@lifeready/core 1.0.2 → 1.0.4

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (225) hide show
  1. package/README.md +62 -62
  2. package/bundles/lifeready-core.umd.js +15445 -15445
  3. package/bundles/lifeready-core.umd.js.map +1 -1
  4. package/bundles/lifeready-core.umd.min.js.map +1 -1
  5. package/esm2015/lib/_common/ast.js +40 -40
  6. package/esm2015/lib/_common/deferred-promise.js +24 -24
  7. package/esm2015/lib/_common/exceptions.js +157 -157
  8. package/esm2015/lib/_common/queries.gql.js +190 -190
  9. package/esm2015/lib/_common/run-outside-angular.js +79 -79
  10. package/esm2015/lib/_common/types.js +1 -1
  11. package/esm2015/lib/_common/utils.js +44 -44
  12. package/esm2015/lib/api/contact-card.gql.js +79 -79
  13. package/esm2015/lib/api/contact-card.service.js +154 -154
  14. package/esm2015/lib/api/contact-card2.gql.js +60 -60
  15. package/esm2015/lib/api/contact-card2.service.js +103 -103
  16. package/esm2015/lib/api/file.service.js +74 -74
  17. package/esm2015/lib/api/item2.gql.js +110 -110
  18. package/esm2015/lib/api/item2.service.js +311 -311
  19. package/esm2015/lib/api/key-exchange.gql.js +188 -188
  20. package/esm2015/lib/api/key-exchange.service.js +442 -442
  21. package/esm2015/lib/api/key-exchange.types.js +18 -18
  22. package/esm2015/lib/api/key-exchange2.gql.js +171 -171
  23. package/esm2015/lib/api/key-exchange2.service.js +479 -479
  24. package/esm2015/lib/api/lock.gql.js +40 -40
  25. package/esm2015/lib/api/lock.service.js +64 -64
  26. package/esm2015/lib/api/lr-apollo.service.js +46 -46
  27. package/esm2015/lib/api/lr-graphql/index.js +6 -6
  28. package/esm2015/lib/api/lr-graphql/lr-graphql.service.js +155 -155
  29. package/esm2015/lib/api/lr-graphql/lr-merged-mutation.js +213 -213
  30. package/esm2015/lib/api/lr-graphql/lr-mutation-base.js +51 -51
  31. package/esm2015/lib/api/lr-graphql/lr-mutation.js +48 -48
  32. package/esm2015/lib/api/lr-graphql/lr.service.js +18 -18
  33. package/esm2015/lib/api/message.service.js +138 -138
  34. package/esm2015/lib/api/persist.service.js +181 -181
  35. package/esm2015/lib/api/query-processor/common-processors.service.js +93 -93
  36. package/esm2015/lib/api/query-processor/index.js +3 -3
  37. package/esm2015/lib/api/query-processor/query-processor.service.js +192 -192
  38. package/esm2015/lib/api/query-processor/tp-password-reset-processor.service.js +109 -109
  39. package/esm2015/lib/api/shared-contact-card.service.js +119 -119
  40. package/esm2015/lib/api/shared-contact-card2.gql.js +41 -41
  41. package/esm2015/lib/api/shared-contact-card2.service.js +117 -117
  42. package/esm2015/lib/api/time.service.js +146 -146
  43. package/esm2015/lib/api/types/graphql.types.js +7 -7
  44. package/esm2015/lib/api/types/index.js +3 -3
  45. package/esm2015/lib/api/types/lr-graphql.types.js +71 -71
  46. package/esm2015/lib/auth/auth.config.js +57 -57
  47. package/esm2015/lib/auth/auth.gql.js +48 -48
  48. package/esm2015/lib/auth/auth.types.js +27 -27
  49. package/esm2015/lib/auth/idle.service.js +168 -168
  50. package/esm2015/lib/auth/idle.types.js +7 -7
  51. package/esm2015/lib/auth/lbop.service.js +355 -355
  52. package/esm2015/lib/auth/life-ready-auth.service.js +500 -500
  53. package/esm2015/lib/auth/password.service.js +320 -320
  54. package/esm2015/lib/auth/register.service.js +172 -172
  55. package/esm2015/lib/auth/two-factor.service.js +74 -74
  56. package/esm2015/lib/category/category-meta.service.js +99 -99
  57. package/esm2015/lib/category/category.gql.js +406 -406
  58. package/esm2015/lib/category/category.service.js +390 -390
  59. package/esm2015/lib/category/category.types.js +29 -29
  60. package/esm2015/lib/cryptography/cryptography.types.js +11 -11
  61. package/esm2015/lib/cryptography/encryption.service.js +189 -189
  62. package/esm2015/lib/cryptography/key-factory.service.js +237 -237
  63. package/esm2015/lib/cryptography/key-graph.service.js +280 -280
  64. package/esm2015/lib/cryptography/key-meta.service.js +200 -200
  65. package/esm2015/lib/cryptography/key.service.js +124 -124
  66. package/esm2015/lib/cryptography/slip39.service.js +169 -169
  67. package/esm2015/lib/cryptography/web-crypto.service.js +29 -29
