Skip to content

Restrict invite_user_to_org RPC to authenticated callers#1710

Open
riderx wants to merge 2 commits intomainfrom
riderx/fix-invite-oracle
Open

Restrict invite_user_to_org RPC to authenticated callers#1710
riderx wants to merge 2 commits intomainfrom
riderx/fix-invite-oracle

Conversation

@riderx
Copy link
Member

@riderx riderx commented Feb 27, 2026

Summary (AI generated)

  • Hardened public.invite_user_to_org to remove org-id enumeration and keep invitation status handling intact for existing callers.
  • Fixed caller-context usage in the super-admin 2FA gate and audit logging to rely on resolved calling_user_id.
  • Tightened execution privileges by removing blanket PUBLIC access while keeping legacy API-key flows compatible through explicit anon execution rights.

Motivation (AI generated)

  • The previous migration revoked only anon execution while still exposing the function to PUBLIC, and used auth.uid() in 2FA checks where authenticated API-key flows resolve identity differently.
  • /organization/members and related legacy flows use API-key-authenticated supabaseApikey clients on the anon role, so fully revoking anon would break legitimate invitations.
  • Reworking identity usage and ACL ordering keeps security fixes in place without regressing existing backend behavior.

Business Impact (AI generated)

  • Prevents org existence enumeration and unauthenticated privilege probing on invitation calls.
  • Preserves member-invite behavior for API-key-authenticated clients used by existing integrations.
  • Improves correctness of 2FA enforcement and audit logs for super-admin invitations.

Test Plan (AI generated)

  • Ran bun lint:backend.
  • Optional: Run a focused integration check for /organization/members legacy org path (rbac=false) with a valid API key.
  • Optional: Run a focused integration check for /organization/members with a non-existent org ID and verify NO_RIGHTS response.

Summary by CodeRabbit

  • Bug Fixes
    • Strengthened security and permission checks for organization invitations, preventing unauthorized sends and enforcing 2FA where required.
    • Fixed edge cases around existing users, pending invitations, and recently canceled invites to reduce duplicate or invalid invites.
  • Improvements
    • Invitation flow now provides clearer, consistent status outcomes so invite sender sees precise results (e.g., already invited, no rights, too-recent cancellation).

@coderabbitai
Copy link
Contributor

coderabbitai bot commented Feb 27, 2026

📝 Walkthrough

Walkthrough

Adds a new SECURITY DEFINER SQL function public.invite_user_to_org(email, org_id, invite_type) that authenticates callers, validates org existence and RBAC (including super-admin and 2FA checks), handles existing users and pending tmp_users invitations, returns specific status codes, and updates EXECUTE grants for access control.

Changes

Cohort / File(s) Summary
Database migration
supabase/migrations/20260227150000_fix_invite_user_to_org_security.sql
Creates/replaces public.invite_user_to_org(email varchar, org_id uuid, invite_type public.user_min_right) as SECURITY DEFINER with a fixed search_path. Implements caller authentication, org existence check, RBAC and super-admin gating (with optional 2FA), handling for existing users and pending tmp_users, returns status codes (NO_RIGHTS, OK, ALREADY_INVITED, NO_EMAIL, TOO_RECENT_INVITATION_CANCELATION), and updates REVOKE/GRANT EXECUTE statements to adjust public/anon/authenticated/service_role access.

Sequence Diagram(s)

sequenceDiagram
    participant Caller
    participant DB_Function as invite_user_to_org
    participant OrgsTable as Orgs
    participant UsersTable as Users
    participant TmpUsers as tmp_users
    Caller->>DB_Function: CALL invite_user_to_org(email, org_id, invite_type)
    DB_Function->>OrgsTable: validate org exists
    DB_Function->>DB_Function: resolve caller identity & rights (RBAC / super-admin)
    alt super-admin and 2FA required
        DB_Function->>Caller: require 2FA (verify)
    end
    DB_Function->>UsersTable: check existing user by email
    alt user exists
        DB_Function->>DB_Function: create org membership/invite -> return OK or ALREADY_INVITED
    else user does not exist
        DB_Function->>TmpUsers: check/create pending invite, enforce recent-cancel rules
        DB_Function->>DB_Function: return OK / ALREADY_INVITED / TOO_RECENT_INVITATION_CANCELATION / NO_EMAIL
    end
    DB_Function->>Caller: return status
Loading

Estimated code review effort

🎯 4 (Complex) | ⏱️ ~45 minutes

Possibly related PRs

Suggested labels

💰 Rewarded

Poem

🐰 I hopped into the SQL night,
Secured the invite with all my might,
RBAC checked, two-factor in view,
Invitations sent — both old and new,
A tiny rabbit, approving through and through.

🚥 Pre-merge checks | ✅ 2 | ❌ 1

❌ Failed checks (1 warning)

Check name Status Explanation Resolution
Description check ⚠️ Warning The description includes Summary, Motivation, and Business Impact sections with detailed explanations; however, it lacks a formal Test Plan section following the template structure and is missing the required Checklist. Add a formal Test Plan section with step-by-step testing instructions and complete the Checklist with appropriate checkboxes marked for applicable items (lint verification, test coverage, manual testing).
✅ Passed checks (2 passed)
Check name Status Explanation
Title check ✅ Passed The title accurately summarizes the main change: restricting the invite_user_to_org RPC to authenticated callers, which is the core security improvement in this migration.
Docstring Coverage ✅ Passed No functions found in the changed files to evaluate docstring coverage. Skipping docstring coverage check.

✏️ Tip: You can configure your own custom pre-merge checks in the settings.

✨ Finishing Touches
🧪 Generate unit tests (beta)
  • Create PR with unit tests
  • Post copyable unit tests in a comment
  • Commit unit tests in branch riderx/fix-invite-oracle

Warning

There were issues while running some tools. Please review the errors and either fix the tool's configuration or disable the tool if it's a critical failure.

🔧 SQLFluff (4.0.4)
supabase/migrations/20260227150000_fix_invite_user_to_org_security.sql

User Error: No dialect was specified. You must configure a dialect or specify one on the command line using --dialect after the command. Available dialects:
ansi, athena, bigquery, clickhouse, databricks, db2, doris, duckdb, exasol, flink, greenplum, hive, impala, mariadb, materialize, mysql, oracle, postgres, redshift, snowflake, soql, sparksql, sqlite, starrocks, teradata, trino, tsql, vertica


Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out.

❤️ Share

Comment @coderabbitai help to get the list of available commands and usage tips.

Copy link

@chatgpt-codex-connector chatgpt-codex-connector bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

💡 Codex Review

Here are some automated review suggestions for this pull request.

Reviewed commit: 6c7b781740

ℹ️ About Codex in GitHub

Your team has set up Codex to review pull requests in this repo. Reviews are triggered when you

  • Open a pull request for review
  • Mark a draft as ready
  • Comment "@codex review".

If Codex has suggestions, it will comment; otherwise it will react with 👍.

Codex can also answer questions or update the PR. Try commenting "@codex address that feedback".

Comment on lines +119 to +123
REVOKE EXECUTE ON FUNCTION public.invite_user_to_org(
character varying,
uuid,
public.user_min_right
) FROM "anon";

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

P1 Badge Reinstate anon execute on invite_user_to_org

/organization/members still calls invite_user_to_org for non-RBAC orgs (supabase/functions/_backend/public/organization/members/post.ts, legacy branch) through supabaseApikey, which authenticates with the anon key plus capgkey header (supabase/functions/_backend/utils/supabase.ts). Revoking anon execute here causes those valid API-key requests to fail with function-permission errors, so member invites break for legacy orgs; keep anon execute and rely on the function’s internal get_identity_org_allowed/check_min_rights checks to reject unauthenticated callers.

Useful? React with 👍 / 👎.

Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 2

🤖 Prompt for all review comments with AI agents
Verify each finding against the current code and only fix it if needed.

Inline comments:
In `@supabase/migrations/20260227150000_fix_invite_user_to_org_security.sql`:
- Around line 62-63: The 2FA check and audit log are using auth.uid() but
authorization earlier uses calling_user_id from get_identity_org_allowed(), so
update the IF and pg_log call in invite_user_to_org to use calling_user_id
instead of auth.uid(): call public.has_2fa_enabled(calling_user_id) in the IF
condition when org.enforcing_2fa is true, and include 'uid': calling_user_id in
the jsonb_build_object passed to public.pg_log so the correct resolved caller is
checked and recorded; keep all other logic and names (invite_user_to_org,
org.enforcing_2fa, public.has_2fa_enabled, public.pg_log) unchanged.
- Around line 119-135: The function public.invite_user_to_org currently revokes
EXECUTE only from "anon" but inherits EXECUTE from PUBLIC; before the existing
REVOKE on "anon" add an explicit REVOKE EXECUTE ON FUNCTION
public.invite_user_to_org(character varying, uuid, public.user_min_right) FROM
PUBLIC so the PUBLIC grant is removed first, then keep the existing REVOKE FROM
"anon" and the subsequent GRANTs to "authenticated" and "service_role"; adjust
the ACL order around the invite_user_to_org function to ensure PUBLIC cannot
execute it after CREATE OR REPLACE.

ℹ️ Review info

Configuration used: defaults

Review profile: CHILL

Plan: Pro

📥 Commits

Reviewing files that changed from the base of the PR and between e719357 and 6c7b781.

📒 Files selected for processing (1)
  • supabase/migrations/20260227150000_fix_invite_user_to_org_security.sql

Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 1

🤖 Prompt for all review comments with AI agents
Verify each finding against the current code and only fix it if needed.

Inline comments:
In `@supabase/migrations/20260227150000_fix_invite_user_to_org_security.sql`:
- Around line 125-129: The GRANT that gives EXECUTE on the SECURITY DEFINER RPC
invite_user_to_org to the "anon" role must be removed and replaced with a grant
to the authenticated role; locate the GRANT EXECUTE ON FUNCTION
public.invite_user_to_org(...) TO "anon" statement and delete it (or change the
grantee) so that only the authenticated role (not "anon") is granted EXECUTE,
ensuring the RPC can only be called by JWT-authenticated clients.

ℹ️ Review info

Configuration used: defaults

Review profile: CHILL

Plan: Pro

📥 Commits

Reviewing files that changed from the base of the PR and between 6c7b781 and f04482b.

📒 Files selected for processing (1)
  • supabase/migrations/20260227150000_fix_invite_user_to_org_security.sql

Comment on lines +125 to +129
GRANT EXECUTE ON FUNCTION public.invite_user_to_org(
character varying,
uuid,
public.user_min_right
) TO "anon";
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Potential issue | 🟠 Major

Remove anon EXECUTE grant to match the security objective.

Line 125 re-grants EXECUTE to "anon", which reopens unauthenticated access to this SECURITY DEFINER RPC and conflicts with the stated goal of authenticated-only invocation.

Proposed fix
-GRANT EXECUTE ON FUNCTION public.invite_user_to_org(
+REVOKE EXECUTE ON FUNCTION public.invite_user_to_org(
   character varying,
   uuid,
   public.user_min_right
-) TO "anon";
+) FROM "anon";

Based on learnings: API keys authenticate through the authenticated role via JWT, not the anon role.

🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.

In `@supabase/migrations/20260227150000_fix_invite_user_to_org_security.sql`
around lines 125 - 129, The GRANT that gives EXECUTE on the SECURITY DEFINER RPC
invite_user_to_org to the "anon" role must be removed and replaced with a grant
to the authenticated role; locate the GRANT EXECUTE ON FUNCTION
public.invite_user_to_org(...) TO "anon" statement and delete it (or change the
grantee) so that only the authenticated role (not "anon") is granted EXECUTE,
ensuring the RPC can only be called by JWT-authenticated clients.

@sonarqubecloud
Copy link

sonarqubecloud bot commented Mar 2, 2026

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant