@elevasis/core 0.11.2 → 0.13.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (50) hide show
  1. package/dist/index.d.ts +2 -1
  2. package/dist/index.js +8 -1
  3. package/dist/organization-model/index.d.ts +2 -1
  4. package/dist/organization-model/index.js +8 -1
  5. package/dist/test-utils/index.d.ts +27 -15
  6. package/dist/test-utils/index.js +25 -0
  7. package/package.json +1 -1
  8. package/src/_gen/__tests__/__snapshots__/contracts.md.snap +27 -270
  9. package/src/auth/multi-tenancy/credentials/__tests__/encryption.test.ts +217 -216
  10. package/src/auth/multi-tenancy/credentials/server/encryption.ts +69 -39
  11. package/src/auth/multi-tenancy/credentials/server/kek-loader.ts +37 -0
  12. package/src/auth/multi-tenancy/index.ts +3 -0
  13. package/src/auth/multi-tenancy/invitations/api-schemas.ts +104 -107
  14. package/src/auth/multi-tenancy/memberships/api-schemas.ts +6 -5
  15. package/src/auth/multi-tenancy/memberships/membership.ts +130 -138
  16. package/src/auth/multi-tenancy/permissions.ts +12 -5
  17. package/src/auth/multi-tenancy/role-management/api-schemas.ts +78 -0
  18. package/src/auth/multi-tenancy/role-management/index.ts +16 -0
  19. package/src/business/acquisition/activity-events.ts +142 -0
  20. package/src/business/acquisition/api-schemas.ts +694 -689
  21. package/src/business/acquisition/derive-actions.ts +90 -0
  22. package/src/business/acquisition/index.ts +111 -109
  23. package/src/execution/engine/index.ts +434 -434
  24. package/src/execution/engine/tools/integration/server/adapters/apify/__tests__/apify-run-actor.integration.test.ts +298 -293
  25. package/src/execution/engine/tools/integration/server/adapters/attio/__tests__/attio-crud.integration.test.ts +0 -1
  26. package/src/execution/engine/tools/integration/service.test.ts +214 -0
  27. package/src/execution/engine/tools/integration/service.ts +169 -161
  28. package/src/execution/engine/tools/lead-service-types.ts +882 -879
  29. package/src/execution/engine/tools/registry.ts +699 -700
  30. package/src/execution/engine/tools/tool-maps.ts +777 -780
  31. package/src/integrations/credentials/__tests__/api-schemas.test.ts +420 -496
  32. package/src/integrations/credentials/api-schemas.ts +127 -143
  33. package/src/integrations/webhook-endpoints/__tests__/api-schemas.test.ts +327 -318
  34. package/src/integrations/webhook-endpoints/api-schemas.ts +103 -102
  35. package/src/integrations/webhook-endpoints/types.ts +58 -51
  36. package/src/operations/activities/api-schemas.ts +80 -79
  37. package/src/operations/activities/types.ts +64 -63
  38. package/src/organization-model/contracts.ts +1 -0
  39. package/src/organization-model/defaults.ts +6 -0
  40. package/src/organization-model/domains/navigation.ts +37 -23
  41. package/src/organization-model/organization-graph.mdx +2 -2
  42. package/src/organization-model/published.ts +2 -1
  43. package/src/platform/constants/versions.ts +1 -1
  44. package/src/reference/_generated/contracts.md +27 -270
  45. package/src/scaffold-registry/__tests__/index.test.ts +72 -7
  46. package/src/scaffold-registry/index.ts +163 -29
  47. package/src/scaffold-registry/schema.ts +68 -62
  48. package/src/server.ts +281 -272
  49. package/src/supabase/database.types.ts +16 -10