  68. package/esm2015/lib/life-ready.config.js +84 -84
  69. package/esm2015/lib/life-ready.module.js +74 -74
  70. package/esm2015/lib/plan/plan.gql.js +123 -123
  71. package/esm2015/lib/plan/plan.service.js +149 -149
  72. package/esm2015/lib/plan/plan.types.js +11 -11
  73. package/esm2015/lib/record/record-attachment.service.js +101 -101
  74. package/esm2015/lib/record/record.gql.js +179 -179
  75. package/esm2015/lib/record/record.service.js +206 -206
  76. package/esm2015/lib/record/record.types.js +15 -15
  77. package/esm2015/lib/record-type/record-type.service.js +75 -75
  78. package/esm2015/lib/record-type/record-type.types.js +28 -28
  79. package/esm2015/lib/scenario/approvals/scenario-approval.gql.js +105 -105
  80. package/esm2015/lib/scenario/approvals/scenario-approval.types.js +1 -1
  81. package/esm2015/lib/scenario/approvals/scenario-approver.service.js +300 -300
  82. package/esm2015/lib/scenario/claimants/scenario-claimant.gql.js +52 -52
  83. package/esm2015/lib/scenario/claimants/scenario-claimant.service.js +97 -97
  84. package/esm2015/lib/scenario/claimants/scenario-claimant.types.js +1 -1
  85. package/esm2015/lib/scenario/receivers/scenario-receiver.gql.js +150 -150
  86. package/esm2015/lib/scenario/receivers/scenario-receiver.service.js +229 -229
  87. package/esm2015/lib/scenario/receivers/scenario-receiver.types.js +1 -1
  88. package/esm2015/lib/scenario/scenario-setup.service.js +269 -269
  89. package/esm2015/lib/scenario/scenario.gql.js +368 -368
  90. package/esm2015/lib/scenario/scenario.service.js +611 -611
  91. package/esm2015/lib/scenario/scenario.types.js +64 -64
  92. package/esm2015/lib/search/search.gql.js +62 -62
  93. package/esm2015/lib/search/search.service.js +156 -156
  94. package/esm2015/lib/search/search.types.js +6 -6
  95. package/esm2015/lib/trusted-parties/tp-password-reset-request.service.js +112 -112
  96. package/esm2015/lib/trusted-parties/tp-password-reset-user.service.js +129 -129
  97. package/esm2015/lib/trusted-parties/tp-password-reset.constants.js +4 -4
  98. package/esm2015/lib/trusted-parties/tp-password-reset.gql.js +232 -232
  99. package/esm2015/lib/trusted-parties/tp-password-reset.service.js +299 -299
  100. package/esm2015/lib/trusted-parties/trusted-party.gql.js +148 -148
  101. package/esm2015/lib/trusted-parties/trusted-party.service.js +326 -326
  102. package/esm2015/lib/trusted-parties/trusted-party.types.js +41 -41
  103. package/esm2015/lib/trusted-parties/trusted-party2.gql.js +87 -87
  104. package/esm2015/lib/trusted-parties/trusted-party2.service.js +215 -215
  105. package/esm2015/lib/users/profile-details.service.js +214 -214
  106. package/esm2015/lib/users/profile.gql.js +97 -97
  107. package/esm2015/lib/users/profile.service.js +169 -169
  108. package/esm2015/lib/users/profile.types.js +34 -34
  109. package/esm2015/lib/users/user.gql.js +60 -60
  110. package/esm2015/lib/users/user.service.js +79 -79
  111. package/esm2015/lib/users/user.types.js +5 -5
  112. package/esm2015/lifeready-core.js +10 -10
  113. package/esm2015/public-api.js +81 -81
  114. package/fesm2015/lifeready-core.js +13088 -13088
  115. package/fesm2015/lifeready-core.js.map +1 -1
  116. package/lib/_common/ast.d.ts +11 -11
  117. package/lib/_common/deferred-promise.d.ts +12 -12
  118. package/lib/_common/exceptions.d.ts +109 -109
  119. package/lib/_common/queries.gql.d.ts +10 -10
  120. package/lib/_common/run-outside-angular.d.ts +14 -14
  121. package/lib/_common/types.d.ts +10 -10
  122. package/lib/_common/utils.d.ts +3 -3
  123. package/lib/api/contact-card.gql.d.ts +7 -7
  124. package/lib/api/contact-card.service.d.ts +52 -52
  125. package/lib/api/contact-card2.gql.d.ts +34 -34
  126. package/lib/api/contact-card2.service.d.ts +49 -49
  127. package/lib/api/file.service.d.ts +18 -18
  128. package/lib/api/item2.gql.d.ts +96 -96
  129. package/lib/api/item2.service.d.ts +177 -177
  130. package/lib/api/key-exchange.gql.d.ts +9 -9
  131. package/lib/api/key-exchange.service.d.ts +39 -39
  132. package/lib/api/key-exchange.types.d.ts +196 -196
  133. package/lib/api/key-exchange2.gql.d.ts +125 -125
  134. package/lib/api/key-exchange2.service.d.ts +187 -187
