fix: auth

This commit is contained in:
David Nguyen
2025-02-09 00:46:25 +11:00
parent f5bfec1990
commit e128e9369e
13 changed files with 188 additions and 142 deletions

View File

@ -58,7 +58,7 @@ export const PasswordForm = ({ className }: PasswordFormProps) => {
const onFormSubmit = async ({ currentPassword, password }: TPasswordFormSchema) => { const onFormSubmit = async ({ currentPassword, password }: TPasswordFormSchema) => {
try { try {
await authClient.updatePassword({ await authClient.emailPassword.updatePassword({
currentPassword, currentPassword,
password, password,
}); });

View File

@ -1,6 +1,7 @@
import { useEffect, useMemo, useState } from 'react'; import { useEffect, useMemo, useState } from 'react';
import { zodResolver } from '@hookform/resolvers/zod'; import { zodResolver } from '@hookform/resolvers/zod';
import type { MessageDescriptor } from '@lingui/core';
import { msg } from '@lingui/core/macro'; import { msg } from '@lingui/core/macro';
import { useLingui } from '@lingui/react'; import { useLingui } from '@lingui/react';
import { Trans } from '@lingui/react/macro'; import { Trans } from '@lingui/react/macro';
@ -40,12 +41,20 @@ import { PasswordInput } from '@documenso/ui/primitives/password-input';
import { PinInput, PinInputGroup, PinInputSlot } from '@documenso/ui/primitives/pin-input'; import { PinInput, PinInputGroup, PinInputSlot } from '@documenso/ui/primitives/pin-input';
import { useToast } from '@documenso/ui/primitives/use-toast'; import { useToast } from '@documenso/ui/primitives/use-toast';
const CommonErrorMessages = { const CommonErrorMessages: Record<string, MessageDescriptor> = {
// [AuthenticationErrorCode.USER_MISSING_PASSWORD]:
// 'This account appears to be using a social login method, please sign in using that method',
[AuthenticationErrorCode.AccountDisabled]: msg`This account has been disabled. Please contact support.`, [AuthenticationErrorCode.AccountDisabled]: msg`This account has been disabled. Please contact support.`,
}; };
const handleFallbackErrorMessages = (code: string) => {
const message = CommonErrorMessages[code];
if (!message) {
return msg`An unknown error occurred`;
}
return message;
};
const LOGIN_REDIRECT_PATH = '/documents'; const LOGIN_REDIRECT_PATH = '/documents';
export const ZSignInFormSchema = z.object({ export const ZSignInFormSchema = z.object({
@ -163,12 +172,7 @@ export const SignInForm = ({
credential: JSON.stringify(credential), credential: JSON.stringify(credential),
csrfToken: sessionId, csrfToken: sessionId,
redirectUrl, redirectUrl,
// callbackUrl,
// redirect: false,
}); });
// Todo: Can't use navigate because of embed?
// window.location.href = callbackUrl;
} catch (err) { } catch (err) {
setIsPasskeyLoading(false); setIsPasskeyLoading(false);
@ -186,10 +190,10 @@ export const SignInForm = ({
msg`This passkey is not configured for this application. Please login and add one in the user settings.`, msg`This passkey is not configured for this application. Please login and add one in the user settings.`,
) )
.with( .with(
AuthenticationErrorCode.SessionExpired, // Todo AuthenticationErrorCode.SessionExpired,
() => msg`This session has expired. Please try again.`, () => msg`This session has expired. Please try again.`,
) )
.otherwise(() => msg`Please try again later or login using your normal details`); .otherwise(() => handleFallbackErrorMessages(error.code));
toast({ toast({
title: 'Something went wrong', title: 'Something went wrong',
@ -208,11 +212,7 @@ export const SignInForm = ({
totpCode, totpCode,
backupCode, backupCode,
redirectUrl, redirectUrl,
// callbackUrl,
// redirect: false,
}); });
// window.location.href = callbackUrl; // Todo: Handle redirect.
} catch (err) { } catch (err) {
console.log(err); console.log(err);
@ -245,7 +245,7 @@ export const SignInForm = ({
AuthenticationErrorCode.InvalidTwoFactorCode, AuthenticationErrorCode.InvalidTwoFactorCode,
() => msg`The two-factor authentication code provided is incorrect`, () => msg`The two-factor authentication code provided is incorrect`,
) )
.otherwise(() => msg`An unknown error occurred`); .otherwise(() => handleFallbackErrorMessages(error.code));
toast({ toast({
title: _(msg`Unable to sign in`), title: _(msg`Unable to sign in`),
@ -257,7 +257,7 @@ export const SignInForm = ({
const onSignInWithGoogleClick = async () => { const onSignInWithGoogleClick = async () => {
try { try {
await authClient.google.signIn(); // Todo: Handle redirect. await authClient.google.signIn();
} catch (err) { } catch (err) {
toast({ toast({
title: _(msg`An unknown error occurred`), title: _(msg`An unknown error occurred`),

