119 lines
4.9 KiB
TypeScript
119 lines
4.9 KiB
TypeScript
// import CredentialsProvider from 'next-auth/providers/credentials'
|
|
import KeycloakProvider from 'next-auth/providers/keycloak'
|
|
import { NuxtAuthHandler, } from '#auth'
|
|
import {timestampToDate} from "~/utils/helper"
|
|
// import {session} from "next-auth/core/routes";
|
|
|
|
export default NuxtAuthHandler({
|
|
// TODO: SET A STRONG SECRET, SEE https://sidebase.io/nuxt-auth/configuration/nuxt-auth-handler#secret
|
|
secret: 'my-auth-secret',
|
|
// TODO: ADD YOUR OWN AUTHENTICATION PROVIDER HERE, READ THE DOCS FOR MORE: https://sidebase.io/nuxt-auth
|
|
providers: [
|
|
// @ts-expect-error You need to use .default here for it to work during SSR. May be fixed via Vite at some point
|
|
KeycloakProvider.default({
|
|
clientId: process.env.KEYCLOAK_ID,
|
|
clientSecret: process.env.KEYCLOAK_SECRET,
|
|
issuer: process.env.KEYCLOAK_ISSUER,
|
|
}),
|
|
|
|
// // @ts-expect-error You need to use .default here for it to work during SSR. May be fixed via Vite at some point
|
|
// CredentialsProvider.default({
|
|
// // The name to display on the sign in form (e.g. 'Sign in with...')
|
|
// name: 'Credentials',
|
|
// // The credentials is used to generate a suitable form on the sign in page.
|
|
// // You can specify whatever fields you are expecting to be submitted.
|
|
// // e.g. domain, username, password, 2FA token, etc.
|
|
// // You can pass any HTML attribute to the <input> tag through the object.
|
|
// credentials: {
|
|
// username: { label: 'Username', type: 'text', placeholder: '(hint: jsmith)' },
|
|
// password: { label: 'Password', type: 'password', placeholder: '(hint: hunter2)' }
|
|
// },
|
|
// authorize (credentials: any) {
|
|
// console.warn('ATTENTION: You should replace this with your real providers or credential provider logic! The current setup is not safe')
|
|
// // You need to provide your own logic here that takes the credentials
|
|
// // submitted and returns either a object representing a user or value
|
|
// // that is false/null if the credentials are invalid.
|
|
// // NOTE: THE BELOW LOGIC IS NOT SAFE OR PROPER FOR AUTHENTICATION!
|
|
|
|
// const user = { id: '1', name: 'J Smith', username: 'jsmith', password: 'hunter2' }
|
|
|
|
// if (credentials?.username === user.username && credentials?.password === user.password) {
|
|
// // Any object returned will be saved in `user` property of the JWT
|
|
// return user
|
|
// } else {
|
|
// console.error('Warning: Malicious login attempt registered, bad credentials provided')
|
|
|
|
// // If you return null then an error will be displayed advising the user to check their details.
|
|
// return null
|
|
|
|
// // You can also Reject this callback with an Error thus the user will be sent to the error page with the error message as a query parameter
|
|
// }
|
|
// }
|
|
// })
|
|
],
|
|
callbacks: {
|
|
async jwt({ token, account, user }: { token: any; user: any, account: any }) {
|
|
try {
|
|
if (account && account.access_token) {
|
|
token.access_token_payload = JSON.parse(atob(account.access_token.split('.')[1]));
|
|
token.jwt = account.access_token;
|
|
}
|
|
} catch (err) {
|
|
console.error(err);
|
|
}
|
|
if (account) {
|
|
token.id_token = account.id_token;
|
|
token.refresh_token = account.refresh_token;
|
|
token.expires_at = account.expires_at;
|
|
token.scope = account.scope;
|
|
}
|
|
if (user) { token.user = user }
|
|
return token
|
|
},
|
|
async session({ token,session }:{token:any, session:any}) {
|
|
const user_payload=JSON.parse(atob(token.jwt.split('.')[1]));
|
|
try {
|
|
if (token && token.id_token) {
|
|
// session.session_user_payload = user_payload;
|
|
session.jwt = token.jwt;
|
|
}
|
|
} catch (err) {
|
|
console.error(err);
|
|
}
|
|
if (token) {
|
|
// session.id_token = token.id_token;
|
|
session.refresh_token = token.refresh_token;
|
|
// session.expires_at = token.expires_at;
|
|
// session.scope = token.scope;
|
|
session.isAuthenticated = true;
|
|
session.user_payload = {
|
|
userName:user_payload.preferred_username,
|
|
typeUser:user_payload.type_user||user_payload.resource_access[user_payload.azp].roles[0],
|
|
roleUser:user_payload.resource_access[user_payload.azp],
|
|
userInfo:{
|
|
id:user_payload.id,
|
|
full_name:user_payload.name,
|
|
givenName:user_payload.given_name,
|
|
familyName:user_payload.family_name,
|
|
email:user_payload.email,
|
|
group:user_payload.group,
|
|
},
|
|
expires:{
|
|
expires_at:token.expires_at,
|
|
timestamps:new Date(token.expires_at),
|
|
date:timestampToDate(token.expires_at,'id-ID'),
|
|
}
|
|
};
|
|
}
|
|
return session
|
|
}
|
|
},
|
|
pages: {
|
|
signIn: '/auth/Login',
|
|
// signOut: '/auth/logout',
|
|
// error: '/auth/error',
|
|
// verifyRequest: '/auth/verify-request',
|
|
// newUser: '/auth/new-user'
|
|
},
|
|
})
|