  50. package/src/test-utils/rls/RLSTestContext.ts +585 -553
@@ -1,216 +1,217 @@
1
- import { describe, it, expect } from 'vitest'
2
- import { encryptCredential, decryptCredential } from '../server/encryption'
3
-
4
- // Note: SECRETS_ENCRYPTION_KEY is set in vitest.config.ts env section
5
- // The encryption module reads it at load time
6
-
7
- describe('Credential Encryption', () =>{
8
-
9
- describe('encryptCredential', () => {
10
- it('encrypts plaintext to base64-encoded JSON string', () => {
11
- const plaintext = 'my-secret-api-key'
12
- const encrypted = encryptCredential(plaintext)
13
-
14
- // Should be a valid JSON string
15
- expect(() => JSON.parse(encrypted)).not.toThrow()
16
-
17
- const parsed = JSON.parse(encrypted)
18
- expect(parsed).toHaveProperty('iv')
19
- expect(parsed).toHaveProperty('authTag')
20
- expect(parsed).toHaveProperty('data')
21
- })
22
-
23
- it('produces different ciphertext for same input (random IV)', () => {
24
- const plaintext = 'same-secret'
25
-
26
- const encrypted1 = encryptCredential(plaintext)
27
- const encrypted2 = encryptCredential(plaintext)
28
-
29
- // Different IVs mean different ciphertext
30
- expect(encrypted1).not.toBe(encrypted2)
31
-
32
- // But both decrypt to same plaintext
33
- expect(decryptCredential(encrypted1)).toBe(plaintext)
34
- expect(decryptCredential(encrypted2)).toBe(plaintext)
35
- })
36
-
37
- it('handles empty string', () => {
38
- const plaintext = ''
39
- const encrypted = encryptCredential(plaintext)
40
- const decrypted = decryptCredential(encrypted)
41
-
42
- expect(decrypted).toBe('')
43
- })
44
-
45
- it('handles long strings', () => {
46
- const plaintext = 'x'.repeat(10000)
47
- const encrypted = encryptCredential(plaintext)
48
- const decrypted = decryptCredential(encrypted)
49
-
50
- expect(decrypted).toBe(plaintext)
51
- })
52
-
53
- it('handles special characters and unicode', () => {
54
- const plaintext = 'Hello 世界! 🔐 Special chars: \n\t\r"\'\\`'
55
- const encrypted = encryptCredential(plaintext)
56
- const decrypted = decryptCredential(encrypted)
57
-
58
- expect(decrypted).toBe(plaintext)
59
- })
60
-
61
- it('validates key is configured at module load', () => {
62
- // We can't test missing key dynamically since MASTER_KEY is set at module load
63
- // Instead, verify the key is set and encryption works
64
- const encrypted = encryptCredential('test')
65
- expect(encrypted).toBeDefined()
66
- })
67
- })
68
-
69
- describe('decryptCredential', () => {
70
- it('decrypts ciphertext back to original plaintext', () => {
71
- const plaintext = 'my-secret-api-key'
72
- const encrypted = encryptCredential(plaintext)
73
- const decrypted = decryptCredential(encrypted)
74
-
75
- expect(decrypted).toBe(plaintext)
76
- })
77
-
78
- it('successfully decrypts with configured key', () => {
79
- const encrypted = encryptCredential('test')
80
- const decrypted = decryptCredential(encrypted)
81
-
82
- expect(decrypted).toBe('test')
83
- })
84
-
85
- it('throws error on malformed JSON', () => {
86
- expect(() => decryptCredential('not-json')).toThrow()
87
- })
88
-
89
- it('throws error on missing fields', () => {
90
- const invalidData = JSON.stringify({ iv: 'abc', authTag: 'def' }) // Missing 'data'
91
-
92
- expect(() => decryptCredential(invalidData)).toThrow()
93
- })
94
-
95
