mirror of
https://github.com/lukevella/rallly.git
synced 2025-05-03 04:06:06 +02:00
♻️ Upgrade to next-auth v5 (#1558)
This commit is contained in:
parent
17d386d905
commit
4b26dc50b3
53 changed files with 765 additions and 628 deletions
|
@ -5,9 +5,6 @@ SECRET_PASSWORD=abcdef1234567890abcdef1234567890
|
||||||
# Example: https://example.com
|
# Example: https://example.com
|
||||||
NEXT_PUBLIC_BASE_URL=http://localhost:3000
|
NEXT_PUBLIC_BASE_URL=http://localhost:3000
|
||||||
|
|
||||||
# NEXTAUTH_URL should be the same as NEXT_PUBLIC_BASE_URL
|
|
||||||
NEXTAUTH_URL=http://localhost:3000
|
|
||||||
|
|
||||||
# A connection string to your Postgres database
|
# A connection string to your Postgres database
|
||||||
DATABASE_URL="postgres://postgres:postgres@localhost:5450/rallly"
|
DATABASE_URL="postgres://postgres:postgres@localhost:5450/rallly"
|
||||||
|
|
||||||
|
|
|
@ -1,6 +1,5 @@
|
||||||
PORT=3002
|
PORT=3002
|
||||||
NEXT_PUBLIC_BASE_URL=http://localhost:3002
|
NEXT_PUBLIC_BASE_URL=http://localhost:3002
|
||||||
NEXTAUTH_URL=$NEXT_PUBLIC_BASE_URL
|
|
||||||
SECRET_PASSWORD=abcdef1234567890abcdef1234567890
|
SECRET_PASSWORD=abcdef1234567890abcdef1234567890
|
||||||
DATABASE_URL=postgres://postgres:postgres@localhost:5450/rallly
|
DATABASE_URL=postgres://postgres:postgres@localhost:5450/rallly
|
||||||
SUPPORT_EMAIL=support@rallly.co
|
SUPPORT_EMAIL=support@rallly.co
|
||||||
|
|
5
apps/web/declarations/next-auth.d.ts
vendored
5
apps/web/declarations/next-auth.d.ts
vendored
|
@ -1,5 +1,6 @@
|
||||||
/* eslint-disable @typescript-eslint/no-unused-vars */
|
/* eslint-disable @typescript-eslint/no-unused-vars */
|
||||||
import type { TimeFormat } from "@rallly/database";
|
import type { TimeFormat } from "@rallly/database";
|
||||||
|
import type { NextRequest } from "next/server";
|
||||||
import type { DefaultSession, DefaultUser } from "next-auth";
|
import type { DefaultSession, DefaultUser } from "next-auth";
|
||||||
import NextAuth from "next-auth";
|
import NextAuth from "next-auth";
|
||||||
import type { DefaultJWT } from "next-auth/jwt";
|
import type { DefaultJWT } from "next-auth/jwt";
|
||||||
|
@ -25,6 +26,10 @@ declare module "next-auth" {
|
||||||
timeFormat?: TimeFormat | null;
|
timeFormat?: TimeFormat | null;
|
||||||
weekStart?: number | null;
|
weekStart?: number | null;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
interface NextAuthRequest extends NextRequest {
|
||||||
|
auth: Session | null;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
declare module "next-auth/jwt" {
|
declare module "next-auth/jwt" {
|
||||||
|
|
|
@ -1,7 +1,7 @@
|
||||||
const typescriptTransform = require("i18next-scanner-typescript");
|
const typescriptTransform = require("i18next-scanner-typescript");
|
||||||
|
|
||||||
module.exports = {
|
module.exports = {
|
||||||
input: ["src/**/*.{ts,tsx}", "!src/auth.ts"],
|
input: ["src/**/*.{ts,tsx}", "!src/next-auth*.ts"],
|
||||||
options: {
|
options: {
|
||||||
nsSeparator: false,
|
nsSeparator: false,
|
||||||
defaultNs: "app",
|
defaultNs: "app",
|
||||||
|
|
|
@ -18,11 +18,12 @@
|
||||||
"docker:start": "./scripts/docker-start.sh"
|
"docker:start": "./scripts/docker-start.sh"
|
||||||
},
|
},
|
||||||
"dependencies": {
|
"dependencies": {
|
||||||
"@auth/prisma-adapter": "^1.0.3",
|
"@auth/prisma-adapter": "^2.7.4",
|
||||||
"@aws-sdk/client-s3": "^3.645.0",
|
"@aws-sdk/client-s3": "^3.645.0",
|
||||||
"@aws-sdk/s3-request-presigner": "^3.645.0",
|
"@aws-sdk/s3-request-presigner": "^3.645.0",
|
||||||
"@hookform/resolvers": "^3.3.1",
|
"@hookform/resolvers": "^3.3.1",
|
||||||
"@next/bundle-analyzer": "^12.3.4",
|
"@next/bundle-analyzer": "^12.3.4",
|
||||||
|
"@panva/hkdf": "^1.2.1",
|
||||||
"@radix-ui/react-slot": "^1.0.1",
|
"@radix-ui/react-slot": "^1.0.1",
|
||||||
"@radix-ui/react-switch": "^1.0.2",
|
"@radix-ui/react-switch": "^1.0.2",
|
||||||
"@rallly/billing": "*",
|
"@rallly/billing": "*",
|
||||||
|
@ -59,6 +60,7 @@
|
||||||
"ics": "^3.1.0",
|
"ics": "^3.1.0",
|
||||||
"intl-messageformat": "^10.3.4",
|
"intl-messageformat": "^10.3.4",
|
||||||
"iron-session": "^6.3.1",
|
"iron-session": "^6.3.1",
|
||||||
|
"jose": "^5.9.6",
|
||||||
"js-cookie": "^3.0.1",
|
"js-cookie": "^3.0.1",
|
||||||
"linkify-react": "^4.1.3",
|
"linkify-react": "^4.1.3",
|
||||||
"linkifyjs": "^4.1.3",
|
"linkifyjs": "^4.1.3",
|
||||||
|
@ -66,7 +68,7 @@
|
||||||
"lucide-react": "^0.387.0",
|
"lucide-react": "^0.387.0",
|
||||||
"micro": "^10.0.1",
|
"micro": "^10.0.1",
|
||||||
"nanoid": "^5.0.9",
|
"nanoid": "^5.0.9",
|
||||||
"next-auth": "^4.24.5",
|
"next-auth": "^5.0.0-beta.25",
|
||||||
"next-i18next": "^13.0.3",
|
"next-i18next": "^13.0.3",
|
||||||
"php-serialize": "^4.1.1",
|
"php-serialize": "^4.1.1",
|
||||||
"postcss": "^8.4.31",
|
"postcss": "^8.4.31",
|
||||||
|
|
|
@ -303,5 +303,6 @@
|
||||||
"loginVerifyDescription": "Check your email for the verification code",
|
"loginVerifyDescription": "Check your email for the verification code",
|
||||||
"createAccount": "Create Account",
|
"createAccount": "Create Account",
|
||||||
"tooManyRequests": "Too many requests",
|
"tooManyRequests": "Too many requests",
|
||||||
"tooManyRequestsDescription": "Please try again later."
|
"tooManyRequestsDescription": "Please try again later.",
|
||||||
|
"loginMagicLinkError": "This link is invalid or expired. Please request a new link."
|
||||||
}
|
}
|
||||||
|
|
|
@ -38,7 +38,7 @@ export function DeleteAccountDialog({
|
||||||
onSuccess() {
|
onSuccess() {
|
||||||
posthog?.capture("delete account");
|
posthog?.capture("delete account");
|
||||||
signOut({
|
signOut({
|
||||||
callbackUrl: "/login",
|
redirectTo: "/login",
|
||||||
});
|
});
|
||||||
},
|
},
|
||||||
});
|
});
|
||||||
|
|
|
@ -4,10 +4,12 @@ import { Button } from "@rallly/ui/button";
|
||||||
import { useMutation } from "@tanstack/react-query";
|
import { useMutation } from "@tanstack/react-query";
|
||||||
import { useRouter } from "next/navigation";
|
import { useRouter } from "next/navigation";
|
||||||
import { useSession } from "next-auth/react";
|
import { useSession } from "next-auth/react";
|
||||||
|
import React from "react";
|
||||||
|
|
||||||
import { OptimizedAvatarImage } from "@/components/optimized-avatar-image";
|
import { OptimizedAvatarImage } from "@/components/optimized-avatar-image";
|
||||||
import { Skeleton } from "@/components/skeleton";
|
import { Skeleton } from "@/components/skeleton";
|
||||||
import { Trans } from "@/components/trans";
|
import { Trans } from "@/components/trans";
|
||||||
|
import { useTranslation } from "@/i18n/client";
|
||||||
import { trpc } from "@/trpc/client";
|
import { trpc } from "@/trpc/client";
|
||||||
|
|
||||||
type PageProps = { magicLink: string; email: string };
|
type PageProps = { magicLink: string; email: string };
|
||||||
|
@ -15,6 +17,9 @@ type PageProps = { magicLink: string; email: string };
|
||||||
export const LoginPage = ({ magicLink, email }: PageProps) => {
|
export const LoginPage = ({ magicLink, email }: PageProps) => {
|
||||||
const session = useSession();
|
const session = useSession();
|
||||||
const posthog = usePostHog();
|
const posthog = usePostHog();
|
||||||
|
const { t } = useTranslation();
|
||||||
|
const [error, setError] = React.useState<string | null>(null);
|
||||||
|
|
||||||
const magicLinkFetch = useMutation({
|
const magicLinkFetch = useMutation({
|
||||||
mutationFn: async () => {
|
mutationFn: async () => {
|
||||||
const res = await fetch(magicLink);
|
const res = await fetch(magicLink);
|
||||||
|
@ -31,9 +36,15 @@ export const LoginPage = ({ magicLink, email }: PageProps) => {
|
||||||
name: updatedSession.user.name,
|
name: updatedSession.user.name,
|
||||||
});
|
});
|
||||||
}
|
}
|
||||||
}
|
|
||||||
|
|
||||||
router.push(data.url);
|
router.push(data.url);
|
||||||
|
} else {
|
||||||
|
setError(
|
||||||
|
t("loginMagicLinkError", {
|
||||||
|
defaultValue:
|
||||||
|
"This link is invalid or expired. Please request a new link.",
|
||||||
|
}),
|
||||||
|
);
|
||||||
|
}
|
||||||
},
|
},
|
||||||
});
|
});
|
||||||
const { data } = trpc.user.getByEmail.useQuery({ email });
|
const { data } = trpc.user.getByEmail.useQuery({ email });
|
||||||
|
@ -72,6 +83,7 @@ export const LoginPage = ({ magicLink, email }: PageProps) => {
|
||||||
<Trans i18nKey="login" defaults="Login" />
|
<Trans i18nKey="login" defaults="Login" />
|
||||||
</Button>
|
</Button>
|
||||||
</div>
|
</div>
|
||||||
|
{error && <p className="text-destructive text-sm">{error}</p>}
|
||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
);
|
);
|
||||||
|
|
|
@ -4,18 +4,24 @@ import { prisma } from "@rallly/database";
|
||||||
import { cookies } from "next/headers";
|
import { cookies } from "next/headers";
|
||||||
|
|
||||||
export async function setVerificationEmail(email: string) {
|
export async function setVerificationEmail(email: string) {
|
||||||
const count = await prisma.user.count({
|
const user = await prisma.user.findUnique({
|
||||||
where: {
|
where: {
|
||||||
email,
|
email,
|
||||||
},
|
},
|
||||||
|
select: {
|
||||||
|
email: true,
|
||||||
|
},
|
||||||
});
|
});
|
||||||
|
|
||||||
cookies().set("verification-email", email, {
|
if (user) {
|
||||||
|
cookies().set("verification-email", user.email, {
|
||||||
httpOnly: true,
|
httpOnly: true,
|
||||||
secure: process.env.NODE_ENV === "production",
|
secure: process.env.NODE_ENV === "production",
|
||||||
sameSite: "lax",
|
sameSite: "lax",
|
||||||
maxAge: 15 * 60,
|
maxAge: 15 * 60,
|
||||||
});
|
});
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
|
||||||
return count > 0;
|
return false;
|
||||||
}
|
}
|
||||||
|
|
|
@ -53,13 +53,13 @@ export function LoginWithEmailForm() {
|
||||||
if (doesExist) {
|
if (doesExist) {
|
||||||
await signIn("email", {
|
await signIn("email", {
|
||||||
email: identifier,
|
email: identifier,
|
||||||
callbackUrl: searchParams?.get("callbackUrl") ?? undefined,
|
redirectTo: searchParams?.get("redirectTo") ?? undefined,
|
||||||
redirect: false,
|
redirect: false,
|
||||||
});
|
});
|
||||||
// redirect to verify page with callbackUrl
|
// redirect to verify page with redirectTo
|
||||||
router.push(
|
router.push(
|
||||||
`/login/verify?callbackUrl=${encodeURIComponent(
|
`/login/verify?redirectTo=${encodeURIComponent(
|
||||||
searchParams?.get("callbackUrl") ?? "",
|
searchParams?.get("redirectTo") ?? "",
|
||||||
)}`,
|
)}`,
|
||||||
);
|
);
|
||||||
} else {
|
} else {
|
||||||
|
|
|
@ -6,16 +6,16 @@ import { Trans } from "@/components/trans";
|
||||||
|
|
||||||
export async function LoginWithOIDC({
|
export async function LoginWithOIDC({
|
||||||
name,
|
name,
|
||||||
callbackUrl,
|
redirectTo,
|
||||||
}: {
|
}: {
|
||||||
name: string;
|
name: string;
|
||||||
callbackUrl?: string;
|
redirectTo?: string;
|
||||||
}) {
|
}) {
|
||||||
return (
|
return (
|
||||||
<Button
|
<Button
|
||||||
onClick={() => {
|
onClick={() => {
|
||||||
signIn("oidc", {
|
signIn("oidc", {
|
||||||
callbackUrl,
|
redirectTo,
|
||||||
});
|
});
|
||||||
}}
|
}}
|
||||||
variant="link"
|
variant="link"
|
||||||
|
|
|
@ -15,7 +15,7 @@ function SSOImage({ provider }: { provider: string }) {
|
||||||
);
|
);
|
||||||
}
|
}
|
||||||
|
|
||||||
if (provider === "azure-ad") {
|
if (provider === "microsoft-entra-id") {
|
||||||
return (
|
return (
|
||||||
<Image
|
<Image
|
||||||
src="/static/microsoft.svg"
|
src="/static/microsoft.svg"
|
||||||
|
@ -40,11 +40,11 @@ function SSOImage({ provider }: { provider: string }) {
|
||||||
export function SSOProvider({
|
export function SSOProvider({
|
||||||
providerId,
|
providerId,
|
||||||
name,
|
name,
|
||||||
callbackUrl,
|
redirectTo,
|
||||||
}: {
|
}: {
|
||||||
providerId: string;
|
providerId: string;
|
||||||
name: string;
|
name: string;
|
||||||
callbackUrl?: string;
|
redirectTo?: string;
|
||||||
}) {
|
}) {
|
||||||
const { t } = useTranslation();
|
const { t } = useTranslation();
|
||||||
return (
|
return (
|
||||||
|
@ -58,7 +58,7 @@ export function SSOProvider({
