mirror of
https://github.com/simstudioai/sim.git
synced 2026-01-07 22:24:06 -05:00
* migrate to bun * added envvars to drizzle * upgrade bun devcontainer feature to a valid one * added bun, docker not working * updated envvars, updated to bunder and esnext modules * fixed build, reinstated otel * feat: optimized multi-stage docker images * add coerce for boolean envvar * feat: add docker-compose configuration for local LLM services and remove legacy Dockerfile and entrypoint script * feat: add docker-compose files for local and production environments, and implement GitHub Actions for Docker image build and publish * refactor: remove unused generateStaticParams function from various API routes and maintain dynamic rendering * cleanup * upgraded bun * updated ci * fixed build --------- Co-authored-by: Aditya Tripathi <aditya@climactic.co>
128 lines
4.0 KiB
TypeScript
128 lines
4.0 KiB
TypeScript
import { NextRequest, NextResponse } from 'next/server'
|
|
import { eq } from 'drizzle-orm'
|
|
import { jwtDecode } from 'jwt-decode'
|
|
import { getSession } from '@/lib/auth'
|
|
import { createLogger } from '@/lib/logs/console-logger'
|
|
import { db } from '@/db'
|
|
import { account, user } from '@/db/schema'
|
|
|
|
export const dynamic = 'force-dynamic'
|
|
|
|
const logger = createLogger('OAuthConnectionsAPI')
|
|
|
|
interface GoogleIdToken {
|
|
email?: string
|
|
sub?: string
|
|
name?: string
|
|
}
|
|
|
|
/**
|
|
* Get all OAuth connections for the current user
|
|
*/
|
|
export async function GET(request: NextRequest) {
|
|
const requestId = crypto.randomUUID().slice(0, 8)
|
|
|
|
try {
|
|
// Get the session
|
|
const session = await getSession()
|
|
|
|
// Check if the user is authenticated
|
|
if (!session?.user?.id) {
|
|
logger.warn(`[${requestId}] Unauthenticated request rejected`)
|
|
return NextResponse.json({ error: 'User not authenticated' }, { status: 401 })
|
|
}
|
|
|
|
// Get all accounts for this user
|
|
const accounts = await db.select().from(account).where(eq(account.userId, session.user.id))
|
|
|
|
// Get the user's email for fallback
|
|
const userRecord = await db
|
|
.select({ email: user.email })
|
|
.from(user)
|
|
.where(eq(user.id, session.user.id))
|
|
.limit(1)
|
|
|
|
const userEmail = userRecord.length > 0 ? userRecord[0]?.email : null
|
|
|
|
// Process accounts to determine connections
|
|
const connections: any[] = []
|
|
|
|
for (const acc of accounts) {
|
|
// Extract the base provider and feature type from providerId (e.g., 'google-email' -> 'google', 'email')
|
|
const [provider, featureType = 'default'] = acc.providerId.split('-')
|
|
|
|
if (provider) {
|
|
// Try multiple methods to get a user-friendly display name
|
|
let displayName = ''
|
|
|
|
// Method 1: Try to extract email from ID token (works for Google, etc.)
|
|
if (acc.idToken) {
|
|
try {
|
|
const decoded = jwtDecode<GoogleIdToken>(acc.idToken)
|
|
if (decoded.email) {
|
|
displayName = decoded.email
|
|
} else if (decoded.name) {
|
|
displayName = decoded.name
|
|
}
|
|
} catch (error) {
|
|
logger.warn(`[${requestId}] Error decoding ID token`, {
|
|
accountId: acc.id,
|
|
})
|
|
}
|
|
}
|
|
|
|
// Method 2: For GitHub, the accountId might be the username
|
|
if (!displayName && provider === 'github') {
|
|
displayName = `${acc.accountId} (GitHub)`
|
|
}
|
|
|
|
// Method 3: Use the user's email from our database
|
|
if (!displayName && userEmail) {
|
|
displayName = userEmail
|
|
}
|
|
|
|
// Fallback: Use accountId with provider type as context
|
|
if (!displayName) {
|
|
displayName = `${acc.accountId} (${provider})`
|
|
}
|
|
|
|
// Create a unique connection key that includes the full provider ID
|
|
const connectionKey = acc.providerId
|
|
|
|
// Find existing connection for this specific provider ID
|
|
const existingConnection = connections.find((conn) => conn.provider === connectionKey)
|
|
|
|
if (existingConnection) {
|
|
// Add account to existing connection
|
|
existingConnection.accounts = existingConnection.accounts || []
|
|
existingConnection.accounts.push({
|
|
id: acc.id,
|
|
name: displayName,
|
|
})
|
|
} else {
|
|
// Create new connection
|
|
connections.push({
|
|
provider: connectionKey,
|
|
baseProvider: provider,
|
|
featureType,
|
|
isConnected: true,
|
|
scopes: acc.scope ? acc.scope.split(' ') : [],
|
|
lastConnected: acc.updatedAt.toISOString(),
|
|
accounts: [
|
|
{
|
|
id: acc.id,
|
|
name: displayName,
|
|
},
|
|
],
|
|
})
|
|
}
|
|
}
|
|
}
|
|
|
|
return NextResponse.json({ connections }, { status: 200 })
|
|
} catch (error) {
|
|
logger.error(`[${requestId}] Error fetching OAuth connections`, error)
|
|
return NextResponse.json({ error: 'Internal server error' }, { status: 500 })
|
|
}
|
|
}
|