View File

@ -124,7 +124,13 @@ export const SignUpForm = ({
const onFormSubmit = async ({ name, email, password, signature, url }: TSignUpFormSchema) => { const onFormSubmit = async ({ name, email, password, signature, url }: TSignUpFormSchema) => {
try { try {
await authClient.emailPassword.signUp({ name, email, password, signature, url }); await authClient.emailPassword.signUp({
name,
email,
password,
signature,
url,
});
await navigate(`/unverified-account`); await navigate(`/unverified-account`);

View File

@ -1,13 +1,13 @@
import { useState } from 'react'; import { useState } from 'react';
import { Trans } from '@lingui/react/macro'; import { Trans, useLingui } from '@lingui/react/macro';
import { RecipientRole } from '@prisma/client'; import { RecipientRole } from '@prisma/client';
import { useNavigate } from 'react-router';
import { authClient } from '@documenso/auth/client'; import { authClient } from '@documenso/auth/client';
import { Alert, AlertDescription } from '@documenso/ui/primitives/alert'; import { Alert, AlertDescription } from '@documenso/ui/primitives/alert';
import { Button } from '@documenso/ui/primitives/button'; import { Button } from '@documenso/ui/primitives/button';
import { DialogFooter } from '@documenso/ui/primitives/dialog'; import { DialogFooter } from '@documenso/ui/primitives/dialog';
import { useToast } from '@documenso/ui/primitives/use-toast';
import { useRequiredDocumentSigningAuthContext } from './document-signing-auth-provider'; import { useRequiredDocumentSigningAuthContext } from './document-signing-auth-provider';
@ -24,7 +24,9 @@ export const DocumentSigningAuthAccount = ({
}: DocumentSigningAuthAccountProps) => { }: DocumentSigningAuthAccountProps) => {
const { recipient } = useRequiredDocumentSigningAuthContext(); const { recipient } = useRequiredDocumentSigningAuthContext();
const navigate = useNavigate(); const { t } = useLingui();
const { toast } = useToast();
const [isSigningOut, setIsSigningOut] = useState(false); const [isSigningOut, setIsSigningOut] = useState(false);
@ -32,18 +34,18 @@ export const DocumentSigningAuthAccount = ({
try { try {
setIsSigningOut(true); setIsSigningOut(true);
// Todo await authClient.signOut({
await authClient.signOut(); redirectUrl: `/signin#email=${email}`,
// { });
// // redirect: false,
// // Todo: Redirect to signin like below
// }
await navigate(`/signin#email=${email}`);
} catch { } catch {
setIsSigningOut(false); setIsSigningOut(false);
// Todo: Alert. toast({
title: t`Something went wrong`,
description: t`We were unable to log you out at this time.`,
duration: 10000,
variant: 'destructive',
});
} }
}; };

View File

@ -3,7 +3,6 @@ import { useState } from 'react';
import { msg } from '@lingui/core/macro'; import { msg } from '@lingui/core/macro';
import { useLingui } from '@lingui/react'; import { useLingui } from '@lingui/react';
import { Trans } from '@lingui/react/macro'; import { Trans } from '@lingui/react/macro';
import { useNavigate } from 'react-router';
import { authClient } from '@documenso/auth/client'; import { authClient } from '@documenso/auth/client';
import { Button } from '@documenso/ui/primitives/button'; import { Button } from '@documenso/ui/primitives/button';
@ -21,18 +20,15 @@ export const DocumentSigningAuthPageView = ({
const { _ } = useLingui(); const { _ } = useLingui();
const { toast } = useToast(); const { toast } = useToast();
const navigate = useNavigate();
const [isSigningOut, setIsSigningOut] = useState(false); const [isSigningOut, setIsSigningOut] = useState(false);
const handleChangeAccount = async (email: string) => { const handleChangeAccount = async (email: string) => {
try { try {
setIsSigningOut(true); setIsSigningOut(true);
// Todo: Redirect false await authClient.signOut({
await authClient.signOut(); redirectUrl: emailHasAccount ? `/signin#email=${email}` : `/signup#email=${email}`,
});
await navigate(emailHasAccount ? `/signin#email=${email}` : `/signup#email=${email}`);
} catch { } catch {
toast({ toast({
title: _(msg`Something went wrong`), title: _(msg`Something went wrong`),

