@lifeready/core 1.0.2 → 1.0.4
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +62 -62
- package/bundles/lifeready-core.umd.js +15445 -15445
- package/bundles/lifeready-core.umd.js.map +1 -1
- package/bundles/lifeready-core.umd.min.js.map +1 -1
- package/esm2015/lib/_common/ast.js +40 -40
- package/esm2015/lib/_common/deferred-promise.js +24 -24
- package/esm2015/lib/_common/exceptions.js +157 -157
- package/esm2015/lib/_common/queries.gql.js +190 -190
- package/esm2015/lib/_common/run-outside-angular.js +79 -79
- package/esm2015/lib/_common/types.js +1 -1
- package/esm2015/lib/_common/utils.js +44 -44
- package/esm2015/lib/api/contact-card.gql.js +79 -79
- package/esm2015/lib/api/contact-card.service.js +154 -154
- package/esm2015/lib/api/contact-card2.gql.js +60 -60
- package/esm2015/lib/api/contact-card2.service.js +103 -103
- package/esm2015/lib/api/file.service.js +74 -74
- package/esm2015/lib/api/item2.gql.js +110 -110
- package/esm2015/lib/api/item2.service.js +311 -311
- package/esm2015/lib/api/key-exchange.gql.js +188 -188
- package/esm2015/lib/api/key-exchange.service.js +442 -442
- package/esm2015/lib/api/key-exchange.types.js +18 -18
- package/esm2015/lib/api/key-exchange2.gql.js +171 -171
- package/esm2015/lib/api/key-exchange2.service.js +479 -479
- package/esm2015/lib/api/lock.gql.js +40 -40
- package/esm2015/lib/api/lock.service.js +64 -64
- package/esm2015/lib/api/lr-apollo.service.js +46 -46
- package/esm2015/lib/api/lr-graphql/index.js +6 -6
- package/esm2015/lib/api/lr-graphql/lr-graphql.service.js +155 -155
- package/esm2015/lib/api/lr-graphql/lr-merged-mutation.js +213 -213
- package/esm2015/lib/api/lr-graphql/lr-mutation-base.js +51 -51
- package/esm2015/lib/api/lr-graphql/lr-mutation.js +48 -48
- package/esm2015/lib/api/lr-graphql/lr.service.js +18 -18
- package/esm2015/lib/api/message.service.js +138 -138
- package/esm2015/lib/api/persist.service.js +181 -181
- package/esm2015/lib/api/query-processor/common-processors.service.js +93 -93
- package/esm2015/lib/api/query-processor/index.js +3 -3
- package/esm2015/lib/api/query-processor/query-processor.service.js +192 -192
- package/esm2015/lib/api/query-processor/tp-password-reset-processor.service.js +109 -109
- package/esm2015/lib/api/shared-contact-card.service.js +119 -119
- package/esm2015/lib/api/shared-contact-card2.gql.js +41 -41
- package/esm2015/lib/api/shared-contact-card2.service.js +117 -117
- package/esm2015/lib/api/time.service.js +146 -146
- package/esm2015/lib/api/types/graphql.types.js +7 -7
- package/esm2015/lib/api/types/index.js +3 -3
- package/esm2015/lib/api/types/lr-graphql.types.js +71 -71
- package/esm2015/lib/auth/auth.config.js +57 -57
- package/esm2015/lib/auth/auth.gql.js +48 -48
- package/esm2015/lib/auth/auth.types.js +27 -27
- package/esm2015/lib/auth/idle.service.js +168 -168
- package/esm2015/lib/auth/idle.types.js +7 -7
- package/esm2015/lib/auth/lbop.service.js +355 -355
- package/esm2015/lib/auth/life-ready-auth.service.js +500 -500
- package/esm2015/lib/auth/password.service.js +320 -320
- package/esm2015/lib/auth/register.service.js +172 -172
- package/esm2015/lib/auth/two-factor.service.js +74 -74
- package/esm2015/lib/category/category-meta.service.js +99 -99
- package/esm2015/lib/category/category.gql.js +406 -406
- package/esm2015/lib/category/category.service.js +390 -390
- package/esm2015/lib/category/category.types.js +29 -29
- package/esm2015/lib/cryptography/cryptography.types.js +11 -11
- package/esm2015/lib/cryptography/encryption.service.js +189 -189
- package/esm2015/lib/cryptography/key-factory.service.js +237 -237
- package/esm2015/lib/cryptography/key-graph.service.js +280 -280
- package/esm2015/lib/cryptography/key-meta.service.js +200 -200
- package/esm2015/lib/cryptography/key.service.js +124 -124
- package/esm2015/lib/cryptography/slip39.service.js +169 -169
- package/esm2015/lib/cryptography/web-crypto.service.js +29 -29
- package/esm2015/lib/life-ready.config.js +84 -84
- package/esm2015/lib/life-ready.module.js +74 -74
- package/esm2015/lib/plan/plan.gql.js +123 -123
- package/esm2015/lib/plan/plan.service.js +149 -149
- package/esm2015/lib/plan/plan.types.js +11 -11
- package/esm2015/lib/record/record-attachment.service.js +101 -101
- package/esm2015/lib/record/record.gql.js +179 -179
- package/esm2015/lib/record/record.service.js +206 -206
- package/esm2015/lib/record/record.types.js +15 -15
- package/esm2015/lib/record-type/record-type.service.js +75 -75
- package/esm2015/lib/record-type/record-type.types.js +28 -28
- package/esm2015/lib/scenario/approvals/scenario-approval.gql.js +105 -105
- package/esm2015/lib/scenario/approvals/scenario-approval.types.js +1 -1
- package/esm2015/lib/scenario/approvals/scenario-approver.service.js +300 -300
- package/esm2015/lib/scenario/claimants/scenario-claimant.gql.js +52 -52
- package/esm2015/lib/scenario/claimants/scenario-claimant.service.js +97 -97
- package/esm2015/lib/scenario/claimants/scenario-claimant.types.js +1 -1
- package/esm2015/lib/scenario/receivers/scenario-receiver.gql.js +150 -150
- package/esm2015/lib/scenario/receivers/scenario-receiver.service.js +229 -229
- package/esm2015/lib/scenario/receivers/scenario-receiver.types.js +1 -1
- package/esm2015/lib/scenario/scenario-setup.service.js +269 -269
- package/esm2015/lib/scenario/scenario.gql.js +368 -368
- package/esm2015/lib/scenario/scenario.service.js +611 -611
- package/esm2015/lib/scenario/scenario.types.js +64 -64
- package/esm2015/lib/search/search.gql.js +62 -62
- package/esm2015/lib/search/search.service.js +156 -156
- package/esm2015/lib/search/search.types.js +6 -6
- package/esm2015/lib/trusted-parties/tp-password-reset-request.service.js +112 -112
- package/esm2015/lib/trusted-parties/tp-password-reset-user.service.js +129 -129
- package/esm2015/lib/trusted-parties/tp-password-reset.constants.js +4 -4
- package/esm2015/lib/trusted-parties/tp-password-reset.gql.js +232 -232
- package/esm2015/lib/trusted-parties/tp-password-reset.service.js +299 -299
- package/esm2015/lib/trusted-parties/trusted-party.gql.js +148 -148
- package/esm2015/lib/trusted-parties/trusted-party.service.js +326 -326
- package/esm2015/lib/trusted-parties/trusted-party.types.js +41 -41
- package/esm2015/lib/trusted-parties/trusted-party2.gql.js +87 -87
- package/esm2015/lib/trusted-parties/trusted-party2.service.js +215 -215
- package/esm2015/lib/users/profile-details.service.js +214 -214
- package/esm2015/lib/users/profile.gql.js +97 -97
- package/esm2015/lib/users/profile.service.js +169 -169
- package/esm2015/lib/users/profile.types.js +34 -34
- package/esm2015/lib/users/user.gql.js +60 -60
- package/esm2015/lib/users/user.service.js +79 -79
- package/esm2015/lib/users/user.types.js +5 -5
- package/esm2015/lifeready-core.js +10 -10
- package/esm2015/public-api.js +81 -81
- package/fesm2015/lifeready-core.js +13088 -13088
- package/fesm2015/lifeready-core.js.map +1 -1
- package/lib/_common/ast.d.ts +11 -11
- package/lib/_common/deferred-promise.d.ts +12 -12
- package/lib/_common/exceptions.d.ts +109 -109
- package/lib/_common/queries.gql.d.ts +10 -10
- package/lib/_common/run-outside-angular.d.ts +14 -14
- package/lib/_common/types.d.ts +10 -10
- package/lib/_common/utils.d.ts +3 -3
- package/lib/api/contact-card.gql.d.ts +7 -7
- package/lib/api/contact-card.service.d.ts +52 -52
- package/lib/api/contact-card2.gql.d.ts +34 -34
- package/lib/api/contact-card2.service.d.ts +49 -49
- package/lib/api/file.service.d.ts +18 -18
- package/lib/api/item2.gql.d.ts +96 -96
- package/lib/api/item2.service.d.ts +177 -177
- package/lib/api/key-exchange.gql.d.ts +9 -9
- package/lib/api/key-exchange.service.d.ts +39 -39
- package/lib/api/key-exchange.types.d.ts +196 -196
- package/lib/api/key-exchange2.gql.d.ts +125 -125
