mirror of
				https://github.com/zadam/trilium.git
				synced 2025-11-03 20:06:08 +01:00 
			
		
		
		
	
		
			
				
	
	
		
			442 lines
		
	
	
		
			13 KiB
		
	
	
	
		
			JavaScript
		
	
	
	
	
	
			
		
		
	
	
			442 lines
		
	
	
		
			13 KiB
		
	
	
	
		
			JavaScript
		
	
	
	
	
	
"use strict";
 | 
						|
 | 
						|
const encryption = (function() {
 | 
						|
    const dialogEl = $("#encryption-password-dialog");
 | 
						|
    const encryptionPasswordFormEl = $("#encryption-password-form");
 | 
						|
    const encryptionPasswordEl = $("#encryption-password");
 | 
						|
 | 
						|
    let encryptionDeferred = null;
 | 
						|
    let dataKey = null;
 | 
						|
    let lastEncryptionOperationDate = null;
 | 
						|
    let encryptionSalt = null;
 | 
						|
    let encryptedDataKey = null;
 | 
						|
    let encryptionSessionTimeout = null;
 | 
						|
 | 
						|
    $.ajax({
 | 
						|
        url: baseApiUrl + 'settings/all',
 | 
						|
        type: 'GET',
 | 
						|
        error: () => error("Error getting encryption settings.")
 | 
						|
    }).then(settings => {
 | 
						|
        encryptionSalt = settings.password_derived_key_salt;
 | 
						|
        encryptionSessionTimeout = settings.encryption_session_timeout;
 | 
						|
        encryptedDataKey = settings.encrypted_data_key;
 | 
						|
    });
 | 
						|
 | 
						|
    function setEncryptedDataKey(encDataKey) {
 | 
						|
        encryptedDataKey = encDataKey;
 | 
						|
    }
 | 
						|
 | 
						|
    function setEncryptionSessionTimeout(encSessTimeout) {
 | 
						|
        encryptionSessionTimeout = encSessTimeout;
 | 
						|
    }
 | 
						|
 | 
						|
    function ensureEncryptionIsAvailable(requireEncryption, modal) {
 | 
						|
        const dfd = $.Deferred();
 | 
						|
 | 
						|
        if (requireEncryption && dataKey === null) {
 | 
						|
            encryptionDeferred = dfd;
 | 
						|
 | 
						|
            dialogEl.dialog({
 | 
						|
                modal: modal,
 | 
						|
                width: 400,
 | 
						|
                open: () => {
 | 
						|
                    if (!modal) {
 | 
						|
                        // dialog steals focus for itself, which is not what we want for non-modal (viewing)
 | 
						|
                        treeUtils.getNodeByKey(noteEditor.getCurrentNoteId()).setFocus();
 | 
						|
                    }
 | 
						|
                }
 | 
						|
            });
 | 
						|
        }
 | 
						|
        else {
 | 
						|
            dfd.resolve();
 | 
						|
        }
 | 
						|
 | 
						|
        return dfd.promise();
 | 
						|
    }
 | 
						|
 | 
						|
    function getDataKey(password) {
 | 
						|
        return computeScrypt(password, encryptionSalt, (key, resolve, reject) => {
 | 
						|
            const dataKeyAes = getDataKeyAes(key);
 | 
						|
 | 
						|
            const decryptedDataKey = decrypt(dataKeyAes, encryptedDataKey);
 | 
						|
 | 
						|
            if (decryptedDataKey === false) {
 | 
						|
                reject("Wrong password.");
 | 
						|
            }
 | 
						|
 | 
						|
            resolve(decryptedDataKey);
 | 
						|
        });
 | 
						|
    }
 | 
						|
 | 
						|
    function computeScrypt(password, salt, callback) {
 | 
						|
        const normalizedPassword = password.normalize('NFKC');
 | 
						|
        const passwordBuffer = new buffer.SlowBuffer(normalizedPassword);
 | 
						|
        const saltBuffer = new buffer.SlowBuffer(salt);
 | 
						|
 | 
						|
        // this settings take ~500ms on my laptop
 | 
						|
        const N = 16384, r = 8, p = 1;
 | 
						|
        // 32 byte key - AES 256
 | 
						|
        const dkLen = 32;
 | 
						|
 | 
						|
        const startedDate = new Date();
 | 
						|
 | 
						|
        return new Promise((resolve, reject) => {
 | 
						|
            scrypt(passwordBuffer, saltBuffer, N, r, p, dkLen, (error, progress, key) => {
 | 
						|
                if (error) {
 | 
						|
                    console.log("Error: " + error);
 | 
						|
 | 
						|
                    reject();
 | 
						|
                }
 | 
						|
                else if (key) {
 | 
						|
                    console.log("Computation took " + (new Date().getTime() - startedDate.getTime()) + "ms");
 | 
						|
 | 
						|
                    callback(key, resolve, reject);
 | 
						|
                }
 | 
						|
                else {
 | 
						|
                    // update UI with progress complete
 | 
						|
                }
 | 
						|
            });
 | 
						|
        });
 | 
						|
    }
 | 
						|
 | 
						|
    function decryptTreeItems() {
 | 
						|
        if (!isEncryptionAvailable()) {
 | 
						|
            return;
 | 
						|
        }
 | 
						|
 | 
						|
        for (const noteId of glob.allNoteIds) {
 | 
						|
            const note = treeUtils.getNodeByKey(noteId);
 | 
						|
 | 
						|
            if (note.data.encryption > 0) {
 | 
						|
                const title = decryptString(note.data.note_title);
 | 
						|
 | 
						|
                note.setTitle(title);
 | 
						|
            }
 | 
						|
        }
 | 
						|
    }
 | 
						|
 | 
						|
    encryptionPasswordFormEl.submit(() => {
 | 
						|
        const password = encryptionPasswordEl.val();
 | 
						|
        encryptionPasswordEl.val("");
 | 
						|
 | 
						|
        getDataKey(password).then(key => {
 | 
						|
            dialogEl.dialog("close");
 | 
						|
 | 
						|
            dataKey = key;
 | 
						|
 | 
						|
            decryptTreeItems();
 | 
						|
 | 
						|
            if (encryptionDeferred !== null) {
 | 
						|
                encryptionDeferred.resolve();
 | 
						|
 | 
						|
                encryptionDeferred = null;
 | 
						|
            }
 | 
						|
        })
 | 
						|
            .catch(reason => {
 | 
						|
                console.log(reason);
 | 
						|
 | 
						|
                error(reason);
 | 
						|
            });
 | 
						|
 | 
						|
        return false;
 | 
						|
    });
 | 
						|
 | 
						|
    function resetEncryptionSession() {
 | 
						|
        dataKey = null;
 | 
						|
 | 
						|
        if (noteEditor.getCurrentNote().detail.encryption > 0) {
 | 
						|
            // most secure solution - guarantees nothing remained in memory
 | 
						|
            // since this expires because user doesn't use the app, it shouldn't be disruptive
 | 
						|
            window.location.reload(true);
 | 
						|
        }
 | 
						|
    }
 | 
						|
 | 
						|
    setInterval(() => {
 | 
						|
        if (lastEncryptionOperationDate !== null && new Date().getTime() - lastEncryptionOperationDate.getTime() > encryptionSessionTimeout * 1000) {
 | 
						|
            resetEncryptionSession();
 | 
						|
        }
 | 
						|
    }, 5000);
 | 
						|
 | 
						|
    function isEncryptionAvailable() {
 | 
						|
        return dataKey !== null;
 | 
						|
    }
 | 
						|
 | 
						|
    function getDataAes() {
 | 
						|
        lastEncryptionOperationDate = new Date();
 | 
						|
 | 
						|
        return new aesjs.ModeOfOperation.ctr(dataKey, new aesjs.Counter(5));
 | 
						|
    }
 | 
						|
 | 
						|
    function getDataKeyAes(key) {
 | 
						|
        return new aesjs.ModeOfOperation.ctr(key, new aesjs.Counter(5));
 | 
						|
    }
 | 
						|
 | 
						|
    function encryptNoteIfNecessary(note) {
 | 
						|
        if (note.detail.encryption === 0) {
 | 
						|
            return note;
 | 
						|
        }
 | 
						|
        else {
 | 
						|
            return encryptNote(note);
 | 
						|
        }
 | 
						|
    }
 | 
						|
 | 
						|
    function encryptString(str) {
 | 
						|
        return encrypt(getDataAes(), str);
 | 
						|
    }
 | 
						|
 | 
						|
    function encrypt(aes, str) {
 | 
						|
        const payload = Array.from(aesjs.utils.utf8.toBytes(str));
 | 
						|
        const digest = sha256Array(payload).slice(0, 4);
 | 
						|
 | 
						|
        const digestWithPayload = digest.concat(payload);
 | 
						|
 | 
						|
        const encryptedBytes = aes.encrypt(digestWithPayload);
 | 
						|
 | 
						|
        return uint8ToBase64(encryptedBytes);
 | 
						|
    }
 | 
						|
 | 
						|
    function decryptString(encryptedBase64) {
 | 
						|
        const decryptedBytes = decrypt(getDataAes(), encryptedBase64);
 | 
						|
 | 
						|
        return aesjs.utils.utf8.fromBytes(decryptedBytes);
 | 
						|
    }
 | 
						|
 | 
						|
    function decrypt(aes, encryptedBase64) {
 | 
						|
        const encryptedBytes = base64ToUint8Array(encryptedBase64);
 | 
						|
 | 
						|
        const decryptedBytes = aes.decrypt(encryptedBytes);
 | 
						|
 | 
						|
        const digest = decryptedBytes.slice(0, 4);
 | 
						|
        const payload = decryptedBytes.slice(4);
 | 
						|
 | 
						|
        const hashArray = sha256Array(payload);
 | 
						|
 | 
						|
        const computedDigest = hashArray.slice(0, 4);
 | 
						|
 | 
						|
        if (!arraysIdentical(digest, computedDigest)) {
 | 
						|
            return false;
 | 
						|
        }
 | 
						|
 | 
						|
        return payload;
 | 
						|
    }
 | 
						|
 | 
						|
    function sha256Array(content) {
 | 
						|
        const hash = sha256.create();
 | 
						|
        hash.update(content);
 | 
						|
        return hash.array();
 | 
						|
    }
 | 
						|
 | 
						|
    function arraysIdentical(a, b) {
 | 
						|
        let i = a.length;
 | 
						|
        if (i !== b.length) return false;
 | 
						|
        while (i--) {
 | 
						|
            if (a[i] !== b[i]) return false;
 | 
						|
        }
 | 
						|
        return true;
 | 
						|
    }
 | 
						|
 | 
						|
    function encryptNote(note) {
 | 
						|
        note.detail.note_title = encryptString(note.detail.note_title);
 | 
						|
        note.detail.note_text = encryptString(note.detail.note_text);
 | 
						|
 | 
						|
        note.detail.encryption = 1;
 | 
						|
 | 
						|
        return note;
 | 
						|
    }
 | 
						|
 | 
						|
    async function encryptNoteAndSendToServer() {
 | 
						|
        await ensureEncryptionIsAvailable(true, true);
 | 
						|
 | 
						|
        const note = noteEditor.getCurrentNote();
 | 
						|
 | 
						|
        noteEditor.updateNoteFromInputs(note);
 | 
						|
 | 
						|
        encryptNote(note);
 | 
						|
 | 
						|
        await noteEditor.saveNoteToServer(note);
 | 
						|
 | 
						|
        await changeEncryptionOnNoteHistory(note.detail.note_id, true);
 | 
						|
 | 
						|
        noteEditor.setNoteBackgroundIfEncrypted(note);
 | 
						|
    }
 | 
						|
 | 
						|
    async function changeEncryptionOnNoteHistory(noteId, encrypt) {
 | 
						|
        const result = await $.ajax({
 | 
						|
            url: baseApiUrl + 'notes-history/' + noteId + "?encryption=" + (encrypt ? 0 : 1),
 | 
						|
            type: 'GET',
 | 
						|
