mirror of
https://github.com/bitwarden/browser.git
synced 2024-09-27 04:03:00 +02:00
b99153a016
* Added billing account profile state service
* Update usages after removing state service functions
* Added migrator
* Updated bw.ts and main.background.ts
* Removed comment
* Updated state service dependencies to include billing service
* Added missing mv3 factory and updated MainContextMenuHandler
* updated autofill service and tests
* Updated the remaining extensions usages
* Updated desktop
* Removed subjects where they weren't needed
* Refactored billing service to have a single setter to avoid unecessary emissions
* Refactored has premium guard to return an observable
* Renamed services to match ADR
f633f2cdd8/docs/architecture/clients/presentation/angular.md (abstract--default-implementations)
* Updated property names to be a smidgen more descriptive and added jsdocs
* Updated setting of canAccessPremium to automatically update when the underlying observable emits
* Fixed build error after merge conflicts
* Another build error from conflict
* Removed autofill unit test changes from conflict
* Updated login strategy to not set premium field using state service
* Updated CLI to use billing state provider
* Shortened names a bit
* Fixed build
530 lines
17 KiB
TypeScript
530 lines
17 KiB
TypeScript
import { DatePipe } from "@angular/common";
|
|
import {
|
|
ChangeDetectorRef,
|
|
Directive,
|
|
EventEmitter,
|
|
Input,
|
|
NgZone,
|
|
OnDestroy,
|
|
OnInit,
|
|
Output,
|
|
} from "@angular/core";
|
|
import { firstValueFrom, Subject, takeUntil } from "rxjs";
|
|
|
|
import { ApiService } from "@bitwarden/common/abstractions/api.service";
|
|
import { AuditService } from "@bitwarden/common/abstractions/audit.service";
|
|
import { EventCollectionService } from "@bitwarden/common/abstractions/event/event-collection.service";
|
|
import { TokenService } from "@bitwarden/common/auth/abstractions/token.service";
|
|
import { BillingAccountProfileStateService } from "@bitwarden/common/billing/abstractions/account/billing-account-profile-state.service";
|
|
import { EventType } from "@bitwarden/common/enums";
|
|
import { ErrorResponse } from "@bitwarden/common/models/response/error.response";
|
|
import { BroadcasterService } from "@bitwarden/common/platform/abstractions/broadcaster.service";
|
|
import { CryptoService } from "@bitwarden/common/platform/abstractions/crypto.service";
|
|
import { FileDownloadService } from "@bitwarden/common/platform/abstractions/file-download/file-download.service";
|
|
import { I18nService } from "@bitwarden/common/platform/abstractions/i18n.service";
|
|
import { LogService } from "@bitwarden/common/platform/abstractions/log.service";
|
|
import { PlatformUtilsService } from "@bitwarden/common/platform/abstractions/platform-utils.service";
|
|
import { StateService } from "@bitwarden/common/platform/abstractions/state.service";
|
|
import { EncArrayBuffer } from "@bitwarden/common/platform/models/domain/enc-array-buffer";
|
|
import { CipherService } from "@bitwarden/common/vault/abstractions/cipher.service";
|
|
import { FolderService } from "@bitwarden/common/vault/abstractions/folder/folder.service.abstraction";
|
|
import { TotpService } from "@bitwarden/common/vault/abstractions/totp.service";
|
|
import { FieldType, CipherType } from "@bitwarden/common/vault/enums";
|
|
import { CipherRepromptType } from "@bitwarden/common/vault/enums/cipher-reprompt-type";
|
|
import { Launchable } from "@bitwarden/common/vault/interfaces/launchable";
|
|
import { AttachmentView } from "@bitwarden/common/vault/models/view/attachment.view";
|
|
import { CipherView } from "@bitwarden/common/vault/models/view/cipher.view";
|
|
import { FolderView } from "@bitwarden/common/vault/models/view/folder.view";
|
|
import { DialogService } from "@bitwarden/components";
|
|
import { PasswordRepromptService } from "@bitwarden/vault";
|
|
|
|
const BroadcasterSubscriptionId = "ViewComponent";
|
|
|
|
@Directive()
|
|
export class ViewComponent implements OnDestroy, OnInit {
|
|
@Input() cipherId: string;
|
|
@Output() onEditCipher = new EventEmitter<CipherView>();
|
|
@Output() onCloneCipher = new EventEmitter<CipherView>();
|
|
