@lifeready/core 1.0.15 → 1.0.16
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +62 -62
- package/bundles/lifeready-core.umd.js +14315 -14315
- package/bundles/lifeready-core.umd.js.map +1 -1
- package/bundles/lifeready-core.umd.min.js.map +1 -1
- package/esm2015/lib/_common/ast.js +40 -40
- package/esm2015/lib/_common/deferred-promise.js +24 -24
- package/esm2015/lib/_common/exceptions.js +157 -157
- package/esm2015/lib/_common/queries.gql.js +190 -190
- package/esm2015/lib/_common/run-outside-angular.js +79 -79
- package/esm2015/lib/_common/types.js +1 -1
- package/esm2015/lib/_common/utils.js +52 -52
- package/esm2015/lib/api/contact-card.gql.js +79 -79
- package/esm2015/lib/api/contact-card.service.js +154 -154
- package/esm2015/lib/api/contact-card2.gql.js +60 -60
- package/esm2015/lib/api/contact-card2.service.js +103 -103
- package/esm2015/lib/api/file.service.js +74 -74
- package/esm2015/lib/api/key-exchange.gql.js +188 -188
- package/esm2015/lib/api/key-exchange.service.js +442 -442
- package/esm2015/lib/api/key-exchange.types.js +18 -18
- package/esm2015/lib/api/key-exchange2.gql.js +171 -171
- package/esm2015/lib/api/key-exchange2.service.js +479 -479
- package/esm2015/lib/api/lock.gql.js +40 -40
- package/esm2015/lib/api/lock.service.js +64 -64
- package/esm2015/lib/api/lr-apollo.service.js +46 -46
- package/esm2015/lib/api/lr-graphql/index.js +6 -6
- package/esm2015/lib/api/lr-graphql/lr-graphql.service.js +155 -155
- package/esm2015/lib/api/lr-graphql/lr-merged-mutation.js +213 -213
- package/esm2015/lib/api/lr-graphql/lr-mutation-base.js +51 -51
- package/esm2015/lib/api/lr-graphql/lr-mutation.js +48 -48
- package/esm2015/lib/api/lr-graphql/lr.service.js +18 -18
- package/esm2015/lib/api/message.service.js +138 -138
- package/esm2015/lib/api/persist.service.js +181 -181
- package/esm2015/lib/api/query-processor/common-processors.service.js +93 -93
- package/esm2015/lib/api/query-processor/index.js +3 -3
- package/esm2015/lib/api/query-processor/query-processor.service.js +262 -262
- package/esm2015/lib/api/query-processor/tp-password-reset-processor.service.js +109 -109
- package/esm2015/lib/api/shared-contact-card.service.js +119 -119
- package/esm2015/lib/api/shared-contact-card2.gql.js +41 -41
- package/esm2015/lib/api/shared-contact-card2.service.js +117 -117
- package/esm2015/lib/api/time.service.js +146 -146
- package/esm2015/lib/api/types/graphql.types.js +7 -7
- package/esm2015/lib/api/types/index.js +3 -3
- package/esm2015/lib/api/types/lr-graphql.types.js +101 -101
- package/esm2015/lib/auth/auth.config.js +57 -57
- package/esm2015/lib/auth/auth.gql.js +48 -48
- package/esm2015/lib/auth/auth.types.js +27 -27
- package/esm2015/lib/auth/idle.service.js +168 -168
- package/esm2015/lib/auth/idle.types.js +7 -7
- package/esm2015/lib/auth/lbop.service.js +355 -355
- package/esm2015/lib/auth/life-ready-auth.service.js +488 -488
- package/esm2015/lib/auth/password.service.js +320 -320
- package/esm2015/lib/auth/register.service.js +172 -172
- package/esm2015/lib/auth/two-factor.service.js +74 -74
- package/esm2015/lib/category/category-meta.service.js +99 -99
- package/esm2015/lib/category/category.gql.js +406 -406
- package/esm2015/lib/category/category.service.js +390 -390
- package/esm2015/lib/category/category.types.js +29 -29
- package/esm2015/lib/cryptography/cryptography.types.js +11 -11
- package/esm2015/lib/cryptography/encryption.service.js +189 -189
- package/esm2015/lib/cryptography/key-factory.service.js +237 -237
- package/esm2015/lib/cryptography/key-graph.service.js +299 -299
- package/esm2015/lib/cryptography/key-meta.service.js +200 -200
- package/esm2015/lib/cryptography/key.service.js +124 -124
- package/esm2015/lib/cryptography/slip39.service.js +169 -169
- package/esm2015/lib/cryptography/web-crypto.service.js +29 -29
- package/esm2015/lib/items2/item2.gql.js +139 -139
- package/esm2015/lib/items2/item2.service.js +498 -498
- package/esm2015/lib/items2/item2.types.js +1 -1
- package/esm2015/lib/life-ready.config.js +84 -84
- package/esm2015/lib/life-ready.module.js +74 -74
- package/esm2015/lib/notification/notification.gql.js +43 -43
- package/esm2015/lib/notification/notification.service.js +118 -118
- package/esm2015/lib/plan/plan.gql.js +123 -123
- package/esm2015/lib/plan/plan.service.js +149 -149
- package/esm2015/lib/plan/plan.types.js +11 -11
- package/esm2015/lib/record/record-attachment.service.js +101 -101
- package/esm2015/lib/record/record.gql.js +179 -179
- package/esm2015/lib/record/record.service.js +206 -206
- package/esm2015/lib/record/record.types.js +15 -15
- package/esm2015/lib/record-type/record-type.service.js +75 -75
- package/esm2015/lib/record-type/record-type.types.js +28 -28
- package/esm2015/lib/scenario/scenario.constants.js +2 -2
- package/esm2015/lib/scenario/scenario.controller.js +34 -34
- package/esm2015/lib/scenario/scenario.gql.js +72 -72
- package/esm2015/lib/scenario/scenario.gql.private.js +198 -198
- package/esm2015/lib/scenario/scenario.service.js +538 -538
- package/esm2015/lib/scenario/scenario.types.js +1 -1
- package/esm2015/lib/trusted-parties/tp-assembly.gql.private.js +22 -22
- package/esm2015/lib/trusted-parties/tp-assembly.js +362 -362
- package/esm2015/lib/trusted-parties/tp-assembly.types.js +1 -1
- package/esm2015/lib/trusted-parties/tp-password-reset-request.service.js +113 -113
- package/esm2015/lib/trusted-parties/tp-password-reset-user.service.js +129 -129
- package/esm2015/lib/trusted-parties/tp-password-reset.constants.js +4 -4
- package/esm2015/lib/trusted-parties/tp-password-reset.controller.js +34 -34
- package/esm2015/lib/trusted-parties/tp-password-reset.gql.js +236 -236
- package/esm2015/lib/trusted-parties/tp-password-reset.service.js +95 -95
- package/esm2015/lib/trusted-parties/trusted-party.gql.js +148 -148
- package/esm2015/lib/trusted-parties/trusted-party.service.js +326 -326
- package/esm2015/lib/trusted-parties/trusted-party.types.js +41 -41
- package/esm2015/lib/trusted-parties/trusted-party2.gql.js +87 -87
- package/esm2015/lib/trusted-parties/trusted-party2.service.js +215 -215
- package/esm2015/lib/users/profile-details.service.js +214 -214
- package/esm2015/lib/users/profile.gql.js +97 -97
- package/esm2015/lib/users/profile.service.js +169 -169
- package/esm2015/lib/users/profile.types.js +34 -34
- package/esm2015/lib/users/user.gql.js +60 -60
- package/esm2015/lib/users/user.service.js +79 -79
- package/esm2015/lib/users/user.types.js +5 -5
- package/esm2015/lifeready-core.js +13 -13
- package/esm2015/public-api.js +71 -71
- package/fesm2015/lifeready-core.js +12258 -12258
- package/fesm2015/lifeready-core.js.map +1 -1
- package/lib/_common/ast.d.ts +11 -11
- package/lib/_common/deferred-promise.d.ts +12 -12
- package/lib/_common/exceptions.d.ts +109 -109
- package/lib/_common/queries.gql.d.ts +10 -10
- package/lib/_common/run-outside-angular.d.ts +14 -14
- package/lib/_common/types.d.ts +10 -10
- package/lib/_common/utils.d.ts +9 -9
- package/lib/api/contact-card.gql.d.ts +7 -7
- package/lib/api/contact-card.service.d.ts +52 -52
- package/lib/api/contact-card2.gql.d.ts +34 -34
- package/lib/api/contact-card2.service.d.ts +49 -49
- package/lib/api/file.service.d.ts +18 -18
- package/lib/api/key-exchange.gql.d.ts +9 -9
- package/lib/api/key-exchange.service.d.ts +39 -39
- package/lib/api/key-exchange.types.d.ts +196 -196
- package/lib/api/key-exchange2.gql.d.ts +125 -125
- package/lib/api/key-exchange2.service.d.ts +187 -187
- package/lib/api/lock.gql.d.ts +27 -27
