fix: use updated csrf token on first login #117
Merged
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Is your PR related to a specific issue/feature? Please describe and mention issues.
Closes #108 and probably related #6 (comments from @alecritson).
Due to the Nuxt hack with the
runWithContext
call for request/response interceptors, there was an edge case when cookies after refresh were not included in the result headers due to missingawait
keyword, thus CSRF token was missing or was used from the previous API response.Additional context
This PR changes how the Nuxt instance will be passed to each interceptor. Now each interceptor is wrapped with the current instance context instead of running a loop with one instance.
Checklist: