@lifeready/core 1.0.1 → 1.0.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +62 -62
- package/bundles/lifeready-core.umd.js +15939 -0
- package/bundles/lifeready-core.umd.js.map +1 -0
- package/bundles/lifeready-core.umd.min.js +16 -0
- package/bundles/lifeready-core.umd.min.js.map +1 -0
- package/esm2015/lib/_common/ast.js +40 -0
- package/esm2015/lib/_common/deferred-promise.js +24 -0
- package/esm2015/lib/_common/exceptions.js +157 -0
- package/esm2015/lib/_common/queries.gql.js +190 -0
- package/esm2015/lib/_common/run-outside-angular.js +79 -0
- package/esm2015/lib/_common/types.js +1 -0
- package/esm2015/lib/_common/utils.js +44 -0
- package/esm2015/lib/api/contact-card.gql.js +79 -0
- package/esm2015/lib/api/contact-card.service.js +154 -0
- package/esm2015/lib/api/contact-card2.gql.js +60 -0
- package/esm2015/lib/api/contact-card2.service.js +103 -0
- package/esm2015/lib/api/file.service.js +74 -0
- package/esm2015/lib/api/item2.gql.js +110 -0
- package/esm2015/lib/api/item2.service.js +311 -0
- package/esm2015/lib/api/key-exchange.gql.js +188 -0
- package/esm2015/lib/api/key-exchange.service.js +442 -0
- package/esm2015/lib/api/key-exchange.types.js +18 -0
- package/esm2015/lib/api/key-exchange2.gql.js +171 -0
- package/esm2015/lib/api/key-exchange2.service.js +479 -0
- package/esm2015/lib/api/lock.gql.js +40 -0
- package/esm2015/lib/api/lock.service.js +64 -0
- package/esm2015/lib/api/lr-apollo.service.js +46 -0
- package/esm2015/lib/api/lr-graphql/index.js +6 -0
- package/esm2015/lib/api/lr-graphql/lr-graphql.service.js +155 -0
- package/esm2015/lib/api/lr-graphql/lr-merged-mutation.js +213 -0
- package/esm2015/lib/api/lr-graphql/lr-mutation-base.js +51 -0
- package/esm2015/lib/api/lr-graphql/lr-mutation.js +48 -0
- package/esm2015/lib/api/lr-graphql/lr.service.js +18 -0
- package/esm2015/lib/api/message.service.js +138 -0
- package/esm2015/lib/api/persist.service.js +181 -0
- package/esm2015/lib/api/query-processor/common-processors.service.js +93 -0
- package/esm2015/lib/api/query-processor/index.js +3 -0
- package/esm2015/lib/api/query-processor/query-processor.service.js +192 -0
- package/esm2015/lib/api/query-processor/tp-password-reset-processor.service.js +109 -0
- package/esm2015/lib/api/shared-contact-card.service.js +119 -0
- package/esm2015/lib/api/shared-contact-card2.gql.js +41 -0
- package/esm2015/lib/api/shared-contact-card2.service.js +117 -0
- package/esm2015/lib/api/time.service.js +146 -0
- package/esm2015/lib/api/types/graphql.types.js +7 -0
- package/esm2015/lib/api/types/index.js +3 -0
- package/esm2015/lib/api/types/lr-graphql.types.js +71 -0
- package/esm2015/lib/auth/auth.config.js +57 -0
- package/esm2015/lib/auth/auth.gql.js +48 -0
- package/esm2015/lib/auth/auth.types.js +27 -0
- package/esm2015/lib/auth/idle.service.js +168 -0
- package/esm2015/lib/auth/idle.types.js +7 -0
- package/esm2015/lib/auth/lbop.service.js +355 -0
- package/esm2015/lib/auth/life-ready-auth.service.js +500 -0
- package/esm2015/lib/auth/password.service.js +320 -0
- package/esm2015/lib/auth/register.service.js +172 -0
- package/esm2015/lib/auth/two-factor.service.js +74 -0
- package/esm2015/lib/category/category-meta.service.js +99 -0
- package/esm2015/lib/category/category.gql.js +406 -0
- package/esm2015/lib/category/category.service.js +390 -0
- package/esm2015/lib/category/category.types.js +29 -0
- package/esm2015/lib/cryptography/cryptography.types.js +11 -0
- package/esm2015/lib/cryptography/encryption.service.js +189 -0
- package/esm2015/lib/cryptography/key-factory.service.js +237 -0
- package/esm2015/lib/cryptography/key-graph.service.js +280 -0
- package/esm2015/lib/cryptography/key-meta.service.js +200 -0
- package/esm2015/lib/cryptography/key.service.js +124 -0
- package/esm2015/lib/cryptography/slip39.service.js +169 -0
- package/esm2015/lib/cryptography/web-crypto.service.js +29 -0
- package/esm2015/lib/life-ready.config.js +84 -0
- package/esm2015/lib/life-ready.module.js +74 -0
- package/esm2015/lib/plan/plan.gql.js +123 -0
- package/esm2015/lib/plan/plan.service.js +149 -0
- package/esm2015/lib/plan/plan.types.js +11 -0
- package/esm2015/lib/record/record-attachment.service.js +101 -0
- package/esm2015/lib/record/record.gql.js +179 -0
- package/esm2015/lib/record/record.service.js +206 -0
- package/esm2015/lib/record/record.types.js +15 -0
- package/esm2015/lib/record-type/record-type.service.js +75 -0
- package/esm2015/lib/record-type/record-type.types.js +28 -0
- package/esm2015/lib/scenario/approvals/scenario-approval.gql.js +105 -0
- package/esm2015/lib/scenario/approvals/scenario-approval.types.js +1 -0
- package/esm2015/lib/scenario/approvals/scenario-approver.service.js +300 -0
- package/esm2015/lib/scenario/claimants/scenario-claimant.gql.js +52 -0
- package/esm2015/lib/scenario/claimants/scenario-claimant.service.js +97 -0
- package/esm2015/lib/scenario/claimants/scenario-claimant.types.js +1 -0
- package/esm2015/lib/scenario/receivers/scenario-receiver.gql.js +150 -0
- package/esm2015/lib/scenario/receivers/scenario-receiver.service.js +229 -0
- package/esm2015/lib/scenario/receivers/scenario-receiver.types.js +1 -0
- package/esm2015/lib/scenario/scenario-setup.service.js +269 -0
- package/esm2015/lib/scenario/scenario.gql.js +368 -0
- package/esm2015/lib/scenario/scenario.service.js +611 -0
- package/esm2015/lib/scenario/scenario.types.js +64 -0
- package/esm2015/lib/search/search.gql.js +62 -0
- package/esm2015/lib/search/search.service.js +156 -0
- package/esm2015/lib/search/search.types.js +6 -0
- package/esm2015/lib/trusted-parties/tp-password-reset-request.service.js +112 -0
- package/esm2015/lib/trusted-parties/tp-password-reset-user.service.js +129 -0
- package/esm2015/lib/trusted-parties/tp-password-reset.constants.js +4 -0
- package/esm2015/lib/trusted-parties/tp-password-reset.gql.js +232 -0
- package/esm2015/lib/trusted-parties/tp-password-reset.service.js +299 -0
- package/esm2015/lib/trusted-parties/trusted-party.gql.js +148 -0
- package/esm2015/lib/trusted-parties/trusted-party.service.js +326 -0
- package/esm2015/lib/trusted-parties/trusted-party.types.js +41 -0
- package/esm2015/lib/trusted-parties/trusted-party2.gql.js +87 -0
- package/esm2015/lib/trusted-parties/trusted-party2.service.js +215 -0
- package/esm2015/lib/users/profile-details.service.js +214 -0
- package/esm2015/lib/users/profile.gql.js +97 -0
- package/esm2015/lib/users/profile.service.js +169 -0
- package/esm2015/lib/users/profile.types.js +34 -0
- package/esm2015/lib/users/user.gql.js +60 -0
- package/esm2015/lib/users/user.service.js +79 -0
- package/esm2015/lib/users/user.types.js +5 -0
- package/esm2015/lifeready-core.js +10 -0
- package/esm2015/public-api.js +81 -0
- package/fesm2015/lifeready-core.js +13314 -0
- package/fesm2015/lifeready-core.js.map +1 -0
- package/lib/_common/ast.d.ts +11 -0
- package/lib/_common/deferred-promise.d.ts +12 -0
- package/lib/_common/exceptions.d.ts +109 -0
- package/lib/_common/queries.gql.d.ts +10 -0
- package/lib/_common/run-outside-angular.d.ts +14 -0
- package/{src/lib/_common/types.ts → lib/_common/types.d.ts} +10 -13
- package/lib/_common/utils.d.ts +3 -0
- package/lib/api/contact-card.gql.d.ts +7 -0
- package/lib/api/contact-card.service.d.ts +52 -0
- package/lib/api/contact-card2.gql.d.ts +34 -0
- package/lib/api/contact-card2.service.d.ts +49 -0
- package/lib/api/file.service.d.ts +18 -0
- package/lib/api/item2.gql.d.ts +96 -0
- package/lib/api/item2.service.d.ts +177 -0
- package/lib/api/key-exchange.gql.d.ts +9 -0
- package/lib/api/key-exchange.service.d.ts +39 -0
- package/lib/api/key-exchange.types.d.ts +196 -0
- package/lib/api/key-exchange2.gql.d.ts +125 -0
- package/lib/api/key-exchange2.service.d.ts +187 -0
- package/lib/api/lock.gql.d.ts +27 -0
- package/lib/api/lock.service.d.ts +25 -0
- package/lib/api/lr-apollo.service.d.ts +15 -0
- package/{src/lib/api/lr-graphql/index.ts → lib/api/lr-graphql/index.d.ts} +5 -5
- package/lib/api/lr-graphql/lr-graphql.service.d.ts +60 -0
- package/lib/api/lr-graphql/lr-merged-mutation.d.ts +27 -0
- package/lib/api/lr-graphql/lr-mutation-base.d.ts +28 -0
- package/lib/api/lr-graphql/lr-mutation.d.ts +8 -0
- package/lib/api/lr-graphql/lr.service.d.ts +9 -0
- package/lib/api/message.service.d.ts +58 -0
- package/lib/api/persist.service.d.ts +31 -0
- package/lib/api/query-processor/common-processors.service.d.ts +36 -0
- package/{src/lib/api/query-processor/index.ts → lib/api/query-processor/index.d.ts} +2 -2
- package/lib/api/query-processor/query-processor.service.d.ts +18 -0
- package/lib/api/query-processor/tp-password-reset-processor.service.d.ts +15 -0
