@lifeready/core 1.0.2 → 1.0.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +62 -62
- package/bundles/lifeready-core.umd.js +15445 -15445
- package/bundles/lifeready-core.umd.js.map +1 -1
- package/bundles/lifeready-core.umd.min.js.map +1 -1
- package/esm2015/lib/_common/ast.js +40 -40
- package/esm2015/lib/_common/deferred-promise.js +24 -24
- package/esm2015/lib/_common/exceptions.js +157 -157
- package/esm2015/lib/_common/queries.gql.js +190 -190
- package/esm2015/lib/_common/run-outside-angular.js +79 -79
- package/esm2015/lib/_common/types.js +1 -1
- package/esm2015/lib/_common/utils.js +44 -44
- package/esm2015/lib/api/contact-card.gql.js +79 -79
- package/esm2015/lib/api/contact-card.service.js +154 -154
- package/esm2015/lib/api/contact-card2.gql.js +60 -60
- package/esm2015/lib/api/contact-card2.service.js +103 -103
- package/esm2015/lib/api/file.service.js +74 -74
- package/esm2015/lib/api/item2.gql.js +110 -110
- package/esm2015/lib/api/item2.service.js +311 -311
- package/esm2015/lib/api/key-exchange.gql.js +188 -188
- package/esm2015/lib/api/key-exchange.service.js +442 -442
- package/esm2015/lib/api/key-exchange.types.js +18 -18
- package/esm2015/lib/api/key-exchange2.gql.js +171 -171
- package/esm2015/lib/api/key-exchange2.service.js +479 -479
- package/esm2015/lib/api/lock.gql.js +40 -40
- package/esm2015/lib/api/lock.service.js +64 -64
- package/esm2015/lib/api/lr-apollo.service.js +46 -46
- package/esm2015/lib/api/lr-graphql/index.js +6 -6
- package/esm2015/lib/api/lr-graphql/lr-graphql.service.js +155 -155
- package/esm2015/lib/api/lr-graphql/lr-merged-mutation.js +213 -213
- package/esm2015/lib/api/lr-graphql/lr-mutation-base.js +51 -51
- package/esm2015/lib/api/lr-graphql/lr-mutation.js +48 -48
- package/esm2015/lib/api/lr-graphql/lr.service.js +18 -18
- package/esm2015/lib/api/message.service.js +138 -138
- package/esm2015/lib/api/persist.service.js +181 -181
- package/esm2015/lib/api/query-processor/common-processors.service.js +93 -93
- package/esm2015/lib/api/query-processor/index.js +3 -3
- package/esm2015/lib/api/query-processor/query-processor.service.js +192 -192
- package/esm2015/lib/api/query-processor/tp-password-reset-processor.service.js +109 -109
- package/esm2015/lib/api/shared-contact-card.service.js +119 -119
- package/esm2015/lib/api/shared-contact-card2.gql.js +41 -41
- package/esm2015/lib/api/shared-contact-card2.service.js +117 -117
- package/esm2015/lib/api/time.service.js +146 -146
- package/esm2015/lib/api/types/graphql.types.js +7 -7
- package/esm2015/lib/api/types/index.js +3 -3
- package/esm2015/lib/api/types/lr-graphql.types.js +71 -71
- package/esm2015/lib/auth/auth.config.js +57 -57
- package/esm2015/lib/auth/auth.gql.js +48 -48
- package/esm2015/lib/auth/auth.types.js +27 -27
- package/esm2015/lib/auth/idle.service.js +168 -168
- package/esm2015/lib/auth/idle.types.js +7 -7
- package/esm2015/lib/auth/lbop.service.js +355 -355
- package/esm2015/lib/auth/life-ready-auth.service.js +500 -500
- package/esm2015/lib/auth/password.service.js +320 -320
- package/esm2015/lib/auth/register.service.js +172 -172
- package/esm2015/lib/auth/two-factor.service.js +74 -74
- package/esm2015/lib/category/category-meta.service.js +99 -99
- package/esm2015/lib/category/category.gql.js +406 -406
- package/esm2015/lib/category/category.service.js +390 -390
- package/esm2015/lib/category/category.types.js +29 -29
- package/esm2015/lib/cryptography/cryptography.types.js +11 -11
- package/esm2015/lib/cryptography/encryption.service.js +189 -189
- package/esm2015/lib/cryptography/key-factory.service.js +237 -237
- package/esm2015/lib/cryptography/key-graph.service.js +280 -280
- package/esm2015/lib/cryptography/key-meta.service.js +200 -200
- package/esm2015/lib/cryptography/key.service.js +124 -124
- package/esm2015/lib/cryptography/slip39.service.js +169 -169
- package/esm2015/lib/cryptography/web-crypto.service.js +29 -29
- package/esm2015/lib/life-ready.config.js +84 -84
- package/esm2015/lib/life-ready.module.js +74 -74
- package/esm2015/lib/plan/plan.gql.js +123 -123
- package/esm2015/lib/plan/plan.service.js +149 -149
- package/esm2015/lib/plan/plan.types.js +11 -11
- package/esm2015/lib/record/record-attachment.service.js +101 -101
- package/esm2015/lib/record/record.gql.js +179 -179
- package/esm2015/lib/record/record.service.js +206 -206
- package/esm2015/lib/record/record.types.js +15 -15
- package/esm2015/lib/record-type/record-type.service.js +75 -75
- package/esm2015/lib/record-type/record-type.types.js +28 -28
- package/esm2015/lib/scenario/approvals/scenario-approval.gql.js +105 -105
- package/esm2015/lib/scenario/approvals/scenario-approval.types.js +1 -1
- package/esm2015/lib/scenario/approvals/scenario-approver.service.js +300 -300
- package/esm2015/lib/scenario/claimants/scenario-claimant.gql.js +52 -52
- package/esm2015/lib/scenario/claimants/scenario-claimant.service.js +97 -97
- package/esm2015/lib/scenario/claimants/scenario-claimant.types.js +1 -1
- package/esm2015/lib/scenario/receivers/scenario-receiver.gql.js +150 -150
- package/esm2015/lib/scenario/receivers/scenario-receiver.service.js +229 -229
- package/esm2015/lib/scenario/receivers/scenario-receiver.types.js +1 -1
- package/esm2015/lib/scenario/scenario-setup.service.js +269 -269
- package/esm2015/lib/scenario/scenario.gql.js +368 -368
- package/esm2015/lib/scenario/scenario.service.js +611 -611
- package/esm2015/lib/scenario/scenario.types.js +64 -64
- package/esm2015/lib/search/search.gql.js +62 -62
- package/esm2015/lib/search/search.service.js +156 -156
- package/esm2015/lib/search/search.types.js +6 -6
- package/esm2015/lib/trusted-parties/tp-password-reset-request.service.js +112 -112
- package/esm2015/lib/trusted-parties/tp-password-reset-user.service.js +129 -129
- package/esm2015/lib/trusted-parties/tp-password-reset.constants.js +4 -4
- package/esm2015/lib/trusted-parties/tp-password-reset.gql.js +232 -232
- package/esm2015/lib/trusted-parties/tp-password-reset.service.js +299 -299
- package/esm2015/lib/trusted-parties/trusted-party.gql.js +148 -148
- package/esm2015/lib/trusted-parties/trusted-party.service.js +326 -326
- package/esm2015/lib/trusted-parties/trusted-party.types.js +41 -41
- package/esm2015/lib/trusted-parties/trusted-party2.gql.js +87 -87
- package/esm2015/lib/trusted-parties/trusted-party2.service.js +215 -215
- package/esm2015/lib/users/profile-details.service.js +214 -214
- package/esm2015/lib/users/profile.gql.js +97 -97
- package/esm2015/lib/users/profile.service.js +169 -169
- package/esm2015/lib/users/profile.types.js +34 -34
- package/esm2015/lib/users/user.gql.js +60 -60
- package/esm2015/lib/users/user.service.js +79 -79
- package/esm2015/lib/users/user.types.js +5 -5
- package/esm2015/lifeready-core.js +10 -10
- package/esm2015/public-api.js +81 -81
- package/fesm2015/lifeready-core.js +13088 -13088
- package/fesm2015/lifeready-core.js.map +1 -1
- package/lib/_common/ast.d.ts +11 -11
- package/lib/_common/deferred-promise.d.ts +12 -12
- package/lib/_common/exceptions.d.ts +109 -109
- package/lib/_common/queries.gql.d.ts +10 -10
- package/lib/_common/run-outside-angular.d.ts +14 -14
