@lifeready/core 1.0.21 → 1.0.22

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (228) hide show
  1. package/bundles/lifeready-core.umd.js +9745 -9700
  2. package/bundles/lifeready-core.umd.js.map +1 -1
  3. package/bundles/lifeready-core.umd.min.js +2 -2
  4. package/bundles/lifeready-core.umd.min.js.map +1 -1
  5. package/esm2015/lib/_common/run-outside-angular.js +2 -2
  6. package/esm2015/lib/_common/types.js +1 -1
  7. package/esm2015/lib/api/lr-apollo.service.js +3 -3
  8. package/esm2015/lib/api/lr-graphql/lr-graphql.service.js +3 -3
  9. package/esm2015/lib/api/query-processor/common-processors.service.js +3 -3
  10. package/esm2015/lib/api/query-processor/query-processor.service.js +4 -4
  11. package/esm2015/lib/api/query-processor/tp-password-reset-processor.service.js +6 -5
  12. package/esm2015/lib/api/types/lr-graphql.types.js +1 -1
  13. package/esm2015/lib/auth/auth.gql.js +1 -28
  14. package/esm2015/lib/auth/auth.types.js +1 -1
  15. package/esm2015/lib/auth/life-ready-auth.service.js +32 -31
  16. package/esm2015/lib/category/category.gql.js +1 -1
  17. package/esm2015/lib/category/category.service.js +6 -6
  18. package/esm2015/lib/contact-card/contact-card.gql.js +79 -0
  19. package/esm2015/lib/contact-card/contact-card.service.js +154 -0
  20. package/esm2015/lib/contact-card/contact-card2.gql.js +29 -0
  21. package/esm2015/lib/contact-card/contact-card2.service.js +103 -0
  22. package/esm2015/lib/encryption/encryption.service.js +189 -0
  23. package/esm2015/lib/file-upload/file-upload.service.js +74 -0
  24. package/esm2015/lib/file-upload/file-upload.types.js +1 -0
  25. package/esm2015/lib/{auth → idle}/idle.service.js +7 -7
  26. package/esm2015/lib/{auth → idle}/idle.types.js +1 -1
  27. package/esm2015/lib/items2/item2.service.js +20 -20
  28. package/esm2015/lib/key/key-factory.service.js +237 -0
  29. package/esm2015/lib/{cryptography → key}/key-graph.service.js +10 -10
  30. package/esm2015/lib/key/key-meta.service.js +200 -0
  31. package/esm2015/lib/key/key.service.js +124 -0
  32. package/esm2015/lib/key/key.types.js +11 -0
  33. package/esm2015/lib/key-exchange/key-exchange.gql.js +188 -0
  34. package/esm2015/lib/key-exchange/key-exchange.service.js +443 -0
  35. package/esm2015/lib/key-exchange/key-exchange.types.js +7 -0
  36. package/esm2015/lib/key-exchange/key-exchange2.gql.js +171 -0
  37. package/esm2015/lib/key-exchange/key-exchange2.service.js +500 -0
  38. package/esm2015/lib/lbop/lbop.service.js +355 -0
  39. package/esm2015/lib/life-ready.module.js +2 -27
  40. package/esm2015/lib/lock/lock.gql.js +40 -0
  41. package/esm2015/lib/lock/lock.service.js +64 -0
  42. package/esm2015/lib/message/message.gql.js +32 -0
  43. package/esm2015/lib/message/message.service.js +116 -0
  44. package/esm2015/lib/message/message.types.js +1 -0
  45. package/esm2015/lib/password/password.gql.js +28 -0
  46. package/esm2015/lib/password/password.service.js +315 -0
  47. package/esm2015/lib/persist/persist.service.js +180 -0
  48. package/esm2015/lib/profile/profile-details.service.js +214 -0
  49. package/esm2015/lib/profile/profile.gql.js +97 -0
  50. package/esm2015/lib/profile/profile.service.js +169 -0
  51. package/esm2015/lib/profile/profile.types.js +34 -0
  52. package/esm2015/lib/record/record-attachment.service.js +15 -15
  53. package/esm2015/lib/record/record.service.js +3 -3
  54. package/esm2015/lib/register/register.service.js +172 -0
  55. package/esm2015/lib/scenario/scenario.controller.js +2 -2
  56. package/esm2015/lib/scenario/{scenario.gql.private.js → scenario.private.gql.js} +1 -1
  57. package/esm2015/lib/scenario/scenario.service.js +9 -9
  58. package/esm2015/lib/scenario/scenario.types.js +1 -1
  59. package/esm2015/lib/shared-contact-card/shared-contact-card.service.js +119 -0
  60. package/esm2015/lib/shared-contact-card/shared-contact-card2.gql.js +41 -0
  61. package/esm2015/lib/shared-contact-card/shared-contact-card2.service.js +117 -0
  62. package/esm2015/lib/slip39/slip39.service.js +169 -0
  63. package/esm2015/lib/time/time.service.js +146 -0
  64. package/esm2015/lib/tp-assembly/tp-assembly.js +365 -0
  65. package/esm2015/lib/tp-assembly/tp-assembly.private.gql.js +22 -0
  66. package/esm2015/lib/tp-assembly/tp-assembly.types.js +1 -0
  67. package/esm2015/lib/tp-password-reset/tp-password-reset-request.service.js +100 -0
  68. package/esm2015/lib/tp-password-reset/tp-password-reset-user.service.js +117 -0
  69. package/esm2015/lib/tp-password-reset/tp-password-reset.constants.js +4 -0
  70. package/esm2015/lib/tp-password-reset/tp-password-reset.controller.js +34 -0
  71. package/esm2015/lib/tp-password-reset/tp-password-reset.gql.js +74 -0
  72. package/esm2015/lib/tp-password-reset/tp-password-reset.private.gql.js +165 -0
  73. package/esm2015/lib/tp-password-reset/tp-password-reset.private.service.js +54 -0
  74. package/esm2015/lib/tp-password-reset/tp-password-reset.service.js +92 -0
  75. package/esm2015/lib/tp-password-reset/tp-password-reset.types.js +1 -0
  76. package/esm2015/lib/trusted-party/trusted-party.gql.js +148 -0
  77. package/esm2015/lib/trusted-party/trusted-party.service.js +326 -0
  78. package/esm2015/lib/trusted-party/trusted-party.types.js +41 -0
  79. package/esm2015/lib/trusted-party/trusted-party2.gql.js +64 -0
  80. package/esm2015/lib/trusted-party/trusted-party2.gql.private.js +25 -0
  81. package/esm2015/lib/trusted-party/trusted-party2.service.js +224 -0
  82. package/esm2015/lib/trusted-party/trusted-party2.types.js +1 -0
  83. package/esm2015/lib/two-factor/two-factor.service.js +74 -0
  84. package/esm2015/lib/user/user.gql.js +60 -0
  85. package/esm2015/lib/user/user.service.js +79 -0
  86. package/esm2015/lib/user/user.types.js +1 -0
  87. package/esm2015/lib/web-crypto/web-crypto.service.js +29 -0
  88. package/esm2015/lifeready-core.js +15 -13
  89. package/esm2015/public-api.js +49 -51
  90. package/fesm2015/lifeready-core.js +9232 -9214
  91. package/fesm2015/lifeready-core.js.map +1 -1
  92. package/lib/_common/types.d.ts +3 -1
  93. package/lib/api/lr-apollo.service.d.ts +1 -1
  94. package/lib/api/lr-graphql/lr-graphql.service.d.ts +1 -1
  95. package/lib/api/query-processor/common-processors.service.d.ts +1 -1
  96. package/lib/api/query-processor/query-processor.service.d.ts +1 -1
  97. package/lib/api/query-processor/tp-password-reset-processor.service.d.ts +1 -1
  98. package/lib/api/types/lr-graphql.types.d.ts +11 -0
  99. package/lib/auth/auth.gql.d.ts +0 -3
  100. package/lib/auth/auth.types.d.ts +2 -2
  101. package/lib/auth/life-ready-auth.service.d.ts +12 -12
  102. package/lib/category/category.gql.d.ts +1 -1
  103. package/lib/category/category.service.d.ts +2 -2
  104. package/lib/{api → contact-card}/contact-card.service.d.ts +9 -9
  105. package/lib/contact-card/contact-card2.gql.d.ts +25 -0
  106. package/lib/{api → contact-card}/contact-card2.service.d.ts +11 -12
  107. package/lib/{cryptography → encryption}/encryption.service.d.ts +2 -2
  108. package/lib/{api/file.service.d.ts → file-upload/file-upload.service.d.ts} +3 -7
  109. package/lib/file-upload/file-upload.types.d.ts +5 -0
  110. package/lib/{auth → idle}/idle.service.d.ts +4 -4
  111. package/lib/items2/item2.service.d.ts +11 -11
  112. package/lib/{cryptography → key}/key-factory.service.d.ts +2 -2
  113. package/lib/{cryptography → key}/key-graph.service.d.ts +5 -5
  114. package/lib/{cryptography → key}/key-meta.service.d.ts +1 -1
  115. package/lib/{cryptography → key}/key.service.d.ts +2 -2
  116. package/lib/{cryptography/cryptography.types.d.ts → key/key.types.d.ts} +9 -13
  117. package/lib/{api → key-exchange}/key-exchange.service.d.ts +5 -5
  118. package/lib/{api → key-exchange}/key-exchange.types.d.ts +4 -4
  119. package/lib/{api → key-exchange}/key-exchange2.gql.d.ts +1 -1
  120. package/lib/{api → key-exchange}/key-exchange2.service.d.ts +71 -18
  121. package/lib/{auth → lbop}/lbop.service.d.ts +7 -7
  122. package/lib/{api → lock}/lock.gql.d.ts +1 -1
  123. package/lib/{api → lock}/lock.service.d.ts +1 -1
  124. package/lib/message/message.gql.d.ts +13 -0
  125. package/lib/message/message.service.d.ts +29 -0
  126. package/lib/message/message.types.d.ts +12 -0
  127. package/lib/password/password.gql.d.ts +3 -0
  128. package/lib/{auth → password}/password.service.d.ts +8 -8
  129. package/lib/{api → persist}/persist.service.d.ts +3 -3
  130. package/lib/{users → profile}/profile-details.service.d.ts +3 -3
  131. package/lib/{users → profile}/profile.gql.d.ts +2 -2
  132. package/lib/{users → profile}/profile.service.d.ts +6 -6
  133. package/lib/{users → profile}/profile.types.d.ts +1 -1
  134. package/lib/record/record-attachment.service.d.ts +6 -6
  135. package/lib/record/record.service.d.ts +1 -1
  136. package/lib/{auth → register}/register.service.d.ts +4 -4
  137. package/lib/scenario/scenario.controller.d.ts +1 -1
  138. package/lib/scenario/scenario.service.d.ts +2 -2
  139. package/lib/scenario/scenario.types.d.ts +1 -1
  140. package/lib/{api → shared-contact-card}/shared-contact-card.service.d.ts +9 -9
  141. package/lib/{api → shared-contact-card}/shared-contact-card2.gql.d.ts +1 -1
  142. package/lib/{api → shared-contact-card}/shared-contact-card2.service.d.ts +6 -6
  143. package/lib/{trusted-parties → tp-assembly}/tp-assembly.d.ts +7 -7
