Files
caddy-proxy-manager/app/api/forward-auth/login/route.ts
akanealw 99819b70ff
Some checks failed
Build and Push Docker Images (Trusted) / build-and-push (., docker/caddy/Dockerfile, caddy) (push) Has been cancelled
Build and Push Docker Images (Trusted) / build-and-push (., docker/l4-port-manager/Dockerfile, l4-port-manager) (push) Has been cancelled
Build and Push Docker Images (Trusted) / build-and-push (., docker/web/Dockerfile, web) (push) Has been cancelled
Tests / test (push) Has been cancelled
added caddy-proxy-manager for testing
2026-04-21 22:49:08 +00:00

131 lines
4.8 KiB
TypeScript
Executable File

import { NextRequest, NextResponse } from "next/server";
import bcrypt from "bcryptjs";
import db from "@/src/lib/db";
import { config } from "@/src/lib/config";
import {
createForwardAuthSession,
createExchangeCode,
checkHostAccessByDomain,
consumeRedirectIntent
} from "@/src/lib/models/forward-auth";
import { logAuditEvent } from "@/src/lib/audit";
import { isRateLimited, registerFailedAttempt, resetAttempts } from "@/src/lib/rate-limit";
/**
* Forward auth login endpoint — validates credentials and starts the exchange flow.
* Called by the portal login form with an opaque redirect intent ID (rid).
*/
export async function POST(request: NextRequest) {
try {
// CSRF: verify the request originates from the CPM portal
const origin = request.headers.get("origin");
const baseOrigin = new URL(config.baseUrl).origin;
if (!origin || origin !== baseOrigin) {
return NextResponse.json({ error: "Forbidden" }, { status: 403 });
}
const body = await request.json();
const username = typeof body.username === "string" ? body.username.trim() : "";
const password = typeof body.password === "string" ? body.password : "";
const rid = typeof body.rid === "string" ? body.rid : "";
if (!username || !password) {
return NextResponse.json({ error: "Username and password are required" }, { status: 400 });
}
if (!rid) {
return NextResponse.json({ error: "Missing redirect intent" }, { status: 400 });
}
// Rate limiting — prefer x-real-ip (set by reverse proxy) over x-forwarded-for
const ip =
request.headers.get("x-real-ip")?.trim() ||
request.headers.get("x-forwarded-for")?.split(",").pop()?.trim() ||
"unknown";
const rateLimitResult = isRateLimited(ip);
if (rateLimitResult.blocked) {
return NextResponse.json(
{ error: "Too many login attempts. Please try again later." },
{ status: 429 }
);
}
// Authenticate using the same logic as the credentials provider
const email = `${username}@localhost`;
const user = await db.query.users.findFirst({
where: (table, operators) => operators.eq(table.email, email)
});
if (!user || user.status !== "active" || !user.passwordHash) {
registerFailedAttempt(ip);
logAuditEvent({
userId: null,
action: "forward_auth_login_failed",
entityType: "user",
summary: `Forward auth login failed for username: ${username}`
});
return NextResponse.json({ error: "Invalid credentials" }, { status: 401 });
}
const isValid = await bcrypt.compare(password, user.passwordHash);
if (!isValid) {
registerFailedAttempt(ip);
logAuditEvent({
userId: user.id,
action: "forward_auth_login_failed",
entityType: "user",
entityId: user.id,
summary: `Forward auth login failed for user ${user.email}`
});
return NextResponse.json({ error: "Invalid credentials" }, { status: 401 });
}
// Successful credential check — reset rate limiter for this IP
resetAttempts(ip);
// Consume the redirect intent — returns the server-stored redirect URI.
// This is a one-time operation: the intent is deleted after consumption.
const redirectUri = await consumeRedirectIntent(rid);
if (!redirectUri) {
return NextResponse.json({ error: "Invalid or expired redirect intent. Please try again." }, { status: 400 });
}
const targetUrl = new URL(redirectUri);
// Check if user has access to the target host
const { hasAccess } = await checkHostAccessByDomain(user.id, targetUrl.hostname);
if (!hasAccess) {
logAuditEvent({
userId: user.id,
action: "forward_auth_access_denied",
entityType: "proxy_host",
summary: `Forward auth access denied for user ${user.email} to host ${targetUrl.hostname}`
});
return NextResponse.json(
{ error: "You do not have access to this application." },
{ status: 403 }
);
}
// Create session and exchange code
const { session } = await createForwardAuthSession(user.id);
const { rawCode } = await createExchangeCode(session.id, redirectUri);
logAuditEvent({
userId: user.id,
action: "forward_auth_login",
entityType: "user",
entityId: user.id,
summary: `Forward auth login for user ${user.email} to ${targetUrl.hostname}`
});
// Build callback URL on the target domain
const callbackUrl = new URL("/.cpm-auth/callback", targetUrl.origin);
callbackUrl.searchParams.set("code", rawCode);
return NextResponse.json({ redirectTo: callbackUrl.toString() });
} catch (error) {
console.error("Forward auth login error:", error);
return NextResponse.json({ error: "Internal server error" }, { status: 500 });
}
}