@lifeready/core 1.0.1 → 1.0.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/bundles/lifeready-core.umd.js +15939 -0
- package/bundles/lifeready-core.umd.js.map +1 -0
- package/bundles/lifeready-core.umd.min.js +16 -0
- package/bundles/lifeready-core.umd.min.js.map +1 -0
- package/esm2015/lib/_common/ast.js +40 -0
- package/esm2015/lib/_common/deferred-promise.js +24 -0
- package/esm2015/lib/_common/exceptions.js +157 -0
- package/esm2015/lib/_common/queries.gql.js +190 -0
- package/esm2015/lib/_common/run-outside-angular.js +79 -0
- package/esm2015/lib/_common/types.js +1 -0
- package/esm2015/lib/_common/utils.js +44 -0
- package/esm2015/lib/api/contact-card.gql.js +79 -0
- package/esm2015/lib/api/contact-card.service.js +154 -0
- package/esm2015/lib/api/contact-card2.gql.js +60 -0
- package/esm2015/lib/api/contact-card2.service.js +103 -0
- package/esm2015/lib/api/file.service.js +74 -0
- package/esm2015/lib/api/item2.gql.js +110 -0
- package/esm2015/lib/api/item2.service.js +311 -0
- package/esm2015/lib/api/key-exchange.gql.js +188 -0
- package/esm2015/lib/api/key-exchange.service.js +442 -0
- package/esm2015/lib/api/key-exchange.types.js +18 -0
- package/esm2015/lib/api/key-exchange2.gql.js +171 -0
- package/esm2015/lib/api/key-exchange2.service.js +479 -0
- package/esm2015/lib/api/lock.gql.js +40 -0
- package/esm2015/lib/api/lock.service.js +64 -0
- package/esm2015/lib/api/lr-apollo.service.js +46 -0
- package/esm2015/lib/api/lr-graphql/index.js +6 -0
- package/esm2015/lib/api/lr-graphql/lr-graphql.service.js +155 -0
- package/esm2015/lib/api/lr-graphql/lr-merged-mutation.js +213 -0
- package/esm2015/lib/api/lr-graphql/lr-mutation-base.js +51 -0
- package/esm2015/lib/api/lr-graphql/lr-mutation.js +48 -0
- package/esm2015/lib/api/lr-graphql/lr.service.js +18 -0
- package/esm2015/lib/api/message.service.js +138 -0
- package/esm2015/lib/api/persist.service.js +181 -0
- package/esm2015/lib/api/query-processor/common-processors.service.js +93 -0
- package/esm2015/lib/api/query-processor/index.js +3 -0
- package/esm2015/lib/api/query-processor/query-processor.service.js +192 -0
- package/esm2015/lib/api/query-processor/tp-password-reset-processor.service.js +109 -0
- package/esm2015/lib/api/shared-contact-card.service.js +119 -0
- package/esm2015/lib/api/shared-contact-card2.gql.js +41 -0
- package/esm2015/lib/api/shared-contact-card2.service.js +117 -0
- package/esm2015/lib/api/time.service.js +146 -0
- package/esm2015/lib/api/types/graphql.types.js +7 -0
- package/esm2015/lib/api/types/index.js +3 -0
- package/esm2015/lib/api/types/lr-graphql.types.js +71 -0
- package/esm2015/lib/auth/auth.config.js +57 -0
- package/esm2015/lib/auth/auth.gql.js +48 -0
- package/esm2015/lib/auth/auth.types.js +27 -0
- package/esm2015/lib/auth/idle.service.js +168 -0
- package/esm2015/lib/auth/idle.types.js +7 -0
- package/esm2015/lib/auth/lbop.service.js +355 -0
- package/esm2015/lib/auth/life-ready-auth.service.js +500 -0
- package/esm2015/lib/auth/password.service.js +320 -0
- package/esm2015/lib/auth/register.service.js +172 -0
- package/esm2015/lib/auth/two-factor.service.js +74 -0
- package/esm2015/lib/category/category-meta.service.js +99 -0
- package/esm2015/lib/category/category.gql.js +406 -0
- package/esm2015/lib/category/category.service.js +390 -0
- package/esm2015/lib/category/category.types.js +29 -0
- package/esm2015/lib/cryptography/cryptography.types.js +11 -0
- package/esm2015/lib/cryptography/encryption.service.js +189 -0
- package/esm2015/lib/cryptography/key-factory.service.js +237 -0
- package/esm2015/lib/cryptography/key-graph.service.js +280 -0
- package/esm2015/lib/cryptography/key-meta.service.js +200 -0
- package/esm2015/lib/cryptography/key.service.js +124 -0
- package/esm2015/lib/cryptography/slip39.service.js +169 -0
- package/esm2015/lib/cryptography/web-crypto.service.js +29 -0
- package/esm2015/lib/life-ready.config.js +84 -0
- package/esm2015/lib/life-ready.module.js +74 -0
- package/esm2015/lib/plan/plan.gql.js +123 -0
- package/esm2015/lib/plan/plan.service.js +149 -0
- package/esm2015/lib/plan/plan.types.js +11 -0
- package/esm2015/lib/record/record-attachment.service.js +101 -0
- package/esm2015/lib/record/record.gql.js +179 -0
- package/esm2015/lib/record/record.service.js +206 -0
- package/esm2015/lib/record/record.types.js +15 -0
- package/esm2015/lib/record-type/record-type.service.js +75 -0
- package/esm2015/lib/record-type/record-type.types.js +28 -0
- package/esm2015/lib/scenario/approvals/scenario-approval.gql.js +105 -0
- package/esm2015/lib/scenario/approvals/scenario-approval.types.js +1 -0
- package/esm2015/lib/scenario/approvals/scenario-approver.service.js +300 -0
- package/esm2015/lib/scenario/claimants/scenario-claimant.gql.js +52 -0
- package/esm2015/lib/scenario/claimants/scenario-claimant.service.js +97 -0
- package/esm2015/lib/scenario/claimants/scenario-claimant.types.js +1 -0
- package/esm2015/lib/scenario/receivers/scenario-receiver.gql.js +150 -0
- package/esm2015/lib/scenario/receivers/scenario-receiver.service.js +229 -0
- package/esm2015/lib/scenario/receivers/scenario-receiver.types.js +1 -0
- package/esm2015/lib/scenario/scenario-setup.service.js +269 -0
- package/esm2015/lib/scenario/scenario.gql.js +368 -0
- package/esm2015/lib/scenario/scenario.service.js +611 -0
- package/esm2015/lib/scenario/scenario.types.js +64 -0
- package/esm2015/lib/search/search.gql.js +62 -0
- package/esm2015/lib/search/search.service.js +156 -0
- package/esm2015/lib/search/search.types.js +6 -0
- package/esm2015/lib/trusted-parties/tp-password-reset-request.service.js +112 -0
- package/esm2015/lib/trusted-parties/tp-password-reset-user.service.js +129 -0
- package/esm2015/lib/trusted-parties/tp-password-reset.constants.js +4 -0
- package/esm2015/lib/trusted-parties/tp-password-reset.gql.js +232 -0
- package/esm2015/lib/trusted-parties/tp-password-reset.service.js +299 -0
- package/esm2015/lib/trusted-parties/trusted-party.gql.js +148 -0
- package/esm2015/lib/trusted-parties/trusted-party.service.js +326 -0
- package/esm2015/lib/trusted-parties/trusted-party.types.js +41 -0
- package/esm2015/lib/trusted-parties/trusted-party2.gql.js +87 -0
- package/esm2015/lib/trusted-parties/trusted-party2.service.js +215 -0
- package/esm2015/lib/users/profile-details.service.js +214 -0
- package/esm2015/lib/users/profile.gql.js +97 -0
- package/esm2015/lib/users/profile.service.js +169 -0
- package/esm2015/lib/users/profile.types.js +34 -0
- package/esm2015/lib/users/user.gql.js +60 -0
- package/esm2015/lib/users/user.service.js +79 -0
- package/esm2015/lib/users/user.types.js +5 -0
- package/esm2015/lifeready-core.js +10 -0
- package/esm2015/public-api.js +81 -0
- package/fesm2015/lifeready-core.js +13314 -0
- package/fesm2015/lifeready-core.js.map +1 -0
- package/lib/_common/ast.d.ts +11 -0
- package/lib/_common/deferred-promise.d.ts +12 -0
- package/lib/_common/exceptions.d.ts +109 -0
- package/lib/_common/queries.gql.d.ts +10 -0
- package/lib/_common/run-outside-angular.d.ts +14 -0
- package/{src/lib/_common/types.ts → lib/_common/types.d.ts} +3 -6
- package/lib/_common/utils.d.ts +3 -0
- package/lib/api/contact-card.gql.d.ts +7 -0
- package/lib/api/contact-card.service.d.ts +52 -0
- package/lib/api/contact-card2.gql.d.ts +34 -0
- package/lib/api/contact-card2.service.d.ts +49 -0
- package/lib/api/file.service.d.ts +18 -0
- package/lib/api/item2.gql.d.ts +96 -0
- package/lib/api/item2.service.d.ts +177 -0
- package/lib/api/key-exchange.gql.d.ts +9 -0
- package/lib/api/key-exchange.service.d.ts +39 -0
- package/lib/api/key-exchange.types.d.ts +196 -0
- package/lib/api/key-exchange2.gql.d.ts +125 -0
- package/lib/api/key-exchange2.service.d.ts +187 -0
- package/lib/api/lock.gql.d.ts +27 -0
- package/lib/api/lock.service.d.ts +25 -0
- package/lib/api/lr-apollo.service.d.ts +15 -0
- package/lib/api/lr-graphql/lr-graphql.service.d.ts +60 -0
- package/lib/api/lr-graphql/lr-merged-mutation.d.ts +27 -0
- package/lib/api/lr-graphql/lr-mutation-base.d.ts +28 -0
- package/lib/api/lr-graphql/lr-mutation.d.ts +8 -0
- package/lib/api/lr-graphql/lr.service.d.ts +9 -0
- package/lib/api/message.service.d.ts +58 -0
- package/lib/api/persist.service.d.ts +31 -0
- package/lib/api/query-processor/common-processors.service.d.ts +36 -0
- package/lib/api/query-processor/query-processor.service.d.ts +18 -0
- package/lib/api/query-processor/tp-password-reset-processor.service.d.ts +15 -0
- package/lib/api/shared-contact-card.service.d.ts +33 -0
- package/lib/api/shared-contact-card2.gql.d.ts +36 -0
- package/lib/api/shared-contact-card2.service.d.ts +45 -0
- package/lib/api/time.service.d.ts +16 -0
- package/lib/api/types/graphql.types.d.ts +29 -0
- package/lib/api/types/lr-graphql.types.d.ts +385 -0
- package/lib/auth/auth.config.d.ts +5 -0
- package/lib/auth/auth.gql.d.ts +15 -0
- package/lib/auth/auth.types.d.ts +66 -0
- package/lib/auth/idle.service.d.ts +40 -0
- package/lib/auth/idle.types.d.ts +10 -0
- package/lib/auth/lbop.service.d.ts +91 -0
- package/lib/auth/life-ready-auth.service.d.ts +59 -0
- package/lib/auth/password.service.d.ts +78 -0
- package/lib/auth/register.service.d.ts +25 -0
- package/lib/auth/two-factor.service.d.ts +15 -0
- package/lib/category/category-meta.service.d.ts +23 -0
- package/lib/category/category.gql.d.ts +45 -0
- package/lib/category/category.service.d.ts +67 -0
- package/lib/category/category.types.d.ts +79 -0
- package/lib/cryptography/cryptography.types.d.ts +83 -0
- package/lib/cryptography/encryption.service.d.ts +41 -0
- package/lib/cryptography/key-factory.service.d.ts +38 -0
- package/lib/cryptography/key-graph.service.d.ts +33 -0
- package/lib/cryptography/key-meta.service.d.ts +44 -0
- package/lib/cryptography/key.service.d.ts +36 -0
- package/lib/cryptography/slip39.service.d.ts +43 -0
- package/lib/cryptography/web-crypto.service.d.ts +5 -0
- package/lib/life-ready.config.d.ts +14 -0
- package/lib/life-ready.module.d.ts +5 -0
- package/lib/plan/plan.gql.d.ts +11 -0
- package/lib/plan/plan.service.d.ts +33 -0
- package/lib/plan/plan.types.d.ts +31 -0
- package/lib/record/record-attachment.service.d.ts +16 -0
- package/lib/record/record.gql.d.ts +14 -0
- package/lib/record/record.service.d.ts +25 -0
- package/lib/record/record.types.d.ts +57 -0
- package/lib/record-type/record-type.service.d.ts +11 -0
- package/lib/record-type/record-type.types.d.ts +50 -0
- package/lib/scenario/approvals/scenario-approval.gql.d.ts +7 -0
- package/lib/scenario/approvals/scenario-approval.types.d.ts +63 -0
- package/lib/scenario/approvals/scenario-approver.service.d.ts +32 -0
- package/lib/scenario/claimants/scenario-claimant.gql.d.ts +5 -0
- package/lib/scenario/claimants/scenario-claimant.service.d.ts +17 -0
- package/lib/scenario/claimants/scenario-claimant.types.d.ts +18 -0
- package/lib/scenario/receivers/scenario-receiver.gql.d.ts +8 -0
- package/lib/scenario/receivers/scenario-receiver.service.d.ts +30 -0
- package/lib/scenario/receivers/scenario-receiver.types.d.ts +54 -0
- package/lib/scenario/scenario-setup.service.d.ts +22 -0
- package/lib/scenario/scenario.gql.d.ts +34 -0
- package/lib/scenario/scenario.service.d.ts +58 -0
- package/lib/scenario/scenario.types.d.ts +217 -0
- package/lib/search/search.gql.d.ts +1 -0
- package/lib/search/search.service.d.ts +25 -0
- package/lib/search/search.types.d.ts +20 -0
- package/lib/trusted-parties/tp-password-reset-request.service.d.ts +20 -0
- package/lib/trusted-parties/tp-password-reset-user.service.d.ts +35 -0
- package/lib/trusted-parties/tp-password-reset.constants.d.ts +3 -0
- package/lib/trusted-parties/tp-password-reset.gql.d.ts +218 -0
- package/lib/trusted-parties/tp-password-reset.service.d.ts +130 -0
- package/lib/trusted-parties/trusted-party.gql.d.ts +9 -0
- package/lib/trusted-parties/trusted-party.service.d.ts +44 -0
- package/lib/trusted-parties/trusted-party.types.d.ts +102 -0
- package/lib/trusted-parties/trusted-party2.gql.d.ts +79 -0
