@lifeready/core 1.0.0 → 1.0.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +62 -62
- package/karma.conf.js +32 -0
- package/ng-package.json +26 -0
- package/package.json +21 -29
- package/src/lib/_common/ast.ts +75 -0
- package/src/lib/_common/deferred-promise.ts +35 -0
- package/src/lib/_common/exceptions.ts +189 -0
- package/src/lib/_common/queries.gql.ts +200 -0
- package/src/lib/_common/run-outside-angular.ts +125 -0
- package/src/lib/_common/tests.ts +82 -0
- package/{lib/_common/types.d.ts → src/lib/_common/types.ts} +13 -10
- package/src/lib/_common/utils.ts +57 -0
- package/src/lib/api/api-mutation.spec.ts +547 -0
- package/src/lib/api/api-query.spec.ts +40 -0
- package/src/lib/api/contact-card.gql.ts +85 -0
- package/src/lib/api/contact-card.service.spec.ts +249 -0
- package/src/lib/api/contact-card.service.ts +228 -0
- package/src/lib/api/contact-card2.gql.ts +93 -0
- package/src/lib/api/contact-card2.service.spec.ts +297 -0
- package/src/lib/api/contact-card2.service.ts +139 -0
- package/src/lib/api/file.service.spec.ts +14 -0
- package/src/lib/api/file.service.ts +81 -0
- package/src/lib/api/item2.gql.ts +211 -0
- package/src/lib/api/item2.service.spec.ts +1043 -0
- package/src/lib/api/item2.service.ts +481 -0
- package/src/lib/api/key-exchange.gql.ts +196 -0
- package/src/lib/api/key-exchange.service.spec.ts +470 -0
- package/src/lib/api/key-exchange.service.ts +731 -0
- package/src/lib/api/key-exchange.types.ts +235 -0
- package/src/lib/api/key-exchange2.gql.ts +310 -0
- package/src/lib/api/key-exchange2.service.spec.ts +892 -0
- package/src/lib/api/key-exchange2.service.ts +875 -0
- package/src/lib/api/lock.gql.ts +67 -0
- package/src/lib/api/lock.service.spec.ts +549 -0
- package/src/lib/api/lock.service.ts +57 -0
- package/src/lib/api/lr-apollo.service.spec.ts +27 -0
- package/src/lib/api/lr-apollo.service.ts +43 -0
- package/{lib/api/lr-graphql/index.d.ts → src/lib/api/lr-graphql/index.ts} +5 -5
- package/src/lib/api/lr-graphql/lr-graphql.service.ts +313 -0
- package/src/lib/api/lr-graphql/lr-merged-mutation.ts +377 -0
- package/src/lib/api/lr-graphql/lr-mutation-base.ts +67 -0
- package/src/lib/api/lr-graphql/lr-mutation.ts +74 -0
- package/src/lib/api/lr-graphql/lr.service.ts +28 -0
- package/src/lib/api/message.service.spec.ts +20 -0
- package/src/lib/api/message.service.ts +210 -0
- package/src/lib/api/persist.service.spec.ts +209 -0
- package/src/lib/api/persist.service.ts +220 -0
- package/src/lib/api/query-processor/common-processors.service.ts +148 -0
- package/{lib/api/query-processor/index.d.ts → src/lib/api/query-processor/index.ts} +2 -2
- package/src/lib/api/query-processor/query-processor.service.ts +240 -0
- package/src/lib/api/query-processor/tp-password-reset-processor.service.ts +177 -0
- package/src/lib/api/shared-contact-card.service.ts +156 -0
- package/src/lib/api/shared-contact-card2.gql.ts +76 -0
- package/src/lib/api/shared-contact-card2.service.ts +154 -0
- package/src/lib/api/time.service.spec.ts +48 -0
- package/src/lib/api/time.service.ts +155 -0
- package/src/lib/api/types/graphql.types.ts +48 -0
- package/{lib/api/types/index.d.ts → src/lib/api/types/index.ts} +2 -2
- package/src/lib/api/types/lr-graphql.types.ts +467 -0
- package/src/lib/auth/auth.config.ts +83 -0
- package/src/lib/auth/auth.gql.ts +62 -0
- package/src/lib/auth/auth.types.ts +79 -0
- package/src/lib/auth/idle.service.spec.ts +119 -0
- package/src/lib/auth/idle.service.ts +208 -0
- package/src/lib/auth/idle.types.ts +11 -0
- package/src/lib/auth/lbop.service.spec.ts +56 -0
- package/src/lib/auth/lbop.service.ts +539 -0
- package/src/lib/auth/life-ready-auth.service.spec.ts +70 -0
- package/src/lib/auth/life-ready-auth.service.ts +454 -0
- package/src/lib/auth/password.service.spec.ts +51 -0
- package/src/lib/auth/password.service.ts +438 -0
- package/src/lib/auth/register.service.spec.ts +31 -0
- package/src/lib/auth/register.service.ts +181 -0
- package/src/lib/auth/two-factor.service.spec.ts +21 -0
- package/src/lib/auth/two-factor.service.ts +69 -0
- package/src/lib/category/category-meta.service.spec.ts +28 -0
- package/src/lib/category/category-meta.service.ts +125 -0
- package/src/lib/category/category.gql.ts +449 -0
- package/src/lib/category/category.service.spec.ts +26 -0
- package/src/lib/category/category.service.ts +498 -0
- package/src/lib/category/category.types.ts +89 -0
- package/src/lib/cryptography/cryptography.types.ts +108 -0
- package/src/lib/cryptography/encryption.service.spec.ts +125 -0
- package/src/lib/cryptography/encryption.service.ts +243 -0
- package/src/lib/cryptography/key-factory.service.spec.ts +15 -0
- package/src/lib/cryptography/key-factory.service.ts +303 -0
- package/src/lib/cryptography/key-graph.service.spec.ts +16 -0
- package/src/lib/cryptography/key-graph.service.ts +354 -0
- package/src/lib/cryptography/key-meta.service.spec.ts +40 -0
- package/src/lib/cryptography/key-meta.service.ts +254 -0
- package/src/lib/cryptography/key.service.spec.ts +16 -0
- package/src/lib/cryptography/key.service.ts +154 -0
- package/src/lib/cryptography/slip39.service.spec.ts +44 -0
- package/src/lib/cryptography/slip39.service.ts +204 -0
- package/src/lib/cryptography/web-crypto.service.ts +22 -0
- package/src/lib/life-ready.config.ts +127 -0
- package/src/lib/life-ready.module.ts +81 -0
- package/src/lib/plan/plan.gql.ts +133 -0
- package/src/lib/plan/plan.service.spec.ts +294 -0
- package/src/lib/plan/plan.service.ts +198 -0
