mirror of
https://github.com/bitwarden/browser.git
synced 2024-11-13 10:24:20 +01:00
4852992662
* [AC-779] fix: policy link * [AC-779] fix: search string set by url not showing in input field * [AC-779] fix: navigation to cipher events * [AC-779] fix: collection link * [AC-779] chore: clean up old components * [AC-779] chore: remove some copy pasta
943 lines
31 KiB
TypeScript
943 lines
31 KiB
TypeScript
import {
|
|
ChangeDetectorRef,
|
|
Component,
|
|
NgZone,
|
|
OnDestroy,
|
|
OnInit,
|
|
ViewChild,
|
|
ViewContainerRef,
|
|
} from "@angular/core";
|
|
import { ActivatedRoute, Params, Router } from "@angular/router";
|
|
import {
|
|
BehaviorSubject,
|
|
combineLatest,
|
|
firstValueFrom,
|
|
lastValueFrom,
|
|
Observable,
|
|
Subject,
|
|
} from "rxjs";
|
|
import {
|
|
concatMap,
|
|
debounceTime,
|
|
distinctUntilChanged,
|
|
filter,
|
|
first,
|
|
map,
|
|
shareReplay,
|
|
switchMap,
|
|
takeUntil,
|
|
tap,
|
|
} from "rxjs/operators";
|
|
|
|
import { SearchPipe } from "@bitwarden/angular/pipes/search.pipe";
|
|
import { ModalService } from "@bitwarden/angular/services/modal.service";
|
|
import { ApiService } from "@bitwarden/common/abstractions/api.service";
|
|
import { BroadcasterService } from "@bitwarden/common/abstractions/broadcaster.service";
|
|
import { EventCollectionService } from "@bitwarden/common/abstractions/event/event-collection.service";
|
|
import { I18nService } from "@bitwarden/common/abstractions/i18n.service";
|
|
import { LogService } from "@bitwarden/common/abstractions/log.service";
|
|
import { MessagingService } from "@bitwarden/common/abstractions/messaging.service";
|
|
import { PlatformUtilsService } from "@bitwarden/common/abstractions/platformUtils.service";
|
|
import { SearchService } from "@bitwarden/common/abstractions/search.service";
|
|
import { TotpService } from "@bitwarden/common/abstractions/totp.service";
|
|
import { OrganizationService } from "@bitwarden/common/admin-console/abstractions/organization/organization.service.abstraction";
|
|
import { Organization } from "@bitwarden/common/admin-console/models/domain/organization";
|
|
import { CollectionView } from "@bitwarden/common/admin-console/models/view/collection.view";
|
|
import { EventType } from "@bitwarden/common/enums";
|
|
import { ServiceUtils } from "@bitwarden/common/misc/serviceUtils";
|
|
import { Utils } from "@bitwarden/common/misc/utils";
|
|
import { TreeNode } from "@bitwarden/common/models/domain/tree-node";
|
|
import { CipherService } from "@bitwarden/common/vault/abstractions/cipher.service";
|
|
import { PasswordRepromptService } from "@bitwarden/common/vault/abstractions/password-reprompt.service";
|
|
import { SyncService } from "@bitwarden/common/vault/abstractions/sync/sync.service.abstraction";
|
|
import { CipherRepromptType } from "@bitwarden/common/vault/enums/cipher-reprompt-type";
|
|
import { CipherView } from "@bitwarden/common/vault/models/view/cipher.view";
|
|
import { DialogService, Icons } from "@bitwarden/components";
|
|
|
|
import {
|
|
CollectionAdminService,
|
|
CollectionAdminView,
|
|
GroupService,
|
|
GroupView,
|
|
} from "../../admin-console/organizations/core";
|
|
import { EntityEventsComponent } from "../../admin-console/organizations/manage/entity-events.component";
|
|
import {
|
|
CollectionDialogResult,
|
|
CollectionDialogTabType,
|
|
openCollectionDialog,
|
|
} from "../../admin-console/organizations/shared";
|
|
import { VaultFilterService } from "../../vault/individual-vault/vault-filter/services/abstractions/vault-filter.service";
|
|
import { VaultFilter } from "../../vault/individual-vault/vault-filter/shared/models/vault-filter.model";
|
|
import { VaultItemEvent } from "../components/vault-items/vault-item-event";
|
|
import {
|
|
BulkDeleteDialogResult,
|
|
openBulkDeleteDialog,
|
|
} from "../individual-vault/bulk-action-dialogs/bulk-delete-dialog/bulk-delete-dialog.component";
|
|
import {
|
|
BulkRestoreDialogResult,
|
|
openBulkRestoreDialog,
|
|
} from "../individual-vault/bulk-action-dialogs/bulk-restore-dialog/bulk-restore-dialog.component";
|
|
import { RoutedVaultFilterBridgeService } from "../individual-vault/vault-filter/services/routed-vault-filter-bridge.service";
|
|
