@lifeready/core 1.0.3 → 1.0.5

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (225) hide show
  1. package/README.md +62 -62
  2. package/bundles/lifeready-core.umd.js +15445 -15445
  3. package/bundles/lifeready-core.umd.js.map +1 -1
  4. package/bundles/lifeready-core.umd.min.js.map +1 -1
  5. package/esm2015/lib/_common/ast.js +40 -40
  6. package/esm2015/lib/_common/deferred-promise.js +24 -24
  7. package/esm2015/lib/_common/exceptions.js +157 -157
  8. package/esm2015/lib/_common/queries.gql.js +190 -190
  9. package/esm2015/lib/_common/run-outside-angular.js +79 -79
  10. package/esm2015/lib/_common/types.js +1 -1
  11. package/esm2015/lib/_common/utils.js +44 -44
  12. package/esm2015/lib/api/contact-card.gql.js +79 -79
  13. package/esm2015/lib/api/contact-card.service.js +154 -154
  14. package/esm2015/lib/api/contact-card2.gql.js +60 -60
  15. package/esm2015/lib/api/contact-card2.service.js +103 -103
  16. package/esm2015/lib/api/file.service.js +74 -74
  17. package/esm2015/lib/api/item2.gql.js +110 -110
  18. package/esm2015/lib/api/item2.service.js +311 -311
  19. package/esm2015/lib/api/key-exchange.gql.js +188 -188
  20. package/esm2015/lib/api/key-exchange.service.js +442 -442
  21. package/esm2015/lib/api/key-exchange.types.js +18 -18
  22. package/esm2015/lib/api/key-exchange2.gql.js +171 -171
  23. package/esm2015/lib/api/key-exchange2.service.js +479 -479
  24. package/esm2015/lib/api/lock.gql.js +40 -40
  25. package/esm2015/lib/api/lock.service.js +64 -64
  26. package/esm2015/lib/api/lr-apollo.service.js +46 -46
  27. package/esm2015/lib/api/lr-graphql/index.js +6 -6
  28. package/esm2015/lib/api/lr-graphql/lr-graphql.service.js +155 -155
  29. package/esm2015/lib/api/lr-graphql/lr-merged-mutation.js +213 -213
  30. package/esm2015/lib/api/lr-graphql/lr-mutation-base.js +51 -51
  31. package/esm2015/lib/api/lr-graphql/lr-mutation.js +48 -48
  32. package/esm2015/lib/api/lr-graphql/lr.service.js +18 -18
  33. package/esm2015/lib/api/message.service.js +138 -138
  34. package/esm2015/lib/api/persist.service.js +181 -181
  35. package/esm2015/lib/api/query-processor/common-processors.service.js +93 -93
  36. package/esm2015/lib/api/query-processor/index.js +3 -3
  37. package/esm2015/lib/api/query-processor/query-processor.service.js +192 -192
  38. package/esm2015/lib/api/query-processor/tp-password-reset-processor.service.js +109 -109
  39. package/esm2015/lib/api/shared-contact-card.service.js +119 -119
  40. package/esm2015/lib/api/shared-contact-card2.gql.js +41 -41
  41. package/esm2015/lib/api/shared-contact-card2.service.js +117 -117
  42. package/esm2015/lib/api/time.service.js +146 -146
  43. package/esm2015/lib/api/types/graphql.types.js +7 -7
  44. package/esm2015/lib/api/types/index.js +3 -3
  45. package/esm2015/lib/api/types/lr-graphql.types.js +71 -71
  46. package/esm2015/lib/auth/auth.config.js +57 -57
  47. package/esm2015/lib/auth/auth.gql.js +48 -48
  48. package/esm2015/lib/auth/auth.types.js +27 -27
  49. package/esm2015/lib/auth/idle.service.js +168 -168
  50. package/esm2015/lib/auth/idle.types.js +7 -7
  51. package/esm2015/lib/auth/lbop.service.js +355 -355
  52. package/esm2015/lib/auth/life-ready-auth.service.js +500 -500
  53. package/esm2015/lib/auth/password.service.js +320 -320
  54. package/esm2015/lib/auth/register.service.js +172 -172
  55. package/esm2015/lib/auth/two-factor.service.js +74 -74
  56. package/esm2015/lib/category/category-meta.service.js +99 -99
  57. package/esm2015/lib/category/category.gql.js +406 -406
  58. package/esm2015/lib/category/category.service.js +390 -390
  59. package/esm2015/lib/category/category.types.js +29 -29
  60. package/esm2015/lib/cryptography/cryptography.types.js +11 -11
  61. package/esm2015/lib/cryptography/encryption.service.js +189 -189
  62. package/esm2015/lib/cryptography/key-factory.service.js +237 -237
  63. package/esm2015/lib/cryptography/key-graph.service.js +280 -280
  64. package/esm2015/lib/cryptography/key-meta.service.js +200 -200
  65. package/esm2015/lib/cryptography/key.service.js +124 -124
  66. package/esm2015/lib/cryptography/slip39.service.js +169 -169
  67. package/esm2015/lib/cryptography/web-crypto.service.js +29 -29
  68. package/esm2015/lib/life-ready.config.js +84 -84
  69. package/esm2015/lib/life-ready.module.js +74 -74
  70. package/esm2015/lib/plan/plan.gql.js +123 -123
  71. package/esm2015/lib/plan/plan.service.js +149 -149
  72. package/esm2015/lib/plan/plan.types.js +11 -11
  73. package/esm2015/lib/record/record-attachment.service.js +101 -101
  74. package/esm2015/lib/record/record.gql.js +179 -179
  75. package/esm2015/lib/record/record.service.js +206 -206
  76. package/esm2015/lib/record/record.types.js +15 -15
  77. package/esm2015/lib/record-type/record-type.service.js +75 -75
  78. package/esm2015/lib/record-type/record-type.types.js +28 -28
  79. package/esm2015/lib/scenario/approvals/scenario-approval.gql.js +105 -105
  80. package/esm2015/lib/scenario/approvals/scenario-approval.types.js +1 -1
  81. package/esm2015/lib/scenario/approvals/scenario-approver.service.js +300 -300
  82. package/esm2015/lib/scenario/claimants/scenario-claimant.gql.js +52 -52
  83. package/esm2015/lib/scenario/claimants/scenario-claimant.service.js +97 -97
  84. package/esm2015/lib/scenario/claimants/scenario-claimant.types.js +1 -1
  85. package/esm2015/lib/scenario/receivers/scenario-receiver.gql.js +150 -150
  86. package/esm2015/lib/scenario/receivers/scenario-receiver.service.js +229 -229
  87. package/esm2015/lib/scenario/receivers/scenario-receiver.types.js +1 -1
  88. package/esm2015/lib/scenario/scenario-setup.service.js +269 -269
  89. package/esm2015/lib/scenario/scenario.gql.js +368 -368
  90. package/esm2015/lib/scenario/scenario.service.js +611 -611
  91. package/esm2015/lib/scenario/scenario.types.js +64 -64