- package/lib/_common/types.d.ts +10 -10
- package/lib/_common/utils.d.ts +3 -3
- package/lib/api/contact-card.gql.d.ts +7 -7
- package/lib/api/contact-card.service.d.ts +52 -52
- package/lib/api/contact-card2.gql.d.ts +34 -34
- package/lib/api/contact-card2.service.d.ts +49 -49
- package/lib/api/file.service.d.ts +18 -18
- package/lib/api/item2.gql.d.ts +96 -96
- package/lib/api/item2.service.d.ts +177 -177
- package/lib/api/key-exchange.gql.d.ts +9 -9
- package/lib/api/key-exchange.service.d.ts +39 -39
- package/lib/api/key-exchange.types.d.ts +196 -196
- package/lib/api/key-exchange2.gql.d.ts +125 -125
- package/lib/api/key-exchange2.service.d.ts +187 -187
- package/lib/api/lock.gql.d.ts +27 -27
- package/lib/api/lock.service.d.ts +25 -25
- package/lib/api/lr-apollo.service.d.ts +15 -15
- package/lib/api/lr-graphql/index.d.ts +5 -5
- package/lib/api/lr-graphql/lr-graphql.service.d.ts +60 -60
- package/lib/api/lr-graphql/lr-merged-mutation.d.ts +27 -27
- package/lib/api/lr-graphql/lr-mutation-base.d.ts +28 -28
- package/lib/api/lr-graphql/lr-mutation.d.ts +8 -8
- package/lib/api/lr-graphql/lr.service.d.ts +9 -9
- package/lib/api/message.service.d.ts +58 -58
- package/lib/api/persist.service.d.ts +31 -31
- package/lib/api/query-processor/common-processors.service.d.ts +36 -36
- package/lib/api/query-processor/index.d.ts +2 -2
- package/lib/api/query-processor/query-processor.service.d.ts +18 -18
- package/lib/api/query-processor/tp-password-reset-processor.service.d.ts +15 -15
- package/lib/api/shared-contact-card.service.d.ts +33 -33
- package/lib/api/shared-contact-card2.gql.d.ts +36 -36
- package/lib/api/shared-contact-card2.service.d.ts +45 -45
- package/lib/api/time.service.d.ts +16 -16
- package/lib/api/types/graphql.types.d.ts +29 -29
- package/lib/api/types/index.d.ts +2 -2
- package/lib/api/types/lr-graphql.types.d.ts +385 -385
- package/lib/auth/auth.config.d.ts +5 -5
- package/lib/auth/auth.gql.d.ts +15 -15
- package/lib/auth/auth.types.d.ts +66 -66
- package/lib/auth/idle.service.d.ts +40 -40
- package/lib/auth/idle.types.d.ts +10 -10
- package/lib/auth/lbop.service.d.ts +91 -91
- package/lib/auth/life-ready-auth.service.d.ts +59 -59
- package/lib/auth/password.service.d.ts +78 -78
- package/lib/auth/register.service.d.ts +25 -25
- package/lib/auth/two-factor.service.d.ts +15 -15
- package/lib/category/category-meta.service.d.ts +23 -23
- package/lib/category/category.gql.d.ts +45 -45
- package/lib/category/category.service.d.ts +67 -67
- package/lib/category/category.types.d.ts +79 -79
- package/lib/cryptography/cryptography.types.d.ts +83 -83
- package/lib/cryptography/encryption.service.d.ts +41 -41
- package/lib/cryptography/key-factory.service.d.ts +38 -38
- package/lib/cryptography/key-graph.service.d.ts +33 -33
- package/lib/cryptography/key-meta.service.d.ts +44 -44
- package/lib/cryptography/key.service.d.ts +36 -36
- package/lib/cryptography/slip39.service.d.ts +43 -43
- package/lib/cryptography/web-crypto.service.d.ts +5 -5
- package/lib/life-ready.config.d.ts +14 -14
- package/lib/life-ready.module.d.ts +5 -5
- package/lib/plan/plan.gql.d.ts +11 -11
- package/lib/plan/plan.service.d.ts +33 -33
- package/lib/plan/plan.types.d.ts +31 -31
- package/lib/record/record-attachment.service.d.ts +16 -16
- package/lib/record/record.gql.d.ts +14 -14
- package/lib/record/record.service.d.ts +25 -25
- package/lib/record/record.types.d.ts +57 -57
- package/lib/record-type/record-type.service.d.ts +11 -11
- package/lib/record-type/record-type.types.d.ts +50 -50
- package/lib/scenario/approvals/scenario-approval.gql.d.ts +7 -7
- package/lib/scenario/approvals/scenario-approval.types.d.ts +63 -63
- package/lib/scenario/approvals/scenario-approver.service.d.ts +32 -32
- package/lib/scenario/claimants/scenario-claimant.gql.d.ts +5 -5
- package/lib/scenario/claimants/scenario-claimant.service.d.ts +17 -17
- package/lib/scenario/claimants/scenario-claimant.types.d.ts +18 -18
- package/lib/scenario/receivers/scenario-receiver.gql.d.ts +8 -8
- package/lib/scenario/receivers/scenario-receiver.service.d.ts +30 -30
- package/lib/scenario/receivers/scenario-receiver.types.d.ts +54 -54
- package/lib/scenario/scenario-setup.service.d.ts +22 -22
- package/lib/scenario/scenario.gql.d.ts +34 -34
- package/lib/scenario/scenario.service.d.ts +58 -58
- package/lib/scenario/scenario.types.d.ts +217 -217
- package/lib/search/search.gql.d.ts +1 -1
- package/lib/search/search.service.d.ts +25 -25
- package/lib/search/search.types.d.ts +20 -20
- package/lib/trusted-parties/tp-password-reset-request.service.d.ts +20 -20
- package/lib/trusted-parties/tp-password-reset-user.service.d.ts +35 -35
- package/lib/trusted-parties/tp-password-reset.constants.d.ts +3 -3
- package/lib/trusted-parties/tp-password-reset.gql.d.ts +218 -218
- package/lib/trusted-parties/tp-password-reset.service.d.ts +130 -130
- package/lib/trusted-parties/trusted-party.gql.d.ts +9 -9
- package/lib/trusted-parties/trusted-party.service.d.ts +44 -44
- package/lib/trusted-parties/trusted-party.types.d.ts +102 -102
- package/lib/trusted-parties/trusted-party2.gql.d.ts +79 -79
- package/lib/trusted-parties/trusted-party2.service.d.ts +114 -114
- package/lib/users/profile-details.service.d.ts +21 -21
- package/lib/users/profile.gql.d.ts +11 -11
- package/lib/users/profile.service.d.ts +35 -35
- package/lib/users/profile.types.d.ts +96 -96
- package/lib/users/user.gql.d.ts +9 -9
- package/lib/users/user.service.d.ts +12 -12
- package/lib/users/user.types.d.ts +23 -23
- package/lifeready-core.d.ts +9 -9
- package/package.json +1 -1
- package/public-api.d.ts +77 -77
|
@@ -1,181 +1,181 @@
|
|
|
1
|
-
import { __awaiter } from "tslib";
|
|
2
|
-
import { Injectable, Injector } from '@angular/core';
|
|
3
|
-
import { CookieService } from 'ngx-cookie-service';
|
|
4
|
-
import { EncryptionService } from '../cryptography/encryption.service';
|
|
5
|
-
import { isDevMode } from '@angular/core';
|
|
6
|
-
import { LrBadArgumentException } from '../_common/exceptions';
|
|
7
|
-
import { KeyFactoryService as KFS } from '../cryptography/key-factory.service';
|
|
8
|
-
import * as i0 from "@angular/core";
|
|
9
|
-
import * as i1 from "../cryptography/key-factory.service";
|
|
10
|
-
import * as i2 from "ngx-cookie-service";
|
|
11
|
-
import * as i3 from "../cryptography/encryption.service";
|
|
12
|
-
export class PersistService {
|
|
13
|
-
constructor(keyFactory, cookieService, encryptionService, injector) {
|
|
14
|
-
this.keyFactory = keyFactory;
|
|
15
|
-
this.cookieService = cookieService;
|
|
16
|
-
this.encryptionService = encryptionService;
|
|
17
|
-
this.injector = injector;
|
|
18
|
-
this.KEY_PREFIX = 'lrSession-';
|
|
19
|
-
this.cookieSecure = true;
|
|
20
|
-
this.serverSessionEncryptionKey = null;
|
|
21
|
-
if (isDevMode()) {
|
|
22
|
-
this.setCookieSecure(false);
|
|
23
|
-
}
|
|
24
|
-
}
|
|
25
|
-
setServerSessionEncryptionKey(key) {
|
|
26
|
-
this.serverSessionEncryptionKey = key;
|
|
27
|
-
}
|
|
28
|
-
clearServerSessionEncryptionKey() {
|
|
29
|
-
this.serverSessionEncryptionKey = null;
|
|
30
|
-
}
|
|
31
|
-
// It's important that set and delete cookie use exactly the same set of parameters.
