@lifeready/core 1.0.21 → 1.0.23
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/bundles/lifeready-core.umd.js +10612 -10527
- package/bundles/lifeready-core.umd.js.map +1 -1
- package/bundles/lifeready-core.umd.min.js +1 -15
- package/bundles/lifeready-core.umd.min.js.map +1 -1
- package/esm2015/lib/_common/ast.js +2 -1
- package/esm2015/lib/_common/deferred-promise.js +1 -1
- package/esm2015/lib/_common/exceptions.js +1 -1
- package/esm2015/lib/_common/queries.gql.js +1 -1
- package/esm2015/lib/_common/run-outside-angular.js +3 -2
- package/esm2015/lib/_common/types.js +2 -1
- package/esm2015/lib/_common/utils.js +2 -1
- package/esm2015/lib/api/lr-apollo.service.js +4 -3
- package/esm2015/lib/api/lr-graphql/index.js +1 -1
- package/esm2015/lib/api/lr-graphql/lr-graphql.service.js +9 -8
- package/esm2015/lib/api/lr-graphql/lr-merged-mutation.js +5 -6
- package/esm2015/lib/api/lr-graphql/lr-mutation-base.js +1 -1
- package/esm2015/lib/api/lr-graphql/lr-mutation.js +3 -3
- package/esm2015/lib/api/lr-graphql/lr.service.js +1 -1
- package/esm2015/lib/api/query-processor/common-processors.service.js +4 -3
- package/esm2015/lib/api/query-processor/index.js +1 -1
- package/esm2015/lib/api/query-processor/query-processor.service.js +5 -4
- package/esm2015/lib/api/query-processor/tp-password-reset-processor.service.js +8 -7
- package/esm2015/lib/api/types/graphql.types.js +2 -1
- package/esm2015/lib/api/types/index.js +1 -1
- package/esm2015/lib/api/types/lr-graphql.types.js +1 -1
- package/esm2015/lib/auth/auth.config.js +1 -1
- package/esm2015/lib/auth/auth.gql.js +1 -28
- package/esm2015/lib/auth/auth.types.js +1 -1
- package/esm2015/lib/auth/life-ready-auth.service.js +36 -32
- package/esm2015/lib/category/category-meta.service.js +1 -1
- package/esm2015/lib/category/category.gql.js +3 -2
- package/esm2015/lib/category/category.service.js +9 -8
- package/esm2015/lib/category/category.types.js +1 -1
- package/esm2015/lib/contact-card/contact-card.gql.js +79 -0
- package/esm2015/lib/contact-card/contact-card.service.js +156 -0
- package/esm2015/lib/contact-card/contact-card2.gql.js +29 -0
- package/esm2015/lib/contact-card/contact-card2.service.js +103 -0
- package/esm2015/lib/encryption/encryption.service.js +190 -0
- package/esm2015/lib/file-upload/file-upload.service.js +74 -0
- package/esm2015/lib/file-upload/file-upload.types.js +2 -0
- package/esm2015/lib/idle/idle.service.js +168 -0
- package/esm2015/lib/idle/idle.types.js +7 -0
- package/esm2015/lib/item2/item2.gql.js +127 -0
- package/esm2015/lib/item2/item2.gql.private.js +23 -0
- package/esm2015/lib/item2/item2.service.js +519 -0
- package/esm2015/lib/item2/item2.types.js +2 -0
- package/esm2015/lib/key/key-factory.service.js +237 -0
- package/esm2015/lib/key/key-graph.service.js +300 -0
- package/esm2015/lib/key/key-meta.service.js +201 -0
- package/esm2015/lib/{cryptography → key}/key.service.js +4 -4
- package/esm2015/lib/key/key.types.js +11 -0
- package/esm2015/lib/key-exchange/key-exchange.gql.js +188 -0
- package/esm2015/lib/key-exchange/key-exchange.service.js +441 -0
- package/esm2015/lib/key-exchange/key-exchange.types.js +7 -0
- package/esm2015/lib/key-exchange/key-exchange2.gql.js +171 -0
- package/esm2015/lib/key-exchange/key-exchange2.service.js +500 -0
- package/esm2015/lib/lbop/lbop.service.js +357 -0
- package/esm2015/lib/life-ready.config.js +2 -1
- package/esm2015/lib/life-ready.module.js +2 -27
- package/esm2015/lib/lock/lock.gql.js +40 -0
- package/esm2015/lib/lock/lock.service.js +64 -0
- package/esm2015/lib/message/message.gql.js +32 -0
- package/esm2015/lib/message/message.service.js +118 -0
- package/esm2015/lib/message/message.types.js +2 -0
- package/esm2015/lib/notification/notification.gql.js +1 -1
- package/esm2015/lib/notification/notification.service.js +2 -2
- package/esm2015/lib/password/password.gql.js +28 -0
- package/esm2015/lib/password/password.service.js +316 -0
- package/esm2015/lib/persist/persist.service.js +181 -0
- package/esm2015/lib/plan/plan.gql.js +1 -1
- package/esm2015/lib/plan/plan.service.js +3 -2
- package/esm2015/lib/plan/plan.types.js +1 -1
- package/esm2015/lib/profile/profile-details.service.js +215 -0
- package/esm2015/lib/profile/profile.gql.js +98 -0
- package/esm2015/lib/profile/profile.service.js +170 -0
- package/esm2015/lib/profile/profile.types.js +34 -0
- package/esm2015/lib/record/record-attachment.service.js +16 -15
- package/esm2015/lib/record/record.gql.js +1 -1
- package/esm2015/lib/record/record.service.js +8 -8
- package/esm2015/lib/record/record.types.js +1 -1
- package/esm2015/lib/record-type/record-type.service.js +1 -1
- package/esm2015/lib/record-type/record-type.types.js +1 -1
- package/esm2015/lib/register/register.service.js +173 -0
- package/esm2015/lib/scenario/scenario.constants.js +1 -1
- package/esm2015/lib/scenario/scenario.controller.js +2 -2
- package/esm2015/lib/scenario/scenario.gql.js +1 -1
- package/esm2015/lib/scenario/scenario.private.gql.js +198 -0
- package/esm2015/lib/scenario/scenario.service.js +19 -17
- package/esm2015/lib/scenario/scenario.types.js +2 -1
- package/esm2015/lib/shared-contact-card/shared-contact-card.service.js +119 -0
- package/esm2015/lib/shared-contact-card/shared-contact-card2.gql.js +41 -0
- package/esm2015/lib/shared-contact-card/shared-contact-card2.service.js +117 -0
- package/esm2015/lib/slip39/slip39.service.js +167 -0
- package/esm2015/lib/time/time.service.js +146 -0
- package/esm2015/lib/tp-assembly/tp-assembly.js +365 -0
- package/esm2015/lib/tp-assembly/tp-assembly.private.gql.js +22 -0
- package/esm2015/lib/tp-assembly/tp-assembly.types.js +2 -0
- package/esm2015/lib/tp-password-reset/tp-password-reset-request.service.js +100 -0
- package/esm2015/lib/tp-password-reset/tp-password-reset-user.service.js +118 -0
- package/esm2015/lib/tp-password-reset/tp-password-reset.constants.js +4 -0
- package/esm2015/lib/tp-password-reset/tp-password-reset.controller.js +34 -0
- package/esm2015/lib/tp-password-reset/tp-password-reset.gql.js +74 -0
- package/esm2015/lib/tp-password-reset/tp-password-reset.private.gql.js +165 -0
- package/esm2015/lib/tp-password-reset/tp-password-reset.private.service.js +54 -0
- package/esm2015/lib/tp-password-reset/tp-password-reset.service.js +92 -0
- package/esm2015/lib/tp-password-reset/tp-password-reset.types.js +2 -0
- package/esm2015/lib/trusted-party/trusted-party.gql.js +148 -0
- package/esm2015/lib/trusted-party/trusted-party.service.js +327 -0
- package/esm2015/lib/trusted-party/trusted-party.types.js +41 -0
- package/esm2015/lib/trusted-party/trusted-party2.gql.js +64 -0
- package/esm2015/lib/trusted-party/trusted-party2.gql.private.js +25 -0
- package/esm2015/lib/trusted-party/trusted-party2.service.js +224 -0
- package/esm2015/lib/trusted-party/trusted-party2.types.js +2 -0
- package/esm2015/lib/two-factor/two-factor.service.js +74 -0
- package/esm2015/lib/user/user.gql.js +60 -0
- package/esm2015/lib/user/user.service.js +80 -0
- package/esm2015/lib/user/user.types.js +2 -0
- package/esm2015/lib/web-crypto/web-crypto.service.js +29 -0
- package/esm2015/lifeready-core.js +15 -13
- package/esm2015/public-api.js +49 -51
- package/fesm2015/lifeready-core.js +8764 -8737
- package/fesm2015/lifeready-core.js.map +1 -1
- package/lib/_common/types.d.ts +3 -1
- package/lib/_common/utils.d.ts +2 -2
- package/lib/api/lr-apollo.service.d.ts +2 -2
- package/lib/api/lr-graphql/lr-graphql.service.d.ts +26 -8
- package/lib/api/lr-graphql/lr-merged-mutation.d.ts +22 -4
- package/lib/api/lr-graphql/lr-mutation.d.ts +1 -2
- package/lib/api/query-processor/common-processors.service.d.ts +1 -1
- package/lib/api/query-processor/query-processor.service.d.ts +1 -1
- package/lib/api/query-processor/tp-password-reset-processor.service.d.ts +2 -2
- package/lib/api/types/lr-graphql.types.d.ts +14 -3
- package/lib/auth/auth.gql.d.ts +0 -3
- package/lib/auth/auth.types.d.ts +5 -5
- package/lib/auth/life-ready-auth.service.d.ts +13 -13
- package/lib/category/category.gql.d.ts +1 -1
- package/lib/category/category.service.d.ts +3 -3
- package/lib/{api → contact-card}/contact-card.service.d.ts +9 -9
- package/lib/contact-card/contact-card2.gql.d.ts +25 -0
- package/lib/contact-card/contact-card2.service.d.ts +64 -0
- package/lib/{cryptography → encryption}/encryption.service.d.ts +10 -9
- package/lib/{api/file.service.d.ts → file-upload/file-upload.service.d.ts} +5 -8
- package/lib/file-upload/file-upload.types.d.ts +5 -0
- package/lib/{auth → idle}/idle.service.d.ts +6 -6
- package/lib/{items2 → item2}/item2.gql.d.ts +16 -16
- package/lib/{items2 → item2}/item2.service.d.ts +34 -35
- package/lib/{cryptography → key}/key-factory.service.d.ts +4 -3
- package/lib/{cryptography → key}/key-graph.service.d.ts +6 -6
- package/lib/{cryptography → key}/key-meta.service.d.ts +1 -1
- package/lib/{cryptography → key}/key.service.d.ts +2 -2
- package/lib/{cryptography/cryptography.types.d.ts → key/key.types.d.ts} +13 -17
- package/lib/{api → key-exchange}/key-exchange.service.d.ts +5 -5
- package/lib/{api → key-exchange}/key-exchange.types.d.ts +4 -4
- package/lib/{api → key-exchange}/key-exchange2.gql.d.ts +1 -1
- package/lib/{api → key-exchange}/key-exchange2.service.d.ts +82 -29
- package/lib/{auth → lbop}/lbop.service.d.ts +7 -7
- package/lib/life-ready.config.d.ts +1 -1
- package/lib/{api → lock}/lock.gql.d.ts +1 -1
- package/lib/{api → lock}/lock.service.d.ts +1 -1
- package/lib/message/message.gql.d.ts +13 -0
- package/lib/message/message.service.d.ts +36 -0
- package/lib/message/message.types.d.ts +12 -0
- package/lib/notification/notification.service.d.ts +3 -2
- package/lib/password/password.gql.d.ts +3 -0
- package/lib/{auth → password}/password.service.d.ts +9 -9
- package/lib/{api → persist}/persist.service.d.ts +3 -3
- package/lib/plan/plan.service.d.ts +3 -2
- package/lib/plan/plan.types.d.ts +2 -1
- package/lib/{users → profile}/profile-details.service.d.ts +3 -3
- package/lib/{users → profile}/profile.gql.d.ts +2 -2
- package/lib/{users → profile}/profile.service.d.ts +6 -6
- package/lib/{users → profile}/profile.types.d.ts +3 -2
- package/lib/record/record-attachment.service.d.ts +6 -6
- package/lib/record/record.service.d.ts +3 -3
- package/lib/{auth → register}/register.service.d.ts +4 -4
- package/lib/scenario/scenario.controller.d.ts +1 -1
- package/lib/scenario/scenario.service.d.ts +105 -5
- package/lib/scenario/scenario.types.d.ts +1 -1
- package/lib/{api → shared-contact-card}/shared-contact-card.service.d.ts +9 -9
- package/lib/{api → shared-contact-card}/shared-contact-card2.gql.d.ts +1 -1
- package/lib/{api → shared-contact-card}/shared-contact-card2.service.d.ts +6 -6
- package/lib/{cryptography → slip39}/slip39.service.d.ts +0 -1
- package/lib/{trusted-parties → tp-assembly}/tp-assembly.d.ts +7 -7
- package/lib/{trusted-parties → tp-assembly}/tp-assembly.types.d.ts +3 -3
