mirror of
https://github.com/kmc7468/arkvault.git
synced 2025-12-15 22:38:47 +00:00
암호 키 생성 및 등록시 HSK도 함께 생성 및 등록하도록 변경
This commit is contained in:
@@ -1,6 +1,6 @@
|
|||||||
import type { ClientInit } from "@sveltejs/kit";
|
import type { ClientInit } from "@sveltejs/kit";
|
||||||
import { getClientKey, getMasterKeys } from "$lib/indexedDB";
|
import { getClientKey, getMasterKeys, getHmacSecrets } from "$lib/indexedDB";
|
||||||
import { clientKeyStore, masterKeyStore } from "$lib/stores";
|
import { clientKeyStore, masterKeyStore, hmacSecretStore } from "$lib/stores";
|
||||||
|
|
||||||
const prepareClientKeyStore = async () => {
|
const prepareClientKeyStore = async () => {
|
||||||
const [encryptKey, decryptKey, signKey, verifyKey] = await Promise.all([
|
const [encryptKey, decryptKey, signKey, verifyKey] = await Promise.all([
|
||||||
@@ -21,6 +21,13 @@ const prepareMasterKeyStore = async () => {
|
|||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
|
||||||
export const init: ClientInit = async () => {
|
const prepareHmacSecretStore = async () => {
|
||||||
await Promise.all([prepareClientKeyStore(), prepareMasterKeyStore()]);
|
const hmacSecrets = await getHmacSecrets();
|
||||||
|
if (hmacSecrets.length > 0) {
|
||||||
|
hmacSecretStore.set(new Map(hmacSecrets.map((hmacSecret) => [hmacSecret.version, hmacSecret])));
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
export const init: ClientInit = async () => {
|
||||||
|
await Promise.all([prepareClientKeyStore(), prepareMasterKeyStore(), prepareHmacSecretStore()]);
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -11,6 +11,7 @@ interface KeyExportState {
|
|||||||
verifyKeyBase64: string;
|
verifyKeyBase64: string;
|
||||||
|
|
||||||
masterKeyWrapped: string;
|
masterKeyWrapped: string;
|
||||||
|
hmacSecretWrapped: string;
|
||||||
}
|
}
|
||||||
|
|
||||||
const useAutoNull = <T>(value: T | null) => {
|
const useAutoNull = <T>(value: T | null) => {
|
||||||
|
|||||||
@@ -7,22 +7,28 @@ interface ClientKey {
|
|||||||
key: CryptoKey;
|
key: CryptoKey;
|
||||||
}
|
}
|
||||||
|
|
||||||
type MasterKeyState = "active" | "retired";
|
|
||||||
|
|
||||||
interface MasterKey {
|
interface MasterKey {
|
||||||
version: number;
|
version: number;
|
||||||
state: MasterKeyState;
|
state: "active" | "retired";
|
||||||
key: CryptoKey;
|
key: CryptoKey;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
interface HmacSecret {
|
||||||
|
version: number;
|
||||||
|
state: "active";
|
||||||
|
secret: CryptoKey;
|
||||||
|
}
|
||||||
|
|
||||||
const keyStore = new Dexie("keyStore") as Dexie & {
|
const keyStore = new Dexie("keyStore") as Dexie & {
|
||||||
clientKey: EntityTable<ClientKey, "usage">;
|
clientKey: EntityTable<ClientKey, "usage">;
|
||||||
masterKey: EntityTable<MasterKey, "version">;
|
masterKey: EntityTable<MasterKey, "version">;
|
||||||
|
hmacSecret: EntityTable<HmacSecret, "version">;
|
||||||
};
|
};
|
||||||
|
|
||||||
keyStore.version(1).stores({
|
keyStore.version(1).stores({
|
||||||
clientKey: "usage",
|
clientKey: "usage",
|
||||||
