* fix select edit host but not update view (#438) * fix: Checksum issue with chocolatey * fix: Remove homebrew old stuff * Add Korean translation (#439) Co-authored-by: 송준우 <2484@coreit.co.kr> * feat: Automate flatpak * fix: Add imagemagik to electron builder to resolve build error * fix: Build error with runtime repo flag * fix: Flatpak runtime error and install freedesktop ver warning * fix: Flatpak runtime error and install freedesktop ver warning * feat: Re-add homebrew cask and move scripts to backend * fix: No sandbox flag issue * fix: Change name for electron macos cask output * fix: Sandbox error with Linux * fix: Remove comming soon for app stores in readme * Adding Comment at the end of the public_key on the host on deploy (#440) * Add termix.rb Cask file * Update Termix to version 1.9.0 with new checksum * Update README to remove 'coming soon' notes * -Add New Interface for Credential DB -Add Credential Name as a comment into the server authorized_key file --------- Co-authored-by: Luke Gustafson <88517757+LukeGus@users.noreply.github.com> * Sudo auto fill password (#441) * Add termix.rb Cask file * Update Termix to version 1.9.0 with new checksum * Update README to remove 'coming soon' notes * Feature Sudo password auto-fill; * Fix locale json shema; --------- Co-authored-by: Luke Gustafson <88517757+LukeGus@users.noreply.github.com> * Added Italian Language; (#445) * Add termix.rb Cask file * Update Termix to version 1.9.0 with new checksum * Update README to remove 'coming soon' notes * Added Italian Language; --------- Co-authored-by: Luke Gustafson <88517757+LukeGus@users.noreply.github.com> * Auto collapse snippet folders (#448) * Add termix.rb Cask file * Update Termix to version 1.9.0 with new checksum * Update README to remove 'coming soon' notes * feat: Add collapsable snippets (customizable in user profile) * Translations (#447) * Add termix.rb Cask file * Update Termix to version 1.9.0 with new checksum * Update README to remove 'coming soon' notes * Added Italian Language; * Fix translations; Removed duplicate keys, synchronised other languages using English as the source, translated added keys, fixed inaccurate translations. --------- Co-authored-by: Luke Gustafson <88517757+LukeGus@users.noreply.github.com> * Remove PTY-level keepalive (#449) * Add termix.rb Cask file * Update Termix to version 1.9.0 with new checksum * Update README to remove 'coming soon' notes * Remove PTY-level keepalive to prevent unwanted terminal output; use SSH-level keepalive instead --------- Co-authored-by: Luke Gustafson <88517757+LukeGus@users.noreply.github.com> * feat: Seperate server stats and tunnel management (improved both UI's) then started initial docker implementation * fix: finalize adding docker to db * feat: Add docker management support (local squash) * Fix RBAC role system bugs and improve UX (#446) * Fix RBAC role system bugs and improve UX - Fix user list dropdown selection in host sharing - Fix role sharing permissions to include role-based access - Fix translation template interpolation for success messages - Standardize system roles to admin and user only - Auto-assign user role to new registrations - Remove blocking confirmation dialogs in modal contexts - Add missing i18n keys for common actions - Fix button type to prevent unintended form submissions * Enhance RBAC system with UI improvements and security fixes - Move role assignment