@@ -144,7 +144,7 @@ const Adapter = (typeOrmConfig, options = {}) => {
144
144
}
145
145
146
146
try {
147
- return manager . findOne ( User , { [ idKey ] : id } )
147
+ return manager . findUnique ( User , { [ idKey ] : id } )
148
148
} catch ( error ) {
149
149
logger . error ( 'GET_USER_BY_ID_ERROR' , error )
150
150
return Promise . reject ( new Error ( 'GET_USER_BY_ID_ERROR' , error ) )
@@ -155,7 +155,7 @@ const Adapter = (typeOrmConfig, options = {}) => {
155
155
debug ( 'GET_USER_BY_EMAIL' , email )
156
156
try {
157
157
if ( ! email ) { return Promise . resolve ( null ) }
158
- return manager . findOne ( User , { email } )
158
+ return manager . findUnique ( User , { email } )
159
159
} catch ( error ) {
160
160
logger . error ( 'GET_USER_BY_EMAIL_ERROR' , error )
161
161
return Promise . reject ( new Error ( 'GET_USER_BY_EMAIL_ERROR' , error ) )
@@ -165,9 +165,9 @@ const Adapter = (typeOrmConfig, options = {}) => {
165
165
async function getUserByProviderAccountId ( providerId , providerAccountId ) {
166
166
debug ( 'GET_USER_BY_PROVIDER_ACCOUNT_ID' , providerId , providerAccountId )
167
167
try {
168
- const account = await manager . findOne ( Account , { providerId, providerAccountId } )
168
+ const account = await manager . findUnique ( Account , { providerId, providerAccountId } )
169
169
if ( ! account ) { return null }
170
- return manager . findOne ( User , { [ idKey ] : account . userId } )
170
+ return manager . findUnique ( User , { [ idKey ] : account . userId } )
171
171
} catch ( error ) {
172
172
logger . error ( 'GET_USER_BY_PROVIDER_ACCOUNT_ID_ERROR' , error )
173
173
return Promise . reject ( new Error ( 'GET_USER_BY_PROVIDER_ACCOUNT_ID_ERROR' , error ) )
@@ -227,7 +227,7 @@ const Adapter = (typeOrmConfig, options = {}) => {
227
227
async function getSession ( sessionToken ) {
228
228
debug ( 'GET_SESSION' , sessionToken )
229
229
try {
230
- const session = await manager . findOne ( Session , { sessionToken } )
230
+ const session = await manager . findUnique ( Session , { sessionToken } )
231
231
232
232
// Check session has not expired (do not return it if it has)
233
233
if ( session && session . expires && new Date ( ) > new Date ( session . expires ) ) {
@@ -327,7 +327,7 @@ const Adapter = (typeOrmConfig, options = {}) => {
327
327
// Hash token provided with secret before trying to match it with database
328
328
// @TODO Use bcrypt instead of salted SHA-256 hash for token
329
329
const hashedToken = createHash ( 'sha256' ) . update ( `${ token } ${ secret } ` ) . digest ( 'hex' )
330
- const verificationRequest = await manager . findOne ( VerificationRequest , { identifier, token : hashedToken } )
330
+ const verificationRequest = await manager . findUnique ( VerificationRequest , { identifier, token : hashedToken } )
331
331
332
332
if ( verificationRequest && verificationRequest . expires && new Date ( ) > new Date ( verificationRequest . expires ) ) {
333
333
// Delete verification entry so it cannot be used again
0 commit comments