-
Notifications
You must be signed in to change notification settings - Fork 0
/
auth.ts
96 lines (80 loc) · 2.15 KB
/
auth.ts
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
import { PrismaAdapter } from '@auth/prisma-adapter';
import { UserRole } from '@prisma/client';
import NextAuth, { DefaultSession } from 'next-auth';
import { db } from './lib/db';
import { getAccountByUserId } from './utils/account';
import { getUserById } from './utils/user';
import authConfig from './auth.config';
export type ExtendedUser = DefaultSession['user'] & {
role: UserRole;
isTwoFactorEnabled: boolean;
isOAuth: boolean;
};
declare module 'next-auth' {
interface Session {
user: ExtendedUser;
}
}
export const {
auth, handlers, signIn, signOut,
} = NextAuth({
pages: {
signIn: '/login',
error: '/error',
},
events: {
async linkAccount({ user }) {
await db.user.update({
where: { id: user.id },
data: { emailVerified: new Date() },
});
},
},
callbacks: {
async signIn({ user, account }) {
// Allow OAuth without verification
if (account?.access_token) {
return true;
}
const existingUser = await getUserById(user.id || '');
// Block credentials auth without verification
if (!existingUser || !existingUser.emailVerified) {
return false;
}
return true;
},
async session({ token, session }) {
if (!token.sub) {
return session;
}
const existingUser = await getUserById(token.sub);
if (!existingUser) {
return session;
}
if (existingUser.role && session.user) {
session.user.role = existingUser.role;
}
session.user.name = existingUser.name;
session.user.email = existingUser.email;
session.user.isTwoFactorEnabled = existingUser.isTwoFactorEnabled;
const existingAccount = await getAccountByUserId(existingUser.id);
if (existingAccount) {
session.user.isOAuth = !!existingAccount;
}
return session;
},
async jwt({ token }) {
if (!token.sub) {
return token;
}
const existingUser = await getUserById(token.sub);
if (!existingUser) {
return token;
}
return token;
},
},
adapter: PrismaAdapter(db),
session: { strategy: 'jwt' },
...authConfig,
});