@friggframework/core 2.0.0-next.53 → 2.0.0-next.55
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CLAUDE.md +2 -1
- package/application/commands/credential-commands.js +1 -1
- package/application/commands/integration-commands.js +1 -1
- package/application/index.js +1 -1
- package/core/create-handler.js +12 -0
- package/credential/repositories/credential-repository-documentdb.js +304 -0
- package/credential/repositories/credential-repository-factory.js +8 -1
- package/credential/repositories/credential-repository-mongo.js +16 -54
- package/credential/repositories/credential-repository-postgres.js +14 -41
- package/credential/use-cases/get-credential-for-user.js +7 -3
- package/database/config.js +4 -4
- package/database/documentdb-encryption-service.js +330 -0
- package/database/documentdb-utils.js +136 -0
- package/database/encryption/README.md +50 -1
- package/database/encryption/documentdb-encryption-service.md +3270 -0
- package/database/encryption/encryption-schema-registry.js +46 -0
- package/database/prisma.js +7 -47
- package/database/repositories/health-check-repository-documentdb.js +134 -0
- package/database/repositories/health-check-repository-factory.js +6 -1
- package/database/repositories/health-check-repository-interface.js +29 -34
- package/database/repositories/health-check-repository-mongodb.js +1 -3
- package/database/use-cases/check-database-state-use-case.js +3 -3
- package/database/use-cases/run-database-migration-use-case.js +6 -4
- package/database/use-cases/trigger-database-migration-use-case.js +2 -2
- package/database/utils/mongodb-schema-init.js +5 -5
- package/database/utils/prisma-runner.js +15 -9
- package/errors/client-safe-error.js +26 -0
- package/errors/fetch-error.js +2 -1
- package/errors/index.js +2 -0
- package/generated/prisma-mongodb/edge.js +3 -3
- package/generated/prisma-mongodb/index.d.ts +10 -4
- package/generated/prisma-mongodb/index.js +3 -3
- package/generated/prisma-mongodb/package.json +1 -1
- package/generated/prisma-mongodb/schema.prisma +1 -3
- package/generated/prisma-mongodb/wasm.js +2 -2
- package/generated/prisma-postgresql/edge.js +3 -3
- package/generated/prisma-postgresql/index.d.ts +10 -4
- package/generated/prisma-postgresql/index.js +3 -3
- package/generated/prisma-postgresql/package.json +1 -1
- package/generated/prisma-postgresql/schema.prisma +1 -3
- package/generated/prisma-postgresql/wasm.js +2 -2
- package/handlers/routers/db-migration.js +2 -3
- package/handlers/routers/health.js +0 -3
- package/handlers/workers/db-migration.js +8 -8
- package/integrations/integration-router.js +6 -6
- package/integrations/repositories/integration-mapping-repository-documentdb.js +280 -0
- package/integrations/repositories/integration-mapping-repository-factory.js +8 -1
- package/integrations/repositories/integration-repository-documentdb.js +210 -0
- package/integrations/repositories/integration-repository-factory.js +8 -1
- package/integrations/repositories/process-repository-documentdb.js +243 -0
- package/integrations/repositories/process-repository-factory.js +8 -1
- package/modules/repositories/module-repository-documentdb.js +307 -0
- package/modules/repositories/module-repository-factory.js +8 -1
- package/package.json +5 -5
- package/prisma-mongodb/schema.prisma +1 -3
- package/prisma-postgresql/migrations/20251112195422_update_user_unique_constraints/migration.sql +69 -0
- package/prisma-postgresql/schema.prisma +1 -3
- package/syncs/repositories/sync-repository-documentdb.js +240 -0
- package/syncs/repositories/sync-repository-factory.js +6 -1
- package/token/repositories/token-repository-documentdb.js +137 -0
- package/token/repositories/token-repository-factory.js +8 -1