|
|
32
|
-
getCookieParams() {
|
|
33
|
-
return {
|
|
34
|
-
path: '/',
|
|
35
|
-
domain: null,
|
|
36
|
-
secure: this.cookieSecure,
|
|
37
|
-
sameSite: 'Lax',
|
|
38
|
-
};
|
|
39
|
-
}
|
|
40
|
-
clear() {
|
|
41
|
-
// Remove all cookies
|
|
42
|
-
Object.keys(this.cookieService.getAll()).forEach((key) => {
|
|
43
|
-
if (key.startsWith(this.KEY_PREFIX)) {
|
|
44
|
-
this.deletePrefixedName(key);
|
|
45
|
-
}
|
|
46
|
-
});
|
|
47
|
-
// Remove all persisted session variables
|
|
48
|
-
Object.keys(localStorage).forEach((key) => {
|
|
49
|
-
if (key.startsWith(this.KEY_PREFIX)) {
|
|
50
|
-
this.deletePrefixedName(key);
|
|
51
|
-
}
|
|
52
|
-
});
|
|
53
|
-
}
|
|
54
|
-
setCookieSecure(value) {
|
|
55
|
-
this.cookieSecure = value;
|
|
56
|
-
if (!value) {
|
|
57
|
-
if (isDevMode()) {
|
|
58
|
-
console.warn('The cookie secure flag in persistService has been set to false, set it to true in production mode');
|
|
59
|
-
}
|
|
60
|
-
else {
|
|
61
|
-
throw new LrBadArgumentException('Can not set PersistService cookie secure flag to false in production mode.');
|
|
62
|
-
}
|
|
63
|
-
}
|
|
64
|
-
}
|
|
65
|
-
prefixName(name) {
|
|
66
|
-
return this.KEY_PREFIX + name;
|
|
67
|
-
}
|
|
68
|
-
delete(name) {
|
|
69
|
-
this.deletePrefixedName(this.prefixName(name));
|
|
70
|
-
}
|
|
71
|
-
deletePrefixedName(prefixedName) {
|
|
72
|
-
const params = this.getCookieParams();
|
|
73
|
-
this.cookieService.delete(prefixedName, // name: string,
|
|
74
|
-
params.path, // path?: string,
|
|
75
|
-
params.domain, // domain ?: string,
|
|
76
|
-
params.secure, // secure ?: boolean,
|
|
77
|
-
params.sameSite // sameSite ?: 'Lax' | 'None' | 'Strict'): void;
|
|
78
|
-
);
|
|
79
|
-
localStorage.removeItem(prefixedName);
|
|
80
|
-
}
|
|
81
|
-
set({ name, value, serverSession, expiry, }) {
|
|
82
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
83
|
-
const prefixedName = this.prefixName(name);
|
|
84
|
-
let item;
|
|
85
|
-
if (serverSession) {
|
|
86
|
-
item = {
|
|
87
|
-
serverSession: true,
|
|
88
|
-
data: yield this.encryptionService.encryptToString(this.serverSessionEncryptionKey, value),
|
|
89
|
-
};
|
|
90
|
-
}
|
|
91
|
-
else {
|
|
92
|
-
item = {
|
|
93
|
-
data: value,
|
|
94
|
-
};
|
|
95
|
-
}
|
|
96
|
-
if (expiry) {
|
|
97
|
-
const key = yield this.keyFactory.createKey();
|
|
98
|
-
item.expiry = expiry.toISOString();
|
|
99
|
-
item.data = yield this.encryptionService.encryptToString(key, item.data);
|
|
100
|
-
const cookieItem = {
|
|
101
|
-
key: key.toJSON(true),
|
|
102
|
-
};
|
|
103
|
-
// If path is set to anything other than "/" then the cookie is only
|
|
104
|
-
// accessible by JS if the current URL has the same prefix as the path.
|
|
105
|
-
// Ideally we don't want the encryption key cookie to be sent at all, but
|
|
106
|
-
// since the encrypted content is held in localstorage, it is not a security
|
|
107
|
-
// risk, i.e. it is at least as secure as storing only in localstorage.
|
|
108
|
-
const params = this.getCookieParams();
|
|
109
|
-
this.cookieService.set(prefixedName, // name: string,
|
|
110
|
-
JSON.stringify(cookieItem), // value: string,
|
|
111
|
-
expiry, // expires?: number | Date,
|
|
112
|
-
params.path, // path?: string,
|
|
113
|
-
params.domain, // domain?: string,
|
|
114
|
-
params.secure, // secure?: boolean,
|
|
115
|
-
params.sameSite // sameSite?: 'Lax' | 'None' | 'Strict'
|
|
116
|
-
);
|
|
117
|
-
}
|
|
118
|
-
localStorage.setItem(prefixedName, JSON.stringify(item));
|
|
119
|
-
});
|
|
120
|
-
}
|
|
121
|
-
get(name) {
|
|
122
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
123
|
-
const prefixedName = this.prefixName(name);
|
|
124
|
-
try {
|
|
125
|
-
const ret = yield this.getImpl(prefixedName);
|
|
126
|
-
if (ret == null) {
|
|
127
|
-
// Clear any cookies to keep things in sync.
|
|
128
|
-
this.deletePrefixedName(prefixedName);
|
|
129
|
-
}
|
|
130
|
-
return ret;
|
|
131
|
-
}
|
|
132
|
-
catch (error) {
|
|
133
|
-
this.deletePrefixedName(prefixedName);
|
|
134
|
-
throw error;
|
|
135
|
-
}
|
|
136
|
-
});
|
|
137
|
-
}
|
|
138
|
-
getImpl(name) {
|
|
139
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
140
|
-
const itemString = localStorage.getItem(name);
|
|
141
|
-
if (!itemString) {
|
|
142
|
-
return null;
|
|
143
|
-
}
|
|
144
|
-
const item = JSON.parse(itemString);
|
|
145
|
-
let data;
|
|
146
|
-
if (item.expiry) {
|
|
147
|
-
const cookieItemString = this.cookieService.get(name);
|
|
148
|
-
if (!cookieItemString) {
|
|
149
|
-
// Probably expired, but we won't make any interpretations since if we only used
|
|
150
|
-
// cookies we can't tell if it's expired or explicitly removed. So we just make
|
|
151
|
-
// the behaviour here consistent with that.
|
|
152
|
-
console.log('No cookie.');
|
|
153
|
-
return null;
|
|
154
|
-
}
|
|
155
|
-
const cookieItem = JSON.parse(cookieItemString);
|
|
156
|
-
const key = yield KFS.asKey(cookieItem.key);
|
|
157
|
-
data = yield this.encryptionService.decrypt(key, item.data);
|
|
158
|
-
}
|
|
159
|
-
else {
|
|
160
|
-
data = item.data;
|
|
161
|
-
}
|
|
162
|
-
if (item.serverSession) {
|
|
163
|
-
data = yield this.encryptionService.decrypt(this.serverSessionEncryptionKey, data);
|
|
164
|
-
}
|
|
165
|
-
return data;
|
|
166
|
-
});
|
|
167
|
-
}
|
|
168
|
-
}
|
|
169
|
-
PersistService.ɵprov = i0.ɵɵdefineInjectable({ factory: function PersistService_Factory() { return new PersistService(i0.ɵɵinject(i1.KeyFactoryService), i0.ɵɵinject(i2.CookieService), i0.ɵɵinject(i3.EncryptionService), i0.ɵɵinject(i0.INJECTOR)); }, token: PersistService, providedIn: "root" });
|
|
170
|
-
PersistService.decorators = [
|
|
171
|
-
{ type: Injectable, args: [{
|
|
172
|
-
providedIn: 'root',
|
|
173
|
-
},] }
|
|
174
|
-
];
|
|
175
|
-
PersistService.ctorParameters = () => [
|
|
176
|
-
{ type: KFS },
|
|
177
|
-
{ type: CookieService },
|
|
178
|
-
{ type: EncryptionService },
|
|
179
|
-
{ type: Injector }
|
|
180
|
-
];
|
|
181
|
-
