Compare commits

...

28 Commits

Author SHA1 Message Date
Pilou
f7a3136086 Merge pull request #670 from nhost/changeset-release/main
chore: update versions
2022-06-03 20:06:20 +02:00
github-actions[bot]
b5642586a4 chore: update versions 2022-06-03 14:00:05 +00:00
Pilou
cadc8f8864 Merge pull request #667 from nhost/662-invalid-url-when-using-google-provider
fix: correct rewriting options when `clientUrl` is not available
2022-06-03 15:58:17 +02:00
Pierre-Louis Mercereau
1dc2bce05a refactor: add tests and inline docs 2022-06-03 14:41:15 +02:00
Pilou
65588268f6 Merge pull request #669 from nhost/contributors-readme-action-hUXZuGw8l3
contributors readme action update
2022-06-03 13:37:21 +02:00
github-actions[bot]
a6b15bb387 contrib-readme-action has updated readme 2022-06-03 10:07:07 +00:00
Pilou
7b8f64ab25 Merge pull request #668 from nbourdin/patch-2
Update github-integration.mdx
2022-06-03 12:06:50 +02:00
Nicolas Bourdin
451b62d641 Update github-integration.mdx 2022-06-03 12:05:04 +02:00
Pierre-Louis Mercereau
08a37aae7c fix: correct rewriting options when clientUrl is not available
The client URL is set to `window.location.origin`, so it can rewrite redirection urls that are
passed on to authenticaion methods. However, `clientUrl` is set to `''` when running on the server
side. This fix then avoid raising an error when trying to rewrite `redirectTo` on non-browser
environment, and forces `useProviderLink` to be rendered on the client side.
2022-06-03 11:41:52 +02:00
Johan Eliasson
679c32cb5a Merge pull request #658 from nhost/docs-storage
Docs: Storage and small fixes
2022-06-02 17:03:13 +02:00
Johan Eliasson
25bc2bee67 small updates 2022-06-02 15:34:17 +02:00
Szilárd Dóró
ce1ea16981 Merge pull request #661 from nhost/changeset-release/main
chore: update versions
2022-06-02 12:50:27 +02:00
github-actions[bot]
7048eaf0bb chore: update versions 2022-06-02 10:47:48 +00:00
Szilárd Dóró
9c382a3773 Merge pull request #660 from nhost/fix/esm-rollback
chore: reverted ESM related changes
2022-06-02 12:46:57 +02:00
Johan Eliasson
7f07c75dc4 Merge pull request #659 from gdangelo/docs/quickstarts-nextjs
docs: Add skip option to useQuery call to skip query if id is falsy
2022-06-02 12:44:13 +02:00
Szilárd Dóró
ebad09364e added changeset 2022-06-02 12:43:40 +02:00
Szilárd Dóró
cbec4dbab6 chore: reverted ESM related changes
ESM gods didn't like me 😞 we'll come back to this in the future
2022-06-02 11:26:23 +02:00
Johan Eliasson
a05d7585a3 typo 2022-06-02 10:51:15 +02:00
Johan Eliasson
89f823fdce stronger 2022-06-02 10:50:08 +02:00
Johan Eliasson
6f4d465f54 main repo 2022-06-02 10:48:23 +02:00
Johan Eliasson
aafbaa8d25 update 2022-06-02 10:37:47 +02:00
Johan Eliasson
0f7b31497f storage update 2022-06-02 09:33:36 +02:00
Grégory D'Angelo
bcf2751625 docs: Add skip option to useQuery call to skip query if id is falsy 2022-06-02 09:20:53 +02:00
Johan Eliasson
1965fc85d6 storage started 2022-06-02 08:30:46 +02:00
Johan Eliasson
a8a7c32ec1 better docs for magic link and sms 2022-06-02 07:21:36 +02:00
Johan Eliasson
e8232cdfbb better phone number sign in docs 2022-06-02 07:14:28 +02:00
Johan Eliasson
066489e3d4 zoom images 2022-06-02 07:00:34 +02:00
Johan Eliasson
de10d84cc1 started 2022-06-01 23:24:11 +02:00
74 changed files with 626 additions and 270 deletions

View File

@@ -264,6 +264,13 @@ Here are some ways of contributing to making Nhost better:
<sub><b>Mustafa Hanif</b></sub>
</a>
</td>
<td align="center">
<a href="https://github.com/nbourdin">
<img src="https://avatars.githubusercontent.com/u/5602476?v=4" width="100;" alt="nbourdin"/>
<br />
<sub><b>Nicolas Bourdin</b></sub>
</a>
</td>
<td align="center">
<a href="https://github.com/timpratim">
<img src="https://avatars.githubusercontent.com/u/32492961?v=4" width="100;" alt="timpratim"/>
@@ -291,15 +298,15 @@ Here are some ways of contributing to making Nhost better:
<br />
<sub><b>Anders Kjær Damgaard</b></sub>
</a>
</td>
</td></tr>
<tr>
<td align="center">
<a href="https://github.com/Sonichigo">
<img src="https://avatars.githubusercontent.com/u/53110238?v=4" width="100;" alt="Sonichigo"/>
<br />
<sub><b>Animesh Pathak</b></sub>
</a>
</td></tr>
<tr>
</td>
<td align="center">
<a href="https://github.com/rustyb">
<img src="https://avatars.githubusercontent.com/u/53086?v=4" width="100;" alt="rustyb"/>
@@ -334,15 +341,15 @@ Here are some ways of contributing to making Nhost better:
<br />
<sub><b>Hoang Do</b></sub>
</a>
</td>
</td></tr>
<tr>
<td align="center">
<a href="https://github.com/MelodicCrypter">
<img src="https://avatars.githubusercontent.com/u/18341500?v=4" width="100;" alt="MelodicCrypter"/>
<br />
<sub><b>Hugh Caluscusin</b></sub>
</a>
</td></tr>
<tr>
</td>
<td align="center">
<a href="https://github.com/jladuval">
<img src="https://avatars.githubusercontent.com/u/1935359?v=4" width="100;" alt="jladuval"/>
@@ -364,13 +371,6 @@ Here are some ways of contributing to making Nhost better:
<sub><b>Max Reynolds</b></sub>
</a>
</td>
<td align="center">
<a href="https://github.com/nbourdin">
<img src="https://avatars.githubusercontent.com/u/5602476?v=4" width="100;" alt="nbourdin"/>
<br />
<sub><b>Nicolas Bourdin</b></sub>
</a>
</td>
<td align="center">
<a href="https://github.com/ghoshnirmalya">
<img src="https://avatars.githubusercontent.com/u/6391763?v=4" width="100;" alt="ghoshnirmalya"/>

View File

@@ -59,7 +59,6 @@ module.exports = {
allowArrowFunction: true,
allowAnonymousFunction: true
}
],
'import/extensions': ['error', { js: 'always' }]
]
}
}

View File

@@ -1,4 +1,4 @@
const base = require('./.eslint.base.js')
const base = require('./.eslint.base')
module.exports = {
...base,
extends: ['react-app', 'plugin:react/recommended', 'plugin:react-hooks/recommended'],

View File

@@ -1,4 +1,4 @@
const base = require('./.eslint.base.js')
const base = require('./.eslint.base')
module.exports = {
...base,
extends: ['plugin:import/recommended', 'plugin:import/typescript'],

View File

@@ -13,23 +13,6 @@ const entry = fs.existsSync(tsEntry) ? tsEntry : tsEntry.replace('.ts', '.tsx')
const deps = [...Object.keys(Object.assign({}, pkg.peerDependencies, pkg.dependencies))]
function createModuleJsAndMapAfterBuild() {
return {
closeBundle() {
if (
fs.existsSync(path.join(PWD, 'dist/index.esm.js')) &&
fs.existsSync(path.join(PWD, 'dist/index.esm.js.map'))
) {
fs.copyFileSync(path.join(PWD, 'dist/index.esm.js'), path.join(PWD, 'dist/index.esm.mjs'))
fs.copyFileSync(
path.join(PWD, 'dist/index.esm.js.map'),
path.join(PWD, 'dist/index.esm.mjs.map')
)
}
}
}
}
export default defineConfig({
plugins: [
tsconfigPaths(),
@@ -42,8 +25,7 @@ export default defineConfig({
})
fs.rmdirSync(path.join(PWD, 'dist/src'))
}
}),
createModuleJsAndMapAfterBuild()
})
],
test: {
globals: true,
@@ -68,11 +50,11 @@ export default defineConfig({
globals: {
graphql: 'graphql',
'@apollo/client': '@apollo/client',
'@apollo/client/core/index.js': '@apollo/client/core',
'@apollo/client/link/context/index.js': '@apollo/client/link/context',
'@apollo/client/react/index.js': '@apollo/client/react',
'@apollo/client/link/subscriptions/index.js': '@apollo/client/link/subscriptions',
'@apollo/client/utilities/index.js': '@apollo/client/utilities',
'@apollo/client/core': '@apollo/client/core',
'@apollo/client/link/context': '@apollo/client/link/context',
'@apollo/client/react': '@apollo/client/react',
'@apollo/client/link/subscriptions': '@apollo/client/link/subscriptions',
'@apollo/client/utilities': '@apollo/client/utilities',
'graphql-ws': 'graphql-ws',
xstate: 'xstate',
axios: 'axios',

View File

@@ -1,6 +1,6 @@
import { defineConfig } from 'vite'
import viteLibConfig from './vite.lib.config.js'
import viteLibConfig from './vite.lib.config'
export default defineConfig({
...viteLibConfig,

View File

@@ -3,7 +3,7 @@ import path from 'path'
import { defineConfig } from 'vite'
import tsconfigPaths from 'vite-tsconfig-paths'
import baseLibConfig from './vite.lib.config.js'
import baseLibConfig from './vite.lib.config'
const PWD = process.env.PWD
const pkg = require(path.join(PWD, 'package.json'))

View File

@@ -2,7 +2,7 @@ import { defineConfig } from 'vite'
import react from '@vitejs/plugin-react'
import baseLibConfig from './vite.lib.config.js'
import baseLibConfig from './vite.lib.config'
export default defineConfig({
...baseLibConfig,

View File

@@ -1,6 +1,6 @@
import { defineConfig } from 'vite'
import viteReactConfig from './vite.react.config.js'
import viteReactConfig from './vite.react.config'
export default defineConfig({
...viteReactConfig,

View File

@@ -5,7 +5,7 @@ import tsconfigPaths from 'vite-tsconfig-paths'
import react from '@vitejs/plugin-react'
import baseLibConfig from './vite.lib.config.js'
import baseLibConfig from './vite.lib.config'
const PWD = process.env.PWD
const pkg = require(path.join(PWD, 'package.json'))

View File

@@ -2,7 +2,7 @@ import { defineConfig } from 'vite'
import vue from '@vitejs/plugin-vue'
import baseLibConfig from './vite.lib.config.js'
import baseLibConfig from './vite.lib.config'
export default defineConfig({
...baseLibConfig,

View File

@@ -1,6 +1,6 @@
import { defineConfig } from 'vite'
import viteVueConfig from './vite.vue.config.js'
import viteVueConfig from './vite.vue.config'
export default defineConfig({
...viteVueConfig,

View File

@@ -5,7 +5,7 @@ import tsconfigPaths from 'vite-tsconfig-paths'
import vue from '@vitejs/plugin-vue'
import baseLibConfig from './vite.lib.config.js'
import baseLibConfig from './vite.lib.config'
const PWD = process.env.PWD
const pkg = require(path.join(PWD, 'package.json'))