- package/token/repositories/token-repository-mongo.js +10 -3
- package/token/repositories/token-repository-postgres.js +10 -3
- package/user/repositories/user-repository-documentdb.js +432 -0
- package/user/repositories/user-repository-factory.js +6 -1
- package/user/repositories/user-repository-mongo.js +3 -2
- package/user/repositories/user-repository-postgres.js +3 -2
- package/user/use-cases/login-user.js +1 -1
- package/websocket/repositories/websocket-connection-repository-documentdb.js +119 -0
- package/websocket/repositories/websocket-connection-repository-factory.js +8 -1
|
@@ -0,0 +1,243 @@
|
|
|
1
|
+
const { prisma } = require('../../database/prisma');
|
|
2
|
+
const {
|
|
3
|
+
toObjectId,
|
|
4
|
+
fromObjectId,
|
|
5
|
+
findMany,
|
|
6
|
+
findOne,
|
|
7
|
+
insertOne,
|
|
8
|
+
updateOne,
|
|
9
|
+
deleteOne,
|
|
10
|
+
} = require('../../database/documentdb-utils');
|
|
11
|
+
const {
|
|
12
|
+
ProcessRepositoryInterface,
|
|
13
|
+
} = require('./process-repository-interface');
|
|
14
|
+
const {
|
|
15
|
+
DocumentDBEncryptionService,
|
|
16
|
+
} = require('../../database/documentdb-encryption-service');
|
|
17
|
+
|
|
18
|
+
class ProcessRepositoryDocumentDB extends ProcessRepositoryInterface {
|
|
19
|
+
constructor() {
|
|
20
|
+
super();
|
|
21
|
+
this.prisma = prisma;
|
|
22
|
+
this.encryptionService = new DocumentDBEncryptionService();
|
|
23
|
+
}
|
|
24
|
+
|
|
25
|
+
async create(processData) {
|
|
26
|
+
const now = new Date();
|
|
27
|
+
const plainDocument = {
|
|
28
|
+
userId: toObjectId(processData.userId),
|
|
29
|
+
integrationId: toObjectId(processData.integrationId),
|
|
30
|
+
name: processData.name,
|
|
31
|
+
type: processData.type,
|
|
32
|
+
state: processData.state || 'INITIALIZING',
|
|
33
|
+
context: processData.context || {},
|
|
34
|
+
results: processData.results || {},
|
|
35
|
+
childProcesses: (processData.childProcesses || [])
|
|
36
|
+
.map((id) => toObjectId(id))
|
|
37
|
+
.filter(Boolean),
|
|
38
|
+
parentProcessId: processData.parentProcessId
|
|
39
|
+
? toObjectId(processData.parentProcessId)
|
|
40
|
+
: null,
|
|
41
|
+
createdAt: now,
|
|
42
|
+
updatedAt: now,
|
|
43
|
+
};
|
|
44
|
+
|
|
45
|
+
const encryptedDocument = await this.encryptionService.encryptFields(
|
|
46
|
+
'Process',
|
|
47
|
+
plainDocument
|
|
48
|
+
);
|
|
49
|
+
|
|
50
|
+
const insertedId = await insertOne(
|
|
51
|
+
this.prisma,
|
|
52
|
+
'Process',
|
|
53
|
+
encryptedDocument
|
|
54
|
+
);
|
|
55
|
+
|
|
56
|
+
const created = await findOne(this.prisma, 'Process', {
|
|
57
|
+
_id: insertedId,
|
|
58
|
+
});
|
|
59
|
+
if (!created) {
|
|
60
|
+
console.error(
|
|
61
|
+
'[ProcessRepositoryDocumentDB] Process not found after insert',
|
|
62
|
+
{
|
|
63
|
+
insertedId: fromObjectId(insertedId),
|
|
64
|
+
processData: {
|
|
65
|
+
userId: processData.userId,
|
|
66
|
+
integrationId: processData.integrationId,
|
|
67
|
+
name: processData.name,
|
|
68
|
+
type: processData.type,
|
|
69
|
+
},
|
|
70
|
+
}
|
|
71
|
+
);
|
|
72
|
+
throw new Error(
|
|
73
|
+
'Failed to create process: Document not found after insert. ' +
|
|
74
|
+
'This indicates a database consistency issue.'
|
|
75
|
+
);
|
|
76
|
+
}
|
|
77
|
+
const decryptedProcess = await this.encryptionService.decryptFields(
|
|
78
|
+
'Process',
|
|
79
|
+
created
|
|
80
|
+
);
|
|
81
|
+
return this._mapProcess(decryptedProcess);
|
|
82
|
+
}
|
|
83
|
+
|
|
84
|
+
async findById(processId) {
|
|
85
|
+
const objectId = toObjectId(processId);
|
|
86
|
+
if (!objectId) return null;
|
|
87
|
+
const doc = await findOne(this.prisma, 'Process', { _id: objectId });
|
|
88
|
+
if (!doc) return null;
|
|
89
|
+
|
|
90
|
+
