mirror of
https://github.com/bitwarden/browser
synced 2025-12-10 05:13:29 +00:00
* move cli service-container to new folder * fix imports * add tsconfig and fix type issues in other services * fix more imports in service-container * make ts server happy in service-container * fix actual bugs in cli service-container * fix package json reference path * fix service-container import * update type on cipher service
216 lines
7.3 KiB
TypeScript
216 lines
7.3 KiB
TypeScript
import { firstValueFrom, map, Observable } from "rxjs";
|
|
import { Jsonify } from "type-fest";
|
|
|
|
import { CryptoService } from "../../platform/abstractions/crypto.service";
|
|
import { I18nService } from "../../platform/abstractions/i18n.service";
|
|
import { Utils } from "../../platform/misc/utils";
|
|
import {
|
|
ActiveUserState,
|
|
StateProvider,
|
|
COLLECTION_DATA,
|
|
DeriveDefinition,
|
|
DerivedState,
|
|
UserKeyDefinition,
|
|
} from "../../platform/state";
|
|
import { CollectionId, OrganizationId, UserId } from "../../types/guid";
|
|
import { CollectionService as CollectionServiceAbstraction } from "../../vault/abstractions/collection.service";
|
|
import { CollectionData } from "../models/data/collection.data";
|
|
import { Collection } from "../models/domain/collection";
|
|
import { TreeNode } from "../models/domain/tree-node";
|
|
import { CollectionView } from "../models/view/collection.view";
|
|
import { ServiceUtils } from "../service-utils";
|
|
|
|
const ENCRYPTED_COLLECTION_DATA_KEY = UserKeyDefinition.record<CollectionData, CollectionId>(
|
|
COLLECTION_DATA,
|
|
"collections",
|
|
{
|
|
deserializer: (jsonData: Jsonify<CollectionData>) => CollectionData.fromJSON(jsonData),
|
|
clearOn: ["logout"],
|
|
},
|
|
);
|
|
|
|
const DECRYPTED_COLLECTION_DATA_KEY = DeriveDefinition.from<
|
|
Record<CollectionId, CollectionData>,
|
|
CollectionView[],
|
|
{ collectionService: CollectionService }
|
|
>(ENCRYPTED_COLLECTION_DATA_KEY, {
|
|
deserializer: (obj) => obj.map((collection) => CollectionView.fromJSON(collection)),
|
|
derive: async (collections: Record<CollectionId, CollectionData>, { collectionService }) => {
|
|
const data: Collection[] = [];
|
|
for (const id in collections ?? {}) {
|
|
const collectionId = id as CollectionId;
|
|
data.push(new Collection(collections[collectionId]));
|
|
}
|
|
return await collectionService.decryptMany(data);
|
|
},
|
|
});
|
|
|
|
const NestingDelimiter = "/";
|
|
|
|
export class CollectionService implements CollectionServiceAbstraction {
|
|
private encryptedCollectionDataState: ActiveUserState<Record<CollectionId, CollectionData>>;
|
|
encryptedCollections$: Observable<Collection[]>;
|
|
private decryptedCollectionDataState: DerivedState<CollectionView[]>;
|
|
decryptedCollections$: Observable<CollectionView[]>;
|
|
|
|
decryptedCollectionViews$(ids: CollectionId[]): Observable<CollectionView[]> {
|
|
return this.decryptedCollections$.pipe(
|
|
map((collections) => collections.filter((c) => ids.includes(c.id as CollectionId))),
|
|
);
|
|
}
|
|
|
|
constructor(
|
|
private cryptoService: CryptoService,
|
|
private i18nService: I18nService,
|
|
protected stateProvider: StateProvider,
|
|
) {
|
|
this.encryptedCollectionDataState = this.stateProvider.getActive(ENCRYPTED_COLLECTION_DATA_KEY);
|
|
this.encryptedCollections$ = this.encryptedCollectionDataState.state$.pipe(
|
|
map((collections) => {
|
|
const response: Collection[] = [];
|
|
for (const id in collections ?? {}) {
|
|
response.push(new Collection(collections[id as CollectionId]));
|
|
}
|
|
return response;
|
|
}),
|
|
);
|
|
|
|
this.decryptedCollectionDataState = this.stateProvider.getDerived(
|
|
this.encryptedCollectionDataState.state$,
|
|
DECRYPTED_COLLECTION_DATA_KEY,
|
|
{ collectionService: this },
|
|
);
|
|
|
|
this.decryptedCollections$ = this.decryptedCollectionDataState.state$;
|
|
}
|
|
|
|
async clearActiveUserCache(): Promise<void> {
|
|
await this.decryptedCollectionDataState.forceValue(null);
|
|
}
|
|
|
|
async encrypt(model: CollectionView): Promise<Collection> {
