@elevasis/core 0.11.2 → 0.13.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/index.d.ts +2 -1
- package/dist/index.js +8 -1
- package/dist/organization-model/index.d.ts +2 -1
- package/dist/organization-model/index.js +8 -1
- package/dist/test-utils/index.d.ts +27 -15
- package/dist/test-utils/index.js +25 -0
- package/package.json +1 -1
- package/src/_gen/__tests__/__snapshots__/contracts.md.snap +27 -270
- package/src/auth/multi-tenancy/credentials/__tests__/encryption.test.ts +217 -216
- package/src/auth/multi-tenancy/credentials/server/encryption.ts +69 -39
- package/src/auth/multi-tenancy/credentials/server/kek-loader.ts +37 -0
- package/src/auth/multi-tenancy/index.ts +3 -0
- package/src/auth/multi-tenancy/invitations/api-schemas.ts +104 -107
- package/src/auth/multi-tenancy/memberships/api-schemas.ts +6 -5
- package/src/auth/multi-tenancy/memberships/membership.ts +130 -138
- package/src/auth/multi-tenancy/permissions.ts +12 -5
- package/src/auth/multi-tenancy/role-management/api-schemas.ts +78 -0
- package/src/auth/multi-tenancy/role-management/index.ts +16 -0
- package/src/business/acquisition/activity-events.ts +142 -0
- package/src/business/acquisition/api-schemas.ts +694 -689
- package/src/business/acquisition/derive-actions.ts +90 -0
- package/src/business/acquisition/index.ts +111 -109
- package/src/execution/engine/index.ts +434 -434
- package/src/execution/engine/tools/integration/server/adapters/apify/__tests__/apify-run-actor.integration.test.ts +298 -293
- package/src/execution/engine/tools/integration/server/adapters/attio/__tests__/attio-crud.integration.test.ts +0 -1
- package/src/execution/engine/tools/integration/service.test.ts +214 -0
- package/src/execution/engine/tools/integration/service.ts +169 -161
- package/src/execution/engine/tools/lead-service-types.ts +882 -879
- package/src/execution/engine/tools/registry.ts +699 -700
- package/src/execution/engine/tools/tool-maps.ts +777 -780
- package/src/integrations/credentials/__tests__/api-schemas.test.ts +420 -496
- package/src/integrations/credentials/api-schemas.ts +127 -143
- package/src/integrations/webhook-endpoints/__tests__/api-schemas.test.ts +327 -318
- package/src/integrations/webhook-endpoints/api-schemas.ts +103 -102
- package/src/integrations/webhook-endpoints/types.ts +58 -51
- package/src/operations/activities/api-schemas.ts +80 -79
- package/src/operations/activities/types.ts +64 -63
- package/src/organization-model/contracts.ts +1 -0
- package/src/organization-model/defaults.ts +6 -0
- package/src/organization-model/domains/navigation.ts +37 -23
- package/src/organization-model/organization-graph.mdx +2 -2
- package/src/organization-model/published.ts +2 -1
- package/src/platform/constants/versions.ts +1 -1
- package/src/reference/_generated/contracts.md +27 -270
