mirror of
https://github.com/bitwarden/browser.git
synced 2025-04-12 19:46:17 +02:00
* Remove deprecated cryptoservice functions * Use getUserkeyWithLegacySupport to get userkey * Fix tests * Fix tests * Fix tests * Remove unused cryptoservice instances * Fix build * Remove unused apiService in constructor * Fix encryption * Ensure passed in key is used if present * Fix sends and folders * Fix tests * Remove logged key * Fix import for account restricted keys
314 lines
11 KiB
TypeScript
314 lines
11 KiB
TypeScript
import { Directive, EventEmitter, Input, OnInit, Output } from "@angular/core";
|
|
import { firstValueFrom, map } from "rxjs";
|
|
|
|
import { ApiService } from "@bitwarden/common/abstractions/api.service";
|
|
import { AccountService } from "@bitwarden/common/auth/abstractions/account.service";
|
|
import { BillingAccountProfileStateService } from "@bitwarden/common/billing/abstractions/account/billing-account-profile-state.service";
|
|
import { ErrorResponse } from "@bitwarden/common/models/response/error.response";
|
|
import { CryptoService } from "@bitwarden/common/platform/abstractions/crypto.service";
|
|
import { EncryptService } from "@bitwarden/common/platform/abstractions/encrypt.service";
|
|
import { FileDownloadService } from "@bitwarden/common/platform/abstractions/file-download/file-download.service";
|
|
import { I18nService } from "@bitwarden/common/platform/abstractions/i18n.service";
|
|
import { LogService } from "@bitwarden/common/platform/abstractions/log.service";
|
|
import { PlatformUtilsService } from "@bitwarden/common/platform/abstractions/platform-utils.service";
|
|
import { StateService } from "@bitwarden/common/platform/abstractions/state.service";
|
|
import { EncArrayBuffer } from "@bitwarden/common/platform/models/domain/enc-array-buffer";
|
|
import { UserId } from "@bitwarden/common/types/guid";
|
|
import { CipherService } from "@bitwarden/common/vault/abstractions/cipher.service";
|
|
import { Cipher } from "@bitwarden/common/vault/models/domain/cipher";
|
|
import { AttachmentView } from "@bitwarden/common/vault/models/view/attachment.view";
|
|
import { CipherView } from "@bitwarden/common/vault/models/view/cipher.view";
|
|
import { DialogService, ToastService } from "@bitwarden/components";
|
|
|
|
@Directive()
|
|
export class AttachmentsComponent implements OnInit {
|
|
@Input() cipherId: string;
|
|
@Input() viewOnly: boolean;
|
|
@Output() onUploadedAttachment = new EventEmitter();
|
|
@Output() onDeletedAttachment = new EventEmitter();
|
|
@Output() onReuploadedAttachment = new EventEmitter();
|
|
|
|
cipher: CipherView;
|
|
cipherDomain: Cipher;
|
|
canAccessAttachments: boolean;
|
|
formPromise: Promise<any>;
|
|
deletePromises: { [id: string]: Promise<any> } = {};
|
|
reuploadPromises: { [id: string]: Promise<any> } = {};
|
|
emergencyAccessId?: string = null;
|
|
protected componentName = "";
|
|
|
|
constructor(
|
|
protected cipherService: CipherService,
|
|
protected i18nService: I18nService,
|
|
protected cryptoService: CryptoService,
|
|
protected encryptService: EncryptService,
|
|
protected platformUtilsService: PlatformUtilsService,
|
|
protected apiService: ApiService,
|
|
protected win: Window,
|
|
protected logService: LogService,
|
|
protected stateService: StateService,
|
|
protected fileDownloadService: FileDownloadService,
|
|
protected dialogService: DialogService,
|
|
protected billingAccountProfileStateService: BillingAccountProfileStateService,
|
|
protected accountService: AccountService,
|
|
protected toastService: ToastService,
|
|
) {}
|
|
|
|
async ngOnInit() {
|
|
await this.init();
|
|
}
|
|
|
|
async submit() {
|
|
const fileEl = document.getElementById("file") as HTMLInputElement;
|
|
const files = fileEl.files;
|
|
if (files == null || files.length === 0) {
