feat(#4): Implement Authentik OIDC authentication with BetterAuth

- Integrated BetterAuth library for modern authentication
- Added Session, Account, and Verification database tables
- Created complete auth module with service, controller, guards, and decorators
- Implemented shared authentication types in @mosaic/shared package
- Added comprehensive test coverage (26 tests passing)
- Documented type sharing strategy for monorepo
- Updated environment configuration with OIDC and JWT settings

Key architectural decisions:
- BetterAuth over Passport.js for better TypeScript support
- Separation of User (DB entity) vs AuthUser (client-safe subset)
- Shared types package to prevent FE/BE drift
- Factory pattern for auth config to use shared Prisma instance

Ready for frontend integration (Issue #6).

Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>

Fixes #4
This commit is contained in:
Jason Woltje
2026-01-28 17:26:34 -06:00
parent 139a16648d
commit 6a038d093b
22 changed files with 2616 additions and 7 deletions

View File

@@ -32,10 +32,12 @@
"@nestjs/core": "^11.1.12",
"@nestjs/platform-express": "^11.1.12",
"@prisma/client": "^6.19.2",
"better-auth": "^1.4.17",
"reflect-metadata": "^0.2.2",
"rxjs": "^7.8.1"
},
"devDependencies": {
"@better-auth/cli": "^1.4.17",
"@mosaic/config": "workspace:*",
"@nestjs/cli": "^11.0.6",
"@nestjs/schematics": "^11.0.1",
@@ -43,6 +45,7 @@
"@swc/core": "^1.10.18",
"@types/express": "^5.0.1",
"@types/node": "^22.13.4",
"express": "^5.2.1",
"prisma": "^6.19.2",
"tsx": "^4.21.0",
"typescript": "^5.8.2",

View File

@@ -70,6 +70,8 @@ model User {
id String @id @default(uuid()) @db.Uuid
email String @unique
name String
emailVerified Boolean @default(false) @map("email_verified")
image String?
authProviderId String? @unique @map("auth_provider_id")
preferences Json @default("{}")
createdAt DateTime @default(now()) @map("created_at") @db.Timestamptz
@@ -83,6 +85,8 @@ model User {
createdEvents Event[] @relation("EventCreator")
createdProjects Project[] @relation("ProjectCreator")
activityLogs ActivityLog[]
sessions Session[]
accounts Account[]
@@map("users")
}
@@ -251,3 +255,60 @@ model MemoryEmbedding {
@@index([workspaceId])
@@map("memory_embeddings")
}
// ============================================
// AUTHENTICATION MODELS (BetterAuth)
// ============================================
model Session {
id String @id @default(uuid()) @db.Uuid
userId String @map("user_id") @db.Uuid
token String @unique
expiresAt DateTime @map("expires_at") @db.Timestamptz
ipAddress String? @map("ip_address")
userAgent String? @map("user_agent")
createdAt DateTime @default(now()) @map("created_at") @db.Timestamptz
updatedAt DateTime @updatedAt @map("updated_at") @db.Timestamptz
// Relations
user User @relation(fields: [userId], references: [id], onDelete: Cascade)
@@index([userId])
@@index([token])
@@map("sessions")
}
model Account {
id String @id @default(uuid()) @db.Uuid
userId String @map("user_id") @db.Uuid
accountId String @map("account_id")
providerId String @map("provider_id")
accessToken String? @map("access_token")
refreshToken String? @map("refresh_token")
idToken String? @map("id_token")
accessTokenExpiresAt DateTime? @map("access_token_expires_at") @db.Timestamptz
refreshTokenExpiresAt DateTime? @map("refresh_token_expires_at") @db.Timestamptz
scope String?
password String?
createdAt DateTime @default(now()) @map("created_at") @db.Timestamptz
updatedAt DateTime @updatedAt @map("updated_at") @db.Timestamptz
// Relations
user User @relation(fields: [userId], references: [id], onDelete: Cascade)
@@unique([providerId, accountId])
@@index([userId])
@@map("accounts")
}
model Verification {
id String @id @default(uuid()) @db.Uuid
identifier String
value String
expiresAt DateTime @map("expires_at") @db.Timestamptz
createdAt DateTime @default(now()) @map("created_at") @db.Timestamptz
updatedAt DateTime @updatedAt @map("updated_at") @db.Timestamptz
@@index([identifier])
@@map("verifications")
}

View File

@@ -3,9 +3,10 @@ import { AppController } from "./app.controller";
import { AppService } from "./app.service";
import { PrismaModule } from "./prisma/prisma.module";
import { DatabaseModule } from "./database/database.module";
import { AuthModule } from "./auth/auth.module";
@Module({
imports: [PrismaModule, DatabaseModule],
imports: [PrismaModule, DatabaseModule, AuthModule],
controllers: [AppController],
providers: [AppService],
})