masterKey: "version",
|
masterKey: "version",
|
||||||
|
hmacSecret: "version",
|
||||||
});
|
});
|
||||||
|
|
||||||
export const getClientKey = async (usage: ClientKeyUsage) => {
|
export const getClientKey = async (usage: ClientKeyUsage) => {
|
||||||
@@ -62,3 +68,14 @@ export const storeMasterKeys = async (keys: MasterKey[]) => {
|
|||||||
}
|
}
|
||||||
await keyStore.masterKey.bulkPut(keys);
|
await keyStore.masterKey.bulkPut(keys);
|
||||||
};
|
};
|
||||||
|
|
||||||
|
export const getHmacSecrets = async () => {
|
||||||
|
return await keyStore.hmacSecret.toArray();
|
||||||
|
};
|
||||||
|
|
||||||
|
export const storeHmacSecrets = async (secrets: HmacSecret[]) => {
|
||||||
|
if (secrets.some(({ secret }) => secret.extractable)) {
|
||||||
|
throw new Error("Hmac secrets must be nonextractable");
|
||||||
|
}
|
||||||
|
await keyStore.hmacSecret.bulkPut(secrets);
|
||||||
|
};
|
||||||
|
|||||||
@@ -55,6 +55,27 @@ export const unwrapDataKey = async (dataKeyWrapped: string, masterKey: CryptoKey
|
|||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
export const wrapHmacSecret = async (hmacSecret: CryptoKey, masterKey: CryptoKey) => {
|
||||||
|
return encodeToBase64(await window.crypto.subtle.wrapKey("raw", hmacSecret, masterKey, "AES-KW"));
|
||||||
|
};
|
||||||
|
|
||||||
|
export const unwrapHmacSecret = async (hmacSecretWrapped: string, masterKey: CryptoKey) => {
|
||||||
|
return {
|
||||||
|
hmacSecret: await window.crypto.subtle.unwrapKey(
|
||||||
|
"raw",
|
||||||
|
decodeFromBase64(hmacSecretWrapped),
|
||||||
|
masterKey,
|
||||||
|
"AES-KW",
|
||||||
|
{
|
||||||
|
name: "HMAC",
|
||||||
|
hash: "SHA-256",
|
||||||
|
} satisfies HmacImportParams,
|
||||||
|
false, // Nonextractable
|
||||||
|
["sign", "verify"],
|
||||||
|
),
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
export const encryptData = async (data: BufferSource, dataKey: CryptoKey) => {
|
export const encryptData = async (data: BufferSource, dataKey: CryptoKey) => {
|
||||||
const iv = window.crypto.getRandomValues(new Uint8Array(12));
|
const iv = window.crypto.getRandomValues(new Uint8Array(12));
|
||||||
const ciphertext = await window.crypto.subtle.encrypt(
|
const ciphertext = await window.crypto.subtle.encrypt(
|
||||||
|
|||||||
@@ -95,7 +95,7 @@ export const unwrapMasterKey = async (
|
|||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
export const signMessage = async (message: BufferSource, signKey: CryptoKey) => {
|
export const signMessageRSA = async (message: BufferSource, signKey: CryptoKey) => {
|
||||||
return await window.crypto.subtle.sign(
|
return await window.crypto.subtle.sign(
|
||||||
{
|
{
|
||||||
name: "RSA-PSS",
|
name: "RSA-PSS",
|
||||||
@@ -106,7 +106,7 @@ export const signMessage = async (message: BufferSource, signKey: CryptoKey) =>
|
|||||||
);
|
);
|
||||||
};
|
};
|
||||||
|
|
||||||
export const verifySignature = async (
|
export const verifySignatureRSA = async (
|
||||||
message: BufferSource,
|
message: BufferSource,
|
||||||
signature: BufferSource,
|
signature: BufferSource,
|
||||||
verifyKey: CryptoKey,