- it('throws error on tampered ciphertext', () => {
96
- const encrypted = encryptCredential('secret')
97
- const parsed = JSON.parse(encrypted)
98
-
99
- // Tamper with the data
100
- parsed.data = 'tampered-data'
101
- const tampered = JSON.stringify(parsed)
102
-
103
- expect(() => decryptCredential(tampered)).toThrow()
104
- })
105
-
106
- it('throws error on tampered auth tag', () => {
107
- const encrypted = encryptCredential('secret')
108
- const parsed = JSON.parse(encrypted)
109
-
110
- // Tamper with the auth tag
111
- parsed.authTag = 'AAAAAAAAAAAAAAAAAAAAAA=='
112
- const tampered = JSON.stringify(parsed)
113
-
114
- expect(() => decryptCredential(tampered)).toThrow()
115
- })
116
-
117
- it('detects tampering via auth tag (GCM mode)', () => {
118
- const encrypted = encryptCredential('secret')
119
- const parsed = JSON.parse(encrypted)
120
-
121
- // Tamper with just one byte of data
122
- const dataBuffer = Buffer.from(parsed.data, 'base64')
123
- dataBuffer[0] ^= 0x01 // Flip one bit
124
- parsed.data = dataBuffer.toString('base64')
125
-
126
- const tampered = JSON.stringify(parsed)
127
-
128
- // GCM should detect the tampering and throw
129
- expect(() => decryptCredential(tampered)).toThrow()
130
- })
131
-
132
- it('throws error on invalid base64 encoding', () => {
133
- const invalidData = JSON.stringify({
134
- iv: 'not-valid-base64!!!',
135
- authTag: 'AAAA',
136
- data: 'BBBB'
137
- })
138
-
139
- expect(() => decryptCredential(invalidData)).toThrow()
140
- })
141
- })
142
-
143
- describe('Round-trip encryption/decryption', () => {
144
- it('preserves API key format', () => {
145
- const apiKey = 'sk_test_1234567890abcdefghijklmnopqrstuvwxyz'
146
- const encrypted = encryptCredential(apiKey)
147
- const decrypted = decryptCredential(encrypted)
148
-
149
- expect(decrypted).toBe(apiKey)
150
- })
151
-
152
- it('preserves database connection strings', () => {
153
- const connString = 'postgresql://user:password@localhost:5432/database?sslmode=require'
154
- const encrypted = encryptCredential(connString)
155
- const decrypted = decryptCredential(encrypted)
156
-
157
- expect(decrypted).toBe(connString)
158
- })
159
-
160
- it('preserves JSON credentials', () => {
161
- const jsonCreds = JSON.stringify({
162
- type: 'service_account',
163
- project_id: 'my-project',
164
- private_key: '-----BEGIN PRIVATE KEY-----\nMIIE...\n-----END PRIVATE KEY-----\n'
165
- })
166
-
167
- const encrypted = encryptCredential(jsonCreds)
168
- const decrypted = decryptCredential(encrypted)
169
-
170
- expect(decrypted).toBe(jsonCreds)
171
- expect(JSON.parse(decrypted)).toEqual(JSON.parse(jsonCreds))
172
- })
173
- })
174
-
175
- describe('Security properties', () => {
176
- it('uses AES-256-GCM (authenticated encryption)', () => {
177
- const encrypted = encryptCredential('test')
178
- const parsed = JSON.parse(encrypted)
179
-
180
- // Auth tag should be present (GCM mode)
181
- expect(parsed.authTag).toBeDefined()
182
- expect(parsed.authTag.length).toBeGreaterThan(0)
183
- })
184
-
185
- it('uses random IV for each encryption', () => {
186
- const ivs = new Set()
187
-
188
- for (let i = 0; i < 100; i++) {
189
- const encrypted = encryptCredential('test')
190
- const parsed = JSON.parse(encrypted)
191
- ivs.add(parsed.iv)
192
- }
