@lifeready/core 1.0.3 → 1.0.5
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +62 -62
- package/bundles/lifeready-core.umd.js +15445 -15445
- package/bundles/lifeready-core.umd.js.map +1 -1
- package/bundles/lifeready-core.umd.min.js.map +1 -1
- package/esm2015/lib/_common/ast.js +40 -40
- package/esm2015/lib/_common/deferred-promise.js +24 -24
- package/esm2015/lib/_common/exceptions.js +157 -157
- package/esm2015/lib/_common/queries.gql.js +190 -190
- package/esm2015/lib/_common/run-outside-angular.js +79 -79
- package/esm2015/lib/_common/types.js +1 -1
- package/esm2015/lib/_common/utils.js +44 -44
- package/esm2015/lib/api/contact-card.gql.js +79 -79
- package/esm2015/lib/api/contact-card.service.js +154 -154
- package/esm2015/lib/api/contact-card2.gql.js +60 -60
- package/esm2015/lib/api/contact-card2.service.js +103 -103
- package/esm2015/lib/api/file.service.js +74 -74
- package/esm2015/lib/api/item2.gql.js +110 -110
- package/esm2015/lib/api/item2.service.js +311 -311
- package/esm2015/lib/api/key-exchange.gql.js +188 -188
- package/esm2015/lib/api/key-exchange.service.js +442 -442
- package/esm2015/lib/api/key-exchange.types.js +18 -18
- package/esm2015/lib/api/key-exchange2.gql.js +171 -171
- package/esm2015/lib/api/key-exchange2.service.js +479 -479
- package/esm2015/lib/api/lock.gql.js +40 -40
- package/esm2015/lib/api/lock.service.js +64 -64
- package/esm2015/lib/api/lr-apollo.service.js +46 -46
- package/esm2015/lib/api/lr-graphql/index.js +6 -6
- package/esm2015/lib/api/lr-graphql/lr-graphql.service.js +155 -155
- package/esm2015/lib/api/lr-graphql/lr-merged-mutation.js +213 -213
- package/esm2015/lib/api/lr-graphql/lr-mutation-base.js +51 -51
- package/esm2015/lib/api/lr-graphql/lr-mutation.js +48 -48
- package/esm2015/lib/api/lr-graphql/lr.service.js +18 -18
- package/esm2015/lib/api/message.service.js +138 -138
- package/esm2015/lib/api/persist.service.js +181 -181
- package/esm2015/lib/api/query-processor/common-processors.service.js +93 -93
- package/esm2015/lib/api/query-processor/index.js +3 -3
- package/esm2015/lib/api/query-processor/query-processor.service.js +192 -192
- package/esm2015/lib/api/query-processor/tp-password-reset-processor.service.js +109 -109
- package/esm2015/lib/api/shared-contact-card.service.js +119 -119
- package/esm2015/lib/api/shared-contact-card2.gql.js +41 -41
- package/esm2015/lib/api/shared-contact-card2.service.js +117 -117
- package/esm2015/lib/api/time.service.js +146 -146
- package/esm2015/lib/api/types/graphql.types.js +7 -7
- package/esm2015/lib/api/types/index.js +3 -3
- package/esm2015/lib/api/types/lr-graphql.types.js +71 -71
- package/esm2015/lib/auth/auth.config.js +57 -57
- package/esm2015/lib/auth/auth.gql.js +48 -48
- package/esm2015/lib/auth/auth.types.js +27 -27
- package/esm2015/lib/auth/idle.service.js +168 -168
- package/esm2015/lib/auth/idle.types.js +7 -7
- package/esm2015/lib/auth/lbop.service.js +355 -355
- package/esm2015/lib/auth/life-ready-auth.service.js +500 -500
- package/esm2015/lib/auth/password.service.js +320 -320
- package/esm2015/lib/auth/register.service.js +172 -172
- package/esm2015/lib/auth/two-factor.service.js +74 -74
- package/esm2015/lib/category/category-meta.service.js +99 -99
- package/esm2015/lib/category/category.gql.js +406 -406
- package/esm2015/lib/category/category.service.js +390 -390
- package/esm2015/lib/category/category.types.js +29 -29
- package/esm2015/lib/cryptography/cryptography.types.js +11 -11
- package/esm2015/lib/cryptography/encryption.service.js +189 -189
- package/esm2015/lib/cryptography/key-factory.service.js +237 -237
- package/esm2015/lib/cryptography/key-graph.service.js +280 -280
- package/esm2015/lib/cryptography/key-meta.service.js +200 -200
- package/esm2015/lib/cryptography/key.service.js +124 -124
- package/esm2015/lib/cryptography/slip39.service.js +169 -169
- package/esm2015/lib/cryptography/web-crypto.service.js +29 -29
- package/esm2015/lib/life-ready.config.js +84 -84
- package/esm2015/lib/life-ready.module.js +74 -74
- package/esm2015/lib/plan/plan.gql.js +123 -123
- package/esm2015/lib/plan/plan.service.js +149 -149
- package/esm2015/lib/plan/plan.types.js +11 -11
- package/esm2015/lib/record/record-attachment.service.js +101 -101
- package/esm2015/lib/record/record.gql.js +179 -179
- package/esm2015/lib/record/record.service.js +206 -206
- package/esm2015/lib/record/record.types.js +15 -15
- package/esm2015/lib/record-type/record-type.service.js +75 -75
- package/esm2015/lib/record-type/record-type.types.js +28 -28
- package/esm2015/lib/scenario/approvals/scenario-approval.gql.js +105 -105
- package/esm2015/lib/scenario/approvals/scenario-approval.types.js +1 -1
- package/esm2015/lib/scenario/approvals/scenario-approver.service.js +300 -300
- package/esm2015/lib/scenario/claimants/scenario-claimant.gql.js +52 -52
- package/esm2015/lib/scenario/claimants/scenario-claimant.service.js +97 -97
- package/esm2015/lib/scenario/claimants/scenario-claimant.types.js +1 -1
- package/esm2015/lib/scenario/receivers/scenario-receiver.gql.js +150 -150
- package/esm2015/lib/scenario/receivers/scenario-receiver.service.js +229 -229
- package/esm2015/lib/scenario/receivers/scenario-receiver.types.js +1 -1
- package/esm2015/lib/scenario/scenario-setup.service.js +269 -269
- package/esm2015/lib/scenario/scenario.gql.js +368 -368
- package/esm2015/lib/scenario/scenario.service.js +611 -611
- package/esm2015/lib/scenario/scenario.types.js +64 -64
- package/esm2015/lib/search/search.gql.js +62 -62
- package/esm2015/lib/search/search.service.js +156 -156
- package/esm2015/lib/search/search.types.js +6 -6
- package/esm2015/lib/trusted-parties/tp-password-reset-request.service.js +112 -112