- package/lib/{trusted-parties → tp-password-reset}/tp-password-reset-request.service.d.ts +5 -9
- package/lib/{trusted-parties → tp-password-reset}/tp-password-reset-user.service.d.ts +7 -13
- package/lib/{trusted-parties → tp-password-reset}/tp-password-reset.controller.d.ts +1 -1
- package/lib/tp-password-reset/tp-password-reset.gql.d.ts +63 -0
- package/lib/{trusted-parties/tp-password-reset.gql.d.ts → tp-password-reset/tp-password-reset.private.gql.d.ts} +1 -63
- package/lib/tp-password-reset/tp-password-reset.private.service.d.ts +59 -0
- package/lib/{trusted-parties → tp-password-reset}/tp-password-reset.service.d.ts +6 -89
- package/lib/tp-password-reset/tp-password-reset.types.d.ts +40 -0
- package/lib/{trusted-parties → trusted-party}/trusted-party.service.d.ts +7 -7
- package/lib/{trusted-parties → trusted-party}/trusted-party.types.d.ts +2 -3
- package/lib/{trusted-parties → trusted-party}/trusted-party2.gql.d.ts +0 -22
- package/lib/trusted-party/trusted-party2.gql.private.d.ts +23 -0
- package/lib/{trusted-parties → trusted-party}/trusted-party2.service.d.ts +11 -35
- package/lib/trusted-party/trusted-party2.types.d.ts +12 -0
- package/lib/{users → user}/user.gql.d.ts +1 -1
- package/lib/{users → user}/user.service.d.ts +1 -1
- package/lib/{users → user}/user.types.d.ts +1 -1
- package/lifeready-core.d.ts +14 -12
- package/lifeready-core.metadata.json +1 -1
- package/package.json +2 -2
- package/public-api.d.ts +48 -50
- package/esm2015/lib/api/contact-card.gql.js +0 -79
- package/esm2015/lib/api/contact-card.service.js +0 -154
- package/esm2015/lib/api/contact-card2.gql.js +0 -60
- package/esm2015/lib/api/contact-card2.service.js +0 -103
- package/esm2015/lib/api/file.service.js +0 -74
- package/esm2015/lib/api/key-exchange.gql.js +0 -188
- package/esm2015/lib/api/key-exchange.service.js +0 -442
- package/esm2015/lib/api/key-exchange.types.js +0 -7
- package/esm2015/lib/api/key-exchange2.gql.js +0 -171
- package/esm2015/lib/api/key-exchange2.service.js +0 -480
- package/esm2015/lib/api/lock.gql.js +0 -40
- package/esm2015/lib/api/lock.service.js +0 -64
- package/esm2015/lib/api/message.service.js +0 -138
- package/esm2015/lib/api/persist.service.js +0 -181
- package/esm2015/lib/api/shared-contact-card.service.js +0 -119
- package/esm2015/lib/api/shared-contact-card2.gql.js +0 -41
- package/esm2015/lib/api/shared-contact-card2.service.js +0 -117
- package/esm2015/lib/api/time.service.js +0 -146
- package/esm2015/lib/auth/idle.service.js +0 -168
- package/esm2015/lib/auth/idle.types.js +0 -7
- package/esm2015/lib/auth/lbop.service.js +0 -355
- package/esm2015/lib/auth/password.service.js +0 -315
- package/esm2015/lib/auth/register.service.js +0 -172
- package/esm2015/lib/auth/two-factor.service.js +0 -74
- package/esm2015/lib/cryptography/cryptography.types.js +0 -11
- package/esm2015/lib/cryptography/encryption.service.js +0 -189
- package/esm2015/lib/cryptography/key-factory.service.js +0 -237
- package/esm2015/lib/cryptography/key-graph.service.js +0 -299
- package/esm2015/lib/cryptography/key-meta.service.js +0 -200
- package/esm2015/lib/cryptography/slip39.service.js +0 -169
- package/esm2015/lib/cryptography/web-crypto.service.js +0 -29
- package/esm2015/lib/items2/item2.gql.js +0 -127
- package/esm2015/lib/items2/item2.gql.private.js +0 -23
- package/esm2015/lib/items2/item2.service.js +0 -516
- package/esm2015/lib/items2/item2.types.js +0 -1
- package/esm2015/lib/scenario/scenario.gql.private.js +0 -198
- package/esm2015/lib/trusted-parties/tp-assembly.gql.private.js +0 -22
- package/esm2015/lib/trusted-parties/tp-assembly.js +0 -365
- package/esm2015/lib/trusted-parties/tp-assembly.types.js +0 -1
- package/esm2015/lib/trusted-parties/tp-password-reset-request.service.js +0 -113
- package/esm2015/lib/trusted-parties/tp-password-reset-user.service.js +0 -129
- package/esm2015/lib/trusted-parties/tp-password-reset.constants.js +0 -4
- package/esm2015/lib/trusted-parties/tp-password-reset.controller.js +0 -34
- package/esm2015/lib/trusted-parties/tp-password-reset.gql.js +0 -237
- package/esm2015/lib/trusted-parties/tp-password-reset.service.js +0 -95
- package/esm2015/lib/trusted-parties/trusted-party.gql.js +0 -148
- package/esm2015/lib/trusted-parties/trusted-party.service.js +0 -326
- package/esm2015/lib/trusted-parties/trusted-party.types.js +0 -41
- package/esm2015/lib/trusted-parties/trusted-party2.gql.js +0 -87
- package/esm2015/lib/trusted-parties/trusted-party2.service.js +0 -218
- package/esm2015/lib/users/profile-details.service.js +0 -214
- package/esm2015/lib/users/profile.gql.js +0 -97
- package/esm2015/lib/users/profile.service.js +0 -169
- package/esm2015/lib/users/profile.types.js +0 -34
- package/esm2015/lib/users/user.gql.js +0 -60
- package/esm2015/lib/users/user.service.js +0 -79
- package/esm2015/lib/users/user.types.js +0 -1
- package/lib/api/contact-card2.gql.d.ts +0 -34
- package/lib/api/contact-card2.service.d.ts +0 -50
- package/lib/api/message.service.d.ts +0 -59
- /package/lib/{api → contact-card}/contact-card.gql.d.ts +0 -0
- /package/lib/{auth → idle}/idle.types.d.ts +0 -0
- /package/lib/{items2 → item2}/item2.gql.private.d.ts +0 -0
- /package/lib/{items2 → item2}/item2.types.d.ts +0 -0
- /package/lib/{api → key-exchange}/key-exchange.gql.d.ts +0 -0
- /package/lib/scenario/{scenario.gql.private.d.ts → scenario.private.gql.d.ts} +0 -0
- /package/lib/{api → time}/time.service.d.ts +0 -0
- /package/lib/{trusted-parties/tp-assembly.gql.private.d.ts → tp-assembly/tp-assembly.private.gql.d.ts} +0 -0
- /package/lib/{trusted-parties → tp-password-reset}/tp-password-reset.constants.d.ts +0 -0
- /package/lib/{trusted-parties → trusted-party}/trusted-party.gql.d.ts +0 -0
- /package/lib/{auth → two-factor}/two-factor.service.d.ts +0 -0
- /package/lib/{cryptography → web-crypto}/web-crypto.service.d.ts +0 -0
|
@@ -0,0 +1,316 @@
|
|
|
1
|
+
import { __awaiter } from "tslib";
|
|
2
|
+
import { HttpClient } from '@angular/common/http';
|
|
3
|
+
import { Inject, Injectable } from '@angular/core';
|
|
4
|
+
import { AuthClass } from '@aws-amplify/auth/lib-esm/Auth';
|
|
5
|
+
import * as moment_ from 'moment';
|
|
6
|
+
import { EncryptionService } from '../encryption/encryption.service';
|
|
7
|
+
import { IdleService } from '../idle/idle.service';
|
|
8
|
+
import { KeyFactoryService as KFS } from '../key/key-factory.service';
|
|
9
|
+
import { KeyGraphService } from '../key/key-graph.service';
|
|
10
|
+
import { LR_CONFIG } from '../life-ready.config';
|
|
11
|
+
import { ProfileService } from '../profile/profile.service';
|
|
12
|
+
import { WebCryptoService } from '../web-crypto/web-crypto.service';
|
|
13
|
+
import { LrAuthException } from '../_common/exceptions';
|
|
14
|
+
import { LrApolloService } from './../api/lr-apollo.service';
|
|
15
|
+
import { PasswordChangeConfigQuery, PasswordChangeMutation, PasswordChangeRequestMutation, } from './password.gql';
|
|
16
|
+
import * as i0 from "@angular/core";
|
|
17
|
+
import * as i1 from "../life-ready.config";
|
|
18
|
+
import * as i2 from "@angular/common/http";
|
|
19
|
+
import * as i3 from "../api/lr-apollo.service";
|
|
20
|
+
import * as i4 from "@aws-amplify/auth/lib-esm/Auth";
|
|
21
|
+
import * as i5 from "../profile/profile.service";
|
|
22
|
+
import * as i6 from "../key/key-factory.service";
|
|
23
|
+
import * as i7 from "../encryption/encryption.service";
|
|
24
|
+
import * as i8 from "../key/key-graph.service";
|
|
25
|
+
import * as i9 from "../web-crypto/web-crypto.service";
|
|
26
|
+
import * as i10 from "../idle/idle.service";
|
|
27
|
+
// "why?" you ask: https://stackoverflow.com/questions/59735280/angular-8-moment-error-cannot-call-a-namespace-moment
|
|
28
|
+
const moment = moment_;
|
|
29
|
+
export class PasswordCheck {
|
|
30
|
+
}
|
|
31
|
+
export class PasswordService {
|
|
32
|
+
constructor(config, http, apollo, auth, profileService, keyFactory, encryptionService, keyGraph, webCryptoService, idleService) {
|
|
33
|
+
this.config = config;
|
|
34
|
+
this.http = http;
|
|
35
|
+
this.apollo = apollo;
|
|
36
|
+
this.auth = auth;
|
|
37
|
+
this.profileService = profileService;
|
|
38
|
+
this.keyFactory = keyFactory;
|
|
39
|
+
this.encryptionService = encryptionService;
|
|
40
|
+
this.keyGraph = keyGraph;
|
|
41
|
+
this.webCryptoService = webCryptoService;
|
|
42
|
+
this.idleService = idleService;
|
|
43
|
+
this.CLIENT_NONCE_LENGTH = 32;
|
|
44
|
+
}
|
|
45
|
+
checkPassword(password) {
|
|
46
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
47
|
+
const { years } = this.passwordStrength(password);
|
|
48
|
+
return {
|
|
49
|
+
length: password.length,
|
|
50
|
+
timeToCrack: moment.duration({ years }),
|
|
51
|
+
passwordExposed: yield this.getExposureCount(password),
|
|
52
|
+
};
|
|
53
|
+
});
|
|
54
|
+
}
|
|
55
|
+
getExposureCount(password) {
|
|
56
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
57
|
+
const sha1Password = yield this.webCryptoService.stringDigest('SHA-1', password);
|
|
58
|
+
const first5sha1 = sha1Password.substring(0, 5);
|
|
59
|
+
const response = yield this.http
|
|
60
|
+
.get(`https://api.pwnedpasswords.com/range/${first5sha1}`, {
|
|
61
|
+
responseType: 'text',
|
|
62
|
+
})
|
|
63
|
+
.toPromise();
|
|
64
|
+
const results = new RegExp(`^(?:${sha1Password.substring(5)}:)(?<count>\\d+)$`, 'im').exec(response);
|
|
65
|
+
if (results) {
|
|
66
|
+
return +results.groups.count;
|
|
67
|
+
}
|
|
68
|
+
return 0;
|
|
69
|
+
});
|
|
70
|
+
}
|
|
71
|
+
getPassIdpString(passIdp) {
|
|
72
|
+
return passIdp.toJSON(true).k;
|
|
73
|
+
}
|
|
74
|
+
createPassKeyBundle(password) {
|
|
75
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
76
|
+
const passIdpParams = yield this.keyFactory.createPassIdpParams();
|
|
77
|
+
const passIdp = (yield this.keyFactory.derivePassIdp(Object.assign({ password }, passIdpParams))).jwk;
|
|
78
|
+
const passKeyParams = yield this.keyFactory.createPassKeyParams();
|
|
79
|
+
const passKey = (yield this.keyFactory.derivePassKey(Object.assign({ password }, passKeyParams))).jwk;
|
|
80
|
+
const passIdpVerifier = yield this.keyFactory.createPkcSignKey();
|
|
81
|
+
const wrappedPassIdpVerifierPrk = yield this.encryptionService.encrypt(passKey, passIdpVerifier.toJSON(true));
|
|
82
|
+
// There are two formats that the private key can be represented in JWK:
|
|
83
|
+
// https://tools.ietf.org/html/rfc8017#page-9
|
|
84
|
+
// The second form is an optimization:
|
|
85
|
+
// https://crypto.stackexchange.com/questions/19413/what-are-dp-and-dq-in-encryption-by-rsa-in-c
|
|
86
|
+
return {
|
|
87
|
+
passKeyParams,
|
|
88
|
+
passKey,
|
|
89
|
+
passIdpParams,
|
|
90
|
+
passIdp,
|
|
91
|
+
passIdpVerifier,
|
|
92
|
+
wrappedPassIdpVerifierPrk,
|
|
93
|
+
};
|
|
94
|
+
});
|
|
95
|
+
}
|
|
96
|
+
/**
|
|
97
|
+
* We need to allow for interruption of the process at any point. Each API call can be considered
|
|
98
|
+
* atomic and either succeeds or fails.
