@lifeready/core 1.0.13 → 1.0.15

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (219) hide show
  1. package/README.md +62 -62
  2. package/bundles/lifeready-core.umd.js +14315 -14315
  3. package/bundles/lifeready-core.umd.js.map +1 -1
  4. package/bundles/lifeready-core.umd.min.js.map +1 -1
  5. package/esm2015/lib/_common/ast.js +40 -40
  6. package/esm2015/lib/_common/deferred-promise.js +24 -24
  7. package/esm2015/lib/_common/exceptions.js +157 -157
  8. package/esm2015/lib/_common/queries.gql.js +190 -190
  9. package/esm2015/lib/_common/run-outside-angular.js +79 -79
  10. package/esm2015/lib/_common/types.js +1 -1
  11. package/esm2015/lib/_common/utils.js +52 -52
  12. package/esm2015/lib/api/contact-card.gql.js +79 -79
  13. package/esm2015/lib/api/contact-card.service.js +154 -154
  14. package/esm2015/lib/api/contact-card2.gql.js +60 -60
  15. package/esm2015/lib/api/contact-card2.service.js +103 -103
  16. package/esm2015/lib/api/file.service.js +74 -74
  17. package/esm2015/lib/api/key-exchange.gql.js +188 -188
  18. package/esm2015/lib/api/key-exchange.service.js +442 -442
  19. package/esm2015/lib/api/key-exchange.types.js +18 -18
  20. package/esm2015/lib/api/key-exchange2.gql.js +171 -171
  21. package/esm2015/lib/api/key-exchange2.service.js +479 -479
  22. package/esm2015/lib/api/lock.gql.js +40 -40
  23. package/esm2015/lib/api/lock.service.js +64 -64
  24. package/esm2015/lib/api/lr-apollo.service.js +46 -46
  25. package/esm2015/lib/api/lr-graphql/index.js +6 -6
  26. package/esm2015/lib/api/lr-graphql/lr-graphql.service.js +155 -155
  27. package/esm2015/lib/api/lr-graphql/lr-merged-mutation.js +213 -213
  28. package/esm2015/lib/api/lr-graphql/lr-mutation-base.js +51 -51
  29. package/esm2015/lib/api/lr-graphql/lr-mutation.js +48 -48
  30. package/esm2015/lib/api/lr-graphql/lr.service.js +18 -18
  31. package/esm2015/lib/api/message.service.js +138 -138
  32. package/esm2015/lib/api/persist.service.js +181 -181
  33. package/esm2015/lib/api/query-processor/common-processors.service.js +93 -93
  34. package/esm2015/lib/api/query-processor/index.js +3 -3
  35. package/esm2015/lib/api/query-processor/query-processor.service.js +262 -262
  36. package/esm2015/lib/api/query-processor/tp-password-reset-processor.service.js +109 -109
  37. package/esm2015/lib/api/shared-contact-card.service.js +119 -119
  38. package/esm2015/lib/api/shared-contact-card2.gql.js +41 -41
  39. package/esm2015/lib/api/shared-contact-card2.service.js +117 -117
  40. package/esm2015/lib/api/time.service.js +146 -146
  41. package/esm2015/lib/api/types/graphql.types.js +7 -7
  42. package/esm2015/lib/api/types/index.js +3 -3
  43. package/esm2015/lib/api/types/lr-graphql.types.js +101 -101
  44. package/esm2015/lib/auth/auth.config.js +57 -57
  45. package/esm2015/lib/auth/auth.gql.js +48 -48
  46. package/esm2015/lib/auth/auth.types.js +27 -27
  47. package/esm2015/lib/auth/idle.service.js +168 -168
  48. package/esm2015/lib/auth/idle.types.js +7 -7
  49. package/esm2015/lib/auth/lbop.service.js +355 -355
  50. package/esm2015/lib/auth/life-ready-auth.service.js +488 -488
  51. package/esm2015/lib/auth/password.service.js +320 -320
  52. package/esm2015/lib/auth/register.service.js +172 -172
  53. package/esm2015/lib/auth/two-factor.service.js +74 -74
  54. package/esm2015/lib/category/category-meta.service.js +99 -99
  55. package/esm2015/lib/category/category.gql.js +406 -406
  56. package/esm2015/lib/category/category.service.js +390 -390
  57. package/esm2015/lib/category/category.types.js +29 -29
  58. package/esm2015/lib/cryptography/cryptography.types.js +11 -11
  59. package/esm2015/lib/cryptography/encryption.service.js +189 -189
  60. package/esm2015/lib/cryptography/key-factory.service.js +237 -237
  61. package/esm2015/lib/cryptography/key-graph.service.js +299 -299
  62. package/esm2015/lib/cryptography/key-meta.service.js +200 -200
  63. package/esm2015/lib/cryptography/key.service.js +124 -124
  64. package/esm2015/lib/cryptography/slip39.service.js +169 -169
  65. package/esm2015/lib/cryptography/web-crypto.service.js +29 -29
  66. package/esm2015/lib/items2/item2.gql.js +139 -139
  67. package/esm2015/lib/items2/item2.service.js +498 -498
  68. package/esm2015/lib/items2/item2.types.js +1 -1
  69. package/esm2015/lib/life-ready.config.js +84 -84
  70. package/esm2015/lib/life-ready.module.js +74 -74
  71. package/esm2015/lib/notification/notification.gql.js +43 -43
  72. package/esm2015/lib/notification/notification.service.js +118 -118
  73. package/esm2015/lib/plan/plan.gql.js +123 -123
  74. package/esm2015/lib/plan/plan.service.js +149 -149
  75. package/esm2015/lib/plan/plan.types.js +11 -11
  76. package/esm2015/lib/record/record-attachment.service.js +101 -101
  77. package/esm2015/lib/record/record.gql.js +179 -179
  78. package/esm2015/lib/record/record.service.js +206 -206
  79. package/esm2015/lib/record/record.types.js +15 -15
  80. package/esm2015/lib/record-type/record-type.service.js +75 -75
  81. package/esm2015/lib/record-type/record-type.types.js +28 -28
  82. package/esm2015/lib/scenario/scenario.constants.js +2 -2
  83. package/esm2015/lib/scenario/scenario.controller.js +34 -34
  84. package/esm2015/lib/scenario/scenario.gql.js +72 -72
  85. package/esm2015/lib/scenario/scenario.gql.private.js +198 -198
  86. package/esm2015/lib/scenario/scenario.service.js +538 -538
  87. package/esm2015/lib/scenario/scenario.types.js +1 -1
  88. package/esm2015/lib/trusted-parties/tp-assembly.gql.private.js +22 -22
  89. package/esm2015/lib/trusted-parties/tp-assembly.js +362 -362
  90. package/esm2015/lib/trusted-parties/tp-assembly.types.js +1 -1
  91. package/esm2015/lib/trusted-parties/tp-password-reset-request.service.js +113 -113
  92. package/esm2015/lib/trusted-parties/tp-password-reset-user.service.js +129 -129
  93. package/esm2015/lib/trusted-parties/tp-password-reset.constants.js +4 -4
  94. package/esm2015/lib/trusted-parties/tp-password-reset.controller.js +34 -34
  95. package/esm2015/lib/trusted-parties/tp-password-reset.gql.js +236 -236
  96. package/esm2015/lib/trusted-parties/tp-password-reset.service.js +95 -95
  97. package/esm2015/lib/trusted-parties/trusted-party.gql.js +148 -148
  98. package/esm2015/lib/trusted-parties/trusted-party.service.js +326 -326
  99. package/esm2015/lib/trusted-parties/trusted-party.types.js +41 -41
  100. package/esm2015/lib/trusted-parties/trusted-party2.gql.js +87 -87
  101. package/esm2015/lib/trusted-parties/trusted-party2.service.js +215 -215
  102. package/esm2015/lib/users/profile-details.service.js +214 -214
  103. package/esm2015/lib/users/profile.gql.js +97 -97
  104. package/esm2015/lib/users/profile.service.js +169 -169
  105. package/esm2015/lib/users/profile.types.js +34 -34
  106. package/esm2015/lib/users/user.gql.js +60 -60
  107. package/esm2015/lib/users/user.service.js +79 -79
  108. package/esm2015/lib/users/user.types.js +5 -5
  109. package/esm2015/lifeready-core.js +13 -13
  110. package/esm2015/public-api.js +71 -71
  111. package/fesm2015/lifeready-core.js +12258 -12258
  112. package/fesm2015/lifeready-core.js.map +1 -1
  113. package/lib/_common/ast.d.ts +11 -11
  114. package/lib/_common/deferred-promise.d.ts +12 -12
  115. package/lib/_common/exceptions.d.ts +109 -109
  116. package/lib/_common/queries.gql.d.ts +10 -10
  117. package/lib/_common/run-outside-angular.d.ts +14 -14
  118. package/lib/_common/types.d.ts +10 -10
  119. package/lib/_common/utils.d.ts +9 -9
  120. package/lib/api/contact-card.gql.d.ts +7 -7
  121. package/lib/api/contact-card.service.d.ts +52 -52
  122. package/lib/api/contact-card2.gql.d.ts +34 -34
  123. package/lib/api/contact-card2.service.d.ts +49 -49
  124. package/lib/api/file.service.d.ts +18 -18
  125. package/lib/api/key-exchange.gql.d.ts +9 -9
  126. package/lib/api/key-exchange.service.d.ts +39 -39
  127. package/lib/api/key-exchange.types.d.ts +196 -196
  128. package/lib/api/key-exchange2.gql.d.ts +125 -125
  129. package/lib/api/key-exchange2.service.d.ts +187 -187
  130. package/lib/api/lock.gql.d.ts +27 -27
  131. package/lib/api/lock.service.d.ts +34 -34
  132. package/lib/api/lr-apollo.service.d.ts +15 -15
  133. package/lib/api/lr-graphql/index.d.ts +5 -5
  134. package/lib/api/lr-graphql/lr-graphql.service.d.ts +60 -60
  135. package/lib/api/lr-graphql/lr-merged-mutation.d.ts +28 -28
  136. package/lib/api/lr-graphql/lr-mutation-base.d.ts +28 -28
  137. package/lib/api/lr-graphql/lr-mutation.d.ts +8 -8
  138. package/lib/api/lr-graphql/lr.service.d.ts +9 -9
  139. package/lib/api/message.service.d.ts +58 -58
  140. package/lib/api/persist.service.d.ts +31 -31
  141. package/lib/api/query-processor/common-processors.service.d.ts +36 -36
  142. package/lib/api/query-processor/index.d.ts +2 -2