View File

@ -27,8 +27,6 @@ export const loader = ({ params }: Route.LoaderArgs) => {
}; };
export default function VerifyEmailPage({ loaderData }: Route.ComponentProps) { export default function VerifyEmailPage({ loaderData }: Route.ComponentProps) {
console.log('hello world');
const { token } = loaderData; const { token } = loaderData;
const { _ } = useLingui(); const { _ } = useLingui();
@ -42,7 +40,6 @@ export default function VerifyEmailPage({ loaderData }: Route.ComponentProps) {
setIsLoading(true); setIsLoading(true);
try { try {
// Todo: Types and check.
const response = await authClient.emailPassword.verifyEmail({ const response = await authClient.emailPassword.verifyEmail({
token, token,
}); });

View File

@ -40,8 +40,9 @@ export default defineConfig({
external: ['@node-rs/bcrypt', '@prisma/client'], external: ['@node-rs/bcrypt', '@prisma/client'],
}, },
optimizeDeps: { optimizeDeps: {
// include: ['react-icons'], entries: ['./app/**/*', '../../packages/ui/**/*', '../../packages/lib/**/*'],
exclude: ['@node-rs/bcrypt'], include: ['prop-types', 'file-selector', 'attr-accept'],
exclude: ['node_modules', '@node-rs/bcrypt', '@documenso/pdf-sign', 'sharp'],
}, },
resolve: { resolve: {
alias: { alias: {

