-
Notifications
You must be signed in to change notification settings - Fork 0
/
auth.ts
119 lines (102 loc) · 3.72 KB
/
auth.ts
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
import NextAuth from 'next-auth'
import { PrismaAdapter } from '@auth/prisma-adapter'
import { db } from './lib/db'
import authConfig from './auth.config'
import { getUserById } from './data/user'
import { userRole } from '@prisma/client'
import { getTwoFactorConfimationByUserId } from './data/two-factor-cofirmation'
export const {
handlers: { GET, POST },
auth,
signIn,
signOut,
} = NextAuth({
pages: {
signIn: '/login',
error: '/error',
},
events: {
async linkAccount({ user }) {
await db.user.update({
where: { id: user.id },
data: {
emailVerified: new Date(),
},
})
},
},
callbacks: {
async signIn({ user, account, email }) {
//if Oauth providers then dont need to check for email verification
if (account?.provider !== 'credentials') {
return true
}
// /prevent signin without email verification using credentionals
const existingUser = await getUserById(user.id)
if (!existingUser?.emailVerified) {
return false
}
//=============== my own time base two factor authentication
if (existingUser.isTwofactorEnabled) {
const twoFactorStatus = await getTwoFactorConfimationByUserId(
existingUser.id
)
if (!twoFactorStatus) {
return false
}
//delete two factor confirmation for next sign in
await db.twoFactorConfirmaitonModel.delete({
where: {
userId: existingUser.id,
},
})
}
return true
},
async jwt({ token, account }) {
// console.log('called jwt');
if (!token.sub) {
return token
}
const existingUser = await getUserById(token.sub)
if (!existingUser) return token
token.role = existingUser.role
token.isTwofactorEnabled = existingUser.isTwofactorEnabled
//this will change userName and email when 'api/auth/session' is called during a update in '/settings' page
token.name = existingUser.name
token.email = existingUser.email
token.image = existingUser.image
//TODO: need to improve
const getProviderList = await db.account.findMany({
where: {
userId: existingUser.id,
},
})
token.isOauth = getProviderList.length > 0 // extending the OAuth status for excluding changes while using OAuth
return token
},
async session({ token, session }) {
if (token.sub && session.user) {
session.user.id = token.sub
}
if (token.role && session.user) {
session.user.role = token.role as userRole
}
if (token.role && session.user) {
session.user.isTwofactorEnabled =
token.isTwofactorEnabled as boolean
}
session.user.isOauth = token.isOauth as boolean
//as JWT callback run first so it will change the tokens and we can implement those using the session callback
if (session.user && token.email) {
session.user.name = token.name
session.user.email = token.email
session.user.image = token.image
}
return session
},
},
adapter: PrismaAdapter(db),
session: { strategy: 'jwt' },
...authConfig,
})