  92. package/esm2015/lib/search/search.gql.js +62 -62
  93. package/esm2015/lib/search/search.service.js +156 -156
  94. package/esm2015/lib/search/search.types.js +6 -6
  95. package/esm2015/lib/trusted-parties/tp-password-reset-request.service.js +112 -112
  96. package/esm2015/lib/trusted-parties/tp-password-reset-user.service.js +129 -129
  97. package/esm2015/lib/trusted-parties/tp-password-reset.constants.js +4 -4
  98. package/esm2015/lib/trusted-parties/tp-password-reset.gql.js +232 -232
  99. package/esm2015/lib/trusted-parties/tp-password-reset.service.js +299 -299
  100. package/esm2015/lib/trusted-parties/trusted-party.gql.js +148 -148
  101. package/esm2015/lib/trusted-parties/trusted-party.service.js +326 -326
  102. package/esm2015/lib/trusted-parties/trusted-party.types.js +41 -41
  103. package/esm2015/lib/trusted-parties/trusted-party2.gql.js +87 -87
  104. package/esm2015/lib/trusted-parties/trusted-party2.service.js +215 -215
  105. package/esm2015/lib/users/profile-details.service.js +214 -214
  106. package/esm2015/lib/users/profile.gql.js +97 -97
  107. package/esm2015/lib/users/profile.service.js +169 -169
  108. package/esm2015/lib/users/profile.types.js +34 -34
  109. package/esm2015/lib/users/user.gql.js +60 -60
  110. package/esm2015/lib/users/user.service.js +79 -79
  111. package/esm2015/lib/users/user.types.js +5 -5
  112. package/esm2015/lifeready-core.js +10 -10
  113. package/esm2015/public-api.js +81 -81
  114. package/fesm2015/lifeready-core.js +13088 -13088
  115. package/fesm2015/lifeready-core.js.map +1 -1
  116. package/lib/_common/ast.d.ts +11 -11
  117. package/lib/_common/deferred-promise.d.ts +12 -12
  118. package/lib/_common/exceptions.d.ts +109 -109
  119. package/lib/_common/queries.gql.d.ts +10 -10
  120. package/lib/_common/run-outside-angular.d.ts +14 -14
  121. package/lib/_common/types.d.ts +10 -10
  122. package/lib/_common/utils.d.ts +3 -3
  123. package/lib/api/contact-card.gql.d.ts +7 -7
  124. package/lib/api/contact-card.service.d.ts +52 -52
  125. package/lib/api/contact-card2.gql.d.ts +34 -34
  126. package/lib/api/contact-card2.service.d.ts +49 -49
  127. package/lib/api/file.service.d.ts +18 -18
  128. package/lib/api/item2.gql.d.ts +96 -96
  129. package/lib/api/item2.service.d.ts +177 -177
  130. package/lib/api/key-exchange.gql.d.ts +9 -9
  131. package/lib/api/key-exchange.service.d.ts +39 -39
  132. package/lib/api/key-exchange.types.d.ts +196 -196
  133. package/lib/api/key-exchange2.gql.d.ts +125 -125
  134. package/lib/api/key-exchange2.service.d.ts +187 -187
  135. package/lib/api/lock.gql.d.ts +27 -27
  136. package/lib/api/lock.service.d.ts +25 -25
  137. package/lib/api/lr-apollo.service.d.ts +15 -15
  138. package/lib/api/lr-graphql/index.d.ts +5 -5
  139. package/lib/api/lr-graphql/lr-graphql.service.d.ts +60 -60
  140. package/lib/api/lr-graphql/lr-merged-mutation.d.ts +27 -27
  141. package/lib/api/lr-graphql/lr-mutation-base.d.ts +28 -28
  142. package/lib/api/lr-graphql/lr-mutation.d.ts +8 -8
  143. package/lib/api/lr-graphql/lr.service.d.ts +9 -9
  144. package/lib/api/message.service.d.ts +58 -58
  145. package/lib/api/persist.service.d.ts +31 -31
  146. package/lib/api/query-processor/common-processors.service.d.ts +36 -36
  147. package/lib/api/query-processor/index.d.ts +2 -2
  148. package/lib/api/query-processor/query-processor.service.d.ts +18 -18
  149. package/lib/api/query-processor/tp-password-reset-processor.service.d.ts +15 -15
  150. package/lib/api/shared-contact-card.service.d.ts +33 -33
  151. package/lib/api/shared-contact-card2.gql.d.ts +36 -36
  152. package/lib/api/shared-contact-card2.service.d.ts +45 -45
  153. package/lib/api/time.service.d.ts +16 -16
  154. package/lib/api/types/graphql.types.d.ts +29 -29
  155. package/lib/api/types/index.d.ts +2 -2
  156. package/lib/api/types/lr-graphql.types.d.ts +385 -385
  157. package/lib/auth/auth.config.d.ts +5 -5
  158. package/lib/auth/auth.gql.d.ts +15 -15
  159. package/lib/auth/auth.types.d.ts +66 -66
  160. package/lib/auth/idle.service.d.ts +40 -40
  161. package/lib/auth/idle.types.d.ts +10 -10
  162. package/lib/auth/lbop.service.d.ts +91 -91
  163. package/lib/auth/life-ready-auth.service.d.ts +59 -59
  164. package/lib/auth/password.service.d.ts +78 -78
  165. package/lib/auth/register.service.d.ts +25 -25
  166. package/lib/auth/two-factor.service.d.ts +15 -15
  167. package/lib/category/category-meta.service.d.ts +23 -23
  168. package/lib/category/category.gql.d.ts +45 -45
  169. package/lib/category/category.service.d.ts +67 -67
  170. package/lib/category/category.types.d.ts +79 -79
  171. package/lib/cryptography/cryptography.types.d.ts +83 -83
  172. package/lib/cryptography/encryption.service.d.ts +41 -41
  173. package/lib/cryptography/key-factory.service.d.ts +38 -38
  174. package/lib/cryptography/key-graph.service.d.ts +33 -33
  175. package/lib/cryptography/key-meta.service.d.ts +44 -44
  176. package/lib/cryptography/key.service.d.ts +36 -36
  177. package/lib/cryptography/slip39.service.d.ts +43 -43
  178. package/lib/cryptography/web-crypto.service.d.ts +5 -5
  179. package/lib/life-ready.config.d.ts +14 -14
  180. package/lib/life-ready.module.d.ts +5 -5
  181. package/lib/plan/plan.gql.d.ts +11 -11
  182. package/lib/plan/plan.service.d.ts +33 -33
  183. package/lib/plan/plan.types.d.ts +31 -31
  184. package/lib/record/record-attachment.service.d.ts +16 -16
  185. package/lib/record/record.gql.d.ts +14 -14
  186. package/lib/record/record.service.d.ts +25 -25
  187. package/lib/record/record.types.d.ts +57 -57
  188. package/lib/record-type/record-type.service.d.ts +11 -11
  189. package/lib/record-type/record-type.types.d.ts +50 -50
  190. package/lib/scenario/approvals/scenario-approval.gql.d.ts +7 -7
  191. package/lib/scenario/approvals/scenario-approval.types.d.ts +63 -63
