mirror of
https://github.com/bitwarden/browser
synced 2025-12-23 19:53:43 +00:00
* refactor: add barrel file for admin-console enums, update references, refs AC-1202 * fix: lint/prettier updates, refs AC-1202 * refactor: add enum suffix, refs AC-1202 * refactor: add barrel file for billing enums, update imports to use it, refs AC-1202 * fix: prettier, refs AC-1202 * refactor: add enum suffix for billing enums, refs AC-1202
83 lines
3.5 KiB
TypeScript
83 lines
3.5 KiB
TypeScript
import { CryptoService } from "../../abstractions/crypto.service";
|
|
import { StateService } from "../../abstractions/state.service";
|
|
import { VaultTimeoutSettingsService as VaultTimeoutSettingsServiceAbstraction } from "../../abstractions/vaultTimeout/vaultTimeoutSettings.service";
|
|
import { PolicyService } from "../../admin-console/abstractions/policy/policy.service.abstraction";
|
|
import { PolicyType } from "../../admin-console/enums";
|
|
import { TokenService } from "../../auth/abstractions/token.service";
|
|
|
|
export class VaultTimeoutSettingsService implements VaultTimeoutSettingsServiceAbstraction {
|
|
constructor(
|
|
private cryptoService: CryptoService,
|
|
private tokenService: TokenService,
|
|
private policyService: PolicyService,
|
|
private stateService: StateService
|
|
) {}
|
|
|
|
async setVaultTimeoutOptions(timeout: number, action: string): Promise<void> {
|
|
await this.stateService.setVaultTimeout(timeout);
|
|
|
|
// We swap these tokens from being on disk for lock actions, and in memory for logout actions
|
|
// Get them here to set them to their new location after changing the timeout action and clearing if needed
|
|
const token = await this.tokenService.getToken();
|
|
const refreshToken = await this.tokenService.getRefreshToken();
|
|
const clientId = await this.tokenService.getClientId();
|
|
const clientSecret = await this.tokenService.getClientSecret();
|
|
|
|
const currentAction = await this.stateService.getVaultTimeoutAction();
|
|
if ((timeout != null || timeout === 0) && action === "logOut" && action !== currentAction) {
|
|
// if we have a vault timeout and the action is log out, reset tokens
|
|
await this.tokenService.clearToken();
|
|
}
|
|
|
|
await this.stateService.setVaultTimeoutAction(action);
|
|
|
|
await this.tokenService.setToken(token);
|
|
await this.tokenService.setRefreshToken(refreshToken);
|
|
await this.tokenService.setClientId(clientId);
|
|
await this.tokenService.setClientSecret(clientSecret);
|
|
|
|
await this.cryptoService.toggleKey();
|
|
}
|
|
|
|
async isPinLockSet(): Promise<[boolean, boolean]> {
|
|
const protectedPin = await this.stateService.getProtectedPin();
|
|
const pinProtectedKey = await this.stateService.getEncryptedPinProtected();
|
|
return [protectedPin != null, pinProtectedKey != null];
|
|
}
|
|
|
|
async isBiometricLockSet(): Promise<boolean> {
|
|
return await this.stateService.getBiometricUnlock();
|
|
}
|
|
|
|
async getVaultTimeout(userId?: string): Promise<number> {
|
|
const vaultTimeout = await this.stateService.getVaultTimeout({ userId: userId });
|
|
|
|
if (
|
|
await this.policyService.policyAppliesToUser(PolicyType.MaximumVaultTimeout, null, userId)
|
|
) {
|
|
const policy = await this.policyService.getAll(PolicyType.MaximumVaultTimeout, userId);
|
|
// Remove negative values, and ensure it's smaller than maximum allowed value according to policy
|
|
let timeout = Math.min(vaultTimeout, policy[0].data.minutes);
|
|
|
|
if (vaultTimeout == null || timeout < 0) {
|
|
timeout = policy[0].data.minutes;
|
|
}
|
|
|
|
// We really shouldn't need to set the value here, but multiple services relies on this value being correct.
|
|
if (vaultTimeout !== timeout) {
|
|
await this.stateService.setVaultTimeout(timeout, { userId: userId });
|
|
}
|
|
|
|
return timeout;
|
|
}
|
|
|
|
return vaultTimeout;
|
|
}
|
|
|
|
async clear(userId?: string): Promise<void> {
|
|
await this.stateService.setEverBeenUnlocked(false, { userId: userId });
|
|
await this.stateService.setDecryptedPinProtected(null, { userId: userId });
|
|
await this.stateService.setProtectedPin(null, { userId: userId });
|
|
}
|
|
}
|