- package/lib/api/shared-contact-card.service.d.ts +33 -0
- package/lib/api/shared-contact-card2.gql.d.ts +36 -0
- package/lib/api/shared-contact-card2.service.d.ts +45 -0
- package/lib/api/time.service.d.ts +16 -0
- package/lib/api/types/graphql.types.d.ts +29 -0
- package/{src/lib/api/types/index.ts → lib/api/types/index.d.ts} +2 -2
- package/lib/api/types/lr-graphql.types.d.ts +385 -0
- package/lib/auth/auth.config.d.ts +5 -0
- package/lib/auth/auth.gql.d.ts +15 -0
- package/lib/auth/auth.types.d.ts +66 -0
- package/lib/auth/idle.service.d.ts +40 -0
- package/lib/auth/idle.types.d.ts +10 -0
- package/lib/auth/lbop.service.d.ts +91 -0
- package/lib/auth/life-ready-auth.service.d.ts +59 -0
- package/lib/auth/password.service.d.ts +78 -0
- package/lib/auth/register.service.d.ts +25 -0
- package/lib/auth/two-factor.service.d.ts +15 -0
- package/lib/category/category-meta.service.d.ts +23 -0
- package/lib/category/category.gql.d.ts +45 -0
- package/lib/category/category.service.d.ts +67 -0
- package/lib/category/category.types.d.ts +79 -0
- package/lib/cryptography/cryptography.types.d.ts +83 -0
- package/lib/cryptography/encryption.service.d.ts +41 -0
- package/lib/cryptography/key-factory.service.d.ts +38 -0
- package/lib/cryptography/key-graph.service.d.ts +33 -0
- package/lib/cryptography/key-meta.service.d.ts +44 -0
- package/lib/cryptography/key.service.d.ts +36 -0
- package/lib/cryptography/slip39.service.d.ts +43 -0
- package/lib/cryptography/web-crypto.service.d.ts +5 -0
- package/lib/life-ready.config.d.ts +14 -0
- package/lib/life-ready.module.d.ts +5 -0
- package/lib/plan/plan.gql.d.ts +11 -0
- package/lib/plan/plan.service.d.ts +33 -0
- package/lib/plan/plan.types.d.ts +31 -0
- package/lib/record/record-attachment.service.d.ts +16 -0
- package/lib/record/record.gql.d.ts +14 -0
- package/lib/record/record.service.d.ts +25 -0
- package/lib/record/record.types.d.ts +57 -0
- package/lib/record-type/record-type.service.d.ts +11 -0
- package/lib/record-type/record-type.types.d.ts +50 -0
- package/lib/scenario/approvals/scenario-approval.gql.d.ts +7 -0
- package/lib/scenario/approvals/scenario-approval.types.d.ts +63 -0
- package/lib/scenario/approvals/scenario-approver.service.d.ts +32 -0
- package/lib/scenario/claimants/scenario-claimant.gql.d.ts +5 -0
- package/lib/scenario/claimants/scenario-claimant.service.d.ts +17 -0
- package/lib/scenario/claimants/scenario-claimant.types.d.ts +18 -0
- package/lib/scenario/receivers/scenario-receiver.gql.d.ts +8 -0
- package/lib/scenario/receivers/scenario-receiver.service.d.ts +30 -0
- package/lib/scenario/receivers/scenario-receiver.types.d.ts +54 -0
- package/lib/scenario/scenario-setup.service.d.ts +22 -0
- package/lib/scenario/scenario.gql.d.ts +34 -0
- package/lib/scenario/scenario.service.d.ts +58 -0
- package/lib/scenario/scenario.types.d.ts +217 -0
- package/lib/search/search.gql.d.ts +1 -0
- package/lib/search/search.service.d.ts +25 -0
- package/lib/search/search.types.d.ts +20 -0
- package/lib/trusted-parties/tp-password-reset-request.service.d.ts +20 -0
- package/lib/trusted-parties/tp-password-reset-user.service.d.ts +35 -0
- package/lib/trusted-parties/tp-password-reset.constants.d.ts +3 -0
- package/lib/trusted-parties/tp-password-reset.gql.d.ts +218 -0
- package/lib/trusted-parties/tp-password-reset.service.d.ts +130 -0
- package/lib/trusted-parties/trusted-party.gql.d.ts +9 -0
- package/lib/trusted-parties/trusted-party.service.d.ts +44 -0
- package/lib/trusted-parties/trusted-party.types.d.ts +102 -0
- package/lib/trusted-parties/trusted-party2.gql.d.ts +79 -0
- package/lib/trusted-parties/trusted-party2.service.d.ts +114 -0
- package/lib/users/profile-details.service.d.ts +21 -0
- package/lib/users/profile.gql.d.ts +11 -0
- package/lib/users/profile.service.d.ts +35 -0
- package/lib/users/profile.types.d.ts +96 -0
- package/lib/users/user.gql.d.ts +9 -0
- package/lib/users/user.service.d.ts +12 -0
- package/lib/users/user.types.d.ts +23 -0
- package/lifeready-core.d.ts +9 -0
- package/lifeready-core.metadata.json +1 -0
- package/package.json +29 -21
- package/{src/public-api.ts → public-api.d.ts} +77 -96
- package/karma.conf.js +0 -32
- package/ng-package.json +0 -26
- package/src/lib/_common/ast.ts +0 -75
- package/src/lib/_common/deferred-promise.ts +0 -35
- package/src/lib/_common/exceptions.ts +0 -189
- package/src/lib/_common/queries.gql.ts +0 -200
- package/src/lib/_common/run-outside-angular.ts +0 -125
- package/src/lib/_common/tests.ts +0 -82
- package/src/lib/_common/utils.ts +0 -57
- package/src/lib/api/api-mutation.spec.ts +0 -547
- package/src/lib/api/api-query.spec.ts +0 -40
- package/src/lib/api/contact-card.gql.ts +0 -85
- package/src/lib/api/contact-card.service.spec.ts +0 -249
- package/src/lib/api/contact-card.service.ts +0 -228
- package/src/lib/api/contact-card2.gql.ts +0 -93
- package/src/lib/api/contact-card2.service.spec.ts +0 -297
- package/src/lib/api/contact-card2.service.ts +0 -139
- package/src/lib/api/file.service.spec.ts +0 -14
- package/src/lib/api/file.service.ts +0 -81
- package/src/lib/api/item2.gql.ts +0 -211
- package/src/lib/api/item2.service.spec.ts +0 -1043
- package/src/lib/api/item2.service.ts +0 -481
- package/src/lib/api/key-exchange.gql.ts +0 -196
- package/src/lib/api/key-exchange.service.spec.ts +0 -470
- package/src/lib/api/key-exchange.service.ts +0 -731
- package/src/lib/api/key-exchange.types.ts +0 -235
- package/src/lib/api/key-exchange2.gql.ts +0 -310
- package/src/lib/api/key-exchange2.service.spec.ts +0 -892
- package/src/lib/api/key-exchange2.service.ts +0 -875
- package/src/lib/api/lock.gql.ts +0 -67
- package/src/lib/api/lock.service.spec.ts +0 -549
- package/src/lib/api/lock.service.ts +0 -57
- package/src/lib/api/lr-apollo.service.spec.ts +0 -27
- package/src/lib/api/lr-apollo.service.ts +0 -43
- package/src/lib/api/lr-graphql/lr-graphql.service.ts +0 -313
- package/src/lib/api/lr-graphql/lr-merged-mutation.ts +0 -377
- package/src/lib/api/lr-graphql/lr-mutation-base.ts +0 -67
- package/src/lib/api/lr-graphql/lr-mutation.ts +0 -74
- package/src/lib/api/lr-graphql/lr.service.ts +0 -28
- package/src/lib/api/message.service.spec.ts +0 -20
- package/src/lib/api/message.service.ts +0 -210
- package/src/lib/api/persist.service.spec.ts +0 -209
- package/src/lib/api/persist.service.ts +0 -220
- package/src/lib/api/query-processor/common-processors.service.ts +0 -148
- package/src/lib/api/query-processor/query-processor.service.ts +0 -240
- package/src/lib/api/query-processor/tp-password-reset-processor.service.ts +0 -177
- package/src/lib/api/shared-contact-card.service.ts +0 -156
- package/src/lib/api/shared-contact-card2.gql.ts +0 -76
- package/src/lib/api/shared-contact-card2.service.ts +0 -154
- package/src/lib/api/time.service.spec.ts +0 -48
- package/src/lib/api/time.service.ts +0 -155
- package/src/lib/api/types/graphql.types.ts +0 -48
- package/src/lib/api/types/lr-graphql.types.ts +0 -467
- package/src/lib/auth/auth.config.ts +0 -83
- package/src/lib/auth/auth.gql.ts +0 -62
- package/src/lib/auth/auth.types.ts +0 -79
- package/src/lib/auth/idle.service.spec.ts +0 -119
- package/src/lib/auth/idle.service.ts +0 -208
- package/src/lib/auth/idle.types.ts +0 -11
- package/src/lib/auth/lbop.service.spec.ts +0 -56
- package/src/lib/auth/lbop.service.ts +0 -539
- package/src/lib/auth/life-ready-auth.service.spec.ts +0 -70
- package/src/lib/auth/life-ready-auth.service.ts +0 -454
- package/src/lib/auth/password.service.spec.ts +0 -51
- package/src/lib/auth/password.service.ts +0 -438
- package/src/lib/auth/register.service.spec.ts +0 -31
- package/src/lib/auth/register.service.ts +0 -181
- package/src/lib/auth/two-factor.service.spec.ts +0 -21
- package/src/lib/auth/two-factor.service.ts +0 -69
- package/src/lib/category/category-meta.service.spec.ts +0 -28
- package/src/lib/category/category-meta.service.ts +0 -125
- package/src/lib/category/category.gql.ts +0 -449
- package/src/lib/category/category.service.spec.ts +0 -26
- package/src/lib/category/category.service.ts +0 -498
- package/src/lib/category/category.types.ts +0 -89
- package/src/lib/cryptography/cryptography.types.ts +0 -108
- package/src/lib/cryptography/encryption.service.spec.ts +0 -125
- package/src/lib/cryptography/encryption.service.ts +0 -243
- package/src/lib/cryptography/key-factory.service.spec.ts +0 -15
- package/src/lib/cryptography/key-factory.service.ts +0 -303
- package/src/lib/cryptography/key-graph.service.spec.ts +0 -16
- package/src/lib/cryptography/key-graph.service.ts +0 -354
- package/src/lib/cryptography/key-meta.service.spec.ts +0 -40
