import { CipherType } from '../enums/cipherType'; import { FieldType } from '../enums/fieldType'; import { UriMatchType } from '../enums/uriMatchType'; import { CipherData } from '../models/data/cipherData'; import { Attachment } from '../models/domain/attachment'; import { Card } from '../models/domain/card'; import { Cipher } from '../models/domain/cipher'; import { CipherString } from '../models/domain/cipherString'; import Domain from '../models/domain/domainBase'; import { Field } from '../models/domain/field'; import { Identity } from '../models/domain/identity'; import { Login } from '../models/domain/login'; import { LoginUri } from '../models/domain/loginUri'; import { Password } from '../models/domain/password'; import { SecureNote } from '../models/domain/secureNote'; import { SymmetricCryptoKey } from '../models/domain/symmetricCryptoKey'; import { CipherBulkDeleteRequest } from '../models/request/cipherBulkDeleteRequest'; import { CipherBulkMoveRequest } from '../models/request/cipherBulkMoveRequest'; import { CipherBulkShareRequest } from '../models/request/cipherBulkShareRequest'; import { CipherCollectionsRequest } from '../models/request/cipherCollectionsRequest'; import { CipherCreateRequest } from '../models/request/cipherCreateRequest'; import { CipherRequest } from '../models/request/cipherRequest'; import { CipherShareRequest } from '../models/request/cipherShareRequest'; import { CipherResponse } from '../models/response/cipherResponse'; import { ErrorResponse } from '../models/response/errorResponse'; import { AttachmentView } from '../models/view/attachmentView'; import { CipherView } from '../models/view/cipherView'; import { FieldView } from '../models/view/fieldView'; import { PasswordHistoryView } from '../models/view/passwordHistoryView'; import { View } from '../models/view/view'; import { ApiService } from '../abstractions/api.service'; import { CipherService as CipherServiceAbstraction } from '../abstractions/cipher.service'; import { CryptoService } from '../abstractions/crypto.service'; import { I18nService } from '../abstractions/i18n.service'; import { SearchService } from '../abstractions/search.service'; import { SettingsService } from '../abstractions/settings.service'; import { StorageService } from '../abstractions/storage.service'; import { UserService } from '../abstractions/user.service'; import { ConstantsService } from './constants.service'; import { sequentialize } from '../misc/sequentialize'; import { Utils } from '../misc/utils'; const Keys = { ciphersPrefix: 'ciphers_', localData: 'sitesLocalData', neverDomains: 'neverDomains', }; const DomainMatchBlacklist = new Map>([ ['google.com', new Set(['script.google.com'])], ]); export class CipherService implements CipherServiceAbstraction { // tslint:disable-next-line _decryptedCipherCache: CipherView[]; constructor(private cryptoService: CryptoService, private userService: UserService, private settingsService: SettingsService, private apiService: ApiService, private storageService: StorageService, private i18nService: I18nService, private searchService: () => SearchService) { } get decryptedCipherCache() { return this._decryptedCipherCache; } set decryptedCipherCache(value: CipherView[]) { this._decryptedCipherCache = value; if (this.searchService != null) { if (value == null) { this.searchService().clearIndex(); } else { this.searchService().indexCiphers(); } } } clearCache(): void { this.decryptedCipherCache = null; } async encrypt(model: CipherView, key?: SymmetricCryptoKey, originalCipher: Cipher = null): Promise { // Adjust password history if (model.id != null) { if (originalCipher == null) { originalCipher = await this.get(model.id); } if (originalCipher != null) { const existingCipher = await originalCipher.decrypt(); model.passwordHistory = existingCipher.passwordHistory || []; if (model.type === CipherType.Login && existingCipher.type === CipherType.Login) { if (existingCipher.login.password != null && existingCipher.login.password !== '' && existingCipher.login.password !== model.login.password) { const ph = new PasswordHistoryView(); ph.password = existingCipher.login.password; ph.lastUsedDate = model.login.passwordRevisionDate = new Date(); model.passwordHistory.splice(0, 0, ph); } else { model.login.passwordRevisionDate = existingCipher.login.passwordRevisionDate; } } if (existingCipher.hasFields) { const existingHiddenFields = existingCipher.fields.filter((f) => f.type === FieldType.Hidden && f.name != null && f.name !== '' && f.value != null && f.value !== ''); const hiddenFields = model.fields == null ? [] : model.fields.filter((f) => f.type === FieldType.Hidden && f.name != null && f.name !== ''); existingHiddenFields.forEach((ef) => { const matchedField = hiddenFields.find((f) => f.name === ef.name); if (matchedField == null || matchedField.value !== ef.value) { const ph = new PasswordHistoryView(); ph.password = ef.name + ': ' + ef.value; ph.lastUsedDate = new Date(); model.passwordHistory.splice(0, 0, ph); } }); } } if (model.passwordHistory != null && model.passwordHistory.length === 0) { model.passwordHistory = null; } else if (model.passwordHistory != null && model.passwordHistory.length > 5) { // only save last 5 history model.passwordHistory = model.passwordHistory.slice(0, 5); } } const cipher = new Cipher(); cipher.id = model.id; cipher.folderId = model.folderId; cipher.favorite = model.favorite; cipher.organizationId = model.organizationId; cipher.type = model.type; cipher.collectionIds = model.collectionIds; if (key == null && cipher.organizationId != null) { key = await this.cryptoService.getOrgKey(cipher.organizationId); if (key == null) { throw new Error('Cannot encrypt cipher for organization. No key.'); } } await Promise.all([ this.encryptObjProperty(model, cipher, { name: null, notes: null, }, key), this.encryptCipherData(cipher, model, key), this.encryptFields(model.fields, key).then((fields) => { cipher.fields = fields; }), this.encryptPasswordHistories(model.passwordHistory, key).then((ph) => { cipher.passwordHistory = ph; }), this.encryptAttachments(model.attachments, key).then((attachments) => { cipher.attachments = attachments; }), ]); return cipher; } async encryptAttachments(attachmentsModel: AttachmentView[], key: SymmetricCryptoKey): Promise { if (attachmentsModel == null || attachmentsModel.length === 0) { return null; } const promises: Array> = []; const encAttachments: Attachment[] = []; attachmentsModel.forEach(async (model) => { const attachment = new Attachment(); attachment.id = model.id; attachment.size = model.size; attachment.sizeName = model.sizeName; attachment.url = model.url; const promise = this.encryptObjProperty(model, attachment, { fileName: null, }, key).then(async () => { if (model.key != null) { attachment.key = await this.cryptoService.encrypt(model.key.key, key); } encAttachments.push(attachment); }); promises.push(promise); }); await Promise.all(promises); return encAttachments; } async encryptFields(fieldsModel: FieldView[], key: SymmetricCryptoKey): Promise { if (!fieldsModel || !fieldsModel.length) { return null; } const self = this; const encFields: Field[] = []; await fieldsModel.reduce((promise, field) => { return promise.then(() => { return self.encryptField(field, key); }).then((encField: Field) => { encFields.push(encField); }); }, Promise.resolve()); return encFields; } async encryptField(fieldModel: FieldView, key: SymmetricCryptoKey): Promise { const field = new Field(); field.type = fieldModel.type; // normalize boolean type field values if (fieldModel.type === FieldType.Boolean && fieldModel.value !== 'true') { fieldModel.value = 'false'; } await this.encryptObjProperty(fieldModel, field, { name: null, value: null, }, key); return field; } async encryptPasswordHistories(phModels: PasswordHistoryView[], key: SymmetricCryptoKey): Promise { if (!phModels || !phModels.length) { return null; } const self = this; const encPhs: Password[] = []; await phModels.reduce((promise, ph) => { return promise.then(() => { return self.encryptPasswordHistory(ph, key); }).then((encPh: Password) => { encPhs.push(encPh); }); }, Promise.resolve()); return encPhs; } async encryptPasswordHistory(phModel: PasswordHistoryView, key: SymmetricCryptoKey): Promise { const ph = new Password(); ph.lastUsedDate = phModel.lastUsedDate; await this.encryptObjProperty(phModel, ph, { password: null, }, key); return ph; } async get(id: string): Promise { const userId = await this.userService.getUserId(); const localData = await this.storageService.get(Keys.localData); const ciphers = await this.storageService.get<{ [id: string]: CipherData; }>( Keys.ciphersPrefix + userId); if (ciphers == null || !ciphers.hasOwnProperty(id)) { return null; } return new Cipher(ciphers[id], false, localData ? localData[id] : null); } async getAll(): Promise { const userId = await this.userService.getUserId(); const localData = await this.storageService.get(Keys.localData); const ciphers = await this.storageService.get<{ [id: string]: CipherData; }>( Keys.ciphersPrefix + userId); const response: Cipher[] = []; for (const id in ciphers) { if (ciphers.hasOwnProperty(id)) { response.push(new Cipher(ciphers[id], false, localData ? localData[id] : null)); } } return response; } @sequentialize(() => 'getAllDecrypted') async getAllDecrypted(): Promise { if (this.decryptedCipherCache != null) { return this.decryptedCipherCache; } const decCiphers: CipherView[] = []; const hasKey = await this.cryptoService.hasKey(); if (!hasKey) { throw new Error('No key.'); } const promises: any[] = []; const ciphers = await this.getAll(); ciphers.forEach((cipher) => { promises.push(cipher.decrypt().then((c) => decCiphers.push(c))); }); await Promise.all(promises); decCiphers.sort(this.getLocaleSortingFunction()); this.decryptedCipherCache = decCiphers; return this.decryptedCipherCache; } async getAllDecryptedForGrouping(groupingId: string, folder: boolean = true): Promise { const ciphers = await this.getAllDecrypted(); return ciphers.filter((cipher) => { if (folder && cipher.folderId === groupingId) { return true; } else if (!folder && cipher.collectionIds != null && cipher.collectionIds.indexOf(groupingId) > -1) { return true; } return false; }); } async getAllDecryptedForUrl(url: string, includeOtherTypes?: CipherType[]): Promise { if (url == null && includeOtherTypes == null) { return Promise.resolve([]); } const domain = Utils.getDomain(url); const eqDomainsPromise = domain == null ? Promise.resolve([]) : this.settingsService.getEquivalentDomains().then((eqDomains: any[][]) => { let matches: any[] = []; eqDomains.forEach((eqDomain) => { if (eqDomain.length && eqDomain.indexOf(domain) >= 0) { matches = matches.concat(eqDomain); } }); if (!matches.length) { matches.push(domain); } return matches; }); const result = await Promise.all([eqDomainsPromise, this.getAllDecrypted()]); const matchingDomains = result[0]; const ciphers = result[1]; let defaultMatch = await this.storageService.get(ConstantsService.defaultUriMatch); if (defaultMatch == null) { defaultMatch = UriMatchType.Domain; } return ciphers.filter((cipher) => { if (includeOtherTypes != null && includeOtherTypes.indexOf(cipher.type) > -1) { return true; } if (url != null && cipher.type === CipherType.Login && cipher.login.uris != null) { for (let i = 0; i < cipher.login.uris.length; i++) { const u = cipher.login.uris[i]; if (u.uri == null) { continue; } const match = u.match == null ? defaultMatch : u.match; switch (match) { case UriMatchType.Domain: if (domain != null && u.domain != null && matchingDomains.indexOf(u.domain) > -1) { if (DomainMatchBlacklist.has(u.domain)) { const domainUrlHost = Utils.getHost(url); if (!DomainMatchBlacklist.get(u.domain).has(domainUrlHost)) { return true; } } else { return true; } } break; case UriMatchType.Host: const urlHost = Utils.getHost(url); if (urlHost != null && urlHost === Utils.getHost(u.uri)) { return true; } break; case UriMatchType.Exact: if (url === u.uri) { return true; } break; case UriMatchType.StartsWith: if (url.startsWith(u.uri)) { return true; } break; case UriMatchType.RegularExpression: try { const regex = new RegExp(u.uri, 'i'); if (regex.test(url)) { return true; } } catch { } break; case UriMatchType.Never: default: break; } } } return false; }); } async getAllFromApiForOrganization(organizationId: string): Promise { const ciphers = await this.apiService.getCiphersOrganization(organizationId); if (ciphers != null && ciphers.data != null && ciphers.data.length) { const decCiphers: CipherView[] = []; const promises: any[] = []; ciphers.data.forEach((r) => { const data = new CipherData(r); const cipher = new Cipher(data); promises.push(cipher.decrypt().then((c) => decCiphers.push(c))); }); await Promise.all(promises); decCiphers.sort(this.getLocaleSortingFunction()); return decCiphers; } else { return []; } } async getLastUsedForUrl(url: string): Promise { const ciphers = await this.getAllDecryptedForUrl(url); if (ciphers.length === 0) { return null; } const sortedCiphers = ciphers.sort(this.sortCiphersByLastUsed); return sortedCiphers[0]; } async updateLastUsedDate(id: string): Promise { let ciphersLocalData = await this.storageService.get(Keys.localData); if (!ciphersLocalData) { ciphersLocalData = {}; } if (ciphersLocalData[id]) { ciphersLocalData[id].lastUsedDate = new Date().getTime(); } else { ciphersLocalData[id] = { lastUsedDate: new Date().getTime(), }; } await this.storageService.save(Keys.localData, ciphersLocalData); if (this.decryptedCipherCache == null) { return; } for (let i = 0; i < this.decryptedCipherCache.length; i++) { const cached = this.decryptedCipherCache[i]; if (cached.id === id) { cached.localData = ciphersLocalData[id]; break; } } } async saveNeverDomain(domain: string): Promise { if (domain == null) { return; } let domains = await this.storageService.get<{ [id: string]: any; }>(Keys.neverDomains); if (!domains) { domains = {}; } domains[domain] = null; await this.storageService.save(Keys.neverDomains, domains); } async saveWithServer(cipher: Cipher): Promise { let response: CipherResponse; if (cipher.id == null) { if (cipher.collectionIds != null) { const request = new CipherCreateRequest(cipher); response = await this.apiService.postCipherCreate(request); } else { const request = new CipherRequest(cipher); response = await this.apiService.postCipher(request); } cipher.id = response.id; } else { const request = new CipherRequest(cipher); response = await this.apiService.putCipher(cipher.id, request); } const userId = await this.userService.getUserId(); const data = new CipherData(response, userId, cipher.collectionIds); await this.upsert(data); } async shareWithServer(cipher: CipherView, organizationId: string, collectionIds: string[]): Promise { const attachmentPromises: Array> = []; if (cipher.attachments != null) { cipher.attachments.forEach((attachment) => { if (attachment.key == null) { attachmentPromises.push(this.shareAttachmentWithServer(attachment, cipher.id, organizationId)); } }); } await Promise.all(attachmentPromises); cipher.organizationId = organizationId; cipher.collectionIds = collectionIds; const encCipher = await this.encrypt(cipher); const request = new CipherShareRequest(encCipher); const response = await this.apiService.putShareCipher(cipher.id, request); const userId = await this.userService.getUserId(); const data = new CipherData(response, userId, collectionIds); await this.upsert(data); } async shareManyWithServer(ciphers: CipherView[], organizationId: string, collectionIds: string[]): Promise { const promises: Array> = []; const encCiphers: Cipher[] = []; for (const cipher of ciphers) { cipher.organizationId = organizationId; cipher.collectionIds = collectionIds; promises.push(this.encrypt(cipher).then((c) => { encCiphers.push(c); })); } await Promise.all(promises); const request = new CipherBulkShareRequest(encCiphers, collectionIds); await this.apiService.putShareCiphers(request); const userId = await this.userService.getUserId(); await this.upsert(encCiphers.map((c) => c.toCipherData(userId))); } saveAttachmentWithServer(cipher: Cipher, unencryptedFile: any, admin = false): Promise { return new Promise((resolve, reject) => { const reader = new FileReader(); reader.readAsArrayBuffer(unencryptedFile); reader.onload = async (evt: any) => { try { const cData = await this.saveAttachmentRawWithServer(cipher, unencryptedFile.name, evt.target.result, admin); resolve(cData); } catch (e) { reject(e); } }; reader.onerror = (evt) => { reject('Error reading file.'); }; }); } async saveAttachmentRawWithServer(cipher: Cipher, filename: string, data: ArrayBuffer, admin = false): Promise { const key = await this.cryptoService.getOrgKey(cipher.organizationId); const encFileName = await this.cryptoService.encrypt(filename, key); const dataEncKey = await this.cryptoService.makeEncKey(key); const encData = await this.cryptoService.encryptToBytes(data, dataEncKey[0]); const fd = new FormData(); try { const blob = new Blob([encData], { type: 'application/octet-stream' }); fd.append('key', dataEncKey[1].encryptedString); fd.append('data', blob, encFileName.encryptedString); } catch (e) { if (Utils.isNode && !Utils.isBrowser) { fd.append('key', dataEncKey[1].encryptedString); fd.append('data', Buffer.from(encData) as any, { filepath: encFileName.encryptedString, contentType: 'application/octet-stream', } as any); } else { throw e; } } let response: CipherResponse; try { if (admin) { response = await this.apiService.postCipherAttachmentAdmin(cipher.id, fd); } else { response = await this.apiService.postCipherAttachment(cipher.id, fd); } } catch (e) { throw new Error((e as ErrorResponse).getSingleMessage()); } const userId = await this.userService.getUserId(); const cData = new CipherData(response, userId, cipher.collectionIds); if (!admin) { await this.upsert(cData); } return new Cipher(cData); } async saveCollectionsWithServer(cipher: Cipher): Promise { const request = new CipherCollectionsRequest(cipher.collectionIds); await this.apiService.putCipherCollections(cipher.id, request); const userId = await this.userService.getUserId(); const data = cipher.toCipherData(userId); await this.upsert(data); } async upsert(cipher: CipherData | CipherData[]): Promise { const userId = await this.userService.getUserId(); let ciphers = await this.storageService.get<{ [id: string]: CipherData; }>( Keys.ciphersPrefix + userId); if (ciphers == null) { ciphers = {}; } if (cipher instanceof CipherData) { const c = cipher as CipherData; ciphers[c.id] = c; } else { (cipher as CipherData[]).forEach((c) => { ciphers[c.id] = c; }); } await this.storageService.save(Keys.ciphersPrefix + userId, ciphers); this.decryptedCipherCache = null; } async replace(ciphers: { [id: string]: CipherData; }): Promise { const userId = await this.userService.getUserId(); await this.storageService.save(Keys.ciphersPrefix + userId, ciphers); this.decryptedCipherCache = null; } async clear(userId: string): Promise { await this.storageService.remove(Keys.ciphersPrefix + userId); this.clearCache(); } async moveManyWithServer(ids: string[], folderId: string): Promise { await this.apiService.putMoveCiphers(new CipherBulkMoveRequest(ids, folderId)); const userId = await this.userService.getUserId(); let ciphers = await this.storageService.get<{ [id: string]: CipherData; }>( Keys.ciphersPrefix + userId); if (ciphers == null) { ciphers = {}; } ids.forEach((id) => { if (ciphers.hasOwnProperty(id)) { ciphers[id].folderId = folderId; } }); await this.storageService.save(Keys.ciphersPrefix + userId, ciphers); this.decryptedCipherCache = null; } async delete(id: string | string[]): Promise { const userId = await this.userService.getUserId(); const ciphers = await this.storageService.get<{ [id: string]: CipherData; }>( Keys.ciphersPrefix + userId); if (ciphers == null) { return; } if (typeof id === 'string') { if (ciphers[id] == null) { return; } delete ciphers[id]; } else { (id as string[]).forEach((i) => { delete ciphers[i]; }); } await this.storageService.save(Keys.ciphersPrefix + userId, ciphers); this.decryptedCipherCache = null; } async deleteWithServer(id: string): Promise { await this.apiService.deleteCipher(id); await this.delete(id); } async deleteManyWithServer(ids: string[]): Promise { await this.apiService.deleteManyCiphers(new CipherBulkDeleteRequest(ids)); await this.delete(ids); } async deleteAttachment(id: string, attachmentId: string): Promise { const userId = await this.userService.getUserId(); const ciphers = await this.storageService.get<{ [id: string]: CipherData; }>( Keys.ciphersPrefix + userId); if (ciphers == null || !ciphers.hasOwnProperty(id) || ciphers[id].attachments == null) { return; } for (let i = 0; i < ciphers[id].attachments.length; i++) { if (ciphers[id].attachments[i].id === attachmentId) { ciphers[id].attachments.splice(i, 1); } } await this.storageService.save(Keys.ciphersPrefix + userId, ciphers); this.decryptedCipherCache = null; } async deleteAttachmentWithServer(id: string, attachmentId: string): Promise { try { await this.apiService.deleteCipherAttachment(id, attachmentId); } catch (e) { return Promise.reject((e as ErrorResponse).getSingleMessage()); } await this.deleteAttachment(id, attachmentId); } sortCiphersByLastUsed(a: CipherView, b: CipherView): number { const aLastUsed = a.localData && a.localData.lastUsedDate ? a.localData.lastUsedDate as number : null; const bLastUsed = b.localData && b.localData.lastUsedDate ? b.localData.lastUsedDate as number : null; const bothNotNull = aLastUsed != null && bLastUsed != null; if (bothNotNull && aLastUsed < bLastUsed) { return 1; } if (aLastUsed != null && bLastUsed == null) { return -1; } if (bothNotNull && aLastUsed > bLastUsed) { return -1; } if (bLastUsed != null && aLastUsed == null) { return 1; } return 0; } sortCiphersByLastUsedThenName(a: CipherView, b: CipherView): number { const result = this.sortCiphersByLastUsed(a, b); if (result !