- package/src/lib/plan/plan.types.ts +37 -0
- package/src/lib/record/record-attachment.service.spec.ts +31 -0
- package/src/lib/record/record-attachment.service.ts +101 -0
- package/src/lib/record/record.gql.ts +192 -0
- package/src/lib/record/record.service.spec.ts +598 -0
- package/src/lib/record/record.service.ts +236 -0
- package/src/lib/record/record.types.ts +86 -0
- package/src/lib/record-type/record-type.service.spec.ts +16 -0
- package/src/lib/record-type/record-type.service.ts +71 -0
- package/src/lib/record-type/record-type.types.ts +58 -0
- package/src/lib/scenario/approvals/scenario-approval.gql.ts +112 -0
- package/src/lib/scenario/approvals/scenario-approval.types.ts +85 -0
- package/src/lib/scenario/approvals/scenario-approver.service.spec.ts +16 -0
- package/src/lib/scenario/approvals/scenario-approver.service.ts +422 -0
- package/src/lib/scenario/claimants/scenario-claimant.gql.ts +56 -0
- package/src/lib/scenario/claimants/scenario-claimant.service.spec.ts +16 -0
- package/src/lib/scenario/claimants/scenario-claimant.service.ts +100 -0
- package/src/lib/scenario/claimants/scenario-claimant.types.ts +21 -0
- package/src/lib/scenario/receivers/scenario-receiver.gql.ts +157 -0
- package/src/lib/scenario/receivers/scenario-receiver.service.spec.ts +16 -0
- package/src/lib/scenario/receivers/scenario-receiver.service.ts +278 -0
- package/src/lib/scenario/receivers/scenario-receiver.types.ts +66 -0
- package/src/lib/scenario/scenario-setup.service.spec.ts +22 -0
- package/src/lib/scenario/scenario-setup.service.ts +369 -0
- package/src/lib/scenario/scenario.gql.ts +404 -0
- package/src/lib/scenario/scenario.service.spec.ts +1586 -0
- package/src/lib/scenario/scenario.service.ts +811 -0
- package/src/lib/scenario/scenario.types.ts +258 -0
- package/src/lib/search/search.gql.ts +62 -0
- package/src/lib/search/search.service.spec.ts +57 -0
- package/src/lib/search/search.service.ts +174 -0
- package/src/lib/search/search.types.ts +24 -0
- package/src/lib/trusted-parties/tp-password-reset-request.service.ts +140 -0
- package/src/lib/trusted-parties/tp-password-reset-user.service.ts +359 -0
- package/src/lib/trusted-parties/tp-password-reset.gql.ts +453 -0
- package/src/lib/trusted-parties/tp-password-reset.service.spec.ts +602 -0
- package/src/lib/trusted-parties/tp-password-reset.service.ts +482 -0
- package/src/lib/trusted-parties/trusted-party.gql.ts +159 -0
- package/src/lib/trusted-parties/trusted-party.service.spec.ts +1008 -0
- package/src/lib/trusted-parties/trusted-party.service.ts +394 -0
- package/src/lib/trusted-parties/trusted-party.types.ts +119 -0
- package/src/lib/trusted-parties/trusted-party2.gql.ts +165 -0
- package/src/lib/trusted-parties/trusted-party2.service.spec.ts +1782 -0
- package/src/lib/trusted-parties/trusted-party2.service.ts +272 -0
- package/src/lib/users/profile-details.service.spec.ts +45 -0
- package/src/lib/users/profile-details.service.ts +278 -0
- package/src/lib/users/profile.gql.ts +108 -0
- package/src/lib/users/profile.service.spec.ts +97 -0
- package/src/lib/users/profile.service.ts +224 -0
- package/src/lib/users/profile.types.ts +101 -0
- package/src/lib/users/user.gql.ts +69 -0
- package/src/lib/users/user.service.spec.ts +161 -0
- package/src/lib/users/user.service.ts +72 -0
- package/src/lib/users/user.types.ts +27 -0
- package/{public-api.d.ts → src/public-api.ts} +96 -77
- package/src/test.ts +21 -0
- package/tsconfig.lib.json +21 -0
- package/tsconfig.lib.prod.json +6 -0
- package/tsconfig.spec.json +10 -0
- package/tslint.json +17 -0
- package/bundles/lifeready-core.umd.js +0 -15876
- package/bundles/lifeready-core.umd.js.map +0 -1
- package/bundles/lifeready-core.umd.min.js +0 -16
- package/bundles/lifeready-core.umd.min.js.map +0 -1
- package/esm2015/lib/_common/ast.js +0 -40
- package/esm2015/lib/_common/deferred-promise.js +0 -24
- package/esm2015/lib/_common/exceptions.js +0 -157
- package/esm2015/lib/_common/queries.gql.js +0 -190
- package/esm2015/lib/_common/run-outside-angular.js +0 -79
- package/esm2015/lib/_common/types.js +0 -1
- package/esm2015/lib/_common/utils.js +0 -44
- package/esm2015/lib/api/contact-card.gql.js +0 -79
- package/esm2015/lib/api/contact-card.service.js +0 -154
- package/esm2015/lib/api/contact-card2.gql.js +0 -60
- package/esm2015/lib/api/contact-card2.service.js +0 -103
- package/esm2015/lib/api/file.service.js +0 -74
- package/esm2015/lib/api/item2.gql.js +0 -110
- package/esm2015/lib/api/item2.service.js +0 -311
- package/esm2015/lib/api/key-exchange.gql.js +0 -188
- package/esm2015/lib/api/key-exchange.service.js +0 -442
- package/esm2015/lib/api/key-exchange.types.js +0 -18
- package/esm2015/lib/api/key-exchange2.gql.js +0 -171
- package/esm2015/lib/api/key-exchange2.service.js +0 -479
- package/esm2015/lib/api/lock.gql.js +0 -40
- package/esm2015/lib/api/lock.service.js +0 -64
- package/esm2015/lib/api/lr-apollo.service.js +0 -46
- package/esm2015/lib/api/lr-graphql/index.js +0 -6
- package/esm2015/lib/api/lr-graphql/lr-graphql.service.js +0 -155
- package/esm2015/lib/api/lr-graphql/lr-merged-mutation.js +0 -213
- package/esm2015/lib/api/lr-graphql/lr-mutation-base.js +0 -51
- package/esm2015/lib/api/lr-graphql/lr-mutation.js +0 -48
- package/esm2015/lib/api/lr-graphql/lr.service.js +0 -18
- package/esm2015/lib/api/message.service.js +0 -138
- package/esm2015/lib/api/persist.service.js +0 -181
- package/esm2015/lib/api/query-processor/common-processors.service.js +0 -93
- package/esm2015/lib/api/query-processor/index.js +0 -3
- package/esm2015/lib/api/query-processor/query-processor.service.js +0 -192
- package/esm2015/lib/api/query-processor/tp-password-reset-processor.service.js +0 -109
- package/esm2015/lib/api/shared-contact-card.service.js +0 -119
- package/esm2015/lib/api/shared-contact-card2.gql.js +0 -41
- package/esm2015/lib/api/shared-contact-card2.service.js +0 -117
- package/esm2015/lib/api/time.service.js +0 -146
- package/esm2015/lib/api/types/graphql.types.js +0 -7
- package/esm2015/lib/api/types/index.js +0 -3
- package/esm2015/lib/api/types/lr-graphql.types.js +0 -71
- package/esm2015/lib/auth/auth.config.js +0 -57
- package/esm2015/lib/auth/auth.gql.js +0 -48
- package/esm2015/lib/auth/auth.types.js +0 -27
- package/esm2015/lib/auth/idle.service.js +0 -168
- package/esm2015/lib/auth/idle.types.js +0 -7
- package/esm2015/lib/auth/lbop.service.js +0 -355
- package/esm2015/lib/auth/life-ready-auth.service.js +0 -333
- package/esm2015/lib/auth/password.service.js +0 -320
- package/esm2015/lib/auth/register.service.js +0 -172
- package/esm2015/lib/auth/two-factor.service.js +0 -74
- package/esm2015/lib/category/category-meta.service.js +0 -99
- package/esm2015/lib/category/category.gql.js +0 -406
- package/esm2015/lib/category/category.service.js +0 -390
- package/esm2015/lib/category/category.types.js +0 -29
- package/esm2015/lib/cryptography/cryptography.types.js +0 -11
- package/esm2015/lib/cryptography/encryption.service.js +0 -189
- package/esm2015/lib/cryptography/key-factory.service.js +0 -237
- package/esm2015/lib/cryptography/key-graph.service.js +0 -280
- package/esm2015/lib/cryptography/key-meta.service.js +0 -200
- package/esm2015/lib/cryptography/key.service.js +0 -124
- package/esm2015/lib/cryptography/slip39.service.js +0 -169
- package/esm2015/lib/cryptography/web-crypto.service.js +0 -29
- package/esm2015/lib/life-ready.config.js +0 -84
- package/esm2015/lib/life-ready.module.js +0 -74
- package/esm2015/lib/plan/plan.gql.js +0 -123
- package/esm2015/lib/plan/plan.service.js +0 -149
- package/esm2015/lib/plan/plan.types.js +0 -11
- package/esm2015/lib/record/record-attachment.service.js +0 -101
- package/esm2015/lib/record/record.gql.js +0 -179
- package/esm2015/lib/record/record.service.js +0 -206
- package/esm2015/lib/record/record.types.js +0 -15
- package/esm2015/lib/record-type/record-type.service.js +0 -75
- package/esm2015/lib/record-type/record-type.types.js +0 -28
- package/esm2015/lib/scenario/approvals/scenario-approval.gql.js +0 -105
- package/esm2015/lib/scenario/approvals/scenario-approval.types.js +0 -1
- package/esm2015/lib/scenario/approvals/scenario-approver.service.js +0 -300
- package/esm2015/lib/scenario/claimants/scenario-claimant.gql.js +0 -52
- package/esm2015/lib/scenario/claimants/scenario-claimant.service.js +0 -97
- package/esm2015/lib/scenario/claimants/scenario-claimant.types.js +0 -1
- package/esm2015/lib/scenario/receivers/scenario-receiver.gql.js +0 -150
- package/esm2015/lib/scenario/receivers/scenario-receiver.service.js +0 -229
- package/esm2015/lib/scenario/receivers/scenario-receiver.types.js +0 -1
- package/esm2015/lib/scenario/scenario-setup.service.js +0 -269
- package/esm2015/lib/scenario/scenario.gql.js +0 -368
- package/esm2015/lib/scenario/scenario.service.js +0 -611
- package/esm2015/lib/scenario/scenario.types.js +0 -64
- package/esm2015/lib/search/search.gql.js +0 -62
- package/esm2015/lib/search/search.service.js +0 -156
- package/esm2015/lib/search/search.types.js +0 -6
- package/esm2015/lib/trusted-parties/tp-password-reset-request.service.js +0 -112
- package/esm2015/lib/trusted-parties/tp-password-reset-user.service.js +0 -266
- package/esm2015/lib/trusted-parties/tp-password-reset.gql.js +0 -232
- package/esm2015/lib/trusted-parties/tp-password-reset.service.js +0 -300
- package/esm2015/lib/trusted-parties/trusted-party.gql.js +0 -148
- package/esm2015/lib/trusted-parties/trusted-party.service.js +0 -326
- package/esm2015/lib/trusted-parties/trusted-party.types.js +0 -41
- package/esm2015/lib/trusted-parties/trusted-party2.gql.js +0 -87
- package/esm2015/lib/trusted-parties/trusted-party2.service.js +0 -215
- package/esm2015/lib/users/profile-details.service.js +0 -214
- package/esm2015/lib/users/profile.gql.js +0 -97
- package/esm2015/lib/users/profile.service.js +0 -169
- package/esm2015/lib/users/profile.types.js +0 -34
- package/esm2015/lib/users/user.gql.js +0 -60
- package/esm2015/lib/users/user.service.js +0 -79
- package/esm2015/lib/users/user.types.js +0 -5
- package/esm2015/lifeready-core.js +0 -10
- package/esm2015/public-api.js +0 -81
- package/fesm2015/lifeready-core.js +0 -13282
- package/fesm2015/lifeready-core.js.map +0 -1
- package/lib/_common/ast.d.ts +0 -11
- package/lib/_common/deferred-promise.d.ts +0 -12
- package/lib/_common/exceptions.d.ts +0 -109
- package/lib/_common/queries.gql.d.ts +0 -10
- package/lib/_common/run-outside-angular.d.ts +0 -14
- package/lib/_common/utils.d.ts +0 -3
- package/lib/api/contact-card.gql.d.ts +0 -7
- package/lib/api/contact-card.service.d.ts +0 -52
- package/lib/api/contact-card2.gql.d.ts +0 -34
- package/lib/api/contact-card2.service.d.ts +0 -49
- package/lib/api/file.service.d.ts +0 -18
- package/lib/api/item2.gql.d.ts +0 -96
- package/lib/api/item2.service.d.ts +0 -177
- package/lib/api/key-exchange.gql.d.ts +0 -9
- package/lib/api/key-exchange.service.d.ts +0 -39
- package/lib/api/key-exchange.types.d.ts +0 -196