  135. package/lib/api/lock.gql.d.ts +27 -27
  136. package/lib/api/lock.service.d.ts +25 -25
  137. package/lib/api/lr-apollo.service.d.ts +15 -15
  138. package/lib/api/lr-graphql/index.d.ts +5 -5
  139. package/lib/api/lr-graphql/lr-graphql.service.d.ts +60 -60
  140. package/lib/api/lr-graphql/lr-merged-mutation.d.ts +27 -27
  141. package/lib/api/lr-graphql/lr-mutation-base.d.ts +28 -28
  142. package/lib/api/lr-graphql/lr-mutation.d.ts +8 -8
  143. package/lib/api/lr-graphql/lr.service.d.ts +9 -9
  144. package/lib/api/message.service.d.ts +58 -58
  145. package/lib/api/persist.service.d.ts +31 -31
  146. package/lib/api/query-processor/common-processors.service.d.ts +36 -36
  147. package/lib/api/query-processor/index.d.ts +2 -2
  148. package/lib/api/query-processor/query-processor.service.d.ts +18 -18
  149. package/lib/api/query-processor/tp-password-reset-processor.service.d.ts +15 -15
  150. package/lib/api/shared-contact-card.service.d.ts +33 -33
  151. package/lib/api/shared-contact-card2.gql.d.ts +36 -36
  152. package/lib/api/shared-contact-card2.service.d.ts +45 -45
  153. package/lib/api/time.service.d.ts +16 -16
  154. package/lib/api/types/graphql.types.d.ts +29 -29
  155. package/lib/api/types/index.d.ts +2 -2
  156. package/lib/api/types/lr-graphql.types.d.ts +385 -385
  157. package/lib/auth/auth.config.d.ts +5 -5
  158. package/lib/auth/auth.gql.d.ts +15 -15
  159. package/lib/auth/auth.types.d.ts +66 -66
  160. package/lib/auth/idle.service.d.ts +40 -40
  161. package/lib/auth/idle.types.d.ts +10 -10
  162. package/lib/auth/lbop.service.d.ts +91 -91
  163. package/lib/auth/life-ready-auth.service.d.ts +59 -59
  164. package/lib/auth/password.service.d.ts +78 -78
  165. package/lib/auth/register.service.d.ts +25 -25
  166. package/lib/auth/two-factor.service.d.ts +15 -15
  167. package/lib/category/category-meta.service.d.ts +23 -23
  168. package/lib/category/category.gql.d.ts +45 -45
  169. package/lib/category/category.service.d.ts +67 -67
  170. package/lib/category/category.types.d.ts +79 -79
  171. package/lib/cryptography/cryptography.types.d.ts +83 -83
  172. package/lib/cryptography/encryption.service.d.ts +41 -41
  173. package/lib/cryptography/key-factory.service.d.ts +38 -38
  174. package/lib/cryptography/key-graph.service.d.ts +33 -33
  175. package/lib/cryptography/key-meta.service.d.ts +44 -44
  176. package/lib/cryptography/key.service.d.ts +36 -36
  177. package/lib/cryptography/slip39.service.d.ts +43 -43
  178. package/lib/cryptography/web-crypto.service.d.ts +5 -5
  179. package/lib/life-ready.config.d.ts +14 -14
  180. package/lib/life-ready.module.d.ts +5 -5
  181. package/lib/plan/plan.gql.d.ts +11 -11
  182. package/lib/plan/plan.service.d.ts +33 -33
  183. package/lib/plan/plan.types.d.ts +31 -31
  184. package/lib/record/record-attachment.service.d.ts +16 -16
  185. package/lib/record/record.gql.d.ts +14 -14
  186. package/lib/record/record.service.d.ts +25 -25
  187. package/lib/record/record.types.d.ts +57 -57
  188. package/lib/record-type/record-type.service.d.ts +11 -11
  189. package/lib/record-type/record-type.types.d.ts +50 -50
  190. package/lib/scenario/approvals/scenario-approval.gql.d.ts +7 -7
  191. package/lib/scenario/approvals/scenario-approval.types.d.ts +63 -63
  192. package/lib/scenario/approvals/scenario-approver.service.d.ts +32 -32
  193. package/lib/scenario/claimants/scenario-claimant.gql.d.ts +5 -5
  194. package/lib/scenario/claimants/scenario-claimant.service.d.ts +17 -17
  195. package/lib/scenario/claimants/scenario-claimant.types.d.ts +18 -18
  196. package/lib/scenario/receivers/scenario-receiver.gql.d.ts +8 -8
  197. package/lib/scenario/receivers/scenario-receiver.service.d.ts +30 -30
  198. package/lib/scenario/receivers/scenario-receiver.types.d.ts +54 -54
  199. package/lib/scenario/scenario-setup.service.d.ts +22 -22
  200. package/lib/scenario/scenario.gql.d.ts +34 -34
  201. package/lib/scenario/scenario.service.d.ts +58 -58
  202. package/lib/scenario/scenario.types.d.ts +217 -217
  203. package/lib/search/search.gql.d.ts +1 -1
  204. package/lib/search/search.service.d.ts +25 -25
  205. package/lib/search/search.types.d.ts +20 -20
  206. package/lib/trusted-parties/tp-password-reset-request.service.d.ts +20 -20
  207. package/lib/trusted-parties/tp-password-reset-user.service.d.ts +35 -35
  208. package/lib/trusted-parties/tp-password-reset.constants.d.ts +3 -3
  209. package/lib/trusted-parties/tp-password-reset.gql.d.ts +218 -218
  210. package/lib/trusted-parties/tp-password-reset.service.d.ts +130 -130
  211. package/lib/trusted-parties/trusted-party.gql.d.ts +9 -9
  212. package/lib/trusted-parties/trusted-party.service.d.ts +44 -44
  213. package/lib/trusted-parties/trusted-party.types.d.ts +102 -102
  214. package/lib/trusted-parties/trusted-party2.gql.d.ts +79 -79
  215. package/lib/trusted-parties/trusted-party2.service.d.ts +114 -114
  216. package/lib/users/profile-details.service.d.ts +21 -21
  217. package/lib/users/profile.gql.d.ts +11 -11
  218. package/lib/users/profile.service.d.ts +35 -35
  219. package/lib/users/profile.types.d.ts +96 -96
  220. package/lib/users/user.gql.d.ts +9 -9
  221. package/lib/users/user.service.d.ts +12 -12
  222. package/lib/users/user.types.d.ts +23 -23
  223. package/lifeready-core.d.ts +9 -9
  224. package/package.json +1 -1
  225. package/public-api.d.ts +77 -77
@@ -1,78 +1,78 @@
1
- import { HttpClient } from '@angular/common/http';
2
- import { AuthClass } from '@aws-amplify/auth/lib-esm/Auth';
3
- import { JWK } from 'node-jose';
4
- import { ProfileService } from '../users/profile.service';
5
- import { EncryptionService } from '../cryptography/encryption.service';
6
- import { KeyGraphService } from '../cryptography/key-graph.service';
7
- import { LifeReadyConfig } from '../life-ready.config';
8
- import { LrApolloService } from './../api/lr-apollo.service';
9
- import { PassKeyBundle } from './auth.types';
10
- import { WebCryptoService } from '../cryptography/web-crypto.service';
11
- import { Duration } from 'moment';
12
- import { IdleService } from '../auth/idle.service';
13
- import { KeyFactoryService as KFS } from '../cryptography/key-factory.service';
14
- export interface PasswordChangeConfig {
15
- maxAuthAgeSeconds: number;
16
- authTime: string | Date;
17
- serverTime: string | Date;
18
- }
19
- export declare class PasswordCheck {
20
- length?: number;
21
- timeToCrack?: Duration;
22
- passwordExposed?: number;
23
- }
24
- export declare class PasswordService {
25
- private config;
26
- private http;
27
- private apollo;
28
- private auth;
29
- private profileService;
30
- private keyFactory;
31
- private encryptionService;
32
- private keyGraph;
33
- private webCryptoService;
34
- private idleService;
35
- private readonly CLIENT_NONCE_LENGTH;
36
- constructor(config: LifeReadyConfig, http: HttpClient, apollo: LrApolloService, auth: AuthClass, profileService: ProfileService, keyFactory: KFS, encryptionService: EncryptionService, keyGraph: KeyGraphService, webCryptoService: WebCryptoService, idleService: IdleService);
37
- checkPassword(password: string): Promise<PasswordCheck>;
38
- getExposureCount(password: string): Promise<number>;
39
- getPassIdpString(passIdp: JWK.Key): any;
40
- createPassKeyBundle(password: string): Promise<PassKeyBundle>;
41
- /**
42
- * We need to allow for interruption of the process at any point. Each API call can be considered
43
- * atomic and either succeeds or fails.
44
- *
45
- * The LR server APIs use semaphore tokens for locking critical operations, so concurrent calls will
46
- * fail.
47
- *
48
- * We assume the worst case for IdP API calls. So we use the semaphore token from LR to prevent
49
- * concurrent calls to IdP APIs, but we have to assume that the IdP API calls will either succeed or
50
- * fail within a reasonable amount of time.
51
- *
52
- * Each location where the server state changes can be a potential point of interruption.
53
- * Potential points of interruption are marked with: --Potential Failure Point--
54
- *
55
- * Places for timeout:
56
- * - Login age too old at call to: verifyPassword()
57
- * - Login age too old at call to: changePasswordMutation()
58
- * - Semaphore token expires at call to: changePasswordComplete()
59
- *
60
- * Tests:
61
- * - Potential Failure Point 1: should be able to restart the process, user remains signed in.
