session correction logout 3 rest 3
This commit is contained in:
parent
4cb1e1119e
commit
7e15100b57
@ -1,12 +1,42 @@
|
|||||||
import NextAuth, { NextAuthOptions } from "next-auth";
|
import NextAuth, { NextAuthOptions } from "next-auth";
|
||||||
import KeycloakProvider from "next-auth/providers/keycloak";
|
import KeycloakProvider from "next-auth/providers/keycloak";
|
||||||
import { prisma } from '@/lib/prisma';
|
|
||||||
import { ExtendedJWT, ExtendedSession, ServiceToken, invalidateServiceTokens } from '@/lib/session';
|
interface KeycloakProfile {
|
||||||
import { Session } from "next-auth";
|
sub: string;
|
||||||
|
email?: string;
|
||||||
|
name?: string;
|
||||||
|
roles?: string[];
|
||||||
|
preferred_username?: string;
|
||||||
|
given_name?: string;
|
||||||
|
family_name?: string;
|
||||||
|
}
|
||||||
|
|
||||||
declare module "next-auth" {
|
declare module "next-auth" {
|
||||||
interface Session extends ExtendedSession {}
|
interface Session {
|
||||||
interface JWT extends ExtendedJWT {}
|
user: {
|
||||||
|
id: string;
|
||||||
|
name?: string | null;
|
||||||
|
email?: string | null;
|
||||||
|
image?: string | null;
|
||||||
|
username: string;
|
||||||
|
first_name: string;
|
||||||
|
last_name: string;
|
||||||
|
role: string[];
|
||||||
|
};
|
||||||
|
accessToken: string;
|
||||||
|
}
|
||||||
|
|
||||||
|
interface JWT {
|
||||||
|
sub?: string;
|
||||||
|
accessToken: string;
|
||||||
|
refreshToken: string;
|
||||||
|
accessTokenExpires: number;
|
||||||
|
role: string[];
|
||||||
|
username: string;
|
||||||
|
first_name: string;
|
||||||
|
last_name: string;
|
||||||
|
error?: string;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
function getRequiredEnvVar(name: string): string {
|
function getRequiredEnvVar(name: string): string {
|
||||||
@ -17,12 +47,46 @@ function getRequiredEnvVar(name: string): string {
|
|||||||
return value;
|
return value;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
async function refreshAccessToken(token: JWT) {
|
||||||
|
try {
|
||||||
|
const response = await fetch(`${process.env.KEYCLOAK_ISSUER}/protocol/openid-connect/token`, {
|
||||||
|
headers: { "Content-Type": "application/x-www-form-urlencoded" },
|
||||||
|
body: new URLSearchParams({
|
||||||
|
client_id: process.env.KEYCLOAK_CLIENT_ID!,
|
||||||
|
client_secret: process.env.KEYCLOAK_CLIENT_SECRET!,
|
||||||
|
grant_type: "refresh_token",
|
||||||
|
refresh_token: token.refreshToken,
|
||||||
|
}),
|
||||||
|
method: "POST",
|
||||||
|
});
|
||||||
|
|
||||||
|
const refreshedTokens = await response.json();
|
||||||
|
|
||||||
|
if (!response.ok) {
|
||||||
|
throw refreshedTokens;
|
||||||
|
}
|
||||||
|
|
||||||
|
return {
|
||||||
|
...token,
|
||||||
|
accessToken: refreshedTokens.access_token,
|
||||||
|
refreshToken: refreshedTokens.refresh_token ?? token.refreshToken,
|
||||||
|
accessTokenExpires: Date.now() + refreshedTokens.expires_in * 1000,
|
||||||
|
};
|
||||||
|
} catch (error) {
|
||||||
|
console.error("Error refreshing access token:", error);
|
||||||
|
return {
|
||||||
|
...token,
|
||||||
|
error: "RefreshAccessTokenError",
|
||||||
|
};
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
export const authOptions: NextAuthOptions = {
|
export const authOptions: NextAuthOptions = {
|
||||||
providers: [
|
providers: [
|
||||||
KeycloakProvider({
|
KeycloakProvider({
|
||||||
clientId: process.env.KEYCLOAK_CLIENT_ID!,
|
clientId: getRequiredEnvVar("KEYCLOAK_CLIENT_ID"),
|
||||||
clientSecret: process.env.KEYCLOAK_CLIENT_SECRET!,
|
clientSecret: getRequiredEnvVar("KEYCLOAK_CLIENT_SECRET"),
|
||||||
issuer: process.env.KEYCLOAK_ISSUER!,
|
issuer: getRequiredEnvVar("KEYCLOAK_ISSUER"),
