- Replace next-auth v5 beta with better-auth v1.6.2 (stable releases)
- Add multi-provider OAuth support with admin UI configuration
- New oauthProviders table with encrypted secrets (AES-256-GCM)
- Env var bootstrap (OAUTH_*) syncs to DB, UI-created providers fully editable
- OAuth provider REST API: GET/POST/PUT/DELETE /api/v1/oauth-providers
- Settings page "Authentication Providers" section for admin management
- Account linking uses new accounts table (multi-provider per user)
- Username plugin for credentials sign-in (replaces email@localhost pattern)
- bcrypt password compatibility (existing hashes work)
- Database-backed sessions via Kysely adapter (bun:sqlite direct)
- Configurable rate limiting via AUTH_RATE_LIMIT_* env vars
- All DB columns migrated from snake_case to camelCase
- All TypeScript types/models migrated to camelCase properties
- Removed casing: "snake_case" from Drizzle config
- Callback URL format: {baseUrl}/api/auth/oauth2/callback/{providerId}
- package-lock.json removed and gitignored (using bun.lock)
Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
111 lines
3.6 KiB
TypeScript
111 lines
3.6 KiB
TypeScript
import { NextRequest, NextResponse } from "next/server";
|
|
import { auth, checkSameOrigin } from "@/src/lib/auth";
|
|
import { getUserById, updateUserPassword } from "@/src/lib/models/user";
|
|
import { createAuditEvent } from "@/src/lib/models/audit";
|
|
import { isRateLimited, registerFailedAttempt, resetAttempts } from "@/src/lib/rate-limit";
|
|
import bcrypt from "bcryptjs";
|
|
|
|
export async function POST(request: NextRequest) {
|
|
const originCheck = checkSameOrigin(request);
|
|
if (originCheck) return originCheck;
|
|
|
|
try {
|
|
const session = await auth();
|
|
if (!session?.user?.id) {
|
|
return NextResponse.json({ error: "Unauthorized" }, { status: 401 });
|
|
}
|
|
|
|
// Rate limit password change attempts to prevent brute-forcing current password
|
|
const rateLimitKey = `password-change:${session.user.id}`;
|
|
const rateCheck = isRateLimited(rateLimitKey);
|
|
if (rateCheck.blocked) {
|
|
return NextResponse.json(
|
|
{ error: "Too many attempts. Please try again later." },
|
|
{ status: 429, headers: rateCheck.retryAfterMs ? { "Retry-After": String(Math.ceil(rateCheck.retryAfterMs / 1000)) } : undefined }
|
|
);
|
|
}
|
|
|
|
const body = await request.json();
|
|
const { currentPassword, newPassword } = body;
|
|
|
|
// Enforce password complexity matching production admin password requirements
|
|
if (!newPassword || newPassword.length < 12) {
|
|
return NextResponse.json(
|
|
{ error: "New password must be at least 12 characters long" },
|
|
{ status: 400 }
|
|
);
|
|
}
|
|
const complexityErrors: string[] = [];
|
|
if (!/[A-Z]/.test(newPassword) || !/[a-z]/.test(newPassword)) {
|
|
complexityErrors.push("must include both uppercase and lowercase letters");
|
|
}
|
|
if (!/[0-9]/.test(newPassword)) {
|
|
complexityErrors.push("must include at least one number");
|
|
}
|
|
if (!/[^A-Za-z0-9]/.test(newPassword)) {
|
|
complexityErrors.push("must include at least one special character");
|
|
}
|
|
if (complexityErrors.length > 0) {
|
|
return NextResponse.json(
|
|
{ error: `Password ${complexityErrors.join(", ")}` },
|
|
{ status: 400 }
|
|
);
|
|
}
|
|
|
|
const userId = Number(session.user.id);
|
|
const user = await getUserById(userId);
|
|
|
|
if (!user) {
|
|
return NextResponse.json({ error: "User not found" }, { status: 404 });
|
|
}
|
|
|
|
// If user has a password, verify current password
|
|
if (user.passwordHash) {
|
|
if (!currentPassword) {
|
|
return NextResponse.json(
|
|
{ error: "Current password is required" },
|
|
{ status: 400 }
|
|
);
|
|
}
|
|
|
|
const isValid = bcrypt.compareSync(currentPassword, user.passwordHash);
|
|
if (!isValid) {
|
|
registerFailedAttempt(rateLimitKey);
|
|
return NextResponse.json(
|
|
{ error: "Current password is incorrect" },
|
|
{ status: 401 }
|
|
);
|
|
}
|
|
}
|
|
|
|
// Password verified successfully — reset rate limit counter
|
|
resetAttempts(rateLimitKey);
|
|
|
|
// Hash new password
|
|
const newPasswordHash = bcrypt.hashSync(newPassword, 12);
|
|
|
|
// Update password
|
|
await updateUserPassword(userId, newPasswordHash);
|
|
|
|
// Audit log
|
|
await createAuditEvent({
|
|
userId,
|
|
action: user.passwordHash ? "password_changed" : "password_set",
|
|
entityType: "user",
|
|
entityId: userId,
|
|
summary: user.passwordHash ? "User changed their password" : "User set a password",
|
|
});
|
|
|
|
return NextResponse.json({
|
|
success: true,
|
|
message: "Password updated successfully"
|
|
});
|
|
} catch (error) {
|
|
console.error("Password change error:", error);
|
|
return NextResponse.json(
|
|
{ error: "Failed to change password" },
|
|
{ status: 500 }
|
|
);
|
|
}
|
|
}
|