|
|
this.platformUtilsService.showToast(
|
|
"error",
|
|
this.i18nService.t("errorOccurred"),
|
|
this.i18nService.t("selectFile"),
|
|
);
|
|
return;
|
|
}
|
|
|
|
if (files[0].size > 524288000) {
|
|
// 500 MB
|
|
this.platformUtilsService.showToast(
|
|
"error",
|
|
this.i18nService.t("errorOccurred"),
|
|
this.i18nService.t("maxFileSize"),
|
|
);
|
|
return;
|
|
}
|
|
|
|
try {
|
|
const activeUserId = await firstValueFrom(
|
|
this.accountService.activeAccount$.pipe(map((a) => a?.id)),
|
|
);
|
|
this.formPromise = this.saveCipherAttachment(files[0], activeUserId);
|
|
this.cipherDomain = await this.formPromise;
|
|
this.cipher = await this.cipherDomain.decrypt(
|
|
await this.cipherService.getKeyForCipherKeyDecryption(this.cipherDomain, activeUserId),
|
|
);
|
|
this.platformUtilsService.showToast("success", null, this.i18nService.t("attachmentSaved"));
|
|
this.onUploadedAttachment.emit();
|
|
} catch (e) {
|
|
this.logService.error(e);
|
|
}
|
|
|
|
// reset file input
|
|
// ref: https://stackoverflow.com/a/20552042
|
|
fileEl.type = "";
|
|
fileEl.type = "file";
|
|
fileEl.value = "";
|
|
}
|
|
|
|
async delete(attachment: AttachmentView) {
|
|
if (this.deletePromises[attachment.id] != null) {
|
|
return;
|
|
}
|
|
|
|
const confirmed = await this.dialogService.openSimpleDialog({
|
|
title: { key: "deleteAttachment" },
|
|
content: { key: "deleteAttachmentConfirmation" },
|
|
type: "warning",
|
|
});
|
|
|
|
if (!confirmed) {
|
|
return;
|
|
}
|
|
|
|
try {
|
|
this.deletePromises[attachment.id] = this.deleteCipherAttachment(attachment.id);
|
|
await this.deletePromises[attachment.id];
|
|
this.platformUtilsService.showToast("success", null, this.i18nService.t("deletedAttachment"));
|
|
const i = this.cipher.attachments.indexOf(attachment);
|
|
if (i > -1) {
|
|
this.cipher.attachments.splice(i, 1);
|
|
}
|
|
} catch (e) {
|
|
this.logService.error(e);
|
|
}
|
|
|
|
this.deletePromises[attachment.id] = null;
|
|
this.onDeletedAttachment.emit();
|
|
}
|
|
|
|
async download(attachment: AttachmentView) {
|
|
const a = attachment as any;
|
|
if (a.downloading) {
|
|
return;
|
|
}
|
|
|
|
if (!this.canAccessAttachments) {
|
|
this.platformUtilsService.showToast(
|
|
"error",
|
|
this.i18nService.t("premiumRequired"),
|
|
this.i18nService.t("premiumRequiredDesc"),
|
|
);
|
|
return;
|
|
}
|
|
|
|
let url: string;
|
|
try {
|
|
const attachmentDownloadResponse = await this.apiService.getAttachmentData(
|
|
this.cipher.id,
|
|
attachment.id,
|
|
this.emergencyAccessId,
|
|
);
|
|
url = attachmentDownloadResponse.url;
|
|
} catch (e) {
|
|
if (e instanceof ErrorResponse && (e as ErrorResponse).statusCode === 404) {
|
|
url = attachment.url;
|
|
} else if (e instanceof ErrorResponse) {
|
|
throw new Error((e as ErrorResponse).getSingleMessage());
|
|
} else {
|
|
throw e;
|
|
}
|
|
}
|
|
|
|
a.downloading = true;
|
|
const response = await fetch(new Request(url, { cache: "no-store" }));
|
|
if (response.status !== 200) {
|
|
this.platformUtilsService.showToast("error", null, this.i18nService.t("errorOccurred"));
|
|
a.downloading = false;
|
|
return;
|
|
}
|
|
|
|
try {
|
|
const encBuf = await EncArrayBuffer.fromResponse(response);
|
|
const key =
|
|
attachment.key != null
|
|
? attachment.key
|
|
: await this.cryptoService.getOrgKey(this.cipher.organizationId);
|
|
const decBuf = await this.encryptService.decryptToBytes(encBuf, key);
|
|
this.fileDownloadService.download({
|
|
fileName: attachment.fileName,
|
|
blobData: decBuf,
|
|
});
|
|
this.toastService.showToast({
|
|
variant: "success",
|
|
title: null,
|
|
message: this.i18nService.t("fileSavedToDevice"),
|
|
});
|
|
} catch (e) {
|
|
this.platformUtilsService.showToast("error", null, this.i18nService.t("errorOccurred"));
|
|
}
|
|
|
|
a.downloading = false;
|