  144. package/lib/{trusted-parties → tp-assembly}/tp-assembly.types.d.ts +1 -1
  145. package/lib/{trusted-parties → tp-password-reset}/tp-password-reset-request.service.d.ts +4 -8
  146. package/lib/{trusted-parties → tp-password-reset}/tp-password-reset-user.service.d.ts +7 -13
  147. package/lib/{trusted-parties → tp-password-reset}/tp-password-reset.controller.d.ts +1 -1
  148. package/lib/tp-password-reset/tp-password-reset.gql.d.ts +63 -0
  149. package/lib/{trusted-parties/tp-password-reset.gql.d.ts → tp-password-reset/tp-password-reset.private.gql.d.ts} +1 -63
  150. package/lib/tp-password-reset/tp-password-reset.private.service.d.ts +59 -0
  151. package/lib/{trusted-parties → tp-password-reset}/tp-password-reset.service.d.ts +6 -89
  152. package/lib/tp-password-reset/tp-password-reset.types.d.ts +40 -0
  153. package/lib/{trusted-parties → trusted-party}/trusted-party.service.d.ts +7 -7
  154. package/lib/{trusted-parties → trusted-party}/trusted-party.types.d.ts +2 -3
  155. package/lib/{trusted-parties → trusted-party}/trusted-party2.gql.d.ts +0 -22
  156. package/lib/trusted-party/trusted-party2.gql.private.d.ts +23 -0
  157. package/lib/{trusted-parties → trusted-party}/trusted-party2.service.d.ts +11 -35
  158. package/lib/trusted-party/trusted-party2.types.d.ts +12 -0
  159. package/lib/{users → user}/user.gql.d.ts +1 -1
  160. package/lib/{users → user}/user.types.d.ts +1 -1
  161. package/lifeready-core.d.ts +14 -12
  162. package/lifeready-core.metadata.json +1 -1
  163. package/package.json +1 -1
  164. package/public-api.d.ts +48 -50
  165. package/esm2015/lib/api/contact-card.gql.js +0 -79
  166. package/esm2015/lib/api/contact-card.service.js +0 -154
  167. package/esm2015/lib/api/contact-card2.gql.js +0 -60
  168. package/esm2015/lib/api/contact-card2.service.js +0 -103
  169. package/esm2015/lib/api/file.service.js +0 -74
  170. package/esm2015/lib/api/key-exchange.gql.js +0 -188
  171. package/esm2015/lib/api/key-exchange.service.js +0 -442
  172. package/esm2015/lib/api/key-exchange.types.js +0 -7
  173. package/esm2015/lib/api/key-exchange2.gql.js +0 -171
  174. package/esm2015/lib/api/key-exchange2.service.js +0 -480
  175. package/esm2015/lib/api/lock.gql.js +0 -40
  176. package/esm2015/lib/api/lock.service.js +0 -64
  177. package/esm2015/lib/api/message.service.js +0 -138
  178. package/esm2015/lib/api/persist.service.js +0 -181
  179. package/esm2015/lib/api/shared-contact-card.service.js +0 -119
  180. package/esm2015/lib/api/shared-contact-card2.gql.js +0 -41
  181. package/esm2015/lib/api/shared-contact-card2.service.js +0 -117
  182. package/esm2015/lib/api/time.service.js +0 -146
  183. package/esm2015/lib/auth/lbop.service.js +0 -355
  184. package/esm2015/lib/auth/password.service.js +0 -315
  185. package/esm2015/lib/auth/register.service.js +0 -172
  186. package/esm2015/lib/auth/two-factor.service.js +0 -74
  187. package/esm2015/lib/cryptography/cryptography.types.js +0 -11
  188. package/esm2015/lib/cryptography/encryption.service.js +0 -189
  189. package/esm2015/lib/cryptography/key-factory.service.js +0 -237
  190. package/esm2015/lib/cryptography/key-meta.service.js +0 -200
  191. package/esm2015/lib/cryptography/key.service.js +0 -124
  192. package/esm2015/lib/cryptography/slip39.service.js +0 -169
  193. package/esm2015/lib/cryptography/web-crypto.service.js +0 -29
  194. package/esm2015/lib/trusted-parties/tp-assembly.gql.private.js +0 -22
  195. package/esm2015/lib/trusted-parties/tp-assembly.js +0 -365
  196. package/esm2015/lib/trusted-parties/tp-assembly.types.js +0 -1
  197. package/esm2015/lib/trusted-parties/tp-password-reset-request.service.js +0 -113
  198. package/esm2015/lib/trusted-parties/tp-password-reset-user.service.js +0 -129
  199. package/esm2015/lib/trusted-parties/tp-password-reset.constants.js +0 -4
  200. package/esm2015/lib/trusted-parties/tp-password-reset.controller.js +0 -34
  201. package/esm2015/lib/trusted-parties/tp-password-reset.gql.js +0 -237
  202. package/esm2015/lib/trusted-parties/tp-password-reset.service.js +0 -95
  203. package/esm2015/lib/trusted-parties/trusted-party.gql.js +0 -148
  204. package/esm2015/lib/trusted-parties/trusted-party.service.js +0 -326
  205. package/esm2015/lib/trusted-parties/trusted-party.types.js +0 -41
  206. package/esm2015/lib/trusted-parties/trusted-party2.gql.js +0 -87
  207. package/esm2015/lib/trusted-parties/trusted-party2.service.js +0 -218
  208. package/esm2015/lib/users/profile-details.service.js +0 -214
  209. package/esm2015/lib/users/profile.gql.js +0 -97
  210. package/esm2015/lib/users/profile.service.js +0 -169
  211. package/esm2015/lib/users/profile.types.js +0 -34
  212. package/esm2015/lib/users/user.gql.js +0 -60
  213. package/esm2015/lib/users/user.service.js +0 -79
  214. package/esm2015/lib/users/user.types.js +0 -1
  215. package/lib/api/contact-card2.gql.d.ts +0 -34
  216. package/lib/api/message.service.d.ts +0 -59
  217. /package/lib/{api → contact-card}/contact-card.gql.d.ts +0 -0
  218. /package/lib/{auth → idle}/idle.types.d.ts +0 -0
  219. /package/lib/{api → key-exchange}/key-exchange.gql.d.ts +0 -0
  220. /package/lib/scenario/{scenario.gql.private.d.ts → scenario.private.gql.d.ts} +0 -0
  221. /package/lib/{cryptography → slip39}/slip39.service.d.ts +0 -0
  222. /package/lib/{api → time}/time.service.d.ts +0 -0
  223. /package/lib/{trusted-parties/tp-assembly.gql.private.d.ts → tp-assembly/tp-assembly.private.gql.d.ts} +0 -0
  224. /package/lib/{trusted-parties → tp-password-reset}/tp-password-reset.constants.d.ts +0 -0
  225. /package/lib/{trusted-parties → trusted-party}/trusted-party.gql.d.ts +0 -0
  226. /package/lib/{auth → two-factor}/two-factor.service.d.ts +0 -0
  227. /package/lib/{users → user}/user.service.d.ts +0 -0
  228. /package/lib/{cryptography → web-crypto}/web-crypto.service.d.ts +0 -0
@@ -1,200 +0,0 @@
1
- import { __awaiter } from "tslib";
2
- import { Injectable } from '@angular/core';
3
- import { LrApolloService } from '../api/lr-apollo.service';
4
- import { GetCategoryKeyIdQuery } from '../category/category.gql';
5
- import { EncryptionService, } from './encryption.service';
6
- import { KeyFactoryService } from './key-factory.service';
7
- import { KeyGraphService } from './key-graph.service';
8
- import { KeyService } from './key.service';
9
- import * as i0 from "@angular/core";
10
- import * as i1 from "./encryption.service";
11
- import * as i2 from "./key-graph.service";
12
- import * as i3 from "../api/lr-apollo.service";
13
- import * as i4 from "./key.service";
14
- import * as i5 from "./key-factory.service";
15
- export class WrappedContent {
16
- }
17
- export class WrappingKey {
18
- }
19
- export class KeyMetaService {
20
- constructor(encryptionService, keyGraph, lrApollo, keyService, keyFactory) {
21
- this.encryptionService = encryptionService;
22
- this.keyGraph = keyGraph;
23
- this.lrApollo = lrApollo;
24
- this.keyService = keyService;
25
- this.keyFactory = keyFactory;
26
- }
27
- // async decryptFromString<T>(
28
- // keyOrId: string | Key,
29
- // cipherData: string,
30
- // options?: DecryptOptions
31
- // ): Promise<T> {
32
- // if (cipherData) {
33
- // const key = await this.keyGraphService.getJwkKey(keyOrId);
34
- // return (await this.encryptionService.decrypt(
35
- // key,
36
- // JSON.parse(cipherData),
37
- // options
38
- // )) as any;
39
- // }
40
- // return null;
41
- // }
42
- decryptMeta(metaHaver) {
43
- return __awaiter(this, void 0, void 0, function* () {
44
- if (metaHaver.cipherMeta) {
45
- const key = yield this.keyGraph.getJwkKey(metaHaver.keyId);
46
- return (yield this.encryptionService.decrypt(key, JSON.parse(metaHaver.cipherMeta)));
47
- }
48
- return null;
49
- });
50
- }
51
- // async decryptFile(keyId: string, file: any): Promise<any> {
52
- // const key = await this.keyGraphService.getJwkKey(keyId);
53
- // return (await this.encryptionService.decrypt(key, file, {
54
- // payloadType: 'ArrayBuffer',
55
- // })) as any;
56
- // }
57
- // // TODO rename this to encrypt() and use as the most common usecase
58
- // async encryptToString(
59
- // key: string | Key | JWK.Key,
60
- // content: any
61
- // ): Promise<string> {
62
- // // Empty string should be encrypted since you want to clear the field.
63
- // // Null is not encrypted because it's not valid JSON in the old JSON spec. Use
64
- // // empty string instead. It'll function as a logic false as well.
65
- // // Note that passing in empty string means it'll be encrypted which verifies
66
- // // it's integrity. But we still want to have a way to set the DB field
67
- // // to NULL, so we explicitly return null when content == null. A null
68
- // // variable in graphql mutation on KC server clears the field to NULL.
69
- // if (content == null) {
70
- // return null;
71
- // }
72
- // const jwk =
73
- // asJwk(key) || (await this.keyGraphService.getJwkKey(key as string | Key));
74
- // return JSON.stringify(await this.encryptionService.encrypt(jwk, content));
75
- // }
76
- // // Wraps a symmetric encryption key.
77
- // // Throws exception if wrapping public keys.
78
- // async wrapKey<T>(
79
- // wrappingKey: string | Key | JWK.Key,
80
- // key: JWK.Key
81
- // ): Promise<string> {
82
- // if (!isSymmetricKey(key)) {
83
- // throw new LrBadArgumentException(
84
- // 'Only allowing wrapping of symmetric keys.'