- package/esm2015/lib/trusted-parties/tp-password-reset-user.service.js +129 -129
- package/esm2015/lib/trusted-parties/tp-password-reset.constants.js +4 -4
- package/esm2015/lib/trusted-parties/tp-password-reset.gql.js +232 -232
- package/esm2015/lib/trusted-parties/tp-password-reset.service.js +299 -299
- package/esm2015/lib/trusted-parties/trusted-party.gql.js +148 -148
- package/esm2015/lib/trusted-parties/trusted-party.service.js +326 -326
- package/esm2015/lib/trusted-parties/trusted-party.types.js +41 -41
- package/esm2015/lib/trusted-parties/trusted-party2.gql.js +87 -87
- package/esm2015/lib/trusted-parties/trusted-party2.service.js +215 -215
- package/esm2015/lib/users/profile-details.service.js +214 -214
- package/esm2015/lib/users/profile.gql.js +97 -97
- package/esm2015/lib/users/profile.service.js +169 -169
- package/esm2015/lib/users/profile.types.js +34 -34
- package/esm2015/lib/users/user.gql.js +60 -60
- package/esm2015/lib/users/user.service.js +79 -79
- package/esm2015/lib/users/user.types.js +5 -5
- package/esm2015/lifeready-core.js +10 -10
- package/esm2015/public-api.js +81 -81
- package/fesm2015/lifeready-core.js +13088 -13088
- package/fesm2015/lifeready-core.js.map +1 -1
- package/lib/_common/ast.d.ts +11 -11
- package/lib/_common/deferred-promise.d.ts +12 -12
- package/lib/_common/exceptions.d.ts +109 -109
- package/lib/_common/queries.gql.d.ts +10 -10
- package/lib/_common/run-outside-angular.d.ts +14 -14
- package/lib/_common/types.d.ts +10 -10
- package/lib/_common/utils.d.ts +3 -3
- package/lib/api/contact-card.gql.d.ts +7 -7
- package/lib/api/contact-card.service.d.ts +52 -52
- package/lib/api/contact-card2.gql.d.ts +34 -34
- package/lib/api/contact-card2.service.d.ts +49 -49
- package/lib/api/file.service.d.ts +18 -18
- package/lib/api/item2.gql.d.ts +96 -96
- package/lib/api/item2.service.d.ts +177 -177
- package/lib/api/key-exchange.gql.d.ts +9 -9
- package/lib/api/key-exchange.service.d.ts +39 -39
- package/lib/api/key-exchange.types.d.ts +196 -196
- package/lib/api/key-exchange2.gql.d.ts +125 -125
- package/lib/api/key-exchange2.service.d.ts +187 -187
- package/lib/api/lock.gql.d.ts +27 -27
- package/lib/api/lock.service.d.ts +25 -25
- package/lib/api/lr-apollo.service.d.ts +15 -15
- package/lib/api/lr-graphql/index.d.ts +5 -5
- package/lib/api/lr-graphql/lr-graphql.service.d.ts +60 -60
- package/lib/api/lr-graphql/lr-merged-mutation.d.ts +27 -27
- package/lib/api/lr-graphql/lr-mutation-base.d.ts +28 -28
- package/lib/api/lr-graphql/lr-mutation.d.ts +8 -8
- package/lib/api/lr-graphql/lr.service.d.ts +9 -9
- package/lib/api/message.service.d.ts +58 -58
- package/lib/api/persist.service.d.ts +31 -31
- package/lib/api/query-processor/common-processors.service.d.ts +36 -36
- package/lib/api/query-processor/index.d.ts +2 -2
- package/lib/api/query-processor/query-processor.service.d.ts +18 -18
- package/lib/api/query-processor/tp-password-reset-processor.service.d.ts +15 -15
- package/lib/api/shared-contact-card.service.d.ts +33 -33
- package/lib/api/shared-contact-card2.gql.d.ts +36 -36
- package/lib/api/shared-contact-card2.service.d.ts +45 -45
- package/lib/api/time.service.d.ts +16 -16
- package/lib/api/types/graphql.types.d.ts +29 -29
- package/lib/api/types/index.d.ts +2 -2
- package/lib/api/types/lr-graphql.types.d.ts +385 -385
- package/lib/auth/auth.config.d.ts +5 -5
- package/lib/auth/auth.gql.d.ts +15 -15
- package/lib/auth/auth.types.d.ts +66 -66
- package/lib/auth/idle.service.d.ts +40 -40
- package/lib/auth/idle.types.d.ts +10 -10
- package/lib/auth/lbop.service.d.ts +91 -91
- package/lib/auth/life-ready-auth.service.d.ts +59 -59
- package/lib/auth/password.service.d.ts +78 -78
- package/lib/auth/register.service.d.ts +25 -25
- package/lib/auth/two-factor.service.d.ts +15 -15
- package/lib/category/category-meta.service.d.ts +23 -23
- package/lib/category/category.gql.d.ts +45 -45
- package/lib/category/category.service.d.ts +67 -67
- package/lib/category/category.types.d.ts +79 -79
- package/lib/cryptography/cryptography.types.d.ts +83 -83
- package/lib/cryptography/encryption.service.d.ts +41 -41
- package/lib/cryptography/key-factory.service.d.ts +38 -38
- package/lib/cryptography/key-graph.service.d.ts +33 -33
- package/lib/cryptography/key-meta.service.d.ts +44 -44
- package/lib/cryptography/key.service.d.ts +36 -36
- package/lib/cryptography/slip39.service.d.ts +43 -43
- package/lib/cryptography/web-crypto.service.d.ts +5 -5
- package/lib/life-ready.config.d.ts +14 -14
- package/lib/life-ready.module.d.ts +5 -5
- package/lib/plan/plan.gql.d.ts +11 -11
- package/lib/plan/plan.service.d.ts +33 -33
- package/lib/plan/plan.types.d.ts +31 -31
- package/lib/record/record-attachment.service.d.ts +16 -16
- package/lib/record/record.gql.d.ts +14 -14
- package/lib/record/record.service.d.ts +25 -25
- package/lib/record/record.types.d.ts +57 -57
- package/lib/record-type/record-type.service.d.ts +11 -11
- package/lib/record-type/record-type.types.d.ts +50 -50
- package/lib/scenario/approvals/scenario-approval.gql.d.ts +7 -7
- package/lib/scenario/approvals/scenario-approval.types.d.ts +63 -63
- package/lib/scenario/approvals/scenario-approver.service.d.ts +32 -32
- package/lib/scenario/claimants/scenario-claimant.gql.d.ts +5 -5
- package/lib/scenario/claimants/scenario-claimant.service.d.ts +17 -17
- package/lib/scenario/claimants/scenario-claimant.types.d.ts +18 -18
- package/lib/scenario/receivers/scenario-receiver.gql.d.ts +8 -8
- package/lib/scenario/receivers/scenario-receiver.service.d.ts +30 -30
- package/lib/scenario/receivers/scenario-receiver.types.d.ts +54 -54
- package/lib/scenario/scenario-setup.service.d.ts +22 -22