View File

@@ -9,6 +9,14 @@ Follow this guide to sign in users with Magic Link, also called passwordless ema
The Magic Link sign-in method enables you to sign in users to your app using an email address, without requiring a password.
## Setup
Enable the Magic Link sign-in method in the Nhost dashboard under **Users** -> **Login settings** -> **Magic Link**.
![Magic Link Setup with Nhost](/img/platform/authentication/sign-in-methods/magic-link/magic-link-setup.png)
## Sign In
To sign in users with Magic Link is a two-step process:
1. Send a Magic Link to the user's email address.
@@ -21,3 +29,5 @@ nhost.auth.signIn({
email: 'joe@example.com'
})
```
If you want to change the email for your magic link emails, you can do so by changing the [email templates](/platform/authentication/email-templates).

View File

@@ -7,22 +7,53 @@ image: /img/og/platform/sign-in-with-phone-number-sms.png
Follow this guide to sign in users with a phone number (SMS).
## Setup
You need a [Twilio account](https://www.twilio.com/try-twilio) to use this feature because all SMS are sent through Twilio.
Enable the Phone Number (SMS) sign-in method in the Nhost dashboard under **Users** -> **Login settings** -> **Passwordless SMS**.
You need to insert the following settings in the Nhost dashboard from Twilio:
- Account SID
- Auth Token
- Messaging Service SID (or a Twilio phone number)
<video width="99%" autoPlay muted loop controls="true" style={{marginBottom: '15px'}}>
<source src="/videos/enable-sms-sign-in.mp4" type="video/mp4" />
</video>
## Sign In
To sign in users with a phone number is a two-step process:
1. Send a one-time password (OTP) to the user's phone number.
2. The user uses the OTP to sign in
2. The user uses the OTP to sign in.
```js
// Step 1: Send OTP to the user's phone number
await nhost.auth.signIn({
phoneNumber: '0011233213123'
phoneNumber: '+11233213123'
})
// Step 2: Sign in user using their phone number and OTP
await nhost.auth.signIn({
phoneNumber: '0011233213123'
phoneNumber: '+11233213123'
// highlight-next-line
otp: '123456',
})
```
The first time a user signs in using a phone number, the user is created. That means you don't need to sign up the user before signin in the user.
:::info
Phone numbers should start with `+` (not `00`) to follow the [E.164 formatting standard](https://en.wikipedia.org/wiki/E.164).
:::
## Other SMS Providers
We only support Twilio for now. If you want support for another SMS provider, please create an issue on [GitHub](https://github.com/nhost/nhost).

View File

@@ -15,7 +15,7 @@ The following things are deployed:
- Serverless Functions
:::info
Settings in `nhost/config.yaml` are **not** deployed. That menas you need to manually sync settings between local and remote environments between the CLI and Nhost Cloud.
Settings in `nhost/config.yaml` are **not** deployed. That means you need to manually sync settings between local and remote environments between the CLI and Nhost Cloud.
:::
## Connecting a GitHub repository

View File

@@ -673,7 +673,8 @@ export function UserProvider({ children = null }) {
const id = useUserId()
// highlight-start
const { loading, error, data } = useQuery(GET_USER_QUERY, {
variables: { id }
variables: { id },
skip: !id
})
const user = data?.user
// highlight-end

View File

@@ -1,102 +0,0 @@
---
title: 'Storage'
sidebar_position: 7
image: /img/og/platform/storage.png
---
Nhost stores and serves files of any type in your backend.
The metadata for files hosted on Nhost is available in the `storage.files` table of your database, and thus is also accessible in the GraphQL API. This allows you to fetch a list of files to display in your frontend, for example.
---
## Buckets
Buckets are used to organize files and group permissions for files. Buckets are stored in the `storage.buckets` table in your database, and accessible via `buckets` in your GraphQL API.
Buckets are a way to segment permissions for file type, minimum and maximum file size, cache control, download expiration, and if pre-signed URLs are allowed.
---
## Permissions
Upload, read and delete permissions for files are managed through Hasura's permission system, just like other permissions.
### Upload
To upload a file, a user must have the `insert` permission to the `storage.files` table. The following columns must be checked:
- `id`
- `bucket_id`
- `name`
- `mime_type`
### Select
To read and download a file, a user must have the `select` permission to the `storage.files` table. Only the `id` column is required, but as a best practice you should allow reading all columns.
### Delete
To delete a file, a user must have the `delete` permission to the `storage.files` table.
> Updating an existing file is not supported. Delete and upload a new file instead.
---
## Accessing files
To access a file, make an HTTP GET request to `/v1/storage/files/{id}` with the `Authorization` header set with the access token returned by Nhost Auth. Alternatively, you can create a pre-signed URL by making an HTTP GET request to `/v1/storage/files/{id}/presignedurl` with the `Authorization` header set with the access token returned by Nhost Auth.
If the file is publicly accessible, there is no need to set the `Authorization` header. The file is publicly accessible if the permission for the `public` role is set to allow reading the file metadata in Hasura for the `storage.files` table.
### Pre-signed URL
A pre-signed URL is a unique URL that is used to access the file. Anyone with the pre-signed URL can access the file without exceptions. The URL is generated by Nhost Storage API and is valid for a limited time. The time limit of the pre-signed URL is determined by the `download_expiration` column in the bucket where the file is.
Using pre-signed URL is a good way to share files to people who don't have access to the file directly, or to access the file without setting the `Authorization` headers, for example when displaying the file in an `img` tag.
## Example with GraphQL
Let's say we're building a CRM and we want to store files for each customer.
In our CRM, we have the following two tables:
- `customers`
- `id`
- `name`
- `address`
- `customer_files`
- `id`
- `customer_id` (foreign key to `customers.id`)
- `file_id` (foreign key to `storage.files.id`)
We also have created relationships between `customers` and `customer_files` and between `customer_files` and `storage.files`.
We can now query the data with the following query:
```graphql
query {
customer {
# customer table
id
name
customer_files {
# customer_files table
id
file {
# storage.files table
id
name
size
mime_type
}
}
}
}
```
To upload a file, this is what we do;
1. Upload a file
2. Get the `id` of the file. The server returns this.
3. Insert the `id` of the file together with the customer's id into the `customer_files` table.

View File

@@ -0,0 +1,244 @@
---
title: 'Storage'
sidebar_position: 7
image: /img/og/platform/storage.png
---
import Tabs from '@theme/Tabs'
import TabItem from '@theme/TabItem'
Nhost Storage enables you to let your users upload and download files. Nhost Storage is integrated with the [GraphQL API](/platform/graphql) and its permission system from Hasura.
## Files
Files can be of any type, such as images, documents, videos, etc.
File metadata is stored in your database in the `files` table in the `storage` schema. This means that file metadata is available in your GraphQL API, which makes it easy to:
