-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathauth.ts
111 lines (94 loc) · 2.74 KB
/
auth.ts
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
import NextAuth from "next-auth";
import { PrismaAdapter } from "@auth/prisma-adapter";
import authConfig from "@/auth.config";
import { db } from "@/lib/db";
import { getUserById } from "./utils/data";
import { getTwoFactorConfirmationByUserId } from "./utils/two-factor-auth-confiramtion";
import { UserRole } from "@prisma/client";
import { getAccountById } from "./utils/account-details";
export const {
handlers: { GET, POST },
auth,
signIn,
signOut,
update
} = NextAuth({
pages: {
signIn: "/auth/login",
error: "/auth/error",
},
events: {
linkAccount: async ({ user }) => {
console.log("LINK ACCOUNT:", user);
await db.user.update({
where: {
id: user.id,
},
data: {
emailVerified: new Date(),
},
});
},
},
callbacks: {
async signIn({ account, user }) {
// To check is the user is verified
if (account?.provider !== "credentials") return true; // google and github accounts are already verified
const existingUser = await db.user.findFirst({
where: {
id: user.id,
},
});
if (!existingUser || !existingUser.emailVerified) return false;
if (existingUser.twoFactorEnabled) {
const confirmation = await getTwoFactorConfirmationByUserId(
existingUser.id
);
if (!confirmation) return false;
//delete the confirmation so that user has to perform 2FA for every login
await db.twoFactorConfirmation.delete({
where: {
userId: user.id,
},
});
}
return true;
},
async session({ session, token }) {
if (session?.user && token.sub) {
session.user.userId = token.sub;
}
if (token.role && session.user) {
session.user.role = token.role as UserRole;
}
if (token.twoFactorEnabled && session.user) {
session.user.twoFactorEnabled = token.twoFactorEnabled as boolean;
}
if (session.user) {
session.user.email = token.email;
session.user.name = token.name;
session.user.isOauth = token.isOauth as boolean;
}
return session;
},
async jwt({ token }) {
if (!token.sub) {
return token;
}
const existingUser = await getUserById(token.sub);
if (!existingUser) {
return token;
}
const isOauth = await getAccountById(existingUser.id);
token.isOauth = !!isOauth;
token.name = existingUser.name;
token.email = existingUser.email;
token.role = existingUser.role;
token.twoFactorEnabled = existingUser.twoFactorEnabled as boolean;
return token;
},
},
adapter: PrismaAdapter(db),
session: { strategy: "jwt" },
...authConfig,
});