- package/lib/scenario/scenario.gql.d.ts +34 -34
- package/lib/scenario/scenario.service.d.ts +58 -58
- package/lib/scenario/scenario.types.d.ts +217 -217
- package/lib/search/search.gql.d.ts +1 -1
- package/lib/search/search.service.d.ts +25 -25
- package/lib/search/search.types.d.ts +20 -20
- package/lib/trusted-parties/tp-password-reset-request.service.d.ts +20 -20
- package/lib/trusted-parties/tp-password-reset-user.service.d.ts +35 -35
- package/lib/trusted-parties/tp-password-reset.constants.d.ts +3 -3
- package/lib/trusted-parties/tp-password-reset.gql.d.ts +218 -218
- package/lib/trusted-parties/tp-password-reset.service.d.ts +130 -130
- package/lib/trusted-parties/trusted-party.gql.d.ts +9 -9
- package/lib/trusted-parties/trusted-party.service.d.ts +44 -44
- package/lib/trusted-parties/trusted-party.types.d.ts +102 -102
- package/lib/trusted-parties/trusted-party2.gql.d.ts +79 -79
- package/lib/trusted-parties/trusted-party2.service.d.ts +114 -114
- package/lib/users/profile-details.service.d.ts +21 -21
- package/lib/users/profile.gql.d.ts +11 -11
- package/lib/users/profile.service.d.ts +35 -35
- package/lib/users/profile.types.d.ts +96 -96
- package/lib/users/user.gql.d.ts +9 -9
- package/lib/users/user.service.d.ts +12 -12
- package/lib/users/user.types.d.ts +23 -23
- package/lifeready-core.d.ts +9 -9
- package/package.json +1 -1
- package/public-api.d.ts +77 -77
|
@@ -1,124 +1,124 @@
|
|
|
1
|
-
import { __awaiter } from "tslib";
|
|
2
|
-
import { Inject, Injectable } from '@angular/core';
|
|
3
|
-
import { LrNotFoundException } from '../_common/exceptions';
|
|
4
|
-
import { PersistService } from '../api/persist.service';
|
|
5
|
-
import { KeyFactoryService as KFS } from './key-factory.service';
|
|
6
|
-
import { LR_CONFIG } from '../life-ready.config';
|
|
7
|
-
import * as i0 from "@angular/core";
|
|
8
|
-
import * as i1 from "../life-ready.config";
|
|
9
|
-
import * as i2 from "../api/persist.service";
|
|
10
|
-
export class UserKeys {
|
|
11
|
-
}
|
|
12
|
-
export class KeyService {
|
|
13
|
-
constructor(config, persistService) {
|
|
14
|
-
this.config = config;
|
|
15
|
-
this.persistService = persistService;
|
|
16
|
-
this.STORE_MASTER_KEY = 'masterKey';
|
|
17
|
-
// AZ: This can't be change easily. It's basically a PassK or PassIdp rotation.
|
|
18
|
-
// todo: we should eventually increase this periodically to match with Moore's law.
|
|
19
|
-
// The iterations for each key are kept by the server as well but we assume the value
|
|
20
|
-
// from the server is not trustworthy, so need to have minimum thresholds here.
|
|
21
|
-
// If creating new keys, these minimum are used.
|
|
22
|
-
this.MIN_PASS_IDP_PBKDF_ITER = 100000;
|
|
23
|
-
this.MIN_PASS_KEY_PBKDF_ITER = 100000;
|
|
24
|
-
this.MIN_LBOP_KEY_PBKDF_ITER = 100000;
|
|
25
|
-
// These are used as the default values. They must be larger than the minimum values.
|
|
26
|
-
this.DEFAULT_PASS_IDP_PBKDF_ITER = this.MIN_PASS_IDP_PBKDF_ITER;
|
|
27
|
-
this.DEFAULT_PASS_KEY_PBKDF_ITER = this.MIN_PASS_KEY_PBKDF_ITER;
|
|
28
|
-
this.DEFAULT_LBOP_KEY_PBKDF_ITER = this.MIN_LBOP_KEY_PBKDF_ITER;
|
|
29
|
-
this.resetKeys();
|
|
30
|
-
}
|
|
31
|
-
resetKeys() {
|
|
32
|
-
this.keys = null;
|
|
33
|
-
this.masterKey = null;
|
|
34
|
-
}
|
|
35
|
-
purgeKeys() {
|
|
36
|
-
this.resetKeys();
|
|
37
|
-
this.persistService.clear();
|
|
38
|
-
}
|
|
39
|
-
populateKeys(keys) {
|
|
40
|
-
this.keys = keys;
|
|
41
|
-
}
|
|
42
|
-
getCurrentPassKey() {
|
|
43
|
-
return this.keys.passKey;
|
|
44
|
-
}
|
|
45
|
-
getCurrentMasterKey() {
|
|
46
|
-
return this.keys.masterKey;
|
|
47
|
-
}
|
|
48
|
-
getCurrentRootKey() {
|
|
49
|
-
return this.keys.rootKey;
|
|
50
|
-
}
|
|
51
|
-
getCurrentPxk() {
|
|
52
|
-
return this.keys.pxk;
|
|
53
|
-
}
|
|
54
|
-
getCurrentSigPxk() {
|
|
55
|
-
return this.keys.sigPxk;
|
|
56
|
-
}
|
|
57
|
-
expiresAfter(seconds) {
|
|
58
|
-
return new Date(Date.now() + 1000 * seconds);
|
|
59
|
-
}
|
|
60
|
-
persistMasterKey(masterKey, expiresAfterSeconds) {
|
|
61
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
62
|
-
const storedKey = {
|
|
63
|
-
id: masterKey.id,
|
|
64
|
-
jwk: masterKey.jwk.toJSON(true),
|
|
65
|
-
};
|
|
66
|
-
this.masterKey = masterKey;
|
|
67
|
-
// Save in an expirable cookie.
|
|
68
|
-
yield this.persistService.set({
|
|
69
|
-
name: this.STORE_MASTER_KEY,
|
|
70
|
-
value: storedKey,
|
|
71
|
-
expiry: this.expiresAfter(expiresAfterSeconds),
|
|
72
|
-
serverSession: !this.config.disableSessionEncryptionKey,
|
|
73
|
-
});
|
|
74
|
-
});
|
|
75
|
-
}
|
|
76
|
-
setMasterKeyExpiresAfterSeconds(seconds) {
|
|
77
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
78
|
-
const storedKey = yield this.persistService.get(this.STORE_MASTER_KEY);
|
|
79
|
-
if (storedKey == null) {
|
|
80
|
-
throw new LrNotFoundException(`Can not find masterKey in persisted storage using name: ${this.STORE_MASTER_KEY}`);
|
|
81
|
-
}
|
|
82
|
-
yield this.persistService.set({
|
|
83
|
-
name: this.STORE_MASTER_KEY,
|
|
84
|
-
value: storedKey,
|
|
85
|
-
expiry: this.expiresAfter(seconds),
|
|
86
|
-
serverSession: !this.config.disableSessionEncryptionKey,
|
|
87
|
-
});
|
|
88
|
-
});
|
|
89
|
-
}
|
|
90
|
-
// There's little benefit in using WebCrypto's none-extractable keys because if there
|
|
91
|
-
// is an XSS attack, then the attacker has control over the js that downloads the keys. The
|
|
92
|
-
// attacker can modify the code to import the keys as extractable. So none-extractable keys
|
|
93
|
-
// are only useful if they are already persisted and the user cannot download any more keys,
|
|
94
|
-
// which is not feasible.