- package/lib/api/key-exchange2.service.d.ts +187 -187
- package/lib/api/lock.gql.d.ts +27 -27
- package/lib/api/lock.service.d.ts +25 -25
- package/lib/api/lr-apollo.service.d.ts +15 -15
- package/lib/api/lr-graphql/index.d.ts +5 -5
- package/lib/api/lr-graphql/lr-graphql.service.d.ts +60 -60
- package/lib/api/lr-graphql/lr-merged-mutation.d.ts +27 -27
- package/lib/api/lr-graphql/lr-mutation-base.d.ts +28 -28
- package/lib/api/lr-graphql/lr-mutation.d.ts +8 -8
- package/lib/api/lr-graphql/lr.service.d.ts +9 -9
- package/lib/api/message.service.d.ts +58 -58
- package/lib/api/persist.service.d.ts +31 -31
- package/lib/api/query-processor/common-processors.service.d.ts +36 -36
- package/lib/api/query-processor/index.d.ts +2 -2
- package/lib/api/query-processor/query-processor.service.d.ts +18 -18
- package/lib/api/query-processor/tp-password-reset-processor.service.d.ts +15 -15
- package/lib/api/shared-contact-card.service.d.ts +33 -33
- package/lib/api/shared-contact-card2.gql.d.ts +36 -36
- package/lib/api/shared-contact-card2.service.d.ts +45 -45
- package/lib/api/time.service.d.ts +16 -16
- package/lib/api/types/graphql.types.d.ts +29 -29
- package/lib/api/types/index.d.ts +2 -2
- package/lib/api/types/lr-graphql.types.d.ts +385 -385
- package/lib/auth/auth.config.d.ts +5 -5
- package/lib/auth/auth.gql.d.ts +15 -15
- package/lib/auth/auth.types.d.ts +66 -66
- package/lib/auth/idle.service.d.ts +40 -40
- package/lib/auth/idle.types.d.ts +10 -10
- package/lib/auth/lbop.service.d.ts +91 -91
- package/lib/auth/life-ready-auth.service.d.ts +59 -59
- package/lib/auth/password.service.d.ts +78 -78
- package/lib/auth/register.service.d.ts +25 -25
- package/lib/auth/two-factor.service.d.ts +15 -15
- package/lib/category/category-meta.service.d.ts +23 -23
- package/lib/category/category.gql.d.ts +45 -45
- package/lib/category/category.service.d.ts +67 -67
- package/lib/category/category.types.d.ts +79 -79
- package/lib/cryptography/cryptography.types.d.ts +83 -83
- package/lib/cryptography/encryption.service.d.ts +41 -41
- package/lib/cryptography/key-factory.service.d.ts +38 -38
- package/lib/cryptography/key-graph.service.d.ts +33 -33
- package/lib/cryptography/key-meta.service.d.ts +44 -44
- package/lib/cryptography/key.service.d.ts +36 -36
- package/lib/cryptography/slip39.service.d.ts +43 -43
- package/lib/cryptography/web-crypto.service.d.ts +5 -5
- package/lib/life-ready.config.d.ts +14 -14
- package/lib/life-ready.module.d.ts +5 -5
- package/lib/plan/plan.gql.d.ts +11 -11
- package/lib/plan/plan.service.d.ts +33 -33
- package/lib/plan/plan.types.d.ts +31 -31
- package/lib/record/record-attachment.service.d.ts +16 -16
- package/lib/record/record.gql.d.ts +14 -14
- package/lib/record/record.service.d.ts +25 -25
- package/lib/record/record.types.d.ts +57 -57
- package/lib/record-type/record-type.service.d.ts +11 -11
- package/lib/record-type/record-type.types.d.ts +50 -50
- package/lib/scenario/approvals/scenario-approval.gql.d.ts +7 -7
- package/lib/scenario/approvals/scenario-approval.types.d.ts +63 -63
- package/lib/scenario/approvals/scenario-approver.service.d.ts +32 -32
- package/lib/scenario/claimants/scenario-claimant.gql.d.ts +5 -5
- package/lib/scenario/claimants/scenario-claimant.service.d.ts +17 -17
- package/lib/scenario/claimants/scenario-claimant.types.d.ts +18 -18
- package/lib/scenario/receivers/scenario-receiver.gql.d.ts +8 -8
- package/lib/scenario/receivers/scenario-receiver.service.d.ts +30 -30
- package/lib/scenario/receivers/scenario-receiver.types.d.ts +54 -54
- package/lib/scenario/scenario-setup.service.d.ts +22 -22
- package/lib/scenario/scenario.gql.d.ts +34 -34
- package/lib/scenario/scenario.service.d.ts +58 -58
- package/lib/scenario/scenario.types.d.ts +217 -217
- package/lib/search/search.gql.d.ts +1 -1
- package/lib/search/search.service.d.ts +25 -25
- package/lib/search/search.types.d.ts +20 -20
- package/lib/trusted-parties/tp-password-reset-request.service.d.ts +20 -20
- package/lib/trusted-parties/tp-password-reset-user.service.d.ts +35 -35
- package/lib/trusted-parties/tp-password-reset.constants.d.ts +3 -3
- package/lib/trusted-parties/tp-password-reset.gql.d.ts +218 -218
- package/lib/trusted-parties/tp-password-reset.service.d.ts +130 -130
- package/lib/trusted-parties/trusted-party.gql.d.ts +9 -9
- package/lib/trusted-parties/trusted-party.service.d.ts +44 -44
- package/lib/trusted-parties/trusted-party.types.d.ts +102 -102
- package/lib/trusted-parties/trusted-party2.gql.d.ts +79 -79
- package/lib/trusted-parties/trusted-party2.service.d.ts +114 -114
- package/lib/users/profile-details.service.d.ts +21 -21
- package/lib/users/profile.gql.d.ts +11 -11
- package/lib/users/profile.service.d.ts +35 -35
- package/lib/users/profile.types.d.ts +96 -96
- package/lib/users/user.gql.d.ts +9 -9
- package/lib/users/user.service.d.ts +12 -12
- package/lib/users/user.types.d.ts +23 -23
- package/lifeready-core.d.ts +9 -9
- package/package.json +1 -1
- package/public-api.d.ts +77 -77
|
@@ -1,200 +1,200 @@
|
|
|
1
|
-
import { __awaiter } from "tslib";
|
|
2
|
-
import { Injectable } from '@angular/core';
|
|
3
|
-
import { LrApolloService } from '../api/lr-apollo.service';
|
|
4
|
-
import { GetCategoryKeyIdQuery } from '../category/category.gql';
|
|
5
|
-
import { EncryptionService, } from './encryption.service';
|
|
6
|
-
import { KeyFactoryService } from './key-factory.service';
|
|
7
|
-
import { KeyGraphService } from './key-graph.service';
|
|
8
|
-
import { KeyService } from './key.service';
|
|
9
|
-
import * as i0 from "@angular/core";
|
|
10
|
-
import * as i1 from "./encryption.service";
|
|
11
|
-
import * as i2 from "./key-graph.service";
|
|
12
|
-
import * as i3 from "../api/lr-apollo.service";
|
|
13
|
-
import * as i4 from "./key.service";
|
|
14
|
-
import * as i5 from "./key-factory.service";
|
|
15
|
-
export class WrappedContent {
|
|
16
|
-
}
|
|
17
|
-
export class WrappingKey {
|
|
18
|
-
}
|
|
19
|
-
export class KeyMetaService {
|
|
20
|
-
constructor(encryptionService, keyGraph, lrApollo, keyService, keyFactory) {
|
|
21
|
-
this.encryptionService = encryptionService;
|
|
22
|
-
this.keyGraph = keyGraph;
|
|
23
|
-
this.lrApollo = lrApollo;
|
|
24
|
-
this.keyService = keyService;
|
|
25
|
-
this.keyFactory = keyFactory;
|
|
26
|
-
}
|
|
27
|
-
// async decryptFromString<T>(
|
|
28
|
-
// keyOrId: string | Key,
|
|
29
|
-
// cipherData: string,
|
|
30
|
-
// options?: DecryptOptions
|
|
31
|
-
// ): Promise<T> {
|
|
32
|
-
// if (cipherData) {
|
|
33
|
-
// const key = await this.keyGraphService.getJwkKey(keyOrId);
|
|
34
|
-
// return (await this.encryptionService.decrypt(
|
|
35
|
-
// key,
|
|
36
|
-
// JSON.parse(cipherData),
|
|
37
|
-
// options
|
|
38
|
-
// )) as any;
|
|
39
|
-
// }
|
|
40
|
-
// return null;
|
|
41
|
-
// }
|
|
42
|
-
decryptMeta(metaHaver) {
|
|
43
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
44
|
-
if (metaHaver.cipherMeta) {
|
|
45
|
-
const key = yield this.keyGraph.getJwkKey(metaHaver.keyId);
|
|
46
|
-
return (yield this.encryptionService.decrypt(key, JSON.parse(metaHaver.cipherMeta)));
|
|
47
|
-
}
|
|
48
|
-
return null;
|
|
49
|
-
});
|
|
50
|
-
}
|
|
51
|
-
// async decryptFile(keyId: string, file: any): Promise<any> {
|
|
52
|
-
// const key = await this.keyGraphService.getJwkKey(keyId);
|
|
53
|
-
// return (await this.encryptionService.decrypt(key, file, {
|
|
54
|
-
// payloadType: 'ArrayBuffer',
|
|
55
|
-
// })) as any;
|
|
56
|
-
// }
|
|
57
|
-
// // TODO rename this to encrypt() and use as the most common usecase
|
|
58
|
-
// async encryptToString(
|
|
59
|
-
// key: string | Key | JWK.Key,
|
|
60
|
-
// content: any
|
|
61
|
-
// ): Promise<string> {
|
|
62
|
-
// // Empty string should be encrypted since you want to clear the field.
