* fix select edit host but not update view (#438) * fix: Checksum issue with chocolatey * fix: Remove homebrew old stuff * Add Korean translation (#439) Co-authored-by: 송준우 <2484@coreit.co.kr> * feat: Automate flatpak * fix: Add imagemagik to electron builder to resolve build error * fix: Build error with runtime repo flag * fix: Flatpak runtime error and install freedesktop ver warning * fix: Flatpak runtime error and install freedesktop ver warning * feat: Re-add homebrew cask and move scripts to backend * fix: No sandbox flag issue * fix: Change name for electron macos cask output * fix: Sandbox error with Linux * fix: Remove comming soon for app stores in readme * Adding Comment at the end of the public_key on the host on deploy (#440) * Add termix.rb Cask file * Update Termix to version 1.9.0 with new checksum * Update README to remove 'coming soon' notes * -Add New Interface for Credential DB -Add Credential Name as a comment into the server authorized_key file --------- Co-authored-by: Luke Gustafson <88517757+LukeGus@users.noreply.github.com> * Sudo auto fill password (#441) * Add termix.rb Cask file * Update Termix to version 1.9.0 with new checksum * Update README to remove 'coming soon' notes * Feature Sudo password auto-fill; * Fix locale json shema; --------- Co-authored-by: Luke Gustafson <88517757+LukeGus@users.noreply.github.com> * Added Italian Language; (#445) * Add termix.rb Cask file * Update Termix to version 1.9.0 with new checksum * Update README to remove 'coming soon' notes * Added Italian Language; --------- Co-authored-by: Luke Gustafson <88517757+LukeGus@users.noreply.github.com> * Auto collapse snippet folders (#448) * Add termix.rb Cask file * Update Termix to version 1.9.0 with new checksum * Update README to remove 'coming soon' notes * feat: Add collapsable snippets (customizable in user profile) * Translations (#447) * Add termix.rb Cask file * Update Termix to version 1.9.0 with new checksum * Update README to remove 'coming soon' notes * Added Italian Language; * Fix translations; Removed duplicate keys, synchronised other languages using English as the source, translated added keys, fixed inaccurate translations. --------- Co-authored-by: Luke Gustafson <88517757+LukeGus@users.noreply.github.com> * Remove PTY-level keepalive (#449) * Add termix.rb Cask file * Update Termix to version 1.9.0 with new checksum * Update README to remove 'coming soon' notes * Remove PTY-level keepalive to prevent unwanted terminal output; use SSH-level keepalive instead --------- Co-authored-by: Luke Gustafson <88517757+LukeGus@users.noreply.github.com> * feat: Seperate server stats and tunnel management (improved both UI's) then started initial docker implementation * fix: finalize adding docker to db * feat: Add docker management support (local squash) * Fix RBAC role system bugs and improve UX (#446) * Fix RBAC role system bugs and improve UX - Fix user list dropdown selection in host sharing - Fix role sharing permissions to include role-based access - Fix translation template interpolation for success messages - Standardize system roles to admin and user only - Auto-assign user role to new registrations - Remove blocking confirmation dialogs in modal contexts - Add missing i18n keys for common actions - Fix button type to prevent unintended form submissions * Enhance RBAC system with UI improvements and security fixes - Move role assignment to Users tab with per-user role management - Protect system roles (admin/user) from editing and manual assignment - Simplify permission system: remove Use level, keep View and Manage - Hide Update button and Sharing tab for view-only/shared hosts - Prevent users from sharing hosts with themselves - Unify table and modal styling across admin panels - Auto-assign