- package/lib/api/key-exchange2.gql.d.ts +0 -125
- package/lib/api/key-exchange2.service.d.ts +0 -187
- package/lib/api/lock.gql.d.ts +0 -27
- package/lib/api/lock.service.d.ts +0 -25
- package/lib/api/lr-apollo.service.d.ts +0 -15
- package/lib/api/lr-graphql/lr-graphql.service.d.ts +0 -60
- package/lib/api/lr-graphql/lr-merged-mutation.d.ts +0 -27
- package/lib/api/lr-graphql/lr-mutation-base.d.ts +0 -28
- package/lib/api/lr-graphql/lr-mutation.d.ts +0 -8
- package/lib/api/lr-graphql/lr.service.d.ts +0 -9
- package/lib/api/message.service.d.ts +0 -58
- package/lib/api/persist.service.d.ts +0 -31
- package/lib/api/query-processor/common-processors.service.d.ts +0 -36
- package/lib/api/query-processor/query-processor.service.d.ts +0 -18
- package/lib/api/query-processor/tp-password-reset-processor.service.d.ts +0 -15
- package/lib/api/shared-contact-card.service.d.ts +0 -33
- package/lib/api/shared-contact-card2.gql.d.ts +0 -36
- package/lib/api/shared-contact-card2.service.d.ts +0 -45
- package/lib/api/time.service.d.ts +0 -16
- package/lib/api/types/graphql.types.d.ts +0 -29
- package/lib/api/types/lr-graphql.types.d.ts +0 -385
- package/lib/auth/auth.config.d.ts +0 -5
- package/lib/auth/auth.gql.d.ts +0 -15
- package/lib/auth/auth.types.d.ts +0 -66
- package/lib/auth/idle.service.d.ts +0 -40
- package/lib/auth/idle.types.d.ts +0 -10
- package/lib/auth/lbop.service.d.ts +0 -91
- package/lib/auth/life-ready-auth.service.d.ts +0 -46
- package/lib/auth/password.service.d.ts +0 -78
- package/lib/auth/register.service.d.ts +0 -25
- package/lib/auth/two-factor.service.d.ts +0 -15
- package/lib/category/category-meta.service.d.ts +0 -23
- package/lib/category/category.gql.d.ts +0 -45
- package/lib/category/category.service.d.ts +0 -67
- package/lib/category/category.types.d.ts +0 -79
- package/lib/cryptography/cryptography.types.d.ts +0 -83
- package/lib/cryptography/encryption.service.d.ts +0 -41
- package/lib/cryptography/key-factory.service.d.ts +0 -38
- package/lib/cryptography/key-graph.service.d.ts +0 -33
- package/lib/cryptography/key-meta.service.d.ts +0 -44
- package/lib/cryptography/key.service.d.ts +0 -36
- package/lib/cryptography/slip39.service.d.ts +0 -43
- package/lib/cryptography/web-crypto.service.d.ts +0 -5
- package/lib/life-ready.config.d.ts +0 -14
- package/lib/life-ready.module.d.ts +0 -5
- package/lib/plan/plan.gql.d.ts +0 -11
- package/lib/plan/plan.service.d.ts +0 -33
- package/lib/plan/plan.types.d.ts +0 -31
- package/lib/record/record-attachment.service.d.ts +0 -16
- package/lib/record/record.gql.d.ts +0 -14
- package/lib/record/record.service.d.ts +0 -25
- package/lib/record/record.types.d.ts +0 -57
- package/lib/record-type/record-type.service.d.ts +0 -11
- package/lib/record-type/record-type.types.d.ts +0 -50
- package/lib/scenario/approvals/scenario-approval.gql.d.ts +0 -7
- package/lib/scenario/approvals/scenario-approval.types.d.ts +0 -63
- package/lib/scenario/approvals/scenario-approver.service.d.ts +0 -32
- package/lib/scenario/claimants/scenario-claimant.gql.d.ts +0 -5
- package/lib/scenario/claimants/scenario-claimant.service.d.ts +0 -17
- package/lib/scenario/claimants/scenario-claimant.types.d.ts +0 -18
- package/lib/scenario/receivers/scenario-receiver.gql.d.ts +0 -8
- package/lib/scenario/receivers/scenario-receiver.service.d.ts +0 -30
- package/lib/scenario/receivers/scenario-receiver.types.d.ts +0 -54
- package/lib/scenario/scenario-setup.service.d.ts +0 -22
- package/lib/scenario/scenario.gql.d.ts +0 -34
- package/lib/scenario/scenario.service.d.ts +0 -58
- package/lib/scenario/scenario.types.d.ts +0 -217
- package/lib/search/search.gql.d.ts +0 -1
- package/lib/search/search.service.d.ts +0 -25
- package/lib/search/search.types.d.ts +0 -20
- package/lib/trusted-parties/tp-password-reset-request.service.d.ts +0 -20
- package/lib/trusted-parties/tp-password-reset-user.service.d.ts +0 -41
- package/lib/trusted-parties/tp-password-reset.gql.d.ts +0 -218
- package/lib/trusted-parties/tp-password-reset.service.d.ts +0 -131
- package/lib/trusted-parties/trusted-party.gql.d.ts +0 -9
- package/lib/trusted-parties/trusted-party.service.d.ts +0 -44
- package/lib/trusted-parties/trusted-party.types.d.ts +0 -102
- package/lib/trusted-parties/trusted-party2.gql.d.ts +0 -79
- package/lib/trusted-parties/trusted-party2.service.d.ts +0 -114
- package/lib/users/profile-details.service.d.ts +0 -21
- package/lib/users/profile.gql.d.ts +0 -11
- package/lib/users/profile.service.d.ts +0 -35
- package/lib/users/profile.types.d.ts +0 -96
- package/lib/users/user.gql.d.ts +0 -9
- package/lib/users/user.service.d.ts +0 -12
- package/lib/users/user.types.d.ts +0 -23
- package/lifeready-core.d.ts +0 -9
- package/lifeready-core.metadata.json +0 -1
|
@@ -0,0 +1,470 @@
|
|
|
1
|
+
// import { TestBed } from '@angular/core/testing';
|
|
2
|
+
// import { environment } from 'projects/lr-auth-app/src/environments/environment';
|
|
3
|
+
// import { TrustedPartyService, UserService } from '../../public-api';
|
|
4
|
+
// import {
|
|
5
|
+
// loginTestUser,
|
|
6
|
+
// logoutUser,
|
|
7
|
+
// } from '../auth/life-ready-auth.service.spec';
|
|
8
|
+
// import { ProfileService } from '../users/profile.service';
|
|
9
|
+
// import {
|
|
10
|
+
// lrConfigureTestingModule,
|
|
11
|
+
// lrExpectAsyncThrow,
|
|
12
|
+
// lrit,
|
|
13
|
+
// } from '../_common/tests';
|
|
14
|
+
// import { KeyExchangeService } from './key-exchange.service';
|
|