- package/src/lib/cryptography/key-meta.service.ts +0 -254
- package/src/lib/cryptography/key.service.spec.ts +0 -16
- package/src/lib/cryptography/key.service.ts +0 -154
- package/src/lib/cryptography/slip39.service.spec.ts +0 -44
- package/src/lib/cryptography/slip39.service.ts +0 -204
- package/src/lib/cryptography/web-crypto.service.ts +0 -22
- package/src/lib/life-ready.config.ts +0 -127
- package/src/lib/life-ready.module.ts +0 -81
- package/src/lib/plan/plan.gql.ts +0 -133
- package/src/lib/plan/plan.service.spec.ts +0 -294
- package/src/lib/plan/plan.service.ts +0 -198
- package/src/lib/plan/plan.types.ts +0 -37
- package/src/lib/record/record-attachment.service.spec.ts +0 -31
- package/src/lib/record/record-attachment.service.ts +0 -101
- package/src/lib/record/record.gql.ts +0 -192
- package/src/lib/record/record.service.spec.ts +0 -598
- package/src/lib/record/record.service.ts +0 -236
- package/src/lib/record/record.types.ts +0 -86
- package/src/lib/record-type/record-type.service.spec.ts +0 -16
- package/src/lib/record-type/record-type.service.ts +0 -71
- package/src/lib/record-type/record-type.types.ts +0 -58
- package/src/lib/scenario/approvals/scenario-approval.gql.ts +0 -112
- package/src/lib/scenario/approvals/scenario-approval.types.ts +0 -85
- package/src/lib/scenario/approvals/scenario-approver.service.spec.ts +0 -16
- package/src/lib/scenario/approvals/scenario-approver.service.ts +0 -422
- package/src/lib/scenario/claimants/scenario-claimant.gql.ts +0 -56
- package/src/lib/scenario/claimants/scenario-claimant.service.spec.ts +0 -16
- package/src/lib/scenario/claimants/scenario-claimant.service.ts +0 -100
- package/src/lib/scenario/claimants/scenario-claimant.types.ts +0 -21
- package/src/lib/scenario/receivers/scenario-receiver.gql.ts +0 -157
- package/src/lib/scenario/receivers/scenario-receiver.service.spec.ts +0 -16
- package/src/lib/scenario/receivers/scenario-receiver.service.ts +0 -278
- package/src/lib/scenario/receivers/scenario-receiver.types.ts +0 -66
- package/src/lib/scenario/scenario-setup.service.spec.ts +0 -22
- package/src/lib/scenario/scenario-setup.service.ts +0 -369
- package/src/lib/scenario/scenario.gql.ts +0 -404
- package/src/lib/scenario/scenario.service.spec.ts +0 -1586
- package/src/lib/scenario/scenario.service.ts +0 -811
- package/src/lib/scenario/scenario.types.ts +0 -258
- package/src/lib/search/search.gql.ts +0 -62
- package/src/lib/search/search.service.spec.ts +0 -57
- package/src/lib/search/search.service.ts +0 -174
- package/src/lib/search/search.types.ts +0 -24
- package/src/lib/trusted-parties/tp-password-reset-request.service.ts +0 -140
- package/src/lib/trusted-parties/tp-password-reset-user.service.ts +0 -359
- package/src/lib/trusted-parties/tp-password-reset.gql.ts +0 -453
- package/src/lib/trusted-parties/tp-password-reset.service.spec.ts +0 -602
- package/src/lib/trusted-parties/tp-password-reset.service.ts +0 -482
- package/src/lib/trusted-parties/trusted-party.gql.ts +0 -159
- package/src/lib/trusted-parties/trusted-party.service.spec.ts +0 -1008
- package/src/lib/trusted-parties/trusted-party.service.ts +0 -394
- package/src/lib/trusted-parties/trusted-party.types.ts +0 -119
- package/src/lib/trusted-parties/trusted-party2.gql.ts +0 -165
- package/src/lib/trusted-parties/trusted-party2.service.spec.ts +0 -1782
- package/src/lib/trusted-parties/trusted-party2.service.ts +0 -272
- package/src/lib/users/profile-details.service.spec.ts +0 -45
- package/src/lib/users/profile-details.service.ts +0 -278
- package/src/lib/users/profile.gql.ts +0 -108
- package/src/lib/users/profile.service.spec.ts +0 -97
- package/src/lib/users/profile.service.ts +0 -224
- package/src/lib/users/profile.types.ts +0 -101
- package/src/lib/users/user.gql.ts +0 -69
- package/src/lib/users/user.service.spec.ts +0 -161
- package/src/lib/users/user.service.ts +0 -72
- package/src/lib/users/user.types.ts +0 -27
- package/src/test.ts +0 -21
- package/tsconfig.lib.json +0 -21
- package/tsconfig.lib.prod.json +0 -6
- package/tsconfig.spec.json +0 -10
- package/tslint.json +0 -17
|
@@ -0,0 +1,189 @@
|
|
|
1
|
+
import { __awaiter } from "tslib";
|
|
2
|
+
import { LrException, LrErrorCode, LrBadArgumentException, } from './../_common/exceptions';
|
|
3
|
+
import { Injectable } from '@angular/core';
|
|
4
|
+
import { JWE, JWS } from 'node-jose';
|
|
5
|
+
import { TimeService } from '../api/time.service';
|
|
6
|
+
import * as i0 from "@angular/core";
|
|
7
|
+
import * as i1 from "../api/time.service";
|
|
8
|
+
export var JoseSerialization;
|
|
9
|
+
(function (JoseSerialization) {
|
|
10
|
+
JoseSerialization["JSON"] = "JSON";
|
|
11
|
+
JoseSerialization["COMPACT"] = "COMPACT";
|
|
12
|
+
})(JoseSerialization || (JoseSerialization = {}));
|
|
13
|
+
export const VERIFY_OPTIONS_DEFAULT = {
|
|
14
|
+
payloadType: 'json',
|
|
15
|
+
returnOnlyPayload: true,
|
|
16
|
+
};
|
|
17
|
+
export const DECRYPT_OPTIONS_DEFAULT = {
|
|
18
|
+
payloadType: 'json',
|
|
19
|
+
returnOnlyPayload: true,
|
|
20
|
+
serializations: [JoseSerialization.JSON],
|
|
21
|
+
};
|
|
22
|
+
export function isSymmetricKey(key) {
|
|
23
|
+
// TODO: make sure this covers all cases.
|
|
24
|
+
return key.kty === 'oct';
|
|
25
|
+
}
|
|
26
|
+
export function asJwk(key) {
|
|
27
|
+
// TODO: make sure this covers all cases.
|
|
28
|
+
// Excluded:
|
|
29
|
+
// key.use - only for public keys, Ref: https://tools.ietf.org/html/rfc7517#section-4.2
|
|
30
|
+
if (key.id && key.jwk) {
|
|
31
|
+
return key.jwk;
|
|
32
|
+
}
|
|
33
|
+
else if (key.keystore && key.length && key.kty && key.kid && key.alg) {
|
|
34
|
+
return key;
|
|
35
|
+
}
|
|
36
|
+
else {
|
|
37
|
+
return null;
|
|
38
|
+
}
|
|
39
|
+
}
|
|
40
|
+
export class EncryptionService {
|
|
41
|
+
constructor(timeService) {
|
|
42
|
+
this.timeService = timeService;
|
|
43
|
+
}
|
|
44
|
+
decrypt(key, // string is assumed to be key.id, will unwrap key.
|
|
45
|
+
jwe, // string will be JSON.parsed
|
|
46
|
+
options) {
|
|
47
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
48
|
+
const opt = {
|
|
49
|
+
algorithms: ['dir', 'A*GCM', 'RSA-OAEP-*'],
|
|
50
|
+
};
|
|
51
|
+
options = Object.assign(Object.assign({}, DECRYPT_OPTIONS_DEFAULT), options);
|
|
52
|
+
if (key.jwk) {
|
|
53
|
+
key = key.jwk;
|
|
54
|
+
}
|
|
55
|
+
if (typeof jwe === 'string') {
|
|
56
|
+
if (options.serializations.includes(JoseSerialization.JSON)) {
|
|
57
|
+
try {
|
|
58
|
+
jwe = JSON.parse(jwe);
|
|
59
|
+
}
|
|
60
|
+
catch (error) {
|
|
61
|
+
if (options.serializations.includes(JoseSerialization.COMPACT)) {
|
|
62
|
+
console.log('Not a JSON-formatted JWE, it maybe compact serialisation format.');
|
|
63
|
+
}
|
|
64
|
+
else {
|
|
65
|
+
throw error;
|
|
66
|
+
}
|
|
67
|
+
}
|
|
68
|
+
}
|
|
69
|
+
}
|
|
70
|
+
// {result} is a Object with:
|
|
71
|
+
// * header: the combined 'protected' and 'unprotected' header members
|
|
72
|
+
// * protected: an array of the member names from the "protected" member
|
|
73
|
+
// * key: Key used to decrypt
|
|
74
|
+
// * payload: Buffer of the decrypted content
|
|
75
|
+
// * plaintext: Buffer of the decrypted content (alternate), just a reference to payload
|
|
76
|
+
const res = yield JWE.createDecrypt(key, opt).decrypt(jwe);
|
|
77
|
+
res.payload = this.decodePayload(options.payloadType, res.payload);
|
|
78
|
+
if (options.returnOnlyPayload) {
|
|
79
|
+
return res.payload;
|
|
80
|
+
}
|
|
81
|
+
else {
|
|
82
|
+
return res;
|
|
83
|
+
}
|
|
84
|
+
});
|
|
85
|
+
}
|
|
86
|
+
// TODO rename this to encrypt() and use as the most common usecase
|
|
87
|
+
encryptToString(key, content) {
|
|
88
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
89
|
+
return JSON.stringify(yield this.encrypt(key, content));
|
|
90
|
+
});
|
|
91
|
+
}
|
|
92
|
+
// TODO rename this to encryptToJSON() and use this when required.
|
|
93
|
+
encrypt(key, content) {
|
|
94
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
95
|
+
if (!content) {
|
|
96
|
+
throw new Error('Encrypting empty content.');
|
|
97
|
+
}
|
|
98
|
+
if (!(content instanceof ArrayBuffer)) {
|
|
99
|
+
content = new TextEncoder().encode(JSON.stringify(content));
|
|
100
|
+
}
|
|
101
|
+
return JWE.createEncrypt({
|
|
102
|
+
contentAlg: 'A256GCM',
|
|
103
|
+
fields: {
|
|
104
|
+
timestamp: yield this.timeService.serverNow(),
|
|
105
|
+
},
|
|
106
|
+
}, key)
|
|
107
|
+
.update(content)
|
|
108
|
+
.final();
|
|
109
|
+
});
|
|
110
|
+
}
|
|
111
|
+
// <AZ> Unlike signContent, the serialised "content" variable is contained inside
|
|
112
|
+
// the result. So ordering of fields within "content" is not an issue.