to Users tab with per-user role management - Protect system roles (admin/user) from editing and manual assignment - Simplify permission system: remove Use level, keep View and Manage - Hide Update button and Sharing tab for view-only/shared hosts - Prevent users from sharing hosts with themselves - Unify table and modal styling across admin panels - Auto-assign system roles on user registration - Add permission metadata to host interface * Add empty state message for role assignment - Display helpful message when no custom roles available - Clarify that system roles are auto-assigned - Add noCustomRolesToAssign translation in English and Chinese * fix: Prevent credential sharing errors for shared hosts - Skip credential resolution for shared hosts with credential authentication to prevent decryption errors (credentials are encrypted per-user) - Add warning alert in sharing tab when host uses credential authentication - Inform users that shared users cannot connect to credential-based hosts - Add translations for credential sharing warning (EN/ZH) This prevents authentication failures when sharing hosts configured with credential authentication while maintaining security by keeping credentials isolated per user. * feat: Improve rbac UI and fixes some bugs --------- Co-authored-by: Luke Gustafson <88517757+LukeGus@users.noreply.github.com> Co-authored-by: LukeGus <bugattiguy527@gmail.com> * SOCKS5 support (#452) * Add termix.rb Cask file * Update Termix to version 1.9.0 with new checksum * Update README to remove 'coming soon' notes * SOCKS5 support Adding single and chain socks5 proxy support * fix: cleanup files --------- Co-authored-by: Luke Gustafson <88517757+LukeGus@users.noreply.github.com> Co-authored-by: LukeGus <bugattiguy527@gmail.com> * Notes and Expiry fields add (#453) * Add termix.rb Cask file * Update Termix to version 1.9.0 with new checksum * Update README to remove 'coming soon' notes * Notes and Expiry add * fix: cleanup files --------- Co-authored-by: Luke Gustafson <88517757+LukeGus@users.noreply.github.com> Co-authored-by: LukeGus <bugattiguy527@gmail.com> * fix: ssh host types * fix: sudo incorrect styling and remove expiration date * feat: add sudo password and add diagonal bg's * fix: snippet running on enter key * fix: base64 decoding * fix: improve server stats / rbac * fix: wrap ssh host json export in hosts array * feat: auto trim host inputs, fix file manager jump hosts, dashboard prevent duplicates, file manager terminal not size updating, improve left sidebar sorting, hide/show tags, add apperance user profile tab, add new host manager tabs. * feat: improve terminal connection speed * fix: sqlite constriant errors and support non-root user (nginx perm issue) * feat: add beta syntax highlighing to terminal * feat: update imports and improve admin settings user management * chore: update translations * chore: update translations * feat: Complete light mode implementation with semantic theme system (#450) - Add comprehensive light/dark mode CSS variables with semantic naming - Implement theme-aware scrollbars using CSS variables - Add light mode backgrounds: --bg-base, --bg-elevated, --bg-surface, etc. - Add theme-aware borders: --border-base, --border-panel, --border-subtle - Add semantic text colors: --foreground-secondary, --foreground-subtle - Convert oklch colors to hex for better compatibility - Add theme awareness to CodeMirror