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"persist.service.js","sourceRoot":"/opt/atlassian/pipelines/agent/build/projects/core/src/","sources":["lib/api/persist.service.ts"],"names":[],"mappings":";AACA,OAAO,EAAE,UAAU,EAAE,QAAQ,EAAE,MAAM,eAAe,CAAC;AACrD,OAAO,EAAE,aAAa,EAAE,MAAM,oBAAoB,CAAC;AACnD,OAAO,EAAE,iBAAiB,EAAE,MAAM,oCAAoC,CAAC;AACvE,OAAO,EAAE,SAAS,EAAE,MAAM,eAAe,CAAC;AAC1C,OAAO,EAAE,sBAAsB,EAAE,MAAM,uBAAuB,CAAC;AAC/D,OAAO,EAAE,iBAAiB,IAAI,GAAG,EAAE,MAAM,qCAAqC,CAAC;;;;;AAe/E,MAAM,OAAO,cAAc;IAMzB,YACU,UAAe,EACf,aAA4B,EAC5B,iBAAoC,EACpC,QAAkB;QAHlB,eAAU,GAAV,UAAU,CAAK;QACf,kBAAa,GAAb,aAAa,CAAe;QAC5B,sBAAiB,GAAjB,iBAAiB,CAAmB;QACpC,aAAQ,GAAR,QAAQ,CAAU;QATX,eAAU,GAAG,YAAY,CAAC;QAEnC,iBAAY,GAAG,IAAI,CAAC;QACpB,+BAA0B,GAAY,IAAI,CAAC;QAQjD,IAAI,SAAS,EAAE,EAAE;YACf,IAAI,CAAC,eAAe,CAAC,KAAK,CAAC,CAAC;SAC7B;IACH,CAAC;IAED,6BAA6B,CAAC,GAAY;QACxC,IAAI,CAAC,0BAA0B,GAAG,GAAG,CAAC;IACxC,CAAC;IAED,+BAA+B;QAC7B,IAAI,CAAC,0BAA0B,GAAG,IAAI,CAAC;IACzC,CAAC;IAED,oFAAoF;IAC5E,eAAe;QACrB,OAAO;YACL,IAAI,EAAE,GAAG;YACT,MAAM,EAAE,IAAI;YACZ,MAAM,EAAE,IAAI,CAAC,YAAY;YACzB,QAAQ,EAAE,KAAkC;SAC7C,CAAC;IACJ,CAAC;IAEM,KAAK;QACV,qBAAqB;QACrB,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,aAAa,CAAC,MAAM,EAAE,CAAC,CAAC,OAAO,CAAC,CAAC,GAAG,EAAE,EAAE;YACvD,IAAI,GAAG,CAAC,UAAU,CAAC,IAAI,CAAC,UAAU,CAAC,EAAE;gBACnC,IAAI,CAAC,kBAAkB,CAAC,GAAG,CAAC,CAAC;aAC9B;QACH,CAAC,CAAC,CAAC;QAEH,yCAAyC;QACzC,MAAM,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,OAAO,CAAC,CAAC,GAAG,EAAE,EAAE;YACxC,IAAI,GAAG,CAAC,UAAU,CAAC,IAAI,CAAC,UAAU,CAAC,EAAE;gBACnC,IAAI,CAAC,kBAAkB,CAAC,GAAG,CAAC,CAAC;aAC9B;QACH,CAAC,CAAC,CAAC;IACL,CAAC;IAEM,eAAe,CAAC,KAAc;QACnC,IAAI,CAAC,YAAY,GAAG,KAAK,CAAC;QAC1B,IAAI,CAAC,KAAK,EAAE;YACV,IAAI,SAAS,EAAE,EAAE;gBACf,OAAO,CAAC,IAAI,CACV,mGAAmG,CACpG,CAAC;aACH;iBAAM;gBACL,MAAM,IAAI,sBAAsB,CAC9B,4EAA4E,CAC7E,CAAC;aACH;SACF;IACH,CAAC;IAEO,UAAU,CAAC,IAAY;QAC7B,OAAO,IAAI,CAAC,UAAU,GAAG,IAAI,CAAC;IAChC,CAAC;IAEM,MAAM,CAAC,IAAY;QACxB,IAAI,CAAC,kBAAkB,CAAC,IAAI,CAAC,UAAU,CAAC,IAAI,CAAC,CAAC,CAAC;IACjD,CAAC;IAEO,kBAAkB,CAAC,YAAoB;QAC7C,MAAM,MAAM,GAAG,IAAI,CAAC,eAAe,EAAE,CAAC;QACtC,IAAI,CAAC,aAAa,CAAC,MAAM,CACvB,YAAY,EAAE,gBAAgB;QAC9B,MAAM,CAAC,IAAI,EAAE,iBAAiB;QAC9B,MAAM,CAAC,MAAM,EAAE,oBAAoB;QACnC,MAAM,CAAC,MAAM,EAAE,qBAAqB;QACpC,MAAM,CAAC,QAAQ,CAAC,gDAAgD;SACjE,CAAC;QACF,YAAY,CAAC,UAAU,CAAC,YAAY,CAAC,CAAC;IACxC,CAAC;IAEY,GAAG,CAAC,EACf,IAAI,EACJ,KAAK,EACL,aAAa,EACb,MAAM,GAMP;;YACC,MAAM,YAAY,GAAG,IAAI,CAAC,UAAU,CAAC,IAAI,CAAC,CAAC;YAE3C,IAAI,IAAU,CAAC;YAEf,IAAI,aAAa,EAAE;gBACjB,IAAI,GAAG;oBACL,aAAa,EAAE,IAAI;oBACnB,IAAI,EAAE,MAAM,IAAI,CAAC,iBAAiB,CAAC,eAAe,CAChD,IAAI,CAAC,0BAA0B,EAC/B,KAAK,CACN;iBACF,CAAC;aACH;iBAAM;gBACL,IAAI,GAAG;oBACL,IAAI,EAAE,KAAK;iBACZ,CAAC;aACH;YAED,IAAI,MAAM,EAAE;gBACV,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,SAAS,EAAE,CAAC;gBAC9C,IAAI,CAAC,MAAM,GAAG,MAAM,CAAC,WAAW,EAAE,CAAC;gBACnC,IAAI,CAAC,IAAI,GAAG,MAAM,IAAI,CAAC,iBAAiB,CAAC,eAAe,CAAC,GAAG,EAAE,IAAI,CAAC,IAAI,CAAC,CAAC;gBAEzE,MAAM,UAAU,GAAe;oBAC7B,GAAG,EAAE,GAAG,CAAC,MAAM,CAAC,IAAI,CAAC;iBACtB,CAAC;gBAEF,oEAAoE;gBACpE,uEAAuE;gBACvE,yEAAyE;gBACzE,4EAA4E;gBAC5E,uEAAuE;gBACvE,MAAM,MAAM,GAAG,IAAI,CAAC,eAAe,EAAE,CAAC;gBACtC,IAAI,CAAC,aAAa,CAAC,GAAG,CACpB,YAAY,EAAE,gBAAgB;gBAC9B,IAAI,CAAC,SAAS,CAAC,UAAU,CAAC,EAAE,iBAAiB;gBAC7C,MAAM,EAAE,2BAA2B;gBACnC,MAAM,CAAC,IAAI,EAAE,iBAAiB;gBAC9B,MAAM,CAAC,MAAM,EAAE,mBAAmB;gBAClC,MAAM,CAAC,MAAM,EAAE,oBAAoB;gBACnC,MAAM,CAAC,QAAQ,CAAC,uCAAuC;iBACxD,CAAC;aACH;YAED,YAAY,CAAC,OAAO,CAAC,YAAY,EAAE,IAAI,CAAC,SAAS,CAAC,IAAI,CAAC,CAAC,CAAC;QAC3D,CAAC;KAAA;IAEY,GAAG,CAAC,IAAY;;YAC3B,MAAM,YAAY,GAAG,IAAI,CAAC,UAAU,CAAC,IAAI,CAAC,CAAC;YAE3C,IAAI;gBACF,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,OAAO,CAAC,YAAY,CAAC,CAAC;gBAC7C,IAAI,GAAG,IAAI,IAAI,EAAE;oBACf,4CAA4C;oBAC5C,IAAI,CAAC,kBAAkB,CAAC,YAAY,CAAC,CAAC;iBACvC;gBACD,OAAO,GAAG,CAAC;aACZ;YAAC,OAAO,KAAK,EAAE;gBACd,IAAI,CAAC,kBAAkB,CAAC,YAAY,CAAC,CAAC;gBACtC,MAAM,KAAK,CAAC;aACb;QACH,CAAC;KAAA;IAEa,OAAO,CAAC,IAAY;;YAChC,MAAM,UAAU,GAAG,YAAY,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC;YAC9C,IAAI,CAAC,UAAU,EAAE;gBACf,OAAO,IAAI,CAAC;aACb;YAED,MAAM,IAAI,GAAS,IAAI,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC;YAE1C,IAAI,IAAS,CAAC;YAEd,IAAI,IAAI,CAAC,MAAM,EAAE;gBACf,MAAM,gBAAgB,GAAG,IAAI,CAAC,aAAa,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC;gBACtD,IAAI,CAAC,gBAAgB,EAAE;oBACrB,gFAAgF;oBAChF,+EAA+E;oBAC/E,2CAA2C;oBAC3C,OAAO,CAAC,GAAG,CAAC,YAAY,CAAC,CAAC;oBAC1B,OAAO,IAAI,CAAC;iBACb;gBAED,MAAM,UAAU,GAAG,IAAI,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC;gBAEhD,MAAM,GAAG,GAAG,MAAM,GAAG,CAAC,KAAK,CAAC,UAAU,CAAC,GAAG,CAAC,CAAC;gBAE5C,IAAI,GAAG,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAAC,GAAG,EAAE,IAAI,CAAC,IAAI,CAAC,CAAC;aAC7D;iBAAM;gBACL,IAAI,GAAG,IAAI,CAAC,IAAI,CAAC;aAClB;YAED,IAAI,IAAI,CAAC,aAAa,EAAE;gBACtB,IAAI,GAAG,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CACzC,IAAI,CAAC,0BAA0B,EAC/B,IAAI,CACL,CAAC;aACH;YAED,OAAO,IAAI,CAAC;QACd,CAAC;KAAA;;;;YAxMF,UAAU,SAAC;gBACV,UAAU,EAAE,MAAM;aACnB;;;YAd6B,GAAG;YAJxB,aAAa;YACb,iBAAiB;YAFL,QAAQ","sourcesContent":["import { JWK } from 'node-jose';\nimport { Injectable, Injector } from '@angular/core';\nimport { CookieService } from 'ngx-cookie-service';\nimport { EncryptionService } from '../cryptography/encryption.service';\nimport { isDevMode } from '@angular/core';\nimport { LrBadArgumentException } from '../_common/exceptions';\nimport { KeyFactoryService as KFS } from '../cryptography/key-factory.service';\n\ninterface Item {\n  data: string;\n  expiry?: string; // iso format\n  serverSession?: boolean;\n}\n\ninterface CookieItem {\n  key: any;\n}\n\n@Injectable({\n  providedIn: 'root',\n})\nexport class PersistService {\n  private readonly KEY_PREFIX = 'lrSession-';\n\n  private cookieSecure = true;\n  private serverSessionEncryptionKey: JWK.Key = null;\n\n  constructor(\n    private keyFactory: KFS,\n    private cookieService: CookieService,\n    private encryptionService: EncryptionService,\n    private injector: Injector\n  ) {\n    if (isDevMode()) {\n      this.setCookieSecure(false);\n    }\n  }\n\n  setServerSessionEncryptionKey(key: JWK.Key) {\n    this.serverSessionEncryptionKey = key;\n  }\n\n  clearServerSessionEncryptionKey() {\n    this.serverSessionEncryptionKey = null;\n  }\n\n  // It's important that set and delete cookie use exactly the same set of parameters.\n  private getCookieParams() {\n    return {\n      path: '/',\n      domain: null, // which means the current domain of the frontend app.