@Output() onShareCipher = new EventEmitter<CipherView>();
|
|
@Output() onDeletedCipher = new EventEmitter<CipherView>();
|
|
@Output() onRestoredCipher = new EventEmitter<CipherView>();
|
|
|
|
cipher: CipherView;
|
|
showPassword: boolean;
|
|
showPasswordCount: boolean;
|
|
showCardNumber: boolean;
|
|
showCardCode: boolean;
|
|
canAccessPremium: boolean;
|
|
showPremiumRequiredTotp: boolean;
|
|
totpCode: string;
|
|
totpCodeFormatted: string;
|
|
totpDash: number;
|
|
totpSec: number;
|
|
totpLow: boolean;
|
|
fieldType = FieldType;
|
|
checkPasswordPromise: Promise<number>;
|
|
folder: FolderView;
|
|
cipherType = CipherType;
|
|
|
|
private totpInterval: any;
|
|
private previousCipherId: string;
|
|
private passwordReprompted = false;
|
|
private directiveIsDestroyed$ = new Subject<boolean>();
|
|
|
|
get fido2CredentialCreationDateValue(): string {
|
|
const dateCreated = this.i18nService.t("dateCreated");
|
|
const creationDate = this.datePipe.transform(
|
|
this.cipher?.login?.fido2Credentials?.[0]?.creationDate,
|
|
"short",
|
|
);
|
|
return `${dateCreated} ${creationDate}`;
|
|
}
|
|
|
|
constructor(
|
|
protected cipherService: CipherService,
|
|
protected folderService: FolderService,
|
|
protected totpService: TotpService,
|
|
protected tokenService: TokenService,
|
|
protected i18nService: I18nService,
|
|
protected cryptoService: CryptoService,
|
|
protected platformUtilsService: PlatformUtilsService,
|
|
protected auditService: AuditService,
|
|
protected win: Window,
|
|
protected broadcasterService: BroadcasterService,
|
|
protected ngZone: NgZone,
|
|
protected changeDetectorRef: ChangeDetectorRef,
|
|
protected eventCollectionService: EventCollectionService,
|
|
protected apiService: ApiService,
|
|
protected passwordRepromptService: PasswordRepromptService,
|
|
private logService: LogService,
|
|
protected stateService: StateService,
|
|
protected fileDownloadService: FileDownloadService,
|
|
protected dialogService: DialogService,
|
|
protected datePipe: DatePipe,
|
|
private billingAccountProfileStateService: BillingAccountProfileStateService,
|
|
) {}
|
|
|
|
ngOnInit() {
|
|
this.broadcasterService.subscribe(BroadcasterSubscriptionId, (message: any) => {
|
|
// FIXME: Verify that this floating promise is intentional. If it is, add an explanatory comment and ensure there is proper error handling.
|
|
// eslint-disable-next-line @typescript-eslint/no-floating-promises
|
|
this.ngZone.run(async () => {
|
|
switch (message.command) {
|
|
case "syncCompleted":
|
|
if (message.successfully) {
|
|
await this.load();
|
|
this.changeDetectorRef.detectChanges();
|
|
}
|
|
break;
|
|
}
|
|
});
|
|
});
|
|
|
|
this.billingAccountProfileStateService.hasPremiumFromAnySource$
|
|
.pipe(takeUntil(this.directiveIsDestroyed$))
|
|
.subscribe((canAccessPremium: boolean) => {
|
|
this.canAccessPremium = canAccessPremium;
|
|
});
|
|
}
|
|
|
|
ngOnDestroy() {
|
|
this.broadcasterService.unsubscribe(BroadcasterSubscriptionId);
|
|
this.cleanUp();
|
|
this.directiveIsDestroyed$.next(true);
|
|
this.directiveIsDestroyed$.complete();
|
|
}
|
|
|
|
async load() {
|
|
this.cleanUp();
|
|
|
|
const cipher = await this.cipherService.get(this.cipherId);
|
|
this.cipher = await cipher.decrypt(
|
|
await this.cipherService.getKeyForCipherKeyDecryption(cipher),
|
|
);
|
|
this.showPremiumRequiredTotp =
|
|
this.cipher.login.totp && !this.canAccessPremium && !this.cipher.organizationUseTotp;
|
|
|
|
if (this.cipher.folderId) {
|
|
this.folder = await (
|
|
await firstValueFrom(this.folderService.folderViews$)
|
|
).find((f) => f.id == this.cipher.folderId);
|
|
}
|
|
|
|
if (
|
|
this.cipher.type === CipherType.Login &&
|
|
this.cipher.login.totp &&
|
|
(cipher.organizationUseTotp || this.canAccessPremium)
|
|
) {
|
|
await this.totpUpdateCode();
|
|
const interval = this.totpService.getTimeInterval(this.cipher.login.totp);
|
|
await this.totpTick(interval);
|
|
|
|
this.totpInterval = setInterval(async () => {
|
|
await this.totpTick(interval);
|
|
}, 1000);
|
|
}
|
|
|
|
if (this.previousCipherId !== this.cipherId) {
|
|
// FIXME: Verify that this floating promise is intentional. If it is, add an explanatory comment and ensure there is proper error handling.