  143. package/lib/api/query-processor/query-processor.service.d.ts +18 -18
  144. package/lib/api/query-processor/tp-password-reset-processor.service.d.ts +15 -15
  145. package/lib/api/shared-contact-card.service.d.ts +33 -33
  146. package/lib/api/shared-contact-card2.gql.d.ts +36 -36
  147. package/lib/api/shared-contact-card2.service.d.ts +45 -45
  148. package/lib/api/time.service.d.ts +16 -16
  149. package/lib/api/types/graphql.types.d.ts +29 -29
  150. package/lib/api/types/index.d.ts +2 -2
  151. package/lib/api/types/lr-graphql.types.d.ts +502 -502
  152. package/lib/auth/auth.config.d.ts +5 -5
  153. package/lib/auth/auth.gql.d.ts +15 -15
  154. package/lib/auth/auth.types.d.ts +66 -66
  155. package/lib/auth/idle.service.d.ts +40 -40
  156. package/lib/auth/idle.types.d.ts +10 -10
  157. package/lib/auth/lbop.service.d.ts +91 -91
  158. package/lib/auth/life-ready-auth.service.d.ts +61 -61
  159. package/lib/auth/password.service.d.ts +78 -78
  160. package/lib/auth/register.service.d.ts +25 -25
  161. package/lib/auth/two-factor.service.d.ts +15 -15
  162. package/lib/category/category-meta.service.d.ts +23 -23
  163. package/lib/category/category.gql.d.ts +45 -45
  164. package/lib/category/category.service.d.ts +67 -67
  165. package/lib/category/category.types.d.ts +79 -79
  166. package/lib/cryptography/cryptography.types.d.ts +83 -83
  167. package/lib/cryptography/encryption.service.d.ts +41 -41
  168. package/lib/cryptography/key-factory.service.d.ts +38 -38
  169. package/lib/cryptography/key-graph.service.d.ts +41 -41
  170. package/lib/cryptography/key-meta.service.d.ts +44 -44
  171. package/lib/cryptography/key.service.d.ts +36 -36
  172. package/lib/cryptography/slip39.service.d.ts +43 -43
  173. package/lib/cryptography/web-crypto.service.d.ts +5 -5
  174. package/lib/items2/item2.gql.d.ts +123 -123
  175. package/lib/items2/item2.service.d.ts +203 -203
  176. package/lib/items2/item2.types.d.ts +70 -70
  177. package/lib/life-ready.config.d.ts +14 -14
  178. package/lib/life-ready.module.d.ts +5 -5
  179. package/lib/notification/notification.gql.d.ts +37 -37
  180. package/lib/notification/notification.service.d.ts +63 -63
  181. package/lib/plan/plan.gql.d.ts +11 -11
  182. package/lib/plan/plan.service.d.ts +33 -33
  183. package/lib/plan/plan.types.d.ts +31 -31
  184. package/lib/record/record-attachment.service.d.ts +16 -16
  185. package/lib/record/record.gql.d.ts +14 -14
  186. package/lib/record/record.service.d.ts +25 -25
  187. package/lib/record/record.types.d.ts +57 -57
  188. package/lib/record-type/record-type.service.d.ts +11 -11
  189. package/lib/record-type/record-type.types.d.ts +50 -50
  190. package/lib/scenario/scenario.constants.d.ts +1 -1
  191. package/lib/scenario/scenario.controller.d.ts +10 -10
  192. package/lib/scenario/scenario.gql.d.ts +62 -62
  193. package/lib/scenario/scenario.gql.private.d.ts +16 -16
  194. package/lib/scenario/scenario.service.d.ts +233 -233
  195. package/lib/scenario/scenario.types.d.ts +50 -50
  196. package/lib/trusted-parties/tp-assembly.d.ts +177 -177
  197. package/lib/trusted-parties/tp-assembly.gql.private.d.ts +5 -5
  198. package/lib/trusted-parties/tp-assembly.types.d.ts +38 -38
  199. package/lib/trusted-parties/tp-password-reset-request.service.d.ts +20 -20
  200. package/lib/trusted-parties/tp-password-reset-user.service.d.ts +35 -35
  201. package/lib/trusted-parties/tp-password-reset.constants.d.ts +3 -3
  202. package/lib/trusted-parties/tp-password-reset.controller.d.ts +10 -10
  203. package/lib/trusted-parties/tp-password-reset.gql.d.ts +223 -223
  204. package/lib/trusted-parties/tp-password-reset.service.d.ts +188 -188
  205. package/lib/trusted-parties/trusted-party.gql.d.ts +9 -9
  206. package/lib/trusted-parties/trusted-party.service.d.ts +44 -44
  207. package/lib/trusted-parties/trusted-party.types.d.ts +102 -102
  208. package/lib/trusted-parties/trusted-party2.gql.d.ts +79 -79
  209. package/lib/trusted-parties/trusted-party2.service.d.ts +114 -114
  210. package/lib/users/profile-details.service.d.ts +21 -21
  211. package/lib/users/profile.gql.d.ts +11 -11
  212. package/lib/users/profile.service.d.ts +35 -35
  213. package/lib/users/profile.types.d.ts +96 -96
  214. package/lib/users/user.gql.d.ts +9 -9
  215. package/lib/users/user.service.d.ts +12 -12
  216. package/lib/users/user.types.d.ts +23 -23
  217. package/lifeready-core.d.ts +12 -12
  218. package/package.json +1 -1
  219. package/public-api.d.ts +67 -67
@@ -1,172 +1,172 @@
1
- import { __awaiter } from "tslib";
2
- import { HttpClient } from '@angular/common/http';
3
- import { Inject, Injectable } from '@angular/core';
4
- import { AuthClass } from '@aws-amplify/auth/lib-esm/Auth';
5
- import { EncryptionService } from '../cryptography/encryption.service';
6
- import { KeyFactoryService } from '../cryptography/key-factory.service';
7
- import { LR_CONFIG } from '../life-ready.config';
8
- import { PasswordService } from './password.service';
9
- import * as i0 from "@angular/core";
10
- import * as i1 from "../life-ready.config";
11
- import * as i2 from "@aws-amplify/auth/lib-esm/Auth";
12
- import * as i3 from "@angular/common/http";
13
- import * as i4 from "../cryptography/key-factory.service";
14
- import * as i5 from "../cryptography/encryption.service";
15
- import * as i6 from "./password.service";
16
- export class RegisterService {
17
- constructor(config, auth, http, keyFactory, encryptionService, passwordService) {
18
- this.config = config;
19
- this.auth = auth;
20
- this.http = http;
21
- this.keyFactory = keyFactory;
22
- this.encryptionService = encryptionService;
23
- this.passwordService = passwordService;
24
- }
25
- /**
26
- * Request a verification code to be sent out to an email.
27
- * @return Info needed to be submitted along with the verification code
28
- */
29
- verifyEmail(email) {
30
- return __awaiter(this, void 0, void 0, function* () {
31
- const { claim_id } = yield this.http
32
- .post(`${this.config.authUrl}cove/claim/email/`, {
33
- address: email,
34
- context: 'signup',
35
- })
36
- .toPromise();
37
- return claim_id;
38
- });
39
- }
40
- verifyPhone(phoneNumber) {
41
- return __awaiter(this, void 0, void 0, function* () {
42
- const { claim_id } = yield this.http
43
- .post(`${this.config.authUrl}cove/claim/sms/`, {
44
- address: phoneNumber,
45
- context: 'signup',
46
- })
47
- .toPromise();
48
- return claim_id;
49
- });
50
- }
51
- confirmVerificationCode(verificationId, verificationCode) {
52
- return __awaiter(this, void 0, void 0, function* () {
53
- const { token } = yield this.http
54
- .post(`${this.config.authUrl}cove/respond/`, {
55
- claim_id: verificationId,
56
- v_code: verificationCode,
57
- })
58
- .toPromise();
59
- return token;
60
- });
61
- }
62
- register(email, password, verificationId, verificationToken, verificationType = 'email') {
63
- return __awaiter(this, void 0, void 0, function* () {
64
- // Generate the key material needed for PassIdp which will be the password used for Cognito.
65
- const passKeyBundle = yield this.passwordService.createPassKeyBundle(password);
66
- const masterKey = yield this.keyFactory.createKey();
67
- const wrappedMasterKey = yield this.encryptionService.encrypt(passKeyBundle.passKey, masterKey.toJSON(true));
68
- const rootKey = yield this.keyFactory.createKey();
69
- const wrappedRootKey = yield this.encryptionService.encrypt(masterKey, rootKey.toJSON(true));
70
- // Encryption PKC key
71
- const prk = yield this.keyFactory.createPkcKey();
72
- const wrappedPrk = yield this.encryptionService.encrypt(rootKey, prk.toJSON(true));
73
- // Signing PKC key
74
- const sigPrk = yield this.keyFactory.createPkcSignKey();
75
- const wrappedSigPrk = yield this.encryptionService.encrypt(rootKey, sigPrk.toJSON(true));
76
- // API call to setup profile
77
- const user = yield this.http
78
- .post(`${this.config.authUrl}users/`, {
79
- claims: [
80
- {
81
- type: verificationType,
82
- token: verificationToken,
83
- claim_id: verificationId,
84
- },
85
- ],
86
- pass_idp_params: passKeyBundle.passIdpParams,
87
- pass_idp_verifier_pbk: passKeyBundle.passIdpVerifier.toJSON(),
88
- wrapped_pass_idp_verifier_prk: passKeyBundle.wrappedPassIdpVerifierPrk,
89
- pass_key_params: passKeyBundle.passKeyParams,
90
- wrapped_master_key: wrappedMasterKey,
91
- wrapped_root_key: wrappedRootKey,
92
- pbk: prk.toJSON(),
93
- wrapped_prk: wrappedPrk,
94
- sig_pbk: sigPrk.toJSON(),
95
- wrapped_sig_prk: wrappedSigPrk,
96
- })
97
- .toPromise();
98
- // API call to create user on cognito
99
- const attributes = {};
100
- user.claims.forEach((claim) => {
101
- attributes[claim.type] = claim.value;
102
- });
103
- // Random suffix for uniqueness. If there's a duplicate, then used just needs to
104
- // sign up again. But chances of collision is low.