editors - Update dark mode colors for consistency (background, sidebar, card, muted, input) - Add Tailwind color mappings for semantic classes Co-authored-by: Luke Gustafson <88517757+LukeGus@users.noreply.github.com> * fix: syntax errors * chore: updating/match themes and split admin settings * feat: add translation workflow and remove old translation.json * fix: translation workflow error * fix: translation workflow error * feat: improve translation system and update workflow * fix: wrong path for translations * fix: change translation to flat files * fix: gh rule error * chore: auto-translate to multiple languages (#458) * chore: improve organization and made a few styling changes in host manager * feat: improve terminal stability and split out the host manager * fix: add unnversiioned files * chore: migrate all to use the new theme system * fix: wrong animation line colors * fix: rbac implementation general issues (local squash) * fix: remove unneeded files * feat: add 10 new langs * chore: update gitnore * chore: auto-translate to multiple languages (#459) * fix: improve tunnel system * fix: properly split tabs, still need to fix up the host manager * chore: cleanup files (possible RC) * feat: add norwegian * chore: auto-translate to multiple languages (#461) * fix: small qol fixes and began readme update * fix: run cleanup script * feat: add docker docs button * feat: general bug fixes and readme updates * fix: translations * chore: auto-translate to multiple languages (#462) * fix: cleanup files * fix: test new translation issue and add better server-stats support * fix: fix translate error * chore: auto-translate to multiple languages (#463) * fix: fix translate mismatching text * chore: auto-translate to multiple languages (#465) * fix: fix translate mismatching text * fix: fix translate mismatching text * chore: auto-translate to multiple languages (#466) * fix: fix translate mismatching text * fix: fix translate mismatching text * fix: fix translate mismatching text * chore: auto-translate to multiple languages (#467) * fix: fix translate mismatching text * chore: auto-translate to multiple languages (#468) * feat: add to readme, a few qol changes, and improve server stats in general * chore: auto-translate to multiple languages (#469) * feat: turned disk uage into graph and fixed issue with termina console * fix: electron build error and hide icons when shared * chore: run clean * fix: general server stats issues, file manager decoding, ui qol * fix: add dashboard line breaks * fix: docker console error * fix: docker console not loading and mismatched stripped background for electron * fix: docker console not loading * chore: docker console not loading in docker * chore: translate readme to chinese * chore: match package lock to package json * chore: nginx config issue for dokcer console * chore: auto-translate to multiple languages (#470) --------- Co-authored-by: Tran Trung Kien <kientt13.7@gmail.com> Co-authored-by: junu <bigdwarf_@naver.com> Co-authored-by: 송준우 <2484@coreit.co.kr> Co-authored-by: SlimGary <trash.slim@gmail.com> Co-authored-by: Nunzio Marfè <nunzio.marfe@protonmail.com> Co-authored-by: Wesley Reid <starhound@lostsouls.org> Co-authored-by: ZacharyZcR <zacharyzcr1984@gmail.com> Co-authored-by: Denis <38875137+Medvedinca@users.noreply.github.com> Co-authored-by: Peet McKinney <68706879+PeetMcK@users.noreply.github.com>
701 lines