import { RoutedVaultFilterService } from "../individual-vault/vault-filter/services/routed-vault-filter.service";
|
|
import { createFilterFunction } from "../individual-vault/vault-filter/shared/models/filter-function";
|
|
import {
|
|
All,
|
|
RoutedVaultFilterModel,
|
|
Unassigned,
|
|
} from "../individual-vault/vault-filter/shared/models/routed-vault-filter.model";
|
|
import { getNestedCollectionTree } from "../utils/collection-utils";
|
|
|
|
import { AddEditComponent } from "./add-edit.component";
|
|
import { AttachmentsComponent } from "./attachments.component";
|
|
import { CollectionsComponent } from "./collections.component";
|
|
import { VaultFilterComponent } from "./vault-filter/vault-filter.component";
|
|
|
|
const BroadcasterSubscriptionId = "OrgVaultComponent";
|
|
const SearchTextDebounceInterval = 200;
|
|
|
|
@Component({
|
|
selector: "app-org-vault",
|
|
templateUrl: "vault.component.html",
|
|
providers: [RoutedVaultFilterService, RoutedVaultFilterBridgeService],
|
|
})
|
|
export class VaultComponent implements OnInit, OnDestroy {
|
|
protected Unassigned = Unassigned;
|
|
|
|
@ViewChild("vaultFilter", { static: true })
|
|
vaultFilterComponent: VaultFilterComponent;
|
|
@ViewChild("attachments", { read: ViewContainerRef, static: true })
|
|
attachmentsModalRef: ViewContainerRef;
|
|
@ViewChild("cipherAddEdit", { read: ViewContainerRef, static: true })
|
|
cipherAddEditModalRef: ViewContainerRef;
|
|
@ViewChild("collectionsModal", { read: ViewContainerRef, static: true })
|
|
collectionsModalRef: ViewContainerRef;
|
|
@ViewChild("eventsTemplate", { read: ViewContainerRef, static: true })
|
|
eventsModalRef: ViewContainerRef;
|
|
|
|
trashCleanupWarning: string = null;
|
|
activeFilter: VaultFilter = new VaultFilter();
|
|
|
|
protected noItemIcon = Icons.Search;
|
|
protected performingInitialLoad = true;
|
|
protected refreshing = false;
|
|
protected processingEvent = false;
|
|
protected filter: RoutedVaultFilterModel = {};
|
|
protected organization: Organization;
|
|
protected allCollections: CollectionAdminView[];
|
|
protected allGroups: GroupView[];
|
|
protected ciphers: CipherView[];
|
|
protected collections: CollectionAdminView[];
|
|
protected selectedCollection: TreeNode<CollectionAdminView> | undefined;
|
|
protected isEmpty: boolean;
|
|
protected showMissingCollectionPermissionMessage: boolean;
|
|
protected currentSearchText$: Observable<string>;
|
|
|
|
private searchText$ = new Subject<string>();
|
|
private refresh$ = new BehaviorSubject<void>(null);
|
|
private destroy$ = new Subject<void>();
|
|
|
|
constructor(
|
|
private route: ActivatedRoute,
|
|
private organizationService: OrganizationService,
|
|
protected vaultFilterService: VaultFilterService,
|
|
private routedVaultFilterBridgeService: RoutedVaultFilterBridgeService,
|
|
private routedVaultFilterService: RoutedVaultFilterService,
|
|
private router: Router,
|
|
private changeDetectorRef: ChangeDetectorRef,
|
|
private syncService: SyncService,
|
|
private i18nService: I18nService,
|
|
private modalService: ModalService,
|
|
private dialogService: DialogService,
|
|
private messagingService: MessagingService,
|
|
private broadcasterService: BroadcasterService,
|
|
private ngZone: NgZone,
|
|
private platformUtilsService: PlatformUtilsService,
|
|
private cipherService: CipherService,
|
|
private passwordRepromptService: PasswordRepromptService,
|
|
private collectionAdminService: CollectionAdminService,
|
|
private searchService: SearchService,
|
|
private searchPipe: SearchPipe,
|
|
private groupService: GroupService,
|
|
private logService: LogService,
|
|
private eventCollectionService: EventCollectionService,
|
|
private totpService: TotpService,
|
|
private apiService: ApiService
|
|
) {}
|
|
|
|
async ngOnInit() {
|
|
this.trashCleanupWarning = this.i18nService.t(
|
|
this.platformUtilsService.isSelfHost()
|
|
? "trashCleanupWarningSelfHosted"
|
|
: "trashCleanupWarning"
|
|
);
|
|
|
|
const filter$ = this.routedVaultFilterService.filter$;
|
|
const organizationId$ = filter$.pipe(
|
|
map((filter) => filter.organizationId),
|
|
filter((filter) => filter !== undefined),
|
|
distinctUntilChanged()
|
|
);
|
|
|
|
const organization$ = organizationId$.pipe(
|