  192. package/lib/scenario/approvals/scenario-approver.service.d.ts +32 -32
  193. package/lib/scenario/claimants/scenario-claimant.gql.d.ts +5 -5
  194. package/lib/scenario/claimants/scenario-claimant.service.d.ts +17 -17
  195. package/lib/scenario/claimants/scenario-claimant.types.d.ts +18 -18
  196. package/lib/scenario/receivers/scenario-receiver.gql.d.ts +8 -8
  197. package/lib/scenario/receivers/scenario-receiver.service.d.ts +30 -30
  198. package/lib/scenario/receivers/scenario-receiver.types.d.ts +54 -54
  199. package/lib/scenario/scenario-setup.service.d.ts +22 -22
  200. package/lib/scenario/scenario.gql.d.ts +34 -34
  201. package/lib/scenario/scenario.service.d.ts +58 -58
  202. package/lib/scenario/scenario.types.d.ts +217 -217
  203. package/lib/search/search.gql.d.ts +1 -1
  204. package/lib/search/search.service.d.ts +25 -25
  205. package/lib/search/search.types.d.ts +20 -20
  206. package/lib/trusted-parties/tp-password-reset-request.service.d.ts +20 -20
  207. package/lib/trusted-parties/tp-password-reset-user.service.d.ts +35 -35
  208. package/lib/trusted-parties/tp-password-reset.constants.d.ts +3 -3
  209. package/lib/trusted-parties/tp-password-reset.gql.d.ts +218 -218
  210. package/lib/trusted-parties/tp-password-reset.service.d.ts +130 -130
  211. package/lib/trusted-parties/trusted-party.gql.d.ts +9 -9
  212. package/lib/trusted-parties/trusted-party.service.d.ts +44 -44
  213. package/lib/trusted-parties/trusted-party.types.d.ts +102 -102
  214. package/lib/trusted-parties/trusted-party2.gql.d.ts +79 -79
  215. package/lib/trusted-parties/trusted-party2.service.d.ts +114 -114
  216. package/lib/users/profile-details.service.d.ts +21 -21
  217. package/lib/users/profile.gql.d.ts +11 -11
  218. package/lib/users/profile.service.d.ts +35 -35
  219. package/lib/users/profile.types.d.ts +96 -96
  220. package/lib/users/user.gql.d.ts +9 -9
  221. package/lib/users/user.service.d.ts +12 -12
  222. package/lib/users/user.types.d.ts +23 -23
  223. package/lifeready-core.d.ts +9 -9
  224. package/package.json +1 -1
  225. package/public-api.d.ts +77 -77
@@ -1,124 +1,124 @@
1
- import { __awaiter } from "tslib";
2
- import { Inject, Injectable } from '@angular/core';
3
- import { LrNotFoundException } from '../_common/exceptions';
4
- import { PersistService } from '../api/persist.service';
5
- import { KeyFactoryService as KFS } from './key-factory.service';
6
- import { LR_CONFIG } from '../life-ready.config';
7
- import * as i0 from "@angular/core";
8
- import * as i1 from "../life-ready.config";
9
- import * as i2 from "../api/persist.service";
10
- export class UserKeys {
11
- }
12
- export class KeyService {
13
- constructor(config, persistService) {
14
- this.config = config;
15
- this.persistService = persistService;
16
- this.STORE_MASTER_KEY = 'masterKey';
17
- // AZ: This can't be change easily. It's basically a PassK or PassIdp rotation.
18
- // todo: we should eventually increase this periodically to match with Moore's law.
19
- // The iterations for each key are kept by the server as well but we assume the value
20
- // from the server is not trustworthy, so need to have minimum thresholds here.
21
- // If creating new keys, these minimum are used.
22
- this.MIN_PASS_IDP_PBKDF_ITER = 100000;
23
- this.MIN_PASS_KEY_PBKDF_ITER = 100000;
24
- this.MIN_LBOP_KEY_PBKDF_ITER = 100000;
25
- // These are used as the default values. They must be larger than the minimum values.
26
- this.DEFAULT_PASS_IDP_PBKDF_ITER = this.MIN_PASS_IDP_PBKDF_ITER;
27
- this.DEFAULT_PASS_KEY_PBKDF_ITER = this.MIN_PASS_KEY_PBKDF_ITER;
28
- this.DEFAULT_LBOP_KEY_PBKDF_ITER = this.MIN_LBOP_KEY_PBKDF_ITER;
29
- this.resetKeys();
30
- }
31
- resetKeys() {
32
- this.keys = null;
33
- this.masterKey = null;
34
- }
35
- purgeKeys() {
36
- this.resetKeys();
37
- this.persistService.clear();
38
- }
39
- populateKeys(keys) {
40
- this.keys = keys;
41
- }
42
- getCurrentPassKey() {
43
- return this.keys.passKey;
44
- }
45
- getCurrentMasterKey() {
46
- return this.keys.masterKey;
47
- }
48
- getCurrentRootKey() {
49
- return this.keys.rootKey;
50
- }
51
- getCurrentPxk() {
52
- return this.keys.pxk;
53
- }
54
- getCurrentSigPxk() {
55
- return this.keys.sigPxk;
56
- }
57
- expiresAfter(seconds) {
58
- return new Date(Date.now() + 1000 * seconds);
59
- }
60
- persistMasterKey(masterKey, expiresAfterSeconds) {
61
- return __awaiter(this, void 0, void 0, function* () {
62
- const storedKey = {
63
- id: masterKey.id,
64
- jwk: masterKey.jwk.toJSON(true),
65
- };
66
- this.masterKey = masterKey;
67
- // Save in an expirable cookie.
68
- yield this.persistService.set({
69
- name: this.STORE_MASTER_KEY,
70
- value: storedKey,
71
- expiry: this.expiresAfter(expiresAfterSeconds),
72
- serverSession: !this.config.disableSessionEncryptionKey,
73
- });
74
- });
75
- }
76
- setMasterKeyExpiresAfterSeconds(seconds) {
77
- return __awaiter(this, void 0, void 0, function* () {
78
- const storedKey = yield this.persistService.get(this.STORE_MASTER_KEY);
79
- if (storedKey == null) {
80
- throw new LrNotFoundException(`Can not find masterKey in persisted storage using name: ${this.STORE_MASTER_KEY}`);
81
- }
82
- yield this.persistService.set({
83
- name: this.STORE_MASTER_KEY,
84
- value: storedKey,
85
- expiry: this.expiresAfter(seconds),
86
- serverSession: !this.config.disableSessionEncryptionKey,
87
- });
88
- });
89
- }
90
- // There's little benefit in using WebCrypto's none-extractable keys because if there
91
- // is an XSS attack, then the attacker has control over the js that downloads the keys. The
92
- // attacker can modify the code to import the keys as extractable. So none-extractable keys
93
- // are only useful if they are already persisted and the user cannot download any more keys,
94
- // which is not feasible.