- package/lib/api/lock.service.d.ts +34 -34
- package/lib/api/lr-apollo.service.d.ts +15 -15
- package/lib/api/lr-graphql/index.d.ts +5 -5
- package/lib/api/lr-graphql/lr-graphql.service.d.ts +60 -60
- package/lib/api/lr-graphql/lr-merged-mutation.d.ts +28 -28
- package/lib/api/lr-graphql/lr-mutation-base.d.ts +28 -28
- package/lib/api/lr-graphql/lr-mutation.d.ts +8 -8
- package/lib/api/lr-graphql/lr.service.d.ts +9 -9
- package/lib/api/message.service.d.ts +58 -58
- package/lib/api/persist.service.d.ts +31 -31
- package/lib/api/query-processor/common-processors.service.d.ts +36 -36
- package/lib/api/query-processor/index.d.ts +2 -2
- package/lib/api/query-processor/query-processor.service.d.ts +18 -18
- package/lib/api/query-processor/tp-password-reset-processor.service.d.ts +15 -15
- package/lib/api/shared-contact-card.service.d.ts +33 -33
- package/lib/api/shared-contact-card2.gql.d.ts +36 -36
- package/lib/api/shared-contact-card2.service.d.ts +45 -45
- package/lib/api/time.service.d.ts +16 -16
- package/lib/api/types/graphql.types.d.ts +29 -29
- package/lib/api/types/index.d.ts +2 -2
- package/lib/api/types/lr-graphql.types.d.ts +502 -502
- package/lib/auth/auth.config.d.ts +5 -5
- package/lib/auth/auth.gql.d.ts +15 -15
- package/lib/auth/auth.types.d.ts +66 -66
- package/lib/auth/idle.service.d.ts +40 -40
- package/lib/auth/idle.types.d.ts +10 -10
- package/lib/auth/lbop.service.d.ts +91 -91
- package/lib/auth/life-ready-auth.service.d.ts +61 -61
- package/lib/auth/password.service.d.ts +78 -78
- package/lib/auth/register.service.d.ts +25 -25
- package/lib/auth/two-factor.service.d.ts +15 -15
- package/lib/category/category-meta.service.d.ts +23 -23
- package/lib/category/category.gql.d.ts +45 -45
- package/lib/category/category.service.d.ts +67 -67
- package/lib/category/category.types.d.ts +79 -79
- package/lib/cryptography/cryptography.types.d.ts +83 -83
- package/lib/cryptography/encryption.service.d.ts +41 -41
- package/lib/cryptography/key-factory.service.d.ts +38 -38
- package/lib/cryptography/key-graph.service.d.ts +41 -41
- package/lib/cryptography/key-meta.service.d.ts +44 -44
- package/lib/cryptography/key.service.d.ts +36 -36
- package/lib/cryptography/slip39.service.d.ts +43 -43
- package/lib/cryptography/web-crypto.service.d.ts +5 -5
- package/lib/items2/item2.gql.d.ts +123 -123
- package/lib/items2/item2.service.d.ts +203 -203
- package/lib/items2/item2.types.d.ts +70 -70
- package/lib/life-ready.config.d.ts +14 -14
- package/lib/life-ready.module.d.ts +5 -5
- package/lib/notification/notification.gql.d.ts +37 -37
- package/lib/notification/notification.service.d.ts +63 -63
- package/lib/plan/plan.gql.d.ts +11 -11
- package/lib/plan/plan.service.d.ts +33 -33
- package/lib/plan/plan.types.d.ts +31 -31
- package/lib/record/record-attachment.service.d.ts +16 -16
- package/lib/record/record.gql.d.ts +14 -14
- package/lib/record/record.service.d.ts +25 -25
- package/lib/record/record.types.d.ts +57 -57
- package/lib/record-type/record-type.service.d.ts +11 -11
- package/lib/record-type/record-type.types.d.ts +50 -50
- package/lib/scenario/scenario.constants.d.ts +1 -1
- package/lib/scenario/scenario.controller.d.ts +10 -10
- package/lib/scenario/scenario.gql.d.ts +62 -62
- package/lib/scenario/scenario.gql.private.d.ts +16 -16
- package/lib/scenario/scenario.service.d.ts +233 -233
- package/lib/scenario/scenario.types.d.ts +50 -50
- package/lib/trusted-parties/tp-assembly.d.ts +177 -177
- package/lib/trusted-parties/tp-assembly.gql.private.d.ts +5 -5
- package/lib/trusted-parties/tp-assembly.types.d.ts +38 -38
- package/lib/trusted-parties/tp-password-reset-request.service.d.ts +20 -20
- package/lib/trusted-parties/tp-password-reset-user.service.d.ts +35 -35
- package/lib/trusted-parties/tp-password-reset.constants.d.ts +3 -3
- package/lib/trusted-parties/tp-password-reset.controller.d.ts +10 -10
- package/lib/trusted-parties/tp-password-reset.gql.d.ts +223 -223
- package/lib/trusted-parties/tp-password-reset.service.d.ts +188 -188
- package/lib/trusted-parties/trusted-party.gql.d.ts +9 -9
- package/lib/trusted-parties/trusted-party.service.d.ts +44 -44
- package/lib/trusted-parties/trusted-party.types.d.ts +102 -102
- package/lib/trusted-parties/trusted-party2.gql.d.ts +79 -79
- package/lib/trusted-parties/trusted-party2.service.d.ts +114 -114
- package/lib/users/profile-details.service.d.ts +21 -21
- package/lib/users/profile.gql.d.ts +11 -11
- package/lib/users/profile.service.d.ts +35 -35
- package/lib/users/profile.types.d.ts +96 -96
- package/lib/users/user.gql.d.ts +9 -9
- package/lib/users/user.service.d.ts +12 -12
- package/lib/users/user.types.d.ts +23 -23
- package/lifeready-core.d.ts +12 -12
- package/package.json +1 -1
- package/public-api.d.ts +67 -67
|
@@ -1,109 +1,109 @@
|
|
|
1
|
-
import { __awaiter, __decorate } from "tslib";
|
|
2
|
-
import { Injectable, NgZone } from '@angular/core';
|
|
3
|
-
import { KeyGraphService } from '../../cryptography/key-graph.service';
|
|
4
|
-
import { RunOutsideAngular } from '../../_common/run-outside-angular';
|
|
5
|
-
import { processConnection, } from './common-processors.service';
|
|
6
|
-
import { LrBadRequestException } from '../../_common/exceptions';
|
|
7
|
-
import * as i0 from "@angular/core";
|
|
8
|
-
import * as i1 from "../../cryptography/key-graph.service";
|
|
9
|
-
let TpPasswordResetProcessorService = class TpPasswordResetProcessorService {
|
|
10
|
-
constructor(ngZone, keyGraph) {
|
|
11
|
-
this.ngZone = ngZone;
|
|
12
|
-
this.keyGraph = keyGraph;
|
|
13
|
-
}
|
|
14
|
-
processTpPasswordResetUserNode(node) {
|
|
15
|
-
var _a;
|
|
16
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
17
|
-
const pxk = ((_a = node.pxk) === null || _a === void 0 ? void 0 : _a.id) && (yield this.keyGraph.getKey(node.pxk.id));
|
|
18
|
-
const ret = Object.assign({}, node);
|
|
19
|
-
if (pxk && node.approvals) {
|
|
20
|
-
ret.approvals = yield Promise.all(node.approvals.map((approval) => this.processTpPasswordResetUserApprovalNode(approval, pxk)));
|
|
21
|
-
}
|
|
22
|
-
return ret;
|
|
23
|
-
});
|
|
24
|
-
}
|
|
25
|
-
processTpPasswordResetUserApprovalNode(approval, pxk) {
|
|
26
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
27
|
-
const ret = Object.assign({}, approval);
|
|
28
|
-
if (approval.receiverCipher) {
|
|
29
|
-
ret.receiverCipherClearJson = this.keyGraph.decryptFromString(pxk, approval.receiverCipher);
|
|
30
|
-
}
|
|
31
|
-
if (approval.receiverCipherPartialAssemblyKey) {
|
|
32
|
-
ret.receiverCipherPartialAssemblyKeyClearJson = yield this.keyGraph.decryptFromString(pxk, approval.receiverCipherPartialAssemblyKey);
|
|
33
|
-
}
|
|
34
|
-
return ret;
|
|
35
|
-
});
|
|
36
|
-
}
|
|
37
|
-
makeTpPasswordResetNodeProcessor() {
|
|
38
|
-
return ({ field, }) => __awaiter(this, void 0, void 0, function* () {
|
|
39
|
-
const ret = Object.assign({}, field);
|
|
40
|
-
if (field.assembly) {
|
|
41
|
-
if (field.applied == null) {
|
|
42
|
-
throw new LrBadRequestException('If you request for field "assembly" in the TpPasswordResetNode, then you must also request the "applied" field');
|
|
43
|
-
}
|
|
44
|
-
ret.assembly = yield this.processTpAssemblyNode(field.assembly, field.applied);
|
|
45
|
-
}
|
|
46
|
-
return ret;
|
|
47
|
-
});
|
|
48
|
-
}
|
|
49
|
-
processTpAssemblyNode(assembly, applied) {
|
|
50
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
51
|
-
// Subject key is encrypted user the master key. So if reset has been applied, then
|
|
52
|
-
// these keys are not available any more.