|
|
63
|
-
// // Null is not encrypted because it's not valid JSON in the old JSON spec. Use
|
|
64
|
-
// // empty string instead. It'll function as a logic false as well.
|
|
65
|
-
// // Note that passing in empty string means it'll be encrypted which verifies
|
|
66
|
-
// // it's integrity. But we still want to have a way to set the DB field
|
|
67
|
-
// // to NULL, so we explicitly return null when content == null. A null
|
|
68
|
-
// // variable in graphql mutation on KC server clears the field to NULL.
|
|
69
|
-
// if (content == null) {
|
|
70
|
-
// return null;
|
|
71
|
-
// }
|
|
72
|
-
// const jwk =
|
|
73
|
-
// asJwk(key) || (await this.keyGraphService.getJwkKey(key as string | Key));
|
|
74
|
-
// return JSON.stringify(await this.encryptionService.encrypt(jwk, content));
|
|
75
|
-
// }
|
|
76
|
-
// // Wraps a symmetric encryption key.
|
|
77
|
-
// // Throws exception if wrapping public keys.
|
|
78
|
-
// async wrapKey<T>(
|
|
79
|
-
// wrappingKey: string | Key | JWK.Key,
|
|
80
|
-
// key: JWK.Key
|
|
81
|
-
// ): Promise<string> {
|
|
82
|
-
// if (!isSymmetricKey(key)) {
|
|
83
|
-
// throw new LrBadArgumentException(
|
|
84
|
-
// 'Only allowing wrapping of symmetric keys.'
|
|
85
|
-
// );
|
|
86
|
-
// }
|
|
87
|
-
// return this.encryptToString(wrappingKey, key.toJSON(true));
|
|
88
|
-
// }
|
|
89
|
-
// // TODO
|
|
90
|
-
// // async wrapPublicKey<T>();
|
|
91
|
-
// // async wrapPrivateKey<T>();
|
|
92
|
-
doubleWrapContent(secureContent, categoryIds, fileContent) {
|
|
93
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
94
|
-
const key = yield this.keyFactory.createKey();
|
|
95
|
-
const wrappedContent = yield this.wrapContent(key.toJSON(true), categoryIds);
|
|
96
|
-
return {
|
|
97
|
-
rootKey: wrappedContent.rootKey,
|
|
98
|
-
wrappedKeys: wrappedContent.wrappedKeys,
|
|
99
|
-
doubleWrappedKey: wrappedContent.cipherMeta,
|
|
100
|
-
cipherMeta: secureContent
|
|
101
|
-
? JSON.stringify(yield this.encryptionService.encrypt(key, secureContent))
|
|
102
|
-
: null,
|
|
103
|
-
cipherFileContent: fileContent
|
|
104
|
-
? JSON.stringify(yield this.encryptionService.encrypt(key, fileContent))
|
|
105
|
-
: null,
|
|
106
|
-
};
|
|
107
|
-
});
|
|
108
|
-
}
|
|
109
|
-
reWrapContent(keyId, secureContent) {
|
|
110
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
111
|
-
const key = yield this.keyGraph.getJwkKey(keyId);
|
|
112
|
-
const newKey = yield this.keyFactory.createKey();
|
|
113
|
-
return {
|
|
114
|
-
doubleWrappedKey: JSON.stringify(yield this.encryptionService.encrypt(key, newKey.toJSON(true))),
|
|
115
|
-
cipherMeta: secureContent
|
|
116
|
-
? JSON.stringify(yield this.encryptionService.encrypt(newKey, secureContent))
|
|
117
|
-
: null,
|
|
118
|
-
};
|
|
119
|
-
});
|
|
120
|
-
}
|
|
121
|
-
wrapContent(secureContent, categoryIds) {
|
|
122
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
123
|
-
const key = yield this.keyFactory.createKey();
|
|
124
|
-
let wrappedKeys;
|
|
125
|
-
let rootWrappingKey;
|
|
126
|
-
if (categoryIds && categoryIds.length) {
|
|
127
|
-
wrappedKeys = yield Promise.all(categoryIds.map((categoryId) => __awaiter(this, void 0, void 0, function* () {
|
|
128
|
-
const parentKey = yield this.getCategoryKeyId(categoryId);
|
|
129
|
-
const wrappedKey = JSON.stringify(yield this.encryptionService.encrypt(parentKey.key, key.toJSON(true)));
|
|
130
|
-
return {
|
|
131
|
-
directoryId: categoryId,
|
|
132
|
-
wrappingKeyId: parentKey.keyId,
|
|
133
|
-
wrappedKey,
|
|
134
|
-
};
|
|
135
|
-
})));
|
|
136
|
-
}
|
|
137
|
-
else {
|
|
138
|
-
// Adding to root directory
|
|
139
|
-
const rootKey = this.keyService.getCurrentRootKey();
|
|
140
|
-
const wrappedKey = JSON.stringify(yield this.encryptionService.encrypt(rootKey.jwk, key.toJSON(true)));
|
|
141
|
-
rootWrappingKey = {
|
|
142
|
-
wrappingKeyId: rootKey.id,
|
|
143
|
-
wrappedKey,
|
|
144
|
-
};
|
|
145
|
-
}
|
|
146
|
-
return {
|
|
147
|
-
key,
|
|
148
|
-
rootKey: rootWrappingKey,
|
|
149
|
-
wrappedKeys,
|
|
150
|
-
cipherMeta: secureContent
|
|
151
|
-
? JSON.stringify(yield this.encryptionService.encrypt(key, secureContent))
|
|
152
|
-
: null,
|
|
153
|
-
};
|
|
154
|
-
});
|
|
155
|
-
}
|
|
156
|
-
wrapContentWithKey(secureContent, keyId) {
|
|
157
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
158
|
-
const key = yield this.keyFactory.createKey();
|
|
159
|
-
const wrappedKey = yield this.keyGraph.encryptToString(keyId, key.toJSON(true));
|
|
160
|
-
return {
|
|
161
|
-
key,
|
|
162
|
-
rootKey: {
|
|
163
|
-
wrappingKeyId: keyId,
|
|
164
|
-
wrappedKey,
|
|
165
|
-
},
|
|
166
|
-
cipherMeta: secureContent
|
|
167
|
-
? JSON.stringify(yield this.encryptionService.encrypt(key, secureContent))
|
|
168
|
-
: null,
|
|
169
|
-
};
|
|
170
|
-
});
|
|
171
|
-
}
|
|
172
|
-
getCategoryKeyId(categoryId) {
|
|
173
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
174
|
-
const { category } = yield this.lrApollo.query({
|
|
175
|
-
query: GetCategoryKeyIdQuery,
|
|
176
|
-
variables: {
|
|
177
|
-
id: categoryId,
|
|
178
|
-
},
|
|
179
|
-
});
|
|
180
|
-
return {
|
|
181
|
-
keyId: category.keyId,
|
|
182
|
-
key: yield this.keyGraph.getJwkKey(category.keyId),
|
|
183
|
-
};
|
|
184
|
-
});
|
|
185
|
-
}
|
|
186
|
-
}
|
|
187
|
-
KeyMetaService.ɵprov = i0.ɵɵdefineInjectable({ factory: function KeyMetaService_Factory() { return new KeyMetaService(i0.ɵɵinject(i1.EncryptionService), i0.ɵɵinject(i2.KeyGraphService), i0.ɵɵinject(i3.LrApolloService), i0.ɵɵinject(i4.KeyService), i0.ɵɵinject(i5.KeyFactoryService)); }, token: KeyMetaService, providedIn: "root" });
|
|
188
|
-
KeyMetaService.decorators = [
|
|
189
|
-
{ type: Injectable, args: [{
|
|
190
|
-
providedIn: 'root',
|
|
191
|
-
},] }
|
|
192
|
-
];
|
|
193
|
-
KeyMetaService.ctorParameters = () => [
|
|
194
|
-
{ type: EncryptionService },
|
|
195
|
-
{ type: KeyGraphService },
|
|
196
|
-
{ type: LrApolloService },
|
|
197
|
-
{ type: KeyService },
|
|
198
|
-
{ type: KeyFactoryService }
|
|
199
|
-
];
|
|
200
|
-
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"key-meta.service.js","sourceRoot":"/opt/atlassian/pipelines/agent/build/projects/core/src/","sources":["lib/cryptography/key-meta.service.ts"],"names":[],"mappings":";AAAA,OAAO,EAAE,UAAU,EAAE,MAAM,eAAe,CAAC;AAE3C,OAAO,EAAE,eAAe,EAAE,MAAM,0BAA0B,CAAC;AAC3D,OAAO,EAAE,qBAAqB,EAAE,MAAM,0BAA0B,CAAC;AAGjE,OAAO,EAGL,iBAAiB,GAElB,MAAM,sBAAsB,CAAC;AAC9B,OAAO,EAAE,iBAAiB,EAAE,MAAM,uBAAuB,CAAC;AAC1D,OAAO,EAAE,eAAe,EAAE,MAAM,qBAAqB,CAAC;AACtD,OAAO,EAAE,UAAU,EAAE,MAAM,eAAe,CAAC;;;;;;;AAO3C,MAAM,OAAO,cAAc;CAK1B;AAED,MAAM,OAAO,WAAW;CAIvB;AAKD,MAAM,OAAO,cAAc;IACzB,YACU,iBAAoC,EACpC,QAAyB,EACzB,QAAyB,EACzB,UAAsB,EACtB,UAA6B;QAJ7B,sBAAiB,GAAjB,iBAAiB,CAAmB;QACpC,aAAQ,GAAR,QAAQ,CAAiB;QACzB,aAAQ,GAAR,QAAQ,CAAiB;QACzB,eAAU,GAAV,UAAU,CAAY;QACtB,eAAU,GAAV,UAAU,CAAmB;IACpC,CAAC;IAEJ,8BAA8B;IAC9B,2BAA2B;IAC3B,wBAAwB;IACxB,6BAA6B;IAC7B,kBAAkB;IAClB,sBAAsB;IACtB,iEAAiE;IACjE,oDAAoD;IACpD,aAAa;IACb,gCAAgC;IAChC,gBAAgB;IAChB,iBAAiB;IACjB,MAAM;IACN,iBAAiB;IACjB,IAAI;IAEE,WAAW,CAAI,SAAwB;;YAC3C,IAAI,SAAS,CAAC,UAAU,EAAE;gBACxB,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC,SAAS,CAAC,SAAS,CAAC,KAAK,CAAC,CAAC;gBAC3D,OAAO,CAAC,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAC1C,GAAG,EACH,IAAI,CAAC,KAAK,CAAC,SAAS,CAAC,UAAU,CAAC,CACjC,CAAQ,CAAC;aACX;YACD,OAAO,IAAI,CAAC;QACd,CAAC;KAAA;IAED,8DAA8D;IAC9D,6DAA6D;IAC7D,8DAA8D;IAC9D,kCAAkC;IAClC,gBAAgB;IAChB,IAAI;IAEJ,sEAAsE;IACtE,yBAAyB;IACzB,iCAAiC;IACjC,iBAAiB;IACjB,uBAAuB;IACvB,2EAA2E;IAC3E,mFAAmF;IACnF,sEAAsE;IACtE,iFAAiF;IACjF,2EAA2E;IAC3E,0EAA0E;IAC1E,2EAA2E;IAC3E,2BAA2B;IAC3B,mBAAmB;IACnB,MAAM;IAEN,gBAAgB;IAChB,iFAAiF;IACjF,+EAA+E;IAC/E,IAAI;IAEJ,uCAAuC;IACvC,+CAA+C;IAC/C,oBAAoB;IACpB,yCAAyC;IACzC,iBAAiB;IACjB,uBAAuB;IACvB,gCAAgC;IAChC,wCAAwC;IACxC,oDAAoD;IACpD,SAAS;IACT,MAAM;IAEN,gEAAgE;IAChE,IAAI;IAEJ,UAAU;IACV,+BAA+B;IAC/B,gCAAgC;IAE1B,iBAAiB,CACrB,aAAkB,EAClB,WAAqB,EACrB,WAAyB;;YAEzB,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,SAAS,EAAE,CAAC;YAE9C,MAAM,cAAc,GAAG,MAAM,IAAI,CAAC,WAAW,CAC3C,GAAG,CAAC,MAAM,CAAC,IAAI,CAAC,EAChB,WAAW,CACZ,CAAC;YAEF,OAAO;gBACL,OAAO,EAAE,cAAc,CAAC,OAAO;gBAC/B,WAAW,EAAE,cAAc,CAAC,WAAW;gBACvC,gBAAgB,EAAE,cAAc,CAAC,UAAU;gBAC3C,UAAU,EAAE,aAAa;oBACvB,CAAC,CAAC,IAAI,CAAC,SAAS,CACZ,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAAC,GAAG,EAAE,aAAa,CAAC,CACzD;oBACH,CAAC,CAAC,IAAI;gBACR,iBAAiB,EAAE,WAAW;oBAC5B,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAAC,GAAG,EAAE,WAAW,CAAC,CAAC;oBACxE,CAAC,CAAC,IAAI;aACT,CAAC;QACJ,CAAC;KAAA;IAEK,aAAa,CAAC,KAAa,EAAE,aAAkB;;YACnD,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC,SAAS,CAAC,KAAK,CAAC,CAAC;YACjD,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,SAAS,EAAE,CAAC;YAEjD,OAAO;gBACL,gBAAgB,EAAE,IAAI,CAAC,SAAS,CAC9B,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAAC,GAAG,EAAE,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAC/D;gBACD,UAAU,EAAE,aAAa;oBACvB,CAAC,CAAC,IAAI,CAAC,SAAS,CACZ,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAAC,MAAM,EAAE,aAAa,CAAC,CAC5D;oBACH,CAAC,CAAC,IAAI;aACT,CAAC;QACJ,CAAC;KAAA;IAEK,WAAW,CACf,aAAkB,EAClB,WAAsB;;YAEtB,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,SAAS,EAAE,CAAC;YAE9C,IAAI,WAA0B,CAAC;YAC/B,IAAI,eAA4B,CAAC;YAEjC,IAAI,WAAW,IAAI,WAAW,CAAC,MAAM,EAAE;gBACrC,WAAW,GAAG,MAAM,OAAO,CAAC,GAAG,CAC7B,WAAW,CAAC,GAAG,CAAC,CAAO,UAAU,EAAE,EAAE;oBACnC,MAAM,SAAS,GAAG,MAAM,IAAI,CAAC,gBAAgB,CAAC,UAAU,CAAC,CAAC;oBAC1D,MAAM,UAAU,GAAG,IAAI,CAAC,SAAS,CAC/B,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAClC,SAAS,CAAC,GAAG,EACb,GAAG,CAAC,MAAM,CAAC,IAAI,CAAC,CACjB,CACF,CAAC;oBACF,OAAO;wBACL,WAAW,EAAE,UAAU;wBACvB,aAAa,EAAE,SAAS,CAAC,KAAK;wBAC9B,UAAU;qBACX,CAAC;gBACJ,CAAC,CAAA,CAAC,CACH,CAAC;aACH;iBAAM;gBACL,2BAA2B;gBAC3B,MAAM,OAAO,GAAG,IAAI,CAAC,UAAU,CAAC,iBAAiB,EAAE,CAAC;gBACpD,MAAM,UAAU,GAAG,IAAI,CAAC,SAAS,CAC/B,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAAC,OAAO,CAAC,GAAG,EAAE,GAAG,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CACpE,CAAC;gBACF,eAAe,GAAG;oBAChB,aAAa,EAAE,OAAO,CAAC,EAAE;oBACzB,UAAU;iBACX,CAAC;aACH;YAED,OAAO;gBACL,GAAG;gBACH,OAAO,EAAE,eAAe;gBACxB,WAAW;gBACX,UAAU,EAAE,aAAa;oBACvB,CAAC,CAAC,IAAI,CAAC,SAAS,CACZ,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAAC,GAAG,EAAE,aAAa,CAAC,CACzD;oBACH,CAAC,CAAC,IAAI;aACT,CAAC;QACJ,CAAC;KAAA;IAEK,kBAAkB,CACtB,aAAkB,EAClB,KAAa;;YAEb,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,SAAS,EAAE,CAAC;YAE9C,MAAM,UAAU,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC,eAAe,CACpD,KAAK,EACL,GAAG,CAAC,MAAM,CAAC,IAAI,CAAC,CACjB,CAAC;YAEF,OAAO;gBACL,GAAG;gBACH,OAAO,EAAE;oBACP,aAAa,EAAE,KAAK;oBACpB,UAAU;iBACX;gBACD,UAAU,EAAE,aAAa;oBACvB,CAAC,CAAC,IAAI,CAAC,SAAS,CACZ,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAAC,GAAG,EAAE,aAAa,CAAC,CACzD;oBACH,CAAC,CAAC,IAAI;aACT,CAAC;QACJ,CAAC;KAAA;IAEa,gBAAgB,CAC5B,UAAkB;;YAElB,MAAM,EAAE,QAAQ,EAAE,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC,KAAK,CAAM;gBAClD,KAAK,EAAE,qBAAqB;gBAC5B,SAAS,EAAE;oBACT,EAAE,EAAE,UAAU;iBACf;aACF,CAAC,CAAC;YAEH,OAAO;gBACL,KAAK,EAAE,QAAQ,CAAC,KAAK;gBACrB,GAAG,EAAE,MAAM,IAAI,CAAC,QAAQ,CAAC,SAAS,CAAC,QAAQ,CAAC,KAAK,CAAC;aACnD,CAAC;QACJ,CAAC;KAAA;;;;YA1NF,UAAU,SAAC;gBACV,UAAU,EAAE,MAAM;aACnB;;;YA3BC,iBAAiB;YAIV,eAAe;YAXf,eAAe;YAYf,UAAU;YAFV,iBAAiB","sourcesContent":["import { Injectable } from '@angular/core';\nimport { JWK } from 'node-jose';\nimport { LrApolloService } from '../api/lr-apollo.service';\nimport { GetCategoryKeyIdQuery } from '../category/category.gql';\nimport { LrBadArgumentException } from '../_common/exceptions';\nimport { Key, PayloadType } from './cryptography.types';\nimport {\n  asJwk,\n  DecryptOptions,\n  EncryptionService,\n  isSymmetricKey,\n} from './encryption.service';\nimport { KeyFactoryService } from './key-factory.service';\nimport { KeyGraphService } from './key-graph.service';\nimport { KeyService } from './key.service';\n\nexport interface HasCipherMeta {\n  keyId: string;\n  cipherMeta: string;\n}\n\nexport class WrappedContent {\n  key: JWK.Key;\n  cipherMeta: string;\n  wrappedKeys?: WrappingKey[];\n  rootKey?: WrappingKey;\n}\n\nexport class WrappingKey {\n  directoryId?: string;\n  wrappingKeyId: string;\n  wrappedKey: string;\n}\n\n@Injectable({\n  providedIn: 'root',\n})\nexport class KeyMetaService {\n  constructor(\n    private encryptionService: EncryptionService,\n    private keyGraph: KeyGraphService,\n    private lrApollo: LrApolloService,\n    private keyService: KeyService,\n    private keyFactory: KeyFactoryService\n  ) {}\n\n  // async decryptFromString<T>(\n  //   keyOrId: string | Key,\n  //   cipherData: string,\n  //   options?: DecryptOptions\n  // ): Promise<T> {\n  //   if (cipherData) {\n  //     const key = await this.keyGraphService.getJwkKey(keyOrId);\n  //     return (await this.encryptionService.decrypt(\n  //       key,\n  //       JSON.parse(cipherData),\n  //       options\n  //     )) as any;\n  //   }\n  //   return null;\n  // }\n\n  async decryptMeta<T>(metaHaver: HasCipherMeta): Promise<T> {\n    if (metaHaver.cipherMeta) {\n      const key = await this.keyGraph.getJwkKey(metaHaver.keyId);\n      return (await this.encryptionService.decrypt(\n        key,\n        JSON.parse(metaHaver.cipherMeta)\n      )) as any;\n    }\n    return null;\n  }\n\n  // async decryptFile(keyId: string, file: any): Promise<any> {\n  //   const key = await this.keyGraphService.getJwkKey(keyId);\n  //   return (await this.encryptionService.decrypt(key, file, {\n  //     payloadType: 'ArrayBuffer',\n  //   })) as any;\n  // }\n\n  // // TODO rename this to encrypt() and use as the most common usecase\n  // async encryptToString(\n  //   key: string | Key | JWK.Key,\n  //   content: any\n  // ): Promise<string> {\n  //   // Empty string should be encrypted since you want to clear the field.\n  //   // Null is not encrypted because it's not valid JSON in the old JSON spec. Use\n  //   // empty string instead. It'll function as a logic false as well.\n  //   // Note that passing in empty string means it'll be encrypted which verifies\n  //   // it's integrity. But we still want to have a way to set the DB field\n  //   // to NULL, so we explicitly return null when content == null. A null\n  //   // variable in graphql mutation on KC server clears the field to NULL.