\n      secure: this.cookieSecure,\n      sameSite: 'Lax' as 'Lax' | 'None' | 'Strict',\n    };\n  }\n\n  public clear() {\n    // Remove all cookies\n    Object.keys(this.cookieService.getAll()).forEach((key) => {\n      if (key.startsWith(this.KEY_PREFIX)) {\n        this.deletePrefixedName(key);\n      }\n    });\n\n    // Remove all persisted session variables\n    Object.keys(localStorage).forEach((key) => {\n      if (key.startsWith(this.KEY_PREFIX)) {\n        this.deletePrefixedName(key);\n      }\n    });\n  }\n\n  public setCookieSecure(value: boolean) {\n    this.cookieSecure = value;\n    if (!value) {\n      if (isDevMode()) {\n        console.warn(\n          'The cookie secure flag in persistService has been set to false, set it to true in production mode'\n        );\n      } else {\n        throw new LrBadArgumentException(\n          'Can not set PersistService cookie secure flag to false in production mode.'\n        );\n      }\n    }\n  }\n\n  private prefixName(name: string): string {\n    return this.KEY_PREFIX + name;\n  }\n\n  public delete(name: string): void {\n    this.deletePrefixedName(this.prefixName(name));\n  }\n\n  private deletePrefixedName(prefixedName: string): void {\n    const params = this.getCookieParams();\n    this.cookieService.delete(\n      prefixedName, // name: string,\n      params.path, // path?: string,\n      params.domain, // domain ?: string,\n      params.secure, // secure ?: boolean,\n      params.sameSite // sameSite ?: 'Lax' | 'None' | 'Strict'): void;\n    );\n    localStorage.removeItem(prefixedName);\n  }\n\n  public async set({\n    name,\n    value,\n    serverSession,\n    expiry,\n  }: {\n    name: string;\n    value: any;\n    serverSession: boolean;\n    expiry?: Date;\n  }): Promise<void> {\n    const prefixedName = this.prefixName(name);\n\n    let item: Item;\n\n    if (serverSession) {\n      item = {\n        serverSession: true,\n        data: await this.encryptionService.encryptToString(\n          this.serverSessionEncryptionKey,\n          value\n        ),\n      };\n    } else {\n      item = {\n        data: value,\n      };\n    }\n\n    if (expiry) {\n      const key = await this.keyFactory.createKey();\n      item.expiry = expiry.toISOString();\n      item.data = await this.encryptionService.encryptToString(key, item.data);\n\n      const cookieItem: CookieItem = {\n        key: key.toJSON(true),\n      };\n\n      // If path is set to anything other than \"/\" then the cookie is only\n      // accessible by JS if the current URL has the same prefix as the path.\n      // Ideally we don't want the encryption key cookie to be sent at all, but\n      // since the encrypted content is held in localstorage, it is not a security\n      // risk, i.e. it is at least as secure as storing only in localstorage.\n      const params = this.getCookieParams();\n      this.cookieService.set(\n        prefixedName, // name: string,\n        JSON.stringify(cookieItem), // value: string,\n        expiry, // expires?: number | Date,\n        params.path, // path?: string,\n        params.domain, // domain?: string,\n        params.secure, // secure?: boolean,\n        params.sameSite // sameSite?: 'Lax' | 'None' | 'Strict'\n      );\n    }\n\n    localStorage.setItem(prefixedName, JSON.stringify(item));\n  }\n\n  public async get(name: string): Promise<any> {\n    const prefixedName = this.prefixName(name);\n\n    try {\n      const ret = await this.getImpl(prefixedName);\n      if (ret == null) {\n        // Clear any cookies to keep things in sync.\n        this.deletePrefixedName(prefixedName);\n      }\n      return ret;\n    } catch (error) {\n      this.deletePrefixedName(prefixedName);\n      throw error;\n    }\n  }\n\n  private async getImpl(name: string): Promise<any> {\n    const itemString = localStorage.getItem(name);\n    if (!itemString) {\n      return null;\n    }\n\n    const item: Item = JSON.parse(itemString);\n\n    let data: any;\n\n    if (item.expiry) {\n      const cookieItemString = this.cookieService.get(name);\n      if (!cookieItemString) {\n        // Probably expired, but we won't make any interpretations since if we only used\n        // cookies we can't tell if it's expired or explicitly removed. So we just make\n        // the behaviour here consistent with that.\n        console.log('No cookie.');\n        return null;\n      }\n\n      const cookieItem = JSON.parse(cookieItemString);\n\n      const key = await KFS.asKey(cookieItem.key);\n\n      data = await this.encryptionService.decrypt(key, item.data);\n    } else {\n      data = item.data;\n    }\n\n    if (item.serverSession) {\n      data = await this.encryptionService.decrypt(\n        this.serverSessionEncryptionKey,\n        data\n      );\n    }\n\n    return data;\n  }\n}\n"]}
|
|
1
|
+
import { __awaiter } from "tslib";
|
|
2
|
+
import { Injectable, Injector } from '@angular/core';
|
|
3
|
+
import { CookieService } from 'ngx-cookie-service';
|
|
4
|
+
import { EncryptionService } from '../cryptography/encryption.service';
|
|
5
|
+
import { isDevMode } from '@angular/core';
|
|
6
|
+
import { LrBadArgumentException } from '../_common/exceptions';
|
|
7
|
+
import { KeyFactoryService as KFS } from '../cryptography/key-factory.service';
|
|
8
|
+
import * as i0 from "@angular/core";
|
|
9
|
+
import * as i1 from "../cryptography/key-factory.service";
|
|
10
|
+
import * as i2 from "ngx-cookie-service";
|
|
11
|
+
import * as i3 from "../cryptography/encryption.service";
|
|
12
|
+
export class PersistService {
|
|
13
|
+
constructor(keyFactory, cookieService, encryptionService, injector) {
|
|
14
|
+
this.keyFactory = keyFactory;
|
|
15
|
+
this.cookieService = cookieService;
|
|
16
|
+
this.encryptionService = encryptionService;
|
|
17
|
+
this.injector = injector;
|
|
18
|
+
this.KEY_PREFIX = 'lrSession-';
|
|
19
|
+
this.cookieSecure = true;
|
|
20
|
+
this.serverSessionEncryptionKey = null;
|
|
21
|
+
if (isDevMode()) {
|
|
22
|
+
this.setCookieSecure(false);
|
|
23
|
+
}
|
|
24
|
+
}
|
|
25
|
+
setServerSessionEncryptionKey(key) {
|
|
26
|
+
this.serverSessionEncryptionKey = key;
|
|
27
|
+
}
|
|
28
|
+
clearServerSessionEncryptionKey() {
|
|
29
|
+
this.serverSessionEncryptionKey = null;
|
|
30
|
+
}
|
|
31
|
+
// It's important that set and delete cookie use exactly the same set of parameters.