const decryptedProcess = await this.encryptionService.decryptFields(
|
|
91
|
+
'Process',
|
|
92
|
+
doc
|
|
93
|
+
);
|
|
94
|
+
return this._mapProcess(decryptedProcess);
|
|
95
|
+
}
|
|
96
|
+
|
|
97
|
+
async update(processId, updates) {
|
|
98
|
+
const objectId = toObjectId(processId);
|
|
99
|
+
if (!objectId) return null;
|
|
100
|
+
|
|
101
|
+
const existing = await findOne(this.prisma, 'Process', {
|
|
102
|
+
_id: objectId,
|
|
103
|
+
});
|
|
104
|
+
if (!existing) return null;
|
|
105
|
+
|
|
106
|
+
const updatePayload = {};
|
|
107
|
+
if (updates.state !== undefined) updatePayload.state = updates.state;
|
|
108
|
+
if (updates.context !== undefined)
|
|
109
|
+
updatePayload.context = updates.context;
|
|
110
|
+
if (updates.results !== undefined)
|
|
111
|
+
updatePayload.results = updates.results;
|
|
112
|
+
if (updates.childProcesses !== undefined) {
|
|
113
|
+
updatePayload.childProcesses = (updates.childProcesses || [])
|
|
114
|
+
.map((id) => toObjectId(id))
|
|
115
|
+
.filter(Boolean);
|
|
116
|
+
}
|
|
117
|
+
if (updates.parentProcessId !== undefined) {
|
|
118
|
+
updatePayload.parentProcessId = updates.parentProcessId
|
|
119
|
+
? toObjectId(updates.parentProcessId)
|
|
120
|
+
: null;
|
|
121
|
+
}
|
|
122
|
+
updatePayload.updatedAt = new Date();
|
|
123
|
+
|
|
124
|
+
const encryptedUpdate = await this.encryptionService.encryptFields(
|
|
125
|
+
'Process',
|
|
126
|
+
updatePayload
|
|
127
|
+
);
|
|
128
|
+
|
|
129
|
+
await updateOne(
|
|
130
|
+
this.prisma,
|
|
131
|
+
'Process',
|
|
132
|
+
{ _id: objectId },
|
|
133
|
+
{ $set: encryptedUpdate }
|
|
134
|
+
);
|
|
135
|
+
|
|
136
|
+
const updated = await findOne(this.prisma, 'Process', {
|
|
137
|
+
_id: objectId,
|
|
138
|
+
});
|
|
139
|
+
if (!updated) {
|
|
140
|
+
console.error(
|
|
141
|
+
'[ProcessRepositoryDocumentDB] Process not found after update',
|
|
142
|
+
{
|
|
143
|
+
processId: fromObjectId(objectId),
|
|
144
|
+
}
|
|
145
|
+
);
|
|
146
|
+
throw new Error(
|
|
147
|
+
'Failed to update process: Document not found after update. ' +
|
|
148
|
+
'This indicates a database consistency issue.'
|
|
149
|
+
);
|
|
150
|
+
}
|
|
151
|
+
const decryptedProcess = await this.encryptionService.decryptFields(
|
|
152
|
+
'Process',
|
|
153
|
+
updated
|
|
154
|
+
);
|
|
155
|
+
return this._mapProcess(decryptedProcess);
|
|
156
|
+
}
|
|
157
|
+
|
|
158
|
+
async findByIntegrationAndType(integrationId, type) {
|
|
159
|
+
const integrationObjectId = toObjectId(integrationId);
|
|
160
|
+
const filter = {
|
|
161
|
+
integrationId: integrationObjectId,
|
|
162
|
+
type,
|
|
163
|
+
};
|
|
164
|
+
const docs = await findMany(this.prisma, 'Process', filter, {
|
|
165
|
+
sort: { createdAt: -1 },
|
|
166
|
+
});
|
|
167
|
+
|
|
168
|
+
const decryptedDocs = await Promise.all(
|
|
169
|
+
docs.map((doc) =>
|
|
170
|
+
this.encryptionService.decryptFields('Process', doc)
|
|
171
|
+
)
|
|
172
|
+
);
|
|
173
|
+
|
|
174
|
+
return decryptedDocs.map((doc) => this._mapProcess(doc));
|
|
175
|
+
}
|
|
176
|
+
|
|
177
|
+
async findActiveProcesses(
|
|
178
|
+
integrationId,
|
|
179
|
+
excludeStates = ['COMPLETED', 'ERROR']
|
|
180
|
+
) {
|
|
181
|
+
const integrationObjectId = toObjectId(integrationId);
|
|
182
|
+
const filter = {
|
|
183
|
+
integrationId: integrationObjectId,
|
|
184
|
+
state: { $nin: excludeStates },
|
|
185
|
+
};
|
|
186
|
+
const docs = await findMany(this.prisma, 'Process', filter, {
|
|
187
|
+
sort: { createdAt: -1 },
|
|
188
|
+
});
|
|
189
|
+
|
|
190
|
+
const decryptedDocs = await Promise.all(
|
|
191
|
+
docs.map((doc) =>
|
|
192
|
+
this.encryptionService.decryptFields('Process', doc)
|
|
193
|
+
)
|
|
194
|
+
);
|
|
195
|
+
|
|
196
|
+
return decryptedDocs.map((doc) => this._mapProcess(doc));
|
|
197
|
+
}
|
|
198
|
+
|
|
199
|
+
async findByName(name) {
|
|
200
|
+
const doc = await findOne(
|
|
201
|
+
this.prisma,
|
|
202
|
+
'Process',
|
|
203
|
+
{ name },
|
|
204
|
+
{ sort: { createdAt: -1 } }
|
|
205
|
+
);
|
|
206
|
+
if (!doc) return null;
|
|
207
|
+
|
|
208
|
+
const decryptedProcess = await this.encryptionService.decryptFields(
|
|
209
|
+
'Process',
|
|
210
|
+
doc
|
|
211
|
+
);
|
|
212
|
+
return this._mapProcess(decryptedProcess);
|
|
213
|
+
}
|
|
214
|
+
|
|
215
|
+
async deleteById(processId) {
|
|
216
|
+
const objectId = toObjectId(processId);
|
|
217
|
+
if (!objectId) return;
|
|
218
|
+
await deleteOne(this.prisma, 'Process', { _id: objectId });
|
|
219
|
+
}
|
|
220
|
+
|
|
221
|
+
_mapProcess(doc) {
|
|
222
|
+
return {
|
|
223
|
+
id: fromObjectId(doc?._id),
|
|
224
|
+
userId: fromObjectId(doc?.userId),
|
|
225
|
+
integrationId: fromObjectId(doc?.integrationId),
|
|
226
|
+
name: doc?.name ?? null,
|
|
227
|
+
type: doc?.type ?? null,
|
|
228
|
+
state: doc?.state ?? null,
|
|
229
|
+
context: doc?.context ?? {},
|
|
230
|
+
results: doc?.results ?? {},
|
|
231
|
+
childProcesses: (doc?.childProcesses || []).map((id) =>
|
|
232
|
+
fromObjectId(id)
|
|
233
|
+
),
|
|
234
|
+
parentProcessId: doc?.parentProcessId
|
|
235
|
+
? fromObjectId(doc.parentProcessId)
|
|
236
|
+
: null,
|
|
237
|
+
createdAt: doc?.createdAt ? new Date(doc.createdAt) : null,
|
|
238
|
+
updatedAt: doc?.updatedAt ? new Date(doc.updatedAt) : null,
|
|
239
|
+
};
|
|
240
|
+
}
|
|
241
|
+
}
|
|
242
|
+
|
|
243
|
+
module.exports = { ProcessRepositoryDocumentDB };
|
|
@@ -1,5 +1,8 @@
|
|
|
1
1
|
const { ProcessRepositoryMongo } = require('./process-repository-mongo');
|
|
2
2
|
const { ProcessRepositoryPostgres } = require('./process-repository-postgres');
|
|
3
|
+
const {
|
|
4
|
+
ProcessRepositoryDocumentDB,
|
|
5
|
+
} = require('./process-repository-documentdb');
|
|
3
6
|
const config = require('../../database/config');
|
|
4
7
|
|
|
5
8
|
/**
|
|
@@ -30,9 +33,12 @@ function createProcessRepository() {
|
|
|
30
33
|
case 'postgresql':
|
|
31
34
|
return new ProcessRepositoryPostgres();
|
|
32
35
|
|
|
36
|
+
case 'documentdb':
|
|
37
|
+
return new ProcessRepositoryDocumentDB();
|
|
38
|
+
|
|
33
39
|
default:
|
|
34
40
|
throw new Error(
|
|
35
|
-
`Unsupported database type: ${dbType}. Supported values: 'mongodb', 'postgresql'`
|
|
41
|
+
`Unsupported database type: ${dbType}. Supported values: 'mongodb', 'documentdb', 'postgresql'`
|
|
36
42
|
);
|
|
37
43
|
}
|
|
38
44
|
}
|
|
@@ -42,5 +48,6 @@ module.exports = {
|
|
|
42
48
|
// Export adapters for direct testing
|
|
43
49
|
ProcessRepositoryMongo,
|
|
44
50
|
ProcessRepositoryPostgres,
|
|
51
|
+
ProcessRepositoryDocumentDB,
|
|
45
52
|
};
|
|
46
53
|
|
|
@@ -0,0 +1,307 @@
|
|
|
1
|
+
const { prisma } = require('../../database/prisma');
|
|
2
|
+
const {
|
|
3
|
+
toObjectId,
|
|
4
|
+
fromObjectId,
|
|
5
|
+
findMany,
|
|
6
|
+
findOne,
|
|
7
|
+
insertOne,
|
|
8
|
+
updateOne,
|
|
9
|
+
deleteOne,
|
|
10
|
+
} = require('../../database/documentdb-utils');
|
|
11
|
+
const { ModuleRepositoryInterface } = require('./module-repository-interface');
|
|
12
|
+
const { DocumentDBEncryptionService } = require('../../database/documentdb-encryption-service');
|
|
13
|
+
|
|
14
|
+
/**
|
|
15
|
+
* Module/Entity repository for DocumentDB.
|
|
16
|
+
* Uses DocumentDBEncryptionService for credential decryption.
|
|
17
|
+
*
|
|
18
|
+
* Encrypted fields: Credential.data.*
|
|
19
|
+
*
|
|
20
|
+
* Note: This repository only reads credentials. CredentialRepository
|
|
21
|
+
* handles credential creation/updates with encryption.
|
|
22
|
+
*
|
|
23
|
+
* @see DocumentDBEncryptionService
|
|
24
|
+
* @see CredentialRepositoryDocumentDB
|
|
25
|
+
*/
|
|
26
|
+
class ModuleRepositoryDocumentDB extends ModuleRepositoryInterface {
|
|
27
|
+
constructor() {
|
|
28
|
+
super();
|
|
29
|
+
this.prisma = prisma;
|
|
30
|
+
this.encryptionService = new DocumentDBEncryptionService();
|
|
31
|
+
}
|
|
32
|
+
|
|
33
|
+
async findEntityById(entityId) {
|
|
34
|
+
const objectId = toObjectId(entityId);
|
|
35
|
+
if (!objectId) {
|
|
36
|
+
throw new Error(`Entity ${entityId} not found`);
|
|
37
|
+
}
|
|
38
|
+
const doc = await findOne(this.prisma, 'Entity', { _id: objectId });
|
|
39
|
+
if (!doc) {
|
|
40
|
+
throw new Error(`Entity ${entityId} not found`);
|
|
41
|
+
}
|
|
42
|
+
const credential = await this._fetchCredential(doc.credentialId);
|
|
43
|
+
return this._mapEntity(doc, credential);
|
|
44
|
+
}
|
|
45
|
+
|
|
46
|
+
async findEntitiesByUserId(userId) {
|
|
47
|
+
const objectId = toObjectId(userId);
|
|
48
|
+
if (!objectId) {
|
|
49
|
+
throw new Error(`Invalid userId: ${userId}`);
|
|
50
|
+
}
|
|
51
|
+
const filter = { userId: objectId };
|
|
52
|
+
const docs = await findMany(this.prisma, 'Entity', filter);
|
|
53
|
+
const credentialMap = await this._fetchCredentialsBulk(docs.map((doc) => doc.credentialId));
|
|
54
|
+
return docs.map((doc) => this._mapEntity(doc, credentialMap.get(fromObjectId(doc.credentialId)) || null));
|
|
55
|
+
}
|
|
56
|
+
|
|
57
|
+
async findEntitiesByIds(entitiesIds) {
|
|
58
|
+
const ids = (entitiesIds || []).map((id) => toObjectId(id)).filter(Boolean);
|
|
59
|
+
if (ids.length === 0) return [];
|
|
60
|
+
const docs = await findMany(this.prisma, 'Entity', { _id: { $in: ids } });
|
|
61
|
+
const credentialMap = await this._fetchCredentialsBulk(docs.map((doc) => doc.credentialId));
|
|
62
|
+
return docs.map((doc) => this._mapEntity(doc, credentialMap.get(fromObjectId(doc.credentialId)) || null));
|
|
63
|
+
}
|
|
64
|
+
|
|
65
|
+
async findEntitiesByUserIdAndModuleName(userId, moduleName) {
|
|
66
|
+
const objectId = toObjectId(userId);
|
|
67
|
+
if (!objectId) {
|
|
68
|
+
throw new Error(`Invalid userId: ${userId}`);
|
|
69
|
+
}
|
|
70
|
+
const filter = {
|
|
71
|
+
userId: objectId,
|
|
72
|
+
moduleName,
|
|
73
|
+
};
|
|
74
|
+
const docs = await findMany(this.prisma, 'Entity', filter);
|
|
75
|
+
const credentialMap = await this._fetchCredentialsBulk(docs.map((doc) => doc.credentialId));
|
|
76
|
+
return docs.map((doc) => this._mapEntity(doc, credentialMap.get(fromObjectId(doc.credentialId)) || null));
|
|
77
|
+
}
|
|
78
|
+
|
|
79
|
+
async unsetCredential(entityId) {
|
|
80
|
+
const objectId = toObjectId(entityId);
|
|
81
|
+
if (!objectId) return false;
|
|
82
|
+
await updateOne(
|
|
83
|
+
this.prisma,
|
|
84
|
+
'Entity',
|
|
85
|
+
{ _id: objectId },
|
|
86
|
+
{
|
|
87
|
+
$set: {
|
|
88
|
+
credentialId: null,
|
|
89
|
+
},
|
|
90
|
+
}
|
|
91
|
+
);
|
|
92
|
+
return true;
|
|
93
|
+
}
|
|
94
|
+
|
|
95
|
+
async findEntity(filter) {
|
|
96
|
+
const query = this._buildFilter(filter);
|
|
97
|
+
const doc = await findOne(this.prisma, 'Entity', query);
|
|
98
|
+
if (!doc) return null;
|
|
99
|
+
const credential = await this._fetchCredential(doc.credentialId);
|
|
100
|
+
return this._mapEntity(doc, credential);
|
|
101
|
+
}
|
|
102
|
+
|
|
103
|
+
async createEntity(entityData) {
|
|
104
|
+
const document = {
|
|
105
|
+
userId: toObjectId(entityData.user || entityData.userId),
|
|
106
|
+
credentialId: toObjectId(entityData.credential || entityData.credentialId) || null,
|
|
107
|
+
name: entityData.name ?? null,
|
|
108
|
+
moduleName: entityData.moduleName ?? null,
|
|
109
|
+
