2024-08-07 16:02:13 -05:00
|
|
|
import NextAuth from "next-auth";
|
|
|
|
import CredentialsProvider from "next-auth/providers/credentials";
|
2024-09-06 12:32:23 -05:00
|
|
|
import EmailProvider from "next-auth/providers/email";
|
2024-08-07 16:02:13 -05:00
|
|
|
import NDK from "@nostr-dev-kit/ndk";
|
|
|
|
import axios from "axios";
|
2024-09-06 12:32:23 -05:00
|
|
|
import { PrismaAdapter } from "@next-auth/prisma-adapter";
|
|
|
|
import prisma from "@/db/prisma";
|
2024-08-07 16:02:13 -05:00
|
|
|
import { findKind0Fields } from "@/utils/nostr";
|
2024-09-06 12:32:23 -05:00
|
|
|
import { generateSecretKey, getPublicKey } from 'nostr-tools/pure'
|
|
|
|
import { bytesToHex } from '@noble/hashes/utils'
|
|
|
|
import { updateUser } from "@/db/models/userModels";
|
2024-09-11 16:48:56 -05:00
|
|
|
import { createRole } from "@/db/models/roleModels";
|
2024-09-17 13:55:51 -05:00
|
|
|
import appConfig from "@/config/appConfig";
|
2024-08-07 16:02:13 -05:00
|
|
|
|
|
|
|
const BASE_URL = process.env.BASE_URL;
|
|
|
|
|
|
|
|
const ndk = new NDK({
|
2024-09-17 13:55:51 -05:00
|
|
|
explicitRelayUrls: appConfig.defaultRelayUrls,
|
2024-08-07 16:02:13 -05:00
|
|
|
});
|
|
|
|
|
2024-08-12 17:27:47 -05:00
|
|
|
const authorize = async (pubkey) => {
|
|
|
|
await ndk.connect();
|
|
|
|
const user = ndk.getUser({ pubkey });
|
|
|
|
|
|
|
|
try {
|
|
|
|
const profile = await user.fetchProfile();
|
|
|
|
|
|
|
|
// Check if user exists, create if not
|
|
|
|
const response = await axios.get(`${BASE_URL}/api/users/${pubkey}`);
|
|
|
|
if (response.status === 200 && response.data) {
|
|
|
|
const fields = await findKind0Fields(profile);
|
|
|
|
|
|
|
|
// Combine user object with kind0Fields, giving priority to kind0Fields
|
|
|
|
const combinedUser = { ...fields, ...response.data };
|
|
|
|
|
|
|
|
// Update the user on the backend if necessary
|
|
|
|
// await axios.put(`${BASE_URL}/api/users/${combinedUser.id}`, combinedUser);
|
|
|
|
|
|
|
|
return combinedUser;
|
|
|
|
} else if (response.status === 204) {
|
|
|
|
// Create user
|
|
|
|
if (profile) {
|
|
|
|
const fields = await findKind0Fields(profile);
|
|
|
|
const payload = { pubkey, ...fields };
|
|
|
|
|
|
|
|
const createUserResponse = await axios.post(`${BASE_URL}/api/users`, payload);
|
|
|
|
return createUserResponse.data;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} catch (error) {
|
|
|
|
console.error("Nostr login error:", error);
|
|
|
|
}
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
|
2024-09-08 18:41:51 -05:00
|
|
|
export const authOptions = {
|
2024-09-06 12:32:23 -05:00
|
|
|
adapter: PrismaAdapter(prisma),
|
2024-08-07 16:02:13 -05:00
|
|
|
providers: [
|
|
|
|
CredentialsProvider({
|
|
|
|
id: "nostr",
|
|
|
|
name: "Nostr",
|
|
|
|
credentials: {
|
|
|
|
pubkey: { label: "Public Key", type: "text" },
|
|
|
|
},
|
|
|
|
authorize: async (credentials) => {
|
|
|
|
if (credentials?.pubkey) {
|
2024-08-12 17:27:47 -05:00
|
|
|
return await authorize(credentials.pubkey);
|
2024-08-07 16:02:13 -05:00
|
|
|
}
|
|
|
|
return null;
|
|
|
|
},
|
|
|
|
}),
|
2024-09-06 12:32:23 -05:00
|
|
|
EmailProvider({
|
|
|
|
server: {
|
|
|
|
host: process.env.EMAIL_SERVER_HOST,
|
|
|
|
port: process.env.EMAIL_SERVER_PORT,
|
|
|
|