18 KiB
TypeScript
701 lines
18 KiB
TypeScript
import { db } from "../database/db/index.js";
|
|
import {
|
|
sharedCredentials,
|
|
sshCredentials,
|
|
hostAccess,
|
|
users,
|
|
userRoles,
|
|
sshData,
|
|
} from "../database/db/schema.js";
|
|
import { eq, and } from "drizzle-orm";
|
|
import { DataCrypto } from "./data-crypto.js";
|
|
import { FieldCrypto } from "./field-crypto.js";
|
|
import { databaseLogger } from "./logger.js";
|
|
|
|
interface CredentialData {
|
|
username: string;
|
|
authType: string;
|
|
password?: string;
|
|
key?: string;
|
|
keyPassword?: string;
|
|
keyType?: string;
|
|
}
|
|
|
|
/**
|
|
* Manages shared credentials for RBAC host sharing.
|
|
* Creates per-user encrypted credential copies to enable credential sharing
|
|
* without requiring the credential owner to be online.
|
|
*/
|
|
class SharedCredentialManager {
|
|
private static instance: SharedCredentialManager;
|
|
|
|
private constructor() {}
|
|
|
|
static getInstance(): SharedCredentialManager {
|
|
if (!this.instance) {
|
|
this.instance = new SharedCredentialManager();
|
|
}
|
|
return this.instance;
|
|
}
|
|
|
|
/**
|
|
* Create shared credential for a specific user
|
|
* Called when sharing a host with a user
|
|
*/
|
|
async createSharedCredentialForUser(
|
|
hostAccessId: number,
|
|
originalCredentialId: number,
|
|
targetUserId: string,
|
|
ownerId: string,
|
|
): Promise<void> {
|
|
try {
|
|
const ownerDEK = DataCrypto.getUserDataKey(ownerId);
|
|
|
|
if (ownerDEK) {
|
|
const targetDEK = DataCrypto.getUserDataKey(targetUserId);
|
|
if (!targetDEK) {
|
|
await this.createPendingSharedCredential(
|
|
hostAccessId,
|
|
originalCredentialId,
|
|
targetUserId,
|
|
);
|
|
return;
|
|
}
|
|
|
|
const credentialData = await this.getDecryptedCredential(
|
|
originalCredentialId,
|
|
ownerId,
|
|
ownerDEK,
|
|
);
|
|
|
|
const encryptedForTarget = this.encryptCredentialForUser(
|
|
credentialData,
|
|
targetUserId,
|
|
targetDEK,
|
|
hostAccessId,
|
|
);
|
|
|
|
await db.insert(sharedCredentials).values({
|
|
hostAccessId,
|
|
originalCredentialId,
|
|
targetUserId,
|
|
...encryptedForTarget,
|
|
needsReEncryption: false,
|
|
});
|
|
} else {
|
|
const targetDEK = DataCrypto.getUserDataKey(targetUserId);
|
|
if (!targetDEK) {
|
|
await this.createPendingSharedCredential(
|
|
hostAccessId,
|
|
originalCredentialId,
|
|
targetUserId,
|
|
);
|
|
return;
|
|
}
|
|
|
|
const credentialData =
|
|
await this.getDecryptedCredentialViaSystemKey(originalCredentialId);
|
|
|
|
const encryptedForTarget = this.encryptCredentialForUser(
|
|
credentialData,
|
|
targetUserId,
|
|
targetDEK,
|
|
hostAccessId,
|
|
);
|
|
|
|
await db.insert(sharedCredentials).values({
|
|
hostAccessId,
|
|
originalCredentialId,
|
|
targetUserId,
|
|
...encryptedForTarget,
|
|
needsReEncryption: false,
|
|
});
|
|
}
|
|
} catch (error) {
|
|
databaseLogger.error("Failed to create shared credential", error, {
|
|
operation: "create_shared_credential",
|
|
hostAccessId,
|
|
targetUserId,
|
|
});
|
|
throw error;
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Create shared credentials for all users in a role
|
|
* Called when sharing a host with a role
|
|
*/
|
|
async createSharedCredentialsForRole(
|
|
hostAccessId: number,
|
|
originalCredentialId: number,
|
|
roleId: number,
|
|
ownerId: string,
|
|
): Promise<void> {
|
|
try {
|
|
const roleUsers = await db
|
|
.select({ userId: userRoles.userId })