View File

@@ -0,0 +1,24 @@
import { betterAuth } from "better-auth";
import { prismaAdapter } from "better-auth/adapters/prisma";
import type { PrismaClient } from "@prisma/client";
export function createAuth(prisma: PrismaClient) {
return betterAuth({
database: prismaAdapter(prisma, {
provider: "postgresql",
}),
emailAndPassword: {
enabled: true, // Enable for now, can be disabled later
},
session: {
expiresIn: 60 * 60 * 24, // 24 hours
updateAge: 60 * 60 * 24, // 24 hours
},
trustedOrigins: [
process.env.NEXT_PUBLIC_APP_URL || "http://localhost:3000",
"http://localhost:3001", // API origin
],
});
}
export type Auth = ReturnType<typeof createAuth>;

View File

@@ -0,0 +1,66 @@
import { describe, it, expect, beforeEach, vi } from "vitest";
import { Test, TestingModule } from "@nestjs/testing";
import type { AuthUser } from "@mosaic/shared";
import { AuthController } from "./auth.controller";
import { AuthService } from "./auth.service";
describe("AuthController", () => {
let controller: AuthController;
let authService: AuthService;
const mockAuthService = {
getAuth: vi.fn(),
};
beforeEach(async () => {
const module: TestingModule = await Test.createTestingModule({
controllers: [AuthController],
providers: [
{
provide: AuthService,
useValue: mockAuthService,
},
],
}).compile();
controller = module.get<AuthController>(AuthController);
authService = module.get<AuthService>(AuthService);
vi.clearAllMocks();
});
describe("handleAuth", () => {
it("should call BetterAuth handler", async () => {
const mockHandler = vi.fn().mockResolvedValue({ status: 200 });
mockAuthService.getAuth.mockReturnValue({ handler: mockHandler });
const mockRequest = {
method: "GET",
url: "/auth/session",
};
await controller.handleAuth(mockRequest);
expect(mockAuthService.getAuth).toHaveBeenCalled();
expect(mockHandler).toHaveBeenCalledWith(mockRequest);
});
});
describe("getProfile", () => {
it("should return user profile", () => {
const mockUser: AuthUser = {
id: "user-123",
email: "test@example.com",
name: "Test User",
};
const result = controller.getProfile(mockUser);
expect(result).toEqual({
id: mockUser.id,
email: mockUser.email,
name: mockUser.name,
});
});
});
});

View File

@@ -0,0 +1,42 @@
import { Controller, All, Req, Get, UseGuards } from "@nestjs/common";
import type { AuthUser } from "@mosaic/shared";
import { AuthService } from "./auth.service";
import { AuthGuard } from "./guards/auth.guard";
import { CurrentUser } from "./decorators/current-user.decorator";
@Controller("auth")
export class AuthController {
constructor(private readonly authService: AuthService) {}
/**
* Handle all BetterAuth routes
* BetterAuth provides built-in handlers for:
* - /auth/sign-in
* - /auth/sign-up
* - /auth/sign-out
* - /auth/callback/authentik
* - /auth/session
* etc.
*
* Note: BetterAuth expects a Fetch API-compatible Request object.
* NestJS converts the incoming Express request to be compatible at runtime.
*/
@All("*")
async handleAuth(@Req() req: Request) {
const auth = this.authService.getAuth();
return auth.handler(req);
}
/**
* Get current user profile (protected route example)
*/
@Get("profile")
@UseGuards(AuthGuard)
getProfile(@CurrentUser() user: AuthUser) {
return {
id: user.id,
email: user.email,
name: user.name,
};
}
}

View File

@@ -0,0 +1,13 @@
import { Module } from "@nestjs/common";
import { PrismaModule } from "../prisma/prisma.module";
import { AuthService } from "./auth.service";
import { AuthController } from "./auth.controller";
import { AuthGuard } from "./guards/auth.guard";
@Module({
imports: [PrismaModule],
controllers: [AuthController],
providers: [AuthService, AuthGuard],
exports: [AuthService, AuthGuard],
})
export class AuthModule {}