193
-
194
- // All IVs should be unique
195
- expect(ivs.size).toBe(100)
196
- })
197
-
198
- it('IV is 16 bytes (128 bits)', () => {
199
- const encrypted = encryptCredential('test')
200
- const parsed = JSON.parse(encrypted)
201
-
202
- // Base64-encoded 16 bytes = 24 characters
203
- const ivBuffer = Buffer.from(parsed.iv, 'base64')
204
- expect(ivBuffer.length).toBe(16)
205
- })
206
-
207
- it('auth tag is 16 bytes (128 bits)', () => {
208
- const encrypted = encryptCredential('test')
209
- const parsed = JSON.parse(encrypted)
210
-
211
- // Base64-encoded 16 bytes = 24 characters
212
- const authTagBuffer = Buffer.from(parsed.authTag, 'base64')
213
- expect(authTagBuffer.length).toBe(16)
214
- })
215
- })
216
- })
1
+ import crypto from 'crypto'
2
+ import { describe, it, expect, beforeAll } from 'vitest'
3
+ import { encryptCredential, decryptCredential, setKek, CURRENT_KEY_ID } from '../server/encryption'
4
+
5
+ beforeAll(() => {
6
+ setKek(CURRENT_KEY_ID, crypto.randomBytes(32))
7
+ })
8
+
9
+ describe('Credential Encryption', () => {
10
+ describe('encryptCredential', () => {
11
+ it('encrypts plaintext to base64-encoded JSON string', () => {
12
+ const plaintext = 'my-secret-api-key'
13
+ const encrypted = encryptCredential(plaintext)
14
+
15
+ // Should be a valid JSON string
16
+ expect(() => JSON.parse(encrypted)).not.toThrow()
17
+
18
+ const parsed = JSON.parse(encrypted)
19
+ expect(parsed).toHaveProperty('iv')
20
+ expect(parsed).toHaveProperty('authTag')
21
+ expect(parsed).toHaveProperty('data')
22
+ })
23
+
24
+ it('produces different ciphertext for same input (random IV)', () => {
25
+ const plaintext = 'same-secret'
26
+
27
+ const encrypted1 = encryptCredential(plaintext)
28
+ const encrypted2 = encryptCredential(plaintext)
29
+
30
+ // Different IVs mean different ciphertext
31
+ expect(encrypted1).not.toBe(encrypted2)
32
+
33
+ // But both decrypt to same plaintext
34
+ expect(decryptCredential(encrypted1)).toBe(plaintext)
35
+ expect(decryptCredential(encrypted2)).toBe(plaintext)
36
+ })
37
+
38
+ it('handles empty string', () => {
39
+ const plaintext = ''
40
+ const encrypted = encryptCredential(plaintext)
41
+ const decrypted = decryptCredential(encrypted)
42
+
43
+ expect(decrypted).toBe('')
44
+ })
45
+
46
+ it('handles long strings', () => {
47
+ const plaintext = 'x'.repeat(10000)
48
+ const encrypted = encryptCredential(plaintext)
49
+ const decrypted = decryptCredential(encrypted)
50
+
51
+ expect(decrypted).toBe(plaintext)
52
+ })
53
+
54
+ it('handles special characters and unicode', () => {
55
+ const plaintext = 'Hello 世界! 🔐 Special chars: \n\t\r"\'\\`'
56
+ const encrypted = encryptCredential(plaintext)
57
+ const decrypted = decryptCredential(encrypted)
58
+
59
+ expect(decrypted).toBe(plaintext)
60
+ })
61
+
62
+ it('validates key is configured at module load', () => {
63
+ // We can't test missing key dynamically since MASTER_KEY is set at module load
64
+ // Instead, verify the key is set and encryption works
65
+ const encrypted = encryptCredential('test')
66
+ expect(encrypted).toBeDefined()
67
+ })
68
+ })
69
+
70
+ describe('decryptCredential', () => {
71
+ it('decrypts ciphertext back to original plaintext', () => {
72
+ const plaintext = 'my-secret-api-key'
73
+ const encrypted = encryptCredential(plaintext)