|
||||||
key={providerId}
|
key={providerId}
|
||||||
onClick={() => {
|
onClick={() => {
|
||||||
signIn(providerId, {
|
signIn(providerId, {
|
||||||
callbackUrl,
|
redirectTo,
|
||||||
});
|
});
|
||||||
}}
|
}}
|
||||||
>
|
>
|
||||||
|
|
|
@ -1,7 +1,9 @@
|
||||||
import Link from "next/link";
|
import Link from "next/link";
|
||||||
import { Trans } from "react-i18next/TransWithoutContext";
|
import { Trans } from "react-i18next/TransWithoutContext";
|
||||||
|
|
||||||
import { getOAuthProviders } from "@/auth";
|
import { GoogleProvider } from "@/auth/providers/google";
|
||||||
|
import { MicrosoftProvider } from "@/auth/providers/microsoft";
|
||||||
|
import { OIDCProvider } from "@/auth/providers/oidc";
|
||||||
import { getTranslation } from "@/i18n/server";
|
import { getTranslation } from "@/i18n/server";
|
||||||
|
|
||||||
import {
|
import {
|
||||||
|
@ -22,20 +24,14 @@ export default async function LoginPage({
|
||||||
searchParams,
|
searchParams,
|
||||||
}: {
|
}: {
|
||||||
searchParams?: {
|
searchParams?: {
|
||||||
callbackUrl?: string;
|
redirectTo?: string;
|
||||||
};
|
};
|
||||||
}) {
|
}) {
|
||||||
const { t } = await getTranslation();
|
const { t } = await getTranslation();
|
||||||
const oAuthProviders = getOAuthProviders();
|
|
||||||
|
|
||||||
const hasAlternateLoginMethods = oAuthProviders.length > 0;
|
const oidcProvider = OIDCProvider();
|
||||||
|
const socialProviders = [GoogleProvider(), MicrosoftProvider()];
|
||||||
const oidcProvider = oAuthProviders.find(
|
const hasAlternateLoginMethods = socialProviders.length > 0 || !!oidcProvider;
|
||||||
(provider) => provider.id === "oidc",
|
|
||||||
);
|
|
||||||
const socialProviders = oAuthProviders.filter(
|
|
||||||
(provider) => provider.id !== "oidc",
|
|
||||||
);
|
|
||||||
|
|
||||||
return (
|
return (
|
||||||
<AuthPageContainer>
|
<AuthPageContainer>
|
||||||
|
@ -58,19 +54,21 @@ export default async function LoginPage({
|
||||||
{oidcProvider ? (
|
{oidcProvider ? (
|
||||||
<LoginWithOIDC
|
<LoginWithOIDC
|
||||||
name={oidcProvider.name}
|
name={oidcProvider.name}
|
||||||
callbackUrl={searchParams?.callbackUrl}
|
redirectTo={searchParams?.redirectTo}
|
||||||
/>
|
/>
|
||||||
) : null}
|
) : null}
|
||||||
{socialProviders ? (
|
{socialProviders ? (
|
||||||
<div className="grid gap-4">
|
<div className="grid gap-4">
|
||||||
{socialProviders.map((provider) => (
|
{socialProviders.map((provider) =>
|
||||||
|
provider ? (
|
||||||
<SSOProvider
|
<SSOProvider
|
||||||
key={provider.id}
|
key={provider.id}
|
||||||
providerId={provider.id}
|
providerId={provider.id}
|
||||||
name={provider.name}
|
name={provider.options?.name || provider.name}
|
||||||
callbackUrl={searchParams?.callbackUrl}
|
redirectTo={searchParams?.redirectTo}
|
||||||
/>
|
/>
|
||||||
))}
|
) : null,
|
||||||
|
)}
|
||||||
</div>
|
</div>
|
||||||
) : null}
|
) : null}
|
||||||
</AuthPageContent>
|
</AuthPageContent>
|
||||||
|
|
|
@ -50,7 +50,7 @@ export function OTPForm({ email }: { email: string }) {
|
||||||
message: t("wrongVerificationCode"),
|
message: t("wrongVerificationCode"),
|
||||||
});
|
});
|
||||||
} else {
|
} else {
|
||||||
window.location.href = searchParams?.get("callbackUrl") ?? "/";
|
window.location.href = searchParams?.get("redirectTo") ?? "/";
|
||||||
}
|
}
|
||||||
});
|
});
|
||||||
|
|
||||||
|
|
|
@ -68,7 +68,7 @@ export function OTPForm({ token }: { token: string }) {
|
||||||
|
|
||||||
signIn("registration-token", {
|
signIn("registration-token", {
|
||||||
token,
|
token,
|
||||||
callbackUrl: searchParams?.get("callbackUrl") ?? "/",
|
redirectTo: searchParams?.get("redirectTo") ?? "/",
|
||||||
});
|
});
|
||||||
});
|
});
|
||||||
|
|
||||||
|
|
|
@ -4,12 +4,12 @@ import "../../style.css";
|
||||||
import { Toaster } from "@rallly/ui/toaster";
|
import { Toaster } from "@rallly/ui/toaster";
|
||||||
import type { Metadata, Viewport } from "next";
|
import type { Metadata, Viewport } from "next";
|
||||||
import { Inter } from "next/font/google";
|
import { Inter } from "next/font/google";
|
||||||
|
import { SessionProvider } from "next-auth/react";
|
||||||
import React from "react";
|
import React from "react";
|
||||||
|
|
||||||
import { TimeZoneChangeDetector } from "@/app/[locale]/timezone-change-detector";
|
import { TimeZoneChangeDetector } from "@/app/[locale]/timezone-change-detector";
|
||||||
import { Providers } from "@/app/providers";
|
import { Providers } from "@/app/providers";
|
||||||
import { getServerSession } from "@/auth";
|
import { auth } from "@/next-auth";
|
||||||
import { SessionProvider } from "@/auth/session-provider";
|
|
||||||
|
|
||||||
const inter = Inter({
|
const inter = Inter({
|
||||||
subsets: ["latin"],
|
subsets: ["latin"],
|
||||||
|
@ -30,7 +30,7 @@ export default async function Root({
|
||||||
children: React.ReactNode;
|
children: React.ReactNode;
|
||||||
params: { locale: string };
|
params: { locale: string };
|
||||||
}) {
|
}) {
|
||||||
const session = await getServerSession();
|
const session = await auth();
|
||||||
|
|
||||||
return (
|
return (
|
||||||
<html lang={locale} className={inter.className}>
|
<html lang={locale} className={inter.className}>
|
||||||
|
|
6
apps/web/src/app/api/auth/[...nextauth]/route.ts
Normal file
6
apps/web/src/app/api/auth/[...nextauth]/route.ts
Normal file
|
@ -0,0 +1,6 @@
|
||||||
|
import { withPosthog } from "@rallly/posthog/server";
|
||||||
|
|
||||||
|
import { handlers } from "@/next-auth";
|
||||||
|
|
||||||
|
export const GET = withPosthog(handlers.GET);
|
||||||
|
export const POST = withPosthog(handlers.POST);
|
|
@ -3,7 +3,7 @@ import { cookies } from "next/headers";
|
||||||
import type { NextRequest } from "next/server";
|
import type { NextRequest } from "next/server";
|
||||||
import { NextResponse } from "next/server";
|
import { NextResponse } from "next/server";
|
||||||
|
|
||||||
import { getServerSession } from "@/auth";
|
import { auth } from "@/next-auth";
|
||||||
import type { DisableNotificationsPayload } from "@/trpc/types";
|
import type { DisableNotificationsPayload } from "@/trpc/types";
|
||||||
import { decryptToken } from "@/utils/session";
|
import { decryptToken } from "@/utils/session";
|
||||||
|
|
||||||
|
@ -14,7 +14,7 @@ export const GET = async (req: NextRequest) => {
|
||||||
return NextResponse.redirect(new URL("/login", req.url));
|
return NextResponse.redirect(new URL("/login", req.url));
|
||||||
}
|
}
|
||||||
|
|
||||||
const session = await getServerSession();
|
const session = await auth();
|
||||||
|
|
||||||
if (!session || !session.user?.email) {
|
if (!session || !session.user?.email) {
|
||||||
return NextResponse.redirect(new URL("/login", req.url));
|
return NextResponse.redirect(new URL("/login", req.url));
|
||||||
|
|
|
@ -5,7 +5,7 @@ import type { NextRequest } from "next/server";
|
||||||
import { NextResponse } from "next/server";
|
import { NextResponse } from "next/server";
|
||||||
import { z } from "zod";
|
import { z } from "zod";
|
||||||
|
|
||||||
import { getServerSession } from "@/auth";
|
import { auth } from "@/next-auth";
|
||||||
|
|
||||||
const inputSchema = z.object({
|
const inputSchema = z.object({
|
||||||
period: z.enum(["monthly", "yearly"]).optional(),
|
period: z.enum(["monthly", "yearly"]).optional(),
|
||||||
|
@ -14,7 +14,7 @@ const inputSchema = z.object({
|
||||||
});
|
});
|
||||||
|
|
||||||
export async function POST(request: NextRequest) {
|
export async function POST(request: NextRequest) {
|
||||||
const userSession = await getServerSession();
|
const userSession = await auth();
|
||||||
const formData = await request.formData();
|
const formData = await request.formData();
|
||||||
const { period = "monthly", return_path } = inputSchema.parse(
|
const { period = "monthly", return_path } = inputSchema.parse(
|
||||||
Object.fromEntries(formData.entries()),
|
Object.fromEntries(formData.entries()),
|
||||||
|
|
|
@ -5,7 +5,7 @@ import * as Sentry from "@sentry/nextjs";
|
||||||
import type { NextRequest } from "next/server";
|
import type { NextRequest } from "next/server";
|
||||||
import { NextResponse } from "next/server";
|
import { NextResponse } from "next/server";
|
||||||
|
|
||||||
import { getServerSession } from "@/auth";
|
import { auth } from "@/next-auth";
|
||||||
|
|
||||||
export async function GET(request: NextRequest) {
|
export async function GET(request: NextRequest) {
|
||||||
const sessionId = request.nextUrl.searchParams.get("session_id");
|
const sessionId = request.nextUrl.searchParams.get("session_id");
|
||||||
|
@ -32,7 +32,7 @@ export async function GET(request: NextRequest) {
|
||||||
);
|
);
|
||||||
}
|
}
|
||||||
} else {
|
} else {
|
||||||
const userSession = await getServerSession();
|
const userSession = await auth();
|
||||||
if (!userSession?.user || userSession.user.email === null) {
|
if (!userSession?.user || userSession.user.email === null) {
|
||||||
Sentry.captureException(new Error("User not logged in"));
|
Sentry.captureException(new Error("User not logged in"));
|
||||||
return NextResponse.json(
|
return NextResponse.json(
|
||||||
|
|
|
@ -4,7 +4,7 @@ import { ipAddress } from "@vercel/functions";
|
||||||
import type { NextRequest } from "next/server";
|
import type { NextRequest } from "next/server";
|
||||||
|
|
||||||
import { getLocaleFromHeader } from "@/app/guest";
|
import { getLocaleFromHeader } from "@/app/guest";
|
||||||
import { getServerSession } from "@/auth";
|
import { auth } from "@/next-auth";
|
||||||
import type { TRPCContext } from "@/trpc/context";
|
import type { TRPCContext } from "@/trpc/context";
|
||||||
import { appRouter } from "@/trpc/routers";
|
import { appRouter } from "@/trpc/routers";
|
||||||
import { getEmailClient } from "@/utils/emails";
|
import { getEmailClient } from "@/utils/emails";
|
||||||
|
@ -15,7 +15,7 @@ const handler = (req: NextRequest) => {
|
||||||
req,
|
req,
|
||||||
router: appRouter,
|
router: appRouter,
|
||||||
createContext: async () => {
|
createContext: async () => {
|
||||||
const session = await getServerSession();
|
const session = await auth();
|
||||||
const locale = await getLocaleFromHeader(req);
|
const locale = await getLocaleFromHeader(req);
|
||||||
const user = session?.user
|
const user = session?.user
|
||||||
? {
|
? {
|
||||||
|
|
|
@ -3,7 +3,7 @@ import { cookies } from "next/headers";
|
||||||
import type { NextRequest } from "next/server";
|
import type { NextRequest } from "next/server";
|
||||||
import { NextResponse } from "next/server";
|
import { NextResponse } from "next/server";
|
||||||
|
|
||||||
import { getServerSession } from "@/auth";
|
import { auth } from "@/next-auth";
|
||||||
import { decryptToken } from "@/utils/session";
|
import { decryptToken } from "@/utils/session";
|
||||||
|
|
||||||
type EmailChangePayload = {
|
type EmailChangePayload = {
|
||||||
|
@ -50,11 +50,11 @@ export const GET = async (request: NextRequest) => {
|
||||||
return NextResponse.json({ error: "No token provided" }, { status: 400 });
|
return NextResponse.json({ error: "No token provided" }, { status: 400 });
|
||||||
}
|
}
|
||||||
|
|
||||||
const session = await getServerSession();
|
const session = await auth();
|
||||||
|
|
||||||
if (!session?.user || !session.user.email) {
|
if (!session?.user || !session.user.email) {
|
||||||
return NextResponse.redirect(
|
return NextResponse.redirect(
|
||||||
new URL(`/login?callbackUrl=${request.url}`, request.url),
|
new URL(`/login?redirectTo=${request.url}`, request.url),
|
||||||
);
|
);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -1,371 +0,0 @@
|
||||||
import { prisma } from "@rallly/database";
|
|
||||||
import { posthog } from "@rallly/posthog/server";
|
|
||||||
import { absoluteUrl } from "@rallly/utils/absolute-url";
|
|
||||||
import { generateOtp, randomid } from "@rallly/utils/nanoid";
|
|
||||||
import type {
|
|
||||||
GetServerSidePropsContext,
|
|
||||||
NextApiRequest,
|
|
||||||
NextApiResponse,
|
|
||||||