15
|
+
// import {
|
|
16
|
+
// DecryptedKeyExchange,
|
|
17
|
+
// KeyExchangeContactCardInput,
|
|
18
|
+
// KeyExchangeState,
|
|
19
|
+
// OtkState,
|
|
20
|
+
// } from './key-exchange.types';
|
|
21
|
+
// import { MessageService } from './message.service';
|
|
22
|
+
// import { SharedContactCardService } from './shared-contact-card.service';
|
|
23
|
+
// import { deleteAllTps } from '../trusted-parties/trusted-party.service.spec';
|
|
24
|
+
|
|
25
|
+
// const TIMEOUT = 1000 * 60 * 10;
|
|
26
|
+
|
|
27
|
+
// describe('KeyExchangeService', () => {
|
|
28
|
+
// let service: KeyExchangeService;
|
|
29
|
+
// let messageService: MessageService;
|
|
30
|
+
// let profileService: ProfileService;
|
|
31
|
+
// let userService: UserService;
|
|
32
|
+
// let trustedPartyService: TrustedPartyService;
|
|
33
|
+
// let sccService: SharedContactCardService;
|
|
34
|
+
|
|
35
|
+
// beforeEach(async () => {
|
|
36
|
+
// lrConfigureTestingModule();
|
|
37
|
+
// service = TestBed.inject(KeyExchangeService);
|
|
38
|
+
// messageService = TestBed.inject(MessageService);
|
|
39
|
+
// profileService = TestBed.inject(ProfileService);
|
|
40
|
+
// userService = TestBed.inject(UserService);
|
|
41
|
+
// trustedPartyService = TestBed.inject(TrustedPartyService);
|
|
42
|
+
// sccService = TestBed.inject(SharedContactCardService);
|
|
43
|
+
// }, TIMEOUT);
|
|
44
|
+
|
|
45
|
+
// lrit(
|
|
46
|
+
// 'should exchange keys and send messages',
|
|
47
|
+
// async () => {
|
|
48
|
+
// if (!environment.test) {
|
|
49
|
+
// return;
|
|
50
|
+
// }
|
|
51
|
+
|
|
52
|
+
// const {
|
|
53
|
+
// username: username1,
|
|
54
|
+
// password: password1,
|
|
55
|
+
// } = environment.test.users[0];
|
|
56
|
+
// const {
|
|
57
|
+
// username: username2,
|
|
58
|
+
// password: password2,
|
|
59
|
+
// } = environment.test.users[1];
|
|
60
|
+
|
|
61
|
+
// let ke: DecryptedKeyExchange;
|
|
62
|
+
|
|
63
|
+
// // ------------------------------------------------------
|
|
64
|
+
// // Test User 1
|
|
65
|
+
// // ------------------------------------------------------
|
|
66
|
+
// await loginTestUser(username1, password1);
|
|
67
|
+
// const user1 = await profileService.getCurrentUser();
|
|
68
|
+
|
|
69
|
+
// const msg1 = 'from initiator';
|
|
70
|
+
// const {
|
|
71
|
+
// keyExchange: initiated,
|
|
72
|
+
// otKeyK: initiatedOtKeyK,
|
|
73
|
+
// } = await service.initiateOtk({ message: { message: msg1 } });
|
|
74
|
+
// expect(initiated.id).toBeTruthy();
|
|
75
|
+
// expect(initiated.token).toBeTruthy();
|
|
76
|
+
// expect(initiated.initiatorActionRequired).toBe(false);
|
|
77
|
+
// expect(initiated.responderActionRequired).toBe(true);
|
|
78
|
+
// expect(initiated.state).toEqual(KeyExchangeState.IN_PROGRESS);
|
|
79
|
+
// expect(initiated.otk.state).toEqual(OtkState.OTK_INITIATED);
|
|
80
|
+
|
|
81
|
+
// const { keyExchange: cancelled } = await service.initiateOtk({
|
|
82
|
+
// message: { message: 'to be cancelled by initiator' },
|
|
83
|
+
// });
|
|
84
|
+
// const {
|
|
85
|
+
// keyExchange: declined,
|
|
86
|
+
// otKeyK: declinedOtKeyK,
|
|
87
|
+
// } = await service.initiateOtk({
|
|
88
|
+
// message: { message: 'to be declined by responder' },
|
|
89
|
+
// });
|
|
90
|
+
// const {
|
|
91
|
+
// keyExchange: declinedAfterAccept,
|
|
92
|
+
// otKeyK: declinedAfterOtKeyK,
|
|
93
|
+
// } = await service.initiateOtk({
|
|
94
|
+
// message: { message: 'to be declined by responder after accepting' },
|
|
95
|
+
// });
|
|
96
|
+
|
|
97
|
+
// // Initiator cancels
|
|
98
|
+
// await trustedPartyService.cancelInvitation(cancelled.id);
|
|
99
|
+
// ke = await service.getKeyExchange(cancelled.id);
|
|
100
|
+
// expect(ke.state).toEqual(KeyExchangeState.CANCELLED);
|
|
101
|
+
// // ------------------------------------------------------
|
|
102
|
+
// // Logout
|
|
103
|
+
// // ------------------------------------------------------
|
|
104
|
+
// await logoutUser();
|
|
105
|
+
|
|
106
|
+
// // Responder declines
|
|
107
|
+
// await trustedPartyService.declineInvitation(declined.id, declined.token);
|
|
108
|
+
// ke = await service.getKeyExchange(declined.id, {
|
|
109
|
+
// token: declined.token,
|
|
110
|
+
// otKeyK: declinedOtKeyK,
|
|
111
|
+
// });
|
|
112
|
+
// expect(ke.state).toEqual(KeyExchangeState.DECLINED);
|
|
113
|
+
|
|
114
|
+
// // Responder declines again should fail
|
|
115
|
+
// (
|
|
116
|
+
// await lrExpectAsyncThrow(
|
|
117
|
+
// trustedPartyService.declineInvitation(declined.id, declined.token)
|
|
118
|
+
// )
|
|
119
|
+
// ).toBeTruthy();
|
|
120
|
+
|
|
121
|
+
// ke = await service.getKeyExchange(initiated.id, {
|
|
122
|
+
// token: initiated.token,
|
|
123
|
+
// otKeyK: initiatedOtKeyK,
|
|
124
|
+
// });
|
|
125
|
+
// expect(
|
|
126
|
+
// ke.decryptedOtk.plainOtKeyCipher.initiator.message.message
|
|
127
|
+
// ).toEqual(msg1);
|
|
128
|
+
|
|
129
|
+
// // ------------------------------------------------------
|
|
130
|
+
// // Test User 2
|
|
131
|
+
// // ------------------------------------------------------
|
|
132
|
+
// await loginTestUser(username2, password2);
|
|
133
|
+
// const { currentUser: user2 } = await profileService.getCurrentUser();
|
|
134
|
+
|
|
135
|
+
// // Responder accepts then declines
|
|
136
|
+
// // Note that declining a key exchange will always invalidate the current shared key. So make
|
|
137
|
+
// // sure to do this first before the next test that accepts the exchange.
|
|
138
|
+
// ke = await service.getKeyExchange(declinedAfterAccept.id, {
|
|
139
|
+
// token: declinedAfterAccept.token,
|
|
140
|
+
// otKeyK: declinedAfterOtKeyK,
|
|
141
|
+
// });
|
|
142
|
+
// await service.respondOtk({
|
|
143
|
+
// id: ke.id,
|
|
144
|
+
// token: ke.token,
|
|
145
|
+
// decryptedOtk: ke.decryptedOtk,
|
|
146
|
+
// message: { message: 'will be declined after accepting' },
|
|
147
|
+
// });
|
|
148
|
+
|
|
149
|
+
// await trustedPartyService.declineInvitation(
|
|
150
|
+
// declinedAfterAccept.id,
|
|
151
|
+
// declinedAfterAccept.token
|
|
152
|
+
// );
|
|
153
|
+
|
|
154
|
+
// ke = await service.getKeyExchange(declinedAfterAccept.id);
|
|
155
|
+
// expect(ke.state).toEqual(KeyExchangeState.DECLINED);
|
|
156
|
+
// // Accept
|
|
157
|
+
// ke = await service.getKeyExchange(initiated.id, {
|
|
158
|
+
// token: initiated.token,
|
|
159
|
+
// otKeyK: initiatedOtKeyK,
|
|
160
|
+
// });
|
|
161
|
+
// const msg2 = 'from responder';
|
|
162
|
+
// const accepted = await service.respondOtk({
|
|
163
|
+
// id: ke.id,
|
|
164
|
+
// token: ke.token,
|
|
165
|
+
// decryptedOtk: ke.decryptedOtk,
|
|
166
|
+
// message: { message: msg2 },
|
|
167
|
+
// });
|
|
168
|
+
// expect(accepted.userSharedKey).toBeTruthy();
|
|
169
|
+
// expect(accepted.keyExchange.initiatorActionRequired).toBe(true);
|
|
170
|
+
// expect(accepted.keyExchange.responderActionRequired).toBe(false);
|
|
171
|
+
// expect(accepted.keyExchange.state).toEqual(KeyExchangeState.IN_PROGRESS);
|
|
172
|
+
// expect(accepted.keyExchange.otk.state).toEqual(OtkState.OTK_ACCEPTED);
|
|
173
|
+
|
|
174
|
+
// // Send message from User 2 to User 1 using username
|
|
175
|
+
// const plainMessageJson2to1 = {
|
|
176
|
+
// plain: 'plain message from test user 2 to test user 1',
|
|
177
|
+
// };
|
|
178
|
+
// const plainCipherMessageJson2to1 =
|
|
179
|
+
// 'cipher message from test user 2 to test user 1';
|
|
180
|
+
// const message2to1 = await messageService.sendMessage({
|
|
181
|
+
// username: username1,
|
|
182
|
+
// plainMessageJson: plainMessageJson2to1,
|
|
183
|
+
// plainCipherMessageJson: plainCipherMessageJson2to1,
|
|
184
|
+
// });
|
|
185
|
+
|
|
186
|
+
// // ------------------------------------------------------
|
|
187
|
+
// // Test User 1
|
|
188
|
+
// // ------------------------------------------------------
|
|
189
|
+
// await loginTestUser(username1, password1);
|
|
190
|
+
|
|
191
|
+
// ke = await service.getKeyExchange(initiated.id);
|
|
192
|
+
|
|
193
|
+
// const completed = await service.completeOtk(
|
|
194
|
+
// ke.id,
|
|
195
|
+
// ke.initiatorRootKeyCipher,
|
|
196
|
+
// ke.otk.initiatorOneTimePbkCipher
|
|
197
|
+
// );
|
|
198
|
+
// expect(completed.userSharedKey).toBeTruthy();
|
|
199
|
+
// expect(completed.keyExchange.initiatorActionRequired).toBe(false);
|
|
200
|
+
// expect(completed.keyExchange.responderActionRequired).toBe(false);
|
|
201
|
+
// expect(completed.keyExchange.state).toEqual(KeyExchangeState.COMPLETED);
|
|
202
|
+
// expect(completed.keyExchange.otk.state).toEqual(OtkState.OTK_COMPLETED);
|
|
203
|
+
|
|
204
|
+
// const userSharedKey = await service.currentUserSharedKey({
|
|
205
|
+
// username: username2,
|
|
206
|
+
// });
|
|
207
|
+
// expect(userSharedKey.sharedKey.id).toEqual(
|
|
208
|
+
// completed.userSharedKey.sharedKey.id,
|
|
209
|
+
// 'Current user shared key not set to the new one just shared.'
|
|
210
|
+
// );
|
|
211
|
+
|
|
212
|
+
// // Get message from user 2
|
|
213
|
+
// const message2to1Copy = await messageService.getMessage(
|
|
214
|
+
// message2to1.message.id
|
|
215
|
+
// );
|
|
216
|
+
// expect(JSON.stringify(message2to1Copy.plainMessageJson)).toEqual(
|
|
217
|
+
// JSON.stringify(plainMessageJson2to1)
|
|
218
|
+
// );
|
|
219
|
+
// expect(
|
|
220
|
+
// JSON.stringify(message2to1Copy.plainSignedCipherMessageJson)
|
|
221
|
+
// ).toEqual(JSON.stringify(plainCipherMessageJson2to1));
|
|
222
|
+
|
|
223
|
+
// // Send message from User 1 to User 2 using userId
|
|
224
|
+
// const plainMessageJson1to2 = {
|
|
225
|
+
// plain: 'plain message from test user 1 to test user 2',
|
|
226
|
+
// };
|
|
227
|
+
// const plainCipherMessageJson1to2 =
|
|
228
|
+
// 'cipher message from test user 1 to test user 2';
|
|
229
|
+
// const message1to2 = await messageService.sendMessage({
|
|
230
|
+
// userId: user2.id,
|
|
231
|
+
// plainMessageJson: plainMessageJson1to2,
|
|
232
|
+
// plainCipherMessageJson: plainCipherMessageJson1to2,
|
|
233
|
+
// });
|
|
234
|
+
|
|
235
|
+
// // ------------------------------------------------------
|
|
236
|
+
// // Test User 2
|
|
237
|
+
// // ------------------------------------------------------
|
|
238
|
+
// await loginTestUser(username2, password2);
|
|
239
|
+
// const message1to2Copy = await messageService.getMessage(
|
|
240
|
+
// message1to2.message.id
|
|
241
|
+
// );
|
|
242
|
+
// expect(JSON.stringify(message1to2Copy.plainMessageJson)).toEqual(
|
|
243
|
+
// JSON.stringify(plainMessageJson1to2)
|
|
244
|
+
// );
|
|
245
|
+
// expect(
|
|
246
|
+
// JSON.stringify(message1to2Copy.plainSignedCipherMessageJson)
|
|
247
|
+
// ).toEqual(JSON.stringify(plainCipherMessageJson1to2));
|
|
248
|
+
// },
|
|
249
|
+
// TIMEOUT
|
|
250
|
+
// );
|
|
251
|
+
|
|
252
|
+
// lrit(
|
|
253
|
+
// 'should exchange keys with specific user',
|
|
254
|
+
// async () => {
|
|
255
|
+
// if (!environment.test) {
|
|
256
|
+
// return;
|
|
257
|
+
// }
|
|
258
|
+
|
|
259
|
+
// const {
|
|
260
|
+
// username: username1,
|
|
261
|
+
// password: password1,
|
|
262
|
+
// email: email1,
|
|
263
|
+
// } = environment.test.users[0];
|
|
264
|
+
// const {
|
|
265
|
+
// username: username2,
|
|
266
|
+
// password: password2,
|
|
267
|
+
// email: email2,
|
|
268
|
+
// } = environment.test.users[1];
|
|
269
|
+
// const {
|
|
270
|
+
// username: username3,
|
|
271
|
+
// password: password3,
|
|
272
|
+
// email: email3,
|
|
273
|
+
// } = environment.test.users[2];
|
|
274
|
+
|
|
275
|
+
// // ------------------------------------------------------
|
|
276
|
+
// // Prepare
|
|
277
|
+
// // ------------------------------------------------------
|
|
278
|
+
// await deleteAllTps(username1, password1);
|
|
279
|
+
|
|
280
|
+
// // ------------------------------------------------------
|
|
281
|
+
// // Test User 1
|
|
282
|
+
// // ------------------------------------------------------
|
|
283
|
+
// const msg1 = 'from initiator';
|
|
284
|
+
// let ke: DecryptedKeyExchange;
|
|
285
|
+
// let res;
|
|
286
|
+
|
|
287
|
+
// await loginTestUser(username1, password1);
|
|
288
|
+
// const user2 = await userService.getUserByEmail(email2);
|
|
289
|
+
// const { keyExchange: initiated, otKeyK } = await service.initiateOtk({
|
|
290
|
+
// message: { message: msg1 },
|
|
291
|
+
// email: email2,
|
|
292
|
+
// upgrade: true,
|
|
293
|
+
// });
|
|
294
|
+
|
|
295
|
+
// // ------------------------------------------------------
|
|
296
|
+
// // Not signed in
|
|
297
|
+
// // ------------------------------------------------------
|
|
298
|
+
// await logoutUser();
|
|
299
|
+
// (
|
|
300
|
+
// await lrExpectAsyncThrow(service.getKeyExchange(initiated.id))
|
|
301
|
+
// ).toBeTruthy();
|
|
302
|
+
|
|
303
|
+
// // ------------------------------------------------------
|
|
304
|
+
// // Test User 3
|
|
305
|
+
// // ------------------------------------------------------
|
|
306
|
+
// await loginTestUser(username3, password3);
|
|
307
|
+
// // No access since not targeted at User3
|
|
308
|
+
// (
|
|
309
|
+
// await lrExpectAsyncThrow(service.getKeyExchange(initiated.id))
|
|
310
|
+
// ).toBeTruthy();
|
|
311
|
+
// // But can still access via the direct link
|
|
312
|
+
// ke = await service.getKeyExchange(initiated.id, {
|
|
313
|
+
// token: initiated.token,
|
|
314
|
+
// otKeyK,
|
|
315
|
+
// });
|
|
316
|
+
// // Can not accept because it's sent to user2.
|
|
317
|
+
// res = service.respondOtk({
|
|
318
|
+
// id: ke.id,
|
|
319
|
+
// token: ke.token,
|
|
320
|
+
// decryptedOtk: ke.decryptedOtk,
|
|
321
|
+
// message: { message: 'can not accept because it is targeted to user2' },
|
|
322
|
+
// });
|
|
323
|
+
// (await lrExpectAsyncThrow(res)).toBeTruthy();
|
|
324
|
+
|
|
325
|
+
// // ------------------------------------------------------
|
|
326
|
+
// // Test User 2
|
|
327
|
+
// // ------------------------------------------------------
|
|
328
|
+
// await loginTestUser(username2, password2);
|
|
329
|
+
// ke = await service.getKeyExchange(initiated.id);
|
|
330
|
+
// const accepted = await service.respondOtk({
|
|
331
|
+
// id: ke.id,
|
|
332
|
+
// token: ke.token,
|
|
333
|
+
// decryptedOtk: ke.decryptedOtk,
|
|
334
|
+
// message: { message: 'user2 can accept' },
|
|
335
|
+
// });
|
|
336
|
+
// expect(accepted.userSharedKey).toBeTruthy();
|
|
337
|
+
// expect(accepted.keyExchange.initiatorActionRequired).toBe(true);
|
|
338
|
+
