2
0
Files
bot/apps/builder/src/pages/api/auth/[...nextauth].ts

227 lines
7.0 KiB
TypeScript
Raw Normal View History

import NextAuth, { Account } from 'next-auth'
2021-11-29 15:19:07 +01:00
import EmailProvider from 'next-auth/providers/email'
import GitHubProvider from 'next-auth/providers/github'
2022-04-26 09:50:02 +02:00
import GitlabProvider from 'next-auth/providers/gitlab'
2021-11-29 15:19:07 +01:00
import GoogleProvider from 'next-auth/providers/google'
import FacebookProvider from 'next-auth/providers/facebook'
import AzureADProvider from 'next-auth/providers/azure-ad'
import prisma from '@/lib/prisma'
2021-12-06 15:48:50 +01:00
import { Provider } from 'next-auth/providers'
2021-12-27 15:59:32 +01:00
import { NextApiRequest, NextApiResponse } from 'next'
2022-02-24 11:13:19 +01:00
import { CustomAdapter } from './adapter'
import { User } from '@typebot.io/prisma'
import { env, getAtPath, isDefined, isNotEmpty } from '@typebot.io/lib'
import { sendVerificationRequest } from './sendVerificationRequest'
import { mockedUser } from '@/features/auth/mockedUser'
import { getNewUserInvitations } from '@/features/auth/helpers/getNewUserInvitations'
2021-11-29 15:19:07 +01:00
const providers: Provider[] = []
2022-08-08 08:21:36 +02:00
if (
isNotEmpty(process.env.GITHUB_CLIENT_ID) &&
isNotEmpty(process.env.GITHUB_CLIENT_SECRET)
)
2022-04-12 14:58:55 -05:00
providers.push(
GitHubProvider({
clientId: process.env.GITHUB_CLIENT_ID,
2022-04-12 14:58:55 -05:00
clientSecret: process.env.GITHUB_CLIENT_SECRET,
})
)
2021-12-06 15:48:50 +01:00
if (isNotEmpty(env('SMTP_FROM')) && process.env.SMTP_AUTH_DISABLED !== 'true')
2021-12-06 15:48:50 +01:00
providers.push(
EmailProvider({
server: {
host: process.env.SMTP_HOST,
port: process.env.SMTP_PORT ? Number(process.env.SMTP_PORT) : 25,
secure: process.env.SMTP_SECURE
? process.env.SMTP_SECURE === 'true'
: false,
auth: {
user: process.env.SMTP_USERNAME,
pass: process.env.SMTP_PASSWORD,
},
},
from: env('SMTP_FROM'),
sendVerificationRequest,
2021-12-06 15:48:50 +01:00
})
)
if (
isNotEmpty(process.env.GOOGLE_CLIENT_ID) &&
isNotEmpty(process.env.GOOGLE_CLIENT_SECRET)
)
2021-12-06 15:48:50 +01:00
providers.push(
2021-11-29 15:19:07 +01:00
GoogleProvider({
clientId: process.env.GOOGLE_CLIENT_ID,
2021-12-06 15:48:50 +01:00
clientSecret: process.env.GOOGLE_CLIENT_SECRET,
})
)
if (
isNotEmpty(process.env.FACEBOOK_CLIENT_ID) &&
isNotEmpty(process.env.FACEBOOK_CLIENT_SECRET)
)
2021-12-06 15:48:50 +01:00
providers.push(
2021-11-29 15:19:07 +01:00
FacebookProvider({
clientId: process.env.FACEBOOK_CLIENT_ID,
2021-12-06 15:48:50 +01:00
clientSecret: process.env.FACEBOOK_CLIENT_SECRET,
})
)
2022-04-26 09:50:02 +02:00
if (
isNotEmpty(process.env.GITLAB_CLIENT_ID) &&
isNotEmpty(process.env.GITLAB_CLIENT_SECRET)
2022-04-26 09:50:02 +02:00
) {
2022-04-30 07:10:02 -07:00
const BASE_URL = process.env.GITLAB_BASE_URL || 'https://gitlab.com'
providers.push(
GitlabProvider({
clientId: process.env.GITLAB_CLIENT_ID,
2022-04-30 07:10:02 -07:00
clientSecret: process.env.GITLAB_CLIENT_SECRET,
authorization: `${BASE_URL}/oauth/authorize?scope=read_api`,
token: `${BASE_URL}/oauth/token`,
userinfo: `${BASE_URL}/api/v4/user`,
name: process.env.GITLAB_NAME || 'GitLab',
2022-04-30 07:10:02 -07:00
})
)
2022-04-26 09:50:02 +02:00
}
2022-06-06 15:34:47 +02:00
if (
isNotEmpty(process.env.AZURE_AD_CLIENT_ID) &&
isNotEmpty(process.env.AZURE_AD_CLIENT_SECRET) &&
isNotEmpty(process.env.AZURE_AD_TENANT_ID)
) {
providers.push(
AzureADProvider({
clientId: process.env.AZURE_AD_CLIENT_ID,
clientSecret: process.env.AZURE_AD_CLIENT_SECRET,
tenantId: process.env.AZURE_AD_TENANT_ID,
})
2022-06-06 15:34:47 +02:00
)
}
if (isNotEmpty(process.env.CUSTOM_OAUTH_WELL_KNOWN_URL)) {
providers.push({
id: 'custom-oauth',
name: process.env.CUSTOM_OAUTH_NAME ?? 'Custom OAuth',
type: 'oauth',