            error: () => error("Error getting note history.")
 | 
						|
        });
 | 
						|
 | 
						|
        for (const row of result) {
 | 
						|
            if (encrypt) {
 | 
						|
                row.note_title = encryptString(row.note_title);
 | 
						|
                row.note_text = encryptString(row.note_text);
 | 
						|
            }
 | 
						|
            else {
 | 
						|
                row.note_title = decryptString(row.note_title);
 | 
						|
                row.note_text = decryptString(row.note_text);
 | 
						|
            }
 | 
						|
 | 
						|
            row.encryption = encrypt ? 1 : 0;
 | 
						|
 | 
						|
            await $.ajax({
 | 
						|
                url: baseApiUrl + 'notes-history',
 | 
						|
                type: 'PUT',
 | 
						|
                contentType: 'application/json',
 | 
						|
                data: JSON.stringify(row),
 | 
						|
                error: () => error("Error de/encrypting note history.")
 | 
						|
            });
 | 
						|
 | 
						|
            console.log('Note history ' + row.note_history_id + ' de/encrypted');
 | 
						|
        }
 | 
						|
    }
 | 
						|
 | 
						|
    async function decryptNoteAndSendToServer() {
 | 
						|
        await ensureEncryptionIsAvailable(true, true);
 | 
						|
 | 
						|
        const note = noteEditor.getCurrentNote();
 | 
						|
 | 
						|
        noteEditor.updateNoteFromInputs(note);
 | 
						|
 | 
						|
        note.detail.encryption = 0;
 | 
						|
 | 
						|
        await noteEditor.saveNoteToServer(note);
 | 
						|
 | 
						|
        await changeEncryptionOnNoteHistory(note.detail.note_id, false);
 | 
						|
 | 
						|
        noteEditor.setNoteBackgroundIfEncrypted(note);
 | 
						|
    }
 | 
						|
 | 
						|
    function decryptNoteIfNecessary(note) {
 | 
						|
        if (note.detail.encryption > 0) {
 | 
						|
            decryptNote(note);
 | 
						|
        }
 | 
						|
    }
 | 
						|
 | 
						|
    function decryptNote(note) {
 | 
						|
        note.detail.note_title = decryptString(note.detail.note_title);
 | 
						|
        note.detail.note_text = decryptString(note.detail.note_text);
 | 
						|
    }
 | 
						|
 | 
						|
    async function encryptSubTree(noteId) {
 | 
						|
        await ensureEncryptionIsAvailable(true, true);
 | 
						|
 | 
						|
        updateSubTreeRecursively(noteId, note => {
 | 
						|
                if (note.detail.encryption === null || note.detail.encryption === 0) {
 | 
						|
                    encryptNote(note);
 | 
						|
 | 
						|
                    note.detail.encryption = 1;
 | 
						|
 | 
						|
                    return true;
 | 
						|
                }
 | 
						|
                else {
 | 
						|
                    return false;
 | 
						|
                }
 | 
						|
            },
 | 
						|
            note => {
 | 
						|
                if (note.detail.note_id === noteEditor.getCurrentNoteId()) {
 | 
						|
                    noteEditor.loadNoteToEditor(note.detail.note_id);
 | 
						|
                }
 | 
						|
                else {
 | 
						|
                    noteEditor.setTreeBasedOnEncryption(note);
 | 
						|
                }
 | 
						|
            });
 | 
						|
 | 
						|
        message("Encryption finished.");
 | 
						|
    }
 | 
						|
 | 
						|
    async function decryptSubTree(noteId) {
 | 
						|
        await ensureEncryptionIsAvailable(true, true);
 | 
						|
 | 
						|
        updateSubTreeRecursively(noteId, note => {
 | 
						|
                if (note.detail.encryption === 1) {
 | 
						|
                    decryptNote(note);
