Files
worldmonitor/scripts/lib/crypto.cjs
Sebastien Melki 50765023ea feat: Cloud Preferences Sync polish + encryption key rotation (#3067)
* feat: cloud prefs sync polish + encryption key rotation (#2906)

1. Add sync status indicator in Preferences panel — shows current state
   (synced/pending/error/offline) with colored dot, last-sync timestamp,
   and manual "Sync now" button for conflict/error recovery.

2. Support AES key rotation in scripts/lib/crypto.cjs — encrypt() always
   uses the latest ENCRYPTION_KEY_V{n} env var, decrypt() reads the version
   prefix to select the matching key. Fully backwards-compatible with the
   existing NOTIFICATION_ENCRYPTION_KEY single-key setup.

3. Add tests exercising the applyMigrations() schema-version plumbing and
   the new multi-version key rotation (12 tests, all passing).

Closes #2906

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>

* fix: address Greptile review feedback

- Raise key version ceiling from 9 to 99 to avoid silent footgun
- Extract SYNC_STATE_LABELS/COLORS to shared constants (no drift risk)
- Gate Cloud Sync UI on isCloudSyncEnabled() so it doesn't render
  when VITE_CLOUD_PREFS_ENABLED is off

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>

---------

Co-authored-by: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-04-13 19:44:25 +04:00

61 lines
2.3 KiB
JavaScript

'use strict';
const { createCipheriv, createDecipheriv, randomBytes } = require('node:crypto');
const LEGACY_KEY_ENV = 'NOTIFICATION_ENCRYPTION_KEY';
const IV_LEN = 12;
const TAG_LEN = 16;
// Versioned key env vars: ENCRYPTION_KEY_V1, ENCRYPTION_KEY_V2, ...
// Falls back to NOTIFICATION_ENCRYPTION_KEY for v1 (backwards-compatible).
const KEY_ENV_PREFIX = 'ENCRYPTION_KEY_V';
function getLatestVersion() {
for (let v = 99; v >= 1; v--) {
if (process.env[`${KEY_ENV_PREFIX}${v}`]) return `v${v}`;
}
if (process.env[LEGACY_KEY_ENV]) return 'v1';
throw new Error('No encryption key configured (set ENCRYPTION_KEY_V1 or NOTIFICATION_ENCRYPTION_KEY)');
}
function getKey(version) {
const num = parseInt(version.slice(1), 10);
if (!num || num < 1) throw new Error(`Unknown key version: ${version}`);
const raw = process.env[`${KEY_ENV_PREFIX}${num}`]
|| (num === 1 ? process.env[LEGACY_KEY_ENV] : undefined);
if (!raw) throw new Error(`No key for ${version} (set ${KEY_ENV_PREFIX}${num})`);
const key = Buffer.from(raw, 'base64');
if (key.length !== 32) throw new Error(`${KEY_ENV_PREFIX}${num} must be 32 bytes for AES-256 (got ${key.length})`);
return key;
}
function encrypt(plaintext) {
const version = getLatestVersion();
const key = getKey(version);
const iv = randomBytes(IV_LEN);
const cipher = createCipheriv('aes-256-gcm', key, iv);
const encrypted = Buffer.concat([cipher.update(plaintext, 'utf8'), cipher.final()]);
const tag = cipher.getAuthTag();
const payload = Buffer.concat([iv, tag, encrypted]);
return `${version}:${payload.toString('base64')}`;
}
function decrypt(stored) {
const colon = stored.indexOf(':');
if (colon === -1) throw new Error('Invalid envelope: missing version prefix');
const version = stored.slice(0, colon);
const key = getKey(version);
const payload = Buffer.from(stored.slice(colon + 1), 'base64');
if (payload.length < IV_LEN + TAG_LEN) throw new Error('Invalid envelope: too short');
const iv = payload.subarray(0, IV_LEN);
const tag = payload.subarray(IV_LEN, IV_LEN + TAG_LEN);
const ciphertext = payload.subarray(IV_LEN + TAG_LEN);
const decipher = createDecipheriv('aes-256-gcm', key, iv);
decipher.setAuthTag(tag);
return Buffer.concat([decipher.update(ciphertext), decipher.final()]).toString('utf8');
}
module.exports = { encrypt, decrypt, getLatestVersion };