-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathauth.ts
94 lines (84 loc) · 2.78 KB
/
auth.ts
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
import NextAuth, { type DefaultSession } from "next-auth";
import { PrismaAdapter } from "@auth/prisma-adapter";
import { PrismaClient, UserRole } from "@prisma/client";
import authConfig from "./auth.config";
import { getUserId } from "./data/user";
import { db } from "./libs";
import { getTwoFactorConfirmationById } from "./data/two-factor-confirmation";
import { getAccountByUserId } from "./data/account";
import { ExtendedUser } from "./next-auth";
const prisma = new PrismaClient();
export const { auth, handlers, signIn, signOut } = NextAuth({
pages: {
signIn: "/auth/login",
error: "/auth/error",
},
events: {
async linkAccount({ user }) {
await db.user.update({
where: { id: user.id },
data: { emailVerified: new Date() },
});
},
},
callbacks: {
async signIn({ user, account }) {
// To allow the 0Auth providers withOut email verification
if (account?.provider !== "credentials") return true;
// To restrict the login without email verification
const existingUser = await getUserId(user.id as string);
if (!existingUser?.emailVerified) return false;
if (existingUser.isTwoFactorEnabled) {
const twoFactorconfirmation = await getTwoFactorConfirmationById(
existingUser.id
);
if (!twoFactorconfirmation) {
return false;
}
await db.twoFactorConfirmation.delete({
where: {
id: twoFactorconfirmation.id,
},
});
}
return true;
},
async session({ session, token }) {
// to display the user id
if (session.user && token.sub) {
session.user.id = token.sub;
}
//to display the role of the user
if (session.user && token.role) {
session.user.role = token.role as UserRole;
}
if (session.user) {
(session.user as any).isTwoFactorEnabled =
token.isTwoFactorEnabled as boolean;
session.user.name = token.name;
session.user.email = token.email as string;
(session.user as ExtendedUser).isOAuth = token.isOAuth as boolean;
}
return session;
},
async jwt({ token }) {
//we can actually create custom fields in the session
if (!token.sub) return token;
const existingUser = await getUserId(token.sub);
const existingAccount = await getAccountByUserId(token.sub);
if (existingUser) {
token.name = existingUser.name;
token.email = existingUser.email;
token.role = existingUser.role;
token.isTwoFactorEnabled = existingUser.isTwoFactorEnabled;
}
if (existingAccount) {
token.isOAuth = !!existingAccount;
}
return token;
},
},
adapter: PrismaAdapter(prisma),
session: { strategy: "jwt" },
...authConfig,
});