NeahFront7/app/api/auth/[...nextauth]/route.ts
2025-04-13 21:13:00 +02:00

196 lines
6.1 KiB
TypeScript

import NextAuth, { NextAuthOptions } from "next-auth";
import KeycloakProvider from "next-auth/providers/keycloak";
declare module "next-auth" {
interface Session {
user: {
id: string;
name?: string | null;
email?: string | null;
image?: string | null;
username: string;
first_name: string;
last_name: string;
role: string[];
};
accessToken: string;
rocketChatToken: string | null;
rocketChatUserId: string | null;
}
interface JWT {
accessToken: string;
refreshToken: string;
accessTokenExpires: number;
role: string[];
username: string;
first_name: string;
last_name: string;
rocketChatToken: string | null;
rocketChatUserId: string | null;
}
}
function getRequiredEnvVar(name: string): string {
const value = process.env[name];
if (!value) {
throw new Error(`Missing required environment variable: ${name}`);
}
return value;
}
export const authOptions: NextAuthOptions = {
providers: [
KeycloakProvider({
clientId: getRequiredEnvVar("KEYCLOAK_CLIENT_ID"),
clientSecret: getRequiredEnvVar("KEYCLOAK_CLIENT_SECRET"),
issuer: getRequiredEnvVar("KEYCLOAK_ISSUER"),
profile(profile) {
console.log("Keycloak profile received for user:", profile.preferred_username);
return {
id: profile.sub,
name: profile.name ?? profile.preferred_username,
email: profile.email,
first_name: profile.given_name ?? '',
last_name: profile.family_name ?? '',
username: profile.preferred_username ?? profile.email?.split('@')[0] ?? '',
role: profile.groups ?? [],
}
},
}),
],
session: {
strategy: "jwt",
maxAge: 30 * 24 * 60 * 60, // 30 days
},
callbacks: {
async jwt({ token, account, profile }) {
// Log only non-sensitive information
console.log("JWT callback - processing token for user:", token.sub);
if (account && profile) {
token.accessToken = account.access_token;
token.refreshToken = account.refresh_token;
token.accessTokenExpires = account.expires_at! * 1000;
token.role = (profile as any).groups ?? [];
token.username = (profile as any).preferred_username ?? profile.email?.split('@')[0] ?? '';
token.first_name = (profile as any).given_name ?? '';
token.last_name = (profile as any).family_name ?? '';
}
// Return previous token if not expired
if (Date.now() < (token.accessTokenExpires as number)) {
return token;
}
try {
// Token has expired, try to refresh it
const clientId = getRequiredEnvVar("KEYCLOAK_CLIENT_ID");
const clientSecret = getRequiredEnvVar("KEYCLOAK_CLIENT_SECRET");
console.log("Attempting to refresh token for user:", token.sub);
const response = await fetch(
`${process.env.KEYCLOAK_BASE_URL}/realms/${process.env.KEYCLOAK_REALM}/protocol/openid-connect/token`,
{
method: "POST",
headers: {
"Content-Type": "application/x-www-form-urlencoded",
},
body: new URLSearchParams({
grant_type: "refresh_token",
client_id: clientId,
client_secret: clientSecret,
refresh_token: token.refreshToken as string,
}),
}
);
const tokens = await response.json();
if (!response.ok) {
console.error("Token refresh failed for user:", token.sub);
throw new Error("RefreshAccessTokenError");
}
return {
...token,
accessToken: tokens.access_token,
refreshToken: tokens.refresh_token ?? token.refreshToken,
accessTokenExpires: Date.now() + tokens.expires_in * 1000,
rocketChatToken: token.rocketChatToken || null,
rocketChatUserId: token.rocketChatUserId || null,
};
} catch (error) {
console.error("Error refreshing token for user:", token.sub);
// Return token with error flag - this will trigger a redirect to sign-in
return {
...token,
error: "RefreshAccessTokenError",
rocketChatToken: null,
rocketChatUserId: null,
};
}
},
async session({ session, token }) {
console.log("Session callback - processing session for user:", token.sub);
if (token.error) {
console.error("Token error detected for user:", token.sub);
// Force sign out if there was a refresh error
throw new Error("RefreshAccessTokenError");
}
session.accessToken = token.accessToken;
session.user = {
...session.user,
id: token.sub as string,
first_name: token.first_name ?? '',
last_name: token.last_name ?? '',
username: token.username ?? '',
role: token.role ?? [],
};
// Add Rocket.Chat credentials to session
session.rocketChatToken = token.rocketChatToken || null;
session.rocketChatUserId = token.rocketChatUserId || null;
return session;
}
},
events: {
async signOut({ token }) {
console.log("Sign out event - processing logout for user:", token.sub);
if (token.refreshToken) {
try {
await fetch(
`${process.env.KEYCLOAK_BASE_URL}/realms/${process.env.KEYCLOAK_REALM}/protocol/openid-connect/logout`,
{
method: "POST",
headers: {
"Content-Type": "application/x-www-form-urlencoded",
},
body: new URLSearchParams({
client_id: getRequiredEnvVar("KEYCLOAK_CLIENT_ID"),
client_secret: getRequiredEnvVar("KEYCLOAK_CLIENT_SECRET"),
refresh_token: token.refreshToken as string,
}),
}
);
} catch (error) {
console.error("Error during logout for user:", token.sub);
}
}
},
},
pages: {
signIn: '/signin',
error: '/signin',
},
debug: process.env.NODE_ENV === 'development',
};
const handler = NextAuth(authOptions);
export { handler as GET, handler as POST };