|
switchMap((organizationId) => this.organizationService.get$(organizationId)),
|
|
takeUntil(this.destroy$),
|
|
shareReplay({ refCount: false, bufferSize: 1 })
|
|
);
|
|
|
|
const firstSetup$ = combineLatest([organization$, this.route.queryParams]).pipe(
|
|
first(),
|
|
switchMap(async ([organization]) => {
|
|
this.organization = organization;
|
|
|
|
if (!organization.canUseAdminCollections) {
|
|
await this.syncService.fullSync(false);
|
|
}
|
|
|
|
return undefined;
|
|
}),
|
|
shareReplay({ refCount: true, bufferSize: 1 })
|
|
);
|
|
|
|
this.broadcasterService.subscribe(BroadcasterSubscriptionId, (message: any) => {
|
|
this.ngZone.run(async () => {
|
|
switch (message.command) {
|
|
case "syncCompleted":
|
|
if (message.successfully) {
|
|
this.refresh();
|
|
this.changeDetectorRef.detectChanges();
|
|
}
|
|
break;
|
|
}
|
|
});
|
|
});
|
|
|
|
this.routedVaultFilterBridgeService.activeFilter$
|
|
.pipe(takeUntil(this.destroy$))
|
|
.subscribe((activeFilter) => {
|
|
this.activeFilter = activeFilter;
|
|
});
|
|
|
|
this.searchText$
|
|
.pipe(debounceTime(SearchTextDebounceInterval), takeUntil(this.destroy$))
|
|
.subscribe((searchText) =>
|
|
this.router.navigate([], {
|
|
queryParams: { search: Utils.isNullOrEmpty(searchText) ? null : searchText },
|
|
queryParamsHandling: "merge",
|
|
replaceUrl: true,
|
|
})
|
|
);
|
|
|
|
this.currentSearchText$ = this.route.queryParams.pipe(map((queryParams) => queryParams.search));
|
|
|
|
const allCollectionsWithoutUnassigned$ = organizationId$.pipe(
|
|
switchMap((orgId) => this.collectionAdminService.getAll(orgId)),
|
|
shareReplay({ refCount: true, bufferSize: 1 })
|
|
);
|
|
|
|
const allCollections$ = combineLatest([organizationId$, allCollectionsWithoutUnassigned$]).pipe(
|
|
map(([organizationId, allCollections]) => {
|
|
const noneCollection = new CollectionAdminView();
|
|
noneCollection.name = this.i18nService.t("unassigned");
|
|
noneCollection.id = Unassigned;
|
|
noneCollection.organizationId = organizationId;
|
|
return allCollections.concat(noneCollection);
|
|
})
|
|
);
|
|
|
|
const allGroups$ = organizationId$.pipe(
|
|
switchMap((organizationId) => this.groupService.getAll(organizationId)),
|
|
shareReplay({ refCount: true, bufferSize: 1 })
|
|
);
|
|
|
|
const allCiphers$ = organization$.pipe(
|
|
concatMap(async (organization) => {
|
|
let ciphers;
|
|
if (organization.canEditAnyCollection) {
|
|
ciphers = await this.cipherService.getAllFromApiForOrganization(organization.id);
|
|
} else {
|
|
ciphers = (await this.cipherService.getAllDecrypted()).filter(
|
|
(c) => c.organizationId === organization.id
|
|
);
|
|
}
|
|
await this.searchService.indexCiphers(ciphers, organization.id);
|
|
return ciphers;
|
|
})
|
|
);
|
|
|
|
const ciphers$ = combineLatest([allCiphers$, filter$, this.currentSearchText$]).pipe(
|
|
filter(([ciphers, filter]) => ciphers != undefined && filter != undefined),
|
|
concatMap(async ([ciphers, filter, searchText]) => {
|
|
if (filter.collectionId === undefined && filter.type === undefined) {
|
|
return [];
|
|
}
|
|
|
|
const filterFunction = createFilterFunction(filter);
|
|
|
|
if (this.searchService.isSearchable(searchText)) {
|
|
return await this.searchService.searchCiphers(searchText, [filterFunction], ciphers);
|
|
}
|
|
|
|
return ciphers.filter(filterFunction);
|
|
}),
|
|
shareReplay({ refCount: true, bufferSize: 1 })
|
|
);
|
|
|
|
const nestedCollections$ = allCollections$.pipe(
|
|
map((collections) => getNestedCollectionTree(collections)),
|
|
shareReplay({ refCount: true, bufferSize: 1 })
|
|
);
|
|
|
|
const collections$ = combineLatest([nestedCollections$, filter$, this.currentSearchText$]).pipe(
|
|
filter(([collections, filter]) => collections != undefined && filter != undefined),
|
|
map(([collections, filter, searchText]) => {
|
|
if (
|
|
filter.collectionId === Unassigned ||
|
|
(filter.collectionId === undefined && filter.type !== undefined)
|
|
) {
|
|
return [];
|
|
}
|
|
|
|
let collectionsToReturn = [];
|
|
if (filter.collectionId === undefined || filter.collectionId === All) {
|
|
collectionsToReturn = collections.map((c) => c.node);
|
|
} else {
|
|
const selectedCollection = ServiceUtils.getTreeNodeObjectFromList(
|
|
collections,
|
|