|
|
113
|
+
sign(key, content) {
|
|
114
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
115
|
+
const signer = JWS.createSign({
|
|
116
|
+
fields: {
|
|
117
|
+
timestamp: yield this.timeService.serverNow(),
|
|
118
|
+
},
|
|
119
|
+
}, key);
|
|
120
|
+
if (content instanceof Buffer) {
|
|
121
|
+
signer.update(content);
|
|
122
|
+
}
|
|
123
|
+
else {
|
|
124
|
+
signer.update(JSON.stringify(content), 'utf8');
|
|
125
|
+
}
|
|
126
|
+
return signer.final();
|
|
127
|
+
});
|
|
128
|
+
}
|
|
129
|
+
signToString(key, content) {
|
|
130
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
131
|
+
return JSON.stringify(yield this.sign(key, content));
|
|
132
|
+
});
|
|
133
|
+
}
|
|
134
|
+
verify(key, jws, options) {
|
|
135
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
136
|
+
const opt = {
|
|
137
|
+
algorithms: ['RS*'],
|
|
138
|
+
};
|
|
139
|
+
options = Object.assign(Object.assign({}, VERIFY_OPTIONS_DEFAULT), options);
|
|
140
|
+
try {
|
|
141
|
+
const res = yield JWS.createVerify(key, opt).verify(jws);
|
|
142
|
+
res.payload = this.decodePayload(options.payloadType, res.payload);
|
|
143
|
+
if (options.returnOnlyPayload) {
|
|
144
|
+
return res.payload;
|
|
145
|
+
}
|
|
146
|
+
else {
|
|
147
|
+
return res;
|
|
148
|
+
}
|
|
149
|
+
}
|
|
150
|
+
catch (error) {
|
|
151
|
+
throw new LrException({
|
|
152
|
+
code: LrErrorCode.BadSignature,
|
|
153
|
+
message: `Bad signature: ${error}`,
|
|
154
|
+
});
|
|
155
|
+
}
|
|
156
|
+
});
|
|
157
|
+
}
|
|
158
|
+
encryptThenSign({ key, sigPrk, }, content) {
|
|
159
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
160
|
+
const cipher = JSON.stringify(yield this.encrypt(key, content));
|
|
161
|
+
const sig = yield this.sign(sigPrk, cipher);
|
|
162
|
+
delete sig.payload;
|
|
163
|
+
return {
|
|
164
|
+
cipher,
|
|
165
|
+
sig: JSON.stringify(sig),
|
|
166
|
+
};
|
|
167
|
+
});
|
|
168
|
+
}
|
|
169
|
+
decodePayload(payloadType, payload) {
|
|
170
|
+
switch (payloadType) {
|
|
171
|
+
case 'json':
|
|
172
|
+
return JSON.parse(new TextDecoder().decode(payload));
|
|
173
|
+
case 'ArrayBuffer':
|
|
174
|
+
return payload;
|
|
175
|
+
default:
|
|
176
|
+
throw new LrBadArgumentException(`Unknown payloadType: ${payloadType}`);
|
|
177
|
+
}
|
|
178
|
+
}
|
|
179
|
+
}
|
|
180
|
+
EncryptionService.ɵprov = i0.ɵɵdefineInjectable({ factory: function EncryptionService_Factory() { return new EncryptionService(i0.ɵɵinject(i1.TimeService)); }, token: EncryptionService, providedIn: "root" });
|
|
181
|
+
EncryptionService.decorators = [
|
|
182
|
+
{ type: Injectable, args: [{
|
|
183
|
+
providedIn: 'root',
|
|
184
|
+
},] }
|
|
185
|
+
];
|
|
186
|
+
EncryptionService.ctorParameters = () => [
|
|
187
|
+
{ type: TimeService }
|
|
188
|
+
];
|
|
189
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"encryption.service.js","sourceRoot":"/opt/atlassian/pipelines/agent/build/projects/core/src/","sources":["lib/cryptography/encryption.service.ts"],"names":[],"mappings":";AAAA,OAAO,EACL,WAAW,EACX,WAAW,EACX,sBAAsB,GACvB,MAAM,yBAAyB,CAAC;AACjC,OAAO,EAA4B,UAAU,EAAE,MAAM,eAAe,CAAC;AACrE,OAAO,EAAE,GAAG,EAAO,GAAG,EAAQ,MAAM,WAAW,CAAC;AAEhD,OAAO,EAAE,WAAW,EAAE,MAAM,qBAAqB,CAAC;;;AAElD,MAAM,CAAN,IAAY,iBAGX;AAHD,WAAY,iBAAiB;IAC3B,kCAAa,CAAA;IACb,wCAAmB,CAAA;AACrB,CAAC,EAHW,iBAAiB,KAAjB,iBAAiB,QAG5B;AAaD,MAAM,CAAC,MAAM,sBAAsB,GAAkB;IACnD,WAAW,EAAE,MAAM;IACnB,iBAAiB,EAAE,IAAI;CACxB,CAAC;AAEF,MAAM,CAAC,MAAM,uBAAuB,GAAmB;IACrD,WAAW,EAAE,MAAM;IACnB,iBAAiB,EAAE,IAAI;IACvB,cAAc,EAAE,CAAC,iBAAiB,CAAC,IAAI,CAAC;CACzC,CAAC;AAEF,MAAM,UAAU,cAAc,CAAC,GAAY;IACzC,yCAAyC;IACzC,OAAO,GAAG,CAAC,GAAG,KAAK,KAAK,CAAC;AAC3B,CAAC;AAED,MAAM,UAAU,KAAK,CAAC,GAAwB;IAC5C,yCAAyC;IACzC,YAAY;IACZ,yFAAyF;IAEzF,IAAI,GAAG,CAAC,EAAE,IAAI,GAAG,CAAC,GAAG,EAAE;QACrB,OAAO,GAAG,CAAC,GAAG,CAAC;KAChB;SAAM,IAAI,GAAG,CAAC,QAAQ,IAAI,GAAG,CAAC,MAAM,IAAI,GAAG,CAAC,GAAG,IAAI,GAAG,CAAC,GAAG,IAAI,GAAG,CAAC,GAAG,EAAE;QACtE,OAAO,GAAG,CAAC;KACZ;SAAM;QACL,OAAO,IAAI,CAAC;KACb;AACH,CAAC;AAKD,MAAM,OAAO,iBAAiB;IAC5B,YAAoB,WAAwB;QAAxB,gBAAW,GAAX,WAAW,CAAa;IAAG,CAAC;IAE1C,OAAO,CACX,GAAkB,EAAE,mDAAmD;IACvE,GAAoB,EAAE,6BAA6B;IACnD,OAAwB;;YAExB,MAAM,GAAG,GAAG;gBACV,UAAU,EAAE,CAAC,KAAK,EAAE,OAAO,EAAE,YAAY,CAAC;aAC3C,CAAC;YAEF,OAAO,mCACF,uBAAuB,GACvB,OAAO,CACX,CAAC;YAEF,IAAK,GAAW,CAAC,GAAG,EAAE;gBACpB,GAAG,GAAI,GAAW,CAAC,GAAG,CAAC;aACxB;YAED,IAAI,OAAO,GAAG,KAAK,QAAQ,EAAE;gBAC3B,IAAI,OAAO,CAAC,cAAc,CAAC,QAAQ,CAAC,iBAAiB,CAAC,IAAI,CAAC,EAAE;oBAC3D,IAAI;wBACF,GAAG,GAAG,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;qBACvB;oBAAC,OAAO,KAAK,EAAE;wBACd,IAAI,OAAO,CAAC,cAAc,CAAC,QAAQ,CAAC,iBAAiB,CAAC,OAAO,CAAC,EAAE;4BAC9D,OAAO,CAAC,GAAG,CACT,kEAAkE,CACnE,CAAC;yBACH;6BAAM;4BACL,MAAM,KAAK,CAAC;yBACb;qBACF;iBACF;aACF;YAED,6BAA6B;YAC7B,uEAAuE;YACvE,yEAAyE;YACzE,8BAA8B;YAC9B,8CAA8C;YAC9C,yFAAyF;YACzF,MAAM,GAAG,GAAG,MAAM,GAAG,CAAC,aAAa,CAAC,GAAc,EAAE,GAAG,CAAC,CAAC,OAAO,CAC9D,GAAU,CACX,CAAC;YAEF,GAAG,CAAC,OAAO,GAAG,IAAI,CAAC,aAAa,CAAC,OAAO,CAAC,WAAW,EAAE,GAAG,CAAC,OAAO,CAAC,CAAC;YAEnE,IAAI,OAAO,CAAC,iBAAiB,EAAE;gBAC7B,OAAO,GAAG,CAAC,OAAO,CAAC;aACpB;iBAAM;gBACL,OAAO,GAAG,CAAC;aACZ;QACH,CAAC;KAAA;IAED,mEAAmE;IAC7D,eAAe,CACnB,GAAY,EACZ,OAAsC;;YAEtC,OAAO,IAAI,CAAC,SAAS,CAAC,MAAM,IAAI,CAAC,OAAO,CAAC,GAAG,EAAE,OAAO,CAAC,CAAC,CAAC;QAC1D,CAAC;KAAA;IAED,kEAAkE;IAC5D,OAAO,CACX,GAAY,EACZ,OAAsC;;YAEtC,IAAI,CAAC,OAAO,EAAE;gBACZ,MAAM,IAAI,KAAK,CAAC,2BAA2B,CAAC,CAAC;aAC9C;YAED,IAAI,CAAC,CAAC,OAAO,YAAY,WAAW,CAAC,EAAE;gBACrC,OAAO,GAAG,IAAI,WAAW,EAAE,CAAC,MAAM,CAAC,IAAI,CAAC,SAAS,CAAC,OAAO,CAAC,CAAC,CAAC;aAC7D;YAED,OAAO,GAAG,CAAC,aAAa,CACtB;gBACE,UAAU,EAAE,SAAS;gBACrB,MAAM,EAAE;oBACN,SAAS,EAAE,MAAM,IAAI,CAAC,WAAW,CAAC,SAAS,EAAE;iBAC9C;aACK,EACR,GAAG,CACJ;iBACE,MAAM,CAAC,OAAO,CAAC;iBACf,KAAK,EAAS,CAAC;QACpB,CAAC;KAAA;IAED,iFAAiF;IACjF,sEAAsE;IAChE,IAAI,CAAC,GAAY,EAAE,OAAiC;;YACxD,MAAM,MAAM,GAAG,GAAG,CAAC,UAAU,CAC3B;gBACE,MAAM,EAAE;oBACN,SAAS,EAAE,MAAM,IAAI,CAAC,WAAW,CAAC,SAAS,EAAE;iBAC9C;aACF,EACD,GAAG,CACJ,CAAC;YAEF,IAAI,OAAO,YAAY,MAAM,EAAE;gBAC7B,MAAM,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC;aACxB;iBAAM;gBACL,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,SAAS,CAAC,OAAO,CAAC,EAAE,MAAM,CAAC,CAAC;aAChD;YAED,OAAO,MAAM,CAAC,KAAK,EAAE,CAAC;QACxB,CAAC;KAAA;IAEK,YAAY,CAChB,GAAY,EACZ,OAAiC;;YAEjC,OAAO,IAAI,CAAC,SAAS,CAAC,MAAM,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE,OAAO,CAAC,CAAC,CAAC;QACvD,CAAC;KAAA;IAEK,MAAM,CACV,GAAY,EACZ,GAAW,EACX,OAAuB;;YAEvB,MAAM,GAAG,GAAG;gBACV,UAAU,EAAE,CAAC,KAAK,CAAC;aACpB,CAAC;YAEF,OAAO,mCACF,sBAAsB,GACtB,OAAO,CACX,CAAC;YAEF,IAAI;gBACF,MAAM,GAAG,GAAG,MAAM,GAAG,CAAC,YAAY,CAAC,GAAG,EAAE,GAAG,CAAC,CAAC,MAAM,CAAC,GAAU,CAAC,CAAC;gBAEhE,GAAG,CAAC,OAAO,GAAG,IAAI,CAAC,aAAa,CAAC,OAAO,CAAC,WAAW,EAAE,GAAG,CAAC,OAAO,CAAC,CAAC;gBAEnE,IAAI,OAAO,CAAC,iBAAiB,EAAE;oBAC7B,OAAO,GAAG,CAAC,OAAO,CAAC;iBACpB;qBAAM;oBACL,OAAO,GAAG,CAAC;iBACZ;aACF;YAAC,OAAO,KAAK,EAAE;gBACd,MAAM,IAAI,WAAW,CAAC;oBACpB,IAAI,EAAE,WAAW,CAAC,YAAY;oBAC9B,OAAO,EAAE,kBAAkB,KAAK,EAAE;iBACnC,CAAC,CAAC;aACJ;QACH,CAAC;KAAA;IAEK,eAAe,CACnB,EACE,GAAG,EACH,MAAM,GAIP,EACD,OAAsC;;YAEtC,MAAM,MAAM,GAAG,IAAI,CAAC,SAAS,CAAC,MAAM,IAAI,CAAC,OAAO,CAAC,GAAG,EAAE,OAAO,CAAC,CAAC,CAAC;YAChE,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,IAAI,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC;YAC5C,OAAO,GAAG,CAAC,OAAO,CAAC;YAEnB,OAAO;gBACL,MAAM;gBACN,GAAG,EAAE,IAAI,CAAC,SAAS,CAAC,GAAG,CAAC;aACzB,CAAC;QACJ,CAAC;KAAA;IAEO,aAAa,CACnB,WAAwB,EACxB,OAAoB;QAEpB,QAAQ,WAAW,EAAE;YACnB,KAAK,MAAM;gBACT,OAAO,IAAI,CAAC,KAAK,CAAC,IAAI,WAAW,EAAE,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC,CAAC;YACvD,KAAK,aAAa;gBAChB,OAAO,OAAO,CAAC;YACjB;gBACE,MAAM,IAAI,sBAAsB,CAAC,wBAAwB,WAAW,EAAE,CAAC,CAAC;SAC3E;IACH,CAAC;;;;YAzLF,UAAU,SAAC;gBACV,UAAU,EAAE,MAAM;aACnB;;;YAlDQ,WAAW","sourcesContent":["import {\n  LrException,\n  LrErrorCode,\n  LrBadArgumentException,\n} from './../_common/exceptions';\nimport { ComponentFactoryResolver, Injectable } from '@angular/core';\nimport { JWE, JWK, JWS, util } from 'node-jose';\nimport { Key, PayloadType } from './cryptography.types';\nimport { TimeService } from '../api/time.service';\n\nexport enum JoseSerialization {\n  JSON = 'JSON',\n  COMPACT = 'COMPACT',\n}\n\nexport interface VerifyOptions {\n  payloadType?: PayloadType;\n  returnOnlyPayload?: boolean; // If true, return only the decoded payload.\n}\n\nexport interface DecryptOptions {\n  payloadType?: PayloadType;\n  returnOnlyPayload?: boolean; // If true, return only the decoded payload.\n  serializations?: JoseSerialization[];\n}\n\nexport const VERIFY_OPTIONS_DEFAULT: VerifyOptions = {\n  payloadType: 'json',\n  returnOnlyPayload: true,\n};\n\nexport const DECRYPT_OPTIONS_DEFAULT: DecryptOptions = {\n  payloadType: 'json',\n  returnOnlyPayload: true,\n  serializations: [JoseSerialization.JSON],\n};\n\nexport function isSymmetricKey(key: JWK.Key) {\n  // TODO: make sure this covers all cases.\n  return key.kty === 'oct';\n}\n\nexport function asJwk(key: JWK.Key | Key | any): JWK.Key | null {\n  // TODO: make sure this covers all cases.\n  // Excluded:\n  //   key.use - only for public keys, Ref: https://tools.ietf.org/html/rfc7517#section-4.2\n\n  if (key.id && key.jwk) {\n    return key.jwk;\n  } else if (key.keystore && key.length && key.kty && key.kid && key.alg) {\n    return key;\n  } else {\n    return null;\n  }\n}\n\n@Injectable({\n  providedIn: 'root',\n})\nexport class EncryptionService {\n  constructor(private timeService: TimeService) {}\n\n  async decrypt(\n    key: JWK.Key | Key, // string is assumed to be key.id, will unwrap key.