|
|
95
|
-
// So storing the PassKey in localstorage for now, at least till we know what the usage
|
|
96
|
-
// pattern is, i.e. how often do we need to use the RootK, MaterK, and PassK.
|
|
97
|
-
loadMasterKey(masterKeyId) {
|
|
98
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
99
|
-
if (!this.masterKey) {
|
|
100
|
-
const storedKey = yield this.persistService.get(this.STORE_MASTER_KEY);
|
|
101
|
-
if (!storedKey) {
|
|
102
|
-
throw new LrNotFoundException('Could not find masterKey in persisted storage');
|
|
103
|
-
}
|
|
104
|
-
if (storedKey.id !== masterKeyId) {
|
|
105
|
-
throw new LrNotFoundException(`masterKeyId ${storedKey.id} in persisted storage does not match the one requested ${masterKeyId}`);
|
|
106
|
-
}
|
|
107
|
-
storedKey.jwk = yield KFS.asKey(storedKey.jwk);
|
|
108
|
-
this.masterKey = storedKey;
|
|
109
|
-
}
|
|
110
|
-
return this.masterKey;
|
|
111
|
-
});
|
|
112
|
-
}
|
|
113
|
-
}
|
|
114
|
-
KeyService.ɵprov = i0.ɵɵdefineInjectable({ factory: function KeyService_Factory() { return new KeyService(i0.ɵɵinject(i1.LR_CONFIG), i0.ɵɵinject(i2.PersistService)); }, token: KeyService, providedIn: "root" });
|
|
115
|
-
KeyService.decorators = [
|
|
116
|
-
{ type: Injectable, args: [{
|
|
117
|
-
providedIn: 'root',
|
|
118
|
-
},] }
|
|
119
|
-
];
|
|
120
|
-
KeyService.ctorParameters = () => [
|
|
121
|
-
{ type: undefined, decorators: [{ type: Inject, args: [LR_CONFIG,] }] },
|
|
122
|
-
{ type: PersistService }
|
|
123
|
-
];
|
|
124
|
-
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"key.service.js","sourceRoot":"C:/Projects/newrepo/kc-client/projects/core/src/","sources":["lib/cryptography/key.service.ts"],"names":[],"mappings":";AAAA,OAAO,EAAE,MAAM,EAAE,UAAU,EAAE,MAAM,eAAe,CAAC;AAEnD,OAAO,EAAE,mBAAmB,EAAE,MAAM,uBAAuB,CAAC;AAC5D,OAAO,EAAE,cAAc,EAAE,MAAM,wBAAwB,CAAC;AACxD,OAAO,EAAE,iBAAiB,IAAI,GAAG,EAAE,MAAM,uBAAuB,CAAC;AACjE,OAAO,EAAmB,SAAS,EAAE,MAAM,sBAAsB,CAAC;;;;AAElE,MAAM,OAAO,QAAQ;CAMpB;AAUD,MAAM,OAAO,UAAU;IAoBrB,YAC6B,MAAuB,EAC1C,cAA8B;QADX,WAAM,GAAN,MAAM,CAAiB;QAC1C,mBAAc,GAAd,cAAc,CAAgB;QArBvB,qBAAgB,GAAG,WAAW,CAAC;QAKhD,+EAA+E;QAC/E,mFAAmF;QACnF,qFAAqF;QACrF,+EAA+E;QAC/E,gDAAgD;QAChC,4BAAuB,GAAG,MAAM,CAAC;QACjC,4BAAuB,GAAG,MAAM,CAAC;QACjC,4BAAuB,GAAG,MAAM,CAAC;QAEjD,qFAAqF;QACrE,gCAA2B,GAAG,IAAI,CAAC,uBAAuB,CAAC;QAC3D,gCAA2B,GAAG,IAAI,CAAC,uBAAuB,CAAC;QAC3D,gCAA2B,GAAG,IAAI,CAAC,uBAAuB,CAAC;QAMzE,IAAI,CAAC,SAAS,EAAE,CAAC;IACnB,CAAC;IAED,SAAS;QACP,IAAI,CAAC,IAAI,GAAG,IAAI,CAAC;QACjB,IAAI,CAAC,SAAS,GAAG,IAAI,CAAC;IACxB,CAAC;IAED,SAAS;QACP,IAAI,CAAC,SAAS,EAAE,CAAC;QACjB,IAAI,CAAC,cAAc,CAAC,KAAK,EAAE,CAAC;IAC9B,CAAC;IAED,YAAY,CAAC,IAAc;QACzB,IAAI,CAAC,IAAI,GAAG,IAAI,CAAC;IACnB,CAAC;IAEM,iBAAiB;QACtB,OAAO,IAAI,CAAC,IAAI,CAAC,OAAO,CAAC;IAC3B,CAAC;IAEM,mBAAmB;QACxB,OAAO,IAAI,CAAC,IAAI,CAAC,SAAS,CAAC;IAC7B,CAAC;IAEM,iBAAiB;QACtB,OAAO,IAAI,CAAC,IAAI,CAAC,OAAO,CAAC;IAC3B,CAAC;IAEM,aAAa;QAClB,OAAO,IAAI,CAAC,IAAI,CAAC,GAAG,CAAC;IACvB,CAAC;IAEM,gBAAgB;QACrB,OAAO,IAAI,CAAC,IAAI,CAAC,MAAM,CAAC;IAC1B,CAAC;IAEO,YAAY,CAAC,OAAe;QAClC,OAAO,IAAI,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE,GAAG,IAAI,GAAG,OAAO,CAAC,CAAC;IAC/C,CAAC;IAEK,gBAAgB,CACpB,SAAc,EACd,mBAA2B;;YAE3B,MAAM,SAAS,GAAG;gBAChB,EAAE,EAAE,SAAS,CAAC,EAAE;gBAChB,GAAG,EAAE,SAAS,CAAC,GAAG,CAAC,MAAM,CAAC,IAAI,CAAC;aAChC,CAAC;YAEF,IAAI,CAAC,SAAS,GAAG,SAAS,CAAC;YAE3B,+BAA+B;YAC/B,MAAM,IAAI,CAAC,cAAc,CAAC,GAAG,CAAC;gBAC5B,IAAI,EAAE,IAAI,CAAC,gBAAgB;gBAC3B,KAAK,EAAE,SAAS;gBAChB,MAAM,EAAE,IAAI,CAAC,YAAY,CAAC,mBAAmB,CAAC;gBAC9C,aAAa,EAAE,CAAC,IAAI,CAAC,MAAM,CAAC,2BAA2B;aACxD,CAAC,CAAC;QACL,CAAC;KAAA;IAEK,+BAA+B,CAAC,OAAe;;YACnD,MAAM,SAAS,GAAG,MAAM,IAAI,CAAC,cAAc,CAAC,GAAG,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC;YACvE,IAAI,SAAS,IAAI,IAAI,EAAE;gBACrB,MAAM,IAAI,mBAAmB,CAC3B,2DAA2D,IAAI,CAAC,gBAAgB,EAAE,CACnF,CAAC;aACH;YACD,MAAM,IAAI,CAAC,cAAc,CAAC,GAAG,CAAC;gBAC5B,IAAI,EAAE,IAAI,CAAC,gBAAgB;gBAC3B,KAAK,EAAE,SAAS;gBAChB,MAAM,EAAE,IAAI,CAAC,YAAY,CAAC,OAAO,CAAC;gBAClC,aAAa,EAAE,CAAC,IAAI,CAAC,MAAM,CAAC,2BAA2B;aACxD,CAAC,CAAC;QACL,CAAC;KAAA;IAED,qFAAqF;IACrF,2FAA2F;IAC3F,2FAA2F;IAC3F,4FAA4F;IAC5F,yBAAyB;IACzB,uFAAuF;IACvF,6EAA6E;IACvE,aAAa,CAAC,WAAmB;;YACrC,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE;gBACnB,MAAM,SAAS,GAAG,MAAM,IAAI,CAAC,cAAc,CAAC,GAAG,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC;gBAEvE,IAAI,CAAC,SAAS,EAAE;oBACd,MAAM,IAAI,mBAAmB,CAC3B,+CAA+C,CAChD,CAAC;iBACH;gBAED,IAAI,SAAS,CAAC,EAAE,KAAK,WAAW,EAAE;oBAChC,MAAM,IAAI,mBAAmB,CAC3B,eAAe,SAAS,CAAC,EAAE,0DAA0D,WAAW,EAAE,CACnG,CAAC;iBACH;gBAED,SAAS,CAAC,GAAG,GAAG,MAAM,GAAG,CAAC,KAAK,CAAC,SAAS,CAAC,GAAG,CAAC,CAAC;gBAE/C,IAAI,CAAC,SAAS,GAAG,SAAS,CAAC;aAC5B;YAED,OAAO,IAAI,CAAC,SAAS,CAAC;QACxB,CAAC;KAAA;;;;YApIF,UAAU,SAAC;gBACV,UAAU,EAAE,MAAM;aACnB;;;4CAsBI,MAAM,SAAC,SAAS;YAzCZ,cAAc","sourcesContent":["import { Inject, Injectable } from '@angular/core';\r\nimport { Key, PassKey } from './cryptography.types';\r\nimport { LrNotFoundException } from '../_common/exceptions';\r\nimport { PersistService } from '../api/persist.service';\r\nimport { KeyFactoryService as KFS } from './key-factory.service';\r\nimport { LifeReadyConfig, LR_CONFIG } from '../life-ready.config';\r\n\r\nexport class UserKeys {\r\n  passKey: PassKey;\r\n  masterKey: Key;\r\n  rootKey?: Key;\r\n  pxk?: Key;\r\n  sigPxk?: Key;\r\n}\r\n\r\ninterface StoredPassKey {\r\n  id: string;\r\n  jwk: object;\r\n}\r\n\r\n@Injectable({\r\n  providedIn: 'root',\r\n})\r\nexport class KeyService {\r\n  private readonly STORE_MASTER_KEY = 'masterKey';\r\n  // variables\r\n  private keys: UserKeys;\r\n  private masterKey: Key;\r\n\r\n  // AZ: This can't be change easily. It's basically a PassK or PassIdp rotation.\r\n  // todo: we should eventually increase this periodically to match with Moore's law.\r\n  // The iterations for each key are kept by the server as well but we assume the value\r\n  // from the server is not trustworthy, so need to have minimum thresholds here.\r\n  // If creating new keys, these minimum are used.\r\n  public readonly MIN_PASS_IDP_PBKDF_ITER = 100000;\r\n  public readonly MIN_PASS_KEY_PBKDF_ITER = 100000;\r\n  public readonly MIN_LBOP_KEY_PBKDF_ITER = 100000;\r\n\r\n  // These are used as the default values. They must be larger than the minimum values.\r\n  public readonly DEFAULT_PASS_IDP_PBKDF_ITER = this.MIN_PASS_IDP_PBKDF_ITER;\r\n  public readonly DEFAULT_PASS_KEY_PBKDF_ITER = this.MIN_PASS_KEY_PBKDF_ITER;\r\n  public readonly DEFAULT_LBOP_KEY_PBKDF_ITER = this.MIN_LBOP_KEY_PBKDF_ITER;\r\n\r\n  constructor(\r\n    @Inject(LR_CONFIG) private config: LifeReadyConfig,\r\n    private persistService: PersistService\r\n  ) {\r\n    this.resetKeys();\r\n  }\r\n\r\n  resetKeys() {\r\n    this.keys = null;\r\n    this.masterKey = null;\r\n  }\r\n\r\n  purgeKeys() {\r\n    this.resetKeys();\r\n    this.persistService.clear();\r\n  }\r\n\r\n  populateKeys(keys: UserKeys) {\r\n    this.keys = keys;\r\n  }\r\n\r\n  public getCurrentPassKey(): Key {\r\n    return this.keys.passKey;\r\n  }\r\n\r\n  public getCurrentMasterKey(): Key {\r\n    return this.keys.masterKey;\r\n  }\r\n\r\n  public getCurrentRootKey(): Key {\r\n    return this.keys.rootKey;\r\n  }\r\n\r\n  public getCurrentPxk(): Key {\r\n    return this.keys.pxk;\r\n  }\r\n\r\n  public getCurrentSigPxk(): Key {\r\n    return this.keys.sigPxk;\r\n  }\r\n\r\n  private expiresAfter(seconds: number): Date {\r\n    return new Date(Date.now() + 1000 * seconds);\r\n  }\r\n\r\n  async persistMasterKey(\r\n    masterKey: Key,\r\n    expiresAfterSeconds: number\r\n  ): Promise<void> {\r\n    const storedKey = {\r\n      id: masterKey.id,\r\n      jwk: masterKey.jwk.toJSON(true),\r\n    };\r\n\r\n    this.masterKey = masterKey;\r\n\r\n    // Save in an expirable cookie.\r\n    await this.persistService.set({\r\n      name: this.STORE_MASTER_KEY,\r\n      value: storedKey,\r\n      expiry: this.expiresAfter(expiresAfterSeconds),\r\n      serverSession: !this.config.disableSessionEncryptionKey,\r\n    });\r\n  }\r\n\r\n  async setMasterKeyExpiresAfterSeconds(seconds: number): Promise<void> {\r\n    const storedKey = await this.persistService.get(this.STORE_MASTER_KEY);\r\n    if (storedKey == null) {\r\n      throw new LrNotFoundException(\r\n        `Can not find masterKey in persisted storage using name: ${this.STORE_MASTER_KEY}`\r\n      );\r\n    }\r\n    await this.persistService.set({\r\n      name: this.STORE_MASTER_KEY,\r\n      value: storedKey,\r\n      expiry: this.expiresAfter(seconds),\r\n      serverSession: !this.config.disableSessionEncryptionKey,\r\n    });\r\n  }\r\n\r\n  // There's little benefit in using WebCrypto's none-extractable keys because if there\r\n  // is an XSS attack, then the attacker has control over the js that downloads the keys. The\r\n  // attacker can modify the code to import the keys as extractable. So none-extractable keys\r\n  // are only useful if they are already persisted and the user cannot download any more keys,\r\n  // which is not feasible.\r\n  // So storing the PassKey in localstorage for now, at least till we know what the usage\r\n  // pattern is, i.e. how often do we need to use the RootK, MaterK, and PassK.\r\n  async loadMasterKey(masterKeyId: string): Promise<Key> {\r\n    if (!this.masterKey) {\r\n      const storedKey = await this.persistService.get(this.STORE_MASTER_KEY);\r\n\r\n      if (!storedKey) {\r\n        throw new LrNotFoundException(\r\n          'Could not find masterKey in persisted storage'\r\n        );\r\n      }\r\n\r\n      if (storedKey.id !== masterKeyId) {\r\n        throw new LrNotFoundException(\r\n          `masterKeyId ${storedKey.id} in persisted storage does not match the one requested ${masterKeyId}`\r\n        );\r\n      }\r\n\r\n      storedKey.jwk = await KFS.asKey(storedKey.jwk);\r\n\r\n      this.masterKey = storedKey;\r\n    }\r\n\r\n    return this.masterKey;\r\n  }\r\n}\r\n"]}