|
|
.from(userRoles)
|
|
.where(eq(userRoles.roleId, roleId));
|
|
|
|
for (const { userId } of roleUsers) {
|
|
try {
|
|
await this.createSharedCredentialForUser(
|
|
hostAccessId,
|
|
originalCredentialId,
|
|
userId,
|
|
ownerId,
|
|
);
|
|
} catch (error) {
|
|
databaseLogger.error(
|
|
"Failed to create shared credential for role member",
|
|
error,
|
|
{
|
|
operation: "create_shared_credentials_role",
|
|
hostAccessId,
|
|
roleId,
|
|
userId,
|
|
},
|
|
);
|
|
}
|
|
}
|
|
} catch (error) {
|
|
databaseLogger.error(
|
|
"Failed to create shared credentials for role",
|
|
error,
|
|
{
|
|
operation: "create_shared_credentials_role",
|
|
hostAccessId,
|
|
roleId,
|
|
},
|
|
);
|
|
throw error;
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Get credential data for a shared user
|
|
* Called when a shared user connects to a host
|
|
*/
|
|
async getSharedCredentialForUser(
|
|
hostId: number,
|
|
userId: string,
|
|
): Promise<CredentialData | null> {
|
|
try {
|
|
const userDEK = DataCrypto.getUserDataKey(userId);
|
|
if (!userDEK) {
|
|
throw new Error(`User ${userId} data not unlocked`);
|
|
}
|
|
|
|
const sharedCred = await db
|
|
.select()
|
|
.from(sharedCredentials)
|
|
.innerJoin(
|
|
hostAccess,
|
|
eq(sharedCredentials.hostAccessId, hostAccess.id),
|
|
)
|
|
.where(
|
|
and(
|
|
eq(hostAccess.hostId, hostId),
|
|
eq(sharedCredentials.targetUserId, userId),
|
|
),
|
|
)
|
|
.limit(1);
|
|
|
|
if (sharedCred.length === 0) {
|
|
return null;
|
|
}
|
|
|
|
const cred = sharedCred[0].shared_credentials;
|
|
|
|
if (cred.needsReEncryption) {
|
|
databaseLogger.warn(
|
|
"Shared credential needs re-encryption but cannot be accessed yet",
|
|
{
|
|
operation: "get_shared_credential_pending",
|
|
hostId,
|
|
userId,
|
|
},
|
|
);
|
|
return null;
|
|
}
|
|
|
|
return this.decryptSharedCredential(cred, userDEK);
|
|
} catch (error) {
|
|
databaseLogger.error("Failed to get shared credential", error, {
|
|
operation: "get_shared_credential",
|
|
hostId,
|
|
userId,
|
|
});
|
|
throw error;
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Update all shared credentials when original credential is updated
|
|
* Called when credential owner updates credential
|
|
*/
|
|
async updateSharedCredentialsForOriginal(
|
|
credentialId: number,
|
|
ownerId: string,
|
|
): Promise<void> {
|
|
try {
|
|
const sharedCreds = await db
|
|
.select()
|
|
.from(sharedCredentials)
|
|
.where(eq(sharedCredentials.originalCredentialId, credentialId));
|
|
|
|
const ownerDEK = DataCrypto.getUserDataKey(ownerId);
|
|
let credentialData: CredentialData;
|
|
|
|
if (ownerDEK) {
|
|
credentialData = await this.getDecryptedCredential(
|
|
credentialId,
|
|
ownerId,
|
|
ownerDEK,
|
|
);
|
|
} else {
|
|
try {
|
|
credentialData =
|
|
await this.getDecryptedCredentialViaSystemKey(credentialId);
|
|
} catch (error) {
|
|
databaseLogger.warn(
|
|
"Cannot update shared credentials: owner offline and credential not migrated",
|
|
{
|
|
operation: "update_shared_credentials_failed",
|
|
credentialId,
|
|
ownerId,
|
|
error: error instanceof Error ? error.message : "Unknown error",
|
|
},
|
|
);
|
|
await db
|
|
.update(sharedCredentials)
|
|
.set({ needsReEncryption: true })
|
|
.where(eq(sharedCredentials.originalCredentialId, credentialId));
|
|
return;
|
|
}
|
|
}
|
|
|
|
for (const sharedCred of sharedCreds) {
|
|
const targetDEK = DataCrypto.getUserDataKey(sharedCred.targetUserId);