View File

@ -1,109 +1,112 @@
import type { ClientResponse } from 'hono/client'; import type { ClientResponse, InferRequestType } from 'hono/client';
import { hc } from 'hono/client'; import { hc } from 'hono/client';
import { NEXT_PUBLIC_WEBAPP_URL } from '@documenso/lib/constants/app'; import { NEXT_PUBLIC_WEBAPP_URL } from '@documenso/lib/constants/app';
import { AppError } from '@documenso/lib/errors/app-error'; import { AppError } from '@documenso/lib/errors/app-error';
import type { AuthAppType } from '../server'; import type { AuthAppType } from '../server';
import { handleSignInRedirect } from '../server/lib/utils/redirect';
import type { import type {
TForgotPasswordSchema, TForgotPasswordSchema,
TResetPasswordSchema, TResetPasswordSchema,
TSignInSchema,
TSignUpSchema, TSignUpSchema,
TUpdatePasswordSchema,
TVerifyEmailSchema, TVerifyEmailSchema,
} from '../server/types/email-password'; } from '../server/types/email-password';
import type { TPasskeyAuthorizeSchema } from '../server/types/passkey';
type AuthClientType = ReturnType<typeof hc<AuthAppType>>;
type TEmailPasswordSignin = InferRequestType<
AuthClientType['email-password']['authorize']['$post']
>['json'] & { redirectPath?: string };
type TPasskeySignin = InferRequestType<AuthClientType['passkey']['authorize']['$post']>['json'] & {
redirectPath?: string;
};
export class AuthClient { export class AuthClient {
public client: ReturnType<typeof hc<AuthAppType>>; public client: AuthClientType;
private signOutRedirectUrl: string = '/signin'; private signOutredirectPath: string = '/signin';
constructor(options: { baseUrl: string }) { constructor(options: { baseUrl: string }) {
this.client = hc<AuthAppType>(options.baseUrl); this.client = hc<AuthAppType>(options.baseUrl);
} }
public async signOut() { public async signOut({ redirectPath }: { redirectPath?: string } = {}) {
await this.client.signout.$post(); await this.client.signout.$post();
window.location.href = this.signOutRedirectUrl; window.location.href = redirectPath ?? this.signOutredirectPath;
} }
public async session() { public async session() {
return this.client.session.$get(); return this.client.session.$get();
} }
private async handleResponse<T>(response: ClientResponse<T>) { private async handleError<T>(response: ClientResponse<T>): Promise<void> {
if (!response.ok) { if (!response.ok) {
const error = await response.json(); const error = await response.json();
throw AppError.parseError(error); throw AppError.parseError(error);
} }
if (response.headers.get('content-type')?.includes('application/json')) {
return response.json();
}
return response.text();
} }
public emailPassword = { public emailPassword = {
signIn: async (data: TSignInSchema & { redirectUrl?: string }) => { signIn: async (data: TEmailPasswordSignin) => {
const response = await this.client['email-password'].authorize const response = await this.client['email-password'].authorize.$post({ json: data });
.$post({ json: data }) await this.handleError(response);
.then(this.handleResponse);
if (data.redirectUrl) { handleSignInRedirect(data.redirectPath);
window.location.href = data.redirectUrl; },
}
return response; updatePassword: async (data: TUpdatePasswordSchema) => {
const response = await this.client['email-password']['update-password'].$post({ json: data });
await this.handleError(response);
}, },
forgotPassword: async (data: TForgotPasswordSchema) => { forgotPassword: async (data: TForgotPasswordSchema) => {
const response = await this.client['email-password']['forgot-password'].$post({ json: data }); const response = await this.client['email-password']['forgot-password'].$post({ json: data });
return this.handleResponse(response); await this.handleError(response);
}, },
resetPassword: async (data: TResetPasswordSchema) => { resetPassword: async (data: TResetPasswordSchema) => {
const response = await this.client['email-password']['reset-password'].$post({ json: data }); const response = await this.client['email-password']['reset-password'].$post({ json: data });
return this.handleResponse(response); await this.handleError(response);
}, },
signUp: async (data: TSignUpSchema) => { signUp: async (data: TSignUpSchema) => {
const response = await this.client['email-password']['signup'].$post({ json: data }); const response = await this.client['email-password']['signup'].$post({ json: data });
return this.handleResponse(response); await this.handleError(response);
}, },
verifyEmail: async (data: TVerifyEmailSchema) => { verifyEmail: async (data: TVerifyEmailSchema) => {
const response = await this.client['email-password']['verify-email'].$post({ json: data }); const response = await this.client['email-password']['verify-email'].$post({ json: data });
return this.handleResponse(response); await this.handleError(response);
return response.json();
}, },
}; };
public passkey = { public passkey = {
signIn: async (data: TPasskeyAuthorizeSchema & { redirectUrl?: string }) => { signIn: async (data: TPasskeySignin) => {
const response = await this.client['passkey'].authorize const response = await this.client['passkey'].authorize.$post({ json: data });
.$post({ json: data }) await this.handleError(response);
.then(this.handleResponse);
if (data.redirectUrl) { handleSignInRedirect(data.redirectPath);
window.location.href = data.redirectUrl;
}
return response;
}, },
}; };
public google = { public google = {
signIn: async () => { signIn: async ({ redirectPath }: { redirectPath?: string } = {}) => {
const response = await this.client['google'].authorize.$post().then(this.handleResponse); const response = await this.client['google'].authorize.$post({ json: { redirectPath } });
await this.handleError(response);
if (response.redirectUrl) { const data = await response.json();
window.location.href = response.redirectUrl;
// Redirect to external Google auth URL.
if (data.redirectUrl) {
window.location.href = data.redirectUrl;
} }
return response;
}, },
}; };
} }