- package/src/scaffold-registry/__tests__/index.test.ts +72 -7
- package/src/scaffold-registry/index.ts +163 -29
- package/src/scaffold-registry/schema.ts +68 -62
- package/src/server.ts +281 -272
- package/src/supabase/database.types.ts +16 -10
- package/src/test-utils/rls/RLSTestContext.ts +585 -553
|
@@ -1,216 +1,217 @@
|
|
|
1
|
-
import
|
|
2
|
-
import {
|
|
3
|
-
|
|
4
|
-
|
|
5
|
-
|
|
6
|
-
|
|
7
|
-
|
|
8
|
-
|
|
9
|
-
|
|
10
|
-
|
|
11
|
-
|
|
12
|
-
const
|
|
13
|
-
|
|
14
|
-
|
|
15
|
-
|
|
16
|
-
|
|
17
|
-
|
|
18
|
-
|
|
19
|
-
expect(parsed).toHaveProperty('
|
|
20
|
-
expect(parsed).toHaveProperty('
|
|
21
|
-
|
|
22
|
-
|
|
23
|
-
|
|
24
|
-
|
|
25
|
-
|
|
26
|
-
|
|
27
|
-
const
|
|
28
|
-
|
|
29
|
-
|
|
30
|
-
|
|
31
|
-
|
|
32
|
-
|
|
33
|
-
|
|
34
|
-
expect(decryptCredential(
|
|
35
|
-
|
|
36
|
-
|
|
37
|
-
|
|
38
|
-
|
|
39
|
-
const
|
|
40
|
-
const
|
|
41
|
-
|
|
42
|
-
|
|
43
|
-
|
|
44
|
-
|
|
45
|
-
|
|
46
|
-
|
|
47
|
-
const
|
|
48
|
-
const
|
|
49
|
-
|
|
50
|
-
|
|
51
|
-
|
|
52
|
-
|
|
53
|
-
|
|
54
|
-
|
|
55
|
-
const
|
|
56
|
-
const
|
|
57
|
-
|
|
58
|
-
|
|
59
|
-
|
|
60
|
-
|
|
61
|
-
|
|
62
|
-
|
|
63
|
-
//
|
|
64
|
-
|
|
65
|
-
|
|
66
|
-
|
|
67
|
-
|
|
68
|
-
|
|
69
|
-
|
|
70
|
-
|
|
71
|
-
|
|
72
|
-
const
|
|
73
|
-
const
|
|
74
|
-
|
|
75
|
-
|
|
76
|
-
|
|
77
|
-
|
|
78
|
-
|
|
79
|
-
|
|
80
|
-
const
|
|
81
|
-
|
|
82
|
-
|
|
83
|
-
|
|
84
|
-
|
|
85
|
-
|
|
86
|
-
|
|
87
|
-
|
|
88
|
-
|
|
89
|
-
|
|
90
|
-
|
|
91
|
-
|
|
92
|
-
|
|
93
|
-
|
|
94
|
-
|
|
95
|
-
|
|
96
|
-
|
|
97
|
-
const
|
|
98
|
-
|
|
99
|
-
|
|
100
|
-
|
|
101
|
-
|
|
102
|
-
|
|
103
|
-
|
|
104
|
-
|
|
105
|
-
|
|
106
|
-
|
|
107
|
-
|
|
108
|
-
const
|
|
109
|
-
|
|
110
|
-
|
|
111
|
-
|
|
112
|
-
|
|
113
|
-
|
|
114
|
-
|
|
115
|
-
|
|
116
|
-
|
|
117
|
-
|
|
118
|
-
|
|
119
|
-
const
|
|
120
|
-
|
|
121
|
-
|
|
122
|
-
|
|
123
|
-
dataBuffer
|
|
124
|
-
|
|
125
|
-
|
|
126
|
-
|
|
127
|
-
|
|
128
|
-
|
|
129
|
-
|
|
130
|
-
|
|
131
|
-
|
|
132
|
-
|
|
133
|
-
|
|
134
|
-
|
|
135
|
-
|
|
136
|
-
|
|
137
|
-
|
|
138
|
-
|
|
139
|
-
|
|
140
|
-
|
|
141
|
-
|
|
142
|
-
|
|
143
|
-
|
|
144
|
-
|
|
145
|
-
|
|
146
|
-
const
|
|
147
|
-
const
|
|
148
|
-
|
|
149
|
-
|
|
150
|
-
|
|
151
|
-
|
|
152
|
-
|
|
153
|
-
|
|
154
|
-
const
|
|
155
|
-
const
|
|
156
|
-
|
|
157
|
-
|
|
158
|
-
|
|
159
|
-
|
|
160
|
-
|
|
161
|
-
|
|
162
|
-
|
|
163
|
-
|
|
164
|
-
|
|
165
|
-
|
|
166
|
-
|
|
167
|
-
|
|
168
|
-
const
|
|
169
|
-
|
|
170
|
-
|
|
171
|
-
expect(
|
|
172
|
-
|
|
173
|
-
|
|
174
|
-
|
|
175
|
-
|
|
176
|
-
|
|
177
|
-
|
|
178
|
-
const
|
|
179
|
-
|
|
180
|
-
|
|
181
|
-
|
|
182
|
-
expect(parsed.authTag
|
|
183
|
-
|
|
184
|
-
|
|
185
|
-
|
|
186
|
-
|
|
187
|
-
|
|
188
|
-
|
|
189
|
-
|