|
|
53
|
-
const { subjectKey, assemblyKey, assemblyCipherData, subAssemblies, } = assembly;
|
|
54
|
-
const ret = Object.assign(Object.assign({}, assembly), { subAssemblies: yield processConnection(subAssemblies, (node) => this.processTpSubAssemblyNode(node, subjectKey.id, applied)) });
|
|
55
|
-
if (!applied) {
|
|
56
|
-
if (assemblyCipherData) {
|
|
57
|
-
ret.assemblyCipherDataClearJson = yield this.keyGraph.decryptFromString(assemblyKey.id, assemblyCipherData);
|
|
58
|
-
}
|
|
59
|
-
}
|
|
60
|
-
return ret;
|
|
61
|
-
});
|
|
62
|
-
}
|
|
63
|
-
processTpSubAssemblyNode(subAssembly, subjectKeyId, applied) {
|
|
64
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
65
|
-
const { subjectCipherData, approvers } = subAssembly;
|
|
66
|
-
// const ret: TpSubAssemblyNode = {
|
|
67
|
-
// ...subAssembly,
|
|
68
|
-
// approvers: {
|
|
69
|
-
// ...approvers,
|
|
70
|
-
// edges: await Promise.all(
|
|
71
|
-
// approvers.edges.map(async (edge) => ({
|
|
72
|
-
// ...edge,
|
|
73
|
-
// node: await this.processTpAssemblyApproverNode(edge.node, applied),
|
|
74
|
-
// }))
|
|
75
|
-
// ),
|
|
76
|
-
// },
|
|
77
|
-
// };
|
|
78
|
-
const ret = Object.assign(Object.assign({}, subAssembly), { approvers: yield processConnection(approvers, (node) => this.processTpAssemblyApproverNode(node, applied)) });
|
|
79
|
-
if (!applied) {
|
|
80
|
-
if (subjectCipherData) {
|
|
81
|
-
ret.subjectCipherDataClearJson = yield this.keyGraph.decryptFromString(subjectKeyId, subjectCipherData);
|
|
82
|
-
}
|
|
83
|
-
}
|
|
84
|
-
return ret;
|
|
85
|
-
});
|
|
86
|
-
}
|
|
87
|
-
processTpAssemblyApproverNode(approver, applied) {
|
|
88
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
89
|
-
return approver;
|
|
90
|
-
});
|
|
91
|
-
}
|
|
92
|
-
};
|
|
93
|
-
TpPasswordResetProcessorService.ɵprov = i0.ɵɵdefineInjectable({ factory: function TpPasswordResetProcessorService_Factory() { return new TpPasswordResetProcessorService(i0.ɵɵinject(i0.NgZone), i0.ɵɵinject(i1.KeyGraphService)); }, token: TpPasswordResetProcessorService, providedIn: "root" });
|
|
94
|
-
TpPasswordResetProcessorService.decorators = [
|
|
95
|
-
{ type: Injectable, args: [{
|
|
96
|
-
providedIn: 'root',
|
|
97
|
-
},] }
|
|
98
|
-
];
|
|
99
|
-
TpPasswordResetProcessorService.ctorParameters = () => [
|
|
100
|
-
{ type: NgZone },
|
|
101
|
-
{ type: KeyGraphService }
|
|
102
|
-
];
|
|
103
|
-
TpPasswordResetProcessorService = __decorate([
|
|
104
|
-
RunOutsideAngular({
|
|
105
|
-
ngZoneName: 'ngZone',
|
|
106
|
-
})
|
|
107
|
-
], TpPasswordResetProcessorService);
|
|
108
|
-
export { TpPasswordResetProcessorService };
|
|
109
|
-
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"tp-password-reset-processor.service.js","sourceRoot":"C:/Projects/kc-client/projects/core/src/","sources":["lib/api/query-processor/tp-password-reset-processor.service.ts"],"names":[],"mappings":";AAAA,OAAO,EAAE,UAAU,EAAE,MAAM,EAAE,MAAM,eAAe,CAAC;AACnD,OAAO,EAAE,eAAe,EAAE,MAAM,sCAAsC,CAAC;AACvE,OAAO,EAAE,iBAAiB,EAAE,MAAM,mCAAmC,CAAC;AAQtE,OAAO,EACL,iBAAiB,GAElB,MAAM,6BAA6B,CAAC;AAOrC,OAAO,EAAE,qBAAqB,EAAE,MAAM,0BAA0B,CAAC;;;IAQpD,+BAA+B,SAA/B,+BAA+B;IAC1C,YAAoB,MAAc,EAAU,QAAyB;QAAjD,WAAM,GAAN,MAAM,CAAQ;QAAU,aAAQ,GAAR,QAAQ,CAAiB;IAAG,CAAC;IAEnE,8BAA8B,CAClC,IAA6B;;;YAE7B,MAAM,GAAG,GAAG,OAAA,IAAI,CAAC,GAAG,0CAAE,EAAE,KAAI,CAAC,MAAM,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,CAAC,CAAC;YAEtE,MAAM,GAAG,qBACJ,IAAI,CACR,CAAC;YAEF,IAAI,GAAG,IAAI,IAAI,CAAC,SAAS,EAAE;gBACzB,GAAG,CAAC,SAAS,GAAG,MAAM,OAAO,CAAC,GAAG,CAC/B,IAAI,CAAC,SAAS,CAAC,GAAG,CAAC,CAAC,QAAQ,EAAE,EAAE,CAC9B,IAAI,CAAC,sCAAsC,CAAC,QAAQ,EAAE,GAAG,CAAC,CAC3D,CACF,CAAC;aACH;YAED,OAAO,GAAG,CAAC;;KACZ;IAEa,sCAAsC,CAClD,QAAyC,EACzC,GAAQ;;YAER,MAAM,GAAG,qBACJ,QAAQ,CACZ,CAAC;YAEF,IAAI,QAAQ,CAAC,cAAc,EAAE;gBAC3B,GAAG,CAAC,uBAAuB,GAAG,IAAI,CAAC,QAAQ,CAAC,iBAAiB,CAC3D,GAAG,EACH,QAAQ,CAAC,cAAc,CACxB,CAAC;aACH;YAED,IAAI,QAAQ,CAAC,gCAAgC,EAAE;gBAC7C,GAAG,CAAC,yCAAyC,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC,iBAAiB,CACnF,GAAG,EACH,QAAQ,CAAC,gCAAgC,CAC1C,CAAC;aACH;YACD,OAAO,GAAG,CAAC;QACb,CAAC;KAAA;IAED,gCAAgC;QAC9B,OAAO,CAAO,EACZ,KAAK,GACmB,EAAgC,EAAE;YAC1D,MAAM,GAAG,qBACJ,KAAK,CACT,CAAC;YAEF,IAAI,KAAK,CAAC,QAAQ,EAAE;gBAClB,IAAI,KAAK,CAAC,OAAO,IAAI,IAAI,EAAE;oBACzB,MAAM,IAAI,qBAAqB,CAC7B,gHAAgH,CACjH,CAAC;iBACH;gBAED,GAAG,CAAC,QAAQ,GAAG,MAAM,IAAI,CAAC,qBAAqB,CAC7C,KAAK,CAAC,QAAQ,EACd,KAAK,CAAC,OAAO,CACd,CAAC;aACH;YAED,OAAO,GAAG,CAAC;QACb,CAAC,CAAA,CAAC;IACJ,CAAC;IAEa,qBAAqB,CACjC,QAAwB,EACxB,OAAgB;;YAEhB,mFAAmF;YACnF,yCAAyC;YACzC,MAAM,EACJ,UAAU,EACV,WAAW,EACX,kBAAkB,EAClB,aAAa,GACd,GAAG,QAAQ,CAAC;YAEb,MAAM,GAAG,mCACJ,QAAQ,KACX,aAAa,EAAE,MAAM,iBAAiB,CAAC,aAAa,EAAE,CAAC,IAAI,EAAE,EAAE,CAC7D,IAAI,CAAC,wBAAwB,CAAC,IAAI,EAAE,UAAU,CAAC,EAAE,EAAE,OAAO,CAAC,CAC5D,GACF,CAAC;YAEF,IAAI,CAAC,OAAO,EAAE;gBACZ,IAAI,kBAAkB,EAAE;oBACtB,GAAG,CAAC,2BAA2B,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC,iBAAiB,CACrE,WAAW,CAAC,EAAE,EACd,kBAAkB,CACnB,CAAC;iBACH;aACF;YAED,OAAO,GAAG,CAAC;QACb,CAAC;KAAA;IAEa,wBAAwB,CACpC,WAA8B,EAC9B,YAAgB,EAChB,OAAgB;;YAEhB,MAAM,EAAE,iBAAiB,EAAE,SAAS,EAAE,GAAG,WAAW,CAAC;YAErD,mCAAmC;YACnC,oBAAoB;YACpB,iBAAiB;YACjB,oBAAoB;YACpB,gCAAgC;YAChC,+CAA+C;YAC/C,mBAAmB;YACnB,8EAA8E;YAC9E,YAAY;YACZ,SAAS;YACT,OAAO;YACP,KAAK;YACL,MAAM,GAAG,mCACJ,WAAW,KACd,SAAS,EAAE,MAAM,iBAAiB,CAAC,SAAS,EAAE,CAAC,IAAI,EAAE,EAAE,CACrD,IAAI,CAAC,6BAA6B,CAAC,IAAI,EAAE,OAAO,CAAC,CAClD,GACF,CAAC;YAEF,IAAI,CAAC,OAAO,EAAE;gBACZ,IAAI,iBAAiB,EAAE;oBACrB,GAAG,CAAC,0BAA0B,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC,iBAAiB,CACpE,YAAY,EACZ,iBAAiB,CAClB,CAAC;iBACH;aACF;YAED,OAAO,GAAG,CAAC;QACb,CAAC;KAAA;IAEa,6BAA6B,CACzC,QAAgC,EAChC,OAAgB;;YAEhB,OAAO,QAAQ,CAAC;QAClB,CAAC;KAAA;CACF,CAAA;;;YAvJA,UAAU,SAAC;gBACV,UAAU,EAAE,MAAM;aACnB;;;YA3BoB,MAAM;YAClB,eAAe;;AA2BX,+BAA+B;IAN3C,iBAAiB,CAAC;QACjB,UAAU,EAAE,QAAQ;KACrB,CAAC;GAIW,+BAA+B,CAoJ3C;SApJY,+BAA+B","sourcesContent":["import { Injectable, NgZone } from '@angular/core';\r\nimport { KeyGraphService } from '../../cryptography/key-graph.service';\r\nimport { RunOutsideAngular } from '../../_common/run-outside-angular';\r\nimport {\r\n  ID,\r\n  SharedTpAssemblyNode,\r\n  TpAssemblyApproverNode,\r\n  TpAssemblyNode,\r\n  TpSubAssemblyNode,\r\n} from '../types';\r\nimport {\r\n  processConnection,\r\n  ProcessorCallbackParams,\r\n} from './common-processors.service';\r\nimport {\r\n  TpPasswordResetUserNode,\r\n  TpPasswordResetUserApprovalNode,\r\n  TpPasswordResetNode,\r\n} from '../types';\r\nimport { Key } from '../../cryptography/cryptography.types';\r\nimport { LrBadRequestException } from '../../_common/exceptions';\r\n\r\n@RunOutsideAngular({\r\n  ngZoneName: 'ngZone',\r\n})\r\n@Injectable({\r\n  providedIn: 'root',\r\n})\r\nexport class TpPasswordResetProcessorService {\r\n  constructor(private ngZone: NgZone, private keyGraph: KeyGraphService) {}\r\n\r\n  async processTpPasswordResetUserNode(\r\n    node: TpPasswordResetUserNode\r\n  ): Promise<TpPasswordResetUserNode> {\r\n    const pxk = node.pxk?.id && (await this.keyGraph.getKey(node.pxk.id));\r\n\r\n    const ret = {\r\n      ...node,\r\n    };\r\n\r\n    if (pxk && node.approvals) {\r\n      ret.approvals = await Promise.all(\r\n        node.approvals.map((approval) =>\r\n          this.processTpPasswordResetUserApprovalNode(approval, pxk)\r\n        )\r\n      );\r\n    }\r\n\r\n    return ret;\r\n  }\r\n\r\n  private async processTpPasswordResetUserApprovalNode(\r\n    approval: TpPasswordResetUserApprovalNode,\r\n    pxk: Key\r\n  ) {\r\n    const ret = {\r\n      ...approval,\r\n    };\r\n\r\n    if (approval.receiverCipher) {\r\n      ret.receiverCipherClearJson = this.keyGraph.decryptFromString(\r\n        pxk,\r\n        approval.receiverCipher\r\n      );\r\n    }\r\n\r\n    if (approval.receiverCipherPartialAssemblyKey) {\r\n      ret.receiverCipherPartialAssemblyKeyClearJson = await this.keyGraph.decryptFromString(\r\n        pxk,\r\n        approval.receiverCipherPartialAssemblyKey\r\n      );\r\n    }\r\n    return ret;\r\n  }\r\n\r\n  makeTpPasswordResetNodeProcessor() {\r\n    return async ({\r\n      field,\r\n    }: ProcessorCallbackParams): Promise<TpPasswordResetNode> => {\r\n      const ret = {\r\n        ...field,\r\n      };\r\n\r\n      if (field.assembly) {\r\n        if (field.applied == null) {\r\n          throw new LrBadRequestException(\r\n            'If you request for field \"assembly\" in the TpPasswordResetNode, then you must also request the \"applied\" field'\r\n          );\r\n        }\r\n\r\n        ret.assembly = await this.processTpAssemblyNode(\r\n          field.assembly,\r\n          field.applied\r\n        );\r\n      }\r\n\r\n      return ret;\r\n    };\r\n  }\r\n\r\n  private async processTpAssemblyNode(\r\n    assembly: TpAssemblyNode,\r\n    applied: boolean\r\n  ): Promise<TpAssemblyNode> {\r\n    // Subject key is encrypted user the master key. So if reset has been applied, then\r\n    // these keys are not available any more.\r\n    const {\r\n      subjectKey,\r\n      assemblyKey,\r\n      assemblyCipherData,\r\n      subAssemblies,\r\n    } = assembly;\r\n\r\n    const ret: TpAssemblyNode = {\r\n      ...assembly,\r\n      subAssemblies: await processConnection(subAssemblies, (node) =>\r\n        this.processTpSubAssemblyNode(node, subjectKey.id, applied)\r\n      ),\r\n    };\r\n\r\n    if (!applied) {\r\n      if (assemblyCipherData) {\r\n        ret.assemblyCipherDataClearJson = await this.keyGraph.decryptFromString(\r\n          assemblyKey.id,\r\n          assemblyCipherData\r\n        );\r\n      }\r\n    }\r\n\r\n    return ret;\r\n  }\r\n\r\n  private async processTpSubAssemblyNode(\r\n    subAssembly: TpSubAssemblyNode,\r\n    subjectKeyId: ID,\r\n    applied: boolean\r\n  ): Promise<TpSubAssemblyNode> {\r\n    const { subjectCipherData, approvers } = subAssembly;\r\n\r\n    // const ret: TpSubAssemblyNode = {\r\n    //   ...subAssembly,\r\n    //   approvers: {\r\n    //     ...approvers,\r\n    //     edges: await Promise.all(\r\n    //       approvers.edges.map(async (edge) => ({\r\n    //         ...edge,\r\n    //         node: await this.processTpAssemblyApproverNode(edge.node, applied),\r\n    //       }))\r\n    //     ),\r\n    //   },\r\n    // };\r\n    const ret: TpSubAssemblyNode = {\r\n      ...subAssembly,\r\n      approvers: await processConnection(approvers, (node) =>\r\n        this.processTpAssemblyApproverNode(node, applied)\r\n      ),\r\n    };\r\n\r\n    if (!applied) {\r\n      if (subjectCipherData) {\r\n        ret.subjectCipherDataClearJson = await this.keyGraph.decryptFromString(\r\n          subjectKeyId,\r\n          subjectCipherData\r\n        );\r\n      }\r\n    }\r\n\r\n    return ret;\r\n  }\r\n\r\n  private async processTpAssemblyApproverNode(\r\n    approver: TpAssemblyApproverNode,\r\n    applied: boolean\r\n  ) {\r\n    return approver;\r\n  }\r\n}\r\n"]}
|
|
1
|
+
import { __awaiter, __decorate } from "tslib";
|
|
2
|
+
import { Injectable, NgZone } from '@angular/core';
|
|
3
|
+
import { KeyGraphService } from '../../cryptography/key-graph.service';
|
|
4
|
+
import { RunOutsideAngular } from '../../_common/run-outside-angular';
|
|
5
|
+
import { processConnection, } from './common-processors.service';
|
|
6
|
+
import { LrBadRequestException } from '../../_common/exceptions';
|
|
7
|
+
import * as i0 from "@angular/core";
|
|
8
|
+
import * as i1 from "../../cryptography/key-graph.service";
|
|
9
|
+
let TpPasswordResetProcessorService = class TpPasswordResetProcessorService {
|
|
10
|
+
constructor(ngZone, keyGraph) {
|
|
11
|
+
this.ngZone = ngZone;
|
|
12
|
+
this.keyGraph = keyGraph;
|
|
13
|
+
}
|
|
14
|
+
processTpPasswordResetUserNode(node) {
|
|
15
|
+
var _a;
|
|
16
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
17
|
+
const pxk = ((_a = node.pxk) === null || _a === void 0 ? void 0 : _a.id) && (yield this.keyGraph.getKey(node.pxk.id));
|
|
18
|
+
const ret = Object.assign({}, node);
|
|
19
|
+
if (pxk && node.approvals) {
|
|
20
|
+
ret.approvals = yield Promise.all(node.approvals.map((approval) => this.processTpPasswordResetUserApprovalNode(approval, pxk)));
|
|
21
|
+
}
|
|
22
|
+
return ret;
|
|
23
|
+
});
|
|
24
|
+
}
|
|
25
|
+
processTpPasswordResetUserApprovalNode(approval, pxk) {
|
|
26
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
27
|
+
const ret = Object.assign({}, approval);
|
|
28
|
+
if (approval.receiverCipher) {
|
|
29
|
+
ret.receiverCipherClearJson = this.keyGraph.decryptFromString(pxk, approval.receiverCipher);
|
|
30
|
+
}
|
|
31
|
+
if (approval.receiverCipherPartialAssemblyKey) {
|
|
32
|
+
ret.receiverCipherPartialAssemblyKeyClearJson = yield this.keyGraph.decryptFromString(pxk, approval.receiverCipherPartialAssemblyKey);
|
|
33
|
+
}
|
|
34
|
+
return ret;
|
|
35
|
+
});
|
|
36
|
+
}
|
|
37
|
+
makeTpPasswordResetNodeProcessor() {
|
|
38
|
+
return ({ field, }) => __awaiter(this, void 0, void 0, function* () {
|
|
39
|
+
const ret = Object.assign({}, field);
|
|
40
|
+
if (field.assembly) {
|
|
41
|
+
if (field.applied == null) {
|
|
42
|
+
throw new LrBadRequestException('If you request for field "assembly" in the TpPasswordResetNode, then you must also request the "applied" field');
|
|
43
|
+
}
|
|
44
|
+
ret.assembly = yield this.processTpAssemblyNode(field.assembly, field.applied);
|
|
45
|
+
}
|
|
46
|
+
return ret;
|
|
47
|
+
});
|
|
48
|
+
}
|
|
49
|
+
processTpAssemblyNode(assembly, applied) {
|
|
50
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
51
|
+
// Subject key is encrypted user the master key. So if reset has been applied, then
|
|
52
|
+
// these keys are not available any more.
