2018-02-19 19:07:19 +01:00
|
|
|
import { CipherType } from '../enums/cipherType';
|
2018-07-27 22:44:20 +02:00
|
|
|
import { FieldType } from '../enums/fieldType';
|
2018-03-02 18:03:03 +01:00
|
|
|
import { UriMatchType } from '../enums/uriMatchType';
|
2018-01-10 05:01:16 +01:00
|
|
|
|
2018-02-19 19:07:19 +01:00
|
|
|
import { CipherData } from '../models/data/cipherData';
|
2018-01-10 05:01:16 +01:00
|
|
|
|
2018-06-12 17:45:02 +02:00
|
|
|
import { Attachment } from '../models/domain/attachment';
|
2018-02-19 19:07:19 +01:00
|
|
|
import { Card } from '../models/domain/card';
|
|
|
|
import { Cipher } from '../models/domain/cipher';
|
2018-10-04 20:38:15 +02:00
|
|
|
import Domain from '../models/domain/domainBase';
|
2021-04-21 02:16:19 +02:00
|
|
|
import { EncArrayBuffer } from '../models/domain/encArrayBuffer';
|
|
|
|
import { EncString } from '../models/domain/encString';
|
2018-02-19 19:07:19 +01:00
|
|
|
import { Field } from '../models/domain/field';
|
|
|
|
import { Identity } from '../models/domain/identity';
|
|
|
|
import { Login } from '../models/domain/login';
|
2018-03-02 05:44:29 +01:00
|
|
|
import { LoginUri } from '../models/domain/loginUri';
|
2018-07-27 22:44:20 +02:00
|
|
|
import { Password } from '../models/domain/password';
|
2018-02-19 19:07:19 +01:00
|
|
|
import { SecureNote } from '../models/domain/secureNote';
|
|
|
|
import { SymmetricCryptoKey } from '../models/domain/symmetricCryptoKey';
|
2018-01-10 05:01:16 +01:00
|
|
|
|
2021-04-14 17:47:10 +02:00
|
|
|
import { AttachmentRequest } from '../models/request/attachmentRequest';
|
2018-06-12 23:12:27 +02:00
|
|
|
import { CipherBulkDeleteRequest } from '../models/request/cipherBulkDeleteRequest';
|
|
|
|
import { CipherBulkMoveRequest } from '../models/request/cipherBulkMoveRequest';
|
2020-04-03 22:32:15 +02:00
|
|
|
import { CipherBulkRestoreRequest } from '../models/request/cipherBulkRestoreRequest';
|
2018-06-13 06:02:15 +02:00
|
|
|
import { CipherBulkShareRequest } from '../models/request/cipherBulkShareRequest';
|
2018-06-12 19:07:06 +02:00
|
|
|
import { CipherCollectionsRequest } from '../models/request/cipherCollectionsRequest';
|
2018-10-19 15:14:11 +02:00
|
|
|
import { CipherCreateRequest } from '../models/request/cipherCreateRequest';
|
2018-02-19 19:07:19 +01:00
|
|
|
import { CipherRequest } from '../models/request/cipherRequest';
|
2018-06-12 23:12:27 +02:00
|
|
|
import { CipherShareRequest } from '../models/request/cipherShareRequest';
|
2018-01-10 05:01:16 +01:00
|
|
|
|
2018-02-19 19:07:19 +01:00
|
|
|
import { CipherResponse } from '../models/response/cipherResponse';
|
|
|
|
import { ErrorResponse } from '../models/response/errorResponse';
|
2018-01-10 05:01:16 +01:00
|
|
|
|
2018-06-12 17:45:02 +02:00
|
|
|
import { AttachmentView } from '../models/view/attachmentView';
|
2018-02-19 19:07:19 +01:00
|
|
|
import { CipherView } from '../models/view/cipherView';
|
|
|
|
import { FieldView } from '../models/view/fieldView';
|
2018-07-27 22:44:20 +02:00
|
|
|
import { PasswordHistoryView } from '../models/view/passwordHistoryView';
|
2018-02-19 19:07:19 +01:00
|
|
|
import { View } from '../models/view/view';
|
2018-01-24 17:33:15 +01:00
|
|
|
|
2020-08-12 21:59:59 +02:00
|
|
|
import { SortedCiphersCache } from '../models/domain/sortedCiphersCache';
|
|
|
|
|
2018-02-19 19:07:19 +01:00
|
|
|
import { ApiService } from '../abstractions/api.service';
|
|
|
|
import { CipherService as CipherServiceAbstraction } from '../abstractions/cipher.service';
|
|
|
|
import { CryptoService } from '../abstractions/crypto.service';
|
2021-03-26 22:57:07 +01:00
|
|
|
import { FileUploadService } from '../abstractions/fileUpload.service';
|
2018-02-19 19:07:19 +01:00
|
|
|
import { I18nService } from '../abstractions/i18n.service';
|
2018-08-13 15:42:52 +02:00
|
|
|
import { SearchService } from '../abstractions/search.service';
|
2018-02-19 19:07:19 +01:00
|
|
|
import { SettingsService } from '../abstractions/settings.service';
|
|
|
|
import { StorageService } from '../abstractions/storage.service';
|
|
|
|
import { UserService } from '../abstractions/user.service';
|
2018-04-23 19:03:47 +02:00
|
|
|
|
2019-01-09 17:59:11 +01:00
|
|
|
import { ConstantsService } from './constants.service';
|
|
|
|
|
2021-10-19 10:32:14 +02:00
|
|
|
import { LogService } from '../abstractions/log.service';
|
2018-08-13 20:09:03 +02:00
|
|
|
import { sequentialize } from '../misc/sequentialize';
|
2018-04-23 19:03:47 +02:00
|
|
|
import { Utils } from '../misc/utils';
|
2018-01-10 05:01:16 +01:00
|
|
|
|
|
|
|
const Keys = {
|
|
|
|
ciphersPrefix: 'ciphers_',
|
|
|
|
localData: 'sitesLocalData',
|
|
|
|
neverDomains: 'neverDomains',
|
|
|
|
};
|
|
|
|
|
2018-12-07 21:41:43 +01:00
|
|
|
const DomainMatchBlacklist = new Map<string, Set<string>>([
|
|
|
|
['google.com', new Set(['script.google.com'])],
|
|
|
|
]);
|
|
|
|
|
2018-01-23 23:29:15 +01:00
|
|
|
export class CipherService implements CipherServiceAbstraction {
|
2018-08-13 15:42:52 +02:00
|
|
|
// tslint:disable-next-line
|
|
|
|
_decryptedCipherCache: CipherView[];
|
2018-01-10 05:01:16 +01:00
|
|
|
|
2020-08-12 21:59:59 +02:00
|
|
|
private sortedCiphersCache: SortedCiphersCache = new SortedCiphersCache(this.sortCiphersByLastUsed);
|
|
|
|
|
2018-01-10 05:01:16 +01:00
|
|
|
constructor(private cryptoService: CryptoService, private userService: UserService,
|
|
|
|
private settingsService: SettingsService, private apiService: ApiService,
|
2021-03-26 22:57:07 +01:00
|
|
|
private fileUploadService: FileUploadService, private storageService: StorageService,
|
2021-10-19 10:32:14 +02:00
|
|
|
private i18nService: I18nService, private searchService: () => SearchService,
|
|
|
|
private logService: LogService) {
|
2018-08-13 15:42:52 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
get decryptedCipherCache() {
|
|
|
|
return this._decryptedCipherCache;
|
|
|
|
}
|
|
|
|
set decryptedCipherCache(value: CipherView[]) {
|
|
|
|
this._decryptedCipherCache = value;
|
2018-08-13 20:28:10 +02:00
|
|
|
if (this.searchService != null) {
|
|
|
|
if (value == null) {
|
|
|
|
this.searchService().clearIndex();
|
|
|
|
} else {
|
|
|
|
this.searchService().indexCiphers();
|
|
|
|
}
|
2018-08-13 15:42:52 +02:00
|
|
|
}
|
2018-01-10 05:01:16 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
clearCache(): void {
|
|
|
|
this.decryptedCipherCache = null;
|
2020-08-12 21:59:59 +02:00
|
|
|
this.sortedCiphersCache.clear();
|