- Read file metadata via GraphQL.
- Manage file permissions (in Hasura).
- Create GraphQL relationships between files and your database tables.
:::warning
Don't modify the database schema, nor GraphQL root fields in any of the tables in the `storage` schema.
:::
:::tip
You're allowed to add and modify the following:
- GraphQL Relationships
- Permissions
:::
### Upload File
When a file is uploaded, the file metadata is inserted into the `storage.files` table and a file `id` is returned. The file's `id` is how you reference and access the file. It's recommended to create your own table to store the uploaded file `id`, to access the file in the future.
<Tabs groupId="http-sdk">
<TabItem value="js" label="JavaScript">
```js
await nhost.storage.upload({ file })
```
Learn more about [`upload()`](/reference/javascript/storage/upload).
</TabItem>
<TabItem value="http" label="HTTP" default>
```http
POST /v1/storage/files HTTP/1.1
```
</TabItem>
</Tabs>
### Download File
There are two ways to download a file:
- Public URL.
- Pre-signed URL.
#### Public URL
Public URLs are available for both unauthenticated and authenticated users. Permissions are checked for every file request. To get a public URL for a file, you would normally use the `public` role to set **select** permissions.
<Tabs groupId="http-sdk">
<TabItem value="js" label="JavaScript">
```js
await nhost.storage.getPublicUrl({
fileId: '<File-ID>'
})
```
Learn more about [`getPublicUrl()`](/reference/javascript/storage/get-public-url).
</TabItem>
<TabItem value="http" label="HTTP" default>
```http
GET /v1/storage/files/{file_id} HTTP/1.1
```
</TabItem>
</Tabs>
#### Pre-signed URL
Pre-signed URLs work a bit differently from public URLs.
The permission check only happens when the user requests a pre-signed URL. Once a pre-signed URL is generated, anyone with the pre-signed URL can download the file.
Pre-signed URLs expire, and stop work, after a set amount of time. By default, for files in the `default` bucket, the expiration time is 30 seconds. You can change the expiration time for pre-signed URLs by changing the `download_expiration` (in seconds) field on the bucket where the file is located.
<Tabs groupId="http-sdk">
<TabItem value="js" label="JavaScript">
```js
await nhost.storage.getPresignedUrl({
fileId: '<File-ID>'
})
```
Learn more about [`getPresignedUrl()`](/reference/javascript/storage/get-presigned-url).
</TabItem>
<TabItem value="http" label="HTTP" default>
```http
GET /v1/storage/files/{file_id}/presignedurl HTTP/1.1
```
</TabItem>
</Tabs>
### Delete File
Delete a file and the file metadata in the database.
<Tabs groupId="http-sdk">
<TabItem value="js" label="JavaScript">
```js
const { error } = await nhost.storage.delete({ fileId: 'uuid' })
```
Learn more about [`delete()`](/reference/javascript/storage/delete).
</TabItem>
<TabItem value="http" label="HTTP" default>
```http
DELETE /v1/storage/files/{file_id} HTTP/1.1
```
</TabItem>
</Tabs>
## Buckets
Buckets are used to organize files and group permissions for files. Buckets are stored in the `storage.buckets` table in your database, and accessible via `buckets` in your GraphQL API.
For each bucket, you can specify file permissions for the following properties:
- MIME type.
- Minimum size.
- Maximum size.
- Cache control.
- Allow pre-signed URLs.
- Download expiration (for pre-signed URLs).
There is a default bucket (`default`) that is used if no bucket is specified during file upload. It's not possible to delete the `default` bucket.
## Permissions
Permissions to upload, download, and delete files are managed through Hasura's permission system on the `storage.files` table.
### Upload
To upload a file, a user must have the **`insert` permission** to the `storage.files` table. The following columns must be allowed to insert:
- `id`
- `bucket_id`
- `name`
- `mime_type`
### Download
To download a file, a user must have the **`select` permission** to the `storage.files` table. Only the `id` column is required, but we recommend allowing to select all columns.
### Delete
To delete a file, a user must have the **`delete` permission** to the `storage.files` table.
Updating an existing file is not supported. If you need to update a file, delete the file and upload a new file.
Just deleting the file metadata in the `storage.files` table does **not** delete the actual file. Always delete files via Nhost Storage. This way, both the file metadata and the actual file are deleted.
## Image Transformation
Images can be transformed, on the fly, by adding query parameters. The following query parameters are available:
- `w` - Width of the image in pixels.
- `h` - Height of the image in pixels.
Image Transformation works on both public and pre-signed URLs.
**Example**: Transform an image to 500px width (`?w=500`):
```text
https://[subdomain].nhost.run/v1/storage/files/08e6fa32-0880-4d0e-a832-278198acb363?w=500
```
## Example: CRM System
Let's say you want to build a CRM system and you want to store files for customers. This is one way how you could do that.
Start with, you would have two tables:
1. `customers` - Customer data.
2. `customer_files` - What file belongs to what customer.
```text
- customers
- id
- name
- address
customer_files
- id
- customer_id (Foreign Key to `customers.id`)
- file_id (Foreign Key to `storage.files.id`)
```
You would also create [Hasura Relationships](https://hasura.io/docs/latest/graphql/core/databases/postgres/schema/table-relationships/index/) (GraphQL relationships) between between `customers` and `customer_files` and between `customer_files` and `storage.files`.
With the two tables and GraphQL relationships in place, you can query customers and the customer's files like this:
```graphql
query {
customers { # customers table
id
name
customer_files { # customer_files tabel
id
file { # storage.files table
id
name
size
mimeType
}
}
}
}
```
The file upload process would be as follows:
1. Upload a file.
2. Get the returned file id.
3. Insert the file `id` and the customer's `id` into the `customer_files` table.
This would allow you to upload and download files belonging to specific customers in your CRM system.

View File

@@ -26,7 +26,7 @@ const config = {
favicon: 'img/favicon.png',
organizationName: 'nhost',
projectName: 'docs',
plugins: [require.resolve("docusaurus-plugin-image-zoom")],
presets: [
[
'classic',
@@ -180,6 +180,16 @@ const config = {
apiKey: 'a76361eaed8ebcd4cf5d9ae2f0c9e746',
indexName: 'nhost',
contextualSearch: false
},
zoom: {
selector: '.markdown :not(em) > img',
config: {
// options you can specify via https://github.com/francoischalifour/medium-zoom#usage
background: {
light: 'rgb(255, 255, 255)',
dark: 'rgb(50, 50, 50)'
}
}
}
})
}

View File

@@ -20,6 +20,7 @@
"@docusaurus/preset-classic": "2.0.0-beta.20",
"@mdx-js/react": "^1.6.22",
"clsx": "^1.1.1",
"docusaurus-plugin-image-zoom": "^0.1.1",
"mdx-mermaid": "^1.2.1",
"mermaid": "^8.14.0",
"prism-react-renderer": "^1.3.1",

Binary file not shown.

After

Width:  |  Height:  |  Size: 667 KiB

Binary file not shown.

View File

@@ -5,7 +5,6 @@ module.exports = {
'plugin:@next/next/recommended'
],
rules: {
'react/react-in-jsx-scope': 'off',
'import/extensions': 'off'
'react/react-in-jsx-scope': 'off'
}
}

View File

@@ -1,6 +1,6 @@
import { FaFacebook, FaGithub, FaGoogle } from 'react-icons/fa'
