@lifeready/core 1.0.2 → 1.0.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (225) hide show
  1. package/README.md +62 -62
  2. package/bundles/lifeready-core.umd.js +15445 -15445
  3. package/bundles/lifeready-core.umd.js.map +1 -1
  4. package/bundles/lifeready-core.umd.min.js.map +1 -1
  5. package/esm2015/lib/_common/ast.js +40 -40
  6. package/esm2015/lib/_common/deferred-promise.js +24 -24
  7. package/esm2015/lib/_common/exceptions.js +157 -157
  8. package/esm2015/lib/_common/queries.gql.js +190 -190
  9. package/esm2015/lib/_common/run-outside-angular.js +79 -79
  10. package/esm2015/lib/_common/types.js +1 -1
  11. package/esm2015/lib/_common/utils.js +44 -44
  12. package/esm2015/lib/api/contact-card.gql.js +79 -79
  13. package/esm2015/lib/api/contact-card.service.js +154 -154
  14. package/esm2015/lib/api/contact-card2.gql.js +60 -60
  15. package/esm2015/lib/api/contact-card2.service.js +103 -103
  16. package/esm2015/lib/api/file.service.js +74 -74
  17. package/esm2015/lib/api/item2.gql.js +110 -110
  18. package/esm2015/lib/api/item2.service.js +311 -311
  19. package/esm2015/lib/api/key-exchange.gql.js +188 -188
  20. package/esm2015/lib/api/key-exchange.service.js +442 -442
  21. package/esm2015/lib/api/key-exchange.types.js +18 -18
  22. package/esm2015/lib/api/key-exchange2.gql.js +171 -171
  23. package/esm2015/lib/api/key-exchange2.service.js +479 -479
  24. package/esm2015/lib/api/lock.gql.js +40 -40
  25. package/esm2015/lib/api/lock.service.js +64 -64
  26. package/esm2015/lib/api/lr-apollo.service.js +46 -46
  27. package/esm2015/lib/api/lr-graphql/index.js +6 -6
  28. package/esm2015/lib/api/lr-graphql/lr-graphql.service.js +155 -155
  29. package/esm2015/lib/api/lr-graphql/lr-merged-mutation.js +213 -213
  30. package/esm2015/lib/api/lr-graphql/lr-mutation-base.js +51 -51
  31. package/esm2015/lib/api/lr-graphql/lr-mutation.js +48 -48
  32. package/esm2015/lib/api/lr-graphql/lr.service.js +18 -18
  33. package/esm2015/lib/api/message.service.js +138 -138
  34. package/esm2015/lib/api/persist.service.js +181 -181
  35. package/esm2015/lib/api/query-processor/common-processors.service.js +93 -93
  36. package/esm2015/lib/api/query-processor/index.js +3 -3
  37. package/esm2015/lib/api/query-processor/query-processor.service.js +192 -192
  38. package/esm2015/lib/api/query-processor/tp-password-reset-processor.service.js +109 -109
  39. package/esm2015/lib/api/shared-contact-card.service.js +119 -119
  40. package/esm2015/lib/api/shared-contact-card2.gql.js +41 -41
  41. package/esm2015/lib/api/shared-contact-card2.service.js +117 -117
  42. package/esm2015/lib/api/time.service.js +146 -146
  43. package/esm2015/lib/api/types/graphql.types.js +7 -7
  44. package/esm2015/lib/api/types/index.js +3 -3
  45. package/esm2015/lib/api/types/lr-graphql.types.js +71 -71
  46. package/esm2015/lib/auth/auth.config.js +57 -57
  47. package/esm2015/lib/auth/auth.gql.js +48 -48
  48. package/esm2015/lib/auth/auth.types.js +27 -27
  49. package/esm2015/lib/auth/idle.service.js +168 -168
  50. package/esm2015/lib/auth/idle.types.js +7 -7
  51. package/esm2015/lib/auth/lbop.service.js +355 -355
  52. package/esm2015/lib/auth/life-ready-auth.service.js +500 -500
  53. package/esm2015/lib/auth/password.service.js +320 -320
  54. package/esm2015/lib/auth/register.service.js +172 -172
  55. package/esm2015/lib/auth/two-factor.service.js +74 -74
  56. package/esm2015/lib/category/category-meta.service.js +99 -99
  57. package/esm2015/lib/category/category.gql.js +406 -406
  58. package/esm2015/lib/category/category.service.js +390 -390
  59. package/esm2015/lib/category/category.types.js +29 -29
  60. package/esm2015/lib/cryptography/cryptography.types.js +11 -11
  61. package/esm2015/lib/cryptography/encryption.service.js +189 -189
  62. package/esm2015/lib/cryptography/key-factory.service.js +237 -237
  63. package/esm2015/lib/cryptography/key-graph.service.js +280 -280
  64. package/esm2015/lib/cryptography/key-meta.service.js +200 -200
  65. package/esm2015/lib/cryptography/key.service.js +124 -124
  66. package/esm2015/lib/cryptography/slip39.service.js +169 -169
  67. package/esm2015/lib/cryptography/web-crypto.service.js +29 -29
  68. package/esm2015/lib/life-ready.config.js +84 -84
  69. package/esm2015/lib/life-ready.module.js +74 -74
  70. package/esm2015/lib/plan/plan.gql.js +123 -123
  71. package/esm2015/lib/plan/plan.service.js +149 -149
  72. package/esm2015/lib/plan/plan.types.js +11 -11
  73. package/esm2015/lib/record/record-attachment.service.js +101 -101
  74. package/esm2015/lib/record/record.gql.js +179 -179
  75. package/esm2015/lib/record/record.service.js +206 -206
  76. package/esm2015/lib/record/record.types.js +15 -15
  77. package/esm2015/lib/record-type/record-type.service.js +75 -75
  78. package/esm2015/lib/record-type/record-type.types.js +28 -28
  79. package/esm2015/lib/scenario/approvals/scenario-approval.gql.js +105 -105
  80. package/esm2015/lib/scenario/approvals/scenario-approval.types.js +1 -1
  81. package/esm2015/lib/scenario/approvals/scenario-approver.service.js +300 -300
  82. package/esm2015/lib/scenario/claimants/scenario-claimant.gql.js +52 -52
  83. package/esm2015/lib/scenario/claimants/scenario-claimant.service.js +97 -97
  84. package/esm2015/lib/scenario/claimants/scenario-claimant.types.js +1 -1
  85. package/esm2015/lib/scenario/receivers/scenario-receiver.gql.js +150 -150
  86. package/esm2015/lib/scenario/receivers/scenario-receiver.service.js +229 -229
  87. package/esm2015/lib/scenario/receivers/scenario-receiver.types.js +1 -1
  88. package/esm2015/lib/scenario/scenario-setup.service.js +269 -269
  89. package/esm2015/lib/scenario/scenario.gql.js +368 -368
  90. package/esm2015/lib/scenario/scenario.service.js +611 -611
  91. package/esm2015/lib/scenario/scenario.types.js +64 -64
  92. package/esm2015/lib/search/search.gql.js +62 -62
  93. package/esm2015/lib/search/search.service.js +156 -156
  94. package/esm2015/lib/search/search.types.js +6 -6
  95. package/esm2015/lib/trusted-parties/tp-password-reset-request.service.js +112 -112
  96. package/esm2015/lib/trusted-parties/tp-password-reset-user.service.js +129 -129
  97. package/esm2015/lib/trusted-parties/tp-password-reset.constants.js +4 -4
  98. package/esm2015/lib/trusted-parties/tp-password-reset.gql.js +232 -232
  99. package/esm2015/lib/trusted-parties/tp-password-reset.service.js +299 -299
  100. package/esm2015/lib/trusted-parties/trusted-party.gql.js +148 -148
  101. package/esm2015/lib/trusted-parties/trusted-party.service.js +326 -326
  102. package/esm2015/lib/trusted-parties/trusted-party.types.js +41 -41
  103. package/esm2015/lib/trusted-parties/trusted-party2.gql.js +87 -87
  104. package/esm2015/lib/trusted-parties/trusted-party2.service.js +215 -215
  105. package/esm2015/lib/users/profile-details.service.js +214 -214
  106. package/esm2015/lib/users/profile.gql.js +97 -97
  107. package/esm2015/lib/users/profile.service.js +169 -169
  108. package/esm2015/lib/users/profile.types.js +34 -34
  109. package/esm2015/lib/users/user.gql.js +60 -60
  110. package/esm2015/lib/users/user.service.js +79 -79
  111. package/esm2015/lib/users/user.types.js +5 -5
  112. package/esm2015/lifeready-core.js +10 -10
  113. package/esm2015/public-api.js +81 -81
  114. package/fesm2015/lifeready-core.js +13088 -13088
  115. package/fesm2015/lifeready-core.js.map +1 -1
  116. package/lib/_common/ast.d.ts +11 -11
  117. package/lib/_common/deferred-promise.d.ts +12 -12
  118. package/lib/_common/exceptions.d.ts +109 -109
  119. package/lib/_common/queries.gql.d.ts +10 -10