system roles on user registration - Add permission metadata to host interface * Add empty state message for role assignment - Display helpful message when no custom roles available - Clarify that system roles are auto-assigned - Add noCustomRolesToAssign translation in English and Chinese * fix: Prevent credential sharing errors for shared hosts - Skip credential resolution for shared hosts with credential authentication to prevent decryption errors (credentials are encrypted per-user) - Add warning alert in sharing tab when host uses credential authentication - Inform users that shared users cannot connect to credential-based hosts - Add translations for credential sharing warning (EN/ZH) This prevents authentication failures when sharing hosts configured with credential authentication while maintaining security by keeping credentials isolated per user. * feat: Improve rbac UI and fixes some bugs --------- Co-authored-by: Luke Gustafson <88517757+LukeGus@users.noreply.github.com> Co-authored-by: LukeGus <bugattiguy527@gmail.com> * SOCKS5 support (#452) * Add termix.rb Cask file * Update Termix to version 1.9.0 with new checksum * Update README to remove 'coming soon' notes * SOCKS5 support Adding single and chain socks5 proxy support * fix: cleanup files --------- Co-authored-by: Luke Gustafson <88517757+LukeGus@users.noreply.github.com> Co-authored-by: LukeGus <bugattiguy527@gmail.com> * Notes and Expiry fields add (#453) * Add termix.rb Cask file * Update Termix to version 1.9.0 with new checksum * Update README to remove 'coming soon' notes * Notes and Expiry add * fix: cleanup files --------- Co-authored-by: Luke Gustafson <88517757+LukeGus@users.noreply.github.com> Co-authored-by: LukeGus <bugattiguy527@gmail.com> * fix: ssh host types * fix: sudo incorrect styling and remove expiration date * feat: add sudo password and add diagonal bg's * fix: snippet running on enter key * fix: base64 decoding * fix: improve server stats / rbac * fix: wrap ssh host json export in hosts array * feat: auto trim host inputs, fix file manager jump hosts, dashboard prevent duplicates, file manager terminal not size updating, improve left sidebar sorting, hide/show tags, add apperance user profile tab, add new host manager tabs. * feat: improve terminal connection speed * fix: sqlite constriant errors and support non-root user (nginx perm issue) * feat: add beta syntax highlighing to terminal * feat: update imports and improve admin settings user management * chore: update translations * chore: update translations * feat: Complete light mode implementation with semantic theme system (#450) - Add comprehensive light/dark mode CSS variables with semantic naming - Implement theme-aware scrollbars using CSS variables - Add light mode backgrounds: --bg-base, --bg-elevated, --bg-surface, etc. - Add theme-aware borders: --border-base, --border-panel, --border-subtle - Add semantic text colors: --foreground-secondary, --foreground-subtle - Convert oklch colors to hex for better compatibility - Add theme awareness to CodeMirror editors - Update dark mode colors for consistency (background, sidebar, card, muted, input) - Add Tailwind color mappings for semantic classes Co-authored-by: Luke Gustafson <88517757+LukeGus@users.noreply.github.com> * fix: syntax errors * chore: updating/match themes and split admin settings * feat: add translation workflow and remove old translation.json * fix: translation workflow error * fix: translation workflow error * feat: improve translation system and update workflow * fix: wrong path for translations * fix: change translation to flat files * fix: gh rule error * chore: auto-translate to multiple languages (#458) * chore: improve organization and made a few styling changes in host manager * feat: improve