\n    jwe: object | string, // string will be JSON.parsed\n    options?: DecryptOptions\n  ): Promise<JWE.DecryptResult | any> {\n    const opt = {\n      algorithms: ['dir', 'A*GCM', 'RSA-OAEP-*'],\n    };\n\n    options = {\n      ...DECRYPT_OPTIONS_DEFAULT,\n      ...options,\n    };\n\n    if ((key as Key).jwk) {\n      key = (key as Key).jwk;\n    }\n\n    if (typeof jwe === 'string') {\n      if (options.serializations.includes(JoseSerialization.JSON)) {\n        try {\n          jwe = JSON.parse(jwe);\n        } catch (error) {\n          if (options.serializations.includes(JoseSerialization.COMPACT)) {\n            console.log(\n              'Not a JSON-formatted JWE, it maybe compact serialisation format.'\n            );\n          } else {\n            throw error;\n          }\n        }\n      }\n    }\n\n    // {result} is a Object with:\n    // *  header: the combined 'protected' and 'unprotected' header members\n    // *  protected: an array of the member names from the \"protected\" member\n    // *  key: Key used to decrypt\n    // *  payload: Buffer of the decrypted content\n    // *  plaintext: Buffer of the decrypted content (alternate), just a reference to payload\n    const res = await JWE.createDecrypt(key as JWK.Key, opt).decrypt(\n      jwe as any\n    );\n\n    res.payload = this.decodePayload(options.payloadType, res.payload);\n\n    if (options.returnOnlyPayload) {\n      return res.payload;\n    } else {\n      return res;\n    }\n  }\n\n  // TODO rename this to encrypt() and use as the most common usecase\n  async encryptToString(\n    key: JWK.Key,\n    content: ArrayBuffer | string | object\n  ): Promise<string> {\n    return JSON.stringify(await this.encrypt(key, content));\n  }\n\n  // TODO rename this to encryptToJSON() and use this when required.\n  async encrypt(\n    key: JWK.Key,\n    content: ArrayBuffer | string | object\n  ): Promise<any> {\n    if (!content) {\n      throw new Error('Encrypting empty content.');\n    }\n\n    if (!(content instanceof ArrayBuffer)) {\n      content = new TextEncoder().encode(JSON.stringify(content));\n    }\n\n    return JWE.createEncrypt(\n      {\n        contentAlg: 'A256GCM',\n        fields: {\n          timestamp: await this.timeService.serverNow(),\n        },\n      } as any,\n      key\n    )\n      .update(content)\n      .final() as any;\n  }\n\n  // <AZ> Unlike signContent, the serialised \"content\" variable is contained inside\n  // the result. So ordering of fields within \"content\" is not an issue.\n  async sign(key: JWK.Key, content: Buffer | string | object): Promise<any> {\n    const signer = JWS.createSign(\n      {\n        fields: {\n          timestamp: await this.timeService.serverNow(),\n        },\n      },\n      key\n    );\n\n    if (content instanceof Buffer) {\n      signer.update(content);\n    } else {\n      signer.update(JSON.stringify(content), 'utf8');\n    }\n\n    return signer.final();\n  }\n\n  async signToString(\n    key: JWK.Key,\n    content: Buffer | string | object\n  ): Promise<string> {\n    return JSON.stringify(await this.sign(key, content));\n  }\n\n  async verify(\n    key: JWK.Key,\n    jws: object,\n    options?: VerifyOptions\n  ): Promise<any> {\n    const opt = {\n      algorithms: ['RS*'],\n    };\n\n    options = {\n      ...VERIFY_OPTIONS_DEFAULT,\n      ...options,\n    };\n\n    try {\n      const res = await JWS.createVerify(key, opt).verify(jws as any);\n\n      res.payload = this.decodePayload(options.payloadType, res.payload);\n\n      if (options.returnOnlyPayload) {\n        return res.payload;\n      } else {\n        return res;\n      }\n    } catch (error) {\n      throw new LrException({\n        code: LrErrorCode.BadSignature,\n        message: `Bad signature: ${error}`,\n      });\n    }\n  }\n\n  async encryptThenSign(\n    {\n      key,\n      sigPrk,\n    }: {\n      key: JWK.Key;\n      sigPrk: JWK.Key;\n    },\n    content: ArrayBuffer | string | object\n  ): Promise<{ cipher: string; sig: string }> {\n    const cipher = JSON.stringify(await this.encrypt(key, content));\n    const sig = await this.sign(sigPrk, cipher);\n    delete sig.payload;\n\n    return {\n      cipher,\n      sig: JSON.stringify(sig),\n    };\n  }\n\n  private decodePayload(\n    payloadType: PayloadType,\n    payload: ArrayBuffer\n  ): ArrayBuffer | any {\n    switch (payloadType) {\n      case 'json':\n        return JSON.parse(new TextDecoder().decode(payload));\n      case 'ArrayBuffer':\n        return payload;\n      default:\n        throw new LrBadArgumentException(`Unknown payloadType: ${payloadType}`);\n    }\n  }\n}\n"]}
|
|
@@ -0,0 +1,237 @@
|
|
|
1
|
+
import { __awaiter } from "tslib";
|
|
2
|
+
import { Injectable } from '@angular/core';
|
|
3
|
+
import { JWK } from 'node-jose';
|
|
4
|
+
import { WebCryptoService } from './web-crypto.service';
|
|
5
|
+
import { LrBadArgumentException, LrSuspiciousException, } from '../_common/exceptions';
|
|
6
|
+
import * as i0 from "@angular/core";
|
|
7
|
+
import * as i1 from "./web-crypto.service";
|
|
8
|
+
export function sha256(message) {
|
|
9
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
10
|
+
// encode as UTF-8
|
|
11
|
+
const msgBuffer = new TextEncoder().encode(message);
|
|
12
|
+
// hash the message
|
|
13
|
+
const hashBuffer = yield crypto.subtle.digest('SHA-256', msgBuffer);
|
|
14
|
+
// convert ArrayBuffer to Array
|
|
15
|
+
const hashArray = Array.from(new Uint8Array(hashBuffer));
|
|
16
|
+
// convert bytes to hex string
|
|
17
|
+
const hashHex = hashArray
|
|
18
|
+
.map((b) => ('00' + b.toString(16)).slice(-2))
|
|
19
|
+
.join('');
|
|
20
|
+
return hashHex;
|
|
21
|
+
});
|
|
22
|
+
}
|
|
23
|
+
export class KeyFactoryService {
|
|
24
|
+
constructor(webCryptoService) {
|
|
25
|
+
this.webCryptoService = webCryptoService;
|
|
26
|
+
// Global keys store. Otherwise, each call to asKey creates a new keyStore.
|
|
27
|
+
// <AZ> Did not seem to improve speed.
|
|
28
|
+
// public static keyStore = JWK.createKeyStore();
|
|
29
|
+
// AZ: This can't be change easily. It's basically a PassK or PassIdp rotation.
|
|
30
|
+
// todo: we should eventually increase this periodically to match with Moore's law.
|
|
31
|
+
// The iterations for each key are kept by the server as well but we assume the value
|
|
32
|
+
// from the server is not trustworthy, so need to have minimum thresholds here.
|
|
33
|
+
// If creating new keys, these minimum are used.
|
|
34
|
+
this.MIN_PASS_IDP_PBKDF_ITER = 100000;
|
|
35
|
+
this.MIN_PASS_KEY_PBKDF_ITER = 100000;
|
|
36
|
+
this.MIN_LBOP_KEY_PBKDF_ITER = 100000;
|
|
37
|
+
// These are used as the default values. They must be larger than the minimum values.
|
|
38
|
+
this.DEFAULT_PASS_IDP_PBKDF_ITER = this.MIN_PASS_IDP_PBKDF_ITER;
|
|
39
|
+
this.DEFAULT_PASS_KEY_PBKDF_ITER = this.MIN_PASS_KEY_PBKDF_ITER;
|
|
40
|
+
this.DEFAULT_LBOP_KEY_PBKDF_ITER = this.MIN_LBOP_KEY_PBKDF_ITER;
|
|
41
|
+
this.crypto = this.webCryptoService.crypto;
|
|
42
|
+
}
|
|
43
|
+
static asKey(key, form, extras) {
|
|
44
|
+
// <AZ> Using a single global key store did not seem to improve speed.
|
|
45
|
+
// return KeyFactoryService.keyStore.add(key, form, extras);
|
|
46
|
+
return JWK.asKey(key, form, extras);
|
|
47
|
+
}
|
|
48
|
+
randomString(digits) {
|
|
49
|
+
if (digits <= 0) {
|
|
50
|
+
throw new LrBadArgumentException('digits <= 0');
|
|
51
|
+
}
|
|
52
|
+
const validChars = 'ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789';
|
|
53
|
+
let array = new Uint32Array(digits);
|
|
54
|
+
this.crypto.getRandomValues(array);
|
|
55
|
+
array = array.map((x) => validChars.charCodeAt(x % validChars.length));
|
|
56
|
+
return String.fromCharCode.apply(null, array);
|
|
57
|
+
}
|
|
58
|
+
randomDigitsNoZeros(digits) {
|
|
59
|
+
return this.randomChoices([1, 2, 3, 4, 5, 6, 7, 8, 9], digits).join('');
|
|
60
|
+
}
|
|
61
|
+
randomChoices(array, chooseN) {
|
|
62
|
+
if (array.length <= 1) {
|
|
63
|
+
throw new LrBadArgumentException('array.length <= 0');
|
|
64
|
+
}
|
|
65
|
+
if (chooseN <= 0) {
|
|
66
|
+
throw new LrBadArgumentException('chooseN <= 0');
|
|
67
|
+
}
|
|
68
|
+
const values = new Uint32Array(chooseN);
|
|
69
|
+
this.crypto.getRandomValues(values);
|
|
70
|
+
const ret = [];
|
|
71
|
+
values.forEach((v) => ret.push(array[v % array.length]));
|
|
72
|
+
return ret;
|
|
73
|
+
}
|
|
74
|
+
createSalt() {
|
|
75
|
+
return this.randomString(16);
|
|
76
|
+
}
|
|
77
|
+
createKey() {
|
|
78
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
79
|
+
const key = yield this.crypto.subtle.generateKey({
|
|
80
|
+
name: 'AES-GCM',
|
|
81
|
+
length: 256,
|
|
82
|
+
}, true, // whether the key is extractable (i.e. can be used in exportKey)
|
|
83
|
+
['encrypt', 'decrypt'] // must be ["encrypt", "decrypt"] or ["wrapKey", "unwrapKey"]
|
|
84
|
+
);
|
|
85
|
+
const jwk = yield this.crypto.subtle.exportKey('jwk', key);
|
|
86
|
+
// Removing the fields not needed by node-jose
|
|
87
|
+
delete jwk.ext;
|
|
88
|
+
delete jwk.key_ops;
|
|
89
|
+
return KeyFactoryService.asKey(jwk);
|
|
90
|
+
});
|
|
91
|
+
}
|
|
92
|
+
createSignKey() {
|
|
93
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
94
|
+
const key = yield this.crypto.subtle.generateKey({
|
|
95
|
+
name: 'HMAC',
|
|
96
|
+
hash: { name: 'SHA-512' },
|
|
97
|
+
}, true, ['sign', 'verify']);
|
|
98
|
+
const jwk = yield this.crypto.subtle.exportKey('jwk', key);
|
|
99
|
+
// Removing the fields not needed by node-jose
|
|
100
|
+
delete jwk.key_ops;
|
|
101
|
+
delete jwk.ext;
|
|
102
|
+
return KeyFactoryService.asKey(jwk);
|
|
103
|
+
});
|
|
104
|
+
}
|
|
105
|
+
createPkcKey() {
|
|
106
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
107
|
+
// node-jose is not using Forge properly. It should be calling the async version of
|
|
108
|
+
// pki.rsa.generateKeyPair() with a callback. Instead it calls the sync version. Webcrypto
|
|
109
|
+
// does not support sync version, so it uses the javascript implementation, which is way too slow.