filter.collectionId
|
|
);
|
|
collectionsToReturn = selectedCollection?.children.map((c) => c.node) ?? [];
|
|
}
|
|
|
|
if (this.searchService.isSearchable(searchText)) {
|
|
collectionsToReturn = this.searchPipe.transform(
|
|
collectionsToReturn,
|
|
searchText,
|
|
(collection) => collection.name,
|
|
(collection) => collection.id
|
|
);
|
|
}
|
|
|
|
return collectionsToReturn;
|
|
}),
|
|
takeUntil(this.destroy$),
|
|
shareReplay({ refCount: true, bufferSize: 1 })
|
|
);
|
|
|
|
const selectedCollection$ = combineLatest([nestedCollections$, filter$]).pipe(
|
|
filter(([collections, filter]) => collections != undefined && filter != undefined),
|
|
map(([collections, filter]) => {
|
|
if (
|
|
filter.collectionId === undefined ||
|
|
filter.collectionId === All ||
|
|
filter.collectionId === Unassigned
|
|
) {
|
|
return undefined;
|
|
}
|
|
|
|
return ServiceUtils.getTreeNodeObjectFromList(collections, filter.collectionId);
|
|
}),
|
|
shareReplay({ refCount: true, bufferSize: 1 })
|
|
);
|
|
|
|
const showMissingCollectionPermissionMessage$ = combineLatest([
|
|
filter$,
|
|
selectedCollection$,
|
|
organization$,
|
|
]).pipe(
|
|
map(([filter, collection, organization]) => {
|
|
return (
|
|
// Filtering by unassigned, show message if not admin
|
|
(filter.collectionId === Unassigned && !organization.canUseAdminCollections) ||
|
|
// Filtering by a collection, so show message if user is not assigned
|
|
(collection != undefined &&
|
|
!collection.node.assigned &&
|
|
!organization.canUseAdminCollections)
|
|
);
|
|
}),
|
|
shareReplay({ refCount: true, bufferSize: 1 })
|
|
);
|
|
|
|
firstSetup$
|
|
.pipe(
|
|
switchMap(() => combineLatest([this.route.queryParams, organization$])),
|
|
switchMap(async ([qParams, organization]) => {
|
|
const cipherId = getCipherIdFromParams(qParams);
|
|
if (!cipherId) {
|
|
return;
|
|
}
|
|
if (
|
|
// Handle users with implicit collection access since they use the admin endpoint
|
|
organization.canUseAdminCollections ||
|
|
(await this.cipherService.get(cipherId)) != null
|
|
) {
|
|
this.editCipherId(cipherId);
|
|
} else {
|
|
this.platformUtilsService.showToast(
|
|
"error",
|
|
this.i18nService.t("errorOccurred"),
|
|
this.i18nService.t("unknownCipher")
|
|
);
|
|
this.router.navigate([], {
|
|
queryParams: { cipherId: null, itemId: null },
|
|
queryParamsHandling: "merge",
|
|
});
|
|
}
|
|
}),
|
|
takeUntil(this.destroy$)
|
|
)
|
|
.subscribe();
|
|
|
|
firstSetup$
|
|
.pipe(
|
|
switchMap(() => combineLatest([this.route.queryParams, organization$, allCiphers$])),
|
|
switchMap(async ([qParams, organization, allCiphers$]) => {
|
|
const cipherId = qParams.viewEvents;
|
|
if (!cipherId) {
|
|
return;
|
|
}
|
|
const cipher = allCiphers$.find((c) => c.id === cipherId);
|
|
if (organization.useEvents && cipher != undefined) {
|
|
this.viewEvents(cipher);
|
|
} else {
|
|
this.platformUtilsService.showToast(
|
|
"error",
|
|
this.i18nService.t("errorOccurred"),
|
|
this.i18nService.t("unknownCipher")
|
|
);
|
|
this.router.navigate([], {
|
|
queryParams: { viewEvents: null },
|
|
queryParamsHandling: "merge",
|
|
});
|
|
}
|
|
}),
|
|
takeUntil(this.destroy$)
|
|
)
|
|
.subscribe();
|
|
|
|
firstSetup$
|
|
.pipe(
|
|
switchMap(() => this.refresh$),
|
|
tap(() => (this.refreshing = true)),
|
|
switchMap(() =>
|
|
combineLatest([
|
|
organization$,
|
|
filter$,
|
|
allCollections$,
|
|
allGroups$,
|
|
ciphers$,
|
|
collections$,
|
|
selectedCollection$,
|
|
showMissingCollectionPermissionMessage$,
|
|
])
|
|
),
|
|
takeUntil(this.destroy$)
|
|
)
|
|
.subscribe(
|
|
([
|
|
organization,
|
|
filter,
|
|
allCollections,
|
|
allGroups,
|
|
ciphers,
|
|
collections,
|
|
selectedCollection,
|
|
showMissingCollectionPermissionMessage,
|
|
]) => {
|
|
this.organization = organization;
|
|
this.filter = filter;
|
|
this.allCollections = allCollections;
|
|
this.allGroups = allGroups;
|
|
this.ciphers = ciphers;
|
|
this.collections = collections;
|
|
this.selectedCollection = selectedCollection;
|
|
this.showMissingCollectionPermissionMessage = showMissingCollectionPermissionMessage;
|
|
|
|
this.isEmpty = collections?.length === 0 && ciphers?.length === 0;
|
|
|
|
// This is a temporary fix to avoid double fetching collections.