View File

@@ -0,0 +1,141 @@
import { describe, it, expect, beforeEach, vi } from "vitest";
import { Test, TestingModule } from "@nestjs/testing";
import { AuthService } from "./auth.service";
import { PrismaService } from "../prisma/prisma.service";
describe("AuthService", () => {
let service: AuthService;
let prisma: PrismaService;
const mockPrismaService = {
user: {
findUnique: vi.fn(),
},
};
beforeEach(async () => {
const module: TestingModule = await Test.createTestingModule({
providers: [
AuthService,
{
provide: PrismaService,
useValue: mockPrismaService,
},
],
}).compile();
service = module.get<AuthService>(AuthService);
prisma = module.get<PrismaService>(PrismaService);
vi.clearAllMocks();
});
describe("getAuth", () => {
it("should return BetterAuth instance", () => {
const auth = service.getAuth();
expect(auth).toBeDefined();
expect(auth.handler).toBeDefined();
});
});
describe("getUserById", () => {
const mockUser = {
id: "user-123",
email: "test@example.com",
name: "Test User",
authProviderId: "auth-123",
};
it("should get user by ID", async () => {
mockPrismaService.user.findUnique.mockResolvedValue(mockUser);
const result = await service.getUserById("user-123");
expect(result).toEqual(mockUser);
expect(mockPrismaService.user.findUnique).toHaveBeenCalledWith({
where: { id: "user-123" },
select: {
id: true,
email: true,
name: true,
authProviderId: true,
},
});
});
});
describe("getUserByEmail", () => {
const mockUser = {
id: "user-123",
email: "test@example.com",
name: "Test User",
authProviderId: "auth-123",
};
it("should get user by email", async () => {
mockPrismaService.user.findUnique.mockResolvedValue(mockUser);
const result = await service.getUserByEmail("test@example.com");
expect(result).toEqual(mockUser);
expect(mockPrismaService.user.findUnique).toHaveBeenCalledWith({
where: { email: "test@example.com" },
select: {
id: true,
email: true,
name: true,
authProviderId: true,
},
});
});
});
describe("verifySession", () => {
const mockSessionData = {
user: {
id: "user-123",
email: "test@example.com",
name: "Test User",
},
session: {
id: "session-123",
token: "test-token",
},
};
it("should return session data for valid token", async () => {
const auth = service.getAuth();
const mockGetSession = vi.fn().mockResolvedValue(mockSessionData);
auth.api = { getSession: mockGetSession } as any;
const result = await service.verifySession("valid-token");
expect(result).toEqual(mockSessionData);
expect(mockGetSession).toHaveBeenCalledWith({
headers: {
authorization: "Bearer valid-token",
},
});
});
it("should return null for invalid session", async () => {
const auth = service.getAuth();
const mockGetSession = vi.fn().mockResolvedValue(null);
auth.api = { getSession: mockGetSession } as any;
const result = await service.verifySession("invalid-token");
expect(result).toBeNull();
});
it("should return null and log error on verification failure", async () => {
const auth = service.getAuth();
const mockGetSession = vi.fn().mockRejectedValue(new Error("Verification failed"));
auth.api = { getSession: mockGetSession } as any;
const result = await service.verifySession("error-token");
expect(result).toBeNull();
});
});
});

View File

@@ -0,0 +1,82 @@
import { Injectable, Logger } from "@nestjs/common";
import type { PrismaClient } from "@prisma/client";
import { PrismaService } from "../prisma/prisma.service";
import { createAuth, type Auth } from "./auth.config";
@Injectable()
export class AuthService {
private readonly logger = new Logger(AuthService.name);
private readonly auth: Auth;
constructor(private readonly prisma: PrismaService) {
// PrismaService extends PrismaClient and is compatible with BetterAuth's adapter
// Cast is safe as PrismaService provides all required PrismaClient methods
this.auth = createAuth(this.prisma as unknown as PrismaClient);
}
/**
* Get BetterAuth instance
*/
getAuth() {
return this.auth;
}
/**
* Get user by ID
*/
async getUserById(userId: string) {
return this.prisma.user.findUnique({
where: { id: userId },
select: {
id: true,
email: true,
name: true,
authProviderId: true,
},
});
}
/**
* Get user by email
*/
async getUserByEmail(email: string) {
return this.prisma.user.findUnique({
where: { email },
select: {
id: true,
email: true,
name: true,
authProviderId: true,
},
});
}
/**
* Verify session token
* Returns session data if valid, null if invalid or expired
*/
async verifySession(token: string): Promise<{ user: any; session: any } | null> {
try {
const session = await this.auth.api.getSession({
headers: {
authorization: `Bearer ${token}`,
},
});
if (!session) {
return null;
}
return {
user: session.user,
session: session.session,
};
} catch (error) {
this.logger.error(
"Session verification failed",
error instanceof Error ? error.message : "Unknown error"
);
return null;
}
}
}

View File

@@ -0,0 +1,6 @@
import { createParamDecorator, ExecutionContext } from "@nestjs/common";
export const CurrentUser = createParamDecorator((_data: unknown, ctx: ExecutionContext) => {
const request = ctx.switchToHttp().getRequest();
return request.user;
});

