diff --git a/frontend/src/common/jwe.ts b/frontend/src/common/jwe.ts index bf199853..d9437ac2 100644 --- a/frontend/src/common/jwe.ts +++ b/frontend/src/common/jwe.ts @@ -289,7 +289,7 @@ export class JWE { return new EncryptedJWE(protectedHeader, [{ encrypted_key: encryptedKey, header: header }], iv, ciphertext, tag); } - public static parseJson(jwe: JsonJWE): EncryptedJWE { // TODO: json: + public static parseJson(jwe: JsonJWE): EncryptedJWE { if (!jwe.protected || !jwe.recipients || !jwe.iv || !jwe.ciphertext || !jwe.tag) { throw new Error('Malformed JWE'); } @@ -473,7 +473,6 @@ export class PBES2 { public static readonly DEFAULT_ITERATION_COUNT = 1000000; private static readonly NULL_BYTE = Uint8Array.of(0x00); - // TODO: can we dedup this with crypto.ts's PBKDF2? Or is the latter unused anyway, once we migrate all ciphertext to JWE containers public static async deriveWrappingKey(password: string, alg: 'PBES2-HS512+A256KW' | 'PBES2-HS256+A128KW', salt: Uint8Array, iterations: number, extractable: boolean = false): Promise { let hash, keyLen; if (alg == 'PBES2-HS512+A256KW') { diff --git a/frontend/tsconfig.json b/frontend/tsconfig.json index 6136992e..dae11f70 100644 --- a/frontend/tsconfig.json +++ b/frontend/tsconfig.json @@ -14,7 +14,7 @@ }, "ts-node": { "compilerOptions": { - "module": "CommonJS" // TODO change to es2022? + "module": "CommonJS" } }, "include": ["src/**/*.ts", "src/**/*.d.ts", "src/**/*.tsx", "src/**/*.vue"]