mirror of
https://github.com/Monadical-SAS/reflector.git
synced 2025-12-20 20:29:06 +00:00
* docker-compose for production frontend * fix: Remove external Redis port mapping for Coolify compatibility Redis should only be accessible within the internal Docker network in Coolify deployments to avoid port conflicts with other applications. * fix: Remove external port mapping for web service in Coolify Coolify handles port exposure through its proxy (Traefik), so services should not expose ports directly in the docker-compose file. * server side client envs * missing vars * nextjs experimental * fix claude 'fix' * remove build env vars compose * docker * remove ports for coolify * review * cleanup --------- Co-authored-by: Igor Loskutov <igor.loskutoff@gmail.com>
71 lines
2.2 KiB
TypeScript
71 lines
2.2 KiB
TypeScript
"use client";
|
|
|
|
import createClient from "openapi-fetch";
|
|
import type { paths } from "../reflector-api";
|
|
import createFetchClient from "openapi-react-query";
|
|
import { parseNonEmptyString } from "./utils";
|
|
import { isBuildPhase } from "./next";
|
|
import { getSession } from "next-auth/react";
|
|
import { assertExtendedToken } from "./types";
|
|
import { getClientEnv } from "./clientEnv";
|
|
|
|
export const API_URL = !isBuildPhase
|
|
? getClientEnv().API_URL
|
|
: "http://localhost";
|
|
|
|
export const WEBSOCKET_URL = !isBuildPhase
|
|
? getClientEnv().WEBSOCKET_URL || "ws://127.0.0.1:1250"
|
|
: "ws://localhost";
|
|
|
|
export const client = createClient<paths>({
|
|
baseUrl: API_URL,
|
|
});
|
|
|
|
// will assert presence/absence of login initially
|
|
const initialSessionPromise = getSession();
|
|
|
|
const waitForAuthTokenDefinitivePresenceOrAbsence = async () => {
|
|
const initialSession = await initialSessionPromise;
|
|
if (currentAuthToken === undefined) {
|
|
currentAuthToken =
|
|
initialSession === null
|
|
? null
|
|
: assertExtendedToken(initialSession).accessToken;
|
|
}
|
|
// otherwise already overwritten by external forces
|
|
return currentAuthToken;
|
|
};
|
|
|
|
client.use({
|
|
async onRequest({ request }) {
|
|
const token = await waitForAuthTokenDefinitivePresenceOrAbsence();
|
|
if (token !== null) {
|
|
request.headers.set(
|
|
"Authorization",
|
|
`Bearer ${parseNonEmptyString(token, true, "panic! token is required")}`,
|
|
);
|
|
}
|
|
// XXX Only set Content-Type if not already set (FormData will set its own boundary)
|
|
// This is a work around for uploading file, we're passing a formdata
|
|
// but the content type was still application/json
|
|
if (
|
|
!request.headers.has("Content-Type") &&
|
|
!(request.body instanceof FormData)
|
|
) {
|
|
request.headers.set("Content-Type", "application/json");
|
|
}
|
|
return request;
|
|
},
|
|
});
|
|
|
|
export const $api = createFetchClient<paths>(client);
|
|
|
|
let currentAuthToken: string | null | undefined = undefined;
|
|
|
|
// the function contract: lightweight, idempotent
|
|
export const configureApiAuth = (token: string | null | undefined) => {
|
|
// watch only for the initial loading; "reloading" state assumes token presence/absence
|
|
if (token === undefined && currentAuthToken !== undefined) return;
|
|
currentAuthToken = token;
|
|
};
|