|
}
|
|
|
|
protected async init() {
|
|
this.cipherDomain = await this.loadCipher();
|
|
const activeUserId = await firstValueFrom(
|
|
this.accountService.activeAccount$.pipe(map((a) => a?.id)),
|
|
);
|
|
this.cipher = await this.cipherDomain.decrypt(
|
|
await this.cipherService.getKeyForCipherKeyDecryption(this.cipherDomain, activeUserId),
|
|
);
|
|
|
|
const canAccessPremium = await firstValueFrom(
|
|
this.billingAccountProfileStateService.hasPremiumFromAnySource$,
|
|
);
|
|
this.canAccessAttachments = canAccessPremium || this.cipher.organizationId != null;
|
|
|
|
if (!this.canAccessAttachments) {
|
|
const confirmed = await this.dialogService.openSimpleDialog({
|
|
title: { key: "premiumRequired" },
|
|
content: { key: "premiumRequiredDesc" },
|
|
acceptButtonText: { key: "learnMore" },
|
|
type: "success",
|
|
});
|
|
|
|
if (confirmed) {
|
|
this.platformUtilsService.launchUri(
|
|
"https://vault.bitwarden.com/#/settings/subscription/premium",
|
|
);
|
|
}
|
|
}
|
|
}
|
|
|
|
protected async reuploadCipherAttachment(attachment: AttachmentView, admin: boolean) {
|
|
const a = attachment as any;
|
|
if (attachment.key != null || a.downloading || this.reuploadPromises[attachment.id] != null) {
|
|
return;
|
|
}
|
|
|
|
try {
|
|
this.reuploadPromises[attachment.id] = Promise.resolve().then(async () => {
|
|
// 1. Download
|
|
a.downloading = true;
|
|
const response = await fetch(new Request(attachment.url, { cache: "no-store" }));
|
|
if (response.status !== 200) {
|
|
this.platformUtilsService.showToast("error", null, this.i18nService.t("errorOccurred"));
|
|
a.downloading = false;
|
|
return;
|
|
}
|
|
|
|
try {
|
|
// 2. Resave
|
|
const encBuf = await EncArrayBuffer.fromResponse(response);
|
|
const key =
|
|
attachment.key != null
|
|
? attachment.key
|
|
: await this.cryptoService.getOrgKey(this.cipher.organizationId);
|
|
const decBuf = await this.encryptService.decryptToBytes(encBuf, key);
|
|
const activeUserId = await firstValueFrom(
|
|
this.accountService.activeAccount$.pipe(map((a) => a?.id)),
|
|
);
|
|
this.cipherDomain = await this.cipherService.saveAttachmentRawWithServer(
|
|
this.cipherDomain,
|
|
attachment.fileName,
|
|
decBuf,
|
|
activeUserId,
|
|
admin,
|
|
);
|
|
this.cipher = await this.cipherDomain.decrypt(
|
|
await this.cipherService.getKeyForCipherKeyDecryption(this.cipherDomain, activeUserId),
|
|
);
|
|
|
|
// 3. Delete old
|
|
this.deletePromises[attachment.id] = this.deleteCipherAttachment(attachment.id);
|
|
await this.deletePromises[attachment.id];
|
|
const foundAttachment = this.cipher.attachments.filter((a2) => a2.id === attachment.id);
|
|
if (foundAttachment.length > 0) {
|
|
const i = this.cipher.attachments.indexOf(foundAttachment[0]);
|
|
if (i > -1) {
|
|
this.cipher.attachments.splice(i, 1);
|
|
}
|
|
}
|
|
|
|
this.platformUtilsService.showToast(
|
|
"success",
|
|
null,
|
|
this.i18nService.t("attachmentSaved"),
|
|
);
|
|
this.onReuploadedAttachment.emit();
|
|
} catch (e) {
|
|
this.platformUtilsService.showToast("error", null, this.i18nService.t("errorOccurred"));
|
|
}
|
|
|
|
a.downloading = false;
|
|
});
|
|
await this.reuploadPromises[attachment.id];
|
|
} catch (e) {
|
|
this.logService.error(e);
|
|
}
|
|
}
|
|
|
|
protected loadCipher() {
|
|
return this.cipherService.get(this.cipherId);
|
|
}
|
|
|
|
protected saveCipherAttachment(file: File, userId: UserId) {
|
|
return this.cipherService.saveAttachmentWithServer(this.cipherDomain, file, userId);
|
|
}
|
|
|
|
protected deleteCipherAttachment(attachmentId: string) {
|
|
return this.cipherService.deleteAttachmentWithServer(this.cipher.id, attachmentId);
|
|
}
|
|
|
|
protected async reupload(attachment: AttachmentView) {
|
|
// TODO: This should be removed but is needed since we re-use the same template
|
|
}
|
|
}
|