@niledatabase/server 3.0.0-alpha.17 → 3.0.0-alpha.18

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -3113,6 +3113,8 @@ var appRoutes = function appRoutes(prefix) {
3113
3113
  };
3114
3114
  };
3115
3115
 
3116
+ // url host does not matter, we only match on the 1st leg by path
3117
+ var ORIGIN = 'http://localhost';
3116
3118
  /**
3117
3119
  * a helper function to log in server side.
3118
3120
  */
@@ -3120,7 +3122,7 @@ function serverAuth(config, handlers) {
3120
3122
  var _Logger = Logger(config, '[server side login]'),
3121
3123
  info = _Logger.info,
3122
3124
  error = _Logger.error;
3123
- var routes = proxyRoutes(config);
3125
+ var routes = appRoutes(config.routePrefix);
3124
3126
  return /*#__PURE__*/function () {
3125
3127
  var _login = _asyncToGenerator( /*#__PURE__*/_regeneratorRuntime().mark(function _callee(_ref) {
3126
3128
  var _providers, _exec;
@@ -3136,7 +3138,7 @@ function serverAuth(config, handlers) {
3136
3138
  throw new Error('Server side login requires a user email and password.');
3137
3139
  case 3:
3138
3140
  info('Obtaining providers for', email);
3139
- sessionUrl = new URL(routes.PROVIDERS);
3141
+ sessionUrl = new URL("" + ORIGIN + routes.PROVIDERS);
3140
3142
  sessionReq = new Request(sessionUrl, {
3141
3143
  method: 'GET',
3142
3144
  headers: new Headers({
@@ -3167,7 +3169,7 @@ function serverAuth(config, handlers) {
3167
3169
  error(_context.t0);
3168
3170
  case 21:
3169
3171
  info('Obtaining csrf');
3170
- csrf = new URL(routes.CSRF);
3172
+ csrf = new URL("" + ORIGIN + routes.CSRF);
3171
3173
  csrfReq = new Request(csrf, {
3172
3174
  method: 'GET',
3173
3175
  headers: new Headers({
@@ -3211,14 +3213,14 @@ function serverAuth(config, handlers) {
3211
3213
  }
3212
3214
  throw new Error('Unable to obtain credential provider. Aborting server side login.');
3213
3215
  case 48:
3214
- signInUrl = new URL(routes.SIGNIN);
3216
+ signInUrl = new URL(credentials.callbackUrl);
3215
3217
  if (csrfCookie) {
3216
3218
  _context.next = 51;
3217
3219
  break;
3218
3220
  }
3219
3221
  throw new Error('Unable to authenticate REST');
3220
3222
  case 51:
3221
- info('Attempting sign in via proxy', signInUrl.href, 'with email', email);
3223
+ info('Attempting sign in with email', email);
3222
3224
  postReq = new Request(signInUrl, {
3223
3225
  method: 'POST',
3224
3226
  headers: new Headers({
@@ -3244,11 +3246,17 @@ function serverAuth(config, handlers) {
3244
3246
  throw new Error('authentication failed');
3245
3247
  case 59:
3246
3248
  _ref3 = (_exec = /(nile\.session-token=.+?);/.exec(authCookie)) != null ? _exec : [], token = _ref3[1];
3249
+ if (token) {
3250
+ _context.next = 62;
3251
+ break;
3252
+ }
3253
+ throw new Error('Server login failed');
3254
+ case 62:
3247
3255
  info('Server login successful', authCookie, csrfCookie);
3248
3256
  return _context.abrupt("return", new Headers({
3249
3257
  cookie: [token, csrfCookie].join('; ')
3250
3258
  }));
3251
- case 62:
3259
+ case 64:
3252
3260
  case "end":
3253
3261
  return _context.stop();
3254
3262
  }