85
- // );
86
- // }
87
- // return this.encryptToString(wrappingKey, key.toJSON(true));
88
- // }
89
- // // TODO
90
- // // async wrapPublicKey<T>();
91
- // // async wrapPrivateKey<T>();
92
- doubleWrapContent(secureContent, categoryIds, fileContent) {
93
- return __awaiter(this, void 0, void 0, function* () {
94
- const key = yield this.keyFactory.createKey();
95
- const wrappedContent = yield this.wrapContent(key.toJSON(true), categoryIds);
96
- return {
97
- rootKey: wrappedContent.rootKey,
98
- wrappedKeys: wrappedContent.wrappedKeys,
99
- doubleWrappedKey: wrappedContent.cipherMeta,
100
- cipherMeta: secureContent
101
- ? JSON.stringify(yield this.encryptionService.encrypt(key, secureContent))
102
- : null,
103
- cipherFileContent: fileContent
104
- ? JSON.stringify(yield this.encryptionService.encrypt(key, fileContent))
105
- : null,
106
- };
107
- });
108
- }
109
- reWrapContent(keyId, secureContent) {
110
- return __awaiter(this, void 0, void 0, function* () {
111
- const key = yield this.keyGraph.getJwkKey(keyId);
112
- const newKey = yield this.keyFactory.createKey();
113
- return {
114
- doubleWrappedKey: JSON.stringify(yield this.encryptionService.encrypt(key, newKey.toJSON(true))),
115
- cipherMeta: secureContent
116
- ? JSON.stringify(yield this.encryptionService.encrypt(newKey, secureContent))
117
- : null,
118
- };
119
- });
120
- }
121
- wrapContent(secureContent, categoryIds) {
122
- return __awaiter(this, void 0, void 0, function* () {
123
- const key = yield this.keyFactory.createKey();
124
- let wrappedKeys;
125
- let rootWrappingKey;
126
- if (categoryIds && categoryIds.length) {
127
- wrappedKeys = yield Promise.all(categoryIds.map((categoryId) => __awaiter(this, void 0, void 0, function* () {
128
- const parentKey = yield this.getCategoryKeyId(categoryId);
129
- const wrappedKey = JSON.stringify(yield this.encryptionService.encrypt(parentKey.key, key.toJSON(true)));
130
- return {
131
- directoryId: categoryId,
132
- wrappingKeyId: parentKey.keyId,
133
- wrappedKey,
134
- };
135
- })));
136
- }
137
- else {
138
- // Adding to root directory
139
- const rootKey = this.keyService.getCurrentRootKey();
140
- const wrappedKey = JSON.stringify(yield this.encryptionService.encrypt(rootKey.jwk, key.toJSON(true)));
141
- rootWrappingKey = {
142
- wrappingKeyId: rootKey.id,
143
- wrappedKey,
144
- };
145
- }
146
- return {
147
- key,
148
- rootKey: rootWrappingKey,
149
- wrappedKeys,
150
- cipherMeta: secureContent
151
- ? JSON.stringify(yield this.encryptionService.encrypt(key, secureContent))
152
- : null,
153
- };
154
- });
155
- }
156
- wrapContentWithKey(secureContent, keyId) {
157
- return __awaiter(this, void 0, void 0, function* () {
158
- const key = yield this.keyFactory.createKey();
159
- const wrappedKey = yield this.keyGraph.encryptToString(keyId, key.toJSON(true));
160
- return {
161
- key,
162
- rootKey: {
163
- wrappingKeyId: keyId,
164
- wrappedKey,
165
- },
166
- cipherMeta: secureContent
167
- ? JSON.stringify(yield this.encryptionService.encrypt(key, secureContent))
168
- : null,
169
- };
170
- });
171
- }
172
- getCategoryKeyId(categoryId) {
173
- return __awaiter(this, void 0, void 0, function* () {
174
- const { category } = yield this.lrApollo.query({
175
- query: GetCategoryKeyIdQuery,
176
- variables: {
177
- id: categoryId,
178
- },
179
- });
180
- return {
181
- keyId: category.keyId,
182
- key: yield this.keyGraph.getJwkKey(category.keyId),
183
- };
184
- });
185
- }
186
- }
187
- KeyMetaService.ɵprov = i0.ɵɵdefineInjectable({ factory: function KeyMetaService_Factory() { return new KeyMetaService(i0.ɵɵinject(i1.EncryptionService), i0.ɵɵinject(i2.KeyGraphService), i0.ɵɵinject(i3.LrApolloService), i0.ɵɵinject(i4.KeyService), i0.ɵɵinject(i5.KeyFactoryService)); }, token: KeyMetaService, providedIn: "root" });
188
- KeyMetaService.decorators = [
189
- { type: Injectable, args: [{
190
- providedIn: 'root',
191
- },] }
192
- ];
193
- KeyMetaService.ctorParameters = () => [
194
- { type: EncryptionService },
195
- { type: KeyGraphService },
196
- { type: LrApolloService },
197
- { type: KeyService },
198
- { type: KeyFactoryService }
199
- ];
200
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"key-meta.service.js","sourceRoot":"/opt/atlassian/pipelines/agent/build/projects/core/src/","sources":["lib/cryptography/key-meta.service.ts"],"names":[],"mappings":";AAAA,OAAO,EAAE,UAAU,EAAE,MAAM,eAAe,CAAC;AAE3C,OAAO,EAAE,eAAe,EAAE,MAAM,0BAA0B,CAAC;AAC3D,OAAO,EAAE,qBAAqB,EAAE,MAAM,0BAA0B,CAAC;AAGjE,OAAO,EAGL,iBAAiB,GAElB,MAAM,sBAAsB,CAAC;AAC9B,OAAO,EAAE,iBAAiB,EAAE,MAAM,uBAAuB,CAAC;AAC1D,OAAO,EAAE,eAAe,EAAE,MAAM,qBAAqB,CAAC;AACtD,OAAO,EAAE,UAAU,EAAE,MAAM,eAAe,CAAC;;;;;;;AAO3C,MAAM,OAAO,cAAc;CAK1B;AAED,MAAM,OAAO,WAAW;CAIvB;AAKD,MAAM,OAAO,cAAc;IACzB,YACU,iBAAoC,EACpC,QAAyB,EACzB,QAAyB,EACzB,UAAsB,EACtB,UAA6B;QAJ7B,sBAAiB,GAAjB,iBAAiB,CAAmB;QACpC,aAAQ,GAAR,QAAQ,CAAiB;QACzB,aAAQ,GAAR,QAAQ,CAAiB;QACzB,eAAU,GAAV,UAAU,CAAY;QACtB,eAAU,GAAV,UAAU,CAAmB;IACpC,CAAC;IAEJ,8BAA8B;IAC9B,2BAA2B;IAC3B,wBAAwB;IACxB,6BAA6B;IAC7B,kBAAkB;IAClB,sBAAsB;IACtB,iEAAiE;IACjE,oDAAoD;IACpD,aAAa;IACb,gCAAgC;IAChC,gBAAgB;IAChB,iBAAiB;IACjB,MAAM;IACN,iBAAiB;IACjB,IAAI;IAEE,WAAW,CAAI,SAAwB;;YAC3C,IAAI,SAAS,CAAC,UAAU,EAAE;gBACxB,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC,SAAS,CAAC,SAAS,CAAC,KAAK,CAAC,CAAC;gBAC3D,OAAO,CAAC,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAC1C,GAAG,EACH,IAAI,CAAC,KAAK,CAAC,SAAS,CAAC,UAAU,CAAC,CACjC,CAAQ,CAAC;aACX;YACD,OAAO,IAAI,CAAC;QACd,CAAC;KAAA;IAED,8DAA8D;IAC9D,6DAA6D;IAC7D,8DAA8D;IAC9D,kCAAkC;IAClC,gBAAgB;IAChB,IAAI;IAEJ,sEAAsE;IACtE,yBAAyB;IACzB,iCAAiC;IACjC,iBAAiB;IACjB,uBAAuB;IACvB,2EAA2E;IAC3E,mFAAmF;IACnF,sEAAsE;IACtE,iFAAiF;IACjF,2EAA2E;IAC3E,0EAA0E;IAC1E,2EAA2E;IAC3E,2BAA2B;IAC3B,mBAAmB;IACnB,MAAM;IAEN,gBAAgB;IAChB,iFAAiF;IACjF,+EAA+E;IAC/E,IAAI;IAEJ,uCAAuC;IACvC,+CAA+C;IAC/C,oBAAoB;IACpB,yCAAyC;IACzC,iBAAiB;IACjB,uBAAuB;IACvB,gCAAgC;IAChC,wCAAwC;IACxC,oDAAoD;IACpD,SAAS;IACT,MAAM;IAEN,gEAAgE;IAChE,IAAI;IAEJ,UAAU;IACV,+BAA+B;IAC/B,gCAAgC;IAE1B,iBAAiB,CACrB,aAAkB,EAClB,WAAqB,EACrB,WAAyB;;YAEzB,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,SAAS,EAAE,CAAC;YAE9C,MAAM,cAAc,GAAG,MAAM,IAAI,CAAC,WAAW,CAC3C,GAAG,CAAC,MAAM,CAAC,IAAI,CAAC,EAChB,WAAW,CACZ,CAAC;YAEF,OAAO;gBACL,OAAO,EAAE,cAAc,CAAC,OAAO;gBAC/B,WAAW,EAAE,cAAc,CAAC,WAAW;gBACvC,gBAAgB,EAAE,cAAc,CAAC,UAAU;gBAC3C,UAAU,EAAE,aAAa;oBACvB,CAAC,CAAC,IAAI,CAAC,SAAS,CACZ,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAAC,GAAG,EAAE,aAAa,CAAC,CACzD;oBACH,CAAC,CAAC,IAAI;gBACR,iBAAiB,EAAE,WAAW;oBAC5B,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAAC,GAAG,EAAE,WAAW,CAAC,CAAC;oBACxE,CAAC,CAAC,IAAI;aACT,CAAC;QACJ,CAAC;KAAA;IAEK,aAAa,CAAC,KAAa,EAAE,aAAkB;;YACnD,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC,SAAS,CAAC,KAAK,CAAC,CAAC;YACjD,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,SAAS,EAAE,CAAC;YAEjD,OAAO;gBACL,gBAAgB,EAAE,IAAI,CAAC,SAAS,CAC9B,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAAC,GAAG,EAAE,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAC/D;gBACD,UAAU,EAAE,aAAa;oBACvB,CAAC,CAAC,IAAI,CAAC,SAAS,CACZ,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAAC,MAAM,EAAE,aAAa,CAAC,CAC5D;oBACH,CAAC,CAAC,IAAI;aACT,CAAC;QACJ,CAAC;KAAA;IAEK,WAAW,CACf,aAAkB,EAClB,WAAsB;;YAEtB,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,SAAS,EAAE,CAAC;YAE9C,IAAI,WAA0B,CAAC;YAC/B,IAAI,eAA4B,CAAC;YAEjC,IAAI,WAAW,IAAI,WAAW,CAAC,MAAM,EAAE;gBACrC,WAAW,GAAG,MAAM,OAAO,CAAC,GAAG,CAC7B,WAAW,CAAC,GAAG,CAAC,CAAO,UAAU,EAAE,EAAE;oBACnC,MAAM,SAAS,GAAG,MAAM,IAAI,CAAC,gBAAgB,CAAC,UAAU,CAAC,CAAC;oBAC1D,MAAM,UAAU,GAAG,IAAI,CAAC,SAAS,CAC/B,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAClC,SAAS,CAAC,GAAG,EACb,GAAG,CAAC,MAAM,CAAC,IAAI,CAAC,CACjB,CACF,CAAC;oBACF,OAAO;wBACL,WAAW,EAAE,UAAU;wBACvB,aAAa,EAAE,SAAS,CAAC,KAAK;wBAC9B,UAAU;qBACX,CAAC;gBACJ,CAAC,CAAA,CAAC,CACH,CAAC;aACH;iBAAM;gBACL,2BAA2B;gBAC3B,MAAM,OAAO,GAAG,IAAI,CAAC,UAAU,CAAC,iBAAiB,EAAE,CAAC;gBACpD,MAAM,UAAU,GAAG,IAAI,CAAC,SAAS,CAC/B,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAAC,OAAO,CAAC,GAAG,EAAE,GAAG,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CACpE,CAAC;gBACF,eAAe,GAAG;oBAChB,aAAa,EAAE,OAAO,CAAC,EAAE;oBACzB,UAAU;iBACX,CAAC;aACH;YAED,OAAO;gBACL,GAAG;gBACH,OAAO,EAAE,eAAe;gBACxB,WAAW;gBACX,UAAU,EAAE,aAAa;oBACvB,CAAC,CAAC,IAAI,CAAC,SAAS,CACZ,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAAC,GAAG,EAAE,aAAa,CAAC,CACzD;oBACH,CAAC,CAAC,IAAI;aACT,CAAC;QACJ,CAAC;KAAA;IAEK,kBAAkB,CACtB,aAAkB,EAClB,KAAa;;YAEb,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,SAAS,EAAE,CAAC;YAE9C,MAAM,UAAU,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC,eAAe,CACpD,KAAK,EACL,GAAG,CAAC,MAAM,CAAC,IAAI,CAAC,CACjB,CAAC;YAEF,OAAO;gBACL,GAAG;gBACH,OAAO,EAAE;oBACP,aAAa,EAAE,KAAK;oBACpB,UAAU;iBACX;gBACD,UAAU,EAAE,aAAa;oBACvB,CAAC,CAAC,IAAI,CAAC,SAAS,CACZ,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAAC,GAAG,EAAE,aAAa,CAAC,CACzD;oBACH,CAAC,CAAC,IAAI;aACT,CAAC;QACJ,CAAC;KAAA;IAEa,gBAAgB,CAC5B,UAAkB;;YAElB,MAAM,EAAE,QAAQ,EAAE,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC,KAAK,CAAM;gBAClD,KAAK,EAAE,qBAAqB;gBAC5B,SAAS,EAAE;oBACT,EAAE,EAAE,UAAU;iBACf;aACF,CAAC,CAAC;YAEH,OAAO;gBACL,KAAK,EAAE,QAAQ,CAAC,KAAK;gBACrB,GAAG,EAAE,MAAM,IAAI,CAAC,QAAQ,CAAC,SAAS,CAAC,QAAQ,CAAC,KAAK,CAAC;aACnD,CAAC;QACJ,CAAC;KAAA;;;;YA1NF,UAAU,SAAC;gBACV,UAAU,EAAE,MAAM;aACnB;;;YA3BC,iBAAiB;YAIV,eAAe;YAXf,eAAe;YAYf,UAAU;YAFV,iBAAiB","sourcesContent":["import { Injectable } from '@angular/core';\nimport { JWK } from 'node-jose';\nimport { LrApolloService } from '../api/lr-apollo.service';\nimport { GetCategoryKeyIdQuery } from '../category/category.gql';\nimport { LrBadArgumentException } from '../_common/exceptions';\nimport { Key, PayloadType } from './cryptography.types';\nimport {\n  asJwk,\n  DecryptOptions,\n  EncryptionService,\n  isSymmetricKey,\n} from './encryption.service';\nimport { KeyFactoryService } from './key-factory.service';\nimport { KeyGraphService } from './key-graph.service';\nimport { KeyService } from './key.service';\n\nexport interface HasCipherMeta {\n  keyId: string;\n  cipherMeta: string;\n}\n\nexport class WrappedContent {\n  key: JWK.Key;\n  cipherMeta: string;\n  wrappedKeys?: WrappingKey[];\n  rootKey?: WrappingKey;\n}\n\nexport class WrappingKey {\n  directoryId?: string;\n  wrappingKeyId: string;\n  wrappedKey: string;\n}\n\n@Injectable({\n  providedIn: 'root',\n})\nexport class KeyMetaService {\n  constructor(\n    private encryptionService: EncryptionService,\n    private keyGraph: KeyGraphService,\n    private lrApollo: LrApolloService,\n    private keyService: KeyService,\n    private keyFactory: KeyFactoryService\n  ) {}\n\n  // async decryptFromString<T>(\n  //   keyOrId: string | Key,\n  //   cipherData: string,\n  //   options?: DecryptOptions\n  // ): Promise<T> {\n  //   if (cipherData) {\n  //     const key = await this.keyGraphService.getJwkKey(keyOrId);\n  //     return (await this.encryptionService.decrypt(\n  //       key,\n  //       JSON.parse(cipherData),\n  //       options\n  //     )) as any;\n  //   }\n  //   return null;\n  // }\n\n  async decryptMeta<T>(metaHaver: HasCipherMeta): Promise<T> {\n    if (metaHaver.cipherMeta) {\n      const key = await this.keyGraph.getJwkKey(metaHaver.keyId);\n      return (await this.encryptionService.decrypt(\n        key,\n        JSON.parse(metaHaver.cipherMeta)\n      )) as any;\n    }\n    return null;\n  }\n\n  // async decryptFile(keyId: string, file: any): Promise<any> {\n  //   const key = await this.keyGraphService.getJwkKey(keyId);\n  //   return (await this.encryptionService.decrypt(key, file, {\n  //     payloadType: 'ArrayBuffer',\n  //   })) as any;\n  // }\n\n  // // TODO rename this to encrypt() and use as the most common usecase\n  // async encryptToString(\n  //   key: string | Key | JWK.Key,\n  //   content: any\n  // ): Promise<string> {\n  //   // Empty string should be encrypted since you want to clear the field.\n  //   // Null is not encrypted because it's not valid JSON in the old JSON spec. Use\n  //   // empty string instead. It'll function as a logic false as well.\n  //   // Note that passing in empty string means it'll be encrypted which verifies\n  //   // it's integrity. But we still want to have a way to set the DB field\n  //   // to NULL, so we explicitly return null when content == null. A null\n  //   // variable in graphql mutation on KC server clears the field to NULL.\n  //   if (content == null) {\n  //     return null;\n  //   }\n\n  //   const jwk =\n  //     asJwk(key) || (await this.keyGraphService.getJwkKey(key as string | Key));\n  //   return JSON.stringify(await this.encryptionService.encrypt(jwk, content));\n  // }\n\n  // // Wraps a symmetric encryption key.\n  // // Throws exception if wrapping public keys.\n  // async wrapKey<T>(\n  //   wrappingKey: string | Key | JWK.Key,\n  //   key: JWK.Key\n  // ): Promise<string> {\n  //   if (!isSymmetricKey(key)) {\n  //     throw new LrBadArgumentException(\n  //       'Only allowing wrapping of symmetric keys.'\n  //     );\n  //   }\n\n  //   return this.encryptToString(wrappingKey, key.toJSON(true));\n  // }\n\n  // // TODO\n  // // async wrapPublicKey<T>();\n  // // async wrapPrivateKey<T>();\n\n  async doubleWrapContent(\n    secureContent: any,\n    categoryIds: string[],\n    fileContent?: ArrayBuffer\n  ) {\n    const key = await this.keyFactory.createKey();\n\n    const wrappedContent = await this.wrapContent(\n      key.toJSON(true),\n      categoryIds\n    );\n\n    return {\n      rootKey: wrappedContent.rootKey,\n      wrappedKeys: wrappedContent.wrappedKeys,\n      doubleWrappedKey: wrappedContent.cipherMeta,\n      cipherMeta: secureContent\n        ? JSON.stringify(\n            await this.encryptionService.encrypt(key, secureContent)\n          )\n        : null,\n      cipherFileContent: fileContent\n        ? JSON.stringify(await this.encryptionService.encrypt(key, fileContent))\n        : null,\n    };\n  }\n\n  async reWrapContent(keyId: string, secureContent: any) {\n    const key = await this.keyGraph.getJwkKey(keyId);\n    const newKey = await this.keyFactory.createKey();\n\n    return {\n      doubleWrappedKey: JSON.stringify(\n        await this.encryptionService.encrypt(key, newKey.toJSON(true))\n      ),\n      cipherMeta: secureContent\n        ? JSON.stringify(\n            await this.encryptionService.encrypt(newKey, secureContent)\n          )\n        : null,\n    };\n  }\n\n  async wrapContent(\n    secureContent: any,\n    categoryIds?: string[]\n  ): Promise<WrappedContent> {\n    const key = await this.keyFactory.createKey();\n\n    let wrappedKeys: WrappingKey[];\n    let rootWrappingKey: WrappingKey;\n\n    if (categoryIds && categoryIds.length) {\n      wrappedKeys = await Promise.all(\n        categoryIds.map(async (categoryId) => {\n          const parentKey = await this.getCategoryKeyId(categoryId);\n          const wrappedKey = JSON.stringify(\n            await this.encryptionService.encrypt(\n              parentKey.key,\n              key.toJSON(true)\n            )\n          );\n          return {\n            directoryId: categoryId,\n            wrappingKeyId: parentKey.keyId,\n            wrappedKey,\n          };\n        })\n      );\n    } else {\n      // Adding to root directory\n      const rootKey = this.keyService.getCurrentRootKey();\n      const wrappedKey = JSON.stringify(\n        await this.encryptionService.encrypt(rootKey.jwk, key.toJSON(true))\n      );\n      rootWrappingKey = {\n        wrappingKeyId: rootKey.id,\n        wrappedKey,\n      };\n    }\n\n    return {\n      key,\n      rootKey: rootWrappingKey,\n      wrappedKeys,\n      cipherMeta: secureContent\n        ? JSON.stringify(\n            await this.encryptionService.encrypt(key, secureContent)\n          )\n        : null,\n    };\n  }\n\n  async wrapContentWithKey(\n    secureContent: any,\n    keyId: string\n  ): Promise<WrappedContent> {\n    const key = await this.keyFactory.createKey();\n\n    const wrappedKey = await this.keyGraph.encryptToString(\n      keyId,\n      key.toJSON(true)\n    );\n\n    return {\n      key,\n      rootKey: {\n        wrappingKeyId: keyId,\n        wrappedKey,\n      },\n      cipherMeta: secureContent\n        ? JSON.stringify(\n            await this.encryptionService.encrypt(key, secureContent)\n          )\n        : null,\n    };\n  }\n\n  private async getCategoryKeyId(\n    categoryId: string\n  ): Promise<{ keyId: string; key: any }> {\n    const { category } = await this.lrApollo.query<any>({\n      query: GetCategoryKeyIdQuery,\n      variables: {\n        id: categoryId,\n      },\n    });\n\n    return {\n      keyId: category.keyId,\n      key: await this.keyGraph.getJwkKey(category.keyId),\n    };\n  }\n}\n"]}
@@ -1,124 +0,0 @@
1
- import { __awaiter } from "tslib";
2
- import { Inject, Injectable } from '@angular/core';
3
- import { LrNotFoundException } from '../_common/exceptions';
4
- import { PersistService } from '../api/persist.service';
5
- import { KeyFactoryService as KFS } from './key-factory.service';
6
- import { LR_CONFIG } from '../life-ready.config';
7
- import * as i0 from "@angular/core";
8
- import * as i1 from "../life-ready.config";
9
- import * as i2 from "../api/persist.service";
10
- export class UserKeys {
11
- }
12
- export class KeyService {
13
- constructor(config, persistService) {
14
- this.config = config;
15
- this.persistService = persistService;
16
- this.STORE_MASTER_KEY = 'masterKey';
17
- // AZ: This can't be change easily. It's basically a PassK or PassIdp rotation.
18
- // todo: we should eventually increase this periodically to match with Moore's law.