|
|
32
|
+
getCookieParams() {
|
|
33
|
+
return {
|
|
34
|
+
path: '/',
|
|
35
|
+
domain: null,
|
|
36
|
+
secure: this.cookieSecure,
|
|
37
|
+
sameSite: 'Lax',
|
|
38
|
+
};
|
|
39
|
+
}
|
|
40
|
+
clear() {
|
|
41
|
+
// Remove all cookies
|
|
42
|
+
Object.keys(this.cookieService.getAll()).forEach((key) => {
|
|
43
|
+
if (key.startsWith(this.KEY_PREFIX)) {
|
|
44
|
+
this.deletePrefixedName(key);
|
|
45
|
+
}
|
|
46
|
+
});
|
|
47
|
+
// Remove all persisted session variables
|
|
48
|
+
Object.keys(localStorage).forEach((key) => {
|
|
49
|
+
if (key.startsWith(this.KEY_PREFIX)) {
|
|
50
|
+
this.deletePrefixedName(key);
|
|
51
|
+
}
|
|
52
|
+
});
|
|
53
|
+
}
|
|
54
|
+
setCookieSecure(value) {
|
|
55
|
+
this.cookieSecure = value;
|
|
56
|
+
if (!value) {
|
|
57
|
+
if (isDevMode()) {
|
|
58
|
+
console.warn('The cookie secure flag in persistService has been set to false, set it to true in production mode');
|
|
59
|
+
}
|
|
60
|
+
else {
|
|
61
|
+
throw new LrBadArgumentException('Can not set PersistService cookie secure flag to false in production mode.');
|
|
62
|
+
}
|
|
63
|
+
}
|
|
64
|
+
}
|
|
65
|
+
prefixName(name) {
|
|
66
|
+
return this.KEY_PREFIX + name;
|
|
67
|
+
}
|
|
68
|
+
delete(name) {
|
|
69
|
+
this.deletePrefixedName(this.prefixName(name));
|
|
70
|
+
}
|
|
71
|
+
deletePrefixedName(prefixedName) {
|
|
72
|
+
const params = this.getCookieParams();
|
|
73
|
+
this.cookieService.delete(prefixedName, // name: string,
|
|
74
|
+
params.path, // path?: string,
|
|
75
|
+
params.domain, // domain ?: string,
|
|
76
|
+
params.secure, // secure ?: boolean,
|
|
77
|
+
params.sameSite // sameSite ?: 'Lax' | 'None' | 'Strict'): void;
|
|
78
|
+
);
|
|
79
|
+
localStorage.removeItem(prefixedName);
|
|
80
|
+
}
|
|
81
|
+
set({ name, value, serverSession, expiry, }) {
|
|
82
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
83
|
+
const prefixedName = this.prefixName(name);
|
|
84
|
+
let item;
|
|
85
|
+
if (serverSession) {
|
|
86
|
+
item = {
|
|
87
|
+
serverSession: true,
|
|
88
|
+
data: yield this.encryptionService.encryptToString(this.serverSessionEncryptionKey, value),
|
|
89
|
+
};
|
|
90
|
+
}
|
|
91
|
+
else {
|
|
92
|
+
item = {
|
|
93
|
+
data: value,
|
|
94
|
+
};
|
|
95
|
+
}
|
|
96
|
+
if (expiry) {
|
|
97
|
+
const key = yield this.keyFactory.createKey();
|
|
98
|
+
item.expiry = expiry.toISOString();
|
|
99
|
+
item.data = yield this.encryptionService.encryptToString(key, item.data);
|
|
100
|
+
const cookieItem = {
|
|
101
|
+
key: key.toJSON(true),
|
|
102
|
+
};
|
|
103
|
+
// If path is set to anything other than "/" then the cookie is only
|
|
104
|
+
// accessible by JS if the current URL has the same prefix as the path.
|
|
105
|
+
// Ideally we don't want the encryption key cookie to be sent at all, but
|
|
106
|
+
// since the encrypted content is held in localstorage, it is not a security
|
|
107
|
+
// risk, i.e. it is at least as secure as storing only in localstorage.
|
|
108
|
+
const params = this.getCookieParams();
|
|
109
|
+
this.cookieService.set(prefixedName, // name: string,
|
|
110
|
+
JSON.stringify(cookieItem), // value: string,
|
|
111
|
+
expiry, // expires?: number | Date,
|
|
112
|
+
params.path, // path?: string,
|
|
113
|
+
params.domain, // domain?: string,
|
|
114
|
+
params.secure, // secure?: boolean,
|
|
115
|
+
params.sameSite // sameSite?: 'Lax' | 'None' | 'Strict'
|
|
116
|
+
);
|
|
117
|
+
}
|
|
118
|
+
localStorage.setItem(prefixedName, JSON.stringify(item));
|
|
119
|
+
});
|
|
120
|
+
}
|
|
121
|
+
get(name) {
|
|
122
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
123
|
+
const prefixedName = this.prefixName(name);
|
|
124
|
+
try {
|
|
125
|
+
const ret = yield this.getImpl(prefixedName);
|
|
126
|
+
if (ret == null) {
|
|
127
|
+
// Clear any cookies to keep things in sync.
|
|
128
|
+
this.deletePrefixedName(prefixedName);
|
|
129
|
+
}
|
|
130
|
+
return ret;
|
|
131
|
+
}
|
|
132
|
+
catch (error) {
|
|
133
|
+
this.deletePrefixedName(prefixedName);
|
|
134
|
+
throw error;
|
|
135
|
+
}
|
|
136
|
+
});
|
|
137
|
+
}
|
|
138
|
+
getImpl(name) {
|
|
139
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
140
|
+
const itemString = localStorage.getItem(name);
|
|
141
|
+
if (!itemString) {
|
|
142
|
+
return null;
|
|
143
|
+
}
|
|
144
|
+
const item = JSON.parse(itemString);
|
|
145
|
+
let data;
|
|
146
|
+
if (item.expiry) {
|
|
147
|
+
const cookieItemString = this.cookieService.get(name);
|
|
148
|
+
if (!cookieItemString) {
|
|
149
|
+
// Probably expired, but we won't make any interpretations since if we only used
|
|
150
|
+
// cookies we can't tell if it's expired or explicitly removed. So we just make
|
|
151
|
+
// the behaviour here consistent with that.