62
- * - Potential Failure Point 2: should enter recovery flow
63
- * - Potential Failure Point 3: should enter recovery flow
64
- * - Potential Failure Point 4: should enter recovery flow
65
- *
66
- */
67
- isLoginRequired(): Promise<boolean>;
68
- changePassword(password: string, newPassword: string): Promise<void>;
69
- changePasswordComplete(accessToken: string, useNewPassword: boolean, token?: string): Promise<any>;
70
- private getVerifierPrK;
71
- private verifyPassword;
72
- private changePasswordMutation;
73
- getChangePasswordConfig(): Promise<PasswordChangeConfig>;
74
- passwordStrength(password: any): {
75
- years: number;
76
- bits: number;
77
- };
78
- }
1
+ import { HttpClient } from '@angular/common/http';
2
+ import { AuthClass } from '@aws-amplify/auth/lib-esm/Auth';
3
+ import { JWK } from 'node-jose';
4
+ import { ProfileService } from '../users/profile.service';
5
+ import { EncryptionService } from '../cryptography/encryption.service';
6
+ import { KeyGraphService } from '../cryptography/key-graph.service';
7
+ import { LifeReadyConfig } from '../life-ready.config';
8
+ import { LrApolloService } from './../api/lr-apollo.service';
9
+ import { PassKeyBundle } from './auth.types';
10
+ import { WebCryptoService } from '../cryptography/web-crypto.service';
11
+ import { Duration } from 'moment';
12
+ import { IdleService } from '../auth/idle.service';
13
+ import { KeyFactoryService as KFS } from '../cryptography/key-factory.service';
14
+ export interface PasswordChangeConfig {
15
+ maxAuthAgeSeconds: number;
16
+ authTime: string | Date;
17
+ serverTime: string | Date;
18
+ }
19
+ export declare class PasswordCheck {
20
+ length?: number;
21
+ timeToCrack?: Duration;
22
+ passwordExposed?: number;
23
+ }
24
+ export declare class PasswordService {
25
+ private config;
26
+ private http;
27
+ private apollo;
28
+ private auth;
29
+ private profileService;
30
+ private keyFactory;
31
+ private encryptionService;
32
+ private keyGraph;
33
+ private webCryptoService;
34
+ private idleService;
35
+ private readonly CLIENT_NONCE_LENGTH;
36
+ constructor(config: LifeReadyConfig, http: HttpClient, apollo: LrApolloService, auth: AuthClass, profileService: ProfileService, keyFactory: KFS, encryptionService: EncryptionService, keyGraph: KeyGraphService, webCryptoService: WebCryptoService, idleService: IdleService);
37
+ checkPassword(password: string): Promise<PasswordCheck>;
38
+ getExposureCount(password: string): Promise<number>;
39
+ getPassIdpString(passIdp: JWK.Key): any;
40
+ createPassKeyBundle(password: string): Promise<PassKeyBundle>;
41
+ /**
42
+ * We need to allow for interruption of the process at any point. Each API call can be considered
43
+ * atomic and either succeeds or fails.
44
+ *
45
+ * The LR server APIs use semaphore tokens for locking critical operations, so concurrent calls will
46
+ * fail.
47
+ *
48
+ * We assume the worst case for IdP API calls. So we use the semaphore token from LR to prevent
49
+ * concurrent calls to IdP APIs, but we have to assume that the IdP API calls will either succeed or
50
+ * fail within a reasonable amount of time.
51
+ *
52
+ * Each location where the server state changes can be a potential point of interruption.
53
+ * Potential points of interruption are marked with: --Potential Failure Point--
54
+ *
55
+ * Places for timeout:
56
+ * - Login age too old at call to: verifyPassword()
57
+ * - Login age too old at call to: changePasswordMutation()
58
+ * - Semaphore token expires at call to: changePasswordComplete()
59
+ *
60
+ * Tests:
61
+ * - Potential Failure Point 1: should be able to restart the process, user remains signed in.
62
+ * - Potential Failure Point 2: should enter recovery flow
63
+ * - Potential Failure Point 3: should enter recovery flow
64
+ * - Potential Failure Point 4: should enter recovery flow
65
+ *
66
+ */
67
+ isLoginRequired(): Promise<boolean>;
68
+ changePassword(password: string, newPassword: string): Promise<void>;
69
+ changePasswordComplete(accessToken: string, useNewPassword: boolean, token?: string): Promise<any>;
70
+ private getVerifierPrK;
71
+ private verifyPassword;
72
+ private changePasswordMutation;
73
+ getChangePasswordConfig(): Promise<PasswordChangeConfig>;
74
+ passwordStrength(password: any): {
75
+ years: number;
76
+ bits: number;
77
+ };
78
+ }
@@ -1,25 +1,25 @@
1
- import { HttpClient } from '@angular/common/http';
2
- import { AuthClass } from '@aws-amplify/auth/lib-esm/Auth';
3
- import { EncryptionService } from '../cryptography/encryption.service';
4
- import { KeyFactoryService } from '../cryptography/key-factory.service';
5
- import { LifeReadyConfig } from '../life-ready.config';
6
- import { PasswordService } from './password.service';
7
- import { RegisterResult } from './auth.types';
8
- export declare class RegisterService {
9
- private config;
10
- private auth;
11
- private http;
12
- private keyFactory;
13
- private encryptionService;
14
- private passwordService;
15
- constructor(config: LifeReadyConfig, auth: AuthClass, http: HttpClient, keyFactory: KeyFactoryService, encryptionService: EncryptionService, passwordService: PasswordService);
16
- /**
17
- * Request a verification code to be sent out to an email.
18
- * @return Info needed to be submitted along with the verification code
19
- */
20
- verifyEmail(email: string): Promise<string>;
21
- verifyPhone(phoneNumber: string): Promise<string>;
22
- confirmVerificationCode(verificationId: string, verificationCode: string): Promise<string>;
23
- register(email: string, password: string, verificationId: string, verificationToken: string, verificationType?: 'email' | 'phone'): Promise<RegisterResult>;
24
- hibpBreachedAccounts(account: string): Promise<any>;
25
- }
1
+ import { HttpClient } from '@angular/common/http';
2
+ import { AuthClass } from '@aws-amplify/auth/lib-esm/Auth';
3
+ import { EncryptionService } from '../cryptography/encryption.service';
4
+ import { KeyFactoryService } from '../cryptography/key-factory.service';
5
+ import { LifeReadyConfig } from '../life-ready.config';
6
+ import { PasswordService } from './password.service';
7
+ import { RegisterResult } from './auth.types';
8
+ export declare class RegisterService {
9
+ private config;
10
+ private auth;
11
+ private http;
12
+ private keyFactory;
13
+ private encryptionService;
14
+ private passwordService;
15
+ constructor(config: LifeReadyConfig, auth: AuthClass, http: HttpClient, keyFactory: KeyFactoryService, encryptionService: EncryptionService, passwordService: PasswordService);
16
+ /**
17
+ * Request a verification code to be sent out to an email.
