- Add Redis-based sliding window rate limiting on login, register, forgot-password, reset-password - Fix user enumeration: register returns generic 200 for both new and existing emails - Add Redis authentication (requirepass) and password in .env - Docker network isolation: postgres/redis on internal-only network - Whitelist Stripe redirect origins (prevent open redirect) - Add 10MB request size limit on trace ingestion - Limit API keys to 10 per user - Add CORS headers via middleware (whitelist agentlens.vectry.tech + localhost) - Reduce JWT max age from 30 days to 7 days
74 lines
2.1 KiB
TypeScript
74 lines
2.1 KiB
TypeScript
import { NextResponse } from "next/server";
|
|
import { createHash } from "crypto";
|
|
import { hash } from "bcryptjs";
|
|
import { z } from "zod";
|
|
import { prisma } from "@/lib/prisma";
|
|
import { checkRateLimit, AUTH_RATE_LIMITS } from "@/lib/rate-limit";
|
|
|
|
const resetPasswordSchema = z.object({
|
|
token: z.string().min(1, "Token is required"),
|
|
password: z.string().min(8, "Password must be at least 8 characters"),
|
|
});
|
|
|
|
function hashToken(token: string): string {
|
|
return createHash("sha256").update(token).digest("hex");
|
|
}
|
|
|
|
export async function POST(request: Request) {
|
|
try {
|
|
const ip = request.headers.get("x-forwarded-for")?.split(",")[0]?.trim() ?? "unknown";
|
|
const rl = await checkRateLimit(`reset:${ip}`, AUTH_RATE_LIMITS.resetPassword);
|
|
if (!rl.allowed) {
|
|
return NextResponse.json(
|
|
{ error: "Too many attempts. Please try again later." },
|
|
{ status: 429, headers: { "Retry-After": String(Math.ceil((rl.resetAt - Date.now()) / 1000)) } }
|
|
);
|
|
}
|
|
|
|
const body: unknown = await request.json();
|
|
const parsed = resetPasswordSchema.safeParse(body);
|
|
|
|
if (!parsed.success) {
|
|
return NextResponse.json(
|
|
{ error: parsed.error.issues[0]?.message ?? "Invalid input" },
|
|
{ status: 400 }
|
|
);
|
|
}
|
|
|
|
const { token, password } = parsed.data;
|
|
const tokenHash = hashToken(token);
|
|
|
|
const resetToken = await prisma.passwordResetToken.findUnique({
|
|
where: { token: tokenHash },
|
|
include: { user: true },
|
|
});
|
|
|
|
if (!resetToken || resetToken.used || resetToken.expiresAt < new Date()) {
|
|
return NextResponse.json(
|
|
{ error: "Invalid or expired reset link" },
|
|
{ status: 400 }
|
|
);
|
|
}
|
|
|
|
const passwordHash = await hash(password, 12);
|
|
|
|
await prisma.$transaction([
|
|
prisma.user.update({
|
|
where: { id: resetToken.userId },
|
|
data: { passwordHash },
|
|
}),
|
|
prisma.passwordResetToken.update({
|
|
where: { id: resetToken.id },
|
|
data: { used: true },
|
|
}),
|
|
]);
|
|
|
|
return NextResponse.json({ success: true });
|
|
} catch {
|
|
return NextResponse.json(
|
|
{ error: "Internal server error" },
|
|
{ status: 500 }
|
|
);
|
|
}
|
|
}
|