View File

@@ -0,0 +1,98 @@
import { describe, it, expect, beforeEach, vi } from "vitest";
import { Test, TestingModule } from "@nestjs/testing";
import { ExecutionContext, UnauthorizedException } from "@nestjs/common";
import { AuthGuard } from "./auth.guard";
import { AuthService } from "../auth.service";
describe("AuthGuard", () => {
let guard: AuthGuard;
let authService: AuthService;
const mockAuthService = {
verifySession: vi.fn(),
};
beforeEach(async () => {
const module: TestingModule = await Test.createTestingModule({
providers: [
AuthGuard,
{
provide: AuthService,
useValue: mockAuthService,
},
],
}).compile();
guard = module.get<AuthGuard>(AuthGuard);
authService = module.get<AuthService>(AuthService);
vi.clearAllMocks();
});
const createMockExecutionContext = (headers: any = {}): ExecutionContext => {
const mockRequest = {
headers,
};
return {
switchToHttp: () => ({
getRequest: () => mockRequest,
}),
} as ExecutionContext;
};
describe("canActivate", () => {
it("should return true for valid session", async () => {
const mockSessionData = {
user: {
id: "user-123",
email: "test@example.com",
name: "Test User",
},
session: {
id: "session-123",
},
};
mockAuthService.verifySession.mockResolvedValue(mockSessionData);
const context = createMockExecutionContext({
authorization: "Bearer valid-token",
});
const result = await guard.canActivate(context);
expect(result).toBe(true);
expect(mockAuthService.verifySession).toHaveBeenCalledWith("valid-token");
});
it("should throw UnauthorizedException if no token provided", async () => {
const context = createMockExecutionContext({});
await expect(guard.canActivate(context)).rejects.toThrow(UnauthorizedException);
await expect(guard.canActivate(context)).rejects.toThrow("No authentication token provided");
});
it("should throw UnauthorizedException if session is invalid", async () => {
mockAuthService.verifySession.mockResolvedValue(null);
const context = createMockExecutionContext({
authorization: "Bearer invalid-token",
});
await expect(guard.canActivate(context)).rejects.toThrow(UnauthorizedException);
await expect(guard.canActivate(context)).rejects.toThrow("Invalid or expired session");
});
it("should throw UnauthorizedException if session verification fails", async () => {
mockAuthService.verifySession.mockRejectedValue(new Error("Verification failed"));
const context = createMockExecutionContext({
authorization: "Bearer error-token",
});
await expect(guard.canActivate(context)).rejects.toThrow(UnauthorizedException);
await expect(guard.canActivate(context)).rejects.toThrow("Authentication failed");
});
});
});

View File

@@ -0,0 +1,41 @@
import { Injectable, CanActivate, ExecutionContext, UnauthorizedException } from "@nestjs/common";
import { AuthService } from "../auth.service";
@Injectable()
export class AuthGuard implements CanActivate {
constructor(private readonly authService: AuthService) {}
async canActivate(context: ExecutionContext): Promise<boolean> {
const request = context.switchToHttp().getRequest();
const token = this.extractTokenFromHeader(request);
if (!token) {
throw new UnauthorizedException("No authentication token provided");
}
try {
const sessionData = await this.authService.verifySession(token);
if (!sessionData) {
throw new UnauthorizedException("Invalid or expired session");
}
// Attach user to request
request.user = sessionData.user;
request.session = sessionData.session;
return true;
} catch (error) {
// Re-throw if it's already an UnauthorizedException
if (error instanceof UnauthorizedException) {
throw error;
}
throw new UnauthorizedException("Authentication failed");
}
}
private extractTokenFromHeader(request: any): string | undefined {
const [type, token] = request.headers.authorization?.split(" ") ?? [];
return type === "Bearer" ? token : undefined;
}
}

View File

@@ -0,0 +1,37 @@
/**
* BetterAuth Request Type
*
* BetterAuth expects a Request object compatible with the Fetch API standard.
* This extends the web standard Request interface with additional properties
* that may be present in the Express request object at runtime.
*/
import type { AuthUser } from "@mosaic/shared";
/**
* Session data stored in request after authentication
*/
export interface RequestSession {
id: string;
token: string;
expiresAt: Date;
[key: string]: unknown;
}
/**
* Web standard Request interface extended with Express-specific properties
* This matches the Fetch API Request specification that BetterAuth expects.
*/
export interface BetterAuthRequest extends Request {
// Express route parameters
params?: Record<string, string>;
// Express query string parameters
query?: Record<string, string | string[]>;
// Session data attached by AuthGuard after successful authentication
session?: RequestSession;
// Authenticated user attached by AuthGuard
user?: AuthUser;
}

View File

@@ -13,6 +13,11 @@ export default defineConfig({
exclude: ["node_modules/", "dist/"],
},
setupFiles: ["./vitest.setup.ts"],
server: {
deps: {
inline: ["@nestjs/common", "@nestjs/core"],
},
},
},
resolve: {
alias: {