19
- // The iterations for each key are kept by the server as well but we assume the value
20
- // from the server is not trustworthy, so need to have minimum thresholds here.
21
- // If creating new keys, these minimum are used.
22
- this.MIN_PASS_IDP_PBKDF_ITER = 100000;
23
- this.MIN_PASS_KEY_PBKDF_ITER = 100000;
24
- this.MIN_LBOP_KEY_PBKDF_ITER = 100000;
25
- // These are used as the default values. They must be larger than the minimum values.
26
- this.DEFAULT_PASS_IDP_PBKDF_ITER = this.MIN_PASS_IDP_PBKDF_ITER;
27
- this.DEFAULT_PASS_KEY_PBKDF_ITER = this.MIN_PASS_KEY_PBKDF_ITER;
28
- this.DEFAULT_LBOP_KEY_PBKDF_ITER = this.MIN_LBOP_KEY_PBKDF_ITER;
29
- this.resetKeys();
30
- }
31
- resetKeys() {
32
- this.keys = null;
33
- this.masterKey = null;
34
- }
35
- purgeKeys() {
36
- this.resetKeys();
37
- this.persistService.clear();
38
- }
39
- populateKeys(keys) {
40
- this.keys = keys;
41
- }
42
- getCurrentPassKey() {
43
- return this.keys.passKey;
44
- }
45
- getCurrentMasterKey() {
46
- return this.keys.masterKey;
47
- }
48
- getCurrentRootKey() {
49
- return this.keys.rootKey;
50
- }
51
- getCurrentPxk() {
52
- return this.keys.pxk;
53
- }
54
- getCurrentSigPxk() {
55
- return this.keys.sigPxk;
56
- }
57
- expiresAfter(seconds) {
58
- return new Date(Date.now() + 1000 * seconds);
59
- }
60
- persistMasterKey(masterKey, expiresAfterSeconds) {
61
- return __awaiter(this, void 0, void 0, function* () {
62
- const storedKey = {
63
- id: masterKey.id,
64
- jwk: masterKey.jwk.toJSON(true),
65
- };
66
- this.masterKey = masterKey;
67
- // Save in an expirable cookie.
68
- yield this.persistService.set({
69
- name: this.STORE_MASTER_KEY,
70
- value: storedKey,
71
- expiry: this.expiresAfter(expiresAfterSeconds),
72
- serverSession: !this.config.disableSessionEncryptionKey,
73
- });
74
- });
75
- }
76
- setMasterKeyExpiresAfterSeconds(seconds) {
77
- return __awaiter(this, void 0, void 0, function* () {
78
- const storedKey = yield this.persistService.get(this.STORE_MASTER_KEY);
79
- if (storedKey == null) {
80
- throw new LrNotFoundException(`Can not find masterKey in persisted storage using name: ${this.STORE_MASTER_KEY}`);
81
- }
82
- yield this.persistService.set({
83
- name: this.STORE_MASTER_KEY,
84
- value: storedKey,
85
- expiry: this.expiresAfter(seconds),
86
- serverSession: !this.config.disableSessionEncryptionKey,
87
- });
88
- });
89
- }
90
- // There's little benefit in using WebCrypto's none-extractable keys because if there
91
- // is an XSS attack, then the attacker has control over the js that downloads the keys. The
92
- // attacker can modify the code to import the keys as extractable. So none-extractable keys
93
- // are only useful if they are already persisted and the user cannot download any more keys,
94
- // which is not feasible.
95
- // So storing the PassKey in localstorage for now, at least till we know what the usage
96
- // pattern is, i.e. how often do we need to use the RootK, MaterK, and PassK.
97
- loadMasterKey(masterKeyId) {
98
- return __awaiter(this, void 0, void 0, function* () {
99
- if (!this.masterKey) {
100
- const storedKey = yield this.persistService.get(this.STORE_MASTER_KEY);
101
- if (!storedKey) {
102
- throw new LrNotFoundException('Could not find masterKey in persisted storage');
103
- }
104
- if (storedKey.id !== masterKeyId) {
105
- throw new LrNotFoundException(`masterKeyId ${storedKey.id} in persisted storage does not match the one requested ${masterKeyId}`);
106
- }
107
- storedKey.jwk = yield KFS.asKey(storedKey.jwk);
108
- this.masterKey = storedKey;
109
- }
110
- return this.masterKey;
111
- });
112
- }
113
- }
114
- KeyService.ɵprov = i0.ɵɵdefineInjectable({ factory: function KeyService_Factory() { return new KeyService(i0.ɵɵinject(i1.LR_CONFIG), i0.ɵɵinject(i2.PersistService)); }, token: KeyService, providedIn: "root" });
115
- KeyService.decorators = [
116
- { type: Injectable, args: [{
117
- providedIn: 'root',
118
- },] }
119
- ];
120
- KeyService.ctorParameters = () => [
121
- { type: undefined, decorators: [{ type: Inject, args: [LR_CONFIG,] }] },
122
- { type: PersistService }
123
- ];
124
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"key.service.js","sourceRoot":"/opt/atlassian/pipelines/agent/build/projects/core/src/","sources":["lib/cryptography/key.service.ts"],"names":[],"mappings":";AAAA,OAAO,EAAE,MAAM,EAAE,UAAU,EAAE,MAAM,eAAe,CAAC;AAEnD,OAAO,EAAE,mBAAmB,EAAE,MAAM,uBAAuB,CAAC;AAC5D,OAAO,EAAE,cAAc,EAAE,MAAM,wBAAwB,CAAC;AACxD,OAAO,EAAE,iBAAiB,IAAI,GAAG,EAAE,MAAM,uBAAuB,CAAC;AACjE,OAAO,EAAmB,SAAS,EAAE,MAAM,sBAAsB,CAAC;;;;AAElE,MAAM,OAAO,QAAQ;CAMpB;AAUD,MAAM,OAAO,UAAU;IAoBrB,YAC6B,MAAuB,EAC1C,cAA8B;QADX,WAAM,GAAN,MAAM,CAAiB;QAC1C,mBAAc,GAAd,cAAc,CAAgB;QArBvB,qBAAgB,GAAG,WAAW,CAAC;QAKhD,+EAA+E;QAC/E,mFAAmF;QACnF,qFAAqF;QACrF,+EAA+E;QAC/E,gDAAgD;QAChC,4BAAuB,GAAG,MAAM,CAAC;QACjC,4BAAuB,GAAG,MAAM,CAAC;QACjC,4BAAuB,GAAG,MAAM,CAAC;QAEjD,qFAAqF;QACrE,gCAA2B,GAAG,IAAI,CAAC,uBAAuB,CAAC;QAC3D,gCAA2B,GAAG,IAAI,CAAC,uBAAuB,CAAC;QAC3D,gCAA2B,GAAG,IAAI,CAAC,uBAAuB,CAAC;QAMzE,IAAI,CAAC,SAAS,EAAE,CAAC;IACnB,CAAC;IAED,SAAS;QACP,IAAI,CAAC,IAAI,GAAG,IAAI,CAAC;QACjB,IAAI,CAAC,SAAS,GAAG,IAAI,CAAC;IACxB,CAAC;IAED,SAAS;QACP,IAAI,CAAC,SAAS,EAAE,CAAC;QACjB,IAAI,CAAC,cAAc,CAAC,KAAK,EAAE,CAAC;IAC9B,CAAC;IAED,YAAY,CAAC,IAAc;QACzB,IAAI,CAAC,IAAI,GAAG,IAAI,CAAC;IACnB,CAAC;IAEM,iBAAiB;QACtB,OAAO,IAAI,CAAC,IAAI,CAAC,OAAO,CAAC;IAC3B,CAAC;IAEM,mBAAmB;QACxB,OAAO,IAAI,CAAC,IAAI,CAAC,SAAS,CAAC;IAC7B,CAAC;IAEM,iBAAiB;QACtB,OAAO,IAAI,CAAC,IAAI,CAAC,OAAO,CAAC;IAC3B,CAAC;IAEM,aAAa;QAClB,OAAO,IAAI,CAAC,IAAI,CAAC,GAAG,CAAC;IACvB,CAAC;IAEM,gBAAgB;QACrB,OAAO,IAAI,CAAC,IAAI,CAAC,MAAM,CAAC;IAC1B,CAAC;IAEO,YAAY,CAAC,OAAe;QAClC,OAAO,IAAI,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE,GAAG,IAAI,GAAG,OAAO,CAAC,CAAC;IAC/C,CAAC;IAEK,gBAAgB,CACpB,SAAc,EACd,mBAA2B;;YAE3B,MAAM,SAAS,GAAG;gBAChB,EAAE,EAAE,SAAS,CAAC,EAAE;gBAChB,GAAG,EAAE,SAAS,CAAC,GAAG,CAAC,MAAM,CAAC,IAAI,CAAC;aAChC,CAAC;YAEF,IAAI,CAAC,SAAS,GAAG,SAAS,CAAC;YAE3B,+BAA+B;YAC/B,MAAM,IAAI,CAAC,cAAc,CAAC,GAAG,CAAC;gBAC5B,IAAI,EAAE,IAAI,CAAC,gBAAgB;gBAC3B,KAAK,EAAE,SAAS;gBAChB,MAAM,EAAE,IAAI,CAAC,YAAY,CAAC,mBAAmB,CAAC;gBAC9C,aAAa,EAAE,CAAC,IAAI,CAAC,MAAM,CAAC,2BAA2B;aACxD,CAAC,CAAC;QACL,CAAC;KAAA;IAEK,+BAA+B,CAAC,OAAe;;YACnD,MAAM,SAAS,GAAG,MAAM,IAAI,CAAC,cAAc,CAAC,GAAG,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC;YACvE,IAAI,SAAS,IAAI,IAAI,EAAE;gBACrB,MAAM,IAAI,mBAAmB,CAC3B,2DAA2D,IAAI,CAAC,gBAAgB,EAAE,CACnF,CAAC;aACH;YACD,MAAM,IAAI,CAAC,cAAc,CAAC,GAAG,CAAC;gBAC5B,IAAI,EAAE,IAAI,CAAC,gBAAgB;gBAC3B,KAAK,EAAE,SAAS;gBAChB,MAAM,EAAE,IAAI,CAAC,YAAY,CAAC,OAAO,CAAC;gBAClC,aAAa,EAAE,CAAC,IAAI,CAAC,MAAM,CAAC,2BAA2B;aACxD,CAAC,CAAC;QACL,CAAC;KAAA;IAED,qFAAqF;IACrF,2FAA2F;IAC3F,2FAA2F;IAC3F,4FAA4F;IAC5F,yBAAyB;IACzB,uFAAuF;IACvF,6EAA6E;IACvE,aAAa,CAAC,WAAmB;;YACrC,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE;gBACnB,MAAM,SAAS,GAAG,MAAM,IAAI,CAAC,cAAc,CAAC,GAAG,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC;gBAEvE,IAAI,CAAC,SAAS,EAAE;oBACd,MAAM,IAAI,mBAAmB,CAC3B,+CAA+C,CAChD,CAAC;iBACH;gBAED,IAAI,SAAS,CAAC,EAAE,KAAK,WAAW,EAAE;oBAChC,MAAM,IAAI,mBAAmB,CAC3B,eAAe,SAAS,CAAC,EAAE,0DAA0D,WAAW,EAAE,CACnG,CAAC;iBACH;gBAED,SAAS,CAAC,GAAG,GAAG,MAAM,GAAG,CAAC,KAAK,CAAC,SAAS,CAAC,GAAG,CAAC,CAAC;gBAE/C,IAAI,CAAC,SAAS,GAAG,SAAS,CAAC;aAC5B;YAED,OAAO,IAAI,CAAC,SAAS,CAAC;QACxB,CAAC;KAAA;;;;YApIF,UAAU,SAAC;gBACV,UAAU,EAAE,MAAM;aACnB;;;4CAsBI,MAAM,SAAC,SAAS;YAzCZ,cAAc","sourcesContent":["import { Inject, Injectable } from '@angular/core';\nimport { Key, PassKey } from './cryptography.types';\nimport { LrNotFoundException } from '../_common/exceptions';\nimport { PersistService } from '../api/persist.service';\nimport { KeyFactoryService as KFS } from './key-factory.service';\nimport { LifeReadyConfig, LR_CONFIG } from '../life-ready.config';\n\nexport class UserKeys {\n  passKey: PassKey;\n  masterKey: Key;\n  rootKey?: Key;\n  pxk?: Key;\n  sigPxk?: Key;\n}\n\ninterface StoredPassKey {\n  id: string;\n  jwk: object;\n}\n\n@Injectable({\n  providedIn: 'root',\n})\nexport class KeyService {\n  private readonly STORE_MASTER_KEY = 'masterKey';\n  // variables\n  private keys: UserKeys;\n  private masterKey: Key;\n\n  // AZ: This can't be change easily. It's basically a PassK or PassIdp rotation.