  120. package/lib/_common/run-outside-angular.d.ts +14 -14
  121. package/lib/_common/types.d.ts +10 -10
  122. package/lib/_common/utils.d.ts +3 -3
  123. package/lib/api/contact-card.gql.d.ts +7 -7
  124. package/lib/api/contact-card.service.d.ts +52 -52
  125. package/lib/api/contact-card2.gql.d.ts +34 -34
  126. package/lib/api/contact-card2.service.d.ts +49 -49
  127. package/lib/api/file.service.d.ts +18 -18
  128. package/lib/api/item2.gql.d.ts +96 -96
  129. package/lib/api/item2.service.d.ts +177 -177
  130. package/lib/api/key-exchange.gql.d.ts +9 -9
  131. package/lib/api/key-exchange.service.d.ts +39 -39
  132. package/lib/api/key-exchange.types.d.ts +196 -196
  133. package/lib/api/key-exchange2.gql.d.ts +125 -125
  134. package/lib/api/key-exchange2.service.d.ts +187 -187
  135. package/lib/api/lock.gql.d.ts +27 -27
  136. package/lib/api/lock.service.d.ts +25 -25
  137. package/lib/api/lr-apollo.service.d.ts +15 -15
  138. package/lib/api/lr-graphql/index.d.ts +5 -5
  139. package/lib/api/lr-graphql/lr-graphql.service.d.ts +60 -60
  140. package/lib/api/lr-graphql/lr-merged-mutation.d.ts +27 -27
  141. package/lib/api/lr-graphql/lr-mutation-base.d.ts +28 -28
  142. package/lib/api/lr-graphql/lr-mutation.d.ts +8 -8
  143. package/lib/api/lr-graphql/lr.service.d.ts +9 -9
  144. package/lib/api/message.service.d.ts +58 -58
  145. package/lib/api/persist.service.d.ts +31 -31
  146. package/lib/api/query-processor/common-processors.service.d.ts +36 -36
  147. package/lib/api/query-processor/index.d.ts +2 -2
  148. package/lib/api/query-processor/query-processor.service.d.ts +18 -18
  149. package/lib/api/query-processor/tp-password-reset-processor.service.d.ts +15 -15
  150. package/lib/api/shared-contact-card.service.d.ts +33 -33
  151. package/lib/api/shared-contact-card2.gql.d.ts +36 -36
  152. package/lib/api/shared-contact-card2.service.d.ts +45 -45
  153. package/lib/api/time.service.d.ts +16 -16
  154. package/lib/api/types/graphql.types.d.ts +29 -29
  155. package/lib/api/types/index.d.ts +2 -2
  156. package/lib/api/types/lr-graphql.types.d.ts +385 -385
  157. package/lib/auth/auth.config.d.ts +5 -5
  158. package/lib/auth/auth.gql.d.ts +15 -15
  159. package/lib/auth/auth.types.d.ts +66 -66
  160. package/lib/auth/idle.service.d.ts +40 -40
  161. package/lib/auth/idle.types.d.ts +10 -10
  162. package/lib/auth/lbop.service.d.ts +91 -91
  163. package/lib/auth/life-ready-auth.service.d.ts +59 -59
  164. package/lib/auth/password.service.d.ts +78 -78
  165. package/lib/auth/register.service.d.ts +25 -25
  166. package/lib/auth/two-factor.service.d.ts +15 -15
  167. package/lib/category/category-meta.service.d.ts +23 -23
  168. package/lib/category/category.gql.d.ts +45 -45
  169. package/lib/category/category.service.d.ts +67 -67
  170. package/lib/category/category.types.d.ts +79 -79
  171. package/lib/cryptography/cryptography.types.d.ts +83 -83
  172. package/lib/cryptography/encryption.service.d.ts +41 -41
  173. package/lib/cryptography/key-factory.service.d.ts +38 -38
  174. package/lib/cryptography/key-graph.service.d.ts +33 -33
  175. package/lib/cryptography/key-meta.service.d.ts +44 -44
  176. package/lib/cryptography/key.service.d.ts +36 -36
  177. package/lib/cryptography/slip39.service.d.ts +43 -43
  178. package/lib/cryptography/web-crypto.service.d.ts +5 -5
  179. package/lib/life-ready.config.d.ts +14 -14
  180. package/lib/life-ready.module.d.ts +5 -5
  181. package/lib/plan/plan.gql.d.ts +11 -11
  182. package/lib/plan/plan.service.d.ts +33 -33
  183. package/lib/plan/plan.types.d.ts +31 -31
  184. package/lib/record/record-attachment.service.d.ts +16 -16
  185. package/lib/record/record.gql.d.ts +14 -14
  186. package/lib/record/record.service.d.ts +25 -25
  187. package/lib/record/record.types.d.ts +57 -57
  188. package/lib/record-type/record-type.service.d.ts +11 -11
  189. package/lib/record-type/record-type.types.d.ts +50 -50
  190. package/lib/scenario/approvals/scenario-approval.gql.d.ts +7 -7
  191. package/lib/scenario/approvals/scenario-approval.types.d.ts +63 -63
  192. package/lib/scenario/approvals/scenario-approver.service.d.ts +32 -32
  193. package/lib/scenario/claimants/scenario-claimant.gql.d.ts +5 -5
  194. package/lib/scenario/claimants/scenario-claimant.service.d.ts +17 -17
  195. package/lib/scenario/claimants/scenario-claimant.types.d.ts +18 -18
  196. package/lib/scenario/receivers/scenario-receiver.gql.d.ts +8 -8
  197. package/lib/scenario/receivers/scenario-receiver.service.d.ts +30 -30
  198. package/lib/scenario/receivers/scenario-receiver.types.d.ts +54 -54
  199. package/lib/scenario/scenario-setup.service.d.ts +22 -22
  200. package/lib/scenario/scenario.gql.d.ts +34 -34
  201. package/lib/scenario/scenario.service.d.ts +58 -58
  202. package/lib/scenario/scenario.types.d.ts +217 -217
  203. package/lib/search/search.gql.d.ts +1 -1
  204. package/lib/search/search.service.d.ts +25 -25
  205. package/lib/search/search.types.d.ts +20 -20
  206. package/lib/trusted-parties/tp-password-reset-request.service.d.ts +20 -20
  207. package/lib/trusted-parties/tp-password-reset-user.service.d.ts +35 -35
  208. package/lib/trusted-parties/tp-password-reset.constants.d.ts +3 -3
  209. package/lib/trusted-parties/tp-password-reset.gql.d.ts +218 -218
  210. package/lib/trusted-parties/tp-password-reset.service.d.ts +130 -130
  211. package/lib/trusted-parties/trusted-party.gql.d.ts +9 -9
  212. package/lib/trusted-parties/trusted-party.service.d.ts +44 -44
  213. package/lib/trusted-parties/trusted-party.types.d.ts +102 -102
  214. package/lib/trusted-parties/trusted-party2.gql.d.ts +79 -79
  215. package/lib/trusted-parties/trusted-party2.service.d.ts +114 -114
  216. package/lib/users/profile-details.service.d.ts +21 -21
  217. package/lib/users/profile.gql.d.ts +11 -11
  218. package/lib/users/profile.service.d.ts +35 -35
  219. package/lib/users/profile.types.d.ts +96 -96
  220. package/lib/users/user.gql.d.ts +9 -9
  221. package/lib/users/user.service.d.ts +12 -12
  222. package/lib/users/user.types.d.ts +23 -23
  223. package/lifeready-core.d.ts +9 -9
  224. package/package.json +1 -1
  225. package/public-api.d.ts +77 -77
@@ -1,181 +1,181 @@
1
- import { __awaiter } from "tslib";
2
- import { Injectable, Injector } from '@angular/core';
3
- import { CookieService } from 'ngx-cookie-service';
4
- import { EncryptionService } from '../cryptography/encryption.service';
5
- import { isDevMode } from '@angular/core';
6
- import { LrBadArgumentException } from '../_common/exceptions';
7
- import { KeyFactoryService as KFS } from '../cryptography/key-factory.service';
8
- import * as i0 from "@angular/core";
9
- import * as i1 from "../cryptography/key-factory.service";
10
- import * as i2 from "ngx-cookie-service";
11
- import * as i3 from "../cryptography/encryption.service";
12
- export class PersistService {
13
- constructor(keyFactory, cookieService, encryptionService, injector) {
14
- this.keyFactory = keyFactory;
15
- this.cookieService = cookieService;
16
- this.encryptionService = encryptionService;
17
- this.injector = injector;
18
- this.KEY_PREFIX = 'lrSession-';
19
- this.cookieSecure = true;
20
- this.serverSessionEncryptionKey = null;
21
- if (isDevMode()) {
22
- this.setCookieSecure(false);
23
- }
24
- }
25
- setServerSessionEncryptionKey(key) {
26
- this.serverSessionEncryptionKey = key;
27
- }
28
- clearServerSessionEncryptionKey() {
29
- this.serverSessionEncryptionKey = null;
30
- }
31
- // It's important that set and delete cookie use exactly the same set of parameters.