105
- const suffix = this.keyFactory.randomDigitsNoZeros(4);
106
- const cognitoUser = yield this.auth.signUp({
107
- username: `${email.split('@')[0]}.${suffix}`,
108
- password: this.passwordService.getPassIdpString(passKeyBundle.passIdp),
109
- attributes,
110
- // Unfortunately, validationData is not passed to the post
111
- // confirmation cognito trigger. So can can't do the association there.
112
- // The current workflow will create a new user on LR before signing up
113
- // with Cognito. Then Cognito can use the user.id and user.pre_sign_up_token to
114
- // do the validation of the attributes.
115
- // validationData: [
116
- // new CognitoUserAttribute({
117
- // Name: "user_id",
118
- // Value: String(user.id)
119
- // }),
120
- // new CognitoUserAttribute({
121
- // Name: "user_pre_sign_up_token",
122
- // Value: user.pre_sign_up_token
123
- // })
124
- // ]
125
- clientMetadata: {
126
- user_id: String(user.id),
127
- user_pre_sign_up_token: String(user.pre_sign_up_token),
128
- },
129
- });
130
- return {
131
- username: cognitoUser.user.getUsername(),
132
- userId: user.id,
133
- preSignUpToken: user.pre_sign_up_token,
134
- userSub: cognitoUser.userSub,
135
- };
136
- });
137
- }
138
- hibpBreachedAccounts(account) {
139
- return __awaiter(this, void 0, void 0, function* () {
140
- // The account is just the email
141
- try {
142
- const response = yield this.http
143
- .get(`${this.config.authUrl}users/hibp/breachedaccount/${account}/?truncateResponse=false`)
144
- .toPromise();
145
- return response;
146
- }
147
- catch (error) {
148
- if (error.status === 404) {
149
- return null;
150
- }
151
- else {
152
- throw error;
153
- }
154
- }
155
- });
156
- }
157
- }
158
- RegisterService.ɵprov = i0.ɵɵdefineInjectable({ factory: function RegisterService_Factory() { return new RegisterService(i0.ɵɵinject(i1.LR_CONFIG), i0.ɵɵinject(i2.AuthClass), i0.ɵɵinject(i3.HttpClient), i0.ɵɵinject(i4.KeyFactoryService), i0.ɵɵinject(i5.EncryptionService), i0.ɵɵinject(i6.PasswordService)); }, token: RegisterService, providedIn: "root" });
159
- RegisterService.decorators = [
160
- { type: Injectable, args: [{
161
- providedIn: 'root',
162
- },] }
163
- ];
164
- RegisterService.ctorParameters = () => [
165
- { type: undefined, decorators: [{ type: Inject, args: [LR_CONFIG,] }] },
166
- { type: AuthClass },
167
- { type: HttpClient },
168
- { type: KeyFactoryService },
169
- { type: EncryptionService },
170
- { type: PasswordService }
171
- ];
172
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"register.service.js","sourceRoot":"/opt/atlassian/pipelines/agent/build/projects/core/src/","sources":["lib/auth/register.service.ts"],"names":[],"mappings":";AAAA,OAAO,EAAE,UAAU,EAAE,MAAM,sBAAsB,CAAC;AAClD,OAAO,EAAE,MAAM,EAAE,UAAU,EAAE,MAAM,eAAe,CAAC;AACnD,OAAO,EAAE,SAAS,EAAE,MAAM,gCAAgC,CAAC;AAC3D,OAAO,EAAE,iBAAiB,EAAE,MAAM,oCAAoC,CAAC;AACvE,OAAO,EAAE,iBAAiB,EAAE,MAAM,qCAAqC,CAAC;AACxE,OAAO,EAAmB,SAAS,EAAE,MAAM,sBAAsB,CAAC;AAClE,OAAO,EAAE,eAAe,EAAE,MAAM,oBAAoB,CAAC;;;;;;;;AAMrD,MAAM,OAAO,eAAe;IAC1B,YAC6B,MAAuB,EAC1C,IAAe,EACf,IAAgB,EAChB,UAA6B,EAC7B,iBAAoC,EACpC,eAAgC;QALb,WAAM,GAAN,MAAM,CAAiB;QAC1C,SAAI,GAAJ,IAAI,CAAW;QACf,SAAI,GAAJ,IAAI,CAAY;QAChB,eAAU,GAAV,UAAU,CAAmB;QAC7B,sBAAiB,GAAjB,iBAAiB,CAAmB;QACpC,oBAAe,GAAf,eAAe,CAAiB;IACvC,CAAC;IAEJ;;;OAGG;IACU,WAAW,CAAC,KAAa;;YACpC,MAAM,EAAE,QAAQ,EAAE,GAAG,MAAM,IAAI,CAAC,IAAI;iBACjC,IAAI,CAAe,GAAG,IAAI,CAAC,MAAM,CAAC,OAAO,mBAAmB,EAAE;gBAC7D,OAAO,EAAE,KAAK;gBACd,OAAO,EAAE,QAAQ;aAClB,CAAC;iBACD,SAAS,EAAE,CAAC;YACf,OAAO,QAAQ,CAAC;QAClB,CAAC;KAAA;IAEY,WAAW,CAAC,WAAmB;;YAC1C,MAAM,EAAE,QAAQ,EAAE,GAAG,MAAM,IAAI,CAAC,IAAI;iBACjC,IAAI,CAAe,GAAG,IAAI,CAAC,MAAM,CAAC,OAAO,iBAAiB,EAAE;gBAC3D,OAAO,EAAE,WAAW;gBACpB,OAAO,EAAE,QAAQ;aAClB,CAAC;iBACD,SAAS,EAAE,CAAC;YACf,OAAO,QAAQ,CAAC;QAClB,CAAC;KAAA;IAEY,uBAAuB,CAClC,cAAsB,EACtB,gBAAwB;;YAExB,MAAM,EAAE,KAAK,EAAE,GAAG,MAAM,IAAI,CAAC,IAAI;iBAC9B,IAAI,CAAY,GAAG,IAAI,CAAC,MAAM,CAAC,OAAO,eAAe,EAAE;gBACtD,QAAQ,EAAE,cAAc;gBACxB,MAAM,EAAE,gBAAgB;aACzB,CAAC;iBACD,SAAS,EAAE,CAAC;YACf,OAAO,KAAK,CAAC;QACf,CAAC;KAAA;IAEY,QAAQ,CACnB,KAAa,EACb,QAAgB,EAChB,cAAsB,EACtB,iBAAyB,EACzB,mBAAsC,OAAO;;YAE7C,4FAA4F;YAC5F,MAAM,aAAa,GAAG,MAAM,IAAI,CAAC,eAAe,CAAC,mBAAmB,CAClE,QAAQ,CACT,CAAC;YAEF,MAAM,SAAS,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,SAAS,EAAE,CAAC;YACpD,MAAM,gBAAgB,GAAG,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAC3D,aAAa,CAAC,OAAO,EACrB,SAAS,CAAC,MAAM,CAAC,IAAI,CAAC,CACvB,CAAC;YAEF,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,SAAS,EAAE,CAAC;YAClD,MAAM,cAAc,GAAG,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CACzD,SAAS,EACT,OAAO,CAAC,MAAM,CAAC,IAAI,CAAC,CACrB,CAAC;YAEF,qBAAqB;YACrB,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,YAAY,EAAE,CAAC;YACjD,MAAM,UAAU,GAAG,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CACrD,OAAO,EACP,GAAG,CAAC,MAAM,CAAC,IAAI,CAAC,CACjB,CAAC;YAEF,kBAAkB;YAClB,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,gBAAgB,EAAE,CAAC;YACxD,MAAM,aAAa,GAAG,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CACxD,OAAO,EACP,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CACpB,CAAC;YAEF,4BAA4B;YAC5B,MAAM,IAAI,GAAG,MAAM,IAAI,CAAC,IAAI;iBACzB,IAAI,CAAM,GAAG,IAAI,CAAC,MAAM,CAAC,OAAO,QAAQ,EAAE;gBACzC,MAAM,EAAE;oBACN;wBACE,IAAI,EAAE,gBAAgB;wBACtB,KAAK,EAAE,iBAAiB;wBACxB,QAAQ,EAAE,cAAc;qBACzB;iBACF;gBACD,eAAe,EAAE,aAAa,CAAC,aAAa;gBAC5C,qBAAqB,EAAE,aAAa,CAAC,eAAe,CAAC,MAAM,EAAE;gBAC7D,6BAA6B,EAAE,aAAa,CAAC,yBAAyB;gBACtE,eAAe,EAAE,aAAa,CAAC,aAAa;gBAC5C,kBAAkB,EAAE,gBAAgB;gBACpC,gBAAgB,EAAE,cAAc;gBAChC,GAAG,EAAE,GAAG,CAAC,MAAM,EAAE;gBACjB,WAAW,EAAE,UAAU;gBACvB,OAAO,EAAE,MAAM,CAAC,MAAM,EAAE;gBACxB,eAAe,EAAE,aAAa;aAC/B,CAAC;iBACD,SAAS,EAAE,CAAC;YAEf,qCAAqC;YACrC,MAAM,UAAU,GAAG,EAAE,CAAC;YACtB,IAAI,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC,KAAK,EAAE,EAAE;gBAC5B,UAAU,CAAC,KAAK,CAAC,IAAI,CAAC,GAAG,KAAK,CAAC,KAAK,CAAC;YACvC,CAAC,CAAC,CAAC;YAEH,gFAAgF;YAChF,kDAAkD;YAClD,MAAM,MAAM,GAAG,IAAI,CAAC,UAAU,CAAC,mBAAmB,CAAC,CAAC,CAAC,CAAC;YAEtD,MAAM,WAAW,GAAG,MAAM,IAAI,CAAC,IAAI,CAAC,MAAM,CAAC;gBACzC,QAAQ,EAAE,GAAG,KAAK,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,IAAI,MAAM,EAAE;gBAC5C,QAAQ,EAAE,IAAI,CAAC,eAAe,CAAC,gBAAgB,CAAC,aAAa,CAAC,OAAO,CAAC;gBACtE,UAAU;gBACV,0DAA0D;gBAC1D,uEAAuE;gBACvE,sEAAsE;gBACtE,+EAA+E;gBAC/E,uCAAuC;gBACvC,oBAAoB;gBACpB,+BAA+B;gBAC/B,uBAAuB;gBACvB,6BAA6B;gBAC7B,QAAQ;gBACR,+BAA+B;gBAC/B,sCAAsC;gBACtC,oCAAoC;gBACpC,OAAO;gBACP,IAAI;gBACJ,cAAc,EAAE;oBACd,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,EAAE,CAAC;oBACxB,sBAAsB,EAAE,MAAM,CAAC,IAAI,CAAC,iBAAiB,CAAC;iBACvD;aACF,CAAC,CAAC;YAEH,OAAO;gBACL,QAAQ,EAAE,WAAW,CAAC,IAAI,CAAC,WAAW,EAAE;gBACxC,MAAM,EAAE,IAAI,CAAC,EAAE;gBACf,cAAc,EAAE,IAAI,CAAC,iBAAiB;gBACtC,OAAO,EAAE,WAAW,CAAC,OAAO;aAC7B,CAAC;QACJ,CAAC;KAAA;IAEY,oBAAoB,CAAC,OAAe;;YAC/C,gCAAgC;YAChC,IAAI;gBACF,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,IAAI;qBAC7B,GAAG,CACF,GAAG,IAAI,CAAC,MAAM,CAAC,OAAO,8BAA8B,OAAO,0BAA0B,CACtF;qBACA,SAAS,EAAE,CAAC;gBACf,OAAO,QAAQ,CAAC;aACjB;YAAC,OAAO,KAAK,EAAE;gBACd,IAAI,KAAK,CAAC,MAAM,KAAK,GAAG,EAAE;oBACxB,OAAO,IAAI,CAAC;iBACb;qBAAM;oBACL,MAAM,KAAK,CAAC;iBACb;aACF;QACH,CAAC;KAAA;;;;YA1KF,UAAU,SAAC;gBACV,UAAU,EAAE,MAAM;aACnB;;;4CAGI,MAAM,SAAC,SAAS;YAZZ,SAAS;YAFT,UAAU;YAIV,iBAAiB;YADjB,iBAAiB;YAGjB,eAAe","sourcesContent":["import { HttpClient } from '@angular/common/http';\nimport { Inject, Injectable } from '@angular/core';\nimport { AuthClass } from '@aws-amplify/auth/lib-esm/Auth';\nimport { EncryptionService } from '../cryptography/encryption.service';\nimport { KeyFactoryService } from '../cryptography/key-factory.service';\nimport { LifeReadyConfig, LR_CONFIG } from '../life-ready.config';\nimport { PasswordService } from './password.service';\nimport { RegisterResult } from './auth.types';\n\n@Injectable({\n  providedIn: 'root',\n})\nexport class RegisterService {\n  constructor(\n    @Inject(LR_CONFIG) private config: LifeReadyConfig,\n    private auth: AuthClass,\n    private http: HttpClient,\n    private keyFactory: KeyFactoryService,\n    private encryptionService: EncryptionService,\n    private passwordService: PasswordService\n  ) {}\n\n  /**\n   * Request a verification code to be sent out to an email.