- package/lib/trusted-parties/trusted-party2.service.d.ts +114 -0
- package/lib/users/profile-details.service.d.ts +21 -0
- package/lib/users/profile.gql.d.ts +11 -0
- package/lib/users/profile.service.d.ts +35 -0
- package/lib/users/profile.types.d.ts +96 -0
- package/lib/users/user.gql.d.ts +9 -0
- package/lib/users/user.service.d.ts +12 -0
- package/lib/users/user.types.d.ts +23 -0
- package/lifeready-core.d.ts +9 -0
- package/lifeready-core.metadata.json +1 -0
- package/package.json +29 -21
- package/{src/public-api.ts → public-api.d.ts} +0 -19
- package/karma.conf.js +0 -32
- package/ng-package.json +0 -26
- package/src/lib/_common/ast.ts +0 -75
- package/src/lib/_common/deferred-promise.ts +0 -35
- package/src/lib/_common/exceptions.ts +0 -189
- package/src/lib/_common/queries.gql.ts +0 -200
- package/src/lib/_common/run-outside-angular.ts +0 -125
- package/src/lib/_common/tests.ts +0 -82
- package/src/lib/_common/utils.ts +0 -57
- package/src/lib/api/api-mutation.spec.ts +0 -547
- package/src/lib/api/api-query.spec.ts +0 -40
- package/src/lib/api/contact-card.gql.ts +0 -85
- package/src/lib/api/contact-card.service.spec.ts +0 -249
- package/src/lib/api/contact-card.service.ts +0 -228
- package/src/lib/api/contact-card2.gql.ts +0 -93
- package/src/lib/api/contact-card2.service.spec.ts +0 -297
- package/src/lib/api/contact-card2.service.ts +0 -139
- package/src/lib/api/file.service.spec.ts +0 -14
- package/src/lib/api/file.service.ts +0 -81
- package/src/lib/api/item2.gql.ts +0 -211
- package/src/lib/api/item2.service.spec.ts +0 -1043
- package/src/lib/api/item2.service.ts +0 -481
- package/src/lib/api/key-exchange.gql.ts +0 -196
- package/src/lib/api/key-exchange.service.spec.ts +0 -470
- package/src/lib/api/key-exchange.service.ts +0 -731
- package/src/lib/api/key-exchange.types.ts +0 -235
- package/src/lib/api/key-exchange2.gql.ts +0 -310
- package/src/lib/api/key-exchange2.service.spec.ts +0 -892
- package/src/lib/api/key-exchange2.service.ts +0 -875
- package/src/lib/api/lock.gql.ts +0 -67
- package/src/lib/api/lock.service.spec.ts +0 -549
- package/src/lib/api/lock.service.ts +0 -57
- package/src/lib/api/lr-apollo.service.spec.ts +0 -27
- package/src/lib/api/lr-apollo.service.ts +0 -43
- package/src/lib/api/lr-graphql/lr-graphql.service.ts +0 -313
- package/src/lib/api/lr-graphql/lr-merged-mutation.ts +0 -377
- package/src/lib/api/lr-graphql/lr-mutation-base.ts +0 -67
- package/src/lib/api/lr-graphql/lr-mutation.ts +0 -74
- package/src/lib/api/lr-graphql/lr.service.ts +0 -28
- package/src/lib/api/message.service.spec.ts +0 -20
- package/src/lib/api/message.service.ts +0 -210
- package/src/lib/api/persist.service.spec.ts +0 -209
- package/src/lib/api/persist.service.ts +0 -220
- package/src/lib/api/query-processor/common-processors.service.ts +0 -148
- package/src/lib/api/query-processor/query-processor.service.ts +0 -240
- package/src/lib/api/query-processor/tp-password-reset-processor.service.ts +0 -177
- package/src/lib/api/shared-contact-card.service.ts +0 -156
- package/src/lib/api/shared-contact-card2.gql.ts +0 -76
- package/src/lib/api/shared-contact-card2.service.ts +0 -154
- package/src/lib/api/time.service.spec.ts +0 -48
- package/src/lib/api/time.service.ts +0 -155
- package/src/lib/api/types/graphql.types.ts +0 -48
- package/src/lib/api/types/lr-graphql.types.ts +0 -467
- package/src/lib/auth/auth.config.ts +0 -83
- package/src/lib/auth/auth.gql.ts +0 -62
- package/src/lib/auth/auth.types.ts +0 -79
- package/src/lib/auth/idle.service.spec.ts +0 -119
- package/src/lib/auth/idle.service.ts +0 -208
- package/src/lib/auth/idle.types.ts +0 -11
- package/src/lib/auth/lbop.service.spec.ts +0 -56
- package/src/lib/auth/lbop.service.ts +0 -539
- package/src/lib/auth/life-ready-auth.service.spec.ts +0 -70
- package/src/lib/auth/life-ready-auth.service.ts +0 -454
- package/src/lib/auth/password.service.spec.ts +0 -51
- package/src/lib/auth/password.service.ts +0 -438
- package/src/lib/auth/register.service.spec.ts +0 -31
- package/src/lib/auth/register.service.ts +0 -181
- package/src/lib/auth/two-factor.service.spec.ts +0 -21
- package/src/lib/auth/two-factor.service.ts +0 -69
- package/src/lib/category/category-meta.service.spec.ts +0 -28
- package/src/lib/category/category-meta.service.ts +0 -125
- package/src/lib/category/category.gql.ts +0 -449
- package/src/lib/category/category.service.spec.ts +0 -26
- package/src/lib/category/category.service.ts +0 -498
- package/src/lib/category/category.types.ts +0 -89
- package/src/lib/cryptography/cryptography.types.ts +0 -108
- package/src/lib/cryptography/encryption.service.spec.ts +0 -125
- package/src/lib/cryptography/encryption.service.ts +0 -243
- package/src/lib/cryptography/key-factory.service.spec.ts +0 -15
- package/src/lib/cryptography/key-factory.service.ts +0 -303
- package/src/lib/cryptography/key-graph.service.spec.ts +0 -16
- package/src/lib/cryptography/key-graph.service.ts +0 -354
- package/src/lib/cryptography/key-meta.service.spec.ts +0 -40
- package/src/lib/cryptography/key-meta.service.ts +0 -254
- package/src/lib/cryptography/key.service.spec.ts +0 -16
- package/src/lib/cryptography/key.service.ts +0 -154
- package/src/lib/cryptography/slip39.service.spec.ts +0 -44
- package/src/lib/cryptography/slip39.service.ts +0 -204
- package/src/lib/cryptography/web-crypto.service.ts +0 -22
- package/src/lib/life-ready.config.ts +0 -127
- package/src/lib/life-ready.module.ts +0 -81
- package/src/lib/plan/plan.gql.ts +0 -133
- package/src/lib/plan/plan.service.spec.ts +0 -294
- package/src/lib/plan/plan.service.ts +0 -198
- package/src/lib/plan/plan.types.ts +0 -37
- package/src/lib/record/record-attachment.service.spec.ts +0 -31
- package/src/lib/record/record-attachment.service.ts +0 -101
- package/src/lib/record/record.gql.ts +0 -192
- package/src/lib/record/record.service.spec.ts +0 -598
- package/src/lib/record/record.service.ts +0 -236
- package/src/lib/record/record.types.ts +0 -86
- package/src/lib/record-type/record-type.service.spec.ts +0 -16
- package/src/lib/record-type/record-type.service.ts +0 -71
- package/src/lib/record-type/record-type.types.ts +0 -58
- package/src/lib/scenario/approvals/scenario-approval.gql.ts +0 -112
- package/src/lib/scenario/approvals/scenario-approval.types.ts +0 -85
- package/src/lib/scenario/approvals/scenario-approver.service.spec.ts +0 -16
- package/src/lib/scenario/approvals/scenario-approver.service.ts +0 -422
- package/src/lib/scenario/claimants/scenario-claimant.gql.ts +0 -56
- package/src/lib/scenario/claimants/scenario-claimant.service.spec.ts +0 -16
- package/src/lib/scenario/claimants/scenario-claimant.service.ts +0 -100
- package/src/lib/scenario/claimants/scenario-claimant.types.ts +0 -21
- package/src/lib/scenario/receivers/scenario-receiver.gql.ts +0 -157
- package/src/lib/scenario/receivers/scenario-receiver.service.spec.ts +0 -16
- package/src/lib/scenario/receivers/scenario-receiver.service.ts +0 -278
- package/src/lib/scenario/receivers/scenario-receiver.types.ts +0 -66
- package/src/lib/scenario/scenario-setup.service.spec.ts +0 -22
- package/src/lib/scenario/scenario-setup.service.ts +0 -369
- package/src/lib/scenario/scenario.gql.ts +0 -404
- package/src/lib/scenario/scenario.service.spec.ts +0 -1586
- package/src/lib/scenario/scenario.service.ts +0 -811
- package/src/lib/scenario/scenario.types.ts +0 -258
- package/src/lib/search/search.gql.ts +0 -62
- package/src/lib/search/search.service.spec.ts +0 -57
- package/src/lib/search/search.service.ts +0 -174
- package/src/lib/search/search.types.ts +0 -24
- package/src/lib/trusted-parties/tp-password-reset-request.service.ts +0 -140
- package/src/lib/trusted-parties/tp-password-reset-user.service.ts +0 -359
- package/src/lib/trusted-parties/tp-password-reset.gql.ts +0 -453
- package/src/lib/trusted-parties/tp-password-reset.service.spec.ts +0 -602
- package/src/lib/trusted-parties/tp-password-reset.service.ts +0 -482
- package/src/lib/trusted-parties/trusted-party.gql.ts +0 -159
- package/src/lib/trusted-parties/trusted-party.service.spec.ts +0 -1008
- package/src/lib/trusted-parties/trusted-party.service.ts +0 -394
- package/src/lib/trusted-parties/trusted-party.types.ts +0 -119
- package/src/lib/trusted-parties/trusted-party2.gql.ts +0 -165
- package/src/lib/trusted-parties/trusted-party2.service.spec.ts +0 -1782
- package/src/lib/trusted-parties/trusted-party2.service.ts +0 -272
- package/src/lib/users/profile-details.service.spec.ts +0 -45
- package/src/lib/users/profile-details.service.ts +0 -278
- package/src/lib/users/profile.gql.ts +0 -108
- package/src/lib/users/profile.service.spec.ts +0 -97
- package/src/lib/users/profile.service.ts +0 -224
- package/src/lib/users/profile.types.ts +0 -101
- package/src/lib/users/user.gql.ts +0 -69
- package/src/lib/users/user.service.spec.ts +0 -161
- package/src/lib/users/user.service.ts +0 -72
- package/src/lib/users/user.types.ts +0 -27
- package/src/test.ts +0 -21
- package/tsconfig.lib.json +0 -21
- package/tsconfig.lib.prod.json +0 -6
- package/tsconfig.spec.json +0 -10
- package/tslint.json +0 -17
- /package/{src/lib/api/lr-graphql/index.ts → lib/api/lr-graphql/index.d.ts} +0 -0
- /package/{src/lib/api/query-processor/index.ts → lib/api/query-processor/index.d.ts} +0 -0
- /package/{src/lib/api/types/index.ts → lib/api/types/index.d.ts} +0 -0
|
@@ -0,0 +1,280 @@
|
|
|
1
|
+
import { __awaiter } from "tslib";
|
|
2
|
+
import { Injectable } from '@angular/core';
|
|
3
|
+
import graphlib, { Graph } from '@dagrejs/graphlib';
|
|
4
|
+
import _ from 'lodash';
|
|
5
|
+
import { LrException, LrEncryptionException, LrNotFoundException, LrBadArgumentException, } from '../_common/exceptions';
|
|
6
|
+
import { EdgeType, NodeType, } from './cryptography.types';
|
|
7
|
+
import { asJwk, EncryptionService, isSymmetricKey, } from './encryption.service';
|
|
8
|
+
import { KeyFactoryService as KFS, } from './key-factory.service';
|
|
9
|
+
import { KeyService } from './key.service';
|
|
10
|
+
import * as i0 from "@angular/core";
|
|
11
|
+
import * as i1 from "./encryption.service";
|
|
12
|
+
import * as i2 from "./key.service";
|
|
13
|
+
export class KeyGraphService {
|
|
14
|
+
// private keyCache: {
|
|
15
|
+
// [id: string]: Key;
|
|
16
|
+
// };
|
|
17
|
+
constructor(encryptionService, keyService) {
|
|
18
|
+
this.encryptionService = encryptionService;
|
|
19
|
+
this.keyService = keyService;
|
|
20
|
+
this.purgeKeys();
|
|
21
|
+
}
|
|
22
|
+
purgeKeys() {
|
|
23
|
+
this.graph = new Graph();
|
|
24
|
+
// this.keyCache = null;
|
|
25
|
+
}
|
|
26
|
+
populateKeys(userKey) {
|
|
27
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
28
|
+
this.keyService.populateKeys({
|
|
29
|
+
passKey: userKey.passKey,
|
|
30
|
+
masterKey: yield this.keyService.loadMasterKey(userKey.masterKey.id),
|
|
31
|
+
rootKey: yield this.unwrapKey(userKey.masterKey.id, userKey.rootKey.id),
|
|
32
|
+
pxk: yield this.unwrapKey(userKey.masterKey.id, userKey.pxk.id),
|
|
33
|
+
sigPxk: yield this.unwrapKey(userKey.masterKey.id, userKey.sigPxk.id),
|
|
34
|
+
});
|
|
35
|
+
});
|
|
36
|
+
}
|
|
37
|
+
hasKey(keyId) {
|
|
38
|
+
return !!this.graph.node(keyId);
|
|
39
|
+
}
|
|
40
|
+
getNode(id, type) {
|
|
41
|
+
const node = this.graph.node(id);
|
|
42
|
+
if (!node) {
|
|
43
|
+
throw new LrNotFoundException(`Key graphs does not contain key id: ${id}`);
|
|
44
|
+
}
|
|
45
|
+
if (node.type !== type) {
|
|
46
|
+
throw new LrException({
|
|
47
|
+
message: `Key with id ${id} is not of type ${type}`,
|
|
48
|
+
});
|
|
49
|
+
}
|
|
50
|
+
return node.data;
|
|
51
|
+
}
|
|
52
|
+
key(id) {
|
|
53
|
+
return this.getNode(id, NodeType.Key);
|
|
54
|
+
}
|
|
55
|
+
passKey(id) {
|
|
56
|
+
return this.getNode(id, NodeType.PassKey);
|
|
57
|
+
}
|
|
58
|
+
addKeys(src) {
|
|
59
|
+
// Keys
|
|
60
|
+
if (src.keys) {
|
|
61
|
+
// What key graph returns can not be customized. So keys are essentially immutable.