18
+ * @return Info needed to be submitted along with the verification code
19
+ */
20
+ verifyEmail(email: string): Promise<string>;
21
+ verifyPhone(phoneNumber: string): Promise<string>;
22
+ confirmVerificationCode(verificationId: string, verificationCode: string): Promise<string>;
23
+ register(email: string, password: string, verificationId: string, verificationToken: string, verificationType?: 'email' | 'phone'): Promise<RegisterResult>;
24
+ hibpBreachedAccounts(account: string): Promise<any>;
25
+ }
@@ -1,15 +1,15 @@
1
- import { AuthClass } from '@aws-amplify/auth/lib-esm/Auth';
2
- export declare class TwoFactorService {
3
- private auth;
4
- constructor(auth: AuthClass);
5
- getPreferredMFA(): Promise<string>;
6
- setPreferredMFA(method: 'TOTP' | 'SMS' | 'NOMFA'): Promise<void>;
7
- setPhoneNumber(phone: any): Promise<void>;
8
- getSMSCode(): Promise<void>;
9
- verifySMSCode(verificationCode: string): Promise<void>;
10
- getSoftwareToken(): Promise<{
11
- code: string;
12
- codeUri: string;
13
- }>;
14
- verifySoftwareToken(totpCode: string): Promise<void>;
15
- }
1
+ import { AuthClass } from '@aws-amplify/auth/lib-esm/Auth';
2
+ export declare class TwoFactorService {
3
+ private auth;
4
+ constructor(auth: AuthClass);
5
+ getPreferredMFA(): Promise<string>;
6
+ setPreferredMFA(method: 'TOTP' | 'SMS' | 'NOMFA'): Promise<void>;
7
+ setPhoneNumber(phone: any): Promise<void>;
8
+ getSMSCode(): Promise<void>;
9
+ verifySMSCode(verificationCode: string): Promise<void>;
10
+ getSoftwareToken(): Promise<{
11
+ code: string;
12
+ codeUri: string;
13
+ }>;
14
+ verifySoftwareToken(totpCode: string): Promise<void>;
15
+ }
@@ -1,23 +1,23 @@
1
- import { HttpClient } from '@angular/common/http';
2
- import { CategoryService } from './category.service';
3
- import { AccessLevel, CurrentCategory, DefaultCategory } from './category.types';
4
- export declare class LoadedCategoryTree {
5
- categories: CurrentCategory[];
6
- missingCategories: string[][];
7
- }
8
- export declare class CategoryMetaService {
9
- private http;
10
- private categoryService;
11
- private categories;
12
- constructor(http: HttpClient, categoryService: CategoryService);
13
- getCoreCategories(): Promise<DefaultCategory[]>;
14
- loadCategories(categoryTrees: string[][], selectedCategoryId?: string, trustedPartyId?: string): Promise<LoadedCategoryTree>;
15
- loadCategoriesForRole(categories: {
16
- category: string[];
17
- accessLevel: AccessLevel;
18
- }[]): Promise<{
19
- category: CurrentCategory;
20
- accessLevel: AccessLevel;
21
- }[]>;
22
- private loadCategory;
23
- }
1
+ import { HttpClient } from '@angular/common/http';
2
+ import { CategoryService } from './category.service';
3
+ import { AccessLevel, CurrentCategory, DefaultCategory } from './category.types';
4
+ export declare class LoadedCategoryTree {
5
+ categories: CurrentCategory[];
6
+ missingCategories: string[][];
7
+ }
8
+ export declare class CategoryMetaService {
9
+ private http;
10
+ private categoryService;
11
+ private categories;
12
+ constructor(http: HttpClient, categoryService: CategoryService);
13
+ getCoreCategories(): Promise<DefaultCategory[]>;
14
+ loadCategories(categoryTrees: string[][], selectedCategoryId?: string, trustedPartyId?: string): Promise<LoadedCategoryTree>;
15
+ loadCategoriesForRole(categories: {
16
+ category: string[];
17
+ accessLevel: AccessLevel;
18
+ }[]): Promise<{
19
+ category: CurrentCategory;
20
+ accessLevel: AccessLevel;
21
+ }[]>;
22
+ private loadCategory;
23
+ }
@@ -1,45 +1,45 @@
1
- import { HasKeyGraph } from './../cryptography/cryptography.types';
2
- import { HasEdges } from '../_common/types';
3
- export declare const DEFAULT_BREADCRUMB_DEPTH = 5;
4
- export declare const DEFAULT_DESCENDANTS_DEPTH = 5;
5
- export declare enum DirectoryType {
6
- Vault = "vault",
7
- Category = "category",
8
- Record = "record"
9
- }
10
- export declare const DefaultVaultFilter: string;
11
- export declare const CategoryFilter: string;
12
- export declare const RecordFilter: string;
13
- export declare const AccessFields = "\naccessRoles {\n role\n method\n inheritedFrom {\n id\n }\n trustedParty {\n id\n }\n isIssuer\n}";
14
- export declare const CategoryFields: string;
15
- export declare const VaultFields = "\n id\n keyId\n plainMeta\n cipherMeta\n";
16
- export declare const GetRootDirectoryIdsQuery: import("graphql").DocumentNode;