terminal stability and split out the host manager * fix: add unnversiioned files * chore: migrate all to use the new theme system * fix: wrong animation line colors * fix: rbac implementation general issues (local squash) * fix: remove unneeded files * feat: add 10 new langs * chore: update gitnore * chore: auto-translate to multiple languages (#459) * fix: improve tunnel system * fix: properly split tabs, still need to fix up the host manager * chore: cleanup files (possible RC) * feat: add norwegian * chore: auto-translate to multiple languages (#461) * fix: small qol fixes and began readme update * fix: run cleanup script * feat: add docker docs button * feat: general bug fixes and readme updates * fix: translations * chore: auto-translate to multiple languages (#462) * fix: cleanup files * fix: test new translation issue and add better server-stats support * fix: fix translate error * chore: auto-translate to multiple languages (#463) * fix: fix translate mismatching text * chore: auto-translate to multiple languages (#465) * fix: fix translate mismatching text * fix: fix translate mismatching text * chore: auto-translate to multiple languages (#466) * fix: fix translate mismatching text * fix: fix translate mismatching text * fix: fix translate mismatching text * chore: auto-translate to multiple languages (#467) * fix: fix translate mismatching text * chore: auto-translate to multiple languages (#468) * feat: add to readme, a few qol changes, and improve server stats in general * chore: auto-translate to multiple languages (#469) * feat: turned disk uage into graph and fixed issue with termina console * fix: electron build error and hide icons when shared * chore: run clean * fix: general server stats issues, file manager decoding, ui qol * fix: add dashboard line breaks * fix: docker console error * fix: docker console not loading and mismatched stripped background for electron * fix: docker console not loading * chore: docker console not loading in docker * chore: translate readme to chinese * chore: match package lock to package json * chore: nginx config issue for dokcer console * chore: auto-translate to multiple languages (#470) --------- Co-authored-by: Tran Trung Kien <kientt13.7@gmail.com> Co-authored-by: junu <bigdwarf_@naver.com> Co-authored-by: 송준우 <2484@coreit.co.kr> Co-authored-by: SlimGary <trash.slim@gmail.com> Co-authored-by: Nunzio Marfè <nunzio.marfe@protonmail.com> Co-authored-by: Wesley Reid <starhound@lostsouls.org> Co-authored-by: ZacharyZcR <zacharyzcr1984@gmail.com> Co-authored-by: Denis <38875137+Medvedinca@users.noreply.github.com> Co-authored-by: Peet McKinney <68706879+PeetMcK@users.noreply.github.com>
527 lines
16 KiB
TypeScript
527 lines
16 KiB
TypeScript
import { FieldCrypto } from "./field-crypto.js";
|
|
import { LazyFieldEncryption } from "./lazy-field-encryption.js";
|
|
import { UserCrypto } from "./user-crypto.js";
|
|
import { databaseLogger } from "./logger.js";
|
|
|
|
interface DatabaseInstance {
|
|
prepare: (sql: string) => {
|
|
all: (param?: unknown) => DatabaseRecord[];
|
|
get: (param?: unknown) => DatabaseRecord;
|
|
run: (...params: unknown[]) => unknown;
|
|
};
|
|
}
|
|
|
|
interface DatabaseRecord {
|
|
id: number | string;
|
|
[key: string]: unknown;
|
|
}
|
|
|
|
class DataCrypto {
|
|
private static userCrypto: UserCrypto;
|
|
|
|
static initialize() {
|
|
this.userCrypto = UserCrypto.getInstance();
|
|
}
|
|
|
|
static encryptRecord<T extends Record<string, unknown>>(
|
|
tableName: string,
|
|
record: T,
|
|
userId: string,
|
|
userDataKey: Buffer,
|
|
): T {
|
|
const encryptedRecord: Record<string, unknown> = { ...record };
|
|
const recordId = record.id || "temp-" + Date.now();
|
|
|
|
for (const [fieldName, value] of Object.entries(record)) {
|
|