externalId: entityData.externalId ?? null,
|
|
110
|
+
accountId: entityData.accountId ?? null,
|
|
111
|
+
};
|
|
112
|
+
const insertedId = await insertOne(this.prisma, 'Entity', document);
|
|
113
|
+
const created = await findOne(this.prisma, 'Entity', { _id: insertedId });
|
|
114
|
+
const credential = await this._fetchCredential(created?.credentialId);
|
|
115
|
+
return this._mapEntity(created, credential);
|
|
116
|
+
}
|
|
117
|
+
|
|
118
|
+
async updateEntity(entityId, updates) {
|
|
119
|
+
const objectId = toObjectId(entityId);
|
|
120
|
+
if (!objectId) return null;
|
|
121
|
+
const updatePayload = {};
|
|
122
|
+
if (updates.user !== undefined || updates.userId !== undefined) {
|
|
123
|
+
const userVal = updates.user !== undefined ? updates.user : updates.userId;
|
|
124
|
+
updatePayload.userId = toObjectId(userVal) || null;
|
|
125
|
+
}
|
|
126
|
+
if (updates.credential !== undefined || updates.credentialId !== undefined) {
|
|
127
|
+
const credVal = updates.credential !== undefined ? updates.credential : updates.credentialId;
|
|
128
|
+
updatePayload.credentialId = toObjectId(credVal) || null;
|
|
129
|
+
}
|
|
130
|
+
if (updates.name !== undefined) updatePayload.name = updates.name;
|
|
131
|
+
if (updates.moduleName !== undefined) updatePayload.moduleName = updates.moduleName;
|
|
132
|
+
if (updates.externalId !== undefined) updatePayload.externalId = updates.externalId;
|
|
133
|
+
if (updates.accountId !== undefined) updatePayload.accountId = updates.accountId;
|
|
134
|
+
const result = await updateOne(
|
|
135
|
+
this.prisma,
|
|
136
|
+
'Entity',
|
|
137
|
+
{ _id: objectId },
|
|
138
|
+
{ $set: updatePayload }
|
|
139
|
+
);
|
|
140
|
+
const modified = result?.nModified ?? result?.n ?? 0;
|
|
141
|
+
if (modified === 0) return null;
|
|
142
|
+
const updated = await findOne(this.prisma, 'Entity', { _id: objectId });
|
|
143
|
+
const credential = await this._fetchCredential(updated?.credentialId);
|
|
144
|
+
return this._mapEntity(updated, credential);
|
|
145
|
+
}
|
|
146
|
+
|
|
147
|
+
async deleteEntity(entityId) {
|
|
148
|
+
const objectId = toObjectId(entityId);
|
|
149
|
+
if (!objectId) return false;
|
|
150
|
+
const result = await deleteOne(this.prisma, 'Entity', { _id: objectId });
|
|
151
|
+
const deleted = result?.n ?? 0;
|
|
152
|
+
return deleted > 0;
|
|
153
|
+
}
|
|
154
|
+
|
|
155
|
+
async _fetchCredential(credentialId) {
|
|
156
|
+
const id = fromObjectId(credentialId);
|
|
157
|
+
if (!id) return null;
|
|
158
|
+
|
|
159
|
+
try {
|
|
160
|
+
// Convert to ObjectId for raw query
|
|
161
|
+
const objectId = toObjectId(id);
|
|
162
|
+
if (!objectId) return null;
|
|
163
|
+
|
|
164
|
+
// Use raw findOne to bypass Prisma encryption extension
|
|
165
|
+
const rawCredential = await findOne(this.prisma, 'Credential', {
|
|
166
|
+
_id: objectId
|
|
167
|
+
});
|
|
168
|
+
|
|
169
|
+
if (!rawCredential) return null;
|
|
170
|
+
|
|
171
|
+
// Decrypt sensitive fields using service
|
|
172
|
+
const decryptedCredential = await this.encryptionService.decryptFields('Credential', rawCredential);
|
|
173
|
+
|
|
174
|
+
// Return in same format
|
|
175
|
+
const credential = {
|
|
176
|
+
id: fromObjectId(decryptedCredential._id),
|
|
177
|
+
userId: fromObjectId(decryptedCredential.userId),
|
|
178
|
+
externalId: decryptedCredential.externalId ?? null,
|
|
179
|
+
authIsValid: decryptedCredential.authIsValid ?? null,
|
|
180
|
+
createdAt: decryptedCredential.createdAt,
|
|
181
|
+
updatedAt: decryptedCredential.updatedAt,
|
|
182
|
+
data: decryptedCredential.data
|
|
183
|
+
};
|
|
184
|
+
|
|
185
|
+
return this._convertCredentialIds(credential);
|
|
186
|
+
} catch (error) {
|
|
187
|
+