} from "next";
|
|
||||||
import type { NextAuthOptions, User } from "next-auth";
|
|
||||||
import NextAuth, {
|
|
||||||
getServerSession as getServerSessionWithOptions,
|
|
||||||
} from "next-auth/next";
|
|
||||||
import AzureADProvider from "next-auth/providers/azure-ad";
|
|
||||||
import CredentialsProvider from "next-auth/providers/credentials";
|
|
||||||
import EmailProvider from "next-auth/providers/email";
|
|
||||||
import GoogleProvider from "next-auth/providers/google";
|
|
||||||
import type { Provider } from "next-auth/providers/index";
|
|
||||||
|
|
||||||
import { env } from "@/env";
|
|
||||||
import type { RegistrationTokenPayload } from "@/trpc/types";
|
|
||||||
import { getEmailClient } from "@/utils/emails";
|
|
||||||
import { getValueByPath } from "@/utils/get-value-by-path";
|
|
||||||
import { decryptToken } from "@/utils/session";
|
|
||||||
|
|
||||||
import { CustomPrismaAdapter } from "./auth/custom-prisma-adapter";
|
|
||||||
import { mergeGuestsIntoUser } from "./auth/merge-user";
|
|
||||||
|
|
||||||
const providers: Provider[] = [
|
|
||||||
// When a user registers, we don't want to go through the email verification process
|
|
||||||
// so this provider allows us exchange the registration token for a session token
|
|
||||||
CredentialsProvider({
|
|
||||||
id: "registration-token",
|
|
||||||
name: "Registration Token",
|
|
||||||
credentials: {
|
|
||||||
token: {
|
|
||||||
label: "Token",
|
|
||||||
type: "text",
|
|
||||||
},
|
|
||||||
},
|
|
||||||
async authorize(credentials) {
|
|
||||||
if (credentials?.token) {
|
|
||||||
const payload = await decryptToken<RegistrationTokenPayload>(
|
|
||||||
credentials.token,
|
|
||||||
);
|
|
||||||
if (payload) {
|
|
||||||
const user = await prisma.user.findUnique({
|
|
||||||
where: {
|
|
||||||
email: payload.email,
|
|
||||||
},
|
|
||||||
select: {
|
|
||||||
id: true,
|
|
||||||
email: true,
|
|
||||||
name: true,
|
|
||||||
locale: true,
|
|
||||||
timeFormat: true,
|
|
||||||
timeZone: true,
|
|
||||||
image: true,
|
|
||||||
},
|
|
||||||
});
|
|
||||||
|
|
||||||
if (user) {
|
|
||||||
return user;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return null;
|
|
||||||
},
|
|
||||||
}),
|
|
||||||
CredentialsProvider({
|
|
||||||
id: "guest",
|
|
||||||
name: "Guest",
|
|
||||||
credentials: {},
|
|
||||||
async authorize() {
|
|
||||||
return {
|
|
||||||
id: `user-${randomid()}`,
|
|
||||||
email: null,
|
|
||||||
};
|
|
||||||
},
|
|
||||||
}),
|
|
||||||
EmailProvider({
|
|
||||||
server: "",
|
|
||||||
from: process.env.NOREPLY_EMAIL,
|
|
||||||
generateVerificationToken() {
|
|
||||||
return generateOtp();
|
|
||||||
},
|
|
||||||
async sendVerificationRequest({ identifier: email, token, url }) {
|
|
||||||
const user = await prisma.user.findUnique({
|
|
||||||
where: {
|
|
||||||
email,
|
|
||||||
},
|
|
||||||
select: {
|
|
||||||
name: true,
|
|
||||||
locale: true,
|
|
||||||
},
|
|
||||||
});
|
|
||||||
|
|
||||||
if (user) {
|
|
||||||
await getEmailClient(user.locale ?? undefined).sendTemplate(
|
|
||||||
"LoginEmail",
|
|
||||||
{
|
|
||||||
to: email,
|
|
||||||
props: {
|
|
||||||
magicLink: absoluteUrl("/auth/login", {
|
|
||||||
magicLink: url,
|
|
||||||
}),
|
|
||||||
code: token,
|
|
||||||
},
|
|
||||||
},
|
|
||||||
);
|
|
||||||
}
|
|
||||||
},
|
|
||||||
}),
|
|
||||||
];
|
|
||||||
|
|
||||||
// If we have an OAuth provider configured, we add it to the list of providers
|
|
||||||
if (
|
|
||||||
process.env.OIDC_DISCOVERY_URL &&
|
|
||||||
process.env.OIDC_CLIENT_ID &&
|
|
||||||
process.env.OIDC_CLIENT_SECRET
|
|
||||||
) {
|
|
||||||
providers.push({
|
|
||||||
id: "oidc",
|
|
||||||
name: process.env.OIDC_NAME ?? "OpenID Connect",
|
|
||||||
type: "oauth",
|
|
||||||
wellKnown: process.env.OIDC_DISCOVERY_URL,
|
|
||||||
authorization: { params: { scope: "openid email profile" } },
|
|
||||||
clientId: process.env.OIDC_CLIENT_ID,
|
|
||||||
clientSecret: process.env.OIDC_CLIENT_SECRET,
|
|
||||||
idToken: true,
|
|
||||||
checks: ["state"],
|
|
||||||
allowDangerousEmailAccountLinking: true,
|
|
||||||
profile(profile) {
|
|
||||||
return {
|
|
||||||
id: profile.sub,
|
|
||||||
name: getValueByPath(profile, env.OIDC_NAME_CLAIM_PATH),
|
|
||||||
email: getValueByPath(profile, env.OIDC_EMAIL_CLAIM_PATH),
|
|
||||||
image: getValueByPath(profile, env.OIDC_PICTURE_CLAIM_PATH),
|
|
||||||
} as User;
|
|
||||||
},
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
if (process.env.GOOGLE_CLIENT_ID && process.env.GOOGLE_CLIENT_SECRET) {
|
|
||||||
providers.push(
|
|
||||||
GoogleProvider({
|
|
||||||
clientId: process.env.GOOGLE_CLIENT_ID,
|
|
||||||
clientSecret: process.env.GOOGLE_CLIENT_SECRET,
|
|
||||||
allowDangerousEmailAccountLinking: true,
|
|
||||||
}),
|
|
||||||
);
|
|
||||||
}
|
|
||||||
|
|
||||||
if (
|
|
||||||
process.env.MICROSOFT_TENANT_ID &&
|
|
||||||
process.env.MICROSOFT_CLIENT_ID &&
|
|
||||||
process.env.MICROSOFT_CLIENT_SECRET
|
|
||||||
) {
|
|
||||||
providers.push(
|
|
||||||
AzureADProvider({
|
|
||||||
name: "Microsoft",
|
|
||||||
tenantId: process.env.MICROSOFT_TENANT_ID,
|
|
||||||
clientId: process.env.MICROSOFT_CLIENT_ID,
|
|
||||||
clientSecret: process.env.MICROSOFT_CLIENT_SECRET,
|
|
||||||
wellKnown:
|
|
||||||
"https://login.microsoftonline.com/common/v2.0/.well-known/openid-configuration",
|
|
||||||
}),
|
|
||||||
);
|
|
||||||
}
|
|
||||||
|
|
||||||
const getAuthOptions = (...args: GetServerSessionParams) =>
|
|
||||||
({
|
|
||||||
adapter: CustomPrismaAdapter(prisma, {
|
|
||||||
migrateData: async (userId) => {
|
|
||||||
const session = await getServerSession(...args);
|
|
||||||
if (session?.user && session.user.email === null) {
|
|
||||||
await mergeGuestsIntoUser(userId, [session.user.id]);
|
|
||||||
}
|
|
||||||
},
|
|
||||||
}),
|
|
||||||
secret: process.env.SECRET_PASSWORD,
|
|
||||||
session: {
|
|
||||||
strategy: "jwt",
|
|
||||||
},
|
|
||||||
providers: providers,
|
|
||||||
pages: {
|
|
||||||
signIn: "/login",
|
|
||||||
verifyRequest: "/login/verify",
|
|
||||||
error: "/auth/error",
|
|
||||||
},
|
|
||||||
events: {
|
|
||||||
signIn({ user, account }) {
|
|
||||||
posthog?.capture({
|
|
||||||
distinctId: user.id,
|
|
||||||
event: "login",
|
|
||||||
properties: {
|
|
||||||
method: account?.provider,
|
|
||||||
$set: {
|
|
||||||
name: user.name,
|
|
||||||
email: user.email,
|
|
||||||
timeZone: user.timeZone,
|
|
||||||
locale: user.locale,
|
|
||||||
},
|
|
||||||
},
|
|
||||||
});
|
|
||||||
},
|
|
||||||
},
|
|
||||||
callbacks: {
|
|
||||||
async signIn({ user, email, profile }) {
|
|
||||||
const distinctId = user.id;
|
|
||||||
// prevent sign in if email is not verified
|
|
||||||
if (
|
|
||||||
profile &&
|
|
||||||
"email_verified" in profile &&
|
|
||||||
profile.email_verified === false
|
|
||||||
) {
|
|
||||||
posthog?.capture({
|
|
||||||
distinctId,
|
|
||||||
event: "login failed",
|
|
||||||
properties: {
|
|
||||||
reason: "email not verified",
|
|
||||||
},
|
|
||||||
});
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
// Make sure email is allowed
|
|
||||||
if (user.email) {
|
|
||||||
const isBlocked = isEmailBlocked(user.email);
|
|
||||||
if (isBlocked) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// For now, we don't allow users to login unless they have
|
|
||||||
// registered an account. This is just because we need a name
|
|
||||||
// to display on the dashboard. The flow can be modified so that
|
|
||||||
// the name is requested after the user has logged in.
|
|
||||||
if (email?.verificationRequest) {
|
|
||||||
const isRegisteredUser =
|
|
||||||
(await prisma.user.count({
|
|
||||||
where: {
|
|
||||||
email: user.email as string,
|
|
||||||
},
|
|
||||||
})) > 0;
|
|
||||||
|
|
||||||
return isRegisteredUser;
|
|
||||||
}
|
|
||||||
|
|
||||||
// when we login with a social account for the first time, the user is not created yet
|
|
||||||
// and the user id will be the same as the provider account id
|
|
||||||
// we handle this case the the prisma adapter when we link accounts
|
|
||||||
const isInitialSocialLogin = user.id === profile?.sub;
|
|
||||||
|
|
||||||
if (!isInitialSocialLogin) {
|
|
||||||
// merge guest user into newly logged in user
|
|
||||||
const session = await getServerSession(...args);
|
|
||||||
if (session?.user && !session.user.email) {
|
|
||||||
await mergeGuestsIntoUser(user.id, [session.user.id]);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return true;
|
|
||||||
},
|
|
||||||
async jwt({ token, session }) {
|
|
||||||
if (session) {
|
|
||||||
token.locale = session.locale;
|
|
||||||
token.timeFormat = session.timeFormat;
|
|
||||||
token.timeZone = session.timeZone;
|
|
||||||
token.weekStart = session.weekStart;
|
|
||||||
}
|
|
||||||
|
|
||||||
return token;
|
|
||||||
},
|
|
||||||
async session({ session, token }) {
|
|
||||||
if (!token.sub) {
|
|
||||||
return session;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (token.sub?.startsWith("user-")) {
|
|
||||||
session.user = {
|
|
||||||
id: token.sub as string,
|
|
||||||
locale: token.locale,
|
|
||||||
timeFormat: token.timeFormat,
|
|
||||||
timeZone: token.timeZone,
|
|
||||||
weekStart: token.weekStart,
|
|
||||||
};
|
|
||||||
return session;
|
|
||||||
}
|
|
||||||
|
|
||||||
const user = await prisma.user.findUnique({
|
|
||||||
where: {
|
|
||||||
id: token.sub as string,
|
|
||||||
},
|
|
||||||
select: {
|
|
||||||
id: true,
|
|
||||||
name: true,
|
|
||||||
timeFormat: true,
|
|
||||||
timeZone: true,
|
|
||||||
locale: true,
|
|
||||||
weekStart: true,
|
|
||||||
email: true,
|
|
||||||
image: true,
|
|
||||||
},
|
|
||||||
});
|
|
||||||
|
|
||||||
if (user) {
|
|
||||||
session.user = {
|
|
||||||
id: user.id,
|
|
||||||
name: user.name,
|
|
||||||
email: user.email,
|
|
||||||
image: user.image,
|
|
||||||
locale: user.locale,
|
|
||||||
timeFormat: user.timeFormat,
|
|
||||||
timeZone: user.timeZone,
|
|
||||||
weekStart: user.weekStart,
|
|
||||||
};
|
|
||||||
}
|
|
||||||
|
|
||||||
return session;
|
|
||||||
},
|
|
||||||
},
|
|
||||||
}) satisfies NextAuthOptions;
|
|
||||||
|
|
||||||
type GetServerSessionParams =
|
|
||||||
| [GetServerSidePropsContext["req"], GetServerSidePropsContext["res"]]
|
|
||||||
| [NextApiRequest, NextApiResponse]
|
|
||||||
| [];
|
|
||||||
|
|
||||||
export async function getServerSession(...args: GetServerSessionParams) {
|
|
||||||
return await getServerSessionWithOptions(...args, getAuthOptions(...args));
|
|
||||||
}
|
|
||||||
|
|
||||||
export async function AuthApiRoute(req: NextApiRequest, res: NextApiResponse) {
|
|
||||||
const authOptions = getAuthOptions(req, res);
|
|
||||||
return NextAuth(req, res, authOptions);
|
|
||||||
}
|
|
||||||
|
|
||||||
export const isEmailBlocked = (email: string) => {
|
|
||||||
if (process.env.ALLOWED_EMAILS) {
|
|
||||||
const allowedEmails = process.env.ALLOWED_EMAILS.split(",");
|
|
||||||
// Check whether the email matches enough of the patterns specified in ALLOWED_EMAILS
|
|
||||||
const isAllowed = allowedEmails.some((allowedEmail) => {
|
|
||||||
const regex = new RegExp(
|
|
||||||
`^${allowedEmail
|
|
||||||
.replace(/[.+?^${}()|[\]\\]/g, "\\$&")
|
|
||||||
.replaceAll(/[*]/g, ".*")}$`,
|
|
||||||
);
|
|
||||||
return regex.test(email);
|
|
||||||
});
|
|
||||||
|
|
||||||
if (!isAllowed) {
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return false;
|
|
||||||
};
|
|
||||||
|
|
||||||
export function getOAuthProviders(): {
|
|
||||||
id: string;
|
|
||||||
name: string;
|
|
||||||
}[] {
|
|
||||||
return providers
|
|
||||||
.filter((provider) => provider.type === "oauth")
|
|
||||||
.map((provider) => {
|
|
||||||
return {
|
|
||||||
id: provider.id,
|
|
||||||
name: provider.options?.name || provider.name,
|
|
||||||
};
|
|
||||||
});
|
|
||||||
}
|
|
|
@ -10,19 +10,18 @@
|
||||||
* See: https://github.com/lukevella/rallly/issues/949
|
* See: https://github.com/lukevella/rallly/issues/949
|
||||||
*/
|
*/
|
||||||
import { PrismaAdapter } from "@auth/prisma-adapter";