\n   * @return Info needed to be submitted along with the verification code\n   */\n  public async verifyEmail(email: string): Promise<string> {\n    const { claim_id } = await this.http\n      .post<{ claim_id }>(`${this.config.authUrl}cove/claim/email/`, {\n        address: email,\n        context: 'signup',\n      })\n      .toPromise();\n    return claim_id;\n  }\n\n  public async verifyPhone(phoneNumber: string): Promise<string> {\n    const { claim_id } = await this.http\n      .post<{ claim_id }>(`${this.config.authUrl}cove/claim/sms/`, {\n        address: phoneNumber,\n        context: 'signup',\n      })\n      .toPromise();\n    return claim_id;\n  }\n\n  public async confirmVerificationCode(\n    verificationId: string,\n    verificationCode: string\n  ): Promise<string> {\n    const { token } = await this.http\n      .post<{ token }>(`${this.config.authUrl}cove/respond/`, {\n        claim_id: verificationId,\n        v_code: verificationCode,\n      })\n      .toPromise();\n    return token;\n  }\n\n  public async register(\n    email: string,\n    password: string,\n    verificationId: string,\n    verificationToken: string,\n    verificationType: 'email' | 'phone' = 'email'\n  ): Promise<RegisterResult> {\n    // Generate the key material needed for PassIdp which will be the password used for Cognito.\n    const passKeyBundle = await this.passwordService.createPassKeyBundle(\n      password\n    );\n\n    const masterKey = await this.keyFactory.createKey();\n    const wrappedMasterKey = await this.encryptionService.encrypt(\n      passKeyBundle.passKey,\n      masterKey.toJSON(true)\n    );\n\n    const rootKey = await this.keyFactory.createKey();\n    const wrappedRootKey = await this.encryptionService.encrypt(\n      masterKey,\n      rootKey.toJSON(true)\n    );\n\n    // Encryption PKC key\n    const prk = await this.keyFactory.createPkcKey();\n    const wrappedPrk = await this.encryptionService.encrypt(\n      rootKey,\n      prk.toJSON(true)\n    );\n\n    // Signing PKC key\n    const sigPrk = await this.keyFactory.createPkcSignKey();\n    const wrappedSigPrk = await this.encryptionService.encrypt(\n      rootKey,\n      sigPrk.toJSON(true)\n    );\n\n    // API call to setup profile\n    const user = await this.http\n      .post<any>(`${this.config.authUrl}users/`, {\n        claims: [\n          {\n            type: verificationType,\n            token: verificationToken,\n            claim_id: verificationId,\n          },\n        ],\n        pass_idp_params: passKeyBundle.passIdpParams,\n        pass_idp_verifier_pbk: passKeyBundle.passIdpVerifier.toJSON(),\n        wrapped_pass_idp_verifier_prk: passKeyBundle.wrappedPassIdpVerifierPrk,\n        pass_key_params: passKeyBundle.passKeyParams,\n        wrapped_master_key: wrappedMasterKey,\n        wrapped_root_key: wrappedRootKey,\n        pbk: prk.toJSON(), // public encryption key\n        wrapped_prk: wrappedPrk,\n        sig_pbk: sigPrk.toJSON(), // public signing key\n        wrapped_sig_prk: wrappedSigPrk,\n      })\n      .toPromise();\n\n    // API call to create user on cognito\n    const attributes = {};\n    user.claims.forEach((claim) => {\n      attributes[claim.type] = claim.value;\n    });\n\n    // Random suffix for uniqueness. If there's a duplicate, then used just needs to\n    // sign up again. But chances of collision is low.\n    const suffix = this.keyFactory.randomDigitsNoZeros(4);\n\n    const cognitoUser = await this.auth.signUp({\n      username: `${email.split('@')[0]}.${suffix}`,\n      password: this.passwordService.getPassIdpString(passKeyBundle.passIdp),\n      attributes,\n      // Unfortunately, validationData is not passed to the post\n      // confirmation cognito trigger. So can can't do the association there.\n      // The current workflow will create a new user on LR before signing up\n      // with Cognito. Then Cognito can use the user.id and user.pre_sign_up_token to\n      // do the validation of the attributes.\n      // validationData: [\n      //   new CognitoUserAttribute({\n      //     Name: \"user_id\",\n      //     Value: String(user.id)\n      //   }),\n      //   new CognitoUserAttribute({\n      //     Name: \"user_pre_sign_up_token\",\n      //     Value: user.pre_sign_up_token\n      //   })\n      // ]\n      clientMetadata: {\n        user_id: String(user.id),\n        user_pre_sign_up_token: String(user.pre_sign_up_token),\n      },\n    });\n\n    return {\n      username: cognitoUser.user.getUsername(),\n      userId: user.id,\n      preSignUpToken: user.pre_sign_up_token,\n      userSub: cognitoUser.userSub,\n    };\n  }\n\n  public async hibpBreachedAccounts(account: string): Promise<any> {\n    // The account is just the email\n    try {\n      const response = await this.http\n        .get(\n          `${this.config.authUrl}users/hibp/breachedaccount/${account}/?truncateResponse=false`\n        )\n        .toPromise();\n      return response;\n    } catch (error) {\n      if (error.status === 404) {\n        return null;\n      } else {\n        throw error;\n      }\n    }\n  }\n}\n"]}
1
+ import { __awaiter } from "tslib";
2
+ import { HttpClient } from '@angular/common/http';
3
+ import { Inject, Injectable } from '@angular/core';
4
+ import { AuthClass } from '@aws-amplify/auth/lib-esm/Auth';
5
+ import { EncryptionService } from '../cryptography/encryption.service';
6
+ import { KeyFactoryService } from '../cryptography/key-factory.service';
7
+ import { LR_CONFIG } from '../life-ready.config';
8
+ import { PasswordService } from './password.service';
9
+ import * as i0 from "@angular/core";
10
+ import * as i1 from "../life-ready.config";
11
+ import * as i2 from "@aws-amplify/auth/lib-esm/Auth";
12
+ import * as i3 from "@angular/common/http";
13
+ import * as i4 from "../cryptography/key-factory.service";
14
+ import * as i5 from "../cryptography/encryption.service";
15
+ import * as i6 from "./password.service";
16
+ export class RegisterService {
17
+ constructor(config, auth, http, keyFactory, encryptionService, passwordService) {
18
+ this.config = config;
19
+ this.auth = auth;
20
+ this.http = http;
21
+ this.keyFactory = keyFactory;
22
+ this.encryptionService = encryptionService;
23
+ this.passwordService = passwordService;
24
+ }
25
+ /**
26
+ * Request a verification code to be sent out to an email.
27
+ * @return Info needed to be submitted along with the verification code
28
+ */
29
+ verifyEmail(email) {
30
+ return __awaiter(this, void 0, void 0, function* () {
31
+ const { claim_id } = yield this.http
32
+ .post(`${this.config.authUrl}cove/claim/email/`, {
33
+ address: email,
34
+ context: 'signup',
35
+ })
36
+ .toPromise();
37
+ return claim_id;
38
+ });
39
+ }
40
+ verifyPhone(phoneNumber) {
41
+ return __awaiter(this, void 0, void 0, function* () {
42
+ const { claim_id } = yield this.http
43
+ .post(`${this.config.authUrl}cove/claim/sms/`, {
44
+ address: phoneNumber,
45
+ context: 'signup',
46
+ })
47
+ .toPromise();
48
+ return claim_id;
49
+ });
50
+ }
51
+ confirmVerificationCode(verificationId, verificationCode) {
52
+ return __awaiter(this, void 0, void 0, function* () {
53
+ const { token } = yield this.http
54
+ .post(`${this.config.authUrl}cove/respond/`, {
55
+ claim_id: verificationId,
56
+ v_code: verificationCode,
57
+ })
58
+ .toPromise();
59
+ return token;
60
+ });
61
+ }
62
+ register(email, password, verificationId, verificationToken, verificationType = 'email') {
63
+ return __awaiter(this, void 0, void 0, function* () {
64
+ // Generate the key material needed for PassIdp which will be the password used for Cognito.