|
|
// eslint-disable-next-line @typescript-eslint/no-floating-promises
|
|
this.eventCollectionService.collect(EventType.Cipher_ClientViewed, this.cipherId);
|
|
}
|
|
this.previousCipherId = this.cipherId;
|
|
}
|
|
|
|
async edit() {
|
|
if (await this.promptPassword()) {
|
|
this.onEditCipher.emit(this.cipher);
|
|
return true;
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
async clone() {
|
|
if (this.cipher.login?.hasFido2Credentials) {
|
|
const confirmed = await this.dialogService.openSimpleDialog({
|
|
title: { key: "passkeyNotCopied" },
|
|
content: { key: "passkeyNotCopiedAlert" },
|
|
type: "info",
|
|
});
|
|
|
|
if (!confirmed) {
|
|
return false;
|
|
}
|
|
}
|
|
|
|
if (await this.promptPassword()) {
|
|
this.onCloneCipher.emit(this.cipher);
|
|
return true;
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
async share() {
|
|
if (await this.promptPassword()) {
|
|
this.onShareCipher.emit(this.cipher);
|
|
return true;
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
async delete(): Promise<boolean> {
|
|
if (!(await this.promptPassword())) {
|
|
return;
|
|
}
|
|
|
|
const confirmed = await this.dialogService.openSimpleDialog({
|
|
title: { key: "deleteItem" },
|
|
content: {
|
|
key: this.cipher.isDeleted ? "permanentlyDeleteItemConfirmation" : "deleteItemConfirmation",
|
|
},
|
|
type: "warning",
|
|
});
|
|
|
|
if (!confirmed) {
|
|
return false;
|
|
}
|
|
|
|
try {
|
|
await this.deleteCipher();
|
|
this.platformUtilsService.showToast(
|
|
"success",
|
|
null,
|
|
this.i18nService.t(this.cipher.isDeleted ? "permanentlyDeletedItem" : "deletedItem"),
|
|
);
|
|
this.onDeletedCipher.emit(this.cipher);
|
|
} catch (e) {
|
|
this.logService.error(e);
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
async restore(): Promise<boolean> {
|
|
if (!this.cipher.isDeleted) {
|
|
return false;
|
|
}
|
|
|
|
try {
|
|
await this.restoreCipher();
|
|
this.platformUtilsService.showToast("success", null, this.i18nService.t("restoredItem"));
|
|
this.onRestoredCipher.emit(this.cipher);
|
|
} catch (e) {
|
|
this.logService.error(e);
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
async togglePassword() {
|
|
if (!(await this.promptPassword())) {
|
|
return;
|
|
}
|
|
|
|
this.showPassword = !this.showPassword;
|
|
this.showPasswordCount = false;
|
|
if (this.showPassword) {
|
|
// FIXME: Verify that this floating promise is intentional. If it is, add an explanatory comment and ensure there is proper error handling.
|
|
// eslint-disable-next-line @typescript-eslint/no-floating-promises
|
|
this.eventCollectionService.collect(
|
|
EventType.Cipher_ClientToggledPasswordVisible,
|
|
this.cipherId,
|
|
);
|
|
}
|
|
}
|
|
|
|
async togglePasswordCount() {
|
|
if (!this.showPassword) {
|
|
return;
|
|
}
|
|
|
|
this.showPasswordCount = !this.showPasswordCount;
|
|
}
|
|
|
|
async toggleCardNumber() {
|
|
if (!(await this.promptPassword())) {
|
|
return;
|
|
}
|
|
|
|
this.showCardNumber = !this.showCardNumber;
|
|
if (this.showCardNumber) {
|
|
// FIXME: Verify that this floating promise is intentional. If it is, add an explanatory comment and ensure there is proper error handling.
|
|
// eslint-disable-next-line @typescript-eslint/no-floating-promises
|
|
this.eventCollectionService.collect(
|
|
EventType.Cipher_ClientToggledCardNumberVisible,
|
|
this.cipherId,
|
|
);
|
|
}
|
|
}
|
|
|
|
async toggleCardCode() {
|
|
if (!(await this.promptPassword())) {
|
|
return;
|
|
}
|
|
|
|
this.showCardCode = !this.showCardCode;
|
|
if (this.showCardCode) {
|
|
// FIXME: Verify that this floating promise is intentional. If it is, add an explanatory comment and ensure there is proper error handling.
|
|
// eslint-disable-next-line @typescript-eslint/no-floating-promises
|
|
this.eventCollectionService.collect(
|
|
EventType.Cipher_ClientToggledCardCodeVisible,
|
|
this.cipherId,
|
|
);
|
|
}
|
|
}
|
|
|
|
async checkPassword() {
|
|
if (
|
|
this.cipher.login == null ||
|
|
this.cipher.login.password == null ||
|
|
this.cipher.login.password === ""
|
|
) {
|
|
return;
|
|
}
|
|
|
|
this.checkPasswordPromise = this.auditService.passwordLeaked(this.cipher.login.password);
|
|
const matches = await this.checkPasswordPromise;
|
|
|
|
if (matches > 0) {
|
|
this.platformUtilsService.showToast(
|
|
"warning",
|
|
null,
|
|
this.i18nService.t("passwordExposed", matches.toString()),
|
|
);
|
|
} else {
|
|
this.platformUtilsService.showToast("success", null, this.i18nService.t("passwordSafe"));
|
|
}
|
|
}
|
|
|
|
launch(uri: Launchable, cipherId?: string) {
|
|
if (!uri.canLaunch) {
|
|
return;
|
|
}
|
|
|
|
if (cipherId) {
|
|
// FIXME: Verify that this floating promise is intentional. If it is, add an explanatory comment and ensure there is proper error handling.
|
|
// eslint-disable-next-line @typescript-eslint/no-floating-promises
|
|
this.cipherService.updateLastLaunchedDate(cipherId);
|
|
}
|
|
|
|
this.platformUtilsService.launchUri(uri.launchUri);
|
|
}
|
|
|
|
async copy(value: string, typeI18nKey: string, aType: string): Promise<boolean> {
|
|
if (value == null) {
|
|
return false;
|
|
}
|
|
|
|
if (
|
|
this.passwordRepromptService.protectedFields().includes(aType) &&
|
|
!(await this.promptPassword())
|
|
) {
|
|
return false;
|
|
}
|
|
|
|
const copyOptions = this.win != null ? { window: this.win } : null;
|
|
this.platformUtilsService.copyToClipboard(value, copyOptions);
|
|
this.platformUtilsService.showToast(
|
|
"info",
|
|
null,
|
|
this.i18nService.t("valueCopied", this.i18nService.t(typeI18nKey)),
|
|
);
|
|
|
|
if (typeI18nKey === "password") {
|
|
// FIXME: Verify that this floating promise is intentional. If it is, add an explanatory comment and ensure there is proper error handling.
|
|
// eslint-disable-next-line @typescript-eslint/no-floating-promises
|
|
this.eventCollectionService.collect(EventType.Cipher_ClientCopiedPassword, this.cipherId);
|
|
} else if (typeI18nKey === "securityCode") {
|
|
// FIXME: Verify that this floating promise is intentional. If it is, add an explanatory comment and ensure there is proper error handling.
|
|
// eslint-disable-next-line @typescript-eslint/no-floating-promises
|
|
this.eventCollectionService.collect(EventType.Cipher_ClientCopiedCardCode, this.cipherId);
|
|
} else if (aType === "H_Field") {
|
|
// FIXME: Verify that this floating promise is intentional. If it is, add an explanatory comment and ensure there is proper error handling.