if (FieldCrypto.shouldEncryptField(tableName, fieldName) && value) {
|
|
encryptedRecord[fieldName] = FieldCrypto.encryptField(
|
|
value as string,
|
|
userDataKey,
|
|
recordId as string,
|
|
fieldName,
|
|
);
|
|
}
|
|
}
|
|
|
|
return encryptedRecord as T;
|
|
}
|
|
|
|
static decryptRecord<T extends Record<string, unknown>>(
|
|
tableName: string,
|
|
record: T,
|
|
userId: string,
|
|
userDataKey: Buffer,
|
|
): T {
|
|
if (!record) return record;
|
|
|
|
const decryptedRecord: Record<string, unknown> = { ...record };
|
|
const recordId = record.id;
|
|
|
|
for (const [fieldName, value] of Object.entries(record)) {
|
|
if (FieldCrypto.shouldEncryptField(tableName, fieldName) && value) {
|
|
decryptedRecord[fieldName] = LazyFieldEncryption.safeGetFieldValue(
|
|
value as string,
|
|
userDataKey,
|
|
recordId as string,
|
|
fieldName,
|
|
);
|
|
}
|
|
}
|
|
|
|
return decryptedRecord as T;
|
|
}
|
|
|
|
static decryptRecords<T extends Record<string, unknown>>(
|
|
tableName: string,
|
|
records: T[],
|
|
userId: string,
|
|
userDataKey: Buffer,
|
|
): T[] {
|
|
if (!Array.isArray(records)) return records;
|
|
return records.map((record) =>
|
|
this.decryptRecord(tableName, record, userId, userDataKey),
|
|
);
|
|
}
|
|
|
|
static async migrateUserSensitiveFields(
|
|
userId: string,
|
|
userDataKey: Buffer,
|
|
db: DatabaseInstance,
|
|
): Promise<{
|
|
migrated: boolean;
|
|
migratedTables: string[];
|
|
migratedFieldsCount: number;
|
|
}> {
|
|
let migrated = false;
|
|
const migratedTables: string[] = [];
|
|
let migratedFieldsCount = 0;
|
|
|
|
try {
|
|
const { needsMigration } =
|
|
await LazyFieldEncryption.checkUserNeedsMigration(
|
|
userId,
|
|
userDataKey,
|
|
db,
|
|
);
|
|
|
|
if (!needsMigration) {
|
|
return { migrated: false, migratedTables: [], migratedFieldsCount: 0 };
|
|
}
|
|
|
|
const sshDataRecords = db
|
|
.prepare("SELECT * FROM ssh_data WHERE user_id = ?")
|
|
.all(userId) as DatabaseRecord[];
|
|
for (const record of sshDataRecords) {
|
|
const sensitiveFields =
|
|
LazyFieldEncryption.getSensitiveFieldsForTable("ssh_data");
|
|
const { updatedRecord, migratedFields, needsUpdate } =
|
|
LazyFieldEncryption.migrateRecordSensitiveFields(
|
|
record,
|
|
sensitiveFields,
|
|
userDataKey,
|
|
record.id.toString(),
|
|
);
|
|
|
|
if (needsUpdate) {
|
|
const updateQuery = `
|
|
UPDATE ssh_data
|
|
SET password = ?, key = ?, key_password = ?, key_type = ?, autostart_password = ?, autostart_key = ?, autostart_key_password = ?, updated_at = CURRENT_TIMESTAMP
|
|
WHERE id = ?
|
|
`;
|
|
db.prepare(updateQuery).run(
|
|
updatedRecord.password || null,
|
|
updatedRecord.key || null,
|
|
updatedRecord.key_password || updatedRecord.keyPassword || null,
|
|
updatedRecord.keyType || null,
|
|
updatedRecord.autostartPassword || null,
|
|
updatedRecord.autostartKey || null,
|
|
updatedRecord.autostartKeyPassword || null,
|
|
record.id,
|
|
);
|
|
|
|
migratedFieldsCount += migratedFields.length;
|
|
if (!migratedTables.includes("ssh_data")) {
|
|
migratedTables.push("ssh_data");
|
|
}
|
|
migrated = true;
|
|
}
|
|
}
|
|
|
|
const sshCredentialsRecords = db
|
|
.prepare("SELECT * FROM ssh_credentials WHERE user_id = ?")
|
|
.all(userId) as DatabaseRecord[];
|
|
for (const record of sshCredentialsRecords) {
|
|
const sensitiveFields =
|
|
LazyFieldEncryption.getSensitiveFieldsForTable("ssh_credentials");
|
|
const { updatedRecord, migratedFields, needsUpdate } =
|
|
LazyFieldEncryption.migrateRecordSensitiveFields(
|
|
record,
|
|
sensitiveFields,
|
|
userDataKey,
|
|
record.id.toString(),
|
|
);
|
|
|
|
if (needsUpdate) {
|
|
const updateQuery = `
|
|
UPDATE ssh_credentials
|
|
SET password = ?, key = ?, key_password = ?, private_key = ?, public_key = ?, key_type = ?, updated_at = CURRENT_TIMESTAMP
|
|
WHERE id = ?