17
- export declare const GetCategoriesQuery: import("graphql").DocumentNode;
18
- export declare const GetVaultsQuery: import("graphql").DocumentNode;
19
- export interface GetTrustedPartyCategoriesQueryType extends HasKeyGraph {
20
- tp: {
21
- sharedItems: {
22
- list: HasEdges<any>;
23
- records: HasEdges<any>;
24
- };
25
- };
26
- }
27
- export declare const GetTrustedPartyCategoriesQuery: import("graphql").DocumentNode;
28
- export interface GetMySharedCategoriesQueryType extends HasKeyGraph {
29
- tp: {
30
- myItems: {
31
- list: HasEdges<any>;
32
- records: HasEdges<any>;
33
- };
34
- };
35
- }
36
- export declare const GetMySharedCategoriesQuery: import("graphql").DocumentNode;
37
- export declare const parentCategoriesField: (depth?: number) => any;
38
- export declare const GetCategoryQuery: (depth?: number) => import("graphql").DocumentNode;
39
- export declare const GetCategoryKeyIdQuery: import("graphql").DocumentNode;
40
- export declare const CreateCategoryMutation: import("graphql").DocumentNode;
41
- export declare const CreateVaultMutation: import("graphql").DocumentNode;
42
- export declare const UpdateCategoryMutation: import("graphql").DocumentNode;
43
- export declare const DeleteCategoryMutation: import("graphql").DocumentNode;
44
- export declare const ArchiveDirectoryMutation: import("graphql").DocumentNode;
45
- export declare const UnarchiveDirectoryMutation: import("graphql").DocumentNode;
1
+ import { HasKeyGraph } from './../cryptography/cryptography.types';
2
+ import { HasEdges } from '../_common/types';
3
+ export declare const DEFAULT_BREADCRUMB_DEPTH = 5;
4
+ export declare const DEFAULT_DESCENDANTS_DEPTH = 5;
5
+ export declare enum DirectoryType {
6
+ Vault = "vault",
7
+ Category = "category",
8
+ Record = "record"
9
+ }
10
+ export declare const DefaultVaultFilter: string;
11
+ export declare const CategoryFilter: string;
12
+ export declare const RecordFilter: string;
13
+ export declare const AccessFields = "\naccessRoles {\n role\n method\n inheritedFrom {\n id\n }\n trustedParty {\n id\n }\n isIssuer\n}";
14
+ export declare const CategoryFields: string;
15
+ export declare const VaultFields = "\n id\n keyId\n plainMeta\n cipherMeta\n";
16
+ export declare const GetRootDirectoryIdsQuery: import("graphql").DocumentNode;
17
+ export declare const GetCategoriesQuery: import("graphql").DocumentNode;
18
+ export declare const GetVaultsQuery: import("graphql").DocumentNode;
19
+ export interface GetTrustedPartyCategoriesQueryType extends HasKeyGraph {
20
+ tp: {
21
+ sharedItems: {
22
+ list: HasEdges<any>;
23
+ records: HasEdges<any>;
24
+ };
25
+ };
26
+ }
27
+ export declare const GetTrustedPartyCategoriesQuery: import("graphql").DocumentNode;
28
+ export interface GetMySharedCategoriesQueryType extends HasKeyGraph {
29
+ tp: {
30
+ myItems: {
31
+ list: HasEdges<any>;
32
+ records: HasEdges<any>;
33
+ };
34
+ };
35
+ }
36
+ export declare const GetMySharedCategoriesQuery: import("graphql").DocumentNode;
37
+ export declare const parentCategoriesField: (depth?: number) => any;
38
+ export declare const GetCategoryQuery: (depth?: number) => import("graphql").DocumentNode;
39
+ export declare const GetCategoryKeyIdQuery: import("graphql").DocumentNode;
40
+ export declare const CreateCategoryMutation: import("graphql").DocumentNode;
41
+ export declare const CreateVaultMutation: import("graphql").DocumentNode;
42
+ export declare const UpdateCategoryMutation: import("graphql").DocumentNode;
43
+ export declare const DeleteCategoryMutation: import("graphql").DocumentNode;
44
+ export declare const ArchiveDirectoryMutation: import("graphql").DocumentNode;
45
+ export declare const UnarchiveDirectoryMutation: import("graphql").DocumentNode;
@@ -1,67 +1,67 @@
1
- import { LrApolloService } from '../api/lr-apollo.service';
2
- import { KeyMetaService } from '../cryptography/key-meta.service';
3
- import { Category, NewCategory, UpdatedCategory, VaultCategory, VaultRecord, Vault } from './category.types';
4
- import { KeyGraphService } from '../cryptography/key-graph.service';
5
- export declare class CategoryService {
6
- private lrApollo;
7
- private keyMetaService;
8
- private keyGraph;
9
- constructor(lrApollo: LrApolloService, keyMetaService: KeyMetaService, keyGraph: KeyGraphService);
10
- getRootDirectoryIds(input?: {
11