|
|
// TODO: Remove when implementing new VVR menu
|
|
this.vaultFilterService.reloadCollections(allCollections);
|
|
|
|
this.refreshing = false;
|
|
this.performingInitialLoad = false;
|
|
}
|
|
);
|
|
}
|
|
|
|
get loading() {
|
|
return this.refreshing || this.processingEvent;
|
|
}
|
|
|
|
ngOnDestroy() {
|
|
this.broadcasterService.unsubscribe(BroadcasterSubscriptionId);
|
|
this.destroy$.next();
|
|
this.destroy$.complete();
|
|
}
|
|
|
|
async onVaultItemsEvent(event: VaultItemEvent) {
|
|
this.processingEvent = true;
|
|
|
|
try {
|
|
if (event.type === "viewAttachments") {
|
|
await this.editCipherAttachments(event.item);
|
|
} else if (event.type === "viewCollections") {
|
|
await this.editCipherCollections(event.item);
|
|
} else if (event.type === "clone") {
|
|
await this.cloneCipher(event.item);
|
|
} else if (event.type === "restore") {
|
|
if (event.items.length === 1) {
|
|
await this.restore(event.items[0]);
|
|
} else {
|
|
await this.bulkRestore(event.items);
|
|
}
|
|
} else if (event.type === "delete") {
|
|
const ciphers = event.items.filter((i) => i.collection === undefined).map((i) => i.cipher);
|
|
const collections = event.items
|
|
.filter((i) => i.cipher === undefined)
|
|
.map((i) => i.collection);
|
|
if (ciphers.length === 1 && collections.length === 0) {
|
|
await this.deleteCipher(ciphers[0]);
|
|
} else if (ciphers.length === 0 && collections.length === 1) {
|
|
await this.deleteCollection(collections[0]);
|
|
} else {
|
|
await this.bulkDelete(ciphers, collections, this.organization);
|
|
}
|
|
} else if (event.type === "copyField") {
|
|
await this.copy(event.item, event.field);
|
|
} else if (event.type === "edit") {
|
|
await this.editCollection(event.item, CollectionDialogTabType.Info);
|
|
} else if (event.type === "viewAccess") {
|
|
await this.editCollection(event.item, CollectionDialogTabType.Access);
|
|
} else if (event.type === "viewEvents") {
|
|
await this.viewEvents(event.item);
|
|
}
|
|
} finally {
|
|
this.processingEvent = false;
|
|
}
|
|
}
|
|
|
|
filterSearchText(searchText: string) {
|
|
this.searchText$.next(searchText);
|
|
}
|
|
|
|
async editCipherAttachments(cipher: CipherView) {
|
|
if (this.organization.maxStorageGb == null || this.organization.maxStorageGb === 0) {
|
|
this.messagingService.send("upgradeOrganization", { organizationId: cipher.organizationId });
|
|
return;
|
|
}
|
|
|
|
let madeAttachmentChanges = false;
|
|
|
|
const [modal] = await this.modalService.openViewRef(
|
|
AttachmentsComponent,
|
|
this.attachmentsModalRef,
|
|
(comp) => {
|
|
comp.organization = this.organization;
|
|
comp.cipherId = cipher.id;
|
|
comp.onUploadedAttachment
|
|
.pipe(takeUntil(this.destroy$))
|
|
.subscribe(() => (madeAttachmentChanges = true));
|
|
comp.onDeletedAttachment
|
|
.pipe(takeUntil(this.destroy$))
|
|
.subscribe(() => (madeAttachmentChanges = true));
|
|
}
|
|
);
|
|
|
|
modal.onClosed.pipe(takeUntil(this.destroy$)).subscribe(() => {
|
|
if (madeAttachmentChanges) {
|
|
this.refresh();
|
|
}
|
|
madeAttachmentChanges = false;
|
|
});
|
|
}
|
|
|
|
async editCipherCollections(cipher: CipherView) {
|
|
const currCollections = await firstValueFrom(this.vaultFilterService.filteredCollections$);
|
|
const [modal] = await this.modalService.openViewRef(
|
|
CollectionsComponent,
|
|
this.collectionsModalRef,
|
|
(comp) => {
|
|
comp.collectionIds = cipher.collectionIds;
|
|
comp.collections = currCollections.filter((c) => !c.readOnly && c.id != null);
|
|
comp.organization = this.organization;