74
+ const decrypted = decryptCredential(encrypted)
75
+
76
+ expect(decrypted).toBe(plaintext)
77
+ })
78
+
79
+ it('successfully decrypts with configured key', () => {
80
+ const encrypted = encryptCredential('test')
81
+ const decrypted = decryptCredential(encrypted)
82
+
83
+ expect(decrypted).toBe('test')
84
+ })
85
+
86
+ it('throws error on malformed JSON', () => {
87
+ expect(() => decryptCredential('not-json')).toThrow()
88
+ })
89
+
90
+ it('throws error on missing fields', () => {
91
+ const invalidData = JSON.stringify({ iv: 'abc', authTag: 'def' }) // Missing 'data'
92
+
93
+ expect(() => decryptCredential(invalidData)).toThrow()
94
+ })
95
+
96
+ it('throws error on tampered ciphertext', () => {
97
+ const encrypted = encryptCredential('secret')
98
+ const parsed = JSON.parse(encrypted)
99
+
100
+ // Tamper with the data
101
+ parsed.data = 'tampered-data'
102
+ const tampered = JSON.stringify(parsed)
103
+
104
+ expect(() => decryptCredential(tampered)).toThrow()
105
+ })
106
+
107
+ it('throws error on tampered auth tag', () => {
108
+ const encrypted = encryptCredential('secret')
109
+ const parsed = JSON.parse(encrypted)
110
+
111
+ // Tamper with the auth tag
112
+ parsed.authTag = 'AAAAAAAAAAAAAAAAAAAAAA=='
113
+ const tampered = JSON.stringify(parsed)
114
+
115
+ expect(() => decryptCredential(tampered)).toThrow()
116
+ })
117
+
118
+ it('detects tampering via auth tag (GCM mode)', () => {
119
+ const encrypted = encryptCredential('secret')
120
+ const parsed = JSON.parse(encrypted)
121
+
122
+ // Tamper with just one byte of data
123
+ const dataBuffer = Buffer.from(parsed.data, 'base64')
124
+ dataBuffer[0] ^= 0x01 // Flip one bit
125
+ parsed.data = dataBuffer.toString('base64')
126
+
127
+ const tampered = JSON.stringify(parsed)
128
+
129
+ // GCM should detect the tampering and throw
130
+ expect(() => decryptCredential(tampered)).toThrow()
131
+ })
132
+
133
+ it('throws error on invalid base64 encoding', () => {
134
+ const invalidData = JSON.stringify({
135
+ iv: 'not-valid-base64!!!',
136
+ authTag: 'AAAA',
137
+ data: 'BBBB'
138
+ })
139
+
140
+ expect(() => decryptCredential(invalidData)).toThrow()
141
+ })
142
+ })
143
+
144
+ describe('Round-trip encryption/decryption', () => {
145
+ it('preserves API key format', () => {
146
+ const apiKey = 'sk_test_1234567890abcdefghijklmnopqrstuvwxyz'
147
+ const encrypted = encryptCredential(apiKey)
148
+ const decrypted = decryptCredential(encrypted)
149
+
150
+ expect(decrypted).toBe(apiKey)
151
+ })
152
+
153
+ it('preserves database connection strings', () => {
154
+ const connString = 'postgresql://user:password@localhost:5432/database?sslmode=require'
155
+ const encrypted = encryptCredential(connString)
156
+ const decrypted = decryptCredential(encrypted)
157
+
158
+ expect(decrypted).toBe(connString)
159
+ })
160
+
161
+ it('preserves JSON credentials', () => {
162
+ const jsonCreds = JSON.stringify({
163
+ type: 'service_account',
164
+ project_id: 'my-project',
165
+ private_key: '-----BEGIN PRIVATE KEY-----\nMIIE...\n-----END PRIVATE KEY-----\n'
166
+ })
167
+
168
+ const encrypted = encryptCredential(jsonCreds)
169
+ const decrypted = decryptCredential(encrypted)
170
+
171
+ expect(decrypted).toBe(jsonCreds)
172