95
- // So storing the PassKey in localstorage for now, at least till we know what the usage
96
- // pattern is, i.e. how often do we need to use the RootK, MaterK, and PassK.
97
- loadMasterKey(masterKeyId) {
98
- return __awaiter(this, void 0, void 0, function* () {
99
- if (!this.masterKey) {
100
- const storedKey = yield this.persistService.get(this.STORE_MASTER_KEY);
101
- if (!storedKey) {
102
- throw new LrNotFoundException('Could not find masterKey in persisted storage');
103
- }
104
- if (storedKey.id !== masterKeyId) {
105
- throw new LrNotFoundException(`masterKeyId ${storedKey.id} in persisted storage does not match the one requested ${masterKeyId}`);
106
- }
107
- storedKey.jwk = yield KFS.asKey(storedKey.jwk);
108
- this.masterKey = storedKey;
109
- }
110
- return this.masterKey;
111
- });
112
- }
113
- }
114
- KeyService.ɵprov = i0.ɵɵdefineInjectable({ factory: function KeyService_Factory() { return new KeyService(i0.ɵɵinject(i1.LR_CONFIG), i0.ɵɵinject(i2.PersistService)); }, token: KeyService, providedIn: "root" });
115
- KeyService.decorators = [
116
- { type: Injectable, args: [{
117
- providedIn: 'root',
118
- },] }
119
- ];
120
- KeyService.ctorParameters = () => [
121
- { type: undefined, decorators: [{ type: Inject, args: [LR_CONFIG,] }] },
122
- { type: PersistService }
123
- ];
124
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"key.service.js","sourceRoot":"C:/Projects/newrepo/kc-client/projects/core/src/","sources":["lib/cryptography/key.service.ts"],"names":[],"mappings":";AAAA,OAAO,EAAE,MAAM,EAAE,UAAU,EAAE,MAAM,eAAe,CAAC;AAEnD,OAAO,EAAE,mBAAmB,EAAE,MAAM,uBAAuB,CAAC;AAC5D,OAAO,EAAE,cAAc,EAAE,MAAM,wBAAwB,CAAC;AACxD,OAAO,EAAE,iBAAiB,IAAI,GAAG,EAAE,MAAM,uBAAuB,CAAC;AACjE,OAAO,EAAmB,SAAS,EAAE,MAAM,sBAAsB,CAAC;;;;AAElE,MAAM,OAAO,QAAQ;CAMpB;AAUD,MAAM,OAAO,UAAU;IAoBrB,YAC6B,MAAuB,EAC1C,cAA8B;QADX,WAAM,GAAN,MAAM,CAAiB;QAC1C,mBAAc,GAAd,cAAc,CAAgB;QArBvB,qBAAgB,GAAG,WAAW,CAAC;QAKhD,+EAA+E;QAC/E,mFAAmF;QACnF,qFAAqF;QACrF,+EAA+E;QAC/E,gDAAgD;QAChC,4BAAuB,GAAG,MAAM,CAAC;QACjC,4BAAuB,GAAG,MAAM,CAAC;QACjC,4BAAuB,GAAG,MAAM,CAAC;QAEjD,qFAAqF;QACrE,gCAA2B,GAAG,IAAI,CAAC,uBAAuB,CAAC;QAC3D,gCAA2B,GAAG,IAAI,CAAC,uBAAuB,CAAC;QAC3D,gCAA2B,GAAG,IAAI,CAAC,uBAAuB,CAAC;QAMzE,IAAI,CAAC,SAAS,EAAE,CAAC;IACnB,CAAC;IAED,SAAS;QACP,IAAI,CAAC,IAAI,GAAG,IAAI,CAAC;QACjB,IAAI,CAAC,SAAS,GAAG,IAAI,CAAC;IACxB,CAAC;IAED,SAAS;QACP,IAAI,CAAC,SAAS,EAAE,CAAC;QACjB,IAAI,CAAC,cAAc,CAAC,KAAK,EAAE,CAAC;IAC9B,CAAC;IAED,YAAY,CAAC,IAAc;QACzB,IAAI,CAAC,IAAI,GAAG,IAAI,CAAC;IACnB,CAAC;IAEM,iBAAiB;QACtB,OAAO,IAAI,CAAC,IAAI,CAAC,OAAO,CAAC;IAC3B,CAAC;IAEM,mBAAmB;QACxB,OAAO,IAAI,CAAC,IAAI,CAAC,SAAS,CAAC;IAC7B,CAAC;IAEM,iBAAiB;QACtB,OAAO,IAAI,CAAC,IAAI,CAAC,OAAO,CAAC;IAC3B,CAAC;IAEM,aAAa;QAClB,OAAO,IAAI,CAAC,IAAI,CAAC,GAAG,CAAC;IACvB,CAAC;IAEM,gBAAgB;QACrB,OAAO,IAAI,CAAC,IAAI,CAAC,MAAM,CAAC;IAC1B,CAAC;IAEO,YAAY,CAAC,OAAe;QAClC,OAAO,IAAI,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE,GAAG,IAAI,GAAG,OAAO,CAAC,CAAC;IAC/C,CAAC;IAEK,gBAAgB,CACpB,SAAc,EACd,mBAA2B;;YAE3B,MAAM,SAAS,GAAG;gBAChB,EAAE,EAAE,SAAS,CAAC,EAAE;gBAChB,GAAG,EAAE,SAAS,CAAC,GAAG,CAAC,MAAM,CAAC,IAAI,CAAC;aAChC,CAAC;YAEF,IAAI,CAAC,SAAS,GAAG,SAAS,CAAC;YAE3B,+BAA+B;YAC/B,MAAM,IAAI,CAAC,cAAc,CAAC,GAAG,CAAC;gBAC5B,IAAI,EAAE,IAAI,CAAC,gBAAgB;gBAC3B,KAAK,EAAE,SAAS;gBAChB,MAAM,EAAE,IAAI,CAAC,YAAY,CAAC,mBAAmB,CAAC;gBAC9C,aAAa,EAAE,CAAC,IAAI,CAAC,MAAM,CAAC,2BAA2B;aACxD,CAAC,CAAC;QACL,CAAC;KAAA;IAEK,+BAA+B,CAAC,OAAe;;YACnD,MAAM,SAAS,GAAG,MAAM,IAAI,CAAC,cAAc,CAAC,GAAG,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC;YACvE,IAAI,SAAS,IAAI,IAAI,EAAE;gBACrB,MAAM,IAAI,mBAAmB,CAC3B,2DAA2D,IAAI,CAAC,gBAAgB,EAAE,CACnF,CAAC;aACH;YACD,MAAM,IAAI,CAAC,cAAc,CAAC,GAAG,CAAC;gBAC5B,IAAI,EAAE,IAAI,CAAC,gBAAgB;gBAC3B,KAAK,EAAE,SAAS;gBAChB,MAAM,EAAE,IAAI,CAAC,YAAY,CAAC,OAAO,CAAC;gBAClC,aAAa,EAAE,CAAC,IAAI,CAAC,MAAM,CAAC,2BAA2B;aACxD,CAAC,CAAC;QACL,CAAC;KAAA;IAED,qFAAqF;IACrF,2FAA2F;IAC3F,2FAA2F;IAC3F,4FAA4F;IAC5F,yBAAyB;IACzB,uFAAuF;IACvF,6EAA6E;IACvE,aAAa,CAAC,WAAmB;;YACrC,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE;gBACnB,MAAM,SAAS,GAAG,MAAM,IAAI,CAAC,cAAc,CAAC,GAAG,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC;gBAEvE,IAAI,CAAC,SAAS,EAAE;oBACd,MAAM,IAAI,mBAAmB,CAC3B,+CAA+C,CAChD,CAAC;iBACH;gBAED,IAAI,SAAS,CAAC,EAAE,KAAK,WAAW,EAAE;oBAChC,MAAM,IAAI,mBAAmB,CAC3B,eAAe,SAAS,CAAC,EAAE,0DAA0D,WAAW,EAAE,CACnG,CAAC;iBACH;gBAED,SAAS,CAAC,GAAG,GAAG,MAAM,GAAG,CAAC,KAAK,CAAC,SAAS,CAAC,GAAG,CAAC,CAAC;gBAE/C,IAAI,CAAC,SAAS,GAAG,SAAS,CAAC;aAC5B;YAED,OAAO,IAAI,CAAC,SAAS,CAAC;QACxB,CAAC;KAAA;;;;YApIF,UAAU,SAAC;gBACV,UAAU,EAAE,MAAM;aACnB;;;4CAsBI,MAAM,SAAC,SAAS;YAzCZ,cAAc","sourcesContent":["import { Inject, Injectable } from '@angular/core';\r\nimport { Key, PassKey } from './cryptography.types';\r\nimport { LrNotFoundException } from '../_common/exceptions';\r\nimport { PersistService } from '../api/persist.service';\r\nimport { KeyFactoryService as KFS } from './key-factory.service';\r\nimport { LifeReadyConfig, LR_CONFIG } from '../life-ready.config';\r\n\r\nexport class UserKeys {\r\n  passKey: PassKey;\r\n  masterKey: Key;\r\n  rootKey?: Key;\r\n  pxk?: Key;\r\n  sigPxk?: Key;\r\n}\r\n\r\ninterface StoredPassKey {\r\n  id: string;\r\n  jwk: object;\r\n}\r\n\r\n@Injectable({\r\n  providedIn: 'root',\r\n})\r\nexport class KeyService {\r\n  private readonly STORE_MASTER_KEY = 'masterKey';\r\n  // variables\r\n  private keys: UserKeys;\r\n  private masterKey: Key;\r\n\r\n  // AZ: This can't be change easily. It's basically a PassK or PassIdp rotation.\r\n  // todo: we should eventually increase this periodically to match with Moore's law.\r\n  // The iterations for each key are kept by the server as well but we assume the value\r\n  // from the server is not trustworthy, so need to have minimum thresholds here.\r\n  // If creating new keys, these minimum are used.\r\n  public readonly MIN_PASS_IDP_PBKDF_ITER = 100000;\r\n  public readonly MIN_PASS_KEY_PBKDF_ITER = 100000;\r\n  public readonly MIN_LBOP_KEY_PBKDF_ITER = 100000;\r\n\r\n  // These are used as the default values. They must be larger than the minimum values.\r\n  public readonly DEFAULT_PASS_IDP_PBKDF_ITER = this.MIN_PASS_IDP_PBKDF_ITER;\r\n  public readonly DEFAULT_PASS_KEY_PBKDF_ITER = this.MIN_PASS_KEY_PBKDF_ITER;\r\n  public readonly DEFAULT_LBOP_KEY_PBKDF_ITER = this.MIN_LBOP_KEY_PBKDF_ITER;\r\n\r\n  constructor(\r\n    @Inject(LR_CONFIG) private config: LifeReadyConfig,\r\n    private persistService: PersistService\r\n  ) {\r\n    this.resetKeys();\r\n  }\r\n\r\n  resetKeys() {\r\n    this.keys = null;\r\n    this.masterKey = null;\r\n  }\r\n\r\n  purgeKeys() {\r\n    this.resetKeys();\r\n    this.persistService.clear();\r\n  }\r\n\r\n  populateKeys(keys: UserKeys) {\r\n    this.keys = keys;\r\n  }\r\n\r\n  public getCurrentPassKey(): Key {\r\n    return this.keys.passKey;\r\n  }\r\n\r\n  public getCurrentMasterKey(): Key {\r\n    return this.keys.masterKey;\r\n  }\r\n\r\n  public getCurrentRootKey(): Key {\r\n    return this.keys.rootKey;\r\n  }\r\n\r\n  public getCurrentPxk(): Key {\r\n    return this.keys.pxk;\r\n  }\r\n\r\n  public getCurrentSigPxk(): Key {\r\n    return this.keys.sigPxk;\r\n  }\r\n\r\n  private expiresAfter(seconds: number): Date {\r\n    return new Date(Date.now() + 1000 * seconds);\r\n  }\r\n\r\n  async persistMasterKey(\r\n    masterKey: Key,\r\n    expiresAfterSeconds: number\r\n  ): Promise<void> {\r\n    const storedKey = {\r\n      id: masterKey.id,\r\n      jwk: masterKey.jwk.toJSON(true),\r\n    };\r\n\r\n    this.masterKey = masterKey;\r\n\r\n    // Save in an expirable cookie.\r\n    await this.persistService.set({\r\n      name: this.STORE_MASTER_KEY,\r\n      value: storedKey,\r\n      expiry: this.expiresAfter(expiresAfterSeconds),\r\n      serverSession: !this.config.disableSessionEncryptionKey,\r\n    });\r\n  }\r\n\r\n  async setMasterKeyExpiresAfterSeconds(seconds: number): Promise<void> {\r\n    const storedKey = await this.persistService.get(this.STORE_MASTER_KEY);\r\n    if (storedKey == null) {\r\n      throw new LrNotFoundException(\r\n        `Can not find masterKey in persisted storage using name: ${this.STORE_MASTER_KEY}`\r\n      );\r\n    }\r\n    await this.persistService.set({\r\n      name: this.STORE_MASTER_KEY,\r\n      value: storedKey,\r\n      expiry: this.expiresAfter(seconds),\r\n      serverSession: !this.config.disableSessionEncryptionKey,\r\n    });\r\n  }\r\n\r\n  // There's little benefit in using WebCrypto's none-extractable keys because if there\r\n  // is an XSS attack, then the attacker has control over the js that downloads the keys. The\r\n  // attacker can modify the code to import the keys as extractable. So none-extractable keys\r\n  // are only useful if they are already persisted and the user cannot download any more keys,\r\n  // which is not feasible.\r\n  // So storing the PassKey in localstorage for now, at least till we know what the usage\r\n  // pattern is, i.e. how often do we need to use the RootK, MaterK, and PassK.\r\n  async loadMasterKey(masterKeyId: string): Promise<Key> {\r\n    if (!this.masterKey) {\r\n      const storedKey = await this.persistService.get(this.STORE_MASTER_KEY);\r\n\r\n      if (!storedKey) {\r\n        throw new LrNotFoundException(\r\n          'Could not find masterKey in persisted storage'\r\n        );\r\n      }\r\n\r\n      if (storedKey.id !== masterKeyId) {\r\n        throw new LrNotFoundException(\r\n          `masterKeyId ${storedKey.id} in persisted storage does not match the one requested ${masterKeyId}`\r\n        );\r\n      }\r\n\r\n      storedKey.jwk = await KFS.asKey(storedKey.jwk);\r\n\r\n      this.masterKey = storedKey;\r\n    }\r\n\r\n    return this.masterKey;\r\n  }\r\n}\r\n"]}