|
|
|
|
if (!targetDEK) {
|
|
await db
|
|
.update(sharedCredentials)
|
|
.set({ needsReEncryption: true })
|
|
.where(eq(sharedCredentials.id, sharedCred.id));
|
|
continue;
|
|
}
|
|
|
|
const encryptedForTarget = this.encryptCredentialForUser(
|
|
credentialData,
|
|
sharedCred.targetUserId,
|
|
targetDEK,
|
|
sharedCred.hostAccessId,
|
|
);
|
|
|
|
await db
|
|
.update(sharedCredentials)
|
|
.set({
|
|
...encryptedForTarget,
|
|
needsReEncryption: false,
|
|
updatedAt: new Date().toISOString(),
|
|
})
|
|
.where(eq(sharedCredentials.id, sharedCred.id));
|
|
}
|
|
} catch (error) {
|
|
databaseLogger.error("Failed to update shared credentials", error, {
|
|
operation: "update_shared_credentials",
|
|
credentialId,
|
|
});
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Delete shared credentials when original credential is deleted
|
|
* Called from credential deletion route
|
|
*/
|
|
async deleteSharedCredentialsForOriginal(
|
|
credentialId: number,
|
|
): Promise<void> {
|
|
try {
|
|
const result = await db
|
|
.delete(sharedCredentials)
|
|
.where(eq(sharedCredentials.originalCredentialId, credentialId))
|
|
.returning({ id: sharedCredentials.id });
|
|
} catch (error) {
|
|
databaseLogger.error("Failed to delete shared credentials", error, {
|
|
operation: "delete_shared_credentials",
|
|
credentialId,
|
|
});
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Re-encrypt pending shared credentials for a user when they log in
|
|
* Called during user login
|
|
*/
|
|
async reEncryptPendingCredentialsForUser(userId: string): Promise<void> {
|
|
try {
|
|
const userDEK = DataCrypto.getUserDataKey(userId);
|
|
if (!userDEK) {
|
|
return;
|
|
}
|
|
|
|
const pendingCreds = await db
|
|
.select()
|
|
.from(sharedCredentials)
|
|
.where(
|
|
and(
|
|
eq(sharedCredentials.targetUserId, userId),
|
|
eq(sharedCredentials.needsReEncryption, true),
|
|
),
|
|
);
|
|
|
|
for (const cred of pendingCreds) {
|
|
await this.reEncryptSharedCredential(cred.id, userId);
|
|
}
|
|
} catch (error) {
|
|
databaseLogger.error("Failed to re-encrypt pending credentials", error, {
|
|
operation: "reencrypt_pending_credentials",
|
|
userId,
|
|
});
|
|
}
|
|
}
|
|
|
|
private async getDecryptedCredential(
|
|
credentialId: number,
|
|
ownerId: string,
|
|
ownerDEK: Buffer,
|
|
): Promise<CredentialData> {
|
|
const creds = await db
|
|
.select()
|
|
.from(sshCredentials)
|
|
.where(
|
|
and(
|
|
eq(sshCredentials.id, credentialId),
|
|
eq(sshCredentials.userId, ownerId),
|
|
),
|
|
)
|
|
.limit(1);
|
|
|
|
if (creds.length === 0) {
|
|
throw new Error(`Credential ${credentialId} not found`);
|
|
}
|
|
|
|
const cred = creds[0];
|
|
|
|
return {
|
|
username: cred.username,
|
|
authType: cred.authType,
|
|
password: cred.password
|
|
? this.decryptField(cred.password, ownerDEK, credentialId, "password")
|
|
: undefined,
|
|
key: cred.key
|
|
? this.decryptField(cred.key, ownerDEK, credentialId, "key")
|
|
: undefined,
|
|
keyPassword: cred.key_password
|
|
? this.decryptField(
|
|
cred.key_password,
|
|
ownerDEK,
|
|
credentialId,
|
|
"key_password",
|
|
)
|
|
: undefined,
|
|
keyType: cred.keyType,
|
|
};
|
|
}
|
|
|
|
/**
|
|
* Decrypt credential using system key (for offline sharing when owner is offline)
|
|
*/
|
|
private async getDecryptedCredentialViaSystemKey(
|
|
credentialId: number,
|
|
): Promise<CredentialData> {
|
|
const creds = await db
|
|
.select()