|
190
|
-
const
|
|
191
|
-
|
|
192
|
-
|
|
193
|
-
|
|
194
|
-
|
|
195
|
-
|
|
196
|
-
|
|
197
|
-
|
|
198
|
-
|
|
199
|
-
|
|
200
|
-
const
|
|
201
|
-
|
|
202
|
-
|
|
203
|
-
|
|
204
|
-
|
|
205
|
-
|
|
206
|
-
|
|
207
|
-
|
|
208
|
-
|
|
209
|
-
const
|
|
210
|
-
|
|
211
|
-
|
|
212
|
-
|
|
213
|
-
|
|
214
|
-
|
|
215
|
-
|
|
216
|
-
})
|
|
1
|
+
import crypto from 'crypto'
|
|
2
|
+
import { describe, it, expect, beforeAll } from 'vitest'
|
|
3
|
+
import { encryptCredential, decryptCredential, setKek, CURRENT_KEY_ID } from '../server/encryption'
|
|
4
|
+
|
|
5
|
+
beforeAll(() => {
|
|
6
|
+
setKek(CURRENT_KEY_ID, crypto.randomBytes(32))
|
|
7
|
+
})
|
|
8
|
+
|
|
9
|
+
describe('Credential Encryption', () => {
|
|
10
|
+
describe('encryptCredential', () => {
|
|
11
|
+
it('encrypts plaintext to base64-encoded JSON string', () => {
|
|
12
|
+
const plaintext = 'my-secret-api-key'
|
|
13
|
+
const encrypted = encryptCredential(plaintext)
|
|
14
|
+
|
|
15
|
+
// Should be a valid JSON string
|
|
16
|
+
expect(() => JSON.parse(encrypted)).not.toThrow()
|
|
17
|
+
|
|
18
|
+
const parsed = JSON.parse(encrypted)
|
|
19
|
+
expect(parsed).toHaveProperty('iv')
|
|
20
|
+
expect(parsed).toHaveProperty('authTag')
|
|
21
|
+
expect(parsed).toHaveProperty('data')
|
|
22
|
+
})
|
|
23
|
+
|
|
24
|
+
it('produces different ciphertext for same input (random IV)', () => {
|
|
25
|
+
const plaintext = 'same-secret'
|
|
26
|
+
|
|
27
|
+
const encrypted1 = encryptCredential(plaintext)
|
|
28
|
+
const encrypted2 = encryptCredential(plaintext)
|
|
29
|
+
|
|
30
|
+
// Different IVs mean different ciphertext
|
|
31
|
+
expect(encrypted1).not.toBe(encrypted2)
|
|
32
|
+
|
|
33
|
+
// But both decrypt to same plaintext
|
|
34
|
+
expect(decryptCredential(encrypted1)).toBe(plaintext)
|
|
35
|
+
expect(decryptCredential(encrypted2)).toBe(plaintext)
|
|
36
|
+
})
|
|
37
|
+
|
|
38
|
+
it('handles empty string', () => {
|
|
39
|
+
const plaintext = ''
|
|
40
|
+
const encrypted = encryptCredential(plaintext)
|
|
41
|
+
const decrypted = decryptCredential(encrypted)
|
|
42
|
+
|
|
43
|
+
expect(decrypted).toBe('')
|
|
44
|
+
})
|
|
45
|
+
|
|
46
|
+
it('handles long strings', () => {
|
|
47
|
+
const plaintext = 'x'.repeat(10000)
|
|
48
|
+
const encrypted = encryptCredential(plaintext)
|
|
49
|
+
const decrypted = decryptCredential(encrypted)
|
|
50
|
+
|
|
51
|
+
expect(decrypted).toBe(plaintext)
|
|
52
|
+
})
|
|
53
|
+
|
|
54
|
+
it('handles special characters and unicode', () => {
|
|
55
|
+
const plaintext = 'Hello 世界! 🔐 Special chars: \n\t\r"\'\\`'
|
|
56
|
+
const encrypted = encryptCredential(plaintext)
|
|
57
|
+
const decrypted = decryptCredential(encrypted)
|
|
58
|
+
|
|
59
|
+
expect(decrypted).toBe(plaintext)
|
|
60
|
+
})
|
|
61
|
+
|
|