|
|
1
|
+
import { __awaiter } from "tslib";
|
|
2
|
+
import { Inject, Injectable } from '@angular/core';
|
|
3
|
+
import { LrNotFoundException } from '../_common/exceptions';
|
|
4
|
+
import { PersistService } from '../api/persist.service';
|
|
5
|
+
import { KeyFactoryService as KFS } from './key-factory.service';
|
|
6
|
+
import { LR_CONFIG } from '../life-ready.config';
|
|
7
|
+
import * as i0 from "@angular/core";
|
|
8
|
+
import * as i1 from "../life-ready.config";
|
|
9
|
+
import * as i2 from "../api/persist.service";
|
|
10
|
+
export class UserKeys {
|
|
11
|
+
}
|
|
12
|
+
export class KeyService {
|
|
13
|
+
constructor(config, persistService) {
|
|
14
|
+
this.config = config;
|
|
15
|
+
this.persistService = persistService;
|
|
16
|
+
this.STORE_MASTER_KEY = 'masterKey';
|
|
17
|
+
// AZ: This can't be change easily. It's basically a PassK or PassIdp rotation.
|
|
18
|
+
// todo: we should eventually increase this periodically to match with Moore's law.
|
|
19
|
+
// The iterations for each key are kept by the server as well but we assume the value
|
|
20
|
+
// from the server is not trustworthy, so need to have minimum thresholds here.
|
|
21
|
+
// If creating new keys, these minimum are used.
|
|
22
|
+
this.MIN_PASS_IDP_PBKDF_ITER = 100000;
|
|
23
|
+
this.MIN_PASS_KEY_PBKDF_ITER = 100000;
|
|
24
|
+
this.MIN_LBOP_KEY_PBKDF_ITER = 100000;
|
|
25
|
+
// These are used as the default values. They must be larger than the minimum values.
|
|
26
|
+
this.DEFAULT_PASS_IDP_PBKDF_ITER = this.MIN_PASS_IDP_PBKDF_ITER;
|
|
27
|
+
this.DEFAULT_PASS_KEY_PBKDF_ITER = this.MIN_PASS_KEY_PBKDF_ITER;
|
|
28
|
+
this.DEFAULT_LBOP_KEY_PBKDF_ITER = this.MIN_LBOP_KEY_PBKDF_ITER;
|
|
29
|
+
this.resetKeys();
|
|
30
|
+
}
|
|
31
|
+
resetKeys() {
|
|
32
|
+
this.keys = null;
|
|
33
|
+
this.masterKey = null;
|
|
34
|
+
}
|
|
35
|
+
purgeKeys() {
|
|
36
|
+
this.resetKeys();
|
|
37
|
+
this.persistService.clear();
|
|
38
|
+
}
|
|
39
|
+
populateKeys(keys) {
|
|
40
|
+
this.keys = keys;
|
|
41
|
+
}
|
|
42
|
+
getCurrentPassKey() {
|
|
43
|
+
return this.keys.passKey;
|
|
44
|
+
}
|
|
45
|
+
getCurrentMasterKey() {
|
|
46
|
+
return this.keys.masterKey;
|
|
47
|
+
}
|
|
48
|
+
getCurrentRootKey() {
|
|
49
|
+
return this.keys.rootKey;
|
|
50
|
+
}
|
|
51
|
+
getCurrentPxk() {
|
|
52
|
+
return this.keys.pxk;
|
|
53
|
+
}
|
|
54
|
+
getCurrentSigPxk() {
|
|
55
|
+
return this.keys.sigPxk;
|
|
56
|
+
}
|
|
57
|
+
expiresAfter(seconds) {
|
|
58
|
+
return new Date(Date.now() + 1000 * seconds);
|
|
59
|
+
}
|
|
60
|
+
persistMasterKey(masterKey, expiresAfterSeconds) {
|
|
61
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
62
|
+
const storedKey = {
|
|
63
|
+
id: masterKey.id,
|
|
64
|
+
jwk: masterKey.jwk.toJSON(true),
|
|
65
|
+
};
|
|
66
|
+
this.masterKey = masterKey;
|
|
67
|
+
// Save in an expirable cookie.
|
|
68
|
+
yield this.persistService.set({
|
|
69
|
+
name: this.STORE_MASTER_KEY,
|
|
70
|
+
value: storedKey,
|
|
71
|
+
expiry: this.expiresAfter(expiresAfterSeconds),
|
|
72
|
+
serverSession: !this.config.disableSessionEncryptionKey,
|
|
73
|
+
});
|
|
74
|
+
});
|
|
75
|
+
}
|
|
76
|
+
setMasterKeyExpiresAfterSeconds(seconds) {
|
|
77
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
78
|
+
const storedKey = yield this.persistService.get(this.STORE_MASTER_KEY);
|
|
79
|
+
if (storedKey == null) {
|
|
80
|
+
throw new LrNotFoundException(`Can not find masterKey in persisted storage using name: ${this.STORE_MASTER_KEY}`);
|
|
81
|
+
}
|
|
82
|
+
yield this.persistService.set({
|
|
83
|
+
name: this.STORE_MASTER_KEY,
|
|
84
|
+
value: storedKey,
|
|
85
|
+
expiry: this.expiresAfter(seconds),
|
|
86
|
+
serverSession: !this.config.disableSessionEncryptionKey,
|
|
87
|
+
});
|
|
88
|
+
});
|
|
89
|
+
}
|
|
90
|
+
// There's little benefit in using WebCrypto's none-extractable keys because if there
|
|
91
|
+
// is an XSS attack, then the attacker has control over the js that downloads the keys. The
|
|
92
|
+
// attacker can modify the code to import the keys as extractable. So none-extractable keys
|
|
93
|
+
// are only useful if they are already persisted and the user cannot download any more keys,
|
|
94
|
+
// which is not feasible.
|
|
95
|
+
// So storing the PassKey in localstorage for now, at least till we know what the usage
|
|
96
|
+
// pattern is, i.e. how often do we need to use the RootK, MaterK, and PassK.