|
import { PrismaAdapter } from "@auth/prisma-adapter";
|
||||||
import type { ExtendedPrismaClient, PrismaClient } from "@rallly/database";
|
import { prisma } from "@rallly/database";
|
||||||
import type { Adapter, AdapterAccount } from "next-auth/adapters";
|
import type { Adapter } from "next-auth/adapters";
|
||||||
|
|
||||||
export function CustomPrismaAdapter(
|
export function CustomPrismaAdapter(options: {
|
||||||
client: ExtendedPrismaClient,
|
migrateData: (userId: string) => Promise<void>;
|
||||||
options: { migrateData: (userId: string) => Promise<void> },
|
}) {
|
||||||
) {
|
const adapter = PrismaAdapter(prisma);
|
||||||
const adapter = PrismaAdapter(client as PrismaClient);
|
|
||||||
return {
|
return {
|
||||||
...adapter,
|
...adapter,
|
||||||
linkAccount: async (account: AdapterAccount) => {
|
linkAccount: async (account) => {
|
||||||
await options.migrateData(account.userId);
|
await options.migrateData(account.userId);
|
||||||
return (await client.account.create({
|
return prisma.account.create({
|
||||||
data: {
|
data: {
|
||||||
userId: account.userId,
|
userId: account.userId,
|
||||||
type: account.type,
|
type: account.type,
|
||||||
|
@ -36,7 +35,7 @@ export function CustomPrismaAdapter(
|
||||||
scope: account.scope as string,
|
scope: account.scope as string,
|
||||||
session_state: account.session_state as string,
|
session_state: account.session_state as string,
|
||||||
},
|
},
|
||||||
})) as AdapterAccount;
|
});
|
||||||
},
|
},
|
||||||
} satisfies Adapter;
|
} as Adapter;
|
||||||
}
|
}
|
11
apps/web/src/auth/helpers/get-optional-providers.ts
Normal file
11
apps/web/src/auth/helpers/get-optional-providers.ts
Normal file
|
@ -0,0 +1,11 @@
|
||||||
|
import type { Provider } from "next-auth/providers/index";
|
||||||
|
|
||||||
|
import { GoogleProvider } from "../providers/google";
|
||||||
|
import { MicrosoftProvider } from "../providers/microsoft";
|
||||||
|
import { OIDCProvider } from "../providers/oidc";
|
||||||
|
|
||||||
|
export function getOptionalProviders() {
|
||||||
|
return [OIDCProvider(), GoogleProvider(), MicrosoftProvider()].filter(
|
||||||
|
Boolean,
|
||||||
|
) as Provider[];
|
||||||
|
}
|
19
apps/web/src/auth/helpers/is-email-blocked.ts
Normal file
19
apps/web/src/auth/helpers/is-email-blocked.ts
Normal file
|
@ -0,0 +1,19 @@
|
||||||
|
export const isEmailBlocked = (email: string) => {
|
||||||
|
if (process.env.ALLOWED_EMAILS) {
|
||||||
|
const allowedEmails = process.env.ALLOWED_EMAILS.split(",");
|
||||||
|
// Check whether the email matches enough of the patterns specified in ALLOWED_EMAILS
|
||||||
|
const isAllowed = allowedEmails.some((allowedEmail) => {
|
||||||
|
const regex = new RegExp(
|
||||||
|
`^${allowedEmail
|
||||||
|
.replace(/[.+?^${}()|[\]\\]/g, "\\$&")
|
||||||
|
.replaceAll(/[*]/g, ".*")}$`,
|
||||||
|
);
|
||||||
|
return regex.test(email);
|
||||||
|
});
|
||||||
|
|
||||||
|
if (!isAllowed) {
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return false;
|
||||||
|
};
|
30
apps/web/src/auth/legacy/helpers/jwt.ts
Normal file
30
apps/web/src/auth/legacy/helpers/jwt.ts
Normal file
|
@ -0,0 +1,30 @@
|
||||||
|
import hkdf from "@panva/hkdf";
|
||||||
|
import { jwtDecrypt } from "jose";
|
||||||
|
|
||||||
|
import type { JWT } from "./types";
|
||||||
|
|
||||||
|
/** Decodes a NextAuth.js issued JWT. */
|
||||||
|
export async function decodeLegacyJWT(token: string): Promise<JWT | null> {
|
||||||
|
if (!token) return null;
|
||||||
|
const encryptionSecret = await getDerivedEncryptionKey(
|
||||||
|
process.env.SECRET_PASSWORD,
|
||||||
|
"",
|
||||||
|
);
|
||||||
|
const { payload } = await jwtDecrypt(token, encryptionSecret, {
|
||||||
|
clockTolerance: 15,
|
||||||
|
});
|
||||||
|
return payload;
|
||||||
|
}
|
||||||
|
|
||||||
|
async function getDerivedEncryptionKey(
|
||||||
|
keyMaterial: string | Buffer,
|
||||||
|
salt: string,
|
||||||
|
) {
|
||||||
|
return await hkdf(
|
||||||
|
"sha256",
|
||||||
|
keyMaterial,
|
||||||
|
salt,
|
||||||
|
`NextAuth.js Generated Encryption Key${salt ? ` (${salt})` : ""}`,
|
||||||
|
32,
|
||||||
|
);
|
||||||
|
}
|
46
apps/web/src/auth/legacy/helpers/types.ts
Normal file
46
apps/web/src/auth/legacy/helpers/types.ts
Normal file
|
@ -0,0 +1,46 @@
|
||||||
|
export interface DefaultJWT extends Record<string, unknown> {
|
||||||
|
name?: string | null;
|
||||||
|
email?: string | null;
|
||||||
|
picture?: string | null;
|
||||||
|
sub?: string;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returned by the `jwt` callback and `getToken`, when using JWT sessions
|
||||||
|
*
|
||||||
|
* [`jwt` callback](https://next-auth.js.org/configuration/callbacks#jwt-callback) | [`getToken`](https://next-auth.js.org/tutorials/securing-pages-and-api-routes#using-gettoken)
|
||||||
|
*/
|
||||||
|
export interface JWT extends Record<string, unknown>, DefaultJWT {}
|
||||||
|
|
||||||
|
export interface JWTEncodeParams {
|
||||||
|
/** The JWT payload. */
|
||||||
|
token?: JWT;
|
||||||
|
/**
|
||||||
|
* Used in combination with `secret` when deriving the encryption secret for the various NextAuth.js-issued JWTs.
|
||||||
|
* @note When no `salt` is passed, we assume this is a session token.
|
||||||
|
* This is for backwards-compatibility with currently active sessions, so they won't be invalidated when upgrading the package.
|
||||||
|
*/
|
||||||
|
salt?: string;
|
||||||
|
/** The key material used to encode the NextAuth.js issued JWTs. Defaults to `NEXTAUTH_SECRET`. */
|
||||||
|
secret: string | Buffer;
|
||||||
|
/**
|
||||||
|
* The maximum age of the NextAuth.js issued JWT in seconds.
|
||||||
|
* @default 30 * 24 * 60 * 60 // 30 days
|
||||||
|
*/
|
||||||
|
maxAge?: number;
|
||||||
|
}
|
||||||
|
|
||||||
|
export interface JWTDecodeParams {
|
||||||
|
/** The NextAuth.js issued JWT to be decoded */
|
||||||
|
token?: string;
|
||||||
|
/**
|
||||||
|
* Used in combination with `secret` when deriving the encryption secret for the various NextAuth.js-issued JWTs.
|
||||||
|
* @note When no `salt` is passed, we assume this is a session token.
|
||||||
|
* This is for backwards-compatibility with currently active sessions, so they won't be invalidated when upgrading the package.
|
||||||
|
*/
|
||||||
|
salt?: string;
|
||||||
|
/** The key material used to decode the NextAuth.js issued JWTs. Defaults to `NEXTAUTH_SECRET`. */
|
||||||
|
secret: string | Buffer;
|
||||||
|
}
|
||||||
|
|
||||||
|
export type Secret = string | Buffer;
|
65
apps/web/src/auth/legacy/next-auth-cookie-migration.ts
Normal file
65
apps/web/src/auth/legacy/next-auth-cookie-migration.ts
Normal file
|
@ -0,0 +1,65 @@
|
||||||
|
import type { NextRequest } from "next/server";
|
||||||
|
import { NextResponse } from "next/server";
|
||||||
|
import { encode } from "next-auth/jwt";
|
||||||
|
|
||||||
|
import { decodeLegacyJWT } from "./helpers/jwt";
|
||||||
|
|
||||||
|
const isSecureCookie =
|
||||||
|
process.env.NEXT_PUBLIC_BASE_URL?.startsWith("https://") ?? false;
|
||||||
|
|
||||||
|
const prefix = isSecureCookie ? "__Secure-" : "";
|
||||||
|
|
||||||
|
const oldCookieName = prefix + "next-auth.session-token";
|
||||||
|
const newCookieName = prefix + "authjs.session-token";
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Migrates the next-auth cookies to the new authjs cookie names
|
||||||
|
* This is needed for next-auth v5 which renamed the cookie prefix from 'next-auth' to 'authjs'
|
||||||
|
*/
|
||||||
|
export function withAuthMigration(
|
||||||
|
middleware: (req: NextRequest) => void | Response | Promise<void | Response>,
|
||||||
|
) {
|
||||||
|
return async (req: NextRequest) => {
|
||||||
|
const oldCookie = req.cookies.get(oldCookieName);
|
||||||
|
|
||||||
|
// If the old cookie doesn't exist, return the middleware
|
||||||
|
if (!oldCookie) {
|
||||||
|
return middleware(req);
|
||||||
|
}
|
||||||
|
|
||||||
|
const response = NextResponse.redirect(req.url);
|
||||||
|
response.cookies.delete(oldCookieName);
|
||||||
|
|
||||||
|
// If the new cookie exists, delete the old cookie first and rerun middleware
|
||||||
|
if (req.cookies.get(newCookieName)) {
|
||||||
|
return response;
|
||||||
|
}
|
||||||
|
|
||||||
|
const decodedCookie = await decodeLegacyJWT(oldCookie.value);
|
||||||
|
|
||||||
|
// If old cookie is invalid, delete the old cookie first and rerun middleware
|
||||||
|
if (!decodedCookie) {
|
||||||
|
return response;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Set the new cookie
|
||||||
|
const encodedCookie = await encode({
|
||||||
|
token: decodedCookie,
|
||||||
|
secret: process.env.SECRET_PASSWORD,
|
||||||
|
salt: newCookieName,
|
||||||
|
});
|
||||||
|
|
||||||
|
// Set the new cookie with the same value and attributes
|
||||||
|
response.cookies.set(newCookieName, encodedCookie, {
|
||||||
|
path: "/",
|
||||||
|
secure: isSecureCookie,
|
||||||
|
sameSite: "lax",
|
||||||
|
httpOnly: true,
|
||||||
|
});
|
||||||
|
|
||||||
|
// Delete the old cookie
|
||||||
|
response.cookies.delete(oldCookieName);
|
||||||
|
|
||||||
|
return response;
|
||||||
|
};
|
||||||
|
}
|
15
apps/web/src/auth/middleware.ts
Normal file
15
apps/web/src/auth/middleware.ts
Normal file
|
@ -0,0 +1,15 @@
|
||||||
|
import type { NextRequest } from "next/server";
|
||||||
|
import type { NextAuthRequest } from "next-auth";
|
||||||
|
import NextAuth from "next-auth";
|
||||||
|
|
||||||
|
import { nextAuthConfig } from "@/next-auth.config";
|
||||||
|
|
||||||
|
const { auth } = NextAuth(nextAuthConfig);
|
||||||
|
|
||||||
|
export function withAuth(
|
||||||
|
middleware: (
|
||||||
|
req: NextAuthRequest,
|
||||||
|
) => void | Response | Promise<void | Response>,
|
||||||
|
): (req: NextRequest) => void | Response | Promise<void | Response> {
|
||||||
|
return (req: NextRequest) => auth(middleware)(req, undefined as never);
|
||||||
|
}
|
41
apps/web/src/auth/providers/email.ts
Normal file
41
apps/web/src/auth/providers/email.ts
Normal file
|
@ -0,0 +1,41 @@
|
||||||
|
import { prisma } from "@rallly/database";
|
||||||
|
import { absoluteUrl } from "@rallly/utils/absolute-url";
|
||||||
|
import { generateOtp } from "@rallly/utils/nanoid";
|
||||||
|
import NodemailerProvider from "next-auth/providers/nodemailer";
|
||||||
|
|
||||||
|
import { getEmailClient } from "@/utils/emails";
|
||||||
|
|
||||||
|
export const EmailProvider = NodemailerProvider({
|
||||||
|
server: "none", // This value is required even though we don't need it
|
||||||
|
from: process.env.NOREPLY_EMAIL,
|
||||||
|
id: "email",
|
||||||
|
generateVerificationToken() {
|
||||||
|
return generateOtp();
|
||||||
|
},
|
||||||
|
async sendVerificationRequest({ identifier: email, token, url }) {
|
||||||
|
const user = await prisma.user.findUnique({
|
||||||
|
where: {
|
||||||
|
email,
|
||||||
|
},
|
||||||
|
select: {
|
||||||
|
name: true,
|
||||||
|
locale: true,
|
||||||
|
},
|
||||||
|
});
|
||||||
|
|
||||||
|
if (user) {
|
||||||
|
await getEmailClient(user.locale ?? undefined).sendTemplate(
|
||||||
|
"LoginEmail",
|
||||||
|
{
|
||||||
|
to: email,
|
||||||
|
props: {
|
||||||
|
magicLink: absoluteUrl("/auth/login", {
|
||||||
|
magicLink: url,
|
||||||
|
}),
|
||||||
|
code: token,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
);
|
||||||
|
}
|
||||||
|
},
|
||||||
|
});
|
11
apps/web/src/auth/providers/google.ts
Normal file
11
apps/web/src/auth/providers/google.ts
Normal file
|
@ -0,0 +1,11 @@
|
||||||
|
import BaseGoogleProvider from "next-auth/providers/google";
|
||||||
|
|
||||||
|
export function GoogleProvider() {
|
||||||
|
if (process.env.GOOGLE_CLIENT_ID && process.env.GOOGLE_CLIENT_SECRET) {
|
||||||
|
return BaseGoogleProvider({
|
||||||
|
clientId: process.env.GOOGLE_CLIENT_ID,
|
||||||
|
clientSecret: process.env.GOOGLE_CLIENT_SECRET,
|
||||||
|
allowDangerousEmailAccountLinking: true,
|
||||||
|
});
|
||||||
|
}
|
||||||
|
}
|
14
apps/web/src/auth/providers/guest.ts
Normal file
14
apps/web/src/auth/providers/guest.ts