\n  //   if (content == null) {\n  //     return null;\n  //   }\n\n  //   const jwk =\n  //     asJwk(key) || (await this.keyGraphService.getJwkKey(key as string | Key));\n  //   return JSON.stringify(await this.encryptionService.encrypt(jwk, content));\n  // }\n\n  // // Wraps a symmetric encryption key.\n  // // Throws exception if wrapping public keys.\n  // async wrapKey<T>(\n  //   wrappingKey: string | Key | JWK.Key,\n  //   key: JWK.Key\n  // ): Promise<string> {\n  //   if (!isSymmetricKey(key)) {\n  //     throw new LrBadArgumentException(\n  //       'Only allowing wrapping of symmetric keys.'\n  //     );\n  //   }\n\n  //   return this.encryptToString(wrappingKey, key.toJSON(true));\n  // }\n\n  // // TODO\n  // // async wrapPublicKey<T>();\n  // // async wrapPrivateKey<T>();\n\n  async doubleWrapContent(\n    secureContent: any,\n    categoryIds: string[],\n    fileContent?: ArrayBuffer\n  ) {\n    const key = await this.keyFactory.createKey();\n\n    const wrappedContent = await this.wrapContent(\n      key.toJSON(true),\n      categoryIds\n    );\n\n    return {\n      rootKey: wrappedContent.rootKey,\n      wrappedKeys: wrappedContent.wrappedKeys,\n      doubleWrappedKey: wrappedContent.cipherMeta,\n      cipherMeta: secureContent\n        ? JSON.stringify(\n            await this.encryptionService.encrypt(key, secureContent)\n          )\n        : null,\n      cipherFileContent: fileContent\n        ? JSON.stringify(await this.encryptionService.encrypt(key, fileContent))\n        : null,\n    };\n  }\n\n  async reWrapContent(keyId: string, secureContent: any) {\n    const key = await this.keyGraph.getJwkKey(keyId);\n    const newKey = await this.keyFactory.createKey();\n\n    return {\n      doubleWrappedKey: JSON.stringify(\n        await this.encryptionService.encrypt(key, newKey.toJSON(true))\n      ),\n      cipherMeta: secureContent\n        ? JSON.stringify(\n            await this.encryptionService.encrypt(newKey, secureContent)\n          )\n        : null,\n    };\n  }\n\n  async wrapContent(\n    secureContent: any,\n    categoryIds?: string[]\n  ): Promise<WrappedContent> {\n    const key = await this.keyFactory.createKey();\n\n    let wrappedKeys: WrappingKey[];\n    let rootWrappingKey: WrappingKey;\n\n    if (categoryIds && categoryIds.length) {\n      wrappedKeys = await Promise.all(\n        categoryIds.map(async (categoryId) => {\n          const parentKey = await this.getCategoryKeyId(categoryId);\n          const wrappedKey = JSON.stringify(\n            await this.encryptionService.encrypt(\n              parentKey.key,\n              key.toJSON(true)\n            )\n          );\n          return {\n            directoryId: categoryId,\n            wrappingKeyId: parentKey.keyId,\n            wrappedKey,\n          };\n        })\n      );\n    } else {\n      // Adding to root directory\n      const rootKey = this.keyService.getCurrentRootKey();\n      const wrappedKey = JSON.stringify(\n        await this.encryptionService.encrypt(rootKey.jwk, key.toJSON(true))\n      );\n      rootWrappingKey = {\n        wrappingKeyId: rootKey.id,\n        wrappedKey,\n      };\n    }\n\n    return {\n      key,\n      rootKey: rootWrappingKey,\n      wrappedKeys,\n      cipherMeta: secureContent\n        ? JSON.stringify(\n            await this.encryptionService.encrypt(key, secureContent)\n          )\n        : null,\n    };\n  }\n\n  async wrapContentWithKey(\n    secureContent: any,\n    keyId: string\n  ): Promise<WrappedContent> {\n    const key = await this.keyFactory.createKey();\n\n    const wrappedKey = await this.keyGraph.encryptToString(\n      keyId,\n      key.toJSON(true)\n    );\n\n    return {\n      key,\n      rootKey: {\n        wrappingKeyId: keyId,\n        wrappedKey,\n      },\n      cipherMeta: secureContent\n        ? JSON.stringify(\n            await this.encryptionService.encrypt(key, secureContent)\n          )\n        : null,\n    };\n  }\n\n  private async getCategoryKeyId(\n    categoryId: string\n  ): Promise<{ keyId: string; key: any }> {\n    const { category } = await this.lrApollo.query<any>({\n      query: GetCategoryKeyIdQuery,\n      variables: {\n        id: categoryId,\n      },\n    });\n\n    return {\n      keyId: category.keyId,\n      key: await this.keyGraph.getJwkKey(category.keyId),\n    };\n  }\n}\n"]}
|
|
1
|
+
import { __awaiter } from "tslib";
|
|
2
|
+
import { Injectable } from '@angular/core';
|
|
3
|
+
import { LrApolloService } from '../api/lr-apollo.service';
|
|
4
|
+
import { GetCategoryKeyIdQuery } from '../category/category.gql';
|
|
5
|
+
import { EncryptionService, } from './encryption.service';
|
|
6
|
+
import { KeyFactoryService } from './key-factory.service';
|
|
7
|
+
import { KeyGraphService } from './key-graph.service';
|
|
8
|
+
import { KeyService } from './key.service';
|
|
9
|
+
import * as i0 from "@angular/core";
|
|
10
|
+
import * as i1 from "./encryption.service";
|
|
11
|
+
import * as i2 from "./key-graph.service";
|
|
12
|
+
import * as i3 from "../api/lr-apollo.service";
|
|
13
|
+
import * as i4 from "./key.service";
|
|
14
|
+
import * as i5 from "./key-factory.service";
|
|
15
|
+
export class WrappedContent {
|
|
16
|
+
}
|
|
17
|
+
export class WrappingKey {
|
|
18
|
+
}
|
|
19
|
+
export class KeyMetaService {
|
|
20
|
+
constructor(encryptionService, keyGraph, lrApollo, keyService, keyFactory) {
|
|
21
|
+
this.encryptionService = encryptionService;
|
|
22
|
+
this.keyGraph = keyGraph;
|
|
23
|
+
this.lrApollo = lrApollo;
|
|
24
|
+
this.keyService = keyService;
|
|
25
|
+
this.keyFactory = keyFactory;
|
|
26
|
+
}
|
|
27
|
+
// async decryptFromString<T>(
|
|
28
|
+
// keyOrId: string | Key,
|
|
29
|
+
// cipherData: string,
|
|
30
|
+
// options?: DecryptOptions
|
|
31
|
+
// ): Promise<T> {
|
|
32
|
+
// if (cipherData) {
|
|
33
|
+
// const key = await this.keyGraphService.getJwkKey(keyOrId);
|
|
34
|
+
// return (await this.encryptionService.decrypt(
|
|
35
|
+
// key,
|
|
36
|
+
// JSON.parse(cipherData),
|
|
37
|
+
// options
|
|
38
|
+
// )) as any;
|
|
39
|
+
// }
|
|
40
|
+
// return null;
|
|
41
|
+
// }
|
|
42
|
+
decryptMeta(metaHaver) {
|
|
43
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
44
|
+
if (metaHaver.cipherMeta) {
|
|
45
|
+
const key = yield this.keyGraph.getJwkKey(metaHaver.keyId);
|
|
46
|
+
return (yield this.encryptionService.decrypt(key, JSON.parse(metaHaver.cipherMeta)));
|
|
47
|
+
}
|
|
48
|
+
return null;
|
|
49
|
+
});
|
|
50
|
+
}
|
|
51
|
+
// async decryptFile(keyId: string, file: any): Promise<any> {
|
|
52
|
+
// const key = await this.keyGraphService.getJwkKey(keyId);
|
|
53
|
+
// return (await this.encryptionService.decrypt(key, file, {
|
|
54
|
+
// payloadType: 'ArrayBuffer',
|
|
55
|
+
// })) as any;
|
|
56
|
+
// }
|
|
57
|
+
// // TODO rename this to encrypt() and use as the most common usecase
|
|
58
|
+
// async encryptToString(
|
|
59
|
+
// key: string | Key | JWK.Key,
|
|
60
|
+
// content: any
|
|
61
|
+
// ): Promise<string> {
|
|
62
|
+
// // Empty string should be encrypted since you want to clear the field.