\n  // todo: we should eventually increase this periodically to match with Moore's law.\n  // The iterations for each key are kept by the server as well but we assume the value\n  // from the server is not trustworthy, so need to have minimum thresholds here.\n  // If creating new keys, these minimum are used.\n  public readonly MIN_PASS_IDP_PBKDF_ITER = 100000;\n  public readonly MIN_PASS_KEY_PBKDF_ITER = 100000;\n  public readonly MIN_LBOP_KEY_PBKDF_ITER = 100000;\n\n  // These are used as the default values. They must be larger than the minimum values.\n  public readonly DEFAULT_PASS_IDP_PBKDF_ITER = this.MIN_PASS_IDP_PBKDF_ITER;\n  public readonly DEFAULT_PASS_KEY_PBKDF_ITER = this.MIN_PASS_KEY_PBKDF_ITER;\n  public readonly DEFAULT_LBOP_KEY_PBKDF_ITER = this.MIN_LBOP_KEY_PBKDF_ITER;\n\n  constructor(\n    @Inject(LR_CONFIG) private config: LifeReadyConfig,\n    private persistService: PersistService\n  ) {\n    this.resetKeys();\n  }\n\n  resetKeys() {\n    this.keys = null;\n    this.masterKey = null;\n  }\n\n  purgeKeys() {\n    this.resetKeys();\n    this.persistService.clear();\n  }\n\n  populateKeys(keys: UserKeys) {\n    this.keys = keys;\n  }\n\n  public getCurrentPassKey(): Key {\n    return this.keys.passKey;\n  }\n\n  public getCurrentMasterKey(): Key {\n    return this.keys.masterKey;\n  }\n\n  public getCurrentRootKey(): Key {\n    return this.keys.rootKey;\n  }\n\n  public getCurrentPxk(): Key {\n    return this.keys.pxk;\n  }\n\n  public getCurrentSigPxk(): Key {\n    return this.keys.sigPxk;\n  }\n\n  private expiresAfter(seconds: number): Date {\n    return new Date(Date.now() + 1000 * seconds);\n  }\n\n  async persistMasterKey(\n    masterKey: Key,\n    expiresAfterSeconds: number\n  ): Promise<void> {\n    const storedKey = {\n      id: masterKey.id,\n      jwk: masterKey.jwk.toJSON(true),\n    };\n\n    this.masterKey = masterKey;\n\n    // Save in an expirable cookie.\n    await this.persistService.set({\n      name: this.STORE_MASTER_KEY,\n      value: storedKey,\n      expiry: this.expiresAfter(expiresAfterSeconds),\n      serverSession: !this.config.disableSessionEncryptionKey,\n    });\n  }\n\n  async setMasterKeyExpiresAfterSeconds(seconds: number): Promise<void> {\n    const storedKey = await this.persistService.get(this.STORE_MASTER_KEY);\n    if (storedKey == null) {\n      throw new LrNotFoundException(\n        `Can not find masterKey in persisted storage using name: ${this.STORE_MASTER_KEY}`\n      );\n    }\n    await this.persistService.set({\n      name: this.STORE_MASTER_KEY,\n      value: storedKey,\n      expiry: this.expiresAfter(seconds),\n      serverSession: !this.config.disableSessionEncryptionKey,\n    });\n  }\n\n  // There's little benefit in using WebCrypto's none-extractable keys because if there\n  // is an XSS attack, then the attacker has control over the js that downloads the keys. The\n  // attacker can modify the code to import the keys as extractable. So none-extractable keys\n  // are only useful if they are already persisted and the user cannot download any more keys,\n  // which is not feasible.\n  // So storing the PassKey in localstorage for now, at least till we know what the usage\n  // pattern is, i.e. how often do we need to use the RootK, MaterK, and PassK.\n  async loadMasterKey(masterKeyId: string): Promise<Key> {\n    if (!this.masterKey) {\n      const storedKey = await this.persistService.get(this.STORE_MASTER_KEY);\n\n      if (!storedKey) {\n        throw new LrNotFoundException(\n          'Could not find masterKey in persisted storage'\n        );\n      }\n\n      if (storedKey.id !== masterKeyId) {\n        throw new LrNotFoundException(\n          `masterKeyId ${storedKey.id} in persisted storage does not match the one requested ${masterKeyId}`\n        );\n      }\n\n      storedKey.jwk = await KFS.asKey(storedKey.jwk);\n\n      this.masterKey = storedKey;\n    }\n\n    return this.masterKey;\n  }\n}\n"]}
@@ -1,169 +0,0 @@
1
- import { __awaiter } from "tslib";
2
- import { Injectable } from '@angular/core';
3
- import { Slip39, Slip39Helper } from 'slip39';
4
- import * as i0 from "@angular/core";
5
- export class SecretShare {
6
- constructor(assembly = 0, subAssembly = 0, mnemonics = '') {
7
- this.assembly = assembly;
8
- this.subAssembly = subAssembly;
9
- this.mnemonics = mnemonics;
10
- }
11
- }
12
- export class SubAssembly {
13
- constructor(index, threshold = 0, size = 0) {
14
- this.index = index;
15
- this.threshold = threshold;
16
- this.size = size;
17
- this.clearShares();
18
- }
19
- clearShares() {
20
- this.shares = Array();
21
- }
22
- addShare(share) {
23
- this.shares.push(share);
24
- }
25
- }
26
- export class Assembly {
27
- constructor(threshold = 0) {
28
- this.threshold = threshold;
29
- this.clearSubAssemblies();
30
- }
31
- size() {
32
- return this.subAssemblies.length;
33
- }
34
- clearSubAssemblies() {
35
- this.subAssemblies = new Array();
36
- }
37
- addSubAssembly(subAssembly) {
38
- this.subAssemblies.push(subAssembly);
39
- }
40
- }
41
- export class SubQuorum {
42
- constructor(subAssemblyIndex) {
43
- this.subAssemblyIndex = subAssemblyIndex;
44
- this.clearShares();
45
- }
46
- clearShares() {
47
- this.shares = new Array();
48
- }
49
- addShare(share) {
50
- this.shares.push(share);
51
- }
52
- }
53
- export class Quorum {
54
- constructor() {
55
- this.clearSubQuora();
56
- }
57
- clearSubQuora() {
58
- this.subQuora = new Array();
59
- }
60
- addSubQuorum(subQuorum) {
61
- this.subQuora.push(subQuorum);
62
- }
63
- serialiseShares() {
64
- let shares = [];
65
- this.subQuora.forEach((subQuorum) => {
66
- shares = shares.concat(subQuorum.shares);
67
- });
68
- return shares;
69
- }
70
- }
71
- export class Slip39Service {
72
- constructor() { }
73
- generateShares(secret, passphrase, assembly) {
74
- return __awaiter(this, void 0, void 0, function* () {
75
- // Hex-encode secret.
76
- let ems = btoa(secret);
77
- ems = Slip39Helper.slip39EncodeHex(ems);
78
- // Construct group specifications
79
- const groups = [];
80
- for (const sa of assembly.subAssemblies) {
81
- groups.push([sa.threshold, sa.size]);
82
- }
83
- // Split!
84
- const slip = yield Slip39.fromArray(ems, {
85
- passphrase,
86
- threshold: assembly.threshold,
87
- groups,
88
- title: '',
89
- });
90
- // Extract shares
91
- assembly.subAssemblies.forEach((sa, isa) => {
92
- // Remove any existing shares
93
- sa.clearShares();
94
- for (let im = 0; im < sa.size; im++) {
95
- // Construct the path to the share, formatted as "r/<subassembly index>/<member index>"
96
- // with <subassembly index> and <member index> being two-digit, zero-padded integers.
97
- const path = 'r/' +
98
- isa.toString().padStart(2, '0') +
99
- '/' +
100
- im.toString().padStart(2, '0');
101
- const mnemonics = slip.fromPath(path).mnemonics[0];
102
- const share = new SecretShare(isa, im, mnemonics);
103
- sa.addShare(share);
104
- }
105
- });
106
- });
107
- }
108
- // Remove all redundant shares. i.e. keep only enough members and groups to satisfy the thresholds.
109
- minimalSet(mnemonics) {
110
- // Decode the mnemonics and sort then into groups.
111
- let groupThresh = null;
112
- const groups = new Map();
113
- for (const mnemonic of mnemonics) {
114
- const decoded = Slip39Helper.decodeMnemonic(mnemonic);
115
- if (groupThresh && groupThresh !== decoded.groupThreshold) {
116
- throw new Error('groupThreshold is different in mnemonics');
117
- }
118
- groupThresh = decoded.groupThreshold;
119
- // Note that Slip39.recoverSecret() will do all the error checking again. So it's not critical
120
- // that we error check here. So we just optimistically assume it's all good.
121
- let g = groups.get(decoded.groupIndex);
122
- if (g == null) {
123
- g = {
124
- memberThreshold: decoded.memberThreshold,
125
- members: [],
126
- };
127
- groups.set(decoded.groupIndex, g);
128
- }
129
- g.members.push({
130
- mnemonic,
131
- decoded,
132
- });
133
- }
134
- // Keep the minimum set of groups that meet threshold.