Normal file
|
@ -0,0 +1,14 @@
|
||||||
|
import { randomid } from "@rallly/utils/nanoid";
|
||||||
|
import CredentialsProvider from "next-auth/providers/credentials";
|
||||||
|
|
||||||
|
export const GuestProvider = CredentialsProvider({
|
||||||
|
id: "guest",
|
||||||
|
name: "Guest",
|
||||||
|
credentials: {},
|
||||||
|
async authorize() {
|
||||||
|
return {
|
||||||
|
id: `user-${randomid()}`,
|
||||||
|
email: null,
|
||||||
|
};
|
||||||
|
},
|
||||||
|
});
|
17
apps/web/src/auth/providers/microsoft.ts
Normal file
17
apps/web/src/auth/providers/microsoft.ts
Normal file
|
@ -0,0 +1,17 @@
|
||||||
|
import MicrosoftEntraID from "next-auth/providers/microsoft-entra-id";
|
||||||
|
|
||||||
|
export function MicrosoftProvider() {
|
||||||
|
if (
|
||||||
|
process.env.MICROSOFT_TENANT_ID &&
|
||||||
|
process.env.MICROSOFT_CLIENT_ID &&
|
||||||
|
process.env.MICROSOFT_CLIENT_SECRET
|
||||||
|
) {
|
||||||
|
return MicrosoftEntraID({
|
||||||
|
name: "Microsoft",
|
||||||
|
clientId: process.env.MICROSOFT_CLIENT_ID,
|
||||||
|
clientSecret: process.env.MICROSOFT_CLIENT_SECRET,
|
||||||
|
wellKnown:
|
||||||
|
"https://login.microsoftonline.com/common/v2.0/.well-known/openid-configuration",
|
||||||
|
});
|
||||||
|
}
|
||||||
|
}
|
34
apps/web/src/auth/providers/oidc.ts
Normal file
34
apps/web/src/auth/providers/oidc.ts
Normal file
|
@ -0,0 +1,34 @@
|
||||||
|
import type { User } from "next-auth";
|
||||||
|
import type { OIDCConfig } from "next-auth/providers/index";
|
||||||
|
|
||||||
|
import { env } from "@/env";
|
||||||
|
import { getValueByPath } from "@/utils/get-value-by-path";
|
||||||
|
|
||||||
|
export const OIDCProvider = () => {
|
||||||
|
if (
|
||||||
|
process.env.OIDC_DISCOVERY_URL &&
|
||||||
|
process.env.OIDC_CLIENT_ID &&
|
||||||
|
process.env.OIDC_CLIENT_SECRET
|
||||||
|
) {
|
||||||
|
return {
|
||||||
|
id: "oidc",
|
||||||
|
name: process.env.OIDC_NAME ?? "OpenID Connect",
|
||||||
|
type: "oidc",
|
||||||
|
wellKnown: process.env.OIDC_DISCOVERY_URL,
|
||||||
|
authorization: { params: { scope: "openid email profile" } },
|
||||||
|
clientId: process.env.OIDC_CLIENT_ID,
|
||||||
|
clientSecret: process.env.OIDC_CLIENT_SECRET,
|
||||||
|
idToken: true,
|
||||||
|
checks: ["state"],
|
||||||
|
allowDangerousEmailAccountLinking: true,
|
||||||
|
profile(profile) {
|
||||||
|
return {
|
||||||
|
id: profile.sub,
|
||||||
|
name: getValueByPath(profile, env.OIDC_NAME_CLAIM_PATH),
|
||||||
|
email: getValueByPath(profile, env.OIDC_EMAIL_CLAIM_PATH),
|
||||||
|
image: getValueByPath(profile, env.OIDC_PICTURE_CLAIM_PATH),
|
||||||
|
} as User;
|
||||||
|
},
|
||||||
|
} satisfies OIDCConfig<Record<string, unknown>>;
|
||||||
|
}
|
||||||
|
};
|
47
apps/web/src/auth/providers/registration-token.ts
Normal file
47
apps/web/src/auth/providers/registration-token.ts
Normal file
|
@ -0,0 +1,47 @@
|
||||||
|
import { prisma } from "@rallly/database";
|
||||||
|
import CredentialsProvider from "next-auth/providers/credentials";
|
||||||
|
|
||||||
|
import type { RegistrationTokenPayload } from "@/trpc/types";
|
||||||
|
import { decryptToken } from "@/utils/session";
|
||||||
|
|
||||||
|
// When a user registers, we don't want to go through the email verification process
|
||||||
|
// so this provider allows us exchange the registration token for a session token
|
||||||
|
export const RegistrationTokenProvider = CredentialsProvider({
|
||||||
|
id: "registration-token",
|
||||||
|
name: "Registration Token",
|
||||||
|
credentials: {
|
||||||
|
token: {
|
||||||
|
label: "Token",
|
||||||
|
type: "text",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
async authorize(credentials) {
|
||||||
|
if (credentials?.token) {
|
||||||
|
const payload = await decryptToken<RegistrationTokenPayload>(
|
||||||
|
credentials.token as string,
|
||||||
|
);
|
||||||
|
if (payload) {
|
||||||
|
const user = await prisma.user.findUnique({
|
||||||
|
where: {
|
||||||
|
email: payload.email,
|
||||||
|
},
|
||||||
|
select: {
|
||||||
|
id: true,
|
||||||
|
email: true,
|
||||||
|
name: true,
|
||||||
|
locale: true,
|
||||||
|
timeFormat: true,
|
||||||
|
timeZone: true,
|
||||||
|
image: true,
|
||||||
|
},
|
||||||
|
});
|
||||||
|
|
||||||
|
if (user) {
|
||||||
|
return user;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return null;
|
||||||
|
},
|
||||||
|
});
|
|
@ -1,8 +0,0 @@
|
||||||
"use client";
|
|
||||||
|
|
||||||
import type { SessionProviderProps } from "next-auth/react";
|
|
||||||
import { SessionProvider as NextAuthSessionProvider } from "next-auth/react";
|
|
||||||
|
|
||||||
export function SessionProvider(props: SessionProviderProps) {
|
|
||||||
return <NextAuthSessionProvider {...props} />;
|
|
||||||
}
|
|
|
@ -12,7 +12,7 @@ export const LoginLink = React.forwardRef<
|
||||||
<Link
|
<Link
|
||||||
ref={ref}
|
ref={ref}
|
||||||
{...props}
|
{...props}
|
||||||
href={`/login?callbackUrl=${encodeURIComponent(pathname)}`}
|
href={`/login?redirectTo=${encodeURIComponent(pathname)}`}
|
||||||
>
|
>
|
||||||
{children}
|
{children}
|
||||||
</Link>
|
</Link>
|
||||||
|
|
|
@ -18,7 +18,7 @@ export const LanguageSelect: React.FunctionComponent<{
|
||||||
return (
|
return (
|
||||||
<Select value={value} onValueChange={onChange}>
|
<Select value={value} onValueChange={onChange}>
|
||||||
<SelectTrigger asChild className={className}>
|
<SelectTrigger asChild className={className}>
|
||||||
<Button variant="ghost">
|
<Button>
|
||||||
<Icon>
|
<Icon>
|
||||||
<GlobeIcon />
|
<GlobeIcon />
|
||||||
</Icon>
|
</Icon>
|
||||||
|
|
|
@ -17,7 +17,7 @@ export const RegisterLink = React.forwardRef<
|
||||||
onClick={async (e) => {
|
onClick={async (e) => {
|
||||||
e.preventDefault();
|
e.preventDefault();
|
||||||
props.onClick?.(e);
|
props.onClick?.(e);
|
||||||
router.push("/register?callbackUrl=" + encodeURIComponent(pathname));
|
router.push("/register?redirectTo=" + encodeURIComponent(pathname));
|
||||||
}}
|
}}
|
||||||
>
|
>
|
||||||
{children}
|
{children}
|
||||||
|
|
|
@ -1,9 +1,9 @@
|
||||||
import { prisma } from "@rallly/database";
|
import { prisma } from "@rallly/database";
|
||||||
|
|
||||||
import { getServerSession } from "@/auth";
|
import { auth } from "@/next-auth";
|
||||||
|
|
||||||
export async function getGuestPolls() {
|
export async function getGuestPolls() {
|
||||||
const session = await getServerSession();
|
const session = await auth();
|
||||||
const user = session?.user;
|
const user = session?.user;
|
||||||
const guestId = !user?.email ? user?.id : null;
|
const guestId = !user?.email ? user?.id : null;
|
||||||
|
|
||||||
|
|
|
@ -1,32 +1,19 @@
|
||||||
import languages from "@rallly/languages";
|
import languages from "@rallly/languages";
|
||||||
import { withPostHog } from "@rallly/posthog/next/middleware";
|
import { withPostHog } from "@rallly/posthog/next/middleware";
|
||||||
import { NextResponse } from "next/server";
|
import { NextResponse } from "next/server";
|
||||||
import withAuth from "next-auth/middleware";
|
|
||||||
|
|
||||||
import { getLocaleFromHeader } from "@/app/guest";
|
import { getLocaleFromHeader } from "@/app/guest";
|
||||||
import { isSelfHosted } from "@/utils/constants";
|
import { withAuthMigration } from "@/auth/legacy/next-auth-cookie-migration";
|
||||||
|
import { withAuth } from "@/auth/middleware";
|
||||||
|
|
||||||
const supportedLocales = Object.keys(languages);
|
const supportedLocales = Object.keys(languages);
|
||||||
|
|
||||||
const publicRoutes = [
|
export const middleware = withAuthMigration(
|
||||||
"/login",
|
withAuth(async (req) => {
|
||||||
"/register",
|
|
||||||
"/invite/",
|
|
||||||
"/poll/",
|
|
||||||
"/auth/login",
|
|
||||||
];
|
|
||||||
|
|
||||||
if (process.env.QUICK_CREATE_ENABLED === "true") {
|
|
||||||
publicRoutes.push("/quick-create", "/new");
|
|
||||||
}
|
|
||||||
|
|
||||||
export const middleware = withAuth(
|
|
||||||
async function middleware(req) {
|
|
||||||
const { nextUrl } = req;
|
const { nextUrl } = req;
|
||||||
const newUrl = nextUrl.clone();
|
const newUrl = nextUrl.clone();
|
||||||
|
|
||||||
const isLoggedIn = req.nextauth.token?.email;
|
const isLoggedIn = req.auth?.user?.email;
|
||||||
// set x-pathname header to the pathname
|
|
||||||
|
|
||||||
// if the user is already logged in, don't let them access the login page
|
// if the user is already logged in, don't let them access the login page
|
||||||
if (/^\/(login)/.test(newUrl.pathname) && isLoggedIn) {
|
if (/^\/(login)/.test(newUrl.pathname) && isLoggedIn) {
|
||||||
|
@ -34,63 +21,25 @@ export const middleware = withAuth(
|
||||||
return NextResponse.redirect(newUrl);
|
return NextResponse.redirect(newUrl);
|
||||||
}
|
}
|
||||||
|
|
||||||
// if the user is not logged in and the page is not public, redirect to login
|
|
||||||
if (
|
|
||||||
!isLoggedIn &&
|
|
||||||
!publicRoutes.some((route) => newUrl.pathname.startsWith(route))
|
|
||||||
) {
|
|
||||||
if (newUrl.pathname !== "/") {
|
|
||||||
newUrl.searchParams.set("callbackUrl", newUrl.pathname);
|
|
||||||
}
|
|
||||||
newUrl.pathname = "/login";
|
|
||||||
return NextResponse.redirect(newUrl);
|
|
||||||
}
|
|
||||||
|
|
||||||
// Check if locale is specified in cookie
|
// Check if locale is specified in cookie
|
||||||
let locale = req.nextauth.token?.locale;
|
let locale = req.auth?.user?.locale;
|
||||||
if (locale && supportedLocales.includes(locale)) {
|
if (locale && supportedLocales.includes(locale)) {
|
||||||
newUrl.pathname = `/${locale}${newUrl.pathname}`;
|
newUrl.pathname = `/${locale}${newUrl.pathname}`;
|
||||||
} else {
|
} else {
|
||||||
// Check if locale is specified in header
|
// Check if locale is specified in header
|
||||||
locale = await getLocaleFromHeader(req);
|
locale = await getLocaleFromHeader(req);
|
||||||
|
|
||||||
newUrl.pathname = `/${locale}${newUrl.pathname}`;
|
newUrl.pathname = `/${locale}${newUrl.pathname}`;
|
||||||
}
|
}
|
||||||
|
|
||||||
const res = NextResponse.rewrite(newUrl);
|
const res = NextResponse.rewrite(newUrl);
|
||||||
res.headers.set("x-pathname", newUrl.pathname);
|
res.headers.set("x-pathname", newUrl.pathname);
|
||||||
|
|
||||||
if (req.nextauth.token) {
|
if (req.auth?.user?.id) {
|
||||||
await withPostHog(res, { distinctID: req.nextauth.token.sub });
|
await withPostHog(res, { distinctID: req.auth.user.id });
|
||||||
}
|
}
|
||||||
|
|
||||||
return res;
|
return res;
|
||||||
},
|
}),
|
||||||
{
|
|
||||||
secret: process.env.SECRET_PASSWORD,
|
|
||||||
callbacks: {
|
|
||||||
authorized: ({ token, req }) => {
|
|
||||||
const nextUrl = req.nextUrl;
|
|
||||||
const isGuest = !token?.email;
|
|
||||||
if (
|
|
||||||
isSelfHosted &&
|
|
||||||
isGuest &&
|
|
||||||
!(
|
|
||||||
nextUrl.pathname.startsWith("/invite") ||
|
|
||||||
nextUrl.pathname.startsWith("/login") ||
|
|
||||||
nextUrl.pathname.startsWith("/register") ||
|
|
||||||
nextUrl.pathname.startsWith("/auth") ||
|
|
||||||
nextUrl.pathname.startsWith("/p/")
|
|
||||||
)
|
|
||||||
) {
|
|
||||||
// limit which pages guests can access for self-hosted instances
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
return true;
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
);
|
);
|
||||||
|
|
||||||
export const config = {
|
export const config = {
|
||||||
|
|
50
apps/web/src/next-auth.config.ts
Normal file
50
apps/web/src/next-auth.config.ts
Normal file
|
@ -0,0 +1,50 @@
|
||||||
|
import { NextResponse } from "next/server";
|
||||||
|
import type { NextAuthConfig } from "next-auth";
|
||||||
|
|
||||||
|
import { env } from "@/env";
|
||||||
|
import { isQuickCreateEnabled } from "@/features/quick-create/constants";
|
||||||
|
|
||||||
|
const publicRoutes = ["/login", "/register", "/invite/", "/poll/", "/auth"];
|
||||||
|
|
||||||
|
if (isQuickCreateEnabled) {
|
||||||
|
publicRoutes.push("/quick-create", "/new");
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* We split the next-auth config so that we can create an edge compatible instance that is
|
||||||
|
* used in middleware.
|
||||||
|
*/
|
||||||
|
export const nextAuthConfig = {
|
||||||
|
session: {
|
||||||
|
strategy: "jwt",
|
||||||
|
},
|
||||||
|
secret: env.SECRET_PASSWORD,
|
||||||
|
providers: [],
|
||||||
|
callbacks: {
|
||||||
|
async session({ session, token }) {
|
||||||
|
session.user.id = token.sub as string;
|
||||||
|
session.user.email = token.email as string;
|
||||||
|
session.user.locale = token.locale;
|
||||||
|
session.user.timeFormat = token.timeFormat;
|
||||||
|
session.user.timeZone = token.timeZone;
|
||||||
|
session.user.weekStart = token.weekStart;
|
||||||
|
return session;
|
||||||
|
},
|
||||||
|
async authorized({ request, auth }) {
|
||||||
|
const { nextUrl } = request;
|
||||||
|
const isLoggedIn = !!auth?.user?.email;
|
||||||
|
const isPublicRoute = publicRoutes.some((route) =>
|
||||||
|
nextUrl.pathname.startsWith(route),
|
||||||
|
);
|
||||||
|
if (isLoggedIn || isPublicRoute) {
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
const redirectUrl = new URL("/login", request.url);
|
||||||
|
if (nextUrl.pathname !== "/") {
|
||||||
|
const redirectPath = nextUrl.pathname + nextUrl.search;
|
||||||
|
redirectUrl.searchParams.set("redirectTo", redirectPath);
|
||||||
|
}
|
||||||
|
return NextResponse.redirect(redirectUrl);
|
||||||
|
},
|
||||||
|
},
|
||||||
|
} satisfies NextAuthConfig;
|
169
apps/web/src/next-auth.ts
Normal file
169
apps/web/src/next-auth.ts
Normal file
|
@ -0,0 +1,169 @@
|
||||||
|
import { prisma } from "@rallly/database";
|
||||||
|
import { posthog } from "@rallly/posthog/server";
|
||||||
|
import NextAuth from "next-auth";
|
||||||
|
import type { Provider } from "next-auth/providers";
|
||||||
|
import z from "zod";
|
||||||
|
|
||||||
|
import { CustomPrismaAdapter } from "./auth/adapters/prisma";
|
||||||
|
import { isEmailBlocked } from "./auth/helpers/is-email-blocked";
|
||||||
|
import { mergeGuestsIntoUser } from "./auth/helpers/merge-user";
|
||||||
|
import { EmailProvider } from "./auth/providers/email";
|
||||||
|
import { GoogleProvider } from "./auth/providers/google";
|
||||||
|
import { GuestProvider } from "./auth/providers/guest";
|
||||||
|
import { MicrosoftProvider } from "./auth/providers/microsoft";
|
||||||
|
import { OIDCProvider } from "./auth/providers/oidc";
|
||||||
|
import { RegistrationTokenProvider } from "./auth/providers/registration-token";
|
||||||
|
import { nextAuthConfig } from "./next-auth.config";
|
||||||
|
|
||||||
|
const sessionUpdateSchema = z.object({
|
||||||
|
locale: z.string().nullish(),
|
||||||
|
timeFormat: z.enum(["12h", "24h"]).nullish(),
|
||||||
|
timeZone: z.string().nullish(),
|
||||||
|
weekStart: z.number().nullish(),
|
||||||
|
});
|
||||||
|
|
||||||
|
export const { auth, handlers, signIn, signOut } = NextAuth({
|
||||||
|
...nextAuthConfig,
|
||||||
|
adapter: CustomPrismaAdapter({
|
||||||
|
migrateData: async (userId) => {
|
||||||
|
const session = await auth();
|
||||||
|
if (session?.user && session.user.email === null) {
|
||||||
|
await mergeGuestsIntoUser(userId, [session.user.id]);
|
||||||
|
}
|
||||||
|
},
|
||||||
|
}),
|
||||||
|
providers: [
|
||||||
|
RegistrationTokenProvider,
|
||||||
|
EmailProvider,
|
||||||
|
GuestProvider,
|
||||||
|
...([GoogleProvider(), OIDCProvider(), MicrosoftProvider()].filter(
|
||||||
|
Boolean,
|
||||||
|
) as Provider[]),
|
||||||
|
],
|
||||||
|
pages: {
|
||||||
|
signIn: "/login",
|
||||||
|
verifyRequest: "/login/verify",
|
||||||
|
error: "/auth/error",
|
||||||
|
},
|
||||||
|
session: {
|
||||||
|
strategy: "jwt",
|
||||||
|
},
|
||||||
|
events: {
|
||||||
|
signIn({ user, account }) {
|
||||||
|
if (user.id) {
|
||||||
|
posthog?.capture({
|
||||||
|
distinctId: user.id,
|
||||||
|
event: "login",
|
||||||
|
properties: {
|
||||||
|
method: account?.provider,
|
||||||
|
$set: {
|
||||||
|
name: user.name,
|
||||||
|
email: user.email,
|
||||||
|
timeZone: user.timeZone,
|
||||||
|
locale: user.locale,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
});
|
||||||
|
}
|
||||||
|
},
|
||||||
|
},
|
||||||
|
callbacks: {
|
||||||
|
...nextAuthConfig.callbacks,
|
||||||
|
async signIn({ user, email, profile }) {
|
||||||
|
const distinctId = user.id;
|
||||||
|
// prevent sign in if email is not verified
|
||||||
|
if (
|
||||||
|
profile &&
|
||||||
|
"email_verified" in profile &&
|
||||||
|
profile.email_verified === false &&
|
||||||
|
distinctId
|
||||||
|
) {
|
||||||
|
posthog?.capture({
|
||||||
|
distinctId,
|
||||||
|
event: "login failed",
|
||||||
|
properties: {
|
||||||
|
reason: "email not verified",
|
||||||
|
},
|
||||||
|
});
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
// Make sure email is allowed
|
||||||
|
if (user.email) {
|
||||||
|
const isBlocked = isEmailBlocked(user.email);
|
||||||
|
if (isBlocked) {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// For now, we don't allow users to login unless they have
|
||||||
|
// registered an account. This is just because we need a name
|
||||||
|
// to display on the dashboard. The flow can be modified so that
|
||||||
|
// the name is requested after the user has logged in.
|
||||||
|
if (email?.verificationRequest) {
|
||||||
|
const isRegisteredUser =
|
||||||
|
(await prisma.user.count({
|
||||||
|
where: {
|
||||||
|
email: user.email as string,
|
||||||
|
},
|
||||||
|
})) > 0;
|
||||||
|
|
||||||
|
return isRegisteredUser;
|
||||||
|
}
|
||||||
|
|
||||||
|
// when we login with a social account for the first time, the user is not created yet
|
||||||
|
// and the user id will be the same as the provider account id
|
||||||
|
// we handle this case the the prisma adapter when we link accounts
|
||||||
|
const isInitialSocialLogin = user.id === profile?.sub;
|
||||||
|
|
||||||
|
if (!isInitialSocialLogin) {
|
||||||
|
// merge guest user into newly logged in user
|
||||||
|
const session = await auth();
|
||||||
|
if (user.id && session?.user && !session.user.email) {
|
||||||
|
await mergeGuestsIntoUser(user.id, [session.user.id]);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return true;
|
||||||
|
},
|
||||||
|
async jwt({ token, session, trigger }) {
|
||||||
|
if (trigger === "update") {
|
||||||
|
const parsed = sessionUpdateSchema.safeParse(session);
|
||||||
|
if (parsed.success) {
|
||||||
|
Object.entries(parsed.data).forEach(([key, value]) => {
|
||||||
|
token[key] = value;
|
||||||
|
});
|
||||||
|
} else {
|
||||||
|
console.error(parsed.error);
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
const userId = token.sub;
|
||||||
|
const isGuest = userId?.startsWith("guest-");
|
||||||
|
|
||||||
|
if (userId && !isGuest) {
|
||||||
|
const user = await prisma.user.findUnique({
|
||||||
|
where: {
|
||||||
|
id: userId,
|
||||||
|
},
|
||||||
|
select: {
|
||||||
|
email: true,
|
||||||
|
locale: true,
|
||||||
|
timeFormat: true,
|
||||||
|
timeZone: true,
|
||||||
|
weekStart: true,
|
||||||
|
},
|
||||||
|
});
|
||||||
|
|
||||||
|
if (user) {
|
||||||
|
token.email = user.email;
|
||||||
|
token.locale = user.locale;
|
||||||
|
token.timeFormat = user.timeFormat;
|
||||||
|
token.timeZone = user.timeZone;
|
||||||
|
token.weekStart = user.weekStart;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return token;
|
||||||
|
},
|
||||||
|
},
|
||||||
|
});
|
|
@ -1,14 +0,0 @@
|
||||||
import { posthogApiHandler } from "@rallly/posthog/server";
|
|
||||||
import type { NextApiRequest, NextApiResponse } from "next";
|
|
||||||
|
|
||||||
import { AuthApiRoute } from "@/auth";
|
|
||||||
import { composeApiHandlers } from "@/utils/next";
|
|
||||||
|
|
||||||
export default async function auth(req: NextApiRequest, res: NextApiResponse) {
|
|
||||||
if (req.method === "HEAD") {
|
|
||||||
res.status(200).end();
|
|
||||||
res.setHeader("Content-Length", "0");
|
|
||||||
} else {
|
|
||||||
return composeApiHandlers(AuthApiRoute, posthogApiHandler)(req, res);
|
|
||||||
}
|
|
||||||
}
|
|
|
@ -4,8 +4,8 @@ import { generateOtp } from "@rallly/utils/nanoid";
|
||||||
import * as Sentry from "@sentry/nextjs";
|
import * as Sentry from "@sentry/nextjs";
|
||||||
import { z } from "zod";
|
import { z } from "zod";
|
||||||
|
|
||||||
import { isEmailBlocked } from "@/auth";
|
import { isEmailBlocked } from "@/auth/helpers/is-email-blocked";
|
||||||
import { mergeGuestsIntoUser } from "@/auth/merge-user";
|
import { mergeGuestsIntoUser } from "@/auth/helpers/merge-user";
|
||||||
import { getEmailClient } from "@/utils/emails";
|
import { getEmailClient } from "@/utils/emails";
|
||||||
import { createToken, decryptToken } from "@/utils/session";
|
import { createToken, decryptToken } from "@/utils/session";
|
||||||
|
|
||||||
|
|
|
@ -2,14 +2,14 @@ import { createServerSideHelpers } from "@trpc/react-query/server";
|
||||||
import { redirect } from "next/navigation";
|
import { redirect } from "next/navigation";
|
||||||
import superjson from "superjson";
|
import superjson from "superjson";
|
||||||
|
|
||||||
import { getServerSession } from "@/auth";
|
import { auth } from "@/next-auth";
|
||||||
import { getEmailClient } from "@/utils/emails";
|
import { getEmailClient } from "@/utils/emails";
|
||||||
|
|
||||||
import type { TRPCContext } from "../context";
|
import type { TRPCContext } from "../context";
|
||||||
import { appRouter } from "../routers";
|
import { appRouter } from "../routers";
|
||||||
|
|
||||||
async function createContext(): Promise<TRPCContext> {
|
async function createContext(): Promise<TRPCContext> {
|
||||||
const session = await getServerSession();
|
const session = await auth();
|
||||||
return {
|
return {
|
||||||
user: session?.user
|
user: session?.user
|
||||||
? {
|
? {
|
||||||
|
|
|
@ -31,6 +31,6 @@ test.describe.serial(() => {
|
||||||
|
|
||||||
deletePollDialog.getByRole("button", { name: "delete" }).click();
|
deletePollDialog.getByRole("button", { name: "delete" }).click();
|
||||||
|
|
||||||
await expect(page).toHaveURL("/login?callbackUrl=%2Fpolls");
|
await expect(page).toHaveURL("/login?redirectTo=%2Fpolls");
|
||||||
});
|
});
|
||||||
});
|
});
|
||||||
|
|
|
@ -58,5 +58,6 @@
|
||||||
"engines": {
|
"engines": {
|
||||||
"node": "20.x"
|
"node": "20.x"
|
||||||
},
|
},
|
||||||
"packageManager": "yarn@1.22.22"
|
"packageManager": "yarn@1.22.22",
|
||||||
|
"dependencies": {}
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
import { waitUntil } from "@vercel/functions";
|
import { waitUntil } from "@vercel/functions";
|
||||||
|
import type { NextRequest } from "next/server";
|
||||||
import { PostHog } from "posthog-node";
|
import { PostHog } from "posthog-node";
|
||||||
|
|
||||||
function PostHogClient() {
|
function PostHogClient() {
|
||||||
|
@ -14,10 +15,14 @@ function PostHogClient() {
|
||||||
|
|
||||||
export const posthog = PostHogClient();
|
export const posthog = PostHogClient();
|
||||||
|
|
||||||
export function posthogApiHandler() {
|
export function withPosthog(handler: (req: NextRequest) => Promise<Response>) {
|
||||||
|
return async (req: NextRequest) => {
|
||||||
|
const res = await handler(req);
|
||||||
try {
|
try {
|
||||||
waitUntil(Promise.all([posthog?.shutdown()]));
|
waitUntil(Promise.all([posthog?.shutdown()]));
|
||||||
} catch (error) {
|
} catch (error) {
|
||||||
console.error("Failed to flush PostHog events:", error);
|
console.error("Failed to flush PostHog events:", error);
|
||||||
}
|
}
|
||||||
|
return res;
|
||||||
|
};
|
||||||
}
|
}
|
||||||
|
|
|
@ -2,7 +2,6 @@
|
||||||
set -e
|
set -e
|
||||||
|
|
||||||
export DIRECT_DATABASE_URL=$DATABASE_URL
|
export DIRECT_DATABASE_URL=$DATABASE_URL
|
||||||
export NEXTAUTH_URL=$NEXT_PUBLIC_BASE_URL
|
|
||||||
|
|
||||||
prisma migrate deploy --schema=./prisma/schema.prisma
|
prisma migrate deploy --schema=./prisma/schema.prisma
|
||||||
node apps/web/server.js
|
node apps/web/server.js
|
||||||
|
|
142
yarn.lock
142
yarn.lock
|
@ -20,24 +20,36 @@
|
||||||
"@jridgewell/gen-mapping" "^0.1.0"
|
"@jridgewell/gen-mapping" "^0.1.0"
|
||||||
"@jridgewell/trace-mapping" "^0.3.9"
|
"@jridgewell/trace-mapping" "^0.3.9"
|
||||||
|
|
||||||
"@auth/core@0.16.1":
|
"@auth/core@0.37.2":
|
||||||
version "0.16.1"
|
version "0.37.2"
|
||||||
resolved "https://registry.npmjs.org/@auth/core/-/core-0.16.1.tgz"
|
resolved "https://registry.yarnpkg.com/@auth/core/-/core-0.37.2.tgz#0db8a94a076846bd88eb7f9273618513e2285cb2"
|
||||||
integrity sha512-V+YifnjpyOadiiTbxfYDV2xYWo8xpKNtwYVskAEKUSwMvE0FlSlP+10QGBpf0axS/AJFOO61IR6GncFF/IOrHQ==
|
integrity sha512-kUvzyvkcd6h1vpeMAojK2y7+PAV5H+0Cc9+ZlKYDFhDY31AlvsB+GW5vNO4qE3Y07KeQgvNO9U0QUx/fN62kBw==
|
||||||
dependencies:
|
dependencies:
|
||||||
"@panva/hkdf" "^1.0.4"
|
"@panva/hkdf" "^1.2.1"
|
||||||
cookie "0.5.0"
|
"@types/cookie" "0.6.0"
|
||||||
jose "^4.11.1"
|
cookie "0.7.1"
|
||||||
oauth4webapi "^2.0.6"
|
jose "^5.9.3"
|
||||||
|
oauth4webapi "^3.0.0"
|
||||||
preact "10.11.3"
|
preact "10.11.3"
|
||||||
preact-render-to-string "5.2.3"
|
preact-render-to-string "5.2.3"
|
||||||
|
|
||||||
"@auth/prisma-adapter@^1.0.3":
|
"@auth/core@0.37.4":
|
||||||
version "1.0.3"
|
version "0.37.4"
|
||||||
resolved "https://registry.npmjs.org/@auth/prisma-adapter/-/prisma-adapter-1.0.3.tgz"
|
resolved "https://registry.yarnpkg.com/@auth/core/-/core-0.37.4.tgz#c51410aa7d0997fa22a07a196d2c21c8b1bca71b"
|
||||||
integrity sha512-AMwQbO7OiBYRCA6VNfv9CpcpiRh0BP4EKhPdtO+pom9Uhuor2ioE4IqvhUfJyBkSjAP2Gt9WbKqr9kzL9LrtIg==
|
integrity sha512-HOXJwXWXQRhbBDHlMU0K/6FT1v+wjtzdKhsNg0ZN7/gne6XPsIrjZ4daMcFnbq0Z/vsAbYBinQhhua0d77v7qw==
|
||||||
dependencies:
|
dependencies:
|
||||||
"@auth/core" "0.16.1"
|
"@panva/hkdf" "^1.2.1"
|
||||||
|
jose "^5.9.6"
|
||||||
|
oauth4webapi "^3.1.1"
|
||||||
|
preact "10.24.3"
|
||||||
|
preact-render-to-string "6.5.11"
|
||||||
|
|
||||||
|
"@auth/prisma-adapter@^2.7.4":
|
||||||
|
version "2.7.4"
|
||||||
|
resolved "https://registry.yarnpkg.com/@auth/prisma-adapter/-/prisma-adapter-2.7.4.tgz#4890be47a9f227f449832302d955c565c02879ee"
|
||||||
|
integrity sha512-3T/X94R9J1sxOLQtsD3ijIZ0JGHPXlZQxRr/8NpnZBJ3KGxun/mNsZ1MwMRhTxy0mmn9JWXk7u9+xCcVn0pu3A==
|
||||||
|
dependencies:
|
||||||
|
"@auth/core" "0.37.4"
|
||||||
|
|
||||||
"@aws-crypto/crc32@3.0.0":
|
"@aws-crypto/crc32@3.0.0":
|
||||||
version "3.0.0"
|
version "3.0.0"
|
||||||
|
@ -3378,10 +3390,10 @@
|
||||||
dependencies:
|
dependencies:
|
||||||
"@opentelemetry/core" "^1.1.0"
|
"@opentelemetry/core" "^1.1.0"
|
||||||
|
|
||||||
"@panva/hkdf@^1.0.2", "@panva/hkdf@^1.0.4":
|
"@panva/hkdf@^1.2.1":
|
||||||
version "1.1.1"
|
version "1.2.1"
|
||||||
resolved "https://registry.npmjs.org/@panva/hkdf/-/hkdf-1.1.1.tgz"
|
resolved "https://registry.yarnpkg.com/@panva/hkdf/-/hkdf-1.2.1.tgz#cb0d111ef700136f4580349ff0226bf25c853f23"
|
||||||
integrity sha512-dhPeilub1NuIG0X5Kvhh9lH4iW3ZsHlnzwgwbOlgwQ2wG1IqFzsgHqmKPk3WzsdWAeaxKJxgM0+W433RmN45GA==
|
integrity sha512-6oclG6Y3PiDFcoyk8srjLfVKyMfVCKJ27JwNPViuXziFpmdz+MZnZN/aKY0JGXgYuO/VghU0jcOAZgWXZ1Dmrw==
|
||||||
|
|
||||||
"@peculiar/asn1-schema@^2.1.6", "@peculiar/asn1-schema@^2.3.0":
|
"@peculiar/asn1-schema@^2.1.6", "@peculiar/asn1-schema@^2.3.0":
|
||||||
version "2.3.3"
|
version "2.3.3"
|
||||||
|
@ -6128,6 +6140,11 @@
|
||||||
resolved "https://registry.npmjs.org/@types/content-disposition/-/content-disposition-0.5.5.tgz"
|
resolved "https://registry.npmjs.org/@types/content-disposition/-/content-disposition-0.5.5.tgz"
|
||||||
integrity sha512-v6LCdKfK6BwcqMo+wYW05rLS12S0ZO0Fl4w1h4aaZMD7bqT3gVUns6FvLJKGZHQmYn3SX55JWGpziwJRwVgutA==
|
integrity sha512-v6LCdKfK6BwcqMo+wYW05rLS12S0ZO0Fl4w1h4aaZMD7bqT3gVUns6FvLJKGZHQmYn3SX55JWGpziwJRwVgutA==
|
||||||
|
|
||||||
|
"@types/cookie@0.6.0":
|
||||||
|
version "0.6.0"
|
||||||
|
resolved "https://registry.yarnpkg.com/@types/cookie/-/cookie-0.6.0.tgz#eac397f28bf1d6ae0ae081363eca2f425bedf0d5"
|
||||||
|
integrity sha512-4Kh9a6B2bQciAhf7FSuMRRkUWecJgJu9nPnx3yzpsfXX/c50REIqpHY4C82bXP90qrLtXtkDxTZosYO3UpOwlA==
|
||||||
|
|
||||||
"@types/cookie@^0.4.1":
|
"@types/cookie@^0.4.1":
|
||||||
version "0.4.1"
|
version "0.4.1"
|
||||||
resolved "https://registry.yarnpkg.com/@types/cookie/-/cookie-0.4.1.tgz#bfd02c1f2224567676c1545199f87c3a861d878d"
|
resolved "https://registry.yarnpkg.com/@types/cookie/-/cookie-0.4.1.tgz#bfd02c1f2224567676c1545199f87c3a861d878d"
|
||||||
|
@ -7521,9 +7538,9 @@ camelcase@^6.2.0:
|
||||||
integrity sha512-Gmy6FhYlCY7uOElZUSbxo2UCDH8owEk996gkbrpsgGtrJLM3J7jGxl9Ic7Qwwj4ivOE5AWZWRMecDdF7hqGjFA==
|
integrity sha512-Gmy6FhYlCY7uOElZUSbxo2UCDH8owEk996gkbrpsgGtrJLM3J7jGxl9Ic7Qwwj4ivOE5AWZWRMecDdF7hqGjFA==
|
||||||
|
|
||||||
caniuse-lite@^1.0.30001406, caniuse-lite@^1.0.30001426, caniuse-lite@^1.0.30001449, caniuse-lite@^1.0.30001464, caniuse-lite@^1.0.30001579, caniuse-lite@^1.0.30001580, caniuse-lite@^1.0.30001629:
|
caniuse-lite@^1.0.30001406, caniuse-lite@^1.0.30001426, caniuse-lite@^1.0.30001449, caniuse-lite@^1.0.30001464, caniuse-lite@^1.0.30001579, caniuse-lite@^1.0.30001580, caniuse-lite@^1.0.30001629:
|
||||||
version "1.0.30001636"
|
version "1.0.30001697"
|
||||||
resolved "https://registry.yarnpkg.com/caniuse-lite/-/caniuse-lite-1.0.30001636.tgz#b15f52d2bdb95fad32c2f53c0b68032b85188a78"
|
resolved "https://registry.npmjs.org/caniuse-lite/-/caniuse-lite-1.0.30001697.tgz"
|
||||||
integrity sha512-bMg2vmr8XBsbL6Lr0UHXy/21m84FTxDLWn2FSqMd5PrlbMxwJlQnC2YWYxVgp66PZE+BBNF2jYQUBKCo1FDeZg==
|
integrity sha512-GwNPlWJin8E+d7Gxq96jxM6w0w+VFeyyXRsjU58emtkYqnbwHqXm5uT2uCmO0RQE9htWknOP4xtBlLmM/gWxvQ==
|
||||||
|
|
||||||
ccount@^2.0.0:
|
ccount@^2.0.0:
|
||||||
version "2.0.1"
|
version "2.0.1"
|
||||||
|
@ -7855,7 +7872,12 @@ convert-source-map@^2.0.0:
|
||||||
resolved "https://registry.yarnpkg.com/convert-source-map/-/convert-source-map-2.0.0.tgz#4b560f649fc4e918dd0ab75cf4961e8bc882d82a"
|
resolved "https://registry.yarnpkg.com/convert-source-map/-/convert-source-map-2.0.0.tgz#4b560f649fc4e918dd0ab75cf4961e8bc882d82a"
|
||||||
integrity sha512-Kvp459HrV2FEJ1CAsi1Ku+MY3kasH19TFykTz2xWmMeq6bk2NU3XXvfJ+Q61m0xktWwt+1HSYf3JZsTms3aRJg==
|
integrity sha512-Kvp459HrV2FEJ1CAsi1Ku+MY3kasH19TFykTz2xWmMeq6bk2NU3XXvfJ+Q61m0xktWwt+1HSYf3JZsTms3aRJg==
|
||||||
|
|
||||||
cookie@0.5.0, cookie@^0.5.0:
|
cookie@0.7.1:
|
||||||
|
version "0.7.1"
|
||||||
|
resolved "https://registry.yarnpkg.com/cookie/-/cookie-0.7.1.tgz#2f73c42142d5d5cf71310a74fc4ae61670e5dbc9"
|
||||||
|
integrity sha512-6DnInpx7SJ2AK3+CTUE/ZM0vWTUboZCegxhC2xiIydHR9jNuTAASBrfEpHhiGOZw/nX51bHt6YQl8jsGo4y/0w==
|
||||||
|
|
||||||
|
cookie@^0.5.0:
|
||||||
version "0.5.0"
|
version "0.5.0"
|
||||||
resolved "https://registry.yarnpkg.com/cookie/-/cookie-0.5.0.tgz#d1f5d71adec6558c58f389987c366aa47e994f8b"
|
resolved "https://registry.yarnpkg.com/cookie/-/cookie-0.5.0.tgz#d1f5d71adec6558c58f389987c366aa47e994f8b"
|
||||||
integrity sha512-YZ3GUyn/o8gfKJlnlX7g7xq4gyO6OSuhGPKaaGssGB2qgDUS0gPgtTvoyZLTt9Ab6dC4hfc9dV5arkvc/OCmrw==
|
integrity sha512-YZ3GUyn/o8gfKJlnlX7g7xq4gyO6OSuhGPKaaGssGB2qgDUS0gPgtTvoyZLTt9Ab6dC4hfc9dV5arkvc/OCmrw==
|
||||||
|
@ -10396,12 +10418,7 @@ joi@^17.6.0:
|
||||||
"@sideway/formula" "^3.0.1"
|
"@sideway/formula" "^3.0.1"