import { useProviderLink } from '@nhost/react'
import { useProviderLink } from '@nhost/nextjs'
import AuthLink from './AuthLink'

View File

@@ -15,7 +15,7 @@
<script lang="ts">
import { computed, defineComponent } from 'vue'
import { gql } from '@apollo/client/core/index.js'
import { gql } from '@apollo/client/core'
import { useAuthenticated } from '@nhost/vue'
import { useQuery } from '@vue/apollo-composable'

View File

@@ -1,5 +1,5 @@
<script setup lang="ts">
import { gql } from '@apollo/client/core/index.js'
import { gql } from '@apollo/client/core'
import { useNhostClient, useUserId } from '@nhost/vue'
import { useMutation, useSubscription } from '@vue/apollo-composable'
import { computed, ref } from 'vue'

View File

@@ -1,5 +1,19 @@
# @nhost/apollo
## 0.5.13
### Patch Changes
- @nhost/nhost-js@1.2.4
## 0.5.12
### Patch Changes
- ebad0936: reverted ESM related changes
- Updated dependencies [ebad0936]
- @nhost/nhost-js@1.2.3
## 0.5.11
### Patch Changes

View File

@@ -1,6 +1,6 @@
{
"name": "@nhost/apollo",
"version": "0.5.11",
"version": "0.5.13",
"description": "Nhost Apollo Client library",
"license": "MIT",
"keywords": [
@@ -22,7 +22,7 @@
"url": "https://github.com/nhost/nhost.git"
},
"main": "dist/index.cjs.js",
"module": "dist/index.esm.mjs",
"module": "dist/index.esm.js",
"types": "dist/index.d.ts",
"source": "src/index.ts",
"files": [
@@ -32,11 +32,8 @@
],
"exports": {
".": {
"node": {
"import": "./dist/index.esm.mjs",
"require": "./dist/index.cjs.js"
},
"default": "./dist/index.esm.js"
"import": "./dist/index.esm.js",
"require": "./dist/index.cjs.js"
}
},
"publishConfig": {

View File

@@ -7,10 +7,10 @@ import {
RequestHandler,
split,
WatchQueryFetchPolicy
} from '@apollo/client/core/index.js'
import { setContext } from '@apollo/client/link/context/index.js'
import { GraphQLWsLink } from '@apollo/client/link/subscriptions/index.js'
import { getMainDefinition } from '@apollo/client/utilities/index.js'
} from '@apollo/client/core'
import { setContext } from '@apollo/client/link/context'
import { GraphQLWsLink } from '@apollo/client/link/subscriptions'
import { getMainDefinition } from '@apollo/client/utilities'
import { NhostClient } from '@nhost/nhost-js'
import { createRestartableClient } from './ws'

View File

@@ -1,5 +1,18 @@
# @nhost/core
## 0.6.5
### Patch Changes
- 08a37aae: correct rewriting options when `clientUrl` is not available
The client URL is set to `window.location.origin`, so it can rewrite redirection urls that are passed on to authenticaion methods. However, `clientUrl` is set to `''` when running on the server side. This fix then avoid raising an error when trying to rewrite `redirectTo` on non-browser environment, and forces `useProviderLink` to be rendered on the client side.
## 0.6.4
### Patch Changes
- ebad0936: reverted ESM related changes
## 0.6.3
### Patch Changes

View File

@@ -1,6 +1,6 @@
{
"name": "@nhost/core",
"version": "0.6.3",
"version": "0.6.5",
"description": "Nhost core client library",
"license": "MIT",
"keywords": [
@@ -21,7 +21,7 @@
"url": "https://github.com/nhost/nhost.git"
},
"main": "dist/index.cjs.js",
"module": "dist/index.esm.mjs",
"module": "dist/index.esm.js",
"types": "dist/index.d.ts",
"source": "src/index.ts",
"files": [
@@ -31,11 +31,8 @@
],
"exports": {
".": {
"node": {
"import": "./dist/index.esm.mjs",
"require": "./dist/index.cjs.js"
},
"default": "./dist/index.esm.js"
"import": "./dist/index.esm.js",
"require": "./dist/index.cjs.js"
}
},
"publishConfig": {

View File

@@ -17,21 +17,39 @@ export const encodeQueryParameters = (baseUrl: string, parameters?: Record<strin
else return baseUrl
}
export const rewriteRedirectTo = <T extends RedirectOption>(clientUrl: string, options?: T) => {
/**
* Transform options that include a redirectTo property so the
* redirect url is absolute, given a base clientUrl.
* If no client url is given, any relative redirectUrl is removed while
* the other options are sent as-is.
* @param clientUrl base client url
* @param options
* @returns
*/
export const rewriteRedirectTo = <T extends RedirectOption>(
clientUrl?: string,
options?: T
): (Omit<T, 'redirectTo'> & { redirectTo?: string }) | undefined => {
if (!options?.redirectTo) {
return options
}
const { redirectTo, ...otherOptions } = options
// * If the clientUrl is not defined, we can't rewrite the redirectTo
if (!clientUrl) {
// * If redirectTo is a relative path, we therefore pull it out of the options
if (redirectTo.startsWith('/')) {
return otherOptions
} else {
return options
}
}
const baseClientUrl = new URL(clientUrl)
const clientParams = Object.fromEntries(new URLSearchParams(baseClientUrl.search))
const url = new URL(
options.redirectTo.startsWith('/')
? baseClientUrl.origin + options.redirectTo
: options.redirectTo
)
const url = new URL(redirectTo.startsWith('/') ? baseClientUrl.origin + redirectTo : redirectTo)
const additionalParams = new URLSearchParams(url.search)
let combinedParams = Object.fromEntries(additionalParams)
if (options.redirectTo.startsWith('/')) {
if (redirectTo.startsWith('/')) {
combinedParams = { ...clientParams, ...combinedParams }
}
let pathName = baseClientUrl.pathname
@@ -39,7 +57,7 @@ export const rewriteRedirectTo = <T extends RedirectOption>(clientUrl: string, o
pathName += url.pathname.slice(1)
}
return {
...options,
...otherOptions,
redirectTo: encodeQueryParameters(url.origin + pathName, combinedParams)
}
}

View File

@@ -1,6 +1,6 @@
import faker from '@faker-js/faker'
import { interpret } from 'xstate'
import { waitFor } from 'xstate/lib/waitFor.js'
import { waitFor } from 'xstate/lib/waitFor'
import { AuthClient } from '../src/client'
import { INVALID_EMAIL_ERROR } from '../src/errors'
import { createAuthMachine, createChangeEmailMachine } from '../src/machines'

View File

@@ -1,6 +1,6 @@
import faker from '@faker-js/faker'
import { interpret } from 'xstate'
import { waitFor } from 'xstate/lib/waitFor.js'
import { waitFor } from 'xstate/lib/waitFor'
import { AuthClient } from '../src/client'
import { INVALID_PASSWORD_ERROR } from '../src/errors'
import { createAuthMachine, createChangePasswordMachine } from '../src/machines'

View File

@@ -1,7 +1,7 @@
import faker from '@faker-js/faker'
import { afterAll, afterEach, beforeAll, expect, test } from 'vitest'
import { interpret } from 'xstate'
import { waitFor } from 'xstate/lib/waitFor.js'
import { waitFor } from 'xstate/lib/waitFor'
import { AuthClient } from '../src/client'
import { INVALID_MFA_CODE_ERROR, INVALID_MFA_TYPE_ERROR } from '../src/errors'
import { createAuthMachine, createEnableMfaMachine } from '../src/machines'

View File

@@ -1,7 +1,7 @@
import faker from '@faker-js/faker'
import { afterAll, afterEach, beforeAll, expect, test } from 'vitest'
import { interpret } from 'xstate'
import { waitFor } from 'xstate/lib/waitFor.js'
import { waitFor } from 'xstate/lib/waitFor'
import { createAuthMachine } from '../src/machines'
import { Typegen0 } from '../src/machines/index.typegen'
import { BASE_URL } from './helpers/config'

View File

@@ -1,6 +1,6 @@
import faker from '@faker-js/faker'
import { interpret } from 'xstate'
import { waitFor } from 'xstate/lib/waitFor.js'
import { waitFor } from 'xstate/lib/waitFor'
import { INVALID_EMAIL_ERROR, INVALID_PASSWORD_ERROR } from '../src/errors'
import { createAuthMachine } from '../src/machines'