|
|
// eslint-disable-next-line @typescript-eslint/no-floating-promises
|
|
this.eventCollectionService.collect(EventType.Cipher_ClientCopiedHiddenField, this.cipherId);
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
setTextDataOnDrag(event: DragEvent, data: string) {
|
|
event.dataTransfer.setData("text", data);
|
|
}
|
|
|
|
async downloadAttachment(attachment: AttachmentView) {
|
|
if (!(await this.promptPassword())) {
|
|
return;
|
|
}
|
|
const a = attachment as any;
|
|
if (a.downloading) {
|
|
return;
|
|
}
|
|
|
|
if (this.cipher.organizationId == null && !this.canAccessPremium) {
|
|
this.platformUtilsService.showToast(
|
|
"error",
|
|
this.i18nService.t("premiumRequired"),
|
|
this.i18nService.t("premiumRequiredDesc"),
|
|
);
|
|
return;
|
|
}
|
|
|
|
let url: string;
|
|
try {
|
|
const attachmentDownloadResponse = await this.apiService.getAttachmentData(
|
|
this.cipher.id,
|
|
attachment.id,
|
|
);
|
|
url = attachmentDownloadResponse.url;
|
|
} catch (e) {
|
|
if (e instanceof ErrorResponse && (e as ErrorResponse).statusCode === 404) {
|
|
url = attachment.url;
|
|
} else if (e instanceof ErrorResponse) {
|
|
throw new Error((e as ErrorResponse).getSingleMessage());
|
|
} else {
|
|
throw e;
|
|
}
|
|
}
|
|
|
|
a.downloading = true;
|
|
const response = await fetch(new Request(url, { cache: "no-store" }));
|
|
if (response.status !== 200) {
|
|
this.platformUtilsService.showToast("error", null, this.i18nService.t("errorOccurred"));
|
|
a.downloading = false;
|
|
return;
|
|
}
|
|
|
|
try {
|
|
const encBuf = await EncArrayBuffer.fromResponse(response);
|
|
const key =
|
|
attachment.key != null
|
|
? attachment.key
|
|
: await this.cryptoService.getOrgKey(this.cipher.organizationId);
|
|
const decBuf = await this.cryptoService.decryptFromBytes(encBuf, key);
|
|
this.fileDownloadService.download({
|
|
fileName: attachment.fileName,
|
|
blobData: decBuf,
|
|
});
|
|
} catch (e) {
|
|
this.platformUtilsService.showToast("error", null, this.i18nService.t("errorOccurred"));
|
|
}
|
|
|
|
a.downloading = false;
|
|
}
|
|
|
|
protected deleteCipher() {
|
|
return this.cipher.isDeleted
|
|
? this.cipherService.deleteWithServer(this.cipher.id)
|
|
: this.cipherService.softDeleteWithServer(this.cipher.id);
|
|
}
|
|
|
|
protected restoreCipher() {
|
|
return this.cipherService.restoreWithServer(this.cipher.id);
|
|
}
|
|
|
|
protected async promptPassword() {
|
|
if (this.cipher.reprompt === CipherRepromptType.None || this.passwordReprompted) {
|
|
return true;
|
|
}
|
|
|
|
return (this.passwordReprompted = await this.passwordRepromptService.showPasswordPrompt());
|
|
}
|
|
|
|
private cleanUp() {
|
|
this.totpCode = null;
|
|
this.cipher = null;
|
|
this.folder = null;
|
|
this.showPassword = false;
|
|
this.showCardNumber = false;
|
|
this.showCardCode = false;
|
|
this.passwordReprompted = false;
|
|
if (this.totpInterval) {
|
|
clearInterval(this.totpInterval);
|
|
}
|
|
}
|
|
|
|
private async totpUpdateCode() {
|
|
if (
|
|
this.cipher == null ||
|
|
this.cipher.type !== CipherType.Login ||
|
|
this.cipher.login.totp == null
|
|
) {
|
|
if (this.totpInterval) {
|
|
clearInterval(this.totpInterval);
|
|
}
|
|
return;
|
|
}
|
|
|
|
this.totpCode = await this.totpService.getCode(this.cipher.login.totp);
|
|
if (this.totpCode != null) {
|
|
if (this.totpCode.length > 4) {
|
|
const half = Math.floor(this.totpCode.length / 2);
|
|
this.totpCodeFormatted =
|
|
this.totpCode.substring(0, half) + " " + this.totpCode.substring(half);
|
|
} else {
|
|
this.totpCodeFormatted = this.totpCode;
|
|
}
|
|
} else {
|
|
this.totpCodeFormatted = null;
|
|
if (this.totpInterval) {
|
|
clearInterval(this.totpInterval);
|
|
}
|
|
}
|
|
}
|
|
|
|
private async totpTick(intervalSeconds: number) {
|
|
const epoch = Math.round(new Date().getTime() / 1000.0);
|
|
const mod = epoch % intervalSeconds;
|
|
|
|
this.totpSec = intervalSeconds - mod;
|
|
this.totpDash = +(Math.round(((78.6 / intervalSeconds) * mod + "e+2") as any) + "e-2");
|
|
this.totpLow = this.totpSec <= 7;
|
|
if (mod === 0) {
|
|
await this.totpUpdateCode();
|
|
}
|
|
}
|
|
}
|