32
- getCookieParams() {
33
- return {
34
- path: '/',
35
- domain: null,
36
- secure: this.cookieSecure,
37
- sameSite: 'Lax',
38
- };
39
- }
40
- clear() {
41
- // Remove all cookies
42
- Object.keys(this.cookieService.getAll()).forEach((key) => {
43
- if (key.startsWith(this.KEY_PREFIX)) {
44
- this.deletePrefixedName(key);
45
- }
46
- });
47
- // Remove all persisted session variables
48
- Object.keys(localStorage).forEach((key) => {
49
- if (key.startsWith(this.KEY_PREFIX)) {
50
- this.deletePrefixedName(key);
51
- }
52
- });
53
- }
54
- setCookieSecure(value) {
55
- this.cookieSecure = value;
56
- if (!value) {
57
- if (isDevMode()) {
58
- console.warn('The cookie secure flag in persistService has been set to false, set it to true in production mode');
59
- }
60
- else {
61
- throw new LrBadArgumentException('Can not set PersistService cookie secure flag to false in production mode.');
62
- }
63
- }
64
- }
65
- prefixName(name) {
66
- return this.KEY_PREFIX + name;
67
- }
68
- delete(name) {
69
- this.deletePrefixedName(this.prefixName(name));
70
- }
71
- deletePrefixedName(prefixedName) {
72
- const params = this.getCookieParams();
73
- this.cookieService.delete(prefixedName, // name: string,
74
- params.path, // path?: string,
75
- params.domain, // domain ?: string,
76
- params.secure, // secure ?: boolean,
77
- params.sameSite // sameSite ?: 'Lax' | 'None' | 'Strict'): void;
78
- );
79
- localStorage.removeItem(prefixedName);
80
- }
81
- set({ name, value, serverSession, expiry, }) {
82
- return __awaiter(this, void 0, void 0, function* () {
83
- const prefixedName = this.prefixName(name);
84
- let item;
85
- if (serverSession) {
86
- item = {
87
- serverSession: true,
88
- data: yield this.encryptionService.encryptToString(this.serverSessionEncryptionKey, value),
89
- };
90
- }
91
- else {
92
- item = {
93
- data: value,
94
- };
95
- }
96
- if (expiry) {
97
- const key = yield this.keyFactory.createKey();
98
- item.expiry = expiry.toISOString();
99
- item.data = yield this.encryptionService.encryptToString(key, item.data);
100
- const cookieItem = {
101
- key: key.toJSON(true),
102
- };
103
- // If path is set to anything other than "/" then the cookie is only
104
- // accessible by JS if the current URL has the same prefix as the path.
105
- // Ideally we don't want the encryption key cookie to be sent at all, but
106
- // since the encrypted content is held in localstorage, it is not a security
107
- // risk, i.e. it is at least as secure as storing only in localstorage.
108
- const params = this.getCookieParams();
109
- this.cookieService.set(prefixedName, // name: string,
110
- JSON.stringify(cookieItem), // value: string,
111
- expiry, // expires?: number | Date,
112
- params.path, // path?: string,
113
- params.domain, // domain?: string,
114
- params.secure, // secure?: boolean,
115
- params.sameSite // sameSite?: 'Lax' | 'None' | 'Strict'
116
- );
117
- }
118
- localStorage.setItem(prefixedName, JSON.stringify(item));
119
- });
120
- }
121
- get(name) {
122
- return __awaiter(this, void 0, void 0, function* () {
123
- const prefixedName = this.prefixName(name);
124
- try {
125
- const ret = yield this.getImpl(prefixedName);
126
- if (ret == null) {
127
- // Clear any cookies to keep things in sync.
128
- this.deletePrefixedName(prefixedName);
129
- }
130
- return ret;
131
- }
132
- catch (error) {
133
- this.deletePrefixedName(prefixedName);
134
- throw error;
135
- }
136
- });
137
- }
138
- getImpl(name) {
139
- return __awaiter(this, void 0, void 0, function* () {
140
- const itemString = localStorage.getItem(name);
141
- if (!itemString) {
142
- return null;
143
- }
144
- const item = JSON.parse(itemString);
145
- let data;
146
- if (item.expiry) {
147
- const cookieItemString = this.cookieService.get(name);
148
- if (!cookieItemString) {
149
- // Probably expired, but we won't make any interpretations since if we only used
150
- // cookies we can't tell if it's expired or explicitly removed. So we just make
151
- // the behaviour here consistent with that.