auth: {
|
|
|
|
user: process.env.EMAIL_SERVER_USER,
|
|
|
|
pass: process.env.EMAIL_SERVER_PASSWORD
|
|
|
|
}
|
|
|
|
},
|
|
|
|
from: process.env.EMAIL_FROM
|
|
|
|
}),
|
2024-08-07 16:02:13 -05:00
|
|
|
],
|
|
|
|
callbacks: {
|
2024-08-12 17:27:47 -05:00
|
|
|
async jwt({ token, trigger, user }) {
|
|
|
|
if (trigger === "update") {
|
|
|
|
// if we trigger an update call the authorize function again
|
|
|
|
const newUser = await authorize(token.user.pubkey);
|
|
|
|
token.user = newUser;
|
|
|
|
}
|
2024-09-06 12:32:23 -05:00
|
|
|
// if the user has no pubkey, generate a new key pair
|
|
|
|
if (token && token?.user && token?.user?.id && !token.user?.pubkey) {
|
|
|
|
try {
|
|
|
|
let sk = generateSecretKey()
|
|
|
|
let pk = getPublicKey(sk)
|
|
|
|
let skHex = bytesToHex(sk)
|
|
|
|
const updatedUser = await updateUser(token.user.id, {pubkey: pk, privkey: skHex});
|
|
|
|
if (!updatedUser) {
|
|
|
|
console.error("Failed to update user");
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
token.user = updatedUser;
|
|
|
|
} catch (error) {
|
|
|
|
console.error("Ephemeral key pair generation error:", error);
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2024-09-19 17:33:22 -05:00
|
|
|
// todo this does not work on first login only the second time
|
2024-09-17 13:55:51 -05:00
|
|
|
if (user && appConfig.authorPubkeys.includes(user?.pubkey) && !user?.role) {
|
2024-09-11 16:48:56 -05:00
|
|
|
// create a new author role for this user
|
|
|
|
const role = await createRole({
|
|
|
|
userId: user.id,
|
|
|
|
admin: true,
|
|
|
|
subscribed: false,
|
|
|
|
});
|
|
|
|
|
2024-09-17 18:06:03 -05:00
|
|
|
console.log("role", role);
|
|
|
|
|
2024-09-11 16:48:56 -05:00
|
|
|
if (!role) {
|
|
|
|
console.error("Failed to create role");
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
|
|
|
|
const updatedUser = await updateUser(user.id, {role: role.id});
|
|
|
|
if (!updatedUser) {
|
|
|
|
console.error("Failed to update user");
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
token.user = updatedUser;
|
|
|
|
}
|
|
|
|
|
2024-08-09 14:28:57 -05:00
|
|
|
// Add combined user object to the token
|
2024-08-07 16:02:13 -05:00
|
|
|
if (user) {
|
2024-08-07 17:06:53 -05:00
|
|
|
token.user = user;
|
2024-08-07 16:02:13 -05:00
|
|
|
}
|
|
|
|
return token;
|
|
|
|
},
|
|
|
|
async session({ session, token }) {
|
2024-08-07 17:06:53 -05:00
|
|
|
// Add user from token to session
|
|
|
|
session.user = token.user;
|
|
|
|
session.jwt = token;
|
2024-08-07 16:02:13 -05:00
|
|
|
return session;
|
|
|
|
},
|
|
|
|
async redirect({ url, baseUrl }) {
|
2024-08-07 17:06:53 -05:00
|
|
|
return baseUrl;
|
2024-08-07 16:02:13 -05:00
|
|
|
},
|
2024-08-13 16:28:25 -05:00
|
|
|
async signOut({ token, session }) {
|
|
|
|
token = {}
|
|
|
|
session = {}
|
|
|
|
return true
|
|
|
|
},
|
2024-08-07 16:02:13 -05:00
|
|
|
},
|
|
|
|
secret: process.env.NEXTAUTH_SECRET,
|
2024-08-07 17:06:53 -05:00
|
|
|
session: { strategy: "jwt" },
|
2024-08-07 16:02:13 -05:00
|
|
|
jwt: {
|
|
|
|
signingKey: process.env.JWT_SECRET,
|
|
|
|
},
|
|
|
|
pages: {
|
|
|
|
signIn: "/auth/signin",
|
2024-09-09 15:44:18 -05:00
|
|
|
}
|
2024-09-08 18:41:51 -05:00
|
|
|
};
|
|
|
|
|
|
|
|
export default NextAuth(authOptions);
|