-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathauth.ts
89 lines (78 loc) · 2.78 KB
/
auth.ts
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
/**
* Este arquivo é responsável por montar o objeto do token e sessao do usuario
*/
import NextAuth from "next-auth"
import { PrismaAdapter } from "@auth/prisma-adapter"
import { db } from "@/lib/db"
import authConfig from "@/auth.config"
import { getUserById } from "@/services/user"
import { getTwoFactorConfirmationByUserId } from "@/services/twoFactorConfirmation"
import { UserRole } from "@prisma/client"
import { getAccountByUserId } from "./services/account"
export const {
handlers: { GET, POST },
auth,
signIn,
signOut
} = NextAuth({
pages: {
signIn: '/auth/login',
error: '/auth/error',
},
events: {
async linkAccount({ user }) {
await db.user.update({
where: { id: user.id },
data: { emailVerified: new Date() }
})
}
},
callbacks: {
async signIn({ user, account }) {
// Allow OAuth without email verification
if (account?.provider !== 'credentials') return true
if (user.id) {
const existingUser = await getUserById(user.id)
// Prevent signin without email verification
if (!existingUser?.emailVerified) return false
// 2FA
if (existingUser.isTwoFactorEnabled) {
const twoFactorConfirmation = await getTwoFactorConfirmationByUserId(existingUser.id)
if (!twoFactorConfirmation) return false
// Delete 2FA confirmation for next sign in
await db.twoFactorConfirmation.delete({ where: { id: twoFactorConfirmation.id } })
}
}
return true
},
async session({ token, session }) {
if (token.sub && session.user) session.user.id = token.sub
if (token.role && session.user) session.user.role = token.role as UserRole
if (token.isTwoFactorEnabled && session.user) session.user.isTwoFactorEnabled = token.isTwoFactorEnabled as boolean
if (session.user) {
session.user.name = token.name
session.user.email = token.email!
session.user.isOAuth = token.isOAuth as boolean
session.user.image = token.picture
}
return session
},
async jwt({ token }) {
if (!token.sub) return token // retorna o token caso o usuario nao esteja logado
const existingUser = await getUserById(token.sub)
if (!existingUser) return token // retorna o token caso o usuario nao exista
const existingAccount = await getAccountByUserId(existingUser.id)
// adiciona as informacoes do usuario ao token
token.isOAuth = !!existingAccount
token.name = existingUser.name
token.email = existingUser.email
token.role = existingUser.role
token.isTwoFactorEnabled = existingUser.isTwoFactorEnabled
token.picture = existingUser.image
return token
}
},
adapter: PrismaAdapter(db),
session: { strategy: "jwt" },
...authConfig,
})