147 lines
4.2 KiB
TypeScript
147 lines
4.2 KiB
TypeScript
interface User {
|
|
id: string
|
|
email: string
|
|
username: string
|
|
name: string
|
|
authMethod: string
|
|
}
|
|
|
|
interface AuthState {
|
|
user: User | null
|
|
authenticated: boolean
|
|
}
|
|
|
|
export const useCustomAuth = () => {
|
|
const user = ref<User | null>(null)
|
|
const authenticated = ref(false)
|
|
const loading = ref(true)
|
|
const refreshing = ref(false)
|
|
const retryCount = ref(0)
|
|
const maxRetries = 3
|
|
|
|
// Check authentication status with retry logic
|
|
const checkAuth = async (skipRetry = false) => {
|
|
try {
|
|
loading.value = true
|
|
const data = await $fetch<AuthState>('/api/auth/session', {
|
|
retry: skipRetry ? 0 : 2,
|
|
retryDelay: 1000
|
|
})
|
|
user.value = data.user
|
|
authenticated.value = data.authenticated
|
|
retryCount.value = 0 // Reset retry count on success
|
|
|
|
console.log('[CUSTOM_AUTH] Session check result:', {
|
|
authenticated: data.authenticated,
|
|
userId: data.user?.id
|
|
})
|
|
} catch (error) {
|
|
console.error('[CUSTOM_AUTH] Session check failed:', error)
|
|
|
|
// If it's a network error and we haven't exceeded retry limit, try refresh
|
|
if (!skipRetry && retryCount.value < maxRetries && (error as any)?.status >= 500) {
|
|
retryCount.value++
|
|
console.log(`[CUSTOM_AUTH] Retrying session check (${retryCount.value}/${maxRetries})...`)
|
|
|
|
// Wait a bit before retrying
|
|
await new Promise(resolve => setTimeout(resolve, 1000 * retryCount.value))
|
|
return checkAuth(false)
|
|
}
|
|
|
|
user.value = null
|
|
authenticated.value = false
|
|
} finally {
|
|
loading.value = false
|
|
}
|
|
}
|
|
|
|
// Refresh token with better error handling
|
|
const refreshToken = async () => {
|
|
if (refreshing.value) return false
|
|
|
|
try {
|
|
refreshing.value = true
|
|
console.log('[CUSTOM_AUTH] Attempting token refresh...')
|
|
|
|
const response = await $fetch<{ success: boolean; expiresAt?: number }>('/api/auth/refresh', {
|
|
method: 'POST',
|
|
retry: 2,
|
|
retryDelay: 1000
|
|
})
|
|
|
|
if (response.success) {
|
|
console.log('[CUSTOM_AUTH] Token refresh successful')
|
|
await checkAuth(true) // Re-check auth state after refresh, skip retry to avoid loops
|
|
return true
|
|
}
|
|
|
|
return false
|
|
} catch (error) {
|
|
console.error('[CUSTOM_AUTH] Token refresh failed:', error)
|
|
|
|
// Check if it's a 401 (invalid refresh token) vs other errors
|
|
if ((error as any)?.status === 401) {
|
|
console.log('[CUSTOM_AUTH] Refresh token invalid, clearing auth state')
|
|
user.value = null
|
|
authenticated.value = false
|
|
return false
|
|
}
|
|
|
|
// For other errors (network issues, 502, etc.), don't clear auth state immediately
|
|
// The auto-refresh plugin will handle retries
|
|
console.log('[CUSTOM_AUTH] Network error during refresh, keeping auth state')
|
|
return false
|
|
} finally {
|
|
refreshing.value = false
|
|
}
|
|
}
|
|
|
|
// Login with Keycloak
|
|
const login = () => {
|
|
const authUrl = 'https://auth.portnimara.dev/realms/client-portal/protocol/openid-connect/auth?' +
|
|
new URLSearchParams({
|
|
client_id: 'client-portal',
|
|
redirect_uri: 'https://client.portnimara.dev/api/auth/keycloak/callback',
|
|
response_type: 'code',
|
|
scope: 'openid profile email',
|
|
state: Math.random().toString(36).substring(2)
|
|
}).toString()
|
|
|
|
console.log('[CUSTOM_AUTH] Redirecting to Keycloak login:', authUrl)
|
|
navigateTo(authUrl, { external: true })
|
|
}
|
|
|
|
// Logout
|
|
const logout = async () => {
|
|
try {
|
|
console.log('[CUSTOM_AUTH] Initiating logout...')
|
|
// Clear local state immediately
|
|
user.value = null
|
|
authenticated.value = false
|
|
|
|
// Redirect to logout endpoint
|
|
await navigateTo('/api/auth/logout', { external: true })
|
|
} catch (error) {
|
|
console.error('[CUSTOM_AUTH] Logout failed:', error)
|
|
// Fallback: redirect to login
|
|
await navigateTo('/login')
|
|
}
|
|
}
|
|
|
|
// Initialize auth state on composable creation
|
|
onMounted(() => {
|
|
checkAuth()
|
|
})
|
|
|
|
return {
|
|
user: readonly(user),
|
|
authenticated: readonly(authenticated),
|
|
loading: readonly(loading),
|
|
refreshing: readonly(refreshing),
|
|
login,
|
|
logout,
|
|
checkAuth,
|
|
refreshToken
|
|
}
|
|
}
|