|
|
62
|
+
// Therefore, if a key exists, there's no reason to update it.
|
|
63
|
+
for (const key of src.keys) {
|
|
64
|
+
// Note using Relay global id allows us to not worry about clashing node id
|
|
65
|
+
if (this.graph.hasNode(key.id)) {
|
|
66
|
+
continue;
|
|
67
|
+
}
|
|
68
|
+
const node = {
|
|
69
|
+
type: NodeType.Key,
|
|
70
|
+
data: _.cloneDeep(key),
|
|
71
|
+
};
|
|
72
|
+
this.graph.setNode(key.id, node);
|
|
73
|
+
}
|
|
74
|
+
}
|
|
75
|
+
// KeyLinks
|
|
76
|
+
if (src.keyLinks) {
|
|
77
|
+
for (const keyLink of src.keyLinks) {
|
|
78
|
+
if (this.graph.hasEdge(keyLink.wrappingKeyId, keyLink.keyId)) {
|
|
79
|
+
continue;
|
|
80
|
+
}
|
|
81
|
+
const edge = {
|
|
82
|
+
type: EdgeType.KeyLink,
|
|
83
|
+
data: _.cloneDeep(keyLink),
|
|
84
|
+
};
|
|
85
|
+
// Edge goes from wrapping key to wrapped key.
|
|
86
|
+
this.graph.setEdge(keyLink.wrappingKeyId, keyLink.keyId, edge);
|
|
87
|
+
}
|
|
88
|
+
}
|
|
89
|
+
// PassKeyLinks
|
|
90
|
+
if (src.passKeyLinks) {
|
|
91
|
+
for (const passKeyLink of src.passKeyLinks) {
|
|
92
|
+
if (this.graph.hasEdge(passKeyLink.passKeyId, passKeyLink.keyId)) {
|
|
93
|
+
continue;
|
|
94
|
+
}
|
|
95
|
+
const edge = {
|
|
96
|
+
type: EdgeType.PassKeyLink,
|
|
97
|
+
data: _.cloneDeep(passKeyLink),
|
|
98
|
+
};
|
|
99
|
+
// Edge goes from wrapping key to wrapped key.
|
|
100
|
+
this.graph.setEdge(passKeyLink.passKeyId, passKeyLink.keyId, edge);
|
|
101
|
+
}
|
|
102
|
+
}
|
|
103
|
+
// The graph is the single source of truth. These are lazily calculated.
|
|
104
|
+
// this.keyCache = null;
|
|
105
|
+
}
|
|
106
|
+
tracePath(distances, keyId) {
|
|
107
|
+
// The node label is the same as the id of the key nodes.
|
|
108
|
+
const ret = [];
|
|
109
|
+
let node = keyId;
|
|
110
|
+
if (!distances[node].predecessor) {
|
|
111
|
+
return null;
|
|
112
|
+
}
|
|
113
|
+
while (distances[node].predecessor) {
|
|
114
|
+
const child = distances[node].predecessor;
|
|
115
|
+
ret.push(this.graph.edge(child, node));
|
|
116
|
+
node = child;
|
|
117
|
+
}
|
|
118
|
+
// After reverse, the first element is the passkey
|
|
119
|
+
ret.reverse();
|
|
120
|
+
return ret;
|
|
121
|
+
}
|
|
122
|
+
getPath(knownKeyId, keyId) {
|
|
123
|
+
if (!knownKeyId || typeof knownKeyId !== 'string') {
|
|
124
|
+
throw new LrEncryptionException(`Param knownKeyId wrong format: ${knownKeyId}`);
|
|
125
|
+
}
|
|
126
|
+
if (!keyId || typeof keyId !== 'string') {
|
|
127
|
+
throw new LrEncryptionException(`Param keyId wrong format: ${keyId}`);
|
|
128
|
+
}
|
|
129
|
+
// => { A: { distance: 0 },
|
|
130
|
+
// B: { distance: 6, predecessor: 'C' },
|
|
131
|
+
// C: { distance: 4, predecessor: 'A' },
|
|
132
|
+
// D: { distance: 2, predecessor: 'A' },
|
|
133
|
+
// E: { distance: 8, predecessor: 'F' },
|
|
134
|
+
// F: { distance: 4, predecessor: 'D' } }
|
|
135
|
+
const distances = graphlib.alg.dijkstra(this.graph, knownKeyId);
|
|
136
|
+
// Trace path from keyId to knownKeyId
|
|
137
|
+
return this.tracePath(distances, keyId);
|
|
138
|
+
}
|
|
139
|
+
getJwkKey(keyOrId, getKeyIdCallback) {
|
|
140
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
141
|
+
return (yield this.getKey(keyOrId, getKeyIdCallback)).jwk;
|
|
142
|
+
});
|
|
143
|
+
}
|
|
144
|
+
// We assume that when a keyId is fetched, the key graph
|
|
145
|
+
// for the key is also returned and merged into the client-side
|
|
146
|
+
// key graph. By insisting a keyId is returned instead of the
|
|
147
|
+
// actual key we ensure key-graph is consistent.
|
|
148
|
+
getKey(keyOrId, getKeyIdCallback) {
|
|
149
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
150
|
+
let keyId = typeof keyOrId === 'string' ? keyOrId : keyOrId === null || keyOrId === void 0 ? void 0 : keyOrId.id;
|
|
151
|
+
if (!this.hasKey(keyId) && getKeyIdCallback) {
|
|
152
|
+
keyId = yield getKeyIdCallback();
|
|
153
|
+
}
|
|
154
|
+
// else, continue and let it fail.
|
|
155
|
+
const key = this.key(keyId);
|
|
156
|
+
if (key.jwk) {
|
|
157
|
+
return key;
|
|
158
|
+
}
|
|
159
|
+
else {
|
|
160
|
+
return this.unwrapKey(this.keyService.getCurrentMasterKey().id, keyId);
|
|
161
|
+
}
|
|
162
|
+
});
|
|
163
|
+
}
|
|
164
|
+
_unwrapLink(wrappingKey, link, dstKey) {
|
|
165
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
166
|
+
// console.log("_unwrapLink:", link.data.keyId);
|
|
167
|
+
const wrappedKey = JSON.parse(link.data.wrappedKey);
|
|
168
|
+
// Signatures of keys contain the key itself. This way we only need
|
|
169
|
+
// to access the KeyLinks to decrypt/verify keys.
|
|
170
|
+
let nextRawKey;
|
|
171
|
+
if (wrappedKey.signatures) {
|
|
172
|
+
nextRawKey = yield this.encryptionService.verify(wrappingKey, wrappedKey);
|
|
173
|
+
}
|
|
174
|
+
else {
|
|
175
|
+
nextRawKey = yield this.encryptionService.decrypt(wrappingKey, wrappedKey);
|
|
176
|
+
}
|
|
177
|
+
dstKey.jwk = yield KFS.asKey(nextRawKey);
|
|
178
|
+
dstKey.task = null;
|
|
179
|
+
});
|
|
180
|
+
}
|
|
181
|
+
_unwrap(key, path) {
|
|
182
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
183
|
+
for (const link of path) {
|
|
184
|
+
const dstKey = this.key(link.data.keyId);
|
|
185
|
+
// console.log("key: ", link.data.keyId);
|
|
186
|
+
if (dstKey.jwk) {
|
|
187
|
+
key = dstKey.jwk;
|
|
188
|
+
// console.log("Returning cached key: ", link.data.keyId);
|
|
189
|
+
continue;
|
|
190
|
+
}
|
|
191
|
+
if (!dstKey.task) {
|
|
192
|
+
dstKey.task = this._unwrapLink(key, link, dstKey);
|
|
193
|
+
}
|
|
194
|
+
yield dstKey.task;
|
|
195
|
+
key = dstKey.jwk;
|
|
196
|
+
}
|
|
197
|
+
return key;
|
|
198
|
+
});
|
|
199
|
+
}
|
|
200
|
+
unwrapWithPassKey(passKeyId, passKey, keyId) {
|
|
201
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
202
|
+
// Get path of the directory key.
|
|
203
|
+
const path = this.getPath(passKeyId, keyId);
|
|
204
|
+
return {
|
|
205
|
+
id: keyId,
|
|
206
|
+
jwk: yield this._unwrap(passKey, path),
|
|
207
|
+
};
|
|
208
|
+
});
|
|
209
|
+
}
|
|
210
|
+
unwrapKey(masterKeyId, keyId) {
|
|
211
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
212
|
+
// The first key should be a masterKey
|
|
213
|
+
const masterKey = yield this.keyService.loadMasterKey(masterKeyId);
|
|
214
|
+
if (masterKeyId === keyId) {
|
|
215
|
+
return masterKey;
|
|
216
|
+
}
|
|
217
|
+
// Get path of the directory key.
