|
| 1 | +import { AUTH_URLS, PROTECTED_URLS } from '@/configs/urls' |
| 2 | +import { logInfo, logError } from '@/lib/clients/logger' |
| 3 | +import { createClient } from '@/lib/clients/supabase/server' |
| 4 | +import { encodedRedirect } from '@/lib/utils/auth' |
| 5 | +import { redirect } from 'next/navigation' |
| 6 | +import { NextRequest, NextResponse } from 'next/server' |
| 7 | +import { z } from 'zod' |
| 8 | + |
| 9 | +const confirmSchema = z.object({ |
| 10 | + token_hash: z.string().min(1), |
| 11 | + type: z.enum([ |
| 12 | + 'signup', |
| 13 | + 'recovery', |
| 14 | + 'invite', |
| 15 | + 'magiclink', |
| 16 | + 'email', |
| 17 | + 'email_change', |
| 18 | + ]), |
| 19 | + confirmation_url: z.string().url(), |
| 20 | + next: z.string().url(), |
| 21 | +}) |
| 22 | + |
| 23 | +const normalizeOrigin = (origin: string) => |
| 24 | + origin.replace('www.', '').replace(/\/$/, '') |
| 25 | + |
| 26 | +export async function GET(request: NextRequest) { |
| 27 | + const { searchParams } = new URL(request.url) |
| 28 | + |
| 29 | + const result = confirmSchema.safeParse({ |
| 30 | + token_hash: searchParams.get('token_hash'), |
| 31 | + type: searchParams.get('type'), |
| 32 | + confirmation_url: searchParams.get('confirmation_url'), |
| 33 | + next: searchParams.get('next'), |
| 34 | + }) |
| 35 | + |
| 36 | + const dashboardSignInUrl = new URL(request.nextUrl.origin + AUTH_URLS.SIGN_IN) |
| 37 | + |
| 38 | + if (!result.success) { |
| 39 | + logError('AUTH_CONFIRM_INVALID_PARAMS', { |
| 40 | + errors: result.error.errors, |
| 41 | + }) |
| 42 | + return encodedRedirect( |
| 43 | + 'error', |
| 44 | + dashboardSignInUrl.toString(), |
| 45 | + 'Invalid Request' |
| 46 | + ) |
| 47 | + } |
| 48 | + |
| 49 | + const supabaseTokenHash = result.data.token_hash |
| 50 | + const supabaseType = result.data.type |
| 51 | + const supabaseClientFlowUrl = result.data.confirmation_url |
| 52 | + const supabaseRedirectTo = result.data.next |
| 53 | + |
| 54 | + const dashboardUrl = request.nextUrl |
| 55 | + |
| 56 | + const isDifferentOrigin = |
| 57 | + supabaseRedirectTo && |
| 58 | + normalizeOrigin(new URL(supabaseRedirectTo).origin) !== |
| 59 | + normalizeOrigin(dashboardUrl.origin) |
| 60 | + |
| 61 | + logInfo('AUTH_CONFIRM_INIT', { |
| 62 | + supabase_token_hash: supabaseTokenHash |
| 63 | + ? `${supabaseTokenHash.slice(0, 10)}...` |
| 64 | + : null, |
| 65 | + supabaseType, |
| 66 | + supabaseRedirectTo, |
| 67 | + isDifferentOrigin, |
| 68 | + supabaseClientFlowUrl, |
| 69 | + requestUrl: request.url, |
| 70 | + origin: request.nextUrl.origin, |
| 71 | + }) |
| 72 | + |
| 73 | + // when the next param is an absolute URL, with a different origin, |
| 74 | + // we need to redirect to the supabase client flow url |
| 75 | + if (isDifferentOrigin) { |
| 76 | + throw redirect(supabaseClientFlowUrl!) |
| 77 | + } |
| 78 | + |
| 79 | + try { |
| 80 | + const next = |
| 81 | + supabaseType === 'recovery' |
| 82 | + ? `${request.nextUrl.origin}${PROTECTED_URLS.RESET_PASSWORD}` |
| 83 | + : supabaseRedirectTo |
| 84 | + |
| 85 | + const redirectUrl = new URL(next) |
| 86 | + |
| 87 | + const response = NextResponse.redirect(redirectUrl) |
| 88 | + const supabase = await createClient() |
| 89 | + |
| 90 | + const { error } = await supabase.auth.verifyOtp({ |
| 91 | + type: supabaseType, |
| 92 | + token_hash: supabaseTokenHash, |
| 93 | + }) |
| 94 | + |
| 95 | + if (error) { |
| 96 | + logError('AUTH_CONFIRM_ERROR', { |
| 97 | + supabaseTokenHash: `${supabaseTokenHash.slice(0, 10)}...`, |
| 98 | + supabaseType, |
| 99 | + supabaseRedirectTo, |
| 100 | + redirectUrl: redirectUrl.toString(), |
| 101 | + errorCode: error.code, |
| 102 | + errorStatus: error.status, |
| 103 | + errorMessage: error.message, |
| 104 | + }) |
| 105 | + |
| 106 | + let errorMessage = 'Invalid Token' |
| 107 | + if (error.status === 403 && error.code === 'otp_expired') { |
| 108 | + errorMessage = 'Email link has expired. Please request a new one.' |
| 109 | + } |
| 110 | + |
| 111 | + return encodedRedirect( |
| 112 | + 'error', |
| 113 | + dashboardSignInUrl.toString(), |
| 114 | + errorMessage |
| 115 | + ) |
| 116 | + } |
| 117 | + |
| 118 | + logInfo('AUTH_CONFIRM_SUCCESS', { |
| 119 | + supabaseTokenHash: `${supabaseTokenHash.slice(0, 10)}...`, |
| 120 | + supabaseType, |
| 121 | + supabaseRedirectTo, |
| 122 | + redirectUrl: redirectUrl.toString(), |
| 123 | + }) |
| 124 | + |
| 125 | + return response |
| 126 | + } catch (e) { |
| 127 | + logError('AUTH_CONFIRM_ERROR', { |
| 128 | + error: e, |
| 129 | + }) |
| 130 | + return encodedRedirect( |
| 131 | + 'error', |
| 132 | + dashboardSignInUrl.toString(), |
| 133 | + 'Invalid Token' |
| 134 | + ) |
| 135 | + } |
| 136 | +} |
0 commit comments