Skip to content

Instantly share code, notes, and snippets.

@mbunge
Last active November 1, 2024 13:14
Show Gist options
  • Save mbunge/bb8e392dc8c6297c7695ffce4f158deb to your computer and use it in GitHub Desktop.
Save mbunge/bb8e392dc8c6297c7695ffce4f158deb to your computer and use it in GitHub Desktop.
authjs v5 with steam
const nextAuth = NextAuth(async req => ({
providers: [
SteamProvider(req, {
clientSecret: process.env.STEAM_SECRET!,
callbackUrl: `${process.env.BASE_URL}/api/auth/steamcallback`,
// Since steam is not providing a real email address don't configure this one
// allowDangerousEmailAccountLinking: true
}),
],
adapter: PrismaAdapterConfiguration(),
}));

Authjs v5 with steam

This is an evolved implementation of https://github.com/Nik-Novak/steam-next-auth to meet the latest requirements of [email protected].

The provider has been tested with node 20.17.0, nextjs@14, nextjs@15, react@18 and react@19. The versioning in changelock is the same as in authjs, so that changes can be accurately tracked.

If yopu have any questions just reach out in comments.

Dependencies

  • openid@^2.0.12

Files in my specific project:

  • SteamProvider.ts -> src/authjs-steam/SteamProvider.ts
  • route.ts -> src/app/api/auth/steamcallback/[provider]/route.ts
  • auth.ts -> src/auth.ts

Changes

5.0.0-beta-25.1

  • Replace node:crypto with uuid npm lib, because node:crypto is not compatible with next edge

Go to SteamProvider L4 and replace import { randomUUID } from "node:crypto"; with import { v4 as randomUUID } from "uuid";

5.0.0-beta-25

  • Use the built-in node crypto instead of the deprecated crypto.
  • Crush types, constants and provider into one file. This is not a recommended best practice, but allows fast updates because the steamprovider depends on authjs beta updates along with nextjs updates.
  • Update the required req of the SteamProvider from Request | NextRequest | NextApiRequest to NextRequest | undefined to match the NextAuth request types.
  • Check req is a valid request before executing logic in token.conform (L:99)
import { NextRequest } from "next/server";
type Params = { params: Promise<{ provider: string }> };
export async function GET(req: NextRequest, props: Params): Promise<Response> {
const params = await props.params;
const provider = params.provider;
if (params.provider !== "steam") {
throw new Error("This endpoint only allows steam!");
}
const { searchParams } = new URL(req.url);
//inject a fake code to comply with nextauth v5 requirements
searchParams.set("code", "steam-fake-token");
//this should be your normal nextauth callback url
return Response.redirect(
`${process.env.NEXTAUTH_URL}/api/auth/callback/${provider}?${searchParams.toString()}`,
);
}
export async function POST(): Promise<Response> {
return Response.json({ token: "steam-fake-token" }); //fake token endpoint
}
import type { NextApiRequest } from "next";
import type { OAuthConfig, OAuthUserConfig } from "next-auth/providers";
import type { NextRequest } from "next/server";
import { v4 as randomUUID } from "uuid";
import { RelyingParty } from "openid";
// types
export declare enum CommunityVisibilityState {
Private = 1,
Public = 3,
}
export declare enum PersonaState {
Offline = 0,
Online = 1,
Busy = 2,
Away = 3,
Snooze = 4,
LookingToTrade = 5,
LookingToPlay = 6,
}
export interface SteamProfile extends Record<string, any> {
steamid: string;
communityvisibilitystate: CommunityVisibilityState;
profilestate: number;
personaname: string;
profileurl: string;
avatar: string;
avatarmedium: string;
avatarfull: string;
avatarhash: string;
lastlogoff: number;
personastate: PersonaState;
primaryclanid: string;
timecreated: number;
personastateflags: number;
commentpermission: boolean;
}
export interface SteamProviderOptions extends Partial<OAuthUserConfig<SteamProfile>> {
/** @example 'https://example.com/api/auth/callback' */
callbackUrl: string | URL;
/** @example 'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx' */
clientSecret: string;
}
export type SteamProvider = (
req: Request | NextRequest | NextApiRequest,
options: SteamProviderOptions,
) => OAuthConfig<SteamProfile>;
// constants
export const PROVIDER_ID = "steam";
export const PROVIDER_NAME = "Steam";
export const EMAIL_DOMAIN = "steamcommunity.com";
export const LOGO_URL =
"https://raw.githubusercontent.com/Nekonyx/next-auth-steam/bc574bb62be70993c29f6f54c350bdf64205962a/logo/steam-icon-light.svg";
export const AUTHORIZATION_URL = "https://steamcommunity.com/openid/login";
// Provider
export default function SteamProvider(
req: NextRequest | undefined,
options: SteamProviderOptions,
): OAuthConfig<SteamProfile> {
if (!options.clientSecret || options.clientSecret.length < 1)
throw new Error(
"You have forgot to set your Steam API Key in the `clientSecret` option. Please visit https://steamcommunity.com/dev/apikey to get one.",
);
const callbackUrl = new URL(options.callbackUrl);
const realm = callbackUrl.origin;
const returnTo = `${callbackUrl.href}/${PROVIDER_ID}`;
return {
clientId: PROVIDER_ID,
clientSecret: options.clientSecret,
id: PROVIDER_ID,
name: PROVIDER_NAME,
type: "oauth",
style: {
logo: LOGO_URL,
brandColor: "#000",
},
checks: ["none"],
authorization: {
url: AUTHORIZATION_URL,
params: {
"openid.mode": "checkid_setup",
"openid.ns": "http://specs.openid.net/auth/2.0",
"openid.identity": "http://specs.openid.net/auth/2.0/identifier_select",
"openid.claimed_id": "http://specs.openid.net/auth/2.0/identifier_select",
"openid.return_to": returnTo,
"openid.realm": realm,
},
},
token: {
url: `${callbackUrl}/steam`,
async conform() {
if (undefined === req) {
throw new Error("SteamProvider relies on NextRequest");
}
if (!req.url) {
throw new Error("No URL found in request object");
}
const identifier = await verifyAssertion(req, realm, returnTo);
if (!identifier) {
throw new Error("Unauthenticated");
}
return Response.json({
access_token: randomUUID(),
steamId: identifier,
token_type: "Bearer",
});
},
},
userinfo: {
url: `${callbackUrl}/steam`,
async request(ctx: any) {
const url = new URL("https://api.steampowered.com/ISteamUser/GetPlayerSummaries/v0002");
url.searchParams.set("key", ctx.provider.clientSecret as string);
url.searchParams.set("steamids", ctx.tokens.steamId as string);
const response = await fetch(url);
const data = await response.json();
return data.response.players[0];
},
},
profile(profile: SteamProfile) {
// next.js can't serialize the session if email is missing or null, so I specify user ID
return {
id: profile.steamid,
image: profile.avatarfull,
email: `${profile.steamid}@${EMAIL_DOMAIN}`,
name: profile.personaname,
};
},
};
}
/**
* Verifies an assertion and returns the claimed identifier if authenticated, otherwise null.
*/
async function verifyAssertion(
req: Request | NextRequest | NextApiRequest,
realm: string,
returnTo: string,
): Promise<string | null> {
// Here and from here on out, much of the validation will be related to this PR: https://github.com/liamcurry/passport-steam/pull/120.
// And accordingly copy the logic from this library: https://github.com/liamcurry/passport-steam/blob/dcebba52d02ce2a12c7d27481490c4ee0bd1ae38/lib/passport-steam/strategy.js#L93
const IDENTIFIER_PATTERN = /^https?:\/\/steamcommunity\.com\/openid\/id\/(\d+)$/;
const OPENID_CHECK = {
ns: "http://specs.openid.net/auth/2.0",
claimed_id: "https://steamcommunity.com/openid/id/",
identity: "https://steamcommunity.com/openid/id/",
};
// We need to create a new URL object to parse the query string
// req.url in next@14 is an absolute url, but not in next@13, so example.com used as a base url
const url = new URL(req.url!, "https://example.com");
const query = Object.fromEntries(url.searchParams.entries());
if (query["openid.op_endpoint"] !== AUTHORIZATION_URL || query["openid.ns"] !== OPENID_CHECK.ns) {
return null;
}
if (!query["openid.claimed_id"]?.startsWith(OPENID_CHECK.claimed_id)) {
return null;
}
if (!query["openid.identity"]?.startsWith(OPENID_CHECK.identity)) {
return null;
}
const relyingParty = new RelyingParty(returnTo, realm, true, false, []);
const assertion: {
authenticated: boolean;
claimedIdentifier?: string | undefined;
} = await new Promise((resolve, reject) => {
relyingParty.verifyAssertion(req, (error: any, result: any) => {
if (error) {
reject(error);
}
resolve(result!);
});
});
if (!assertion.authenticated || !assertion.claimedIdentifier) {
return null;
}
const match = assertion.claimedIdentifier.match(IDENTIFIER_PATTERN);
if (!match) {
return null;
}
return match[1];
}
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment