@lifeready/core 1.0.1 → 1.0.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (379) hide show
  1. package/bundles/lifeready-core.umd.js +15939 -0
  2. package/bundles/lifeready-core.umd.js.map +1 -0
  3. package/bundles/lifeready-core.umd.min.js +16 -0
  4. package/bundles/lifeready-core.umd.min.js.map +1 -0
  5. package/esm2015/lib/_common/ast.js +40 -0
  6. package/esm2015/lib/_common/deferred-promise.js +24 -0
  7. package/esm2015/lib/_common/exceptions.js +157 -0
  8. package/esm2015/lib/_common/queries.gql.js +190 -0
  9. package/esm2015/lib/_common/run-outside-angular.js +79 -0
  10. package/esm2015/lib/_common/types.js +1 -0
  11. package/esm2015/lib/_common/utils.js +44 -0
  12. package/esm2015/lib/api/contact-card.gql.js +79 -0
  13. package/esm2015/lib/api/contact-card.service.js +154 -0
  14. package/esm2015/lib/api/contact-card2.gql.js +60 -0
  15. package/esm2015/lib/api/contact-card2.service.js +103 -0
  16. package/esm2015/lib/api/file.service.js +74 -0
  17. package/esm2015/lib/api/item2.gql.js +110 -0
  18. package/esm2015/lib/api/item2.service.js +311 -0
  19. package/esm2015/lib/api/key-exchange.gql.js +188 -0
  20. package/esm2015/lib/api/key-exchange.service.js +442 -0
  21. package/esm2015/lib/api/key-exchange.types.js +18 -0
  22. package/esm2015/lib/api/key-exchange2.gql.js +171 -0
  23. package/esm2015/lib/api/key-exchange2.service.js +479 -0
  24. package/esm2015/lib/api/lock.gql.js +40 -0
  25. package/esm2015/lib/api/lock.service.js +64 -0
  26. package/esm2015/lib/api/lr-apollo.service.js +46 -0
  27. package/esm2015/lib/api/lr-graphql/index.js +6 -0
  28. package/esm2015/lib/api/lr-graphql/lr-graphql.service.js +155 -0
  29. package/esm2015/lib/api/lr-graphql/lr-merged-mutation.js +213 -0
  30. package/esm2015/lib/api/lr-graphql/lr-mutation-base.js +51 -0
  31. package/esm2015/lib/api/lr-graphql/lr-mutation.js +48 -0
  32. package/esm2015/lib/api/lr-graphql/lr.service.js +18 -0
  33. package/esm2015/lib/api/message.service.js +138 -0
  34. package/esm2015/lib/api/persist.service.js +181 -0
  35. package/esm2015/lib/api/query-processor/common-processors.service.js +93 -0
  36. package/esm2015/lib/api/query-processor/index.js +3 -0
  37. package/esm2015/lib/api/query-processor/query-processor.service.js +192 -0
  38. package/esm2015/lib/api/query-processor/tp-password-reset-processor.service.js +109 -0
  39. package/esm2015/lib/api/shared-contact-card.service.js +119 -0
  40. package/esm2015/lib/api/shared-contact-card2.gql.js +41 -0
  41. package/esm2015/lib/api/shared-contact-card2.service.js +117 -0
  42. package/esm2015/lib/api/time.service.js +146 -0
  43. package/esm2015/lib/api/types/graphql.types.js +7 -0
  44. package/esm2015/lib/api/types/index.js +3 -0
  45. package/esm2015/lib/api/types/lr-graphql.types.js +71 -0
  46. package/esm2015/lib/auth/auth.config.js +57 -0
  47. package/esm2015/lib/auth/auth.gql.js +48 -0
  48. package/esm2015/lib/auth/auth.types.js +27 -0
  49. package/esm2015/lib/auth/idle.service.js +168 -0
  50. package/esm2015/lib/auth/idle.types.js +7 -0
  51. package/esm2015/lib/auth/lbop.service.js +355 -0
  52. package/esm2015/lib/auth/life-ready-auth.service.js +500 -0
  53. package/esm2015/lib/auth/password.service.js +320 -0
  54. package/esm2015/lib/auth/register.service.js +172 -0
  55. package/esm2015/lib/auth/two-factor.service.js +74 -0
  56. package/esm2015/lib/category/category-meta.service.js +99 -0
  57. package/esm2015/lib/category/category.gql.js +406 -0
  58. package/esm2015/lib/category/category.service.js +390 -0
  59. package/esm2015/lib/category/category.types.js +29 -0
  60. package/esm2015/lib/cryptography/cryptography.types.js +11 -0
  61. package/esm2015/lib/cryptography/encryption.service.js +189 -0
  62. package/esm2015/lib/cryptography/key-factory.service.js +237 -0
  63. package/esm2015/lib/cryptography/key-graph.service.js +280 -0
  64. package/esm2015/lib/cryptography/key-meta.service.js +200 -0
  65. package/esm2015/lib/cryptography/key.service.js +124 -0
  66. package/esm2015/lib/cryptography/slip39.service.js +169 -0
  67. package/esm2015/lib/cryptography/web-crypto.service.js +29 -0
  68. package/esm2015/lib/life-ready.config.js +84 -0
  69. package/esm2015/lib/life-ready.module.js +74 -0
  70. package/esm2015/lib/plan/plan.gql.js +123 -0
  71. package/esm2015/lib/plan/plan.service.js +149 -0
  72. package/esm2015/lib/plan/plan.types.js +11 -0
  73. package/esm2015/lib/record/record-attachment.service.js +101 -0
  74. package/esm2015/lib/record/record.gql.js +179 -0
  75. package/esm2015/lib/record/record.service.js +206 -0
  76. package/esm2015/lib/record/record.types.js +15 -0
  77. package/esm2015/lib/record-type/record-type.service.js +75 -0
  78. package/esm2015/lib/record-type/record-type.types.js +28 -0
  79. package/esm2015/lib/scenario/approvals/scenario-approval.gql.js +105 -0
  80. package/esm2015/lib/scenario/approvals/scenario-approval.types.js +1 -0
  81. package/esm2015/lib/scenario/approvals/scenario-approver.service.js +300 -0
  82. package/esm2015/lib/scenario/claimants/scenario-claimant.gql.js +52 -0
  83. package/esm2015/lib/scenario/claimants/scenario-claimant.service.js +97 -0
  84. package/esm2015/lib/scenario/claimants/scenario-claimant.types.js +1 -0
  85. package/esm2015/lib/scenario/receivers/scenario-receiver.gql.js +150 -0
  86. package/esm2015/lib/scenario/receivers/scenario-receiver.service.js +229 -0
  87. package/esm2015/lib/scenario/receivers/scenario-receiver.types.js +1 -0
  88. package/esm2015/lib/scenario/scenario-setup.service.js +269 -0
  89. package/esm2015/lib/scenario/scenario.gql.js +368 -0
  90. package/esm2015/lib/scenario/scenario.service.js +611 -0
  91. package/esm2015/lib/scenario/scenario.types.js +64 -0
  92. package/esm2015/lib/search/search.gql.js +62 -0
  93. package/esm2015/lib/search/search.service.js +156 -0
  94. package/esm2015/lib/search/search.types.js +6 -0
  95. package/esm2015/lib/trusted-parties/tp-password-reset-request.service.js +112 -0
  96. package/esm2015/lib/trusted-parties/tp-password-reset-user.service.js +129 -0
  97. package/esm2015/lib/trusted-parties/tp-password-reset.constants.js +4 -0
  98. package/esm2015/lib/trusted-parties/tp-password-reset.gql.js +232 -0
  99. package/esm2015/lib/trusted-parties/tp-password-reset.service.js +299 -0
  100. package/esm2015/lib/trusted-parties/trusted-party.gql.js +148 -0
  101. package/esm2015/lib/trusted-parties/trusted-party.service.js +326 -0
  102. package/esm2015/lib/trusted-parties/trusted-party.types.js +41 -0
  103. package/esm2015/lib/trusted-parties/trusted-party2.gql.js +87 -0
  104. package/esm2015/lib/trusted-parties/trusted-party2.service.js +215 -0
  105. package/esm2015/lib/users/profile-details.service.js +214 -0
  106. package/esm2015/lib/users/profile.gql.js +97 -0
  107. package/esm2015/lib/users/profile.service.js +169 -0
  108. package/esm2015/lib/users/profile.types.js +34 -0
  109. package/esm2015/lib/users/user.gql.js +60 -0
  110. package/esm2015/lib/users/user.service.js +79 -0
  111. package/esm2015/lib/users/user.types.js +5 -0
  112. package/esm2015/lifeready-core.js +10 -0
  113. package/esm2015/public-api.js +81 -0
  114. package/fesm2015/lifeready-core.js +13314 -0
  115. package/fesm2015/lifeready-core.js.map +1 -0
  116. package/lib/_common/ast.d.ts +11 -0
  117. package/lib/_common/deferred-promise.d.ts +12 -0
  118. package/lib/_common/exceptions.d.ts +109 -0
  119. package/lib/_common/queries.gql.d.ts +10 -0
  120. package/lib/_common/run-outside-angular.d.ts +14 -0
  121. package/{src/lib/_common/types.ts → lib/_common/types.d.ts} +3 -6
  122. package/lib/_common/utils.d.ts +3 -0
  123. package/lib/api/contact-card.gql.d.ts +7 -0
  124. package/lib/api/contact-card.service.d.ts +52 -0
  125. package/lib/api/contact-card2.gql.d.ts +34 -0
  126. package/lib/api/contact-card2.service.d.ts +49 -0
  127. package/lib/api/file.service.d.ts +18 -0
  128. package/lib/api/item2.gql.d.ts +96 -0
  129. package/lib/api/item2.service.d.ts +177 -0
  130. package/lib/api/key-exchange.gql.d.ts +9 -0
  131. package/lib/api/key-exchange.service.d.ts +39 -0
  132. package/lib/api/key-exchange.types.d.ts +196 -0
  133. package/lib/api/key-exchange2.gql.d.ts +125 -0
  134. package/lib/api/key-exchange2.service.d.ts +187 -0
  135. package/lib/api/lock.gql.d.ts +27 -0
  136. package/lib/api/lock.service.d.ts +25 -0
  137. package/lib/api/lr-apollo.service.d.ts +15 -0
  138. package/lib/api/lr-graphql/lr-graphql.service.d.ts +60 -0
  139. package/lib/api/lr-graphql/lr-merged-mutation.d.ts +27 -0
  140. package/lib/api/lr-graphql/lr-mutation-base.d.ts +28 -0
  141. package/lib/api/lr-graphql/lr-mutation.d.ts +8 -0
  142. package/lib/api/lr-graphql/lr.service.d.ts +9 -0
  143. package/lib/api/message.service.d.ts +58 -0
  144. package/lib/api/persist.service.d.ts +31 -0
  145. package/lib/api/query-processor/common-processors.service.d.ts +36 -0
  146. package/lib/api/query-processor/query-processor.service.d.ts +18 -0
  147. package/lib/api/query-processor/tp-password-reset-processor.service.d.ts +15 -0
  148. package/lib/api/shared-contact-card.service.d.ts +33 -0
  149. package/lib/api/shared-contact-card2.gql.d.ts +36 -0
  150. package/lib/api/shared-contact-card2.service.d.ts +45 -0
  151. package/lib/api/time.service.d.ts +16 -0
  152. package/lib/api/types/graphql.types.d.ts +29 -0
  153. package/lib/api/types/lr-graphql.types.d.ts +385 -0
  154. package/lib/auth/auth.config.d.ts +5 -0
  155. package/lib/auth/auth.gql.d.ts +15 -0
  156. package/lib/auth/auth.types.d.ts +66 -0
  157. package/lib/auth/idle.service.d.ts +40 -0
  158. package/lib/auth/idle.types.d.ts +10 -0
  159. package/lib/auth/lbop.service.d.ts +91 -0
  160. package/lib/auth/life-ready-auth.service.d.ts +59 -0
  161. package/lib/auth/password.service.d.ts +78 -0
  162. package/lib/auth/register.service.d.ts +25 -0
  163. package/lib/auth/two-factor.service.d.ts +15 -0
  164. package/lib/category/category-meta.service.d.ts +23 -0
  165. package/lib/category/category.gql.d.ts +45 -0
  166. package/lib/category/category.service.d.ts +67 -0
  167. package/lib/category/category.types.d.ts +79 -0
  168. package/lib/cryptography/cryptography.types.d.ts +83 -0
  169. package/lib/cryptography/encryption.service.d.ts +41 -0
  170. package/lib/cryptography/key-factory.service.d.ts +38 -0
  171. package/lib/cryptography/key-graph.service.d.ts +33 -0
  172. package/lib/cryptography/key-meta.service.d.ts +44 -0
  173. package/lib/cryptography/key.service.d.ts +36 -0
  174. package/lib/cryptography/slip39.service.d.ts +43 -0
  175. package/lib/cryptography/web-crypto.service.d.ts +5 -0
  176. package/lib/life-ready.config.d.ts +14 -0
  177. package/lib/life-ready.module.d.ts +5 -0
  178. package/lib/plan/plan.gql.d.ts +11 -0
  179. package/lib/plan/plan.service.d.ts +33 -0
  180. package/lib/plan/plan.types.d.ts +31 -0
  181. package/lib/record/record-attachment.service.d.ts +16 -0
  182. package/lib/record/record.gql.d.ts +14 -0
  183. package/lib/record/record.service.d.ts +25 -0
  184. package/lib/record/record.types.d.ts +57 -0
  185. package/lib/record-type/record-type.service.d.ts +11 -0
  186. package/lib/record-type/record-type.types.d.ts +50 -0
  187. package/lib/scenario/approvals/scenario-approval.gql.d.ts +7 -0
  188. package/lib/scenario/approvals/scenario-approval.types.d.ts +63 -0
  189. package/lib/scenario/approvals/scenario-approver.service.d.ts +32 -0
  190. package/lib/scenario/claimants/scenario-claimant.gql.d.ts +5 -0
  191. package/lib/scenario/claimants/scenario-claimant.service.d.ts +17 -0
  192. package/lib/scenario/claimants/scenario-claimant.types.d.ts +18 -0
  193. package/lib/scenario/receivers/scenario-receiver.gql.d.ts +8 -0
  194. package/lib/scenario/receivers/scenario-receiver.service.d.ts +30 -0
  195. package/lib/scenario/receivers/scenario-receiver.types.d.ts +54 -0
  196. package/lib/scenario/scenario-setup.service.d.ts +22 -0
  197. package/lib/scenario/scenario.gql.d.ts +34 -0
  198. package/lib/scenario/scenario.service.d.ts +58 -0
  199. package/lib/scenario/scenario.types.d.ts +217 -0
  200. package/lib/search/search.gql.d.ts +1 -0
  201. package/lib/search/search.service.d.ts +25 -0
  202. package/lib/search/search.types.d.ts +20 -0
  203. package/lib/trusted-parties/tp-password-reset-request.service.d.ts +20 -0
  204. package/lib/trusted-parties/tp-password-reset-user.service.d.ts +35 -0
  205. package/lib/trusted-parties/tp-password-reset.constants.d.ts +3 -0
  206. package/lib/trusted-parties/tp-password-reset.gql.d.ts +218 -0
  207. package/lib/trusted-parties/tp-password-reset.service.d.ts +130 -0
  208. package/lib/trusted-parties/trusted-party.gql.d.ts +9 -0
  209. package/lib/trusted-parties/trusted-party.service.d.ts +44 -0
  210. package/lib/trusted-parties/trusted-party.types.d.ts +102 -0
  211. package/lib/trusted-parties/trusted-party2.gql.d.ts +79 -0
  212. package/lib/trusted-parties/trusted-party2.service.d.ts +114 -0
  213. package/lib/users/profile-details.service.d.ts +21 -0
  214. package/lib/users/profile.gql.d.ts +11 -0
  215. package/lib/users/profile.service.d.ts +35 -0
  216. package/lib/users/profile.types.d.ts +96 -0
  217. package/lib/users/user.gql.d.ts +9 -0
  218. package/lib/users/user.service.d.ts +12 -0
  219. package/lib/users/user.types.d.ts +23 -0
  220. package/lifeready-core.d.ts +9 -0
  221. package/lifeready-core.metadata.json +1 -0
  222. package/package.json +29 -21
  223. package/{src/public-api.ts → public-api.d.ts} +0 -19
  224. package/karma.conf.js +0 -32
  225. package/ng-package.json +0 -26
  226. package/src/lib/_common/ast.ts +0 -75
  227. package/src/lib/_common/deferred-promise.ts +0 -35
  228. package/src/lib/_common/exceptions.ts +0 -189
  229. package/src/lib/_common/queries.gql.ts +0 -200
  230. package/src/lib/_common/run-outside-angular.ts +0 -125
  231. package/src/lib/_common/tests.ts +0 -82
  232. package/src/lib/_common/utils.ts +0 -57
  233. package/src/lib/api/api-mutation.spec.ts +0 -547
  234. package/src/lib/api/api-query.spec.ts +0 -40
  235. package/src/lib/api/contact-card.gql.ts +0 -85
  236. package/src/lib/api/contact-card.service.spec.ts +0 -249
  237. package/src/lib/api/contact-card.service.ts +0 -228
  238. package/src/lib/api/contact-card2.gql.ts +0 -93
  239. package/src/lib/api/contact-card2.service.spec.ts +0 -297
  240. package/src/lib/api/contact-card2.service.ts +0 -139
  241. package/src/lib/api/file.service.spec.ts +0 -14
  242. package/src/lib/api/file.service.ts +0 -81
  243. package/src/lib/api/item2.gql.ts +0 -211
  244. package/src/lib/api/item2.service.spec.ts +0 -1043
  245. package/src/lib/api/item2.service.ts +0 -481
  246. package/src/lib/api/key-exchange.gql.ts +0 -196
  247. package/src/lib/api/key-exchange.service.spec.ts +0 -470
  248. package/src/lib/api/key-exchange.service.ts +0 -731
  249. package/src/lib/api/key-exchange.types.ts +0 -235
  250. package/src/lib/api/key-exchange2.gql.ts +0 -310
  251. package/src/lib/api/key-exchange2.service.spec.ts +0 -892
  252. package/src/lib/api/key-exchange2.service.ts +0 -875
  253. package/src/lib/api/lock.gql.ts +0 -67
  254. package/src/lib/api/lock.service.spec.ts +0 -549
  255. package/src/lib/api/lock.service.ts +0 -57
  256. package/src/lib/api/lr-apollo.service.spec.ts +0 -27
  257. package/src/lib/api/lr-apollo.service.ts +0 -43
  258. package/src/lib/api/lr-graphql/lr-graphql.service.ts +0 -313
  259. package/src/lib/api/lr-graphql/lr-merged-mutation.ts +0 -377
  260. package/src/lib/api/lr-graphql/lr-mutation-base.ts +0 -67
  261. package/src/lib/api/lr-graphql/lr-mutation.ts +0 -74
  262. package/src/lib/api/lr-graphql/lr.service.ts +0 -28
  263. package/src/lib/api/message.service.spec.ts +0 -20
  264. package/src/lib/api/message.service.ts +0 -210
  265. package/src/lib/api/persist.service.spec.ts +0 -209
  266. package/src/lib/api/persist.service.ts +0 -220
  267. package/src/lib/api/query-processor/common-processors.service.ts +0 -148
  268. package/src/lib/api/query-processor/query-processor.service.ts +0 -240
  269. package/src/lib/api/query-processor/tp-password-reset-processor.service.ts +0 -177
  270. package/src/lib/api/shared-contact-card.service.ts +0 -156
  271. package/src/lib/api/shared-contact-card2.gql.ts +0 -76
  272. package/src/lib/api/shared-contact-card2.service.ts +0 -154
  273. package/src/lib/api/time.service.spec.ts +0 -48
  274. package/src/lib/api/time.service.ts +0 -155
  275. package/src/lib/api/types/graphql.types.ts +0 -48
  276. package/src/lib/api/types/lr-graphql.types.ts +0 -467
  277. package/src/lib/auth/auth.config.ts +0 -83
  278. package/src/lib/auth/auth.gql.ts +0 -62
  279. package/src/lib/auth/auth.types.ts +0 -79
  280. package/src/lib/auth/idle.service.spec.ts +0 -119
  281. package/src/lib/auth/idle.service.ts +0 -208
  282. package/src/lib/auth/idle.types.ts +0 -11
  283. package/src/lib/auth/lbop.service.spec.ts +0 -56
  284. package/src/lib/auth/lbop.service.ts +0 -539
  285. package/src/lib/auth/life-ready-auth.service.spec.ts +0 -70
  286. package/src/lib/auth/life-ready-auth.service.ts +0 -454
  287. package/src/lib/auth/password.service.spec.ts +0 -51
  288. package/src/lib/auth/password.service.ts +0 -438
  289. package/src/lib/auth/register.service.spec.ts +0 -31
  290. package/src/lib/auth/register.service.ts +0 -181
  291. package/src/lib/auth/two-factor.service.spec.ts +0 -21
  292. package/src/lib/auth/two-factor.service.ts +0 -69
  293. package/src/lib/category/category-meta.service.spec.ts +0 -28
  294. package/src/lib/category/category-meta.service.ts +0 -125
  295. package/src/lib/category/category.gql.ts +0 -449
  296. package/src/lib/category/category.service.spec.ts +0 -26
  297. package/src/lib/category/category.service.ts +0 -498
  298. package/src/lib/category/category.types.ts +0 -89
  299. package/src/lib/cryptography/cryptography.types.ts +0 -108
  300. package/src/lib/cryptography/encryption.service.spec.ts +0 -125
  301. package/src/lib/cryptography/encryption.service.ts +0 -243
  302. package/src/lib/cryptography/key-factory.service.spec.ts +0 -15
  303. package/src/lib/cryptography/key-factory.service.ts +0 -303
  304. package/src/lib/cryptography/key-graph.service.spec.ts +0 -16
  305. package/src/lib/cryptography/key-graph.service.ts +0 -354
  306. package/src/lib/cryptography/key-meta.service.spec.ts +0 -40
  307. package/src/lib/cryptography/key-meta.service.ts +0 -254
  308. package/src/lib/cryptography/key.service.spec.ts +0 -16
  309. package/src/lib/cryptography/key.service.ts +0 -154
  310. package/src/lib/cryptography/slip39.service.spec.ts +0 -44
  311. package/src/lib/cryptography/slip39.service.ts +0 -204
  312. package/src/lib/cryptography/web-crypto.service.ts +0 -22
  313. package/src/lib/life-ready.config.ts +0 -127
  314. package/src/lib/life-ready.module.ts +0 -81
  315. package/src/lib/plan/plan.gql.ts +0 -133
  316. package/src/lib/plan/plan.service.spec.ts +0 -294
  317. package/src/lib/plan/plan.service.ts +0 -198
  318. package/src/lib/plan/plan.types.ts +0 -37
  319. package/src/lib/record/record-attachment.service.spec.ts +0 -31
  320. package/src/lib/record/record-attachment.service.ts +0 -101
  321. package/src/lib/record/record.gql.ts +0 -192
  322. package/src/lib/record/record.service.spec.ts +0 -598
  323. package/src/lib/record/record.service.ts +0 -236
  324. package/src/lib/record/record.types.ts +0 -86
  325. package/src/lib/record-type/record-type.service.spec.ts +0 -16
  326. package/src/lib/record-type/record-type.service.ts +0 -71
  327. package/src/lib/record-type/record-type.types.ts +0 -58
  328. package/src/lib/scenario/approvals/scenario-approval.gql.ts +0 -112
  329. package/src/lib/scenario/approvals/scenario-approval.types.ts +0 -85
  330. package/src/lib/scenario/approvals/scenario-approver.service.spec.ts +0 -16
  331. package/src/lib/scenario/approvals/scenario-approver.service.ts +0 -422
  332. package/src/lib/scenario/claimants/scenario-claimant.gql.ts +0 -56
  333. package/src/lib/scenario/claimants/scenario-claimant.service.spec.ts +0 -16
  334. package/src/lib/scenario/claimants/scenario-claimant.service.ts +0 -100
  335. package/src/lib/scenario/claimants/scenario-claimant.types.ts +0 -21
  336. package/src/lib/scenario/receivers/scenario-receiver.gql.ts +0 -157
  337. package/src/lib/scenario/receivers/scenario-receiver.service.spec.ts +0 -16
  338. package/src/lib/scenario/receivers/scenario-receiver.service.ts +0 -278
  339. package/src/lib/scenario/receivers/scenario-receiver.types.ts +0 -66
  340. package/src/lib/scenario/scenario-setup.service.spec.ts +0 -22
  341. package/src/lib/scenario/scenario-setup.service.ts +0 -369
  342. package/src/lib/scenario/scenario.gql.ts +0 -404
  343. package/src/lib/scenario/scenario.service.spec.ts +0 -1586
  344. package/src/lib/scenario/scenario.service.ts +0 -811
  345. package/src/lib/scenario/scenario.types.ts +0 -258
  346. package/src/lib/search/search.gql.ts +0 -62
  347. package/src/lib/search/search.service.spec.ts +0 -57
  348. package/src/lib/search/search.service.ts +0 -174
  349. package/src/lib/search/search.types.ts +0 -24
  350. package/src/lib/trusted-parties/tp-password-reset-request.service.ts +0 -140
  351. package/src/lib/trusted-parties/tp-password-reset-user.service.ts +0 -359
  352. package/src/lib/trusted-parties/tp-password-reset.gql.ts +0 -453
  353. package/src/lib/trusted-parties/tp-password-reset.service.spec.ts +0 -602
  354. package/src/lib/trusted-parties/tp-password-reset.service.ts +0 -482
  355. package/src/lib/trusted-parties/trusted-party.gql.ts +0 -159
  356. package/src/lib/trusted-parties/trusted-party.service.spec.ts +0 -1008
  357. package/src/lib/trusted-parties/trusted-party.service.ts +0 -394
  358. package/src/lib/trusted-parties/trusted-party.types.ts +0 -119
  359. package/src/lib/trusted-parties/trusted-party2.gql.ts +0 -165
  360. package/src/lib/trusted-parties/trusted-party2.service.spec.ts +0 -1782
  361. package/src/lib/trusted-parties/trusted-party2.service.ts +0 -272
  362. package/src/lib/users/profile-details.service.spec.ts +0 -45
  363. package/src/lib/users/profile-details.service.ts +0 -278
  364. package/src/lib/users/profile.gql.ts +0 -108
  365. package/src/lib/users/profile.service.spec.ts +0 -97
  366. package/src/lib/users/profile.service.ts +0 -224
  367. package/src/lib/users/profile.types.ts +0 -101
  368. package/src/lib/users/user.gql.ts +0 -69
  369. package/src/lib/users/user.service.spec.ts +0 -161
  370. package/src/lib/users/user.service.ts +0 -72
  371. package/src/lib/users/user.types.ts +0 -27
  372. package/src/test.ts +0 -21
  373. package/tsconfig.lib.json +0 -21
  374. package/tsconfig.lib.prod.json +0 -6
  375. package/tsconfig.spec.json +0 -10
  376. package/tslint.json +0 -17
  377. /package/{src/lib/api/lr-graphql/index.ts → lib/api/lr-graphql/index.d.ts} +0 -0
  378. /package/{src/lib/api/query-processor/index.ts → lib/api/query-processor/index.d.ts} +0 -0
  379. /package/{src/lib/api/types/index.ts → lib/api/types/index.d.ts} +0 -0
@@ -0,0 +1,320 @@
1
+ import { __awaiter } from "tslib";
2
+ import { HttpClient } from '@angular/common/http';
3
+ import { Inject, Injectable } from '@angular/core';
4
+ import { AuthClass } from '@aws-amplify/auth/lib-esm/Auth';
5
+ import { ProfileService } from '../users/profile.service';
6
+ import { EncryptionService } from '../cryptography/encryption.service';
7
+ import { KeyGraphService } from '../cryptography/key-graph.service';
8
+ import { LR_CONFIG } from '../life-ready.config';
9
+ import { LrAuthException, LrBadArgumentException } from '../_common/exceptions';
10
+ import { LrApolloService } from './../api/lr-apollo.service';
11
+ import { PasswordChangeMutation, PasswordChangeRequestMutation, PasswordChangeConfigQuery, } from './auth.gql';
12
+ import { WebCryptoService } from '../cryptography/web-crypto.service';
13
+ import * as moment_ from 'moment';
14
+ import { IdleService } from '../auth/idle.service';
15
+ import { KeyFactoryService as KFS } from '../cryptography/key-factory.service';
16
+ import * as i0 from "@angular/core";
17
+ import * as i1 from "../life-ready.config";
18
+ import * as i2 from "@angular/common/http";
19
+ import * as i3 from "../api/lr-apollo.service";
20
+ import * as i4 from "@aws-amplify/auth/lib-esm/Auth";
21
+ import * as i5 from "../users/profile.service";
22
+ import * as i6 from "../cryptography/key-factory.service";
23
+ import * as i7 from "../cryptography/encryption.service";
24
+ import * as i8 from "../cryptography/key-graph.service";
25
+ import * as i9 from "../cryptography/web-crypto.service";
26
+ import * as i10 from "./idle.service";
27
+ // "why?" you ask: https://stackoverflow.com/questions/59735280/angular-8-moment-error-cannot-call-a-namespace-moment
28
+ const moment = moment_;
29
+ export class PasswordCheck {
30
+ }
31
+ export class PasswordService {
32
+ constructor(config, http, apollo, auth, profileService, keyFactory, encryptionService, keyGraph, webCryptoService, idleService) {
33
+ this.config = config;
34
+ this.http = http;
35
+ this.apollo = apollo;
36
+ this.auth = auth;
37
+ this.profileService = profileService;
38
+ this.keyFactory = keyFactory;
39
+ this.encryptionService = encryptionService;
40
+ this.keyGraph = keyGraph;
41
+ this.webCryptoService = webCryptoService;
42
+ this.idleService = idleService;
43
+ this.CLIENT_NONCE_LENGTH = 32;
44
+ }
45
+ checkPassword(password) {
46
+ return __awaiter(this, void 0, void 0, function* () {
47
+ const { years } = this.passwordStrength(password);
48
+ return {
49
+ length: password.length,
50
+ timeToCrack: moment.duration({ years }),
51
+ passwordExposed: yield this.getExposureCount(password),
52
+ };
53
+ });
54
+ }
55
+ getExposureCount(password) {
56
+ return __awaiter(this, void 0, void 0, function* () {
57
+ const sha1Password = yield this.webCryptoService.stringDigest('SHA-1', password);
58
+ const first5sha1 = sha1Password.substring(0, 5);
59
+ const response = yield this.http
60
+ .get(`https://api.pwnedpasswords.com/range/${first5sha1}`, {
61
+ responseType: 'text',
62
+ })
63
+ .toPromise();
64
+ const results = new RegExp(`^(?:${sha1Password.substring(5)}:)(?<count>\\d+)$`, 'im').exec(response);
65
+ if (results) {
66
+ return +results.groups.count;
67
+ }
68
+ return 0;
69
+ });
70
+ }
71
+ getPassIdpString(passIdp) {
72
+ return passIdp.toJSON(true).k;
73
+ }
74
+ createPassKeyBundle(password) {
75
+ return __awaiter(this, void 0, void 0, function* () {
76
+ const passIdpParams = yield this.keyFactory.createPassIdpParams();
77
+ const passIdp = (yield this.keyFactory.derivePassIdp(Object.assign({ password }, passIdpParams))).jwk;
78
+ const passKeyParams = yield this.keyFactory.createPassKeyParams();
79
+ const passKey = (yield this.keyFactory.derivePassKey(Object.assign({ password }, passKeyParams))).jwk;
80
+ const passIdpVerifier = yield this.keyFactory.createPkcSignKey();
81
+ const wrappedPassIdpVerifierPrk = yield this.encryptionService.encrypt(passKey, passIdpVerifier.toJSON(true));
82
+ // There are two formats that the private key can be represented in JWK:
83
+ // https://tools.ietf.org/html/rfc8017#page-9
84
+ // The second form is an optimization:
85
+ // https://crypto.stackexchange.com/questions/19413/what-are-dp-and-dq-in-encryption-by-rsa-in-c
86
+ return {
87
+ passKeyParams,
88
+ passKey,
89
+ passIdpParams,
90
+ passIdp,
91
+ passIdpVerifier,
92
+ wrappedPassIdpVerifierPrk,
93
+ };
94
+ });
95
+ }
96
+ /**
97
+ * We need to allow for interruption of the process at any point. Each API call can be considered
98
+ * atomic and either succeeds or fails.
99
+ *
100
+ * The LR server APIs use semaphore tokens for locking critical operations, so concurrent calls will
101
+ * fail.
102
+ *
103
+ * We assume the worst case for IdP API calls. So we use the semaphore token from LR to prevent
104
+ * concurrent calls to IdP APIs, but we have to assume that the IdP API calls will either succeed or
105
+ * fail within a reasonable amount of time.
106
+ *
107
+ * Each location where the server state changes can be a potential point of interruption.
108
+ * Potential points of interruption are marked with: --Potential Failure Point--
109
+ *
110
+ * Places for timeout:
111
+ * - Login age too old at call to: verifyPassword()
112
+ * - Login age too old at call to: changePasswordMutation()
113
+ * - Semaphore token expires at call to: changePasswordComplete()
114
+ *
115
+ * Tests:
116
+ * - Potential Failure Point 1: should be able to restart the process, user remains signed in.
117
+ * - Potential Failure Point 2: should enter recovery flow
118
+ * - Potential Failure Point 3: should enter recovery flow
119
+ * - Potential Failure Point 4: should enter recovery flow
120
+ *
121
+ */
122
+ isLoginRequired() {
123
+ return __awaiter(this, void 0, void 0, function* () {
124
+ const changePasswordConfig = yield this.getChangePasswordConfig();
125
+ const authTime = moment(changePasswordConfig.authTime);
126
+ const serverTime = moment(changePasswordConfig.serverTime);
127
+ const duration = moment.duration(serverTime.diff(authTime));
128
+ const seconds = duration.asSeconds();
129
+ if (seconds > changePasswordConfig.maxAuthAgeSeconds) {
130
+ return true;
131
+ }
132
+ else {
133
+ return false;
134
+ }
135
+ });
136
+ }
137
+ changePassword(password, newPassword) {
138
+ return __awaiter(this, void 0, void 0, function* () {
139
+ const cognitoUser = yield this.auth.currentAuthenticatedUser();
140
+ // Validation
141
+ // todo: Add this back in
142
+ // Note the passIdp will always have a random salt, so will always be different to the current passIdp.
143
+ if (password === newPassword) {
144
+ throw new LrBadArgumentException('New password is the same as the current one.');
145
+ }
146
+ const { currentUser } = yield this.profileService.getCurrentUser();
147
+ const { passIdp, signedChallenge } = yield this.verifyPassword(password, currentUser);
148
+ // --Potential Failure Point 1--
149
+ // verifyPassword() asks for a current password challenge hence changes server state.
150
+ // Place break points here to test the failure scenarios.
151
+ // Generate the new passIdp
152
+ const newPassKey = yield this.createPassKeyBundle(newPassword);
153
+ // Re-encrypt master key with new key
154
+ const masterKey = yield this.keyGraph.getKey(currentUser.currentUserKey.masterKey.id);
155
+ const newWrappedMasterKey = yield this.encryptionService.encrypt(newPassKey.passKey, masterKey.jwk.toJSON(true));
156
+ // If the IdP change password failed, we need to go into recovery mode by forcing
157
+ // a login. We can't logout the user just yet since the IdP password change needs
158
+ // the user to be logged in. We _can_ removed any persisted session values for the IdP
159
+ // but that seems like too much trouble.
160
+ const { token, newPassKeyId } = yield this.changePasswordMutation(signedChallenge, currentUser.currentUserKey.masterKey.id, newWrappedMasterKey, newPassKey);
161
+ // --Potential Failure Point 2--
162
+ // changePasswordMutation() uploads new keys and obtains a semaphore lock to prevent any other
163
+ // clients from performing IdP password change.
164
+ // Now we can do the IdP password change.
165
+ // todo: Add this back in
166
+ yield this.auth.changePassword(cognitoUser, this.getPassIdpString(passIdp), this.getPassIdpString(newPassKey.passIdp));
167
+ // --Potential Failure Point 3--
168
+ // IdP password change
169
+ // Note that changePassword() could throw an exception for a number of reason. It could throw
170
+ // a network timeout for example. But we don't know if it's the response that timed out and
171
+ // the idp password change was actually carried out. So we have to be extra conservative and
172
+ // only act on a clear success. Otherwise we go into recover mode.
173
+ yield this.changePasswordComplete(cognitoUser.getSignInUserSession().getAccessToken().getJwtToken(), true, token);
174
+ });
175
+ }
176
+ changePasswordComplete(accessToken, useNewPassword, token = null) {
177
+ return __awaiter(this, void 0, void 0, function* () {
178
+ return this.http
179
+ .post(`${this.config.authUrl}users/password-change-complete/`, Object.assign({ use_new_password: useNewPassword }, (token && { token })), {
180
+ headers: {
181
+ Authorization: `Bearer ${accessToken}`,
182
+ },
183
+ })
184
+ .toPromise();
185
+ });
186
+ }
187
+ getVerifierPrK(passKey, wrappedPrK) {
188
+ return __awaiter(this, void 0, void 0, function* () {
189
+ try {
190
+ const prkJson = yield this.encryptionService.decrypt(passKey, wrappedPrK);
191
+ return KFS.asKey(prkJson);
192
+ }
193
+ catch (error) {
194
+ throw new LrAuthException('Wrong current password');
195
+ }
196
+ });
197
+ }
198
+ verifyPassword(password, currentUser) {
199
+ return __awaiter(this, void 0, void 0, function* () {
200
+ // Get information from the server to prepare for password change.
201
+ const passwordRequest = yield this.apollo.mutate({
202
+ mutation: PasswordChangeRequestMutation,
203
+ variables: {},
204
+ });
205
+ // Get the old passKey so we can decrypt the old password verifier
206
+ const passKeyResult = yield this.keyFactory.derivePassKey(Object.assign({ password }, currentUser.currentUserKey.passKey.passKeyParams));
207
+ const verifierPrK = yield this.getVerifierPrK(passKeyResult.jwk, currentUser.currentUserKey.passKey.wrappedPassIdpVerifierPrk);
208
+ // Sign the server challenge to prove to the server we can decrypt the password verifier.
209
+ // Generate
210
+ const clientNonce = this.keyFactory.randomString(this.CLIENT_NONCE_LENGTH);
211
+ const signedChallenge = yield this.encryptionService.sign(verifierPrK, {
212
+ serverNonce: passwordRequest.passwordChangeRequest.challenge.serverNonce,
213
+ clientNonce,
214
+ });
215
+ const passIdpResult = yield this.keyFactory.derivePassIdp(Object.assign({ password }, currentUser.currentUserKey.passKey.passIdpParams));
216
+ return {
217
+ passIdp: passIdpResult.jwk,
218
+ signedChallenge,
219
+ };
220
+ });
221
+ }
222
+ changePasswordMutation(signedChallenge, masterKeyId, newWrappedMasterKey, passKeyBundle) {
223
+ return __awaiter(this, void 0, void 0, function* () {
224
+ const response = yield this.apollo.mutate({
225
+ mutation: PasswordChangeMutation,
226
+ variables: {
227
+ input: {
228
+ signedChallenge: JSON.stringify(signedChallenge),
229
+ masterKeyId,
230
+ newWrappedMasterKey: JSON.stringify(newWrappedMasterKey),
231
+ newPassKey: {
232
+ passIdpParams: JSON.stringify(passKeyBundle.passIdpParams),
233
+ passIdpVerifierPbk: JSON.stringify(passKeyBundle.passIdpVerifier.toJSON()),
234
+ wrappedPassIdpVerifierPrk: JSON.stringify(passKeyBundle.wrappedPassIdpVerifierPrk),
235
+ passKeyParams: JSON.stringify(passKeyBundle.passKeyParams),
236
+ },
237
+ },
238
+ },
239
+ });
240
+ return {
241
+ token: response.passwordChange.token,
242
+ newPassKeyId: response.passwordChange.newPassKey.id,
243
+ };
244
+ });
245
+ }
246
+ getChangePasswordConfig() {
247
+ return __awaiter(this, void 0, void 0, function* () {
248
+ const res = yield this.apollo.query({
249
+ query: PasswordChangeConfigQuery,
250
+ });
251
+ const ret = res.passwordChangeConfig;
252
+ ret.authTime = new Date(ret.authTime);
253
+ ret.serverTime = new Date(ret.serverTime);
254
+ return ret;
255
+ });
256
+ }
257
+ passwordStrength(password) {
258
+ const upper = /[A-Z]/g;
259
+ const lower = /[a-z]/g;
260
+ const digit = /[0-9]/g;
261
+ const upperChoices = 26;
262
+ const lowerChoices = 26;
263
+ const digitChoices = 10;
264
+ const specialChoices = 30; // /[!"#$%&'()*+,-./:;<=>?@[\]^_`{|}~]/g
265
+ function instanceCount(str, re) {
266
+ return ((str || '').match(re) || []).length;
267
+ }
268
+ const uppers = instanceCount(password, upper);
269
+ const lowers = instanceCount(password, lower);
270
+ const digits = instanceCount(password, digit);
271
+ const specials = password.length - uppers - lowers - digits;
272
+ let choices = 0;
273
+ if (uppers) {
274
+ choices += upperChoices;
275
+ }
276
+ if (lowers) {
277
+ choices += lowerChoices;
278
+ }
279
+ if (digits) {
280
+ choices += digitChoices;
281
+ }
282
+ if (specials) {
283
+ choices += specialChoices;
284
+ }
285
+ if (password.length === 0) {
286
+ return {
287
+ years: 0,
288
+ // bits of entropy
289
+ bits: 0,
290
+ };
291
+ }
292
+ const permutations = Math.pow(choices, password.length);
293
+ const years = (54000 * permutations) /
294
+ Math.pow(upperChoices + lowerChoices + digitChoices, 12);
295
+ return {
296
+ years,
297
+ // bits of entropy
298
+ bits: Math.round(Math.log2(permutations)),
299
+ };
300
+ }
301
+ }
302
+ PasswordService.ɵprov = i0.ɵɵdefineInjectable({ factory: function PasswordService_Factory() { return new PasswordService(i0.ɵɵinject(i1.LR_CONFIG), i0.ɵɵinject(i2.HttpClient), i0.ɵɵinject(i3.LrApolloService), i0.ɵɵinject(i4.AuthClass), i0.ɵɵinject(i5.ProfileService), i0.ɵɵinject(i6.KeyFactoryService), i0.ɵɵinject(i7.EncryptionService), i0.ɵɵinject(i8.KeyGraphService), i0.ɵɵinject(i9.WebCryptoService), i0.ɵɵinject(i10.IdleService)); }, token: PasswordService, providedIn: "root" });
303
+ PasswordService.decorators = [
304
+ { type: Injectable, args: [{
305
+ providedIn: 'root',
306
+ },] }
307
+ ];
308
+ PasswordService.ctorParameters = () => [
309
+ { type: undefined, decorators: [{ type: Inject, args: [LR_CONFIG,] }] },
310
+ { type: HttpClient },
311
+ { type: LrApolloService },
312
+ { type: AuthClass },
313
+ { type: ProfileService },
314
+ { type: KFS },
315
+ { type: EncryptionService },
316
+ { type: KeyGraphService },
317
+ { type: WebCryptoService },
318
+ { type: IdleService }
319
+ ];
320
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"password.service.js","sourceRoot":"C:/Projects/newrepo/kc-client/projects/core/src/","sources":["lib/auth/password.service.ts"],"names":[],"mappings":";AAAA,OAAO,EAAE,UAAU,EAAE,MAAM,sBAAsB,CAAC;AAClD,OAAO,EAAE,MAAM,EAAE,UAAU,EAAE,MAAM,eAAe,CAAC;AAEnD,OAAO,EAAE,SAAS,EAAE,MAAM,gCAAgC,CAAC;AAE3D,OAAO,EAAE,cAAc,EAAE,MAAM,0BAA0B,CAAC;AAC1D,OAAO,EAAE,iBAAiB,EAAE,MAAM,oCAAoC,CAAC;AACvE,OAAO,EAAE,eAAe,EAAE,MAAM,mCAAmC,CAAC;AACpE,OAAO,EAAmB,SAAS,EAAE,MAAM,sBAAsB,CAAC;AAClE,OAAO,EAAE,eAAe,EAAE,sBAAsB,EAAE,MAAM,uBAAuB,CAAC;AAChF,OAAO,EAAE,eAAe,EAAE,MAAM,4BAA4B,CAAC;AAC7D,OAAO,EACL,sBAAsB,EACtB,6BAA6B,EAC7B,yBAAyB,GAC1B,MAAM,YAAY,CAAC;AAEpB,OAAO,EAAE,gBAAgB,EAAE,MAAM,oCAAoC,CAAC;AAEtE,OAAO,KAAK,OAAO,MAAM,QAAQ,CAAC;AAElC,OAAO,EAAE,WAAW,EAAE,MAAM,sBAAsB,CAAC;AACnD,OAAO,EAAE,iBAAiB,IAAI,GAAG,EAAE,MAAM,qCAAqC,CAAC;;;;;;;;;;;;AAE/E,qHAAqH;AACrH,MAAM,MAAM,GAAG,OAAO,CAAC;AAyBvB,MAAM,OAAO,aAAa;CAIzB;AAKD,MAAM,OAAO,eAAe;IAG1B,YAC6B,MAAuB,EAC1C,IAAgB,EAChB,MAAuB,EACvB,IAAe,EACf,cAA8B,EAC9B,UAAe,EACf,iBAAoC,EACpC,QAAyB,EACzB,gBAAkC,EAClC,WAAwB;QATL,WAAM,GAAN,MAAM,CAAiB;QAC1C,SAAI,GAAJ,IAAI,CAAY;QAChB,WAAM,GAAN,MAAM,CAAiB;QACvB,SAAI,GAAJ,IAAI,CAAW;QACf,mBAAc,GAAd,cAAc,CAAgB;QAC9B,eAAU,GAAV,UAAU,CAAK;QACf,sBAAiB,GAAjB,iBAAiB,CAAmB;QACpC,aAAQ,GAAR,QAAQ,CAAiB;QACzB,qBAAgB,GAAhB,gBAAgB,CAAkB;QAClC,gBAAW,GAAX,WAAW,CAAa;QAZjB,wBAAmB,GAAG,EAAE,CAAC;IAavC,CAAC;IAES,aAAa,CAAC,QAAgB;;YACzC,MAAM,EAAE,KAAK,EAAE,GAAG,IAAI,CAAC,gBAAgB,CAAC,QAAQ,CAAC,CAAC;YAElD,OAAO;gBACL,MAAM,EAAE,QAAQ,CAAC,MAAM;gBACvB,WAAW,EAAE,MAAM,CAAC,QAAQ,CAAC,EAAE,KAAK,EAAE,CAAC;gBACvC,eAAe,EAAE,MAAM,IAAI,CAAC,gBAAgB,CAAC,QAAQ,CAAC;aACvD,CAAC;QACJ,CAAC;KAAA;IAEY,gBAAgB,CAAC,QAAgB;;YAC5C,MAAM,YAAY,GAAG,MAAM,IAAI,CAAC,gBAAgB,CAAC,YAAY,CAC3D,OAAO,EACP,QAAQ,CACT,CAAC;YACF,MAAM,UAAU,GAAG,YAAY,CAAC,SAAS,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC;YAEhD,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,IAAI;iBAC7B,GAAG,CAAC,wCAAwC,UAAU,EAAE,EAAE;gBACzD,YAAY,EAAE,MAAM;aACrB,CAAC;iBACD,SAAS,EAAE,CAAC;YAEf,MAAM,OAAO,GAAG,IAAI,MAAM,CACxB,OAAO,YAAY,CAAC,SAAS,CAAC,CAAC,CAAC,mBAAmB,EACnD,IAAI,CACL,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC;YAEjB,IAAI,OAAO,EAAE;gBACX,OAAO,CAAC,OAAO,CAAC,MAAM,CAAC,KAAK,CAAC;aAC9B;YACD,OAAO,CAAC,CAAC;QACX,CAAC;KAAA;IAEM,gBAAgB,CAAC,OAAgB;QACtC,OAAQ,OAAO,CAAC,MAAM,CAAC,IAAI,CAAS,CAAC,CAAC,CAAC;IACzC,CAAC;IAEY,mBAAmB,CAAC,QAAgB;;YAC/C,MAAM,aAAa,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,mBAAmB,EAAE,CAAC;YAClE,MAAM,OAAO,GAAG,CACd,MAAM,IAAI,CAAC,UAAU,CAAC,aAAa,iBACjC,QAAQ,IACL,aAAa,EAChB,CACH,CAAC,GAAG,CAAC;YAEN,MAAM,aAAa,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,mBAAmB,EAAE,CAAC;YAClE,MAAM,OAAO,GAAG,CACd,MAAM,IAAI,CAAC,UAAU,CAAC,aAAa,iBACjC,QAAQ,IACL,aAAa,EAChB,CACH,CAAC,GAAG,CAAC;YAEN,MAAM,eAAe,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,gBAAgB,EAAE,CAAC;YAEjE,MAAM,yBAAyB,GAAG,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CACpE,OAAO,EACP,eAAe,CAAC,MAAM,CAAC,IAAI,CAAC,CAC7B,CAAC;YAEF,wEAAwE;YACxE,6CAA6C;YAC7C,sCAAsC;YACtC,gGAAgG;YAEhG,OAAO;gBACL,aAAa;gBACb,OAAO;gBACP,aAAa;gBACb,OAAO;gBACP,eAAe;gBACf,yBAAyB;aAC1B,CAAC;QACJ,CAAC;KAAA;IAED;;;;;;;;;;;;;;;;;;;;;;;;;OAyBG;IAEU,eAAe;;YAC1B,MAAM,oBAAoB,GAAG,MAAM,IAAI,CAAC,uBAAuB,EAAE,CAAC;YAClE,MAAM,QAAQ,GAAG,MAAM,CAAC,oBAAoB,CAAC,QAAQ,CAAC,CAAC;YACvD,MAAM,UAAU,GAAG,MAAM,CAAC,oBAAoB,CAAC,UAAU,CAAC,CAAC;YAC3D,MAAM,QAAQ,GAAG,MAAM,CAAC,QAAQ,CAAC,UAAU,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC;YAC5D,MAAM,OAAO,GAAG,QAAQ,CAAC,SAAS,EAAE,CAAC;YACrC,IAAI,OAAO,GAAG,oBAAoB,CAAC,iBAAiB,EAAE;gBACpD,OAAO,IAAI,CAAC;aACb;iBAAM;gBACL,OAAO,KAAK,CAAC;aACd;QACH,CAAC;KAAA;IAEY,cAAc,CAAC,QAAgB,EAAE,WAAmB;;YAC/D,MAAM,WAAW,GAAgB,MAAM,IAAI,CAAC,IAAI,CAAC,wBAAwB,EAAE,CAAC;YAE5E,aAAa;YACb,yBAAyB;YACzB,uGAAuG;YACvG,IAAI,QAAQ,KAAK,WAAW,EAAE;gBAC5B,MAAM,IAAI,sBAAsB,CAC9B,8CAA8C,CAC/C,CAAC;aACH;YAED,MAAM,EAAE,WAAW,EAAE,GAAG,MAAM,IAAI,CAAC,cAAc,CAAC,cAAc,EAAE,CAAC;YAEnE,MAAM,EAAE,OAAO,EAAE,eAAe,EAAE,GAAG,MAAM,IAAI,CAAC,cAAc,CAC5D,QAAQ,EACR,WAAW,CACZ,CAAC;YAEF,gCAAgC;YAChC,qFAAqF;YACrF,yDAAyD;YAEzD,2BAA2B;YAC3B,MAAM,UAAU,GAAG,MAAM,IAAI,CAAC,mBAAmB,CAAC,WAAW,CAAC,CAAC;YAE/D,qCAAqC;YACrC,MAAM,SAAS,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC,MAAM,CAC1C,WAAW,CAAC,cAAc,CAAC,SAAS,CAAC,EAAE,CACxC,CAAC;YACF,MAAM,mBAAmB,GAAG,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAC9D,UAAU,CAAC,OAAO,EAClB,SAAS,CAAC,GAAG,CAAC,MAAM,CAAC,IAAI,CAAC,CAC3B,CAAC;YAEF,iFAAiF;YACjF,iFAAiF;YACjF,sFAAsF;YACtF,wCAAwC;YAExC,MAAM,EAAE,KAAK,EAAE,YAAY,EAAE,GAAG,MAAM,IAAI,CAAC,sBAAsB,CAC/D,eAAe,EACf,WAAW,CAAC,cAAc,CAAC,SAAS,CAAC,EAAE,EACvC,mBAAmB,EACnB,UAAU,CACX,CAAC;YAEF,gCAAgC;YAChC,8FAA8F;YAC9F,+CAA+C;YAE/C,yCAAyC;YACzC,yBAAyB;YACzB,MAAM,IAAI,CAAC,IAAI,CAAC,cAAc,CAC5B,WAAW,EACX,IAAI,CAAC,gBAAgB,CAAC,OAAO,CAAC,EAC9B,IAAI,CAAC,gBAAgB,CAAC,UAAU,CAAC,OAAO,CAAC,CAC1C,CAAC;YAEF,gCAAgC;YAChC,sBAAsB;YAEtB,6FAA6F;YAC7F,2FAA2F;YAC3F,4FAA4F;YAC5F,kEAAkE;YAClE,MAAM,IAAI,CAAC,sBAAsB,CAC/B,WAAW,CAAC,oBAAoB,EAAE,CAAC,cAAc,EAAE,CAAC,WAAW,EAAE,EACjE,IAAI,EACJ,KAAK,CACN,CAAC;QACJ,CAAC;KAAA;IAEY,sBAAsB,CACjC,WAAmB,EACnB,cAAuB,EACvB,QAAgB,IAAI;;YAEpB,OAAO,IAAI,CAAC,IAAI;iBACb,IAAI,CACH,GAAG,IAAI,CAAC,MAAM,CAAC,OAAO,iCAAiC,kBAErD,gBAAgB,EAAE,cAAc,IAC7B,CAAC,KAAK,IAAI,EAAE,KAAK,EAAE,CAAC,GAEzB;gBACE,OAAO,EAAE;oBACP,aAAa,EAAE,UAAU,WAAW,EAAE;iBACvC;aACF,CACF;iBACA,SAAS,EAAE,CAAC;QACjB,CAAC;KAAA;IAEa,cAAc,CAC1B,OAAgB,EAChB,UAAkB;;YAElB,IAAI;gBACF,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAAC,OAAO,EAAE,UAAU,CAAC,CAAC;gBAC1E,OAAO,GAAG,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC;aAC3B;YAAC,OAAO,KAAK,EAAE;gBACd,MAAM,IAAI,eAAe,CAAC,wBAAwB,CAAC,CAAC;aACrD;QACH,CAAC;KAAA;IAEa,cAAc,CAC1B,QAAgB,EAChB,WAA2B;;YAE3B,kEAAkE;YAClE,MAAM,eAAe,GAAG,MAAM,IAAI,CAAC,MAAM,CAAC,MAAM,CAC9C;gBACE,QAAQ,EAAE,6BAA6B;gBACvC,SAAS,EAAE,EAAE;aACd,CACF,CAAC;YAEF,kEAAkE;YAClE,MAAM,aAAa,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,aAAa,iBACvD,QAAQ,IACL,WAAW,CAAC,cAAc,CAAC,OAAO,CAAC,aAAa,EACnD,CAAC;YAEH,MAAM,WAAW,GAAG,MAAM,IAAI,CAAC,cAAc,CAC3C,aAAa,CAAC,GAAG,EACjB,WAAW,CAAC,cAAc,CAAC,OAAO,CAAC,yBAAyB,CAC7D,CAAC;YAEF,yFAAyF;YACzF,WAAW;YACX,MAAM,WAAW,GAAG,IAAI,CAAC,UAAU,CAAC,YAAY,CAAC,IAAI,CAAC,mBAAmB,CAAC,CAAC;YAE3E,MAAM,eAAe,GAAG,MAAM,IAAI,CAAC,iBAAiB,CAAC,IAAI,CAAC,WAAW,EAAE;gBACrE,WAAW,EAAE,eAAe,CAAC,qBAAqB,CAAC,SAAS,CAAC,WAAW;gBACxE,WAAW;aACZ,CAAC,CAAC;YAEH,MAAM,aAAa,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,aAAa,iBACvD,QAAQ,IACL,WAAW,CAAC,cAAc,CAAC,OAAO,CAAC,aAAa,EACnD,CAAC;YAEH,OAAO;gBACL,OAAO,EAAE,aAAa,CAAC,GAAG;gBAC1B,eAAe;aAChB,CAAC;QACJ,CAAC;KAAA;IAEa,sBAAsB,CAClC,eAAqC,EACrC,WAAmB,EACnB,mBAA2B,EAC3B,aAA4B;;YAE5B,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,MAAM,CAAC,MAAM,CAAyB;gBAChE,QAAQ,EAAE,sBAAsB;gBAChC,SAAS,EAAE;oBACT,KAAK,EAAE;wBACL,eAAe,EAAE,IAAI,CAAC,SAAS,CAAC,eAAe,CAAC;wBAChD,WAAW;wBACX,mBAAmB,EAAE,IAAI,CAAC,SAAS,CAAC,mBAAmB,CAAC;wBACxD,UAAU,EAAE;4BACV,aAAa,EAAE,IAAI,CAAC,SAAS,CAAC,aAAa,CAAC,aAAa,CAAC;4BAC1D,kBAAkB,EAAE,IAAI,CAAC,SAAS,CAChC,aAAa,CAAC,eAAe,CAAC,MAAM,EAAE,CACvC;4BACD,yBAAyB,EAAE,IAAI,CAAC,SAAS,CACvC,aAAa,CAAC,yBAAyB,CACxC;4BACD,aAAa,EAAE,IAAI,CAAC,SAAS,CAAC,aAAa,CAAC,aAAa,CAAC;yBAC3D;qBACF;iBACF;aACF,CAAC,CAAC;YACH,OAAO;gBACL,KAAK,EAAE,QAAQ,CAAC,cAAc,CAAC,KAAK;gBACpC,YAAY,EAAE,QAAQ,CAAC,cAAc,CAAC,UAAU,CAAC,EAAE;aACpD,CAAC;QACJ,CAAC;KAAA;IAEK,uBAAuB;;YAC3B,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,MAAM,CAAC,KAAK,CAAM;gBACvC,KAAK,EAAE,yBAAyB;aACjC,CAAC,CAAC;YAEH,MAAM,GAAG,GAAG,GAAG,CAAC,oBAA4C,CAAC;YAE7D,GAAG,CAAC,QAAQ,GAAG,IAAI,IAAI,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;YACtC,GAAG,CAAC,UAAU,GAAG,IAAI,IAAI,CAAC,GAAG,CAAC,UAAU,CAAC,CAAC;YAC1C,OAAO,GAAG,CAAC;QACb,CAAC;KAAA;IAEM,gBAAgB,CAAC,QAAQ;QAC9B,MAAM,KAAK,GAAG,QAAQ,CAAC;QACvB,MAAM,KAAK,GAAG,QAAQ,CAAC;QACvB,MAAM,KAAK,GAAG,QAAQ,CAAC;QAEvB,MAAM,YAAY,GAAG,EAAE,CAAC;QACxB,MAAM,YAAY,GAAG,EAAE,CAAC;QACxB,MAAM,YAAY,GAAG,EAAE,CAAC;QACxB,MAAM,cAAc,GAAG,EAAE,CAAC,CAAC,wCAAwC;QAEnE,SAAS,aAAa,CAAC,GAAG,EAAE,EAAE;YAC5B,OAAO,CAAC,CAAC,GAAG,IAAI,EAAE,CAAC,CAAC,KAAK,CAAC,EAAE,CAAC,IAAI,EAAE,CAAC,CAAC,MAAM,CAAC;QAC9C,CAAC;QAED,MAAM,MAAM,GAAG,aAAa,CAAC,QAAQ,EAAE,KAAK,CAAC,CAAC;QAC9C,MAAM,MAAM,GAAG,aAAa,CAAC,QAAQ,EAAE,KAAK,CAAC,CAAC;QAC9C,MAAM,MAAM,GAAG,aAAa,CAAC,QAAQ,EAAE,KAAK,CAAC,CAAC;QAC9C,MAAM,QAAQ,GAAG,QAAQ,CAAC,MAAM,GAAG,MAAM,GAAG,MAAM,GAAG,MAAM,CAAC;QAE5D,IAAI,OAAO,GAAG,CAAC,CAAC;QAChB,IAAI,MAAM,EAAE;YACV,OAAO,IAAI,YAAY,CAAC;SACzB;QACD,IAAI,MAAM,EAAE;YACV,OAAO,IAAI,YAAY,CAAC;SACzB;QACD,IAAI,MAAM,EAAE;YACV,OAAO,IAAI,YAAY,CAAC;SACzB;QACD,IAAI,QAAQ,EAAE;YACZ,OAAO,IAAI,cAAc,CAAC;SAC3B;QAED,IAAI,QAAQ,CAAC,MAAM,KAAK,CAAC,EAAE;YACzB,OAAO;gBACL,KAAK,EAAE,CAAC;gBACR,kBAAkB;gBAClB,IAAI,EAAE,CAAC;aACR,CAAC;SACH;QAED,MAAM,YAAY,GAAG,IAAI,CAAC,GAAG,CAAC,OAAO,EAAE,QAAQ,CAAC,MAAM,CAAC,CAAC;QAExD,MAAM,KAAK,GACT,CAAC,KAAK,GAAG,YAAY,CAAC;YACtB,IAAI,CAAC,GAAG,CAAC,YAAY,GAAG,YAAY,GAAG,YAAY,EAAE,EAAE,CAAC,CAAC;QAC3D,OAAO;YACL,KAAK;YACL,kBAAkB;YAClB,IAAI,EAAE,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC;SAC1C,CAAC;IACJ,CAAC;;;;YA5XF,UAAU,SAAC;gBACV,UAAU,EAAE,MAAM;aACnB;;;4CAKI,MAAM,SAAC,SAAS;YA/DZ,UAAU;YAUV,eAAe;YAPf,SAAS;YAET,cAAc;YAiBO,GAAG;YAhBxB,iBAAiB;YACjB,eAAe;YAUf,gBAAgB;YAIhB,WAAW","sourcesContent":["import { HttpClient } from '@angular/common/http';\r\nimport { Inject, Injectable } from '@angular/core';\r\nimport { CognitoUser } from '@aws-amplify/auth';\r\nimport { AuthClass } from '@aws-amplify/auth/lib-esm/Auth';\r\nimport { JWK, JWS } from 'node-jose';\r\nimport { ProfileService } from '../users/profile.service';\r\nimport { EncryptionService } from '../cryptography/encryption.service';\r\nimport { KeyGraphService } from '../cryptography/key-graph.service';\r\nimport { LifeReadyConfig, LR_CONFIG } from '../life-ready.config';\r\nimport { LrAuthException, LrBadArgumentException } from '../_common/exceptions';\r\nimport { LrApolloService } from './../api/lr-apollo.service';\r\nimport {\r\n  PasswordChangeMutation,\r\n  PasswordChangeRequestMutation,\r\n  PasswordChangeConfigQuery,\r\n} from './auth.gql';\r\nimport { PassKeyBundle } from './auth.types';\r\nimport { WebCryptoService } from '../cryptography/web-crypto.service';\r\nimport { Duration } from 'moment';\r\nimport * as moment_ from 'moment';\r\nimport { ApiCurrentUser } from '../users/profile.types';\r\nimport { IdleService } from '../auth/idle.service';\r\nimport { KeyFactoryService as KFS } from '../cryptography/key-factory.service';\r\n\r\n// \"why?\" you ask: https://stackoverflow.com/questions/59735280/angular-8-moment-error-cannot-call-a-namespace-moment\r\nconst moment = moment_;\r\n\r\ninterface PasswordChangeRequestMutation {\r\n  passwordChangeRequest: {\r\n    challenge: {\r\n      serverNonce: string;\r\n    };\r\n  };\r\n}\r\n\r\ninterface PasswordChangeMutation {\r\n  passwordChange: {\r\n    token: string;\r\n    newPassKey: {\r\n      id: string;\r\n    };\r\n  };\r\n}\r\n\r\nexport interface PasswordChangeConfig {\r\n  maxAuthAgeSeconds: number;\r\n  authTime: string | Date;\r\n  serverTime: string | Date;\r\n}\r\n\r\nexport class PasswordCheck {\r\n  length?: number;\r\n  timeToCrack?: Duration;\r\n  passwordExposed?: number;\r\n}\r\n\r\n@Injectable({\r\n  providedIn: 'root',\r\n})\r\nexport class PasswordService {\r\n  private readonly CLIENT_NONCE_LENGTH = 32;\r\n\r\n  constructor(\r\n    @Inject(LR_CONFIG) private config: LifeReadyConfig,\r\n    private http: HttpClient,\r\n    private apollo: LrApolloService,\r\n    private auth: AuthClass,\r\n    private profileService: ProfileService,\r\n    private keyFactory: KFS,\r\n    private encryptionService: EncryptionService,\r\n    private keyGraph: KeyGraphService,\r\n    private webCryptoService: WebCryptoService,\r\n    private idleService: IdleService\r\n  ) {}\r\n\r\n  public async checkPassword(password: string): Promise<PasswordCheck> {\r\n    const { years } = this.passwordStrength(password);\r\n\r\n    return {\r\n      length: password.length,\r\n      timeToCrack: moment.duration({ years }),\r\n      passwordExposed: await this.getExposureCount(password),\r\n    };\r\n  }\r\n\r\n  public async getExposureCount(password: string): Promise<number> {\r\n    const sha1Password = await this.webCryptoService.stringDigest(\r\n      'SHA-1',\r\n      password\r\n    );\r\n    const first5sha1 = sha1Password.substring(0, 5);\r\n\r\n    const response = await this.http\r\n      .get(`https://api.pwnedpasswords.com/range/${first5sha1}`, {\r\n        responseType: 'text',\r\n      })\r\n      .toPromise();\r\n\r\n    const results = new RegExp(\r\n      `^(?:${sha1Password.substring(5)}:)(?<count>\\\\d+)$`,\r\n      'im'\r\n    ).exec(response);\r\n\r\n    if (results) {\r\n      return +results.groups.count;\r\n    }\r\n    return 0;\r\n  }\r\n\r\n  public getPassIdpString(passIdp: JWK.Key) {\r\n    return (passIdp.toJSON(true) as any).k;\r\n  }\r\n\r\n  public async createPassKeyBundle(password: string): Promise<PassKeyBundle> {\r\n    const passIdpParams = await this.keyFactory.createPassIdpParams();\r\n    const passIdp = (\r\n      await this.keyFactory.derivePassIdp({\r\n        password,\r\n        ...passIdpParams,\r\n      })\r\n    ).jwk;\r\n\r\n    const passKeyParams = await this.keyFactory.createPassKeyParams();\r\n    const passKey = (\r\n      await this.keyFactory.derivePassKey({\r\n        password,\r\n        ...passKeyParams,\r\n      })\r\n    ).jwk;\r\n\r\n    const passIdpVerifier = await this.keyFactory.createPkcSignKey();\r\n\r\n    const wrappedPassIdpVerifierPrk = await this.encryptionService.encrypt(\r\n      passKey,\r\n      passIdpVerifier.toJSON(true)\r\n    );\r\n\r\n    // There are two formats that the private key can be represented in JWK:\r\n    // https://tools.ietf.org/html/rfc8017#page-9\r\n    // The second form is an optimization:\r\n    // https://crypto.stackexchange.com/questions/19413/what-are-dp-and-dq-in-encryption-by-rsa-in-c\r\n\r\n    return {\r\n      passKeyParams,\r\n      passKey,\r\n      passIdpParams,\r\n      passIdp,\r\n      passIdpVerifier,\r\n      wrappedPassIdpVerifierPrk,\r\n    };\r\n  }\r\n\r\n  /**\r\n   * We need to allow for interruption of the process at any point. Each API call can be considered\r\n   * atomic and either succeeds or fails.\r\n   *\r\n   * The LR server APIs use semaphore tokens for locking critical operations, so concurrent calls will\r\n   * fail.\r\n   *\r\n   * We assume the worst case for IdP API calls. So we use the semaphore token from LR to prevent\r\n   * concurrent calls to IdP APIs, but we have to assume that the IdP API calls will either succeed or\r\n   * fail within a reasonable amount of time.\r\n   *\r\n   * Each location where the server state changes can be a potential point of interruption.\r\n   * Potential points of interruption are marked with: --Potential Failure Point--\r\n   *\r\n   * Places for timeout:\r\n   * - Login age too old at call to: verifyPassword()\r\n   * - Login age too old at call to: changePasswordMutation()\r\n   * - Semaphore token expires at call to: changePasswordComplete()\r\n   *\r\n   * Tests:\r\n   * - Potential Failure Point 1: should be able to restart the process, user remains signed in.\r\n   * - Potential Failure Point 2: should enter recovery flow\r\n   * - Potential Failure Point 3: should enter recovery flow\r\n   * - Potential Failure Point 4: should enter recovery flow\r\n   *\r\n   */\r\n\r\n  public async isLoginRequired(): Promise<boolean> {\r\n    const changePasswordConfig = await this.getChangePasswordConfig();\r\n    const authTime = moment(changePasswordConfig.authTime);\r\n    const serverTime = moment(changePasswordConfig.serverTime);\r\n    const duration = moment.duration(serverTime.diff(authTime));\r\n    const seconds = duration.asSeconds();\r\n    if (seconds > changePasswordConfig.maxAuthAgeSeconds) {\r\n      return true;\r\n    } else {\r\n      return false;\r\n    }\r\n  }\r\n\r\n  public async changePassword(password: string, newPassword: string) {\r\n    const cognitoUser: CognitoUser = await this.auth.currentAuthenticatedUser();\r\n\r\n    // Validation\r\n    // todo: Add this back in\r\n    // Note the passIdp will always have a random salt, so will always be different to the current passIdp.\r\n    if (password === newPassword) {\r\n      throw new LrBadArgumentException(\r\n        'New password is the same as the current one.'\r\n      );\r\n    }\r\n\r\n    const { currentUser } = await this.profileService.getCurrentUser();\r\n\r\n    const { passIdp, signedChallenge } = await this.verifyPassword(\r\n      password,\r\n      currentUser\r\n    );\r\n\r\n    // --Potential Failure Point 1--\r\n    // verifyPassword() asks for a current password challenge hence changes server state.\r\n    // Place break points here to test the failure scenarios.\r\n\r\n    // Generate the new passIdp\r\n    const newPassKey = await this.createPassKeyBundle(newPassword);\r\n\r\n    // Re-encrypt master key with new key\r\n    const masterKey = await this.keyGraph.getKey(\r\n      currentUser.currentUserKey.masterKey.id\r\n    );\r\n    const newWrappedMasterKey = await this.encryptionService.encrypt(\r\n      newPassKey.passKey,\r\n      masterKey.jwk.toJSON(true)\r\n    );\r\n\r\n    // If the IdP change password failed, we need to go into recovery mode by forcing\r\n    // a login. We can't logout the user just yet since the IdP password change needs\r\n    // the user to be logged in. We _can_ removed any persisted session values for the IdP\r\n    // but that seems like too much trouble.\r\n\r\n    const { token, newPassKeyId } = await this.changePasswordMutation(\r\n      signedChallenge,\r\n      currentUser.currentUserKey.masterKey.id,\r\n      newWrappedMasterKey,\r\n      newPassKey\r\n    );\r\n\r\n    // --Potential Failure Point 2--\r\n    // changePasswordMutation() uploads new keys and obtains a semaphore lock to prevent any other\r\n    // clients from performing IdP password change.\r\n\r\n    // Now we can do the IdP password change.\r\n    // todo: Add this back in\r\n    await this.auth.changePassword(\r\n      cognitoUser,\r\n      this.getPassIdpString(passIdp),\r\n      this.getPassIdpString(newPassKey.passIdp)\r\n    );\r\n\r\n    // --Potential Failure Point 3--\r\n    // IdP password change\r\n\r\n    // Note that changePassword() could throw an exception for a number of reason. It could throw\r\n    // a network timeout for example. But we don't know if it's the response that timed out and\r\n    // the idp password change was actually carried out. So we have to be extra conservative and\r\n    // only act on a clear success. Otherwise we go into recover mode.\r\n    await this.changePasswordComplete(\r\n      cognitoUser.getSignInUserSession().getAccessToken().getJwtToken(),\r\n      true,\r\n      token\r\n    );\r\n  }\r\n\r\n  public async changePasswordComplete(\r\n    accessToken: string,\r\n    useNewPassword: boolean,\r\n    token: string = null\r\n  ): Promise<any> {\r\n    return this.http\r\n      .post(\r\n        `${this.config.authUrl}users/password-change-complete/`,\r\n        {\r\n          use_new_password: useNewPassword,\r\n          ...(token && { token }),\r\n        },\r\n        {\r\n          headers: {\r\n            Authorization: `Bearer ${accessToken}`,\r\n          },\r\n        }\r\n      )\r\n      .toPromise();\r\n  }\r\n\r\n  private async getVerifierPrK(\r\n    passKey: JWK.Key,\r\n    wrappedPrK: object\r\n  ): Promise<JWK.Key> {\r\n    try {\r\n      const prkJson = await this.encryptionService.decrypt(passKey, wrappedPrK);\r\n      return KFS.asKey(prkJson);\r\n    } catch (error) {\r\n      throw new LrAuthException('Wrong current password');\r\n    }\r\n  }\r\n\r\n  private async verifyPassword(\r\n    password: string,\r\n    currentUser: ApiCurrentUser\r\n  ): Promise<{ passIdp: JWK.Key; signedChallenge: JWS.CreateSignResult }> {\r\n    // Get information from the server to prepare for password change.\r\n    const passwordRequest = await this.apollo.mutate<PasswordChangeRequestMutation>(\r\n      {\r\n        mutation: PasswordChangeRequestMutation,\r\n        variables: {},\r\n      }\r\n    );\r\n\r\n    // Get the old passKey so we can decrypt the old password verifier\r\n    const passKeyResult = await this.keyFactory.derivePassKey({\r\n      password,\r\n      ...currentUser.currentUserKey.passKey.passKeyParams,\r\n    });\r\n\r\n    const verifierPrK = await this.getVerifierPrK(\r\n      passKeyResult.jwk,\r\n      currentUser.currentUserKey.passKey.wrappedPassIdpVerifierPrk\r\n    );\r\n\r\n    // Sign the server challenge to prove to the server we can decrypt the password verifier.\r\n    // Generate\r\n    const clientNonce = this.keyFactory.randomString(this.CLIENT_NONCE_LENGTH);\r\n\r\n    const signedChallenge = await this.encryptionService.sign(verifierPrK, {\r\n      serverNonce: passwordRequest.passwordChangeRequest.challenge.serverNonce,\r\n      clientNonce,\r\n    });\r\n\r\n    const passIdpResult = await this.keyFactory.derivePassIdp({\r\n      password,\r\n      ...currentUser.currentUserKey.passKey.passIdpParams,\r\n    });\r\n\r\n    return {\r\n      passIdp: passIdpResult.jwk,\r\n      signedChallenge,\r\n    };\r\n  }\r\n\r\n  private async changePasswordMutation(\r\n    signedChallenge: JWS.CreateSignResult,\r\n    masterKeyId: string,\r\n    newWrappedMasterKey: object,\r\n    passKeyBundle: PassKeyBundle\r\n  ): Promise<{ token: string; newPassKeyId: string }> {\r\n    const response = await this.apollo.mutate<PasswordChangeMutation>({\r\n      mutation: PasswordChangeMutation,\r\n      variables: {\r\n        input: {\r\n          signedChallenge: JSON.stringify(signedChallenge),\r\n          masterKeyId,\r\n          newWrappedMasterKey: JSON.stringify(newWrappedMasterKey),\r\n          newPassKey: {\r\n            passIdpParams: JSON.stringify(passKeyBundle.passIdpParams),\r\n            passIdpVerifierPbk: JSON.stringify(\r\n              passKeyBundle.passIdpVerifier.toJSON()\r\n            ),\r\n            wrappedPassIdpVerifierPrk: JSON.stringify(\r\n              passKeyBundle.wrappedPassIdpVerifierPrk\r\n            ),\r\n            passKeyParams: JSON.stringify(passKeyBundle.passKeyParams),\r\n          },\r\n        },\r\n      },\r\n    });\r\n    return {\r\n      token: response.passwordChange.token,\r\n      newPassKeyId: response.passwordChange.newPassKey.id,\r\n    };\r\n  }\r\n\r\n  async getChangePasswordConfig(): Promise<PasswordChangeConfig> {\r\n    const res = await this.apollo.query<any>({\r\n      query: PasswordChangeConfigQuery,\r\n    });\r\n\r\n    const ret = res.passwordChangeConfig as PasswordChangeConfig;\r\n\r\n    ret.authTime = new Date(ret.authTime);\r\n    ret.serverTime = new Date(ret.serverTime);\r\n    return ret;\r\n  }\r\n\r\n  public passwordStrength(password): { years: number; bits: number } {\r\n    const upper = /[A-Z]/g;\r\n    const lower = /[a-z]/g;\r\n    const digit = /[0-9]/g;\r\n\r\n    const upperChoices = 26;\r\n    const lowerChoices = 26;\r\n    const digitChoices = 10;\r\n    const specialChoices = 30; // /[!\"#$%&'()*+,-./:;<=>?@[\\]^_`{|}~]/g\r\n\r\n    function instanceCount(str, re) {\r\n      return ((str || '').match(re) || []).length;\r\n    }\r\n\r\n    const uppers = instanceCount(password, upper);\r\n    const lowers = instanceCount(password, lower);\r\n    const digits = instanceCount(password, digit);\r\n    const specials = password.length - uppers - lowers - digits;\r\n\r\n    let choices = 0;\r\n    if (uppers) {\r\n      choices += upperChoices;\r\n    }\r\n    if (lowers) {\r\n      choices += lowerChoices;\r\n    }\r\n    if (digits) {\r\n      choices += digitChoices;\r\n    }\r\n    if (specials) {\r\n      choices += specialChoices;\r\n    }\r\n\r\n    if (password.length === 0) {\r\n      return {\r\n        years: 0,\r\n        // bits of entropy\r\n        bits: 0,\r\n      };\r\n    }\r\n\r\n    const permutations = Math.pow(choices, password.length);\r\n\r\n    const years =\r\n      (54000 * permutations) /\r\n      Math.pow(upperChoices + lowerChoices + digitChoices, 12);\r\n    return {\r\n      years,\r\n      // bits of entropy\r\n      bits: Math.round(Math.log2(permutations)),\r\n    };\r\n  }\r\n}\r\n"]}
@@ -0,0 +1,172 @@
1
+ import { __awaiter } from "tslib";
2
+ import { HttpClient } from '@angular/common/http';
3
+ import { Inject, Injectable } from '@angular/core';
4
+ import { AuthClass } from '@aws-amplify/auth/lib-esm/Auth';
5
+ import { EncryptionService } from '../cryptography/encryption.service';
6
+ import { KeyFactoryService } from '../cryptography/key-factory.service';
7
+ import { LR_CONFIG } from '../life-ready.config';
8
+ import { PasswordService } from './password.service';
9
+ import * as i0 from "@angular/core";
10
+ import * as i1 from "../life-ready.config";
11
+ import * as i2 from "@aws-amplify/auth/lib-esm/Auth";
12
+ import * as i3 from "@angular/common/http";
13
+ import * as i4 from "../cryptography/key-factory.service";
14
+ import * as i5 from "../cryptography/encryption.service";
15
+ import * as i6 from "./password.service";
16
+ export class RegisterService {
17
+ constructor(config, auth, http, keyFactory, encryptionService, passwordService) {
18
+ this.config = config;
19
+ this.auth = auth;
20
+ this.http = http;
21
+ this.keyFactory = keyFactory;
22
+ this.encryptionService = encryptionService;
23
+ this.passwordService = passwordService;
24
+ }
25
+ /**
26
+ * Request a verification code to be sent out to an email.
27
+ * @return Info needed to be submitted along with the verification code
28
+ */
29
+ verifyEmail(email) {
30
+ return __awaiter(this, void 0, void 0, function* () {
31
+ const { claim_id } = yield this.http
32
+ .post(`${this.config.authUrl}cove/claim/email/`, {
33
+ address: email,
34
+ context: 'signup',
35
+ })
36
+ .toPromise();
37
+ return claim_id;
38
+ });
39
+ }
40
+ verifyPhone(phoneNumber) {
41
+ return __awaiter(this, void 0, void 0, function* () {
42
+ const { claim_id } = yield this.http
43
+ .post(`${this.config.authUrl}cove/claim/sms/`, {
44
+ address: phoneNumber,
45
+ context: 'signup',
46
+ })
47
+ .toPromise();
48
+ return claim_id;
49
+ });
50
+ }
51
+ confirmVerificationCode(verificationId, verificationCode) {
52
+ return __awaiter(this, void 0, void 0, function* () {
53
+ const { token } = yield this.http
54
+ .post(`${this.config.authUrl}cove/respond/`, {
55
+ claim_id: verificationId,
56
+ v_code: verificationCode,
57
+ })
58
+ .toPromise();
59
+ return token;
60
+ });
61
+ }
62
+ register(email, password, verificationId, verificationToken, verificationType = 'email') {
63
+ return __awaiter(this, void 0, void 0, function* () {
64
+ // Generate the key material needed for PassIdp which will be the password used for Cognito.
65
+ const passKeyBundle = yield this.passwordService.createPassKeyBundle(password);
66
+ const masterKey = yield this.keyFactory.createKey();
67
+ const wrappedMasterKey = yield this.encryptionService.encrypt(passKeyBundle.passKey, masterKey.toJSON(true));
68
+ const rootKey = yield this.keyFactory.createKey();
69
+ const wrappedRootKey = yield this.encryptionService.encrypt(masterKey, rootKey.toJSON(true));
70
+ // Encryption PKC key
71
+ const prk = yield this.keyFactory.createPkcKey();
72
+ const wrappedPrk = yield this.encryptionService.encrypt(rootKey, prk.toJSON(true));
73
+ // Signing PKC key
74
+ const sigPrk = yield this.keyFactory.createPkcSignKey();
75
+ const wrappedSigPrk = yield this.encryptionService.encrypt(rootKey, sigPrk.toJSON(true));
76
+ // API call to setup profile
77
+ const user = yield this.http
78
+ .post(`${this.config.authUrl}users/`, {
79
+ claims: [
80
+ {
81
+ type: verificationType,
82
+ token: verificationToken,
83
+ claim_id: verificationId,
84
+ },
85
+ ],
86
+ pass_idp_params: passKeyBundle.passIdpParams,
87
+ pass_idp_verifier_pbk: passKeyBundle.passIdpVerifier.toJSON(),
88
+ wrapped_pass_idp_verifier_prk: passKeyBundle.wrappedPassIdpVerifierPrk,
89
+ pass_key_params: passKeyBundle.passKeyParams,
90
+ wrapped_master_key: wrappedMasterKey,
91
+ wrapped_root_key: wrappedRootKey,
92
+ pbk: prk.toJSON(),
93
+ wrapped_prk: wrappedPrk,
94
+ sig_pbk: sigPrk.toJSON(),
95
+ wrapped_sig_prk: wrappedSigPrk,
96
+ })
97
+ .toPromise();
98
+ // API call to create user on cognito
99
+ const attributes = {};
100
+ user.claims.forEach((claim) => {
101
+ attributes[claim.type] = claim.value;
102
+ });
103
+ // Random suffix for uniqueness. If there's a duplicate, then used just needs to
104
+ // sign up again. But chances of collision is low.
105
+ const suffix = this.keyFactory.randomDigitsNoZeros(4);
106
+ const cognitoUser = yield this.auth.signUp({
107
+ username: `${email.split('@')[0]}.${suffix}`,
108
+ password: this.passwordService.getPassIdpString(passKeyBundle.passIdp),
109
+ attributes,
110
+ // Unfortunately, validationData is not passed to the post
111
+ // confirmation cognito trigger. So can can't do the association there.
112
+ // The current workflow will create a new user on LR before signing up
113
+ // with Cognito. Then Cognito can use the user.id and user.pre_sign_up_token to
114
+ // do the validation of the attributes.
115
+ // validationData: [
116
+ // new CognitoUserAttribute({
117
+ // Name: "user_id",
118
+ // Value: String(user.id)
119
+ // }),
120
+ // new CognitoUserAttribute({
121
+ // Name: "user_pre_sign_up_token",
122
+ // Value: user.pre_sign_up_token
123
+ // })
124
+ // ]
125
+ clientMetadata: {
126
+ user_id: String(user.id),
127
+ user_pre_sign_up_token: String(user.pre_sign_up_token),
128
+ },
129
+ });
130
+ return {
131
+ username: cognitoUser.user.getUsername(),
132
+ userId: user.id,
133
+ preSignUpToken: user.pre_sign_up_token,
134
+ userSub: cognitoUser.userSub,
135
+ };
136
+ });
137
+ }
138
+ hibpBreachedAccounts(account) {
139
+ return __awaiter(this, void 0, void 0, function* () {
140
+ // The account is just the email
141
+ try {
142
+ const response = yield this.http
143
+ .get(`${this.config.authUrl}users/hibp/breachedaccount/${account}/?truncateResponse=false`)
144
+ .toPromise();
145
+ return response;
146
+ }
147
+ catch (error) {
148
+ if (error.status === 404) {
149
+ return null;
150
+ }
151
+ else {
152
+ throw error;
153
+ }
154
+ }
155
+ });
156
+ }
157
+ }
158
+ RegisterService.ɵprov = i0.ɵɵdefineInjectable({ factory: function RegisterService_Factory() { return new RegisterService(i0.ɵɵinject(i1.LR_CONFIG), i0.ɵɵinject(i2.AuthClass), i0.ɵɵinject(i3.HttpClient), i0.ɵɵinject(i4.KeyFactoryService), i0.ɵɵinject(i5.EncryptionService), i0.ɵɵinject(i6.PasswordService)); }, token: RegisterService, providedIn: "root" });
159
+ RegisterService.decorators = [
160
+ { type: Injectable, args: [{
161
+ providedIn: 'root',
162
+ },] }
163
+ ];
164
+ RegisterService.ctorParameters = () => [
165
+ { type: undefined, decorators: [{ type: Inject, args: [LR_CONFIG,] }] },
166
+ { type: AuthClass },
167
+ { type: HttpClient },
168
+ { type: KeyFactoryService },
169
+ { type: EncryptionService },
170
+ { type: PasswordService }
171
+ ];
172
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"register.service.js","sourceRoot":"C:/Projects/newrepo/kc-client/projects/core/src/","sources":["lib/auth/register.service.ts"],"names":[],"mappings":";AAAA,OAAO,EAAE,UAAU,EAAE,MAAM,sBAAsB,CAAC;AAClD,OAAO,EAAE,MAAM,EAAE,UAAU,EAAE,MAAM,eAAe,CAAC;AACnD,OAAO,EAAE,SAAS,EAAE,MAAM,gCAAgC,CAAC;AAC3D,OAAO,EAAE,iBAAiB,EAAE,MAAM,oCAAoC,CAAC;AACvE,OAAO,EAAE,iBAAiB,EAAE,MAAM,qCAAqC,CAAC;AACxE,OAAO,EAAmB,SAAS,EAAE,MAAM,sBAAsB,CAAC;AAClE,OAAO,EAAE,eAAe,EAAE,MAAM,oBAAoB,CAAC;;;;;;;;AAMrD,MAAM,OAAO,eAAe;IAC1B,YAC6B,MAAuB,EAC1C,IAAe,EACf,IAAgB,EAChB,UAA6B,EAC7B,iBAAoC,EACpC,eAAgC;QALb,WAAM,GAAN,MAAM,CAAiB;QAC1C,SAAI,GAAJ,IAAI,CAAW;QACf,SAAI,GAAJ,IAAI,CAAY;QAChB,eAAU,GAAV,UAAU,CAAmB;QAC7B,sBAAiB,GAAjB,iBAAiB,CAAmB;QACpC,oBAAe,GAAf,eAAe,CAAiB;IACvC,CAAC;IAEJ;;;OAGG;IACU,WAAW,CAAC,KAAa;;YACpC,MAAM,EAAE,QAAQ,EAAE,GAAG,MAAM,IAAI,CAAC,IAAI;iBACjC,IAAI,CAAe,GAAG,IAAI,CAAC,MAAM,CAAC,OAAO,mBAAmB,EAAE;gBAC7D,OAAO,EAAE,KAAK;gBACd,OAAO,EAAE,QAAQ;aAClB,CAAC;iBACD,SAAS,EAAE,CAAC;YACf,OAAO,QAAQ,CAAC;QAClB,CAAC;KAAA;IAEY,WAAW,CAAC,WAAmB;;YAC1C,MAAM,EAAE,QAAQ,EAAE,GAAG,MAAM,IAAI,CAAC,IAAI;iBACjC,IAAI,CAAe,GAAG,IAAI,CAAC,MAAM,CAAC,OAAO,iBAAiB,EAAE;gBAC3D,OAAO,EAAE,WAAW;gBACpB,OAAO,EAAE,QAAQ;aAClB,CAAC;iBACD,SAAS,EAAE,CAAC;YACf,OAAO,QAAQ,CAAC;QAClB,CAAC;KAAA;IAEY,uBAAuB,CAClC,cAAsB,EACtB,gBAAwB;;YAExB,MAAM,EAAE,KAAK,EAAE,GAAG,MAAM,IAAI,CAAC,IAAI;iBAC9B,IAAI,CAAY,GAAG,IAAI,CAAC,MAAM,CAAC,OAAO,eAAe,EAAE;gBACtD,QAAQ,EAAE,cAAc;gBACxB,MAAM,EAAE,gBAAgB;aACzB,CAAC;iBACD,SAAS,EAAE,CAAC;YACf,OAAO,KAAK,CAAC;QACf,CAAC;KAAA;IAEY,QAAQ,CACnB,KAAa,EACb,QAAgB,EAChB,cAAsB,EACtB,iBAAyB,EACzB,mBAAsC,OAAO;;YAE7C,4FAA4F;YAC5F,MAAM,aAAa,GAAG,MAAM,IAAI,CAAC,eAAe,CAAC,mBAAmB,CAClE,QAAQ,CACT,CAAC;YAEF,MAAM,SAAS,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,SAAS,EAAE,CAAC;YACpD,MAAM,gBAAgB,GAAG,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAC3D,aAAa,CAAC,OAAO,EACrB,SAAS,CAAC,MAAM,CAAC,IAAI,CAAC,CACvB,CAAC;YAEF,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,SAAS,EAAE,CAAC;YAClD,MAAM,cAAc,GAAG,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CACzD,SAAS,EACT,OAAO,CAAC,MAAM,CAAC,IAAI,CAAC,CACrB,CAAC;YAEF,qBAAqB;YACrB,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,YAAY,EAAE,CAAC;YACjD,MAAM,UAAU,GAAG,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CACrD,OAAO,EACP,GAAG,CAAC,MAAM,CAAC,IAAI,CAAC,CACjB,CAAC;YAEF,kBAAkB;YAClB,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,gBAAgB,EAAE,CAAC;YACxD,MAAM,aAAa,GAAG,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CACxD,OAAO,EACP,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CACpB,CAAC;YAEF,4BAA4B;YAC5B,MAAM,IAAI,GAAG,MAAM,IAAI,CAAC,IAAI;iBACzB,IAAI,CAAM,GAAG,IAAI,CAAC,MAAM,CAAC,OAAO,QAAQ,EAAE;gBACzC,MAAM,EAAE;oBACN;wBACE,IAAI,EAAE,gBAAgB;wBACtB,KAAK,EAAE,iBAAiB;wBACxB,QAAQ,EAAE,cAAc;qBACzB;iBACF;gBACD,eAAe,EAAE,aAAa,CAAC,aAAa;gBAC5C,qBAAqB,EAAE,aAAa,CAAC,eAAe,CAAC,MAAM,EAAE;gBAC7D,6BAA6B,EAAE,aAAa,CAAC,yBAAyB;gBACtE,eAAe,EAAE,aAAa,CAAC,aAAa;gBAC5C,kBAAkB,EAAE,gBAAgB;gBACpC,gBAAgB,EAAE,cAAc;gBAChC,GAAG,EAAE,GAAG,CAAC,MAAM,EAAE;gBACjB,WAAW,EAAE,UAAU;gBACvB,OAAO,EAAE,MAAM,CAAC,MAAM,EAAE;gBACxB,eAAe,EAAE,aAAa;aAC/B,CAAC;iBACD,SAAS,EAAE,CAAC;YAEf,qCAAqC;YACrC,MAAM,UAAU,GAAG,EAAE,CAAC;YACtB,IAAI,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC,KAAK,EAAE,EAAE;gBAC5B,UAAU,CAAC,KAAK,CAAC,IAAI,CAAC,GAAG,KAAK,CAAC,KAAK,CAAC;YACvC,CAAC,CAAC,CAAC;YAEH,gFAAgF;YAChF,kDAAkD;YAClD,MAAM,MAAM,GAAG,IAAI,CAAC,UAAU,CAAC,mBAAmB,CAAC,CAAC,CAAC,CAAC;YAEtD,MAAM,WAAW,GAAG,MAAM,IAAI,CAAC,IAAI,CAAC,MAAM,CAAC;gBACzC,QAAQ,EAAE,GAAG,KAAK,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,IAAI,MAAM,EAAE;gBAC5C,QAAQ,EAAE,IAAI,CAAC,eAAe,CAAC,gBAAgB,CAAC,aAAa,CAAC,OAAO,CAAC;gBACtE,UAAU;gBACV,0DAA0D;gBAC1D,uEAAuE;gBACvE,sEAAsE;gBACtE,+EAA+E;gBAC/E,uCAAuC;gBACvC,oBAAoB;gBACpB,+BAA+B;gBAC/B,uBAAuB;gBACvB,6BAA6B;gBAC7B,QAAQ;gBACR,+BAA+B;gBAC/B,sCAAsC;gBACtC,oCAAoC;gBACpC,OAAO;gBACP,IAAI;gBACJ,cAAc,EAAE;oBACd,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,EAAE,CAAC;oBACxB,sBAAsB,EAAE,MAAM,CAAC,IAAI,CAAC,iBAAiB,CAAC;iBACvD;aACF,CAAC,CAAC;YAEH,OAAO;gBACL,QAAQ,EAAE,WAAW,CAAC,IAAI,CAAC,WAAW,EAAE;gBACxC,MAAM,EAAE,IAAI,CAAC,EAAE;gBACf,cAAc,EAAE,IAAI,CAAC,iBAAiB;gBACtC,OAAO,EAAE,WAAW,CAAC,OAAO;aAC7B,CAAC;QACJ,CAAC;KAAA;IAEY,oBAAoB,CAAC,OAAe;;YAC/C,gCAAgC;YAChC,IAAI;gBACF,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,IAAI;qBAC7B,GAAG,CACF,GAAG,IAAI,CAAC,MAAM,CAAC,OAAO,8BAA8B,OAAO,0BAA0B,CACtF;qBACA,SAAS,EAAE,CAAC;gBACf,OAAO,QAAQ,CAAC;aACjB;YAAC,OAAO,KAAK,EAAE;gBACd,IAAI,KAAK,CAAC,MAAM,KAAK,GAAG,EAAE;oBACxB,OAAO,IAAI,CAAC;iBACb;qBAAM;oBACL,MAAM,KAAK,CAAC;iBACb;aACF;QACH,CAAC;KAAA;;;;YA1KF,UAAU,SAAC;gBACV,UAAU,EAAE,MAAM;aACnB;;;4CAGI,MAAM,SAAC,SAAS;YAZZ,SAAS;YAFT,UAAU;YAIV,iBAAiB;YADjB,iBAAiB;YAGjB,eAAe","sourcesContent":["import { HttpClient } from '@angular/common/http';\r\nimport { Inject, Injectable } from '@angular/core';\r\nimport { AuthClass } from '@aws-amplify/auth/lib-esm/Auth';\r\nimport { EncryptionService } from '../cryptography/encryption.service';\r\nimport { KeyFactoryService } from '../cryptography/key-factory.service';\r\nimport { LifeReadyConfig, LR_CONFIG } from '../life-ready.config';\r\nimport { PasswordService } from './password.service';\r\nimport { RegisterResult } from './auth.types';\r\n\r\n@Injectable({\r\n  providedIn: 'root',\r\n})\r\nexport class RegisterService {\r\n  constructor(\r\n    @Inject(LR_CONFIG) private config: LifeReadyConfig,\r\n    private auth: AuthClass,\r\n    private http: HttpClient,\r\n    private keyFactory: KeyFactoryService,\r\n    private encryptionService: EncryptionService,\r\n    private passwordService: PasswordService\r\n  ) {}\r\n\r\n  /**\r\n   * Request a verification code to be sent out to an email.\r\n   * @return Info needed to be submitted along with the verification code\r\n   */\r\n  public async verifyEmail(email: string): Promise<string> {\r\n    const { claim_id } = await this.http\r\n      .post<{ claim_id }>(`${this.config.authUrl}cove/claim/email/`, {\r\n        address: email,\r\n        context: 'signup',\r\n      })\r\n      .toPromise();\r\n    return claim_id;\r\n  }\r\n\r\n  public async verifyPhone(phoneNumber: string): Promise<string> {\r\n    const { claim_id } = await this.http\r\n      .post<{ claim_id }>(`${this.config.authUrl}cove/claim/sms/`, {\r\n        address: phoneNumber,\r\n        context: 'signup',\r\n      })\r\n      .toPromise();\r\n    return claim_id;\r\n  }\r\n\r\n  public async confirmVerificationCode(\r\n    verificationId: string,\r\n    verificationCode: string\r\n  ): Promise<string> {\r\n    const { token } = await this.http\r\n      .post<{ token }>(`${this.config.authUrl}cove/respond/`, {\r\n        claim_id: verificationId,\r\n        v_code: verificationCode,\r\n      })\r\n      .toPromise();\r\n    return token;\r\n  }\r\n\r\n  public async register(\r\n    email: string,\r\n    password: string,\r\n    verificationId: string,\r\n    verificationToken: string,\r\n    verificationType: 'email' | 'phone' = 'email'\r\n  ): Promise<RegisterResult> {\r\n    // Generate the key material needed for PassIdp which will be the password used for Cognito.\r\n    const passKeyBundle = await this.passwordService.createPassKeyBundle(\r\n      password\r\n    );\r\n\r\n    const masterKey = await this.keyFactory.createKey();\r\n    const wrappedMasterKey = await this.encryptionService.encrypt(\r\n      passKeyBundle.passKey,\r\n      masterKey.toJSON(true)\r\n    );\r\n\r\n    const rootKey = await this.keyFactory.createKey();\r\n    const wrappedRootKey = await this.encryptionService.encrypt(\r\n      masterKey,\r\n      rootKey.toJSON(true)\r\n    );\r\n\r\n    // Encryption PKC key\r\n    const prk = await this.keyFactory.createPkcKey();\r\n    const wrappedPrk = await this.encryptionService.encrypt(\r\n      rootKey,\r\n      prk.toJSON(true)\r\n    );\r\n\r\n    // Signing PKC key\r\n    const sigPrk = await this.keyFactory.createPkcSignKey();\r\n    const wrappedSigPrk = await this.encryptionService.encrypt(\r\n      rootKey,\r\n      sigPrk.toJSON(true)\r\n    );\r\n\r\n    // API call to setup profile\r\n    const user = await this.http\r\n      .post<any>(`${this.config.authUrl}users/`, {\r\n        claims: [\r\n          {\r\n            type: verificationType,\r\n            token: verificationToken,\r\n            claim_id: verificationId,\r\n          },\r\n        ],\r\n        pass_idp_params: passKeyBundle.passIdpParams,\r\n        pass_idp_verifier_pbk: passKeyBundle.passIdpVerifier.toJSON(),\r\n        wrapped_pass_idp_verifier_prk: passKeyBundle.wrappedPassIdpVerifierPrk,\r\n        pass_key_params: passKeyBundle.passKeyParams,\r\n        wrapped_master_key: wrappedMasterKey,\r\n        wrapped_root_key: wrappedRootKey,\r\n        pbk: prk.toJSON(), // public encryption key\r\n        wrapped_prk: wrappedPrk,\r\n        sig_pbk: sigPrk.toJSON(), // public signing key\r\n        wrapped_sig_prk: wrappedSigPrk,\r\n      })\r\n      .toPromise();\r\n\r\n    // API call to create user on cognito\r\n    const attributes = {};\r\n    user.claims.forEach((claim) => {\r\n      attributes[claim.type] = claim.value;\r\n    });\r\n\r\n    // Random suffix for uniqueness. If there's a duplicate, then used just needs to\r\n    // sign up again. But chances of collision is low.\r\n    const suffix = this.keyFactory.randomDigitsNoZeros(4);\r\n\r\n    const cognitoUser = await this.auth.signUp({\r\n      username: `${email.split('@')[0]}.${suffix}`,\r\n      password: this.passwordService.getPassIdpString(passKeyBundle.passIdp),\r\n      attributes,\r\n      // Unfortunately, validationData is not passed to the post\r\n      // confirmation cognito trigger. So can can't do the association there.\r\n      // The current workflow will create a new user on LR before signing up\r\n      // with Cognito. Then Cognito can use the user.id and user.pre_sign_up_token to\r\n      // do the validation of the attributes.\r\n      // validationData: [\r\n      //   new CognitoUserAttribute({\r\n      //     Name: \"user_id\",\r\n      //     Value: String(user.id)\r\n      //   }),\r\n      //   new CognitoUserAttribute({\r\n      //     Name: \"user_pre_sign_up_token\",\r\n      //     Value: user.pre_sign_up_token\r\n      //   })\r\n      // ]\r\n      clientMetadata: {\r\n        user_id: String(user.id),\r\n        user_pre_sign_up_token: String(user.pre_sign_up_token),\r\n      },\r\n    });\r\n\r\n    return {\r\n      username: cognitoUser.user.getUsername(),\r\n      userId: user.id,\r\n      preSignUpToken: user.pre_sign_up_token,\r\n      userSub: cognitoUser.userSub,\r\n    };\r\n  }\r\n\r\n  public async hibpBreachedAccounts(account: string): Promise<any> {\r\n    // The account is just the email\r\n    try {\r\n      const response = await this.http\r\n        .get(\r\n          `${this.config.authUrl}users/hibp/breachedaccount/${account}/?truncateResponse=false`\r\n        )\r\n        .toPromise();\r\n      return response;\r\n    } catch (error) {\r\n      if (error.status === 404) {\r\n        return null;\r\n      } else {\r\n        throw error;\r\n      }\r\n    }\r\n  }\r\n}\r\n"]}