clientId: process.env.CUSTOM_OAUTH_CLIENT_ID,
clientSecret: process.env.CUSTOM_OAUTH_CLIENT_SECRET,
wellKnown: process.env.CUSTOM_OAUTH_WELL_KNOWN_URL,
profile(profile) {
return {
id: getAtPath(profile, process.env.CUSTOM_OAUTH_USER_ID_PATH ?? 'id'),
name: getAtPath(
profile,
process.env.CUSTOM_OAUTH_USER_NAME_PATH ?? 'name'
),
email: getAtPath(
profile,
process.env.CUSTOM_OAUTH_USER_EMAIL_PATH ?? 'email'
),
image: getAtPath(
profile,
process.env.CUSTOM_OAUTH_USER_IMAGE_PATH ?? 'image'
),
} as User
},
})
}
2022-01-28 17:57:14 +01:00
const handler = (req: NextApiRequest, res: NextApiResponse) => {
2023-04-03 09:00:39 +02:00
if (req.url === '/api/auth/session' && env('E2E_TEST') === 'true')
return res.send({ user: mockedUser })
if (req.method === 'HEAD') return res.status(200)
return NextAuth(req, res, {
2022-02-24 11:13:19 +01:00
adapter: CustomAdapter(prisma),
2022-02-11 15:30:02 +01:00
secret: process.env.ENCRYPTION_SECRET,
2022-01-28 17:57:14 +01:00
providers,
session: {
strategy: 'database',
2021-12-06 15:48:50 +01:00
},
pages: {
signIn: '/signin',
},
2022-01-28 17:57:14 +01:00
callbacks: {
session: async ({ session, user }) => {
const userFromDb = user as User
await updateLastActivityDate(userFromDb)
return {
...session,
2022-02-24 15:36:03 +01:00
user: userFromDb,
}
},
signIn: async ({ account, user }) => {
if (!account) return false
const isNewUser = !('createdAt' in user && isDefined(user.createdAt))
if (process.env.DISABLE_SIGNUP === 'true' && isNewUser && user.email) {
const { invitations, workspaceInvitations } =
await getNewUserInvitations(prisma, user.email)
if (invitations.length === 0 && workspaceInvitations.length === 0)
return false
}
const requiredGroups = getRequiredGroups(account.provider)
if (requiredGroups.length > 0) {
const userGroups = await getUserGroups(account)
return checkHasGroups(userGroups, requiredGroups)
}
return true
},
2021-12-06 15:48:50 +01:00
},
2022-01-28 17:57:14 +01:00
})
2021-12-27 15:59:32 +01:00
}
2022-01-28 17:57:14 +01:00
const updateLastActivityDate = async (user: User) => {
const datesAreOnSameDay = (first: Date, second: Date) =>
first.getFullYear() === second.getFullYear() &&
first.getMonth() === second.getMonth() &&
first.getDate() === second.getDate()
if (!datesAreOnSameDay(user.lastActivityAt, new Date()))
await prisma.user.update({
where: { id: user.id },
data: { lastActivityAt: new Date() },
})
}
2022-04-30 07:10:02 -07:00
const getUserGroups = async (account: Account): Promise<string[]> => {
switch (account.provider) {
case 'gitlab': {
2022-05-16 08:02:02 -07:00
const getGitlabGroups = async (
accessToken: string,
page = 1
): Promise<{ full_path: string }[]> => {
2022-05-16 15:49:24 +02:00
const res = await fetch(
2022-05-16 08:02:02 -07:00
`${
process.env.GITLAB_BASE_URL || 'https://gitlab.com'
}/api/v4/groups?per_page=100&page=${page}`,
2022-05-16 15:49:24 +02:00
{ headers: { Authorization: `Bearer ${accessToken}` } }
)
2022-05-16 08:02:02 -07:00
const groups: { full_path: string }[] = await res.json()
2022-05-16 15:49:24 +02:00
const nextPage = parseInt(res.headers.get('X-Next-Page') || '')
2022-05-16 08:02:02 -07:00
if (nextPage)
groups.push(...(await getGitlabGroups(accessToken, nextPage)))
2022-05-16 15:49:24 +02:00
return groups
}
2022-05-16 08:02:02 -07:00
const groups = await getGitlabGroups(account.access_token as string)
return groups.map((group) => group.full_path)
}
2022-04-30 07:10:02 -07:00
default:
return []
}
}
2022-04-30 07:10:02 -07:00
const getRequiredGroups = (provider: string): string[] => {
switch (provider) {
2022-04-30 07:10:02 -07:00
case 'gitlab':
return process.env.GITLAB_REQUIRED_GROUPS?.split(',') || []
default:
return []
}
}
2022-04-30 07:10:02 -07:00
const checkHasGroups = (userGroups: string[], requiredGroups: string[]) =>
userGroups?.some((userGroup) => requiredGroups?.includes(userGroup))
export default handler