1
+ import { __awaiter } from "tslib";
2
+ import { Inject, Injectable } from '@angular/core';
3
+ import { LrNotFoundException } from '../_common/exceptions';
4
+ import { PersistService } from '../api/persist.service';
5
+ import { KeyFactoryService as KFS } from './key-factory.service';
6
+ import { LR_CONFIG } from '../life-ready.config';
7
+ import * as i0 from "@angular/core";
8
+ import * as i1 from "../life-ready.config";
9
+ import * as i2 from "../api/persist.service";
10
+ export class UserKeys {
11
+ }
12
+ export class KeyService {
13
+ constructor(config, persistService) {
14
+ this.config = config;
15
+ this.persistService = persistService;
16
+ this.STORE_MASTER_KEY = 'masterKey';
17
+ // AZ: This can't be change easily. It's basically a PassK or PassIdp rotation.
18
+ // todo: we should eventually increase this periodically to match with Moore's law.
19
+ // The iterations for each key are kept by the server as well but we assume the value
20
+ // from the server is not trustworthy, so need to have minimum thresholds here.
21
+ // If creating new keys, these minimum are used.
22
+ this.MIN_PASS_IDP_PBKDF_ITER = 100000;
23
+ this.MIN_PASS_KEY_PBKDF_ITER = 100000;
24
+ this.MIN_LBOP_KEY_PBKDF_ITER = 100000;
25
+ // These are used as the default values. They must be larger than the minimum values.
26
+ this.DEFAULT_PASS_IDP_PBKDF_ITER = this.MIN_PASS_IDP_PBKDF_ITER;
27
+ this.DEFAULT_PASS_KEY_PBKDF_ITER = this.MIN_PASS_KEY_PBKDF_ITER;
28
+ this.DEFAULT_LBOP_KEY_PBKDF_ITER = this.MIN_LBOP_KEY_PBKDF_ITER;
29
+ this.resetKeys();
30
+ }
31
+ resetKeys() {
32
+ this.keys = null;
33
+ this.masterKey = null;
34
+ }
35
+ purgeKeys() {
36
+ this.resetKeys();
37
+ this.persistService.clear();
38
+ }
39
+ populateKeys(keys) {
40
+ this.keys = keys;
41
+ }
42
+ getCurrentPassKey() {
43
+ return this.keys.passKey;
44
+ }
45
+ getCurrentMasterKey() {
46
+ return this.keys.masterKey;
47
+ }
48
+ getCurrentRootKey() {
49
+ return this.keys.rootKey;
50
+ }
51
+ getCurrentPxk() {
52
+ return this.keys.pxk;
53
+ }
54
+ getCurrentSigPxk() {
55
+ return this.keys.sigPxk;
56
+ }
57
+ expiresAfter(seconds) {
58
+ return new Date(Date.now() + 1000 * seconds);
59
+ }
60
+ persistMasterKey(masterKey, expiresAfterSeconds) {
61
+ return __awaiter(this, void 0, void 0, function* () {
62
+ const storedKey = {
63
+ id: masterKey.id,
64
+ jwk: masterKey.jwk.toJSON(true),
65
+ };
66
+ this.masterKey = masterKey;
67
+ // Save in an expirable cookie.
68
+ yield this.persistService.set({
69
+ name: this.STORE_MASTER_KEY,
70
+ value: storedKey,
71
+ expiry: this.expiresAfter(expiresAfterSeconds),
72
+ serverSession: !this.config.disableSessionEncryptionKey,
73
+ });
74
+ });
75
+ }
76
+ setMasterKeyExpiresAfterSeconds(seconds) {
77
+ return __awaiter(this, void 0, void 0, function* () {
78
+ const storedKey = yield this.persistService.get(this.STORE_MASTER_KEY);
79
+ if (storedKey == null) {
80
+ throw new LrNotFoundException(`Can not find masterKey in persisted storage using name: ${this.STORE_MASTER_KEY}`);
81
+ }
82
+ yield this.persistService.set({
83
+ name: this.STORE_MASTER_KEY,
84
+ value: storedKey,
85
+ expiry: this.expiresAfter(seconds),
86
+ serverSession: !this.config.disableSessionEncryptionKey,
87
+ });
88
+ });
89
+ }
90
+ // There's little benefit in using WebCrypto's none-extractable keys because if there
91
+ // is an XSS attack, then the attacker has control over the js that downloads the keys. The
92
+ // attacker can modify the code to import the keys as extractable. So none-extractable keys
93
+ // are only useful if they are already persisted and the user cannot download any more keys,
94
+ // which is not feasible.
95
+ // So storing the PassKey in localstorage for now, at least till we know what the usage
96
+ // pattern is, i.e. how often do we need to use the RootK, MaterK, and PassK.
97
+ loadMasterKey(masterKeyId) {
98
+ return __awaiter(this, void 0, void 0, function* () {
99
+ if (!this.masterKey) {
100
+ const storedKey = yield this.persistService.get(this.STORE_MASTER_KEY);
101
+ if (!storedKey) {
102
+ throw new LrNotFoundException('Could not find masterKey in persisted storage');
103
+ }
104
+ if (storedKey.id !== masterKeyId) {
105
+ throw new LrNotFoundException(`masterKeyId ${storedKey.id} in persisted storage does not match the one requested ${masterKeyId}`);
106
+ }
107
+ storedKey.jwk = yield KFS.asKey(storedKey.jwk);
108
+ this.masterKey = storedKey;
109
+ }
110
+ return this.masterKey;
111
+ });
112
+ }
113
+ }
114
+ KeyService.ɵprov = i0.ɵɵdefineInjectable({ factory: function KeyService_Factory() { return new KeyService(i0.ɵɵinject(i1.LR_CONFIG), i0.ɵɵinject(i2.PersistService)); }, token: KeyService, providedIn: "root" });
115
+ KeyService.decorators = [
116
+ { type: Injectable, args: [{
117
+ providedIn: 'root',
118
+ },] }
119
+ ];
120
+ KeyService.ctorParameters = () => [
121
+ { type: undefined, decorators: [{ type: Inject, args: [LR_CONFIG,] }] },
122
+ { type: PersistService }
123
+ ];
124
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"key.service.js","sourceRoot":"/opt/atlassian/pipelines/agent/build/projects/core/src/","sources":["lib/cryptography/key.service.ts"],"names":[],"mappings":";AAAA,OAAO,EAAE,MAAM,EAAE,UAAU,EAAE,MAAM,eAAe,CAAC;AAEnD,OAAO,EAAE,mBAAmB,EAAE,MAAM,uBAAuB,CAAC;AAC5D,OAAO,EAAE,cAAc,EAAE,MAAM,wBAAwB,CAAC;AACxD,OAAO,EAAE,iBAAiB,IAAI,GAAG,EAAE,MAAM,uBAAuB,CAAC;AACjE,OAAO,EAAmB,SAAS,EAAE,MAAM,sBAAsB,CAAC;;;;AAElE,MAAM,OAAO,QAAQ;CAMpB;AAUD,MAAM,OAAO,UAAU;IAoBrB,YAC6B,MAAuB,EAC1C,cAA8B;QADX,WAAM,GAAN,MAAM,CAAiB;QAC1C,mBAAc,GAAd,cAAc,CAAgB;QArBvB,qBAAgB,GAAG,WAAW,CAAC;QAKhD,+EAA+E;QAC/E,mFAAmF;QACnF,qFAAqF;QACrF,+EAA+E;QAC/E,gDAAgD;QAChC,4BAAuB,GAAG,MAAM,CAAC;QACjC,4BAAuB,GAAG,MAAM,CAAC;QACjC,4BAAuB,GAAG,MAAM,CAAC;QAEjD,qFAAqF;QACrE,gCAA2B,GAAG,IAAI,CAAC,uBAAuB,CAAC;QAC3D,gCAA2B,GAAG,IAAI,CAAC,uBAAuB,CAAC;QAC3D,gCAA2B,GAAG,IAAI,CAAC,uBAAuB,CAAC;QAMzE,IAAI,CAAC,SAAS,EAAE,CAAC;IACnB,CAAC;IAED,SAAS;QACP,IAAI,CAAC,IAAI,GAAG,IAAI,CAAC;QACjB,IAAI,CAAC,SAAS,GAAG,IAAI,CAAC;IACxB,CAAC;IAED,SAAS;QACP,IAAI,CAAC,SAAS,EAAE,CAAC;QACjB,IAAI,CAAC,cAAc,CAAC,KAAK,EAAE,CAAC;IAC9B,CAAC;IAED,YAAY,CAAC,IAAc;QACzB,IAAI,CAAC,IAAI,GAAG,IAAI,CAAC;IACnB,CAAC;IAEM,iBAAiB;QACtB,OAAO,IAAI,CAAC,IAAI,CAAC,OAAO,CAAC;IAC3B,CAAC;IAEM,mBAAmB;QACxB,OAAO,IAAI,CAAC,IAAI,CAAC,SAAS,CAAC;IAC7B,CAAC;IAEM,iBAAiB;QACtB,OAAO,IAAI,CAAC,IAAI,CAAC,OAAO,CAAC;IAC3B,CAAC;IAEM,aAAa;QAClB,OAAO,IAAI,CAAC,IAAI,CAAC,GAAG,CAAC;IACvB,CAAC;IAEM,gBAAgB;QACrB,OAAO,IAAI,CAAC,IAAI,CAAC,MAAM,CAAC;IAC1B,CAAC;IAEO,YAAY,CAAC,OAAe;QAClC,OAAO,IAAI,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE,GAAG,IAAI,GAAG,OAAO,CAAC,CAAC;IAC/C,CAAC;IAEK,gBAAgB,CACpB,SAAc,EACd,mBAA2B;;YAE3B,MAAM,SAAS,GAAG;gBAChB,EAAE,EAAE,SAAS,CAAC,EAAE;gBAChB,GAAG,EAAE,SAAS,CAAC,GAAG,CAAC,MAAM,CAAC,IAAI,CAAC;aAChC,CAAC;YAEF,IAAI,CAAC,SAAS,GAAG,SAAS,CAAC;YAE3B,+BAA+B;YAC/B,MAAM,IAAI,CAAC,cAAc,CAAC,GAAG,CAAC;gBAC5B,IAAI,EAAE,IAAI,CAAC,gBAAgB;gBAC3B,KAAK,EAAE,SAAS;gBAChB,MAAM,EAAE,IAAI,CAAC,YAAY,CAAC,mBAAmB,CAAC;gBAC9C,aAAa,EAAE,CAAC,IAAI,CAAC,MAAM,CAAC,2BAA2B;aACxD,CAAC,CAAC;QACL,CAAC;KAAA;IAEK,+BAA+B,CAAC,OAAe;;YACnD,MAAM,SAAS,GAAG,MAAM,IAAI,CAAC,cAAc,CAAC,GAAG,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC;YACvE,IAAI,SAAS,IAAI,IAAI,EAAE;gBACrB,MAAM,IAAI,mBAAmB,CAC3B,2DAA2D,IAAI,CAAC,gBAAgB,EAAE,CACnF,CAAC;aACH;YACD,MAAM,IAAI,CAAC,cAAc,CAAC,GAAG,CAAC;gBAC5B,IAAI,EAAE,IAAI,CAAC,gBAAgB;gBAC3B,KAAK,EAAE,SAAS;gBAChB,MAAM,EAAE,IAAI,CAAC,YAAY,CAAC,OAAO,CAAC;gBAClC,aAAa,EAAE,CAAC,IAAI,CAAC,MAAM,CAAC,2BAA2B;aACxD,CAAC,CAAC;QACL,CAAC;KAAA;IAED,qFAAqF;IACrF,2FAA2F;IAC3F,2FAA2F;IAC3F,4FAA4F;IAC5F,yBAAyB;IACzB,uFAAuF;IACvF,6EAA6E;IACvE,aAAa,CAAC,WAAmB;;YACrC,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE;gBACnB,MAAM,SAAS,GAAG,MAAM,IAAI,CAAC,cAAc,CAAC,GAAG,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC;gBAEvE,IAAI,CAAC,SAAS,EAAE;oBACd,MAAM,IAAI,mBAAmB,CAC3B,+CAA+C,CAChD,CAAC;iBACH;gBAED,IAAI,SAAS,CAAC,EAAE,KAAK,WAAW,EAAE;oBAChC,MAAM,IAAI,mBAAmB,CAC3B,eAAe,SAAS,CAAC,EAAE,0DAA0D,WAAW,EAAE,CACnG,CAAC;iBACH;gBAED,SAAS,CAAC,GAAG,GAAG,MAAM,GAAG,CAAC,KAAK,CAAC,SAAS,CAAC,GAAG,CAAC,CAAC;gBAE/C,IAAI,CAAC,SAAS,GAAG,SAAS,CAAC;aAC5B;YAED,OAAO,IAAI,CAAC,SAAS,CAAC;QACxB,CAAC;KAAA;;;;YApIF,UAAU,SAAC;gBACV,UAAU,EAAE,MAAM;aACnB;;;4CAsBI,MAAM,SAAC,SAAS;YAzCZ,cAAc","sourcesContent":["import { Inject, Injectable } from '@angular/core';\nimport { Key, PassKey } from './cryptography.types';\nimport { LrNotFoundException } from '../_common/exceptions';\nimport { PersistService } from '../api/persist.service';\nimport { KeyFactoryService as KFS } from './key-factory.service';\nimport { LifeReadyConfig, LR_CONFIG } from '../life-ready.config';\n\nexport class UserKeys {\n  passKey: PassKey;\n  masterKey: Key;\n  rootKey?: Key;\n  pxk?: Key;\n  sigPxk?: Key;\n}\n\ninterface StoredPassKey {\n  id: string;\n  jwk: object;\n}\n\n@Injectable({\n  providedIn: 'root',\n})\nexport class KeyService {\n  private readonly STORE_MASTER_KEY = 'masterKey';\n  // variables\n  private keys: UserKeys;\n  private masterKey: Key;\n\n  // AZ: This can't be change easily. It's basically a PassK or PassIdp rotation.