135
- const mnemonicsMinSet = [];
136
- let groupCount = 0;
137
- for (const g of groups.values()) {
138
- // Keep only groups that meet threshold
139
- if (g.members.length < g.memberThreshold) {
140
- continue;
141
- }
142
- // Keep minimum number of approvals needed for group
143
- g.members.slice(0, g.memberThreshold).forEach((member) => {
144
- mnemonicsMinSet.push(member.mnemonic);
145
- });
146
- ++groupCount;
147
- if (groupCount >= groupThresh) {
148
- break;
149
- }
150
- }
151
- return mnemonicsMinSet;
152
- }
153
- recoverSecret(shares, passphrase) {
154
- return __awaiter(this, void 0, void 0, function* () {
155
- shares = this.minimalSet(shares);
156
- const recovered = yield Slip39.recoverSecret(shares, passphrase);
157
- const secret = Slip39Helper.slip39DecodeHex(recovered);
158
- return atob(secret);
159
- });
160
- }
161
- }
162
- Slip39Service.ɵprov = i0.ɵɵdefineInjectable({ factory: function Slip39Service_Factory() { return new Slip39Service(); }, token: Slip39Service, providedIn: "root" });
163
- Slip39Service.decorators = [
164
- { type: Injectable, args: [{
165
- providedIn: 'root',
166
- },] }
167
- ];
168
- Slip39Service.ctorParameters = () => [];
169
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"slip39.service.js","sourceRoot":"/opt/atlassian/pipelines/agent/build/projects/core/src/","sources":["lib/cryptography/slip39.service.ts"],"names":[],"mappings":";AAAA,OAAO,EAAE,UAAU,EAAE,MAAM,eAAe,CAAC;AAC3C,OAAO,EAAE,MAAM,EAAE,YAAY,EAAE,MAAM,QAAQ,CAAC;;AAE9C,MAAM,OAAO,WAAW;IACtB,YACS,WAAmB,CAAC,EACpB,cAAsB,CAAC,EACvB,YAAoB,EAAE;QAFtB,aAAQ,GAAR,QAAQ,CAAY;QACpB,gBAAW,GAAX,WAAW,CAAY;QACvB,cAAS,GAAT,SAAS,CAAa;IAC5B,CAAC;CACL;AAED,MAAM,OAAO,WAAW;IACtB,YACS,KAAa,EACb,YAAoB,CAAC,EACrB,OAAe,CAAC;QAFhB,UAAK,GAAL,KAAK,CAAQ;QACb,cAAS,GAAT,SAAS,CAAY;QACrB,SAAI,GAAJ,IAAI,CAAY;QAEvB,IAAI,CAAC,WAAW,EAAE,CAAC;IACrB,CAAC;IAIM,WAAW;QAChB,IAAI,CAAC,MAAM,GAAG,KAAK,EAAE,CAAC;IACxB,CAAC;IAEM,QAAQ,CAAC,KAAkB;QAChC,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC;IAC1B,CAAC;CACF;AAED,MAAM,OAAO,QAAQ;IACnB,YAAmB,YAAoB,CAAC;QAArB,cAAS,GAAT,SAAS,CAAY;QACtC,IAAI,CAAC,kBAAkB,EAAE,CAAC;IAC5B,CAAC;IAIM,IAAI;QACT,OAAO,IAAI,CAAC,aAAa,CAAC,MAAM,CAAC;IACnC,CAAC;IAEM,kBAAkB;QACvB,IAAI,CAAC,aAAa,GAAG,IAAI,KAAK,EAAE,CAAC;IACnC,CAAC;IAEM,cAAc,CAAC,WAAwB;QAC5C,IAAI,CAAC,aAAa,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC;IACvC,CAAC;CACF;AAED,MAAM,OAAO,SAAS;IAGpB,YAAmB,gBAAwB;QAAxB,qBAAgB,GAAhB,gBAAgB,CAAQ;QACzC,IAAI,CAAC,WAAW,EAAE,CAAC;IACrB,CAAC;IAEM,WAAW;QAChB,IAAI,CAAC,MAAM,GAAG,IAAI,KAAK,EAAE,CAAC;IAC5B,CAAC;IAEM,QAAQ,CAAC,KAAa;QAC3B,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC;IAC1B,CAAC;CACF;AAED,MAAM,OAAO,MAAM;IAGjB;QACE,IAAI,CAAC,aAAa,EAAE,CAAC;IACvB,CAAC;IAEM,aAAa;QAClB,IAAI,CAAC,QAAQ,GAAG,IAAI,KAAK,EAAE,CAAC;IAC9B,CAAC;IAEM,YAAY,CAAC,SAAoB;QACtC,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;IAChC,CAAC;IAEM,eAAe;QACpB,IAAI,MAAM,GAAG,EAAE,CAAC;QAEhB,IAAI,CAAC,QAAQ,CAAC,OAAO,CAAC,CAAC,SAAS,EAAE,EAAE;YAClC,MAAM,GAAG,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,MAAM,CAAC,CAAC;QAC3C,CAAC,CAAC,CAAC;QAEH,OAAO,MAAM,CAAC;IAChB,CAAC;CACF;AAKD,MAAM,OAAO,aAAa;IACxB,gBAAe,CAAC;IAEH,cAAc,CAAC,MAAM,EAAE,UAAkB,EAAE,QAAkB;;YACxE,qBAAqB;YACrB,IAAI,GAAG,GAAG,IAAI,CAAC,MAAM,CAAC,CAAC;YACvB,GAAG,GAAG,YAAY,CAAC,eAAe,CAAC,GAAG,CAAC,CAAC;YAExC,iCAAiC;YACjC,MAAM,MAAM,GAAG,EAAE,CAAC;YAElB,KAAK,MAAM,EAAE,IAAI,QAAQ,CAAC,aAAa,EAAE;gBACvC,MAAM,CAAC,IAAI,CAAC,CAAC,EAAE,CAAC,SAAS,EAAE,EAAE,CAAC,IAAI,CAAC,CAAC,CAAC;aACtC;YAED,SAAS;YACT,MAAM,IAAI,GAAG,MAAM,MAAM,CAAC,SAAS,CAAC,GAAG,EAAE;gBACvC,UAAU;gBACV,SAAS,EAAE,QAAQ,CAAC,SAAS;gBAC7B,MAAM;gBACN,KAAK,EAAE,EAAE;aACV,CAAC,CAAC;YAEH,iBAAiB;YACjB,QAAQ,CAAC,aAAa,CAAC,OAAO,CAAC,CAAC,EAAE,EAAE,GAAG,EAAE,EAAE;gBACzC,6BAA6B;gBAC7B,EAAE,CAAC,WAAW,EAAE,CAAC;gBAEjB,KAAK,IAAI,EAAE,GAAG,CAAC,EAAE,EAAE,GAAG,EAAE,CAAC,IAAI,EAAE,EAAE,EAAE,EAAE;oBACnC,uFAAuF;oBACvF,qFAAqF;oBACrF,MAAM,IAAI,GACR,IAAI;wBACJ,GAAG,CAAC,QAAQ,EAAE,CAAC,QAAQ,CAAC,CAAC,EAAE,GAAG,CAAC;wBAC/B,GAAG;wBACH,EAAE,CAAC,QAAQ,EAAE,CAAC,QAAQ,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC;oBACjC,MAAM,SAAS,GAAG,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC;oBACnD,MAAM,KAAK,GAAG,IAAI,WAAW,CAAC,GAAG,EAAE,EAAE,EAAE,SAAS,CAAC,CAAC;oBAElD,EAAE,CAAC,QAAQ,CAAC,KAAK,CAAC,CAAC;iBACpB;YACH,CAAC,CAAC,CAAC;QACL,CAAC;KAAA;IAED,mGAAmG;IAC3F,UAAU,CAAC,SAAmB;QACpC,kDAAkD;QAClD,IAAI,WAAW,GAAG,IAAI,CAAC;QACvB,MAAM,MAAM,GAAG,IAAI,GAAG,EAAE,CAAC;QACzB,KAAK,MAAM,QAAQ,IAAI,SAAS,EAAE;YAChC,MAAM,OAAO,GAAG,YAAY,CAAC,cAAc,CAAC,QAAQ,CAAC,CAAC;YAEtD,IAAI,WAAW,IAAI,WAAW,KAAK,OAAO,CAAC,cAAc,EAAE;gBACzD,MAAM,IAAI,KAAK,CAAC,0CAA0C,CAAC,CAAC;aAC7D;YAED,WAAW,GAAG,OAAO,CAAC,cAAc,CAAC;YAErC,8FAA8F;YAC9F,4EAA4E;YAC5E,IAAI,CAAC,GAAG,MAAM,CAAC,GAAG,CAAC,OAAO,CAAC,UAAU,CAAC,CAAC;YACvC,IAAI,CAAC,IAAI,IAAI,EAAE;gBACb,CAAC,GAAG;oBACF,eAAe,EAAE,OAAO,CAAC,eAAe;oBACxC,OAAO,EAAE,EAAE;iBACZ,CAAC;gBACF,MAAM,CAAC,GAAG,CAAC,OAAO,CAAC,UAAU,EAAE,CAAC,CAAC,CAAC;aACnC;YAED,CAAC,CAAC,OAAO,CAAC,IAAI,CAAC;gBACb,QAAQ;gBACR,OAAO;aACR,CAAC,CAAC;SACJ;QAED,sDAAsD;QACtD,MAAM,eAAe,GAAG,EAAE,CAAC;QAC3B,IAAI,UAAU,GAAG,CAAC,CAAC;QACnB,KAAK,MAAM,CAAC,IAAI,MAAM,CAAC,MAAM,EAAE,EAAE;YAC/B,uCAAuC;YACvC,IAAI,CAAC,CAAC,OAAO,CAAC,MAAM,GAAG,CAAC,CAAC,eAAe,EAAE;gBACxC,SAAS;aACV;YAED,oDAAoD;YACpD,CAAC,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC,EAAE,CAAC,CAAC,eAAe,CAAC,CAAC,OAAO,CAAC,CAAC,MAAM,EAAE,EAAE;gBACvD,eAAe,CAAC,IAAI,CAAC,MAAM,CAAC,QAAQ,CAAC,CAAC;YACxC,CAAC,CAAC,CAAC;YAEH,EAAE,UAAU,CAAC;YACb,IAAI,UAAU,IAAI,WAAW,EAAE;gBAC7B,MAAM;aACP;SACF;QAED,OAAO,eAAe,CAAC;IACzB,CAAC;IAEY,aAAa,CAAC,MAAgB,EAAE,UAAkB;;YAC7D,MAAM,GAAG,IAAI,CAAC,UAAU,CAAC,MAAM,CAAC,CAAC;YAEjC,MAAM,SAAS,GAAG,MAAM,MAAM,CAAC,aAAa,CAAC,MAAM,EAAE,UAAU,CAAC,CAAC;YAEjE,MAAM,MAAM,GAAG,YAAY,CAAC,eAAe,CAAC,SAAS,CAAC,CAAC;YAEvD,OAAO,IAAI,CAAC,MAAM,CAAC,CAAC;QACtB,CAAC;KAAA;;;;YA7GF,UAAU,SAAC;gBACV,UAAU,EAAE,MAAM;aACnB","sourcesContent":["import { Injectable } from '@angular/core';\nimport { Slip39, Slip39Helper } from 'slip39';\n\nexport class SecretShare {\n  constructor(\n    public assembly: number = 0,\n    public subAssembly: number = 0,\n    public mnemonics: string = ''\n  ) {}\n}\n\nexport class SubAssembly {\n  constructor(\n    public index: number,\n    public threshold: number = 0,\n    public size: number = 0\n  ) {\n    this.clearShares();\n  }\n\n  shares: SecretShare[];\n\n  public clearShares() {\n    this.shares = Array();\n  }\n\n  public addShare(share: SecretShare) {\n    this.shares.push(share);\n  }\n}\n\nexport class Assembly {\n  constructor(public threshold: number = 0) {\n    this.clearSubAssemblies();\n  }\n\n  subAssemblies: SubAssembly[];\n\n  public size() {\n    return this.subAssemblies.length;\n  }\n\n  public clearSubAssemblies() {\n    this.subAssemblies = new Array();\n  }\n\n  public addSubAssembly(subAssembly: SubAssembly) {\n    this.subAssemblies.push(subAssembly);\n  }\n}\n\nexport class SubQuorum {\n  shares: string[];\n\n  constructor(public subAssemblyIndex: number) {\n    this.clearShares();\n  }\n\n  public clearShares() {\n    this.shares = new Array();\n  }\n\n  public addShare(share: string) {\n    this.shares.push(share);\n  }\n}\n\nexport class Quorum {\n  subQuora: SubQuorum[];\n\n  constructor() {\n    this.clearSubQuora();\n  }\n\n  public clearSubQuora() {\n    this.subQuora = new Array();\n  }\n\n  public addSubQuorum(subQuorum: SubQuorum) {\n    this.subQuora.push(subQuorum);\n  }\n\n  public serialiseShares() {\n    let shares = [];\n\n    this.subQuora.forEach((subQuorum) => {\n      shares = shares.concat(subQuorum.shares);\n    });\n\n    return shares;\n  }\n}\n\n@Injectable({\n  providedIn: 'root',\n})\nexport class Slip39Service {\n  constructor() {}\n\n  public async generateShares(secret, passphrase: string, assembly: Assembly) {\n    // Hex-encode secret.