@sebspark/openapi-client 2.1.2 → 2.1.4
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/index.js +16 -10
- package/dist/index.mjs +16 -10
- package/package.json +1 -1
package/dist/index.js
CHANGED
|
@@ -96,36 +96,42 @@ var TypedClient = (baseURL, globalOptions, logger) => {
|
|
|
96
96
|
if (globalOptions?.authorizationTokenGenerator) {
|
|
97
97
|
logger?.debug("Authorization token generator is set");
|
|
98
98
|
import_axios.default.interceptors.request.use(async (request) => {
|
|
99
|
-
|
|
100
|
-
|
|
101
|
-
|
|
102
|
-
|
|
103
|
-
|
|
104
|
-
|
|
105
|
-
);
|
|
99
|
+
const url = `${baseURL}/${request.url}`;
|
|
100
|
+
if (globalOptions?.authorizationTokenGenerator && url) {
|
|
101
|
+
const authorizationTokenHeaders = await globalOptions.authorizationTokenGenerator(url);
|
|
102
|
+
logger?.debug("Authorization token headers");
|
|
103
|
+
logger?.debug(authorizationTokenHeaders);
|
|
104
|
+
logger?.debug("URL");
|
|
105
|
+
logger?.debug(url);
|
|
106
106
|
if (authorizationTokenHeaders) {
|
|
107
107
|
for (const [key, value] of Object.entries(
|
|
108
108
|
authorizationTokenHeaders
|
|
109
109
|
)) {
|
|
110
|
+
logger?.debug(`Setting header ${key} to ${value}`);
|
|
110
111
|
request.headers.set(key, value);
|
|
111
112
|
}
|
|
112
113
|
}
|
|
113
114
|
}
|
|
114
|
-
logger?.debug("
|
|
115
|
+
logger?.debug("Intercepted request");
|
|
116
|
+
logger?.debug(JSON.stringify(request, null, 2));
|
|
115
117
|
return request;
|
|
116
118
|
});
|
|
117
119
|
}
|
|
118
120
|
if (globalOptions?.authorizationTokenRefresh) {
|
|
119
121
|
const refreshAuthLogic = async (failedRequest) => {
|
|
120
|
-
logger?.debug("Failed request"
|
|
122
|
+
logger?.debug("Failed request");
|
|
123
|
+
logger?.debug(failedRequest);
|
|
121
124
|
if (!import_axios.default.isAxiosError(failedRequest)) {
|
|
122
125
|
logger?.error("Failed request is not an axios error");
|
|
123
126
|
return;
|
|
124
127
|
}
|
|
125
128
|
const axiosError = failedRequest;
|
|
129
|
+
logger?.debug("Failed request config");
|
|
130
|
+
logger?.debug(JSON.stringify(axiosError.config, null, 2));
|
|
126
131
|
const url = `${axiosError.config?.baseURL}${axiosError.config?.url}`;
|
|
127
|
-
logger?.debug("Failed request config", axiosError.config);
|
|
128
132
|
if (globalOptions?.authorizationTokenRefresh && url) {
|
|
133
|
+
logger?.debug("Refreshing token for URL");
|
|
134
|
+
logger?.debug(url);
|
|
129
135
|
await globalOptions?.authorizationTokenRefresh(url);
|
|
130
136
|
}
|
|
131
137
|
};
|
package/dist/index.mjs
CHANGED
|
@@ -61,36 +61,42 @@ var TypedClient = (baseURL, globalOptions, logger) => {
|
|
|
61
61
|
if (globalOptions?.authorizationTokenGenerator) {
|
|
62
62
|
logger?.debug("Authorization token generator is set");
|
|
63
63
|
axios.interceptors.request.use(async (request) => {
|
|
64
|
-
|
|
65
|
-
|
|
66
|
-
|
|
67
|
-
|
|
68
|
-
|
|
69
|
-
|
|
70
|
-
);
|
|
64
|
+
const url = `${baseURL}/${request.url}`;
|
|
65
|
+
if (globalOptions?.authorizationTokenGenerator && url) {
|
|
66
|
+
const authorizationTokenHeaders = await globalOptions.authorizationTokenGenerator(url);
|
|
67
|
+
logger?.debug("Authorization token headers");
|
|
68
|
+
logger?.debug(authorizationTokenHeaders);
|
|
69
|
+
logger?.debug("URL");
|
|
70
|
+
logger?.debug(url);
|
|
71
71
|
if (authorizationTokenHeaders) {
|
|
72
72
|
for (const [key, value] of Object.entries(
|
|
73
73
|
authorizationTokenHeaders
|
|
74
74
|
)) {
|
|
75
|
+
logger?.debug(`Setting header ${key} to ${value}`);
|
|
75
76
|
request.headers.set(key, value);
|
|
76
77
|
}
|
|
77
78
|
}
|
|
78
79
|
}
|
|
79
|
-
logger?.debug("
|
|
80
|
+
logger?.debug("Intercepted request");
|
|
81
|
+
logger?.debug(JSON.stringify(request, null, 2));
|
|
80
82
|
return request;
|
|
81
83
|
});
|
|
82
84
|
}
|
|
83
85
|
if (globalOptions?.authorizationTokenRefresh) {
|
|
84
86
|
const refreshAuthLogic = async (failedRequest) => {
|
|
85
|
-
logger?.debug("Failed request"
|
|
87
|
+
logger?.debug("Failed request");
|
|
88
|
+
logger?.debug(failedRequest);
|
|
86
89
|
if (!axios.isAxiosError(failedRequest)) {
|
|
87
90
|
logger?.error("Failed request is not an axios error");
|
|
88
91
|
return;
|
|
89
92
|
}
|
|
90
93
|
const axiosError = failedRequest;
|
|
94
|
+
logger?.debug("Failed request config");
|
|
95
|
+
logger?.debug(JSON.stringify(axiosError.config, null, 2));
|
|
91
96
|
const url = `${axiosError.config?.baseURL}${axiosError.config?.url}`;
|
|
92
|
-
logger?.debug("Failed request config", axiosError.config);
|
|
93
97
|
if (globalOptions?.authorizationTokenRefresh && url) {
|
|
98
|
+
logger?.debug("Refreshing token for URL");
|
|
99
|
+
logger?.debug(url);
|
|
94
100
|
await globalOptions?.authorizationTokenRefresh(url);
|
|
95
101
|
}
|
|
96
102
|
};
|