|
|
63
|
+
// // Null is not encrypted because it's not valid JSON in the old JSON spec. Use
|
|
64
|
+
// // empty string instead. It'll function as a logic false as well.
|
|
65
|
+
// // Note that passing in empty string means it'll be encrypted which verifies
|
|
66
|
+
// // it's integrity. But we still want to have a way to set the DB field
|
|
67
|
+
// // to NULL, so we explicitly return null when content == null. A null
|
|
68
|
+
// // variable in graphql mutation on KC server clears the field to NULL.
|
|
69
|
+
// if (content == null) {
|
|
70
|
+
// return null;
|
|
71
|
+
// }
|
|
72
|
+
// const jwk =
|
|
73
|
+
// asJwk(key) || (await this.keyGraphService.getJwkKey(key as string | Key));
|
|
74
|
+
// return JSON.stringify(await this.encryptionService.encrypt(jwk, content));
|
|
75
|
+
// }
|
|
76
|
+
// // Wraps a symmetric encryption key.
|
|
77
|
+
// // Throws exception if wrapping public keys.
|
|
78
|
+
// async wrapKey<T>(
|
|
79
|
+
// wrappingKey: string | Key | JWK.Key,
|
|
80
|
+
// key: JWK.Key
|
|
81
|
+
// ): Promise<string> {
|
|
82
|
+
// if (!isSymmetricKey(key)) {
|
|
83
|
+
// throw new LrBadArgumentException(
|
|
84
|
+
// 'Only allowing wrapping of symmetric keys.'
|
|
85
|
+
// );
|
|
86
|
+
// }
|
|
87
|
+
// return this.encryptToString(wrappingKey, key.toJSON(true));
|
|
88
|
+
// }
|
|
89
|
+
// // TODO
|
|
90
|
+
// // async wrapPublicKey<T>();
|
|
91
|
+
// // async wrapPrivateKey<T>();
|
|
92
|
+
doubleWrapContent(secureContent, categoryIds, fileContent) {
|
|
93
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
94
|
+
const key = yield this.keyFactory.createKey();
|
|
95
|
+
const wrappedContent = yield this.wrapContent(key.toJSON(true), categoryIds);
|
|
96
|
+
return {
|
|
97
|
+
rootKey: wrappedContent.rootKey,
|
|
98
|
+
wrappedKeys: wrappedContent.wrappedKeys,
|
|
99
|
+
doubleWrappedKey: wrappedContent.cipherMeta,
|
|
100
|
+
cipherMeta: secureContent
|
|
101
|
+
? JSON.stringify(yield this.encryptionService.encrypt(key, secureContent))
|
|
102
|
+
: null,
|
|
103
|
+
cipherFileContent: fileContent
|
|
104
|
+
? JSON.stringify(yield this.encryptionService.encrypt(key, fileContent))
|
|
105
|
+
: null,
|
|
106
|
+
};
|
|
107
|
+
});
|
|
108
|
+
}
|
|
109
|
+
reWrapContent(keyId, secureContent) {
|
|
110
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
111
|
+
const key = yield this.keyGraph.getJwkKey(keyId);
|
|
112
|
+
const newKey = yield this.keyFactory.createKey();
|
|
113
|
+
return {
|
|
114
|
+
doubleWrappedKey: JSON.stringify(yield this.encryptionService.encrypt(key, newKey.toJSON(true))),
|
|
115
|
+
cipherMeta: secureContent
|
|
116
|
+
? JSON.stringify(yield this.encryptionService.encrypt(newKey, secureContent))
|
|
117
|
+
: null,
|
|
118
|
+
};
|
|
119
|
+
});
|
|
120
|
+
}
|
|
121
|
+
wrapContent(secureContent, categoryIds) {
|
|
122
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
123
|
+
const key = yield this.keyFactory.createKey();
|
|
124
|
+
let wrappedKeys;
|
|
125
|
+
let rootWrappingKey;
|
|
126
|
+
if (categoryIds && categoryIds.length) {
|
|
127
|
+
wrappedKeys = yield Promise.all(categoryIds.map((categoryId) => __awaiter(this, void 0, void 0, function* () {
|
|
128
|
+
const parentKey = yield this.getCategoryKeyId(categoryId);
|
|
129
|
+
const wrappedKey = JSON.stringify(yield this.encryptionService.encrypt(parentKey.key, key.toJSON(true)));
|
|
130
|
+
return {
|
|
131
|
+
directoryId: categoryId,
|
|
132
|
+
wrappingKeyId: parentKey.keyId,
|
|
133
|
+
wrappedKey,
|
|
134
|
+
};
|
|
135
|
+
})));
|
|
136
|
+
}
|
|
137
|
+
else {
|
|
138
|
+
// Adding to root directory
|
|
139
|
+
const rootKey = this.keyService.getCurrentRootKey();
|
|
140
|
+
const wrappedKey = JSON.stringify(yield this.encryptionService.encrypt(rootKey.jwk, key.toJSON(true)));
|
|
141
|
+
rootWrappingKey = {
|
|
142
|
+
wrappingKeyId: rootKey.id,
|
|
143
|
+
wrappedKey,
|
|
144
|
+
};
|
|
145
|
+
}
|
|
146
|
+
return {
|
|
147
|
+
key,
|
|
148
|
+
rootKey: rootWrappingKey,
|
|
149
|
+
wrappedKeys,
|
|
150
|
+
cipherMeta: secureContent
|
|
151
|
+
? JSON.stringify(yield this.encryptionService.encrypt(key, secureContent))
|
|
152
|
+
: null,
|
|
153
|
+
};
|
|
154
|
+
});
|
|
155
|
+
}
|
|
156
|
+
wrapContentWithKey(secureContent, keyId) {
|
|
157
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
158
|
+
const key = yield this.keyFactory.createKey();
|
|
159
|
+
const wrappedKey = yield this.keyGraph.encryptToString(keyId, key.toJSON(true));
|
|
160
|
+
return {
|
|
161
|
+
key,
|
|
162
|
+
rootKey: {
|
|
163
|
+
wrappingKeyId: keyId,
|
|
164
|
+
wrappedKey,
|
|
165
|
+
},
|
|
166
|
+
cipherMeta: secureContent
|
|
167
|
+
? JSON.stringify(yield this.encryptionService.encrypt(key, secureContent))
|
|
168
|
+
: null,
|
|
169
|
+
};
|
|
170
|
+
});
|
|
171
|
+
}
|
|
172
|
+
getCategoryKeyId(categoryId) {
|
|
173
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
174
|
+
const { category } = yield this.lrApollo.query({
|
|
175
|
+
query: GetCategoryKeyIdQuery,
|
|
176
|
+
variables: {
|
|
177
|
+
id: categoryId,
|
|
178
|
+
},
|
|
179
|
+
});
|
|
180
|
+
return {
|
|
181
|
+
keyId: category.keyId,
|
|
182
|
+
key: yield this.keyGraph.getJwkKey(category.keyId),
|
|
183
|
+
};
|
|
184
|
+
});
|
|
185
|
+
}
|
|
186
|
+
}
|
|
187
|
+
KeyMetaService.ɵprov = i0.ɵɵdefineInjectable({ factory: function KeyMetaService_Factory() { return new KeyMetaService(i0.ɵɵinject(i1.EncryptionService), i0.ɵɵinject(i2.KeyGraphService), i0.ɵɵinject(i3.LrApolloService), i0.ɵɵinject(i4.KeyService), i0.ɵɵinject(i5.KeyFactoryService)); }, token: KeyMetaService, providedIn: "root" });
|
|
188
|
+
KeyMetaService.decorators = [
|
|
189
|
+
{ type: Injectable, args: [{
|
|
190
|
+
providedIn: 'root',
|
|
191
|
+
},] }
|
|
192
|
+
];
|
|
193
|
+
KeyMetaService.ctorParameters = () => [
|
|
194
|
+
{ type: EncryptionService },
|
|
195
|
+
{ type: KeyGraphService },
|
|
196
|
+
{ type: LrApolloService },
|
|
197
|
+
{ type: KeyService },
|
|
198
|
+
{ type: KeyFactoryService }
|
|
199
|
+
];
|
|
200