+ expect(JSON.parse(decrypted)).toEqual(JSON.parse(jsonCreds))
173
+ })
174
+ })
175
+
176
+ describe('Security properties', () => {
177
+ it('uses AES-256-GCM (authenticated encryption)', () => {
178
+ const encrypted = encryptCredential('test')
179
+ const parsed = JSON.parse(encrypted)
180
+
181
+ // Auth tag should be present (GCM mode)
182
+ expect(parsed.authTag).toBeDefined()
183
+ expect(parsed.authTag.length).toBeGreaterThan(0)
184
+ })
185
+
186
+ it('uses random IV for each encryption', () => {
187
+ const ivs = new Set()
188
+
189
+ for (let i = 0; i < 100; i++) {
190
+ const encrypted = encryptCredential('test')
191
+ const parsed = JSON.parse(encrypted)
192
+ ivs.add(parsed.iv)
193
+ }
194
+
195
+ // All IVs should be unique
196
+ expect(ivs.size).toBe(100)
197
+ })
198
+
199
+ it('IV is 16 bytes (128 bits)', () => {
200
+ const encrypted = encryptCredential('test')
201
+ const parsed = JSON.parse(encrypted)
202
+
203
+ // Base64-encoded 16 bytes = 24 characters
204
+ const ivBuffer = Buffer.from(parsed.iv, 'base64')
205
+ expect(ivBuffer.length).toBe(16)
206
+ })
207
+
208
+ it('auth tag is 16 bytes (128 bits)', () => {
209
+ const encrypted = encryptCredential('test')
210
+ const parsed = JSON.parse(encrypted)
211
+
212
+ // Base64-encoded 16 bytes = 24 characters
213
+ const authTagBuffer = Buffer.from(parsed.authTag, 'base64')
214
+ expect(authTagBuffer.length).toBe(16)
215
+ })
216
+ })
217
+ })
@@ -1,39 +1,69 @@
1
- import crypto from 'crypto'
2
-
3
- const MASTER_KEY = process.env.SECRETS_ENCRYPTION_KEY
4
- const ALGORITHM = 'aes-256-gcm'
5
-
6
- interface EncryptedData {
7
- iv: string
8
- authTag: string
9
- data: string
10
- }
11
-
12
- export function encryptCredential(plaintext: string): string {
13
- if (!MASTER_KEY) {
14
- throw new Error('SECRETS_ENCRYPTION_KEY not configured')
15
- }
16
-
17
- const iv = crypto.randomBytes(16)
18
- const cipher = crypto.createCipheriv(ALGORITHM, Buffer.from(MASTER_KEY, 'hex'), iv)
19
- const encrypted = Buffer.concat([cipher.update(plaintext, 'utf8'), cipher.final()])
20
- const authTag = cipher.getAuthTag()
21
-
22
- return JSON.stringify({
23
- iv: iv.toString('base64'),
24
- authTag: authTag.toString('base64'),
25
- data: encrypted.toString('base64')
26
- })
27
- }
28
-
29
- export function decryptCredential(encrypted: string): string {
30
- if (!MASTER_KEY) {
31
- throw new Error('SECRETS_ENCRYPTION_KEY not configured')
32
- }
33
-
34
- const { iv, authTag, data } = JSON.parse(encrypted) as EncryptedData
35
- const decipher = crypto.createDecipheriv(ALGORITHM, Buffer.from(MASTER_KEY, 'hex'), Buffer.from(iv, 'base64'))
36
- decipher.setAuthTag(Buffer.from(authTag, 'base64'))
37
-
38
- return Buffer.concat([decipher.update(Buffer.from(data, 'base64')), decipher.final()]).toString('utf8')
39
- }
1
+ import crypto from 'crypto'
2
+
3
+ const ALGORITHM = 'aes-256-gcm'
4
+
5
+ // keyId stamped on all newly encrypted ciphertexts.
6
+ export const CURRENT_KEY_ID = 'platform-v1'
7
+
8
+ // Implicit keyId for pre-Vault ciphertext rows that lack a keyId field. All
9
+ // known rows were restamped with CURRENT_KEY_ID during the re-encryption
10
+ // migration; this constant remains only so any unexpected legacy blob produces
11
+ // a clear "KEK not loaded" error rather than a silent default-key decrypt.