|
verifyKey: CryptoKey,
|
||||||
@@ -131,7 +131,7 @@ export const signMasterKeyWrapped = async (
|
|||||||
version: masterKeyVersion,
|
version: masterKeyVersion,
|
||||||
key: masterKeyWrapped,
|
key: masterKeyWrapped,
|
||||||
});
|
});
|
||||||
return encodeToBase64(await signMessage(encodeString(serialized), signKey));
|
return encodeToBase64(await signMessageRSA(encodeString(serialized), signKey));
|
||||||
};
|
};
|
||||||
|
|
||||||
export const verifyMasterKeyWrapped = async (
|
export const verifyMasterKeyWrapped = async (
|
||||||
@@ -144,7 +144,7 @@ export const verifyMasterKeyWrapped = async (
|
|||||||
version: masterKeyVersion,
|
version: masterKeyVersion,
|
||||||
key: masterKeyWrapped,
|
key: masterKeyWrapped,
|
||||||
});
|
});
|
||||||
return await verifySignature(
|
return await verifySignatureRSA(
|
||||||
encodeString(serialized),
|
encodeString(serialized),
|
||||||
decodeFromBase64(masterKeyWrappedSig),
|
decodeFromBase64(masterKeyWrappedSig),
|
||||||
verifyKey,
|
verifyKey,
|
||||||
|
|||||||
@@ -1,3 +1,20 @@
|
|||||||
export const digestMessage = async (message: BufferSource) => {
|
export const digestMessage = async (message: BufferSource) => {
|
||||||
return await window.crypto.subtle.digest("SHA-256", message);
|
return await window.crypto.subtle.digest("SHA-256", message);
|
||||||
};
|
};
|
||||||
|
|
||||||
|
export const generateHmacSecret = async () => {
|
||||||
|
return {
|
||||||
|
hmacSecret: await window.crypto.subtle.generateKey(
|
||||||
|
{
|
||||||
|
name: "HMAC",
|
||||||
|
hash: "SHA-256",
|
||||||
|
} satisfies HmacKeyGenParams,
|
||||||
|
true,
|
||||||
|
["sign", "verify"],
|
||||||
|
),
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
export const signMessageHmac = async (message: BufferSource, hmacSecret: CryptoKey) => {
|
||||||
|
return await window.crypto.subtle.sign("HMAC", hmacSecret, message);
|
||||||
|
};
|
||||||
|
|||||||
@@ -1,5 +1,5 @@
|
|||||||
import { callPostApi } from "$lib/hooks";
|
import { callPostApi } from "$lib/hooks";
|
||||||
import { encodeToBase64, decryptChallenge, signMessage } from "$lib/modules/crypto";
|
import { encodeToBase64, decryptChallenge, signMessageRSA } from "$lib/modules/crypto";
|
||||||
import type {
|
import type {
|
||||||
SessionUpgradeRequest,
|
SessionUpgradeRequest,
|
||||||
SessionUpgradeResponse,
|
SessionUpgradeResponse,
|
||||||
@@ -20,7 +20,7 @@ export const requestSessionUpgrade = async (
|
|||||||
|
|
||||||
const { challenge }: SessionUpgradeResponse = await res.json();
|
const { challenge }: SessionUpgradeResponse = await res.json();
|
||||||
const answer = await decryptChallenge(challenge, decryptKey);
|
const answer = await decryptChallenge(challenge, decryptKey);
|
||||||
const answerSig = await signMessage(answer, signKey);
|
const answerSig = await signMessageRSA(answer, signKey);
|
||||||
|
|
||||||
res = await callPostApi<SessionUpgradeVerifyRequest>("/api/auth/upgradeSession/verify", {
|
res = await callPostApi<SessionUpgradeVerifyRequest>("/api/auth/upgradeSession/verify", {
|
||||||
answer: encodeToBase64(answer),