 | 
						|
 | 
						|
                    note.detail.encryption = 0;
 | 
						|
 | 
						|
                    return true;
 | 
						|
                }
 | 
						|
                else {
 | 
						|
                    return false;
 | 
						|
                }
 | 
						|
            },
 | 
						|
            note => {
 | 
						|
                if (note.detail.note_id === noteEditor.getCurrentNoteId()) {
 | 
						|
                    noteEditor.loadNoteToEditor(note.detail.note_id);
 | 
						|
                }
 | 
						|
                else {
 | 
						|
                    noteEditor.setTreeBasedOnEncryption(note);
 | 
						|
                }
 | 
						|
            });
 | 
						|
 | 
						|
        message("Decryption finished.");
 | 
						|
    }
 | 
						|
 | 
						|
    function updateSubTreeRecursively(noteId, updateCallback, successCallback) {
 | 
						|
        updateNoteSynchronously(noteId, updateCallback, successCallback);
 | 
						|
 | 
						|
        const node = treeUtils.getNodeByKey(noteId);
 | 
						|
        if (!node || !node.getChildren()) {
 | 
						|
            return;
 | 
						|
        }
 | 
						|
 | 
						|
        for (const child of node.getChildren()) {
 | 
						|
            updateSubTreeRecursively(child.key, updateCallback, successCallback);
 | 
						|
        }
 | 
						|
    }
 | 
						|
 | 
						|
    function updateNoteSynchronously(noteId, updateCallback, successCallback) {
 | 
						|
        $.ajax({
 | 
						|
            url: baseApiUrl + 'notes/' + noteId,
 | 
						|
            type: 'GET',
 | 
						|
            async: false,
 | 
						|
            success: note => {
 | 
						|
                const needSave = updateCallback(note);
 | 
						|
 | 
						|
                if (!needSave) {
 | 
						|
                    return;
 | 
						|
                }
 | 
						|
 | 
						|
                for (const link of note.links) {
 | 
						|
                    delete link.type;
 | 
						|
                }
 | 
						|
 | 
						|
                $.ajax({
 | 
						|
                    url: baseApiUrl + 'notes/' + noteId,
 | 
						|
                    type: 'PUT',
 | 
						|
                    data: JSON.stringify(note),
 | 
						|
                    contentType: "application/json",
 | 
						|
                    async: false,
 | 
						|
                    success: () => {
 | 
						|
                        if (successCallback) {
 | 
						|
                            successCallback(note);
 | 
						|
                        }
 | 
						|
                    },
 | 
						|
                    error: () => {
 | 
						|
                        console.log("Updating " + noteId + " failed.");
 | 
						|
                    }
 | 
						|
                });
 | 
						|
            },
 | 
						|
            error: () => {
 | 
						|
                console.log("Reading " + noteId + " failed.");
 | 
						|
            }
 | 
						|
        });
 | 
						|
    }
 | 
						|
 | 
						|
    return {
 | 
						|
        setEncryptedDataKey,
 | 
						|
        setEncryptionSessionTimeout,
 | 
						|
        ensureEncryptionIsAvailable,
 | 
						|
        decryptTreeItems,
 | 
						|
        resetEncryptionSession,
 | 
						|
        isEncryptionAvailable,
 | 
						|
        encryptNoteIfNecessary,
 | 
						|
        encryptString,
 | 
						|
        decryptString,
 | 
						|
        encryptNoteAndSendToServer,
 | 
						|
        decryptNoteAndSendToServer,
 | 
						|
        decryptNoteIfNecessary,
 | 
						|
        encryptSubTree,
 | 
						|
        decryptSubTree
 | 
						|
    };
 | 
						|
})(); |