|
|
99
|
+
*
|
|
100
|
+
* The LR server APIs use semaphore tokens for locking critical operations, so concurrent calls will
|
|
101
|
+
* fail.
|
|
102
|
+
*
|
|
103
|
+
* We assume the worst case for IdP API calls. So we use the semaphore token from LR to prevent
|
|
104
|
+
* concurrent calls to IdP APIs, but we have to assume that the IdP API calls will either succeed or
|
|
105
|
+
* fail within a reasonable amount of time.
|
|
106
|
+
*
|
|
107
|
+
* Each location where the server state changes can be a potential point of interruption.
|
|
108
|
+
* Potential points of interruption are marked with: --Potential Failure Point--
|
|
109
|
+
*
|
|
110
|
+
* Places for timeout:
|
|
111
|
+
* - Login age too old at call to: verifyPassword()
|
|
112
|
+
* - Login age too old at call to: changePasswordMutation()
|
|
113
|
+
* - Semaphore token expires at call to: changePasswordComplete()
|
|
114
|
+
*
|
|
115
|
+
* Tests:
|
|
116
|
+
* - Potential Failure Point 1: should be able to restart the process, user remains signed in.
|
|
117
|
+
* - Potential Failure Point 2: should enter recovery flow
|
|
118
|
+
* - Potential Failure Point 3: should enter recovery flow
|
|
119
|
+
* - Potential Failure Point 4: should enter recovery flow
|
|
120
|
+
*
|
|
121
|
+
*/
|
|
122
|
+
isLoginRequired() {
|
|
123
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
124
|
+
const changePasswordConfig = yield this.getChangePasswordConfig();
|
|
125
|
+
const authTime = moment(changePasswordConfig.authTime);
|
|
126
|
+
const serverTime = moment(changePasswordConfig.serverTime);
|
|
127
|
+
const duration = moment.duration(serverTime.diff(authTime));
|
|
128
|
+
const seconds = duration.asSeconds();
|
|
129
|
+
if (seconds > changePasswordConfig.maxAuthAgeSeconds) {
|
|
130
|
+
return true;
|
|
131
|
+
}
|
|
132
|
+
else {
|
|
133
|
+
return false;
|
|
134
|
+
}
|
|
135
|
+
});
|
|
136
|
+
}
|
|
137
|
+
changePassword(password, newPassword) {
|
|
138
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
139
|
+
const cognitoUser = yield this.auth.currentAuthenticatedUser();
|
|
140
|
+
// Not checking that passwords are different. It makes it easier to test.
|
|
141
|
+
const { currentUser } = yield this.profileService.getCurrentUser();
|
|
142
|
+
const { passIdp, signedChallenge } = yield this.verifyPassword(password, currentUser);
|
|
143
|
+
// --Potential Failure Point 1--
|
|
144
|
+
// verifyPassword() asks for a current password challenge hence changes server state.
|
|
145
|
+
// Place break points here to test the failure scenarios.
|
|
146
|
+
// Generate the new passIdp
|
|
147
|
+
const newPassKey = yield this.createPassKeyBundle(newPassword);
|
|
148
|
+
// Re-encrypt master key with new key
|
|
149
|
+
const masterKey = yield this.keyGraph.getKey(currentUser.currentUserKey.masterKey.id);
|
|
150
|
+
const newWrappedMasterKey = yield this.encryptionService.encrypt(newPassKey.passKey, masterKey.jwk.toJSON(true));
|
|
151
|
+
// If the IdP change password failed, we need to go into recovery mode by forcing
|
|
152
|
+
// a login. We can't logout the user just yet since the IdP password change needs
|
|
153
|
+
// the user to be logged in. We _can_ removed any persisted session values for the IdP
|
|
154
|
+
// but that seems like too much trouble.
|
|
155
|
+
const { token } = yield this.changePasswordMutation(signedChallenge, currentUser.currentUserKey.masterKey.id, newWrappedMasterKey, newPassKey);
|
|
156
|
+
// --Potential Failure Point 2--
|
|
157
|
+
// changePasswordMutation() uploads new keys and obtains a semaphore lock to prevent any other
|
|
158
|
+
// clients from performing IdP password change.
|
|
159
|
+
// Now we can do the IdP password change.
|
|
160
|
+
// todo: Add this back in
|
|
161
|
+
yield this.auth.changePassword(cognitoUser, this.getPassIdpString(passIdp), this.getPassIdpString(newPassKey.passIdp));
|
|
162
|
+
// --Potential Failure Point 3--
|
|
163
|
+
// IdP password change
|
|
164
|
+
// Note that changePassword() could throw an exception for a number of reason. It could throw
|
|
165
|
+
// a network timeout for example. But we don't know if it's the response that timed out and
|
|
166
|
+
// the idp password change was actually carried out. So we have to be extra conservative and
|
|
167
|
+
// only act on a clear success. Otherwise we go into recover mode.
|
|
168
|
+
yield this.changePasswordComplete(cognitoUser.getSignInUserSession().getAccessToken().getJwtToken(), true, token);
|
|
169
|
+
});
|
|
170
|
+
}
|
|
171
|
+
changePasswordComplete(accessToken, useNewPassword, token = null) {
|
|
172
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
173
|
+
return this.http
|
|
174
|
+
.post(`${this.config.authUrl}users/password-change-complete/`, Object.assign({ use_new_password: useNewPassword }, (token && { token })), {
|
|
175
|
+
headers: {
|
|
176
|
+
Authorization: `Bearer ${accessToken}`,
|
|
177
|
+
},
|
|
178
|
+
})
|
|
179
|
+
.toPromise();
|
|
180
|
+
});
|
|
181
|
+
}
|
|
182
|
+
getVerifierPrK(passKey, wrappedPrK) {
|
|
183
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
184
|
+
try {
|
|
185
|
+
const prkJson = yield this.encryptionService.decrypt(passKey, wrappedPrK);
|
|
186
|
+
return KFS.asKey(prkJson);
|
|
187
|
+
}
|
|
188
|
+
catch (error) {
|
|
189
|
+
throw new LrAuthException('Wrong current password');
|
|
190
|
+
}
|
|
191
|
+
});
|
|
192
|
+
}
|
|
193
|
+
verifyPassword(password, currentUser) {
|
|
194
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
195
|
+
// Get information from the server to prepare for password change.
|
|
196
|
+
const passwordRequest = yield this.apollo.mutate({
|
|
197
|
+
mutation: PasswordChangeRequestMutation,
|
|
198
|
+
variables: {},
|
|
199
|
+
});
|
|
200
|
+
// Get the old passKey so we can decrypt the old password verifier
|
|
201
|
+
const passKeyResult = yield this.keyFactory.derivePassKey(Object.assign({ password }, currentUser.currentUserKey.passKey.passKeyParams));
|
|
202
|
+
const verifierPrK = yield this.getVerifierPrK(passKeyResult.jwk, currentUser.currentUserKey.passKey.wrappedPassIdpVerifierPrk);
|
|
203
|
+
// Sign the server challenge to prove to the server we can decrypt the password verifier.
|
|
204
|
+
// Generate
|
|
205
|
+
const clientNonce = this.keyFactory.randomString(this.CLIENT_NONCE_LENGTH);
|
|
206
|
+
const signedChallenge = yield this.encryptionService.sign(verifierPrK, {
|
|
207
|
+
serverNonce: passwordRequest.passwordChangeRequest.challenge.serverNonce,
|
|
208
|
+
clientNonce,
|
|
209
|
+
});
|
|
210
|
+
const passIdpResult = yield this.keyFactory.derivePassIdp(Object.assign({ password }, currentUser.currentUserKey.passKey.passIdpParams));
|
|
211
|
+
return {
|
|
212
|
+
passIdp: passIdpResult.jwk,
|
|
213
|
+
signedChallenge,
|
|
214
|
+
};
|
|
215
|
+
});
|
|
216
|
+
}
|
|
217
|
+
changePasswordMutation(signedChallenge, masterKeyId, newWrappedMasterKey, passKeyBundle) {
|
|
218
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
219
|
+
const response = yield this.apollo.mutate({
|
|
220
|
+
mutation: PasswordChangeMutation,
|
|
221
|
+
variables: {
|
|
222
|
+
input: {
|
|
223
|
+
signedChallenge: JSON.stringify(signedChallenge),
|
|
224
|
+
masterKeyId,
|
|
225
|
+
newWrappedMasterKey: JSON.stringify(newWrappedMasterKey),
|
|
226
|
+
newPassKey: {
|
|
227
|
+
passIdpParams: JSON.stringify(passKeyBundle.passIdpParams),
|
|
228
|
+
passIdpVerifierPbk: JSON.stringify(passKeyBundle.passIdpVerifier.toJSON()),
|
|
229
|
+
wrappedPassIdpVerifierPrk: JSON.stringify(passKeyBundle.wrappedPassIdpVerifierPrk),
|
|
230
|
+
passKeyParams: JSON.stringify(passKeyBundle.passKeyParams),
|
|
231
|
+
},
|
|
232
|
+
},
|
|
233
|
+
},
|
|
234
|
+
});
|
|
235
|
+
return {
|
|
236
|
+
token: response.passwordChange.token,
|
|
237
|
+
newPassKeyId: response.passwordChange.newPassKey.id,
|
|
238
|
+
};
|
|
239
|
+
});
|
|
240
|
+
}
|
|
241
|
+
getChangePasswordConfig() {
|
|
242
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
243
|
+
// eslint-disable-next-line @typescript-eslint/no-explicit-any
|
|
244
|
+
const res = yield this.apollo.query({
|
|
245
|
+
query: PasswordChangeConfigQuery,
|
|
246
|
+
});
|
|
247
|
+
const ret = res.passwordChangeConfig;
|
|
248
|
+
ret.authTime = new Date(ret.authTime);
|
|
249
|
+
ret.serverTime = new Date(ret.serverTime);
|
|
250
|
+
return ret;
|
|
251
|
+
});
|
|
252
|
+
}
|
|
253
|
+
passwordStrength(password) {
|
|
254
|
+
const upper = /[A-Z]/g;
|
|
255
|
+
const lower = /[a-z]/g;
|
|
256
|
+
const digit = /[0-9]/g;
|
|
257
|
+
const upperChoices = 26;
|
|
258
|
+
const lowerChoices = 26;
|
|
259
|
+
const digitChoices = 10;
|
|
260
|
+
const specialChoices = 30; // /[!"#$%&'()*+,-./:;<=>?@[\]^_`{|}~]/g
|
|
261
|
+
function instanceCount(str, re) {
|
|
262
|
+
return ((str || '').match(re) || []).length;
|
|
263
|
+
}
|
|
264
|
+
const uppers = instanceCount(password, upper);
|
|
265
|
+