|
|
218
|
+
const path = this.getPath(masterKey.id, keyId);
|
|
219
|
+
return {
|
|
220
|
+
id: keyId,
|
|
221
|
+
jwk: yield this._unwrap(masterKey.jwk, path),
|
|
222
|
+
};
|
|
223
|
+
});
|
|
224
|
+
}
|
|
225
|
+
decryptFromString(keyOrId, cipherData, options) {
|
|
226
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
227
|
+
if (cipherData) {
|
|
228
|
+
const key = yield this.getJwkKey(keyOrId);
|
|
229
|
+
return (yield this.encryptionService.decrypt(key, JSON.parse(cipherData), options));
|
|
230
|
+
}
|
|
231
|
+
return null;
|
|
232
|
+
});
|
|
233
|
+
}
|
|
234
|
+
decryptFile(keyId, file) {
|
|
235
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
236
|
+
const key = yield this.getJwkKey(keyId);
|
|
237
|
+
return (yield this.encryptionService.decrypt(key, file, {
|
|
238
|
+
payloadType: 'ArrayBuffer',
|
|
239
|
+
}));
|
|
240
|
+
});
|
|
241
|
+
}
|
|
242
|
+
// TODO rename this to encrypt() and use as the most common usecase
|
|
243
|
+
encryptToString(key, content) {
|
|
244
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
245
|
+
// Empty string should be encrypted since you want to clear the field.
|
|
246
|
+
// Null is not encrypted because it's not valid JSON in the old JSON spec. Use
|
|
247
|
+
// empty string instead. It'll function as a logic false as well.
|
|
248
|
+
// Note that passing in empty string means it'll be encrypted which verifies
|
|
249
|
+
// it's integrity. But we still want to have a way to set the DB field
|
|
250
|
+
// to NULL, so we explicitly return null when content == null. A null
|
|
251
|
+
// variable in graphql mutation on KC server clears the field to NULL.
|
|
252
|
+
if (content == null) {
|
|
253
|
+
return null;
|
|
254
|
+
}
|
|
255
|
+
const jwk = asJwk(key) || (yield this.getJwkKey(key));
|
|
256
|
+
return this.encryptionService.encryptToString(jwk, content);
|
|
257
|
+
});
|
|
258
|
+
}
|
|
259
|
+
// Wraps a symmetric encryption key.
|
|
260
|
+
// Throws exception if wrapping public keys.
|
|
261
|
+
wrapKey(wrappingKey, key) {
|
|
262
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
263
|
+
if (!isSymmetricKey(key)) {
|
|
264
|
+
throw new LrBadArgumentException('Only allowing wrapping of symmetric keys.');
|
|
265
|
+
}
|
|
266
|
+
return this.encryptToString(wrappingKey, key.toJSON(true));
|
|
267
|
+
});
|
|
268
|
+
}
|
|
269
|
+
}
|
|
270
|
+
KeyGraphService.ɵprov = i0.ɵɵdefineInjectable({ factory: function KeyGraphService_Factory() { return new KeyGraphService(i0.ɵɵinject(i1.EncryptionService), i0.ɵɵinject(i2.KeyService)); }, token: KeyGraphService, providedIn: "root" });
|
|
271
|
+
KeyGraphService.decorators = [
|
|
272
|
+
{ type: Injectable, args: [{
|
|
273
|
+
providedIn: 'root',
|
|
274
|
+
},] }
|
|
275
|
+
];
|
|
276
|
+
KeyGraphService.ctorParameters = () => [
|
|
277
|
+
{ type: EncryptionService },
|
|
278
|
+
{ type: KeyService }
|
|
279
|
+
];
|
|
280
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"key-graph.service.js","sourceRoot":"C:/Projects/newrepo/kc-client/projects/core/src/","sources":["lib/cryptography/key-graph.service.ts"],"names":[],"mappings":";AAAA,OAAO,EAAE,UAAU,EAAE,MAAM,eAAe,CAAC;AAC3C,OAAO,QAAQ,EAAE,EAAE,KAAK,EAAE,MAAM,mBAAmB,CAAC;AACpD,OAAO,CAAC,MAAM,QAAQ,CAAC;AAGvB,OAAO,EACL,WAAW,EACX,qBAAqB,EACrB,mBAAmB,EACnB,sBAAsB,GACvB,MAAM,uBAAuB,CAAC;AAC/B,OAAO,EAEL,QAAQ,EAIR,QAAQ,GAET,MAAM,sBAAsB,CAAC;AAC9B,OAAO,EACL,KAAK,EAEL,iBAAiB,EACjB,cAAc,GACf,MAAM,sBAAsB,CAAC;AAC9B,OAAO,EAEL,iBAAiB,IAAI,GAAG,GACzB,MAAM,uBAAuB,CAAC;AAC/B,OAAO,EAAE,UAAU,EAAE,MAAM,eAAe,CAAC;;;;AAS3C,MAAM,OAAO,eAAe;IAE1B,sBAAsB;IACtB,uBAAuB;IACvB,KAAK;IAEL,YACU,iBAAoC,EACpC,UAAsB;QADtB,sBAAiB,GAAjB,iBAAiB,CAAmB;QACpC,eAAU,GAAV,UAAU,CAAY;QAE9B,IAAI,CAAC,SAAS,EAAE,CAAC;IACnB,CAAC;IAED,SAAS;QACP,IAAI,CAAC,KAAK,GAAG,IAAI,KAAK,EAAE,CAAC;QACzB,wBAAwB;IAC1B,CAAC;IAEK,YAAY,CAAC,OAAuB;;YACxC,IAAI,CAAC,UAAU,CAAC,YAAY,CAAC;gBAC3B,OAAO,EAAE,OAAO,CAAC,OAAO;gBACxB,SAAS,EAAE,MAAM,IAAI,CAAC,UAAU,CAAC,aAAa,CAAC,OAAO,CAAC,SAAS,CAAC,EAAE,CAAC;gBACpE,OAAO,EAAE,MAAM,IAAI,CAAC,SAAS,CAAC,OAAO,CAAC,SAAS,CAAC,EAAE,EAAE,OAAO,CAAC,OAAO,CAAC,EAAE,CAAC;gBACvE,GAAG,EAAE,MAAM,IAAI,CAAC,SAAS,CAAC,OAAO,CAAC,SAAS,CAAC,EAAE,EAAE,OAAO,CAAC,GAAG,CAAC,EAAE,CAAC;gBAC/D,MAAM,EAAE,MAAM,IAAI,CAAC,SAAS,CAAC,OAAO,CAAC,SAAS,CAAC,EAAE,EAAE,OAAO,CAAC,MAAM,CAAC,EAAE,CAAC;aACtE,CAAC,CAAC;QACL,CAAC;KAAA;IAED,MAAM,CAAC,KAAa;QAClB,OAAO,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC;IAClC,CAAC;IAEO,OAAO,CAAC,EAAE,EAAE,IAAI;QACtB,MAAM,IAAI,GAAG,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC;QACjC,IAAI,CAAC,IAAI,EAAE;YACT,MAAM,IAAI,mBAAmB,CAC3B,uCAAuC,EAAE,EAAE,CAC5C,CAAC;SACH;QACD,IAAI,IAAI,CAAC,IAAI,KAAK,IAAI,EAAE;YACtB,MAAM,IAAI,WAAW,CAAC;gBACpB,OAAO,EAAE,eAAe,EAAE,mBAAmB,IAAI,EAAE;aACpD,CAAC,CAAC;SACJ;QACD,OAAO,IAAI,CAAC,IAAI,CAAC;IACnB,CAAC;IAED,GAAG,CAAC,EAAE;QACJ,OAAO,IAAI,CAAC,OAAO,CAAC,EAAE,EAAE,QAAQ,CAAC,GAAG,CAAC,CAAC;IACxC,CAAC;IAED,OAAO,CAAC,EAAE;QACR,OAAO,IAAI,CAAC,OAAO,CAAC,EAAE,EAAE,QAAQ,CAAC,OAAO,CAAC,CAAC;IAC5C,CAAC;IAED,OAAO,CAAC,GAAqB;QAC3B,OAAO;QACP,IAAI,GAAG,CAAC,IAAI,EAAE;YACZ,mFAAmF;YACnF,8DAA8D;YAC9D,KAAK,MAAM,GAAG,IAAI,GAAG,CAAC,IAAI,EAAE;gBAC1B,2EAA2E;gBAC3E,IAAI,IAAI,CAAC,KAAK,CAAC,OAAO,CAAC,GAAG,CAAC,EAAE,CAAC,EAAE;oBAC9B,SAAS;iBACV;gBAED,MAAM,IAAI,GAAS;oBACjB,IAAI,EAAE,QAAQ,CAAC,GAAG;oBAClB,IAAI,EAAE,CAAC,CAAC,SAAS,CAAC,GAAG,CAAC;iBACvB,CAAC;gBAEF,IAAI,CAAC,KAAK,CAAC,OAAO,CAAC,GAAG,CAAC,EAAE,EAAE,IAAI,CAAC,CAAC;aAClC;SACF;QAED,WAAW;QACX,IAAI,GAAG,CAAC,QAAQ,EAAE;YAChB,KAAK,MAAM,OAAO,IAAI,GAAG,CAAC,QAAQ,EAAE;gBAClC,IAAI,IAAI,CAAC,KAAK,CAAC,OAAO,CAAC,OAAO,CAAC,aAAa,EAAE,OAAO,CAAC,KAAK,CAAC,EAAE;oBAC5D,SAAS;iBACV;gBAED,MAAM,IAAI,GAAS;oBACjB,IAAI,EAAE,QAAQ,CAAC,OAAO;oBACtB,IAAI,EAAE,CAAC,CAAC,SAAS,CAAC,OAAO,CAAC;iBAC3B,CAAC;gBACF,8CAA8C;gBAC9C,IAAI,CAAC,KAAK,CAAC,OAAO,CAAC,OAAO,CAAC,aAAa,EAAE,OAAO,CAAC,KAAK,EAAE,IAAI,CAAC,CAAC;aAChE;SACF;QAED,eAAe;QACf,IAAI,GAAG,CAAC,YAAY,EAAE;YACpB,KAAK,MAAM,WAAW,IAAI,GAAG,CAAC,YAAY,EAAE;gBAC1C,IAAI,IAAI,CAAC,KAAK,CAAC,OAAO,CAAC,WAAW,CAAC,SAAS,EAAE,WAAW,CAAC,KAAK,CAAC,EAAE;oBAChE,SAAS;iBACV;gBAED,MAAM,IAAI,GAAS;oBACjB,IAAI,EAAE,QAAQ,CAAC,WAAW;oBAC1B,IAAI,EAAE,CAAC,CAAC,SAAS,CAAC,WAAW,CAAC;iBAC/B,CAAC;gBACF,8CAA8C;gBAC9C,IAAI,CAAC,KAAK,CAAC,OAAO,CAAC,WAAW,CAAC,SAAS,EAAE,WAAW,CAAC,KAAK,EAAE,IAAI,CAAC,CAAC;aACpE;SACF;QAED,wEAAwE;QACxE,wBAAwB;IAC1B,CAAC;IAED,SAAS,CAAC,SAAS,EAAE,KAAa;QAChC,yDAAyD;QACzD,MAAM,GAAG,GAAW,EAAE,CAAC;QACvB,IAAI,IAAI,GAAG,KAAK,CAAC;QACjB,IAAI,CAAC,SAAS,CAAC,IAAI,CAAC,CAAC,WAAW,EAAE;YAChC,OAAO,IAAI,CAAC;SACb;QAED,OAAO,SAAS,CAAC,IAAI,CAAC,CAAC,WAAW,EAAE;YAClC,MAAM,KAAK,GAAG,SAAS,CAAC,IAAI,CAAC,CAAC,WAAW,CAAC;YAC1C,GAAG,CAAC,IAAI,CAAC,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,KAAK,EAAE,IAAI,CAAC,CAAC,CAAC;YACvC,IAAI,GAAG,KAAK,CAAC;SACd;QAED,kDAAkD;QAClD,GAAG,CAAC,OAAO,EAAE,CAAC;QAEd,OAAO,GAAG,CAAC;IACb,CAAC;IAED,OAAO,CAAC,UAAkB,EAAE,KAAa;QACvC,IAAI,CAAC,UAAU,IAAI,OAAO,UAAU,KAAK,QAAQ,EAAE;YACjD,MAAM,IAAI,qBAAqB,CAC7B,kCAAkC,UAAU,EAAE,CAC/C,CAAC;SACH;QACD,IAAI,CAAC,KAAK,IAAI,OAAO,KAAK,KAAK,QAAQ,EAAE;YACvC,MAAM,IAAI,qBAAqB,CAAC,6BAA6B,KAAK,EAAE,CAAC,CAAC;SACvE;QAED,2BAA2B;QAC3B,6CAA6C;QAC7C,6CAA6C;QAC7C,6CAA6C;QAC7C,6CAA6C;QAC7C,8CAA8C;QAC9C,MAAM,SAAS,GAAG,QAAQ,CAAC,GAAG,CAAC,QAAQ,CAAC,IAAI,CAAC,KAAK,EAAE,UAAU,CAAC,CAAC;QAEhE,sCAAsC;QACtC,OAAO,IAAI,CAAC,SAAS,CAAC,SAAS,EAAE,KAAK,CAAC,CAAC;IAC1C,CAAC;IAEK,SAAS,CACb,OAAqB,EACrB,gBAAiD;;YAEjD,OAAO,CAAC,MAAM,IAAI,CAAC,MAAM,CAAC,OAAO,EAAE,gBAAgB,CAAC,CAAC,CAAC,GAAG,CAAC;QAC5D,CAAC;KAAA;IAED,wDAAwD;IACxD,+DAA+D;IAC/D,6DAA6D;IAC7D,gDAAgD;IAC1C,MAAM,CACV,OAAqB,EACrB,gBAAiD;;YAEjD,IAAI,KAAK,GAAG,OAAO,OAAO,KAAK,QAAQ,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,OAAO,aAAP,OAAO,uBAAP,OAAO,CAAE,EAAE,CAAC;YAEhE,IAAI,CAAC,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,IAAI,gBAAgB,EAAE;gBAC3C,KAAK,GAAG,MAAM,gBAAgB,EAAE,CAAC;aAClC;YACD,kCAAkC;YAElC,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,CAAC,KAAK,CAAC,CAAC;YAC5B,IAAI,GAAG,CAAC,GAAG,EAAE;gBACX,OAAO,GAAG,CAAC;aACZ;iBAAM;gBACL,OAAO,IAAI,CAAC,SAAS,CAAC,IAAI,CAAC,UAAU,CAAC,mBAAmB,EAAE,CAAC,EAAE,EAAE,KAAK,CAAC,CAAC;aACxE;QACH,CAAC;KAAA;IAEa,WAAW,CAAC,WAAW,EAAE,IAAI,EAAE,MAAM;;YACjD,gDAAgD;YAChD,MAAM,UAAU,GAAG,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC;YACpD,mEAAmE;YACnE,iDAAiD;YACjD,IAAI,UAAU,CAAC;YACf,IAAI,UAAU,CAAC,UAAU,EAAE;gBACzB,UAAU,GAAG,MAAM,IAAI,CAAC,iBAAiB,CAAC,MAAM,CAAC,WAAW,EAAE,UAAU,CAAC,CAAC;aAC3E;iBAAM;gBACL,UAAU,GAAG,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAC/C,WAAW,EACX,UAAU,CACX,CAAC;aACH;YACD,MAAM,CAAC,GAAG,GAAG,MAAM,GAAG,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC;YACzC,MAAM,CAAC,IAAI,GAAG,IAAI,CAAC;QACrB,CAAC;KAAA;IAEa,OAAO,CAAC,GAAY,EAAE,IAAY;;YAC9C,KAAK,MAAM,IAAI,IAAI,IAAI,EAAE;gBACvB,MAAM,MAAM,GAAG,IAAI,CAAC,GAAG,CAAC,IAAI,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC;gBACzC,yCAAyC;gBACzC,IAAI,MAAM,CAAC,GAAG,EAAE;oBACd,GAAG,GAAG,MAAM,CAAC,GAAG,CAAC;oBACjB,0DAA0D;oBAC1D,SAAS;iBACV;gBAED,IAAI,CAAC,MAAM,CAAC,IAAI,EAAE;oBAChB,MAAM,CAAC,IAAI,GAAG,IAAI,CAAC,WAAW,CAAC,GAAG,EAAE,IAAI,EAAE,MAAM,CAAC,CAAC;iBACnD;gBAED,MAAM,MAAM,CAAC,IAAI,CAAC;gBAClB,GAAG,GAAG,MAAM,CAAC,GAAG,CAAC;aAClB;YAED,OAAO,GAAG,CAAC;QACb,CAAC;KAAA;IAEY,iBAAiB,CAC5B,SAAiB,EACjB,OAAgB,EAChB,KAAa;;YAEb,iCAAiC;YACjC,MAAM,IAAI,GAAG,IAAI,CAAC,OAAO,CAAC,SAAS,EAAE,KAAK,CAAC,CAAC;YAE5C,OAAO;gBACL,EAAE,EAAE,KAAK;gBACT,GAAG,EAAE,MAAM,IAAI,CAAC,OAAO,CAAC,OAAO,EAAE,IAAI,CAAC;aACvC,CAAC;QACJ,CAAC;KAAA;IAEK,SAAS,CAAC,WAAmB,EAAE,KAAa;;YAChD,sCAAsC;YACtC,MAAM,SAAS,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,aAAa,CAAC,WAAW,CAAC,CAAC;YAEnE,IAAI,WAAW,KAAK,KAAK,EAAE;gBACzB,OAAO,SAAS,CAAC;aAClB;YAED,iCAAiC;YACjC,MAAM,IAAI,GAAG,IAAI,CAAC,OAAO,CAAC,SAAS,CAAC,EAAE,EAAE,KAAK,CAAC,CAAC;YAE/C,OAAO;gBACL,EAAE,EAAE,KAAK;gBACT,GAAG,EAAE,MAAM,IAAI,CAAC,OAAO,CAAC,SAAS,CAAC,GAAG,EAAE,IAAI,CAAC;aAC7C,CAAC;QACJ,CAAC;KAAA;IAEK,iBAAiB,CACrB,OAAqB,EACrB,UAAkB,EAClB,OAAwB;;YAExB,IAAI,UAAU,EAAE;gBACd,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,SAAS,CAAC,OAAO,CAAC,CAAC;gBAC1C,OAAO,CAAC,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAC1C,GAAG,EACH,IAAI,CAAC,KAAK,CAAC,UAAU,CAAC,EACtB,OAAO,CACR,CAAQ,CAAC;aACX;YACD,OAAO,IAAI,CAAC;QACd,CAAC;KAAA;IAEK,WAAW,CAAC,KAAa,EAAE,IAAS;;YACxC,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,SAAS,CAAC,KAAK,CAAC,CAAC;YACxC,OAAO,CAAC,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAAC,GAAG,EAAE,IAAI,EAAE;gBACtD,WAAW,EAAE,aAAa;aAC3B,CAAC,CAAQ,CAAC;QACb,CAAC;KAAA;IAED,mEAAmE;IAC7D,eAAe,CACnB,GAA2B,EAC3B,OAAY;;YAEZ,sEAAsE;YACtE,8EAA8E;YAC9E,iEAAiE;YACjE,4EAA4E;YAC5E,sEAAsE;YACtE,qEAAqE;YACrE,sEAAsE;YACtE,IAAI,OAAO,IAAI,IAAI,EAAE;gBACnB,OAAO,IAAI,CAAC;aACb;YAED,MAAM,GAAG,GAAG,KAAK,CAAC,GAAG,CAAC,IAAI,CAAC,MAAM,IAAI,CAAC,SAAS,CAAC,GAAmB,CAAC,CAAC,CAAC;YACtE,OAAO,IAAI,CAAC,iBAAiB,CAAC,eAAe,CAAC,GAAG,EAAE,OAAO,CAAC,CAAC;QAC9D,CAAC;KAAA;IAED,oCAAoC;IACpC,4CAA4C;IACtC,OAAO,CACX,WAAmC,EACnC,GAAY;;YAEZ,IAAI,CAAC,cAAc,CAAC,GAAG,CAAC,EAAE;gBACxB,MAAM,IAAI,sBAAsB,CAC9B,2CAA2C,CAC5C,CAAC;aACH;YAED,OAAO,IAAI,CAAC,eAAe,CAAC,WAAW,EAAE,GAAG,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC;QAC7D,CAAC;KAAA;;;;YAxTF,UAAU,SAAC;gBACV,UAAU,EAAE,MAAM;aACnB;;;YAfC,iBAAiB;YAOV,UAAU","sourcesContent":["import { Injectable } from '@angular/core';\r\nimport graphlib, { Graph } from '@dagrejs/graphlib';\r\nimport _ from 'lodash';\r\nimport { JWK } from 'node-jose';\r\nimport { CurrentUserKey } from '../users/profile.types';\r\nimport {\r\n  LrException,\r\n  LrEncryptionException,\r\n  LrNotFoundException,\r\n  LrBadArgumentException,\r\n} from '../_common/exceptions';\r\nimport {\r\n  Edge,\r\n  EdgeType,\r\n  Key,\r\n  KeyGraphResponse,\r\n  Node,\r\n  NodeType,\r\n  PassKey,\r\n} from './cryptography.types';\r\nimport {\r\n  asJwk,\r\n  DecryptOptions,\r\n  EncryptionService,\r\n  isSymmetricKey,\r\n} from './encryption.service';\r\nimport {\r\n  KeyFactoryService,\r\n  KeyFactoryService as KFS,\r\n} from './key-factory.service';\r\nimport { KeyService } from './key.service';\r\n\r\nexport interface GraphKey extends Key {\r\n  task?: Promise<any>;\r\n}\r\n\r\n@Injectable({\r\n  providedIn: 'root',\r\n})\r\nexport class KeyGraphService {\r\n  private graph: Graph;\r\n  // private keyCache: {\r\n  //   [id: string]: Key;\r\n  // };\r\n\r\n  constructor(\r\n    private encryptionService: EncryptionService,\r\n    private keyService: KeyService\r\n  ) {\r\n    this.purgeKeys();\r\n  }\r\n\r\n  purgeKeys() {\r\n    this.graph = new Graph();\r\n    // this.keyCache = null;\r\n  }\r\n\r\n  async populateKeys(userKey: CurrentUserKey) {\r\n    this.keyService.populateKeys({\r\n      passKey: userKey.passKey,\r\n      masterKey: await this.keyService.loadMasterKey(userKey.masterKey.id),\r\n      rootKey: await this.unwrapKey(userKey.masterKey.id, userKey.rootKey.id),\r\n      pxk: await this.unwrapKey(userKey.masterKey.id, userKey.pxk.id),\r\n      sigPxk: await this.unwrapKey(userKey.masterKey.id, userKey.sigPxk.id),\r\n    });\r\n  }\r\n\r\n  hasKey(keyId: string) {\r\n    return !!this.graph.node(keyId);\r\n  }\r\n\r\n  private getNode(id, type): GraphKey | PassKey {\r\n    const node = this.graph.node(id);\r\n    if (!node) {\r\n      throw new LrNotFoundException(\r\n        `Key graphs does not contain key id: ${id}`\r\n      );\r\n    }\r\n    if (node.type !== type) {\r\n      throw new LrException({\r\n        message: `Key with id ${id} is not of type ${type}`,\r\n      });\r\n    }\r\n    return node.data;\r\n  }\r\n\r\n  key(id): GraphKey {\r\n    return this.getNode(id, NodeType.Key);\r\n  }\r\n\r\n  passKey(id): PassKey {\r\n    return this.getNode(id, NodeType.PassKey);\r\n  }\r\n\r\n  addKeys(src: KeyGraphResponse) {\r\n    // Keys\r\n    if (src.keys) {\r\n      // What key graph returns can not be customized. So keys are essentially immutable.\r\n      // Therefore, if a key exists, there's no reason to update it.\r\n      for (const key of src.keys) {\r\n        // Note using Relay global id allows us to not worry about clashing node id\r\n        if (this.graph.hasNode(key.id)) {\r\n          continue;\r\n        }\r\n\r\n        const node: Node = {\r\n          type: NodeType.Key,\r\n          data: _.cloneDeep(key),\r\n        };\r\n\r\n        this.graph.setNode(key.id, node);\r\n      }\r\n    }\r\n\r\n    // KeyLinks\r\n    if (src.keyLinks) {\r\n      for (const keyLink of src.keyLinks) {\r\n        if (this.graph.hasEdge(keyLink.wrappingKeyId, keyLink.keyId)) {\r\n          continue;\r\n        }\r\n\r\n        const edge: Edge = {\r\n          type: EdgeType.KeyLink,\r\n          data: _.cloneDeep(keyLink),\r\n        };\r\n        // Edge goes from wrapping key to wrapped key.\r\n        this.graph.setEdge(keyLink.wrappingKeyId, keyLink.keyId, edge);\r\n      }\r\n    }\r\n\r\n    // PassKeyLinks\r\n    if (src.passKeyLinks) {\r\n      for (const passKeyLink of src.passKeyLinks) {\r\n        if (this.graph.hasEdge(passKeyLink.passKeyId, passKeyLink.keyId)) {\r\n          continue;\r\n        }\r\n\r\n        const edge: Edge = {\r\n          type: EdgeType.PassKeyLink,\r\n          data: _.cloneDeep(passKeyLink),\r\n        };\r\n        // Edge goes from wrapping key to wrapped key.\r\n        this.graph.setEdge(passKeyLink.passKeyId, passKeyLink.keyId, edge);\r\n      }\r\n    }\r\n\r\n    // The graph is the single source of truth. These are lazily calculated.\r\n    // this.keyCache = null;\r\n  }\r\n\r\n  tracePath(distances, keyId: string): Edge[] {\r\n    // The node label is the same as the id of the key nodes.\r\n    const ret: Edge[] = [];\r\n    let node = keyId;\r\n    if (!distances[node].predecessor) {\r\n      return null;\r\n    }\r\n\r\n    while (distances[node].predecessor) {\r\n      const child = distances[node].predecessor;\r\n      ret.push(this.graph.edge(child, node));\r\n      node = child;\r\n    }\r\n\r\n    // After reverse, the first element is the passkey\r\n    ret.reverse();\r\n\r\n    return ret;\r\n  }\r\n\r\n  getPath(knownKeyId: string, keyId: string): Edge[] {\r\n    if (!knownKeyId || typeof knownKeyId !== 'string') {\r\n      throw new LrEncryptionException(\r\n        `Param knownKeyId wrong format: ${knownKeyId}`\r\n      );\r\n    }\r\n    if (!keyId || typeof keyId !== 'string') {\r\n      throw new LrEncryptionException(`Param keyId wrong format: ${keyId}`);\r\n    }\r\n\r\n    // => { A: { distance: 0 },\r\n    //      B: { distance: 6, predecessor: 'C' },\r\n    //      C: { distance: 4, predecessor: 'A' },\r\n    //      D: { distance: 2, predecessor: 'A' },\r\n    //      E: { distance: 8, predecessor: 'F' },\r\n    //      F: { distance: 4, predecessor: 'D' } }\r\n    const distances = graphlib.alg.dijkstra(this.graph, knownKeyId);\r\n\r\n    // Trace path from keyId to knownKeyId\r\n    return this.tracePath(distances, keyId);\r\n  }\r\n\r\n  async getJwkKey(\r\n    keyOrId: string | Key,\r\n    getKeyIdCallback?: () => Promise<string> | string\r\n  ): Promise<JWK.Key> {\r\n    return (await this.getKey(keyOrId, getKeyIdCallback)).jwk;\r\n  }\r\n\r\n  // We assume that when a keyId is fetched, the key graph\r\n  // for the key is also returned and merged into the client-side\r\n  // key graph. By insisting a keyId is returned instead of the\r\n  // actual key we ensure key-graph is consistent.