== 0) { return result; } return this.getLocaleSortingFunction()(a, b); } getLocaleSortingFunction(): (a: CipherView, b: CipherView) => number { return (a, b) => { let aName = a.name; let bName = b.name; if (aName == null && bName != null) { return -1; } if (aName != null && bName == null) { return 1; } if (aName == null && bName == null) { return 0; } const result = this.i18nService.collator ? this.i18nService.collator.compare(aName, bName) : aName.localeCompare(bName); if (result !== 0 || a.type !== CipherType.Login || b.type !== CipherType.Login) { return result; } if (a.login.username != null) { aName += a.login.username; } if (b.login.username != null) { bName += b.login.username; } return this.i18nService.collator ? this.i18nService.collator.compare(aName, bName) : aName.localeCompare(bName); }; } // Helpers private async shareAttachmentWithServer(attachmentView: AttachmentView, cipherId: string, organizationId: string): Promise { const attachmentResponse = await this.apiService.nativeFetch( new Request(attachmentView.url, { cache: 'no-store' })); if (attachmentResponse.status !== 200) { throw Error('Failed to download attachment: ' + attachmentResponse.status.toString()); } const buf = await attachmentResponse.arrayBuffer(); const decBuf = await this.cryptoService.decryptFromBytes(buf, null); const key = await this.cryptoService.getOrgKey(organizationId); const encFileName = await this.cryptoService.encrypt(attachmentView.fileName, key); const dataEncKey = await this.cryptoService.makeEncKey(key); const encData = await this.cryptoService.encryptToBytes(decBuf, dataEncKey[0]); const fd = new FormData(); try { const blob = new Blob([encData], { type: 'application/octet-stream' }); fd.append('key', dataEncKey[1].encryptedString); fd.append('data', blob, encFileName.encryptedString); } catch (e) { if (Utils.isNode && !Utils.isBrowser) { fd.append('key', dataEncKey[1].encryptedString); fd.append('data', Buffer.from(encData) as any, { filepath: encFileName.encryptedString, contentType: 'application/octet-stream', } as any); } else { throw e; } } try { await this.apiService.postShareCipherAttachment(cipherId, attachmentView.id, fd, organizationId); } catch (e) { throw new Error((e as ErrorResponse).getSingleMessage()); } } private async encryptObjProperty(model: V, obj: D, map: any, key: SymmetricCryptoKey): Promise { const promises = []; const self = this; for (const prop in map) { if (!map.hasOwnProperty(prop)) { continue; } // tslint:disable-next-line (function (theProp, theObj) { const p = Promise.resolve().then(() => { const modelProp = (model as any)[(map[theProp] || theProp)]; if (modelProp && modelProp !== '') { return self.cryptoService.encrypt(modelProp, key); } return null; }).then((val: CipherString) => { (theObj as any)[theProp] = val; }); promises.push(p); })(prop, obj); } await Promise.all(promises); } private async encryptCipherData(cipher: Cipher, model: CipherView, key: SymmetricCryptoKey) { switch (cipher.type) { case CipherType.Login: cipher.login = new Login(); cipher.login.passwordRevisionDate = model.login.passwordRevisionDate; await this.encryptObjProperty(model.login, cipher.login, { username: null, password: null, totp: null, }, key); if (model.login.uris != null) { cipher.login.uris = []; for (let i = 0; i < model.login.uris.length; i++) { const loginUri = new LoginUri(); loginUri.match = model.login.uris[i].match; await this.encryptObjProperty(model.login.uris[i], loginUri, { uri: null, }, key); cipher.login.uris.push(loginUri); } } return; case CipherType.SecureNote: cipher.secureNote = new SecureNote(); cipher.secureNote.type = model.secureNote.type; return; case CipherType.Card: cipher.card = new Card(); await this.encryptObjProperty(model.card, cipher.card, { cardholderName: null, brand: null, number: null, expMonth: null, expYear: null, code: null, }, key); return; case CipherType.Identity: cipher.identity = new Identity(); await this.encryptObjProperty(model.identity, cipher.identity, { title: null, firstName: null, middleName: null, lastName: null, address1: null, address2: null, address3: null, city: null, state: null, postalCode: null, country: null, company: null, email: null, phone: null, ssn: null, username: null, passportNumber: null, licenseNumber: null, }, key); return; default: throw new Error('Unknown cipher type.'); } } }