|
||||||
"@sideway/pinpoint" "^2.0.0"
|
"@sideway/pinpoint" "^2.0.0"
|
||||||
|
|
||||||
jose@^4.11.1, jose@^4.11.4, jose@^4.15.1:
|
jose@^5.2.3, jose@^5.9.3, jose@^5.9.6:
|
||||||
version "4.15.5"
|
|
||||||
resolved "https://registry.yarnpkg.com/jose/-/jose-4.15.5.tgz#6475d0f467ecd3c630a1b5dadd2735a7288df706"
|
|
||||||
integrity sha512-jc7BFxgKPKi94uOvEmzlSWFFe2+vASyXaKUpdQKatWAESU2MWjDfFf0fdfc83CDKcA5QecabZeNLyfhe3yKNkg==
|
|
||||||
|
|
||||||
jose@^5.2.3:
|
|
||||||
version "5.9.6"
|
version "5.9.6"
|
||||||
resolved "https://registry.yarnpkg.com/jose/-/jose-5.9.6.tgz#77f1f901d88ebdc405e57cce08d2a91f47521883"
|
resolved "https://registry.yarnpkg.com/jose/-/jose-5.9.6.tgz#77f1f901d88ebdc405e57cce08d2a91f47521883"
|
||||||
integrity sha512-AMlnetc9+CV9asI19zHmrgS/WYsWUwCn2R7RzlbJWD7F9eWYUTGyBmU9o6PxngtLGOiDGPRu+Uc4fhKzbpteZQ==
|
integrity sha512-AMlnetc9+CV9asI19zHmrgS/WYsWUwCn2R7RzlbJWD7F9eWYUTGyBmU9o6PxngtLGOiDGPRu+Uc4fhKzbpteZQ==
|
||||||
|
@ -11364,20 +11381,12 @@ neverthrow@^7.0.1:
|
||||||
resolved "https://registry.yarnpkg.com/neverthrow/-/neverthrow-7.2.0.tgz#76fa0a6cf1f6d59f0770df461c92b8b270910694"
|
resolved "https://registry.yarnpkg.com/neverthrow/-/neverthrow-7.2.0.tgz#76fa0a6cf1f6d59f0770df461c92b8b270910694"
|
||||||
integrity sha512-iGBUfFB7yPczHHtA8dksKTJ9E8TESNTAx1UQWW6TzMF280vo9jdPYpLUXrMN1BCkPdHFdNG3fxOt2CUad8KhAw==
|
integrity sha512-iGBUfFB7yPczHHtA8dksKTJ9E8TESNTAx1UQWW6TzMF280vo9jdPYpLUXrMN1BCkPdHFdNG3fxOt2CUad8KhAw==
|
||||||
|
|
||||||
next-auth@^4.24.5:
|
next-auth@^5.0.0-beta.25:
|
||||||
version "4.24.5"
|
version "5.0.0-beta.25"
|
||||||
resolved "https://registry.yarnpkg.com/next-auth/-/next-auth-4.24.5.tgz#1fd1bfc0603c61fd2ba6fd81b976af690edbf07e"
|
resolved "https://registry.yarnpkg.com/next-auth/-/next-auth-5.0.0-beta.25.tgz#3a9f9734e1d8fa5ced545360f1afc24862cb92d5"
|
||||||
integrity sha512-3RafV3XbfIKk6rF6GlLE4/KxjTcuMCifqrmD+98ejFq73SRoj2rmzoca8u764977lH/Q7jo6Xu6yM+Re1Mz/Og==
|
integrity sha512-2dJJw1sHQl2qxCrRk+KTQbeH+izFbGFPuJj5eGgBZFYyiYYtvlrBeUw1E/OJJxTRjuxbSYGnCTkUIRsIIW0bog==
|
||||||
dependencies:
|
dependencies:
|
||||||
"@babel/runtime" "^7.20.13"
|
"@auth/core" "0.37.2"
|
||||||
"@panva/hkdf" "^1.0.2"
|
|
||||||
cookie "^0.5.0"
|
|
||||||
jose "^4.11.4"
|
|
||||||
oauth "^0.9.15"
|
|
||||||
openid-client "^5.4.0"
|
|
||||||
preact "^10.6.3"
|
|
||||||
preact-render-to-string "^5.1.19"
|
|
||||||
uuid "^8.3.2"
|
|
||||||
|
|
||||||
next-i18next@^13.0.3:
|
next-i18next@^13.0.3:
|
||||||
version "13.1.6"
|
version "13.1.6"
|
||||||
|
@ -11543,26 +11552,16 @@ nth-check@^2.0.1:
|
||||||
dependencies:
|
dependencies:
|
||||||
boolbase "^1.0.0"
|
boolbase "^1.0.0"
|
||||||
|
|
||||||
oauth4webapi@^2.0.6:
|
oauth4webapi@^3.0.0, oauth4webapi@^3.1.1:
|
||||||
version "2.3.0"
|
version "3.1.4"
|
||||||
resolved "https://registry.npmjs.org/oauth4webapi/-/oauth4webapi-2.3.0.tgz"
|
resolved "https://registry.yarnpkg.com/oauth4webapi/-/oauth4webapi-3.1.4.tgz#50695385cea8e7a43f3e2e23bc33ea27faece4a7"
|
||||||
integrity sha512-JGkb5doGrwzVDuHwgrR4nHJayzN4h59VCed6EW8Tql6iHDfZIabCJvg6wtbn5q6pyB2hZruI3b77Nudvq7NmvA==
|
integrity sha512-eVfN3nZNbok2s/ROifO0UAc5G8nRoLSbrcKJ09OqmucgnhXEfdIQOR4gq1eJH1rN3gV7rNw62bDEgftsgFtBEg==
|
||||||
|
|
||||||
oauth@^0.9.15:
|
|
||||||
version "0.9.15"
|
|
||||||
resolved "https://registry.npmjs.org/oauth/-/oauth-0.9.15.tgz"
|
|
||||||
integrity sha512-a5ERWK1kh38ExDEfoO6qUHJb32rd7aYmPHuyCu3Fta/cnICvYmgd2uhuKXvPD+PXB+gCEYYEaQdIRAjCOwAKNA==
|
|
||||||
|
|
||||||
object-assign@^4, object-assign@^4.0.1, object-assign@^4.1.0, object-assign@^4.1.1:
|
object-assign@^4, object-assign@^4.0.1, object-assign@^4.1.0, object-assign@^4.1.1:
|
||||||
version "4.1.1"
|
version "4.1.1"
|
||||||
resolved "https://registry.npmjs.org/object-assign/-/object-assign-4.1.1.tgz"
|
resolved "https://registry.npmjs.org/object-assign/-/object-assign-4.1.1.tgz"
|
||||||
integrity sha512-rJgTQnkUnH1sFw8yT6VSU3zD3sWmu6sZhIseY8VX+GRu3P6F7Fu+JNDoXfklElbLJSnc3FUQHVe4cU5hj+BcUg==
|
integrity sha512-rJgTQnkUnH1sFw8yT6VSU3zD3sWmu6sZhIseY8VX+GRu3P6F7Fu+JNDoXfklElbLJSnc3FUQHVe4cU5hj+BcUg==
|
||||||
|
|
||||||
object-hash@^2.2.0:
|
|
||||||
version "2.2.0"
|
|
||||||
resolved "https://registry.npmjs.org/object-hash/-/object-hash-2.2.0.tgz"
|
|
||||||
integrity sha512-gScRMn0bS5fH+IuwyIFgnh9zBdo4DV+6GhygmWM9HyNJSgS0hScp1f5vjtm7oIIOiT9trXrShAkLFSc2IqKNgw==
|
|
||||||
|
|
||||||
object-hash@^3.0.0:
|
object-hash@^3.0.0:
|
||||||
version "3.0.0"
|
version "3.0.0"
|
||||||
resolved "https://registry.npmjs.org/object-hash/-/object-hash-3.0.0.tgz"
|
resolved "https://registry.npmjs.org/object-hash/-/object-hash-3.0.0.tgz"
|
||||||
|
@ -11656,11 +11655,6 @@ obuf@~1.1.2:
|
||||||
resolved "https://registry.yarnpkg.com/obuf/-/obuf-1.1.2.tgz#09bea3343d41859ebd446292d11c9d4db619084e"
|
resolved "https://registry.yarnpkg.com/obuf/-/obuf-1.1.2.tgz#09bea3343d41859ebd446292d11c9d4db619084e"
|
||||||
integrity sha512-PX1wu0AmAdPqOL1mWhqmlOd8kOIZQwGZw6rh7uby9fTc5lhaOWFLX3I6R1hrF9k3zUY40e6igsLGkDXK92LJNg==
|
integrity sha512-PX1wu0AmAdPqOL1mWhqmlOd8kOIZQwGZw6rh7uby9fTc5lhaOWFLX3I6R1hrF9k3zUY40e6igsLGkDXK92LJNg==
|
||||||
|
|
||||||
oidc-token-hash@^5.0.3:
|
|
||||||
version "5.0.3"
|
|
||||||
resolved "https://registry.npmjs.org/oidc-token-hash/-/oidc-token-hash-5.0.3.tgz"
|
|
||||||
integrity sha512-IF4PcGgzAr6XXSff26Sk/+P4KZFJVuHAJZj3wgO3vX2bMdNVp/QXTP3P7CEm9V1IdG8lDLY3HhiqpsE/nOwpPw==
|
|
||||||
|
|
||||||
once@^1.3.0, once@^1.3.1, once@^1.3.2, once@^1.4.0:
|
once@^1.3.0, once@^1.3.1, once@^1.3.2, once@^1.4.0:
|
||||||
version "1.4.0"
|
version "1.4.0"
|
||||||
resolved "https://registry.npmjs.org/once/-/once-1.4.0.tgz"
|
resolved "https://registry.npmjs.org/once/-/once-1.4.0.tgz"
|
||||||
|
@ -11680,16 +11674,6 @@ opener@^1.5.2:
|
||||||
resolved "https://registry.npmjs.org/opener/-/opener-1.5.2.tgz"
|
resolved "https://registry.npmjs.org/opener/-/opener-1.5.2.tgz"
|
||||||
integrity sha512-ur5UIdyw5Y7yEj9wLzhqXiy6GZ3Mwx0yGI+5sMn2r0N0v3cKJvUmFH5yPP+WXh9e0xfyzyJX95D8l088DNFj7A==
|
integrity sha512-ur5UIdyw5Y7yEj9wLzhqXiy6GZ3Mwx0yGI+5sMn2r0N0v3cKJvUmFH5yPP+WXh9e0xfyzyJX95D8l088DNFj7A==
|
||||||
|
|
||||||
openid-client@^5.4.0:
|
|
||||||
version "5.6.0"
|
|
||||||
resolved "https://registry.npmjs.org/openid-client/-/openid-client-5.6.0.tgz"
|
|
||||||
integrity sha512-uFTkN/iqgKvSnmpVAS/T6SNThukRMBcmymTQ71Ngus1F60tdtKVap7zCrleocY+fogPtpmoxi5Q1YdrgYuTlkA==
|
|
||||||
dependencies:
|
|
||||||
jose "^4.15.1"
|
|
||||||
lru-cache "^6.0.0"
|
|
||||||
object-hash "^2.2.0"
|
|
||||||
oidc-token-hash "^5.0.3"
|
|
||||||
|
|
||||||
optionator@^0.9.3:
|
optionator@^0.9.3:
|
||||||
version "0.9.3"
|
version "0.9.3"
|
||||||
resolved "https://registry.npmjs.org/optionator/-/optionator-0.9.3.tgz"
|
resolved "https://registry.npmjs.org/optionator/-/optionator-0.9.3.tgz"
|
||||||
|
@ -12162,28 +12146,26 @@ preact-render-to-string@5.2.3:
|
||||||
dependencies:
|
dependencies:
|
||||||
pretty-format "^3.8.0"
|
pretty-format "^3.8.0"
|
||||||
|
|
||||||
preact-render-to-string@^5.1.19:
|
preact-render-to-string@6.5.11:
|
||||||
version "5.2.6"
|
version "6.5.11"
|
||||||
resolved "https://registry.npmjs.org/preact-render-to-string/-/preact-render-to-string-5.2.6.tgz"
|
resolved "https://registry.yarnpkg.com/preact-render-to-string/-/preact-render-to-string-6.5.11.tgz#467e69908a453497bb93d4d1fc35fb749a78e027"
|
||||||
integrity sha512-JyhErpYOvBV1hEPwIxc/fHWXPfnEGdRKxc8gFdAZ7XV4tlzyzG847XAyEZqoDnynP88akM4eaHcSOzNcLWFguw==
|
integrity sha512-ubnauqoGczeGISiOh6RjX0/cdaF8v/oDXIjO85XALCQjwQP+SB4RDXXtvZ6yTYSjG+PC1QRP2AhPgCEsM2EvUw==
|
||||||
dependencies:
|
|
||||||
pretty-format "^3.8.0"
|
|
||||||
|
|
||||||
preact@10.11.3:
|
preact@10.11.3:
|
||||||
version "10.11.3"
|
version "10.11.3"
|
||||||
resolved "https://registry.npmjs.org/preact/-/preact-10.11.3.tgz"
|
resolved "https://registry.npmjs.org/preact/-/preact-10.11.3.tgz"
|
||||||
integrity sha512-eY93IVpod/zG3uMF22Unl8h9KkrcKIRs2EGar8hwLZZDU1lkjph303V9HZBwufh2s736U6VXuhD109LYqPoffg==
|
integrity sha512-eY93IVpod/zG3uMF22Unl8h9KkrcKIRs2EGar8hwLZZDU1lkjph303V9HZBwufh2s736U6VXuhD109LYqPoffg==
|
||||||
|
|
||||||
|
preact@10.24.3:
|
||||||
|
version "10.24.3"
|
||||||
|
resolved "https://registry.yarnpkg.com/preact/-/preact-10.24.3.tgz#086386bd47071e3b45410ef20844c21e23828f64"
|
||||||
|
integrity sha512-Z2dPnBnMUfyQfSQ+GBdsGa16hz35YmLmtTLhM169uW944hYL6xzTYkJjC07j+Wosz733pMWx0fgON3JNw1jJQA==
|
||||||
|
|
||||||
preact@^10.19.3:
|
preact@^10.19.3:
|
||||||
version "10.19.3"
|
version "10.19.3"
|
||||||
resolved "https://registry.yarnpkg.com/preact/-/preact-10.19.3.tgz#7a7107ed2598a60676c943709ea3efb8aaafa899"
|
resolved "https://registry.yarnpkg.com/preact/-/preact-10.19.3.tgz#7a7107ed2598a60676c943709ea3efb8aaafa899"
|
||||||
integrity sha512-nHHTeFVBTHRGxJXKkKu5hT8C/YWBkPso4/Gad6xuj5dbptt9iF9NZr9pHbPhBrnT2klheu7mHTxTZ/LjwJiEiQ==
|
integrity sha512-nHHTeFVBTHRGxJXKkKu5hT8C/YWBkPso4/Gad6xuj5dbptt9iF9NZr9pHbPhBrnT2klheu7mHTxTZ/LjwJiEiQ==
|
||||||
|
|
||||||
preact@^10.6.3:
|
|
||||||
version "10.18.1"
|
|
||||||
resolved "https://registry.npmjs.org/preact/-/preact-10.18.1.tgz"
|
|
||||||
integrity sha512-mKUD7RRkQQM6s7Rkmi7IFkoEHjuFqRQUaXamO61E6Nn7vqF/bo7EZCmSyrUnp2UWHw0O7XjZ2eeXis+m7tf4lg==
|
|
||||||
|
|
||||||
prelude-ls@^1.2.1:
|
prelude-ls@^1.2.1:
|
||||||
version "1.2.1"
|
version "1.2.1"
|
||||||
resolved "https://registry.npmjs.org/prelude-ls/-/prelude-ls-1.2.1.tgz"
|
resolved "https://registry.npmjs.org/prelude-ls/-/prelude-ls-1.2.1.tgz"
|
||||||
|
|
Loading…
Add table
Reference in a new issue