|
answer: encodeToBase64(answer),
|
||||||
|
|||||||
@@ -3,7 +3,7 @@ import { storeMasterKeys } from "$lib/indexedDB";
|
|||||||
import {
|
import {
|
||||||
encodeToBase64,
|
encodeToBase64,
|
||||||
decryptChallenge,
|
decryptChallenge,
|
||||||
signMessage,
|
signMessageRSA,
|
||||||
unwrapMasterKey,
|
unwrapMasterKey,
|
||||||
verifyMasterKeyWrapped,
|
verifyMasterKeyWrapped,
|
||||||
} from "$lib/modules/crypto";
|
} from "$lib/modules/crypto";
|
||||||
@@ -29,7 +29,7 @@ export const requestClientRegistration = async (
|
|||||||
|
|
||||||
const { challenge }: ClientRegisterResponse = await res.json();
|
const { challenge }: ClientRegisterResponse = await res.json();
|
||||||
const answer = await decryptChallenge(challenge, decryptKey);
|
const answer = await decryptChallenge(challenge, decryptKey);
|
||||||
const answerSig = await signMessage(answer, signKey);
|
const answerSig = await signMessageRSA(answer, signKey);
|
||||||
|
|
||||||
res = await callPostApi<ClientRegisterVerifyRequest>("/api/client/register/verify", {
|
res = await callPostApi<ClientRegisterVerifyRequest>("/api/client/register/verify", {
|
||||||
answer: encodeToBase64(answer),
|
answer: encodeToBase64(answer),
|
||||||
|
|||||||
@@ -13,6 +13,14 @@ export interface MasterKey {
|
|||||||
key: CryptoKey;
|
key: CryptoKey;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
export interface HmacSecret {
|
||||||
|
version: number;
|
||||||
|
state: "active";
|
||||||
|
secret: CryptoKey;
|
||||||
|
}
|
||||||
|
|
||||||
export const clientKeyStore = writable<ClientKeys | null>(null);
|
export const clientKeyStore = writable<ClientKeys | null>(null);
|
||||||
|
|
||||||
export const masterKeyStore = writable<Map<number, MasterKey> | null>(null);
|
export const masterKeyStore = writable<Map<number, MasterKey> | null>(null);
|
||||||
|
|
||||||
|
export const hmacSecretStore = writable<Map<number, HmacSecret> | null>(null);
|
||||||
|
|||||||
@@ -11,7 +11,7 @@
|
|||||||
requestClientRegistration,
|
requestClientRegistration,
|
||||||
storeClientKeys,
|
storeClientKeys,
|
||||||
requestSessionUpgrade,
|
requestSessionUpgrade,
|
||||||
requestInitialMasterKeyRegistration,
|
requestInitialMasterKeyAndHmacSecretRegistration,
|
||||||
} from "./service";
|
} from "./service";
|
||||||
|
|
||||||
import IconKey from "~icons/material-symbols/key";
|
import IconKey from "~icons/material-symbols/key";
|
||||||
@@ -69,9 +69,13 @@
|
|||||||
throw new Error("Failed to upgrade session");
|
throw new Error("Failed to upgrade session");
|
||||||
|
|
||||||
if (
|
if (
|
||||||
!(await requestInitialMasterKeyRegistration(data.masterKeyWrapped, $clientKeyStore.signKey))
|
!(await requestInitialMasterKeyAndHmacSecretRegistration(
|
||||||
|
data.masterKeyWrapped,
|
||||||
|
data.hmacSecretWrapped,
|
||||||
|
$clientKeyStore.signKey,
|
||||||
|
))
|
||||||
)
|
)
|
||||||
throw new Error("Failed to register initial MEK");
|
throw new Error("Failed to register initial MEK and HSK");
|
||||||
|
|
||||||
await goto("/client/pending?redirect=" + encodeURIComponent(data.redirectPath));
|
await goto("/client/pending?redirect=" + encodeURIComponent(data.redirectPath));
|
||||||
} catch (e) {
|
} catch (e) {
|
||||||
|
|||||||
@@ -1,7 +1,10 @@
|
|||||||
import { callPostApi } from "$lib/hooks";
|
import { callPostApi } from "$lib/hooks";
|
||||||
import { storeClientKey } from "$lib/indexedDB";
|
import { storeClientKey } from "$lib/indexedDB";
|
||||||
import { signMasterKeyWrapped } from "$lib/modules/crypto";
|
import { signMasterKeyWrapped } from "$lib/modules/crypto";
|
||||||
import type { InitialMasterKeyRegisterRequest } from "$lib/server/schemas";
|
import type {
|
||||||
|
InitialMasterKeyRegisterRequest,
|
||||||
|
InitialHmacSecretRegisterRequest,
|
||||||
|
} from "$lib/server/schemas";
|
||||||
import type { ClientKeys } from "$lib/stores";
|
import type { ClientKeys } from "$lib/stores";
|
||||||
|
|
||||||
export { requestSessionUpgrade } from "$lib/services/auth";
|
export { requestSessionUpgrade } from "$lib/services/auth";
|
||||||
@@ -44,13 +47,22 @@ export const storeClientKeys = async (clientKeys: ClientKeys) => {
|
|||||||
]);
|
]);
|
||||||
};
|
};
|
||||||
|
|
||||||
export const requestInitialMasterKeyRegistration = async (
|
export const requestInitialMasterKeyAndHmacSecretRegistration = async (
|
||||||
masterKeyWrapped: string,
|
masterKeyWrapped: string,
|
||||||
|
hmacSecretWrapped: string,
|
||||||
signKey: CryptoKey,
|
signKey: CryptoKey,
|
||||||
) => {
|
) => {
|
||||||
const res = await callPostApi<InitialMasterKeyRegisterRequest>("/api/mek/register/initial", {
|
let res = await callPostApi<InitialMasterKeyRegisterRequest>("/api/mek/register/initial", {
|
||||||
mek: masterKeyWrapped,
|
mek: masterKeyWrapped,
|
||||||
mekSig: await signMasterKeyWrapped(masterKeyWrapped, 1, signKey),
|
mekSig: await signMasterKeyWrapped(masterKeyWrapped, 1, signKey),
|
||||||
});
|
});
|
||||||
return res.ok || res.status === 409;
|
if (!res.ok) {
|
||||||
|
return res.status === 409;
|
||||||
|
}
|
||||||
|
|
||||||
|
res = await callPostApi<InitialHmacSecretRegisterRequest>("/api/hsk/register/initial", {
|
||||||
|
mekVersion: 1,
|
||||||
|
hsk: hmacSecretWrapped,
|
||||||
|
});
|
||||||
|
return res.ok;
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -6,7 +6,11 @@
|
|||||||
import { gotoStateful } from "$lib/hooks";
|
import { gotoStateful } from "$lib/hooks";
|
||||||
import { clientKeyStore } from "$lib/stores";
|
import { clientKeyStore } from "$lib/stores";
|
||||||
import Order from "./Order.svelte";
|
import Order from "./Order.svelte";
|
||||||
import { generateClientKeys, generateInitialMasterKey } from "./service";
|
import {
|
||||||
|
generateClientKeys,
|
||||||
|
generateInitialMasterKey,
|
||||||
|
generateInitialHmacSecret,
|
||||||
|
} from "./service";
|
||||||
|
|
||||||
import IconKey from "~icons/material-symbols/key";
|
import IconKey from "~icons/material-symbols/key";
|
||||||
|
|
||||||
@@ -36,12 +40,14 @@
|
|||||||
// TODO: Loading indicator
|
// TODO: Loading indicator
|
||||||
|
|
||||||
const { encryptKey, ...clientKeys } = await generateClientKeys();