import { Typegen0 } from '../src/machines/index.typegen'

View File

@@ -1,6 +1,6 @@
import faker from '@faker-js/faker'
import { interpret } from 'xstate'
import { waitFor } from 'xstate/lib/waitFor.js'
import { waitFor } from 'xstate/lib/waitFor'
import { INVALID_EMAIL_ERROR } from '../src/errors'
import { createAuthMachine } from '../src/machines'
import { Typegen0 } from '../src/machines/index.typegen'

View File

@@ -1,6 +1,6 @@
import faker from '@faker-js/faker'
import { interpret } from 'xstate'
import { waitFor } from 'xstate/lib/waitFor.js'
import { waitFor } from 'xstate/lib/waitFor'
import { INVALID_PHONE_NUMBER_ERROR } from '../src/errors'
import { createAuthMachine } from '../src/machines'
import { Typegen0 } from '../src/machines/index.typegen'

View File

@@ -1,7 +1,7 @@
import faker from '@faker-js/faker'
import { afterAll, afterEach, beforeAll, beforeEach, describe, test, vi } from 'vitest'
import { BaseActionObject, interpret, Interpreter, ResolveTypegenMeta, ServiceMap } from 'xstate'
import { waitFor } from 'xstate/lib/waitFor.js'
import { waitFor } from 'xstate/lib/waitFor'
import {
NHOST_JWT_EXPIRES_AT_KEY,
NHOST_REFRESH_TOKEN_KEY,

View File

@@ -1,6 +1,6 @@
import faker from '@faker-js/faker'
import { interpret } from 'xstate'
import { waitFor } from 'xstate/lib/waitFor.js'
import { waitFor } from 'xstate/lib/waitFor'
import { AuthClient } from '../src/client'
import { INVALID_EMAIL_ERROR } from '../src/errors'
import { createResetPasswordMachine } from '../src/machines'

View File

@@ -1,6 +1,6 @@
import faker from '@faker-js/faker'
import { interpret } from 'xstate'
import { waitFor } from 'xstate/lib/waitFor.js'
import { waitFor } from 'xstate/lib/waitFor'
import { AuthClient } from '../src/client'
import { INVALID_EMAIL_ERROR } from '../src/errors'
import { createSendVerificationEmailMachine } from '../src/machines'

View File

@@ -1,6 +1,6 @@
import faker from '@faker-js/faker'
import { interpret } from 'xstate'
import { waitFor } from 'xstate/lib/waitFor.js'
import { waitFor } from 'xstate/lib/waitFor'
import { NHOST_REFRESH_TOKEN_KEY } from '../src/constants'
import { createAuthMachine } from '../src/machines'
import { Typegen0 } from '../src/machines/index.typegen'

View File

@@ -1,6 +1,6 @@
import faker from '@faker-js/faker'
import { interpret } from 'xstate'
import { waitFor } from 'xstate/lib/waitFor.js'
import { waitFor } from 'xstate/lib/waitFor'
import { INVALID_EMAIL_ERROR, INVALID_PASSWORD_ERROR } from '../src/errors'
import { createAuthMachine } from '../src/machines'
import { Typegen0 } from '../src/machines/index.typegen'

View File

@@ -1,6 +1,6 @@
import faker from '@faker-js/faker'
import { interpret } from 'xstate'
import { waitFor } from 'xstate/lib/waitFor.js'
import { waitFor } from 'xstate/lib/waitFor'
import { INVALID_PHONE_NUMBER_ERROR } from '../src/errors'
import { createAuthMachine } from '../src/machines'
import { Typegen0 } from '../src/machines/index.typegen'

View File

@@ -6,6 +6,18 @@ test(`should not add redirectTo when none is given`, async () => {
expect(rewriteRedirectTo('https://frontend.com')).toBeUndefined()
})
test(`should remove redirectTo when it's relative and no clientUrl is given`, async () => {
const options: RedirectOption = { redirectTo: '/index' }
expect(rewriteRedirectTo('', options)).toEqual({})
expect(rewriteRedirectTo(undefined, options)).toEqual({})
})
test(`should preserve options when redirectTo is not a relative url and no clientUrl is given`, async () => {
const options: RedirectOption = { redirectTo: 'https://frontend.com' }
expect(rewriteRedirectTo('', options)).toEqual(options)
expect(rewriteRedirectTo(undefined, options)).toEqual(options)
})
test(`should append redirectTo with the clientUrl prefix`, async () => {
const options: RedirectOption = { redirectTo: '/index' }

View File

@@ -1,5 +1,11 @@
# @nhost/docgen
## 0.1.2
### Patch Changes
- ebad0936: reverted ESM related changes
## 0.1.1
### Patch Changes

View File

@@ -2,7 +2,7 @@
"name": "@nhost/docgen",
"description": "Documentation generator for classes and functions",
"private": true,
"version": "0.1.1",
"version": "0.1.2",
"license": "MIT",
"main": "dist/index.cjs.js",
"types": "dist/index.d.ts",

View File

@@ -1,5 +1,4 @@
#!/usr/bin/env node
// eslint-disable-next-line import/extensions
import { snapshot } from 'valtio/vanilla'
import { getModuleContentMap } from './helpers'

View File

@@ -1,4 +1,3 @@
// eslint-disable-next-line import/extensions
import { proxyWithComputed } from 'valtio/utils'
export type AppState = {

View File

@@ -1,5 +1,4 @@
import { format } from 'prettier'
// eslint-disable-next-line import/extensions
import { snapshot } from 'valtio/vanilla'
import {

View File

@@ -1,5 +1,20 @@
# @nhost/hasura-auth-js
## 1.1.14
### Patch Changes
- Updated dependencies [08a37aae]
- @nhost/core@0.6.5
## 1.1.13
### Patch Changes
- ebad0936: reverted ESM related changes
- Updated dependencies [ebad0936]
- @nhost/core@0.6.4
## 1.1.12
### Patch Changes

View File

@@ -1,6 +1,6 @@
{
"name": "@nhost/hasura-auth-js",
"version": "1.1.12",
"version": "1.1.14",
"description": "Hasura-auth client",
"license": "MIT",
"keywords": [
@@ -20,7 +20,7 @@
"url": "https://github.com/nhost/nhost.git"
},
"main": "dist/index.cjs.js",
"module": "dist/index.esm.mjs",
"module": "dist/index.esm.js",
"types": "dist/index.d.ts",
"source": "src/index.ts",
"files": [
@@ -30,11 +30,8 @@
],
"exports": {
".": {
"node": {
"import": "./dist/index.esm.mjs",
"require": "./dist/index.cjs.js"
},
"default": "./dist/index.esm.js"
"import": "./dist/index.esm.js",
"require": "./dist/index.cjs.js"
}
},
"publishConfig": {

View File

@@ -1,6 +1,6 @@
import { defineConfig } from 'vite'
import baseConfig from '../../config/vite.lib.config.js'
import baseConfig from '../../config/vite.lib.config'
export default defineConfig({
...baseConfig,

View File

@@ -1,5 +1,11 @@
# @nhost/hasura-storage-js
## 0.3.3
### Patch Changes
- ebad0936: reverted ESM related changes
## 0.3.2
### Patch Changes

View File

@@ -1,6 +1,6 @@
{
"name": "@nhost/hasura-storage-js",
"version": "0.3.2",
"version": "0.3.3",
"description": "Hasura-storage client",
"license": "MIT",
"keywords": [
@@ -18,7 +18,7 @@
"url": "https://github.com/nhost/hasura-storage-js.git"
},
"main": "dist/index.cjs.js",
"module": "dist/index.esm.mjs",
"module": "dist/index.esm.js",
"types": "dist/index.d.ts",
"source": "src/index.ts",
"files": [
@@ -28,11 +28,8 @@
],
"exports": {
".": {
"node": {
"import": "./dist/index.esm.mjs",
"require": "./dist/index.cjs.js"
},
"default": "./dist/index.esm.js"
"import": "./dist/index.esm.js",
"require": "./dist/index.cjs.js"
}
},
"publishConfig": {

View File

@@ -1,5 +1,26 @@
# @nhost/nextjs
## 1.2.13
### Patch Changes
- 08a37aae: correct rewriting options when `clientUrl` is not available
The client URL is set to `window.location.origin`, so it can rewrite redirection urls that are passed on to authenticaion methods. However, `clientUrl` is set to `''` when running on the server side. This fix then avoid raising an error when trying to rewrite `redirectTo` on non-browser environment, and forces `useProviderLink` to be rendered on the client side.
- Updated dependencies [08a37aae]
- @nhost/core@0.6.5
- @nhost/react@0.7.13
- @nhost/nhost-js@1.2.4
## 1.2.12
### Patch Changes
- ebad0936: reverted ESM related changes