152
- console.log('No cookie.');
153
- return null;
154
- }
155
- const cookieItem = JSON.parse(cookieItemString);
156
- const key = yield KFS.asKey(cookieItem.key);
157
- data = yield this.encryptionService.decrypt(key, item.data);
158
- }
159
- else {
160
- data = item.data;
161
- }
162
- if (item.serverSession) {
163
- data = yield this.encryptionService.decrypt(this.serverSessionEncryptionKey, data);
164
- }
165
- return data;
166
- });
167
- }
168
- }
169
- PersistService.ɵprov = i0.ɵɵdefineInjectable({ factory: function PersistService_Factory() { return new PersistService(i0.ɵɵinject(i1.KeyFactoryService), i0.ɵɵinject(i2.CookieService), i0.ɵɵinject(i3.EncryptionService), i0.ɵɵinject(i0.INJECTOR)); }, token: PersistService, providedIn: "root" });
170
- PersistService.decorators = [
171
- { type: Injectable, args: [{
172
- providedIn: 'root',
173
- },] }
174
- ];
175
- PersistService.ctorParameters = () => [
176
- { type: KFS },
177
- { type: CookieService },
178
- { type: EncryptionService },
179
- { type: Injector }
180
- ];
181
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"persist.service.js","sourceRoot":"/opt/atlassian/pipelines/agent/build/projects/core/src/","sources":["lib/api/persist.service.ts"],"names":[],"mappings":";AACA,OAAO,EAAE,UAAU,EAAE,QAAQ,EAAE,MAAM,eAAe,CAAC;AACrD,OAAO,EAAE,aAAa,EAAE,MAAM,oBAAoB,CAAC;AACnD,OAAO,EAAE,iBAAiB,EAAE,MAAM,oCAAoC,CAAC;AACvE,OAAO,EAAE,SAAS,EAAE,MAAM,eAAe,CAAC;AAC1C,OAAO,EAAE,sBAAsB,EAAE,MAAM,uBAAuB,CAAC;AAC/D,OAAO,EAAE,iBAAiB,IAAI,GAAG,EAAE,MAAM,qCAAqC,CAAC;;;;;AAe/E,MAAM,OAAO,cAAc;IAMzB,YACU,UAAe,EACf,aAA4B,EAC5B,iBAAoC,EACpC,QAAkB;QAHlB,eAAU,GAAV,UAAU,CAAK;QACf,kBAAa,GAAb,aAAa,CAAe;QAC5B,sBAAiB,GAAjB,iBAAiB,CAAmB;QACpC,aAAQ,GAAR,QAAQ,CAAU;QATX,eAAU,GAAG,YAAY,CAAC;QAEnC,iBAAY,GAAG,IAAI,CAAC;QACpB,+BAA0B,GAAY,IAAI,CAAC;QAQjD,IAAI,SAAS,EAAE,EAAE;YACf,IAAI,CAAC,eAAe,CAAC,KAAK,CAAC,CAAC;SAC7B;IACH,CAAC;IAED,6BAA6B,CAAC,GAAY;QACxC,IAAI,CAAC,0BAA0B,GAAG,GAAG,CAAC;IACxC,CAAC;IAED,+BAA+B;QAC7B,IAAI,CAAC,0BAA0B,GAAG,IAAI,CAAC;IACzC,CAAC;IAED,oFAAoF;IAC5E,eAAe;QACrB,OAAO;YACL,IAAI,EAAE,GAAG;YACT,MAAM,EAAE,IAAI;YACZ,MAAM,EAAE,IAAI,CAAC,YAAY;YACzB,QAAQ,EAAE,KAAkC;SAC7C,CAAC;IACJ,CAAC;IAEM,KAAK;QACV,qBAAqB;QACrB,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,aAAa,CAAC,MAAM,EAAE,CAAC,CAAC,OAAO,CAAC,CAAC,GAAG,EAAE,EAAE;YACvD,IAAI,GAAG,CAAC,UAAU,CAAC,IAAI,CAAC,UAAU,CAAC,EAAE;gBACnC,IAAI,CAAC,kBAAkB,CAAC,GAAG,CAAC,CAAC;aAC9B;QACH,CAAC,CAAC,CAAC;QAEH,yCAAyC;QACzC,MAAM,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,OAAO,CAAC,CAAC,GAAG,EAAE,EAAE;YACxC,IAAI,GAAG,CAAC,UAAU,CAAC,IAAI,CAAC,UAAU,CAAC,EAAE;gBACnC,IAAI,CAAC,kBAAkB,CAAC,GAAG,CAAC,CAAC;aAC9B;QACH,CAAC,CAAC,CAAC;IACL,CAAC;IAEM,eAAe,CAAC,KAAc;QACnC,IAAI,CAAC,YAAY,GAAG,KAAK,CAAC;QAC1B,IAAI,CAAC,KAAK,EAAE;YACV,IAAI,SAAS,EAAE,EAAE;gBACf,OAAO,CAAC,IAAI,CACV,mGAAmG,CACpG,CAAC;aACH;iBAAM;gBACL,MAAM,IAAI,sBAAsB,CAC9B,4EAA4E,CAC7E,CAAC;aACH;SACF;IACH,CAAC;IAEO,UAAU,CAAC,IAAY;QAC7B,OAAO,IAAI,CAAC,UAAU,GAAG,IAAI,CAAC;IAChC,CAAC;IAEM,MAAM,CAAC,IAAY;QACxB,IAAI,CAAC,kBAAkB,CAAC,IAAI,CAAC,UAAU,CAAC,IAAI,CAAC,CAAC,CAAC;IACjD,CAAC;IAEO,kBAAkB,CAAC,YAAoB;QAC7C,MAAM,MAAM,GAAG,IAAI,CAAC,eAAe,EAAE,CAAC;QACtC,IAAI,CAAC,aAAa,CAAC,MAAM,CACvB,YAAY,EAAE,gBAAgB;QAC9B,MAAM,CAAC,IAAI,EAAE,iBAAiB;QAC9B,MAAM,CAAC,MAAM,EAAE,oBAAoB;QACnC,MAAM,CAAC,MAAM,EAAE,qBAAqB;QACpC,MAAM,CAAC,QAAQ,CAAC,gDAAgD;SACjE,CAAC;QACF,YAAY,CAAC,UAAU,CAAC,YAAY,CAAC,CAAC;IACxC,CAAC;IAEY,GAAG,CAAC,EACf,IAAI,EACJ,KAAK,EACL,aAAa,EACb,MAAM,GAMP;;YACC,MAAM,YAAY,GAAG,IAAI,CAAC,UAAU,CAAC,IAAI,CAAC,CAAC;YAE3C,IAAI,IAAU,CAAC;YAEf,IAAI,aAAa,EAAE;gBACjB,IAAI,GAAG;oBACL,aAAa,EAAE,IAAI;oBACnB,IAAI,EAAE,MAAM,IAAI,CAAC,iBAAiB,CAAC,eAAe,CAChD,IAAI,CAAC,0BAA0B,EAC/B,KAAK,CACN;iBACF,CAAC;aACH;iBAAM;gBACL,IAAI,GAAG;oBACL,IAAI,EAAE,KAAK;iBACZ,CAAC;aACH;YAED,IAAI,MAAM,EAAE;gBACV,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,SAAS,EAAE,CAAC;gBAC9C,IAAI,CAAC,MAAM,GAAG,MAAM,CAAC,WAAW,EAAE,CAAC;gBACnC,IAAI,CAAC,IAAI,GAAG,MAAM,IAAI,CAAC,iBAAiB,CAAC,eAAe,CAAC,GAAG,EAAE,IAAI,CAAC,IAAI,CAAC,CAAC;gBAEzE,MAAM,UAAU,GAAe;oBAC7B,GAAG,EAAE,GAAG,CAAC,MAAM,CAAC,IAAI,CAAC;iBACtB,CAAC;gBAEF,oEAAoE;gBACpE,uEAAuE;gBACvE,yEAAyE;gBACzE,4EAA4E;gBAC5E,uEAAuE;gBACvE,MAAM,MAAM,GAAG,IAAI,CAAC,eAAe,EAAE,CAAC;gBACtC,IAAI,CAAC,aAAa,CAAC,GAAG,CACpB,YAAY,EAAE,gBAAgB;gBAC9B,IAAI,CAAC,SAAS,CAAC,UAAU,CAAC,EAAE,iBAAiB;gBAC7C,MAAM,EAAE,2BAA2B;gBACnC,MAAM,CAAC,IAAI,EAAE,iBAAiB;gBAC9B,MAAM,CAAC,MAAM,EAAE,mBAAmB;gBAClC,MAAM,CAAC,MAAM,EAAE,oBAAoB;gBACnC,MAAM,CAAC,QAAQ,CAAC,uCAAuC;iBACxD,CAAC;aACH;YAED,YAAY,CAAC,OAAO,CAAC,YAAY,EAAE,IAAI,CAAC,SAAS,CAAC,IAAI,CAAC,CAAC,CAAC;QAC3D,CAAC;KAAA;IAEY,GAAG,CAAC,IAAY;;YAC3B,MAAM,YAAY,GAAG,IAAI,CAAC,UAAU,CAAC,IAAI,CAAC,CAAC;YAE3C,IAAI;gBACF,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,OAAO,CAAC,YAAY,CAAC,CAAC;gBAC7C,IAAI,GAAG,IAAI,IAAI,EAAE;oBACf,4CAA4C;oBAC5C,IAAI,CAAC,kBAAkB,CAAC,YAAY,CAAC,CAAC;iBACvC;gBACD,OAAO,GAAG,CAAC;aACZ;YAAC,OAAO,KAAK,EAAE;gBACd,IAAI,CAAC,kBAAkB,CAAC,YAAY,CAAC,CAAC;gBACtC,MAAM,KAAK,CAAC;aACb;QACH,CAAC;KAAA;IAEa,OAAO,CAAC,IAAY;;YAChC,MAAM,UAAU,GAAG,YAAY,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC;YAC9C,IAAI,CAAC,UAAU,EAAE;gBACf,OAAO,IAAI,CAAC;aACb;YAED,MAAM,IAAI,GAAS,IAAI,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC;YAE1C,IAAI,IAAS,CAAC;YAEd,IAAI,IAAI,CAAC,MAAM,EAAE;gBACf,MAAM,gBAAgB,GAAG,IAAI,CAAC,aAAa,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC;gBACtD,IAAI,CAAC,gBAAgB,EAAE;oBACrB,gFAAgF;oBAChF,+EAA+E;oBAC/E,2CAA2C;oBAC3C,OAAO,CAAC,GAAG,CAAC,YAAY,CAAC,CAAC;oBAC1B,OAAO,IAAI,CAAC;iBACb;gBAED,MAAM,UAAU,GAAG,IAAI,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC;gBAEhD,MAAM,GAAG,GAAG,MAAM,GAAG,CAAC,KAAK,CAAC,UAAU,CAAC,GAAG,CAAC,CAAC;gBAE5C,IAAI,GAAG,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAAC,GAAG,EAAE,IAAI,CAAC,IAAI,CAAC,CAAC;aAC7D;iBAAM;gBACL,IAAI,GAAG,IAAI,CAAC,IAAI,CAAC;aAClB;YAED,IAAI,IAAI,CAAC,aAAa,EAAE;gBACtB,IAAI,GAAG,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CACzC,IAAI,CAAC,0BAA0B,EAC/B,IAAI,CACL,CAAC;aACH;YAED,OAAO,IAAI,CAAC;QACd,CAAC;KAAA;;;;YAxMF,UAAU,SAAC;gBACV,UAAU,EAAE,MAAM;aACnB;;;YAd6B,GAAG;YAJxB,aAAa;YACb,iBAAiB;YAFL,QAAQ","sourcesContent":["import { JWK } from 'node-jose';\nimport { Injectable, Injector } from '@angular/core';\nimport { CookieService } from 'ngx-cookie-service';\nimport { EncryptionService } from '../cryptography/encryption.service';\nimport { isDevMode } from '@angular/core';\nimport { LrBadArgumentException } from '../_common/exceptions';\nimport { KeyFactoryService as KFS } from '../cryptography/key-factory.service';\n\ninterface Item {\n  data: string;\n  expiry?: string; // iso format\n  serverSession?: boolean;\n}\n\ninterface CookieItem {\n  key: any;\n}\n\n@Injectable({\n  providedIn: 'root',\n})\nexport class PersistService {\n  private readonly KEY_PREFIX = 'lrSession-';\n\n  private cookieSecure = true;\n  private serverSessionEncryptionKey: JWK.Key = null;\n\n  constructor(\n    private keyFactory: KFS,\n    private cookieService: CookieService,\n    private encryptionService: EncryptionService,\n    private injector: Injector\n  ) {\n    if (isDevMode()) {\n      this.setCookieSecure(false);\n    }\n  }\n\n  setServerSessionEncryptionKey(key: JWK.Key) {\n    this.serverSessionEncryptionKey = key;\n  }\n\n  clearServerSessionEncryptionKey() {\n    this.serverSessionEncryptionKey = null;\n  }\n\n  // It's important that set and delete cookie use exactly the same set of parameters.