12
+ export const LEGACY_KEY_ID = 'platform-v0-legacy'
13
+
14
+ interface EncryptedData {
15
+ iv: string
16
+ authTag: string
17
+ data: string
18
+ keyId?: string
19
+ }
20
+
21
+ const kekMap = new Map<string, Buffer>()
22
+
23
+ export function setKek(keyId: string, key: Buffer): void {
24
+ if (key.length !== 32) {
25
+ throw new Error(`KEK must be 32 bytes (256 bits); got ${key.length}`)
26
+ }
27
+ kekMap.set(keyId, key)
28
+ }
29
+
30
+ export function clearKeks(): void {
31
+ kekMap.clear()
32
+ }
33
+
34
+ function resolveKek(keyId: string): Buffer | undefined {
35
+ return kekMap.get(keyId)
36
+ }
37
+
38
+ export function encryptCredential(plaintext: string): string {
39
+ const key = resolveKek(CURRENT_KEY_ID)
40
+ if (!key) {
41
+ throw new Error(`Encryption KEK '${CURRENT_KEY_ID}' not loaded; call setKek() at boot`)
42
+ }
43
+
44
+ const iv = crypto.randomBytes(16)
45
+ const cipher = crypto.createCipheriv(ALGORITHM, key, iv)
46
+ const encrypted = Buffer.concat([cipher.update(plaintext, 'utf8'), cipher.final()])
47
+ const authTag = cipher.getAuthTag()
48
+
49
+ return JSON.stringify({
50
+ iv: iv.toString('base64'),
51
+ authTag: authTag.toString('base64'),
52
+ data: encrypted.toString('base64'),
53
+ keyId: CURRENT_KEY_ID
54
+ })
55
+ }
56
+
57
+ export function decryptCredential(encrypted: string): string {
58
+ const { iv, authTag, data, keyId } = JSON.parse(encrypted) as EncryptedData
59
+ const resolvedKeyId = keyId ?? LEGACY_KEY_ID
60
+ const key = resolveKek(resolvedKeyId)
61
+ if (!key) {
62
+ throw new Error(`Decryption KEK '${resolvedKeyId}' not loaded`)
63
+ }
64
+
65
+ const decipher = crypto.createDecipheriv(ALGORITHM, key, Buffer.from(iv, 'base64'))
66
+ decipher.setAuthTag(Buffer.from(authTag, 'base64'))
67
+
68
+ return Buffer.concat([decipher.update(Buffer.from(data, 'base64')), decipher.final()]).toString('utf8')
69
+ }
@@ -0,0 +1,37 @@
1
+ import { getSupabaseClient } from '../../../../supabase/server/client'
2
+ import { setKek, CURRENT_KEY_ID } from './encryption'
3
+
4
+ let loaded = false
5
+
6
+ /**
7
+ * Loads the platform credential KEK from Supabase Vault and registers it under
8
+ * `CURRENT_KEY_ID` ('platform-v1').
9
+ *
10
+ * Idempotent: subsequent calls are no-ops.
11
+ *
12
+ * Fails fast on missing / malformed Vault KEK so misconfigured deploys do not
13
+ * silently start without a usable encryption key.
14
+ */
15
+ export async function loadCredentialKEKs(): Promise<void> {
16
+ if (loaded) return
17
+
18
+ const supabase = await getSupabaseClient()
19
+ // eslint-disable-next-line @typescript-eslint/no-explicit-any -- RPC isn't in generated types yet (run `supabase gen types` post-merge)
20
+ const { data, error } = await (supabase.rpc as any)('get_platform_credential_kek')
21
+ if (error) {
22
+ throw new Error(
23
+ `Failed to load platform credential KEK from Vault: ${error.message}. ` +
24
+ `Did you run provision-credential-kek.sql against this environment?`
25
+ )
26
+ }
27
+ if (typeof data !== 'string' || data.length === 0) {
28
+ throw new Error('Vault returned null/empty platform credential KEK')
29
+ }
30
+ const vaultKek = Buffer.from(data, 'hex')
31
+ if (vaultKek.length !== 32) {
32
+ throw new Error(`Vault KEK is ${vaultKek.length} bytes, expected 32`)
33
+ }
34
+ setKek(CURRENT_KEY_ID, vaultKek)
35
+
36
+ loaded = true
37
+ }
@@ -4,6 +4,9 @@ export * from './types'
4
4
  // Permission catalog (canonical PERMISSIONS constant + types)
5
5
  export * from './permissions'
6
6
 
7
+ // Role management schemas
8
+ export * from './role-management/index'
9
+
7
10
  // Organization types
8
11
  export * from './organizations/index'
9
12