|
|
110
|
+
// So we generate using webcrypto and import the key.
|
|
111
|
+
// Unfortunately Elliptical Curve is not supported by Webcrypto. So we have to settle for RSA.
|
|
112
|
+
const key = yield this.crypto.subtle.generateKey({
|
|
113
|
+
name: 'RSA-OAEP',
|
|
114
|
+
modulusLength: 2048,
|
|
115
|
+
// As per suggestion: https://developer.mozilla.org/en-US/docs/Web/API/RsaHashedKeyGenParams
|
|
116
|
+
publicExponent: new Uint8Array([0x01, 0x00, 0x01]),
|
|
117
|
+
hash: { name: 'SHA-256' },
|
|
118
|
+
}, true, // whether the key is extractable (i.e. can be used in exportKey)
|
|
119
|
+
['encrypt', 'decrypt'] // must be ["encrypt", "decrypt"] or ["wrapKey", "unwrapKey"]
|
|
120
|
+
);
|
|
121
|
+
const jwk = yield this.crypto.subtle.exportKey('jwk', key.privateKey);
|
|
122
|
+
// Removing the fields not needed by node-jose
|
|
123
|
+
delete jwk.key_ops;
|
|
124
|
+
delete jwk.ext;
|
|
125
|
+
return KeyFactoryService.asKey(jwk);
|
|
126
|
+
});
|
|
127
|
+
}
|
|
128
|
+
createPkcSignKey() {
|
|
129
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
130
|
+
const key = yield this.crypto.subtle.generateKey({
|
|
131
|
+
name: 'RSASSA-PKCS1-v1_5',
|
|
132
|
+
modulusLength: 2048,
|
|
133
|
+
// As per suggestion: https://developer.mozilla.org/en-US/docs/Web/API/RsaHashedKeyGenParams
|
|
134
|
+
publicExponent: new Uint8Array([0x01, 0x00, 0x01]),
|
|
135
|
+
hash: { name: 'SHA-256' },
|
|
136
|
+
}, true, // whether the key is extractable (i.e. can be used in exportKey)
|
|
137
|
+
['sign', 'verify'] // can be any combination of "sign" and "verify"
|
|
138
|
+
);
|
|
139
|
+
const jwk = yield this.crypto.subtle.exportKey('jwk', key.privateKey);
|
|
140
|
+
// Removing the fields not needed by node-jose
|
|
141
|
+
delete jwk.key_ops;
|
|
142
|
+
delete jwk.ext;
|
|
143
|
+
return KeyFactoryService.asKey(jwk);
|
|
144
|
+
});
|
|
145
|
+
}
|
|
146
|
+
deriveKey({ password, salt, iterations, kid, }) {
|
|
147
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
148
|
+
const enc = new TextEncoder();
|
|
149
|
+
const rawKey = yield this.crypto.subtle.importKey('raw', enc.encode(password), 'PBKDF2', false, ['deriveBits', 'deriveKey']);
|
|
150
|
+
const passKey = yield crypto.subtle.deriveKey({
|
|
151
|
+
name: 'PBKDF2',
|
|
152
|
+
salt: new TextEncoder().encode(salt),
|
|
153
|
+
iterations,
|
|
154
|
+
hash: 'SHA-256',
|
|
155
|
+
}, rawKey, { name: 'AES-GCM', length: 256 }, true, ['encrypt', 'decrypt']);
|
|
156
|
+
const passKeyJson = yield crypto.subtle.exportKey('jwk', passKey);
|
|
157
|
+
if (kid) {
|
|
158
|
+
passKeyJson.kid = kid;
|
|
159
|
+
}
|
|
160
|
+
const jwk = yield KeyFactoryService.asKey(passKeyJson);
|
|
161
|
+
return { jwk };
|
|
162
|
+
});
|
|
163
|
+
}
|
|
164
|
+
derivePassIdp(params) {
|
|
165
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
166
|
+
if (params.iterations < this.MIN_PASS_IDP_PBKDF_ITER) {
|
|
167
|
+
throw new LrSuspiciousException(`The number of PassIdp key derivation iterations sent from the server (${params.iterations}) is lower than the minimum (${this.MIN_PASS_IDP_PBKDF_ITER})`);
|
|
168
|
+
}
|
|
169
|
+
return this.deriveKey(params);
|
|
170
|
+
});
|
|
171
|
+
}
|
|
172
|
+
derivePassKey(params) {
|
|
173
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
174
|
+
if (params.iterations < this.MIN_PASS_KEY_PBKDF_ITER) {
|
|
175
|
+
throw new LrSuspiciousException(`The number of PassKey key derivation iterations sent from the server(${params.iterations}) is lower than the minimum(${this.MIN_PASS_KEY_PBKDF_ITER})`);
|
|
176
|
+
}
|
|
177
|
+
return this.deriveKey(params);
|
|
178
|
+
});
|
|
179
|
+
}
|
|
180
|
+
deriveLbopKey(params) {
|
|
181
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
182
|
+
if (params.iterations < this.MIN_LBOP_KEY_PBKDF_ITER) {
|
|
183
|
+
throw new LrSuspiciousException(`The number of LbopKey key derivation iterations sent from the server(${params.iterations}) is lower than the minimum(${this.MIN_LBOP_KEY_PBKDF_ITER})`);
|
|
184
|
+
}
|
|
185
|
+
return this.deriveKey(params);
|
|
186
|
+
});
|
|
187
|
+
}
|
|
188
|
+
createKid() {
|
|
189
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
190
|
+
// todo: AZ: node-jose source uses node's default UUID() function for kid, so just change to use that.
|
|
191
|
+
// for now, we are just creating a new key to use it's kid.
|
|
192
|
+
// The kid is a part of the JWK system. LR backend maintains the key hierarchy separately with it's own
|
|
193
|
+
// key id. But we just use it here as a double check.
|
|
194
|
+
return (yield this.createKey()).kid;
|
|
195
|
+
});
|
|
196
|
+
}
|
|
197
|
+
createPassIdpParams() {
|
|
198
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
199
|
+
return {
|
|
200
|
+
salt: this.createSalt(),
|
|
201
|
+
iterations: this.DEFAULT_PASS_IDP_PBKDF_ITER,
|
|
202
|
+
};
|
|
203
|
+
});
|
|
204
|
+
}
|
|
205
|
+
createPassKeyParams() {
|
|
206
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
207
|
+
return {
|
|
208
|
+
salt: this.createSalt(),
|
|
209
|
+
kid: yield this.createKid(),
|
|
210
|
+
iterations: this.DEFAULT_PASS_KEY_PBKDF_ITER,
|
|
211
|
+
};
|
|
212
|
+
});
|
|
213
|
+
}
|
|
214
|
+
createLbopKeyParams() {
|
|
215
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
216
|
+
return {
|
|
217
|
+
salt: this.createSalt(),
|
|
218
|
+
// todo: AZ: node-jose source uses node's default UUID() function for kid, so just change to use that.
|
|
219
|
+
// for now, we are just creating a new key to use it's kid.
|
|
220
|
+
// The kid is a part of the JWK system. LR backend maintains the key hierarchy separately with it's own
|
|
221
|
+
// key id. But we just use it here as a double check.