|
|
`;
|
|
db.prepare(updateQuery).run(
|
|
updatedRecord.password || null,
|
|
updatedRecord.key || null,
|
|
updatedRecord.key_password || updatedRecord.keyPassword || null,
|
|
updatedRecord.private_key || updatedRecord.privateKey || null,
|
|
updatedRecord.public_key || updatedRecord.publicKey || null,
|
|
updatedRecord.keyType || null,
|
|
record.id,
|
|
);
|
|
|
|
migratedFieldsCount += migratedFields.length;
|
|
if (!migratedTables.includes("ssh_credentials")) {
|
|
migratedTables.push("ssh_credentials");
|
|
}
|
|
migrated = true;
|
|
}
|
|
}
|
|
|
|
const userRecord = db
|
|
.prepare("SELECT * FROM users WHERE id = ?")
|
|
.get(userId) as DatabaseRecord | undefined;
|
|
if (userRecord) {
|
|
const sensitiveFields =
|
|
LazyFieldEncryption.getSensitiveFieldsForTable("users");
|
|
const { updatedRecord, migratedFields, needsUpdate } =
|
|
LazyFieldEncryption.migrateRecordSensitiveFields(
|
|
userRecord,
|
|
sensitiveFields,
|
|
userDataKey,
|
|
userId,
|
|
);
|
|
|
|
if (needsUpdate) {
|
|
const updateQuery = `
|
|
UPDATE users
|
|
SET totp_secret = ?, totp_backup_codes = ?, client_secret = ?, oidc_identifier = ?
|
|
WHERE id = ?
|
|
`;
|
|
db.prepare(updateQuery).run(
|
|
updatedRecord.totp_secret || updatedRecord.totpSecret || null,
|
|
updatedRecord.totp_backup_codes ||
|
|
updatedRecord.totpBackupCodes ||
|
|
null,
|
|
updatedRecord.client_secret || updatedRecord.clientSecret || null,
|
|
updatedRecord.oidc_identifier ||
|
|
updatedRecord.oidcIdentifier ||
|
|
null,
|
|
userId,
|
|
);
|
|
|
|
migratedFieldsCount += migratedFields.length;
|
|
if (!migratedTables.includes("users")) {
|
|
migratedTables.push("users");
|
|
}
|
|
migrated = true;
|
|
}
|
|
}
|
|
|
|
return { migrated, migratedTables, migratedFieldsCount };
|
|
} catch (error) {
|
|
databaseLogger.error("User sensitive fields migration failed", error, {
|
|
operation: "user_sensitive_migration_failed",
|
|
userId,
|
|
error: error instanceof Error ? error.message : "Unknown error",
|
|
});
|
|
|
|
return { migrated: false, migratedTables: [], migratedFieldsCount: 0 };
|
|
}
|
|
}
|
|
|
|
static getUserDataKey(userId: string): Buffer | null {
|
|
return this.userCrypto.getUserDataKey(userId);
|
|
}
|
|
|
|
static async reencryptUserDataAfterPasswordReset(
|
|
userId: string,
|
|
newUserDataKey: Buffer,
|
|
db: DatabaseInstance,
|
|
): Promise<{
|
|
success: boolean;
|
|
reencryptedTables: string[];
|
|
reencryptedFieldsCount: number;
|
|
errors: string[];
|
|
}> {
|
|
const result = {
|
|
success: false,
|
|
reencryptedTables: [] as string[],
|
|
reencryptedFieldsCount: 0,
|
|
errors: [] as string[],
|
|
};
|
|
|
|
try {
|
|
const tablesToReencrypt = [
|
|
{
|
|
table: "ssh_data",
|
|
fields: [
|
|
"password",
|
|
"key",
|
|
"key_password",
|
|
"keyPassword",
|
|
"keyType",
|
|
"autostartPassword",
|
|
"autostartKey",
|
|
"autostartKeyPassword",
|
|
],
|
|
},
|
|
{
|
|
table: "ssh_credentials",
|
|
fields: [
|
|
"password",
|
|
"private_key",
|
|
"privateKey",
|
|
"key_password",
|
|
"keyPassword",
|
|
"key",
|
|
"public_key",
|
|
"publicKey",
|
|
"keyType",
|
|
],
|
|
},
|
|
{
|
|