View File

@ -1,6 +1,7 @@
import type { Context } from 'hono'; import type { Context } from 'hono';
import { getSignedCookie, setSignedCookie } from 'hono/cookie'; import { deleteCookie, getSignedCookie, setSignedCookie } from 'hono/cookie';
import { NEXT_PUBLIC_WEBAPP_URL } from '@documenso/lib/constants/app';
import { appLog } from '@documenso/lib/utils/debugger'; import { appLog } from '@documenso/lib/utils/debugger';
import { env } from '@documenso/lib/utils/env'; import { env } from '@documenso/lib/utils/env';
@ -16,6 +17,12 @@ const getAuthSecret = () => {
return authSecret; return authSecret;
}; };
const getAuthDomain = () => {
const url = new URL(NEXT_PUBLIC_WEBAPP_URL());
return url.hostname;
};
export const extractSessionCookieFromHeaders = (headers: Headers): string | null => { export const extractSessionCookieFromHeaders = (headers: Headers): string | null => {
const cookieHeader = headers.get('cookie') || ''; const cookieHeader = headers.get('cookie') || '';
const cookiePairs = cookieHeader.split(';'); const cookiePairs = cookieHeader.split(';');
@ -51,10 +58,24 @@ export const setSessionCookie = async (c: Context, sessionToken: string) => {
path: '/', path: '/',
// sameSite: '', // whats the default? we need to change this for embed right? // sameSite: '', // whats the default? we need to change this for embed right?
// secure: true, // secure: true,
domain: 'localhost', // todo domain: getAuthDomain(),
}).catch((err) => { }).catch((err) => {
appLog('SetSessionCookie', `Error setting signed cookie: ${err}`); appLog('SetSessionCookie', `Error setting signed cookie: ${err}`);
throw err; throw err;
}); });
}; };
/**
* Set the session cookie into the Hono context.
*
* @param c - The Hono context.
* @param sessionToken - The session token to set.
*/
export const deleteSessionCookie = (c: Context) => {
deleteCookie(c, sessionCookieName, {
path: '/',
secure: true,
domain: getAuthDomain(),
});
};

View File

@ -0,0 +1,28 @@
import { NEXT_PUBLIC_WEBAPP_URL } from '@documenso/lib/constants/app';
/**
* Handle an optional redirect path.
*/
export const handleRequestRedirect = (redirectUrl?: string) => {
if (!redirectUrl) {
return;
}
const url = new URL(redirectUrl, NEXT_PUBLIC_WEBAPP_URL());
if (url.origin !== NEXT_PUBLIC_WEBAPP_URL()) {
window.location.href = '/documents';
} else {
window.location.href = redirectUrl;
}
};
export const handleSignInRedirect = (redirectUrl: string = '/documents') => {
const url = new URL(redirectUrl, NEXT_PUBLIC_WEBAPP_URL());
if (url.origin !== NEXT_PUBLIC_WEBAPP_URL()) {
window.location.href = '/documents';
} else {
window.location.href = redirectUrl;
}
};

