-
Notifications
You must be signed in to change notification settings - Fork 5
/
Copy pathauth.ts
69 lines (57 loc) · 1.6 KB
/
auth.ts
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
import NextAuth from "next-auth"
import authConfig from "@/auth.config"
import { PrismaAdapter } from "@auth/prisma-adapter"
import { PrismaClient } from "@prisma/client"
import { db } from "./lib/db"
import { UserRole } from "@prisma/client"
import { getuserById } from "@/data/user";
export const { auth, handlers: {GET, POST}, signIn, signOut } = NextAuth({
...authConfig,
pages: {
signIn: '/auth/login',
error: '/auth/error',
},
events: {
async linkAccount({user}) {
await db.user.update({
where: { id: user.id },
data: { emailVerified: new Date() },
});
}
},
callbacks: {
async signIn({user, account}){
// oAuth Providers
if (account?.provider !== "credentials") return true;
// Prevent Signin if user is not verified
if (!user.id) return false;
const exsistingUser = await getuserById(user.id);
if (!exsistingUser || !exsistingUser?.emailVerified) return false;
// TODO: Add 2FA check
return true;
},
async session({ session, token }) {
console.log({token });
if ( token.sub && session.user ) {
session.user.id = token.sub;
}
if (token.role && session.user) {
session.user.role = token.role as UserRole;
}
return session;
},
async jwt({ token}) {
if (!token.sub) return token;
const exsistingUser = await getuserById(token.sub);
if (!exsistingUser) {
return token;
}
token.role = exsistingUser.role;
return token;
},
},
adapter: PrismaAdapter(db),
session: {
strategy: "jwt",
},
})