|
|
.from(sshCredentials)
|
|
.where(eq(sshCredentials.id, credentialId))
|
|
.limit(1);
|
|
|
|
if (creds.length === 0) {
|
|
throw new Error(`Credential ${credentialId} not found`);
|
|
}
|
|
|
|
const cred = creds[0];
|
|
|
|
if (!cred.systemPassword && !cred.systemKey && !cred.systemKeyPassword) {
|
|
throw new Error(
|
|
"Credential not yet migrated for offline sharing. " +
|
|
"Please ask credential owner to log in to enable sharing.",
|
|
);
|
|
}
|
|
|
|
const { SystemCrypto } = await import("./system-crypto.js");
|
|
const systemCrypto = SystemCrypto.getInstance();
|
|
const CSKEK = await systemCrypto.getCredentialSharingKey();
|
|
|
|
return {
|
|
username: cred.username,
|
|
authType: cred.authType,
|
|
password: cred.systemPassword
|
|
? this.decryptField(
|
|
cred.systemPassword,
|
|
CSKEK,
|
|
credentialId,
|
|
"password",
|
|
)
|
|
: undefined,
|
|
key: cred.systemKey
|
|
? this.decryptField(cred.systemKey, CSKEK, credentialId, "key")
|
|
: undefined,
|
|
keyPassword: cred.systemKeyPassword
|
|
? this.decryptField(
|
|
cred.systemKeyPassword,
|
|
CSKEK,
|
|
credentialId,
|
|
"key_password",
|
|
)
|
|
: undefined,
|
|
keyType: cred.keyType,
|
|
};
|
|
}
|
|
|
|
private encryptCredentialForUser(
|
|
credentialData: CredentialData,
|
|
targetUserId: string,
|
|
targetDEK: Buffer,
|
|
hostAccessId: number,
|
|
): {
|
|
encryptedUsername: string;
|
|
encryptedAuthType: string;
|
|
encryptedPassword: string | null;
|
|
encryptedKey: string | null;
|
|
encryptedKeyPassword: string | null;
|
|
encryptedKeyType: string | null;
|
|
} {
|
|
const recordId = `shared-${hostAccessId}-${targetUserId}`;
|
|
|
|
return {
|
|
encryptedUsername: FieldCrypto.encryptField(
|
|
credentialData.username,
|
|
targetDEK,
|
|
recordId,
|
|
"username",
|
|
),
|
|
encryptedAuthType: credentialData.authType,
|
|
encryptedPassword: credentialData.password
|
|
? FieldCrypto.encryptField(
|
|
credentialData.password,
|
|
targetDEK,
|
|
recordId,
|
|
"password",
|
|
)
|
|
: null,
|
|
encryptedKey: credentialData.key
|
|
? FieldCrypto.encryptField(
|
|
credentialData.key,
|
|
targetDEK,
|
|
recordId,
|
|
"key",
|
|
)
|
|
: null,
|
|
encryptedKeyPassword: credentialData.keyPassword
|
|
? FieldCrypto.encryptField(
|
|
credentialData.keyPassword,
|
|
targetDEK,
|
|
recordId,
|
|
"key_password",
|
|
)
|
|
: null,
|
|
encryptedKeyType: credentialData.keyType || null,
|
|
};
|
|
}
|
|
|
|
private decryptSharedCredential(
|
|
sharedCred: typeof sharedCredentials.$inferSelect,
|
|
userDEK: Buffer,
|
|
): CredentialData {
|
|
const recordId = `shared-${sharedCred.hostAccessId}-${sharedCred.targetUserId}`;
|
|
|
|
return {
|
|
username: FieldCrypto.decryptField(
|
|
sharedCred.encryptedUsername,
|
|
userDEK,
|
|
recordId,
|
|
"username",
|
|
),
|
|
authType: sharedCred.encryptedAuthType,
|
|
password: sharedCred.encryptedPassword
|
|
? FieldCrypto.decryptField(
|
|
sharedCred.encryptedPassword,
|
|
userDEK,
|
|
recordId,
|
|
"password",
|
|
)
|
|
: undefined,
|
|
key: sharedCred.encryptedKey
|
|
? FieldCrypto.decryptField(
|
|
sharedCred.encryptedKey,
|
|
userDEK,
|
|
recordId,
|
|
"key",
|
|
)
|
|
: undefined,
|
|
keyPassword: sharedCred.encryptedKeyPassword
|
|
? FieldCrypto.decryptField(
|
|
sharedCred.encryptedKeyPassword,
|
|
userDEK,
|
|
recordId,
|
|
"key_password",
|
|
)
|
|
: undefined,
|
|
keyType: sharedCred.encryptedKeyType || undefined,
|
|
};
|
|
}
|
|
|
|
private decryptField(