// expect(accepted.keyExchange.responderActionRequired).toBe(false);
|
|
339
|
+
// expect(accepted.keyExchange.state).toEqual(KeyExchangeState.IN_PROGRESS);
|
|
340
|
+
// expect(accepted.keyExchange.otk.state).toEqual(OtkState.OTK_ACCEPTED);
|
|
341
|
+
|
|
342
|
+
// // ------------------------------------------------------
|
|
343
|
+
// // Test User 1
|
|
344
|
+
// // ------------------------------------------------------
|
|
345
|
+
// await loginTestUser(username1, password1);
|
|
346
|
+
// ke = await service.getKeyExchange(initiated.id);
|
|
347
|
+
|
|
348
|
+
// const completed = await service.completeOtk(
|
|
349
|
+
// ke.id,
|
|
350
|
+
// ke.initiatorRootKeyCipher,
|
|
351
|
+
// ke.otk.initiatorOneTimePbkCipher
|
|
352
|
+
// );
|
|
353
|
+
// expect(completed.userSharedKey).toBeTruthy();
|
|
354
|
+
// expect(completed.keyExchange.initiatorActionRequired).toBe(false);
|
|
355
|
+
// expect(completed.keyExchange.responderActionRequired).toBe(false);
|
|
356
|
+
// expect(completed.keyExchange.state).toEqual(KeyExchangeState.COMPLETED);
|
|
357
|
+
// expect(completed.keyExchange.otk.state).toEqual(OtkState.OTK_COMPLETED);
|
|
358
|
+
// },
|
|
359
|
+
// TIMEOUT
|
|
360
|
+
// );
|
|
361
|
+
|
|
362
|
+
// lrit(
|
|
363
|
+
// 'should create shared contact cards',
|
|
364
|
+
// async () => {
|
|
365
|
+
// const {
|
|
366
|
+
// username: username1,
|
|
367
|
+
// password: password1,
|
|
368
|
+
// } = environment.test.users[0];
|
|
369
|
+
// const {
|
|
370
|
+
// username: username2,
|
|
371
|
+
// password: password2,
|
|
372
|
+
// } = environment.test.users[1];
|
|
373
|
+
|
|
374
|
+
// let ke: DecryptedKeyExchange;
|
|
375
|
+
|
|
376
|
+
// const msg1 = 'from initiator';
|
|
377
|
+
// const scc1 = {
|
|
378
|
+
// plainOwnerCipherDataJson: {
|
|
379
|
+
// data: 'User 1 private data', // use this to store the references to the fields in the master CC
|
|
380
|
+
// },
|
|
381
|
+
// plainSharedCipherDataJson: {
|
|
382
|
+
// name: { name: 'User 1 CC info to be shared with user 2' },
|
|
383
|
+
// phones: [{ label: 'null', value: '0432 123 456' }],
|
|
384
|
+
// },
|
|
385
|
+
// ownerPlainData: {
|
|
386
|
+
// name: {
|
|
387
|
+
// name: '1 First Last',
|
|
388
|
+
// firstName: '1 First',
|
|
389
|
+
// lastName: '1 Last ',
|
|
390
|
+
// title: '1 Dr',
|
|
391
|
+
// },
|
|
392
|
+
// },
|
|
393
|
+
// };
|
|
394
|
+
// const scc2: KeyExchangeContactCardInput = {
|
|
395
|
+
// plainOwnerCipherDataJson: {
|
|
396
|
+
// data: 'User 2 private data', // use this to store the references to the fields in the master CC
|
|
397
|
+
// },
|
|
398
|
+
// plainSharedCipherDataJson: {
|
|
399
|
+
// name: { name: 'User 2 CC info to be shared with user 1' },
|
|
400
|
+
// phones: [{ label: 'null', value: '+61 1111 222 333' }],
|
|
401
|
+
// },
|
|
402
|
+
// ownerPlainData: {
|
|
403
|
+
// name: {
|
|
404
|
+
// name: '2 First Last',
|
|
405
|
+
// firstName: '2 First',
|
|
406
|
+
// lastName: '2 Last ',
|
|
407
|
+
// title: '2 Dr',
|
|
408
|
+
// },
|
|
409
|
+
// },
|
|
410
|
+
// };
|
|
411
|
+
|
|
412
|
+
// // ------------------------------------------------------
|
|
413
|
+
// // Test User 1
|
|
414
|
+
// // ------------------------------------------------------
|
|
415
|
+
// await loginTestUser(username1, password1);
|
|
416
|
+
// const { currentUser: user1 } = await profileService.getCurrentUser();
|
|
417
|
+
|
|
418
|
+
// const initiated = await service.initiateOtk({
|
|
419
|
+
// message: { message: msg1 },
|
|
420
|
+
// contactCard: scc1,
|
|
421
|
+
// });
|
|
422
|
+
|
|
423
|
+
// // ------------------------------------------------------
|
|
424
|
+
// // Test User 2
|
|
425
|
+
// // ------------------------------------------------------
|
|
426
|
+
// await loginTestUser(username2, password2);
|
|
427
|
+
// const { currentUser: user2 } = await profileService.getCurrentUser();
|
|
428
|
+
|
|
429
|
+
// ke = await service.getKeyExchange(initiated.keyExchange.id, {
|
|
430
|
+
// token: initiated.keyExchange.token,
|
|
431
|
+
// otKeyK: initiated.otKeyK,
|
|
432
|
+
// });
|
|
433
|
+
|
|
434
|
+
// const scc1Receiver: any = {
|
|
435
|
+
// name:
|
|
436
|
+
// ke.decryptedOtk.plainOtKeyCipher.initiator.contactCard
|
|
437
|
+
// .plainSharedCipherDataJson.name,
|
|
438
|
+
// };
|
|
439
|
+
|
|
440
|
+
// const accepted = await service.respondOtk({
|
|
441
|
+
// id: ke.id,
|
|
442
|
+
// token: ke.token,
|
|
443
|
+
// decryptedOtk: ke.decryptedOtk,
|
|
444
|
+
// message: { message: 'user2 can accept' },
|
|
445
|
+
// responderContactCard: scc2,
|
|
446
|
+
// initiatorContactCard: {
|
|
447
|
+
// plainReceiverCipherDataJson: scc1Receiver,
|
|
448
|
+
// },
|
|
449
|
+
// });
|
|
450
|
+
|
|
451
|
+
// // ------------------------------------------------------
|
|
452
|
+
// // Test User 1
|
|
453
|
+
// // ------------------------------------------------------
|
|
454
|
+
// await loginTestUser(username1, password1);
|
|
455
|
+
|
|
456
|
+
// ke = await service.getKeyExchange(initiated.keyExchange.id);
|
|
457
|
+
|
|
458
|
+
// expect(ke.myContactCard).toEqual(scc1.plainSharedCipherDataJson);
|
|
459
|
+
// expect(ke.contactCard).toEqual(scc2.plainSharedCipherDataJson);
|
|
460
|
+
|
|
461
|
+
// const completed = await service.completeOtk(
|
|
462
|
+
// ke.id,
|
|
463
|
+
// ke.initiatorRootKeyCipher,
|
|
464
|
+
// ke.otk.initiatorOneTimePbkCipher,
|
|
465
|
+
// ''
|
|
466
|
+
// );
|
|
467
|
+
// },
|
|
468
|
+
// TIMEOUT
|
|
469
|
+
// );
|
|
470
|
+
// });
|