nextauthjs / next-auth

Authentication for the Web.
https://authjs.dev
ISC License
24.96k stars 3.52k forks source link

GetToken() not working in middleware.ts #10809

Closed SeaspaceAI closed 6 months ago

SeaspaceAI commented 6 months ago

Environment

  System:
    OS: Windows 10 10.0.19044
    CPU: (6) x64 AMD Ryzen 5 4500U with Radeon Graphics
    Memory: 1.48 GB / 7.37 GB
  Binaries:
    Node: 21.7.1 - C:\Program Files\nodejs\node.EXE
    Yarn: 1.22.19 - ~\AppData\Roaming\npm\yarn.CMD
    npm: 10.5.0 - C:\Program Files\nodejs\npm.CMD
    pnpm: 8.14.0 - ~\AppData\Roaming\npm\pnpm.CMD
  Browsers:
    Edge: Spartan (44.19041.1266.0), Chromium (123.0.2420.97)
    Internet Explorer: 11.0.19041.1566
  npmPackages:
    @auth/drizzle-adapter: ^1.0.1 => 1.0.1
    next: 14.2.3 => 14.2.3
    next-auth: ^5.0.0-beta.17 => 5.0.0-beta.17
    react: ^18.3.1 => 18.3.1

Reproduction URL

https://github.com/nextauthjs/next-auth-example/blob/main/middleware.ts#L10

Describe the issue

I'm trying to implement middleware in Next.js with the use of getToken() in middleware.ts. I'm not able to get the session token info although I'm able to authenticate normally and fetch the session in server and client components and also I can see the authjs.session-token in cookies. Instead of decrypting it myself it would be great if getToken() worked. And also I'm getting an error if I do not specify salt but that's of minor concern.

Also, I can not use proposed way of creating the middlaware.ts from docs with Drizzle Adapter because I get the following error:

Error: The edge runtime does not support Node.js 'crypto' module.
Learn More: https://nextjs.org/docs/messages/node-module-in-edge-runtime

That's because Drizzle with pg uses crypto

How to reproduce

This is my code:

middleware.ts
import { getToken } from "next-auth/jwt";
import { NextRequest, NextResponse } from "next/server";

export async function middleware(req: NextRequest) {

  const { pathname, origin } = req.nextUrl;

  const token = await getToken({ 
    req,
    secret: process.env.NEXTAUTH_SECRET! as string,
    salt: ''
  })

  console.log("token inside middleware: ", token) // response is null

   if (pathname == "/") {
     if (!session) {
       return NextResponse.redirect(`${process.env.NEXTAUTH_URL}/auth`);
     }
   }

  if (pathname == "/auth") {
    if (session) return NextResponse.redirect(`${origin}`);
  }
}

Expected behavior

Get the session token value

github-actions[bot] commented 6 months ago

We could not detect a valid reproduction link. Make sure to follow the bug report template carefully.

Why was this issue closed?

To be able to investigate, we need access to a reproduction to identify what triggered the issue. We need a link to a public GitHub repository. Example: (NextAuth.js example repository).

The bug template that you filled out has a section called "Reproduction URL", which is where you should provide the link to the reproduction.

What should I do?

Depending on the reason the issue was closed, you can do the following:

In general, assume that we should not go through a lengthy onboarding process at your company code only to be able to verify an issue.

My repository is private and cannot make it public

In most cases, a private repo will not be a sufficient minimal reproduction, as this codebase might contain a lot of unrelated parts that would make our investigation take longer. Please do not make it public. Instead, create a new repository using the templates above, adding the relevant code to reproduce the issue. Common things to look out for:

I did not open this issue, but it is relevant to me, what can I do to help?

Anyone experiencing the same issue is welcome to provide a minimal reproduction following the above steps by opening a new issue.

I think my reproduction is good enough, why aren't you looking into it quickly?

We look into every issue and monitor open issues for new comments.

However, sometimes we might miss a few due to the popularity/high traffic of the repository. We apologize, and kindly ask you to refrain from tagging core maintainers, as that will usually not result in increased priority.

Upvoting issues to show your interest will help us prioritize and address them as quickly as possible. That said, every issue is important to us, and if an issue gets closed by accident, we encourage you to open a new one linking to the old issue and we will look into it.

Useful Resources