console.error(`Failed to fetch/decrypt credential ${id}:`, error.message);
|
|
188
|
+
// Return null instead of throwing to allow graceful degradation
|
|
189
|
+
// This repository is read-only (doesn't create/update credentials)
|
|
190
|
+
// Entities can still be loaded even if their credential is corrupted/unreadable
|
|
191
|
+
// The entity will have null credential, which calling code must handle
|
|
192
|
+
// This is intentional behavior: prefer partial data over complete failure
|
|
193
|
+
return null;
|
|
194
|
+
}
|
|
195
|
+
}
|
|
196
|
+
|
|
197
|
+
async _fetchCredentialsBulk(credentialIds) {
|
|
198
|
+
const ids = (credentialIds || [])
|
|
199
|
+
.map((value) => fromObjectId(value))
|
|
200
|
+
.filter((value) => value !== null && value !== undefined);
|
|
201
|
+
if (ids.length === 0) return new Map();
|
|
202
|
+
|
|
203
|
+
try {
|
|
204
|
+
// Convert string IDs to ObjectIds for bulk query
|
|
205
|
+
const objectIds = ids.map(id => toObjectId(id)).filter(Boolean);
|
|
206
|
+
if (objectIds.length === 0) return new Map();
|
|
207
|
+
|
|
208
|
+
// Use raw findMany to bypass Prisma encryption extension
|
|
209
|
+
const rawCredentials = await findMany(this.prisma, 'Credential', {
|
|
210
|
+
_id: { $in: objectIds }
|
|
211
|
+
});
|
|
212
|
+
|
|
213
|
+
// Decrypt all credentials in parallel
|
|
214
|
+
const decryptionPromises = rawCredentials.map(async (rawCredential) => {
|
|
215
|
+
try {
|
|
216
|
+
// Decrypt sensitive fields using service
|
|
217
|
+
const decryptedCredential = await this.encryptionService.decryptFields('Credential', rawCredential);
|
|
218
|
+
|
|
219
|
+
// Build credential object in same format as Prisma would return
|
|
220
|
+
const credential = {
|
|
221
|
+
id: fromObjectId(decryptedCredential._id),
|
|
222
|
+
userId: fromObjectId(decryptedCredential.userId),
|
|
223
|
+
externalId: decryptedCredential.externalId ?? null,
|
|
224
|
+
authIsValid: decryptedCredential.authIsValid ?? null,
|
|
225
|
+
createdAt: decryptedCredential.createdAt,
|
|
226
|
+
updatedAt: decryptedCredential.updatedAt,
|
|
227
|
+
data: decryptedCredential.data
|
|
228
|
+
};
|
|
229
|
+
|
|
230
|
+
return this._convertCredentialIds(credential);
|
|
231
|
+
} catch (error) {
|
|
232
|
+
const credId = fromObjectId(rawCredential._id);
|
|
233
|
+
console.error(`Failed to decrypt credential ${credId}:`, error.message);
|
|
234
|
+
return null;
|
|
235
|
+
}
|
|
236
|
+
});
|
|
237
|
+
|
|
238
|
+
// Wait for all decryptions to complete
|
|
239
|
+
const decryptedCredentials = await Promise.all(decryptionPromises);
|
|
240
|
+
|
|
241
|
+
// Build Map from results, filtering out nulls
|
|
242
|
+
const map = new Map();
|
|
243
|
+
decryptedCredentials.forEach(credential => {
|
|
244
|
+
if (credential) {
|
|
245
|
+
map.set(credential.id, credential);
|
|
246
|
+
}
|
|
247
|
+
});
|
|
248
|
+
|
|
249
|
+
return map;
|
|
250
|
+
} catch (error) {
|
|
251
|
+
console.error('Failed to fetch credentials bulk:', error.message);
|
|
252
|
+
return new Map();
|
|
253
|
+
}
|
|
254
|
+
}
|
|
255
|
+
|
|
256
|
+
/**
|
|
257
|
+
* Convert credential object IDs to strings for application layer
|
|
258
|
+
* Ensures consistent credential format across database adapters
|
|
259
|
+
* @private
|
|
260
|
+
* @param {Object|null} credential - Credential object from database
|
|
261
|
+
* @returns {Object|null} Credential with properly formatted IDs
|
|
262
|
+
*/
|
|
263
|
+
_convertCredentialIds(credential) {
|
|
264
|
+
if (!credential) return credential;
|
|
265
|
+
return {
|
|
266
|
+
...credential,
|
|
267
|
+
id: credential.id ? String(credential.id) : null,
|
|
268
|
+
userId: credential.userId ? String(credential.userId) : null,
|
|
269
|
+
};
|
|
270
|
+
}
|
|
271
|
+
|
|
272
|
+
_buildFilter(filter) {
|
|
273
|
+
const query = {};
|
|
274
|
+
if (!filter) return query;
|
|
275
|
+
if (filter._id || filter.id) {
|
|
276
|
+
const idObj = toObjectId(filter._id || filter.id);
|
|
277
|
+
if (idObj) query._id = idObj;
|
|
278
|
+
}
|
|
279
|
+
if (filter.user || filter.userId) {
|
|
280
|
+
const userObj = toObjectId(filter.user || filter.userId);
|
|
281
|
+
if (userObj) query.userId = userObj;
|
|
282
|
+
}
|
|
283
|
+
if (filter.credential || filter.credentialId) {
|
|
284
|
+
const credObj = toObjectId(filter.credential || filter.credentialId);
|
|
285
|
+
if (credObj) query.credentialId = credObj;
|
|
286
|
+
}
|
|
287
|
+
if (filter.name) query.name = filter.name;
|
|
288
|
+
if (filter.moduleName) query.moduleName = filter.moduleName;
|
|
289
|
+
if (filter.externalId) query.externalId = filter.externalId;
|
|
290
|
+
return query;
|
|
291
|
+
}
|
|
292
|
+
|
|
293
|
+
_mapEntity(doc, credential) {
|
|
294
|
+
return {
|
|
295
|
+
id: fromObjectId(doc?._id),
|
|
296
|
+
accountId: doc?.accountId ?? null,
|
|
297
|
+
credential,
|
|
298
|
+
userId: fromObjectId(doc?.userId),
|
|
299
|
+
name: doc?.name ?? null,
|
|
300
|
+
externalId: doc?.externalId ?? null,
|
|
301
|
+
moduleName: doc?.moduleName ?? null,
|
|
302
|
+
};
|
|
303
|
+
}
|
|
304
|
+
}
|
|
305
|
+
|
|
306
|
+
module.exports = { ModuleRepositoryDocumentDB };
|
|
307
|
+
|
|
@@ -1,5 +1,8 @@
|
|
|
1
1
|
const { ModuleRepositoryMongo } = require('./module-repository-mongo');
|
|
2
2
|
const { ModuleRepositoryPostgres } = require('./module-repository-postgres');
|
|
3
|
+
const {
|
|
4
|
+
ModuleRepositoryDocumentDB,
|
|
5
|
+
} = require('./module-repository-documentdb');
|
|
3
6
|
const config = require('../../database/config');
|
|
4
7
|
|
|
5
8
|
/**
|
|
@@ -18,9 +21,12 @@ function createModuleRepository() {
|
|
|
18
21
|
case 'postgresql':
|
|
19
22
|
return new ModuleRepositoryPostgres();
|
|
20
23
|
|
|
24
|
+
case 'documentdb':
|
|
25
|
+
return new ModuleRepositoryDocumentDB();
|
|
26
|
+
|
|
21
27
|
default:
|
|
22
28
|
throw new Error(
|
|
23
|
-
`Unsupported database type: ${dbType}. Supported values: 'mongodb', 'postgresql'`
|
|
29
|
+
`Unsupported database type: ${dbType}. Supported values: 'mongodb', 'documentdb', 'postgresql'`
|
|
24
30
|
);
|
|
25
31
|
}
|
|
26
32
|
}
|
|
@@ -30,4 +36,5 @@ module.exports = {
|
|
|
30
36
|
// Export adapters for direct testing
|
|
31
37
|
ModuleRepositoryMongo,
|
|
32
38
|
ModuleRepositoryPostgres,
|
|
39
|
+
ModuleRepositoryDocumentDB,
|
|
33
40
|
};
|
package/package.json
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@friggframework/core",
|
|
3
3
|
"prettier": "@friggframework/prettier-config",
|
|
4
|
-
"version": "2.0.0-next.
|
|
4
|
+
"version": "2.0.0-next.55",
|
|
5
5
|
"dependencies": {
|
|
6
6
|
"@aws-sdk/client-apigatewaymanagementapi": "^3.588.0",
|
|
7
7
|
"@aws-sdk/client-kms": "^3.588.0",
|
|
@@ -38,9 +38,9 @@
|
|
|
38
38
|
}
|
|
39
39
|
},
|
|
40
40
|
"devDependencies": {
|
|
41
|
-
"@friggframework/eslint-config": "2.0.0-next.
|
|
42
|
-
"@friggframework/prettier-config": "2.0.0-next.
|
|
43
|
-
"@friggframework/test": "2.0.0-next.
|
|
41
|
+
"@friggframework/eslint-config": "2.0.0-next.55",
|
|
42
|
+
"@friggframework/prettier-config": "2.0.0-next.55",
|
|
43
|
+
"@friggframework/test": "2.0.0-next.55",
|
|
44
44
|
"@prisma/client": "^6.17.0",
|
|
45
45
|
"@types/lodash": "4.17.15",
|
|
46
46
|
"@typescript-eslint/eslint-plugin": "^8.0.0",
|
|
@@ -80,5 +80,5 @@
|
|
|
80
80
|
"publishConfig": {
|
|
81
81
|
"access": "public"
|
|
82
82
|
},
|
|
83
|
-
"gitHead": "
|
|
83
|
+
"gitHead": "7f86d4b5faaab4de74e6e3676948b62d1e1a5bb1"
|
|
84
84
|
}
|