|
|
if (model.organizationId == null) {
|
|
throw new Error("Collection has no organization id.");
|
|
}
|
|
const key = await this.cryptoService.getOrgKey(model.organizationId);
|
|
if (key == null) {
|
|
throw new Error("No key for this collection's organization.");
|
|
}
|
|
const collection = new Collection();
|
|
collection.id = model.id;
|
|
collection.organizationId = model.organizationId;
|
|
collection.readOnly = model.readOnly;
|
|
collection.externalId = model.externalId;
|
|
collection.name = await this.cryptoService.encrypt(model.name, key);
|
|
return collection;
|
|
}
|
|
|
|
async decryptMany(collections: Collection[]): Promise<CollectionView[]> {
|
|
if (collections == null) {
|
|
return [];
|
|
}
|
|
const decCollections: CollectionView[] = [];
|
|
|
|
const organizationKeys = await firstValueFrom(this.cryptoService.activeUserOrgKeys$);
|
|
|
|
const promises: Promise<any>[] = [];
|
|
collections.forEach((collection) => {
|
|
promises.push(
|
|
collection
|
|
.decrypt(organizationKeys[collection.organizationId as OrganizationId])
|
|
.then((c) => decCollections.push(c)),
|
|
);
|
|
});
|
|
await Promise.all(promises);
|
|
return decCollections.sort(Utils.getSortFunction(this.i18nService, "name"));
|
|
}
|
|
|
|
async get(id: string): Promise<Collection> {
|
|
return (
|
|
(await firstValueFrom(
|
|
this.encryptedCollections$.pipe(map((cs) => cs.find((c) => c.id === id))),
|
|
)) ?? null
|
|
);
|
|
}
|
|
|
|
async getAll(): Promise<Collection[]> {
|
|
return await firstValueFrom(this.encryptedCollections$);
|
|
}
|
|
|
|
async getAllDecrypted(): Promise<CollectionView[]> {
|
|
return await firstValueFrom(this.decryptedCollections$);
|
|
}
|
|
|
|
async getAllNested(collections: CollectionView[] = null): Promise<TreeNode<CollectionView>[]> {
|
|
if (collections == null) {
|
|
collections = await this.getAllDecrypted();
|
|
}
|
|
const nodes: TreeNode<CollectionView>[] = [];
|
|
collections.forEach((c) => {
|
|
const collectionCopy = new CollectionView();
|
|
collectionCopy.id = c.id;
|
|
collectionCopy.organizationId = c.organizationId;
|
|
const parts = c.name != null ? c.name.replace(/^\/+|\/+$/g, "").split(NestingDelimiter) : [];
|
|
ServiceUtils.nestedTraverse(nodes, 0, parts, collectionCopy, null, NestingDelimiter);
|
|
});
|
|
return nodes;
|
|
}
|
|
|
|
/**
|
|
* @deprecated August 30 2022: Moved to new Vault Filter Service
|
|
* Remove when Desktop and Browser are updated
|
|
*/
|
|
async getNested(id: string): Promise<TreeNode<CollectionView>> {
|
|
const collections = await this.getAllNested();
|
|
return ServiceUtils.getTreeNodeObjectFromList(collections, id) as TreeNode<CollectionView>;
|
|
}
|
|
|
|
async upsert(toUpdate: CollectionData | CollectionData[]): Promise<void> {
|
|
if (toUpdate == null) {
|
|
return;
|
|
}
|
|
await this.encryptedCollectionDataState.update((collections) => {
|
|
if (collections == null) {
|
|
collections = {};
|
|
}
|
|
if (Array.isArray(toUpdate)) {
|
|
toUpdate.forEach((c) => {
|
|
collections[c.id] = c;
|
|
});
|
|
} else {
|
|
collections[toUpdate.id] = toUpdate;
|
|
}
|
|
return collections;
|
|
});
|
|
}
|
|
|
|
async replace(collections: Record<CollectionId, CollectionData>): Promise<void> {
|
|
await this.encryptedCollectionDataState.update(() => collections);
|
|
}
|
|
|
|
async clear(userId?: UserId): Promise<void> {
|
|
if (userId == null) {
|
|
await this.encryptedCollectionDataState.update(() => null);
|
|
await this.decryptedCollectionDataState.forceValue(null);
|
|
} else {
|
|
await this.stateProvider.getUser(userId, ENCRYPTED_COLLECTION_DATA_KEY).update(() => null);
|
|
}
|
|
}
|
|
|
|
async delete(id: CollectionId | CollectionId[]): Promise<any> {
|
|
await this.encryptedCollectionDataState.update((collections) => {
|
|
if (collections == null) {
|
|
collections = {};
|
|
}
|
|
if (typeof id === "string") {
|
|
delete collections[id];
|
|
} else {
|
|
(id as CollectionId[]).forEach((i) => {
|
|
delete collections[i];
|
|
});
|
|
}
|
|
return collections;
|
|
});
|
|
}
|
|
}
|