\r\n  async getKey(\r\n    keyOrId: string | Key,\r\n    getKeyIdCallback?: () => Promise<string> | string\r\n  ): Promise<Key> {\r\n    let keyId = typeof keyOrId === 'string' ? keyOrId : keyOrId?.id;\r\n\r\n    if (!this.hasKey(keyId) && getKeyIdCallback) {\r\n      keyId = await getKeyIdCallback();\r\n    }\r\n    // else, continue and let it fail.\r\n\r\n    const key = this.key(keyId);\r\n    if (key.jwk) {\r\n      return key;\r\n    } else {\r\n      return this.unwrapKey(this.keyService.getCurrentMasterKey().id, keyId);\r\n    }\r\n  }\r\n\r\n  private async _unwrapLink(wrappingKey, link, dstKey) {\r\n    // console.log(\"_unwrapLink:\", link.data.keyId);\r\n    const wrappedKey = JSON.parse(link.data.wrappedKey);\r\n    // Signatures of keys contain the key itself. This way we only need\r\n    // to access the KeyLinks to decrypt/verify keys.\r\n    let nextRawKey;\r\n    if (wrappedKey.signatures) {\r\n      nextRawKey = await this.encryptionService.verify(wrappingKey, wrappedKey);\r\n    } else {\r\n      nextRawKey = await this.encryptionService.decrypt(\r\n        wrappingKey,\r\n        wrappedKey\r\n      );\r\n    }\r\n    dstKey.jwk = await KFS.asKey(nextRawKey);\r\n    dstKey.task = null;\r\n  }\r\n\r\n  private async _unwrap(key: JWK.Key, path: Edge[]): Promise<JWK.Key> {\r\n    for (const link of path) {\r\n      const dstKey = this.key(link.data.keyId);\r\n      // console.log(\"key: \", link.data.keyId);\r\n      if (dstKey.jwk) {\r\n        key = dstKey.jwk;\r\n        // console.log(\"Returning cached key: \", link.data.keyId);\r\n        continue;\r\n      }\r\n\r\n      if (!dstKey.task) {\r\n        dstKey.task = this._unwrapLink(key, link, dstKey);\r\n      }\r\n\r\n      await dstKey.task;\r\n      key = dstKey.jwk;\r\n    }\r\n\r\n    return key;\r\n  }\r\n\r\n  public async unwrapWithPassKey(\r\n    passKeyId: string,\r\n    passKey: JWK.Key,\r\n    keyId: string\r\n  ): Promise<Key> {\r\n    // Get path of the directory key.\r\n    const path = this.getPath(passKeyId, keyId);\r\n\r\n    return {\r\n      id: keyId,\r\n      jwk: await this._unwrap(passKey, path),\r\n    };\r\n  }\r\n\r\n  async unwrapKey(masterKeyId: string, keyId: string): Promise<Key> {\r\n    // The first key should be a masterKey\r\n    const masterKey = await this.keyService.loadMasterKey(masterKeyId);\r\n\r\n    if (masterKeyId === keyId) {\r\n      return masterKey;\r\n    }\r\n\r\n    // Get path of the directory key.\r\n    const path = this.getPath(masterKey.id, keyId);\r\n\r\n    return {\r\n      id: keyId,\r\n      jwk: await this._unwrap(masterKey.jwk, path),\r\n    };\r\n  }\r\n\r\n  async decryptFromString<T>(\r\n    keyOrId: string | Key,\r\n    cipherData: string,\r\n    options?: DecryptOptions\r\n  ): Promise<T> {\r\n    if (cipherData) {\r\n      const key = await this.getJwkKey(keyOrId);\r\n      return (await this.encryptionService.decrypt(\r\n        key,\r\n        JSON.parse(cipherData),\r\n        options\r\n      )) as any;\r\n    }\r\n    return null;\r\n  }\r\n\r\n  async decryptFile(keyId: string, file: any): Promise<any> {\r\n    const key = await this.getJwkKey(keyId);\r\n    return (await this.encryptionService.decrypt(key, file, {\r\n      payloadType: 'ArrayBuffer',\r\n    })) as any;\r\n  }\r\n\r\n  // TODO rename this to encrypt() and use as the most common usecase\r\n  async encryptToString(\r\n    key: string | Key | JWK.Key,\r\n    content: any\r\n  ): Promise<string> {\r\n    // Empty string should be encrypted since you want to clear the field.\r\n    // Null is not encrypted because it's not valid JSON in the old JSON spec. Use\r\n    // empty string instead. It'll function as a logic false as well.\r\n    // Note that passing in empty string means it'll be encrypted which verifies\r\n    // it's integrity. But we still want to have a way to set the DB field\r\n    // to NULL, so we explicitly return null when content == null. A null\r\n    // variable in graphql mutation on KC server clears the field to NULL.\r\n    if (content == null) {\r\n      return null;\r\n    }\r\n\r\n    const jwk = asJwk(key) || (await this.getJwkKey(key as string | Key));\r\n    return this.encryptionService.encryptToString(jwk, content);\r\n  }\r\n\r\n  // Wraps a symmetric encryption key.\r\n  // Throws exception if wrapping public keys.\r\n  async wrapKey<T>(\r\n    wrappingKey: string | Key | JWK.Key,\r\n    key: JWK.Key\r\n  ): Promise<string> {\r\n    if (!isSymmetricKey(key)) {\r\n      throw new LrBadArgumentException(\r\n        'Only allowing wrapping of symmetric keys.'\r\n      );\r\n    }\r\n\r\n    return this.encryptToString(wrappingKey, key.toJSON(true));\r\n  }\r\n\r\n  // TODO\r\n  // async wrapPublicKey<T>();\r\n  // async wrapPrivateKey<T>();\r\n}\r\n"]}
|
|
@@ -0,0 +1,200 @@
|
|
|
1
|
+
import { __awaiter } from "tslib";
|
|
2
|
+
import { Injectable } from '@angular/core';
|
|
3
|
+
import { LrApolloService } from '../api/lr-apollo.service';
|
|
4
|
+
import { GetCategoryKeyIdQuery } from '../category/category.gql';
|
|
5
|
+
import { EncryptionService, } from './encryption.service';
|
|
6
|
+
import { KeyFactoryService } from './key-factory.service';
|
|
7
|
+
import { KeyGraphService } from './key-graph.service';
|
|
8
|
+
import { KeyService } from './key.service';
|
|
9
|
+
import * as i0 from "@angular/core";
|
|
10
|
+
import * as i1 from "./encryption.service";
|
|
11
|
+
import * as i2 from "./key-graph.service";
|
|
12
|
+
import * as i3 from "../api/lr-apollo.service";
|
|
13
|
+
import * as i4 from "./key.service";
|
|
14
|
+
import * as i5 from "./key-factory.service";
|
|
15
|
+
export class WrappedContent {
|
|
16
|
+
}
|
|
17
|
+
export class WrappingKey {
|
|
18
|
+
}
|
|
19
|
+
export class KeyMetaService {
|
|
20
|
+
constructor(encryptionService, keyGraph, lrApollo, keyService, keyFactory) {
|
|
21
|
+
this.encryptionService = encryptionService;
|
|
22
|
+
this.keyGraph = keyGraph;
|
|
23
|
+
this.lrApollo = lrApollo;
|
|
24
|
+
this.keyService = keyService;
|
|
25
|
+
this.keyFactory = keyFactory;
|
|
26
|
+
}
|
|
27
|
+
// async decryptFromString<T>(
|
|
28
|
+
// keyOrId: string | Key,
|
|
29
|
+
// cipherData: string,
|
|
30
|
+
// options?: DecryptOptions
|
|
31
|
+
// ): Promise<T> {
|
|
32
|
+
// if (cipherData) {
|
|
33
|
+
// const key = await this.keyGraphService.getJwkKey(keyOrId);
|
|
34
|
+
// return (await this.encryptionService.decrypt(
|
|
35
|
+
// key,
|
|
36
|
+
// JSON.parse(cipherData),
|
|
37
|
+
// options
|
|
38
|
+
// )) as any;
|
|
39
|
+
// }
|
|
40
|
+
// return null;
|
|
41
|
+
// }
|
|
42
|
+
decryptMeta(metaHaver) {
|
|
43
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
44
|
+
if (metaHaver.cipherMeta) {
|
|
45
|
+
const key = yield this.keyGraph.getJwkKey(metaHaver.keyId);
|
|
46
|
+
return (yield this.encryptionService.decrypt(key, JSON.parse(metaHaver.cipherMeta)));
|
|
47
|
+
}
|
|
48
|
+
return null;
|
|
49
|
+
});
|
|
50
|
+
}
|
|
51
|
+
// async decryptFile(keyId: string, file: any): Promise<any> {
|
|
52
|
+
// const key = await this.keyGraphService.getJwkKey(keyId);
|
|
53
|
+
// return (await this.encryptionService.decrypt(key, file, {
|
|
54
|
+
// payloadType: 'ArrayBuffer',
|
|
55
|
+
// })) as any;
|
|
56
|
+
// }
|
|
57
|
+
// // TODO rename this to encrypt() and use as the most common usecase
|
|
58
|
+
// async encryptToString(
|
|
59
|
+
// key: string | Key | JWK.Key,
|
|
60
|
+
// content: any
|
|
61
|
+
// ): Promise<string> {
|
|
62
|
+
// // Empty string should be encrypted since you want to clear the field.
|
|
63
|
+
// // Null is not encrypted because it's not valid JSON in the old JSON spec. Use
|
|
64
|
+
// // empty string instead. It'll function as a logic false as well.
|
|
65
|
+
// // Note that passing in empty string means it'll be encrypted which verifies
|
|
66
|
+
// // it's integrity. But we still want to have a way to set the DB field
|
|
67
|
+
// // to NULL, so we explicitly return null when content == null. A null
|
|
68
|
+
// // variable in graphql mutation on KC server clears the field to NULL.
|
|
69
|
+
// if (content == null) {
|
|
70
|
+
// return null;
|
|
71
|
+
// }
|
|
72
|
+
// const jwk =
|
|
73
|
+
// asJwk(key) || (await this.keyGraphService.getJwkKey(key as string | Key));
|
|
74
|
+
// return JSON.stringify(await this.encryptionService.encrypt(jwk, content));
|
|
75
|
+
// }
|
|
76
|
+
// // Wraps a symmetric encryption key.
|
|
77
|
+
// // Throws exception if wrapping public keys.
|
|
78
|
+
// async wrapKey<T>(
|
|
79
|
+
// wrappingKey: string | Key | JWK.Key,
|
|
80
|
+
// key: JWK.Key
|
|
81
|
+
// ): Promise<string> {
|
|
82
|
+
// if (!isSymmetricKey(key)) {
|
|
83
|
+
// throw new LrBadArgumentException(
|
|
84
|
+
// 'Only allowing wrapping of symmetric keys.'