\n  private getCookieParams() {\n    return {\n      path: '/',\n      domain: null, // which means the current domain of the frontend app.\n      secure: this.cookieSecure,\n      sameSite: 'Lax' as 'Lax' | 'None' | 'Strict',\n    };\n  }\n\n  public clear() {\n    // Remove all cookies\n    Object.keys(this.cookieService.getAll()).forEach((key) => {\n      if (key.startsWith(this.KEY_PREFIX)) {\n        this.deletePrefixedName(key);\n      }\n    });\n\n    // Remove all persisted session variables\n    Object.keys(localStorage).forEach((key) => {\n      if (key.startsWith(this.KEY_PREFIX)) {\n        this.deletePrefixedName(key);\n      }\n    });\n  }\n\n  public setCookieSecure(value: boolean) {\n    this.cookieSecure = value;\n    if (!value) {\n      if (isDevMode()) {\n        console.warn(\n          'The cookie secure flag in persistService has been set to false, set it to true in production mode'\n        );\n      } else {\n        throw new LrBadArgumentException(\n          'Can not set PersistService cookie secure flag to false in production mode.'\n        );\n      }\n    }\n  }\n\n  private prefixName(name: string): string {\n    return this.KEY_PREFIX + name;\n  }\n\n  public delete(name: string): void {\n    this.deletePrefixedName(this.prefixName(name));\n  }\n\n  private deletePrefixedName(prefixedName: string): void {\n    const params = this.getCookieParams();\n    this.cookieService.delete(\n      prefixedName, // name: string,\n      params.path, // path?: string,\n      params.domain, // domain ?: string,\n      params.secure, // secure ?: boolean,\n      params.sameSite // sameSite ?: 'Lax' | 'None' | 'Strict'): void;\n    );\n    localStorage.removeItem(prefixedName);\n  }\n\n  public async set({\n    name,\n    value,\n    serverSession,\n    expiry,\n  }: {\n    name: string;\n    value: any;\n    serverSession: boolean;\n    expiry?: Date;\n  }): Promise<void> {\n    const prefixedName = this.prefixName(name);\n\n    let item: Item;\n\n    if (serverSession) {\n      item = {\n        serverSession: true,\n        data: await this.encryptionService.encryptToString(\n          this.serverSessionEncryptionKey,\n          value\n        ),\n      };\n    } else {\n      item = {\n        data: value,\n      };\n    }\n\n    if (expiry) {\n      const key = await this.keyFactory.createKey();\n      item.expiry = expiry.toISOString();\n      item.data = await this.encryptionService.encryptToString(key, item.data);\n\n      const cookieItem: CookieItem = {\n        key: key.toJSON(true),\n      };\n\n      // If path is set to anything other than \"/\" then the cookie is only\n      // accessible by JS if the current URL has the same prefix as the path.\n      // Ideally we don't want the encryption key cookie to be sent at all, but\n      // since the encrypted content is held in localstorage, it is not a security\n      // risk, i.e. it is at least as secure as storing only in localstorage.\n      const params = this.getCookieParams();\n      this.cookieService.set(\n        prefixedName, // name: string,\n        JSON.stringify(cookieItem), // value: string,\n        expiry, // expires?: number | Date,\n        params.path, // path?: string,\n        params.domain, // domain?: string,\n        params.secure, // secure?: boolean,\n        params.sameSite // sameSite?: 'Lax' | 'None' | 'Strict'\n      );\n    }\n\n    localStorage.setItem(prefixedName, JSON.stringify(item));\n  }\n\n  public async get(name: string): Promise<any> {\n    const prefixedName = this.prefixName(name);\n\n    try {\n      const ret = await this.getImpl(prefixedName);\n      if (ret == null) {\n        // Clear any cookies to keep things in sync.\n        this.deletePrefixedName(prefixedName);\n      }\n      return ret;\n    } catch (error) {\n      this.deletePrefixedName(prefixedName);\n      throw error;\n    }\n  }\n\n  private async getImpl(name: string): Promise<any> {\n    const itemString = localStorage.getItem(name);\n    if (!itemString) {\n      return null;\n    }\n\n    const item: Item = JSON.parse(itemString);\n\n    let data: any;\n\n    if (item.expiry) {\n      const cookieItemString = this.cookieService.get(name);\n      if (!cookieItemString) {\n        // Probably expired, but we won't make any interpretations since if we only used\n        // cookies we can't tell if it's expired or explicitly removed. So we just make\n        // the behaviour here consistent with that.\n        console.log('No cookie.');\n        return null;\n      }\n\n      const cookieItem = JSON.parse(cookieItemString);\n\n      const key = await KFS.asKey(cookieItem.key);\n\n      data = await this.encryptionService.decrypt(key, item.data);\n    } else {\n      data = item.data;\n    }\n\n    if (item.serverSession) {\n      data = await this.encryptionService.decrypt(\n        this.serverSessionEncryptionKey,\n        data\n      );\n    }\n\n    return data;\n  }\n}\n"]}
1
+ import { __awaiter } from "tslib";
2
+ import { Injectable, Injector } from '@angular/core';
3
+ import { CookieService } from 'ngx-cookie-service';
4
+ import { EncryptionService } from '../cryptography/encryption.service';
5
+ import { isDevMode } from '@angular/core';
6
+ import { LrBadArgumentException } from '../_common/exceptions';
7
+ import { KeyFactoryService as KFS } from '../cryptography/key-factory.service';
8
+ import * as i0 from "@angular/core";
9
+ import * as i1 from "../cryptography/key-factory.service";
10
+ import * as i2 from "ngx-cookie-service";
11
+ import * as i3 from "../cryptography/encryption.service";
12
+ export class PersistService {
13
+ constructor(keyFactory, cookieService, encryptionService, injector) {
14
+ this.keyFactory = keyFactory;
15
+ this.cookieService = cookieService;
16
+ this.encryptionService = encryptionService;
17
+ this.injector = injector;
18
+ this.KEY_PREFIX = 'lrSession-';
19
+ this.cookieSecure = true;
20
+ this.serverSessionEncryptionKey = null;
21
+ if (isDevMode()) {
22
+ this.setCookieSecure(false);
23
+ }
24
+ }
25
+ setServerSessionEncryptionKey(key) {
26
+ this.serverSessionEncryptionKey = key;
27
+ }
28
+ clearServerSessionEncryptionKey() {
29
+ this.serverSessionEncryptionKey = null;
30
+ }
31
+ // It's important that set and delete cookie use exactly the same set of parameters.