|
const { encryptKey, ...clientKeys } = await generateClientKeys();
|
||||||
const { masterKeyWrapped } = await generateInitialMasterKey(encryptKey);
|
const { masterKey, masterKeyWrapped } = await generateInitialMasterKey(encryptKey);
|
||||||
|
const { hmacSecretWrapped } = await generateInitialHmacSecret(masterKey);
|
||||||
|
|
||||||
await gotoStateful("/key/export", {
|
await gotoStateful("/key/export", {
|
||||||
...clientKeys,
|
...clientKeys,
|
||||||
redirectPath: data.redirectPath,
|
redirectPath: data.redirectPath,
|
||||||
masterKeyWrapped,
|
masterKeyWrapped,
|
||||||
|
hmacSecretWrapped,
|
||||||
});
|
});
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|||||||
@@ -3,8 +3,11 @@ import {
|
|||||||
generateSigningKeyPair,
|
generateSigningKeyPair,
|
||||||
exportRSAKeyToBase64,
|
exportRSAKeyToBase64,
|
||||||
makeRSAKeyNonextractable,
|
makeRSAKeyNonextractable,
|
||||||
generateMasterKey,
|
|
||||||
wrapMasterKey,
|
wrapMasterKey,
|
||||||
|
generateMasterKey,
|
||||||
|
makeAESKeyNonextractable,
|
||||||
|
wrapHmacSecret,
|
||||||
|
generateHmacSecret,
|
||||||
} from "$lib/modules/crypto";
|
} from "$lib/modules/crypto";
|
||||||
import { clientKeyStore } from "$lib/stores";
|
import { clientKeyStore } from "$lib/stores";
|
||||||
|
|
||||||
@@ -31,6 +34,14 @@ export const generateClientKeys = async () => {
|
|||||||
export const generateInitialMasterKey = async (encryptKey: CryptoKey) => {
|
export const generateInitialMasterKey = async (encryptKey: CryptoKey) => {
|
||||||
const { masterKey } = await generateMasterKey();
|
const { masterKey } = await generateMasterKey();
|
||||||
return {
|
return {
|
||||||
|
masterKey: await makeAESKeyNonextractable(masterKey),
|
||||||
masterKeyWrapped: await wrapMasterKey(masterKey, encryptKey),
|
masterKeyWrapped: await wrapMasterKey(masterKey, encryptKey),
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
export const generateInitialHmacSecret = async (masterKey: CryptoKey) => {
|
||||||
|
const { hmacSecret } = await generateHmacSecret();
|
||||||
|
return {
|
||||||
|
hmacSecretWrapped: await wrapHmacSecret(hmacSecret, masterKey),
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|||||||
@@ -1,10 +1,11 @@
|
|||||||
<script lang="ts">
|
<script lang="ts">
|
||||||
|
import { onMount } from "svelte";
|
||||||
import type { Writable } from "svelte/store";
|
import type { Writable } from "svelte/store";
|
||||||
import { goto } from "$app/navigation";
|
import { goto } from "$app/navigation";
|
||||||
import { TopBar } from "$lib/components";
|
import { TopBar } from "$lib/components";
|
||||||
import { FloatingButton } from "$lib/components/buttons";
|
import { FloatingButton } from "$lib/components/buttons";
|
||||||
import { getDirectoryInfo } from "$lib/modules/file";
|
import { getDirectoryInfo } from "$lib/modules/file";
|
||||||
import { masterKeyStore, type DirectoryInfo } from "$lib/stores";
|
import { masterKeyStore, hmacSecretStore, type DirectoryInfo } from "$lib/stores";
|
||||||
import CreateBottomSheet from "./CreateBottomSheet.svelte";
|