|
|
97
|
+
loadMasterKey(masterKeyId) {
|
|
98
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
99
|
+
if (!this.masterKey) {
|
|
100
|
+
const storedKey = yield this.persistService.get(this.STORE_MASTER_KEY);
|
|
101
|
+
if (!storedKey) {
|
|
102
|
+
throw new LrNotFoundException('Could not find masterKey in persisted storage');
|
|
103
|
+
}
|
|
104
|
+
if (storedKey.id !== masterKeyId) {
|
|
105
|
+
throw new LrNotFoundException(`masterKeyId ${storedKey.id} in persisted storage does not match the one requested ${masterKeyId}`);
|
|
106
|
+
}
|
|
107
|
+
storedKey.jwk = yield KFS.asKey(storedKey.jwk);
|
|
108
|
+
this.masterKey = storedKey;
|
|
109
|
+
}
|
|
110
|
+
return this.masterKey;
|
|
111
|
+
});
|
|
112
|
+
}
|
|
113
|
+
}
|
|
114
|
+
KeyService.ɵprov = i0.ɵɵdefineInjectable({ factory: function KeyService_Factory() { return new KeyService(i0.ɵɵinject(i1.LR_CONFIG), i0.ɵɵinject(i2.PersistService)); }, token: KeyService, providedIn: "root" });
|
|
115
|
+
KeyService.decorators = [
|
|
116
|
+
{ type: Injectable, args: [{
|
|
117
|
+
providedIn: 'root',
|
|
118
|
+
},] }
|
|
119
|
+
];
|
|
120
|
+
KeyService.ctorParameters = () => [
|
|
121
|
+
{ type: undefined, decorators: [{ type: Inject, args: [LR_CONFIG,] }] },
|
|
122
|
+
{ type: PersistService }
|
|
123
|
+
];
|
|
124
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"key.service.js","sourceRoot":"/opt/atlassian/pipelines/agent/build/projects/core/src/","sources":["lib/cryptography/key.service.ts"],"names":[],"mappings":";AAAA,OAAO,EAAE,MAAM,EAAE,UAAU,EAAE,MAAM,eAAe,CAAC;AAEnD,OAAO,EAAE,mBAAmB,EAAE,MAAM,uBAAuB,CAAC;AAC5D,OAAO,EAAE,cAAc,EAAE,MAAM,wBAAwB,CAAC;AACxD,OAAO,EAAE,iBAAiB,IAAI,GAAG,EAAE,MAAM,uBAAuB,CAAC;AACjE,OAAO,EAAmB,SAAS,EAAE,MAAM,sBAAsB,CAAC;;;;AAElE,MAAM,OAAO,QAAQ;CAMpB;AAUD,MAAM,OAAO,UAAU;IAoBrB,YAC6B,MAAuB,EAC1C,cAA8B;QADX,WAAM,GAAN,MAAM,CAAiB;QAC1C,mBAAc,GAAd,cAAc,CAAgB;QArBvB,qBAAgB,GAAG,WAAW,CAAC;QAKhD,+EAA+E;QAC/E,mFAAmF;QACnF,qFAAqF;QACrF,+EAA+E;QAC/E,gDAAgD;QAChC,4BAAuB,GAAG,MAAM,CAAC;QACjC,4BAAuB,GAAG,MAAM,CAAC;QACjC,4BAAuB,GAAG,MAAM,CAAC;QAEjD,qFAAqF;QACrE,gCAA2B,GAAG,IAAI,CAAC,uBAAuB,CAAC;QAC3D,gCAA2B,GAAG,IAAI,CAAC,uBAAuB,CAAC;QAC3D,gCAA2B,GAAG,IAAI,CAAC,uBAAuB,CAAC;QAMzE,IAAI,CAAC,SAAS,EAAE,CAAC;IACnB,CAAC;IAED,SAAS;QACP,IAAI,CAAC,IAAI,GAAG,IAAI,CAAC;QACjB,IAAI,CAAC,SAAS,GAAG,IAAI,CAAC;IACxB,CAAC;IAED,SAAS;QACP,IAAI,CAAC,SAAS,EAAE,CAAC;QACjB,IAAI,CAAC,cAAc,CAAC,KAAK,EAAE,CAAC;IAC9B,CAAC;IAED,YAAY,CAAC,IAAc;QACzB,IAAI,CAAC,IAAI,GAAG,IAAI,CAAC;IACnB,CAAC;IAEM,iBAAiB;QACtB,OAAO,IAAI,CAAC,IAAI,CAAC,OAAO,CAAC;IAC3B,CAAC;IAEM,mBAAmB;QACxB,OAAO,IAAI,CAAC,IAAI,CAAC,SAAS,CAAC;IAC7B,CAAC;IAEM,iBAAiB;QACtB,OAAO,IAAI,CAAC,IAAI,CAAC,OAAO,CAAC;IAC3B,CAAC;IAEM,aAAa;QAClB,OAAO,IAAI,CAAC,IAAI,CAAC,GAAG,CAAC;IACvB,CAAC;IAEM,gBAAgB;QACrB,OAAO,IAAI,CAAC,IAAI,CAAC,MAAM,CAAC;IAC1B,CAAC;IAEO,YAAY,CAAC,OAAe;QAClC,OAAO,IAAI,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE,GAAG,IAAI,GAAG,OAAO,CAAC,CAAC;IAC/C,CAAC;IAEK,gBAAgB,CACpB,SAAc,EACd,mBAA2B;;YAE3B,MAAM,SAAS,GAAG;gBAChB,EAAE,EAAE,SAAS,CAAC,EAAE;gBAChB,GAAG,EAAE,SAAS,CAAC,GAAG,CAAC,MAAM,CAAC,IAAI,CAAC;aAChC,CAAC;YAEF,IAAI,CAAC,SAAS,GAAG,SAAS,CAAC;YAE3B,+BAA+B;YAC/B,MAAM,IAAI,CAAC,cAAc,CAAC,GAAG,CAAC;gBAC5B,IAAI,EAAE,IAAI,CAAC,gBAAgB;gBAC3B,KAAK,EAAE,SAAS;gBAChB,MAAM,EAAE,IAAI,CAAC,YAAY,CAAC,mBAAmB,CAAC;gBAC9C,aAAa,EAAE,CAAC,IAAI,CAAC,MAAM,CAAC,2BAA2B;aACxD,CAAC,CAAC;QACL,CAAC;KAAA;IAEK,+BAA+B,CAAC,OAAe;;YACnD,MAAM,SAAS,GAAG,MAAM,IAAI,CAAC,cAAc,CAAC,GAAG,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC;YACvE,IAAI,SAAS,IAAI,IAAI,EAAE;gBACrB,MAAM,IAAI,mBAAmB,CAC3B,2DAA2D,IAAI,CAAC,gBAAgB,EAAE,CACnF,CAAC;aACH;YACD,MAAM,IAAI,CAAC,cAAc,CAAC,GAAG,CAAC;gBAC5B,IAAI,EAAE,IAAI,CAAC,gBAAgB;gBAC3B,KAAK,EAAE,SAAS;gBAChB,MAAM,EAAE,IAAI,CAAC,YAAY,CAAC,OAAO,CAAC;gBAClC,aAAa,EAAE,CAAC,IAAI,CAAC,MAAM,CAAC,2BAA2B;aACxD,CAAC,CAAC;QACL,CAAC;KAAA;IAED,qFAAqF;IACrF,2FAA2F;IAC3F,2FAA2F;IAC3F,4FAA4F;IAC5F,yBAAyB;IACzB,uFAAuF;IACvF,6EAA6E;IACvE,aAAa,CAAC,WAAmB;;YACrC,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE;gBACnB,MAAM,SAAS,GAAG,MAAM,IAAI,CAAC,cAAc,CAAC,GAAG,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC;gBAEvE,IAAI,CAAC,SAAS,EAAE;oBACd,MAAM,IAAI,mBAAmB,CAC3B,+CAA+C,CAChD,CAAC;iBACH;gBAED,IAAI,SAAS,CAAC,EAAE,KAAK,WAAW,EAAE;oBAChC,MAAM,IAAI,mBAAmB,CAC3B,eAAe,SAAS,CAAC,EAAE,0DAA0D,WAAW,EAAE,CACnG,CAAC;iBACH;gBAED,SAAS,CAAC,GAAG,GAAG,MAAM,GAAG,CAAC,KAAK,CAAC,SAAS,CAAC,GAAG,CAAC,CAAC;gBAE/C,IAAI,CAAC,SAAS,GAAG,SAAS,CAAC;aAC5B;YAED,OAAO,IAAI,CAAC,SAAS,CAAC;QACxB,CAAC;KAAA;;;;YApIF,UAAU,SAAC;gBACV,UAAU,EAAE,MAAM;aACnB;;;4CAsBI,MAAM,SAAC,SAAS;YAzCZ,cAAc","sourcesContent":["import { Inject, Injectable } from '@angular/core';\nimport { Key, PassKey } from './cryptography.types';\nimport { LrNotFoundException } from '../_common/exceptions';\nimport { PersistService } from '../api/persist.service';\nimport { KeyFactoryService as KFS } from './key-factory.service';\nimport { LifeReadyConfig, LR_CONFIG } from '../life-ready.config';\n\nexport class UserKeys {\n  passKey: PassKey;\n  masterKey: Key;\n  rootKey?: Key;\n  pxk?: Key;\n  sigPxk?: Key;\n}\n\ninterface StoredPassKey {\n  id: string;\n  jwk: object;\n}\n\n@Injectable({\n  providedIn: 'root',\n})\nexport class KeyService {\n  private readonly STORE_MASTER_KEY = 'masterKey';\n  // variables\n  private keys: UserKeys;\n  private masterKey: Key;\n\n  // AZ: This can't be change easily. It's basically a PassK or PassIdp rotation.\n  // todo: we should eventually increase this periodically to match with Moore's law.\n  // The iterations for each key are kept by the server as well but we assume the value\n  // from the server is not trustworthy, so need to have minimum thresholds here.\n  // If creating new keys, these minimum are used.\n  public readonly MIN_PASS_IDP_PBKDF_ITER = 100000;\n  public readonly MIN_PASS_KEY_PBKDF_ITER = 100000;\n  public readonly MIN_LBOP_KEY_PBKDF_ITER = 100000;\n\n  // These are used as the default values. They must be larger than the minimum values.\n  public readonly DEFAULT_PASS_IDP_PBKDF_ITER = this.MIN_PASS_IDP_PBKDF_ITER;\n  public readonly DEFAULT_PASS_KEY_PBKDF_ITER = this.MIN_PASS_KEY_PBKDF_ITER;\n  public readonly DEFAULT_LBOP_KEY_PBKDF_ITER = this.MIN_LBOP_KEY_PBKDF_ITER;\n\n  constructor(\n    @Inject(LR_CONFIG) private config: LifeReadyConfig,\n    private persistService: PersistService\n  ) {\n    this.resetKeys();\n  }\n\n  resetKeys() {\n    this.keys = null;\n    this.masterKey = null;\n  }\n\n  purgeKeys() {\n    this.resetKeys();\n    this.persistService.clear();\n  }\n\n  populateKeys(keys: UserKeys) {\n    this.keys = keys;\n  }\n\n  public getCurrentPassKey(): Key {\n    return this.keys.passKey;\n  }\n\n  public getCurrentMasterKey(): Key {\n    return this.keys.masterKey;\n  }\n\n  public getCurrentRootKey(): Key {\n    return this.keys.rootKey;\n  }\n\n  public getCurrentPxk(): Key {\n    return this.keys.pxk;\n  }\n\n  public getCurrentSigPxk(): Key {\n    return this.keys.sigPxk;\n  }\n\n  private expiresAfter(seconds: number): Date {\n    return new Date(Date.now() + 1000 * seconds);\n  }\n\n  async persistMasterKey(\n    masterKey: Key,\n    expiresAfterSeconds: number\n  ): Promise<void> {\n    const storedKey = {\n      id: masterKey.id,\n      jwk: masterKey.jwk.toJSON(true),\n    };\n\n    this.masterKey = masterKey;\n\n    // Save in an expirable cookie.\n    await this.persistService.set({\n      name: this.STORE_MASTER_KEY,\n      value: storedKey,\n      expiry: this.expiresAfter(expiresAfterSeconds),\n      serverSession: !this.config.disableSessionEncryptionKey,\n    });\n  }\n\n  async setMasterKeyExpiresAfterSeconds(seconds: number): Promise<void> {\n    const storedKey = await this.persistService.get(this.STORE_MASTER_KEY);\n    if (storedKey == null) {\n      throw new LrNotFoundException(\n        `Can not find masterKey in persisted storage using name: ${this.STORE_MASTER_KEY}`\n      );\n    }\n    await this.persistService.set({\n      name: this.STORE_MASTER_KEY,\n      value: storedKey,\n      expiry: this.expiresAfter(seconds),\n      serverSession: !this.config.disableSessionEncryptionKey,\n    });\n  }\n\n  // There's little benefit in using WebCrypto's none-extractable keys because if there\n  // is an XSS attack, then the attacker has control over the js that downloads the keys. The\n  // attacker can modify the code to import the keys as extractable. So none-extractable keys\n  // are only useful if they are already persisted and the user cannot download any more keys,\n  // which is not feasible.\n  // So storing the PassKey in localstorage for now, at least till we know what the usage\n  // pattern is, i.e. how often do we need to use the RootK, MaterK, and PassK.\n  async loadMasterKey(masterKeyId: string): Promise<Key> {\n    if (!this.masterKey) {\n      const storedKey = await this.persistService.get(this.STORE_MASTER_KEY);\n\n      if (!storedKey) {\n        throw new LrNotFoundException(\n          'Could not find masterKey in persisted storage'\n        );\n      }\n\n      if (storedKey.id !== masterKeyId) {\n        throw new LrNotFoundException(\n          `masterKeyId ${storedKey.id} in persisted storage does not match the one requested ${masterKeyId}`\n        );\n      }\n\n      storedKey.jwk = await KFS.asKey(storedKey.jwk);\n\n      this.masterKey = storedKey;\n    }\n\n    return this.masterKey;\n  }\n}\n"]}
|