- Updated dependencies [ebad0936]
- @nhost/core@0.6.4
- @nhost/nhost-js@1.2.3
- @nhost/react@0.7.12
## 1.2.11
### Patch Changes

View File

@@ -1,6 +1,6 @@
{
"name": "@nhost/nextjs",
"version": "1.2.11",
"version": "1.2.13",
"description": "Nhost NextJS library",
"license": "MIT",
"keywords": [
@@ -24,7 +24,7 @@
"url": "https://github.com/nhost/nhost.git"
},
"main": "dist/index.cjs.js",
"module": "dist/index.esm.mjs",
"module": "dist/index.esm.js",
"types": "dist/index.d.ts",
"source": "src/index.ts",
"files": [
@@ -34,11 +34,8 @@
],
"exports": {
".": {
"node": {
"import": "./dist/index.esm.mjs",
"require": "./dist/index.cjs.js"
},
"default": "./dist/index.esm.js"
"import": "./dist/index.esm.js",
"require": "./dist/index.cjs.js"
}
},
"publishConfig": {

View File

@@ -1,7 +1,7 @@
import Cookies from 'cookies'
import { GetServerSidePropsContext } from 'next'
import { StateFrom } from 'xstate'
import { waitFor } from 'xstate/lib/waitFor.js'
import { waitFor } from 'xstate/lib/waitFor'
import { AuthMachine, NHOST_REFRESH_TOKEN_KEY } from '@nhost/core'
import { NhostClient } from '@nhost/nhost-js'

View File

@@ -1,5 +1,20 @@
# @nhost/nhost-js
## 1.2.4
### Patch Changes
- @nhost/hasura-auth-js@1.1.14
## 1.2.3
### Patch Changes
- ebad0936: reverted ESM related changes
- Updated dependencies [ebad0936]
- @nhost/hasura-auth-js@1.1.13
- @nhost/hasura-storage-js@0.3.3
## 1.2.2
### Patch Changes

View File

@@ -1,6 +1,6 @@
{
"name": "@nhost/nhost-js",
"version": "1.2.2",
"version": "1.2.4",
"description": "Nhost JavaScript SDK",
"license": "MIT",
"keywords": [
@@ -21,7 +21,7 @@
"url": "git+https://github.com/nhost/nhost.git"
},
"main": "dist/index.cjs.js",
"module": "dist/index.esm.mjs",
"module": "dist/index.esm.js",
"types": "dist/index.d.ts",
"source": "src/index.ts",
"files": [
@@ -31,11 +31,8 @@
],
"exports": {
".": {
"node": {
"import": "./dist/index.esm.mjs",
"require": "./dist/index.cjs.js"
},
"default": "./dist/index.esm.js"
"import": "./dist/index.esm.js",
"require": "./dist/index.cjs.js"
}
},
"publishConfig": {

View File

@@ -1,5 +1,22 @@
# @nhost/react-apollo
## 4.2.15
### Patch Changes
- Updated dependencies [08a37aae]
- @nhost/react@0.7.13
- @nhost/apollo@0.5.13
## 4.2.14
### Patch Changes
- ebad0936: reverted ESM related changes
- Updated dependencies [ebad0936]
- @nhost/apollo@0.5.12
- @nhost/react@0.7.12
## 4.2.13
### Patch Changes

View File

@@ -1,6 +1,6 @@
{
"name": "@nhost/react-apollo",
"version": "4.2.13",
"version": "4.2.15",
"description": "Nhost React Apollo client",
"license": "MIT",
"keywords": [
@@ -23,7 +23,7 @@
"url": "git+https://github.com/nhost/nhost.git"
},
"main": "dist/index.cjs.js",
"module": "dist/index.esm.mjs",
"module": "dist/index.esm.js",
"types": "dist/index.d.ts",
"source": "src/index.ts",
"files": [
@@ -33,11 +33,8 @@
],
"exports": {
".": {
"node": {
"import": "./dist/index.esm.mjs",
"require": "./dist/index.cjs.js"
},
"default": "./dist/index.esm.js"
"import": "./dist/index.esm.js",
"require": "./dist/index.cjs.js"
}
},
"publishConfig": {

View File

@@ -3,9 +3,10 @@ import {
OperationVariables,
QueryHookOptions,
SubscriptionHookOptions,
TypedDocumentNode
TypedDocumentNode,
useQuery,
useSubscription
} from '@apollo/client'
import { useQuery, useSubscription } from '@apollo/client/react/index.js'
import { useAuthenticated } from '@nhost/react'
export function useAuthQuery<TData = any, TVariables = OperationVariables>(

View File

@@ -1,7 +1,6 @@
import React, { useEffect, useState } from 'react'
import { ApolloClient } from '@apollo/client/core/index.js'
import { ApolloProvider } from '@apollo/client/react/index.js'
import { ApolloClient, ApolloProvider } from '@apollo/client'
import { createApolloClient, NhostApolloClientOptions } from '@nhost/apollo'
export const NhostApolloProvider: React.FC<

View File

@@ -1,5 +1,22 @@
# @nhost/react-auth
## 3.0.11
### Patch Changes
- Updated dependencies [08a37aae]
- @nhost/react@0.7.13
- @nhost/hasura-auth-js@1.1.14
## 3.0.10
### Patch Changes
- ebad0936: reverted ESM related changes
- Updated dependencies [ebad0936]
- @nhost/hasura-auth-js@1.1.13
- @nhost/react@0.7.12
## 3.0.9
### Patch Changes

View File

@@ -1,6 +1,6 @@
{
"name": "@nhost/react-auth",
"version": "3.0.9",
"version": "3.0.11",
"description": "Nhost React client",
"license": "MIT",
"keywords": [
@@ -22,9 +22,9 @@
"url": "git+https://github.com/nhost/nhost.git"
},
"main": "dist/index.cjs.js",
"module": "dist/index.esm.mjs",
"module": "dist/index.esm.js",
"types": "dist/index.d.ts",
"source": "src/index.tsx",
"source": "src/index.ts",
"files": [
"dist",
"umd",
@@ -32,11 +32,8 @@
],
"exports": {
".": {
"node": {
"import": "./dist/index.esm.mjs",
"require": "./dist/index.cjs.js"
},
"default": "./dist/index.esm.js"
"import": "./dist/index.esm.js",
"require": "./dist/index.cjs.js"
}
},
"publishConfig": {

View File

@@ -1,5 +1,24 @@
# @nhost/react
## 0.7.13
### Patch Changes
- 08a37aae: correct rewriting options when `clientUrl` is not available
The client URL is set to `window.location.origin`, so it can rewrite redirection urls that are passed on to authenticaion methods. However, `clientUrl` is set to `''` when running on the server side. This fix then avoid raising an error when trying to rewrite `redirectTo` on non-browser environment, and forces `useProviderLink` to be rendered on the client side.
- Updated dependencies [08a37aae]
- @nhost/core@0.6.5
- @nhost/nhost-js@1.2.4
## 0.7.12
### Patch Changes
- ebad0936: reverted ESM related changes
- Updated dependencies [ebad0936]
- @nhost/core@0.6.4
- @nhost/nhost-js@1.2.3
## 0.7.11
### Patch Changes

View File

@@ -1,6 +1,6 @@
{
"name": "@nhost/react",
"version": "0.7.11",
"version": "0.7.13",
"description": "Nhost React library",
"license": "MIT",
"keywords": [
@@ -22,7 +22,7 @@
"url": "https://github.com/nhost/nhost.git"
},
"main": "dist/index.cjs.js",
"module": "dist/index.esm.mjs",
"module": "dist/index.esm.js",
"types": "dist/index.d.ts",
"source": "src/index.ts",
"files": [
@@ -32,11 +32,8 @@
],
"exports": {
".": {
"node": {
"import": "./dist/index.esm.mjs",
"require": "./dist/index.cjs.js"
},
"default": "./dist/index.esm.js"
"import": "./dist/index.esm.js",
"require": "./dist/index.cjs.js"
}
},
"publishConfig": {

View File

@@ -1,4 +1,4 @@
import { useContext, useMemo } from 'react'
import { useContext, useEffect, useState } from 'react'
import { encodeQueryParameters, Provider, ProviderOptions, rewriteRedirectTo } from '@nhost/core'
@@ -29,13 +29,25 @@ import { NhostReactContext } from './provider'
* ```
*/
export const useProviderLink = (options?: ProviderOptions) => {
/**
* @internal When using Nextjs or any SSR framework, nhost.auth.client.clientUrl will be set to `undefined`
* as its value is set to window.location.origin.
* This is because the request context is not available when setting up the client `new NhostClient()` outside of
* the React/Nextjs context.
*/
const [isSSR, setIsSSR] = useState(true)
useEffect(() => {
setIsSSR(false)
}, [])
const nhost = useContext(NhostReactContext)
return new Proxy({} as Record<Provider, string>, {
get(_, provider: string) {
return encodeQueryParameters(
`${nhost.auth.client.backendUrl}/signin/provider/${provider}`,
rewriteRedirectTo(nhost.auth.client.clientUrl, options as any)
rewriteRedirectTo(isSSR ? undefined : nhost.auth.client.clientUrl, options as any)
)
}
})

