-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathauth.ts
119 lines (94 loc) · 3.47 KB
/
auth.ts
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
import NextAuth from 'next-auth';
import { db } from '@/lib/db';
import { PrismaAdapter } from '@auth/prisma-adapter';
import { UserRole } from '@prisma/client';
import authConfig from '@/auth.config';
import { getUserById } from '@/data/user';
import { getTwoFactorConfirmationByUserId } from '@/data/two-factor-confirmation';
import { getAccountTypeByUserId } from '@/data/account';
export const {
handlers: { GET, POST },
auth,
signIn,
signOut,
} = NextAuth({
pages: {
signIn: "/auth/login", // next-auth will redirect to this route instead of the custom page
error: "/auth/error"
},
// this will check if user logged in with an OAuth account
// and will update the emailVerified field with new Date()
events: {
async linkAccount({ user }) {
await db.user.update({
where: {
id: user.id
},
data: {
emailVerified: new Date()
}
})
},
},
callbacks: {
async signIn({ user, account }) {
// allow OAuth login without email verification since providers verify email
if(account?.provider !== 'credentials') return true
const exisitingUser = await getUserById(user.id)
if(!exisitingUser || !exisitingUser.emailVerified) { // if user doesnt exist or if user email is not verified dont allow user login
return false
}
// 2FA check
if (exisitingUser.isTwoFactorEnabled) {
const twoFactorConfirmation = await getTwoFactorConfirmationByUserId(exisitingUser?.id);
if (!twoFactorConfirmation) return false
// delete two factor confirmation for next sign in
await db.twoFactorConfirmation.delete({
where: { id: twoFactorConfirmation.id }
})
}
return true
},
async session({ token, session }) {
if (token.sub && session.user) {
// this allows for the id thats stored in the token to be showed in the session
session.user.id = token.sub;
}
if (token.role && session.user) {
session.user.role = token.role as UserRole;
}
if (session.user) {
session.user.isTwoFactorEnabled = token.isTwoFactorEnabled as boolean;
}
if(session.user) {
session.user.name = token.name;
session.user.email = token.email;
session.user.isOAuth = token.isOAuth as boolean;
}
return session;
},
// this returns majority of user data
async jwt({ token }) {
if (!token.sub) return token; // if !token.sub means user is logged out
const exisitingUser = await getUserById(token.sub);
if (!exisitingUser) return token;
const exisitingAccount = await getAccountTypeByUserId(exisitingUser.id);
// by turning this into a boolean it checks if exisitingAccount is true then token.isOAuth is true
token.isOAuth = !!exisitingAccount
token.name = exisitingUser.name
token.email = exisitingUser.email
/**
* the reason we can't pass the profileImage through jwt
* is due to the size of the profilImage string and it being
* stored in cookies cause issues due to its 45kb limit
*/
// token.profileImage = exisitingUser.profileImage
token.role = exisitingUser.role; // how to return the logged in user role
token.isTwoFactorEnabled = exisitingUser.isTwoFactorEnabled; // how to return the logged in user 2FA status
return token;
},
},
adapter: PrismaAdapter(db),
session: { strategy: 'jwt' },
...authConfig,
});