|
|
encryptedValue: string,
|
|
dek: Buffer,
|
|
recordId: number | string,
|
|
fieldName: string,
|
|
): string {
|
|
try {
|
|
return FieldCrypto.decryptField(
|
|
encryptedValue,
|
|
dek,
|
|
recordId.toString(),
|
|
fieldName,
|
|
);
|
|
} catch (error) {
|
|
databaseLogger.warn("Field decryption failed, returning as-is", {
|
|
operation: "decrypt_field",
|
|
fieldName,
|
|
recordId,
|
|
});
|
|
return encryptedValue;
|
|
}
|
|
}
|
|
|
|
private async createPendingSharedCredential(
|
|
hostAccessId: number,
|
|
originalCredentialId: number,
|
|
targetUserId: string,
|
|
): Promise<void> {
|
|
await db.insert(sharedCredentials).values({
|
|
hostAccessId,
|
|
originalCredentialId,
|
|
targetUserId,
|
|
encryptedUsername: "",
|
|
encryptedAuthType: "",
|
|
needsReEncryption: true,
|
|
});
|
|
|
|
databaseLogger.info("Created pending shared credential", {
|
|
operation: "create_pending_shared_credential",
|
|
hostAccessId,
|
|
targetUserId,
|
|
});
|
|
}
|
|
|
|
private async reEncryptSharedCredential(
|
|
sharedCredId: number,
|
|
userId: string,
|
|
): Promise<void> {
|
|
try {
|
|
const sharedCred = await db
|
|
.select()
|
|
.from(sharedCredentials)
|
|
.where(eq(sharedCredentials.id, sharedCredId))
|
|
.limit(1);
|
|
|
|
if (sharedCred.length === 0) {
|
|
databaseLogger.warn("Re-encrypt: shared credential not found", {
|
|
operation: "reencrypt_not_found",
|
|
sharedCredId,
|
|
});
|
|
return;
|
|
}
|
|
|
|
const cred = sharedCred[0];
|
|
|
|
const access = await db
|
|
.select()
|
|
.from(hostAccess)
|
|
.innerJoin(sshData, eq(hostAccess.hostId, sshData.id))
|
|
.where(eq(hostAccess.id, cred.hostAccessId))
|
|
.limit(1);
|
|
|
|
if (access.length === 0) {
|
|
databaseLogger.warn("Re-encrypt: host access not found", {
|
|
operation: "reencrypt_access_not_found",
|
|
sharedCredId,
|
|
});
|
|
return;
|
|
}
|
|
|
|
const ownerId = access[0].ssh_data.userId;
|
|
|
|
const userDEK = DataCrypto.getUserDataKey(userId);
|
|
if (!userDEK) {
|
|
databaseLogger.warn("Re-encrypt: user DEK not available", {
|
|
operation: "reencrypt_user_offline",
|
|
sharedCredId,
|
|
userId,
|
|
});
|
|
return;
|
|
}
|
|
|
|
const ownerDEK = DataCrypto.getUserDataKey(ownerId);
|
|
let credentialData: CredentialData;
|
|
|
|
if (ownerDEK) {
|
|
credentialData = await this.getDecryptedCredential(
|
|
cred.originalCredentialId,
|
|
ownerId,
|
|
ownerDEK,
|
|
);
|
|
} else {
|
|
try {
|
|
credentialData = await this.getDecryptedCredentialViaSystemKey(
|
|
cred.originalCredentialId,
|
|
);
|
|
} catch (error) {
|
|
databaseLogger.warn(
|
|
"Re-encrypt: system key decryption failed, credential may not be migrated yet",
|
|
{
|
|
operation: "reencrypt_system_key_failed",
|
|
sharedCredId,
|
|
error: error instanceof Error ? error.message : "Unknown error",
|
|
},
|
|
);
|
|
return;
|
|
}
|
|
}
|
|
|
|
const encryptedForTarget = this.encryptCredentialForUser(
|
|
credentialData,
|
|
userId,
|
|
userDEK,
|
|
cred.hostAccessId,
|
|
);
|
|
|
|
await db
|
|
.update(sharedCredentials)
|
|
.set({
|
|
...encryptedForTarget,
|
|
needsReEncryption: false,
|
|
updatedAt: new Date().toISOString(),
|
|
})
|
|
.where(eq(sharedCredentials.id, sharedCredId));
|
|
} catch (error) {
|
|
databaseLogger.error("Failed to re-encrypt shared credential", error, {
|
|
operation: "reencrypt_shared_credential",
|
|
sharedCredId,
|
|
userId,
|
|
});
|
|
}
|
|
}
|
|
}
|
|
|
|
export { SharedCredentialManager };
|