View File

@ -1,21 +1,22 @@
import { zValidator } from '@hono/zod-validator';
import { Google, decodeIdToken, generateCodeVerifier, generateState } from 'arctic'; import { Google, decodeIdToken, generateCodeVerifier, generateState } from 'arctic';
import { Hono } from 'hono'; import { Hono } from 'hono';
import { getCookie, setCookie } from 'hono/cookie'; import { deleteCookie, setCookie } from 'hono/cookie';
import { z } from 'zod';
import { NEXT_PUBLIC_WEBAPP_URL } from '@documenso/lib/constants/app';
import { AppError, AppErrorCode } from '@documenso/lib/errors/app-error'; import { AppError, AppErrorCode } from '@documenso/lib/errors/app-error';
import { setupTwoFactorAuthentication } from '@documenso/lib/server-only/2fa/setup-2fa';
import { env } from '@documenso/lib/utils/env'; import { env } from '@documenso/lib/utils/env';
import { prisma } from '@documenso/prisma'; import { prisma } from '@documenso/prisma';
import { AuthenticationErrorCode } from '../lib/errors/error-codes'; import { AuthenticationErrorCode } from '../lib/errors/error-codes';
import { onAuthorize } from '../lib/utils/authorizer'; import { onAuthorize } from '../lib/utils/authorizer';
import { getRequiredSession } from '../lib/utils/get-session';
import type { HonoAuthContext } from '../types/context'; import type { HonoAuthContext } from '../types/context';
const options = { const options = {
clientId: env('NEXT_PRIVATE_GOOGLE_CLIENT_ID'), clientId: env('NEXT_PRIVATE_GOOGLE_CLIENT_ID') ?? '',
clientSecret: env('NEXT_PRIVATE_GOOGLE_CLIENT_SECRET'), clientSecret: env('NEXT_PRIVATE_GOOGLE_CLIENT_SECRET') ?? '',
redirectUri: 'http://localhost:3000/api/auth/google/callback', redirectUri: `${NEXT_PUBLIC_WEBAPP_URL()}/api/auth/google/callback`,
scope: ['openid', 'email', 'profile'], scope: ['openid', 'email', 'profile'],
id: 'google', id: 'google',
}; };
@ -24,55 +25,62 @@ const google = new Google(options.clientId, options.clientSecret, options.redire
// todo: NEXT_PRIVATE_OIDC_WELL_KNOWN??? // todo: NEXT_PRIVATE_OIDC_WELL_KNOWN???
const ZGoogleAuthorizeSchema = z.object({
redirectPath: z.string().optional(),
});
export const googleRoute = new Hono<HonoAuthContext>() export const googleRoute = new Hono<HonoAuthContext>()
/** /**
* Authorize endpoint. * Authorize endpoint.
*/ */
.post('/authorize', (c) => { .post('/authorize', zValidator('json', ZGoogleAuthorizeSchema), (c) => {
const scopes = options.scope; const scopes = options.scope;
const state = generateState(); const state = generateState();
const codeVerifier = generateCodeVerifier(); const codeVerifier = generateCodeVerifier();
const url = google.createAuthorizationURL(state, codeVerifier, scopes); const url = google.createAuthorizationURL(state, codeVerifier, scopes);
const { redirectPath } = c.req.valid('json');
setCookie(c, 'google_oauth_state', state, { setCookie(c, 'google_oauth_state', state, {
path: '/', path: '/',
httpOnly: true, httpOnly: true,
secure: env('NODE_ENV') === 'production', secure: env('NODE_ENV') === 'production', // Todo: Check.
maxAge: 60 * 10, // 10 minutes maxAge: 60 * 10, // 10 minutes
sameSite: 'lax', sameSite: 'lax', // Todo??
}); });
setCookie(c, 'google_code_verifier', codeVerifier, { setCookie(c, 'google_code_verifier', codeVerifier, {
path: '/', path: '/',
httpOnly: true, httpOnly: true,
// Todo: Might not be node_env but something vite specific? secure: env('NODE_ENV') === 'production', // Todo: Check.
secure: env('NODE_ENV') === 'production',
maxAge: 60 * 10, // 10 minutes maxAge: 60 * 10, // 10 minutes
sameSite: 'lax', sameSite: 'lax', // Todo??
}); });
// return new Response(null, { if (redirectPath) {
// status: 302, setCookie(c, 'google_redirect_path', `${state}:${redirectPath}`, {
// headers: { path: '/',
// Location: url.toString() httpOnly: true,
// } secure: env('NODE_ENV') === 'production', // Todo: Check.
// }); maxAge: 60 * 10, // 10 minutes
sameSite: 'lax', // Todo??
});
}
return c.json({ return c.json({
redirectUrl: url, redirectUrl: url.toString(),
}); });
}) })
/** /**
* Google callback verification. * Google callback verification.
*/ */
.get('/callback', async (c) => { .get('/callback', async (c) => {
// Todo: Use ZValidator to validate query params.
const code = c.req.query('code'); const code = c.req.query('code');
const state = c.req.query('state'); const state = c.req.query('state');
const storedState = getCookie(c, 'google_oauth_state'); const storedState = deleteCookie(c, 'google_oauth_state');
const storedCodeVerifier = getCookie(c, 'google_code_verifier'); const storedCodeVerifier = deleteCookie(c, 'google_code_verifier');
if (!code || !storedState || state !== storedState || !storedCodeVerifier) { if (!code || !storedState || state !== storedState || !storedCodeVerifier) {
throw new AppError(AppErrorCode.INVALID_REQUEST, { throw new AppError(AppErrorCode.INVALID_REQUEST, {
@ -80,18 +88,23 @@ export const googleRoute = new Hono<HonoAuthContext>()
}); });
} }
const storedredirectPath = deleteCookie(c, 'google_redirect_path') ?? '';
// eslint-disable-next-line prefer-const
let [redirectState, redirectPath] = storedredirectPath.split(':');
if (redirectState !== storedState || !redirectPath) {
redirectPath = '/documents';
}
const tokens = await google.validateAuthorizationCode(code, storedCodeVerifier); const tokens = await google.validateAuthorizationCode(code, storedCodeVerifier);
const accessToken = tokens.accessToken(); const accessToken = tokens.accessToken();
const accessTokenExpiresAt = tokens.accessTokenExpiresAt(); const accessTokenExpiresAt = tokens.accessTokenExpiresAt();
const idToken = tokens.idToken(); const idToken = tokens.idToken();
console.log(tokens);
// eslint-disable-next-line @typescript-eslint/consistent-type-assertions // eslint-disable-next-line @typescript-eslint/consistent-type-assertions
const claims = decodeIdToken(tokens.idToken()) as Record<string, unknown>; const claims = decodeIdToken(tokens.idToken()) as Record<string, unknown>;
console.log(claims);
const googleEmail = claims.email; const googleEmail = claims.email;
const googleName = claims.name; const googleName = claims.name;
const googleSub = claims.sub; const googleSub = claims.sub;
@ -127,7 +140,7 @@ export const googleRoute = new Hono<HonoAuthContext>()
if (existingAccount) { if (existingAccount) {
await onAuthorize({ userId: existingAccount.user.id }, c); await onAuthorize({ userId: existingAccount.user.id }, c);
return c.redirect('/documents', 302); // Todo: Redirect return c.redirect(redirectPath, 302);
} }
const userWithSameEmail = await prisma.user.findFirst({ const userWithSameEmail = await prisma.user.findFirst({
@ -154,7 +167,7 @@ export const googleRoute = new Hono<HonoAuthContext>()
// Todo: Link account // Todo: Link account
await onAuthorize({ userId: userWithSameEmail.id }, c); await onAuthorize({ userId: userWithSameEmail.id }, c);
return c.redirect('/documents', 302); // Todo: Redirect return c.redirect(redirectPath, 302);
} }
// Handle new user. // Handle new user.
@ -184,21 +197,5 @@ export const googleRoute = new Hono<HonoAuthContext>()
await onAuthorize({ userId: createdUser.id }, c); await onAuthorize({ userId: createdUser.id }, c);
return c.redirect('/documents', 302); // Todo: Redirect return c.redirect(redirectPath, 302);
})
/**
* Setup passkey authentication.
*/
.post('/setup', async (c) => {
const { user } = await getRequiredSession(c);
const result = await setupTwoFactorAuthentication({
user,
});
return c.json({
success: true,
secret: result.secret,
uri: result.uri,
});
}); });