View File

@@ -1,5 +1,22 @@
# @nhost/vue
## 0.1.6
### Patch Changes
- Updated dependencies [08a37aae]
- @nhost/core@0.6.5
- @nhost/nhost-js@1.2.4
## 0.1.5
### Patch Changes
- ebad0936: reverted ESM related changes
- Updated dependencies [ebad0936]
- @nhost/core@0.6.4
- @nhost/nhost-js@1.2.3
## 0.1.4
### Patch Changes

View File

@@ -1,6 +1,6 @@
{
"name": "@nhost/vue",
"version": "0.1.4",
"version": "0.1.6",
"description": "Nhost Vue library",
"license": "MIT",
"keywords": [
@@ -22,7 +22,7 @@
"url": "https://github.com/nhost/nhost.git"
},
"main": "dist/index.cjs.js",
"module": "dist/index.esm.mjs",
"module": "dist/index.esm.js",
"types": "dist/index.d.ts",
"source": "src/index.ts",
"files": [
@@ -32,11 +32,8 @@
],
"exports": {
".": {
"node": {
"import": "./dist/index.esm.mjs",
"require": "./dist/index.cjs.js"
},
"default": "./dist/index.esm.js"
"import": "./dist/index.esm.js",
"require": "./dist/index.cjs.js"
}
},
"publishConfig": {

12
pnpm-lock.yaml generated
View File

@@ -95,6 +95,7 @@ importers:
'@tsconfig/docusaurus': ^1.0.5
'@types/swagger-ui-react': ^4.1.1
clsx: ^1.1.1
docusaurus-plugin-image-zoom: ^0.1.1
mdx-mermaid: ^1.2.1
mermaid: ^8.14.0
prism-react-renderer: ^1.3.1
@@ -108,6 +109,7 @@ importers:
'@docusaurus/preset-classic': 2.0.0-beta.20_66c8c36abcfdbeab71528ce4b75c41f7
'@mdx-js/react': 1.6.22_react@17.0.2
clsx: 1.1.1
docusaurus-plugin-image-zoom: 0.1.1
mdx-mermaid: 1.2.2_mermaid@8.14.0+react@17.0.2
mermaid: 8.14.0
prism-react-renderer: 1.3.1_react@17.0.2
@@ -9697,6 +9699,12 @@ packages:
resolution: {integrity: sha1-6oCxBqh1OHdOijpKWv4pPeSJ4Kk=}
dev: true
/docusaurus-plugin-image-zoom/0.1.1:
resolution: {integrity: sha512-cJXo5TKh9OR1gE4B5iS5ovLWYYDFwatqRm00iXFPOaShZG99l5tgkDKgbQPAwSL9wg4I+wz3aMwkOtDhMIpKDQ==}
dependencies:
medium-zoom: 1.0.6
dev: false
/dom-converter/0.2.0:
resolution: {integrity: sha512-gd3ypIPfOMr9h5jIKq8E3sHOTCjeirnl0WK5ZdS1AW0Odt0b1PaWaHdJ4Qk4klv+YB9aJBS7mESXjFoDQPu6DA==}
dependencies:
@@ -14628,6 +14636,10 @@ packages:
resolution: {integrity: sha1-hxDXrwqmJvj/+hzgAWhUUmMlV0g=}
engines: {node: '>= 0.6'}
/medium-zoom/1.0.6:
resolution: {integrity: sha512-UdiUWfvz9fZMg1pzf4dcuqA0W079o0mpqbTnOz5ip4VGYX96QjmbM+OgOU/0uOzAytxC0Ny4z+VcYQnhdifimg==}
dev: false
/memfs/3.4.1:
resolution: {integrity: sha512-1c9VPVvW5P7I85c35zAdEr1TD5+F11IToIHIlrVIcflfnzPkJa0ZoYEoEdYDP8KgPFoSZ/opDrUsAoZWym3mtw==}
engines: {node: '>= 4.0.0'}