|
|
53
|
+
const { subjectKey, assemblyKey, assemblyCipherData, subAssemblies, } = assembly;
|
|
54
|
+
const ret = Object.assign(Object.assign({}, assembly), { subAssemblies: yield processConnection(subAssemblies, (node) => this.processTpSubAssemblyNode(node, subjectKey.id, applied)) });
|
|
55
|
+
if (!applied) {
|
|
56
|
+
if (assemblyCipherData) {
|
|
57
|
+
ret.assemblyCipherDataClearJson = yield this.keyGraph.decryptFromString(assemblyKey.id, assemblyCipherData);
|
|
58
|
+
}
|
|
59
|
+
}
|
|
60
|
+
return ret;
|
|
61
|
+
});
|
|
62
|
+
}
|
|
63
|
+
processTpSubAssemblyNode(subAssembly, subjectKeyId, applied) {
|
|
64
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
65
|
+
const { subjectCipherData, approvers } = subAssembly;
|
|
66
|
+
// const ret: TpSubAssemblyNode = {
|
|
67
|
+
// ...subAssembly,
|
|
68
|
+
// approvers: {
|
|
69
|
+
// ...approvers,
|
|
70
|
+
// edges: await Promise.all(
|
|
71
|
+
// approvers.edges.map(async (edge) => ({
|
|
72
|
+
// ...edge,
|
|
73
|
+
// node: await this.processTpAssemblyApproverNode(edge.node, applied),
|
|
74
|
+
// }))
|
|
75
|
+
// ),
|
|
76
|
+
// },
|
|
77
|
+
// };
|
|
78
|
+
const ret = Object.assign(Object.assign({}, subAssembly), { approvers: yield processConnection(approvers, (node) => this.processTpAssemblyApproverNode(node, applied)) });
|
|
79
|
+
if (!applied) {
|
|
80
|
+
if (subjectCipherData) {
|
|
81
|
+
ret.subjectCipherDataClearJson = yield this.keyGraph.decryptFromString(subjectKeyId, subjectCipherData);
|
|
82
|
+
}
|
|
83
|
+
}
|
|
84
|
+
return ret;
|
|
85
|
+
});
|
|
86
|
+
}
|
|
87
|
+
processTpAssemblyApproverNode(approver, applied) {
|
|
88
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
89
|
+
return approver;
|
|
90
|
+
});
|
|
91
|
+
}
|
|
92
|
+
};
|
|
93
|
+
TpPasswordResetProcessorService.ɵprov = i0.ɵɵdefineInjectable({ factory: function TpPasswordResetProcessorService_Factory() { return new TpPasswordResetProcessorService(i0.ɵɵinject(i0.NgZone), i0.ɵɵinject(i1.KeyGraphService)); }, token: TpPasswordResetProcessorService, providedIn: "root" });
|
|
94
|
+
TpPasswordResetProcessorService.decorators = [
|
|
95
|
+
{ type: Injectable, args: [{
|
|
96
|
+
providedIn: 'root',
|
|
97
|
+
},] }
|
|
98
|
+
];
|
|
99
|
+
TpPasswordResetProcessorService.ctorParameters = () => [
|
|
100
|
+
{ type: NgZone },
|
|
101
|
+
{ type: KeyGraphService }
|
|
102
|
+
];
|
|
103
|
+
TpPasswordResetProcessorService = __decorate([
|
|
104
|
+
RunOutsideAngular({
|
|
105
|
+
ngZoneName: 'ngZone',
|
|
106
|
+
})
|
|
107
|
+
], TpPasswordResetProcessorService);
|
|
108
|
+
export { TpPasswordResetProcessorService };
|
|
109
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"tp-password-reset-processor.service.js","sourceRoot":"/opt/atlassian/pipelines/agent/build/projects/core/src/","sources":["lib/api/query-processor/tp-password-reset-processor.service.ts"],"names":[],"mappings":";AAAA,OAAO,EAAE,UAAU,EAAE,MAAM,EAAE,MAAM,eAAe,CAAC;AACnD,OAAO,EAAE,eAAe,EAAE,MAAM,sCAAsC,CAAC;AACvE,OAAO,EAAE,iBAAiB,EAAE,MAAM,mCAAmC,CAAC;AAQtE,OAAO,EACL,iBAAiB,GAElB,MAAM,6BAA6B,CAAC;AAOrC,OAAO,EAAE,qBAAqB,EAAE,MAAM,0BAA0B,CAAC;;;IAQpD,+BAA+B,SAA/B,+BAA+B;IAC1C,YAAoB,MAAc,EAAU,QAAyB;QAAjD,WAAM,GAAN,MAAM,CAAQ;QAAU,aAAQ,GAAR,QAAQ,CAAiB;IAAG,CAAC;IAEnE,8BAA8B,CAClC,IAA6B;;;YAE7B,MAAM,GAAG,GAAG,OAAA,IAAI,CAAC,GAAG,0CAAE,EAAE,KAAI,CAAC,MAAM,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,CAAC,CAAC;YAEtE,MAAM,GAAG,qBACJ,IAAI,CACR,CAAC;YAEF,IAAI,GAAG,IAAI,IAAI,CAAC,SAAS,EAAE;gBACzB,GAAG,CAAC,SAAS,GAAG,MAAM,OAAO,CAAC,GAAG,CAC/B,IAAI,CAAC,SAAS,CAAC,GAAG,CAAC,CAAC,QAAQ,EAAE,EAAE,CAC9B,IAAI,CAAC,sCAAsC,CAAC,QAAQ,EAAE,GAAG,CAAC,CAC3D,CACF,CAAC;aACH;YAED,OAAO,GAAG,CAAC;;KACZ;IAEa,sCAAsC,CAClD,QAAyC,EACzC,GAAQ;;YAER,MAAM,GAAG,qBACJ,QAAQ,CACZ,CAAC;YAEF,IAAI,QAAQ,CAAC,cAAc,EAAE;gBAC3B,GAAG,CAAC,uBAAuB,GAAG,IAAI,CAAC,QAAQ,CAAC,iBAAiB,CAC3D,GAAG,EACH,QAAQ,CAAC,cAAc,CACxB,CAAC;aACH;YAED,IAAI,QAAQ,CAAC,gCAAgC,EAAE;gBAC7C,GAAG,CAAC,yCAAyC,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC,iBAAiB,CACnF,GAAG,EACH,QAAQ,CAAC,gCAAgC,CAC1C,CAAC;aACH;YACD,OAAO,GAAG,CAAC;QACb,CAAC;KAAA;IAED,gCAAgC;QAC9B,OAAO,CAAO,EACZ,KAAK,GACmB,EAAgC,EAAE;YAC1D,MAAM,GAAG,qBACJ,KAAK,CACT,CAAC;YAEF,IAAI,KAAK,CAAC,QAAQ,EAAE;gBAClB,IAAI,KAAK,CAAC,OAAO,IAAI,IAAI,EAAE;oBACzB,MAAM,IAAI,qBAAqB,CAC7B,gHAAgH,CACjH,CAAC;iBACH;gBAED,GAAG,CAAC,QAAQ,GAAG,MAAM,IAAI,CAAC,qBAAqB,CAC7C,KAAK,CAAC,QAAQ,EACd,KAAK,CAAC,OAAO,CACd,CAAC;aACH;YAED,OAAO,GAAG,CAAC;QACb,CAAC,CAAA,CAAC;IACJ,CAAC;IAEa,qBAAqB,CACjC,QAAwB,EACxB,OAAgB;;YAEhB,mFAAmF;YACnF,yCAAyC;YACzC,MAAM,EACJ,UAAU,EACV,WAAW,EACX,kBAAkB,EAClB,aAAa,GACd,GAAG,QAAQ,CAAC;YAEb,MAAM,GAAG,mCACJ,QAAQ,KACX,aAAa,EAAE,MAAM,iBAAiB,CAAC,aAAa,EAAE,CAAC,IAAI,EAAE,EAAE,CAC7D,IAAI,CAAC,wBAAwB,CAAC,IAAI,EAAE,UAAU,CAAC,EAAE,EAAE,OAAO,CAAC,CAC5D,GACF,CAAC;YAEF,IAAI,CAAC,OAAO,EAAE;gBACZ,IAAI,kBAAkB,EAAE;oBACtB,GAAG,CAAC,2BAA2B,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC,iBAAiB,CACrE,WAAW,CAAC,EAAE,EACd,kBAAkB,CACnB,CAAC;iBACH;aACF;YAED,OAAO,GAAG,CAAC;QACb,CAAC;KAAA;IAEa,wBAAwB,CACpC,WAA8B,EAC9B,YAAgB,EAChB,OAAgB;;YAEhB,MAAM,EAAE,iBAAiB,EAAE,SAAS,EAAE,GAAG,WAAW,CAAC;YAErD,mCAAmC;YACnC,oBAAoB;YACpB,iBAAiB;YACjB,oBAAoB;YACpB,gCAAgC;YAChC,+CAA+C;YAC/C,mBAAmB;YACnB,8EAA8E;YAC9E,YAAY;YACZ,SAAS;YACT,OAAO;YACP,KAAK;YACL,MAAM,GAAG,mCACJ,WAAW,KACd,SAAS,EAAE,MAAM,iBAAiB,CAAC,SAAS,EAAE,CAAC,IAAI,EAAE,EAAE,CACrD,IAAI,CAAC,6BAA6B,CAAC,IAAI,EAAE,OAAO,CAAC,CAClD,GACF,CAAC;YAEF,IAAI,CAAC,OAAO,EAAE;gBACZ,IAAI,iBAAiB,EAAE;oBACrB,GAAG,CAAC,0BAA0B,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC,iBAAiB,CACpE,YAAY,EACZ,iBAAiB,CAClB,CAAC;iBACH;aACF;YAED,OAAO,GAAG,CAAC;QACb,CAAC;KAAA;IAEa,6BAA6B,CACzC,QAAgC,EAChC,OAAgB;;YAEhB,OAAO,QAAQ,CAAC;QAClB,CAAC;KAAA;CACF,CAAA;;;YAvJA,UAAU,SAAC;gBACV,UAAU,EAAE,MAAM;aACnB;;;YA3BoB,MAAM;YAClB,eAAe;;AA2BX,+BAA+B;IAN3C,iBAAiB,CAAC;QACjB,UAAU,EAAE,QAAQ;KACrB,CAAC;GAIW,+BAA+B,CAoJ3C;SApJY,+BAA+B","sourcesContent":["import { Injectable, NgZone } from '@angular/core';\nimport { KeyGraphService } from '../../cryptography/key-graph.service';\nimport { RunOutsideAngular } from '../../_common/run-outside-angular';\nimport {\n  ID,\n  SharedTpAssemblyNode,\n  TpAssemblyApproverNode,\n  TpAssemblyNode,\n  TpSubAssemblyNode,\n} from '../types';\nimport {\n  processConnection,\n  ProcessorCallbackParams,\n} from './common-processors.service';\nimport {\n  TpPasswordResetUserNode,\n  TpPasswordResetUserApprovalNode,\n  TpPasswordResetNode,\n} from '../types';\nimport { Key } from '../../cryptography/cryptography.types';\nimport { LrBadRequestException } from '../../_common/exceptions';\n\n@RunOutsideAngular({\n  ngZoneName: 'ngZone',\n})\n@Injectable({\n  providedIn: 'root',\n})\nexport class TpPasswordResetProcessorService {\n  constructor(private ngZone: NgZone, private keyGraph: KeyGraphService) {}\n\n  async processTpPasswordResetUserNode(\n    node: TpPasswordResetUserNode\n  ): Promise<TpPasswordResetUserNode> {\n    const pxk = node.pxk?.id && (await this.keyGraph.getKey(node.pxk.id));\n\n    const ret = {\n      ...node,\n    };\n\n    if (pxk && node.approvals) {\n      ret.approvals = await Promise.all(\n        node.approvals.map((approval) =>\n          this.processTpPasswordResetUserApprovalNode(approval, pxk)\n        )\n      );\n    }\n\n    return ret;\n  }\n\n  private async processTpPasswordResetUserApprovalNode(\n    approval: TpPasswordResetUserApprovalNode,\n    pxk: Key\n  ) {\n    const ret = {\n      ...approval,\n    };\n\n    if (approval.receiverCipher) {\n      ret.receiverCipherClearJson = this.keyGraph.decryptFromString(\n        pxk,\n        approval.receiverCipher\n      );\n    }\n\n    if (approval.receiverCipherPartialAssemblyKey) {\n      ret.receiverCipherPartialAssemblyKeyClearJson = await this.keyGraph.decryptFromString(\n        pxk,\n        approval.receiverCipherPartialAssemblyKey\n      );\n    }\n    return ret;\n  }\n\n  makeTpPasswordResetNodeProcessor() {\n    return async ({\n      field,\n    }: ProcessorCallbackParams): Promise<TpPasswordResetNode> => {\n      const ret = {\n        ...field,\n      };\n\n      if (field.assembly) {\n        if (field.applied == null) {\n          throw new LrBadRequestException(\n            'If you request for field \"assembly\" in the TpPasswordResetNode, then you must also request the \"applied\" field'\n          );\n        }\n\n        ret.assembly = await this.processTpAssemblyNode(\n          field.assembly,\n          field.applied\n        );\n      }\n\n      return ret;\n    };\n  }\n\n  private async processTpAssemblyNode(\n    assembly: TpAssemblyNode,\n    applied: boolean\n  ): Promise<TpAssemblyNode> {\n    // Subject key is encrypted user the master key. So if reset has been applied, then\n    // these keys are not available any more.