32
+ getCookieParams() {
33
+ return {
34
+ path: '/',
35
+ domain: null,
36
+ secure: this.cookieSecure,
37
+ sameSite: 'Lax',
38
+ };
39
+ }
40
+ clear() {
41
+ // Remove all cookies
42
+ Object.keys(this.cookieService.getAll()).forEach((key) => {
43
+ if (key.startsWith(this.KEY_PREFIX)) {
44
+ this.deletePrefixedName(key);
45
+ }
46
+ });
47
+ // Remove all persisted session variables
48
+ Object.keys(localStorage).forEach((key) => {
49
+ if (key.startsWith(this.KEY_PREFIX)) {
50
+ this.deletePrefixedName(key);
51
+ }
52
+ });
53
+ }
54
+ setCookieSecure(value) {
55
+ this.cookieSecure = value;
56
+ if (!value) {
57
+ if (isDevMode()) {
58
+ console.warn('The cookie secure flag in persistService has been set to false, set it to true in production mode');
59
+ }
60
+ else {
61
+ throw new LrBadArgumentException('Can not set PersistService cookie secure flag to false in production mode.');
62
+ }
63
+ }
64
+ }
65
+ prefixName(name) {
66
+ return this.KEY_PREFIX + name;
67
+ }
68
+ delete(name) {
69
+ this.deletePrefixedName(this.prefixName(name));
70
+ }
71
+ deletePrefixedName(prefixedName) {
72
+ const params = this.getCookieParams();
73
+ this.cookieService.delete(prefixedName, // name: string,
74
+ params.path, // path?: string,
75
+ params.domain, // domain ?: string,
76
+ params.secure, // secure ?: boolean,
77
+ params.sameSite // sameSite ?: 'Lax' | 'None' | 'Strict'): void;
78
+ );
79
+ localStorage.removeItem(prefixedName);
80
+ }
81
+ set({ name, value, serverSession, expiry, }) {
82
+ return __awaiter(this, void 0, void 0, function* () {
83
+ const prefixedName = this.prefixName(name);
84
+ let item;
85
+ if (serverSession) {
86
+ item = {
87
+ serverSession: true,
88
+ data: yield this.encryptionService.encryptToString(this.serverSessionEncryptionKey, value),
89
+ };
90
+ }
91
+ else {
92
+ item = {
93
+ data: value,
94
+ };
95
+ }
96
+ if (expiry) {
97
+ const key = yield this.keyFactory.createKey();
98
+ item.expiry = expiry.toISOString();
99
+ item.data = yield this.encryptionService.encryptToString(key, item.data);
100
+ const cookieItem = {
101
+ key: key.toJSON(true),
102
+ };
103
+ // If path is set to anything other than "/" then the cookie is only
104
+ // accessible by JS if the current URL has the same prefix as the path.
105
+ // Ideally we don't want the encryption key cookie to be sent at all, but
106
+ // since the encrypted content is held in localstorage, it is not a security
107
+ // risk, i.e. it is at least as secure as storing only in localstorage.
108
+ const params = this.getCookieParams();
109
+ this.cookieService.set(prefixedName, // name: string,
110
+ JSON.stringify(cookieItem), // value: string,
111
+ expiry, // expires?: number | Date,
112
+ params.path, // path?: string,
113
+ params.domain, // domain?: string,
114
+ params.secure, // secure?: boolean,
115
+ params.sameSite // sameSite?: 'Lax' | 'None' | 'Strict'
116
+ );
117
+ }
118
+ localStorage.setItem(prefixedName, JSON.stringify(item));
119
+ });
120
+ }
121
+ get(name) {
122
+ return __awaiter(this, void 0, void 0, function* () {
123
+ const prefixedName = this.prefixName(name);
124
+ try {
125
+ const ret = yield this.getImpl(prefixedName);
126
+ if (ret == null) {
127
+ // Clear any cookies to keep things in sync.
128
+ this.deletePrefixedName(prefixedName);
129
+ }
130
+ return ret;
131
+ }
132
+ catch (error) {
133
+ this.deletePrefixedName(prefixedName);
134
+ throw error;
135
+ }
136
+ });
137
+ }
138
+ getImpl(name) {
139
+ return __awaiter(this, void 0, void 0, function* () {
140
+ const itemString = localStorage.getItem(name);
141
+ if (!itemString) {
142
+ return null;
143
+ }
144
+ const item = JSON.parse(itemString);
145
+ let data;
146
+ if (item.expiry) {
147
+ const cookieItemString = this.cookieService.get(name);
148
+ if (!cookieItemString) {
149
+ // Probably expired, but we won't make any interpretations since if we only used
150
+ // cookies we can't tell if it's expired or explicitly removed. So we just make
151
+ // the behaviour here consistent with that.
152
+ console.log('No cookie.');
153
+ return null;
154
+ }
155
+ const cookieItem = JSON.parse(cookieItemString);
156
+ const key = yield KFS.asKey(cookieItem.key);
157
+ data = yield this.encryptionService.decrypt(key, item.data);
158
+ }
159
+ else {
160
+ data = item.data;
161
+ }
162
+ if (item.serverSession) {
163
+ data = yield this.encryptionService.decrypt(this.serverSessionEncryptionKey, data);
164
+ }
165
+ return data;
166
+ });
167
+ }
168
+ }
169
+ PersistService.ɵprov = i0.ɵɵdefineInjectable({ factory: function PersistService_Factory() { return new PersistService(i0.ɵɵinject(i1.KeyFactoryService), i0.ɵɵinject(i2.CookieService), i0.ɵɵinject(i3.EncryptionService), i0.ɵɵinject(i0.INJECTOR)); }, token: PersistService, providedIn: "root" });
170
+ PersistService.decorators = [
171
+ { type: Injectable, args: [{
172
+ providedIn: 'root',
173
+ },] }
174
+ ];
175
+ PersistService.ctorParameters = () => [
176
+ { type: KFS },
177
+ { type: CookieService },
178
+ { type: EncryptionService },
179
+ { type: Injector }
180
+ ];
181