View File

@ -1,11 +1,10 @@
import { Hono } from 'hono'; import { Hono } from 'hono';
import { deleteCookie, getSignedCookie } from 'hono/cookie';
import { invalidateSession, validateSessionToken } from '../lib/session/session'; import { invalidateSession, validateSessionToken } from '../lib/session/session';
import { deleteSessionCookie, getSessionCookie } from '../lib/session/session-cookies';
export const signOutRoute = new Hono().post('/signout', async (c) => { export const signOutRoute = new Hono().post('/signout', async (c) => {
// todo: secret const sessionId = await getSessionCookie(c);
const sessionId = await getSignedCookie(c, 'secret', 'sessionId');
if (!sessionId) { if (!sessionId) {
return new Response('No session found', { status: 401 }); return new Response('No session found', { status: 401 });
@ -19,11 +18,7 @@ export const signOutRoute = new Hono().post('/signout', async (c) => {
await invalidateSession(session.id); await invalidateSession(session.id);
deleteCookie(c, 'sessionId', { deleteSessionCookie(c);
path: '/',
secure: true,
domain: 'example.com',
});
return c.status(200); return c.status(200);
}); });

View File

@ -3,13 +3,13 @@ import { i18n } from '@lingui/core';
import type { I18nLocaleData, SupportedLanguageCodes } from '../constants/i18n'; import type { I18nLocaleData, SupportedLanguageCodes } from '../constants/i18n';
import { APP_I18N_OPTIONS } from '../constants/i18n'; import { APP_I18N_OPTIONS } from '../constants/i18n';
import { env } from './env';
export async function dynamicActivate(locale: string) { export async function dynamicActivate(locale: string) {
const extension = env('NODE_ENV') === 'development' ? 'po' : 'js'; // const extension = import.meta.env.PROD env('NODE_ENV') === 'development' ? 'po' : 'js';
// eslint-disable-next-line turbo/no-undeclared-env-vars
const extension = import.meta.env.PROD ? 'js' : 'po';
// Todo: Use extension (currently breaks). // Todo: Use extension (currently breaks).
const { messages } = await import(`../translations/${locale}/web.${extension}`); const { messages } = await import(`../translations/${locale}/web.${extension}`);
i18n.loadAndActivate({ locale, messages }); i18n.loadAndActivate({ locale, messages });