|
||||||
profile(profile) {
|
profile(profile) {
|
||||||
return {
|
return {
|
||||||
id: profile.sub,
|
id: profile.sub,
|
||||||
@ -38,130 +102,46 @@ export const authOptions: NextAuthOptions = {
|
|||||||
],
|
],
|
||||||
session: {
|
session: {
|
||||||
strategy: "jwt",
|
strategy: "jwt",
|
||||||
maxAge: 24 * 60 * 60, // 1 day
|
maxAge: 30 * 24 * 60 * 60, // 30 days
|
||||||
},
|
|
||||||
cookies: {
|
|
||||||
sessionToken: {
|
|
||||||
name: process.env.NODE_ENV === 'production'
|
|
||||||
? `__Secure-next-auth.session-token`
|
|
||||||
: `next-auth.session-token`,
|
|
||||||
options: {
|
|
||||||
httpOnly: true,
|
|
||||||
sameSite: 'lax',
|
|
||||||
path: '/',
|
|
||||||
secure: process.env.NODE_ENV === 'production',
|
|
||||||
maxAge: 24 * 60 * 60 // 1 day
|
|
||||||
}
|
|
||||||
},
|
|
||||||
callbackUrl: {
|
|
||||||
name: process.env.NODE_ENV === 'production'
|
|
||||||
? `__Secure-next-auth.callback-url`
|
|
||||||
: `next-auth.callback-url`,
|
|
||||||
options: {
|
|
||||||
httpOnly: true,
|
|
||||||
sameSite: 'lax',
|
|
||||||
path: '/',
|
|
||||||
secure: process.env.NODE_ENV === 'production',
|
|
||||||
maxAge: 24 * 60 * 60 // 1 day
|
|
||||||
}
|
|
||||||
},
|
|
||||||
csrfToken: {
|
|
||||||
name: process.env.NODE_ENV === 'production'
|
|
||||||
? `__Host-next-auth.csrf-token`
|
|
||||||
: `next-auth.csrf-token`,
|
|
||||||
options: {
|
|
||||||
httpOnly: true,
|
|
||||||
sameSite: 'lax',
|
|
||||||
path: '/',
|
|
||||||
secure: process.env.NODE_ENV === 'production',
|
|
||||||
maxAge: 24 * 60 * 60 // 1 day
|
|
||||||
}
|
|
||||||
}
|
|
||||||
},
|
},
|
||||||
callbacks: {
|
callbacks: {
|
||||||
async signIn({ user, account, profile }) {
|
async jwt({ token, account, profile }) {
|
||||||
if (!user.email) {
|
if (account && profile) {
|
||||||
console.error('No email provided in user profile');
|
const keycloakProfile = profile as KeycloakProfile;
|
||||||
return false;
|
token.accessToken = account.access_token ?? '';
|
||||||
|
token.refreshToken = account.refresh_token ?? '';
|
||||||
|
token.accessTokenExpires = account.expires_at ?? 0;
|
||||||
|
token.sub = keycloakProfile.sub;
|
||||||
|
token.role = keycloakProfile.roles ?? [];
|
||||||
|
token.username = keycloakProfile.preferred_username ?? '';
|
||||||
|
token.first_name = keycloakProfile.given_name ?? '';
|
||||||
|
token.last_name = keycloakProfile.family_name ?? '';
|
||||||
}
|
}
|
||||||
|
|
||||||
try {
|
if (Date.now() < (token.accessTokenExpires as number) * 1000) {
|
||||||
await prisma.user.upsert({
|
return token;
|
||||||
where: { id: user.id },
|
|
||||||
update: {
|
|
||||||
email: user.email,
|
|
||||||
password: '', // We don't store password for Keycloak users
|
|
||||||
},
|
|
||||||
create: {
|
|
||||||
id: user.id,
|
|
||||||
email: user.email,
|
|
||||||
password: '', // We don't store password for Keycloak users
|
|
||||||
},
|
|
||||||
});
|
|
||||||
|
|
||||||
return true;
|
|
||||||
} catch (error) {
|
|
||||||
console.error('Error in signIn callback:', error);
|
|
||||||
return false;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
return refreshAccessToken(token);
|
||||||
},
|
},
|
||||||
async session({ session, token }) {
|
async session({ session, token }) {
|
||||||
const extendedSession = session as ExtendedSession;
|
if (token.error) {
|
||||||
const extendedToken = token as ExtendedJWT;
|
throw new Error(token.error);
|
||||||
|
|
||||||
if (extendedSession?.user && extendedToken.sub) {
|
|
||||||
extendedSession.user.id = extendedToken.sub;
|
|
||||||
extendedSession.user.username = extendedToken.username ?? '';
|
|
||||||
extendedSession.user.first_name = extendedToken.first_name ?? '';