62
|
+
it('validates key is configured at module load', () => {
|
|
63
|
+
// We can't test missing key dynamically since MASTER_KEY is set at module load
|
|
64
|
+
// Instead, verify the key is set and encryption works
|
|
65
|
+
const encrypted = encryptCredential('test')
|
|
66
|
+
expect(encrypted).toBeDefined()
|
|
67
|
+
})
|
|
68
|
+
})
|
|
69
|
+
|
|
70
|
+
describe('decryptCredential', () => {
|
|
71
|
+
it('decrypts ciphertext back to original plaintext', () => {
|
|
72
|
+
const plaintext = 'my-secret-api-key'
|
|
73
|
+
const encrypted = encryptCredential(plaintext)
|
|
74
|
+
const decrypted = decryptCredential(encrypted)
|
|
75
|
+
|
|
76
|
+
expect(decrypted).toBe(plaintext)
|
|
77
|
+
})
|
|
78
|
+
|
|
79
|
+
it('successfully decrypts with configured key', () => {
|
|
80
|
+
const encrypted = encryptCredential('test')
|
|
81
|
+
const decrypted = decryptCredential(encrypted)
|
|
82
|
+
|
|
83
|
+
expect(decrypted).toBe('test')
|
|
84
|
+
})
|
|
85
|
+
|
|
86
|
+
it('throws error on malformed JSON', () => {
|
|
87
|
+
expect(() => decryptCredential('not-json')).toThrow()
|
|
88
|
+
})
|
|
89
|
+
|
|
90
|
+
it('throws error on missing fields', () => {
|
|
91
|
+
const invalidData = JSON.stringify({ iv: 'abc', authTag: 'def' }) // Missing 'data'
|
|
92
|
+
|
|
93
|
+
expect(() => decryptCredential(invalidData)).toThrow()
|
|
94
|
+
})
|
|
95
|
+
|
|
96
|
+
it('throws error on tampered ciphertext', () => {
|
|
97
|
+
const encrypted = encryptCredential('secret')
|
|
98
|
+
const parsed = JSON.parse(encrypted)
|
|
99
|
+
|
|
100
|
+
// Tamper with the data
|
|
101
|
+
parsed.data = 'tampered-data'
|
|
102
|
+
const tampered = JSON.stringify(parsed)
|
|
103
|
+
|
|
104
|
+
expect(() => decryptCredential(tampered)).toThrow()
|
|
105
|
+
})
|
|
106
|
+
|
|
107
|
+
it('throws error on tampered auth tag', () => {
|
|
108
|
+
const encrypted = encryptCredential('secret')
|
|
109
|
+
const parsed = JSON.parse(encrypted)
|
|
110
|
+
|
|
111
|
+
// Tamper with the auth tag
|
|
112
|
+
parsed.authTag = 'AAAAAAAAAAAAAAAAAAAAAA=='
|
|
113
|
+
const tampered = JSON.stringify(parsed)
|
|
114
|
+
|
|
115
|
+
expect(() => decryptCredential(tampered)).toThrow()
|
|
116
|
+
})
|
|
117
|
+
|
|
118
|
+
it('detects tampering via auth tag (GCM mode)', () => {
|
|
119
|
+
const encrypted = encryptCredential('secret')
|
|
120
|
+
const parsed = JSON.parse(encrypted)
|
|
121
|
+
|
|
122
|
+
// Tamper with just one byte of data
|
|
123
|
+
const dataBuffer = Buffer.from(parsed.data, 'base64')
|
|
124
|
+
dataBuffer[0] ^= 0x01 // Flip one bit
|
|
125
|
+
parsed.data = dataBuffer.toString('base64')
|
|
126
|
+
|
|
127
|
+
const tampered = JSON.stringify(parsed)
|
|
128
|
+
|
|
129
|
+
// GCM should detect the tampering and throw
|
|
130
|
+
