-
Notifications
You must be signed in to change notification settings - Fork 0
/
auth.ts
122 lines (103 loc) · 2.99 KB
/
auth.ts
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
import NextAuth from "next-auth"
import authConfig from "./auth.config"
import {PrismaAdapter} from "@auth/prisma-adapter"
import { getUserById } from "./data/user"
// import { JWT } from "next-auth/jwt"
import { db } from "./lib/db"
import { UserRole } from "@prisma/client"
import { getTwoFactorConfirmationByUserId } from "./data/two-factor-confirmation"
import { getAccountByUserId } from "./data/account"
// declare module "next-auth" {
// interface Session {
// /** The user's postal address. */
// user:{
// role: "ADMIN" | "USER";
// // customField: string;
// }
// }
// }
// declare module "next-auth/jwt" {
// /** Returned by the `jwt` callback and `auth`, when using JWT sessions */
// interface JWT {
// role?: "ADMIN" | "USER";
// }
// }
export const {
handlers: { GET, POST },
auth,
signIn,
signOut,
} = NextAuth({
pages:{
signIn:"/auth/signin",
error:"/auth/error",
},
events:{
async linkAccount({user}){
await db.user.update({
where: {id: user.id},
data: {emailVerified: new Date()}
})
}
},
callbacks: {
async signIn({user ,account}){
if(account?.provider !== "credentials" ){
return true;
}
const existingUser = await getUserById(user.id as string);
if(!existingUser?.emailVerified){
return false;
}
//2fa
if(existingUser.isTwoFactorEnabled){
const twoFactorConfirmation = await getTwoFactorConfirmationByUserId(existingUser.id);
if(!twoFactorConfirmation){
return false;
}
await db.twoFactorConfirmation.delete({
where: {id: twoFactorConfirmation.id}
})
}
return true;
},
async session({session, token}){
// console.log("session callback", token);
if(token.sub && session.user) {
session.user.id = token.sub;
}
if(token.role && session.user){
session.user.role = token.role as UserRole;
}
if(token.isTwoFactorEnabled && session.user){
session.user.isTwoFactorEnabled = token.isTwoFactorEnabled as boolean;
}
// session.user.customField="custom"
if(session.user){
session.user.name = token.name;
session.user.email = token.email as string;
session.user.isOAuth = token.isOAuth as boolean;
}
return session;
},
async jwt({token}){
// console.log("jwt callback", token);
if(!token.sub) return token;
const existingUser = await getUserById(token.sub);
if(existingUser){
const existingAccount = await getAccountByUserId(existingUser.id);
token.isOAuth = !!existingAccount;
token.name = existingUser.name;
token.email = existingUser.email;
token.role = existingUser.role
}else{
return token;
}
token.isTwoFactorEnabled = existingUser.isTwoFactorEnabled;
return token;
}
},
adapter: PrismaAdapter(db),
session: {strategy: "jwt"},
...authConfig,
})