|
|
||||||
extendedSession.user.last_name = extendedToken.last_name ?? '';
|
|
||||||
extendedSession.user.role = extendedToken.role ?? [];
|
|
||||||
extendedSession.accessToken = extendedToken.accessToken ?? '';
|
|
||||||
extendedSession.refreshToken = extendedToken.refreshToken;
|
|
||||||
extendedSession.serviceTokens = extendedToken.serviceTokens ?? {};
|
|
||||||
}
|
}
|
||||||
|
|
||||||
return extendedSession;
|
session.user = {
|
||||||
},
|
id: token.sub ?? '',
|
||||||
async jwt({ token, user, account }) {
|
email: token.email ?? null,
|
||||||
const extendedToken = token as ExtendedJWT;
|
name: token.name ?? null,
|
||||||
|
image: null,
|
||||||
|
username: token.username ?? '',
|
||||||
|
first_name: token.first_name ?? '',
|
||||||
|
last_name: token.last_name ?? '',
|
||||||
|
role: token.role ?? [],
|
||||||
|
};
|
||||||
|
session.accessToken = token.accessToken;
|
||||||
|
|
||||||
if (user) {
|
return session;
|
||||||
extendedToken.role = user.role;
|
|
||||||
extendedToken.username = user.username;
|
|
||||||
extendedToken.first_name = user.first_name;
|
|
||||||
extendedToken.last_name = user.last_name;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (account) {
|
|
||||||
extendedToken.accessToken = account.access_token;
|
|
||||||
extendedToken.refreshToken = account.refresh_token;
|
|
||||||
extendedToken.accessTokenExpires = account.expires_at;
|
|
||||||
extendedToken.serviceTokens = {};
|
|
||||||
}
|
|
||||||
|
|
||||||
return extendedToken;
|
|
||||||
}
|
|
||||||
},
|
|
||||||
events: {
|
|
||||||
async signOut({ token }) {
|
|
||||||
const extendedToken = token as ExtendedJWT;
|
|
||||||
if (extendedToken.sub) {
|
|
||||||
await invalidateServiceTokens({
|
|
||||||
user: {
|
|
||||||
id: extendedToken.sub,
|
|
||||||
name: extendedToken.name ?? null,
|
|
||||||
email: extendedToken.email ?? null,
|
|
||||||
username: extendedToken.username ?? '',
|
|
||||||
first_name: extendedToken.first_name ?? '',
|
|
||||||
last_name: extendedToken.last_name ?? '',
|
|
||||||
role: extendedToken.role ?? [],
|
|
||||||
},
|
|
||||||
accessToken: extendedToken.accessToken ?? '',
|
|
||||||
refreshToken: extendedToken.refreshToken,
|
|
||||||
serviceTokens: extendedToken.serviceTokens ?? {},
|
|
||||||
expires: new Date(Date.now() + 24 * 60 * 60 * 1000).toISOString(),
|
|
||||||
} as ExtendedSession);
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
pages: {
|
pages: {
|
||||||
@ -174,3 +154,16 @@ export const authOptions: NextAuthOptions = {
|
|||||||
const handler = NextAuth(authOptions);
|
const handler = NextAuth(authOptions);
|
||||||
export { handler as GET, handler as POST };
|
export { handler as GET, handler as POST };
|
||||||
|
|
||||||
|
interface JWT {
|
||||||
|
accessToken: string;
|
||||||
|
refreshToken: string;
|
||||||
|
accessTokenExpires: number;
|
||||||
|
}
|
||||||
|
|
||||||
|
interface Profile {
|
||||||
|
sub?: string;
|
||||||
|
email?: string;
|
||||||
|
name?: string;
|
||||||
|
roles?: string[];
|
||||||
|
}
|
||||||
|
|
||||||
|
|||||||
@ -20,6 +20,19 @@ const nextConfig = {
|
|||||||
webpackBuildWorker: true,
|
webpackBuildWorker: true,
|
||||||
parallelServerBuildTraces: true,
|
parallelServerBuildTraces: true,
|
||||||
parallelServerCompiles: true,
|
parallelServerCompiles: true,
|
||||||
|
},
|
||||||
|
async headers() {
|
||||||
|
return [
|
||||||
|
{
|
||||||
|
source: '/:path*',
|
||||||
|
headers: [
|
||||||
|
{
|
||||||
|
key: 'Content-Security-Policy',
|
||||||
|
value: "frame-ancestors 'self' https://espace.slm-lab.net https://connect.slm-lab.net"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|||||||
Loading…
Reference in New Issue
Block a user