- Replace next-auth v5 beta with better-auth v1.6.2 (stable releases)
- Add multi-provider OAuth support with admin UI configuration
- New oauthProviders table with encrypted secrets (AES-256-GCM)
- Env var bootstrap (OAUTH_*) syncs to DB, UI-created providers fully editable
- OAuth provider REST API: GET/POST/PUT/DELETE /api/v1/oauth-providers
- Settings page "Authentication Providers" section for admin management
- Account linking uses new accounts table (multi-provider per user)
- Username plugin for credentials sign-in (replaces email@localhost pattern)
- bcrypt password compatibility (existing hashes work)
- Database-backed sessions via Kysely adapter (bun:sqlite direct)
- Configurable rate limiting via AUTH_RATE_LIMIT_* env vars
- All DB columns migrated from snake_case to camelCase
- All TypeScript types/models migrated to camelCase properties
- Removed casing: "snake_case" from Drizzle config
- Callback URL format: {baseUrl}/api/auth/oauth2/callback/{providerId}
- package-lock.json removed and gitignored (using bun.lock)
Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
121 lines
3.5 KiB
TypeScript
121 lines
3.5 KiB
TypeScript
import { NextRequest, NextResponse } from "next/server";
|
|
import { requireApiAdmin, apiErrorResponse } from "@/src/lib/api-auth";
|
|
import { getOAuthProvider, updateOAuthProvider, deleteOAuthProvider } from "@/src/lib/models/oauth-providers";
|
|
import type { OAuthProvider } from "@/src/lib/models/oauth-providers";
|
|
import { createAuditEvent } from "@/src/lib/models/audit";
|
|
import { invalidateProviderCache } from "@/src/lib/auth-server";
|
|
|
|
function redactSecrets(provider: OAuthProvider) {
|
|
const clientId = provider.clientId;
|
|
return {
|
|
...provider,
|
|
clientId: clientId.length > 4 ? "••••" + clientId.slice(-4) : "••••",
|
|
clientSecret: "••••••••",
|
|
};
|
|
}
|
|
|
|
export async function GET(
|
|
request: NextRequest,
|
|
{ params }: { params: Promise<{ id: string }> }
|
|
) {
|
|
try {
|
|
await requireApiAdmin(request);
|
|
const { id } = await params;
|
|
const provider = await getOAuthProvider(id);
|
|
if (!provider) {
|
|
return NextResponse.json({ error: "Not found" }, { status: 404 });
|
|
}
|
|
return NextResponse.json(redactSecrets(provider));
|
|
} catch (error) {
|
|
return apiErrorResponse(error);
|
|
}
|
|
}
|
|
|
|
export async function PUT(
|
|
request: NextRequest,
|
|
{ params }: { params: Promise<{ id: string }> }
|
|
) {
|
|
try {
|
|
const { userId } = await requireApiAdmin(request);
|
|
const { id } = await params;
|
|
const body = await request.json();
|
|
|
|
const existing = await getOAuthProvider(id);
|
|
if (!existing) {
|
|
return NextResponse.json({ error: "Not found" }, { status: 404 });
|
|
}
|
|
|
|
// Env-sourced providers can only have `enabled` toggled
|
|
if (existing.source === "env") {
|
|
const allowedKeys = ["enabled"];
|
|
const bodyKeys = Object.keys(body).filter((k) => body[k] !== undefined);
|
|
const disallowed = bodyKeys.filter((k) => !allowedKeys.includes(k));
|
|
if (disallowed.length > 0) {
|
|
return NextResponse.json(
|
|
{ error: `Environment-sourced providers can only update: ${allowedKeys.join(", ")}` },
|
|
{ status: 400 }
|
|
);
|
|
}
|
|
}
|
|
|
|
const updated = await updateOAuthProvider(id, body);
|
|
if (!updated) {
|
|
return NextResponse.json({ error: "Not found" }, { status: 404 });
|
|
}
|
|
|
|
invalidateProviderCache();
|
|
|
|
await createAuditEvent({
|
|
userId,
|
|
action: "update",
|
|
entityType: "oauth_provider",
|
|
entityId: null,
|
|
summary: `Updated OAuth provider "${updated.name}"`,
|
|
data: JSON.stringify({ providerId: updated.id, fields: Object.keys(body) }),
|
|
});
|
|
|
|
return NextResponse.json(redactSecrets(updated));
|
|
} catch (error) {
|
|
return apiErrorResponse(error);
|
|
}
|
|
}
|
|
|
|
export async function DELETE(
|
|
request: NextRequest,
|
|
{ params }: { params: Promise<{ id: string }> }
|
|
) {
|
|
try {
|
|
const { userId } = await requireApiAdmin(request);
|
|
const { id } = await params;
|
|
|
|
const existing = await getOAuthProvider(id);
|
|
if (!existing) {
|
|
return NextResponse.json({ error: "Not found" }, { status: 404 });
|
|
}
|
|
|
|
if (existing.source === "env") {
|
|
return NextResponse.json(
|
|
{ error: "Cannot delete an environment-sourced OAuth provider" },
|
|
{ status: 400 }
|
|
);
|
|
}
|
|
|
|
await deleteOAuthProvider(id);
|
|
|
|
invalidateProviderCache();
|
|
|
|
await createAuditEvent({
|
|
userId,
|
|
action: "delete",
|
|
entityType: "oauth_provider",
|
|
entityId: null,
|
|
summary: `Deleted OAuth provider "${existing.name}"`,
|
|
data: JSON.stringify({ providerId: existing.id, name: existing.name }),
|
|
});
|
|
|
|
return NextResponse.json({ ok: true });
|
|
} catch (error) {
|
|
return apiErrorResponse(error);
|
|
}
|
|
}
|