expect(() => decryptCredential(tampered)).toThrow()
|
|
131
|
+
})
|
|
132
|
+
|
|
133
|
+
it('throws error on invalid base64 encoding', () => {
|
|
134
|
+
const invalidData = JSON.stringify({
|
|
135
|
+
iv: 'not-valid-base64!!!',
|
|
136
|
+
authTag: 'AAAA',
|
|
137
|
+
data: 'BBBB'
|
|
138
|
+
})
|
|
139
|
+
|
|
140
|
+
expect(() => decryptCredential(invalidData)).toThrow()
|
|
141
|
+
})
|
|
142
|
+
})
|
|
143
|
+
|
|
144
|
+
describe('Round-trip encryption/decryption', () => {
|
|
145
|
+
it('preserves API key format', () => {
|
|
146
|
+
const apiKey = 'sk_test_1234567890abcdefghijklmnopqrstuvwxyz'
|
|
147
|
+
const encrypted = encryptCredential(apiKey)
|
|
148
|
+
const decrypted = decryptCredential(encrypted)
|
|
149
|
+
|
|
150
|
+
expect(decrypted).toBe(apiKey)
|
|
151
|
+
})
|
|
152
|
+
|
|
153
|
+
it('preserves database connection strings', () => {
|
|
154
|
+
const connString = 'postgresql://user:password@localhost:5432/database?sslmode=require'
|
|
155
|
+
const encrypted = encryptCredential(connString)
|
|
156
|
+
const decrypted = decryptCredential(encrypted)
|
|
157
|
+
|
|
158
|
+
expect(decrypted).toBe(connString)
|
|
159
|
+
})
|
|
160
|
+
|
|
161
|
+
it('preserves JSON credentials', () => {
|
|
162
|
+
const jsonCreds = JSON.stringify({
|
|
163
|
+
type: 'service_account',
|
|
164
|
+
project_id: 'my-project',
|
|
165
|
+
private_key: '-----BEGIN PRIVATE KEY-----\nMIIE...\n-----END PRIVATE KEY-----\n'
|
|
166
|
+
})
|
|
167
|
+
|
|
168
|
+
const encrypted = encryptCredential(jsonCreds)
|
|
169
|
+
const decrypted = decryptCredential(encrypted)
|
|
170
|
+
|
|
171
|
+
expect(decrypted).toBe(jsonCreds)
|
|
172
|
+
expect(JSON.parse(decrypted)).toEqual(JSON.parse(jsonCreds))
|
|
173
|
+
})
|
|
174
|
+
})
|
|
175
|
+
|
|
176
|
+
describe('Security properties', () => {
|
|
177
|
+
it('uses AES-256-GCM (authenticated encryption)', () => {
|
|
178
|
+
const encrypted = encryptCredential('test')
|
|
179
|
+
const parsed = JSON.parse(encrypted)
|
|
180
|
+
|
|
181
|
+
// Auth tag should be present (GCM mode)
|
|
182
|
+
expect(parsed.authTag).toBeDefined()
|
|
183
|
+
expect(parsed.authTag.length).toBeGreaterThan(0)
|
|
184
|
+
})
|
|
185
|
+
|
|
186
|
+
it('uses random IV for each encryption', () => {
|
|
187
|
+
const ivs = new Set()
|
|
188
|
+
|
|
189
|
+
for (let i = 0; i < 100; i++) {
|
|
190
|
+
const encrypted = encryptCredential('test')
|
|
191
|
+
const parsed = JSON.parse(encrypted)
|
|
192
|
+
ivs.add(parsed.iv)
|
|
193
|
+
}
|
|
194
|
+
|
|
195
|
+
// All IVs should be unique
|
|
196
|
+
expect(ivs.size).toBe(100)
|
|
197
|
+
})
|
|
198
|
+
|
|
199
|
+
it('IV is 16 bytes (128 bits)', () => {
|
|
200
|
+
const encrypted = encryptCredential('test')
|
|
201
|
+
const parsed = JSON.parse(encrypted)
|
|
202
|
+
|
|
203
|
+