|
|
222
|
+
kid: yield this.createKid(),
|
|
223
|
+
iterations: this.DEFAULT_PASS_KEY_PBKDF_ITER,
|
|
224
|
+
};
|
|
225
|
+
});
|
|
226
|
+
}
|
|
227
|
+
}
|
|
228
|
+
KeyFactoryService.ɵprov = i0.ɵɵdefineInjectable({ factory: function KeyFactoryService_Factory() { return new KeyFactoryService(i0.ɵɵinject(i1.WebCryptoService)); }, token: KeyFactoryService, providedIn: "root" });
|
|
229
|
+
KeyFactoryService.decorators = [
|
|
230
|
+
{ type: Injectable, args: [{
|
|
231
|
+
providedIn: 'root',
|
|
232
|
+
},] }
|
|
233
|
+
];
|
|
234
|
+
KeyFactoryService.ctorParameters = () => [
|
|
235
|
+
{ type: WebCryptoService }
|
|
236
|
+
];
|
|
237
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"key-factory.service.js","sourceRoot":"/opt/atlassian/pipelines/agent/build/projects/core/src/","sources":["lib/cryptography/key-factory.service.ts"],"names":[],"mappings":";AAAA,OAAO,EAAE,UAAU,EAAE,MAAM,eAAe,CAAC;AAC3C,OAAO,EAAE,GAAG,EAAE,MAAM,WAAW,CAAC;AAUhC,OAAO,EAAE,gBAAgB,EAAE,MAAM,sBAAsB,CAAC;AACxD,OAAO,EACL,sBAAsB,EACtB,qBAAqB,GACtB,MAAM,uBAAuB,CAAC;;;AAE/B,MAAM,UAAgB,MAAM,CAAC,OAAO;;QAClC,kBAAkB;QAClB,MAAM,SAAS,GAAG,IAAI,WAAW,EAAE,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC;QAEpD,mBAAmB;QACnB,MAAM,UAAU,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,MAAM,CAAC,SAAS,EAAE,SAAS,CAAC,CAAC;QAEpE,+BAA+B;QAC/B,MAAM,SAAS,GAAG,KAAK,CAAC,IAAI,CAAC,IAAI,UAAU,CAAC,UAAU,CAAC,CAAC,CAAC;QAEzD,8BAA8B;QAC9B,MAAM,OAAO,GAAG,SAAS;aACtB,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,IAAI,GAAG,CAAC,CAAC,QAAQ,CAAC,EAAE,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC;aAC7C,IAAI,CAAC,EAAE,CAAC,CAAC;QACZ,OAAO,OAAO,CAAC;IACjB,CAAC;CAAA;AAKD,MAAM,OAAO,iBAAiB;IAC5B,YAAoB,gBAAkC;QAAlC,qBAAgB,GAAhB,gBAAgB,CAAkB;QAItD,2EAA2E;QAC3E,sCAAsC;QACtC,iDAAiD;QAEjD,+EAA+E;QAC/E,mFAAmF;QACnF,qFAAqF;QACrF,+EAA+E;QAC/E,gDAAgD;QAChC,4BAAuB,GAAG,MAAM,CAAC;QACjC,4BAAuB,GAAG,MAAM,CAAC;QACjC,4BAAuB,GAAG,MAAM,CAAC;QAEjD,qFAAqF;QACrE,gCAA2B,GAAG,IAAI,CAAC,uBAAuB,CAAC;QAC3D,gCAA2B,GAAG,IAAI,CAAC,uBAAuB,CAAC;QAC3D,gCAA2B,GAAG,IAAI,CAAC,uBAAuB,CAAC;QAnBzE,IAAI,CAAC,MAAM,GAAG,IAAI,CAAC,gBAAgB,CAAC,MAAM,CAAC;IAC7C,CAAC;IAoBD,MAAM,CAAC,KAAK,CACV,GAA0C,EAC1C,IAQS,EACT,MAAgC;QAEhC,sEAAsE;QACtE,4DAA4D;QAC5D,OAAO,GAAG,CAAC,KAAK,CAAC,GAAG,EAAE,IAAI,EAAE,MAAM,CAAC,CAAC;IACtC,CAAC;IAED,YAAY,CAAC,MAAc;QACzB,IAAI,MAAM,IAAI,CAAC,EAAE;YACf,MAAM,IAAI,sBAAsB,CAAC,aAAa,CAAC,CAAC;SACjD;QACD,MAAM,UAAU,GACd,gEAAgE,CAAC;QACnE,IAAI,KAAK,GAAG,IAAI,WAAW,CAAC,MAAM,CAAC,CAAC;QACpC,IAAI,CAAC,MAAM,CAAC,eAAe,CAAC,KAAK,CAAC,CAAC;QACnC,KAAK,GAAG,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,UAAU,CAAC,UAAU,CAAC,CAAC,GAAG,UAAU,CAAC,MAAM,CAAC,CAAC,CAAC;QACvE,OAAO,MAAM,CAAC,YAAY,CAAC,KAAK,CAAC,IAAI,EAAE,KAAK,CAAC,CAAC;IAChD,CAAC;IAED,mBAAmB,CAAC,MAAc;QAChC,OAAO,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC,EAAE,CAAC,EAAE,CAAC,EAAE,CAAC,EAAE,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC,EAAE,MAAM,CAAC,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC;IAC1E,CAAC;IAED,aAAa,CAAI,KAAU,EAAE,OAAe;QAC1C,IAAI,KAAK,CAAC,MAAM,IAAI,CAAC,EAAE;YACrB,MAAM,IAAI,sBAAsB,CAAC,mBAAmB,CAAC,CAAC;SACvD;QACD,IAAI,OAAO,IAAI,CAAC,EAAE;YAChB,MAAM,IAAI,sBAAsB,CAAC,cAAc,CAAC,CAAC;SAClD;QACD,MAAM,MAAM,GAAG,IAAI,WAAW,CAAC,OAAO,CAAC,CAAC;QACxC,IAAI,CAAC,MAAM,CAAC,eAAe,CAAC,MAAM,CAAC,CAAC;QACpC,MAAM,GAAG,GAAQ,EAAE,CAAC;QACpB,MAAM,CAAC,OAAO,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,GAAG,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,GAAG,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC;QACzD,OAAO,GAAG,CAAC;IACb,CAAC;IAED,UAAU;QACR,OAAO,IAAI,CAAC,YAAY,CAAC,EAAE,CAAC,CAAC;IAC/B,CAAC;IAEK,SAAS;;YACb,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,WAAW,CAC9C;gBACE,IAAI,EAAE,SAAS;gBACf,MAAM,EAAE,GAAG;aACZ,EACD,IAAI,EAAE,iEAAiE;YACvE,CAAC,SAAS,EAAE,SAAS,CAAC,CAAC,6DAA6D;aACrF,CAAC;YAEF,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,KAAK,EAAE,GAAG,CAAC,CAAC;YAE3D,8CAA8C;YAC9C,OAAO,GAAG,CAAC,GAAG,CAAC;YACf,OAAO,GAAG,CAAC,OAAO,CAAC;YAEnB,OAAO,iBAAiB,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;QACtC,CAAC;KAAA;IAEK,aAAa;;YACjB,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,WAAW,CAC9C;gBACE,IAAI,EAAE,MAAM;gBACZ,IAAI,EAAE,EAAE,IAAI,EAAE,SAAS,EAAE;aAC1B,EACD,IAAI,EACJ,CAAC,MAAM,EAAE,QAAQ,CAAC,CACnB,CAAC;YAEF,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,KAAK,EAAE,GAAG,CAAC,CAAC;YAE3D,8CAA8C;YAC9C,OAAO,GAAG,CAAC,OAAO,CAAC;YACnB,OAAO,GAAG,CAAC,GAAG,CAAC;YAEf,OAAO,iBAAiB,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;QACtC,CAAC;KAAA;IAEK,YAAY;;YAChB,mFAAmF;YACnF,0FAA0F;YAC1F,kGAAkG;YAClG,qDAAqD;YACrD,8FAA8F;YAC9F,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,WAAW,CAC9C;gBACE,IAAI,EAAE,UAAU;gBAChB,aAAa,EAAE,IAAI;gBACnB,4FAA4F;gBAC5F,cAAc,EAAE,IAAI,UAAU,CAAC,CAAC,IAAI,EAAE,IAAI,EAAE,IAAI,CAAC,CAAC;gBAClD,IAAI,EAAE,EAAE,IAAI,EAAE,SAAS,EAAE;aAC1B,EACD,IAAI,EAAE,iEAAiE;YACvE,CAAC,SAAS,EAAE,SAAS,CAAC,CAAC,6DAA6D;aACrF,CAAC;YAEF,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,KAAK,EAAE,GAAG,CAAC,UAAU,CAAC,CAAC;YACtE,8CAA8C;YAC9C,OAAO,GAAG,CAAC,OAAO,CAAC;YACnB,OAAO,GAAG,CAAC,GAAG,CAAC;YAEf,OAAO,iBAAiB,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;QACtC,CAAC;KAAA;IAEK,gBAAgB;;YACpB,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,WAAW,CAC9C;gBACE,IAAI,EAAE,mBAAmB;gBACzB,aAAa,EAAE,IAAI;gBACnB,4FAA4F;gBAC5F,cAAc,EAAE,IAAI,UAAU,CAAC,CAAC,IAAI,EAAE,IAAI,EAAE,IAAI,CAAC,CAAC;gBAClD,IAAI,EAAE,EAAE,IAAI,EAAE,SAAS,EAAE;aAC1B,EACD,IAAI,EAAE,iEAAiE;YACvE,CAAC,MAAM,EAAE,QAAQ,CAAC,CAAC,gDAAgD;aACpE,CAAC;YAEF,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,KAAK,EAAE,GAAG,CAAC,UAAU,CAAC,CAAC;YAEtE,8CAA8C;YAC9C,OAAO,GAAG,CAAC,OAAO,CAAC;YACnB,OAAO,GAAG,CAAC,GAAG,CAAC;YAEf,OAAO,iBAAiB,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;QACtC,CAAC;KAAA;IAEK,SAAS,CAAC,EACd,QAAQ,EACR,IAAI,EACJ,UAAU,EACV,GAAG,GAMJ;;YACC,MAAM,GAAG,GAAG,IAAI,WAAW,EAAE,CAAC;YAC9B,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,SAAS,CAC/C,KAAK,EACL,GAAG,CAAC,MAAM,CAAC,QAAQ,CAAC,EACpB,QAAQ,EACR,KAAK,EACL,CAAC,YAAY,EAAE,WAAW,CAAC,CAC5B,CAAC;YAEF,MAAM,OAAO,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAC3C;gBACE,IAAI,EAAE,QAAQ;gBACd,IAAI,EAAE,IAAI,WAAW,EAAE,CAAC,MAAM,CAAC,IAAI,CAAC;gBACpC,UAAU;gBACV,IAAI,EAAE,SAAS;aAChB,EACD,MAAM,EACN,EAAE,IAAI,EAAE,SAAS,EAAE,MAAM,EAAE,GAAG,EAAE,EAChC,IAAI,EACJ,CAAC,SAAS,EAAE,SAAS,CAAC,CACvB,CAAC;YAEF,MAAM,WAAW,GAAQ,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,KAAK,EAAE,OAAO,CAAC,CAAC;YACvE,IAAI,GAAG,EAAE;gBACP,WAAW,CAAC,GAAG,GAAG,GAAG,CAAC;aACvB;YAED,MAAM,GAAG,GAAG,MAAM,iBAAiB,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC;YAEvD,OAAO,EAAE,GAAG,EAAE,CAAC;QACjB,CAAC;KAAA;IAEK,aAAa,CAAC,MAA2B;;YAC7C,IAAI,MAAM,CAAC,UAAU,GAAG,IAAI,CAAC,uBAAuB,EAAE;gBACpD,MAAM,IAAI,qBAAqB,CAC7B,yEAAyE,MAAM,CAAC,UAAU,gCAAgC,IAAI,CAAC,uBAAuB,GAAG,CAC1J,CAAC;aACH;YACD,OAAO,IAAI,CAAC,SAAS,CAAC,MAAM,CAAC,CAAC;QAChC,CAAC;KAAA;IAEK,aAAa,CAAC,MAA2B;;YAC7C,IAAI,MAAM,CAAC,UAAU,GAAG,IAAI,CAAC,uBAAuB,EAAE;gBACpD,MAAM,IAAI,qBAAqB,CAC7B,wEAAwE,MAAM,CAAC,UAAU,+BAA+B,IAAI,CAAC,uBAAuB,GAAG,CACxJ,CAAC;aACH;YACD,OAAO,IAAI,CAAC,SAAS,CAAC,MAAM,CAAC,CAAC;QAChC,CAAC;KAAA;IAEK,aAAa,CAAC,MAA2B;;YAC7C,IAAI,MAAM,CAAC,UAAU,GAAG,IAAI,CAAC,uBAAuB,EAAE;gBACpD,MAAM,IAAI,qBAAqB,CAC7B,wEAAwE,MAAM,CAAC,UAAU,+BAA+B,IAAI,CAAC,uBAAuB,GAAG,CACxJ,CAAC;aACH;YACD,OAAO,IAAI,CAAC,SAAS,CAAC,MAAM,CAAC,CAAC;QAChC,CAAC;KAAA;IAEK,SAAS;;YACb,sGAAsG;YACtG,2DAA2D;YAC3D,uGAAuG;YACvG,qDAAqD;YACrD,OAAO,CAAC,MAAM,IAAI,CAAC,SAAS,EAAE,CAAC,CAAC,GAAG,CAAC;QACtC,CAAC;KAAA;IAEK,mBAAmB;;YACvB,OAAO;gBACL,IAAI,EAAE,IAAI,CAAC,UAAU,EAAE;gBACvB,UAAU,EAAE,IAAI,CAAC,2BAA2B;aAC7C,CAAC;QACJ,CAAC;KAAA;IAEK,mBAAmB;;YACvB,OAAO;gBACL,IAAI,EAAE,IAAI,CAAC,UAAU,EAAE;gBACvB,GAAG,EAAE,MAAM,IAAI,CAAC,SAAS,EAAE;gBAC3B,UAAU,EAAE,IAAI,CAAC,2BAA2B;aAC7C,CAAC;QACJ,CAAC;KAAA;IAEK,mBAAmB;;YACvB,OAAO;gBACL,IAAI,EAAE,IAAI,CAAC,UAAU,EAAE;gBACvB,sGAAsG;gBACtG,2DAA2D;gBAC3D,uGAAuG;gBACvG,qDAAqD;gBACrD,GAAG,EAAE,MAAM,IAAI,CAAC,SAAS,EAAE;gBAC3B,UAAU,EAAE,IAAI,CAAC,2BAA2B;aAC7C,CAAC;QACJ,CAAC;KAAA;;;;YA3QF,UAAU,SAAC;gBACV,UAAU,EAAE,MAAM;aACnB;;;YAzBQ,gBAAgB","sourcesContent":["import { Injectable } from '@angular/core';\nimport { JWK } from 'node-jose';\nimport {\n  LbopKeyParams,\n  PassIdpParams,\n  PassKeyParams,\n  DeriveKeyResult,\n  DerivePassIdpParams,\n  DerivePassKeyParams,\n  DeriveLbopKeyParams,\n} from './cryptography.types';\nimport { WebCryptoService } from './web-crypto.service';\nimport {\n  LrBadArgumentException,\n  LrSuspiciousException,\n} from '../_common/exceptions';\n\nexport async function sha256(message) {\n  // encode as UTF-8\n  const msgBuffer = new TextEncoder().encode(message);\n\n  // hash the message\n  const hashBuffer = await crypto.subtle.digest('SHA-256', msgBuffer);\n\n  // convert ArrayBuffer to Array\n  const hashArray = Array.from(new Uint8Array(hashBuffer));\n\n  // convert bytes to hex string\n  const hashHex = hashArray\n    .map((b) => ('00' + b.toString(16)).slice(-2))\n    .join('');\n  return hashHex;\n}\n\n@Injectable({\n  providedIn: 'root',\n})\nexport class KeyFactoryService {\n  constructor(private webCryptoService: WebCryptoService) {\n    this.crypto = this.webCryptoService.crypto;\n  }\n  private readonly crypto;\n  // Global keys store. Otherwise, each call to asKey creates a new keyStore.\n  // <AZ> Did not seem to improve speed.