65
+ const passKeyBundle = yield this.passwordService.createPassKeyBundle(password);
66
+ const masterKey = yield this.keyFactory.createKey();
67
+ const wrappedMasterKey = yield this.encryptionService.encrypt(passKeyBundle.passKey, masterKey.toJSON(true));
68
+ const rootKey = yield this.keyFactory.createKey();
69
+ const wrappedRootKey = yield this.encryptionService.encrypt(masterKey, rootKey.toJSON(true));
70
+ // Encryption PKC key
71
+ const prk = yield this.keyFactory.createPkcKey();
72
+ const wrappedPrk = yield this.encryptionService.encrypt(rootKey, prk.toJSON(true));
73
+ // Signing PKC key
74
+ const sigPrk = yield this.keyFactory.createPkcSignKey();
75
+ const wrappedSigPrk = yield this.encryptionService.encrypt(rootKey, sigPrk.toJSON(true));
76
+ // API call to setup profile
77
+ const user = yield this.http
78
+ .post(`${this.config.authUrl}users/`, {
79
+ claims: [
80
+ {
81
+ type: verificationType,
82
+ token: verificationToken,
83
+ claim_id: verificationId,
84
+ },
85
+ ],
86
+ pass_idp_params: passKeyBundle.passIdpParams,
87
+ pass_idp_verifier_pbk: passKeyBundle.passIdpVerifier.toJSON(),
88
+ wrapped_pass_idp_verifier_prk: passKeyBundle.wrappedPassIdpVerifierPrk,
89
+ pass_key_params: passKeyBundle.passKeyParams,
90
+ wrapped_master_key: wrappedMasterKey,
91
+ wrapped_root_key: wrappedRootKey,
92
+ pbk: prk.toJSON(),
93
+ wrapped_prk: wrappedPrk,
94
+ sig_pbk: sigPrk.toJSON(),
95
+ wrapped_sig_prk: wrappedSigPrk,
96
+ })
97
+ .toPromise();
98
+ // API call to create user on cognito
99
+ const attributes = {};
100
+ user.claims.forEach((claim) => {
101
+ attributes[claim.type] = claim.value;
102
+ });
103
+ // Random suffix for uniqueness. If there's a duplicate, then used just needs to
104
+ // sign up again. But chances of collision is low.
105
+ const suffix = this.keyFactory.randomDigitsNoZeros(4);
106
+ const cognitoUser = yield this.auth.signUp({
107
+ username: `${email.split('@')[0]}.${suffix}`,
108
+ password: this.passwordService.getPassIdpString(passKeyBundle.passIdp),
109
+ attributes,
110
+ // Unfortunately, validationData is not passed to the post
111
+ // confirmation cognito trigger. So can can't do the association there.
112
+ // The current workflow will create a new user on LR before signing up
113
+ // with Cognito. Then Cognito can use the user.id and user.pre_sign_up_token to
114
+ // do the validation of the attributes.
115
+ // validationData: [
116
+ // new CognitoUserAttribute({
117
+ // Name: "user_id",
118
+ // Value: String(user.id)
119
+ // }),
120
+ // new CognitoUserAttribute({
121
+ // Name: "user_pre_sign_up_token",
122
+ // Value: user.pre_sign_up_token
123
+ // })
124
+ // ]
125
+ clientMetadata: {
126
+ user_id: String(user.id),
127
+ user_pre_sign_up_token: String(user.pre_sign_up_token),
128
+ },
129
+ });
130
+ return {
131
+ username: cognitoUser.user.getUsername(),
132
+ userId: user.id,
133
+ preSignUpToken: user.pre_sign_up_token,
134
+ userSub: cognitoUser.userSub,
135
+ };
136
+ });
137
+ }
138
+ hibpBreachedAccounts(account) {
139
+ return __awaiter(this, void 0, void 0, function* () {
140
+ // The account is just the email
141
+ try {
142
+ const response = yield this.http
143
+ .get(`${this.config.authUrl}users/hibp/breachedaccount/${account}/?truncateResponse=false`)
144
+ .toPromise();
145
+ return response;
146
+ }
147
+ catch (error) {
148
+ if (error.status === 404) {
149
+ return null;
150
+ }
151
+ else {
152
+ throw error;
153
+ }
154
+ }
155
+ });
156
+ }
157
+ }
158
+ RegisterService.ɵprov = i0.ɵɵdefineInjectable({ factory: function RegisterService_Factory() { return new RegisterService(i0.ɵɵinject(i1.LR_CONFIG), i0.ɵɵinject(i2.AuthClass), i0.ɵɵinject(i3.HttpClient), i0.ɵɵinject(i4.KeyFactoryService), i0.ɵɵinject(i5.EncryptionService), i0.ɵɵinject(i6.PasswordService)); }, token: RegisterService, providedIn: "root" });
159
+ RegisterService.decorators = [
160
+ { type: Injectable, args: [{
161
+ providedIn: 'root',
162
+ },] }
163
+ ];
164
+ RegisterService.ctorParameters = () => [
165
+ { type: undefined, decorators: [{ type: Inject, args: [LR_CONFIG,] }] },
166
+ { type: AuthClass },
167
+ { type: HttpClient },
168
+ { type: KeyFactoryService },
169
+ { type: EncryptionService },
170
+ { type: PasswordService }
171
+ ];
172
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"register.service.js","sourceRoot":"C:/Projects/kc-client/projects/core/src/","sources":["lib/auth/register.service.ts"],"names":[],"mappings":";AAAA,OAAO,EAAE,UAAU,EAAE,MAAM,sBAAsB,CAAC;AAClD,OAAO,EAAE,MAAM,EAAE,UAAU,EAAE,MAAM,eAAe,CAAC;AACnD,OAAO,EAAE,SAAS,EAAE,MAAM,gCAAgC,CAAC;AAC3D,OAAO,EAAE,iBAAiB,EAAE,MAAM,oCAAoC,CAAC;AACvE,OAAO,EAAE,iBAAiB,EAAE,MAAM,qCAAqC,CAAC;AACxE,OAAO,EAAmB,SAAS,EAAE,MAAM,sBAAsB,CAAC;AAClE,OAAO,EAAE,eAAe,EAAE,MAAM,oBAAoB,CAAC;;;;;;;;AAMrD,MAAM,OAAO,eAAe;IAC1B,YAC6B,MAAuB,EAC1C,IAAe,EACf,IAAgB,EAChB,UAA6B,EAC7B,iBAAoC,EACpC,eAAgC;QALb,WAAM,GAAN,MAAM,CAAiB;QAC1C,SAAI,GAAJ,IAAI,CAAW;QACf,SAAI,GAAJ,IAAI,CAAY;QAChB,eAAU,GAAV,UAAU,CAAmB;QAC7B,sBAAiB,GAAjB,iBAAiB,CAAmB;QACpC,oBAAe,GAAf,eAAe,CAAiB;IACvC,CAAC;IAEJ;;;OAGG;IACU,WAAW,CAAC,KAAa;;YACpC,MAAM,EAAE,QAAQ,EAAE,GAAG,MAAM,IAAI,CAAC,IAAI;iBACjC,IAAI,CAAe,GAAG,IAAI,CAAC,MAAM,CAAC,OAAO,mBAAmB,EAAE;gBAC7D,OAAO,EAAE,KAAK;gBACd,OAAO,EAAE,QAAQ;aAClB,CAAC;iBACD,SAAS,EAAE,CAAC;YACf,OAAO,QAAQ,CAAC;QAClB,CAAC;KAAA;IAEY,WAAW,CAAC,WAAmB;;YAC1C,MAAM,EAAE,QAAQ,EAAE,GAAG,MAAM,IAAI,CAAC,IAAI;iBACjC,IAAI,CAAe,GAAG,IAAI,CAAC,MAAM,CAAC,OAAO,iBAAiB,EAAE;gBAC3D,OAAO,EAAE,WAAW;gBACpB,OAAO,EAAE,QAAQ;aAClB,CAAC;iBACD,SAAS,EAAE,CAAC;YACf,OAAO,QAAQ,CAAC;QAClB,CAAC;KAAA;IAEY,uBAAuB,CAClC,cAAsB,EACtB,gBAAwB;;YAExB,MAAM,EAAE,KAAK,EAAE,GAAG,MAAM,IAAI,CAAC,IAAI;iBAC9B,IAAI,CAAY,GAAG,IAAI,CAAC,MAAM,CAAC,OAAO,eAAe,EAAE;gBACtD,QAAQ,EAAE,cAAc;gBACxB,MAAM,EAAE,gBAAgB;aACzB,CAAC;iBACD,SAAS,EAAE,CAAC;YACf,OAAO,KAAK,CAAC;QACf,CAAC;KAAA;IAEY,QAAQ,CACnB,KAAa,EACb,QAAgB,EAChB,cAAsB,EACtB,iBAAyB,EACzB,mBAAsC,OAAO;;YAE7C,4FAA4F;YAC5F,MAAM,aAAa,GAAG,MAAM,IAAI,CAAC,eAAe,CAAC,mBAAmB,CAClE,QAAQ,CACT,CAAC;YAEF,MAAM,SAAS,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,SAAS,EAAE,CAAC;YACpD,MAAM,gBAAgB,GAAG,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAC3D,aAAa,CAAC,OAAO,EACrB,SAAS,CAAC,MAAM,CAAC,IAAI,CAAC,CACvB,CAAC;YAEF,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,SAAS,EAAE,CAAC;YAClD,MAAM,cAAc,GAAG,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CACzD,SAAS,EACT,OAAO,CAAC,MAAM,CAAC,IAAI,CAAC,CACrB,CAAC;YAEF,qBAAqB;YACrB,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,YAAY,EAAE,CAAC;YACjD,MAAM,UAAU,GAAG,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CACrD,OAAO,EACP,GAAG,CAAC,MAAM,CAAC,IAAI,CAAC,CACjB,CAAC;YAEF,kBAAkB;YAClB,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,gBAAgB,EAAE,CAAC;YACxD,MAAM,aAAa,GAAG,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CACxD,OAAO,EACP,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CACpB,CAAC;YAEF,4BAA4B;YAC5B,MAAM,IAAI,GAAG,MAAM,IAAI,CAAC,IAAI;iBACzB,IAAI,CAAM,GAAG,IAAI,CAAC,MAAM,CAAC,OAAO,QAAQ,EAAE;gBACzC,MAAM,EAAE;oBACN;wBACE,IAAI,EAAE,gBAAgB;wBACtB,KAAK,EAAE,iBAAiB;wBACxB,QAAQ,EAAE,cAAc;qBACzB;iBACF;gBACD,eAAe,EAAE,aAAa,CAAC,aAAa;gBAC5C,qBAAqB,EAAE,aAAa,CAAC,eAAe,CAAC,MAAM,EAAE;gBAC7D,6BAA6B,EAAE,aAAa,CAAC,yBAAyB;gBACtE,eAAe,EAAE,aAAa,CAAC,aAAa;gBAC5C,kBAAkB,EAAE,gBAAgB;gBACpC,gBAAgB,EAAE,cAAc;gBAChC,GAAG,EAAE,GAAG,CAAC,MAAM,EAAE;gBACjB,WAAW,EAAE,UAAU;gBACvB,OAAO,EAAE,MAAM,CAAC,MAAM,EAAE;gBACxB,eAAe,EAAE,aAAa;aAC/B,CAAC;iBACD,SAAS,EAAE,CAAC;YAEf,qCAAqC;YACrC,MAAM,UAAU,GAAG,EAAE,CAAC;YACtB,IAAI,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC,KAAK,EAAE,EAAE;gBAC5B,UAAU,CAAC,KAAK,CAAC,IAAI,CAAC,GAAG,KAAK,CAAC,KAAK,CAAC;YACvC,CAAC,CAAC,CAAC;YAEH,gFAAgF;YAChF,kDAAkD;YAClD,MAAM,MAAM,GAAG,IAAI,CAAC,UAAU,CAAC,mBAAmB,CAAC,CAAC,CAAC,CAAC;YAEtD,MAAM,WAAW,GAAG,MAAM,IAAI,CAAC,IAAI,CAAC,MAAM,CAAC;gBACzC,QAAQ,EAAE,GAAG,KAAK,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,IAAI,MAAM,EAAE;gBAC5C,QAAQ,EAAE,IAAI,CAAC,eAAe,CAAC,gBAAgB,CAAC,aAAa,CAAC,OAAO,CAAC;gBACtE,UAAU;gBACV,0DAA0D;gBAC1D,uEAAuE;gBACvE,sEAAsE;gBACtE,+EAA+E;gBAC/E,uCAAuC;gBACvC,oBAAoB;gBACpB,+BAA+B;gBAC/B,uBAAuB;gBACvB,6BAA6B;gBAC7B,QAAQ;gBACR,+BAA+B;gBAC/B,sCAAsC;gBACtC,oCAAoC;gBACpC,OAAO;gBACP,IAAI;gBACJ,cAAc,EAAE;oBACd,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,EAAE,CAAC;oBACxB,sBAAsB,EAAE,MAAM,CAAC,IAAI,CAAC,iBAAiB,CAAC;iBACvD;aACF,CAAC,CAAC;YAEH,OAAO;gBACL,QAAQ,EAAE,WAAW,CAAC,IAAI,CAAC,WAAW,EAAE;gBACxC,MAAM,EAAE,IAAI,CAAC,EAAE;gBACf,cAAc,EAAE,IAAI,CAAC,iBAAiB;gBACtC,OAAO,EAAE,WAAW,CAAC,OAAO;aAC7B,CAAC;QACJ,CAAC;KAAA;IAEY,oBAAoB,CAAC,OAAe;;YAC/C,gCAAgC;YAChC,IAAI;gBACF,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,IAAI;qBAC7B,GAAG,CACF,GAAG,IAAI,CAAC,MAAM,CAAC,OAAO,8BAA8B,OAAO,0BAA0B,CACtF;qBACA,SAAS,EAAE,CAAC;gBACf,OAAO,QAAQ,CAAC;aACjB;YAAC,OAAO,KAAK,EAAE;gBACd,IAAI,KAAK,CAAC,MAAM,KAAK,GAAG,EAAE;oBACxB,OAAO,IAAI,CAAC;iBACb;qBAAM;oBACL,MAAM,KAAK,CAAC;iBACb;aACF;QACH,CAAC;KAAA;;;;YA1KF,UAAU,SAAC;gBACV,UAAU,EAAE,MAAM;aACnB;;;4CAGI,MAAM,SAAC,SAAS;YAZZ,SAAS;YAFT,UAAU;YAIV,iBAAiB;YADjB,iBAAiB;YAGjB,eAAe","sourcesContent":["import { HttpClient } from '@angular/common/http';\r\nimport { Inject, Injectable } from '@angular/core';\r\nimport { AuthClass } from '@aws-amplify/auth/lib-esm/Auth';\r\nimport { EncryptionService } from '../cryptography/encryption.service';\r\nimport { KeyFactoryService } from '../cryptography/key-factory.service';\r\nimport { LifeReadyConfig, LR_CONFIG } from '../life-ready.config';\r\nimport { PasswordService } from './password.service';\r\nimport { RegisterResult } from './auth.types';\r\n\r\n@Injectable({\r\n  providedIn: 'root',\r\n})\r\nexport class RegisterService {\r\n  constructor(\r\n    @Inject(LR_CONFIG) private config: LifeReadyConfig,\r\n    private auth: AuthClass,\r\n    private http: HttpClient,\r\n    private keyFactory: KeyFactoryService,\r\n    private encryptionService: EncryptionService,\r\n    private passwordService: PasswordService\r\n  ) {}\r\n\r\n  /**\r\n   * Request a verification code to be sent out to an email.\r\n   * @return Info needed to be submitted along with the verification code\r\n   */\r\n  public async verifyEmail(email: string): Promise<string> {\r\n    const { claim_id } = await this.http\r\n      .post<{ claim_id }>(`${this.config.authUrl}cove/claim/email/`, {\r\n        address: email,\r\n        context: 'signup',\r\n      })\r\n      .toPromise();\r\n    return claim_id;\r\n  }\r\n\r\n  public async verifyPhone(phoneNumber: string): Promise<string> {\r\n    const { claim_id } = await this.http\r\n      .post<{ claim_id }>(`${this.config.authUrl}cove/claim/sms/`, {\r\n        address: phoneNumber,\r\n        context: 'signup',\r\n      })\r\n      .toPromise();\r\n    return claim_id;\r\n  }\r\n\r\n  public async confirmVerificationCode(\r\n    verificationId: string,\r\n    verificationCode: string\r\n  ): Promise<string> {\r\n    const { token } = await this.http\r\n      .post<{ token }>(`${this.config.authUrl}cove/respond/`, {\r\n        claim_id: verificationId,\r\n        v_code: verificationCode,\r\n      })\r\n      .toPromise();\r\n    return token;\r\n  }\r\n\r\n  public async register(\r\n    email: string,\r\n    password: string,\r\n    verificationId: string,\r\n    verificationToken: string,\r\n    verificationType: 'email' | 'phone' = 'email'\r\n  ): Promise<RegisterResult> {\r\n    // Generate the key material needed for PassIdp which will be the password used for Cognito.\r\n    const passKeyBundle = await this.passwordService.createPassKeyBundle(\r\n      password\r\n    );\r\n\r\n    const masterKey = await this.keyFactory.createKey();\r\n    const wrappedMasterKey = await this.encryptionService.encrypt(\r\n      passKeyBundle.passKey,\r\n      masterKey.toJSON(true)\r\n    );\r\n\r\n    const rootKey = await this.keyFactory.createKey();\r\n    const wrappedRootKey = await this.encryptionService.encrypt(\r\n      masterKey,\r\n      rootKey.toJSON(true)\r\n    );\r\n\r\n    // Encryption PKC key\r\n    const prk = await this.keyFactory.createPkcKey();\r\n    const wrappedPrk = await this.encryptionService.encrypt(\r\n      rootKey,\r\n      prk.toJSON(true)\r\n    );\r\n\r\n    // Signing PKC key\r\n    const sigPrk = await this.keyFactory.createPkcSignKey();\r\n    const wrappedSigPrk = await this.encryptionService.encrypt(\r\n      rootKey,\r\n      sigPrk.toJSON(true)\r\n    );\r\n\r\n    // API call to setup profile\r\n    const user = await this.http\r\n      .post<any>(`${this.config.authUrl}users/`, {\r\n        claims: [\r\n          {\r\n            type: verificationType,\r\n            token: verificationToken,\r\n            claim_id: verificationId,\r\n          },\r\n        ],\r\n        pass_idp_params: passKeyBundle.passIdpParams,\r\n        pass_idp_verifier_pbk: passKeyBundle.passIdpVerifier.toJSON(),\r\n        wrapped_pass_idp_verifier_prk: passKeyBundle.wrappedPassIdpVerifierPrk,\r\n        pass_key_params: passKeyBundle.passKeyParams,\r\n        wrapped_master_key: wrappedMasterKey,\r\n        wrapped_root_key: wrappedRootKey,\r\n        pbk: prk.toJSON(), // public encryption key\r\n        wrapped_prk: wrappedPrk,\r\n        sig_pbk: sigPrk.toJSON(), // public signing key\r\n        wrapped_sig_prk: wrappedSigPrk,\r\n      })\r\n      .toPromise();\r\n\r\n    // API call to create user on cognito\r\n    const attributes = {};\r\n    user.claims.forEach((claim) => {\r\n      attributes[claim.type] = claim.value;\r\n    });\r\n\r\n    // Random suffix for uniqueness. If there's a duplicate, then used just needs to\r\n    // sign up again. But chances of collision is low.\r\n    const suffix = this.keyFactory.randomDigitsNoZeros(4);\r\n\r\n    const cognitoUser = await this.auth.signUp({\r\n      username: `${email.split('@')[0]}.${suffix}`,\r\n      password: this.passwordService.getPassIdpString(passKeyBundle.passIdp),\r\n      attributes,\r\n      // Unfortunately, validationData is not passed to the post\r\n      // confirmation cognito trigger. So can can't do the association there.\r\n      // The current workflow will create a new user on LR before signing up\r\n      // with Cognito. Then Cognito can use the user.id and user.pre_sign_up_token to\r\n      // do the validation of the attributes.\r\n      // validationData: [\r\n      //   new CognitoUserAttribute({\r\n      //     Name: \"user_id\",\r\n      //     Value: String(user.id)\r\n      //   }),\r\n      //   new CognitoUserAttribute({\r\n      //     Name: \"user_pre_sign_up_token\",\r\n      //     Value: user.pre_sign_up_token\r\n      //   })\r\n      // ]\r\n      clientMetadata: {\r\n        user_id: String(user.id),\r\n        user_pre_sign_up_token: String(user.pre_sign_up_token),\r\n      },\r\n    });\r\n\r\n    return {\r\n      username: cognitoUser.user.getUsername(),\r\n      userId: user.id,\r\n      preSignUpToken: user.pre_sign_up_token,\r\n      userSub: cognitoUser.userSub,\r\n    };\r\n  }\r\n\r\n  public async hibpBreachedAccounts(account: string): Promise<any> {\r\n    // The account is just the email\r\n    try {\r\n      const response = await this.http\r\n        .get(\r\n          `${this.config.authUrl}users/hibp/breachedaccount/${account}/?truncateResponse=false`\r\n        )\r\n        .toPromise();\r\n      return response;\r\n    } catch (error) {\r\n      if (error.status === 404) {\r\n        return null;\r\n      } else {\r\n        throw error;\r\n      }\r\n    }\r\n  }\r\n}\r\n"]}
@@ -1,74 +1,74 @@
1
- import { __awaiter } from "tslib";
2
- import { Injectable } from '@angular/core';
3
- import { AuthClass } from '@aws-amplify/auth/lib-esm/Auth';
4
- import { LrBadArgumentException } from '../_common/exceptions';
5
- import * as i0 from "@angular/core";
6
- import * as i1 from "@aws-amplify/auth/lib-esm/Auth";
7
- export class TwoFactorService {
8
- constructor(auth) {
9
- this.auth = auth;
10
- }
11
- getPreferredMFA() {
12
- return __awaiter(this, void 0, void 0, function* () {
13
- const cognitoUser = yield this.auth.currentAuthenticatedUser();
14
- return yield this.auth.getPreferredMFA(cognitoUser);
15
- });
16
- }
17
- setPreferredMFA(method) {
18
- return __awaiter(this, void 0, void 0, function* () {
19
- const cognitoUser = yield this.auth.currentAuthenticatedUser();
20
- yield this.auth.setPreferredMFA(cognitoUser, method);
21
- });
22
- }
23
- setPhoneNumber(phone) {
24
- return __awaiter(this, void 0, void 0, function* () {
25
- const cognitoUser = yield this.auth.currentAuthenticatedUser();
26
- yield this.auth.updateUserAttributes(cognitoUser, {
27
- phone_number: phone,
28
- });
29
- });
30
- }
31
- getSMSCode() {
32
- return __awaiter(this, void 0, void 0, function* () {
33
- yield this.auth.verifyCurrentUserAttribute('phone_number');
34
- });
35
- }
36
- verifySMSCode(verificationCode) {
37
- return __awaiter(this, void 0, void 0, function* () {
38
- yield this.auth.verifyCurrentUserAttributeSubmit('phone_number', verificationCode);
39
- });
40
- }
41
- getSoftwareToken() {
42
- return __awaiter(this, void 0, void 0, function* () {
43
- const [cognitoUser, userInfo] = yield Promise.all([
44
- this.auth.currentAuthenticatedUser(),
45
- this.auth.currentUserInfo(),
46
- ]);
47
- const code = yield this.auth.setupTOTP(cognitoUser);
48
- const email = userInfo.attributes.email;
49
- if (!email) {
50
- throw new LrBadArgumentException('No email associated with user.');
51
- }
52
- return {
53
- code,
54
- codeUri: `otpauth://totp/${email}?secret=${code}&issuer=LifeReady`,
55
- };
56
- });
57
- }
58
- verifySoftwareToken(totpCode) {
59
- return __awaiter(this, void 0, void 0, function* () {
60
- const cognitoUser = yield this.auth.currentAuthenticatedUser();
61
- yield this.auth.verifyTotpToken(cognitoUser, totpCode);
62
- });
63
- }
64
- }
65
- TwoFactorService.ɵprov = i0.ɵɵdefineInjectable({ factory: function TwoFactorService_Factory() { return new TwoFactorService(i0.ɵɵinject(i1.AuthClass)); }, token: TwoFactorService, providedIn: "root" });
66
- TwoFactorService.decorators = [
67
- { type: Injectable, args: [{
68
- providedIn: 'root',
69
- },] }
70
- ];
71
- TwoFactorService.ctorParameters = () => [
72
- { type: AuthClass }
73
- ];
74
- //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoidHdvLWZhY3Rvci5zZXJ2aWNlLmpzIiwic291cmNlUm9vdCI6Ii9vcHQvYXRsYXNzaWFuL3BpcGVsaW5lcy9hZ2VudC9idWlsZC9wcm9qZWN0cy9jb3JlL3NyYy8iLCJzb3VyY2VzIjpbImxpYi9hdXRoL3R3by1mYWN0b3Iuc2VydmljZS50cyJdLCJuYW1lcyI6W10sIm1hcHBpbmdzIjoiO0FBQUEsT0FBTyxFQUFFLFVBQVUsRUFBRSxNQUFNLGVBQWUsQ0FBQztBQUUzQyxPQUFPLEVBQUUsU0FBUyxFQUFFLE1BQU0sZ0NBQWdDLENBQUM7QUFDM0QsT0FBTyxFQUFFLHNCQUFzQixFQUFFLE1BQU0sdUJBQXVCLENBQUM7OztBQUsvRCxNQUFNLE9BQU8sZ0JBQWdCO0lBQzNCLFlBQW9CLElBQWU7UUFBZixTQUFJLEdBQUosSUFBSSxDQUFXO0lBQUcsQ0FBQztJQUUxQixlQUFlOztZQUMxQixNQUFNLFdBQVcsR0FBZ0IsTUFBTSxJQUFJLENBQUMsSUFBSSxDQUFDLHdCQUF3QixFQUFFLENBQUM7WUFFNUUsT0FBTyxNQUFNLElBQUksQ0FBQyxJQUFJLENBQUMsZUFBZSxDQUFDLFdBQVcsQ0FBQyxDQUFDO1FBQ3RELENBQUM7S0FBQTtJQUVZLGVBQWUsQ0FDMUIsTUFBZ0M7O1lBRWhDLE1BQU0sV0FBVyxHQUFnQixNQUFNLElBQUksQ0FBQyxJQUFJLENBQUMsd0JBQXdCLEVBQUUsQ0FBQztZQUU1RSxNQUFNLElBQUksQ0FBQyxJQUFJLENBQUMsZUFBZSxDQUFDLFdBQVcsRUFBRSxNQUFNLENBQUMsQ0FBQztRQUN2RCxDQUFDO0tBQUE7SUFFWSxjQUFjLENBQUMsS0FBSzs7WUFDL0IsTUFBTSxXQUFXLEdBQWdCLE1BQU0sSUFBSSxDQUFDLElBQUksQ0FBQyx3QkFBd0IsRUFBRSxDQUFDO1lBRTVFLE1BQU0sSUFBSSxDQUFDLElBQUksQ0FBQyxvQkFBb0IsQ0FBQyxXQUFXLEVBQUU7Z0JBQ2hELFlBQVksRUFBRSxLQUFLO2FBQ3BCLENBQUMsQ0FBQztRQUNMLENBQUM7S0FBQTtJQUVZLFVBQVU7O1lBQ3JCLE1BQU0sSUFBSSxDQUFDLElBQUksQ0FBQywwQkFBMEIsQ0FBQyxjQUFjLENBQUMsQ0FBQztRQUM3RCxDQUFDO0tBQUE7SUFFWSxhQUFhLENBQUMsZ0JBQXdCOztZQUNqRCxNQUFNLElBQUksQ0FBQyxJQUFJLENBQUMsZ0NBQWdDLENBQzlDLGNBQWMsRUFDZCxnQkFBZ0IsQ0FDakIsQ0FBQztRQUNKLENBQUM7S0FBQTtJQUVZLGdCQUFnQjs7WUFDM0IsTUFBTSxDQUFDLFdBQVcsRUFBRSxRQUFRLENBQUMsR0FBRyxNQUFNLE9BQU8sQ0FBQyxHQUFHLENBQUM7Z0JBQ2hELElBQUksQ0FBQyxJQUFJLENBQUMsd0JBQXdCLEVBQUU7Z0JBQ3BDLElBQUksQ0FBQyxJQUFJLENBQUMsZUFBZSxFQUFFO2FBQzVCLENBQUMsQ0FBQztZQUVILE1BQU0sSUFBSSxHQUFHLE1BQU0sSUFBSSxDQUFDLElBQUksQ0FBQyxTQUFTLENBQUMsV0FBVyxDQUFDLENBQUM7WUFFcEQsTUFBTSxLQUFLLEdBQUcsUUFBUSxDQUFDLFVBQVUsQ0FBQyxLQUFLLENBQUM7WUFDeEMsSUFBSSxDQUFDLEtBQUssRUFBRTtnQkFDVixNQUFNLElBQUksc0JBQXNCLENBQUMsZ0NBQWdDLENBQUMsQ0FBQzthQUNwRTtZQUVELE9BQU87Z0JBQ0wsSUFBSTtnQkFDSixPQUFPLEVBQUUsa0JBQWtCLEtBQUssV0FBVyxJQUFJLG1CQUFtQjthQUNuRSxDQUFDO1FBQ0osQ0FBQztLQUFBO0lBRVksbUJBQW1CLENBQUMsUUFBZ0I7O1lBQy9DLE1BQU0sV0FBVyxHQUFnQixNQUFNLElBQUksQ0FBQyxJQUFJLENBQUMsd0JBQXdCLEVBQUUsQ0FBQztZQUU1RSxNQUFNLElBQUksQ0FBQyxJQUFJLENBQUMsZUFBZSxDQUFDLFdBQVcsRUFBRSxRQUFRLENBQUMsQ0FBQztRQUN6RCxDQUFDO0tBQUE7Ozs7WUE5REYsVUFBVSxTQUFDO2dCQUNWLFVBQVUsRUFBRSxNQUFNO2FBQ25COzs7WUFMUSxTQUFTIiwic291cmNlc0NvbnRlbnQiOlsiaW1wb3J0IHsgSW5qZWN0YWJsZSB9IGZyb20gJ0Bhbmd1bGFyL2NvcmUnO1xuaW1wb3J0IHsgQ29nbml0b1VzZXIgfSBmcm9tICdAYXdzLWFtcGxpZnkvYXV0aCc7XG5pbXBvcnQgeyBBdXRoQ2xhc3MgfSBmcm9tICdAYXdzLWFtcGxpZnkvYXV0aC9saWItZXNtL0F1dGgnO1xuaW1wb3J0IHsgTHJCYWRBcmd1bWVudEV4Y2VwdGlvbiB9IGZyb20gJy4uL19jb21tb24vZXhjZXB0aW9ucyc7XG5cbkBJbmplY3RhYmxlKHtcbiAgcHJvdmlkZWRJbjogJ3Jvb3QnLFxufSlcbmV4cG9ydCBjbGFzcyBUd29GYWN0b3JTZXJ2aWNlIHtcbiAgY29uc3RydWN0b3IocHJpdmF0ZSBhdXRoOiBBdXRoQ2xhc3MpIHt9XG5cbiAgcHVibGljIGFzeW5jIGdldFByZWZlcnJlZE1GQSgpOiBQcm9taXNlPHN0cmluZz4ge1xuICAgIGNvbnN0IGNvZ25pdG9Vc2VyOiBDb2duaXRvVXNlciA9IGF3YWl0IHRoaXMuYXV0aC5jdXJyZW50QXV0aGVudGljYXRlZFVzZXIoKTtcblxuICAgIHJldHVybiBhd2FpdCB0aGlzLmF1dGguZ2V0UHJlZmVycmVkTUZBKGNvZ25pdG9Vc2VyKTtcbiAgfVxuXG4gIHB1YmxpYyBhc3luYyBzZXRQcmVmZXJyZWRNRkEoXG4gICAgbWV0aG9kOiAnVE9UUCcgfCAnU01TJyB8ICdOT01GQSdcbiAgKTogUHJvbWlzZTx2b2lkPiB7XG4gICAgY29uc3QgY29nbml0b1VzZXI6IENvZ25pdG9Vc2VyID0gYXdhaXQgdGhpcy5hdXRoLmN1cnJlbnRBdXRoZW50aWNhdGVkVXNlcigpO1xuXG4gICAgYXdhaXQgdGhpcy5hdXRoLnNldFByZWZlcnJlZE1GQShjb2duaXRvVXNlciwgbWV0aG9kKTtcbiAgfVxuXG4gIHB1YmxpYyBhc3luYyBzZXRQaG9uZU51bWJlcihwaG9uZSk6IFByb21pc2U8dm9pZD4ge1xuICAgIGNvbnN0IGNvZ25pdG9Vc2VyOiBDb2duaXRvVXNlciA9IGF3YWl0IHRoaXMuYXV0aC5jdXJyZW50QXV0aGVudGljYXRlZFVzZXIoKTtcblxuICAgIGF3YWl0IHRoaXMuYXV0aC51cGRhdGVVc2VyQXR0cmlidXRlcyhjb2duaXRvVXNlciwge1xuICAgICAgcGhvbmVfbnVtYmVyOiBwaG9uZSxcbiAgICB9KTtcbiAgfVxuXG4gIHB1YmxpYyBhc3luYyBnZXRTTVNDb2RlKCkge1xuICAgIGF3YWl0IHRoaXMuYXV0aC52ZXJpZnlDdXJyZW50VXNlckF0dHJpYnV0ZSgncGhvbmVfbnVtYmVyJyk7XG4gIH1cblxuICBwdWJsaWMgYXN5bmMgdmVyaWZ5U01TQ29kZSh2ZXJpZmljYXRpb25Db2RlOiBzdHJpbmcpIHtcbiAgICBhd2FpdCB0aGlzLmF1dGgudmVyaWZ5Q3VycmVudFVzZXJBdHRyaWJ1dGVTdWJtaXQoXG4gICAgICAncGhvbmVfbnVtYmVyJyxcbiAgICAgIHZlcmlmaWNhdGlvbkNvZGVcbiAgICApO1xuICB9XG5cbiAgcHVibGljIGFzeW5jIGdldFNvZnR3YXJlVG9rZW4oKTogUHJvbWlzZTx7IGNvZGU6IHN0cmluZzsgY29kZVVyaTogc3RyaW5nIH0+IHtcbiAgICBjb25zdCBbY29nbml0b1VzZXIsIHVzZXJJbmZvXSA9IGF3YWl0IFByb21pc2UuYWxsKFtcbiAgICAgIHRoaXMuYXV0aC5jdXJyZW50QXV0aGVudGljYXRlZFVzZXIoKSxcbiAgICAgIHRoaXMuYXV0aC5jdXJyZW50VXNlckluZm8oKSxcbiAgICBdKTtcblxuICAgIGNvbnN0IGNvZGUgPSBhd2FpdCB0aGlzLmF1dGguc2V0dXBUT1RQKGNvZ25pdG9Vc2VyKTtcblxuICAgIGNvbnN0IGVtYWlsID0gdXNlckluZm8uYXR0cmlidXRlcy5lbWFpbDtcbiAgICBpZiAoIWVtYWlsKSB7XG4gICAgICB0aHJvdyBuZXcgTHJCYWRBcmd1bWVudEV4Y2VwdGlvbignTm8gZW1haWwgYXNzb2NpYXRlZCB3aXRoIHVzZXIuJyk7XG4gICAgfVxuXG4gICAgcmV0dXJuIHtcbiAgICAgIGNvZGUsXG4gICAgICBjb2RlVXJpOiBgb3RwYXV0aDovL3RvdHAvJHtlbWFpbH0/c2VjcmV0PSR7Y29kZX0maXNzdWVyPUxpZmVSZWFkeWAsXG4gICAgfTtcbiAgfVxuXG4gIHB1YmxpYyBhc3luYyB2ZXJpZnlTb2Z0d2FyZVRva2VuKHRvdHBDb2RlOiBzdHJpbmcpOiBQcm9taXNlPHZvaWQ+IHtcbiAgICBjb25zdCBjb2duaXRvVXNlcjogQ29nbml0b1VzZXIgPSBhd2FpdCB0aGlzLmF1dGguY3VycmVudEF1dGhlbnRpY2F0ZWRVc2VyKCk7XG5cbiAgICBhd2FpdCB0aGlzLmF1dGgudmVyaWZ5VG90cFRva2VuKGNvZ25pdG9Vc2VyLCB0b3RwQ29kZSk7XG4gIH1cbn1cbiJdfQ==
1
+ import { __awaiter } from "tslib";
2
+ import { Injectable } from '@angular/core';
3
+ import { AuthClass } from '@aws-amplify/auth/lib-esm/Auth';
4
+ import { LrBadArgumentException } from '../_common/exceptions';
5
+ import * as i0 from "@angular/core";
6
+ import * as i1 from "@aws-amplify/auth/lib-esm/Auth";
7
+ export class TwoFactorService {
8
+ constructor(auth) {
9
+ this.auth = auth;
10
+ }
11
+ getPreferredMFA() {
12
+ return __awaiter(this, void 0, void 0, function* () {
13
+ const cognitoUser = yield this.auth.currentAuthenticatedUser();
14
+ return yield this.auth.getPreferredMFA(cognitoUser);
15
+ });
16
+ }
17
+ setPreferredMFA(method) {
18
+ return __awaiter(this, void 0, void 0, function* () {
19
+ const cognitoUser = yield this.auth.currentAuthenticatedUser();
20
+ yield this.auth.setPreferredMFA(cognitoUser, method);
21
+ });
22
+ }
23
+ setPhoneNumber(phone) {
24
+ return __awaiter(this, void 0, void 0, function* () {
25
+ const cognitoUser = yield this.auth.currentAuthenticatedUser();
26
+ yield this.auth.updateUserAttributes(cognitoUser, {
27
+ phone_number: phone,
28
+ });
29
+ });
30
+ }
31
+ getSMSCode() {
32
+ return __awaiter(this, void 0, void 0, function* () {
33
+ yield this.auth.verifyCurrentUserAttribute('phone_number');
34
+ });
35
+ }
36
+ verifySMSCode(verificationCode) {
37
+ return __awaiter(this, void 0, void 0, function* () {
38
+ yield this.auth.verifyCurrentUserAttributeSubmit('phone_number', verificationCode);
39
+ });
40
+ }
41
+ getSoftwareToken() {
42
+ return __awaiter(this, void 0, void 0, function* () {
43
+ const [cognitoUser, userInfo] = yield Promise.all([
44
+ this.auth.currentAuthenticatedUser(),
45
+ this.auth.currentUserInfo(),
46
+ ]);
47
+ const code = yield this.auth.setupTOTP(cognitoUser);
48
+ const email = userInfo.attributes.email;
49
+ if (!email) {
50
+ throw new LrBadArgumentException('No email associated with user.');
51
+ }
52
+ return {
53
+ code,
54
+ codeUri: `otpauth://totp/${email}?secret=${code}&issuer=LifeReady`,
55
+ };
56
+ });
57
+ }
58
+ verifySoftwareToken(totpCode) {
59
+ return __awaiter(this, void 0, void 0, function* () {
60
+ const cognitoUser = yield this.auth.currentAuthenticatedUser();
61
+ yield this.auth.verifyTotpToken(cognitoUser, totpCode);
62
+ });
63
+ }
64
+ }
65
+ TwoFactorService.ɵprov = i0.ɵɵdefineInjectable({ factory: function TwoFactorService_Factory() { return new TwoFactorService(i0.ɵɵinject(i1.AuthClass)); }, token: TwoFactorService, providedIn: "root" });
66
+ TwoFactorService.decorators = [
67
+ { type: Injectable, args: [{
68
+ providedIn: 'root',
69
+ },] }
70
+ ];
71
+ TwoFactorService.ctorParameters = () => [
72
+ { type: AuthClass }
73
+ ];
74
+ //# sourceMappingURL=data:application/json;base64,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