// Base64-encoded 16 bytes = 24 characters
|
|
204
|
+
const ivBuffer = Buffer.from(parsed.iv, 'base64')
|
|
205
|
+
expect(ivBuffer.length).toBe(16)
|
|
206
|
+
})
|
|
207
|
+
|
|
208
|
+
it('auth tag is 16 bytes (128 bits)', () => {
|
|
209
|
+
const encrypted = encryptCredential('test')
|
|
210
|
+
const parsed = JSON.parse(encrypted)
|
|
211
|
+
|
|
212
|
+
// Base64-encoded 16 bytes = 24 characters
|
|
213
|
+
const authTagBuffer = Buffer.from(parsed.authTag, 'base64')
|
|
214
|
+
expect(authTagBuffer.length).toBe(16)
|
|
215
|
+
})
|
|
216
|
+
})
|
|
217
|
+
})
|
|
@@ -1,39 +1,69 @@
|
|
|
1
|
-
import crypto from 'crypto'
|
|
2
|
-
|
|
3
|
-
const
|
|
4
|
-
|
|
5
|
-
|
|
6
|
-
|
|
7
|
-
|
|
8
|
-
|
|
9
|
-
|
|
10
|
-
|
|
11
|
-
|
|
12
|
-
export
|
|
13
|
-
|
|
14
|
-
|
|
15
|
-
|
|
16
|
-
|
|
17
|
-
|
|
18
|
-
|
|
19
|
-
|
|
20
|
-
|
|
21
|
-
|
|
22
|
-
|
|
23
|
-
|
|
24
|
-
|
|
25
|
-
|
|
26
|
-
}
|
|
27
|
-
|
|
28
|
-
|
|
29
|
-
|
|
30
|
-
|
|
31
|
-
|
|
32
|
-
|
|
33
|
-
|
|
34
|
-
|
|
35
|
-
|
|
36
|
-
|
|
37
|
-
|
|
38
|
-
|
|
39
|
-
|
|
1
|
+
import crypto from 'crypto'
|
|
2
|
+
|
|
3
|
+
const ALGORITHM = 'aes-256-gcm'
|
|
4
|
+
|
|
5
|
+
// keyId stamped on all newly encrypted ciphertexts.
|
|
6
|
+
export const CURRENT_KEY_ID = 'platform-v1'
|
|
7
|
+
|
|
8
|
+
// Implicit keyId for pre-Vault ciphertext rows that lack a keyId field. All
|
|
9
|
+
// known rows were restamped with CURRENT_KEY_ID during the re-encryption
|
|
10
|
+
// migration; this constant remains only so any unexpected legacy blob produces
|
|
11
|
+
// a clear "KEK not loaded" error rather than a silent default-key decrypt.
|
|
12
|
+
export const LEGACY_KEY_ID = 'platform-v0-legacy'
|
|
13
|
+
|
|
14
|
+
interface EncryptedData {
|
|
15
|
+
iv: string
|
|
16
|
+
authTag: string
|
|
17
|
+
data: string
|
|
18
|
+
keyId?: string
|
|
19
|
+
}
|
|
20
|
+
|
|
21
|
+
const kekMap = new Map<string, Buffer>()
|
|
22
|
+
|
|
23
|
+
export function setKek(keyId: string, key: Buffer): void {
|
|
24
|
+
if (key.length !== 32) {
|
|
25
|
+
throw new Error(`KEK must be 32 bytes (256 bits); got ${key.length}`)
|
|
26
|
+
}
|
|
27
|
+
kekMap.set(keyId, key)
|
|
28
|
+
}
|
|
29
|
+
|
|
30
|
+
export function clearKeks(): void {
|
|
31
|
+
kekMap.clear()
|
|
32
|
+
}
|
|
33
|
+
|
|
34
|
+
function resolveKek(keyId: string): Buffer | undefined {
|
|
35
|
+
return kekMap.get(keyId)
|
|
36
|
+
}
|
|
37
|
+
|
|
38
|
+
export function encryptCredential(plaintext: string): string {
|
|
39
|
+
const key = resolveKek(CURRENT_KEY_ID)
|
|
40
|
+
if (!key) {
|
|
41
|
+
throw new Error(`Encryption KEK '${CURRENT_KEY_ID}' not loaded; call setKek() at boot`)
|
|
42
|
+
}
|
|
43
|
+
|
|
44
|
+
const iv = crypto.randomBytes(16)
|
|
45
|
+
const cipher = crypto.createCipheriv(ALGORITHM, key, iv)