- archived: boolean;
12
- }): Promise<string[]>;
13
- getDefaultVault(): Promise<Vault>;
14
- getCategories(input?: {
15
- archived: boolean;
16
- }): Promise<Category[]>;
17
- getTrustedPartyCategories(trustedPartyId: string): Promise<{
18
- categories: Category[];
19
- records?: VaultRecord[];
20
- }>;
21
- getMySharedCategories(trustedPartyId: string): Promise<{
22
- categories: Category[];
23
- records?: VaultRecord[];
24
- }>;
25
- getCategory(categoryId: string): Promise<VaultCategory>;
26
- private mapVaults;
27
- private mapCategories;
28
- private mapRecords;
29
- createDefaultVault(): Promise<string>;
30
- createCategory(newCategory: NewCategory): Promise<string>;
31
- updateCategory(categoryId: string, keyId: string, updatedCategory: UpdatedCategory): Promise<void>;
32
- setCategoryVisibility(categoryId: string, hide: boolean): Promise<void>;
33
- deleteCategory(categoryId: string): Promise<void>;
34
- archiveCategory(categoryId: string, recursive: boolean): Promise<void>;
35
- unarchiveCategory(categoryId: string, recursive: boolean): Promise<void>;
36
- archiveDirectory(directoryId: string, recursive: boolean): Promise<void>;
37
- unarchiveDirectory(directoryId: string, recursive: boolean): Promise<void>;
38
- mapVault(node: {
39
- id: any;
40
- keyId: any;
41
- plainMeta: any;
42
- cipherMeta: any;
43
- }): Promise<Vault>;
44
- mapParentCategories(category: {
45
- parentCategories: any;
46
- }): Promise<Category[]>;
47
- mapCategory(node: {
48
- id: any;
49
- keyId: any;
50
- plainMeta: any;
51
- cipherMeta: any;
52
- descendantDirectories: any;
53
- accessRoles: any[];
54
- archived: any;
55
- }): Promise<Category>;
56
- mapRecord(node: {
57
- id: any;
58
- keyId: any;
59
- plainMeta: any;
60
- cipherMeta: any;
61
- created: any;
62
- modified: any;
63
- content: any;
64
- accessRoles: any[];
65
- archived: any;
66
- }): Promise<VaultRecord>;
67
- }
1
+ import { LrApolloService } from '../api/lr-apollo.service';
2
+ import { KeyMetaService } from '../cryptography/key-meta.service';
3
+ import { Category, NewCategory, UpdatedCategory, VaultCategory, VaultRecord, Vault } from './category.types';
4
+ import { KeyGraphService } from '../cryptography/key-graph.service';
5
+ export declare class CategoryService {
6
+ private lrApollo;
7
+ private keyMetaService;
8
+ private keyGraph;
9
+ constructor(lrApollo: LrApolloService, keyMetaService: KeyMetaService, keyGraph: KeyGraphService);
10
+ getRootDirectoryIds(input?: {
11
+ archived: boolean;
12
+ }): Promise<string[]>;
13
+ getDefaultVault(): Promise<Vault>;
14
+ getCategories(input?: {
15
+ archived: boolean;
16
+ }): Promise<Category[]>;
17
+ getTrustedPartyCategories(trustedPartyId: string): Promise<{
18
+ categories: Category[];
19
+ records?: VaultRecord[];
20
+ }>;
21
+ getMySharedCategories(trustedPartyId: string): Promise<{
22
+ categories: Category[];
23
+ records?: VaultRecord[];
24
+ }>;
25
+ getCategory(categoryId: string): Promise<VaultCategory>;
26
+ private mapVaults;
27
+ private mapCategories;
28
+ private mapRecords;
29
+ createDefaultVault(): Promise<string>;
30
+ createCategory(newCategory: NewCategory): Promise<string>;
31
+ updateCategory(categoryId: string, keyId: string, updatedCategory: UpdatedCategory): Promise<void>;
32
+ setCategoryVisibility(categoryId: string, hide: boolean): Promise<void>;
33
+ deleteCategory(categoryId: string): Promise<void>;
34
+ archiveCategory(categoryId: string, recursive: boolean): Promise<void>;
35
+ unarchiveCategory(categoryId: string, recursive: boolean): Promise<void>;
36
+ archiveDirectory(directoryId: string, recursive: boolean): Promise<void>;
37
+ unarchiveDirectory(directoryId: string, recursive: boolean): Promise<void>;
38
+ mapVault(node: {
39
+ id: any;
40
+ keyId: any;
41
+ plainMeta: any;
42
+ cipherMeta: any;
43
+ }): Promise<Vault>;
44
+ mapParentCategories(category: {
45
+ parentCategories: any;
46
+ }): Promise<Category[]>;
47
+ mapCategory(node: {
48
+ id: any;
49
+ keyId: any;
50
+ plainMeta: any;
51
+ cipherMeta: any;
52
+ descendantDirectories: any;
53
+ accessRoles: any[];
54
+ archived: any;
55
+ }): Promise<Category>;
56
+ mapRecord(node: {
57
+ id: any;
58
+ keyId: any;
59
+ plainMeta: any;
60
+ cipherMeta: any;
61
+ created: any;
62
+ modified: any;
63
+ content: any;
64
+ accessRoles: any[];
65
+ archived: any;
66
+ }): Promise<VaultRecord>;
67
+ }