|
| 1 | +import { cookies } from "next/headers"; |
| 2 | +import { NextResponse, type NextRequest } from "next/server"; |
| 3 | +import { addDays } from "date-fns"; |
| 4 | +import { and, eq } from "drizzle-orm"; |
| 5 | +import { nanoid } from "nanoid"; |
| 6 | + |
| 7 | +import { sessions, users, verificationTokens } from "@echo-webkom/db/schemas"; |
| 8 | +import { db } from "@echo-webkom/db/serverless"; |
| 9 | + |
| 10 | +import { createSessionCookie, SESSION_COOKIE_NAME } from "@/auth/session"; |
| 11 | + |
| 12 | +export async function GET(request: NextRequest) { |
| 13 | + try { |
| 14 | + const searchParams = request.nextUrl.searchParams; |
| 15 | + const token = searchParams.get("token"); |
| 16 | + const email = searchParams.get("email"); |
| 17 | + |
| 18 | + if (!token || !email) { |
| 19 | + return NextResponse.redirect(new URL("/auth/logg-inn?error=invalid-token", request.url)); |
| 20 | + } |
| 21 | + |
| 22 | + // Find and verify the token |
| 23 | + const verificationToken = await db.query.verificationTokens.findFirst({ |
| 24 | + where: and(eq(verificationTokens.identifier, email), eq(verificationTokens.token, token)), |
| 25 | + }); |
| 26 | + |
| 27 | + if (!verificationToken) { |
| 28 | + return NextResponse.redirect(new URL("/auth/logg-inn?error=invalid-token", request.url)); |
| 29 | + } |
| 30 | + |
| 31 | + // Check if token has expired |
| 32 | + if (verificationToken.expires < new Date()) { |
| 33 | + // Clean up expired token |
| 34 | + await db |
| 35 | + .delete(verificationTokens) |
| 36 | + .where(and(eq(verificationTokens.identifier, email), eq(verificationTokens.token, token))); |
| 37 | + |
| 38 | + return NextResponse.redirect(new URL("/auth/logg-inn?error=expired-token", request.url)); |
| 39 | + } |
| 40 | + |
| 41 | + // Find the user |
| 42 | + const user = await db.query.users.findFirst({ |
| 43 | + where: (user, { eq, or }) => or(eq(user.email, email), eq(user.alternativeEmail, email)), |
| 44 | + }); |
| 45 | + |
| 46 | + if (!user) { |
| 47 | + return NextResponse.redirect(new URL("/auth/logg-inn?error=user-not-found", request.url)); |
| 48 | + } |
| 49 | + |
| 50 | + // Clean up the used token |
| 51 | + await db |
| 52 | + .delete(verificationTokens) |
| 53 | + .where(and(eq(verificationTokens.identifier, email), eq(verificationTokens.token, token))); |
| 54 | + |
| 55 | + // Update user's last sign in time |
| 56 | + await db.update(users).set({ lastSignInAt: new Date() }).where(eq(users.id, user.id)); |
| 57 | + |
| 58 | + // Create or find existing session |
| 59 | + let existingSession = await db.query.sessions.findFirst({ |
| 60 | + where: (row, { eq, and, gt }) => and(eq(row.userId, user.id), gt(row.expires, new Date())), |
| 61 | + }); |
| 62 | + |
| 63 | + if (!existingSession) { |
| 64 | + const sessionId = nanoid(40); |
| 65 | + const expiresAt = addDays(new Date(), 30); |
| 66 | + await db.insert(sessions).values({ |
| 67 | + sessionToken: sessionId, |
| 68 | + userId: user.id, |
| 69 | + expires: expiresAt, |
| 70 | + }); |
| 71 | + existingSession = { |
| 72 | + sessionToken: sessionId, |
| 73 | + expires: expiresAt, |
| 74 | + userId: user.id, |
| 75 | + }; |
| 76 | + } |
| 77 | + |
| 78 | + // Set session cookie |
| 79 | + const cookieStore = await cookies(); |
| 80 | + const sessionCookie = await createSessionCookie(existingSession.sessionToken); |
| 81 | + |
| 82 | + cookieStore.set(SESSION_COOKIE_NAME, sessionCookie, { |
| 83 | + path: "/", |
| 84 | + expires: existingSession.expires, |
| 85 | + sameSite: "lax", |
| 86 | + secure: process.env.NODE_ENV === "production", |
| 87 | + }); |
| 88 | + |
| 89 | + return NextResponse.redirect(new URL("/", request.url)); |
| 90 | + } catch (error) { |
| 91 | + console.error("Error verifying magic link:", error); |
| 92 | + return NextResponse.redirect(new URL("/auth/logg-inn?error=verification-failed", request.url)); |
| 93 | + } |
| 94 | +} |
0 commit comments