|
|
85
|
+
// );
|
|
86
|
+
// }
|
|
87
|
+
// return this.encryptToString(wrappingKey, key.toJSON(true));
|
|
88
|
+
// }
|
|
89
|
+
// // TODO
|
|
90
|
+
// // async wrapPublicKey<T>();
|
|
91
|
+
// // async wrapPrivateKey<T>();
|
|
92
|
+
doubleWrapContent(secureContent, categoryIds, fileContent) {
|
|
93
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
94
|
+
const key = yield this.keyFactory.createKey();
|
|
95
|
+
const wrappedContent = yield this.wrapContent(key.toJSON(true), categoryIds);
|
|
96
|
+
return {
|
|
97
|
+
rootKey: wrappedContent.rootKey,
|
|
98
|
+
wrappedKeys: wrappedContent.wrappedKeys,
|
|
99
|
+
doubleWrappedKey: wrappedContent.cipherMeta,
|
|
100
|
+
cipherMeta: secureContent
|
|
101
|
+
? JSON.stringify(yield this.encryptionService.encrypt(key, secureContent))
|
|
102
|
+
: null,
|
|
103
|
+
cipherFileContent: fileContent
|
|
104
|
+
? JSON.stringify(yield this.encryptionService.encrypt(key, fileContent))
|
|
105
|
+
: null,
|
|
106
|
+
};
|
|
107
|
+
});
|
|
108
|
+
}
|
|
109
|
+
reWrapContent(keyId, secureContent) {
|
|
110
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
111
|
+
const key = yield this.keyGraph.getJwkKey(keyId);
|
|
112
|
+
const newKey = yield this.keyFactory.createKey();
|
|
113
|
+
return {
|
|
114
|
+
doubleWrappedKey: JSON.stringify(yield this.encryptionService.encrypt(key, newKey.toJSON(true))),
|
|
115
|
+
cipherMeta: secureContent
|
|
116
|
+
? JSON.stringify(yield this.encryptionService.encrypt(newKey, secureContent))
|
|
117
|
+
: null,
|
|
118
|
+
};
|
|
119
|
+
});
|
|
120
|
+
}
|
|
121
|
+
wrapContent(secureContent, categoryIds) {
|
|
122
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
123
|
+
const key = yield this.keyFactory.createKey();
|
|
124
|
+
let wrappedKeys;
|
|
125
|
+
let rootWrappingKey;
|
|
126
|
+
if (categoryIds && categoryIds.length) {
|
|
127
|
+
wrappedKeys = yield Promise.all(categoryIds.map((categoryId) => __awaiter(this, void 0, void 0, function* () {
|
|
128
|
+
const parentKey = yield this.getCategoryKeyId(categoryId);
|
|
129
|
+
const wrappedKey = JSON.stringify(yield this.encryptionService.encrypt(parentKey.key, key.toJSON(true)));
|
|
130
|
+
return {
|
|
131
|
+
directoryId: categoryId,
|
|
132
|
+
wrappingKeyId: parentKey.keyId,
|
|
133
|
+
wrappedKey,
|
|
134
|
+
};
|
|
135
|
+
})));
|
|
136
|
+
}
|
|
137
|
+
else {
|
|
138
|
+
// Adding to root directory
|
|
139
|
+
const rootKey = this.keyService.getCurrentRootKey();
|
|
140
|
+
const wrappedKey = JSON.stringify(yield this.encryptionService.encrypt(rootKey.jwk, key.toJSON(true)));
|
|
141
|
+
rootWrappingKey = {
|
|
142
|
+
wrappingKeyId: rootKey.id,
|
|
143
|
+
wrappedKey,
|
|
144
|
+
};
|
|
145
|
+
}
|
|
146
|
+
return {
|
|
147
|
+
key,
|
|
148
|
+
rootKey: rootWrappingKey,
|
|
149
|
+
wrappedKeys,
|
|
150
|
+
cipherMeta: secureContent
|
|
151
|
+
? JSON.stringify(yield this.encryptionService.encrypt(key, secureContent))
|
|
152
|
+
: null,
|
|
153
|
+
};
|
|
154
|
+
});
|
|
155
|
+
}
|
|
156
|
+
wrapContentWithKey(secureContent, keyId) {
|
|
157
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
158
|
+
const key = yield this.keyFactory.createKey();
|
|
159
|
+
const wrappedKey = yield this.keyGraph.encryptToString(keyId, key.toJSON(true));
|
|
160
|
+
return {
|
|
161
|
+
key,
|
|
162
|
+
rootKey: {
|
|
163
|
+
wrappingKeyId: keyId,
|
|
164
|
+
wrappedKey,
|
|
165
|
+
},
|
|
166
|
+
cipherMeta: secureContent
|
|
167
|
+
? JSON.stringify(yield this.encryptionService.encrypt(key, secureContent))
|
|
168
|
+
: null,
|
|
169
|
+
};
|
|
170
|
+
});
|
|
171
|
+
}
|
|
172
|
+
getCategoryKeyId(categoryId) {
|
|
173
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
174
|
+
const { category } = yield this.lrApollo.query({
|
|
175
|
+
query: GetCategoryKeyIdQuery,
|
|
176
|
+
variables: {
|
|
177
|
+
id: categoryId,
|
|
178
|
+
},
|
|
179
|
+
});
|
|
180
|
+
return {
|
|
181
|
+
keyId: category.keyId,
|
|
182
|
+
key: yield this.keyGraph.getJwkKey(category.keyId),
|
|
183
|
+
};
|
|
184
|
+
});
|
|
185
|
+
}
|
|
186
|
+
}
|
|
187
|
+
KeyMetaService.ɵprov = i0.ɵɵdefineInjectable({ factory: function KeyMetaService_Factory() { return new KeyMetaService(i0.ɵɵinject(i1.EncryptionService), i0.ɵɵinject(i2.KeyGraphService), i0.ɵɵinject(i3.LrApolloService), i0.ɵɵinject(i4.KeyService), i0.ɵɵinject(i5.KeyFactoryService)); }, token: KeyMetaService, providedIn: "root" });
|
|
188
|
+
KeyMetaService.decorators = [
|
|
189
|
+
{ type: Injectable, args: [{
|
|
190
|
+
providedIn: 'root',
|
|
191
|
+
},] }
|
|
192
|
+
];
|
|
193
|
+
KeyMetaService.ctorParameters = () => [
|
|
194
|
+
{ type: EncryptionService },
|
|
195
|
+
{ type: KeyGraphService },
|
|
196
|
+
{ type: LrApolloService },
|
|
197
|
+
{ type: KeyService },
|
|
198
|
+
{ type: KeyFactoryService }
|
|
199
|
+
];
|
|
200
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"key-meta.service.js","sourceRoot":"C:/Projects/newrepo/kc-client/projects/core/src/","sources":["lib/cryptography/key-meta.service.ts"],"names":[],"mappings":";AAAA,OAAO,EAAE,UAAU,EAAE,MAAM,eAAe,CAAC;AAE3C,OAAO,EAAE,eAAe,EAAE,MAAM,0BAA0B,CAAC;AAC3D,OAAO,EAAE,qBAAqB,EAAE,MAAM,0BAA0B,CAAC;AAGjE,OAAO,EAGL,iBAAiB,GAElB,MAAM,sBAAsB,CAAC;AAC9B,OAAO,EAAE,iBAAiB,EAAE,MAAM,uBAAuB,CAAC;AAC1D,OAAO,EAAE,eAAe,EAAE,MAAM,qBAAqB,CAAC;AACtD,OAAO,EAAE,UAAU,EAAE,MAAM,eAAe,CAAC;;;;;;;AAO3C,MAAM,OAAO,cAAc;CAK1B;AAED,MAAM,OAAO,WAAW;CAIvB;AAKD,MAAM,OAAO,cAAc;IACzB,YACU,iBAAoC,EACpC,QAAyB,EACzB,QAAyB,EACzB,UAAsB,EACtB,UAA6B;QAJ7B,sBAAiB,GAAjB,iBAAiB,CAAmB;QACpC,aAAQ,GAAR,QAAQ,CAAiB;QACzB,aAAQ,GAAR,QAAQ,CAAiB;QACzB,eAAU,GAAV,UAAU,CAAY;QACtB,eAAU,GAAV,UAAU,CAAmB;IACpC,CAAC;IAEJ,8BAA8B;IAC9B,2BAA2B;IAC3B,wBAAwB;IACxB,6BAA6B;IAC7B,kBAAkB;IAClB,sBAAsB;IACtB,iEAAiE;IACjE,oDAAoD;IACpD,aAAa;IACb,gCAAgC;IAChC,gBAAgB;IAChB,iBAAiB;IACjB,MAAM;IACN,iBAAiB;IACjB,IAAI;IAEE,WAAW,CAAI,SAAwB;;YAC3C,IAAI,SAAS,CAAC,UAAU,EAAE;gBACxB,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC,SAAS,CAAC,SAAS,CAAC,KAAK,CAAC,CAAC;gBAC3D,OAAO,CAAC,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAC1C,GAAG,EACH,IAAI,CAAC,KAAK,CAAC,SAAS,CAAC,UAAU,CAAC,CACjC,CAAQ,CAAC;aACX;YACD,OAAO,IAAI,CAAC;QACd,CAAC;KAAA;IAED,8DAA8D;IAC9D,6DAA6D;IAC7D,8DAA8D;IAC9D,kCAAkC;IAClC,gBAAgB;IAChB,IAAI;IAEJ,sEAAsE;IACtE,yBAAyB;IACzB,iCAAiC;IACjC,iBAAiB;IACjB,uBAAuB;IACvB,2EAA2E;IAC3E,mFAAmF;IACnF,sEAAsE;IACtE,iFAAiF;IACjF,2EAA2E;IAC3E,0EAA0E;IAC1E,2EAA2E;IAC3E,2BAA2B;IAC3B,mBAAmB;IACnB,MAAM;IAEN,gBAAgB;IAChB,iFAAiF;IACjF,+EAA+E;IAC/E,IAAI;IAEJ,uCAAuC;IACvC,+CAA+C;IAC/C,oBAAoB;IACpB,yCAAyC;IACzC,iBAAiB;IACjB,uBAAuB;IACvB,gCAAgC;IAChC,wCAAwC;IACxC,oDAAoD;IACpD,SAAS;IACT,MAAM;IAEN,gEAAgE;IAChE,IAAI;IAEJ,UAAU;IACV,+BAA+B;IAC/B,gCAAgC;IAE1B,iBAAiB,CACrB,aAAkB,EAClB,WAAqB,EACrB,WAAyB;;YAEzB,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,SAAS,EAAE,CAAC;YAE9C,MAAM,cAAc,GAAG,MAAM,IAAI,CAAC,WAAW,CAC3C,GAAG,CAAC,MAAM,CAAC,IAAI,CAAC,EAChB,WAAW,CACZ,CAAC;YAEF,OAAO;gBACL,OAAO,EAAE,cAAc,CAAC,OAAO;gBAC/B,WAAW,EAAE,cAAc,CAAC,WAAW;gBACvC,gBAAgB,EAAE,cAAc,CAAC,UAAU;gBAC3C,UAAU,EAAE,aAAa;oBACvB,CAAC,CAAC,IAAI,CAAC,SAAS,CACZ,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAAC,GAAG,EAAE,aAAa,CAAC,CACzD;oBACH,CAAC,CAAC,IAAI;gBACR,iBAAiB,EAAE,WAAW;oBAC5B,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAAC,GAAG,EAAE,WAAW,CAAC,CAAC;oBACxE,CAAC,CAAC,IAAI;aACT,CAAC;QACJ,CAAC;KAAA;IAEK,aAAa,CAAC,KAAa,EAAE,aAAkB;;YACnD,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC,SAAS,CAAC,KAAK,CAAC,CAAC;YACjD,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,SAAS,EAAE,CAAC;YAEjD,OAAO;gBACL,gBAAgB,EAAE,IAAI,CAAC,SAAS,CAC9B,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAAC,GAAG,EAAE,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAC/D;gBACD,UAAU,EAAE,aAAa;oBACvB,CAAC,CAAC,IAAI,CAAC,SAAS,CACZ,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAAC,MAAM,EAAE,aAAa,CAAC,CAC5D;oBACH,CAAC,CAAC,IAAI;aACT,CAAC;QACJ,CAAC;KAAA;IAEK,WAAW,CACf,aAAkB,EAClB,WAAsB;;YAEtB,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,SAAS,EAAE,CAAC;YAE9C,IAAI,WAA0B,CAAC;YAC/B,IAAI,eAA4B,CAAC;YAEjC,IAAI,WAAW,IAAI,WAAW,CAAC,MAAM,EAAE;gBACrC,WAAW,GAAG,MAAM,OAAO,CAAC,GAAG,CAC7B,WAAW,CAAC,GAAG,CAAC,CAAO,UAAU,EAAE,EAAE;oBACnC,MAAM,SAAS,GAAG,MAAM,IAAI,CAAC,gBAAgB,CAAC,UAAU,CAAC,CAAC;oBAC1D,MAAM,UAAU,GAAG,IAAI,CAAC,SAAS,CAC/B,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAClC,SAAS,CAAC,GAAG,EACb,GAAG,CAAC,MAAM,CAAC,IAAI,CAAC,CACjB,CACF,CAAC;oBACF,OAAO;wBACL,WAAW,EAAE,UAAU;wBACvB,aAAa,EAAE,SAAS,CAAC,KAAK;wBAC9B,UAAU;qBACX,CAAC;gBACJ,CAAC,CAAA,CAAC,CACH,CAAC;aACH;iBAAM;gBACL,2BAA2B;gBAC3B,MAAM,OAAO,GAAG,IAAI,CAAC,UAAU,CAAC,iBAAiB,EAAE,CAAC;gBACpD,MAAM,UAAU,GAAG,IAAI,CAAC,SAAS,CAC/B,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAAC,OAAO,CAAC,GAAG,EAAE,GAAG,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CACpE,CAAC;gBACF,eAAe,GAAG;oBAChB,aAAa,EAAE,OAAO,CAAC,EAAE;oBACzB,UAAU;iBACX,CAAC;aACH;YAED,OAAO;gBACL,GAAG;gBACH,OAAO,EAAE,eAAe;gBACxB,WAAW;gBACX,UAAU,EAAE,aAAa;oBACvB,CAAC,CAAC,IAAI,CAAC,SAAS,CACZ,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAAC,GAAG,EAAE,aAAa,CAAC,CACzD;oBACH,CAAC,CAAC,IAAI;aACT,CAAC;QACJ,CAAC;KAAA;IAEK,kBAAkB,CACtB,aAAkB,EAClB,KAAa;;YAEb,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,SAAS,EAAE,CAAC;YAE9C,MAAM,UAAU,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC,eAAe,CACpD,KAAK,EACL,GAAG,CAAC,MAAM,CAAC,IAAI,CAAC,CACjB,CAAC;YAEF,OAAO;gBACL,GAAG;gBACH,OAAO,EAAE;oBACP,aAAa,EAAE,KAAK;oBACpB,UAAU;iBACX;gBACD,UAAU,EAAE,aAAa;oBACvB,CAAC,CAAC,IAAI,CAAC,SAAS,CACZ,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAAC,GAAG,EAAE,aAAa,CAAC,CACzD;oBACH,CAAC,CAAC,IAAI;aACT,CAAC;QACJ,CAAC;KAAA;IAEa,gBAAgB,CAC5B,UAAkB;;YAElB,MAAM,EAAE,QAAQ,EAAE,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC,KAAK,CAAM;gBAClD,KAAK,EAAE,qBAAqB;gBAC5B,SAAS,EAAE;oBACT,EAAE,EAAE,UAAU;iBACf;aACF,CAAC,CAAC;YAEH,OAAO;gBACL,KAAK,EAAE,QAAQ,CAAC,KAAK;gBACrB,GAAG,EAAE,MAAM,IAAI,CAAC,QAAQ,CAAC,SAAS,CAAC,QAAQ,CAAC,KAAK,CAAC;aACnD,CAAC;QACJ,CAAC;KAAA;;;;YA1NF,UAAU,SAAC;gBACV,UAAU,EAAE,MAAM;aACnB;;;YA3BC,iBAAiB;YAIV,eAAe;YAXf,eAAe;YAYf,UAAU;YAFV,iBAAiB","sourcesContent":["import { Injectable } from '@angular/core';\r\nimport { JWK } from 'node-jose';\r\nimport { LrApolloService } from '../api/lr-apollo.service';\r\nimport { GetCategoryKeyIdQuery } from '../category/category.gql';\r\nimport { LrBadArgumentException } from '../_common/exceptions';\r\nimport { Key, PayloadType } from './cryptography.types';\r\nimport {\r\n  asJwk,\r\n  DecryptOptions,\r\n  EncryptionService,\r\n  isSymmetricKey,\r\n} from './encryption.service';\r\nimport { KeyFactoryService } from './key-factory.service';\r\nimport { KeyGraphService } from './key-graph.service';\r\nimport { KeyService } from './key.service';\r\n\r\nexport interface HasCipherMeta {\r\n  keyId: string;\r\n  cipherMeta: string;\r\n}\r\n\r\nexport class WrappedContent {\r\n  key: JWK.Key;\r\n  cipherMeta: string;\r\n  wrappedKeys?: WrappingKey[];\r\n  rootKey?: WrappingKey;\r\n}\r\n\r\nexport class WrappingKey {\r\n  directoryId?: string;\r\n  wrappingKeyId: string;\r\n  wrappedKey: string;\r\n}\r\n\r\n@Injectable({\r\n  providedIn: 'root',\r\n})\r\nexport class KeyMetaService {\r\n  constructor(\r\n    private encryptionService: EncryptionService,\r\n    private keyGraph: KeyGraphService,\r\n    private lrApollo: LrApolloService,\r\n    private keyService: KeyService,\r\n    private keyFactory: KeyFactoryService\r\n  ) {}\r\n\r\n  // async decryptFromString<T>(\r\n  //   keyOrId: string | Key,\r\n  //   cipherData: string,\r\n  //   options?: DecryptOptions\r\n  // ): Promise<T> {\r\n  //   if (cipherData) {\r\n  //     const key = await this.keyGraphService.getJwkKey(keyOrId);\r\n  //     return (await this.encryptionService.decrypt(\r\n  //       key,\r\n  //       JSON.parse(cipherData),\r\n  //       options\r\n  //     )) as any;\r\n  //   }\r\n  //   return null;\r\n  // }\r\n\r\n  async decryptMeta<T>(metaHaver: HasCipherMeta): Promise<T> {\r\n    if (metaHaver.cipherMeta) {\r\n      const key = await this.keyGraph.getJwkKey(metaHaver.keyId);\r\n      return (await this.encryptionService.decrypt(\r\n        key,\r\n        JSON.parse(metaHaver.cipherMeta)\r\n      )) as any;\r\n    }\r\n    return null;\r\n  }\r\n\r\n  // async decryptFile(keyId: string, file: any): Promise<any> {\r\n  //   const key = await this.keyGraphService.getJwkKey(keyId);\r\n  //   return (await this.encryptionService.decrypt(key, file, {\r\n  //     payloadType: 'ArrayBuffer',\r\n  //   })) as any;\r\n  // }\r\n\r\n  // // TODO rename this to encrypt() and use as the most common usecase\r\n  // async encryptToString(\r\n  //   key: string | Key | JWK.Key,\r\n  //   content: any\r\n  // ): Promise<string> {\r\n  //   // Empty string should be encrypted since you want to clear the field.\r\n  //   // Null is not encrypted because it's not valid JSON in the old JSON spec. Use\r\n  //   // empty string instead. It'll function as a logic false as well.\r\n  //   // Note that passing in empty string means it'll be encrypted which verifies\r\n  //   // it's integrity. But we still want to have a way to set the DB field\r\n  //   // to NULL, so we explicitly return null when content == null. A null\r\n  //   // variable in graphql mutation on KC server clears the field to NULL.\r\n  //   if (content == null) {\r\n  //     return null;\r\n  //   }\r\n\r\n  //   const jwk =\r\n  //     asJwk(key) || (await this.keyGraphService.getJwkKey(key as string | Key));\r\n  //   return JSON.stringify(await this.encryptionService.encrypt(jwk, content));\r\n  // }\r\n\r\n  // // Wraps a symmetric encryption key.\r\n  // // Throws exception if wrapping public keys.\r\n  // async wrapKey<T>(\r\n  //   wrappingKey: string | Key | JWK.Key,\r\n  //   key: JWK.Key\r\n  // ): Promise<string> {\r\n  //   if (!isSymmetricKey(key)) {\r\n  //     throw new LrBadArgumentException(\r\n  //       'Only allowing wrapping of symmetric keys.'\r\n  //     );\r\n  //   }\r\n\r\n  //   return this.encryptToString(wrappingKey, key.toJSON(true));\r\n  // }\r\n\r\n  // // TODO\r\n  // // async wrapPublicKey<T>();\r\n  // // async wrapPrivateKey<T>();\r\n\r\n  async doubleWrapContent(\r\n    secureContent: any,\r\n    categoryIds: string[],\r\n    fileContent?: ArrayBuffer\r\n  ) {\r\n    const key = await this.keyFactory.createKey();\r\n\r\n    const wrappedContent = await this.wrapContent(\r\n      key.toJSON(true),\r\n      categoryIds\r\n    );\r\n\r\n    return {\r\n      rootKey: wrappedContent.rootKey,\r\n      wrappedKeys: wrappedContent.wrappedKeys,\r\n      doubleWrappedKey: wrappedContent.cipherMeta,\r\n      cipherMeta: secureContent\r\n        ? JSON.stringify(\r\n            await this.encryptionService.encrypt(key, secureContent)\r\n          )\r\n        : null,\r\n      cipherFileContent: fileContent\r\n        ? JSON.stringify(await this.encryptionService.encrypt(key, fileContent))\r\n        : null,\r\n    };\r\n  }\r\n\r\n  async reWrapContent(keyId: string, secureContent: any) {\r\n    const key = await this.keyGraph.getJwkKey(keyId);\r\n    const newKey = await this.keyFactory.createKey();\r\n\r\n    return {\r\n      doubleWrappedKey: JSON.stringify(\r\n        await this.encryptionService.encrypt(key, newKey.toJSON(true))\r\n      ),\r\n      cipherMeta: secureContent\r\n        ? JSON.stringify(\r\n            await this.encryptionService.encrypt(newKey, secureContent)\r\n          )\r\n        : null,\r\n    };\r\n  }\r\n\r\n  async wrapContent(\r\n    secureContent: any,\r\n    categoryIds?: string[]\r\n  ): Promise<WrappedContent> {\r\n    const key = await this.keyFactory.createKey();\r\n\r\n    let wrappedKeys: WrappingKey[];\r\n    let rootWrappingKey: WrappingKey;\r\n\r\n    if (categoryIds && categoryIds.length) {\r\n      wrappedKeys = await Promise.all(\r\n        categoryIds.map(async (categoryId) => {\r\n          const parentKey = await this.getCategoryKeyId(categoryId);\r\n          const wrappedKey = JSON.stringify(\r\n            await this.encryptionService.encrypt(\r\n              parentKey.key,\r\n              key.toJSON(true)\r\n            )\r\n          );\r\n          return {\r\n            directoryId: categoryId,\r\n            wrappingKeyId: parentKey.keyId,\r\n            wrappedKey,\r\n          };\r\n        })\r\n      );\r\n    } else {\r\n      // Adding to root directory\r\n      const rootKey = this.keyService.getCurrentRootKey();\r\n      const wrappedKey = JSON.stringify(\r\n        await this.encryptionService.encrypt(rootKey.jwk, key.toJSON(true))\r\n      );\r\n      rootWrappingKey = {\r\n        wrappingKeyId: rootKey.id,\r\n        wrappedKey,\r\n      };\r\n    }\r\n\r\n    return {\r\n      key,\r\n      rootKey: rootWrappingKey,\r\n      wrappedKeys,\r\n      cipherMeta: secureContent\r\n        ? JSON.stringify(\r\n            await this.encryptionService.encrypt(key, secureContent)\r\n          )\r\n        : null,\r\n    };\r\n  }\r\n\r\n  async wrapContentWithKey(\r\n    secureContent: any,\r\n    keyId: string\r\n  ): Promise<WrappedContent> {\r\n    const key = await this.keyFactory.createKey();\r\n\r\n    const wrappedKey = await this.keyGraph.encryptToString(\r\n      keyId,\r\n      key.toJSON(true)\r\n    );\r\n\r\n    return {\r\n      key,\r\n      rootKey: {\r\n        wrappingKeyId: keyId,\r\n        wrappedKey,\r\n      },\r\n      cipherMeta: secureContent\r\n        ? JSON.stringify(\r\n            await this.encryptionService.encrypt(key, secureContent)\r\n          )\r\n        : null,\r\n    };\r\n  }\r\n\r\n  private async getCategoryKeyId(\r\n    categoryId: string\r\n  ): Promise<{ keyId: string; key: any }> {\r\n    const { category } = await this.lrApollo.query<any>({\r\n      query: GetCategoryKeyIdQuery,\r\n      variables: {\r\n        id: categoryId,\r\n      },\r\n    });\r\n\r\n    return {\r\n      keyId: category.keyId,\r\n      key: await this.keyGraph.getJwkKey(category.keyId),\r\n    };\r\n  }\r\n}\r\n"]}
|