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"persist.service.js","sourceRoot":"C:/Projects/newrepo/kc-client/projects/core/src/","sources":["lib/api/persist.service.ts"],"names":[],"mappings":";AACA,OAAO,EAAE,UAAU,EAAE,QAAQ,EAAE,MAAM,eAAe,CAAC;AACrD,OAAO,EAAE,aAAa,EAAE,MAAM,oBAAoB,CAAC;AACnD,OAAO,EAAE,iBAAiB,EAAE,MAAM,oCAAoC,CAAC;AACvE,OAAO,EAAE,SAAS,EAAE,MAAM,eAAe,CAAC;AAC1C,OAAO,EAAE,sBAAsB,EAAE,MAAM,uBAAuB,CAAC;AAC/D,OAAO,EAAE,iBAAiB,IAAI,GAAG,EAAE,MAAM,qCAAqC,CAAC;;;;;AAe/E,MAAM,OAAO,cAAc;IAMzB,YACU,UAAe,EACf,aAA4B,EAC5B,iBAAoC,EACpC,QAAkB;QAHlB,eAAU,GAAV,UAAU,CAAK;QACf,kBAAa,GAAb,aAAa,CAAe;QAC5B,sBAAiB,GAAjB,iBAAiB,CAAmB;QACpC,aAAQ,GAAR,QAAQ,CAAU;QATX,eAAU,GAAG,YAAY,CAAC;QAEnC,iBAAY,GAAG,IAAI,CAAC;QACpB,+BAA0B,GAAY,IAAI,CAAC;QAQjD,IAAI,SAAS,EAAE,EAAE;YACf,IAAI,CAAC,eAAe,CAAC,KAAK,CAAC,CAAC;SAC7B;IACH,CAAC;IAED,6BAA6B,CAAC,GAAY;QACxC,IAAI,CAAC,0BAA0B,GAAG,GAAG,CAAC;IACxC,CAAC;IAED,+BAA+B;QAC7B,IAAI,CAAC,0BAA0B,GAAG,IAAI,CAAC;IACzC,CAAC;IAED,oFAAoF;IAC5E,eAAe;QACrB,OAAO;YACL,IAAI,EAAE,GAAG;YACT,MAAM,EAAE,IAAI;YACZ,MAAM,EAAE,IAAI,CAAC,YAAY;YACzB,QAAQ,EAAE,KAAkC;SAC7C,CAAC;IACJ,CAAC;IAEM,KAAK;QACV,qBAAqB;QACrB,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,aAAa,CAAC,MAAM,EAAE,CAAC,CAAC,OAAO,CAAC,CAAC,GAAG,EAAE,EAAE;YACvD,IAAI,GAAG,CAAC,UAAU,CAAC,IAAI,CAAC,UAAU,CAAC,EAAE;gBACnC,IAAI,CAAC,kBAAkB,CAAC,GAAG,CAAC,CAAC;aAC9B;QACH,CAAC,CAAC,CAAC;QAEH,yCAAyC;QACzC,MAAM,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,OAAO,CAAC,CAAC,GAAG,EAAE,EAAE;YACxC,IAAI,GAAG,CAAC,UAAU,CAAC,IAAI,CAAC,UAAU,CAAC,EAAE;gBACnC,IAAI,CAAC,kBAAkB,CAAC,GAAG,CAAC,CAAC;aAC9B;QACH,CAAC,CAAC,CAAC;IACL,CAAC;IAEM,eAAe,CAAC,KAAc;QACnC,IAAI,CAAC,YAAY,GAAG,KAAK,CAAC;QAC1B,IAAI,CAAC,KAAK,EAAE;YACV,IAAI,SAAS,EAAE,EAAE;gBACf,OAAO,CAAC,IAAI,CACV,mGAAmG,CACpG,CAAC;aACH;iBAAM;gBACL,MAAM,IAAI,sBAAsB,CAC9B,4EAA4E,CAC7E,CAAC;aACH;SACF;IACH,CAAC;IAEO,UAAU,CAAC,IAAY;QAC7B,OAAO,IAAI,CAAC,UAAU,GAAG,IAAI,CAAC;IAChC,CAAC;IAEM,MAAM,CAAC,IAAY;QACxB,IAAI,CAAC,kBAAkB,CAAC,IAAI,CAAC,UAAU,CAAC,IAAI,CAAC,CAAC,CAAC;IACjD,CAAC;IAEO,kBAAkB,CAAC,YAAoB;QAC7C,MAAM,MAAM,GAAG,IAAI,CAAC,eAAe,EAAE,CAAC;QACtC,IAAI,CAAC,aAAa,CAAC,MAAM,CACvB,YAAY,EAAE,gBAAgB;QAC9B,MAAM,CAAC,IAAI,EAAE,iBAAiB;QAC9B,MAAM,CAAC,MAAM,EAAE,oBAAoB;QACnC,MAAM,CAAC,MAAM,EAAE,qBAAqB;QACpC,MAAM,CAAC,QAAQ,CAAC,gDAAgD;SACjE,CAAC;QACF,YAAY,CAAC,UAAU,CAAC,YAAY,CAAC,CAAC;IACxC,CAAC;IAEY,GAAG,CAAC,EACf,IAAI,EACJ,KAAK,EACL,aAAa,EACb,MAAM,GAMP;;YACC,MAAM,YAAY,GAAG,IAAI,CAAC,UAAU,CAAC,IAAI,CAAC,CAAC;YAE3C,IAAI,IAAU,CAAC;YAEf,IAAI,aAAa,EAAE;gBACjB,IAAI,GAAG;oBACL,aAAa,EAAE,IAAI;oBACnB,IAAI,EAAE,MAAM,IAAI,CAAC,iBAAiB,CAAC,eAAe,CAChD,IAAI,CAAC,0BAA0B,EAC/B,KAAK,CACN;iBACF,CAAC;aACH;iBAAM;gBACL,IAAI,GAAG;oBACL,IAAI,EAAE,KAAK;iBACZ,CAAC;aACH;YAED,IAAI,MAAM,EAAE;gBACV,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,SAAS,EAAE,CAAC;gBAC9C,IAAI,CAAC,MAAM,GAAG,MAAM,CAAC,WAAW,EAAE,CAAC;gBACnC,IAAI,CAAC,IAAI,GAAG,MAAM,IAAI,CAAC,iBAAiB,CAAC,eAAe,CAAC,GAAG,EAAE,IAAI,CAAC,IAAI,CAAC,CAAC;gBAEzE,MAAM,UAAU,GAAe;oBAC7B,GAAG,EAAE,GAAG,CAAC,MAAM,CAAC,IAAI,CAAC;iBACtB,CAAC;gBAEF,oEAAoE;gBACpE,uEAAuE;gBACvE,yEAAyE;gBACzE,4EAA4E;gBAC5E,uEAAuE;gBACvE,MAAM,MAAM,GAAG,IAAI,CAAC,eAAe,EAAE,CAAC;gBACtC,IAAI,CAAC,aAAa,CAAC,GAAG,CACpB,YAAY,EAAE,gBAAgB;gBAC9B,IAAI,CAAC,SAAS,CAAC,UAAU,CAAC,EAAE,iBAAiB;gBAC7C,MAAM,EAAE,2BAA2B;gBACnC,MAAM,CAAC,IAAI,EAAE,iBAAiB;gBAC9B,MAAM,CAAC,MAAM,EAAE,mBAAmB;gBAClC,MAAM,CAAC,MAAM,EAAE,oBAAoB;gBACnC,MAAM,CAAC,QAAQ,CAAC,uCAAuC;iBACxD,CAAC;aACH;YAED,YAAY,CAAC,OAAO,CAAC,YAAY,EAAE,IAAI,CAAC,SAAS,CAAC,IAAI,CAAC,CAAC,CAAC;QAC3D,CAAC;KAAA;IAEY,GAAG,CAAC,IAAY;;YAC3B,MAAM,YAAY,GAAG,IAAI,CAAC,UAAU,CAAC,IAAI,CAAC,CAAC;YAE3C,IAAI;gBACF,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,OAAO,CAAC,YAAY,CAAC,CAAC;gBAC7C,IAAI,GAAG,IAAI,IAAI,EAAE;oBACf,4CAA4C;oBAC5C,IAAI,CAAC,kBAAkB,CAAC,YAAY,CAAC,CAAC;iBACvC;gBACD,OAAO,GAAG,CAAC;aACZ;YAAC,OAAO,KAAK,EAAE;gBACd,IAAI,CAAC,kBAAkB,CAAC,YAAY,CAAC,CAAC;gBACtC,MAAM,KAAK,CAAC;aACb;QACH,CAAC;KAAA;IAEa,OAAO,CAAC,IAAY;;YAChC,MAAM,UAAU,GAAG,YAAY,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC;YAC9C,IAAI,CAAC,UAAU,EAAE;gBACf,OAAO,IAAI,CAAC;aACb;YAED,MAAM,IAAI,GAAS,IAAI,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC;YAE1C,IAAI,IAAS,CAAC;YAEd,IAAI,IAAI,CAAC,MAAM,EAAE;gBACf,MAAM,gBAAgB,GAAG,IAAI,CAAC,aAAa,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC;gBACtD,IAAI,CAAC,gBAAgB,EAAE;oBACrB,gFAAgF;oBAChF,+EAA+E;oBAC/E,2CAA2C;oBAC3C,OAAO,CAAC,GAAG,CAAC,YAAY,CAAC,CAAC;oBAC1B,OAAO,IAAI,CAAC;iBACb;gBAED,MAAM,UAAU,GAAG,IAAI,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC;gBAEhD,MAAM,GAAG,GAAG,MAAM,GAAG,CAAC,KAAK,CAAC,UAAU,CAAC,GAAG,CAAC,CAAC;gBAE5C,IAAI,GAAG,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAAC,GAAG,EAAE,IAAI,CAAC,IAAI,CAAC,CAAC;aAC7D;iBAAM;gBACL,IAAI,GAAG,IAAI,CAAC,IAAI,CAAC;aAClB;YAED,IAAI,IAAI,CAAC,aAAa,EAAE;gBACtB,IAAI,GAAG,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CACzC,IAAI,CAAC,0BAA0B,EAC/B,IAAI,CACL,CAAC;aACH;YAED,OAAO,IAAI,CAAC;QACd,CAAC;KAAA;;;;YAxMF,UAAU,SAAC;gBACV,UAAU,EAAE,MAAM;aACnB;;;YAd6B,GAAG;YAJxB,aAAa;YACb,iBAAiB;YAFL,QAAQ","sourcesContent":["import { JWK } from 'node-jose';\r\nimport { Injectable, Injector } from '@angular/core';\r\nimport { CookieService } from 'ngx-cookie-service';\r\nimport { EncryptionService } from '../cryptography/encryption.service';\r\nimport { isDevMode } from '@angular/core';\r\nimport { LrBadArgumentException } from '../_common/exceptions';\r\nimport { KeyFactoryService as KFS } from '../cryptography/key-factory.service';\r\n\r\ninterface Item {\r\n  data: string;\r\n  expiry?: string; // iso format\r\n  serverSession?: boolean;\r\n}\r\n\r\ninterface CookieItem {\r\n  key: any;\r\n}\r\n\r\n@Injectable({\r\n  providedIn: 'root',\r\n})\r\nexport class PersistService {\r\n  private readonly KEY_PREFIX = 'lrSession-';\r\n\r\n  private cookieSecure = true;\r\n  private serverSessionEncryptionKey: JWK.Key = null;\r\n\r\n  constructor(\r\n    private keyFactory: KFS,\r\n    private cookieService: CookieService,\r\n    private encryptionService: EncryptionService,\r\n    private injector: Injector\r\n  ) {\r\n    if (isDevMode()) {\r\n      this.setCookieSecure(false);\r\n    }\r\n  }\r\n\r\n  setServerSessionEncryptionKey(key: JWK.Key) {\r\n    this.serverSessionEncryptionKey = key;\r\n  }\r\n\r\n  clearServerSessionEncryptionKey() {\r\n    this.serverSessionEncryptionKey = null;\r\n  }\r\n\r\n  // It's important that set and delete cookie use exactly the same set of parameters.