const lowers = instanceCount(password, lower);
|
|
266
|
+
const digits = instanceCount(password, digit);
|
|
267
|
+
const specials = password.length - uppers - lowers - digits;
|
|
268
|
+
let choices = 0;
|
|
269
|
+
if (uppers) {
|
|
270
|
+
choices += upperChoices;
|
|
271
|
+
}
|
|
272
|
+
if (lowers) {
|
|
273
|
+
choices += lowerChoices;
|
|
274
|
+
}
|
|
275
|
+
if (digits) {
|
|
276
|
+
choices += digitChoices;
|
|
277
|
+
}
|
|
278
|
+
if (specials) {
|
|
279
|
+
choices += specialChoices;
|
|
280
|
+
}
|
|
281
|
+
if (password.length === 0) {
|
|
282
|
+
return {
|
|
283
|
+
years: 0,
|
|
284
|
+
// bits of entropy
|
|
285
|
+
bits: 0,
|
|
286
|
+
};
|
|
287
|
+
}
|
|
288
|
+
const permutations = Math.pow(choices, password.length);
|
|
289
|
+
const years = (54000 * permutations) /
|
|
290
|
+
Math.pow(upperChoices + lowerChoices + digitChoices, 12);
|
|
291
|
+
return {
|
|
292
|
+
years,
|
|
293
|
+
// bits of entropy
|
|
294
|
+
bits: Math.round(Math.log2(permutations)),
|
|
295
|
+
};
|
|
296
|
+
}
|
|
297
|
+
}
|
|
298
|
+
PasswordService.ɵprov = i0.ɵɵdefineInjectable({ factory: function PasswordService_Factory() { return new PasswordService(i0.ɵɵinject(i1.LR_CONFIG), i0.ɵɵinject(i2.HttpClient), i0.ɵɵinject(i3.LrApolloService), i0.ɵɵinject(i4.AuthClass), i0.ɵɵinject(i5.ProfileService), i0.ɵɵinject(i6.KeyFactoryService), i0.ɵɵinject(i7.EncryptionService), i0.ɵɵinject(i8.KeyGraphService), i0.ɵɵinject(i9.WebCryptoService), i0.ɵɵinject(i10.IdleService)); }, token: PasswordService, providedIn: "root" });
|
|
299
|
+
PasswordService.decorators = [
|
|
300
|
+
{ type: Injectable, args: [{
|
|
301
|
+
providedIn: 'root',
|
|
302
|
+
},] }
|
|
303
|
+
];
|
|
304
|
+
PasswordService.ctorParameters = () => [
|
|
305
|
+
{ type: undefined, decorators: [{ type: Inject, args: [LR_CONFIG,] }] },
|
|
306
|
+
{ type: HttpClient },
|
|
307
|
+
{ type: LrApolloService },
|
|
308
|
+
{ type: AuthClass },
|
|
309
|
+
{ type: ProfileService },
|
|
310
|
+
{ type: KFS },
|
|
311
|
+
{ type: EncryptionService },
|
|
312
|
+
{ type: KeyGraphService },
|
|
313
|
+
{ type: WebCryptoService },
|
|
314
|
+
{ type: IdleService }
|
|
315
|
+
];
|
|
316
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"password.service.js","sourceRoot":"","sources":["../../../../../../projects/core/src/lib/password/password.service.ts"],"names":[],"mappings":";AAAA,OAAO,EAAE,UAAU,EAAE,MAAM,sBAAsB,CAAC;AAClD,OAAO,EAAE,MAAM,EAAE,UAAU,EAAE,MAAM,eAAe,CAAC;AAEnD,OAAO,EAAE,SAAS,EAAE,MAAM,gCAAgC,CAAC;AAC3D,OAAO,KAAK,OAAO,MAAM,QAAQ,CAAC;AAKlC,OAAO,EAAE,iBAAiB,EAAE,MAAM,kCAAkC,CAAC;AACrE,OAAO,EAAE,WAAW,EAAE,MAAM,sBAAsB,CAAC;AACnD,OAAO,EAAE,iBAAiB,IAAI,GAAG,EAAE,MAAM,4BAA4B,CAAC;AACtE,OAAO,EAAE,eAAe,EAAE,MAAM,0BAA0B,CAAC;AAC3D,OAAO,EAAmB,SAAS,EAAE,MAAM,sBAAsB,CAAC;AAClE,OAAO,EAAE,cAAc,EAAE,MAAM,4BAA4B,CAAC;AAE5D,OAAO,EAAE,gBAAgB,EAAE,MAAM,kCAAkC,CAAC;AACpE,OAAO,EAAE,eAAe,EAAE,MAAM,uBAAuB,CAAC;AACxD,OAAO,EAAE,eAAe,EAAE,MAAM,4BAA4B,CAAC;AAC7D,OAAO,EACL,yBAAyB,EACzB,sBAAsB,EACtB,6BAA6B,GAC9B,MAAM,gBAAgB,CAAC;;;;;;;;;;;;AAExB,qHAAqH;AACrH,MAAM,MAAM,GAAG,OAAO,CAAC;AAyBvB,MAAM,OAAO,aAAa;CAIzB;AAKD,MAAM,OAAO,eAAe;IAG1B,YAC6B,MAAuB,EAC1C,IAAgB,EAChB,MAAuB,EACvB,IAAe,EACf,cAA8B,EAC9B,UAAe,EACf,iBAAoC,EACpC,QAAyB,EACzB,gBAAkC,EAClC,WAAwB;QATL,WAAM,GAAN,MAAM,CAAiB;QAC1C,SAAI,GAAJ,IAAI,CAAY;QAChB,WAAM,GAAN,MAAM,CAAiB;QACvB,SAAI,GAAJ,IAAI,CAAW;QACf,mBAAc,GAAd,cAAc,CAAgB;QAC9B,eAAU,GAAV,UAAU,CAAK;QACf,sBAAiB,GAAjB,iBAAiB,CAAmB;QACpC,aAAQ,GAAR,QAAQ,CAAiB;QACzB,qBAAgB,GAAhB,gBAAgB,CAAkB;QAClC,gBAAW,GAAX,WAAW,CAAa;QAZjB,wBAAmB,GAAG,EAAE,CAAC;IAavC,CAAC;IAES,aAAa,CAAC,QAAgB;;YACzC,MAAM,EAAE,KAAK,EAAE,GAAG,IAAI,CAAC,gBAAgB,CAAC,QAAQ,CAAC,CAAC;YAElD,OAAO;gBACL,MAAM,EAAE,QAAQ,CAAC,MAAM;gBACvB,WAAW,EAAE,MAAM,CAAC,QAAQ,CAAC,EAAE,KAAK,EAAE,CAAC;gBACvC,eAAe,EAAE,MAAM,IAAI,CAAC,gBAAgB,CAAC,QAAQ,CAAC;aACvD,CAAC;QACJ,CAAC;KAAA;IAEY,gBAAgB,CAAC,QAAgB;;YAC5C,MAAM,YAAY,GAAG,MAAM,IAAI,CAAC,gBAAgB,CAAC,YAAY,CAC3D,OAAO,EACP,QAAQ,CACT,CAAC;YACF,MAAM,UAAU,GAAG,YAAY,CAAC,SAAS,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC;YAEhD,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,IAAI;iBAC7B,GAAG,CAAC,wCAAwC,UAAU,EAAE,EAAE;gBACzD,YAAY,EAAE,MAAM;aACrB,CAAC;iBACD,SAAS,EAAE,CAAC;YAEf,MAAM,OAAO,GAAG,IAAI,MAAM,CACxB,OAAO,YAAY,CAAC,SAAS,CAAC,CAAC,CAAC,mBAAmB,EACnD,IAAI,CACL,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC;YAEjB,IAAI,OAAO,EAAE;gBACX,OAAO,CAAC,OAAO,CAAC,MAAM,CAAC,KAAK,CAAC;aAC9B;YACD,OAAO,CAAC,CAAC;QACX,CAAC;KAAA;IAEM,gBAAgB,CAAC,OAAgB;QACtC,OAAQ,OAAO,CAAC,MAAM,CAAC,IAAI,CAAgB,CAAC,CAAC,CAAC;IAChD,CAAC;IAEY,mBAAmB,CAAC,QAAgB;;YAC/C,MAAM,aAAa,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,mBAAmB,EAAE,CAAC;YAClE,MAAM,OAAO,GAAG,CACd,MAAM,IAAI,CAAC,UAAU,CAAC,aAAa,iBACjC,QAAQ,IACL,aAAa,EAChB,CACH,CAAC,GAAG,CAAC;YAEN,MAAM,aAAa,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,mBAAmB,EAAE,CAAC;YAClE,MAAM,OAAO,GAAG,CACd,MAAM,IAAI,CAAC,UAAU,CAAC,aAAa,iBACjC,QAAQ,IACL,aAAa,EAChB,CACH,CAAC,GAAG,CAAC;YAEN,MAAM,eAAe,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,gBAAgB,EAAE,CAAC;YAEjE,MAAM,yBAAyB,GAAG,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CACpE,OAAO,EACP,eAAe,CAAC,MAAM,CAAC,IAAI,CAAC,CAC7B,CAAC;YAEF,wEAAwE;YACxE,6CAA6C;YAC7C,sCAAsC;YACtC,gGAAgG;YAEhG,OAAO;gBACL,aAAa;gBACb,OAAO;gBACP,aAAa;gBACb,OAAO;gBACP,eAAe;gBACf,yBAAyB;aAC1B,CAAC;QACJ,CAAC;KAAA;IAED;;;;;;;;;;;;;;;;;;;;;;;;;OAyBG;IAEU,eAAe;;YAC1B,MAAM,oBAAoB,GAAG,MAAM,IAAI,CAAC,uBAAuB,EAAE,CAAC;YAClE,MAAM,QAAQ,GAAG,MAAM,CAAC,oBAAoB,CAAC,QAAQ,CAAC,CAAC;YACvD,MAAM,UAAU,GAAG,MAAM,CAAC,oBAAoB,CAAC,UAAU,CAAC,CAAC;YAC3D,MAAM,QAAQ,GAAG,MAAM,CAAC,QAAQ,CAAC,UAAU,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC;YAC5D,MAAM,OAAO,GAAG,QAAQ,CAAC,SAAS,EAAE,CAAC;YACrC,IAAI,OAAO,GAAG,oBAAoB,CAAC,iBAAiB,EAAE;gBACpD,OAAO,IAAI,CAAC;aACb;iBAAM;gBACL,OAAO,KAAK,CAAC;aACd;QACH,CAAC;KAAA;IAEY,cAAc,CAAC,QAAgB,EAAE,WAAmB;;YAC/D,MAAM,WAAW,GAAgB,MAAM,IAAI,CAAC,IAAI,CAAC,wBAAwB,EAAE,CAAC;YAE5E,yEAAyE;YACzE,MAAM,EAAE,WAAW,EAAE,GAAG,MAAM,IAAI,CAAC,cAAc,CAAC,cAAc,EAAE,CAAC;YAEnE,MAAM,EAAE,OAAO,EAAE,eAAe,EAAE,GAAG,MAAM,IAAI,CAAC,cAAc,CAC5D,QAAQ,EACR,WAAW,CACZ,CAAC;YAEF,gCAAgC;YAChC,qFAAqF;YACrF,yDAAyD;YAEzD,2BAA2B;YAC3B,MAAM,UAAU,GAAG,MAAM,IAAI,CAAC,mBAAmB,CAAC,WAAW,CAAC,CAAC;YAE/D,qCAAqC;YACrC,MAAM,SAAS,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC,MAAM,CAC1C,WAAW,CAAC,cAAc,CAAC,SAAS,CAAC,EAAE,CACxC,CAAC;YACF,MAAM,mBAAmB,GAAG,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAC9D,UAAU,CAAC,OAAO,EAClB,SAAS,CAAC,GAAG,CAAC,MAAM,CAAC,IAAI,CAAC,CAC3B,CAAC;YAEF,iFAAiF;YACjF,iFAAiF;YACjF,sFAAsF;YACtF,wCAAwC;YAExC,MAAM,EAAE,KAAK,EAAE,GAAG,MAAM,IAAI,CAAC,sBAAsB,CACjD,eAAe,EACf,WAAW,CAAC,cAAc,CAAC,SAAS,CAAC,EAAE,EACvC,mBAAmB,EACnB,UAAU,CACX,CAAC;YAEF,gCAAgC;YAChC,8FAA8F;YAC9F,+CAA+C;YAE/C,yCAAyC;YACzC,yBAAyB;YACzB,MAAM,IAAI,CAAC,IAAI,CAAC,cAAc,CAC5B,WAAW,EACX,IAAI,CAAC,gBAAgB,CAAC,OAAO,CAAC,EAC9B,IAAI,CAAC,gBAAgB,CAAC,UAAU,CAAC,OAAO,CAAC,CAC1C,CAAC;YAEF,gCAAgC;YAChC,sBAAsB;YAEtB,6FAA6F;YAC7F,2FAA2F;YAC3F,4FAA4F;YAC5F,kEAAkE;YAClE,MAAM,IAAI,CAAC,sBAAsB,CAC/B,WAAW,CAAC,oBAAoB,EAAE,CAAC,cAAc,EAAE,CAAC,WAAW,EAAE,EACjE,IAAI,EACJ,KAAK,CACN,CAAC;QACJ,CAAC;KAAA;IAEY,sBAAsB,CACjC,WAAmB,EACnB,cAAuB,EACvB,QAAgB,IAAI;;YAEpB,OAAO,IAAI,CAAC,IAAI;iBACb,IAAI,CACH,GAAG,IAAI,CAAC,MAAM,CAAC,OAAO,iCAAiC,kBAErD,gBAAgB,EAAE,cAAc,IAC7B,CAAC,KAAK,IAAI,EAAE,KAAK,EAAE,CAAC,GAEzB;gBACE,OAAO,EAAE;oBACP,aAAa,EAAE,UAAU,WAAW,EAAE;iBACvC;aACF,CACF;iBACA,SAAS,EAAE,CAAC;QACjB,CAAC;KAAA;IAEa,cAAc,CAC1B,OAAgB,EAChB,UAAsC;;YAEtC,IAAI;gBACF,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAAC,OAAO,EAAE,UAAU,CAAC,CAAC;gBAC1E,OAAO,GAAG,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC;aAC3B;YAAC,OAAO,KAAK,EAAE;gBACd,MAAM,IAAI,eAAe,CAAC,wBAAwB,CAAC,CAAC;aACrD;QACH,CAAC;KAAA;IAEa,cAAc,CAC1B,QAAgB,EAChB,WAA2B;;YAE3B,kEAAkE;YAClE,MAAM,eAAe,GACnB,MAAM,IAAI,CAAC,MAAM,CAAC,MAAM,CAAgC;gBACtD,QAAQ,EAAE,6BAA6B;gBACvC,SAAS,EAAE,EAAE;aACd,CAAC,CAAC;YAEL,kEAAkE;YAClE,MAAM,aAAa,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,aAAa,iBACvD,QAAQ,IACL,WAAW,CAAC,cAAc,CAAC,OAAO,CAAC,aAAa,EACnD,CAAC;YAEH,MAAM,WAAW,GAAG,MAAM,IAAI,CAAC,cAAc,CAC3C,aAAa,CAAC,GAAG,EACjB,WAAW,CAAC,cAAc,CAAC,OAAO,CAAC,yBAAyB,CAC7D,CAAC;YAEF,yFAAyF;YACzF,WAAW;YACX,MAAM,WAAW,GAAG,IAAI,CAAC,UAAU,CAAC,YAAY,CAAC,IAAI,CAAC,mBAAmB,CAAC,CAAC;YAE3E,MAAM,eAAe,GAAG,MAAM,IAAI,CAAC,iBAAiB,CAAC,IAAI,CAAC,WAAW,EAAE;gBACrE,WAAW,EAAE,eAAe,CAAC,qBAAqB,CAAC,SAAS,CAAC,WAAW;gBACxE,WAAW;aACZ,CAAC,CAAC;YAEH,MAAM,aAAa,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,aAAa,iBACvD,QAAQ,IACL,WAAW,CAAC,cAAc,CAAC,OAAO,CAAC,aAAa,EACnD,CAAC;YAEH,OAAO;gBACL,OAAO,EAAE,aAAa,CAAC,GAAG;gBAC1B,eAAe;aAChB,CAAC;QACJ,CAAC;KAAA;IAEa,sBAAsB,CAClC,eAAqC,EACrC,WAAmB,EACnB,mBAA+C,EAC/C,aAA4B;;YAE5B,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,MAAM,CAAC,MAAM,CAAyB;gBAChE,QAAQ,EAAE,sBAAsB;gBAChC,SAAS,EAAE;oBACT,KAAK,EAAE;wBACL,eAAe,EAAE,IAAI,CAAC,SAAS,CAAC,eAAe,CAAC;wBAChD,WAAW;wBACX,mBAAmB,EAAE,IAAI,CAAC,SAAS,CAAC,mBAAmB,CAAC;wBACxD,UAAU,EAAE;4BACV,aAAa,EAAE,IAAI,CAAC,SAAS,CAAC,aAAa,CAAC,aAAa,CAAC;4BAC1D,kBAAkB,EAAE,IAAI,CAAC,SAAS,CAChC,aAAa,CAAC,eAAe,CAAC,MAAM,EAAE,CACvC;4BACD,yBAAyB,EAAE,IAAI,CAAC,SAAS,CACvC,aAAa,CAAC,yBAAyB,CACxC;4BACD,aAAa,EAAE,IAAI,CAAC,SAAS,CAAC,aAAa,CAAC,aAAa,CAAC;yBAC3D;qBACF;iBACF;aACF,CAAC,CAAC;YACH,OAAO;gBACL,KAAK,EAAE,QAAQ,CAAC,cAAc,CAAC,KAAK;gBACpC,YAAY,EAAE,QAAQ,CAAC,cAAc,CAAC,UAAU,CAAC,EAAE;aACpD,CAAC;QACJ,CAAC;KAAA;IAEK,uBAAuB;;YAC3B,8DAA8D;YAC9D,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,MAAM,CAAC,KAAK,CAAM;gBACvC,KAAK,EAAE,yBAAyB;aACjC,CAAC,CAAC;YAEH,MAAM,GAAG,GAAG,GAAG,CAAC,oBAA4C,CAAC;YAE7D,GAAG,CAAC,QAAQ,GAAG,IAAI,IAAI,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;YACtC,GAAG,CAAC,UAAU,GAAG,IAAI,IAAI,CAAC,GAAG,CAAC,UAAU,CAAC,CAAC;YAC1C,OAAO,GAAG,CAAC;QACb,CAAC;KAAA;IAEM,gBAAgB,CAAC,QAAQ;QAC9B,MAAM,KAAK,GAAG,QAAQ,CAAC;QACvB,MAAM,KAAK,GAAG,QAAQ,CAAC;QACvB,MAAM,KAAK,GAAG,QAAQ,CAAC;QAEvB,MAAM,YAAY,GAAG,EAAE,CAAC;QACxB,MAAM,YAAY,GAAG,EAAE,CAAC;QACxB,MAAM,YAAY,GAAG,EAAE,CAAC;QACxB,MAAM,cAAc,GAAG,EAAE,CAAC,CAAC,wCAAwC;QAEnE,SAAS,aAAa,CAAC,GAAG,EAAE,EAAE;YAC5B,OAAO,CAAC,CAAC,GAAG,IAAI,EAAE,CAAC,CAAC,KAAK,CAAC,EAAE,CAAC,IAAI,EAAE,CAAC,CAAC,MAAM,CAAC;QAC9C,CAAC;QAED,MAAM,MAAM,GAAG,aAAa,CAAC,QAAQ,EAAE,KAAK,CAAC,CAAC;QAC9C,MAAM,MAAM,GAAG,aAAa,CAAC,QAAQ,EAAE,KAAK,CAAC,CAAC;QAC9C,MAAM,MAAM,GAAG,aAAa,CAAC,QAAQ,EAAE,KAAK,CAAC,CAAC;QAC9C,MAAM,QAAQ,GAAG,QAAQ,CAAC,MAAM,GAAG,MAAM,GAAG,MAAM,GAAG,MAAM,CAAC;QAE5D,IAAI,OAAO,GAAG,CAAC,CAAC;QAChB,IAAI,MAAM,EAAE;YACV,OAAO,IAAI,YAAY,CAAC;SACzB;QACD,IAAI,MAAM,EAAE;YACV,OAAO,IAAI,YAAY,CAAC;SACzB;QACD,IAAI,MAAM,EAAE;YACV,OAAO,IAAI,YAAY,CAAC;SACzB;QACD,IAAI,QAAQ,EAAE;YACZ,OAAO,IAAI,cAAc,CAAC;SAC3B;QAED,IAAI,QAAQ,CAAC,MAAM,KAAK,CAAC,EAAE;YACzB,OAAO;gBACL,KAAK,EAAE,CAAC;gBACR,kBAAkB;gBAClB,IAAI,EAAE,CAAC;aACR,CAAC;SACH;QAED,MAAM,YAAY,GAAG,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,QAAQ,CAAC,MAAM,CAAC,CAAC;QAExD,MAAM,KAAK,GACT,CAAC,KAAK,GAAG,YAAY,CAAC;YACtB,IAAI,CAAC,GAAG,CAAC,YAAY,GAAG,YAAY,GAAG,YAAY,EAAE,EAAE,CAAC,CAAC;QAC3D,OAAO;YACL,KAAK;YACL,kBAAkB;YAClB,IAAI,EAAE,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC;SAC1C,CAAC;IACJ,CAAC;;;;YApXF,UAAU,SAAC;gBACV,UAAU,EAAE,MAAM;aACnB;;;4CAKI,MAAM,SAAC,SAAS;YAhEZ,UAAU;YAkBV,eAAe;YAff,SAAS;YAWT,cAAc;YAHO,GAAG;YAFxB,iBAAiB;YAGjB,eAAe;YAIf,gBAAgB;YANhB,WAAW","sourcesContent":["import { HttpClient } from '@angular/common/http';\nimport { Inject, Injectable } from '@angular/core';\nimport { CognitoUser } from '@aws-amplify/auth';\nimport { AuthClass } from '@aws-amplify/auth/lib-esm/Auth';\nimport * as moment_ from 'moment';\nimport { Duration } from 'moment';\nimport { JWK, JWS } from 'node-jose';\nimport { JSONObject } from '../api/types';\nimport { PassKeyBundle } from '../auth/auth.types';\nimport { EncryptionService } from '../encryption/encryption.service';\nimport { IdleService } from '../idle/idle.service';\nimport { KeyFactoryService as KFS } from '../key/key-factory.service';\nimport { KeyGraphService } from '../key/key-graph.service';\nimport { LifeReadyConfig, LR_CONFIG } from '../life-ready.config';\nimport { ProfileService } from '../profile/profile.service';\nimport { ApiCurrentUser } from '../profile/profile.types';\nimport { WebCryptoService } from '../web-crypto/web-crypto.service';\nimport { LrAuthException } from '../_common/exceptions';\nimport { LrApolloService } from './../api/lr-apollo.service';\nimport {\n  PasswordChangeConfigQuery,\n  PasswordChangeMutation,\n  PasswordChangeRequestMutation,\n} from './password.gql';\n\n// \"why?\" you ask: https://stackoverflow.com/questions/59735280/angular-8-moment-error-cannot-call-a-namespace-moment\nconst moment = moment_;\n\ninterface PasswordChangeRequestMutation {\n  passwordChangeRequest: {\n    challenge: {\n      serverNonce: string;\n    };\n  };\n}\n\ninterface PasswordChangeMutation {\n  passwordChange: {\n    token: string;\n    newPassKey: {\n      id: string;\n    };\n  };\n}\n\nexport interface PasswordChangeConfig {\n  maxAuthAgeSeconds: number;\n  authTime: string | Date;\n  serverTime: string | Date;\n}\n\nexport class PasswordCheck {\n  length?: number;\n  timeToCrack?: Duration;\n  passwordExposed?: number;\n}\n\n@Injectable({\n  providedIn: 'root',\n})\nexport class PasswordService {\n  private readonly CLIENT_NONCE_LENGTH = 32;\n\n  constructor(\n    @Inject(LR_CONFIG) private config: LifeReadyConfig,\n    private http: HttpClient,\n    private apollo: LrApolloService,\n    private auth: AuthClass,\n    private profileService: ProfileService,\n    private keyFactory: KFS,\n    private encryptionService: EncryptionService,\n    private keyGraph: KeyGraphService,\n    private webCryptoService: WebCryptoService,\n    private idleService: IdleService\n  ) {}\n\n  public async checkPassword(password: string): Promise<PasswordCheck> {\n    const { years } = this.passwordStrength(password);\n\n    return {\n      length: password.length,\n      timeToCrack: moment.duration({ years }),\n      passwordExposed: await this.getExposureCount(password),\n    };\n  }\n\n  public async getExposureCount(password: string): Promise<number> {\n    const sha1Password = await this.webCryptoService.stringDigest(\n      'SHA-1',\n      password\n    );\n    const first5sha1 = sha1Password.substring(0, 5);\n\n    const response = await this.http\n      .get(`https://api.pwnedpasswords.com/range/${first5sha1}`, {\n        responseType: 'text',\n      })\n      .toPromise();\n\n    const results = new RegExp(\n      `^(?:${sha1Password.substring(5)}:)(?<count>\\\\d+)$`,\n      'im'\n    ).exec(response);\n\n    if (results) {\n      return +results.groups.count;\n    }\n    return 0;\n  }\n\n  public getPassIdpString(passIdp: JWK.Key) {\n    return (passIdp.toJSON(true) as JSONObject).k;\n  }\n\n  public async createPassKeyBundle(password: string): Promise<PassKeyBundle> {\n    const passIdpParams = await this.keyFactory.createPassIdpParams();\n    const passIdp = (\n      await this.keyFactory.derivePassIdp({\n        password,\n        ...passIdpParams,\n      })\n    ).jwk;\n\n    const passKeyParams = await this.keyFactory.createPassKeyParams();\n    const passKey = (\n      await this.keyFactory.derivePassKey({\n        password,\n        ...passKeyParams,\n      })\n    ).jwk;\n\n    const passIdpVerifier = await this.keyFactory.createPkcSignKey();\n\n    const wrappedPassIdpVerifierPrk = await this.encryptionService.encrypt(\n      passKey,\n      passIdpVerifier.toJSON(true)\n    );\n\n    // There are two formats that the private key can be represented in JWK:\n    // https://tools.ietf.org/html/rfc8017#page-9\n    // The second form is an optimization:\n    // https://crypto.stackexchange.com/questions/19413/what-are-dp-and-dq-in-encryption-by-rsa-in-c\n\n    return {\n      passKeyParams,\n      passKey,\n      passIdpParams,\n      passIdp,\n      passIdpVerifier,\n      wrappedPassIdpVerifierPrk,\n    };\n  }\n\n  /**\n   * We need to allow for interruption of the process at any point. Each API call can be considered\n   * atomic and either succeeds or fails.\n   *\n   * The LR server APIs use semaphore tokens for locking critical operations, so concurrent calls will\n   * fail.\n   *\n   * We assume the worst case for IdP API calls. So we use the semaphore token from LR to prevent\n   * concurrent calls to IdP APIs, but we have to assume that the IdP API calls will either succeed or\n   * fail within a reasonable amount of time.\n   *\n   * Each location where the server state changes can be a potential point of interruption.\n   * Potential points of interruption are marked with: --Potential Failure Point--\n   *\n   * Places for timeout:\n   * - Login age too old at call to: verifyPassword()\n   * - Login age too old at call to: changePasswordMutation()\n   * - Semaphore token expires at call to: changePasswordComplete()\n   *\n   * Tests:\n   * - Potential Failure Point 1: should be able to restart the process, user remains signed in.\n   * - Potential Failure Point 2: should enter recovery flow\n   * - Potential Failure Point 3: should enter recovery flow\n   * - Potential Failure Point 4: should enter recovery flow\n   *\n   */\n\n  public async isLoginRequired(): Promise<boolean> {\n    const changePasswordConfig = await this.getChangePasswordConfig();\n    const authTime = moment(changePasswordConfig.authTime);\n    const serverTime = moment(changePasswordConfig.serverTime);\n    const duration = moment.duration(serverTime.diff(authTime));\n    const seconds = duration.asSeconds();\n    if (seconds > changePasswordConfig.maxAuthAgeSeconds) {\n      return true;\n    } else {\n      return false;\n    }\n  }\n\n  public async changePassword(password: string, newPassword: string) {\n    const cognitoUser: CognitoUser = await this.auth.currentAuthenticatedUser();\n\n    // Not checking that passwords are different. It makes it easier to test.