|
|
comp.cipherId = cipher.id;
|
|
comp.onSavedCollections.pipe(takeUntil(this.destroy$)).subscribe(() => {
|
|
modal.close();
|
|
this.refresh();
|
|
});
|
|
}
|
|
);
|
|
}
|
|
|
|
async addCipher() {
|
|
const collections = (await firstValueFrom(this.vaultFilterService.filteredCollections$)).filter(
|
|
(c) => !c.readOnly && c.id != null
|
|
);
|
|
|
|
await this.editCipher(null, (comp) => {
|
|
comp.type = this.activeFilter.cipherType;
|
|
comp.collections = collections;
|
|
if (this.activeFilter.collectionId) {
|
|
comp.collectionIds = [this.activeFilter.collectionId];
|
|
}
|
|
});
|
|
}
|
|
|
|
async navigateToCipher(cipher: CipherView) {
|
|
this.go({ itemId: cipher?.id });
|
|
}
|
|
|
|
async editCipher(
|
|
cipher: CipherView,
|
|
additionalComponentParameters?: (comp: AddEditComponent) => void
|
|
) {
|
|
return this.editCipherId(cipher?.id, additionalComponentParameters);
|
|
}
|
|
|
|
async editCipherId(
|
|
cipherId: string,
|
|
additionalComponentParameters?: (comp: AddEditComponent) => void
|
|
) {
|
|
const cipher = await this.cipherService.get(cipherId);
|
|
if (cipher != null && cipher.reprompt != 0) {
|
|
if (!(await this.passwordRepromptService.showPasswordPrompt())) {
|
|
this.go({ cipherId: null, itemId: null });
|
|
return;
|
|
}
|
|
}
|
|
|
|
const defaultComponentParameters = (comp: AddEditComponent) => {
|
|
comp.organization = this.organization;
|
|
comp.organizationId = this.organization.id;
|
|
comp.cipherId = cipherId;
|
|
comp.onSavedCipher.pipe(takeUntil(this.destroy$)).subscribe(() => {
|
|
modal.close();
|
|
this.refresh();
|
|
});
|
|
comp.onDeletedCipher.pipe(takeUntil(this.destroy$)).subscribe(() => {
|
|
modal.close();
|
|
this.refresh();
|
|
});
|
|
comp.onRestoredCipher.pipe(takeUntil(this.destroy$)).subscribe(() => {
|
|
modal.close();
|
|
this.refresh();
|
|
});
|
|
};
|
|
|
|
const [modal, childComponent] = await this.modalService.openViewRef(
|
|
AddEditComponent,
|
|
this.cipherAddEditModalRef,
|
|
additionalComponentParameters == null
|
|
? defaultComponentParameters
|
|
: (comp) => {
|
|
defaultComponentParameters(comp);
|
|
additionalComponentParameters(comp);
|
|
}
|
|
);
|
|
|
|
modal.onClosedPromise().then(() => {
|
|
this.go({ cipherId: null, itemId: null });
|
|
});
|
|
|
|
return childComponent;
|
|
}
|
|
|
|
async cloneCipher(cipher: CipherView) {
|
|
const collections = (await firstValueFrom(this.vaultFilterService.filteredCollections$)).filter(
|
|
(c) => !c.readOnly && c.id != null
|
|
);
|
|
|
|
await this.editCipher(cipher, (comp) => {
|
|
comp.cloneMode = true;
|
|
comp.collections = collections;
|
|
comp.collectionIds = cipher.collectionIds;
|
|
});
|
|
}
|
|
|
|
async restore(c: CipherView): Promise<boolean> {
|
|
if (!(await this.repromptCipher([c]))) {
|
|
return;
|
|
}
|
|
|
|
if (!c.isDeleted) {
|
|
return;
|
|
}
|
|
const confirmed = await this.platformUtilsService.showDialog(
|
|
this.i18nService.t("restoreItemConfirmation"),
|
|
this.i18nService.t("restoreItem"),
|
|
this.i18nService.t("yes"),
|
|
this.i18nService.t("no"),
|
|
"warning"
|
|
);
|
|
if (!confirmed) {
|
|
return false;
|
|
}
|
|
|
|
try {
|
|
await this.cipherService.restoreWithServer(c.id);
|
|
this.platformUtilsService.showToast("success", null, this.i18nService.t("restoredItem"));
|
|
this.refresh();
|
|
} catch (e) {
|
|
this.logService.error(e);
|
|
}
|
|
}
|
|
|
|
async bulkRestore(ciphers: CipherView[]) {
|
|
if (!(await this.repromptCipher(ciphers))) {
|
|
return;
|
|
}
|
|
|
|
const selectedCipherIds = ciphers.map((cipher) => cipher.id);