\r\n  private getCookieParams() {\r\n    return {\r\n      path: '/',\r\n      domain: null, // which means the current domain of the frontend app.\r\n      secure: this.cookieSecure,\r\n      sameSite: 'Lax' as 'Lax' | 'None' | 'Strict',\r\n    };\r\n  }\r\n\r\n  public clear() {\r\n    // Remove all cookies\r\n    Object.keys(this.cookieService.getAll()).forEach((key) => {\r\n      if (key.startsWith(this.KEY_PREFIX)) {\r\n        this.deletePrefixedName(key);\r\n      }\r\n    });\r\n\r\n    // Remove all persisted session variables\r\n    Object.keys(localStorage).forEach((key) => {\r\n      if (key.startsWith(this.KEY_PREFIX)) {\r\n        this.deletePrefixedName(key);\r\n      }\r\n    });\r\n  }\r\n\r\n  public setCookieSecure(value: boolean) {\r\n    this.cookieSecure = value;\r\n    if (!value) {\r\n      if (isDevMode()) {\r\n        console.warn(\r\n          'The cookie secure flag in persistService has been set to false, set it to true in production mode'\r\n        );\r\n      } else {\r\n        throw new LrBadArgumentException(\r\n          'Can not set PersistService cookie secure flag to false in production mode.'\r\n        );\r\n      }\r\n    }\r\n  }\r\n\r\n  private prefixName(name: string): string {\r\n    return this.KEY_PREFIX + name;\r\n  }\r\n\r\n  public delete(name: string): void {\r\n    this.deletePrefixedName(this.prefixName(name));\r\n  }\r\n\r\n  private deletePrefixedName(prefixedName: string): void {\r\n    const params = this.getCookieParams();\r\n    this.cookieService.delete(\r\n      prefixedName, // name: string,\r\n      params.path, // path?: string,\r\n      params.domain, // domain ?: string,\r\n      params.secure, // secure ?: boolean,\r\n      params.sameSite // sameSite ?: 'Lax' | 'None' | 'Strict'): void;\r\n    );\r\n    localStorage.removeItem(prefixedName);\r\n  }\r\n\r\n  public async set({\r\n    name,\r\n    value,\r\n    serverSession,\r\n    expiry,\r\n  }: {\r\n    name: string;\r\n    value: any;\r\n    serverSession: boolean;\r\n    expiry?: Date;\r\n  }): Promise<void> {\r\n    const prefixedName = this.prefixName(name);\r\n\r\n    let item: Item;\r\n\r\n    if (serverSession) {\r\n      item = {\r\n        serverSession: true,\r\n        data: await this.encryptionService.encryptToString(\r\n          this.serverSessionEncryptionKey,\r\n          value\r\n        ),\r\n      };\r\n    } else {\r\n      item = {\r\n        data: value,\r\n      };\r\n    }\r\n\r\n    if (expiry) {\r\n      const key = await this.keyFactory.createKey();\r\n      item.expiry = expiry.toISOString();\r\n      item.data = await this.encryptionService.encryptToString(key, item.data);\r\n\r\n      const cookieItem: CookieItem = {\r\n        key: key.toJSON(true),\r\n      };\r\n\r\n      // If path is set to anything other than \"/\" then the cookie is only\r\n      // accessible by JS if the current URL has the same prefix as the path.\r\n      // Ideally we don't want the encryption key cookie to be sent at all, but\r\n      // since the encrypted content is held in localstorage, it is not a security\r\n      // risk, i.e. it is at least as secure as storing only in localstorage.\r\n      const params = this.getCookieParams();\r\n      this.cookieService.set(\r\n        prefixedName, // name: string,\r\n        JSON.stringify(cookieItem), // value: string,\r\n        expiry, // expires?: number | Date,\r\n        params.path, // path?: string,\r\n        params.domain, // domain?: string,\r\n        params.secure, // secure?: boolean,\r\n        params.sameSite // sameSite?: 'Lax' | 'None' | 'Strict'\r\n      );\r\n    }\r\n\r\n    localStorage.setItem(prefixedName, JSON.stringify(item));\r\n  }\r\n\r\n  public async get(name: string): Promise<any> {\r\n    const prefixedName = this.prefixName(name);\r\n\r\n    try {\r\n      const ret = await this.getImpl(prefixedName);\r\n      if (ret == null) {\r\n        // Clear any cookies to keep things in sync.\r\n        this.deletePrefixedName(prefixedName);\r\n      }\r\n      return ret;\r\n    } catch (error) {\r\n      this.deletePrefixedName(prefixedName);\r\n      throw error;\r\n    }\r\n  }\r\n\r\n  private async getImpl(name: string): Promise<any> {\r\n    const itemString = localStorage.getItem(name);\r\n    if (!itemString) {\r\n      return null;\r\n    }\r\n\r\n    const item: Item = JSON.parse(itemString);\r\n\r\n    let data: any;\r\n\r\n    if (item.expiry) {\r\n      const cookieItemString = this.cookieService.get(name);\r\n      if (!cookieItemString) {\r\n        // Probably expired, but we won't make any interpretations since if we only used\r\n        // cookies we can't tell if it's expired or explicitly removed. So we just make\r\n        // the behaviour here consistent with that.\r\n        console.log('No cookie.');\r\n        return null;\r\n      }\r\n\r\n      const cookieItem = JSON.parse(cookieItemString);\r\n\r\n      const key = await KFS.asKey(cookieItem.key);\r\n\r\n      data = await this.encryptionService.decrypt(key, item.data);\r\n    } else {\r\n      data = item.data;\r\n    }\r\n\r\n    if (item.serverSession) {\r\n      data = await this.encryptionService.decrypt(\r\n        this.serverSessionEncryptionKey,\r\n        data\r\n      );\r\n    }\r\n\r\n    return data;\r\n  }\r\n}\r\n"]}