\n  // public static keyStore = JWK.createKeyStore();\n\n  // AZ: This can't be change easily. It's basically a PassK or PassIdp rotation.\n  // todo: we should eventually increase this periodically to match with Moore's law.\n  // The iterations for each key are kept by the server as well but we assume the value\n  // from the server is not trustworthy, so need to have minimum thresholds here.\n  // If creating new keys, these minimum are used.\n  public readonly MIN_PASS_IDP_PBKDF_ITER = 100000;\n  public readonly MIN_PASS_KEY_PBKDF_ITER = 100000;\n  public readonly MIN_LBOP_KEY_PBKDF_ITER = 100000;\n\n  // These are used as the default values. They must be larger than the minimum values.\n  public readonly DEFAULT_PASS_IDP_PBKDF_ITER = this.MIN_PASS_IDP_PBKDF_ITER;\n  public readonly DEFAULT_PASS_KEY_PBKDF_ITER = this.MIN_PASS_KEY_PBKDF_ITER;\n  public readonly DEFAULT_LBOP_KEY_PBKDF_ITER = this.MIN_LBOP_KEY_PBKDF_ITER;\n\n  static asKey(\n    key: string | Buffer | object | JWK.RawKey,\n    form?:\n      | 'json'\n      | 'private'\n      | 'pkcs8'\n      | 'public'\n      | 'spki'\n      | 'pkix'\n      | 'x509'\n      | 'pem',\n    extras?: Record<string, unknown>\n  ): Promise<JWK.Key> {\n    // <AZ> Using a single global key store did not seem to improve speed.\n    // return KeyFactoryService.keyStore.add(key, form, extras);\n    return JWK.asKey(key, form, extras);\n  }\n\n  randomString(digits: number): string {\n    if (digits <= 0) {\n      throw new LrBadArgumentException('digits <= 0');\n    }\n    const validChars =\n      'ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789';\n    let array = new Uint32Array(digits);\n    this.crypto.getRandomValues(array);\n    array = array.map((x) => validChars.charCodeAt(x % validChars.length));\n    return String.fromCharCode.apply(null, array);\n  }\n\n  randomDigitsNoZeros(digits: number): string {\n    return this.randomChoices([1, 2, 3, 4, 5, 6, 7, 8, 9], digits).join('');\n  }\n\n  randomChoices<T>(array: T[], chooseN: number): T[] {\n    if (array.length <= 1) {\n      throw new LrBadArgumentException('array.length <= 0');\n    }\n    if (chooseN <= 0) {\n      throw new LrBadArgumentException('chooseN <= 0');\n    }\n    const values = new Uint32Array(chooseN);\n    this.crypto.getRandomValues(values);\n    const ret: T[] = [];\n    values.forEach((v) => ret.push(array[v % array.length]));\n    return ret;\n  }\n\n  createSalt(): string {\n    return this.randomString(16);\n  }\n\n  async createKey(): Promise<JWK.Key> {\n    const key = await this.crypto.subtle.generateKey(\n      {\n        name: 'AES-GCM',\n        length: 256, // can be  128, 192, or 256\n      },\n      true, // whether the key is extractable (i.e. can be used in exportKey)\n      ['encrypt', 'decrypt'] // must be [\"encrypt\", \"decrypt\"] or [\"wrapKey\", \"unwrapKey\"]\n    );\n\n    const jwk = await this.crypto.subtle.exportKey('jwk', key);\n\n    // Removing the fields not needed by node-jose\n    delete jwk.ext;\n    delete jwk.key_ops;\n\n    return KeyFactoryService.asKey(jwk);\n  }\n\n  async createSignKey(): Promise<JWK.Key> {\n    const key = await this.crypto.subtle.generateKey(\n      {\n        name: 'HMAC',\n        hash: { name: 'SHA-512' },\n      },\n      true,\n      ['sign', 'verify']\n    );\n\n    const jwk = await this.crypto.subtle.exportKey('jwk', key);\n\n    // Removing the fields not needed by node-jose\n    delete jwk.key_ops;\n    delete jwk.ext;\n\n    return KeyFactoryService.asKey(jwk);\n  }\n\n  async createPkcKey(): Promise<JWK.Key> {\n    // node-jose is not using Forge properly. It should be calling the async version of\n    // pki.rsa.generateKeyPair() with a callback. Instead it calls the sync version. Webcrypto\n    // does not support sync version, so it uses the javascript implementation, which is way too slow.\n    // So we generate using webcrypto and import the key.\n    // Unfortunately Elliptical Curve is not supported by Webcrypto. So we have to settle for RSA.\n    const key = await this.crypto.subtle.generateKey(\n      {\n        name: 'RSA-OAEP',\n        modulusLength: 2048, // can be 1024, 2048, 3072, 4096 ... 16384\n        // As per suggestion: https://developer.mozilla.org/en-US/docs/Web/API/RsaHashedKeyGenParams\n        publicExponent: new Uint8Array([0x01, 0x00, 0x01]),\n        hash: { name: 'SHA-256' }, // can be \"SHA-1\", \"SHA-256\", \"SHA-384\", or \"SHA-512\"\n      },\n      true, // whether the key is extractable (i.e. can be used in exportKey)\n      ['encrypt', 'decrypt'] // must be [\"encrypt\", \"decrypt\"] or [\"wrapKey\", \"unwrapKey\"]\n    );\n\n    const jwk = await this.crypto.subtle.exportKey('jwk', key.privateKey);\n    // Removing the fields not needed by node-jose\n    delete jwk.key_ops;\n    delete jwk.ext;\n\n    return KeyFactoryService.asKey(jwk);\n  }\n\n  async createPkcSignKey(): Promise<JWK.Key> {\n    const key = await this.crypto.subtle.generateKey(\n      {\n        name: 'RSASSA-PKCS1-v1_5',\n        modulusLength: 2048, // can be 1024, 2048, or 4096\n        // As per suggestion: https://developer.mozilla.org/en-US/docs/Web/API/RsaHashedKeyGenParams\n        publicExponent: new Uint8Array([0x01, 0x00, 0x01]),\n        hash: { name: 'SHA-256' }, // can be \"SHA-1\", \"SHA-256\", \"SHA-384\", or \"SHA-512\"\n      },\n      true, // whether the key is extractable (i.e. can be used in exportKey)\n      ['sign', 'verify'] // can be any combination of \"sign\" and \"verify\"\n    );\n\n    const jwk = await this.crypto.subtle.exportKey('jwk', key.privateKey);\n\n    // Removing the fields not needed by node-jose\n    delete jwk.key_ops;\n    delete jwk.ext;\n\n    return KeyFactoryService.asKey(jwk);\n  }\n\n  async deriveKey({\n    password,\n    salt,\n    iterations,\n    kid,\n  }: {\n    password: string;\n    salt: string;\n    iterations: number;\n    kid?: string;\n  }): Promise<DeriveKeyResult> {\n    const enc = new TextEncoder();\n    const rawKey = await this.crypto.subtle.importKey(\n      'raw',\n      enc.encode(password),\n      'PBKDF2',\n      false,\n      ['deriveBits', 'deriveKey']\n    );\n\n    const passKey = await crypto.subtle.deriveKey(\n      {\n        name: 'PBKDF2',\n        salt: new TextEncoder().encode(salt),\n        iterations,\n        hash: 'SHA-256',\n      },\n      rawKey,\n      { name: 'AES-GCM', length: 256 },\n      true,\n      ['encrypt', 'decrypt']\n    );\n\n    const passKeyJson: any = await crypto.subtle.exportKey('jwk', passKey);\n    if (kid) {\n      passKeyJson.kid = kid;\n    }\n\n    const jwk = await KeyFactoryService.asKey(passKeyJson);\n\n    return { jwk };\n  }\n\n  async derivePassIdp(params: DerivePassIdpParams): Promise<DeriveKeyResult> {\n    if (params.iterations < this.MIN_PASS_IDP_PBKDF_ITER) {\n      throw new LrSuspiciousException(\n        `The number of PassIdp key derivation iterations sent from the server (${params.iterations}) is lower than the minimum (${this.MIN_PASS_IDP_PBKDF_ITER})`\n      );\n    }\n    return this.deriveKey(params);\n  }\n\n  async derivePassKey(params: DerivePassKeyParams): Promise<DeriveKeyResult> {\n    if (params.iterations < this.MIN_PASS_KEY_PBKDF_ITER) {\n      throw new LrSuspiciousException(\n        `The number of PassKey key derivation iterations sent from the server(${params.iterations}) is lower than the minimum(${this.MIN_PASS_KEY_PBKDF_ITER})`\n      );\n    }\n    return this.deriveKey(params);\n  }\n\n  async deriveLbopKey(params: DeriveLbopKeyParams): Promise<DeriveKeyResult> {\n    if (params.iterations < this.MIN_LBOP_KEY_PBKDF_ITER) {\n      throw new LrSuspiciousException(\n        `The number of LbopKey key derivation iterations sent from the server(${params.iterations}) is lower than the minimum(${this.MIN_LBOP_KEY_PBKDF_ITER})`\n      );\n    }\n    return this.deriveKey(params);\n  }\n\n  async createKid(): Promise<string> {\n    // todo: AZ: node-jose source uses node's default UUID() function for kid, so just change to use that.\n    // for now, we are just creating a new key to use it's kid.\n    // The kid is a part of the JWK system. LR backend maintains the key hierarchy separately with it's own\n    // key id. But we just use it here as a double check.\n    return (await this.createKey()).kid;\n  }\n\n  async createPassIdpParams(): Promise<PassIdpParams> {\n    return {\n      salt: this.createSalt(),\n      iterations: this.DEFAULT_PASS_IDP_PBKDF_ITER,\n    };\n  }\n\n  async createPassKeyParams(): Promise<PassKeyParams> {\n    return {\n      salt: this.createSalt(),\n      kid: await this.createKid(),\n      iterations: this.DEFAULT_PASS_KEY_PBKDF_ITER,\n    };\n  }\n\n  async createLbopKeyParams(): Promise<LbopKeyParams> {\n    return {\n      salt: this.createSalt(),\n      // todo: AZ: node-jose source uses node's default UUID() function for kid, so just change to use that.\n      // for now, we are just creating a new key to use it's kid.\n      // The kid is a part of the JWK system. LR backend maintains the key hierarchy separately with it's own\n      // key id. But we just use it here as a double check.\n      kid: await this.createKid(),\n      iterations: this.DEFAULT_PASS_KEY_PBKDF_ITER,\n    };\n  }\n}\n"]}
|