@@ -144,7 +144,7 @@ const Adapter = (typeOrmConfig, options = {}) => {
144144 }
145145
146146 try {
147- return manager . findUnique ( User , { [ idKey ] : id } )
147+ return manager . findOne ( User , { [ idKey ] : id } )
148148 } catch ( error ) {
149149 logger . error ( 'GET_USER_BY_ID_ERROR' , error )
150150 return Promise . reject ( new Error ( 'GET_USER_BY_ID_ERROR' , error ) )
@@ -155,7 +155,7 @@ const Adapter = (typeOrmConfig, options = {}) => {
155155 debug ( 'GET_USER_BY_EMAIL' , email )
156156 try {
157157 if ( ! email ) { return Promise . resolve ( null ) }
158- return manager . findUnique ( User , { email } )
158+ return manager . findOne ( User , { email } )
159159 } catch ( error ) {
160160 logger . error ( 'GET_USER_BY_EMAIL_ERROR' , error )
161161 return Promise . reject ( new Error ( 'GET_USER_BY_EMAIL_ERROR' , error ) )
@@ -165,9 +165,9 @@ const Adapter = (typeOrmConfig, options = {}) => {
165165 async function getUserByProviderAccountId ( providerId , providerAccountId ) {
166166 debug ( 'GET_USER_BY_PROVIDER_ACCOUNT_ID' , providerId , providerAccountId )
167167 try {
168- const account = await manager . findUnique ( Account , { providerId, providerAccountId } )
168+ const account = await manager . findOne ( Account , { providerId, providerAccountId } )
169169 if ( ! account ) { return null }
170- return manager . findUnique ( User , { [ idKey ] : account . userId } )
170+ return manager . findOne ( User , { [ idKey ] : account . userId } )
171171 } catch ( error ) {
172172 logger . error ( 'GET_USER_BY_PROVIDER_ACCOUNT_ID_ERROR' , error )
173173 return Promise . reject ( new Error ( 'GET_USER_BY_PROVIDER_ACCOUNT_ID_ERROR' , error ) )
@@ -227,7 +227,7 @@ const Adapter = (typeOrmConfig, options = {}) => {
227227 async function getSession ( sessionToken ) {
228228 debug ( 'GET_SESSION' , sessionToken )
229229 try {
230- const session = await manager . findUnique ( Session , { sessionToken } )
230+ const session = await manager . findOne ( Session , { sessionToken } )
231231
232232 // Check session has not expired (do not return it if it has)
233233 if ( session && session . expires && new Date ( ) > new Date ( session . expires ) ) {
@@ -327,7 +327,7 @@ const Adapter = (typeOrmConfig, options = {}) => {
327327 // Hash token provided with secret before trying to match it with database
328328 // @TODO Use bcrypt instead of salted SHA-256 hash for token
329329 const hashedToken = createHash ( 'sha256' ) . update ( `${ token } ${ secret } ` ) . digest ( 'hex' )
330- const verificationRequest = await manager . findUnique ( VerificationRequest , { identifier, token : hashedToken } )
330+ const verificationRequest = await manager . findOne ( VerificationRequest , { identifier, token : hashedToken } )
331331
332332 if ( verificationRequest && verificationRequest . expires && new Date ( ) > new Date ( verificationRequest . expires ) ) {
333333 // Delete verification entry so it cannot be used again
0 commit comments