@robelest/convex-auth 0.0.4-preview.13 → 0.0.4-preview.16

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (328) hide show
  1. package/README.md +140 -9
  2. package/dist/bin.cjs +5957 -5478
  3. package/dist/client/index.d.ts +3 -7
  4. package/dist/client/index.d.ts.map +1 -1
  5. package/dist/client/index.js +27 -26
  6. package/dist/client/index.js.map +1 -1
  7. package/dist/component/_generated/api.d.ts +14 -0
  8. package/dist/component/_generated/api.d.ts.map +1 -1
  9. package/dist/component/_generated/api.js.map +1 -1
  10. package/dist/component/_generated/component.d.ts +1672 -24
  11. package/dist/component/_generated/component.d.ts.map +1 -1
  12. package/dist/component/convex.config.d.ts +2 -2
  13. package/dist/component/convex.config.d.ts.map +1 -1
  14. package/dist/component/index.d.ts +1 -1
  15. package/dist/component/index.js +2 -2
  16. package/dist/component/model.d.ts +153 -0
  17. package/dist/component/model.d.ts.map +1 -0
  18. package/dist/component/model.js +343 -0
  19. package/dist/component/model.js.map +1 -0
  20. package/dist/component/providers/sso.d.ts +1 -1
  21. package/dist/component/public/enterprise.d.ts +54 -0
  22. package/dist/component/public/enterprise.d.ts.map +1 -0
  23. package/dist/component/public/enterprise.js +515 -0
  24. package/dist/component/public/enterprise.js.map +1 -0
  25. package/dist/component/public/factors.d.ts +52 -0
  26. package/dist/component/public/factors.d.ts.map +1 -0
  27. package/dist/component/public/factors.js +285 -0
  28. package/dist/component/public/factors.js.map +1 -0
  29. package/dist/component/public/groups.d.ts +116 -0
  30. package/dist/component/public/groups.d.ts.map +1 -0
  31. package/dist/component/public/groups.js +596 -0
  32. package/dist/component/public/groups.js.map +1 -0
  33. package/dist/component/public/identity.d.ts +93 -0
  34. package/dist/component/public/identity.d.ts.map +1 -0
  35. package/dist/component/public/identity.js +426 -0
  36. package/dist/component/public/identity.js.map +1 -0
  37. package/dist/component/public/keys.d.ts +41 -0
  38. package/dist/component/public/keys.d.ts.map +1 -0
  39. package/dist/component/public/keys.js +157 -0
  40. package/dist/component/public/keys.js.map +1 -0
  41. package/dist/component/public/shared.d.ts +26 -0
  42. package/dist/component/public/shared.d.ts.map +1 -0
  43. package/dist/component/public/shared.js +32 -0
  44. package/dist/component/public/shared.js.map +1 -0
  45. package/dist/component/public.d.ts +9 -321
  46. package/dist/component/public.d.ts.map +1 -1
  47. package/dist/component/public.js +6 -2145
  48. package/dist/component/schema.d.ts +406 -260
  49. package/dist/component/schema.js +37 -32
  50. package/dist/component/schema.js.map +1 -1
  51. package/dist/component/server/auth.d.ts +161 -15
  52. package/dist/component/server/auth.d.ts.map +1 -1
  53. package/dist/component/server/auth.js +100 -7
  54. package/dist/component/server/auth.js.map +1 -1
  55. package/dist/component/server/cookies.js +3 -0
  56. package/dist/component/server/cookies.js.map +1 -1
  57. package/dist/component/server/db.js +1 -0
  58. package/dist/component/server/db.js.map +1 -1
  59. package/dist/component/server/device.js +3 -1
  60. package/dist/component/server/device.js.map +1 -1
  61. package/dist/component/server/domains/core.js +629 -0
  62. package/dist/component/server/domains/core.js.map +1 -0
  63. package/dist/component/server/domains/sso.js +884 -0
  64. package/dist/component/server/domains/sso.js.map +1 -0
  65. package/dist/component/server/factory.d.ts +136 -0
  66. package/dist/component/server/factory.d.ts.map +1 -0
  67. package/dist/component/server/factory.js +1134 -0
  68. package/dist/component/server/factory.js.map +1 -0
  69. package/dist/component/server/fx.js +2 -1
  70. package/dist/component/server/fx.js.map +1 -1
  71. package/dist/component/server/http.js +287 -0
  72. package/dist/component/server/http.js.map +1 -0
  73. package/dist/component/server/identity.js +13 -0
  74. package/dist/component/server/identity.js.map +1 -0
  75. package/dist/component/server/keys.js +4 -0
  76. package/dist/component/server/keys.js.map +1 -1
  77. package/dist/component/server/mutations/account.js +1 -1
  78. package/dist/component/server/mutations/index.js +2 -2
  79. package/dist/component/server/mutations/index.js.map +1 -1
  80. package/dist/component/server/mutations/invalidate.js +1 -1
  81. package/dist/component/server/mutations/oauth.js +10 -7
  82. package/dist/component/server/mutations/oauth.js.map +1 -1
  83. package/dist/component/server/mutations/refresh.js +1 -1
  84. package/dist/component/server/mutations/register.js +1 -1
  85. package/dist/component/server/mutations/retrieve.js +1 -1
  86. package/dist/component/server/mutations/signature.js +1 -1
  87. package/dist/component/server/mutations/store.js +6 -3
  88. package/dist/component/server/mutations/store.js.map +1 -1
  89. package/dist/component/server/mutations/verify.js +1 -1
  90. package/dist/component/server/oauth.js +3 -0
  91. package/dist/component/server/oauth.js.map +1 -1
  92. package/dist/component/server/passkey.js +3 -2
  93. package/dist/component/server/passkey.js.map +1 -1
  94. package/dist/component/server/provider.js +2 -0
  95. package/dist/component/server/provider.js.map +1 -1
  96. package/dist/component/server/providers.js +10 -0
  97. package/dist/component/server/providers.js.map +1 -1
  98. package/dist/component/server/ratelimit.js +3 -0
  99. package/dist/component/server/ratelimit.js.map +1 -1
  100. package/dist/component/server/redirects.js +2 -0
  101. package/dist/component/server/redirects.js.map +1 -1
  102. package/dist/component/server/refresh.js +5 -0
  103. package/dist/component/server/refresh.js.map +1 -1
  104. package/dist/component/server/sessions.js +5 -0
  105. package/dist/component/server/sessions.js.map +1 -1
  106. package/dist/component/server/signin.js +2 -1
  107. package/dist/component/server/signin.js.map +1 -1
  108. package/dist/component/server/sso.js +166 -19
  109. package/dist/component/server/sso.js.map +1 -1
  110. package/dist/component/server/tokens.js +1 -0
  111. package/dist/component/server/tokens.js.map +1 -1
  112. package/dist/component/server/totp.js +4 -2
  113. package/dist/component/server/totp.js.map +1 -1
  114. package/dist/component/server/types.d.ts +106 -38
  115. package/dist/component/server/types.d.ts.map +1 -1
  116. package/dist/component/server/types.js.map +1 -1
  117. package/dist/component/server/users.js +1 -0
  118. package/dist/component/server/users.js.map +1 -1
  119. package/dist/component/server/utils.js +44 -2
  120. package/dist/component/server/utils.js.map +1 -1
  121. package/dist/providers/anonymous.d.ts +1 -1
  122. package/dist/providers/credentials.d.ts +1 -1
  123. package/dist/providers/password.d.ts +1 -1
  124. package/dist/providers/sso.d.ts +1 -1
  125. package/dist/providers/sso.js.map +1 -1
  126. package/dist/server/auth.d.ts +163 -17
  127. package/dist/server/auth.d.ts.map +1 -1
  128. package/dist/server/auth.js +100 -7
  129. package/dist/server/auth.js.map +1 -1
  130. package/dist/server/cookies.d.ts +1 -38
  131. package/dist/server/cookies.js +3 -0
  132. package/dist/server/cookies.js.map +1 -1
  133. package/dist/server/db.d.ts +1 -125
  134. package/dist/server/db.js +1 -0
  135. package/dist/server/db.js.map +1 -1
  136. package/dist/server/device.d.ts +1 -24
  137. package/dist/server/device.js +3 -1
  138. package/dist/server/device.js.map +1 -1
  139. package/dist/server/domains/core.d.ts +434 -0
  140. package/dist/server/domains/core.d.ts.map +1 -0
  141. package/dist/server/domains/core.js +629 -0
  142. package/dist/server/domains/core.js.map +1 -0
  143. package/dist/server/domains/sso.d.ts +409 -0
  144. package/dist/server/domains/sso.d.ts.map +1 -0
  145. package/dist/server/domains/sso.js +884 -0
  146. package/dist/server/domains/sso.js.map +1 -0
  147. package/dist/server/enterpriseValidators.d.ts +1 -0
  148. package/dist/server/enterpriseValidators.js +60 -0
  149. package/dist/server/enterpriseValidators.js.map +1 -0
  150. package/dist/server/factory.d.ts +136 -0
  151. package/dist/server/factory.d.ts.map +1 -0
  152. package/dist/server/factory.js +1134 -0
  153. package/dist/server/factory.js.map +1 -0
  154. package/dist/server/fx.d.ts +1 -16
  155. package/dist/server/fx.d.ts.map +1 -1
  156. package/dist/server/fx.js +1 -0
  157. package/dist/server/fx.js.map +1 -1
  158. package/dist/server/http.d.ts +59 -0
  159. package/dist/server/http.d.ts.map +1 -0
  160. package/dist/server/http.js +287 -0
  161. package/dist/server/http.js.map +1 -0
  162. package/dist/server/identity.d.ts +1 -0
  163. package/dist/server/identity.js +13 -0
  164. package/dist/server/identity.js.map +1 -0
  165. package/dist/server/index.d.ts +468 -1
  166. package/dist/server/index.d.ts.map +1 -1
  167. package/dist/server/index.js +530 -36
  168. package/dist/server/index.js.map +1 -1
  169. package/dist/server/keys.d.ts +1 -57
  170. package/dist/server/keys.js +4 -0
  171. package/dist/server/keys.js.map +1 -1
  172. package/dist/server/mutations/account.d.ts +7 -7
  173. package/dist/server/mutations/account.d.ts.map +1 -1
  174. package/dist/server/mutations/code.d.ts +13 -13
  175. package/dist/server/mutations/code.d.ts.map +1 -1
  176. package/dist/server/mutations/index.d.ts +107 -107
  177. package/dist/server/mutations/index.d.ts.map +1 -1
  178. package/dist/server/mutations/index.js +1 -1
  179. package/dist/server/mutations/index.js.map +1 -1
  180. package/dist/server/mutations/invalidate.d.ts +5 -5
  181. package/dist/server/mutations/invalidate.d.ts.map +1 -1
  182. package/dist/server/mutations/oauth.d.ts +10 -10
  183. package/dist/server/mutations/oauth.d.ts.map +1 -1
  184. package/dist/server/mutations/oauth.js +9 -6
  185. package/dist/server/mutations/oauth.js.map +1 -1
  186. package/dist/server/mutations/refresh.d.ts +4 -4
  187. package/dist/server/mutations/register.d.ts +12 -12
  188. package/dist/server/mutations/register.d.ts.map +1 -1
  189. package/dist/server/mutations/retrieve.d.ts +7 -7
  190. package/dist/server/mutations/signature.d.ts +5 -5
  191. package/dist/server/mutations/signin.d.ts +6 -6
  192. package/dist/server/mutations/signin.d.ts.map +1 -1
  193. package/dist/server/mutations/signout.d.ts +1 -1
  194. package/dist/server/mutations/store.d.ts +3 -2
  195. package/dist/server/mutations/store.d.ts.map +1 -1
  196. package/dist/server/mutations/store.js +6 -3
  197. package/dist/server/mutations/store.js.map +1 -1
  198. package/dist/server/mutations/verifier.d.ts +1 -1
  199. package/dist/server/mutations/verify.d.ts +11 -11
  200. package/dist/server/mutations/verify.d.ts.map +1 -1
  201. package/dist/server/oauth.d.ts +1 -59
  202. package/dist/server/oauth.js +3 -0
  203. package/dist/server/oauth.js.map +1 -1
  204. package/dist/server/passkey.d.ts.map +1 -1
  205. package/dist/server/passkey.js +3 -2
  206. package/dist/server/passkey.js.map +1 -1
  207. package/dist/server/provider.d.ts +1 -14
  208. package/dist/server/provider.d.ts.map +1 -1
  209. package/dist/server/provider.js +2 -0
  210. package/dist/server/provider.js.map +1 -1
  211. package/dist/server/providers.js +10 -0
  212. package/dist/server/providers.js.map +1 -1
  213. package/dist/server/ratelimit.d.ts +1 -22
  214. package/dist/server/ratelimit.js +3 -0
  215. package/dist/server/ratelimit.js.map +1 -1
  216. package/dist/server/redirects.d.ts +1 -10
  217. package/dist/server/redirects.js +2 -0
  218. package/dist/server/redirects.js.map +1 -1
  219. package/dist/server/refresh.d.ts +1 -37
  220. package/dist/server/refresh.js +5 -0
  221. package/dist/server/refresh.js.map +1 -1
  222. package/dist/server/sessions.d.ts +1 -28
  223. package/dist/server/sessions.js +5 -0
  224. package/dist/server/sessions.js.map +1 -1
  225. package/dist/server/signin.d.ts +1 -55
  226. package/dist/server/signin.js +2 -1
  227. package/dist/server/signin.js.map +1 -1
  228. package/dist/server/sso.d.ts +1 -348
  229. package/dist/server/sso.js +165 -18
  230. package/dist/server/sso.js.map +1 -1
  231. package/dist/server/templates.d.ts +1 -21
  232. package/dist/server/templates.js +1 -0
  233. package/dist/server/templates.js.map +1 -1
  234. package/dist/server/tokens.d.ts +1 -11
  235. package/dist/server/tokens.js +1 -0
  236. package/dist/server/tokens.js.map +1 -1
  237. package/dist/server/totp.d.ts +1 -23
  238. package/dist/server/totp.js +4 -2
  239. package/dist/server/totp.js.map +1 -1
  240. package/dist/server/types.d.ts +114 -77
  241. package/dist/server/types.d.ts.map +1 -1
  242. package/dist/server/types.js.map +1 -1
  243. package/dist/server/users.d.ts +1 -31
  244. package/dist/server/users.js +1 -0
  245. package/dist/server/users.js.map +1 -1
  246. package/dist/server/utils.d.ts +1 -27
  247. package/dist/server/utils.js +44 -2
  248. package/dist/server/utils.js.map +1 -1
  249. package/dist/server/version.d.ts +1 -1
  250. package/dist/server/version.js +1 -1
  251. package/dist/server/version.js.map +1 -1
  252. package/package.json +4 -5
  253. package/src/cli/bin.ts +5 -0
  254. package/src/cli/index.ts +22 -9
  255. package/src/cli/keys.ts +3 -0
  256. package/src/client/index.ts +36 -37
  257. package/src/component/_generated/api.ts +14 -0
  258. package/src/component/_generated/component.ts +2106 -9
  259. package/src/component/index.ts +3 -1
  260. package/src/component/model.ts +441 -0
  261. package/src/component/public/enterprise.ts +753 -0
  262. package/src/component/public/factors.ts +332 -0
  263. package/src/component/public/groups.ts +932 -0
  264. package/src/component/public/identity.ts +566 -0
  265. package/src/component/public/keys.ts +209 -0
  266. package/src/component/public/shared.ts +119 -0
  267. package/src/component/public.ts +5 -2965
  268. package/src/component/schema.ts +68 -63
  269. package/src/providers/sso.ts +1 -1
  270. package/src/server/auth.ts +413 -18
  271. package/src/server/cookies.ts +3 -0
  272. package/src/server/db.ts +3 -0
  273. package/src/server/device.ts +3 -1
  274. package/src/server/domains/core.ts +1071 -0
  275. package/src/server/domains/sso.ts +1749 -0
  276. package/src/server/enterpriseValidators.ts +93 -0
  277. package/src/server/factory.ts +2181 -0
  278. package/src/server/fx.ts +1 -0
  279. package/src/server/http.ts +529 -0
  280. package/src/server/identity.ts +18 -0
  281. package/src/server/index.ts +806 -40
  282. package/src/server/keys.ts +4 -0
  283. package/src/server/mutations/index.ts +1 -1
  284. package/src/server/mutations/oauth.ts +36 -8
  285. package/src/server/mutations/store.ts +6 -3
  286. package/src/server/oauth.ts +6 -0
  287. package/src/server/passkey.ts +3 -2
  288. package/src/server/provider.ts +2 -0
  289. package/src/server/providers.ts +20 -0
  290. package/src/server/ratelimit.ts +3 -0
  291. package/src/server/redirects.ts +2 -0
  292. package/src/server/refresh.ts +5 -0
  293. package/src/server/sessions.ts +5 -0
  294. package/src/server/signin.ts +1 -0
  295. package/src/server/sso.ts +259 -17
  296. package/src/server/templates.ts +1 -0
  297. package/src/server/tokens.ts +1 -0
  298. package/src/server/totp.ts +4 -2
  299. package/src/server/types.ts +178 -83
  300. package/src/server/users.ts +1 -0
  301. package/src/server/utils.ts +71 -1
  302. package/src/server/version.ts +1 -1
  303. package/dist/component/public.js.map +0 -1
  304. package/dist/component/server/implementation.d.ts +0 -1264
  305. package/dist/component/server/implementation.d.ts.map +0 -1
  306. package/dist/component/server/implementation.js +0 -2365
  307. package/dist/component/server/implementation.js.map +0 -1
  308. package/dist/server/cookies.d.ts.map +0 -1
  309. package/dist/server/db.d.ts.map +0 -1
  310. package/dist/server/device.d.ts.map +0 -1
  311. package/dist/server/implementation.d.ts +0 -1264
  312. package/dist/server/implementation.d.ts.map +0 -1
  313. package/dist/server/implementation.js +0 -2365
  314. package/dist/server/implementation.js.map +0 -1
  315. package/dist/server/keys.d.ts.map +0 -1
  316. package/dist/server/oauth.d.ts.map +0 -1
  317. package/dist/server/ratelimit.d.ts.map +0 -1
  318. package/dist/server/redirects.d.ts.map +0 -1
  319. package/dist/server/refresh.d.ts.map +0 -1
  320. package/dist/server/sessions.d.ts.map +0 -1
  321. package/dist/server/signin.d.ts.map +0 -1
  322. package/dist/server/sso.d.ts.map +0 -1
  323. package/dist/server/templates.d.ts.map +0 -1
  324. package/dist/server/tokens.d.ts.map +0 -1
  325. package/dist/server/totp.d.ts.map +0 -1
  326. package/dist/server/users.d.ts.map +0 -1
  327. package/dist/server/utils.d.ts.map +0 -1
  328. package/src/server/implementation.ts +0 -5336
@@ -0,0 +1,1749 @@
1
+ import { GenericActionCtx, GenericDataModel } from "convex/server";
2
+
3
+ import { AuthError, Fx } from "../fx";
4
+ import type { EnterprisePolicyPatch } from "../types";
5
+
6
+ type ComponentCtx = Pick<
7
+ GenericActionCtx<GenericDataModel>,
8
+ "runQuery" | "runMutation"
9
+ >;
10
+ type ComponentReadCtx = Pick<GenericActionCtx<GenericDataModel>, "runQuery">;
11
+
12
+ /**
13
+ * Build the enterprise and SSO management domain.
14
+ */
15
+ export function createSsoDomain(deps: any) {
16
+ const {
17
+ config,
18
+ normalizeEnterprisePolicy,
19
+ normalizeDomain,
20
+ getEnterpriseSecret,
21
+ loadEnterpriseOrThrow,
22
+ validateEnterprisePolicy,
23
+ recordEnterpriseAuditEvent,
24
+ emitEnterpriseWebhookDeliveries,
25
+ enterpriseNotFoundError,
26
+ ENTERPRISE_OIDC_CLIENT_SECRET_KIND,
27
+ requireEnv,
28
+ generateRandomString,
29
+ INVITE_TOKEN_ALPHABET,
30
+ sha256,
31
+ encryptSecret,
32
+ upsertProtocolConfig,
33
+ parseSamlIdpMetadata,
34
+ createServiceProviderMetadata,
35
+ getSamlServiceProviderOptions,
36
+ getPublicOidcConfig,
37
+ withOidcSecretState,
38
+ getOidcConfig,
39
+ getEnterpriseOidcUrls,
40
+ enterpriseOidcProviderId,
41
+ getPolicyFromEnterprise,
42
+ patchEnterprisePolicy,
43
+ } = deps;
44
+
45
+ const ENTERPRISE_DOMAIN_VERIFICATION_PREFIX = "_convex-auth-verification";
46
+ const ENTERPRISE_DOMAIN_VERIFICATION_TTL_MS = 1000 * 60 * 60 * 24 * 7;
47
+
48
+ const toDomainSummary = (domain: {
49
+ _id: string;
50
+ domain: string;
51
+ isPrimary: boolean;
52
+ verifiedAt?: number;
53
+ }) => ({
54
+ domainId: domain._id,
55
+ domain: domain.domain,
56
+ isPrimary: domain.isPrimary,
57
+ verified: domain.verifiedAt !== undefined,
58
+ verifiedAt: domain.verifiedAt ?? null,
59
+ });
60
+
61
+ const getDomainVerificationRecordName = (domain: string) =>
62
+ `${ENTERPRISE_DOMAIN_VERIFICATION_PREFIX}.${normalizeDomain(domain)}`;
63
+
64
+ const parseTxtAnswer = (value: string) => {
65
+ const quoted = [...value.matchAll(/"([^"]*)"/g)].map((match) => match[1]);
66
+ if (quoted.length > 0) {
67
+ return quoted.join("");
68
+ }
69
+ return value.replace(/^"|"$/g, "").trim();
70
+ };
71
+
72
+ const resolveTxtValues = async (recordName: string) => {
73
+ const url = new URL("https://dns.google/resolve");
74
+ url.searchParams.set("name", recordName);
75
+ url.searchParams.set("type", "TXT");
76
+
77
+ const response = await fetch(url, {
78
+ headers: { accept: "application/json" },
79
+ });
80
+ if (!response.ok) {
81
+ throw new Error(`DNS TXT lookup failed with status ${response.status}.`);
82
+ }
83
+ const data = (await response.json()) as {
84
+ Answer?: Array<{ data?: string }>;
85
+ };
86
+ return (data.Answer ?? [])
87
+ .map((answer) =>
88
+ typeof answer.data === "string" ? parseTxtAnswer(answer.data) : null,
89
+ )
90
+ .filter((value): value is string => value !== null && value.length > 0);
91
+ };
92
+
93
+ return {
94
+ connection: {
95
+ create: async (
96
+ ctx: ComponentCtx,
97
+ data: {
98
+ groupId: string;
99
+ slug?: string;
100
+ name?: string;
101
+ status?: "draft" | "active" | "disabled";
102
+ policy?: EnterprisePolicyPatch;
103
+ config?: Record<string, unknown>;
104
+ extend?: Record<string, unknown>;
105
+ },
106
+ ): Promise<{ ok: true; enterpriseId: string; groupId: string }> => {
107
+ const enterpriseId = (await ctx.runMutation(
108
+ config.component.public.enterpriseCreate,
109
+ {
110
+ ...data,
111
+ policy: normalizeEnterprisePolicy(data.policy),
112
+ },
113
+ )) as string;
114
+ return {
115
+ ok: true,
116
+ enterpriseId,
117
+ groupId: data.groupId,
118
+ };
119
+ },
120
+ get: async (ctx: ComponentReadCtx, enterpriseId: string) => {
121
+ return await ctx.runQuery(config.component.public.enterpriseGet, {
122
+ enterpriseId,
123
+ });
124
+ },
125
+ getByGroup: async (ctx: ComponentReadCtx, groupId: string) => {
126
+ return await ctx.runQuery(
127
+ config.component.public.enterpriseGetByGroup,
128
+ {
129
+ groupId,
130
+ },
131
+ );
132
+ },
133
+ getByDomain: async (ctx: ComponentReadCtx, domain: string) => {
134
+ return await ctx.runQuery(
135
+ config.component.public.enterpriseGetByDomain,
136
+ {
137
+ domain: normalizeDomain(domain),
138
+ },
139
+ );
140
+ },
141
+ list: async (
142
+ ctx: ComponentReadCtx,
143
+ opts?: {
144
+ where?: {
145
+ groupId?: string;
146
+ slug?: string;
147
+ status?: "draft" | "active" | "disabled";
148
+ };
149
+ limit?: number;
150
+ cursor?: string | null;
151
+ orderBy?: "_creationTime" | "name" | "slug" | "status";
152
+ order?: "asc" | "desc";
153
+ },
154
+ ) => {
155
+ return await ctx.runQuery(config.component.public.enterpriseList, {
156
+ where: opts?.where,
157
+ limit: opts?.limit,
158
+ cursor: opts?.cursor,
159
+ orderBy: opts?.orderBy,
160
+ order: opts?.order,
161
+ });
162
+ },
163
+ update: async (
164
+ ctx: ComponentCtx,
165
+ enterpriseId: string,
166
+ data: Record<string, unknown>,
167
+ ) => {
168
+ await ctx.runMutation(config.component.public.enterpriseUpdate, {
169
+ enterpriseId,
170
+ data,
171
+ });
172
+ return { ok: true as const, enterpriseId };
173
+ },
174
+ delete: async (ctx: ComponentCtx, enterpriseId: string) => {
175
+ await ctx.runMutation(config.component.public.enterpriseDelete, {
176
+ enterpriseId,
177
+ });
178
+ return { ok: true as const, enterpriseId };
179
+ },
180
+ /**
181
+ * Aggregate readiness status across all configured protocols for an
182
+ * enterprise connection.
183
+ *
184
+ * Returns a structured result indicating whether the connection is
185
+ * ready, with per-protocol checks so callers can surface actionable
186
+ * diagnostics without running full network validation.
187
+ */
188
+ status: async (ctx: ComponentReadCtx, enterpriseId: string) => {
189
+ const enterprise = await ctx.runQuery(
190
+ config.component.public.enterpriseGet,
191
+ { enterpriseId },
192
+ );
193
+ if (!enterprise) {
194
+ throw new AuthError(
195
+ "INVALID_PARAMETERS",
196
+ enterpriseNotFoundError,
197
+ ).toConvexError();
198
+ }
199
+ const policy = getPolicyFromEnterprise(enterprise);
200
+ const protocols = enterprise.config?.protocols ?? {};
201
+ const oidcConfig = protocols.oidc;
202
+ const oidcSecret = await getEnterpriseSecret(
203
+ ctx,
204
+ enterprise._id,
205
+ ENTERPRISE_OIDC_CLIENT_SECRET_KIND,
206
+ );
207
+ const samlConfig = protocols.saml;
208
+ const scimConfig = await ctx.runQuery(
209
+ config.component.public.enterpriseScimConfigGetByEnterprise,
210
+ { enterpriseId },
211
+ );
212
+ const domains = await ctx.runQuery(
213
+ config.component.public.enterpriseDomainList,
214
+ { enterpriseId },
215
+ );
216
+
217
+ const oidcReady =
218
+ oidcConfig?.enabled === true &&
219
+ typeof oidcConfig?.clientId === "string" &&
220
+ oidcConfig.clientId.length > 0 &&
221
+ oidcSecret !== null &&
222
+ (typeof oidcConfig?.issuer === "string" ||
223
+ typeof oidcConfig?.discoveryUrl === "string");
224
+ const samlReady =
225
+ samlConfig?.enabled === true &&
226
+ typeof samlConfig?.idp?.entityId === "string";
227
+ const scimReady =
228
+ scimConfig !== null &&
229
+ scimConfig !== undefined &&
230
+ (scimConfig as any).status === "active";
231
+
232
+ const ready =
233
+ enterprise.status === "active" && (oidcReady || samlReady);
234
+
235
+ return {
236
+ enterpriseId: enterprise._id,
237
+ status: enterprise.status,
238
+ ready,
239
+ domainCount: (domains as unknown[]).length,
240
+ protocols: {
241
+ oidc: {
242
+ configured: oidcReady,
243
+ ready: oidcReady,
244
+ clientId: oidcConfig?.clientId ?? null,
245
+ issuer: oidcConfig?.issuer ?? oidcConfig?.discoveryUrl ?? null,
246
+ },
247
+ saml: {
248
+ configured: samlReady,
249
+ ready: samlReady,
250
+ entityId: samlConfig?.idp?.entityId ?? null,
251
+ },
252
+ scim: {
253
+ configured: scimReady,
254
+ ready: scimReady,
255
+ basePath: scimConfig?.basePath ?? null,
256
+ deprovisionMode: policy.provisioning.deprovision.mode,
257
+ },
258
+ },
259
+ };
260
+ },
261
+ },
262
+ domain: {
263
+ add: async (
264
+ ctx: ComponentCtx,
265
+ data: {
266
+ enterpriseId: string;
267
+ groupId: string;
268
+ domain: string;
269
+ isPrimary?: boolean;
270
+ },
271
+ ): Promise<string> => {
272
+ return (await ctx.runMutation(
273
+ config.component.public.enterpriseDomainAdd,
274
+ {
275
+ ...data,
276
+ domain: normalizeDomain(data.domain),
277
+ },
278
+ )) as string;
279
+ },
280
+ list: async (ctx: ComponentReadCtx, enterpriseId: string) => {
281
+ return await ctx.runQuery(
282
+ config.component.public.enterpriseDomainList,
283
+ {
284
+ enterpriseId,
285
+ },
286
+ );
287
+ },
288
+ validate: async (ctx: ComponentReadCtx, enterpriseId: string) => {
289
+ const enterprise = await ctx.runQuery(
290
+ config.component.public.enterpriseGet,
291
+ { enterpriseId },
292
+ );
293
+ if (enterprise === null) {
294
+ throw new AuthError(
295
+ "INVALID_PARAMETERS",
296
+ enterpriseNotFoundError,
297
+ ).toConvexError();
298
+ }
299
+
300
+ const domains = await ctx.runQuery(
301
+ config.component.public.enterpriseDomainList,
302
+ { enterpriseId },
303
+ );
304
+ const primaryDomains = domains.filter(
305
+ (domain: (typeof domains)[number]) => domain.isPrimary,
306
+ );
307
+ const verifiedDomains = domains.filter(
308
+ (domain: (typeof domains)[number]) => domain.verifiedAt !== undefined,
309
+ );
310
+
311
+ const warnings: string[] = [];
312
+ if (domains.length === 0) {
313
+ warnings.push("No domains configured.");
314
+ }
315
+ if (primaryDomains.length === 0 && domains.length > 0) {
316
+ warnings.push("No primary domain configured.");
317
+ }
318
+ if (primaryDomains.length > 1) {
319
+ warnings.push("Multiple primary domains configured.");
320
+ }
321
+ if (verifiedDomains.length === 0 && domains.length > 0) {
322
+ warnings.push("No verified domains yet.");
323
+ }
324
+
325
+ return {
326
+ enterpriseId,
327
+ ready:
328
+ enterprise.status === "active" &&
329
+ domains.length > 0 &&
330
+ primaryDomains.length === 1 &&
331
+ verifiedDomains.length > 0,
332
+ summary: {
333
+ domainCount: domains.length,
334
+ primaryCount: primaryDomains.length,
335
+ verifiedCount: verifiedDomains.length,
336
+ },
337
+ domains: domains.map((domain: (typeof domains)[number]) =>
338
+ toDomainSummary(domain),
339
+ ),
340
+ warnings,
341
+ };
342
+ },
343
+ remove: async (ctx: ComponentCtx, domainId: string) => {
344
+ await ctx.runMutation(config.component.public.enterpriseDomainDelete, {
345
+ domainId,
346
+ });
347
+ },
348
+ verification: {
349
+ request: async (
350
+ ctx: ComponentCtx,
351
+ args: { enterpriseId: string; domain: string },
352
+ ) => {
353
+ const enterprise = await loadEnterpriseOrThrow(
354
+ ctx,
355
+ args.enterpriseId,
356
+ );
357
+ const normalizedDomain = normalizeDomain(args.domain);
358
+ const domains = await ctx.runQuery(
359
+ config.component.public.enterpriseDomainList,
360
+ { enterpriseId: enterprise._id },
361
+ );
362
+ const domain = domains.find(
363
+ (entry: (typeof domains)[number]) =>
364
+ entry.domain === normalizedDomain,
365
+ );
366
+ if (!domain) {
367
+ throw new AuthError(
368
+ "INVALID_PARAMETERS",
369
+ "Domain is not attached to this enterprise.",
370
+ ).toConvexError();
371
+ }
372
+
373
+ const requestedAt = Date.now();
374
+ const expiresAt = requestedAt + ENTERPRISE_DOMAIN_VERIFICATION_TTL_MS;
375
+ const token = generateRandomString(32, INVITE_TOKEN_ALPHABET);
376
+ const tokenHash = await sha256(token);
377
+ const recordName = getDomainVerificationRecordName(normalizedDomain);
378
+
379
+ await ctx.runMutation(
380
+ config.component.public.enterpriseDomainVerificationUpsert,
381
+ {
382
+ enterpriseId: enterprise._id,
383
+ groupId: enterprise.groupId,
384
+ domainId: domain._id,
385
+ domain: normalizedDomain,
386
+ recordName,
387
+ token,
388
+ tokenHash,
389
+ requestedAt,
390
+ expiresAt,
391
+ },
392
+ );
393
+
394
+ await recordEnterpriseAuditEvent(ctx, {
395
+ enterpriseId: enterprise._id,
396
+ groupId: enterprise.groupId,
397
+ eventType: "enterprise.domain.verification_requested",
398
+ actorType: "system",
399
+ subjectType: "enterprise_domain",
400
+ subjectId: domain._id,
401
+ ok: true,
402
+ metadata: { domain: normalizedDomain, recordName, expiresAt },
403
+ });
404
+
405
+ return {
406
+ ok: true as const,
407
+ enterpriseId: enterprise._id,
408
+ domain: normalizedDomain,
409
+ requestedAt,
410
+ expiresAt,
411
+ challenge: {
412
+ recordType: "TXT" as const,
413
+ recordName,
414
+ recordValue: token,
415
+ },
416
+ };
417
+ },
418
+ confirm: async (
419
+ ctx: ComponentCtx,
420
+ args: { enterpriseId: string; domain: string },
421
+ ) => {
422
+ const enterprise = await loadEnterpriseOrThrow(
423
+ ctx,
424
+ args.enterpriseId,
425
+ );
426
+ const normalizedDomain = normalizeDomain(args.domain);
427
+ const domains = await ctx.runQuery(
428
+ config.component.public.enterpriseDomainList,
429
+ { enterpriseId: enterprise._id },
430
+ );
431
+ const domain = domains.find(
432
+ (entry: (typeof domains)[number]) =>
433
+ entry.domain === normalizedDomain,
434
+ );
435
+ if (!domain) {
436
+ throw new AuthError(
437
+ "INVALID_PARAMETERS",
438
+ "Domain is not attached to this enterprise.",
439
+ ).toConvexError();
440
+ }
441
+
442
+ if (domain.verifiedAt !== undefined) {
443
+ return {
444
+ ok: true,
445
+ enterpriseId: enterprise._id,
446
+ domain: normalizedDomain,
447
+ verifiedAt: domain.verifiedAt,
448
+ checks: [
449
+ {
450
+ name: "domain_verified",
451
+ ok: true,
452
+ message: "Domain is already verified.",
453
+ },
454
+ ],
455
+ };
456
+ }
457
+
458
+ const verification = await ctx.runQuery(
459
+ config.component.public.enterpriseDomainVerificationGet,
460
+ { domainId: domain._id },
461
+ );
462
+ const checks: Array<{ name: string; ok: boolean; message?: string }> =
463
+ [];
464
+ if (!verification) {
465
+ checks.push({
466
+ name: "verification_requested",
467
+ ok: false,
468
+ message: "No active domain verification challenge exists.",
469
+ });
470
+ return {
471
+ ok: false,
472
+ enterpriseId: enterprise._id,
473
+ domain: normalizedDomain,
474
+ checks,
475
+ };
476
+ }
477
+
478
+ checks.push({ name: "verification_requested", ok: true });
479
+
480
+ if (verification.expiresAt < Date.now()) {
481
+ await ctx.runMutation(
482
+ config.component.public.enterpriseDomainVerificationDelete,
483
+ { domainId: domain._id },
484
+ );
485
+ checks.push({
486
+ name: "challenge_active",
487
+ ok: false,
488
+ message: "The verification challenge expired. Request a new one.",
489
+ });
490
+ return {
491
+ ok: false,
492
+ enterpriseId: enterprise._id,
493
+ domain: normalizedDomain,
494
+ checks,
495
+ };
496
+ }
497
+
498
+ checks.push({ name: "challenge_active", ok: true });
499
+
500
+ let txtValues: string[];
501
+ try {
502
+ txtValues = await resolveTxtValues(verification.recordName);
503
+ } catch (error) {
504
+ throw new AuthError(
505
+ "INTERNAL_ERROR",
506
+ error instanceof Error
507
+ ? error.message
508
+ : "Failed to resolve DNS TXT records.",
509
+ ).toConvexError();
510
+ }
511
+
512
+ checks.push({
513
+ name: "dns_record_present",
514
+ ok: txtValues.length > 0,
515
+ message:
516
+ txtValues.length > 0
517
+ ? undefined
518
+ : `No TXT records found at ${verification.recordName}.`,
519
+ });
520
+
521
+ const matches = txtValues.includes(verification.token);
522
+ checks.push({
523
+ name: "dns_record_matches",
524
+ ok: matches,
525
+ message: matches
526
+ ? undefined
527
+ : `TXT record at ${verification.recordName} does not match the expected value.`,
528
+ });
529
+
530
+ if (!checks.every((check) => check.ok)) {
531
+ return {
532
+ ok: false,
533
+ enterpriseId: enterprise._id,
534
+ domain: normalizedDomain,
535
+ checks,
536
+ };
537
+ }
538
+
539
+ const verifiedAt = Date.now();
540
+ await ctx.runMutation(
541
+ config.component.public.enterpriseDomainVerify,
542
+ {
543
+ domainId: domain._id,
544
+ verifiedAt,
545
+ },
546
+ );
547
+
548
+ await recordEnterpriseAuditEvent(ctx, {
549
+ enterpriseId: enterprise._id,
550
+ groupId: enterprise.groupId,
551
+ eventType: "enterprise.domain.verified",
552
+ actorType: "system",
553
+ subjectType: "enterprise_domain",
554
+ subjectId: domain._id,
555
+ ok: true,
556
+ metadata: { domain: normalizedDomain, verifiedAt },
557
+ });
558
+
559
+ return {
560
+ ok: true,
561
+ enterpriseId: enterprise._id,
562
+ domain: normalizedDomain,
563
+ verifiedAt,
564
+ checks,
565
+ };
566
+ },
567
+ },
568
+ },
569
+ saml: {
570
+ configure: async <DataModel extends GenericDataModel>(
571
+ ctx: GenericActionCtx<DataModel>,
572
+ data: {
573
+ enterpriseId: string;
574
+ metadataXml?: string;
575
+ metadataUrl?: string;
576
+ domains?: string[];
577
+ signAuthnRequests?: boolean;
578
+ attributeMapping?: {
579
+ subject?: string;
580
+ email?: string;
581
+ name?: string;
582
+ firstName?: string;
583
+ lastName?: string;
584
+ };
585
+ sp?: {
586
+ entityId?: string;
587
+ acsUrl?: string;
588
+ sloUrl?: string;
589
+ signingCert?: string | string[];
590
+ encryptCert?: string | string[];
591
+ privateKey?: string;
592
+ privateKeyPass?: string;
593
+ encPrivateKey?: string;
594
+ encPrivateKeyPass?: string;
595
+ };
596
+ },
597
+ ) => {
598
+ return await Fx.run(
599
+ Fx.gen(function* () {
600
+ const enterprise = yield* Fx.from({
601
+ ok: () =>
602
+ ctx.runQuery(config.component.public.enterpriseGet, {
603
+ enterpriseId: data.enterpriseId,
604
+ }),
605
+ err: () =>
606
+ new AuthError("INTERNAL_ERROR", "Failed to load enterprise."),
607
+ }).pipe(
608
+ Fx.chain((ent) =>
609
+ ent === null
610
+ ? Fx.fail(
611
+ new AuthError(
612
+ "INVALID_PARAMETERS",
613
+ enterpriseNotFoundError,
614
+ ),
615
+ )
616
+ : Fx.succeed(ent),
617
+ ),
618
+ );
619
+ const metadataXml = yield* data.metadataXml
620
+ ? Fx.succeed(data.metadataXml)
621
+ : data.metadataUrl
622
+ ? Fx.defer(() =>
623
+ Fx.from({
624
+ ok: async () => {
625
+ const response = await fetch(data.metadataUrl!);
626
+ if (!response.ok) {
627
+ throw new Error(
628
+ `Failed to fetch SAML metadata: ${response.status}`,
629
+ );
630
+ }
631
+ return await response.text();
632
+ },
633
+ err: (error) =>
634
+ new AuthError(
635
+ "INVALID_PARAMETERS",
636
+ error instanceof Error
637
+ ? error.message
638
+ : "Failed to fetch SAML metadata",
639
+ ),
640
+ }),
641
+ ).pipe(
642
+ Fx.timeout(10_000),
643
+ Fx.retry(
644
+ Fx.retry.compose(
645
+ Fx.retry.jittered(Fx.retry.exponential(200)),
646
+ Fx.retry.recurs(2),
647
+ ),
648
+ ),
649
+ Fx.recover((error) =>
650
+ Fx.fail(
651
+ new AuthError(
652
+ "INVALID_PARAMETERS",
653
+ error instanceof Error
654
+ ? error.message
655
+ : "Failed to fetch SAML metadata",
656
+ ),
657
+ ),
658
+ ),
659
+ )
660
+ : Fx.fail(
661
+ new AuthError(
662
+ "INVALID_PARAMETERS",
663
+ "SAML registration requires metadataXml or metadataUrl.",
664
+ ),
665
+ );
666
+
667
+ const parsed = yield* Fx.from({
668
+ ok: () => parseSamlIdpMetadata(metadataXml),
669
+ err: () =>
670
+ new AuthError(
671
+ "INVALID_PARAMETERS",
672
+ "Failed to parse SAML metadata.",
673
+ ),
674
+ });
675
+
676
+ const baseConfig = upsertProtocolConfig(enterprise.config, "saml", {
677
+ enabled: true,
678
+ idp: {
679
+ metadataXml,
680
+ ...parsed,
681
+ },
682
+ sp: data.sp,
683
+ signAuthnRequests:
684
+ data.signAuthnRequests ?? parsed.wantsSignedAuthnRequests,
685
+ attributeMapping: data.attributeMapping,
686
+ });
687
+ const normalizedDomains = data.domains?.map(normalizeDomain);
688
+ const nextConfig = normalizedDomains
689
+ ? { ...baseConfig, domains: normalizedDomains }
690
+ : baseConfig;
691
+
692
+ yield* Fx.from({
693
+ ok: () =>
694
+ ctx.runMutation(config.component.public.enterpriseUpdate, {
695
+ enterpriseId: enterprise._id,
696
+ data: {
697
+ status: "active",
698
+ config: nextConfig,
699
+ },
700
+ }),
701
+ err: () =>
702
+ new AuthError(
703
+ "INTERNAL_ERROR",
704
+ "Failed to persist SAML registration.",
705
+ ),
706
+ });
707
+
708
+ if (normalizedDomains) {
709
+ for (const [index, domain] of normalizedDomains.entries()) {
710
+ yield* Fx.from({
711
+ ok: () =>
712
+ ctx.runMutation(
713
+ config.component.public.enterpriseDomainAdd,
714
+ {
715
+ enterpriseId: enterprise._id,
716
+ groupId: enterprise.groupId,
717
+ domain,
718
+ isPrimary: index === 0,
719
+ },
720
+ ),
721
+ err: () =>
722
+ new AuthError(
723
+ "INTERNAL_ERROR",
724
+ "Failed to persist enterprise domain.",
725
+ ),
726
+ });
727
+ }
728
+ }
729
+
730
+ yield* Fx.from({
731
+ ok: () =>
732
+ recordEnterpriseAuditEvent(ctx, {
733
+ enterpriseId: enterprise._id,
734
+ groupId: enterprise.groupId,
735
+ eventType: "enterprise.saml.registered",
736
+ actorType: "system",
737
+ subjectType: "enterprise_saml",
738
+ subjectId: enterprise._id,
739
+ ok: true,
740
+ metadata: {
741
+ metadataUrl: data.metadataUrl,
742
+ domains: normalizedDomains,
743
+ },
744
+ }),
745
+ err: () =>
746
+ new AuthError(
747
+ "INTERNAL_ERROR",
748
+ "Failed to record SAML registration audit event.",
749
+ ),
750
+ });
751
+
752
+ return {
753
+ ok: true as const,
754
+ enterpriseId: enterprise._id,
755
+ groupId: enterprise.groupId,
756
+ };
757
+ }).pipe(Fx.recover((e) => Fx.fatal(e.toConvexError()))),
758
+ );
759
+ },
760
+ metadata: async <DataModel extends GenericDataModel>(
761
+ ctx: GenericActionCtx<DataModel>,
762
+ opts: {
763
+ enterpriseId: string;
764
+ entityId?: string;
765
+ acsUrl?: string;
766
+ sloUrl?: string;
767
+ },
768
+ ) => {
769
+ const enterprise = await ctx.runQuery(
770
+ config.component.public.enterpriseGet,
771
+ {
772
+ enterpriseId: opts.enterpriseId,
773
+ },
774
+ );
775
+ if (!enterprise) {
776
+ throw new AuthError(
777
+ "INVALID_PARAMETERS",
778
+ "Enterprise not found.",
779
+ ).toConvexError();
780
+ }
781
+
782
+ return createServiceProviderMetadata(
783
+ getSamlServiceProviderOptions({
784
+ rootUrl: requireEnv("CONVEX_SITE_URL"),
785
+ source: { kind: "enterprise", id: enterprise._id },
786
+ config: enterprise.config,
787
+ overrides: {
788
+ entityId: opts.entityId,
789
+ acsUrl: opts.acsUrl,
790
+ sloUrl: opts.sloUrl,
791
+ },
792
+ }),
793
+ );
794
+ },
795
+ /**
796
+ * Validate the stored SAML config for an enterprise connection.
797
+ *
798
+ * Re-parses IdP metadata, checks signing cert presence, and verifies
799
+ * SP metadata can be generated. Returns a structured result with
800
+ * per-check details rather than throwing on first failure.
801
+ */
802
+ validate: async <DataModel extends GenericDataModel>(
803
+ ctx: GenericActionCtx<DataModel>,
804
+ enterpriseId: string,
805
+ ) => {
806
+ const checks: Array<{
807
+ name: string;
808
+ ok: boolean;
809
+ message?: string;
810
+ }> = [];
811
+
812
+ const enterprise = await ctx.runQuery(
813
+ config.component.public.enterpriseGet,
814
+ { enterpriseId },
815
+ );
816
+
817
+ if (!enterprise) {
818
+ return {
819
+ ok: false,
820
+ enterpriseId,
821
+ checks: [
822
+ {
823
+ name: "enterprise_exists",
824
+ ok: false,
825
+ message: "Enterprise not found.",
826
+ },
827
+ ],
828
+ };
829
+ }
830
+
831
+ const samlConfig = enterprise.config?.protocols?.saml;
832
+ const samlConfigured =
833
+ samlConfig?.enabled === true &&
834
+ typeof samlConfig?.idp?.metadataXml === "string";
835
+
836
+ checks.push({
837
+ name: "saml_configured",
838
+ ok: samlConfigured,
839
+ message: samlConfigured ? undefined : "SAML is not configured.",
840
+ });
841
+
842
+ const hasIdpMetadata =
843
+ typeof samlConfig?.idp?.metadataXml === "string" &&
844
+ samlConfig.idp.metadataXml.length > 0;
845
+ checks.push({
846
+ name: "idp_metadata_present",
847
+ ok: hasIdpMetadata,
848
+ message: hasIdpMetadata ? undefined : "IdP metadata XML is missing.",
849
+ });
850
+
851
+ const hasEntityId =
852
+ typeof samlConfig?.idp?.entityId === "string" &&
853
+ samlConfig.idp.entityId.length > 0;
854
+ checks.push({
855
+ name: "idp_entity_id",
856
+ ok: hasEntityId,
857
+ message: hasEntityId
858
+ ? undefined
859
+ : "IdP entityId could not be parsed from metadata.",
860
+ });
861
+
862
+ let spMetadataOk = false;
863
+ let spMetadataMessage: string | undefined;
864
+ if (samlConfigured) {
865
+ try {
866
+ createServiceProviderMetadata(
867
+ getSamlServiceProviderOptions({
868
+ rootUrl: requireEnv("CONVEX_SITE_URL"),
869
+ source: { kind: "enterprise", id: enterprise._id },
870
+ config: enterprise.config,
871
+ overrides: {},
872
+ }),
873
+ );
874
+ spMetadataOk = true;
875
+ } catch (e) {
876
+ spMetadataMessage =
877
+ e instanceof Error ? e.message : "SP metadata generation failed.";
878
+ }
879
+ } else {
880
+ spMetadataMessage = "Skipped — SAML not configured.";
881
+ }
882
+ checks.push({
883
+ name: "sp_metadata_generates",
884
+ ok: spMetadataOk,
885
+ message: spMetadataMessage,
886
+ });
887
+
888
+ return {
889
+ ok: checks.every((c) => c.ok),
890
+ enterpriseId: enterprise._id,
891
+ checks,
892
+ };
893
+ },
894
+ },
895
+ policy: {
896
+ get: async (ctx: ComponentReadCtx, enterpriseId: string) => {
897
+ const enterprise = await loadEnterpriseOrThrow(ctx, enterpriseId);
898
+ return getPolicyFromEnterprise(enterprise);
899
+ },
900
+ update: async (
901
+ ctx: ComponentCtx,
902
+ enterpriseId: string,
903
+ patch: EnterprisePolicyPatch,
904
+ ) => {
905
+ const enterprise = await loadEnterpriseOrThrow(ctx, enterpriseId);
906
+ const policy = patchEnterprisePolicy(enterprise.policy, patch);
907
+ await ctx.runMutation(config.component.public.enterpriseUpdate, {
908
+ enterpriseId,
909
+ data: { policy },
910
+ });
911
+ await recordEnterpriseAuditEvent(ctx, {
912
+ enterpriseId: enterprise._id,
913
+ groupId: enterprise.groupId,
914
+ eventType: "enterprise.policy.updated",
915
+ actorType: "system",
916
+ subjectType: "enterprise_policy",
917
+ subjectId: enterprise._id,
918
+ ok: true,
919
+ metadata: { version: policy.version },
920
+ });
921
+ return policy;
922
+ },
923
+ validate: async (ctx: ComponentReadCtx, enterpriseId: string) => {
924
+ const enterprise = await ctx.runQuery(
925
+ config.component.public.enterpriseGet,
926
+ { enterpriseId },
927
+ );
928
+ if (!enterprise) {
929
+ return {
930
+ ok: false,
931
+ enterpriseId,
932
+ checks: [
933
+ {
934
+ name: "enterprise_exists",
935
+ ok: false,
936
+ message: enterpriseNotFoundError,
937
+ },
938
+ ],
939
+ };
940
+ }
941
+ const policy = getPolicyFromEnterprise(enterprise);
942
+ const checks = validateEnterprisePolicy(policy);
943
+ return {
944
+ ok: checks.every((check: { ok: boolean }) => check.ok),
945
+ enterpriseId,
946
+ policy,
947
+ checks,
948
+ };
949
+ },
950
+ },
951
+ oidc: {
952
+ /**
953
+ * Register or update enterprise OIDC connection settings.
954
+ *
955
+ * Persists protocol config under `enterprise.config.protocols.oidc` and
956
+ * records an `enterprise.oidc.registered` audit event.
957
+ */
958
+ configure: async (
959
+ ctx: ComponentCtx,
960
+ data: {
961
+ enterpriseId: string;
962
+ issuer?: string;
963
+ discoveryUrl?: string;
964
+ clientId: string;
965
+ clientSecret?: string;
966
+ scopes?: string[];
967
+ authorizationParams?: Record<string, string>;
968
+ clockToleranceSeconds?: number;
969
+ strictIssuer?: boolean;
970
+ /**
971
+ * Map OIDC claim names to `user.extend` field names.
972
+ * Example: `{ department: "department", role: "job_title" }` means
973
+ * the OIDC `department` claim is stored as `user.extend.department`.
974
+ */
975
+ extraFields?: Record<string, string>;
976
+ },
977
+ ) => {
978
+ return await Fx.run(
979
+ Fx.gen(function* () {
980
+ yield* Fx.guard(
981
+ data.issuer === undefined && data.discoveryUrl === undefined,
982
+ Fx.fail(
983
+ new AuthError(
984
+ "INVALID_PARAMETERS",
985
+ "OIDC registration requires issuer or discoveryUrl.",
986
+ ),
987
+ ),
988
+ );
989
+
990
+ const enterprise = yield* Fx.from({
991
+ ok: () =>
992
+ ctx.runQuery(config.component.public.enterpriseGet, {
993
+ enterpriseId: data.enterpriseId,
994
+ }),
995
+ err: () =>
996
+ new AuthError("INTERNAL_ERROR", "Failed to load enterprise."),
997
+ }).pipe(
998
+ Fx.chain((ent) =>
999
+ ent === null
1000
+ ? Fx.fail(
1001
+ new AuthError(
1002
+ "INVALID_PARAMETERS",
1003
+ enterpriseNotFoundError,
1004
+ ),
1005
+ )
1006
+ : Fx.succeed(ent),
1007
+ ),
1008
+ );
1009
+ const nextConfig = upsertProtocolConfig(enterprise.config, "oidc", {
1010
+ enabled: true,
1011
+ issuer: data.issuer,
1012
+ discoveryUrl: data.discoveryUrl,
1013
+ clientId: data.clientId,
1014
+ scopes: data.scopes ?? ["openid", "profile", "email"],
1015
+ authorizationParams: data.authorizationParams,
1016
+ clockToleranceSeconds: data.clockToleranceSeconds,
1017
+ strictIssuer: data.strictIssuer,
1018
+ extraFields: data.extraFields,
1019
+ });
1020
+
1021
+ yield* Fx.from({
1022
+ ok: () =>
1023
+ ctx.runMutation(config.component.public.enterpriseUpdate, {
1024
+ enterpriseId: data.enterpriseId,
1025
+ data: { config: nextConfig },
1026
+ }),
1027
+ err: () =>
1028
+ new AuthError(
1029
+ "INTERNAL_ERROR",
1030
+ "Failed to persist OIDC registration.",
1031
+ ),
1032
+ });
1033
+
1034
+ if (data.clientSecret !== undefined) {
1035
+ const ciphertext = yield* Fx.from({
1036
+ ok: () => encryptSecret(data.clientSecret!),
1037
+ err: () =>
1038
+ new AuthError(
1039
+ "INTERNAL_ERROR",
1040
+ "Failed to encrypt OIDC client secret.",
1041
+ ),
1042
+ });
1043
+ yield* Fx.from({
1044
+ ok: () =>
1045
+ ctx.runMutation(
1046
+ config.component.public.enterpriseSecretUpsert,
1047
+ {
1048
+ enterpriseId: data.enterpriseId,
1049
+ groupId: enterprise.groupId,
1050
+ kind: ENTERPRISE_OIDC_CLIENT_SECRET_KIND,
1051
+ ciphertext,
1052
+ updatedAt: Date.now(),
1053
+ },
1054
+ ),
1055
+ err: () =>
1056
+ new AuthError(
1057
+ "INTERNAL_ERROR",
1058
+ "Failed to persist OIDC client secret.",
1059
+ ),
1060
+ });
1061
+ }
1062
+
1063
+ yield* Fx.from({
1064
+ ok: () =>
1065
+ recordEnterpriseAuditEvent(ctx, {
1066
+ enterpriseId: data.enterpriseId,
1067
+ groupId: enterprise.groupId,
1068
+ eventType: "enterprise.oidc.registered",
1069
+ actorType: "system",
1070
+ subjectType: "enterprise_oidc",
1071
+ subjectId: data.enterpriseId,
1072
+ ok: true,
1073
+ metadata: {
1074
+ issuer: data.issuer,
1075
+ discoveryUrl: data.discoveryUrl,
1076
+ },
1077
+ }),
1078
+ err: () =>
1079
+ new AuthError(
1080
+ "INTERNAL_ERROR",
1081
+ "Failed to record OIDC registration audit event.",
1082
+ ),
1083
+ });
1084
+
1085
+ const secret = yield* Fx.from({
1086
+ ok: () =>
1087
+ getEnterpriseSecret(
1088
+ ctx,
1089
+ data.enterpriseId,
1090
+ ENTERPRISE_OIDC_CLIENT_SECRET_KIND,
1091
+ ),
1092
+ err: () =>
1093
+ new AuthError(
1094
+ "INTERNAL_ERROR",
1095
+ "Failed to load OIDC secret metadata.",
1096
+ ),
1097
+ });
1098
+
1099
+ return withOidcSecretState(
1100
+ getPublicOidcConfig(nextConfig),
1101
+ secret !== null,
1102
+ );
1103
+ }).pipe(Fx.recover((e) => Fx.fatal(e.toConvexError()))),
1104
+ );
1105
+ },
1106
+ /**
1107
+ * Fetch the stored OIDC config for an enterprise.
1108
+ */
1109
+ get: async (ctx: ComponentReadCtx, enterpriseId: string) => {
1110
+ return await Fx.run(
1111
+ Fx.from({
1112
+ ok: () =>
1113
+ ctx.runQuery(config.component.public.enterpriseGet, {
1114
+ enterpriseId,
1115
+ }),
1116
+ err: () =>
1117
+ new AuthError("INTERNAL_ERROR", "Failed to load enterprise."),
1118
+ }).pipe(
1119
+ Fx.chain((ent) =>
1120
+ ent === null
1121
+ ? Fx.fail(
1122
+ new AuthError(
1123
+ "INVALID_PARAMETERS",
1124
+ enterpriseNotFoundError,
1125
+ ),
1126
+ )
1127
+ : Fx.succeed(ent),
1128
+ ),
1129
+ Fx.chain((enterprise) =>
1130
+ Fx.from({
1131
+ ok: async () => {
1132
+ const secret = await getEnterpriseSecret(
1133
+ ctx,
1134
+ enterprise._id,
1135
+ ENTERPRISE_OIDC_CLIENT_SECRET_KIND,
1136
+ );
1137
+ return withOidcSecretState(
1138
+ getPublicOidcConfig(enterprise.config),
1139
+ secret !== null,
1140
+ );
1141
+ },
1142
+ err: () =>
1143
+ new AuthError(
1144
+ "INTERNAL_ERROR",
1145
+ "Failed to load OIDC secret metadata.",
1146
+ ),
1147
+ }),
1148
+ ),
1149
+ Fx.recover((e) => Fx.fatal(e.toConvexError())),
1150
+ ),
1151
+ );
1152
+ },
1153
+ /**
1154
+ * Resolve enterprise OIDC sign-in route from enterprise id, domain, or
1155
+ * user email domain.
1156
+ */
1157
+ signIn: async (
1158
+ ctx: ComponentReadCtx,
1159
+ data: {
1160
+ enterpriseId?: string;
1161
+ email?: string;
1162
+ domain?: string;
1163
+ redirectTo?: string;
1164
+ },
1165
+ ) => {
1166
+ return await Fx.run(
1167
+ Fx.gen(function* () {
1168
+ const enterprise =
1169
+ data.enterpriseId !== undefined
1170
+ ? yield* Fx.from({
1171
+ ok: () =>
1172
+ ctx.runQuery(config.component.public.enterpriseGet, {
1173
+ enterpriseId: data.enterpriseId,
1174
+ }),
1175
+ err: () =>
1176
+ new AuthError(
1177
+ "INTERNAL_ERROR",
1178
+ "Failed to load enterprise.",
1179
+ ),
1180
+ }).pipe(
1181
+ Fx.chain((ent) =>
1182
+ ent === null
1183
+ ? Fx.fail(
1184
+ new AuthError(
1185
+ "INVALID_PARAMETERS",
1186
+ enterpriseNotFoundError,
1187
+ ),
1188
+ )
1189
+ : Fx.succeed(ent),
1190
+ ),
1191
+ )
1192
+ : data.domain !== undefined || data.email !== undefined
1193
+ ? yield* Fx.from({
1194
+ ok: () =>
1195
+ ctx.runQuery(
1196
+ config.component.public.enterpriseGetByDomain,
1197
+ {
1198
+ domain: normalizeDomain(
1199
+ data.domain ??
1200
+ String(data.email).split("@").at(-1) ??