table: "users",
|
|
fields: [
|
|
"client_secret",
|
|
"clientSecret",
|
|
"totp_secret",
|
|
"totpSecret",
|
|
"totp_backup_codes",
|
|
"totpBackupCodes",
|
|
"oidc_identifier",
|
|
"oidcIdentifier",
|
|
],
|
|
},
|
|
];
|
|
|
|
for (const { table, fields } of tablesToReencrypt) {
|
|
try {
|
|
const records = db
|
|
.prepare(`SELECT * FROM ${table} WHERE user_id = ?`)
|
|
.all(userId) as DatabaseRecord[];
|
|
|
|
for (const record of records) {
|
|
const recordId = record.id.toString();
|
|
const updatedRecord: DatabaseRecord = { ...record };
|
|
let needsUpdate = false;
|
|
|
|
for (const fieldName of fields) {
|
|
const fieldValue = record[fieldName];
|
|
|
|
if (
|
|
fieldValue &&
|
|
typeof fieldValue === "string" &&
|
|
fieldValue.trim() !== ""
|
|
) {
|
|
try {
|
|
const reencryptedValue = FieldCrypto.encryptField(
|
|
fieldValue,
|
|
newUserDataKey,
|
|
recordId,
|
|
fieldName,
|
|
);
|
|
|
|
updatedRecord[fieldName] = reencryptedValue;
|
|
needsUpdate = true;
|
|
result.reencryptedFieldsCount++;
|
|
} catch (error) {
|
|
const errorMsg = `Failed to re-encrypt ${fieldName} for ${table} record ${recordId}: ${error instanceof Error ? error.message : "Unknown error"}`;
|
|
result.errors.push(errorMsg);
|
|
databaseLogger.warn(
|
|
"Field re-encryption failed during password reset",
|
|
{
|
|
operation: "password_reset_reencrypt_failed",
|
|
userId,
|
|
table,
|
|
recordId,
|
|
fieldName,
|
|
error:
|
|
error instanceof Error
|
|
? error.message
|
|
: "Unknown error",
|
|
},
|
|
);
|
|
}
|
|
}
|
|
}
|
|
|
|
if (needsUpdate) {
|
|
const updateFields = fields.filter(
|
|
(field) => updatedRecord[field] !== record[field],
|
|
);
|
|
if (updateFields.length > 0) {
|
|
const updateQuery = `UPDATE ${table} SET ${updateFields.map((f) => `${f} = ?`).join(", ")}, updated_at = CURRENT_TIMESTAMP WHERE id = ?`;
|
|
const updateValues = updateFields.map(
|
|
(field) => updatedRecord[field],
|
|
);
|
|
updateValues.push(record.id);
|
|
|
|
db.prepare(updateQuery).run(...updateValues);
|
|
|
|
if (!result.reencryptedTables.includes(table)) {
|
|
result.reencryptedTables.push(table);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
} catch (tableError) {
|
|
const errorMsg = `Failed to re-encrypt table ${table}: ${tableError instanceof Error ? tableError.message : "Unknown error"}`;
|
|
result.errors.push(errorMsg);
|
|
databaseLogger.error(
|
|
"Table re-encryption failed during password reset",
|
|
tableError,
|
|
{
|
|
operation: "password_reset_table_reencrypt_failed",
|
|
userId,
|
|
table,
|
|
error:
|
|
tableError instanceof Error
|
|
? tableError.message
|
|
: "Unknown error",
|
|
},
|
|
);
|
|
}
|
|
}
|
|
|
|
result.success = result.errors.length === 0;
|
|
|
|
return result;
|
|
} catch (error) {
|
|
databaseLogger.error(
|
|
"User data re-encryption failed after password reset",
|
|
error,
|
|
{
|
|
operation: "password_reset_reencrypt_failed",
|
|
userId,
|
|
error: error instanceof Error ? error.message : "Unknown error",
|
|
},
|
|
);
|
|
|
|
result.errors.push(
|
|
`Critical error during re-encryption: ${error instanceof Error ? error.message : "Unknown error"}`,