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"key-meta.service.js","sourceRoot":"C:/Projects/newrepo/kc-client/projects/core/src/","sources":["lib/cryptography/key-meta.service.ts"],"names":[],"mappings":";AAAA,OAAO,EAAE,UAAU,EAAE,MAAM,eAAe,CAAC;AAE3C,OAAO,EAAE,eAAe,EAAE,MAAM,0BAA0B,CAAC;AAC3D,OAAO,EAAE,qBAAqB,EAAE,MAAM,0BAA0B,CAAC;AAGjE,OAAO,EAGL,iBAAiB,GAElB,MAAM,sBAAsB,CAAC;AAC9B,OAAO,EAAE,iBAAiB,EAAE,MAAM,uBAAuB,CAAC;AAC1D,OAAO,EAAE,eAAe,EAAE,MAAM,qBAAqB,CAAC;AACtD,OAAO,EAAE,UAAU,EAAE,MAAM,eAAe,CAAC;;;;;;;AAO3C,MAAM,OAAO,cAAc;CAK1B;AAED,MAAM,OAAO,WAAW;CAIvB;AAKD,MAAM,OAAO,cAAc;IACzB,YACU,iBAAoC,EACpC,QAAyB,EACzB,QAAyB,EACzB,UAAsB,EACtB,UAA6B;QAJ7B,sBAAiB,GAAjB,iBAAiB,CAAmB;QACpC,aAAQ,GAAR,QAAQ,CAAiB;QACzB,aAAQ,GAAR,QAAQ,CAAiB;QACzB,eAAU,GAAV,UAAU,CAAY;QACtB,eAAU,GAAV,UAAU,CAAmB;IACpC,CAAC;IAEJ,8BAA8B;IAC9B,2BAA2B;IAC3B,wBAAwB;IACxB,6BAA6B;IAC7B,kBAAkB;IAClB,sBAAsB;IACtB,iEAAiE;IACjE,oDAAoD;IACpD,aAAa;IACb,gCAAgC;IAChC,gBAAgB;IAChB,iBAAiB;IACjB,MAAM;IACN,iBAAiB;IACjB,IAAI;IAEE,WAAW,CAAI,SAAwB;;YAC3C,IAAI,SAAS,CAAC,UAAU,EAAE;gBACxB,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC,SAAS,CAAC,SAAS,CAAC,KAAK,CAAC,CAAC;gBAC3D,OAAO,CAAC,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAC1C,GAAG,EACH,IAAI,CAAC,KAAK,CAAC,SAAS,CAAC,UAAU,CAAC,CACjC,CAAQ,CAAC;aACX;YACD,OAAO,IAAI,CAAC;QACd,CAAC;KAAA;IAED,8DAA8D;IAC9D,6DAA6D;IAC7D,8DAA8D;IAC9D,kCAAkC;IAClC,gBAAgB;IAChB,IAAI;IAEJ,sEAAsE;IACtE,yBAAyB;IACzB,iCAAiC;IACjC,iBAAiB;IACjB,uBAAuB;IACvB,2EAA2E;IAC3E,mFAAmF;IACnF,sEAAsE;IACtE,iFAAiF;IACjF,2EAA2E;IAC3E,0EAA0E;IAC1E,2EAA2E;IAC3E,2BAA2B;IAC3B,mBAAmB;IACnB,MAAM;IAEN,gBAAgB;IAChB,iFAAiF;IACjF,+EAA+E;IAC/E,IAAI;IAEJ,uCAAuC;IACvC,+CAA+C;IAC/C,oBAAoB;IACpB,yCAAyC;IACzC,iBAAiB;IACjB,uBAAuB;IACvB,gCAAgC;IAChC,wCAAwC;IACxC,oDAAoD;IACpD,SAAS;IACT,MAAM;IAEN,gEAAgE;IAChE,IAAI;IAEJ,UAAU;IACV,+BAA+B;IAC/B,gCAAgC;IAE1B,iBAAiB,CACrB,aAAkB,EAClB,WAAqB,EACrB,WAAyB;;YAEzB,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,SAAS,EAAE,CAAC;YAE9C,MAAM,cAAc,GAAG,MAAM,IAAI,CAAC,WAAW,CAC3C,GAAG,CAAC,MAAM,CAAC,IAAI,CAAC,EAChB,WAAW,CACZ,CAAC;YAEF,OAAO;gBACL,OAAO,EAAE,cAAc,CAAC,OAAO;gBAC/B,WAAW,EAAE,cAAc,CAAC,WAAW;gBACvC,gBAAgB,EAAE,cAAc,CAAC,UAAU;gBAC3C,UAAU,EAAE,aAAa;oBACvB,CAAC,CAAC,IAAI,CAAC,SAAS,CACZ,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAAC,GAAG,EAAE,aAAa,CAAC,CACzD;oBACH,CAAC,CAAC,IAAI;gBACR,iBAAiB,EAAE,WAAW;oBAC5B,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAAC,GAAG,EAAE,WAAW,CAAC,CAAC;oBACxE,CAAC,CAAC,IAAI;aACT,CAAC;QACJ,CAAC;KAAA;IAEK,aAAa,CAAC,KAAa,EAAE,aAAkB;;YACnD,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC,SAAS,CAAC,KAAK,CAAC,CAAC;YACjD,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,SAAS,EAAE,CAAC;YAEjD,OAAO;gBACL,gBAAgB,EAAE,IAAI,CAAC,SAAS,CAC9B,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAAC,GAAG,EAAE,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAC/D;gBACD,UAAU,EAAE,aAAa;oBACvB,CAAC,CAAC,IAAI,CAAC,SAAS,CACZ,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAAC,MAAM,EAAE,aAAa,CAAC,CAC5D;oBACH,CAAC,CAAC,IAAI;aACT,CAAC;QACJ,CAAC;KAAA;IAEK,WAAW,CACf,aAAkB,EAClB,WAAsB;;YAEtB,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,SAAS,EAAE,CAAC;YAE9C,IAAI,WAA0B,CAAC;YAC/B,IAAI,eAA4B,CAAC;YAEjC,IAAI,WAAW,IAAI,WAAW,CAAC,MAAM,EAAE;gBACrC,WAAW,GAAG,MAAM,OAAO,CAAC,GAAG,CAC7B,WAAW,CAAC,GAAG,CAAC,CAAO,UAAU,EAAE,EAAE;oBACnC,MAAM,SAAS,GAAG,MAAM,IAAI,CAAC,gBAAgB,CAAC,UAAU,CAAC,CAAC;oBAC1D,MAAM,UAAU,GAAG,IAAI,CAAC,SAAS,CAC/B,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAClC,SAAS,CAAC,GAAG,EACb,GAAG,CAAC,MAAM,CAAC,IAAI,CAAC,CACjB,CACF,CAAC;oBACF,OAAO;wBACL,WAAW,EAAE,UAAU;wBACvB,aAAa,EAAE,SAAS,CAAC,KAAK;wBAC9B,UAAU;qBACX,CAAC;gBACJ,CAAC,CAAA,CAAC,CACH,CAAC;aACH;iBAAM;gBACL,2BAA2B;gBAC3B,MAAM,OAAO,GAAG,IAAI,CAAC,UAAU,CAAC,iBAAiB,EAAE,CAAC;gBACpD,MAAM,UAAU,GAAG,IAAI,CAAC,SAAS,CAC/B,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAAC,OAAO,CAAC,GAAG,EAAE,GAAG,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CACpE,CAAC;gBACF,eAAe,GAAG;oBAChB,aAAa,EAAE,OAAO,CAAC,EAAE;oBACzB,UAAU;iBACX,CAAC;aACH;YAED,OAAO;gBACL,GAAG;gBACH,OAAO,EAAE,eAAe;gBACxB,WAAW;gBACX,UAAU,EAAE,aAAa;oBACvB,CAAC,CAAC,IAAI,CAAC,SAAS,CACZ,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAAC,GAAG,EAAE,aAAa,CAAC,CACzD;oBACH,CAAC,CAAC,IAAI;aACT,CAAC;QACJ,CAAC;KAAA;IAEK,kBAAkB,CACtB,aAAkB,EAClB,KAAa;;YAEb,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,SAAS,EAAE,CAAC;YAE9C,MAAM,UAAU,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC,eAAe,CACpD,KAAK,EACL,GAAG,CAAC,MAAM,CAAC,IAAI,CAAC,CACjB,CAAC;YAEF,OAAO;gBACL,GAAG;gBACH,OAAO,EAAE;oBACP,aAAa,EAAE,KAAK;oBACpB,UAAU;iBACX;gBACD,UAAU,EAAE,aAAa;oBACvB,CAAC,CAAC,IAAI,CAAC,SAAS,CACZ,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAAC,GAAG,EAAE,aAAa,CAAC,CACzD;oBACH,CAAC,CAAC,IAAI;aACT,CAAC;QACJ,CAAC;KAAA;IAEa,gBAAgB,CAC5B,UAAkB;;YAElB,MAAM,EAAE,QAAQ,EAAE,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC,KAAK,CAAM;gBAClD,KAAK,EAAE,qBAAqB;gBAC5B,SAAS,EAAE;oBACT,EAAE,EAAE,UAAU;iBACf;aACF,CAAC,CAAC;YAEH,OAAO;gBACL,KAAK,EAAE,QAAQ,CAAC,KAAK;gBACrB,GAAG,EAAE,MAAM,IAAI,CAAC,QAAQ,CAAC,SAAS,CAAC,QAAQ,CAAC,KAAK,CAAC;aACnD,CAAC;QACJ,CAAC;KAAA;;;;YA1NF,UAAU,SAAC;gBACV,UAAU,EAAE,MAAM;aACnB;;;YA3BC,iBAAiB;YAIV,eAAe;YAXf,eAAe;YAYf,UAAU;YAFV,iBAAiB","sourcesContent":["import { Injectable } from '@angular/core';\r\nimport { JWK } from 'node-jose';\r\nimport { LrApolloService } from '../api/lr-apollo.service';\r\nimport { GetCategoryKeyIdQuery } from '../category/category.gql';\r\nimport { LrBadArgumentException } from '../_common/exceptions';\r\nimport { Key, PayloadType } from './cryptography.types';\r\nimport {\r\n  asJwk,\r\n  DecryptOptions,\r\n  EncryptionService,\r\n  isSymmetricKey,\r\n} from './encryption.service';\r\nimport { KeyFactoryService } from './key-factory.service';\r\nimport { KeyGraphService } from './key-graph.service';\r\nimport { KeyService } from './key.service';\r\n\r\nexport interface HasCipherMeta {\r\n  keyId: string;\r\n  cipherMeta: string;\r\n}\r\n\r\nexport class WrappedContent {\r\n  key: JWK.Key;\r\n  cipherMeta: string;\r\n  wrappedKeys?: WrappingKey[];\r\n  rootKey?: WrappingKey;\r\n}\r\n\r\nexport class WrappingKey {\r\n  directoryId?: string;\r\n  wrappingKeyId: string;\r\n  wrappedKey: string;\r\n}\r\n\r\n@Injectable({\r\n  providedIn: 'root',\r\n})\r\nexport class KeyMetaService {\r\n  constructor(\r\n    private encryptionService: EncryptionService,\r\n    private keyGraph: KeyGraphService,\r\n    private lrApollo: LrApolloService,\r\n    private keyService: KeyService,\r\n    private keyFactory: KeyFactoryService\r\n  ) {}\r\n\r\n  // async decryptFromString<T>(\r\n  //   keyOrId: string | Key,\r\n  //   cipherData: string,\r\n  //   options?: DecryptOptions\r\n  // ): Promise<T> {\r\n  //   if (cipherData) {\r\n  //     const key = await this.keyGraphService.getJwkKey(keyOrId);\r\n  //     return (await this.encryptionService.decrypt(\r\n  //       key,\r\n  //       JSON.parse(cipherData),\r\n  //       options\r\n  //     )) as any;\r\n  //   }\r\n  //   return null;\r\n  // }\r\n\r\n  async decryptMeta<T>(metaHaver: HasCipherMeta): Promise<T> {\r\n    if (metaHaver.cipherMeta) {\r\n      const key = await this.keyGraph.getJwkKey(metaHaver.keyId);\r\n      return (await this.encryptionService.decrypt(\r\n        key,\r\n        JSON.parse(metaHaver.cipherMeta)\r\n      )) as any;\r\n    }\r\n    return null;\r\n  }\r\n\r\n  // async decryptFile(keyId: string, file: any): Promise<any> {\r\n  //   const key = await this.keyGraphService.getJwkKey(keyId);\r\n  //   return (await this.encryptionService.decrypt(key, file, {\r\n  //     payloadType: 'ArrayBuffer',\r\n  //   })) as any;\r\n  // }\r\n\r\n  // // TODO rename this to encrypt() and use as the most common usecase\r\n  // async encryptToString(\r\n  //   key: string | Key | JWK.Key,\r\n  //   content: any\r\n  // ): Promise<string> {\r\n  //   // Empty string should be encrypted since you want to clear the field.\r\n  //   // Null is not encrypted because it's not valid JSON in the old JSON spec. Use\r\n  //   // empty string instead. It'll function as a logic false as well.\r\n  //   // Note that passing in empty string means it'll be encrypted which verifies\r\n  //   // it's integrity. But we still want to have a way to set the DB field\r\n  //   // to NULL, so we explicitly return null when content == null. A null\r\n  //   // variable in graphql mutation on KC server clears the field to NULL.\r\n  //   if (content == null) {\r\n  //     return null;\r\n  //   }\r\n\r\n  //   const jwk =\r\n  //     asJwk(key) || (await this.keyGraphService.getJwkKey(key as string | Key));\r\n  //   return JSON.stringify(await this.encryptionService.encrypt(jwk, content));\r\n  // }\r\n\r\n  // // Wraps a symmetric encryption key.\r\n  // // Throws exception if wrapping public keys.\r\n  // async wrapKey<T>(\r\n  //   wrappingKey: string | Key | JWK.Key,\r\n  //   key: JWK.Key\r\n  // ): Promise<string> {\r\n  //   if (!isSymmetricKey(key)) {\r\n  //     throw new LrBadArgumentException(\r\n  //       'Only allowing wrapping of symmetric keys.'\r\n  //     );\r\n  //   }\r\n\r\n  //   return this.encryptToString(wrappingKey, key.toJSON(true));\r\n  // }\r\n\r\n  // // TODO\r\n  // // async wrapPublicKey<T>();\r\n  // // async wrapPrivateKey<T>();\r\n\r\n  async doubleWrapContent(\r\n    secureContent: any,\r\n    categoryIds: string[],\r\n    fileContent?: ArrayBuffer\r\n  ) {\r\n    const key = await this.keyFactory.createKey();\r\n\r\n    const wrappedContent = await this.wrapContent(\r\n      key.toJSON(true),\r\n      categoryIds\r\n    );\r\n\r\n    return {\r\n      rootKey: wrappedContent.rootKey,\r\n      wrappedKeys: wrappedContent.wrappedKeys,\r\n      doubleWrappedKey: wrappedContent.cipherMeta,\r\n      cipherMeta: secureContent\r\n        ? JSON.stringify(\r\n            await this.encryptionService.encrypt(key, secureContent)\r\n          )\r\n        : null,\r\n      cipherFileContent: fileContent\r\n        ? JSON.stringify(await this.encryptionService.encrypt(key, fileContent))\r\n        : null,\r\n    };\r\n  }\r\n\r\n  async reWrapContent(keyId: string, secureContent: any) {\r\n    const key = await this.keyGraph.getJwkKey(keyId);\r\n    const newKey = await this.keyFactory.createKey();\r\n\r\n    return {\r\n      doubleWrappedKey: JSON.stringify(\r\n        await this.encryptionService.encrypt(key, newKey.toJSON(true))\r\n      ),\r\n      cipherMeta: secureContent\r\n        ? JSON.stringify(\r\n            await this.encryptionService.encrypt(newKey, secureContent)\r\n          )\r\n        : null,\r\n    };\r\n  }\r\n\r\n  async wrapContent(\r\n    secureContent: any,\r\n    categoryIds?: string[]\r\n  ): Promise<WrappedContent> {\r\n    const key = await this.keyFactory.createKey();\r\n\r\n    let wrappedKeys: WrappingKey[];\r\n    let rootWrappingKey: WrappingKey;\r\n\r\n    if (categoryIds && categoryIds.length) {\r\n      wrappedKeys = await Promise.all(\r\n        categoryIds.map(async (categoryId) => {\r\n          const parentKey = await this.getCategoryKeyId(categoryId);\r\n          const wrappedKey = JSON.stringify(\r\n            await this.encryptionService.encrypt(\r\n              parentKey.key,\r\n              key.toJSON(true)\r\n            )\r\n          );\r\n          return {\r\n            directoryId: categoryId,\r\n            wrappingKeyId: parentKey.keyId,\r\n            wrappedKey,\r\n          };\r\n        })\r\n      );\r\n    } else {\r\n      // Adding to root directory\r\n      const rootKey = this.keyService.getCurrentRootKey();\r\n      const wrappedKey = JSON.stringify(\r\n        await this.encryptionService.encrypt(rootKey.jwk, key.toJSON(true))\r\n      );\r\n      rootWrappingKey = {\r\n        wrappingKeyId: rootKey.id,\r\n        wrappedKey,\r\n      };\r\n    }\r\n\r\n    return {\r\n      key,\r\n      rootKey: rootWrappingKey,\r\n      wrappedKeys,\r\n      cipherMeta: secureContent\r\n        ? JSON.stringify(\r\n            await this.encryptionService.encrypt(key, secureContent)\r\n          )\r\n        : null,\r\n    };\r\n  }\r\n\r\n  async wrapContentWithKey(\r\n    secureContent: any,\r\n    keyId: string\r\n  ): Promise<WrappedContent> {\r\n    const key = await this.keyFactory.createKey();\r\n\r\n    const wrappedKey = await this.keyGraph.encryptToString(\r\n      keyId,\r\n      key.toJSON(true)\r\n    );\r\n\r\n    return {\r\n      key,\r\n      rootKey: {\r\n        wrappingKeyId: keyId,\r\n        wrappedKey,\r\n      },\r\n      cipherMeta: secureContent\r\n        ? JSON.stringify(\r\n            await this.encryptionService.encrypt(key, secureContent)\r\n          )\r\n        : null,\r\n    };\r\n  }\r\n\r\n  private async getCategoryKeyId(\r\n    categoryId: string\r\n  ): Promise<{ keyId: string; key: any }> {\r\n    const { category } = await this.lrApollo.query<any>({\r\n      query: GetCategoryKeyIdQuery,\r\n      variables: {\r\n        id: categoryId,\r\n      },\r\n    });\r\n\r\n    return {\r\n      keyId: category.keyId,\r\n      key: await this.keyGraph.getJwkKey(category.keyId),\r\n    };\r\n  }\r\n}\r\n"]}
|