|
|
46
|
+
const encrypted = Buffer.concat([cipher.update(plaintext, 'utf8'), cipher.final()])
|
|
47
|
+
const authTag = cipher.getAuthTag()
|
|
48
|
+
|
|
49
|
+
return JSON.stringify({
|
|
50
|
+
iv: iv.toString('base64'),
|
|
51
|
+
authTag: authTag.toString('base64'),
|
|
52
|
+
data: encrypted.toString('base64'),
|
|
53
|
+
keyId: CURRENT_KEY_ID
|
|
54
|
+
})
|
|
55
|
+
}
|
|
56
|
+
|
|
57
|
+
export function decryptCredential(encrypted: string): string {
|
|
58
|
+
const { iv, authTag, data, keyId } = JSON.parse(encrypted) as EncryptedData
|
|
59
|
+
const resolvedKeyId = keyId ?? LEGACY_KEY_ID
|
|
60
|
+
const key = resolveKek(resolvedKeyId)
|
|
61
|
+
if (!key) {
|
|
62
|
+
throw new Error(`Decryption KEK '${resolvedKeyId}' not loaded`)
|
|
63
|
+
}
|
|
64
|
+
|
|
65
|
+
const decipher = crypto.createDecipheriv(ALGORITHM, key, Buffer.from(iv, 'base64'))
|
|
66
|
+
decipher.setAuthTag(Buffer.from(authTag, 'base64'))
|
|
67
|
+
|
|
68
|
+
return Buffer.concat([decipher.update(Buffer.from(data, 'base64')), decipher.final()]).toString('utf8')
|
|
69
|
+
}
|
|
@@ -0,0 +1,37 @@
|
|
|
1
|
+
import { getSupabaseClient } from '../../../../supabase/server/client'
|
|
2
|
+
import { setKek, CURRENT_KEY_ID } from './encryption'
|
|
3
|
+
|
|
4
|
+
let loaded = false
|
|
5
|
+
|
|
6
|
+
/**
|
|
7
|
+
* Loads the platform credential KEK from Supabase Vault and registers it under
|
|
8
|
+
* `CURRENT_KEY_ID` ('platform-v1').
|
|
9
|
+
*
|
|
10
|
+
* Idempotent: subsequent calls are no-ops.
|
|
11
|
+
*
|
|
12
|
+
* Fails fast on missing / malformed Vault KEK so misconfigured deploys do not
|
|
13
|
+
* silently start without a usable encryption key.
|
|
14
|
+
*/
|
|
15
|
+
export async function loadCredentialKEKs(): Promise<void> {
|
|
16
|
+
if (loaded) return
|
|
17
|
+
|
|
18
|
+
const supabase = await getSupabaseClient()
|
|
19
|
+
// eslint-disable-next-line @typescript-eslint/no-explicit-any -- RPC isn't in generated types yet (run `supabase gen types` post-merge)
|
|
20
|
+
const { data, error } = await (supabase.rpc as any)('get_platform_credential_kek')
|
|
21
|
+
if (error) {
|
|
22
|
+
throw new Error(
|
|
23
|
+
`Failed to load platform credential KEK from Vault: ${error.message}. ` +
|
|
24
|
+
`Did you run provision-credential-kek.sql against this environment?`
|
|
25
|
+
)
|
|
26
|
+
}
|
|
27
|
+
if (typeof data !== 'string' || data.length === 0) {
|
|
28
|
+
throw new Error('Vault returned null/empty platform credential KEK')
|
|
29
|
+
}
|
|
30
|
+
const vaultKek = Buffer.from(data, 'hex')
|
|
31
|
+
if (vaultKek.length !== 32) {
|
|
32
|
+
throw new Error(`Vault KEK is ${vaultKek.length} bytes, expected 32`)
|
|
33
|
+
}
|
|
34
|
+
setKek(CURRENT_KEY_ID, vaultKek)
|
|
35
|
+
|
|
36
|
+
loaded = true
|
|
37
|
+
}
|