2018-01-10 05:01:16 +01:00
|
|
|
}
|
|
|
|
|
2018-08-15 17:43:52 +02:00
|
|
|
async encrypt(model: CipherView, key?: SymmetricCryptoKey, originalCipher: Cipher = null): Promise<Cipher> {
|
2018-07-27 22:44:20 +02:00
|
|
|
// Adjust password history
|
|
|
|
if (model.id != null) {
|
2018-08-15 17:43:52 +02:00
|
|
|
if (originalCipher == null) {
|
|
|
|
originalCipher = await this.get(model.id);
|
|
|
|
}
|
|
|
|
if (originalCipher != null) {
|
|
|
|
const existingCipher = await originalCipher.decrypt();
|
2018-07-27 22:44:20 +02:00
|
|
|
model.passwordHistory = existingCipher.passwordHistory || [];
|
2018-07-27 23:48:18 +02:00
|
|
|
if (model.type === CipherType.Login && existingCipher.type === CipherType.Login) {
|
2018-07-30 22:40:16 +02:00
|
|
|
if (existingCipher.login.password != null && existingCipher.login.password !== '' &&
|
|
|
|
existingCipher.login.password !== model.login.password) {
|
2018-07-27 23:48:18 +02:00
|
|
|
const ph = new PasswordHistoryView();
|
|
|
|
ph.password = existingCipher.login.password;
|
|
|
|
ph.lastUsedDate = model.login.passwordRevisionDate = new Date();
|
|
|
|
model.passwordHistory.splice(0, 0, ph);
|
|
|
|
} else {
|
|
|
|
model.login.passwordRevisionDate = existingCipher.login.passwordRevisionDate;
|
|
|
|
}
|
2018-07-27 22:44:20 +02:00
|
|
|
}
|
|
|
|
if (existingCipher.hasFields) {
|
2021-02-04 16:49:23 +01:00
|
|
|
const existingHiddenFields = existingCipher.fields.filter(f => f.type === FieldType.Hidden &&
|
2018-07-30 22:40:16 +02:00
|
|
|
f.name != null && f.name !== '' && f.value != null && f.value !== '');
|
2018-07-27 22:44:20 +02:00
|
|
|
const hiddenFields = model.fields == null ? [] :
|
2021-02-04 16:49:23 +01:00
|
|
|
model.fields.filter(f => f.type === FieldType.Hidden && f.name != null && f.name !== '');
|
|
|
|
existingHiddenFields.forEach(ef => {
|
|
|
|
const matchedField = hiddenFields.find(f => f.name === ef.name);
|
2019-04-16 03:15:35 +02:00
|
|
|
if (matchedField == null || matchedField.value !== ef.value) {
|
2018-07-27 23:48:18 +02:00
|
|
|
const ph = new PasswordHistoryView();
|
2018-07-27 22:44:20 +02:00
|
|
|
ph.password = ef.name + ': ' + ef.value;
|
|
|
|
ph.lastUsedDate = new Date();
|
|
|
|
model.passwordHistory.splice(0, 0, ph);
|
|
|
|
}
|
|
|
|
});
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (model.passwordHistory != null && model.passwordHistory.length === 0) {
|
|
|
|
model.passwordHistory = null;
|
|
|
|
} else if (model.passwordHistory != null && model.passwordHistory.length > 5) {
|
|
|
|
// only save last 5 history
|
2018-07-27 23:30:51 +02:00
|
|
|
model.passwordHistory = model.passwordHistory.slice(0, 5);
|
2018-07-27 22:44:20 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-01-10 05:01:16 +01:00
|
|
|
const cipher = new Cipher();
|
|
|
|
cipher.id = model.id;
|
|
|
|
cipher.folderId = model.folderId;
|
|
|
|
cipher.favorite = model.favorite;
|
|
|
|
cipher.organizationId = model.organizationId;
|
|
|
|
cipher.type = model.type;
|
|
|
|
cipher.collectionIds = model.collectionIds;
|
2020-11-23 15:48:40 +01:00
|
|
|
cipher.revisionDate = model.revisionDate;
|
2021-04-29 13:31:21 +02:00
|
|
|
cipher.reprompt = model.reprompt;
|
2018-01-10 05:01:16 +01:00
|
|
|
|
2018-07-17 23:22:45 +02:00
|
|
|
if (key == null && cipher.organizationId != null) {
|
|
|
|
key = await this.cryptoService.getOrgKey(cipher.organizationId);
|
2018-09-10 14:22:10 +02:00
|
|
|
if (key == null) {
|
|
|
|
throw new Error('Cannot encrypt cipher for organization. No key.');
|
|
|
|
}
|
2018-07-17 23:22:45 +02:00
|
|
|
}
|
2018-01-10 05:01:16 +01:00
|
|
|
await Promise.all([
|
|
|
|
this.encryptObjProperty(model, cipher, {
|
|
|
|
name: null,
|
|
|
|
notes: null,
|
|
|
|
}, key),
|
2018-01-24 17:33:15 +01:00
|
|
|
this.encryptCipherData(cipher, model, key),
|
2021-02-04 16:49:23 +01:00
|
|
|
this.encryptFields(model.fields, key).then(fields => {
|
2018-01-10 05:01:16 +01:00
|
|
|
cipher.fields = fields;
|
|
|
|
}),
|
2021-02-04 16:49:23 +01:00
|
|
|
this.encryptPasswordHistories(model.passwordHistory, key).then(ph => {
|
2018-07-27 22:44:20 +02:00
|
|
|
cipher.passwordHistory = ph;
|
|
|
|
}),
|
2021-02-04 16:49:23 +01:00
|
|
|
this.encryptAttachments(model.attachments, key).then(attachments => {
|
2018-06-12 17:45:02 +02:00
|
|
|
cipher.attachments = attachments;
|
|
|
|
}),
|
2018-01-10 05:01:16 +01:00
|
|
|
]);
|
|
|
|
|
|
|
|
return cipher;
|
|
|
|
}
|
|
|
|
|
2018-06-12 17:45:02 +02:00
|
|
|
async encryptAttachments(attachmentsModel: AttachmentView[], key: SymmetricCryptoKey): Promise<Attachment[]> {
|
|
|
|
if (attachmentsModel == null || attachmentsModel.length === 0) {
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
|
2020-08-12 21:42:42 +02:00
|
|
|
const promises: Promise<any>[] = [];
|
2018-06-12 17:45:02 +02:00
|
|
|
const encAttachments: Attachment[] = [];
|
2021-02-04 16:49:23 +01:00
|
|
|
attachmentsModel.forEach(async model => {
|
2018-06-12 17:45:02 +02:00
|
|
|
const attachment = new Attachment();
|
|
|
|
attachment.id = model.id;
|
|
|
|
attachment.size = model.size;
|
|
|
|
attachment.sizeName = model.sizeName;
|
|
|
|
attachment.url = model.url;
|
|
|
|
const promise = this.encryptObjProperty(model, attachment, {
|
|
|
|
fileName: null,
|
2018-11-14 02:43:45 +01:00
|
|
|
}, key).then(async () => {
|
|
|
|
if (model.key != null) {
|
|
|
|
attachment.key = await this.cryptoService.encrypt(model.key.key, key);
|
|
|
|
}
|
2018-06-12 17:45:02 +02:00
|
|
|
encAttachments.push(attachment);
|
|
|
|
});
|
|
|
|
promises.push(promise);
|
|
|
|
});
|
|
|
|
|
|
|
|
await Promise.all(promises);
|
|
|
|
return encAttachments;
|
|
|
|
}
|
|
|
|
|
2018-01-24 17:33:15 +01:00
|
|
|
async encryptFields(fieldsModel: FieldView[], key: SymmetricCryptoKey): Promise<Field[]> {
|
2018-01-10 05:01:16 +01:00
|
|
|
if (!fieldsModel || !fieldsModel.length) {
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
|
|
|
|
const self = this;
|
|
|
|
const encFields: Field[] = [];
|
|
|
|
await fieldsModel.reduce((promise, field) => {
|
|
|
|
return promise.then(() => {
|
|
|
|
return self.encryptField(field, key);
|
|
|
|
}).then((encField: Field) => {
|
|
|
|
encFields.push(encField);
|
|
|
|
});
|
|
|
|
}, Promise.resolve());
|
|
|
|
|
|
|
|
return encFields;
|
|
|
|
}
|
|
|
|
|
2018-01-24 17:33:15 +01:00
|
|
|
async encryptField(fieldModel: FieldView, key: SymmetricCryptoKey): Promise<Field> {
|
2018-01-10 05:01:16 +01:00
|
|
|
const field = new Field();
|
|
|
|
field.type = fieldModel.type;