\n    const { currentUser } = await this.profileService.getCurrentUser();\n\n    const { passIdp, signedChallenge } = await this.verifyPassword(\n      password,\n      currentUser\n    );\n\n    // --Potential Failure Point 1--\n    // verifyPassword() asks for a current password challenge hence changes server state.\n    // Place break points here to test the failure scenarios.\n\n    // Generate the new passIdp\n    const newPassKey = await this.createPassKeyBundle(newPassword);\n\n    // Re-encrypt master key with new key\n    const masterKey = await this.keyGraph.getKey(\n      currentUser.currentUserKey.masterKey.id\n    );\n    const newWrappedMasterKey = await this.encryptionService.encrypt(\n      newPassKey.passKey,\n      masterKey.jwk.toJSON(true)\n    );\n\n    // If the IdP change password failed, we need to go into recovery mode by forcing\n    // a login. We can't logout the user just yet since the IdP password change needs\n    // the user to be logged in. We _can_ removed any persisted session values for the IdP\n    // but that seems like too much trouble.\n\n    const { token } = await this.changePasswordMutation(\n      signedChallenge,\n      currentUser.currentUserKey.masterKey.id,\n      newWrappedMasterKey,\n      newPassKey\n    );\n\n    // --Potential Failure Point 2--\n    // changePasswordMutation() uploads new keys and obtains a semaphore lock to prevent any other\n    // clients from performing IdP password change.\n\n    // Now we can do the IdP password change.\n    // todo: Add this back in\n    await this.auth.changePassword(\n      cognitoUser,\n      this.getPassIdpString(passIdp),\n      this.getPassIdpString(newPassKey.passIdp)\n    );\n\n    // --Potential Failure Point 3--\n    // IdP password change\n\n    // Note that changePassword() could throw an exception for a number of reason. It could throw\n    // a network timeout for example. But we don't know if it's the response that timed out and\n    // the idp password change was actually carried out. So we have to be extra conservative and\n    // only act on a clear success. Otherwise we go into recover mode.\n    await this.changePasswordComplete(\n      cognitoUser.getSignInUserSession().getAccessToken().getJwtToken(),\n      true,\n      token\n    );\n  }\n\n  public async changePasswordComplete(\n    accessToken: string,\n    useNewPassword: boolean,\n    token: string = null\n  ) {\n    return this.http\n      .post(\n        `${this.config.authUrl}users/password-change-complete/`,\n        {\n          use_new_password: useNewPassword,\n          ...(token && { token }),\n        },\n        {\n          headers: {\n            Authorization: `Bearer ${accessToken}`,\n          },\n        }\n      )\n      .toPromise();\n  }\n\n  private async getVerifierPrK(\n    passKey: JWK.Key,\n    wrappedPrK: Record<string, JSONObject>\n  ): Promise<JWK.Key> {\n    try {\n      const prkJson = await this.encryptionService.decrypt(passKey, wrappedPrK);\n      return KFS.asKey(prkJson);\n    } catch (error) {\n      throw new LrAuthException('Wrong current password');\n    }\n  }\n\n  private async verifyPassword(\n    password: string,\n    currentUser: ApiCurrentUser\n  ): Promise<{ passIdp: JWK.Key; signedChallenge: JWS.CreateSignResult }> {\n    // Get information from the server to prepare for password change.\n    const passwordRequest =\n      await this.apollo.mutate<PasswordChangeRequestMutation>({\n        mutation: PasswordChangeRequestMutation,\n        variables: {},\n      });\n\n    // Get the old passKey so we can decrypt the old password verifier\n    const passKeyResult = await this.keyFactory.derivePassKey({\n      password,\n      ...currentUser.currentUserKey.passKey.passKeyParams,\n    });\n\n    const verifierPrK = await this.getVerifierPrK(\n      passKeyResult.jwk,\n      currentUser.currentUserKey.passKey.wrappedPassIdpVerifierPrk\n    );\n\n    // Sign the server challenge to prove to the server we can decrypt the password verifier.\n    // Generate\n    const clientNonce = this.keyFactory.randomString(this.CLIENT_NONCE_LENGTH);\n\n    const signedChallenge = await this.encryptionService.sign(verifierPrK, {\n      serverNonce: passwordRequest.passwordChangeRequest.challenge.serverNonce,\n      clientNonce,\n    });\n\n    const passIdpResult = await this.keyFactory.derivePassIdp({\n      password,\n      ...currentUser.currentUserKey.passKey.passIdpParams,\n    });\n\n    return {\n      passIdp: passIdpResult.jwk,\n      signedChallenge,\n    };\n  }\n\n  private async changePasswordMutation(\n    signedChallenge: JWS.CreateSignResult,\n    masterKeyId: string,\n    newWrappedMasterKey: Record<string, JSONObject>,\n    passKeyBundle: PassKeyBundle\n  ): Promise<{ token: string; newPassKeyId: string }> {\n    const response = await this.apollo.mutate<PasswordChangeMutation>({\n      mutation: PasswordChangeMutation,\n      variables: {\n        input: {\n          signedChallenge: JSON.stringify(signedChallenge),\n          masterKeyId,\n          newWrappedMasterKey: JSON.stringify(newWrappedMasterKey),\n          newPassKey: {\n            passIdpParams: JSON.stringify(passKeyBundle.passIdpParams),\n            passIdpVerifierPbk: JSON.stringify(\n              passKeyBundle.passIdpVerifier.toJSON()\n            ),\n            wrappedPassIdpVerifierPrk: JSON.stringify(\n              passKeyBundle.wrappedPassIdpVerifierPrk\n            ),\n            passKeyParams: JSON.stringify(passKeyBundle.passKeyParams),\n          },\n        },\n      },\n    });\n    return {\n      token: response.passwordChange.token,\n      newPassKeyId: response.passwordChange.newPassKey.id,\n    };\n  }\n\n  async getChangePasswordConfig(): Promise<PasswordChangeConfig> {\n    // eslint-disable-next-line @typescript-eslint/no-explicit-any\n    const res = await this.apollo.query<any>({\n      query: PasswordChangeConfigQuery,\n    });\n\n    const ret = res.passwordChangeConfig as PasswordChangeConfig;\n\n    ret.authTime = new Date(ret.authTime);\n    ret.serverTime = new Date(ret.serverTime);\n    return ret;\n  }\n\n  public passwordStrength(password): { years: number; bits: number } {\n    const upper = /[A-Z]/g;\n    const lower = /[a-z]/g;\n    const digit = /[0-9]/g;\n\n    const upperChoices = 26;\n    const lowerChoices = 26;\n    const digitChoices = 10;\n    const specialChoices = 30; // /[!\"#$%&'()*+,-./:;<=>?@[\\]^_`{|}~]/g\n\n    function instanceCount(str, re) {\n      return ((str || '').match(re) || []).length;\n    }\n\n    const uppers = instanceCount(password, upper);\n    const lowers = instanceCount(password, lower);\n    const digits = instanceCount(password, digit);\n    const specials = password.length - uppers - lowers - digits;\n\n    let choices = 0;\n    if (uppers) {\n      choices += upperChoices;\n    }\n    if (lowers) {\n      choices += lowerChoices;\n    }\n    if (digits) {\n      choices += digitChoices;\n    }\n    if (specials) {\n      choices += specialChoices;\n    }\n\n    if (password.length === 0) {\n      return {\n        years: 0,\n        // bits of entropy\n        bits: 0,\n      };\n    }\n\n    const permutations = Math.pow(choices, password.length);\n\n    const years =\n      (54000 * permutations) /\n      Math.pow(upperChoices + lowerChoices + digitChoices, 12);\n    return {\n      years,\n      // bits of entropy\n      bits: Math.round(Math.log2(permutations)),\n    };\n  }\n}\n"]}
|
|
@@ -0,0 +1,181 @@
|
|
|
1
|
+
import { __awaiter } from "tslib";
|
|
2
|
+
/* eslint-disable @typescript-eslint/no-explicit-any */
|
|
3
|
+
import { Injectable, Injector, isDevMode } from '@angular/core';
|
|
4
|
+
import { CookieService } from 'ngx-cookie-service';
|
|
5
|
+
import { EncryptionService } from '../encryption/encryption.service';
|
|
6
|
+
import { KeyFactoryService as KFS } from '../key/key-factory.service';
|
|
7
|
+
import { LrBadArgumentException } from '../_common/exceptions';
|
|
8
|
+
import * as i0 from "@angular/core";
|
|
9
|
+
import * as i1 from "../key/key-factory.service";
|
|
10
|
+
import * as i2 from "ngx-cookie-service";
|
|
11
|
+
import * as i3 from "../encryption/encryption.service";
|
|
12
|
+
export class PersistService {
|
|
13
|
+
constructor(keyFactory, cookieService, encryptionService, injector) {
|
|
14
|
+
this.keyFactory = keyFactory;
|
|
15
|
+
this.cookieService = cookieService;
|
|
16
|
+
this.encryptionService = encryptionService;
|
|
17
|
+
this.injector = injector;
|
|
18
|
+
this.KEY_PREFIX = 'lrSession-';
|
|
19
|
+
this.cookieSecure = true;
|
|
20
|
+
this.serverSessionEncryptionKey = null;
|
|
21
|
+
if (isDevMode()) {
|
|
22
|
+
this.setCookieSecure(false);
|
|
23
|
+
}
|
|
24
|
+
}
|
|
25
|
+
setServerSessionEncryptionKey(key) {
|
|
26
|
+
this.serverSessionEncryptionKey = key;
|
|
27
|
+
}
|
|
28
|
+
clearServerSessionEncryptionKey() {
|
|
29
|
+
this.serverSessionEncryptionKey = null;
|
|
30
|
+
}
|
|
31
|
+
// It's important that set and delete cookie use exactly the same set of parameters.
