@lifeready/core 1.0.3 → 1.0.5
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +62 -62
- package/bundles/lifeready-core.umd.js +15445 -15445
- package/bundles/lifeready-core.umd.js.map +1 -1
- package/bundles/lifeready-core.umd.min.js.map +1 -1
- package/esm2015/lib/_common/ast.js +40 -40
- package/esm2015/lib/_common/deferred-promise.js +24 -24
- package/esm2015/lib/_common/exceptions.js +157 -157
- package/esm2015/lib/_common/queries.gql.js +190 -190
- package/esm2015/lib/_common/run-outside-angular.js +79 -79
- package/esm2015/lib/_common/types.js +1 -1
- package/esm2015/lib/_common/utils.js +44 -44
- package/esm2015/lib/api/contact-card.gql.js +79 -79
- package/esm2015/lib/api/contact-card.service.js +154 -154
- package/esm2015/lib/api/contact-card2.gql.js +60 -60
- package/esm2015/lib/api/contact-card2.service.js +103 -103
- package/esm2015/lib/api/file.service.js +74 -74
- package/esm2015/lib/api/item2.gql.js +110 -110
- package/esm2015/lib/api/item2.service.js +311 -311
- package/esm2015/lib/api/key-exchange.gql.js +188 -188
- package/esm2015/lib/api/key-exchange.service.js +442 -442
- package/esm2015/lib/api/key-exchange.types.js +18 -18
- package/esm2015/lib/api/key-exchange2.gql.js +171 -171
- package/esm2015/lib/api/key-exchange2.service.js +479 -479
- package/esm2015/lib/api/lock.gql.js +40 -40
- package/esm2015/lib/api/lock.service.js +64 -64
- package/esm2015/lib/api/lr-apollo.service.js +46 -46
- package/esm2015/lib/api/lr-graphql/index.js +6 -6
- package/esm2015/lib/api/lr-graphql/lr-graphql.service.js +155 -155
- package/esm2015/lib/api/lr-graphql/lr-merged-mutation.js +213 -213
- package/esm2015/lib/api/lr-graphql/lr-mutation-base.js +51 -51
- package/esm2015/lib/api/lr-graphql/lr-mutation.js +48 -48
- package/esm2015/lib/api/lr-graphql/lr.service.js +18 -18
- package/esm2015/lib/api/message.service.js +138 -138
- package/esm2015/lib/api/persist.service.js +181 -181
- package/esm2015/lib/api/query-processor/common-processors.service.js +93 -93
- package/esm2015/lib/api/query-processor/index.js +3 -3
- package/esm2015/lib/api/query-processor/query-processor.service.js +192 -192
- package/esm2015/lib/api/query-processor/tp-password-reset-processor.service.js +109 -109
- package/esm2015/lib/api/shared-contact-card.service.js +119 -119
- package/esm2015/lib/api/shared-contact-card2.gql.js +41 -41
- package/esm2015/lib/api/shared-contact-card2.service.js +117 -117
- package/esm2015/lib/api/time.service.js +146 -146
- package/esm2015/lib/api/types/graphql.types.js +7 -7
- package/esm2015/lib/api/types/index.js +3 -3
- package/esm2015/lib/api/types/lr-graphql.types.js +71 -71
- package/esm2015/lib/auth/auth.config.js +57 -57
- package/esm2015/lib/auth/auth.gql.js +48 -48
- package/esm2015/lib/auth/auth.types.js +27 -27
- package/esm2015/lib/auth/idle.service.js +168 -168
- package/esm2015/lib/auth/idle.types.js +7 -7
- package/esm2015/lib/auth/lbop.service.js +355 -355
- package/esm2015/lib/auth/life-ready-auth.service.js +500 -500
- package/esm2015/lib/auth/password.service.js +320 -320
- package/esm2015/lib/auth/register.service.js +172 -172
- package/esm2015/lib/auth/two-factor.service.js +74 -74
- package/esm2015/lib/category/category-meta.service.js +99 -99
- package/esm2015/lib/category/category.gql.js +406 -406
- package/esm2015/lib/category/category.service.js +390 -390
- package/esm2015/lib/category/category.types.js +29 -29
- package/esm2015/lib/cryptography/cryptography.types.js +11 -11
- package/esm2015/lib/cryptography/encryption.service.js +189 -189
- package/esm2015/lib/cryptography/key-factory.service.js +237 -237
- package/esm2015/lib/cryptography/key-graph.service.js +280 -280
- package/esm2015/lib/cryptography/key-meta.service.js +200 -200
- package/esm2015/lib/cryptography/key.service.js +124 -124
- package/esm2015/lib/cryptography/slip39.service.js +169 -169
- package/esm2015/lib/cryptography/web-crypto.service.js +29 -29
- package/esm2015/lib/life-ready.config.js +84 -84
- package/esm2015/lib/life-ready.module.js +74 -74
- package/esm2015/lib/plan/plan.gql.js +123 -123
- package/esm2015/lib/plan/plan.service.js +149 -149
- package/esm2015/lib/plan/plan.types.js +11 -11
- package/esm2015/lib/record/record-attachment.service.js +101 -101
- package/esm2015/lib/record/record.gql.js +179 -179
- package/esm2015/lib/record/record.service.js +206 -206
- package/esm2015/lib/record/record.types.js +15 -15
- package/esm2015/lib/record-type/record-type.service.js +75 -75
- package/esm2015/lib/record-type/record-type.types.js +28 -28
- package/esm2015/lib/scenario/approvals/scenario-approval.gql.js +105 -105
- package/esm2015/lib/scenario/approvals/scenario-approval.types.js +1 -1
- package/esm2015/lib/scenario/approvals/scenario-approver.service.js +300 -300
- package/esm2015/lib/scenario/claimants/scenario-claimant.gql.js +52 -52
- package/esm2015/lib/scenario/claimants/scenario-claimant.service.js +97 -97
- package/esm2015/lib/scenario/claimants/scenario-claimant.types.js +1 -1
- package/esm2015/lib/scenario/receivers/scenario-receiver.gql.js +150 -150
- package/esm2015/lib/scenario/receivers/scenario-receiver.service.js +229 -229
- package/esm2015/lib/scenario/receivers/scenario-receiver.types.js +1 -1
- package/esm2015/lib/scenario/scenario-setup.service.js +269 -269
- package/esm2015/lib/scenario/scenario.gql.js +368 -368
- package/esm2015/lib/scenario/scenario.service.js +611 -611
- package/esm2015/lib/scenario/scenario.types.js +64 -64
- package/esm2015/lib/search/search.gql.js +62 -62
- package/esm2015/lib/search/search.service.js +156 -156
- package/esm2015/lib/search/search.types.js +6 -6
- package/esm2015/lib/trusted-parties/tp-password-reset-request.service.js +112 -112
- package/esm2015/lib/trusted-parties/tp-password-reset-user.service.js +129 -129
- package/esm2015/lib/trusted-parties/tp-password-reset.constants.js +4 -4
- package/esm2015/lib/trusted-parties/tp-password-reset.gql.js +232 -232
- package/esm2015/lib/trusted-parties/tp-password-reset.service.js +299 -299
- package/esm2015/lib/trusted-parties/trusted-party.gql.js +148 -148
- package/esm2015/lib/trusted-parties/trusted-party.service.js +326 -326
- package/esm2015/lib/trusted-parties/trusted-party.types.js +41 -41
- package/esm2015/lib/trusted-parties/trusted-party2.gql.js +87 -87
- package/esm2015/lib/trusted-parties/trusted-party2.service.js +215 -215
- package/esm2015/lib/users/profile-details.service.js +214 -214
- package/esm2015/lib/users/profile.gql.js +97 -97
- package/esm2015/lib/users/profile.service.js +169 -169
- package/esm2015/lib/users/profile.types.js +34 -34
- package/esm2015/lib/users/user.gql.js +60 -60
- package/esm2015/lib/users/user.service.js +79 -79
- package/esm2015/lib/users/user.types.js +5 -5
- package/esm2015/lifeready-core.js +10 -10
- package/esm2015/public-api.js +81 -81
- package/fesm2015/lifeready-core.js +13088 -13088
- package/fesm2015/lifeready-core.js.map +1 -1
- package/lib/_common/ast.d.ts +11 -11
- package/lib/_common/deferred-promise.d.ts +12 -12
- package/lib/_common/exceptions.d.ts +109 -109
- package/lib/_common/queries.gql.d.ts +10 -10
- package/lib/_common/run-outside-angular.d.ts +14 -14
- package/lib/_common/types.d.ts +10 -10
- package/lib/_common/utils.d.ts +3 -3
- package/lib/api/contact-card.gql.d.ts +7 -7
- package/lib/api/contact-card.service.d.ts +52 -52
- package/lib/api/contact-card2.gql.d.ts +34 -34
- package/lib/api/contact-card2.service.d.ts +49 -49
- package/lib/api/file.service.d.ts +18 -18
- package/lib/api/item2.gql.d.ts +96 -96
- package/lib/api/item2.service.d.ts +177 -177
- package/lib/api/key-exchange.gql.d.ts +9 -9
- package/lib/api/key-exchange.service.d.ts +39 -39
- package/lib/api/key-exchange.types.d.ts +196 -196
- package/lib/api/key-exchange2.gql.d.ts +125 -125
- package/lib/api/key-exchange2.service.d.ts +187 -187
- package/lib/api/lock.gql.d.ts +27 -27
- package/lib/api/lock.service.d.ts +25 -25
- package/lib/api/lr-apollo.service.d.ts +15 -15
- package/lib/api/lr-graphql/index.d.ts +5 -5
- package/lib/api/lr-graphql/lr-graphql.service.d.ts +60 -60
- package/lib/api/lr-graphql/lr-merged-mutation.d.ts +27 -27
- package/lib/api/lr-graphql/lr-mutation-base.d.ts +28 -28
- package/lib/api/lr-graphql/lr-mutation.d.ts +8 -8
- package/lib/api/lr-graphql/lr.service.d.ts +9 -9
- package/lib/api/message.service.d.ts +58 -58
- package/lib/api/persist.service.d.ts +31 -31
- package/lib/api/query-processor/common-processors.service.d.ts +36 -36
- package/lib/api/query-processor/index.d.ts +2 -2
- package/lib/api/query-processor/query-processor.service.d.ts +18 -18
- package/lib/api/query-processor/tp-password-reset-processor.service.d.ts +15 -15
- package/lib/api/shared-contact-card.service.d.ts +33 -33
- package/lib/api/shared-contact-card2.gql.d.ts +36 -36
- package/lib/api/shared-contact-card2.service.d.ts +45 -45
- package/lib/api/time.service.d.ts +16 -16
- package/lib/api/types/graphql.types.d.ts +29 -29
- package/lib/api/types/index.d.ts +2 -2
- package/lib/api/types/lr-graphql.types.d.ts +385 -385
- package/lib/auth/auth.config.d.ts +5 -5
- package/lib/auth/auth.gql.d.ts +15 -15
- package/lib/auth/auth.types.d.ts +66 -66
- package/lib/auth/idle.service.d.ts +40 -40
- package/lib/auth/idle.types.d.ts +10 -10
- package/lib/auth/lbop.service.d.ts +91 -91
- package/lib/auth/life-ready-auth.service.d.ts +59 -59
- package/lib/auth/password.service.d.ts +78 -78
- package/lib/auth/register.service.d.ts +25 -25
- package/lib/auth/two-factor.service.d.ts +15 -15
- package/lib/category/category-meta.service.d.ts +23 -23
- package/lib/category/category.gql.d.ts +45 -45
- package/lib/category/category.service.d.ts +67 -67
- package/lib/category/category.types.d.ts +79 -79
- package/lib/cryptography/cryptography.types.d.ts +83 -83
- package/lib/cryptography/encryption.service.d.ts +41 -41
- package/lib/cryptography/key-factory.service.d.ts +38 -38
- package/lib/cryptography/key-graph.service.d.ts +33 -33
- package/lib/cryptography/key-meta.service.d.ts +44 -44
- package/lib/cryptography/key.service.d.ts +36 -36
- package/lib/cryptography/slip39.service.d.ts +43 -43
- package/lib/cryptography/web-crypto.service.d.ts +5 -5
- package/lib/life-ready.config.d.ts +14 -14
- package/lib/life-ready.module.d.ts +5 -5
- package/lib/plan/plan.gql.d.ts +11 -11
- package/lib/plan/plan.service.d.ts +33 -33
- package/lib/plan/plan.types.d.ts +31 -31
- package/lib/record/record-attachment.service.d.ts +16 -16
- package/lib/record/record.gql.d.ts +14 -14
- package/lib/record/record.service.d.ts +25 -25
- package/lib/record/record.types.d.ts +57 -57
- package/lib/record-type/record-type.service.d.ts +11 -11
- package/lib/record-type/record-type.types.d.ts +50 -50
- package/lib/scenario/approvals/scenario-approval.gql.d.ts +7 -7
- package/lib/scenario/approvals/scenario-approval.types.d.ts +63 -63
- package/lib/scenario/approvals/scenario-approver.service.d.ts +32 -32
- package/lib/scenario/claimants/scenario-claimant.gql.d.ts +5 -5
- package/lib/scenario/claimants/scenario-claimant.service.d.ts +17 -17
- package/lib/scenario/claimants/scenario-claimant.types.d.ts +18 -18
- package/lib/scenario/receivers/scenario-receiver.gql.d.ts +8 -8
- package/lib/scenario/receivers/scenario-receiver.service.d.ts +30 -30
- package/lib/scenario/receivers/scenario-receiver.types.d.ts +54 -54
- package/lib/scenario/scenario-setup.service.d.ts +22 -22
- package/lib/scenario/scenario.gql.d.ts +34 -34
- package/lib/scenario/scenario.service.d.ts +58 -58
- package/lib/scenario/scenario.types.d.ts +217 -217
- package/lib/search/search.gql.d.ts +1 -1
- package/lib/search/search.service.d.ts +25 -25
- package/lib/search/search.types.d.ts +20 -20
- package/lib/trusted-parties/tp-password-reset-request.service.d.ts +20 -20
- package/lib/trusted-parties/tp-password-reset-user.service.d.ts +35 -35
- package/lib/trusted-parties/tp-password-reset.constants.d.ts +3 -3
- package/lib/trusted-parties/tp-password-reset.gql.d.ts +218 -218
- package/lib/trusted-parties/tp-password-reset.service.d.ts +130 -130
- package/lib/trusted-parties/trusted-party.gql.d.ts +9 -9
- package/lib/trusted-parties/trusted-party.service.d.ts +44 -44
- package/lib/trusted-parties/trusted-party.types.d.ts +102 -102
- package/lib/trusted-parties/trusted-party2.gql.d.ts +79 -79
- package/lib/trusted-parties/trusted-party2.service.d.ts +114 -114
- package/lib/users/profile-details.service.d.ts +21 -21
- package/lib/users/profile.gql.d.ts +11 -11
- package/lib/users/profile.service.d.ts +35 -35
- package/lib/users/profile.types.d.ts +96 -96
- package/lib/users/user.gql.d.ts +9 -9
- package/lib/users/user.service.d.ts +12 -12
- package/lib/users/user.types.d.ts +23 -23
- package/lifeready-core.d.ts +9 -9
- package/package.json +1 -1
- package/public-api.d.ts +77 -77
|
@@ -1,79 +1,79 @@
|
|
|
1
|
-
export declare enum AccessLevel {
|
|
2
|
-
Owner = "OWNER",
|
|
3
|
-
Admin = "ADMIN",
|
|
4
|
-
Writer = "WRITER",
|
|
5
|
-
Reader = "READER",
|
|
6
|
-
Deny = "DENY"
|
|
7
|
-
}
|
|
8
|
-
export declare class SharedAccess {
|
|
9
|
-
trustedPartyId: string;
|
|
10
|
-
accessLevel: AccessLevel;
|
|
11
|
-
isInherited: boolean;
|
|
12
|
-
inheritedFrom?: string;
|
|
13
|
-
}
|
|
14
|
-
export declare class DefaultCategory {
|
|
15
|
-
code: string;
|
|
16
|
-
name: string;
|
|
17
|
-
allowRecords: boolean;
|
|
18
|
-
allowCustomCategories: boolean;
|
|
19
|
-
archived: boolean;
|
|
20
|
-
subCategories?: DefaultCategory[];
|
|
21
|
-
}
|
|
22
|
-
export declare class VaultRecordType {
|
|
23
|
-
id: string;
|
|
24
|
-
name: string;
|
|
25
|
-
}
|
|
26
|
-
export declare class VaultRecord {
|
|
27
|
-
id: string;
|
|
28
|
-
keyId: string;
|
|
29
|
-
name: string;
|
|
30
|
-
recordType: VaultRecordType;
|
|
31
|
-
createdOn: string | Date;
|
|
32
|
-
lastModified: string | Date;
|
|
33
|
-
isArchived: boolean;
|
|
34
|
-
myAccessLevel: AccessLevel;
|
|
35
|
-
sharedAccess: SharedAccess[];
|
|
36
|
-
}
|
|
37
|
-
export declare class Category {
|
|
38
|
-
id: string;
|
|
39
|
-
keyId: string;
|
|
40
|
-
code?: string;
|
|
41
|
-
name: string;
|
|
42
|
-
isHidden: boolean;
|
|
43
|
-
isCustom: boolean;
|
|
44
|
-
isEmpty: boolean;
|
|
45
|
-
isArchived: boolean;
|
|
46
|
-
allRecordsCount: number;
|
|
47
|
-
allowRecords: boolean;
|
|
48
|
-
allowCustomCategories: boolean;
|
|
49
|
-
myAccessLevel: AccessLevel;
|
|
50
|
-
sharedAccess: SharedAccess[];
|
|
51
|
-
}
|
|
52
|
-
export declare class CurrentCategory extends Category {
|
|
53
|
-
parents: Category[];
|
|
54
|
-
}
|
|
55
|
-
export declare class VaultCategory {
|
|
56
|
-
category?: CurrentCategory;
|
|
57
|
-
subCategories?: Category[];
|
|
58
|
-
records?: VaultRecord[];
|
|
59
|
-
}
|
|
60
|
-
export declare class NewCategory {
|
|
61
|
-
name: string;
|
|
62
|
-
code?: string;
|
|
63
|
-
isCustom: boolean;
|
|
64
|
-
allowRecords: boolean;
|
|
65
|
-
allowCustomCategories: boolean;
|
|
66
|
-
categoryIds?: string[];
|
|
67
|
-
}
|
|
68
|
-
export declare class UpdatedCategory {
|
|
69
|
-
name: string;
|
|
70
|
-
code?: string;
|
|
71
|
-
isCustom: boolean;
|
|
72
|
-
allowRecords: boolean;
|
|
73
|
-
allowCustomCategories: boolean;
|
|
74
|
-
}
|
|
75
|
-
export declare class Vault {
|
|
76
|
-
id: string;
|
|
77
|
-
keyId: string;
|
|
78
|
-
name?: string;
|
|
79
|
-
}
|
|
1
|
+
export declare enum AccessLevel {
|
|
2
|
+
Owner = "OWNER",
|
|
3
|
+
Admin = "ADMIN",
|
|
4
|
+
Writer = "WRITER",
|
|
5
|
+
Reader = "READER",
|
|
6
|
+
Deny = "DENY"
|
|
7
|
+
}
|
|
8
|
+
export declare class SharedAccess {
|
|
9
|
+
trustedPartyId: string;
|
|
10
|
+
accessLevel: AccessLevel;
|
|
11
|
+
isInherited: boolean;
|
|
12
|
+
inheritedFrom?: string;
|
|
13
|
+
}
|
|
14
|
+
export declare class DefaultCategory {
|
|
15
|
+
code: string;
|
|
16
|
+
name: string;
|
|
17
|
+
allowRecords: boolean;
|
|
18
|
+
allowCustomCategories: boolean;
|
|
19
|
+
archived: boolean;
|
|
20
|
+
subCategories?: DefaultCategory[];
|
|
21
|
+
}
|
|
22
|
+
export declare class VaultRecordType {
|
|
23
|
+
id: string;
|
|
24
|
+
name: string;
|
|
25
|
+
}
|
|
26
|
+
export declare class VaultRecord {
|
|
27
|
+
id: string;
|
|
28
|
+
keyId: string;
|
|
29
|
+
name: string;
|
|
30
|
+
recordType: VaultRecordType;
|
|
31
|
+
createdOn: string | Date;
|
|
32
|
+
lastModified: string | Date;
|
|
33
|
+
isArchived: boolean;
|
|
34
|
+
myAccessLevel: AccessLevel;
|
|
35
|
+
sharedAccess: SharedAccess[];
|
|
36
|
+
}
|
|
37
|
+
export declare class Category {
|
|
38
|
+
id: string;
|
|
39
|
+
keyId: string;
|
|
40
|
+
code?: string;
|
|
41
|
+
name: string;
|
|
42
|
+
isHidden: boolean;
|
|
43
|
+
isCustom: boolean;
|
|
44
|
+
isEmpty: boolean;
|
|
45
|
+
isArchived: boolean;
|
|
46
|
+
allRecordsCount: number;
|
|
47
|
+
allowRecords: boolean;
|
|
48
|
+
allowCustomCategories: boolean;
|
|
49
|
+
myAccessLevel: AccessLevel;
|
|
50
|
+
sharedAccess: SharedAccess[];
|
|
51
|
+
}
|
|
52
|
+
export declare class CurrentCategory extends Category {
|
|
53
|
+
parents: Category[];
|
|
54
|
+
}
|
|
55
|
+
export declare class VaultCategory {
|
|
56
|
+
category?: CurrentCategory;
|
|
57
|
+
subCategories?: Category[];
|
|
58
|
+
records?: VaultRecord[];
|
|
59
|
+
}
|
|
60
|
+
export declare class NewCategory {
|
|
61
|
+
name: string;
|
|
62
|
+
code?: string;
|
|
63
|
+
isCustom: boolean;
|
|
64
|
+
allowRecords: boolean;
|
|
65
|
+
allowCustomCategories: boolean;
|
|
66
|
+
categoryIds?: string[];
|
|
67
|
+
}
|
|
68
|
+
export declare class UpdatedCategory {
|
|
69
|
+
name: string;
|
|
70
|
+
code?: string;
|
|
71
|
+
isCustom: boolean;
|
|
72
|
+
allowRecords: boolean;
|
|
73
|
+
allowCustomCategories: boolean;
|
|
74
|
+
}
|
|
75
|
+
export declare class Vault {
|
|
76
|
+
id: string;
|
|
77
|
+
keyId: string;
|
|
78
|
+
name?: string;
|
|
79
|
+
}
|
|
@@ -1,83 +1,83 @@
|
|
|
1
|
-
import { JWK } from 'node-jose';
|
|
2
|
-
export interface Key {
|
|
3
|
-
id: string;
|
|
4
|
-
pbk?: string;
|
|
5
|
-
jwk?: JWK.Key;
|
|
6
|
-
}
|
|
7
|
-
export interface PassKeyParams {
|
|
8
|
-
kid: string;
|
|
9
|
-
salt: string;
|
|
10
|
-
iterations: number;
|
|
11
|
-
}
|
|
12
|
-
export interface PassIdpParams {
|
|
13
|
-
salt: string;
|
|
14
|
-
iterations: number;
|
|
15
|
-
}
|
|
16
|
-
export interface LbopKeyParams {
|
|
17
|
-
kid: string;
|
|
18
|
-
salt: string;
|
|
19
|
-
iterations: number;
|
|
20
|
-
}
|
|
21
|
-
export interface PassIdpVerifier {
|
|
22
|
-
wrappedPrK: object;
|
|
23
|
-
pbk: object;
|
|
24
|
-
}
|
|
25
|
-
export interface LbopKeyVerifier {
|
|
26
|
-
wrappedKey: object;
|
|
27
|
-
key: object;
|
|
28
|
-
}
|
|
29
|
-
export interface PassKey {
|
|
30
|
-
id: string;
|
|
31
|
-
passKeyParams?: PassKeyParams;
|
|
32
|
-
passIdpParams?: PassIdpParams;
|
|
33
|
-
wrappedPassIdpVerifierPrk?: object;
|
|
34
|
-
created?: string;
|
|
35
|
-
}
|
|
36
|
-
export interface KeyLink {
|
|
37
|
-
keyId: string;
|
|
38
|
-
wrappingKeyId: string;
|
|
39
|
-
wrappedKey: string;
|
|
40
|
-
}
|
|
41
|
-
export interface PassKeyLink {
|
|
42
|
-
keyId: string;
|
|
43
|
-
passKeyId: string;
|
|
44
|
-
wrappedKey: string;
|
|
45
|
-
}
|
|
46
|
-
export declare enum NodeType {
|
|
47
|
-
Key = "key",
|
|
48
|
-
PassKey = "passKey"
|
|
49
|
-
}
|
|
50
|
-
export interface Node {
|
|
51
|
-
type: NodeType;
|
|
52
|
-
data: Key | PassKey;
|
|
53
|
-
}
|
|
54
|
-
export declare enum EdgeType {
|
|
55
|
-
KeyLink = "keyLink",
|
|
56
|
-
PassKeyLink = "passKeyLink"
|
|
57
|
-
}
|
|
58
|
-
export interface Edge {
|
|
59
|
-
type: EdgeType;
|
|
60
|
-
data: KeyLink | PassKeyLink;
|
|
61
|
-
}
|
|
62
|
-
export interface KeyGraphResponse {
|
|
63
|
-
keys?: Key[];
|
|
64
|
-
keyLinks?: KeyLink[];
|
|
65
|
-
passKeys?: PassKey[];
|
|
66
|
-
passKeyLinks?: PassKeyLink[];
|
|
67
|
-
}
|
|
68
|
-
export interface HasKeyGraph {
|
|
69
|
-
keyGraph?: KeyGraphResponse;
|
|
70
|
-
}
|
|
71
|
-
export declare type PayloadType = 'json' | 'ArrayBuffer';
|
|
72
|
-
export interface DeriveKeyResult {
|
|
73
|
-
jwk: JWK.Key;
|
|
74
|
-
}
|
|
75
|
-
export interface DerivePassIdpParams extends PassIdpParams {
|
|
76
|
-
password: string;
|
|
77
|
-
}
|
|
78
|
-
export interface DerivePassKeyParams extends PassKeyParams {
|
|
79
|
-
password: string;
|
|
80
|
-
}
|
|
81
|
-
export interface DeriveLbopKeyParams extends PassKeyParams {
|
|
82
|
-
password: string;
|
|
83
|
-
}
|
|
1
|
+
import { JWK } from 'node-jose';
|
|
2
|
+
export interface Key {
|
|
3
|
+
id: string;
|
|
4
|
+
pbk?: string;
|
|
5
|
+
jwk?: JWK.Key;
|
|
6
|
+
}
|
|
7
|
+
export interface PassKeyParams {
|
|
8
|
+
kid: string;
|
|
9
|
+
salt: string;
|
|
10
|
+
iterations: number;
|
|
11
|
+
}
|
|
12
|
+
export interface PassIdpParams {
|
|
13
|
+
salt: string;
|
|
14
|
+
iterations: number;
|
|
15
|
+
}
|
|
16
|
+
export interface LbopKeyParams {
|
|
17
|
+
kid: string;
|
|
18
|
+
salt: string;
|
|
19
|
+
iterations: number;
|
|
20
|
+
}
|
|
21
|
+
export interface PassIdpVerifier {
|
|
22
|
+
wrappedPrK: object;
|
|
23
|
+
pbk: object;
|
|
24
|
+
}
|
|
25
|
+
export interface LbopKeyVerifier {
|
|
26
|
+
wrappedKey: object;
|
|
27
|
+
key: object;
|
|
28
|
+
}
|
|
29
|
+
export interface PassKey {
|
|
30
|
+
id: string;
|
|
31
|
+
passKeyParams?: PassKeyParams;
|
|
32
|
+
passIdpParams?: PassIdpParams;
|
|
33
|
+
wrappedPassIdpVerifierPrk?: object;
|
|
34
|
+
created?: string;
|
|
35
|
+
}
|
|
36
|
+
export interface KeyLink {
|
|
37
|
+
keyId: string;
|
|
38
|
+
wrappingKeyId: string;
|
|
39
|
+
wrappedKey: string;
|
|
40
|
+
}
|
|
41
|
+
export interface PassKeyLink {
|
|
42
|
+
keyId: string;
|
|
43
|
+
passKeyId: string;
|
|
44
|
+
wrappedKey: string;
|
|
45
|
+
}
|
|
46
|
+
export declare enum NodeType {
|
|
47
|
+
Key = "key",
|
|
48
|
+
PassKey = "passKey"
|
|
49
|
+
}
|
|
50
|
+
export interface Node {
|
|
51
|
+
type: NodeType;
|
|
52
|
+
data: Key | PassKey;
|
|
53
|
+
}
|
|
54
|
+
export declare enum EdgeType {
|
|
55
|
+
KeyLink = "keyLink",
|
|
56
|
+
PassKeyLink = "passKeyLink"
|
|
57
|
+
}
|
|
58
|
+
export interface Edge {
|
|
59
|
+
type: EdgeType;
|
|
60
|
+
data: KeyLink | PassKeyLink;
|
|
61
|
+
}
|
|
62
|
+
export interface KeyGraphResponse {
|
|
63
|
+
keys?: Key[];
|
|
64
|
+
keyLinks?: KeyLink[];
|
|
65
|
+
passKeys?: PassKey[];
|
|
66
|
+
passKeyLinks?: PassKeyLink[];
|
|
67
|
+
}
|
|
68
|
+
export interface HasKeyGraph {
|
|
69
|
+
keyGraph?: KeyGraphResponse;
|
|
70
|
+
}
|
|
71
|
+
export declare type PayloadType = 'json' | 'ArrayBuffer';
|
|
72
|
+
export interface DeriveKeyResult {
|
|
73
|
+
jwk: JWK.Key;
|
|
74
|
+
}
|
|
75
|
+
export interface DerivePassIdpParams extends PassIdpParams {
|
|
76
|
+
password: string;
|
|
77
|
+
}
|
|
78
|
+
export interface DerivePassKeyParams extends PassKeyParams {
|
|
79
|
+
password: string;
|
|
80
|
+
}
|
|
81
|
+
export interface DeriveLbopKeyParams extends PassKeyParams {
|
|
82
|
+
password: string;
|
|
83
|
+
}
|
|
@@ -1,41 +1,41 @@
|
|
|
1
|
-
/// <reference types="node" />
|
|
2
|
-
import { JWE, JWK } from 'node-jose';
|
|
3
|
-
import { Key, PayloadType } from './cryptography.types';
|
|
4
|
-
import { TimeService } from '../api/time.service';
|
|
5
|
-
export declare enum JoseSerialization {
|
|
6
|
-
JSON = "JSON",
|
|
7
|
-
COMPACT = "COMPACT"
|
|
8
|
-
}
|
|
9
|
-
export interface VerifyOptions {
|
|
10
|
-
payloadType?: PayloadType;
|
|
11
|
-
returnOnlyPayload?: boolean;
|
|
12
|
-
}
|
|
13
|
-
export interface DecryptOptions {
|
|
14
|
-
payloadType?: PayloadType;
|
|
15
|
-
returnOnlyPayload?: boolean;
|
|
16
|
-
serializations?: JoseSerialization[];
|
|
17
|
-
}
|
|
18
|
-
export declare const VERIFY_OPTIONS_DEFAULT: VerifyOptions;
|
|
19
|
-
export declare const DECRYPT_OPTIONS_DEFAULT: DecryptOptions;
|
|
20
|
-
export declare function isSymmetricKey(key: JWK.Key): boolean;
|
|
21
|
-
export declare function asJwk(key: JWK.Key | Key | any): JWK.Key | null;
|
|
22
|
-
export declare class EncryptionService {
|
|
23
|
-
private timeService;
|
|
24
|
-
constructor(timeService: TimeService);
|
|
25
|
-
decrypt(key: JWK.Key | Key, // string is assumed to be key.id, will unwrap key.
|
|
26
|
-
jwe: object | string, // string will be JSON.parsed
|
|
27
|
-
options?: DecryptOptions): Promise<JWE.DecryptResult | any>;
|
|
28
|
-
encryptToString(key: JWK.Key, content: ArrayBuffer | string | object): Promise<string>;
|
|
29
|
-
encrypt(key: JWK.Key, content: ArrayBuffer | string | object): Promise<any>;
|
|
30
|
-
sign(key: JWK.Key, content: Buffer | string | object): Promise<any>;
|
|
31
|
-
signToString(key: JWK.Key, content: Buffer | string | object): Promise<string>;
|
|
32
|
-
verify(key: JWK.Key, jws: object, options?: VerifyOptions): Promise<any>;
|
|
33
|
-
encryptThenSign({ key, sigPrk, }: {
|
|
34
|
-
key: JWK.Key;
|
|
35
|
-
sigPrk: JWK.Key;
|
|
36
|
-
}, content: ArrayBuffer | string | object): Promise<{
|
|
37
|
-
cipher: string;
|
|
38
|
-
sig: string;
|
|
39
|
-
}>;
|
|
40
|
-
private decodePayload;
|
|
41
|
-
}
|
|
1
|
+
/// <reference types="node" />
|
|
2
|
+
import { JWE, JWK } from 'node-jose';
|
|
3
|
+
import { Key, PayloadType } from './cryptography.types';
|
|
4
|
+
import { TimeService } from '../api/time.service';
|
|
5
|
+
export declare enum JoseSerialization {
|
|
6
|
+
JSON = "JSON",
|
|
7
|
+
COMPACT = "COMPACT"
|
|
8
|
+
}
|
|
9
|
+
export interface VerifyOptions {
|
|
10
|
+
payloadType?: PayloadType;
|
|
11
|
+
returnOnlyPayload?: boolean;
|
|
12
|
+
}
|
|
13
|
+
export interface DecryptOptions {
|
|
14
|
+
payloadType?: PayloadType;
|
|
15
|
+
returnOnlyPayload?: boolean;
|
|
16
|
+
serializations?: JoseSerialization[];
|
|
17
|
+
}
|
|
18
|
+
export declare const VERIFY_OPTIONS_DEFAULT: VerifyOptions;
|
|
19
|
+
export declare const DECRYPT_OPTIONS_DEFAULT: DecryptOptions;
|
|
20
|
+
export declare function isSymmetricKey(key: JWK.Key): boolean;
|
|
21
|
+
export declare function asJwk(key: JWK.Key | Key | any): JWK.Key | null;
|
|
22
|
+
export declare class EncryptionService {
|
|
23
|
+
private timeService;
|
|
24
|
+
constructor(timeService: TimeService);
|
|
25
|
+
decrypt(key: JWK.Key | Key, // string is assumed to be key.id, will unwrap key.
|
|
26
|
+
jwe: object | string, // string will be JSON.parsed
|
|
27
|
+
options?: DecryptOptions): Promise<JWE.DecryptResult | any>;
|
|
28
|
+
encryptToString(key: JWK.Key, content: ArrayBuffer | string | object): Promise<string>;
|
|
29
|
+
encrypt(key: JWK.Key, content: ArrayBuffer | string | object): Promise<any>;
|
|
30
|
+
sign(key: JWK.Key, content: Buffer | string | object): Promise<any>;
|
|
31
|
+
signToString(key: JWK.Key, content: Buffer | string | object): Promise<string>;
|
|
32
|
+
verify(key: JWK.Key, jws: object, options?: VerifyOptions): Promise<any>;
|
|
33
|
+
encryptThenSign({ key, sigPrk, }: {
|
|
34
|
+
key: JWK.Key;
|
|
35
|
+
sigPrk: JWK.Key;
|
|
36
|
+
}, content: ArrayBuffer | string | object): Promise<{
|
|
37
|
+
cipher: string;
|
|
38
|
+
sig: string;
|
|
39
|
+
}>;
|
|
40
|
+
private decodePayload;
|
|
41
|
+
}
|
|
@@ -1,38 +1,38 @@
|
|
|
1
|
-
/// <reference types="node" />
|
|
2
|
-
import { JWK } from 'node-jose';
|
|
3
|
-
import { LbopKeyParams, PassIdpParams, PassKeyParams, DeriveKeyResult, DerivePassIdpParams, DerivePassKeyParams, DeriveLbopKeyParams } from './cryptography.types';
|
|
4
|
-
import { WebCryptoService } from './web-crypto.service';
|
|
5
|
-
export declare function sha256(message: any): Promise<string>;
|
|
6
|
-
export declare class KeyFactoryService {
|
|
7
|
-
private webCryptoService;
|
|
8
|
-
constructor(webCryptoService: WebCryptoService);
|
|
9
|
-
private readonly crypto;
|
|
10
|
-
readonly MIN_PASS_IDP_PBKDF_ITER = 100000;
|
|
11
|
-
readonly MIN_PASS_KEY_PBKDF_ITER = 100000;
|
|
12
|
-
readonly MIN_LBOP_KEY_PBKDF_ITER = 100000;
|
|
13
|
-
readonly DEFAULT_PASS_IDP_PBKDF_ITER = 100000;
|
|
14
|
-
readonly DEFAULT_PASS_KEY_PBKDF_ITER = 100000;
|
|
15
|
-
readonly DEFAULT_LBOP_KEY_PBKDF_ITER = 100000;
|
|
16
|
-
static asKey(key: string | Buffer | object | JWK.RawKey, form?: 'json' | 'private' | 'pkcs8' | 'public' | 'spki' | 'pkix' | 'x509' | 'pem', extras?: Record<string, unknown>): Promise<JWK.Key>;
|
|
17
|
-
randomString(digits: number): string;
|
|
18
|
-
randomDigitsNoZeros(digits: number): string;
|
|
19
|
-
randomChoices<T>(array: T[], chooseN: number): T[];
|
|
20
|
-
createSalt(): string;
|
|
21
|
-
createKey(): Promise<JWK.Key>;
|
|
22
|
-
createSignKey(): Promise<JWK.Key>;
|
|
23
|
-
createPkcKey(): Promise<JWK.Key>;
|
|
24
|
-
createPkcSignKey(): Promise<JWK.Key>;
|
|
25
|
-
deriveKey({ password, salt, iterations, kid, }: {
|
|
26
|
-
password: string;
|
|
27
|
-
salt: string;
|
|
28
|
-
iterations: number;
|
|
29
|
-
kid?: string;
|
|
30
|
-
}): Promise<DeriveKeyResult>;
|
|
31
|
-
derivePassIdp(params: DerivePassIdpParams): Promise<DeriveKeyResult>;
|
|
32
|
-
derivePassKey(params: DerivePassKeyParams): Promise<DeriveKeyResult>;
|
|
33
|
-
deriveLbopKey(params: DeriveLbopKeyParams): Promise<DeriveKeyResult>;
|
|
34
|
-
createKid(): Promise<string>;
|
|
35
|
-
createPassIdpParams(): Promise<PassIdpParams>;
|
|
36
|
-
createPassKeyParams(): Promise<PassKeyParams>;
|
|
37
|
-
createLbopKeyParams(): Promise<LbopKeyParams>;
|
|
38
|
-
}
|
|
1
|
+
/// <reference types="node" />
|
|
2
|
+
import { JWK } from 'node-jose';
|
|
3
|
+
import { LbopKeyParams, PassIdpParams, PassKeyParams, DeriveKeyResult, DerivePassIdpParams, DerivePassKeyParams, DeriveLbopKeyParams } from './cryptography.types';
|
|
4
|
+
import { WebCryptoService } from './web-crypto.service';
|
|
5
|
+
export declare function sha256(message: any): Promise<string>;
|
|
6
|
+
export declare class KeyFactoryService {
|
|
7
|
+
private webCryptoService;
|
|
8
|
+
constructor(webCryptoService: WebCryptoService);
|
|
9
|
+
private readonly crypto;
|
|
10
|
+
readonly MIN_PASS_IDP_PBKDF_ITER = 100000;
|
|
11
|
+
readonly MIN_PASS_KEY_PBKDF_ITER = 100000;
|
|
12
|
+
readonly MIN_LBOP_KEY_PBKDF_ITER = 100000;
|
|
13
|
+
readonly DEFAULT_PASS_IDP_PBKDF_ITER = 100000;
|
|
14
|
+
readonly DEFAULT_PASS_KEY_PBKDF_ITER = 100000;
|
|
15
|
+
readonly DEFAULT_LBOP_KEY_PBKDF_ITER = 100000;
|
|
16
|
+
static asKey(key: string | Buffer | object | JWK.RawKey, form?: 'json' | 'private' | 'pkcs8' | 'public' | 'spki' | 'pkix' | 'x509' | 'pem', extras?: Record<string, unknown>): Promise<JWK.Key>;
|
|
17
|
+
randomString(digits: number): string;
|
|
18
|
+
randomDigitsNoZeros(digits: number): string;
|
|
19
|
+
randomChoices<T>(array: T[], chooseN: number): T[];
|
|
20
|
+
createSalt(): string;
|
|
21
|
+
createKey(): Promise<JWK.Key>;
|
|
22
|
+
createSignKey(): Promise<JWK.Key>;
|
|
23
|
+
createPkcKey(): Promise<JWK.Key>;
|
|
24
|
+
createPkcSignKey(): Promise<JWK.Key>;
|
|
25
|
+
deriveKey({ password, salt, iterations, kid, }: {
|
|
26
|
+
password: string;
|
|
27
|
+
salt: string;
|
|
28
|
+
iterations: number;
|
|
29
|
+
kid?: string;
|
|
30
|
+
}): Promise<DeriveKeyResult>;
|
|
31
|
+
derivePassIdp(params: DerivePassIdpParams): Promise<DeriveKeyResult>;
|
|
32
|
+
derivePassKey(params: DerivePassKeyParams): Promise<DeriveKeyResult>;
|
|
33
|
+
deriveLbopKey(params: DeriveLbopKeyParams): Promise<DeriveKeyResult>;
|
|
34
|
+
createKid(): Promise<string>;
|
|
35
|
+
createPassIdpParams(): Promise<PassIdpParams>;
|
|
36
|
+
createPassKeyParams(): Promise<PassKeyParams>;
|
|
37
|
+
createLbopKeyParams(): Promise<LbopKeyParams>;
|
|
38
|
+
}
|
|
@@ -1,33 +1,33 @@
|
|
|
1
|
-
import { JWK } from 'node-jose';
|
|
2
|
-
import { CurrentUserKey } from '../users/profile.types';
|
|
3
|
-
import { Edge, Key, KeyGraphResponse, PassKey } from './cryptography.types';
|
|
4
|
-
import { DecryptOptions, EncryptionService } from './encryption.service';
|
|
5
|
-
import { KeyService } from './key.service';
|
|
6
|
-
export interface GraphKey extends Key {
|
|
7
|
-
task?: Promise<any>;
|
|
8
|
-
}
|
|
9
|
-
export declare class KeyGraphService {
|
|
10
|
-
private encryptionService;
|
|
11
|
-
private keyService;
|
|
12
|
-
private graph;
|
|
13
|
-
constructor(encryptionService: EncryptionService, keyService: KeyService);
|
|
14
|
-
purgeKeys(): void;
|
|
15
|
-
populateKeys(userKey: CurrentUserKey): Promise<void>;
|
|
16
|
-
hasKey(keyId: string): boolean;
|
|
17
|
-
private getNode;
|
|
18
|
-
key(id: any): GraphKey;
|
|
19
|
-
passKey(id: any): PassKey;
|
|
20
|
-
addKeys(src: KeyGraphResponse): void;
|
|
21
|
-
tracePath(distances: any, keyId: string): Edge[];
|
|
22
|
-
getPath(knownKeyId: string, keyId: string): Edge[];
|
|
23
|
-
getJwkKey(keyOrId: string | Key, getKeyIdCallback?: () => Promise<string> | string): Promise<JWK.Key>;
|
|
24
|
-
getKey(keyOrId: string | Key, getKeyIdCallback?: () => Promise<string> | string): Promise<Key>;
|
|
25
|
-
private _unwrapLink;
|
|
26
|
-
private _unwrap;
|
|
27
|
-
unwrapWithPassKey(passKeyId: string, passKey: JWK.Key, keyId: string): Promise<Key>;
|
|
28
|
-
unwrapKey(masterKeyId: string, keyId: string): Promise<Key>;
|
|
29
|
-
decryptFromString<T>(keyOrId: string | Key, cipherData: string, options?: DecryptOptions): Promise<T>;
|
|
30
|
-
decryptFile(keyId: string, file: any): Promise<any>;
|
|
31
|
-
encryptToString(key: string | Key | JWK.Key, content: any): Promise<string>;
|
|
32
|
-
wrapKey<T>(wrappingKey: string | Key | JWK.Key, key: JWK.Key): Promise<string>;
|
|
33
|
-
}
|
|
1
|
+
import { JWK } from 'node-jose';
|
|
2
|
+
import { CurrentUserKey } from '../users/profile.types';
|
|
3
|
+
import { Edge, Key, KeyGraphResponse, PassKey } from './cryptography.types';
|
|
4
|
+
import { DecryptOptions, EncryptionService } from './encryption.service';
|
|
5
|
+
import { KeyService } from './key.service';
|
|
6
|
+
export interface GraphKey extends Key {
|
|
7
|
+
task?: Promise<any>;
|
|
8
|
+
}
|
|
9
|
+
export declare class KeyGraphService {
|
|
10
|
+
private encryptionService;
|
|
11
|
+
private keyService;
|
|
12
|
+
private graph;
|
|
13
|
+
constructor(encryptionService: EncryptionService, keyService: KeyService);
|
|
14
|
+
purgeKeys(): void;
|
|
15
|
+
populateKeys(userKey: CurrentUserKey): Promise<void>;
|
|
16
|
+
hasKey(keyId: string): boolean;
|
|
17
|
+
private getNode;
|
|
18
|
+
key(id: any): GraphKey;
|
|
19
|
+
passKey(id: any): PassKey;
|
|
20
|
+
addKeys(src: KeyGraphResponse): void;
|
|
21
|
+
tracePath(distances: any, keyId: string): Edge[];
|
|
22
|
+
getPath(knownKeyId: string, keyId: string): Edge[];
|
|
23
|
+
getJwkKey(keyOrId: string | Key, getKeyIdCallback?: () => Promise<string> | string): Promise<JWK.Key>;
|
|
24
|
+
getKey(keyOrId: string | Key, getKeyIdCallback?: () => Promise<string> | string): Promise<Key>;
|
|
25
|
+
private _unwrapLink;
|
|
26
|
+
private _unwrap;
|
|
27
|
+
unwrapWithPassKey(passKeyId: string, passKey: JWK.Key, keyId: string): Promise<Key>;
|
|
28
|
+
unwrapKey(masterKeyId: string, keyId: string): Promise<Key>;
|
|
29
|
+
decryptFromString<T>(keyOrId: string | Key, cipherData: string, options?: DecryptOptions): Promise<T>;
|
|
30
|
+
decryptFile(keyId: string, file: any): Promise<any>;
|
|
31
|
+
encryptToString(key: string | Key | JWK.Key, content: any): Promise<string>;
|
|
32
|
+
wrapKey<T>(wrappingKey: string | Key | JWK.Key, key: JWK.Key): Promise<string>;
|
|
33
|
+
}
|
|
@@ -1,44 +1,44 @@
|
|
|
1
|
-
import { JWK } from 'node-jose';
|
|
2
|
-
import { LrApolloService } from '../api/lr-apollo.service';
|
|
3
|
-
import { EncryptionService } from './encryption.service';
|
|
4
|
-
import { KeyFactoryService } from './key-factory.service';
|
|
5
|
-
import { KeyGraphService } from './key-graph.service';
|
|
6
|
-
import { KeyService } from './key.service';
|
|
7
|
-
export interface HasCipherMeta {
|
|
8
|
-
keyId: string;
|
|
9
|
-
cipherMeta: string;
|
|
10
|
-
}
|
|
11
|
-
export declare class WrappedContent {
|
|
12
|
-
key: JWK.Key;
|
|
13
|
-
cipherMeta: string;
|
|
14
|
-
wrappedKeys?: WrappingKey[];
|
|
15
|
-
rootKey?: WrappingKey;
|
|
16
|
-
}
|
|
17
|
-
export declare class WrappingKey {
|
|
18
|
-
directoryId?: string;
|
|
19
|
-
wrappingKeyId: string;
|
|
20
|
-
wrappedKey: string;
|
|
21
|
-
}
|
|
22
|
-
export declare class KeyMetaService {
|
|
23
|
-
private encryptionService;
|
|
24
|
-
private keyGraph;
|
|
25
|
-
private lrApollo;
|
|
26
|
-
private keyService;
|
|
27
|
-
private keyFactory;
|
|
28
|
-
constructor(encryptionService: EncryptionService, keyGraph: KeyGraphService, lrApollo: LrApolloService, keyService: KeyService, keyFactory: KeyFactoryService);
|
|
29
|
-
decryptMeta<T>(metaHaver: HasCipherMeta): Promise<T>;
|
|
30
|
-
doubleWrapContent(secureContent: any, categoryIds: string[], fileContent?: ArrayBuffer): Promise<{
|
|
31
|
-
rootKey: WrappingKey;
|
|
32
|
-
wrappedKeys: WrappingKey[];
|
|
33
|
-
doubleWrappedKey: string;
|
|
34
|
-
cipherMeta: string;
|
|
35
|
-
cipherFileContent: string;
|
|
36
|
-
}>;
|
|
37
|
-
reWrapContent(keyId: string, secureContent: any): Promise<{
|
|
38
|
-
doubleWrappedKey: string;
|
|
39
|
-
cipherMeta: string;
|
|
40
|
-
}>;
|
|
41
|
-
wrapContent(secureContent: any, categoryIds?: string[]): Promise<WrappedContent>;
|
|
42
|
-
wrapContentWithKey(secureContent: any, keyId: string): Promise<WrappedContent>;
|
|
43
|
-
private getCategoryKeyId;
|
|
44
|
-
}
|
|
1
|
+
import { JWK } from 'node-jose';
|
|
2
|
+
import { LrApolloService } from '../api/lr-apollo.service';
|
|
3
|
+
import { EncryptionService } from './encryption.service';
|
|
4
|
+
import { KeyFactoryService } from './key-factory.service';
|
|
5
|
+
import { KeyGraphService } from './key-graph.service';
|
|
6
|
+
import { KeyService } from './key.service';
|
|
7
|
+
export interface HasCipherMeta {
|
|
8
|
+
keyId: string;
|
|
9
|
+
cipherMeta: string;
|
|
10
|
+
}
|
|
11
|
+
export declare class WrappedContent {
|
|
12
|
+
key: JWK.Key;
|
|
13
|
+
cipherMeta: string;
|
|
14
|
+
wrappedKeys?: WrappingKey[];
|
|
15
|
+
rootKey?: WrappingKey;
|
|
16
|
+
}
|
|
17
|
+
export declare class WrappingKey {
|
|
18
|
+
directoryId?: string;
|
|
19
|
+
wrappingKeyId: string;
|
|
20
|
+
wrappedKey: string;
|
|
21
|
+
}
|
|
22
|
+
export declare class KeyMetaService {
|
|
23
|
+
private encryptionService;
|
|
24
|
+
private keyGraph;
|
|
25
|
+
private lrApollo;
|
|
26
|
+
private keyService;
|
|
27
|
+
private keyFactory;
|
|
28
|
+
constructor(encryptionService: EncryptionService, keyGraph: KeyGraphService, lrApollo: LrApolloService, keyService: KeyService, keyFactory: KeyFactoryService);
|
|
29
|
+
decryptMeta<T>(metaHaver: HasCipherMeta): Promise<T>;
|
|
30
|
+
doubleWrapContent(secureContent: any, categoryIds: string[], fileContent?: ArrayBuffer): Promise<{
|
|
31
|
+
rootKey: WrappingKey;
|
|
32
|
+
wrappedKeys: WrappingKey[];
|
|
33
|
+
doubleWrappedKey: string;
|
|
34
|
+
cipherMeta: string;
|
|
35
|
+
cipherFileContent: string;
|
|
36
|
+
}>;
|
|
37
|
+
reWrapContent(keyId: string, secureContent: any): Promise<{
|
|
38
|
+
doubleWrappedKey: string;
|
|
39
|
+
cipherMeta: string;
|
|
40
|
+
}>;
|
|
41
|
+
wrapContent(secureContent: any, categoryIds?: string[]): Promise<WrappedContent>;
|
|
42
|
+
wrapContentWithKey(secureContent: any, keyId: string): Promise<WrappedContent>;
|
|
43
|
+
private getCategoryKeyId;
|
|
44
|
+
}
|