\n  // todo: we should eventually increase this periodically to match with Moore's law.\n  // The iterations for each key are kept by the server as well but we assume the value\n  // from the server is not trustworthy, so need to have minimum thresholds here.\n  // If creating new keys, these minimum are used.\n  public readonly MIN_PASS_IDP_PBKDF_ITER = 100000;\n  public readonly MIN_PASS_KEY_PBKDF_ITER = 100000;\n  public readonly MIN_LBOP_KEY_PBKDF_ITER = 100000;\n\n  // These are used as the default values. They must be larger than the minimum values.\n  public readonly DEFAULT_PASS_IDP_PBKDF_ITER = this.MIN_PASS_IDP_PBKDF_ITER;\n  public readonly DEFAULT_PASS_KEY_PBKDF_ITER = this.MIN_PASS_KEY_PBKDF_ITER;\n  public readonly DEFAULT_LBOP_KEY_PBKDF_ITER = this.MIN_LBOP_KEY_PBKDF_ITER;\n\n  constructor(\n    @Inject(LR_CONFIG) private config: LifeReadyConfig,\n    private persistService: PersistService\n  ) {\n    this.resetKeys();\n  }\n\n  resetKeys() {\n    this.keys = null;\n    this.masterKey = null;\n  }\n\n  purgeKeys() {\n    this.resetKeys();\n    this.persistService.clear();\n  }\n\n  populateKeys(keys: UserKeys) {\n    this.keys = keys;\n  }\n\n  public getCurrentPassKey(): Key {\n    return this.keys.passKey;\n  }\n\n  public getCurrentMasterKey(): Key {\n    return this.keys.masterKey;\n  }\n\n  public getCurrentRootKey(): Key {\n    return this.keys.rootKey;\n  }\n\n  public getCurrentPxk(): Key {\n    return this.keys.pxk;\n  }\n\n  public getCurrentSigPxk(): Key {\n    return this.keys.sigPxk;\n  }\n\n  private expiresAfter(seconds: number): Date {\n    return new Date(Date.now() + 1000 * seconds);\n  }\n\n  async persistMasterKey(\n    masterKey: Key,\n    expiresAfterSeconds: number\n  ): Promise<void> {\n    const storedKey = {\n      id: masterKey.id,\n      jwk: masterKey.jwk.toJSON(true),\n    };\n\n    this.masterKey = masterKey;\n\n    // Save in an expirable cookie.\n    await this.persistService.set({\n      name: this.STORE_MASTER_KEY,\n      value: storedKey,\n      expiry: this.expiresAfter(expiresAfterSeconds),\n      serverSession: !this.config.disableSessionEncryptionKey,\n    });\n  }\n\n  async setMasterKeyExpiresAfterSeconds(seconds: number): Promise<void> {\n    const storedKey = await this.persistService.get(this.STORE_MASTER_KEY);\n    if (storedKey == null) {\n      throw new LrNotFoundException(\n        `Can not find masterKey in persisted storage using name: ${this.STORE_MASTER_KEY}`\n      );\n    }\n    await this.persistService.set({\n      name: this.STORE_MASTER_KEY,\n      value: storedKey,\n      expiry: this.expiresAfter(seconds),\n      serverSession: !this.config.disableSessionEncryptionKey,\n    });\n  }\n\n  // There's little benefit in using WebCrypto's none-extractable keys because if there\n  // is an XSS attack, then the attacker has control over the js that downloads the keys. The\n  // attacker can modify the code to import the keys as extractable. So none-extractable keys\n  // are only useful if they are already persisted and the user cannot download any more keys,\n  // which is not feasible.\n  // So storing the PassKey in localstorage for now, at least till we know what the usage\n  // pattern is, i.e. how often do we need to use the RootK, MaterK, and PassK.\n  async loadMasterKey(masterKeyId: string): Promise<Key> {\n    if (!this.masterKey) {\n      const storedKey = await this.persistService.get(this.STORE_MASTER_KEY);\n\n      if (!storedKey) {\n        throw new LrNotFoundException(\n          'Could not find masterKey in persisted storage'\n        );\n      }\n\n      if (storedKey.id !== masterKeyId) {\n        throw new LrNotFoundException(\n          `masterKeyId ${storedKey.id} in persisted storage does not match the one requested ${masterKeyId}`\n        );\n      }\n\n      storedKey.jwk = await KFS.asKey(storedKey.jwk);\n\n      this.masterKey = storedKey;\n    }\n\n    return this.masterKey;\n  }\n}\n"]}