|
|
);
|
|
return result;
|
|
}
|
|
}
|
|
|
|
static validateUserAccess(userId: string): Buffer {
|
|
const userDataKey = this.getUserDataKey(userId);
|
|
if (!userDataKey) {
|
|
throw new Error(`User ${userId} data not unlocked`);
|
|
}
|
|
return userDataKey;
|
|
}
|
|
|
|
static encryptRecordForUser<T extends Record<string, unknown>>(
|
|
tableName: string,
|
|
record: T,
|
|
userId: string,
|
|
): T {
|
|
const userDataKey = this.validateUserAccess(userId);
|
|
return this.encryptRecord(tableName, record, userId, userDataKey);
|
|
}
|
|
|
|
static decryptRecordForUser<T extends Record<string, unknown>>(
|
|
tableName: string,
|
|
record: T,
|
|
userId: string,
|
|
): T {
|
|
const userDataKey = this.validateUserAccess(userId);
|
|
return this.decryptRecord(tableName, record, userId, userDataKey);
|
|
}
|
|
|
|
static decryptRecordsForUser<T extends Record<string, unknown>>(
|
|
tableName: string,
|
|
records: T[],
|
|
userId: string,
|
|
): T[] {
|
|
const userDataKey = this.validateUserAccess(userId);
|
|
return this.decryptRecords(tableName, records, userId, userDataKey);
|
|
}
|
|
|
|
static canUserAccessData(userId: string): boolean {
|
|
return this.userCrypto.isUserUnlocked(userId);
|
|
}
|
|
|
|
static testUserEncryption(userId: string): boolean {
|
|
try {
|
|
const userDataKey = this.getUserDataKey(userId);
|
|
if (!userDataKey) return false;
|
|
|
|
const testData = "test-" + Date.now();
|
|
const encrypted = FieldCrypto.encryptField(
|
|
testData,
|
|
userDataKey,
|
|
"test-record",
|
|
"test-field",
|
|
);
|
|
const decrypted = FieldCrypto.decryptField(
|
|
encrypted,
|
|
userDataKey,
|
|
"test-record",
|
|
"test-field",
|
|
);
|
|
|
|
return decrypted === testData;
|
|
} catch {
|
|
return false;
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Encrypt sensitive credential fields with system key for offline sharing
|
|
* Returns an object with systemPassword, systemKey, systemKeyPassword fields
|
|
*/
|
|
static async encryptRecordWithSystemKey<T extends Record<string, unknown>>(
|
|
tableName: string,
|
|
record: T,
|
|
systemKey: Buffer,
|
|
): Promise<Partial<T>> {
|
|
const systemEncrypted: Record<string, unknown> = {};
|
|
const recordId = record.id || "temp-" + Date.now();
|
|
|
|
if (tableName !== "ssh_credentials") {
|
|
return systemEncrypted as Partial<T>;
|
|
}
|
|
|
|
if (record.password && typeof record.password === "string") {
|
|
systemEncrypted.systemPassword = FieldCrypto.encryptField(
|
|
record.password as string,
|
|
systemKey,
|
|
recordId as string,
|
|
"password",
|
|
);
|
|
}
|
|
|
|
if (record.key && typeof record.key === "string") {
|
|
systemEncrypted.systemKey = FieldCrypto.encryptField(
|
|
record.key as string,
|
|
systemKey,
|
|
recordId as string,
|
|
"key",
|
|
);
|
|
}
|
|
|
|
if (record.key_password && typeof record.key_password === "string") {
|
|
systemEncrypted.systemKeyPassword = FieldCrypto.encryptField(
|
|
record.key_password as string,
|
|
systemKey,
|
|
recordId as string,
|
|
"key_password",
|
|
);
|
|
}
|
|
|
|
return systemEncrypted as Partial<T>;
|
|
}
|
|
}
|
|
|
|
export { DataCrypto };
|