1201
+ "",
1202
+ ),
1203
+ },
1204
+ ),
1205
+ err: () =>
1206
+ new AuthError(
1207
+ "INTERNAL_ERROR",
1208
+ "Failed to resolve enterprise by domain.",
1209
+ ),
1210
+ }).pipe(
1211
+ Fx.chain((result) =>
1212
+ result?.enterprise &&
1213
+ result.domain?.verifiedAt !== undefined
1214
+ ? Fx.succeed(result.enterprise)
1215
+ : Fx.fail(
1216
+ new AuthError(
1217
+ "INVALID_PARAMETERS",
1218
+ "No enterprise OIDC connection matched the provided input.",
1219
+ ),
1220
+ ),
1221
+ ),
1222
+ )
1223
+ : yield* Fx.fail(
1224
+ new AuthError(
1225
+ "INVALID_PARAMETERS",
1226
+ "No enterprise OIDC connection matched the provided input.",
1227
+ ),
1228
+ );
1229
+
1230
+ yield* Fx.guard(
1231
+ enterprise.status !== "active",
1232
+ Fx.fail(
1233
+ new AuthError(
1234
+ "INVALID_PARAMETERS",
1235
+ "Enterprise connection is not active.",
1236
+ ),
1237
+ ),
1238
+ );
1239
+
1240
+ const oidc = getOidcConfig(enterprise.config);
1241
+ yield* Fx.guard(
1242
+ oidc.enabled !== true,
1243
+ Fx.fail(
1244
+ new AuthError(
1245
+ "PROVIDER_NOT_CONFIGURED",
1246
+ "OIDC is not configured for this enterprise.",
1247
+ ),
1248
+ ),
1249
+ );
1250
+
1251
+ const urls = getEnterpriseOidcUrls({
1252
+ rootUrl: requireEnv("CONVEX_SITE_URL"),
1253
+ enterpriseId: enterprise._id,
1254
+ });
1255
+ return {
1256
+ enterpriseId: enterprise._id,
1257
+ providerId: enterpriseOidcProviderId(enterprise._id),
1258
+ signInPath: urls.signInUrl,
1259
+ callbackPath: urls.callbackUrl,
1260
+ redirectTo: data.redirectTo,
1261
+ };
1262
+ }).pipe(Fx.recover((e) => Fx.fatal(e.toConvexError()))),
1263
+ );
1264
+ },
1265
+ /**
1266
+ * Validate the stored OIDC config for an enterprise connection.
1267
+ *
1268
+ * Fetches the OIDC discovery document from the configured issuer or
1269
+ * discoveryUrl, verifies required fields are present, and checks that
1270
+ * clientId is set. Returns a structured result with per-check details.
1271
+ */
1272
+ validate: async (ctx: ComponentReadCtx, enterpriseId: string) => {
1273
+ const checks: Array<{
1274
+ name: string;
1275
+ ok: boolean;
1276
+ message?: string;
1277
+ }> = [];
1278
+
1279
+ const enterprise = await ctx.runQuery(
1280
+ config.component.public.enterpriseGet,
1281
+ { enterpriseId },
1282
+ );
1283
+
1284
+ if (!enterprise) {
1285
+ return {
1286
+ ok: false,
1287
+ enterpriseId,
1288
+ checks: [
1289
+ {
1290
+ name: "enterprise_exists",
1291
+ ok: false,
1292
+ message: "Enterprise not found.",
1293
+ },
1294
+ ],
1295
+ };
1296
+ }
1297
+
1298
+ const oidc = getOidcConfig(enterprise.config);
1299
+ const secret = await getEnterpriseSecret(
1300
+ ctx,
1301
+ enterprise._id,
1302
+ ENTERPRISE_OIDC_CLIENT_SECRET_KIND,
1303
+ );
1304
+ const oidcConfigured =
1305
+ oidc.enabled === true &&
1306
+ typeof oidc.clientId === "string" &&
1307
+ oidc.clientId.length > 0;
1308
+
1309
+ checks.push({
1310
+ name: "oidc_configured",
1311
+ ok: oidcConfigured,
1312
+ message: oidcConfigured ? undefined : "OIDC is not configured.",
1313
+ });
1314
+
1315
+ const hasClientId =
1316
+ typeof oidc.clientId === "string" && oidc.clientId.length > 0;
1317
+ checks.push({
1318
+ name: "client_id_present",
1319
+ ok: hasClientId,
1320
+ message: hasClientId ? undefined : "clientId is missing.",
1321
+ });
1322
+
1323
+ checks.push({
1324
+ name: "client_secret_stored",
1325
+ ok: secret !== null,
1326
+ message:
1327
+ secret !== null ? undefined : "OIDC client secret is missing.",
1328
+ });
1329
+
1330
+ const discoveryTarget = oidc.discoveryUrl ?? oidc.issuer;
1331
+ const hasDiscovery =
1332
+ typeof discoveryTarget === "string" && discoveryTarget.length > 0;
1333
+ checks.push({
1334
+ name: "issuer_or_discovery_url_present",
1335
+ ok: hasDiscovery,
1336
+ message: hasDiscovery
1337
+ ? undefined
1338
+ : "issuer or discoveryUrl is missing.",
1339
+ });
1340
+
1341
+ let discoveryOk = false;
1342
+ let discoveryMessage: string | undefined;
1343
+ if (hasDiscovery) {
1344
+ const discoveryUrl = oidc.discoveryUrl?.length
1345
+ ? oidc.discoveryUrl
1346
+ : `${oidc.issuer}/.well-known/openid-configuration`;
1347
+ try {
1348
+ const res = await fetch(discoveryUrl, {
1349
+ headers: { Accept: "application/json" },
1350
+ signal: AbortSignal.timeout(8_000),
1351
+ });
1352
+ if (!res.ok) {
1353
+ discoveryMessage = `Discovery endpoint returned ${res.status}.`;
1354
+ } else {
1355
+ const json = (await res.json()) as Record<string, unknown>;
1356
+ if (typeof json.issuer !== "string") {
1357
+ discoveryMessage =
1358
+ "Discovery document is missing issuer field.";
1359
+ } else if (typeof json.authorization_endpoint !== "string") {
1360
+ discoveryMessage =
1361
+ "Discovery document is missing authorization_endpoint.";
1362
+ } else {
1363
+ discoveryOk = true;
1364
+ }
1365
+ }
1366
+ } catch (e) {
1367
+ discoveryMessage =
1368
+ e instanceof Error
1369
+ ? `Discovery fetch failed: ${e.message}`
1370
+ : "Discovery fetch failed.";
1371
+ }
1372
+ } else {
1373
+ discoveryMessage = "Skipped — issuer or discoveryUrl not set.";
1374
+ }
1375
+ checks.push({
1376
+ name: "discovery_reachable",
1377
+ ok: discoveryOk,
1378
+ message: discoveryMessage,
1379
+ });
1380
+
1381
+ return {
1382
+ ok: checks.every((c) => c.ok),
1383
+ enterpriseId: enterprise._id,
1384
+ checks,
1385
+ };
1386
+ },
1387
+ },
1388
+ scim: {
1389
+ configure: async (
1390
+ ctx: ComponentCtx,
1391
+ data: {
1392
+ enterpriseId: string;
1393
+ basePath?: string;
1394
+ status?: "draft" | "active" | "disabled";
1395
+ },
1396
+ ) => {
1397
+ const enterprise = await ctx.runQuery(
1398
+ config.component.public.enterpriseGet,
1399
+ {
1400
+ enterpriseId: data.enterpriseId,
1401
+ },
1402
+ );
1403
+ if (enterprise === null) {
1404
+ throw new AuthError(
1405
+ "INVALID_PARAMETERS",
1406
+ "Enterprise not found.",
1407
+ ).toConvexError();
1408
+ }
1409
+ const rawToken = generateRandomString(48, INVITE_TOKEN_ALPHABET);
1410
+ const tokenHash = await sha256(rawToken);
1411
+ const configId = (await ctx.runMutation(
1412
+ config.component.public.enterpriseScimConfigUpsert,
1413
+ {
1414
+ enterpriseId: enterprise._id,
1415
+ groupId: enterprise.groupId,
1416
+ status: data.status ?? "active",
1417
+ basePath:
1418
+ data.basePath ??
1419
+ `${requireEnv("CONVEX_SITE_URL")}/api/auth/sso/${enterprise._id}/scim/v2`,
1420
+ tokenHash,
1421
+ lastRotatedAt: Date.now(),
1422
+ },
1423
+ )) as string;
1424
+ const auditEventId = await recordEnterpriseAuditEvent(ctx, {
1425
+ enterpriseId: enterprise._id,
1426
+ groupId: enterprise.groupId,
1427
+ eventType: "enterprise.scim.configured",
1428
+ actorType: "system",
1429
+ subjectType: "enterprise_scim",
1430
+ subjectId: configId,
1431
+ ok: true,
1432
+ });
1433
+ await emitEnterpriseWebhookDeliveries(ctx, {
1434
+ enterpriseId: enterprise._id,
1435
+ eventType: "enterprise.scim.configured",
1436
+ auditEventId,
1437
+ payload: { enterpriseId: enterprise._id, scimConfigId: configId },
1438
+ });
1439
+ return {
1440
+ ok: true as const,
1441
+ enterpriseId: enterprise._id,
1442
+ configId,
1443
+ basePath:
1444
+ data.basePath ??
1445
+ `${requireEnv("CONVEX_SITE_URL")}/api/auth/sso/${enterprise._id}/scim/v2`,
1446
+ token: rawToken,
1447
+ };
1448
+ },
1449
+ get: async (ctx: ComponentReadCtx, enterpriseId: string) => {
1450
+ return await ctx.runQuery(
1451
+ config.component.public.enterpriseScimConfigGetByEnterprise,
1452
+ { enterpriseId },
1453
+ );
1454
+ },
1455
+ getConfigByToken: async (ctx: ComponentReadCtx, token: string) => {
1456
+ return await ctx.runQuery(
1457
+ config.component.public.enterpriseScimConfigGetByTokenHash,
1458
+ { tokenHash: await sha256(token) },
1459
+ );
1460
+ },
1461
+ /**
1462
+ * Validate the stored SCIM config for an enterprise connection.
1463
+ *
1464
+ * Checks that a SCIM config record exists, is active, has a token
1465
+ * hash set, and has a non-empty basePath. Returns a structured result
1466
+ * with per-check details.
