2020-01-26 21:04:33 +01:00
|
|
|
import Vue from 'vue'
|
|
|
|
import axios from 'axios'
|
|
|
|
import VueAxios from 'vue-axios'
|
|
|
|
import router from './routes.js'
|
|
|
|
|
|
|
|
Vue.use(VueAxios, axios)
|
|
|
|
|
|
|
|
Vue.axios.defaults.headers.common['X-Requested-With'] = 'XMLHttpRequest';
|
2022-10-18 14:42:02 +02:00
|
|
|
Vue.axios.defaults.headers.common['Content-Type'] = 'application/json'
|
2020-01-26 21:04:33 +01:00
|
|
|
|
2023-01-25 16:58:30 +01:00
|
|
|
if (window.appConfig.subdirectory) {
|
2023-01-20 17:36:15 +01:00
|
|
|
Vue.axios.defaults.baseURL = window.appConfig.subdirectory;
|
|
|
|
}
|
|
|
|
|
2020-01-26 21:04:33 +01:00
|
|
|
Vue.axios.interceptors.response.use(response => response, error => {
|
2023-08-04 15:13:30 +02:00
|
|
|
|
|
|
|
// Whether or not the promise must be returned, if unauthenticated is received
|
|
|
|
// we update the auth state of the front-end
|
|
|
|
if ( error.response.status === 401 ) {
|
|
|
|
Vue.$storage.remove('authenticated')
|
|
|
|
}
|
2020-01-26 21:04:33 +01:00
|
|
|
|
2020-01-27 21:13:21 +01:00
|
|
|
// Return the error when we need to handle it at component level
|
2020-01-26 21:57:53 +01:00
|
|
|
if( error.config.hasOwnProperty('returnError') && error.config.returnError === true ) {
|
|
|
|
return Promise.reject(error);
|
|
|
|
}
|
|
|
|
|
2020-01-27 21:13:21 +01:00
|
|
|
// Return the error for form validation at component level
|
2020-01-26 21:57:53 +01:00
|
|
|
if( error.response.status === 422 ) {
|
|
|
|
return Promise.reject(error);
|
|
|
|
}
|
2020-01-26 21:04:33 +01:00
|
|
|
|
2022-10-19 13:12:49 +02:00
|
|
|
// Push to the login view and force the page to refresh to get a fresh CSRF token
|
2020-02-27 09:30:02 +01:00
|
|
|
if ( error.response.status === 401 ) {
|
2022-10-19 13:12:49 +02:00
|
|
|
router.push({ name: 'login', params: { forceRefresh: true } })
|
2023-08-28 08:33:14 +02:00
|
|
|
return new Promise(() => {})
|
2020-02-27 09:30:02 +01:00
|
|
|
}
|
2022-05-14 13:45:12 +02:00
|
|
|
|
2022-05-19 15:50:06 +02:00
|
|
|
if ( error.response.status === 407 ) {
|
|
|
|
router.push({ name: 'genericError', params: { err: error.response, closable: false } })
|
2023-08-28 08:33:14 +02:00
|
|
|
return new Promise(() => {})
|
2022-05-19 15:50:06 +02:00
|
|
|
}
|
|
|
|
|
2022-10-19 13:12:49 +02:00
|
|
|
// we push to a specific or generic error view
|
|
|
|
let routeName = 'genericError'
|
|
|
|
|
2022-05-14 13:45:12 +02:00
|
|
|
// api calls are stateless so when user inactivity is detected
|
|
|
|
// by the backend middleware it cannot logout the user directly
|
|
|
|
// so it returns a 418 response.
|
2022-07-13 14:56:25 +02:00
|
|
|
// We catch the 418 response and push the user to the autolock view
|
|
|
|
if ( error.response.status === 418 ) routeName = 'autolock'
|
2020-02-27 09:30:02 +01:00
|
|
|
|
2020-01-27 21:13:21 +01:00
|
|
|
if ( error.response.status === 404 ) routeName = '404'
|
2020-01-26 21:04:33 +01:00
|
|
|
|
2020-01-27 21:13:21 +01:00
|
|
|
router.push({ name: routeName, params: { err: error.response } })
|
2023-08-28 08:33:14 +02:00
|
|
|
return new Promise(() => {})
|
2020-01-26 21:04:33 +01:00
|
|
|
|
|
|
|
})
|