- Replace next-auth v5 beta with better-auth v1.6.2 (stable releases)
- Add multi-provider OAuth support with admin UI configuration
- New oauthProviders table with encrypted secrets (AES-256-GCM)
- Env var bootstrap (OAUTH_*) syncs to DB, UI-created providers fully editable
- OAuth provider REST API: GET/POST/PUT/DELETE /api/v1/oauth-providers
- Settings page "Authentication Providers" section for admin management
- Account linking uses new accounts table (multi-provider per user)
- Username plugin for credentials sign-in (replaces email@localhost pattern)
- bcrypt password compatibility (existing hashes work)
- Database-backed sessions via Kysely adapter (bun:sqlite direct)
- Configurable rate limiting via AUTH_RATE_LIMIT_* env vars
- All DB columns migrated from snake_case to camelCase
- All TypeScript types/models migrated to camelCase properties
- Removed casing: "snake_case" from Drizzle config
- Callback URL format: {baseUrl}/api/auth/oauth2/callback/{providerId}
- package-lock.json removed and gitignored (using bun.lock)
Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
61 lines
2.2 KiB
TypeScript
61 lines
2.2 KiB
TypeScript
"use server";
|
|
|
|
import { revalidatePath } from "next/cache";
|
|
import { requireAdmin } from "@/src/lib/auth";
|
|
import { createCertificate, deleteCertificate, updateCertificate } from "@/src/lib/models/certificates";
|
|
|
|
function parseDomains(value: FormDataEntryValue | null): string[] {
|
|
if (!value || typeof value !== "string") {
|
|
return [];
|
|
}
|
|
return value
|
|
.replace(/\n/g, ",")
|
|
.split(",")
|
|
.map((item) => item.trim())
|
|
.filter(Boolean);
|
|
}
|
|
|
|
export async function createCertificateAction(formData: FormData) {
|
|
const session = await requireAdmin();
|
|
const userId = Number(session.user.id);
|
|
const type = String(formData.get("type") ?? "managed") as "managed" | "imported";
|
|
await createCertificate(
|
|
{
|
|
name: String(formData.get("name") ?? "Certificate"),
|
|
type,
|
|
domainNames: parseDomains(formData.get("domain_names")),
|
|
autoRenew: type === "managed" ? formData.get("auto_renew") === "on" : false,
|
|
certificatePem: type === "imported" ? String(formData.get("certificate_pem") ?? "") : null,
|
|
privateKeyPem: type === "imported" ? String(formData.get("private_key_pem") ?? "") : null
|
|
},
|
|
userId
|
|
);
|
|
revalidatePath("/certificates");
|
|
}
|
|
|
|
export async function updateCertificateAction(id: number, formData: FormData) {
|
|
const session = await requireAdmin();
|
|
const userId = Number(session.user.id);
|
|
const type = formData.get("type") ? (String(formData.get("type")) as "managed" | "imported") : undefined;
|
|
await updateCertificate(
|
|
id,
|
|
{
|
|
name: formData.get("name") ? String(formData.get("name")) : undefined,
|
|
type,
|
|
domainNames: formData.get("domain_names") ? parseDomains(formData.get("domain_names")) : undefined,
|
|
autoRenew: formData.has("auto_renew_present") ? formData.get("auto_renew") === "on" : undefined,
|
|
certificatePem: formData.get("certificate_pem") ? String(formData.get("certificate_pem")) : undefined,
|
|
privateKeyPem: formData.get("private_key_pem") ? String(formData.get("private_key_pem")) : undefined
|
|
},
|
|
userId
|
|
);
|
|
revalidatePath("/certificates");
|
|
}
|
|
|
|
export async function deleteCertificateAction(id: number) {
|
|
const session = await requireAdmin();
|
|
const userId = Number(session.user.id);
|
|
await deleteCertificate(id, userId);
|
|
revalidatePath("/certificates");
|
|
}
|