|
|
152
|
+
console.log('No cookie.');
|
|
153
|
+
return null;
|
|
154
|
+
}
|
|
155
|
+
const cookieItem = JSON.parse(cookieItemString);
|
|
156
|
+
const key = yield KFS.asKey(cookieItem.key);
|
|
157
|
+
data = yield this.encryptionService.decrypt(key, item.data);
|
|
158
|
+
}
|
|
159
|
+
else {
|
|
160
|
+
data = item.data;
|
|
161
|
+
}
|
|
162
|
+
if (item.serverSession) {
|
|
163
|
+
data = yield this.encryptionService.decrypt(this.serverSessionEncryptionKey, data);
|
|
164
|
+
}
|
|
165
|
+
return data;
|
|
166
|
+
});
|
|
167
|
+
}
|
|
168
|
+
}
|
|
169
|
+
PersistService.ɵprov = i0.ɵɵdefineInjectable({ factory: function PersistService_Factory() { return new PersistService(i0.ɵɵinject(i1.KeyFactoryService), i0.ɵɵinject(i2.CookieService), i0.ɵɵinject(i3.EncryptionService), i0.ɵɵinject(i0.INJECTOR)); }, token: PersistService, providedIn: "root" });
|
|
170
|
+
PersistService.decorators = [
|
|
171
|
+
{ type: Injectable, args: [{
|
|
172
|
+
providedIn: 'root',
|
|
173
|
+
},] }
|
|
174
|
+
];
|
|
175
|
+
PersistService.ctorParameters = () => [
|
|
176
|
+
{ type: KFS },
|
|
177
|
+
{ type: CookieService },
|
|
178
|
+
{ type: EncryptionService },
|
|
179
|
+
{ type: Injector }
|
|
180
|
+
];
|
|
181
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"persist.service.js","sourceRoot":"C:/Projects/newrepo/kc-client/projects/core/src/","sources":["lib/api/persist.service.ts"],"names":[],"mappings":";AACA,OAAO,EAAE,UAAU,EAAE,QAAQ,EAAE,MAAM,eAAe,CAAC;AACrD,OAAO,EAAE,aAAa,EAAE,MAAM,oBAAoB,CAAC;AACnD,OAAO,EAAE,iBAAiB,EAAE,MAAM,oCAAoC,CAAC;AACvE,OAAO,EAAE,SAAS,EAAE,MAAM,eAAe,CAAC;AAC1C,OAAO,EAAE,sBAAsB,EAAE,MAAM,uBAAuB,CAAC;AAC/D,OAAO,EAAE,iBAAiB,IAAI,GAAG,EAAE,MAAM,qCAAqC,CAAC;;;;;AAe/E,MAAM,OAAO,cAAc;IAMzB,YACU,UAAe,EACf,aAA4B,EAC5B,iBAAoC,EACpC,QAAkB;QAHlB,eAAU,GAAV,UAAU,CAAK;QACf,kBAAa,GAAb,aAAa,CAAe;QAC5B,sBAAiB,GAAjB,iBAAiB,CAAmB;QACpC,aAAQ,GAAR,QAAQ,CAAU;QATX,eAAU,GAAG,YAAY,CAAC;QAEnC,iBAAY,GAAG,IAAI,CAAC;QACpB,+BAA0B,GAAY,IAAI,CAAC;QAQjD,IAAI,SAAS,EAAE,EAAE;YACf,IAAI,CAAC,eAAe,CAAC,KAAK,CAAC,CAAC;SAC7B;IACH,CAAC;IAED,6BAA6B,CAAC,GAAY;QACxC,IAAI,CAAC,0BAA0B,GAAG,GAAG,CAAC;IACxC,CAAC;IAED,+BAA+B;QAC7B,IAAI,CAAC,0BAA0B,GAAG,IAAI,CAAC;IACzC,CAAC;IAED,oFAAoF;IAC5E,eAAe;QACrB,OAAO;YACL,IAAI,EAAE,GAAG;YACT,MAAM,EAAE,IAAI;YACZ,MAAM,EAAE,IAAI,CAAC,YAAY;YACzB,QAAQ,EAAE,KAAkC;SAC7C,CAAC;IACJ,CAAC;IAEM,KAAK;QACV,qBAAqB;QACrB,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,aAAa,CAAC,MAAM,EAAE,CAAC,CAAC,OAAO,CAAC,CAAC,GAAG,EAAE,EAAE;YACvD,IAAI,GAAG,CAAC,UAAU,CAAC,IAAI,CAAC,UAAU,CAAC,EAAE;gBACnC,IAAI,CAAC,kBAAkB,CAAC,GAAG,CAAC,CAAC;aAC9B;QACH,CAAC,CAAC,CAAC;QAEH,yCAAyC;QACzC,MAAM,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,OAAO,CAAC,CAAC,GAAG,EAAE,EAAE;YACxC,IAAI,GAAG,CAAC,UAAU,CAAC,IAAI,CAAC,UAAU,CAAC,EAAE;gBACnC,IAAI,CAAC,kBAAkB,CAAC,GAAG,CAAC,CAAC;aAC9B;QACH,CAAC,CAAC,CAAC;IACL,CAAC;IAEM,eAAe,CAAC,KAAc;QACnC,IAAI,CAAC,YAAY,GAAG,KAAK,CAAC;QAC1B,IAAI,CAAC,KAAK,EAAE;YACV,IAAI,SAAS,EAAE,EAAE;gBACf,OAAO,CAAC,IAAI,CACV,mGAAmG,CACpG,CAAC;aACH;iBAAM;gBACL,MAAM,IAAI,sBAAsB,CAC9B,4EAA4E,CAC7E,CAAC;aACH;SACF;IACH,CAAC;IAEO,UAAU,CAAC,IAAY;QAC7B,OAAO,IAAI,CAAC,UAAU,GAAG,IAAI,CAAC;IAChC,CAAC;IAEM,MAAM,CAAC,IAAY;QACxB,IAAI,CAAC,kBAAkB,CAAC,IAAI,CAAC,UAAU,CAAC,IAAI,CAAC,CAAC,CAAC;IACjD,CAAC;IAEO,kBAAkB,CAAC,YAAoB;QAC7C,MAAM,MAAM,GAAG,IAAI,CAAC,eAAe,EAAE,CAAC;QACtC,IAAI,CAAC,aAAa,CAAC,MAAM,CACvB,YAAY,EAAE,gBAAgB;QAC9B,MAAM,CAAC,IAAI,EAAE,iBAAiB;QAC9B,MAAM,CAAC,MAAM,EAAE,oBAAoB;QACnC,MAAM,CAAC,MAAM,EAAE,qBAAqB;QACpC,MAAM,CAAC,QAAQ,CAAC,gDAAgD;SACjE,CAAC;QACF,YAAY,CAAC,UAAU,CAAC,YAAY,CAAC,CAAC;IACxC,CAAC;IAEY,GAAG,CAAC,EACf,IAAI,EACJ,KAAK,EACL,aAAa,EACb,MAAM,GAMP;;YACC,MAAM,YAAY,GAAG,IAAI,CAAC,UAAU,CAAC,IAAI,CAAC,CAAC;YAE3C,IAAI,IAAU,CAAC;YAEf,IAAI,aAAa,EAAE;gBACjB,IAAI,GAAG;oBACL,aAAa,EAAE,IAAI;oBACnB,IAAI,EAAE,MAAM,IAAI,CAAC,iBAAiB,CAAC,eAAe,CAChD,IAAI,CAAC,0BAA0B,EAC/B,KAAK,CACN;iBACF,CAAC;aACH;iBAAM;gBACL,IAAI,GAAG;oBACL,IAAI,EAAE,KAAK;iBACZ,CAAC;aACH;YAED,IAAI,MAAM,EAAE;gBACV,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,SAAS,EAAE,CAAC;gBAC9C,IAAI,CAAC,MAAM,GAAG,MAAM,CAAC,WAAW,EAAE,CAAC;gBACnC,IAAI,CAAC,IAAI,GAAG,MAAM,IAAI,CAAC,iBAAiB,CAAC,eAAe,CAAC,GAAG,EAAE,IAAI,CAAC,IAAI,CAAC,CAAC;gBAEzE,MAAM,UAAU,GAAe;oBAC7B,GAAG,EAAE,GAAG,CAAC,MAAM,CAAC,IAAI,CAAC;iBACtB,CAAC;gBAEF,oEAAoE;gBACpE,uEAAuE;gBACvE,yEAAyE;gBACzE,4EAA4E;gBAC5E,uEAAuE;gBACvE,MAAM,MAAM,GAAG,IAAI,CAAC,eAAe,EAAE,CAAC;gBACtC,IAAI,CAAC,aAAa,CAAC,GAAG,CACpB,YAAY,EAAE,gBAAgB;gBAC9B,IAAI,CAAC,SAAS,CAAC,UAAU,CAAC,EAAE,iBAAiB;gBAC7C,MAAM,EAAE,2BAA2B;gBACnC,MAAM,CAAC,IAAI,EAAE,iBAAiB;gBAC9B,MAAM,CAAC,MAAM,EAAE,mBAAmB;gBAClC,MAAM,CAAC,MAAM,EAAE,oBAAoB;gBACnC,MAAM,CAAC,QAAQ,CAAC,uCAAuC;iBACxD,CAAC;aACH;YAED,YAAY,CAAC,OAAO,CAAC,YAAY,EAAE,IAAI,CAAC,SAAS,CAAC,IAAI,CAAC,CAAC,CAAC;QAC3D,CAAC;KAAA;IAEY,GAAG,CAAC,IAAY;;YAC3B,MAAM,YAAY,GAAG,IAAI,CAAC,UAAU,CAAC,IAAI,CAAC,CAAC;YAE3C,IAAI;gBACF,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,OAAO,CAAC,YAAY,CAAC,CAAC;gBAC7C,IAAI,GAAG,IAAI,IAAI,EAAE;oBACf,4CAA4C;oBAC5C,IAAI,CAAC,kBAAkB,CAAC,YAAY,CAAC,CAAC;iBACvC;gBACD,OAAO,GAAG,CAAC;aACZ;YAAC,OAAO,KAAK,EAAE;gBACd,IAAI,CAAC,kBAAkB,CAAC,YAAY,CAAC,CAAC;gBACtC,MAAM,KAAK,CAAC;aACb;QACH,CAAC;KAAA;IAEa,OAAO,CAAC,IAAY;;YAChC,MAAM,UAAU,GAAG,YAAY,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC;YAC9C,IAAI,CAAC,UAAU,EAAE;gBACf,OAAO,IAAI,CAAC;aACb;YAED,MAAM,IAAI,GAAS,IAAI,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC;YAE1C,IAAI,IAAS,CAAC;YAEd,IAAI,IAAI,CAAC,MAAM,EAAE;gBACf,MAAM,gBAAgB,GAAG,IAAI,CAAC,aAAa,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC;gBACtD,IAAI,CAAC,gBAAgB,EAAE;oBACrB,gFAAgF;oBAChF,+EAA+E;oBAC/E,2CAA2C;oBAC3C,OAAO,CAAC,GAAG,CAAC,YAAY,CAAC,CAAC;oBAC1B,OAAO,IAAI,CAAC;iBACb;gBAED,MAAM,UAAU,GAAG,IAAI,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC;gBAEhD,MAAM,GAAG,GAAG,MAAM,GAAG,CAAC,KAAK,CAAC,UAAU,CAAC,GAAG,CAAC,CAAC;gBAE5C,IAAI,GAAG,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAAC,GAAG,EAAE,IAAI,CAAC,IAAI,CAAC,CAAC;aAC7D;iBAAM;gBACL,IAAI,GAAG,IAAI,CAAC,IAAI,CAAC;aAClB;YAED,IAAI,IAAI,CAAC,aAAa,EAAE;gBACtB,IAAI,GAAG,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CACzC,IAAI,CAAC,0BAA0B,EAC/B,IAAI,CACL,CAAC;aACH;YAED,OAAO,IAAI,CAAC;QACd,CAAC;KAAA;;;;YAxMF,UAAU,SAAC;gBACV,UAAU,EAAE,MAAM;aACnB;;;YAd6B,GAAG;YAJxB,aAAa;YACb,iBAAiB;YAFL,QAAQ","sourcesContent":["import { JWK } from 'node-jose';\r\nimport { Injectable, Injector } from '@angular/core';\r\nimport { CookieService } from 'ngx-cookie-service';\r\nimport { EncryptionService } from '../cryptography/encryption.service';\r\nimport { isDevMode } from '@angular/core';\r\nimport { LrBadArgumentException } from '../_common/exceptions';\r\nimport { KeyFactoryService as KFS } from '../cryptography/key-factory.service';\r\n\r\ninterface Item {\r\n  data: string;\r\n  expiry?: string; // iso format\r\n  serverSession?: boolean;\r\n}\r\n\r\ninterface CookieItem {\r\n  key: any;\r\n}\r\n\r\n@Injectable({\r\n  providedIn: 'root',\r\n})\r\nexport class PersistService {\r\n  private readonly KEY_PREFIX = 'lrSession-';\r\n\r\n  private cookieSecure = true;\r\n  private serverSessionEncryptionKey: JWK.Key = null;\r\n\r\n  constructor(\r\n    private keyFactory: KFS,\r\n    private cookieService: CookieService,\r\n    private encryptionService: EncryptionService,\r\n    private injector: Injector\r\n  ) {\r\n    if (isDevMode()) {\r\n      this.setCookieSecure(false);\r\n    }\r\n  }\r\n\r\n  setServerSessionEncryptionKey(key: JWK.Key) {\r\n    this.serverSessionEncryptionKey = key;\r\n  }\r\n\r\n  clearServerSessionEncryptionKey() {\r\n    this.serverSessionEncryptionKey = null;\r\n  }\r\n\r\n  // It's important that set and delete cookie use exactly the same set of parameters.\r\n  private getCookieParams() {\r\n    return {\r\n      path: '/',\r\n      domain: null, // which means the current domain of the frontend app.\r\n      secure: this.cookieSecure,\r\n      sameSite: 'Lax' as 'Lax' | 'None' | 'Strict',\r\n    };\r\n  }\r\n\r\n  public clear() {\r\n    // Remove all cookies\r\n    Object.keys(this.cookieService.getAll()).forEach((key) => {\r\n      if (key.startsWith(this.KEY_PREFIX)) {\r\n        this.deletePrefixedName(key);\r\n      }\r\n    });\r\n\r\n    // Remove all persisted session variables\r\n    Object.keys(localStorage).forEach((key) => {\r\n      if (key.startsWith(this.KEY_PREFIX)) {\r\n        this.deletePrefixedName(key);\r\n      }\r\n    });\r\n  }\r\n\r\n  public setCookieSecure(value: boolean) {\r\n    this.cookieSecure = value;\r\n    if (!value) {\r\n      if (isDevMode()) {\r\n        console.warn(\r\n          'The cookie secure flag in persistService has been set to false, set it to true in production mode'\r\n        );\r\n      } else {\r\n        throw new LrBadArgumentException(\r\n          'Can not set PersistService cookie secure flag to false in production mode.'\r\n        );\r\n      }\r\n    }\r\n  }\r\n\r\n  private prefixName(name: string): string {\r\n    return this.KEY_PREFIX + name;\r\n  }\r\n\r\n  public delete(name: string): void {\r\n    this.deletePrefixedName(this.prefixName(name));\r\n  }\r\n\r\n  private deletePrefixedName(prefixedName: string): void {\r\n    const params = this.getCookieParams();\r\n    this.cookieService.delete(\r\n      prefixedName, // name: string,\r\n      params.path, // path?: string,\r\n      params.domain, // domain ?: string,\r\n      params.secure, // secure ?: boolean,\r\n      params.sameSite // sameSite ?: 'Lax' | 'None' | 'Strict'): void;\r\n    );\r\n    localStorage.removeItem(prefixedName);\r\n  }\r\n\r\n  public async set({\r\n    name,\r\n    value,\r\n    serverSession,\r\n    expiry,\r\n  }: {\r\n    name: string;\r\n    value: any;\r\n    serverSession: boolean;\r\n    expiry?: Date;\r\n  }): Promise<void> {\r\n    const prefixedName = this.prefixName(name);\r\n\r\n    let item: Item;\r\n\r\n    if (serverSession) {\r\n      item = {\r\n        serverSession: true,\r\n        data: await this.encryptionService.encryptToString(\r\n          this.serverSessionEncryptionKey,\r\n          value\r\n        ),\r\n      };\r\n    } else {\r\n      item = {\r\n        data: value,\r\n      };\r\n    }\r\n\r\n    if (expiry) {\r\n      const key = await this.keyFactory.createKey();\r\n      item.expiry = expiry.toISOString();\r\n      item.data = await this.encryptionService.encryptToString(key, item.data);\r\n\r\n      const cookieItem: CookieItem = {\r\n        key: key.toJSON(true),\r\n      };\r\n\r\n      // If path is set to anything other than \"/\" then the cookie is only\r\n      // accessible by JS if the current URL has the same prefix as the path.\r\n      // Ideally we don't want the encryption key cookie to be sent at all, but\r\n      // since the encrypted content is held in localstorage, it is not a security\r\n      // risk, i.e. it is at least as secure as storing only in localstorage.\r\n      const params = this.getCookieParams();\r\n      this.cookieService.set(\r\n        prefixedName, // name: string,\r\n        JSON.stringify(cookieItem), // value: string,\r\n        expiry, // expires?: number | Date,\r\n        params.path, // path?: string,\r\n        params.domain, // domain?: string,\r\n        params.secure, // secure?: boolean,\r\n        params.sameSite // sameSite?: 'Lax' | 'None' | 'Strict'\r\n      );\r\n    }\r\n\r\n    localStorage.setItem(prefixedName, JSON.stringify(item));\r\n  }\r\n\r\n  public async get(name: string): Promise<any> {\r\n    const prefixedName = this.prefixName(name);\r\n\r\n    try {\r\n      const ret = await this.getImpl(prefixedName);\r\n      if (ret == null) {\r\n        // Clear any cookies to keep things in sync.\r\n        this.deletePrefixedName(prefixedName);\r\n      }\r\n      return ret;\r\n    } catch (error) {\r\n      this.deletePrefixedName(prefixedName);\r\n      throw error;\r\n    }\r\n  }\r\n\r\n  private async getImpl(name: string): Promise<any> {\r\n    const itemString = localStorage.getItem(name);\r\n    if (!itemString) {\r\n      return null;\r\n    }\r\n\r\n    const item: Item = JSON.parse(itemString);\r\n\r\n    let data: any;\r\n\r\n    if (item.expiry) {\r\n      const cookieItemString = this.cookieService.get(name);\r\n      if (!cookieItemString) {\r\n        // Probably expired, but we won't make any interpretations since if we only used\r\n        // cookies we can't tell if it's expired or explicitly removed. So we just make\r\n        // the behaviour here consistent with that.\r\n        console.log('No cookie.');\r\n        return null;\r\n      }\r\n\r\n      const cookieItem = JSON.parse(cookieItemString);\r\n\r\n      const key = await KFS.asKey(cookieItem.key);\r\n\r\n      data = await this.encryptionService.decrypt(key, item.data);\r\n    } else {\r\n      data = item.data;\r\n    }\r\n\r\n    if (item.serverSession) {\r\n      data = await this.encryptionService.decrypt(\r\n        this.serverSessionEncryptionKey,\r\n        data\r\n      );\r\n    }\r\n\r\n    return data;\r\n  }\r\n}\r\n"]}
|