\n    let ems = btoa(secret);\n    ems = Slip39Helper.slip39EncodeHex(ems);\n\n    // Construct group specifications\n    const groups = [];\n\n    for (const sa of assembly.subAssemblies) {\n      groups.push([sa.threshold, sa.size]);\n    }\n\n    // Split!\n    const slip = await Slip39.fromArray(ems, {\n      passphrase,\n      threshold: assembly.threshold,\n      groups,\n      title: '',\n    });\n\n    // Extract shares\n    assembly.subAssemblies.forEach((sa, isa) => {\n      // Remove any existing shares\n      sa.clearShares();\n\n      for (let im = 0; im < sa.size; im++) {\n        // Construct the path to the share, formatted as \"r/<subassembly index>/<member index>\"\n        // with <subassembly index> and <member index> being two-digit, zero-padded integers.\n        const path =\n          'r/' +\n          isa.toString().padStart(2, '0') +\n          '/' +\n          im.toString().padStart(2, '0');\n        const mnemonics = slip.fromPath(path).mnemonics[0];\n        const share = new SecretShare(isa, im, mnemonics);\n\n        sa.addShare(share);\n      }\n    });\n  }\n\n  // Remove all redundant shares. i.e. keep only enough members and groups to satisfy the thresholds.\n  private minimalSet(mnemonics: string[]): string[] {\n    // Decode the mnemonics and sort then into groups.\n    let groupThresh = null;\n    const groups = new Map();\n    for (const mnemonic of mnemonics) {\n      const decoded = Slip39Helper.decodeMnemonic(mnemonic);\n\n      if (groupThresh && groupThresh !== decoded.groupThreshold) {\n        throw new Error('groupThreshold is different in mnemonics');\n      }\n\n      groupThresh = decoded.groupThreshold;\n\n      // Note that Slip39.recoverSecret() will do all the error checking again. So it's not critical\n      // that we error check here. So we just optimistically assume it's all good.\n      let g = groups.get(decoded.groupIndex);\n      if (g == null) {\n        g = {\n          memberThreshold: decoded.memberThreshold,\n          members: [],\n        };\n        groups.set(decoded.groupIndex, g);\n      }\n\n      g.members.push({\n        mnemonic,\n        decoded,\n      });\n    }\n\n    // Keep the minimum set of groups that meet threshold.\n    const mnemonicsMinSet = [];\n    let groupCount = 0;\n    for (const g of groups.values()) {\n      // Keep only groups that meet threshold\n      if (g.members.length < g.memberThreshold) {\n        continue;\n      }\n\n      // Keep minimum number of approvals needed for group\n      g.members.slice(0, g.memberThreshold).forEach((member) => {\n        mnemonicsMinSet.push(member.mnemonic);\n      });\n\n      ++groupCount;\n      if (groupCount >= groupThresh) {\n        break;\n      }\n    }\n\n    return mnemonicsMinSet;\n  }\n\n  public async recoverSecret(shares: string[], passphrase: string) {\n    shares = this.minimalSet(shares);\n\n    const recovered = await Slip39.recoverSecret(shares, passphrase);\n\n    const secret = Slip39Helper.slip39DecodeHex(recovered);\n\n    return atob(secret);\n  }\n}\n"]}
@@ -1,29 +0,0 @@
1
- import { __awaiter } from "tslib";
2
- import { Injectable } from '@angular/core';
3
- import * as i0 from "@angular/core";
4
- export class WebCryptoService {
5
- constructor() {
6
- this.crypto = window.crypto;
7
- }
8
- toHex(buffer) {
9
- // Ref: https://developer.mozilla.org/en-US/docs/Web/API/SubtleCrypto/digest
10
- const array = Array.from(new Uint8Array(buffer)); // convert buffer to byte array
11
- const hex = array.map((b) => b.toString(16).padStart(2, '0')).join(''); // convert bytes to hex string
12
- return hex;
13
- }
14
- stringDigest(algorithm, message) {
15
- return __awaiter(this, void 0, void 0, function* () {
16
- const encoder = new TextEncoder();
17
- const data = encoder.encode(message);
18
- const hash = yield this.crypto.subtle.digest(algorithm, data);
19
- return this.toHex(hash);
20
- });
21
- }
22
- }
23
- WebCryptoService.ɵprov = i0.ɵɵdefineInjectable({ factory: function WebCryptoService_Factory() { return new WebCryptoService(); }, token: WebCryptoService, providedIn: "root" });
24
- WebCryptoService.decorators = [
25
- { type: Injectable, args: [{
26
- providedIn: 'root',
27
- },] }
28
- ];
29
- //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoid2ViLWNyeXB0by5zZXJ2aWNlLmpzIiwic291cmNlUm9vdCI6Ii9vcHQvYXRsYXNzaWFuL3BpcGVsaW5lcy9hZ2VudC9idWlsZC9wcm9qZWN0cy9jb3JlL3NyYy8iLCJzb3VyY2VzIjpbImxpYi9jcnlwdG9ncmFwaHkvd2ViLWNyeXB0by5zZXJ2aWNlLnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiI7QUFBQSxPQUFPLEVBQUUsVUFBVSxFQUFFLE1BQU0sZUFBZSxDQUFDOztBQUszQyxNQUFNLE9BQU8sZ0JBQWdCO0lBSDdCO1FBSUUsV0FBTSxHQUFXLE1BQU0sQ0FBQyxNQUFNLENBQUM7S0FlaEM7SUFiQyxLQUFLLENBQUMsTUFBbUI7UUFDdkIsNEVBQTRFO1FBQzVFLE1BQU0sS0FBSyxHQUFHLEtBQUssQ0FBQyxJQUFJLENBQUMsSUFBSSxVQUFVLENBQUMsTUFBTSxDQUFDLENBQUMsQ0FBQyxDQUFDLCtCQUErQjtRQUNqRixNQUFNLEdBQUcsR0FBRyxLQUFLLENBQUMsR0FBRyxDQUFDLENBQUMsQ0FBQyxFQUFFLEVBQUUsQ0FBQyxDQUFDLENBQUMsUUFBUSxDQUFDLEVBQUUsQ0FBQyxDQUFDLFFBQVEsQ0FBQyxDQUFDLEVBQUUsR0FBRyxDQUFDLENBQUMsQ0FBQyxJQUFJLENBQUMsRUFBRSxDQUFDLENBQUMsQ0FBQyw4QkFBOEI7UUFDdEcsT0FBTyxHQUFHLENBQUM7SUFDYixDQUFDO0lBRUssWUFBWSxDQUFDLFNBQWlCLEVBQUUsT0FBZTs7WUFDbkQsTUFBTSxPQUFPLEdBQUcsSUFBSSxXQUFXLEVBQUUsQ0FBQztZQUNsQyxNQUFNLElBQUksR0FBRyxPQUFPLENBQUMsTUFBTSxDQUFDLE9BQU8sQ0FBQyxDQUFDO1lBQ3JDLE1BQU0sSUFBSSxHQUFHLE1BQU0sSUFBSSxDQUFDLE1BQU0sQ0FBQyxNQUFNLENBQUMsTUFBTSxDQUFDLFNBQVMsRUFBRSxJQUFJLENBQUMsQ0FBQztZQUM5RCxPQUFPLElBQUksQ0FBQyxLQUFLLENBQUMsSUFBSSxDQUFDLENBQUM7UUFDMUIsQ0FBQztLQUFBOzs7O1lBbEJGLFVBQVUsU0FBQztnQkFDVixVQUFVLEVBQUUsTUFBTTthQUNuQiIsInNvdXJjZXNDb250ZW50IjpbImltcG9ydCB7IEluamVjdGFibGUgfSBmcm9tICdAYW5ndWxhci9jb3JlJztcblxuQEluamVjdGFibGUoe1xuICBwcm92aWRlZEluOiAncm9vdCcsXG59KVxuZXhwb3J0IGNsYXNzIFdlYkNyeXB0b1NlcnZpY2Uge1xuICBjcnlwdG86IENyeXB0byA9IHdpbmRvdy5jcnlwdG87XG5cbiAgdG9IZXgoYnVmZmVyOiBBcnJheUJ1ZmZlcikge1xuICAgIC8vIFJlZjogaHR0cHM6Ly9kZXZlbG9wZXIubW96aWxsYS5vcmcvZW4tVVMvZG9jcy9XZWIvQVBJL1N1YnRsZUNyeXB0by9kaWdlc3RcbiAgICBjb25zdCBhcnJheSA9IEFycmF5LmZyb20obmV3IFVpbnQ4QXJyYXkoYnVmZmVyKSk7IC8vIGNvbnZlcnQgYnVmZmVyIHRvIGJ5dGUgYXJyYXlcbiAgICBjb25zdCBoZXggPSBhcnJheS5tYXAoKGIpID0+IGIudG9TdHJpbmcoMTYpLnBhZFN0YXJ0KDIsICcwJykpLmpvaW4oJycpOyAvLyBjb252ZXJ0IGJ5dGVzIHRvIGhleCBzdHJpbmdcbiAgICByZXR1cm4gaGV4O1xuICB9XG5cbiAgYXN5bmMgc3RyaW5nRGlnZXN0KGFsZ29yaXRobTogc3RyaW5nLCBtZXNzYWdlOiBzdHJpbmcpOiBQcm9taXNlPHN0cmluZz4ge1xuICAgIGNvbnN0IGVuY29kZXIgPSBuZXcgVGV4dEVuY29kZXIoKTtcbiAgICBjb25zdCBkYXRhID0gZW5jb2Rlci5lbmNvZGUobWVzc2FnZSk7XG4gICAgY29uc3QgaGFzaCA9IGF3YWl0IHRoaXMuY3J5cHRvLnN1YnRsZS5kaWdlc3QoYWxnb3JpdGhtLCBkYXRhKTtcbiAgICByZXR1cm4gdGhpcy50b0hleChoYXNoKTtcbiAgfVxufVxuIl19
@@ -1,22 +0,0 @@
1
- import { gqlTyped } from '../_common/ast';
2
- export const TpsKeysQuery = gqlTyped `
3
- query TpsKeysQuery($ids: [ID]) {
4
- tps(id_In: $ids) {
5
- edges {
6
- node {
7
- id
8
- currentUserSharedKey {
9
- userSharedKey {
10
- sharedKey {
11
- id
12
- }
13
- mkSharedKey {
14
- id
15
- }
16
- }
17
- }
18
- }
19
- }
20
- }
21
- }`;
22
- //# sourceMappingURL=data:application/json;base64,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