\n    const {\n      subjectKey,\n      assemblyKey,\n      assemblyCipherData,\n      subAssemblies,\n    } = assembly;\n\n    const ret: TpAssemblyNode = {\n      ...assembly,\n      subAssemblies: await processConnection(subAssemblies, (node) =>\n        this.processTpSubAssemblyNode(node, subjectKey.id, applied)\n      ),\n    };\n\n    if (!applied) {\n      if (assemblyCipherData) {\n        ret.assemblyCipherDataClearJson = await this.keyGraph.decryptFromString(\n          assemblyKey.id,\n          assemblyCipherData\n        );\n      }\n    }\n\n    return ret;\n  }\n\n  private async processTpSubAssemblyNode(\n    subAssembly: TpSubAssemblyNode,\n    subjectKeyId: ID,\n    applied: boolean\n  ): Promise<TpSubAssemblyNode> {\n    const { subjectCipherData, approvers } = subAssembly;\n\n    // const ret: TpSubAssemblyNode = {\n    //   ...subAssembly,\n    //   approvers: {\n    //     ...approvers,\n    //     edges: await Promise.all(\n    //       approvers.edges.map(async (edge) => ({\n    //         ...edge,\n    //         node: await this.processTpAssemblyApproverNode(edge.node, applied),\n    //       }))\n    //     ),\n    //   },\n    // };\n    const ret: TpSubAssemblyNode = {\n      ...subAssembly,\n      approvers: await processConnection(approvers, (node) =>\n        this.processTpAssemblyApproverNode(node, applied)\n      ),\n    };\n\n    if (!applied) {\n      if (subjectCipherData) {\n        ret.subjectCipherDataClearJson = await this.keyGraph.decryptFromString(\n          subjectKeyId,\n          subjectCipherData\n        );\n      }\n    }\n\n    return ret;\n  }\n\n  private async processTpAssemblyApproverNode(\n    approver: TpAssemblyApproverNode,\n    applied: boolean\n  ) {\n    return approver;\n  }\n}\n"]}
|
|
@@ -1,119 +1,119 @@
|
|
|
1
|
-
import { __awaiter } from "tslib";
|
|
2
|
-
import { Injectable } from '@angular/core';
|
|
3
|
-
import gql from 'graphql-tag';
|
|
4
|
-
import { EncryptionService } from '../cryptography/encryption.service';
|
|
5
|
-
import { KeyGraphService } from '../cryptography/key-graph.service';
|
|
6
|
-
import { KeyService } from '../cryptography/key.service';
|
|
7
|
-
import { ContactCardName } from '../users/profile.types';
|
|
8
|
-
import { LrApolloService } from './lr-apollo.service';
|
|
9
|
-
import * as i0 from "@angular/core";
|
|
10
|
-
import * as i1 from "../cryptography/key.service";
|
|
11
|
-
import * as i2 from "./lr-apollo.service";
|
|
12
|
-
import * as i3 from "../cryptography/key-graph.service";
|
|
13
|
-
import * as i4 from "../cryptography/encryption.service";
|
|
14
|
-
export const SharedContactCardFields = `
|
|
15
|
-
id
|
|
16
|
-
owner {
|
|
17
|
-
id
|
|
18
|
-
username
|
|
19
|
-
}
|
|
20
|
-
ownerKey {
|
|
21
|
-
id
|
|
22
|
-
}
|
|
23
|
-
ownerCipherData
|
|
24
|
-
receiver {
|
|
25
|
-
id
|
|
26
|
-
username
|
|
27
|
-
}
|
|
28
|
-
receiverKey {
|
|
29
|
-
id
|
|
30
|
-
}
|
|
31
|
-
receiverCipherData
|
|
32
|
-
sharedKey {
|
|
33
|
-
id
|
|
34
|
-
}
|
|
35
|
-
sharedCipherData
|
|
36
|
-
sharedCipherDataSig
|
|
37
|
-
sharedCipherDataSigPxk {
|
|
38
|
-
id
|
|
39
|
-
}
|
|
40
|
-
`;
|
|
41
|
-
const UpdateOwnedContactCard = gql `
|
|
42
|
-
mutation UpdateOwnedContactCard(
|
|
43
|
-
$input: UpdateOwnedContactCardInput!
|
|
44
|
-
) {
|
|
45
|
-
updateOwnedContactCard(
|
|
46
|
-
input: $input
|
|
47
|
-
) {
|
|
48
|
-
ownedContactCard {
|
|
49
|
-
${SharedContactCardFields}
|
|
50
|
-
}
|
|
51
|
-
}
|
|
52
|
-
}`;
|
|
53
|
-
export class SharedContactCardService {
|
|
54
|
-
constructor(keyService, lrApollo, keyGraph, encryptionService) {
|
|
55
|
-
this.keyService = keyService;
|
|
56
|
-
this.lrApollo = lrApollo;
|
|
57
|
-
this.keyGraph = keyGraph;
|
|
58
|
-
this.encryptionService = encryptionService;
|
|
59
|
-
}
|
|
60
|
-
decryptSharedTrustedPartyDetails(cc) {
|
|
61
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
62
|
-
const details = yield this.decryptTrustedPartyDetails(cc);
|
|
63
|
-
return Object.assign({ id: cc.id, ownedKeyId: cc.ownerKey.id, sharedKeyId: cc.sharedKey.id }, details);
|
|
64
|
-
});
|
|
65
|
-
}
|
|
66
|
-
decryptTrustedPartyDetails(cc) {
|
|
67
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
68
|
-
if (cc && cc.sharedKey && cc.sharedCipherData) {
|
|
69
|
-
try {
|
|
70
|
-
return yield this.encryptionService.decrypt(yield this.keyGraph.getJwkKey(cc.sharedKey.id), cc.sharedCipherData);
|
|
71
|
-
}
|
|
72
|
-
catch (e) {
|
|
73
|
-
console.error('Cannot decrypt trusted party details', e);
|
|
74
|
-
}
|
|
75
|
-
}
|
|
76
|
-
return null;
|
|
77
|
-
});
|
|
78
|
-
}
|
|
79
|
-
updateMySharedContactCard(id, ownedKeyId, sharedKeyId, contactCard) {
|
|
80
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
81
|
-
const ownerKey = yield this.keyGraph.getKey(ownedKeyId);
|
|
82
|
-
const sharedKey = yield this.keyGraph.getKey(sharedKeyId);
|
|
83
|
-
const sigPxk = yield this.keyService.getCurrentSigPxk();
|
|
84
|
-
const sharedCipherData = yield this.encryptionService.encrypt(sharedKey.jwk, contactCard);
|
|
85
|
-
const sharedCipherDataSig = JSON.stringify(yield this.encryptionService.sign(sigPxk.jwk, sharedCipherData));
|
|
86
|
-
const ownerPlainData = {
|
|
87
|
-
name: new ContactCardName(contactCard.name),
|
|
88
|
-
};
|
|
89
|
-
const ownerPlainDataSig = JSON.stringify(yield this.encryptionService.sign(sigPxk.jwk, ownerPlainData));
|
|
90
|
-
yield this.lrApollo.mutate({
|
|
91
|
-
mutation: UpdateOwnedContactCard,
|
|
92
|
-
variables: {
|
|
93
|
-
input: {
|
|
94
|
-
id,
|
|
95
|
-
ownerCipherData: '',
|
|
96
|
-
ownerKeyId: ownerKey.id,
|
|
97
|
-
sharedCipherDataSig,
|
|
98
|
-
sharedKeyId: sharedKey.id,
|
|
99
|
-
sigPxkId: sigPxk.id,
|
|
100
|
-
ownerPlainDataSig,
|
|
101
|
-
},
|
|
102
|
-
},
|
|
103
|
-
});
|
|
104
|
-
});
|
|
105
|
-
}
|
|
106
|
-
}
|
|
107
|
-
SharedContactCardService.ɵprov = i0.ɵɵdefineInjectable({ factory: function SharedContactCardService_Factory() { return new SharedContactCardService(i0.ɵɵinject(i1.KeyService), i0.ɵɵinject(i2.LrApolloService), i0.ɵɵinject(i3.KeyGraphService), i0.ɵɵinject(i4.EncryptionService)); }, token: SharedContactCardService, providedIn: "root" });
|
|
108
|
-
SharedContactCardService.decorators = [
|
|
109
|
-
{ type: Injectable, args: [{
|
|
110
|
-
providedIn: 'root',
|
|
111
|
-
},] }
|
|
112
|
-
];
|
|
113
|
-
SharedContactCardService.ctorParameters = () => [
|
|
114
|
-
{ type: KeyService },
|
|
115
|
-
{ type: LrApolloService },
|
|
116
|
-
{ type: KeyGraphService },
|
|
117
|
-
{ type: EncryptionService }
|
|
118
|
-
];
|
|
119
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
1
|
+
import { __awaiter } from "tslib";
|
|
2
|
+
import { Injectable } from '@angular/core';
|
|
3
|
+
import gql from 'graphql-tag';
|
|
4
|
+
import { EncryptionService } from '../cryptography/encryption.service';
|
|
5
|
+
import { KeyGraphService } from '../cryptography/key-graph.service';
|
|
6
|
+
import { KeyService } from '../cryptography/key.service';
|
|
7
|
+
import { ContactCardName } from '../users/profile.types';
|
|
8
|
+
import { LrApolloService } from './lr-apollo.service';
|
|
9
|
+
import * as i0 from "@angular/core";
|
|
10
|
+
import * as i1 from "../cryptography/key.service";
|
|
11
|
+
import * as i2 from "./lr-apollo.service";
|
|
12
|
+
import * as i3 from "../cryptography/key-graph.service";
|
|
13
|
+
import * as i4 from "../cryptography/encryption.service";
|
|
14
|
+
export const SharedContactCardFields = `
|
|
15
|
+
id
|
|
16
|
+
owner {
|
|
17
|
+
id
|
|
18
|
+
username
|
|
19
|
+
}
|
|
20
|
+
ownerKey {
|
|
21
|
+
id
|
|
22
|
+
}
|
|
23
|
+
ownerCipherData
|
|
24
|
+
receiver {
|
|
25
|
+
id
|
|
26
|
+
username
|
|
27
|
+
}
|
|
28
|
+
receiverKey {
|
|
29
|
+
id
|
|
30
|
+
}
|
|
31
|
+
receiverCipherData
|
|
32
|
+
sharedKey {
|
|
33
|
+
id
|
|
34
|
+
}
|
|
35
|
+
sharedCipherData
|
|
36
|
+
sharedCipherDataSig
|
|
37
|
+
sharedCipherDataSigPxk {
|
|
38
|
+
id
|
|
39
|
+
}
|
|
40
|
+
`;
|
|
41
|
+
const UpdateOwnedContactCard = gql `
|
|
42
|
+
mutation UpdateOwnedContactCard(
|
|
43
|
+
$input: UpdateOwnedContactCardInput!
|
|
44
|
+
) {
|
|
45
|
+
updateOwnedContactCard(
|
|
46
|
+
input: $input
|
|
47
|
+
) {
|
|
48
|
+
ownedContactCard {
|
|
49
|
+
${SharedContactCardFields}
|
|
50
|
+
}
|
|
51
|
+
}
|
|
52
|
+
}`;
|
|
53
|
+
export class SharedContactCardService {
|
|
54
|
+
constructor(keyService, lrApollo, keyGraph, encryptionService) {
|
|
55
|
+
this.keyService = keyService;
|
|
56
|
+
this.lrApollo = lrApollo;
|
|
57
|
+
this.keyGraph = keyGraph;
|
|
58
|
+
this.encryptionService = encryptionService;
|
|
59
|
+
}
|
|
60
|
+
decryptSharedTrustedPartyDetails(cc) {
|
|
61
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
62
|
+
const details = yield this.decryptTrustedPartyDetails(cc);
|
|
63
|
+
return Object.assign({ id: cc.id, ownedKeyId: cc.ownerKey.id, sharedKeyId: cc.sharedKey.id }, details);
|
|
64
|
+
});
|
|
65
|
+
}
|
|
66
|
+
decryptTrustedPartyDetails(cc) {
|
|
67
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
68
|
+
if (cc && cc.sharedKey && cc.sharedCipherData) {
|
|
69
|
+
try {
|
|
70
|
+
return yield this.encryptionService.decrypt(yield this.keyGraph.getJwkKey(cc.sharedKey.id), cc.sharedCipherData);
|
|
71
|
+
}
|
|
72
|
+
catch (e) {
|
|
73
|
+
console.error('Cannot decrypt trusted party details', e);
|
|
74
|
+
}
|
|
75
|
+
}
|
|
76
|
+
return null;
|
|
77
|
+
});
|
|
78
|
+
}
|
|
79
|
+
updateMySharedContactCard(id, ownedKeyId, sharedKeyId, contactCard) {
|
|
80
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
81
|
+
const ownerKey = yield this.keyGraph.getKey(ownedKeyId);
|
|
82
|
+
const sharedKey = yield this.keyGraph.getKey(sharedKeyId);
|
|
83
|
+
const sigPxk = yield this.keyService.getCurrentSigPxk();
|
|
84
|
+
const sharedCipherData = yield this.encryptionService.encrypt(sharedKey.jwk, contactCard);
|
|
85
|
+
const sharedCipherDataSig = JSON.stringify(yield this.encryptionService.sign(sigPxk.jwk, sharedCipherData));
|
|
86
|
+
const ownerPlainData = {
|
|
87
|
+
name: new ContactCardName(contactCard.name),
|
|
88
|
+
};
|
|
89
|
+
const ownerPlainDataSig = JSON.stringify(yield this.encryptionService.sign(sigPxk.jwk, ownerPlainData));
|
|
90
|
+
yield this.lrApollo.mutate({
|
|
91
|
+
mutation: UpdateOwnedContactCard,
|
|
92
|
+
variables: {
|
|
93
|
+
input: {
|
|
94
|
+
id,
|
|
95
|
+
ownerCipherData: '',
|
|
96
|
+
ownerKeyId: ownerKey.id,
|
|
97
|
+
sharedCipherDataSig,
|
|
98
|
+
sharedKeyId: sharedKey.id,
|
|
99
|
+
sigPxkId: sigPxk.id,
|
|
100
|
+
ownerPlainDataSig,
|
|
101
|
+
},
|
|
102
|
+
},
|
|
103
|
+
});
|
|
104
|
+
});
|
|
105
|
+
}
|
|
106
|
+
}
|
|
107
|
+
SharedContactCardService.ɵprov = i0.ɵɵdefineInjectable({ factory: function SharedContactCardService_Factory() { return new SharedContactCardService(i0.ɵɵinject(i1.KeyService), i0.ɵɵinject(i2.LrApolloService), i0.ɵɵinject(i3.KeyGraphService), i0.ɵɵinject(i4.EncryptionService)); }, token: SharedContactCardService, providedIn: "root" });
|
|
108
|
+
SharedContactCardService.decorators = [
|
|
109
|
+
{ type: Injectable, args: [{
|
|
110
|
+
providedIn: 'root',
|
|
111
|
+
},] }
|
|
112
|
+
];
|
|
113
|
+
SharedContactCardService.ctorParameters = () => [
|
|
114
|
+
{ type: KeyService },
|
|
115
|
+
{ type: LrApolloService },
|
|
116
|
+
{ type: KeyGraphService },
|
|
117
|
+
{ type: EncryptionService }
|
|
118
|
+
];
|
|
119
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"shared-contact-card.service.js","sourceRoot":"/opt/atlassian/pipelines/agent/build/projects/core/src/","sources":["lib/api/shared-contact-card.service.ts"],"names":[],"mappings":";AAAA,OAAO,EAAE,UAAU,EAAE,MAAM,eAAe,CAAC;AAC3C,OAAO,GAAG,MAAM,aAAa,CAAC;AAE9B,OAAO,EAAE,iBAAiB,EAAE,MAAM,oCAAoC,CAAC;AACvE,OAAO,EAAE,eAAe,EAAE,MAAM,mCAAmC,CAAC;AACpE,OAAO,EAAE,UAAU,EAAE,MAAM,6BAA6B,CAAC;AAEzD,OAAO,EAAE,eAAe,EAAuB,MAAM,wBAAwB,CAAC;AAG9E,OAAO,EAAE,eAAe,EAAE,MAAM,qBAAqB,CAAC;;;;;;AAEtD,MAAM,CAAC,MAAM,uBAAuB,GAAG;;;;;;;;;;;;;;;;;;;;;;;;;;CA0BtC,CAAC;AAEF,MAAM,sBAAsB,GAAG,GAAG,CAAA;;;;;;;;QAQ1B,uBAAuB;;;EAG7B,CAAC;AA2BH,MAAM,OAAO,wBAAwB;IACnC,YACU,UAAsB,EACtB,QAAyB,EACzB,QAAyB,EACzB,iBAAoC;QAHpC,eAAU,GAAV,UAAU,CAAY;QACtB,aAAQ,GAAR,QAAQ,CAAiB;QACzB,aAAQ,GAAR,QAAQ,CAAiB;QACzB,sBAAiB,GAAjB,iBAAiB,CAAmB;IAC3C,CAAC;IAEE,gCAAgC,CACpC,EAAqB;;YAErB,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,0BAA0B,CAAC,EAAE,CAAC,CAAC;YAE1D,uBACE,EAAE,EAAE,EAAE,CAAC,EAAE,EACT,UAAU,EAAE,EAAE,CAAC,QAAQ,CAAC,EAAE,EAC1B,WAAW,EAAE,EAAE,CAAC,SAAS,CAAC,EAAE,IACzB,OAAO,EACV;QACJ,CAAC;KAAA;IAEK,0BAA0B,CAC9B,EAAqB;;YAErB,IAAI,EAAE,IAAI,EAAE,CAAC,SAAS,IAAI,EAAE,CAAC,gBAAgB,EAAE;gBAC7C,IAAI;oBACF,OAAO,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CACzC,MAAM,IAAI,CAAC,QAAQ,CAAC,SAAS,CAAC,EAAE,CAAC,SAAS,CAAC,EAAE,CAAC,EAC9C,EAAE,CAAC,gBAAgB,CACpB,CAAC;iBACH;gBAAC,OAAO,CAAC,EAAE;oBACV,OAAO,CAAC,KAAK,CAAC,sCAAsC,EAAE,CAAC,CAAC,CAAC;iBAC1D;aACF;YACD,OAAO,IAAI,CAAC;QACd,CAAC;KAAA;IAEK,yBAAyB,CAC7B,EAAU,EACV,UAAkB,EAClB,WAAmB,EACnB,WAAgC;;YAEhC,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,UAAU,CAAC,CAAC;YACxD,MAAM,SAAS,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,WAAW,CAAC,CAAC;YAC1D,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,gBAAgB,EAAE,CAAC;YAExD,MAAM,gBAAgB,GAAG,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAC3D,SAAS,CAAC,GAAG,EACb,WAAW,CACZ,CAAC;YACF,MAAM,mBAAmB,GAAG,IAAI,CAAC,SAAS,CACxC,MAAM,IAAI,CAAC,iBAAiB,CAAC,IAAI,CAAC,MAAM,CAAC,GAAG,EAAE,gBAAgB,CAAC,CAChE,CAAC;YAEF,MAAM,cAAc,GAAG;gBACrB,IAAI,EAAE,IAAI,eAAe,CAAC,WAAW,CAAC,IAAI,CAAC;aAC5C,CAAC;YACF,MAAM,iBAAiB,GAAG,IAAI,CAAC,SAAS,CACtC,MAAM,IAAI,CAAC,iBAAiB,CAAC,IAAI,CAAC,MAAM,CAAC,GAAG,EAAE,cAAc,CAAC,CAC9D,CAAC;YAEF,MAAM,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAyB;gBACjD,QAAQ,EAAE,sBAAsB;gBAChC,SAAS,EAAE;oBACT,KAAK,EAAE;wBACL,EAAE;wBACF,eAAe,EAAE,EAAE;wBACnB,UAAU,EAAE,QAAQ,CAAC,EAAE;wBACvB,mBAAmB;wBACnB,WAAW,EAAE,SAAS,CAAC,EAAE;wBACzB,QAAQ,EAAE,MAAM,CAAC,EAAE;wBACnB,iBAAiB;qBAClB;iBACF;aACF,CAAC,CAAC;QACL,CAAC;KAAA;;;;YA/EF,UAAU,SAAC;gBACV,UAAU,EAAE,MAAM;aACnB;;;YAxEQ,UAAU;YAKV,eAAe;YANf,eAAe;YADf,iBAAiB","sourcesContent":["import { Injectable } from '@angular/core';\nimport gql from 'graphql-tag';\nimport { Key } from '../cryptography/cryptography.types';\nimport { EncryptionService } from '../cryptography/encryption.service';\nimport { KeyGraphService } from '../cryptography/key-graph.service';\nimport { KeyService } from '../cryptography/key.service';\nimport { SharedTrustedPartyDetails } from '../trusted-parties/trusted-party.types';\nimport { ContactCardName, TrustedPartyDetails } from '../users/profile.types';\nimport { User } from '../users/user.types';\nimport { KeyGraphField } from '../_common/queries.gql';\nimport { LrApolloService } from './lr-apollo.service';\n\nexport const SharedContactCardFields = `\n  id\n  owner {\n    id\n    username\n  }\n  ownerKey {\n    id\n  }\n  ownerCipherData\n  receiver {\n    id\n    username\n  }\n  receiverKey {\n    id\n  }\n  receiverCipherData\n  sharedKey {\n    id\n  }\n  sharedCipherData\n  sharedCipherDataSig\n  sharedCipherDataSigPxk {\n    id\n  }\n`;\n\nconst UpdateOwnedContactCard = gql`\nmutation UpdateOwnedContactCard(\n  $input: UpdateOwnedContactCardInput!