|
|
if (selectedCipherIds.length === 0) {
|
|
this.platformUtilsService.showToast(
|
|
"error",
|
|
this.i18nService.t("errorOccurred"),
|
|
this.i18nService.t("nothingSelected")
|
|
);
|
|
return;
|
|
}
|
|
|
|
const dialog = openBulkRestoreDialog(this.dialogService, {
|
|
data: { cipherIds: selectedCipherIds },
|
|
});
|
|
|
|
const result = await lastValueFrom(dialog.closed);
|
|
if (result === BulkRestoreDialogResult.Restored) {
|
|
this.refresh();
|
|
}
|
|
}
|
|
|
|
async deleteCipher(c: CipherView): Promise<boolean> {
|
|
if (!(await this.repromptCipher([c]))) {
|
|
return;
|
|
}
|
|
|
|
const permanent = c.isDeleted;
|
|
const confirmed = await this.platformUtilsService.showDialog(
|
|
this.i18nService.t(
|
|
permanent ? "permanentlyDeleteItemConfirmation" : "deleteItemConfirmation"
|
|
),
|
|
this.i18nService.t(permanent ? "permanentlyDeleteItem" : "deleteItem"),
|
|
this.i18nService.t("yes"),
|
|
this.i18nService.t("no"),
|
|
"warning"
|
|
);
|
|
if (!confirmed) {
|
|
return false;
|
|
}
|
|
|
|
try {
|
|
await this.deleteCipherWithServer(c.id, permanent);
|
|
this.platformUtilsService.showToast(
|
|
"success",
|
|
null,
|
|
this.i18nService.t(permanent ? "permanentlyDeletedItem" : "deletedItem")
|
|
);
|
|
this.refresh();
|
|
} catch (e) {
|
|
this.logService.error(e);
|
|
}
|
|
}
|
|
|
|
async deleteCollection(collection: CollectionView): Promise<void> {
|
|
if (
|
|
!this.organization.canDeleteAssignedCollections &&
|
|
!this.organization.canDeleteAnyCollection
|
|
) {
|
|
this.platformUtilsService.showToast(
|
|
"error",
|
|
this.i18nService.t("errorOccurred"),
|
|
this.i18nService.t("missingPermissions")
|
|
);
|
|
return;
|
|
}
|
|
const confirmed = await this.platformUtilsService.showDialog(
|
|
this.i18nService.t("deleteCollectionConfirmation"),
|
|
collection.name,
|
|
this.i18nService.t("yes"),
|
|
this.i18nService.t("no"),
|
|
"warning"
|
|
);
|
|
if (!confirmed) {
|
|
return;
|
|
}
|
|
try {
|
|
await this.apiService.deleteCollection(this.organization?.id, collection.id);
|
|
this.platformUtilsService.showToast(
|
|
"success",
|
|
null,
|
|
this.i18nService.t("deletedCollectionId", collection.name)
|
|
);
|
|
|
|
// Navigate away if we deleted the colletion we were viewing
|
|
if (this.selectedCollection?.node.id === collection.id) {
|
|
this.router.navigate([], {
|
|
queryParams: { collectionId: this.selectedCollection.parent?.node.id ?? null },
|
|
queryParamsHandling: "merge",
|
|
replaceUrl: true,
|
|
});
|
|
}
|
|
|
|
this.refresh();
|
|
} catch (e) {
|
|
this.logService.error(e);
|
|
}
|
|
}
|
|
|
|
async bulkDelete(
|
|
ciphers: CipherView[],
|
|
collections: CollectionView[],
|
|
organization: Organization
|
|
) {
|
|
if (!(await this.repromptCipher(ciphers))) {
|
|
return;
|
|
}
|
|
|
|
if (ciphers.length === 0 && collections.length === 0) {
|
|
this.platformUtilsService.showToast(
|
|
"error",
|
|
this.i18nService.t("errorOccurred"),
|
|
this.i18nService.t("nothingSelected")
|
|
);
|
|
return;
|
|
}
|
|
const dialog = openBulkDeleteDialog(this.dialogService, {
|
|
data: {
|
|
permanent: this.filter.type === "trash",
|
|
cipherIds: ciphers.map((c) => c.id),
|
|
collectionIds: collections.map((c) => c.id),
|
|
organization,
|
|
},
|
|
});
|
|
|
|
const result = await lastValueFrom(dialog.closed);
|
|
if (result === BulkDeleteDialogResult.Deleted) {
|
|
this.refresh();
|
|
}
|
|
}
|
|
|
|
async copy(cipher: CipherView, field: "username" | "password" | "totp") {
|
|
let aType;
|
|
let value;
|
|
let typeI18nKey;
|
|