|
|
32
|
+
getCookieParams() {
|
|
33
|
+
return {
|
|
34
|
+
path: '/',
|
|
35
|
+
domain: null,
|
|
36
|
+
secure: this.cookieSecure,
|
|
37
|
+
sameSite: 'Lax',
|
|
38
|
+
};
|
|
39
|
+
}
|
|
40
|
+
clear() {
|
|
41
|
+
// Remove all cookies
|
|
42
|
+
Object.keys(this.cookieService.getAll()).forEach((key) => {
|
|
43
|
+
if (key.startsWith(this.KEY_PREFIX)) {
|
|
44
|
+
this.deletePrefixedName(key);
|
|
45
|
+
}
|
|
46
|
+
});
|
|
47
|
+
// Remove all persisted session variables
|
|
48
|
+
Object.keys(localStorage).forEach((key) => {
|
|
49
|
+
if (key.startsWith(this.KEY_PREFIX)) {
|
|
50
|
+
this.deletePrefixedName(key);
|
|
51
|
+
}
|
|
52
|
+
});
|
|
53
|
+
}
|
|
54
|
+
setCookieSecure(value) {
|
|
55
|
+
this.cookieSecure = value;
|
|
56
|
+
if (!value) {
|
|
57
|
+
if (isDevMode()) {
|
|
58
|
+
console.warn('The cookie secure flag in persistService has been set to false, set it to true in production mode');
|
|
59
|
+
}
|
|
60
|
+
else {
|
|
61
|
+
throw new LrBadArgumentException('Can not set PersistService cookie secure flag to false in production mode.');
|
|
62
|
+
}
|
|
63
|
+
}
|
|
64
|
+
}
|
|
65
|
+
prefixName(name) {
|
|
66
|
+
return this.KEY_PREFIX + name;
|
|
67
|
+
}
|
|
68
|
+
delete(name) {
|
|
69
|
+
this.deletePrefixedName(this.prefixName(name));
|
|
70
|
+
}
|
|
71
|
+
deletePrefixedName(prefixedName) {
|
|
72
|
+
const params = this.getCookieParams();
|
|
73
|
+
this.cookieService.delete(prefixedName, // name: string,
|
|
74
|
+
params.path, // path?: string,
|
|
75
|
+
params.domain, // domain ?: string,
|
|
76
|
+
params.secure, // secure ?: boolean,
|
|
77
|
+
params.sameSite // sameSite ?: 'Lax' | 'None' | 'Strict'): void;
|
|
78
|
+
);
|
|
79
|
+
localStorage.removeItem(prefixedName);
|
|
80
|
+
}
|
|
81
|
+
set({ name, value, serverSession, expiry, }) {
|
|
82
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
83
|
+
const prefixedName = this.prefixName(name);
|
|
84
|
+
let item;
|
|
85
|
+
if (serverSession) {
|
|
86
|
+
item = {
|
|
87
|
+
serverSession: true,
|
|
88
|
+
data: yield this.encryptionService.encryptToString(this.serverSessionEncryptionKey, value),
|
|
89
|
+
};
|
|
90
|
+
}
|
|
91
|
+
else {
|
|
92
|
+
item = {
|
|
93
|
+
data: value,
|
|
94
|
+
};
|
|
95
|
+
}
|
|
96
|
+
if (expiry) {
|
|
97
|
+
const key = yield this.keyFactory.createKey();
|
|
98
|
+
item.expiry = expiry.toISOString();
|
|
99
|
+
item.data = yield this.encryptionService.encryptToString(key, item.data);
|
|
100
|
+
const cookieItem = {
|
|
101
|
+
key: key.toJSON(true),
|
|
102
|
+
};
|
|
103
|
+
// If path is set to anything other than "/" then the cookie is only
|
|
104
|
+
// accessible by JS if the current URL has the same prefix as the path.
|
|
105
|
+
// Ideally we don't want the encryption key cookie to be sent at all, but
|
|
106
|
+
// since the encrypted content is held in localstorage, it is not a security
|
|
107
|
+
// risk, i.e. it is at least as secure as storing only in localstorage.
|
|
108
|
+
const params = this.getCookieParams();
|
|
109
|
+
this.cookieService.set(prefixedName, // name: string,
|
|
110
|
+
JSON.stringify(cookieItem), // value: string,
|
|
111
|
+
expiry, // expires?: number | Date,
|
|
112
|
+
params.path, // path?: string,
|
|
113
|
+
params.domain, // domain?: string,
|
|
114
|
+
params.secure, // secure?: boolean,
|
|
115
|
+
params.sameSite // sameSite?: 'Lax' | 'None' | 'Strict'
|
|
116
|
+
);
|
|
117
|
+
}
|
|
118
|
+
localStorage.setItem(prefixedName, JSON.stringify(item));
|
|
119
|
+
});
|
|
120
|
+
}
|
|
121
|
+
get(name) {
|
|
122
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
123
|
+
const prefixedName = this.prefixName(name);
|
|
124
|
+
try {
|
|
125
|
+
const ret = yield this.getImpl(prefixedName);
|
|
126
|
+
if (ret == null) {
|
|
127
|
+
// Clear any cookies to keep things in sync.
|
|
128
|
+
this.deletePrefixedName(prefixedName);
|
|
129
|
+
}
|
|
130
|
+
return ret;
|
|
131
|
+
}
|
|
132
|
+
catch (error) {
|
|
133
|
+
this.deletePrefixedName(prefixedName);
|
|
134
|
+
throw error;
|
|
135
|
+
}
|
|
136
|
+
});
|
|
137
|
+
}
|
|
138
|
+
getImpl(name) {
|
|
139
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
140
|
+
const itemString = localStorage.getItem(name);
|
|
141
|
+
if (!itemString) {
|
|
142
|
+
return null;
|
|
143
|
+
}
|
|
144
|
+
const item = JSON.parse(itemString);
|
|
145
|
+
let data;
|
|
146
|
+
if (item.expiry) {
|
|
147
|
+
const cookieItemString = this.cookieService.get(name);
|
|
148
|
+
if (!cookieItemString) {
|
|
149
|
+
// Probably expired, but we won't make any interpretations since if we only used
|
|
150
|
+
// cookies we can't tell if it's expired or explicitly removed. So we just make
|
|
151
|
+
// the behaviour here consistent with that.
|
|
152
|
+
console.log('No cookie.');
|
|
153
|
+
return null;
|
|
154
|
+
}
|
|
155
|
+
const cookieItem = JSON.parse(cookieItemString);
|
|
156
|
+
const key = yield KFS.asKey(cookieItem.key);
|
|
157
|
+
data = yield this.encryptionService.decrypt(key, item.data);
|
|
158
|
+
}
|
|
159
|
+
else {
|
|
160
|
+
data = item.data;
|
|
161
|
+
}
|
|
162
|
+
if (item.serverSession) {
|
|
163
|
+
data = yield this.encryptionService.decrypt(this.serverSessionEncryptionKey, data);
|
|
164
|
+
}
|
|
165
|
+
return data;
|
|
166
|
+
});
|
|
167
|
+
}
|
|
168
|
+
}
|
|
169
|
+
PersistService.ɵprov = i0.ɵɵdefineInjectable({ factory: function PersistService_Factory() { return new PersistService(i0.ɵɵinject(i1.KeyFactoryService), i0.ɵɵinject(i2.CookieService), i0.ɵɵinject(i3.EncryptionService), i0.ɵɵinject(i0.INJECTOR)); }, token: PersistService, providedIn: "root" });
|
|
170
|
+
PersistService.decorators = [
|
|
171
|
+
{ type: Injectable, args: [{
|
|
172
|
+
providedIn: 'root',
|
|
173
|
+
},] }
|
|
174
|
+
];
|
|
175
|
+
PersistService.ctorParameters = () => [
|
|
176
|
+
{ type: KFS },
|
|
177
|
+
{ type: CookieService },
|
|
178
|
+
{ type: EncryptionService },
|
|
179
|
+
{ type: Injector }
|
|
180
|
+
];
|
|
181
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"persist.service.js","sourceRoot":"","sources":["../../../../../../projects/core/src/lib/persist/persist.service.ts"],"names":[],"mappings":";AAAA,uDAAuD;AACvD,OAAO,EAAE,UAAU,EAAE,QAAQ,EAAE,SAAS,EAAE,MAAM,eAAe,CAAC;AAChE,OAAO,EAAE,aAAa,EAAE,MAAM,oBAAoB,CAAC;AAEnD,OAAO,EAAE,iBAAiB,EAAE,MAAM,kCAAkC,CAAC;AACrE,OAAO,EAAE,iBAAiB,IAAI,GAAG,EAAE,MAAM,4BAA4B,CAAC;AACtE,OAAO,EAAE,sBAAsB,EAAE,MAAM,uBAAuB,CAAC;;;;;AAe/D,MAAM,OAAO,cAAc;IAMzB,YACU,UAAe,EACf,aAA4B,EAC5B,iBAAoC,EACpC,QAAkB;QAHlB,eAAU,GAAV,UAAU,CAAK;QACf,kBAAa,GAAb,aAAa,CAAe;QAC5B,sBAAiB,GAAjB,iBAAiB,CAAmB;QACpC,aAAQ,GAAR,QAAQ,CAAU;QATX,eAAU,GAAG,YAAY,CAAC;QAEnC,iBAAY,GAAG,IAAI,CAAC;QACpB,+BAA0B,GAAY,IAAI,CAAC;QAQjD,IAAI,SAAS,EAAE,EAAE;YACf,IAAI,CAAC,eAAe,CAAC,KAAK,CAAC,CAAC;SAC7B;IACH,CAAC;IAED,6BAA6B,CAAC,GAAY;QACxC,IAAI,CAAC,0BAA0B,GAAG,GAAG,CAAC;IACxC,CAAC;IAED,+BAA+B;QAC7B,IAAI,CAAC,0BAA0B,GAAG,IAAI,CAAC;IACzC,CAAC;IAED,oFAAoF;IAC5E,eAAe;QACrB,OAAO;YACL,IAAI,EAAE,GAAG;YACT,MAAM,EAAE,IAAI;YACZ,MAAM,EAAE,IAAI,CAAC,YAAY;YACzB,QAAQ,EAAE,KAAkC;SAC7C,CAAC;IACJ,CAAC;IAEM,KAAK;QACV,qBAAqB;QACrB,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,aAAa,CAAC,MAAM,EAAE,CAAC,CAAC,OAAO,CAAC,CAAC,GAAG,EAAE,EAAE;YACvD,IAAI,GAAG,CAAC,UAAU,CAAC,IAAI,CAAC,UAAU,CAAC,EAAE;gBACnC,IAAI,CAAC,kBAAkB,CAAC,GAAG,CAAC,CAAC;aAC9B;QACH,CAAC,CAAC,CAAC;QAEH,yCAAyC;QACzC,MAAM,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,OAAO,CAAC,CAAC,GAAG,EAAE,EAAE;YACxC,IAAI,GAAG,CAAC,UAAU,CAAC,IAAI,CAAC,UAAU,CAAC,EAAE;gBACnC,IAAI,CAAC,kBAAkB,CAAC,GAAG,CAAC,CAAC;aAC9B;QACH,CAAC,CAAC,CAAC;IACL,CAAC;IAEM,eAAe,CAAC,KAAc;QACnC,IAAI,CAAC,YAAY,GAAG,KAAK,CAAC;QAC1B,IAAI,CAAC,KAAK,EAAE;YACV,IAAI,SAAS,EAAE,EAAE;gBACf,OAAO,CAAC,IAAI,CACV,mGAAmG,CACpG,CAAC;aACH;iBAAM;gBACL,MAAM,IAAI,sBAAsB,CAC9B,4EAA4E,CAC7E,CAAC;aACH;SACF;IACH,CAAC;IAEO,UAAU,CAAC,IAAY;QAC7B,OAAO,IAAI,CAAC,UAAU,GAAG,IAAI,CAAC;IAChC,CAAC;IAEM,MAAM,CAAC,IAAY;QACxB,IAAI,CAAC,kBAAkB,CAAC,IAAI,CAAC,UAAU,CAAC,IAAI,CAAC,CAAC,CAAC;IACjD,CAAC;IAEO,kBAAkB,CAAC,YAAoB;QAC7C,MAAM,MAAM,GAAG,IAAI,CAAC,eAAe,EAAE,CAAC;QACtC,IAAI,CAAC,aAAa,CAAC,MAAM,CACvB,YAAY,EAAE,gBAAgB;QAC9B,MAAM,CAAC,IAAI,EAAE,iBAAiB;QAC9B,MAAM,CAAC,MAAM,EAAE,oBAAoB;QACnC,MAAM,CAAC,MAAM,EAAE,qBAAqB;QACpC,MAAM,CAAC,QAAQ,CAAC,gDAAgD;SACjE,CAAC;QACF,YAAY,CAAC,UAAU,CAAC,YAAY,CAAC,CAAC;IACxC,CAAC;IAEY,GAAG,CAAC,EACf,IAAI,EACJ,KAAK,EACL,aAAa,EACb,MAAM,GAMP;;YACC,MAAM,YAAY,GAAG,IAAI,CAAC,UAAU,CAAC,IAAI,CAAC,CAAC;YAE3C,IAAI,IAAU,CAAC;YAEf,IAAI,aAAa,EAAE;gBACjB,IAAI,GAAG;oBACL,aAAa,EAAE,IAAI;oBACnB,IAAI,EAAE,MAAM,IAAI,CAAC,iBAAiB,CAAC,eAAe,CAChD,IAAI,CAAC,0BAA0B,EAC/B,KAAK,CACN;iBACF,CAAC;aACH;iBAAM;gBACL,IAAI,GAAG;oBACL,IAAI,EAAE,KAAK;iBACZ,CAAC;aACH;YAED,IAAI,MAAM,EAAE;gBACV,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,SAAS,EAAE,CAAC;gBAC9C,IAAI,CAAC,MAAM,GAAG,MAAM,CAAC,WAAW,EAAE,CAAC;gBACnC,IAAI,CAAC,IAAI,GAAG,MAAM,IAAI,CAAC,iBAAiB,CAAC,eAAe,CAAC,GAAG,EAAE,IAAI,CAAC,IAAI,CAAC,CAAC;gBAEzE,MAAM,UAAU,GAAe;oBAC7B,GAAG,EAAE,GAAG,CAAC,MAAM,CAAC,IAAI,CAAC;iBACtB,CAAC;gBAEF,oEAAoE;gBACpE,uEAAuE;gBACvE,yEAAyE;gBACzE,4EAA4E;gBAC5E,uEAAuE;gBACvE,MAAM,MAAM,GAAG,IAAI,CAAC,eAAe,EAAE,CAAC;gBACtC,IAAI,CAAC,aAAa,CAAC,GAAG,CACpB,YAAY,EAAE,gBAAgB;gBAC9B,IAAI,CAAC,SAAS,CAAC,UAAU,CAAC,EAAE,iBAAiB;gBAC7C,MAAM,EAAE,2BAA2B;gBACnC,MAAM,CAAC,IAAI,EAAE,iBAAiB;gBAC9B,MAAM,CAAC,MAAM,EAAE,mBAAmB;gBAClC,MAAM,CAAC,MAAM,EAAE,oBAAoB;gBACnC,MAAM,CAAC,QAAQ,CAAC,uCAAuC;iBACxD,CAAC;aACH;YAED,YAAY,CAAC,OAAO,CAAC,YAAY,EAAE,IAAI,CAAC,SAAS,CAAC,IAAI,CAAC,CAAC,CAAC;QAC3D,CAAC;KAAA;IAEY,GAAG,CAAC,IAAY;;YAC3B,MAAM,YAAY,GAAG,IAAI,CAAC,UAAU,CAAC,IAAI,CAAC,CAAC;YAE3C,IAAI;gBACF,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,OAAO,CAAC,YAAY,CAAC,CAAC;gBAC7C,IAAI,GAAG,IAAI,IAAI,EAAE;oBACf,4CAA4C;oBAC5C,IAAI,CAAC,kBAAkB,CAAC,YAAY,CAAC,CAAC;iBACvC;gBACD,OAAO,GAAG,CAAC;aACZ;YAAC,OAAO,KAAK,EAAE;gBACd,IAAI,CAAC,kBAAkB,CAAC,YAAY,CAAC,CAAC;gBACtC,MAAM,KAAK,CAAC;aACb;QACH,CAAC;KAAA;IAEa,OAAO,CAAC,IAAY;;YAChC,MAAM,UAAU,GAAG,YAAY,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC;YAC9C,IAAI,CAAC,UAAU,EAAE;gBACf,OAAO,IAAI,CAAC;aACb;YAED,MAAM,IAAI,GAAS,IAAI,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC;YAE1C,IAAI,IAAS,CAAC;YAEd,IAAI,IAAI,CAAC,MAAM,EAAE;gBACf,MAAM,gBAAgB,GAAG,IAAI,CAAC,aAAa,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC;gBACtD,IAAI,CAAC,gBAAgB,EAAE;oBACrB,gFAAgF;oBAChF,+EAA+E;oBAC/E,2CAA2C;oBAC3C,OAAO,CAAC,GAAG,CAAC,YAAY,CAAC,CAAC;oBAC1B,OAAO,IAAI,CAAC;iBACb;gBAED,MAAM,UAAU,GAAG,IAAI,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC;gBAEhD,MAAM,GAAG,GAAG,MAAM,GAAG,CAAC,KAAK,CAAC,UAAU,CAAC,GAAG,CAAC,CAAC;gBAE5C,IAAI,GAAG,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAAC,GAAG,EAAE,IAAI,CAAC,IAAI,CAAC,CAAC;aAC7D;iBAAM;gBACL,IAAI,GAAG,IAAI,CAAC,IAAI,CAAC;aAClB;YAED,IAAI,IAAI,CAAC,aAAa,EAAE;gBACtB,IAAI,GAAG,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CACzC,IAAI,CAAC,0BAA0B,EAC/B,IAAI,CACL,CAAC;aACH;YAED,OAAO,IAAI,CAAC;QACd,CAAC;KAAA;;;;YAxMF,UAAU,SAAC;gBACV,UAAU,EAAE,MAAM;aACnB;;;YAf6B,GAAG;YAHxB,aAAa;YAEb,iBAAiB;YAHL,QAAQ","sourcesContent":["/* eslint-disable @typescript-eslint/no-explicit-any */\nimport { Injectable, Injector, isDevMode } from '@angular/core';\nimport { CookieService } from 'ngx-cookie-service';\nimport { JWK } from 'node-jose';\nimport { EncryptionService } from '../encryption/encryption.service';\nimport { KeyFactoryService as KFS } from '../key/key-factory.service';\nimport { LrBadArgumentException } from '../_common/exceptions';\n\ninterface Item {\n  data: string;\n  expiry?: string; // iso format\n  serverSession?: boolean;\n}\n\ninterface CookieItem {\n  key: any;\n}\n\n@Injectable({\n  providedIn: 'root',\n})\nexport class PersistService {\n  private readonly KEY_PREFIX = 'lrSession-';\n\n  private cookieSecure = true;\n  private serverSessionEncryptionKey: JWK.Key = null;\n\n  constructor(\n    private keyFactory: KFS,\n    private cookieService: CookieService,\n    private encryptionService: EncryptionService,\n    private injector: Injector\n  ) {\n    if (isDevMode()) {\n      this.setCookieSecure(false);\n    }\n  }\n\n  setServerSessionEncryptionKey(key: JWK.Key) {\n    this.serverSessionEncryptionKey = key;\n  }\n\n  clearServerSessionEncryptionKey() {\n    this.serverSessionEncryptionKey = null;\n  }\n\n  // It's important that set and delete cookie use exactly the same set of parameters.\n  private getCookieParams() {\n    return {\n      path: '/',\n      domain: null, // which means the current domain of the frontend app.\n      secure: this.cookieSecure,\n      sameSite: 'Lax' as 'Lax' | 'None' | 'Strict',\n    };\n  }\n\n  public clear() {\n    // Remove all cookies\n    Object.keys(this.cookieService.getAll()).forEach((key) => {\n      if (key.startsWith(this.KEY_PREFIX)) {\n        this.deletePrefixedName(key);\n      }\n    });\n\n    // Remove all persisted session variables\n    Object.keys(localStorage).forEach((key) => {\n      if (key.startsWith(this.KEY_PREFIX)) {\n        this.deletePrefixedName(key);\n      }\n    });\n  }\n\n  public setCookieSecure(value: boolean) {\n    this.cookieSecure = value;\n    if (!value) {\n      if (isDevMode()) {\n        console.warn(\n          'The cookie secure flag in persistService has been set to false, set it to true in production mode'\n        );\n      } else {\n        throw new LrBadArgumentException(\n          'Can not set PersistService cookie secure flag to false in production mode.'\n        );\n      }\n    }\n  }\n\n  private prefixName(name: string): string {\n    return this.KEY_PREFIX + name;\n  }\n\n  public delete(name: string): void {\n    this.deletePrefixedName(this.prefixName(name));\n  }\n\n  private deletePrefixedName(prefixedName: string): void {\n    const params = this.getCookieParams();\n    this.cookieService.delete(\n      prefixedName, // name: string,\n      params.path, // path?: string,\n      params.domain, // domain ?: string,\n      params.secure, // secure ?: boolean,\n      params.sameSite // sameSite ?: 'Lax' | 'None' | 'Strict'): void;\n    );\n    localStorage.removeItem(prefixedName);\n  }\n\n  public async set({\n    name,\n    value,\n    serverSession,\n    expiry,\n  }: {\n    name: string;\n    value: any;\n    serverSession: boolean;\n    expiry?: Date;\n  }): Promise<void> {\n    const prefixedName = this.prefixName(name);\n\n    let item: Item;\n\n    if (serverSession) {\n      item = {\n        serverSession: true,\n        data: await this.encryptionService.encryptToString(\n          this.serverSessionEncryptionKey,\n          value\n        ),\n      };\n    } else {\n      item = {\n        data: value,\n      };\n    }\n\n    if (expiry) {\n      const key = await this.keyFactory.createKey();\n      item.expiry = expiry.toISOString();\n      item.data = await this.encryptionService.encryptToString(key, item.data);\n\n      const cookieItem: CookieItem = {\n        key: key.toJSON(true),\n      };\n\n      // If path is set to anything other than \"/\" then the cookie is only\n      // accessible by JS if the current URL has the same prefix as the path.\n      // Ideally we don't want the encryption key cookie to be sent at all, but\n      // since the encrypted content is held in localstorage, it is not a security\n      // risk, i.e. it is at least as secure as storing only in localstorage.\n      const params = this.getCookieParams();\n      this.cookieService.set(\n        prefixedName, // name: string,\n        JSON.stringify(cookieItem), // value: string,\n        expiry, // expires?: number | Date,\n        params.path, // path?: string,\n        params.domain, // domain?: string,\n        params.secure, // secure?: boolean,\n        params.sameSite // sameSite?: 'Lax' | 'None' | 'Strict'\n      );\n    }\n\n    localStorage.setItem(prefixedName, JSON.stringify(item));\n  }\n\n  public async get(name: string): Promise<any> {\n    const prefixedName = this.prefixName(name);\n\n    try {\n      const ret = await this.getImpl(prefixedName);\n      if (ret == null) {\n        // Clear any cookies to keep things in sync.\n        this.deletePrefixedName(prefixedName);\n      }\n      return ret;\n    } catch (error) {\n      this.deletePrefixedName(prefixedName);\n      throw error;\n    }\n  }\n\n  private async getImpl(name: string): Promise<any> {\n    const itemString = localStorage.getItem(name);\n    if (!itemString) {\n      return null;\n    }\n\n    const item: Item = JSON.parse(itemString);\n\n    let data: any;\n\n    if (item.expiry) {\n      const cookieItemString = this.cookieService.get(name);\n      if (!cookieItemString) {\n        // Probably expired, but we won't make any interpretations since if we only used\n        // cookies we can't tell if it's expired or explicitly removed. So we just make\n        // the behaviour here consistent with that.\n        console.log('No cookie.');\n        return null;\n      }\n\n      const cookieItem = JSON.parse(cookieItemString);\n\n      const key = await KFS.asKey(cookieItem.key);\n\n      data = await this.encryptionService.decrypt(key, item.data);\n    } else {\n      data = item.data;\n    }\n\n    if (item.serverSession) {\n      data = await this.encryptionService.decrypt(\n        this.serverSessionEncryptionKey,\n        data\n      );\n    }\n\n    return data;\n  }\n}\n"]}
|
|
@@ -120,4 +120,4 @@ export const StripeQuery = gql `
|
|
|
120
120
|
}
|
|
121
121
|
}
|
|
122
122
|
`;
|
|
123
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
123
|
+
//# sourceMappingURL=data:application/json;base64,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
|