\n) {\n  updateOwnedContactCard(\n    input: $input\n  ) {\n    ownedContactCard {\n      ${SharedContactCardFields}\n    }\n  }\n}`;\n\ninterface UpdateOwnedContactCard {\n  updateOwnedContactCard: {\n    ownedContactCard: SharedContactCard;\n  };\n}\n\nexport interface SharedContactCard {\n  id: string;\n  owner: User;\n  ownerKey: Key;\n  ownerCipherData: string;\n  receiver: User;\n  receiverKey: Key;\n  receiverCipherData: string;\n  sharedKey: Key;\n  sharedCipherData: string;\n  // Decrypted\n  plainOwnerCipherDataJson: any;\n  plainReceiverCipherDataJson: any;\n  plainSharedCipherDataJson: any;\n}\n\n@Injectable({\n  providedIn: 'root',\n})\nexport class SharedContactCardService {\n  constructor(\n    private keyService: KeyService,\n    private lrApollo: LrApolloService,\n    private keyGraph: KeyGraphService,\n    private encryptionService: EncryptionService\n  ) {}\n\n  async decryptSharedTrustedPartyDetails(\n    cc: SharedContactCard\n  ): Promise<SharedTrustedPartyDetails> {\n    const details = await this.decryptTrustedPartyDetails(cc);\n\n    return {\n      id: cc.id,\n      ownedKeyId: cc.ownerKey.id,\n      sharedKeyId: cc.sharedKey.id,\n      ...details,\n    };\n  }\n\n  async decryptTrustedPartyDetails(\n    cc: SharedContactCard\n  ): Promise<TrustedPartyDetails> {\n    if (cc && cc.sharedKey && cc.sharedCipherData) {\n      try {\n        return await this.encryptionService.decrypt(\n          await this.keyGraph.getJwkKey(cc.sharedKey.id),\n          cc.sharedCipherData\n        );\n      } catch (e) {\n        console.error('Cannot decrypt trusted party details', e);\n      }\n    }\n    return null;\n  }\n\n  async updateMySharedContactCard(\n    id: string,\n    ownedKeyId: string,\n    sharedKeyId: string,\n    contactCard: TrustedPartyDetails\n  ): Promise<void> {\n    const ownerKey = await this.keyGraph.getKey(ownedKeyId);\n    const sharedKey = await this.keyGraph.getKey(sharedKeyId);\n    const sigPxk = await this.keyService.getCurrentSigPxk();\n\n    const sharedCipherData = await this.encryptionService.encrypt(\n      sharedKey.jwk,\n      contactCard\n    );\n    const sharedCipherDataSig = JSON.stringify(\n      await this.encryptionService.sign(sigPxk.jwk, sharedCipherData)\n    );\n\n    const ownerPlainData = {\n      name: new ContactCardName(contactCard.name),\n    };\n    const ownerPlainDataSig = JSON.stringify(\n      await this.encryptionService.sign(sigPxk.jwk, ownerPlainData)\n    );\n\n    await this.lrApollo.mutate<UpdateOwnedContactCard>({\n      mutation: UpdateOwnedContactCard,\n      variables: {\n        input: {\n          id,\n          ownerCipherData: '',\n          ownerKeyId: ownerKey.id,\n          sharedCipherDataSig,\n          sharedKeyId: sharedKey.id,\n          sigPxkId: sigPxk.id,\n          ownerPlainDataSig,\n        },\n      },\n    });\n  }\n}\n"]}
|
|
@@ -1,41 +1,41 @@
|
|
|
1
|
-
import { gqlTyped } from '../_common/ast';
|
|
2
|
-
export const UpdateOwnedContactCardMutation = gqlTyped `
|
|
3
|
-
mutation UpdateOwnedContactCardMutation(
|
|
4
|
-
$input: UpdateOwnedContactCardInput!
|
|
5
|
-
) {
|
|
6
|
-
updateOwnedContactCard(input: $input) {
|
|
7
|
-
ownedContactCard {
|
|
8
|
-
id
|
|
9
|
-
}
|
|
10
|
-
}
|
|
11
|
-
}`;
|
|
12
|
-
export const UpdateReceivedContactCardMutation = gqlTyped `
|
|
13
|
-
mutation UpdateReceivedContactCardMutation(
|
|
14
|
-
$input: UpdateReceivedContactCardInput!
|
|
15
|
-
) {
|
|
16
|
-
updateReceivedContactCard(input: $input) {
|
|
17
|
-
receivedContactCard {
|
|
18
|
-
id
|
|
19
|
-
}
|
|
20
|
-
}
|
|
21
|
-
}`;
|
|
22
|
-
export const GetOwnedContactCardKeyIdsQuery = gqlTyped `
|
|
23
|
-
query GetOwnedContactCardKeyIdsQuery($id: LrRelayIdInput!) {
|
|
24
|
-
ownedContactCard(id: $id) {
|
|
25
|
-
sharedKey {
|
|
26
|
-
id
|
|
27
|
-
}
|
|
28
|
-
ownerKey {
|
|
29
|
-
id
|
|
30
|
-
}
|
|
31
|
-
}
|
|
32
|
-
}`;
|
|
33
|
-
export const GetReceivedContactCardKeyIdQuery = gqlTyped `
|
|
34
|
-
query GetReceivedContactCardKeyIdQuery($id: LrRelayIdInput!) {
|
|
35
|
-
receivedContactCard(id: $id) {
|
|
36
|
-
receiverKey {
|
|
37
|
-
id
|
|
38
|
-
}
|
|
39
|
-
}
|
|
40
|
-
}`;
|
|
41
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
1
|
+
import { gqlTyped } from '../_common/ast';
|
|
2
|
+
export const UpdateOwnedContactCardMutation = gqlTyped `
|
|
3
|
+
mutation UpdateOwnedContactCardMutation(
|
|
4
|
+
$input: UpdateOwnedContactCardInput!
|
|
5
|
+
) {
|
|
6
|
+
updateOwnedContactCard(input: $input) {
|
|
7
|
+
ownedContactCard {
|
|
8
|
+
id
|
|
9
|
+
}
|
|
10
|
+
}
|
|
11
|
+
}`;
|
|
12
|
+
export const UpdateReceivedContactCardMutation = gqlTyped `
|
|
13
|
+
mutation UpdateReceivedContactCardMutation(
|
|
14
|
+
$input: UpdateReceivedContactCardInput!
|
|
15
|
+
) {
|
|
16
|
+
updateReceivedContactCard(input: $input) {
|
|
17
|
+
receivedContactCard {
|
|
18
|
+
id
|
|
19
|
+
}
|
|
20
|
+
}
|
|
21
|
+
}`;
|
|
22
|
+
export const GetOwnedContactCardKeyIdsQuery = gqlTyped `
|
|
23
|
+
query GetOwnedContactCardKeyIdsQuery($id: LrRelayIdInput!) {
|
|
24
|
+
ownedContactCard(id: $id) {
|
|
25
|
+
sharedKey {
|
|
26
|
+
id
|
|
27
|
+
}
|
|
28
|
+
ownerKey {
|
|
29
|
+
id
|
|
30
|
+
}
|
|
31
|
+
}
|
|
32
|
+
}`;
|
|
33
|
+
export const GetReceivedContactCardKeyIdQuery = gqlTyped `
|
|
34
|
+
query GetReceivedContactCardKeyIdQuery($id: LrRelayIdInput!) {
|
|
35
|
+
receivedContactCard(id: $id) {
|
|
36
|
+
receiverKey {
|
|
37
|
+
id
|
|
38
|
+
}
|
|
39
|
+
}
|
|
40
|
+
}`;
|
|
41
|
+
//# sourceMappingURL=data:application/json;base64,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
|