|
2018-12-13 16:58:48 +01:00
|
|
|
// normalize boolean type field values
|
|
|
|
if (fieldModel.type === FieldType.Boolean && fieldModel.value !== 'true') {
|
|
|
|
fieldModel.value = 'false';
|
|
|
|
}
|
2018-01-10 05:01:16 +01:00
|
|
|
|
|
|
|
await this.encryptObjProperty(fieldModel, field, {
|
|
|
|
name: null,
|
|
|
|
value: null,
|
|
|
|
}, key);
|
|
|
|
|
|
|
|
return field;
|
|
|
|
}
|
|
|
|
|
2018-07-27 22:44:20 +02:00
|
|
|
async encryptPasswordHistories(phModels: PasswordHistoryView[], key: SymmetricCryptoKey): Promise<Password[]> {
|
|
|
|
if (!phModels || !phModels.length) {
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
|
|
|
|
const self = this;
|
|
|
|
const encPhs: Password[] = [];
|
|
|
|
await phModels.reduce((promise, ph) => {
|
|
|
|
return promise.then(() => {
|
|
|
|
return self.encryptPasswordHistory(ph, key);
|
|
|
|
}).then((encPh: Password) => {
|
|
|
|
encPhs.push(encPh);
|
|
|
|
});
|
|
|
|
}, Promise.resolve());
|
|
|
|
|
|
|
|
return encPhs;
|
|
|
|
}
|
|
|
|
|
|
|
|
async encryptPasswordHistory(phModel: PasswordHistoryView, key: SymmetricCryptoKey): Promise<Password> {
|
|
|
|
const ph = new Password();
|
|
|
|
ph.lastUsedDate = phModel.lastUsedDate;
|
|
|
|
|
|
|
|
await this.encryptObjProperty(phModel, ph, {
|
|
|
|
password: null,
|
|
|
|
}, key);
|
|
|
|
|
|
|
|
return ph;
|
|
|
|
}
|
|
|
|
|
2018-01-10 05:01:16 +01:00
|
|
|
async get(id: string): Promise<Cipher> {
|
|
|
|
const userId = await this.userService.getUserId();
|
|
|
|
const localData = await this.storageService.get<any>(Keys.localData);
|
|
|
|
const ciphers = await this.storageService.get<{ [id: string]: CipherData; }>(
|
|
|
|
Keys.ciphersPrefix + userId);
|
|
|
|
if (ciphers == null || !ciphers.hasOwnProperty(id)) {
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
|
|
|
|
return new Cipher(ciphers[id], false, localData ? localData[id] : null);
|
|
|
|
}
|
|
|
|
|
|
|
|
async getAll(): Promise<Cipher[]> {
|
|
|
|
const userId = await this.userService.getUserId();
|
|
|
|
const localData = await this.storageService.get<any>(Keys.localData);
|
|
|
|
const ciphers = await this.storageService.get<{ [id: string]: CipherData; }>(
|
|
|
|
Keys.ciphersPrefix + userId);
|
|
|
|
const response: Cipher[] = [];
|
|
|
|
for (const id in ciphers) {
|
|
|
|
if (ciphers.hasOwnProperty(id)) {
|
|
|
|
response.push(new Cipher(ciphers[id], false, localData ? localData[id] : null));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return response;
|
|
|
|
}
|
|
|
|
|
2018-08-13 20:09:03 +02:00
|
|
|
@sequentialize(() => 'getAllDecrypted')
|
2018-01-24 17:33:15 +01:00
|
|
|
async getAllDecrypted(): Promise<CipherView[]> {
|
2018-01-10 05:01:16 +01:00
|
|
|
if (this.decryptedCipherCache != null) {
|
2021-04-22 21:53:45 +02:00
|
|
|
const userId = await this.userService.getUserId();
|
2021-05-10 16:52:45 +02:00
|
|
|
if (this.searchService != null && (this.searchService().indexedEntityId ?? userId) !== userId)
|
2021-04-22 21:53:45 +02:00
|
|
|
{
|
2021-04-23 20:55:57 +02:00
|
|
|
await this.searchService().indexCiphers(userId, this.decryptedCipherCache);
|
2021-04-22 21:53:45 +02:00
|
|
|
}
|
2018-01-10 05:01:16 +01:00
|
|
|
return this.decryptedCipherCache;
|
|
|
|
}
|
|
|
|
|
2018-01-24 17:33:15 +01:00
|
|
|
const decCiphers: CipherView[] = [];
|
2018-06-13 23:14:26 +02:00
|
|
|
const hasKey = await this.cryptoService.hasKey();
|
|
|
|
if (!hasKey) {
|
2018-01-10 05:01:16 +01:00
|
|
|
throw new Error('No key.');
|
|
|
|
}
|
|
|
|
|
2018-07-23 20:24:27 +02:00
|
|
|
const promises: any[] = [];
|
2018-01-10 05:01:16 +01:00
|
|
|
const ciphers = await this.getAll();
|
2021-02-04 16:49:23 +01:00
|
|
|
ciphers.forEach(cipher => {
|
|
|
|
promises.push(cipher.decrypt().then(c => decCiphers.push(c)));
|
2018-07-23 20:24:27 +02:00
|
|
|
});
|
|
|
|
|
|
|
|
await Promise.all(promises);
|
2018-01-27 04:38:22 +01:00
|
|
|
decCiphers.sort(this.getLocaleSortingFunction());
|
2018-01-10 05:01:16 +01:00
|
|
|
this.decryptedCipherCache = decCiphers;
|
|
|
|
return this.decryptedCipherCache;
|
|
|
|
}
|
|
|
|
|
2018-01-24 17:33:15 +01:00
|
|
|
async getAllDecryptedForGrouping(groupingId: string, folder: boolean = true): Promise<CipherView[]> {
|
2018-01-10 05:01:16 +01:00
|
|
|
const ciphers = await this.getAllDecrypted();
|
|
|
|
|
2021-02-04 16:49:23 +01:00
|
|
|
return ciphers.filter(cipher => {
|
2020-04-10 22:42:34 +02:00
|
|
|
if (cipher.isDeleted) {
|
|
|
|
return false;
|
|
|
|
}
|
2018-01-10 05:01:16 +01:00
|
|
|
if (folder && cipher.folderId === groupingId) {
|
2018-01-24 17:33:15 +01:00
|
|
|
return true;
|
2018-01-10 05:01:16 +01:00
|
|
|
} else if (!folder && cipher.collectionIds != null && cipher.collectionIds.indexOf(groupingId) > -1) {
|
2018-01-24 17:33:15 +01:00
|
|
|
return true;
|
2018-01-10 05:01:16 +01:00
|
|
|
}
|
|
|
|
|
2018-01-24 17:33:15 +01:00
|
|
|
return false;
|
|
|
|
});
|
2018-01-10 05:01:16 +01:00
|
|
|
}
|
|
|
|
|
2020-09-20 15:47:35 +02:00
|
|
|
async getAllDecryptedForUrl(url: string, includeOtherTypes?: CipherType[],
|
|
|
|
defaultMatch: UriMatchType = null): Promise<CipherView[]> {
|
2019-04-16 03:15:35 +02:00
|
|
|
if (url == null && includeOtherTypes == null) {
|
2018-01-10 05:01:16 +01:00
|
|
|
return Promise.resolve([]);
|
|
|
|
}
|
|
|
|
|
2018-10-14 04:21:54 +02:00
|
|
|
const domain = Utils.getDomain(url);
|
2018-01-10 05:01:16 +01:00
|
|
|
const eqDomainsPromise = domain == null ? Promise.resolve([]) :
|
|
|
|
this.settingsService.getEquivalentDomains().then((eqDomains: any[][]) => {
|
|
|
|
let matches: any[] = [];
|
2021-02-04 16:49:23 +01:00
|
|
|
eqDomains.forEach(eqDomain => {
|
2018-01-10 05:01:16 +01:00
|
|
|
if (eqDomain.length && eqDomain.indexOf(domain) >= 0) {
|
|
|
|
matches = matches.concat(eqDomain);
|
|
|
|
}
|
|
|
|
});
|
|
|
|
|
|
|
|
if (!matches.length) {
|
|
|
|
matches.push(domain);
|
|
|
|
}
|
|
|
|
|
|
|
|
return matches;
|
|
|
|
});
|
|
|
|
|
|
|
|
const result = await Promise.all([eqDomainsPromise, this.getAllDecrypted()]);
|
|
|
|
const matchingDomains = result[0];
|
|
|
|
const ciphers = result[1];
|
|
|
|
|
2019-01-09 17:59:11 +01:00
|
|
|
if (defaultMatch == null) {
|
2020-09-20 15:47:35 +02:00
|
|
|
defaultMatch = await this.storageService.get<UriMatchType>(ConstantsService.defaultUriMatch);
|
|
|
|
if (defaultMatch == null) {
|
|
|
|
defaultMatch = UriMatchType.Domain;
|
|
|
|
}
|
2019-01-09 17:59:11 +01:00
|
|
|
}
|
|
|
|
|
2021-02-04 16:49:23 +01:00
|
|
|
return ciphers.filter(cipher => {
