File

src/crypto/key/vault-key.service.ts

Extends

KeyService

Index

Properties
Methods

Constructor

constructor(httpService: HttpService, configService: ConfigService, cryptoService: CryptoService)
Parameters :
Name Type Optional
httpService HttpService No
configService ConfigService No
cryptoService CryptoService No

Methods

Async create
create()

Creates a new keypair in the vault.

Returns : unknown
derToJwtSignature
derToJwtSignature(derSignature: string)

Converts a DER signature to a JWT signature.

Parameters :
Name Type Optional
derSignature string No
Returns : any
Private getJWK
getJWK(key: string)
Parameters :
Name Type Optional
key string No
Returns : Promise<JWK>
getKid
getKid()
Inherited from KeyService
Defined in KeyService:94
Returns : Promise<string>
Async getPublicKey
getPublicKey(type)
Inherited from KeyService
Defined in KeyService:104

Gets the public key and converts it to a KeyLike object.

Parameters :
Name Optional
type No
Returns : Promise<string>
Async getPublicKey
getPublicKey(type)
Parameters :
Name Optional
type No
Returns : Promise<JWK>
Async getPublicKey
getPublicKey(type: "jwk" | "pem")
Parameters :
Name Type Optional
type "jwk" | "pem" No
Returns : Promise<JWK | string>
Async init
init()
Inherited from KeyService
Defined in KeyService:49

Check if the vault has a key with the given id

Returns : any
sign
sign(value: string)

Signs a value with a key in the vault.

Parameters :
Name Type Optional
value string No
Returns : Promise<string>
Async signJWT
signJWT(payload: JwtPayload, header: JWTHeaderParameters)
Inherited from KeyService
Defined in KeyService:154

Creates a proof of possession jwt.

Parameters :
Name Type Optional
payload JwtPayload No
header JWTHeaderParameters No
Returns : Promise<string>
Async onModuleInit
onModuleInit()
Inherited from KeyService
Defined in KeyService:11
Returns : any

Properties

Private folder
Type : string
Private headers
Type : literal type
Private keyId
Type : string
Public signer
Type : Signer
Inherited from KeyService
Defined in KeyService:14
Private vaultUrl
Type : string
import { Injectable } from '@nestjs/common';
import { KeyService } from './key.service';
import { HttpService } from '@nestjs/axios';
import { firstValueFrom } from 'rxjs';
import { importSPKI, exportJWK, JWTHeaderParameters, JWK } from 'jose';
import { ConfigService } from '@nestjs/config';
import { JwtPayload, Signer } from '@sd-jwt/types';
import { CryptoService, CryptoType } from './crypto/crypto.service';
import { existsSync, writeFileSync } from 'fs';
import { join } from 'path';

@Injectable()
export class VaultKeyService extends KeyService {
    public signer!: Signer;
    private keyId: string;

    // url to the vault instance
    private vaultUrl: string;
    // headers for the vault api
    private headers: { headers: { 'X-Vault-Token': string } };

    private folder: string;

    constructor(
        private httpService: HttpService,
        private configService: ConfigService,
        private cryptoService: CryptoService,
    ) {
        super();
        this.folder = join(
            this.configService.getOrThrow<string>('FOLDER'),
            'keys',
        );

        this.vaultUrl = this.configService.get<string>('VAULT_URL') as string;
        this.headers = {
            headers: {
                'X-Vault-Token': this.configService.get<string>(
                    'VAULT_TOKEN',
                ) as string,
            },
        };
        this.keyId = this.configService.get<string>('VAULT_KEY_ID') as string;
    }

    /**
     * Check if the vault has a key with the given id
     */
    async init() {
        await this.getPublicKey('pem')
            .then((res) => {
                writeFileSync(join(this.folder, 'public-key.pem'), res);
            })
            .catch(async () => this.create());
        const signerCert = join(this.folder, 'signing-certificate.pem');
        if (!existsSync(signerCert)) {
            //TODO: it would be cool to call this script automatically
            throw new Error(
                'No signing certificate found. Please run create-cert-from-pubkey.sh',
            );
        }

        this.signer = async (input: string) => this.sign(input);
    }

    /**
     * Creates a new keypair in the vault.
     * @param createKeyDto
     * @param user
     * @returns
     */
    async create() {
        const types: Map<CryptoType, string> = new Map();
        types.set('ES256', 'ecdsa-p256');
        types.set('Ed25519', 'ed25519');

        const res = await firstValueFrom(
            this.httpService.post(
                `${this.vaultUrl}/keys/${this.keyId}`,
                {
                    exportable: false,
                    type: types.get(this.cryptoService.getAlg()),
                },
                this.headers,
            ),
        );
        const jwk = await this.getPublicKey('jwk');
        return {
            id: res.data.id,
            publicKey: jwk,
        };
    }

    getKid(): Promise<string> {
        //TODO: check if this is the right way to get the key id
        return Promise.resolve(this.keyId);
    }

    /**
     * Gets the public key and converts it to a KeyLike object.
     * @param id
     * @returns
     */
    async getPublicKey(type: 'pem'): Promise<string>;
    async getPublicKey(type: 'jwk'): Promise<JWK>;
    async getPublicKey(type: 'jwk' | 'pem'): Promise<JWK | string> {
        return firstValueFrom(
            this.httpService.get<any>(
                `${this.vaultUrl}/keys/${this.keyId}`,
                this.headers,
            ),
        ).then(async (res) => {
            return type === 'pem'
                ? (res.data.data.keys['1'].public_key as string)
                : await this.getJWK(res.data.data.keys['1'].public_key);
        });
    }

    private getJWK(key: string): Promise<JWK> {
        return importSPKI(key, this.cryptoService.getAlg())
            .then((cryptoKey) => exportJWK(cryptoKey))
            .then((jwk) => {
                jwk.kid = this.keyId;
                return jwk;
            });
    }

    /**
     * Signs a value with a key in the vault.
     * @param id
     * @param user
     * @param value
     * @returns
     */
    sign(value: string): Promise<string> {
        return firstValueFrom(
            this.httpService.post(
                `${this.vaultUrl}/sign/${this.keyId}`,
                {
                    input: Buffer.from(value).toString('base64'),
                },
                this.headers,
            ),
        ).then((res) =>
            this.derToJwtSignature(res.data.data.signature.split(':')[2]),
        );
    }

    /**
     * Creates a proof of possession jwt.
     * @param user
     * @param value
     */
    async signJWT(
        payload: JwtPayload,
        header: JWTHeaderParameters,
    ): Promise<string> {
        // Convert header and payload to Base64 to prepare for Vault
        const encodedHeader = Buffer.from(JSON.stringify(header)).toString(
            'base64url',
        );
        const encodedPayload = Buffer.from(JSON.stringify(payload)).toString(
            'base64url',
        );
        const signingInput = `${encodedHeader}.${encodedPayload}`;

        // Request to Vault for signing
        try {
            const signature = await this.sign(signingInput);
            return `${encodedHeader}.${encodedPayload}.${signature}`;
        } catch (error) {
            console.error('Error signing JWT with Vault:', error);
            throw error;
        }
    }

    /**
     * Converts a DER signature to a JWT signature.
     * @param derSignature
     * @returns
     */
    derToJwtSignature(derSignature: string) {
        // Step 1: Extract r and s from DER signature
        const der = Buffer.from(derSignature, 'base64');
        const sequence = der.slice(2); // Skip the sequence tag and length
        const rLength = sequence[1];
        const r = sequence.slice(2, 2 + rLength);
        const s = sequence.slice(2 + rLength + 2); // Skip r, its tag and length byte, and s's tag and length byte

        // Step 2: Ensure r and s are 32 bytes each (pad with zeros if necessary)
        // Ensure r and s are 32 bytes each
        let rPadded: Buffer;
        let sPadded: Buffer;
        if (r.length > 32) {
            if (r.length === 33 && r[0] === 0x00) {
                rPadded = r.slice(1);
            } else {
                throw new Error('Invalid r length in DER signature');
            }
        } else {
            rPadded = Buffer.concat([Buffer.alloc(32 - r.length), r]);
        }
        if (s.length > 32) {
            if (s.length === 33 && s[0] === 0x00) {
                sPadded = s.slice(1);
            } else {
                throw new Error('Invalid s length in DER signature');
            }
        } else {
            sPadded = Buffer.concat([Buffer.alloc(32 - s.length), s]);
        }

        // Step 3: Concatenate r and s to form the raw signature
        const rawSignature = Buffer.concat([rPadded, sPadded]);

        // Step 4: Base64url encode the raw signature
        return rawSignature
            .toString('base64')
            .replace(/\+/g, '-')
            .replace(/\//g, '_')
            .replace(/=/g, '');
    }
}

results matching ""

    No results matching ""