1467
+ */
1468
+ validate: async (ctx: ComponentReadCtx, enterpriseId: string) => {
1469
+ const checks: Array<{
1470
+ name: string;
1471
+ ok: boolean;
1472
+ message?: string;
1473
+ }> = [];
1474
+
1475
+ const enterprise = await ctx.runQuery(
1476
+ config.component.public.enterpriseGet,
1477
+ { enterpriseId },
1478
+ );
1479
+
1480
+ if (!enterprise) {
1481
+ return {
1482
+ ok: false,
1483
+ enterpriseId,
1484
+ checks: [
1485
+ {
1486
+ name: "enterprise_exists",
1487
+ ok: false,
1488
+ message: "Enterprise not found.",
1489
+ },
1490
+ ],
1491
+ };
1492
+ }
1493
+
1494
+ const policy = getPolicyFromEnterprise(enterprise);
1495
+
1496
+ const scimConfig = await ctx.runQuery(
1497
+ config.component.public.enterpriseScimConfigGetByEnterprise,
1498
+ { enterpriseId },
1499
+ );
1500
+
1501
+ const hasConfig = scimConfig !== null && scimConfig !== undefined;
1502
+ checks.push({
1503
+ name: "scim_config_exists",
1504
+ ok: hasConfig,
1505
+ message: hasConfig ? undefined : "SCIM has not been configured.",
1506
+ });
1507
+
1508
+ const isActive = hasConfig && (scimConfig as any).status === "active";
1509
+ checks.push({
1510
+ name: "scim_config_active",
1511
+ ok: isActive,
1512
+ message: isActive
1513
+ ? undefined
1514
+ : `SCIM config status is ${hasConfig ? (scimConfig as any).status : "unknown"}.`,
1515
+ });
1516
+
1517
+ const hasToken =
1518
+ hasConfig &&
1519
+ typeof (scimConfig as any).tokenHash === "string" &&
1520
+ (scimConfig as any).tokenHash.length > 0;
1521
+ checks.push({
1522
+ name: "token_hash_set",
1523
+ ok: hasToken,
1524
+ message: hasToken ? undefined : "SCIM bearer token has not been set.",
1525
+ });
1526
+
1527
+ const hasBasePath =
1528
+ hasConfig &&
1529
+ typeof (scimConfig as any).basePath === "string" &&
1530
+ (scimConfig as any).basePath.length > 0;
1531
+ checks.push({
1532
+ name: "base_path_set",
1533
+ ok: hasBasePath,
1534
+ message: hasBasePath ? undefined : "SCIM basePath is missing.",
1535
+ });
1536
+
1537
+ return {
1538
+ ok: checks.every((c) => c.ok),
1539
+ enterpriseId: enterprise._id,
1540
+ basePath: hasBasePath ? (scimConfig as any).basePath : null,
1541
+ deprovisionMode: policy.provisioning.deprovision.mode,
1542
+ checks,
1543
+ };
1544
+ },
1545
+ identity: {
1546
+ get: async (
1547
+ ctx: ComponentReadCtx,
1548
+ data: {
1549
+ enterpriseId: string;
1550
+ resourceType: "user" | "group";
1551
+ externalId: string;
1552
+ },
1553
+ ) => {
1554
+ return await ctx.runQuery(
1555
+ config.component.public.enterpriseScimIdentityGet,
1556
+ data,
1557
+ );
1558
+ },
1559
+ upsert: async (
1560
+ ctx: ComponentCtx,
1561
+ data: {
1562
+ enterpriseId: string;
1563
+ groupId: string;
1564
+ resourceType: "user" | "group";
1565
+ externalId: string;
1566
+ userId?: string;
1567
+ mappedGroupId?: string;
1568
+ active?: boolean;
1569
+ raw?: Record<string, unknown>;
1570
+ },
1571
+ ) => {
1572
+ return (await ctx.runMutation(
1573
+ config.component.public.enterpriseScimIdentityUpsert,
1574
+ { ...data, lastProvisionedAt: Date.now() },
1575
+ )) as string;
1576
+ },
1577
+ },
1578
+ },
1579
+ audit: {
1580
+ record: async (
1581
+ ctx: ComponentCtx,
1582
+ data: {
1583
+ enterpriseId: string;
1584
+ groupId: string;
1585
+ eventType: string;
1586
+ actorType: "user" | "system" | "scim" | "api_key" | "webhook";
1587
+ actorId?: string;
1588
+ subjectType: string;
1589
+ subjectId?: string;
1590
+ ok: boolean;
1591
+ requestId?: string;
1592
+ ip?: string;
1593
+ metadata?: Record<string, unknown>;
1594
+ },
1595
+ ) => {
1596
+ return await recordEnterpriseAuditEvent(ctx, data);
1597
+ },
1598
+ list: async (
1599
+ ctx: ComponentReadCtx,
1600
+ data: { enterpriseId?: string; groupId?: string; limit?: number },
1601
+ ) => {
1602
+ return await ctx.runQuery(
1603
+ config.component.public.enterpriseAuditEventList,
1604
+ data,
1605
+ );
1606
+ },
1607
+ },
1608
+ webhook: {
1609
+ endpoint: {
1610
+ get: async (ctx: ComponentReadCtx, endpointId: string) => {
1611
+ return await ctx.runQuery(
1612
+ config.component.public.enterpriseWebhookEndpointGet,
1613
+ { endpointId },
1614
+ );
1615
+ },
1616
+ create: async (
1617
+ ctx: ComponentCtx,
1618
+ data: {
1619
+ enterpriseId: string;
1620
+ url: string;
1621
+ secret: string;
1622
+ subscriptions: string[];
1623
+ createdByUserId?: string;
1624
+ },
1625
+ ) => {
1626
+ const enterprise = await ctx.runQuery(
1627
+ config.component.public.enterpriseGet,
1628
+ {
1629
+ enterpriseId: data.enterpriseId,
1630
+ },
1631
+ );
1632
+ if (enterprise === null) {
1633
+ throw new AuthError(
1634
+ "INVALID_PARAMETERS",
1635
+ "Enterprise not found.",
1636
+ ).toConvexError();
1637
+ }
1638
+ const secretHash = await sha256(data.secret);
1639
+ const endpointId = (await ctx.runMutation(
1640
+ config.component.public.enterpriseWebhookEndpointCreate,
1641
+ {
1642
+ enterpriseId: enterprise._id,
1643
+ groupId: enterprise.groupId,
1644
+ url: data.url,
1645
+ secretHash,
1646
+ subscriptions: data.subscriptions,
1647
+ createdByUserId: data.createdByUserId,
1648
+ },
1649
+ )) as string;
1650
+ await recordEnterpriseAuditEvent(ctx, {
1651
+ enterpriseId: enterprise._id,
1652
+ groupId: enterprise.groupId,
1653
+ eventType: "enterprise.webhook.endpoint.created",
1654
+ actorType: data.createdByUserId ? "user" : "system",
1655
+ actorId: data.createdByUserId,
1656
+ subjectType: "enterprise_webhook_endpoint",
1657
+ subjectId: endpointId,
1658
+ ok: true,
1659
+ });
1660
+ return { ok: true as const, endpointId };
1661
+ },
1662
+ list: async (ctx: ComponentReadCtx, enterpriseId: string) => {
1663
+ return await ctx.runQuery(
1664
+ config.component.public.enterpriseWebhookEndpointList,
1665
+ { enterpriseId },
1666
+ );
1667
+ },
1668
+ disable: async (ctx: ComponentCtx, endpointId: string) => {
1669
+ await ctx.runMutation(
1670
+ config.component.public.enterpriseWebhookEndpointUpdate,
1671
+ { endpointId, data: { status: "disabled" } },
1672
+ );
1673
+ return { ok: true as const, endpointId };
1674
+ },
1675
+ },
1676
+ emit: async (
1677
+ ctx: ComponentCtx,
1678
+ data: {
1679
+ enterpriseId: string;
1680
+ eventType: string;
1681
+ payload: Record<string, unknown>;
1682
+ auditEventId?: string;
1683
+ },
1684
+ ) => {
1685
+ await emitEnterpriseWebhookDeliveries(ctx, data);
1686
+ },
1687
+ delivery: {
1688
+ list: async (
1689
+ ctx: ComponentReadCtx,
1690
+ data: { enterpriseId: string; limit?: number },
1691
+ ) => {
1692
+ return await ctx.runQuery(
1693
+ (config.component.public as any).enterpriseWebhookDeliveryList,
1694
+ data,
1695
+ );
1696
+ },
1697
+ listReady: async (ctx: ComponentReadCtx, limit?: number) => {
1698
+ return await ctx.runQuery(
1699
+ config.component.public.enterpriseWebhookDeliveryListReady,
1700
+ { now: Date.now(), limit },
1701
+ );
1702
+ },
1703
+ markDelivered: async (
1704
+ ctx: ComponentCtx,
1705
+ deliveryId: string,
1706
+ responseStatus?: number,
1707
+ ) => {
1708
+ await ctx.runMutation(
1709
+ config.component.public.enterpriseWebhookDeliveryPatch,
1710
+ {
1711
+ deliveryId,
1712
+ data: {
1713
+ status: "delivered",
1714
+ attemptCount: 1,
1715
+ lastAttemptAt: Date.now(),
1716
+ lastResponseStatus: responseStatus,
1717
+ },
1718
+ },
1719
+ );
1720
+ },
1721
+ markFailed: async (
1722
+ ctx: ComponentCtx,
1723
+ deliveryId: string,
1724
+ data: {
1725
+ attemptCount: number;
1726
+ responseStatus?: number;
1727
+ error?: string;
1728
+ retryAt?: number;
1729
+ },
1730
+ ) => {
1731
+ await ctx.runMutation(
1732
+ config.component.public.enterpriseWebhookDeliveryPatch,
1733
+ {
1734
+ deliveryId,
1735
+ data: {
1736
+ status: data.retryAt ? "pending" : "failed",
1737
+ attemptCount: data.attemptCount,
1738
+ lastAttemptAt: Date.now(),
1739
+ lastResponseStatus: data.responseStatus,
1740
+ lastError: data.error,
1741
+ nextAttemptAt: data.retryAt ?? Date.now(),
1742
+ },
1743
+ },
1744
+ );
1745
+ },
1746
+ },
1747
+ },
1748
+ };
1749
+ }