import CreateBottomSheet from "./CreateBottomSheet.svelte";
|
||||||
import CreateDirectoryModal from "./CreateDirectoryModal.svelte";
|
import CreateDirectoryModal from "./CreateDirectoryModal.svelte";
|
||||||
import DeleteDirectoryEntryModal from "./DeleteDirectoryEntryModal.svelte";
|
import DeleteDirectoryEntryModal from "./DeleteDirectoryEntryModal.svelte";
|
||||||
@@ -12,6 +13,7 @@
|
|||||||
import DirectoryEntryMenuBottomSheet from "./DirectoryEntryMenuBottomSheet.svelte";
|
import DirectoryEntryMenuBottomSheet from "./DirectoryEntryMenuBottomSheet.svelte";
|
||||||
import RenameDirectoryEntryModal from "./RenameDirectoryEntryModal.svelte";
|
import RenameDirectoryEntryModal from "./RenameDirectoryEntryModal.svelte";
|
||||||
import {
|
import {
|
||||||
|
requestHmacSecretDownload,
|
||||||
requestDirectoryCreation,
|
requestDirectoryCreation,
|
||||||
requestFileUpload,
|
requestFileUpload,
|
||||||
requestDirectoryEntryRename,
|
requestDirectoryEntryRename,
|
||||||
@@ -44,11 +46,19 @@
|
|||||||
const file = fileInput?.files?.[0];
|
const file = fileInput?.files?.[0];
|
||||||
if (!file) return;
|
if (!file) return;
|
||||||
|
|
||||||
requestFileUpload(file, data.id, $masterKeyStore?.get(1)!).then(() => {
|
requestFileUpload(file, data.id, $masterKeyStore?.get(1)!, $hmacSecretStore?.get(1)!).then(
|
||||||
info = getDirectoryInfo(data.id, $masterKeyStore?.get(1)?.key!); // TODO: FIXME
|
() => {
|
||||||
});
|
info = getDirectoryInfo(data.id, $masterKeyStore?.get(1)?.key!); // TODO: FIXME
|
||||||
|
},
|
||||||
|
);
|
||||||
};
|
};
|
||||||
|
|
||||||
|
onMount(async () => {
|
||||||
|
if (!$hmacSecretStore && !(await requestHmacSecretDownload($masterKeyStore?.get(1)?.key!))) {
|
||||||
|
throw new Error("Failed to download hmac secrets");
|
||||||
|
}
|
||||||
|
});
|
||||||
|
|
||||||
$effect(() => {
|
$effect(() => {
|
||||||
info = getDirectoryInfo(data.id, $masterKeyStore?.get(1)?.key!);
|
info = getDirectoryInfo(data.id, $masterKeyStore?.get(1)?.key!);
|
||||||
});
|
});
|
||||||
|
|||||||
@@ -1,12 +1,22 @@
|
|||||||
import { callPostApi } from "$lib/hooks";
|
import { callGetApi, callPostApi } from "$lib/hooks";
|
||||||
import { generateDataKey, wrapDataKey, encryptData, encryptString } from "$lib/modules/crypto";
|
import { storeHmacSecrets } from "$lib/indexedDB";
|
||||||
|
import {
|
||||||
|
encodeToBase64,
|
||||||
|
generateDataKey,
|
||||||
|
wrapDataKey,
|
||||||
|
unwrapHmacSecret,
|
||||||
|
encryptData,
|
||||||
|
encryptString,
|
||||||
|
signMessageHmac,
|
||||||
|
} from "$lib/modules/crypto";
|
||||||
import type {
|
import type {
|
||||||
DirectoryRenameRequest,
|
DirectoryRenameRequest,
|
||||||
DirectoryCreateRequest,
|
DirectoryCreateRequest,
|
||||||
FileRenameRequest,
|
FileRenameRequest,
|
||||||
FileUploadRequest,
|
FileUploadRequest,
|
||||||
|
HmacSecretListResponse,
|
||||||
} from "$lib/server/schemas";
|
} from "$lib/server/schemas";
|
||||||
import type { MasterKey } from "$lib/stores";
|
import { hmacSecretStore, type MasterKey, type HmacSecret } from "$lib/stores";
|
||||||
|
|
||||||
export interface SelectedDirectoryEntry {
|
export interface SelectedDirectoryEntry {
|
||||||
type: "directory" | "file";
|
type: "directory" | "file";
|
||||||
@@ -16,6 +26,26 @@ export interface SelectedDirectoryEntry {
|
|||||||
name: string;
|
name: string;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
export const requestHmacSecretDownload = async (masterKey: CryptoKey) => {
|
||||||
|
// TODO: MEK rotation
|
||||||
|
|
||||||
|
const res = await callGetApi("/api/hsk/list");
|
||||||
|
if (!res.ok) return false;
|
||||||
|
|
||||||
|
const { hsks: hmacSecretsWrapped }: HmacSecretListResponse = await res.json();
|
||||||
|
const hmacSecrets = await Promise.all(
|
||||||
|
hmacSecretsWrapped.map(async ({ version, state, hsk: hmacSecretWrapped }) => {
|
||||||
|
const { hmacSecret } = await unwrapHmacSecret(hmacSecretWrapped, masterKey);
|
||||||
|
return { version, state, secret: hmacSecret };
|
||||||
|
}),
|
||||||
|
);
|
||||||
|
|
||||||
|
await storeHmacSecrets(hmacSecrets);
|
||||||
|
hmacSecretStore.set(new Map(hmacSecrets.map((hmacSecret) => [hmacSecret.version, hmacSecret])));
|
||||||
|
|
||||||
|
return true;
|
||||||
|
};
|
||||||
|
|
||||||
export const requestDirectoryCreation = async (
|
export const requestDirectoryCreation = async (
|
||||||
name: string,
|
name: string,
|
||||||
parentId: "root" | number,
|
parentId: "root" | number,
|
||||||
@@ -37,11 +67,15 @@ export const requestFileUpload = async (
|
|||||||
file: File,
|
file: File,
|
||||||
parentId: "root" | number,
|
parentId: "root" | number,
|
||||||
masterKey: MasterKey,
|
masterKey: MasterKey,
|
||||||
|
hmacSecret: HmacSecret,
|
||||||
) => {
|
) => {
|
||||||
const { dataKey, dataKeyVersion } = await generateDataKey();
|
const { dataKey, dataKeyVersion } = await generateDataKey();
|
||||||
const fileEncrypted = await encryptData(await file.arrayBuffer(), dataKey);
|
|
||||||
const nameEncrypted = await encryptString(file.name, dataKey);
|
const nameEncrypted = await encryptString(file.name, dataKey);
|
||||||
|
|
||||||
|
const fileBuffer = await file.arrayBuffer();
|
||||||
|
const fileSigned = await signMessageHmac(fileBuffer, hmacSecret.secret);
|
||||||
|
const fileEncrypted = await encryptData(fileBuffer, dataKey);
|
||||||
|
|
||||||
const form = new FormData();
|
const form = new FormData();
|
||||||
form.set(
|
form.set(
|
||||||
"metadata",
|
"metadata",
|
||||||
@@ -50,6 +84,8 @@ export const requestFileUpload = async (
|
|||||||
mekVersion: masterKey.version,
|
mekVersion: masterKey.version,
|
||||||
dek: await wrapDataKey(dataKey, masterKey.key),
|
dek: await wrapDataKey(dataKey, masterKey.key),
|
||||||
dekVersion: dataKeyVersion.toISOString(),
|
dekVersion: dataKeyVersion.toISOString(),
|
||||||
|
hskVersion: hmacSecret.version,
|
||||||
|
contentHmac: encodeToBase64(fileSigned),
|
||||||
contentType: file.type,
|
contentType: file.type,
|
||||||
contentIv: fileEncrypted.iv,
|
contentIv: fileEncrypted.iv,
|
||||||
name: nameEncrypted.ciphertext,
|
name: nameEncrypted.ciphertext,
|
||||||
|
|||||||
Reference in New Issue
Block a user