|
|
if (field === "username") {
|
|
aType = "Username";
|
|
value = cipher.login.username;
|
|
typeI18nKey = "username";
|
|
} else if (field === "password") {
|
|
aType = "Password";
|
|
value = cipher.login.password;
|
|
typeI18nKey = "password";
|
|
} else if (field === "totp") {
|
|
aType = "TOTP";
|
|
value = await this.totpService.getCode(cipher.login.totp);
|
|
typeI18nKey = "verificationCodeTotp";
|
|
} else {
|
|
this.platformUtilsService.showToast("info", null, this.i18nService.t("unexpectedError"));
|
|
return;
|
|
}
|
|
|
|
if (
|
|
this.passwordRepromptService.protectedFields().includes(aType) &&
|
|
!(await this.repromptCipher([cipher]))
|
|
) {
|
|
return;
|
|
}
|
|
|
|
if (!cipher.viewPassword) {
|
|
return;
|
|
}
|
|
|
|
this.platformUtilsService.copyToClipboard(value, { window: window });
|
|
this.platformUtilsService.showToast(
|
|
"info",
|
|
null,
|
|
this.i18nService.t("valueCopied", this.i18nService.t(typeI18nKey))
|
|
);
|
|
|
|
if (field === "password" || field === "totp") {
|
|
this.eventCollectionService.collect(
|
|
EventType.Cipher_ClientToggledHiddenFieldVisible,
|
|
cipher.id
|
|
);
|
|
}
|
|
}
|
|
|
|
async addCollection(): Promise<void> {
|
|
const dialog = openCollectionDialog(this.dialogService, {
|
|
data: {
|
|
organizationId: this.organization?.id,
|
|
parentCollectionId: this.selectedCollection?.node.id,
|
|
},
|
|
});
|
|
|
|
const result = await lastValueFrom(dialog.closed);
|
|
if (result === CollectionDialogResult.Saved || result === CollectionDialogResult.Deleted) {
|
|
this.refresh();
|
|
}
|
|
}
|
|
|
|
async editCollection(c: CollectionView, tab: CollectionDialogTabType): Promise<void> {
|
|
const dialog = openCollectionDialog(this.dialogService, {
|
|
data: { collectionId: c?.id, organizationId: this.organization?.id, initialTab: tab },
|
|
});
|
|
|
|
const result = await lastValueFrom(dialog.closed);
|
|
if (result === CollectionDialogResult.Saved || result === CollectionDialogResult.Deleted) {
|
|
this.refresh();
|
|
}
|
|
}
|
|
|
|
async viewEvents(cipher: CipherView) {
|
|
await this.modalService.openViewRef(EntityEventsComponent, this.eventsModalRef, (comp) => {
|
|
comp.name = cipher.name;
|
|
comp.organizationId = this.organization.id;
|
|
comp.entityId = cipher.id;
|
|
comp.showUser = true;
|
|
comp.entity = "cipher";
|
|
});
|
|
}
|
|
|
|
protected deleteCipherWithServer(id: string, permanent: boolean) {
|
|
return permanent
|
|
? this.cipherService.deleteWithServer(id)
|
|
: this.cipherService.softDeleteWithServer(id);
|
|
}
|
|
|
|
protected async repromptCipher(ciphers: CipherView[]) {
|
|
const notProtected = !ciphers.find((cipher) => cipher.reprompt !== CipherRepromptType.None);
|
|
|
|
return notProtected || (await this.passwordRepromptService.showPasswordPrompt());
|
|
}
|
|
|
|
private refresh() {
|
|
this.refresh$.next();
|
|
}
|
|
|
|
private go(queryParams: any = null) {
|
|
if (queryParams == null) {
|
|
queryParams = {
|
|
type: this.activeFilter.cipherType,
|
|
collectionId: this.activeFilter.collectionId,
|
|
deleted: this.activeFilter.isDeleted || null,
|
|
};
|
|
}
|
|
|
|
this.router.navigate([], {
|
|
relativeTo: this.route,
|
|
queryParams: queryParams,
|
|
queryParamsHandling: "merge",
|
|
replaceUrl: true,
|
|
});
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Allows backwards compatibility with
|
|
* old links that used the original `cipherId` param
|
|
*/
|
|
const getCipherIdFromParams = (params: Params): string => {
|
|
return params["itemId"] || params["cipherId"];
|
|
};
|