|
2020-04-10 22:42:34 +02:00
|
|
|
if (cipher.deletedDate != null) {
|
|
|
|
return false;
|
|
|
|
}
|
2019-04-16 03:15:35 +02:00
|
|
|
if (includeOtherTypes != null && includeOtherTypes.indexOf(cipher.type) > -1) {
|
2018-03-02 18:03:03 +01:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (url != null && cipher.type === CipherType.Login && cipher.login.uris != null) {
|
|
|
|
for (let i = 0; i < cipher.login.uris.length; i++) {
|
|
|
|
const u = cipher.login.uris[i];
|
|
|
|
if (u.uri == null) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2019-01-09 17:59:11 +01:00
|
|
|
const match = u.match == null ? defaultMatch : u.match;
|
|
|
|
switch (match) {
|
2018-03-02 19:50:26 +01:00
|
|
|
case UriMatchType.Domain:
|
2018-03-02 18:03:03 +01:00
|
|
|
if (domain != null && u.domain != null && matchingDomains.indexOf(u.domain) > -1) {
|
2018-12-07 21:41:43 +01:00
|
|
|
if (DomainMatchBlacklist.has(u.domain)) {
|
|
|
|
const domainUrlHost = Utils.getHost(url);
|
|
|
|
if (!DomainMatchBlacklist.get(u.domain).has(domainUrlHost)) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
return true;
|
|
|
|
}
|
2018-03-02 18:03:03 +01:00
|
|
|
}
|
2018-03-02 18:36:53 +01:00
|
|
|
break;
|
2018-03-02 18:03:03 +01:00
|
|
|
case UriMatchType.Host:
|
2018-04-23 19:03:47 +02:00
|
|
|
const urlHost = Utils.getHost(url);
|
|
|
|
if (urlHost != null && urlHost === Utils.getHost(u.uri)) {
|
2018-03-02 18:03:03 +01:00
|
|
|
return true;
|
|
|
|
}
|
2018-03-02 18:36:53 +01:00
|
|
|
break;
|
2018-03-02 18:03:03 +01:00
|
|
|
case UriMatchType.Exact:
|
|
|
|
if (url === u.uri) {
|
|
|
|
return true;
|
|
|
|
}
|
2018-03-02 18:36:53 +01:00
|
|
|
break;
|
2018-03-02 18:03:03 +01:00
|
|
|
case UriMatchType.StartsWith:
|
|
|
|
if (url.startsWith(u.uri)) {
|
|
|
|
return true;
|
|
|
|
}
|
2018-03-02 18:36:53 +01:00
|
|
|
break;
|
2018-03-02 18:03:03 +01:00
|
|
|
case UriMatchType.RegularExpression:
|
2018-05-31 05:19:12 +02:00
|
|
|
try {
|
|
|
|
const regex = new RegExp(u.uri, 'i');
|
|
|
|
if (regex.test(url)) {
|
|
|
|
return true;
|
|
|
|
}
|
2021-10-19 10:32:14 +02:00
|
|
|
} catch (e) {
|
|
|
|
this.logService.error(e);
|
|
|
|
}
|
2018-03-02 18:36:53 +01:00
|
|
|
break;
|
2018-03-02 18:03:03 +01:00
|
|
|
case UriMatchType.Never:
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2018-01-10 05:01:16 +01:00
|
|
|
|
2018-01-24 17:33:15 +01:00
|
|
|
return false;
|
|
|
|
});
|
2018-12-14 19:55:44 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
async getAllFromApiForOrganization(organizationId: string): Promise<CipherView[]> {
|
|
|
|
const ciphers = await this.apiService.getCiphersOrganization(organizationId);
|
|
|
|
if (ciphers != null && ciphers.data != null && ciphers.data.length) {
|
|
|
|
const decCiphers: CipherView[] = [];
|
|
|
|
const promises: any[] = [];
|
2021-02-04 16:49:23 +01:00
|
|
|
ciphers.data.forEach(r => {
|
2018-12-14 19:55:44 +01:00
|
|
|
const data = new CipherData(r);
|
|
|
|
const cipher = new Cipher(data);
|
2021-02-04 16:49:23 +01:00
|
|
|
promises.push(cipher.decrypt().then(c => decCiphers.push(c)));
|
2018-12-14 19:55:44 +01:00
|
|
|
});
|
|
|
|
await Promise.all(promises);
|
|
|
|
decCiphers.sort(this.getLocaleSortingFunction());
|
|
|
|
return decCiphers;
|
|
|
|
} else {
|
|
|
|
return [];
|
|
|
|
}
|
2018-01-10 05:01:16 +01:00
|
|
|
}
|
|
|
|
|
2021-05-18 02:08:28 +02:00
|
|
|
async getLastUsedForUrl(url: string, autofillOnPageLoad: boolean = false): Promise<CipherView> {
|
|
|
|
return this.getCipherForUrl(url, true, false, autofillOnPageLoad);
|
2020-09-23 18:41:25 +02:00
|
|
|
}
|
|
|
|
|
2021-05-18 02:08:28 +02:00
|
|
|
async getLastLaunchedForUrl(url: string, autofillOnPageLoad: boolean = false): Promise<CipherView> {
|
|
|
|
return this.getCipherForUrl(url, false, true, autofillOnPageLoad);
|
2020-08-12 21:59:59 +02:00
|
|
|
}
|
2018-01-10 05:01:16 +01:00
|
|
|
|
2020-08-12 21:59:59 +02:00
|
|
|
async getNextCipherForUrl(url: string): Promise<CipherView> {
|
2021-05-18 02:08:28 +02:00
|
|
|
return this.getCipherForUrl(url, false, false, false);
|
2018-01-10 05:01:16 +01:00
|
|
|
}
|
|
|
|
|
2020-10-09 13:30:55 +02:00
|
|
|
updateLastUsedIndexForUrl(url: string) {
|
|
|
|
this.sortedCiphersCache.updateLastUsedIndex(url);
|
|
|
|
}
|
|
|
|
|
2018-01-10 05:01:16 +01:00
|
|
|
async updateLastUsedDate(id: string): Promise<void> {
|
|
|
|
let ciphersLocalData = await this.storageService.get<any>(Keys.localData);
|
|
|
|
if (!ciphersLocalData) {
|
|
|
|
ciphersLocalData = {};
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ciphersLocalData[id]) {
|
|
|
|
ciphersLocalData[id].lastUsedDate = new Date().getTime();
|
|
|
|
} else {
|
|
|
|
ciphersLocalData[id] = {
|
|
|
|
lastUsedDate: new Date().getTime(),
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
await this.storageService.save(Keys.localData, ciphersLocalData);
|
|
|
|
|
|
|
|
if (this.decryptedCipherCache == null) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
for (let i = 0; i < this.decryptedCipherCache.length; i++) {
|
|
|
|
const cached = this.decryptedCipherCache[i];
|
|
|
|
if (cached.id === id) {
|
|
|
|
cached.localData = ciphersLocalData[id];
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-09-23 18:41:25 +02:00
|
|
|
async updateLastLaunchedDate(id: string): Promise<void> {
|
|
|
|
let ciphersLocalData = await this.storageService.get<any>(Keys.localData);
|
|
|
|
if (!ciphersLocalData) {
|
|
|
|
ciphersLocalData = {};
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ciphersLocalData[id]) {
|
|
|
|
ciphersLocalData[id].lastLaunched = new Date().getTime();
|
|
|
|
} else {
|
|
|
|
ciphersLocalData[id] = {
|
|
|
|
lastUsedDate: new Date().getTime(),
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
await this.storageService.save(Keys.localData, ciphersLocalData);
|
|
|
|
|
|
|
|
if (this.decryptedCipherCache == null) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
for (let i = 0; i < this.decryptedCipherCache.length; i++) {
|
|
|
|
const cached = this.decryptedCipherCache[i];
|
|
|
|
if (cached.id === id) {
|
|
|
|
cached.localData = ciphersLocalData[id];
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-01-10 05:01:16 +01:00
|
|
|
async saveNeverDomain(domain: string): Promise<void> {
|
|
|
|
if (domain == null) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
let domains = await this.storageService.get<{ [id: string]: any; }>(Keys.neverDomains);
|
|
|
|
if (!domains) {
|
|
|
|
domains = {};
|
|
|
|
}
|
|
|
|
domains[domain] = null;
|
|
|
|
await this.storageService.save(Keys.neverDomains, domains);
|
|
|
|
}
|
|
|
|
|
2018-10-19 17:20:04 +02:00
|
|
|
async saveWithServer(cipher: Cipher): Promise<any> {
|
2018-01-10 05:01:16 +01:00
|
|
|
let response: CipherResponse;
|
|
|
|
if (cipher.id == null) {
|
2018-10-19 17:20:04 +02:00
|
|
|
if (cipher.collectionIds != null) {
|
|
|
|
const request = new CipherCreateRequest(cipher);
|
2018-10-19 15:14:11 +02:00
|
|
|
response = await this.apiService.postCipherCreate(request);
|
|
|
|
} else {
|
|
|
|
const request = new CipherRequest(cipher);
|
|
|
|
response = await this.apiService.postCipher(request);
|
|
|
|
}
|
2018-01-10 05:01:16 +01:00
|
|
|
cipher.id = response.id;
|
|
|
|
} else {
|
2018-10-19 15:14:11 +02:00
|
|
|
const request = new CipherRequest(cipher);
|
2018-01-10 05:01:16 +01:00
|
|
|
response = await this.apiService.putCipher(cipher.id, request);
|
|
|
|
}
|
|
|
|
|
|
|
|
const userId = await this.userService.getUserId();
|
|
|
|
const data = new CipherData(response, userId, cipher.collectionIds);
|
|
|
|
await this.upsert(data);
|
|
|
|
}
|
|
|
|
|
2018-06-13 06:02:15 +02:00
|
|
|
async shareWithServer(cipher: CipherView, organizationId: string, collectionIds: string[]): Promise<any> {
|
2020-08-12 21:42:42 +02:00
|
|
|
const attachmentPromises: Promise<any>[] = [];
|
2018-10-24 04:10:08 +02:00
|
|
|
if (cipher.attachments != null) {
|
2021-02-04 16:49:23 +01:00
|
|
|
cipher.attachments.forEach(attachment => {
|
2018-11-15 14:55:29 +01:00
|
|
|
if (attachment.key == null) {
|
|
|
|
attachmentPromises.push(this.shareAttachmentWithServer(attachment, cipher.id, organizationId));
|
|
|
|
}
|
2018-10-24 04:10:08 +02:00
|
|
|
});
|
|
|
|
}
|
|
|
|
await Promise.all(attachmentPromises);
|
|
|
|
|
2018-06-13 06:02:15 +02:00
|
|
|
cipher.organizationId = organizationId;
|
|
|
|
cipher.collectionIds = collectionIds;
|
|
|
|
const encCipher = await this.encrypt(cipher);
|
|
|
|
const request = new CipherShareRequest(encCipher);
|
2018-10-23 22:16:59 +02:00
|
|
|
const response = await this.apiService.putShareCipher(cipher.id, request);
|
2018-06-12 17:45:02 +02:00
|
|
|
const userId = await this.userService.getUserId();
|
2018-10-23 22:16:59 +02:00
|
|
|
const data = new CipherData(response, userId, collectionIds);
|
|
|
|
await this.upsert(data);
|
2018-06-13 06:02:15 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
async shareManyWithServer(ciphers: CipherView[], organizationId: string, collectionIds: string[]): Promise<any> {
|
2020-08-12 21:42:42 +02:00
|
|
|
const promises: Promise<any>[] = [];
|
2018-06-13 06:02:15 +02:00
|
|
|
const encCiphers: Cipher[] = [];
|
|
|
|
for (const cipher of ciphers) {
|
|
|
|
cipher.organizationId = organizationId;
|
|
|
|
cipher.collectionIds = collectionIds;
|
2021-02-04 16:49:23 +01:00
|
|
|
promises.push(this.encrypt(cipher).then(c => {
|
2018-06-13 06:02:15 +02:00
|
|
|
encCiphers.push(c);
|
|
|
|
}));
|
|
|
|
}
|
|
|
|
await Promise.all(promises);
|
|
|
|
const request = new CipherBulkShareRequest(encCiphers, collectionIds);
|
|
|
|
await this.apiService.putShareCiphers(request);
|
|
|
|
const userId = await this.userService.getUserId();
|
2021-02-04 16:49:23 +01:00
|
|
|
await this.upsert(encCiphers.map(c => c.toCipherData(userId)));
|
2018-06-12 17:45:02 +02:00
|
|
|
}
|
|
|
|
|
2018-07-05 16:48:19 +02:00
|
|
|
saveAttachmentWithServer(cipher: Cipher, unencryptedFile: any, admin = false): Promise<Cipher> {
|
2018-01-10 05:01:16 +01:00
|
|
|
return new Promise((resolve, reject) => {
|
|
|
|
const reader = new FileReader();
|
|
|
|
reader.readAsArrayBuffer(unencryptedFile);
|
|
|
|
reader.onload = async (evt: any) => {
|
|
|
|
try {
|
2018-05-17 21:35:02 +02:00
|
|
|
const cData = await this.saveAttachmentRawWithServer(cipher,
|
2018-07-05 16:48:19 +02:00
|
|
|
unencryptedFile.name, evt.target.result, admin);
|
2018-05-17 21:35:02 +02:00
|
|
|
resolve(cData);
|
2018-01-10 05:01:16 +01:00
|
|
|
} catch (e) {
|
2018-05-17 21:35:02 +02:00
|
|
|
reject(e);
|
2018-01-10 05:01:16 +01:00
|
|
|
}
|
|
|
|
};
|
2021-02-04 16:49:23 +01:00
|
|
|
reader.onerror = evt => {
|
2018-01-10 05:01:16 +01:00
|
|
|
reject('Error reading file.');
|
|
|
|
};
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
2018-07-05 16:48:19 +02:00
|
|
|
async saveAttachmentRawWithServer(cipher: Cipher, filename: string,
|
|
|
|
data: ArrayBuffer, admin = false): Promise<Cipher> {
|
2018-05-17 21:35:02 +02:00
|
|
|
const key = await this.cryptoService.getOrgKey(cipher.organizationId);
|
|
|
|
const encFileName = await this.cryptoService.encrypt(filename, key);
|
2018-11-14 02:43:45 +01:00
|
|
|
|
|
|
|
const dataEncKey = await this.cryptoService.makeEncKey(key);
|
|
|
|
const encData = await this.cryptoService.encryptToBytes(data, dataEncKey[0]);
|
2018-05-17 21:35:02 +02:00
|
|
|
|
2021-03-26 22:57:07 +01:00
|
|
|
const request: AttachmentRequest = {
|
|
|
|
key: dataEncKey[1].encryptedString,
|
|
|
|
fileName: encFileName.encryptedString,
|
2021-04-14 17:47:10 +02:00
|
|
|
fileSize: encData.buffer.byteLength,
|
2021-03-26 22:57:07 +01:00
|
|
|
adminRequest: admin,
|
|
|
|
};
|
|
|
|
|
|
|
|
let response: CipherResponse;
|
|
|
|
try {
|
|
|
|
const uploadDataResponse = await this.apiService.postCipherAttachment(cipher.id, request);
|
|
|
|
response = admin ? uploadDataResponse.cipherMiniResponse : uploadDataResponse.cipherResponse;
|
2021-06-08 21:02:08 +02:00
|
|
|
await this.fileUploadService.uploadCipherAttachment(admin, uploadDataResponse, encFileName, encData);
|
2021-03-26 22:57:07 +01:00
|
|
|
} catch (e) {
|
|
|
|
if (e instanceof ErrorResponse && (e as ErrorResponse).statusCode === 404 || (e as ErrorResponse).statusCode === 405) {
|
|
|
|
response = await this.legacyServerAttachmentFileUpload(admin, cipher.id, encFileName, encData, dataEncKey[1]);
|
|
|
|
} else if (e instanceof ErrorResponse) {
|
|
|
|
throw new Error((e as ErrorResponse).getSingleMessage());
|
|
|
|
} else {
|
|
|
|
throw e;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
const userId = await this.userService.getUserId();
|
|
|
|
const cData = new CipherData(response, userId, cipher.collectionIds);
|
|
|
|
if (!admin) {
|
|
|
|
await this.upsert(cData);
|
|
|
|
}
|
|
|
|
return new Cipher(cData);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @deprecated Mar 25 2021: This method has been deprecated in favor of direct uploads.
|
|
|
|
* This method still exists for backward compatibility with old server versions.
|
|
|
|
*/
|
2021-04-21 02:16:19 +02:00
|
|
|
async legacyServerAttachmentFileUpload(admin: boolean, cipherId: string, encFileName: EncString,
|
|
|
|
encData: EncArrayBuffer, key: EncString) {
|
2018-05-17 21:35:02 +02:00
|
|
|
const fd = new FormData();
|
|
|
|
try {
|
2021-04-14 17:47:10 +02:00
|
|
|
const blob = new Blob([encData.buffer], { type: 'application/octet-stream' });
|
2021-03-26 22:57:07 +01:00
|
|
|
fd.append('key', key.encryptedString);
|
2018-05-17 21:35:02 +02:00
|
|
|
fd.append('data', blob, encFileName.encryptedString);
|
|
|
|
} catch (e) {
|
2018-05-31 15:07:56 +02:00
|
|
|
if (Utils.isNode && !Utils.isBrowser) {
|
2021-03-26 22:57:07 +01:00
|
|
|
fd.append('key', key.encryptedString);
|
2021-04-14 17:47:10 +02:00
|
|
|
fd.append('data', Buffer.from(encData.buffer) as any, {
|
2018-05-25 14:39:48 +02:00
|
|
|
filepath: encFileName.encryptedString,
|
2018-05-17 21:35:02 +02:00
|
|
|
contentType: 'application/octet-stream',
|
|
|
|
} as any);
|
|
|
|
} else {
|
|
|
|
throw e;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
let response: CipherResponse;
|
|
|
|
try {
|
2018-07-05 16:48:19 +02:00
|
|
|
if (admin) {
|
2021-03-26 22:57:07 +01:00
|
|
|
response = await this.apiService.postCipherAttachmentAdminLegacy(cipherId, fd);
|
2018-07-05 16:48:19 +02:00
|
|
|
} else {
|
2021-03-26 22:57:07 +01:00
|
|
|
response = await this.apiService.postCipherAttachmentLegacy(cipherId, fd);
|
2018-07-05 16:48:19 +02:00
|
|
|
}
|
2018-05-17 21:35:02 +02:00
|
|
|
} catch (e) {
|
|
|
|
throw new Error((e as ErrorResponse).getSingleMessage());
|
|
|
|
}
|
|
|
|
|
2021-03-26 22:57:07 +01:00
|
|
|
return response;
|
2018-05-17 21:35:02 +02:00
|
|
|
}
|
|
|
|
|
2018-06-12 19:07:06 +02:00
|
|
|
async saveCollectionsWithServer(cipher: Cipher): Promise<any> {
|
|
|
|
const request = new CipherCollectionsRequest(cipher.collectionIds);
|
2018-07-05 16:48:19 +02:00
|
|
|
await this.apiService.putCipherCollections(cipher.id, request);
|
2018-06-12 19:07:06 +02:00
|
|
|
const userId = await this.userService.getUserId();
|
|
|
|
const data = cipher.toCipherData(userId);
|
|
|
|
await this.upsert(data);
|
|
|
|
}
|
|
|
|
|
2018-01-10 05:01:16 +01:00
|
|
|
async upsert(cipher: CipherData | CipherData[]): Promise<any> {
|
|
|
|
const userId = await this.userService.getUserId();
|
|
|
|
let ciphers = await this.storageService.get<{ [id: string]: CipherData; }>(
|
|
|
|
Keys.ciphersPrefix + userId);
|
|
|
|
if (ciphers == null) {
|
|
|
|
ciphers = {};
|
|
|
|
}
|
|
|
|
|
|
|
|
if (cipher instanceof CipherData) {
|
|
|
|
const c = cipher as CipherData;
|
|
|
|
ciphers[c.id] = c;
|
|
|
|
} else {
|
2021-02-04 16:49:23 +01:00
|
|
|
(cipher as CipherData[]).forEach(c => {
|
2018-01-10 05:01:16 +01:00
|
|
|
ciphers[c.id] = c;
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
|
|
|
await this.storageService.save(Keys.ciphersPrefix + userId, ciphers);
|
|
|
|
this.decryptedCipherCache = null;
|
|
|
|
}
|
|
|
|
|
|
|
|
async replace(ciphers: { [id: string]: CipherData; }): Promise<any> {
|
|
|
|
const userId = await this.userService.getUserId();
|
|
|
|
await this.storageService.save(Keys.ciphersPrefix + userId, ciphers);
|
|
|
|
this.decryptedCipherCache = null;
|
|
|
|
}
|
|
|
|
|
|
|
|
async clear(userId: string): Promise<any> {
|
|
|
|
await this.storageService.remove(Keys.ciphersPrefix + userId);
|
2018-08-13 15:42:52 +02:00
|
|
|
this.clearCache();
|
2018-01-10 05:01:16 +01:00
|
|
|
}
|
|
|
|
|
2018-06-12 23:12:27 +02:00
|
|
|
async moveManyWithServer(ids: string[], folderId: string): Promise<any> {
|
|
|
|
await this.apiService.putMoveCiphers(new CipherBulkMoveRequest(ids, folderId));
|
|
|
|
|
|
|
|
const userId = await this.userService.getUserId();
|
|
|
|
let ciphers = await this.storageService.get<{ [id: string]: CipherData; }>(
|
|
|
|
Keys.ciphersPrefix + userId);
|
|
|
|
if (ciphers == null) {
|
|
|
|
ciphers = {};
|
|
|
|
}
|
|
|
|
|
2021-02-04 16:49:23 +01:00
|
|
|
ids.forEach(id => {
|
2018-06-12 23:12:27 +02:00
|
|
|
if (ciphers.hasOwnProperty(id)) {
|
|
|
|
ciphers[id].folderId = folderId;
|
|
|
|
}
|
|
|
|
});
|
|
|
|
|
|
|
|
await this.storageService.save(Keys.ciphersPrefix + userId, ciphers);
|
|
|
|
this.decryptedCipherCache = null;
|
|
|
|
}
|
|
|
|
|
2018-01-10 05:01:16 +01:00
|
|
|
async delete(id: string | string[]): Promise<any> {
|
|
|
|
const userId = await this.userService.getUserId();
|
|
|
|
const ciphers = await this.storageService.get<{ [id: string]: CipherData; }>(
|
|
|
|
Keys.ciphersPrefix + userId);
|
|
|
|
if (ciphers == null) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (typeof id === 'string') {
|
2018-08-20 22:01:26 +02:00
|
|
|
if (ciphers[id] == null) {
|
|
|
|
return;
|
|
|
|
}
|
2018-01-10 05:01:16 +01:00
|
|
|
delete ciphers[id];
|
|
|
|
} else {
|
2021-02-04 16:49:23 +01:00
|
|
|
(id as string[]).forEach(i => {
|
2018-01-10 05:01:16 +01:00
|
|
|
delete ciphers[i];
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
|
|
|
await this.storageService.save(Keys.ciphersPrefix + userId, ciphers);
|
|
|
|
this.decryptedCipherCache = null;
|
|
|
|
}
|
|
|
|
|
|
|
|
async deleteWithServer(id: string): Promise<any> {
|
|
|
|
await this.apiService.deleteCipher(id);
|
|
|
|
await this.delete(id);
|
|
|
|
}
|
|
|
|
|
2018-06-12 23:12:27 +02:00
|
|
|
async deleteManyWithServer(ids: string[]): Promise<any> {
|
|
|
|
await this.apiService.deleteManyCiphers(new CipherBulkDeleteRequest(ids));
|
|
|
|
await this.delete(ids);
|
|
|
|
}
|
|
|
|
|
2018-01-10 05:01:16 +01:00
|
|
|
async deleteAttachment(id: string, attachmentId: string): Promise<void> {
|
|
|
|
const userId = await this.userService.getUserId();
|
|
|
|
const ciphers = await this.storageService.get<{ [id: string]: CipherData; }>(
|
|
|
|
Keys.ciphersPrefix + userId);
|
|
|
|
|
|
|
|
if (ciphers == null || !ciphers.hasOwnProperty(id) || ciphers[id].attachments == null) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
for (let i = 0; i < ciphers[id].attachments.length; i++) {
|
|
|
|
if (ciphers[id].attachments[i].id === attachmentId) {
|
|
|
|
ciphers[id].attachments.splice(i, 1);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
await this.storageService.save(Keys.ciphersPrefix + userId, ciphers);
|
|
|
|
this.decryptedCipherCache = null;
|
|
|
|
}
|
|
|
|
|
|
|
|
async deleteAttachmentWithServer(id: string, attachmentId: string): Promise<void> {
|
|
|
|
try {
|
|
|
|
await this.apiService.deleteCipherAttachment(id, attachmentId);
|
|
|
|
} catch (e) {
|
|
|
|
return Promise.reject((e as ErrorResponse).getSingleMessage());
|
|
|
|
}
|
|
|
|
await this.deleteAttachment(id, attachmentId);
|
|
|
|
}
|
|
|
|
|
2018-01-27 04:54:02 +01:00
|
|
|
sortCiphersByLastUsed(a: CipherView, b: CipherView): number {
|
|
|
|
const aLastUsed = a.localData && a.localData.lastUsedDate ? a.localData.lastUsedDate as number : null;
|
|
|
|
const bLastUsed = b.localData && b.localData.lastUsedDate ? b.localData.lastUsedDate as number : null;
|
|
|
|
|
2019-04-17 05:32:02 +02:00
|
|
|
const bothNotNull = aLastUsed != null && bLastUsed != null;
|
|
|
|
if (bothNotNull && aLastUsed < bLastUsed) {
|
2018-01-27 04:54:02 +01:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
if (aLastUsed != null && bLastUsed == null) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2019-04-17 05:32:02 +02:00
|
|
|
if (bothNotNull && aLastUsed > bLastUsed) {
|
2018-01-27 04:54:02 +01:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
if (bLastUsed != null && aLastUsed == null) {
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
2018-01-10 05:01:16 +01:00
|
|
|
}
|
|
|
|
|
2018-01-27 04:54:02 +01:00
|
|
|
sortCiphersByLastUsedThenName(a: CipherView, b: CipherView): number {
|
|
|
|
const result = this.sortCiphersByLastUsed(a, b);
|
|
|
|
if (result !== 0) {
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
|
|
|
return this.getLocaleSortingFunction()(a, b);
|
2018-01-10 05:01:16 +01:00
|
|
|
}
|
|
|
|
|
2018-07-04 05:33:15 +02:00
|
|
|
getLocaleSortingFunction(): (a: CipherView, b: CipherView) => number {
|
2018-01-27 04:16:35 +01:00
|
|
|
return (a, b) => {
|
2018-01-27 04:54:02 +01:00
|
|
|
let aName = a.name;
|
|
|
|
let bName = b.name;
|
|
|
|
|
2018-03-20 00:42:38 +01:00
|
|
|
if (aName == null && bName != null) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
if (aName != null && bName == null) {
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
if (aName == null && bName == null) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2018-02-02 04:55:49 +01:00
|
|
|
const result = this.i18nService.collator ? this.i18nService.collator.compare(aName, bName) :
|
2018-01-27 04:54:02 +01:00
|
|
|
aName.localeCompare(bName);
|
|
|
|
|
|
|
|
if (result !== 0 || a.type !== CipherType.Login || b.type !== CipherType.Login) {
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (a.login.username != null) {
|
|
|
|
aName += a.login.username;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (b.login.username != null) {
|
|
|
|
bName += b.login.username;
|
|
|
|
}
|
|
|
|
|
|
|
|
return this.i18nService.collator ? this.i18nService.collator.compare(aName, bName) :
|
|
|
|
aName.localeCompare(bName);
|
2018-01-27 04:16:35 +01:00
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2020-04-03 22:32:15 +02:00
|
|
|
async softDelete(id: string | string[]): Promise<any> {
|
|
|
|
const userId = await this.userService.getUserId();
|
|
|
|
const ciphers = await this.storageService.get<{ [id: string]: CipherData; }>(
|
|
|
|
Keys.ciphersPrefix + userId);
|
|
|
|
if (ciphers == null) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
const setDeletedDate = (cipherId: string) => {
|
|
|
|
if (ciphers[cipherId] == null) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
ciphers[cipherId].deletedDate = new Date().toISOString();
|
|
|
|
};
|
|
|
|
|
|
|
|
if (typeof id === 'string') {
|
|
|
|
setDeletedDate(id);
|
|
|
|
} else {
|
|
|
|
(id as string[]).forEach(setDeletedDate);
|
|
|
|
}
|
|
|
|
|
|
|
|
await this.storageService.save(Keys.ciphersPrefix + userId, ciphers);
|
|
|
|
this.decryptedCipherCache = null;
|
|
|
|
}
|
|
|
|
|
|
|
|
async softDeleteWithServer(id: string): Promise<any> {
|
|
|
|
await this.apiService.putDeleteCipher(id);
|
|
|
|
await this.softDelete(id);
|
|
|
|
}
|
|
|
|
|
|
|
|
async softDeleteManyWithServer(ids: string[]): Promise<any> {
|
|
|
|
await this.apiService.putDeleteManyCiphers(new CipherBulkDeleteRequest(ids));
|
|
|
|
await this.softDelete(ids);
|
|
|
|
}
|
|
|
|
|
2021-01-08 15:53:41 +01:00
|
|
|
async restore(cipher: { id: string, revisionDate: string; } | { id: string, revisionDate: string; }[]) {
|
2020-04-03 22:32:15 +02:00
|
|
|
const userId = await this.userService.getUserId();
|
|
|
|
const ciphers = await this.storageService.get<{ [id: string]: CipherData; }>(
|
|
|
|
Keys.ciphersPrefix + userId);
|
|
|
|
if (ciphers == null) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2021-01-08 15:53:41 +01:00
|
|
|
const clearDeletedDate = (c: { id: string, revisionDate: string; }) => {
|
|
|
|
if (ciphers[c.id] == null) {
|
2020-04-03 22:32:15 +02:00
|
|
|
return;
|
|
|
|
}
|
2021-01-08 15:53:41 +01:00
|
|
|
ciphers[c.id].deletedDate = null;
|
|
|
|
ciphers[c.id].revisionDate = c.revisionDate;
|
2020-04-03 22:32:15 +02:00
|
|
|
};
|
|
|
|
|
2021-01-08 15:53:41 +01:00
|
|
|
|
|
|
|
if (cipher.constructor.name === 'Array') {
|
|
|
|
(cipher as { id: string, revisionDate: string; }[]).forEach(clearDeletedDate);
|
2020-04-03 22:32:15 +02:00
|
|
|
} else {
|
2021-01-08 15:53:41 +01:00
|
|
|
clearDeletedDate(cipher as { id: string, revisionDate: string; });
|
2020-04-03 22:32:15 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
await this.storageService.save(Keys.ciphersPrefix + userId, ciphers);
|
|
|
|
this.decryptedCipherCache = null;
|
|
|
|
}
|
|
|
|
|
|
|
|
async restoreWithServer(id: string): Promise<any> {
|
2021-01-08 15:53:41 +01:00
|
|
|
const response = await this.apiService.putRestoreCipher(id);
|
|
|
|
await this.restore({ id: id, revisionDate: response.revisionDate });
|
2020-04-03 22:32:15 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
async restoreManyWithServer(ids: string[]): Promise<any> {
|
2021-01-08 15:53:41 +01:00
|
|
|
const response = await this.apiService.putRestoreManyCiphers(new CipherBulkRestoreRequest(ids));
|
|
|
|
const restores: { id: string, revisionDate: string; }[] = [];
|
|
|
|
for (const cipher of response.data) {
|
|
|
|
restores.push({ id: cipher.id, revisionDate: cipher.revisionDate });
|
|
|
|
}
|
|
|
|
await this.restore(restores);
|
2020-04-03 22:32:15 +02:00
|
|
|
}
|
|
|
|
|
2018-07-04 05:33:15 +02:00
|
|
|
// Helpers
|
|
|
|
|
2018-10-24 04:10:08 +02:00
|
|
|
private async shareAttachmentWithServer(attachmentView: AttachmentView, cipherId: string,
|
|
|
|
organizationId: string): Promise<any> {
|
2019-06-24 17:07:26 +02:00
|
|
|
const attachmentResponse = await this.apiService.nativeFetch(
|
2020-01-13 13:49:05 +01:00
|
|
|
new Request(attachmentView.url, { cache: 'no-store' }));
|
2018-10-24 04:10:08 +02:00
|
|
|
if (attachmentResponse.status !== 200) {
|
|
|
|
throw Error('Failed to download attachment: ' + attachmentResponse.status.toString());
|
|
|
|
}
|
|
|
|
|
|
|
|
const buf = await attachmentResponse.arrayBuffer();
|
|
|
|
const decBuf = await this.cryptoService.decryptFromBytes(buf, null);
|
|
|
|
const key = await this.cryptoService.getOrgKey(organizationId);
|
|
|
|
const encFileName = await this.cryptoService.encrypt(attachmentView.fileName, key);
|
|
|
|
|
2018-11-14 02:43:45 +01:00
|
|
|
const dataEncKey = await this.cryptoService.makeEncKey(key);
|
|
|
|
const encData = await this.cryptoService.encryptToBytes(decBuf, dataEncKey[0]);
|
|
|
|
|
2018-10-24 04:10:08 +02:00
|
|
|
const fd = new FormData();
|
|
|
|
try {
|
2021-04-14 17:47:10 +02:00
|
|
|
const blob = new Blob([encData.buffer], { type: 'application/octet-stream' });
|
2019-04-01 20:31:42 +02:00
|
|
|
fd.append('key', dataEncKey[1].encryptedString);
|
2018-10-24 04:10:08 +02:00
|
|
|
fd.append('data', blob, encFileName.encryptedString);
|
|
|
|
} catch (e) {
|
|
|
|
if (Utils.isNode && !Utils.isBrowser) {
|
2018-11-14 02:43:45 +01:00
|
|
|
fd.append('key', dataEncKey[1].encryptedString);
|
2021-04-14 17:47:10 +02:00
|
|
|
fd.append('data', Buffer.from(encData.buffer) as any, {
|
2018-10-24 04:10:08 +02:00
|
|
|
filepath: encFileName.encryptedString,
|
|
|
|
contentType: 'application/octet-stream',
|
|
|
|
} as any);
|
|
|
|
} else {
|
|
|
|
throw e;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
try {
|
|
|
|
await this.apiService.postShareCipherAttachment(cipherId, attachmentView.id, fd, organizationId);
|
|
|
|
} catch (e) {
|
|
|
|
throw new Error((e as ErrorResponse).getSingleMessage());
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-01-24 17:33:15 +01:00
|
|
|
private async encryptObjProperty<V extends View, D extends Domain>(model: V, obj: D,
|
|
|
|
map: any, key: SymmetricCryptoKey): Promise<void> {
|
2018-01-10 05:01:16 +01:00
|
|
|
const promises = [];
|
|
|
|
const self = this;
|
|
|
|
|
|
|
|
for (const prop in map) {
|
|
|
|
if (!map.hasOwnProperty(prop)) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
// tslint:disable-next-line
|
|
|
|
(function (theProp, theObj) {
|
|
|
|
const p = Promise.resolve().then(() => {
|
2018-01-24 17:33:15 +01:00
|
|
|
const modelProp = (model as any)[(map[theProp] || theProp)];
|
2018-01-10 05:01:16 +01:00
|
|
|
if (modelProp && modelProp !== '') {
|
|
|
|
return self.cryptoService.encrypt(modelProp, key);
|
|
|
|
}
|
|
|
|
return null;
|
2021-04-21 02:16:19 +02:00
|
|
|
}).then((val: EncString) => {
|
2018-01-24 17:33:15 +01:00
|
|
|
(theObj as any)[theProp] = val;
|
2018-01-10 05:01:16 +01:00
|
|
|
});
|
|
|
|
promises.push(p);
|
|
|
|
})(prop, obj);
|
|
|
|
}
|
|
|
|
|
2018-01-24 17:33:15 +01:00
|
|
|
await Promise.all(promises);
|
2018-01-10 05:01:16 +01:00
|
|
|
}
|
|
|
|
|
2018-01-24 17:33:15 +01:00
|
|
|
private async encryptCipherData(cipher: Cipher, model: CipherView, key: SymmetricCryptoKey) {
|
2018-01-10 05:01:16 +01:00
|
|
|
switch (cipher.type) {
|
|
|
|
case CipherType.Login:
|
2018-01-24 19:27:32 +01:00
|
|
|
cipher.login = new Login();
|
2018-07-27 23:48:18 +02:00
|
|
|
cipher.login.passwordRevisionDate = model.login.passwordRevisionDate;
|
2021-05-18 02:08:28 +02:00
|
|
|
cipher.login.autofillOnPageLoad = model.login.autofillOnPageLoad;
|
2018-01-24 17:33:15 +01:00
|
|
|
await this.encryptObjProperty(model.login, cipher.login, {
|
2018-01-10 05:01:16 +01:00
|
|
|
username: null,
|
|
|
|
password: null,
|
|
|
|
totp: null,
|
|
|
|
}, key);
|
2018-03-02 05:44:29 +01:00
|
|
|
|
|
|
|
if (model.login.uris != null) {
|
|
|
|
cipher.login.uris = [];
|
|
|
|
for (let i = 0; i < model.login.uris.length; i++) {
|
|
|
|
const loginUri = new LoginUri();
|
|
|
|
loginUri.match = model.login.uris[i].match;
|
|
|
|
await this.encryptObjProperty(model.login.uris[i], loginUri, {
|
|
|
|
uri: null,
|
|
|
|
}, key);
|
|
|
|
cipher.login.uris.push(loginUri);
|
|
|
|
}
|
|
|
|
}
|
2018-01-24 17:33:15 +01:00
|
|
|
return;
|
2018-01-10 05:01:16 +01:00
|
|
|
case CipherType.SecureNote:
|
2018-01-24 19:27:32 +01:00
|
|
|
cipher.secureNote = new SecureNote();
|
|
|
|
cipher.secureNote.type = model.secureNote.type;
|
2018-01-24 17:33:15 +01:00
|
|
|
return;
|
2018-01-10 05:01:16 +01:00
|
|
|
case CipherType.Card:
|
2018-01-24 19:27:32 +01:00
|
|
|
cipher.card = new Card();
|
2018-01-24 17:33:15 +01:00
|
|
|
await this.encryptObjProperty(model.card, cipher.card, {
|
2018-01-10 05:01:16 +01:00
|
|
|
cardholderName: null,
|
|
|
|
brand: null,
|
|
|
|
number: null,
|
|
|
|
expMonth: null,
|
|
|
|
expYear: null,
|
|
|
|
code: null,
|
|
|
|
}, key);
|
2018-01-24 17:33:15 +01:00
|
|
|
return;
|
2018-01-10 05:01:16 +01:00
|
|
|
case CipherType.Identity:
|
2018-01-24 19:27:32 +01:00
|
|
|
cipher.identity = new Identity();
|
2018-01-24 17:33:15 +01:00
|
|
|
await this.encryptObjProperty(model.identity, cipher.identity, {
|
2018-01-10 05:01:16 +01:00
|
|
|
title: null,
|
|
|
|
firstName: null,
|
|
|
|
middleName: null,
|
|
|
|
lastName: null,
|
|
|
|
address1: null,
|
|
|
|
address2: null,
|
|
|
|
address3: null,
|
|
|
|
city: null,
|
|
|
|
state: null,
|
|
|
|
postalCode: null,
|
|
|
|
country: null,
|
|
|
|
company: null,
|
|
|
|
email: null,
|
|
|
|
phone: null,
|
|
|
|
ssn: null,
|
|
|
|
username: null,
|
|
|
|
passportNumber: null,
|
|
|
|
licenseNumber: null,
|
|
|
|
}, key);
|
2018-01-24 17:33:15 +01:00
|
|
|
return;
|
2018-01-10 05:01:16 +01:00
|
|
|
default:
|
|
|
|
throw new Error('Unknown cipher type.');
|
|
|
|
}
|
|
|
|
}
|
2020-08-12 21:59:59 +02:00
|
|
|
|
2021-05-18 02:08:28 +02:00
|
|
|
private async getCipherForUrl(url: string, lastUsed: boolean, lastLaunched: boolean, autofillOnPageLoad: boolean): Promise<CipherView> {
|
|
|
|
const cacheKey = autofillOnPageLoad ? 'autofillOnPageLoad-' + url : url;
|
|
|
|
|
|
|
|
if (!this.sortedCiphersCache.isCached(cacheKey)) {
|
|
|
|
let ciphers = await this.getAllDecryptedForUrl(url);
|
2020-08-12 21:59:59 +02:00
|
|
|
if (!ciphers) {
|
|
|
|
return null;
|
|
|
|
}
|
2021-05-18 02:08:28 +02:00
|
|
|
|
|
|
|
if (autofillOnPageLoad) {
|
|
|
|
const autofillOnPageLoadDefault = await this.storageService.get(ConstantsService.autoFillOnPageLoadDefaultKey);
|
|
|
|
ciphers = ciphers.filter(cipher => cipher.login.autofillOnPageLoad ||
|
2021-05-26 23:02:12 +02:00
|
|
|
(cipher.login.autofillOnPageLoad == null && autofillOnPageLoadDefault !== false));
|
2021-05-18 02:08:28 +02:00
|
|
|
if (ciphers.length === 0) {
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
this.sortedCiphersCache.addCiphers(cacheKey, ciphers);
|
2020-08-12 21:59:59 +02:00
|
|
|
}
|
|
|
|
|
2020-09-23 18:41:25 +02:00
|
|
|
if (lastLaunched) {
|
2021-05-18 02:08:28 +02:00
|
|
|
return this.sortedCiphersCache.getLastLaunched(cacheKey);
|
2020-09-23 18:41:25 +02:00
|
|
|
} else if (lastUsed) {
|
2021-05-18 02:08:28 +02:00
|
|
|
return this.sortedCiphersCache.getLastUsed(cacheKey);
|
2020-10-09 13:30:55 +02:00
|
|
|
} else {
|
2021-05-18 02:08:28 +02:00
|
|
|
return this.sortedCiphersCache.getNext(cacheKey);
|
2020-09-23 18:41:25 +02:00
|
|
|
}
|
2020-08-12 21:59:59 +02:00
|
|
|
}
|
2018-01-10 05:01:16 +01:00
|
|
|
}
|