@lifeready/core 1.0.2 → 1.0.4
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +62 -62
- package/bundles/lifeready-core.umd.js +15445 -15445
- package/bundles/lifeready-core.umd.js.map +1 -1
- package/bundles/lifeready-core.umd.min.js.map +1 -1
- package/esm2015/lib/_common/ast.js +40 -40
- package/esm2015/lib/_common/deferred-promise.js +24 -24
- package/esm2015/lib/_common/exceptions.js +157 -157
- package/esm2015/lib/_common/queries.gql.js +190 -190
- package/esm2015/lib/_common/run-outside-angular.js +79 -79
- package/esm2015/lib/_common/types.js +1 -1
- package/esm2015/lib/_common/utils.js +44 -44
- package/esm2015/lib/api/contact-card.gql.js +79 -79
- package/esm2015/lib/api/contact-card.service.js +154 -154
- package/esm2015/lib/api/contact-card2.gql.js +60 -60
- package/esm2015/lib/api/contact-card2.service.js +103 -103
- package/esm2015/lib/api/file.service.js +74 -74
- package/esm2015/lib/api/item2.gql.js +110 -110
- package/esm2015/lib/api/item2.service.js +311 -311
- package/esm2015/lib/api/key-exchange.gql.js +188 -188
- package/esm2015/lib/api/key-exchange.service.js +442 -442
- package/esm2015/lib/api/key-exchange.types.js +18 -18
- package/esm2015/lib/api/key-exchange2.gql.js +171 -171
- package/esm2015/lib/api/key-exchange2.service.js +479 -479
- package/esm2015/lib/api/lock.gql.js +40 -40
- package/esm2015/lib/api/lock.service.js +64 -64
- package/esm2015/lib/api/lr-apollo.service.js +46 -46
- package/esm2015/lib/api/lr-graphql/index.js +6 -6
- package/esm2015/lib/api/lr-graphql/lr-graphql.service.js +155 -155
- package/esm2015/lib/api/lr-graphql/lr-merged-mutation.js +213 -213
- package/esm2015/lib/api/lr-graphql/lr-mutation-base.js +51 -51
- package/esm2015/lib/api/lr-graphql/lr-mutation.js +48 -48
- package/esm2015/lib/api/lr-graphql/lr.service.js +18 -18
- package/esm2015/lib/api/message.service.js +138 -138
- package/esm2015/lib/api/persist.service.js +181 -181
- package/esm2015/lib/api/query-processor/common-processors.service.js +93 -93
- package/esm2015/lib/api/query-processor/index.js +3 -3
- package/esm2015/lib/api/query-processor/query-processor.service.js +192 -192
- package/esm2015/lib/api/query-processor/tp-password-reset-processor.service.js +109 -109
- package/esm2015/lib/api/shared-contact-card.service.js +119 -119
- package/esm2015/lib/api/shared-contact-card2.gql.js +41 -41
- package/esm2015/lib/api/shared-contact-card2.service.js +117 -117
- package/esm2015/lib/api/time.service.js +146 -146
- package/esm2015/lib/api/types/graphql.types.js +7 -7
- package/esm2015/lib/api/types/index.js +3 -3
- package/esm2015/lib/api/types/lr-graphql.types.js +71 -71
- package/esm2015/lib/auth/auth.config.js +57 -57
- package/esm2015/lib/auth/auth.gql.js +48 -48
- package/esm2015/lib/auth/auth.types.js +27 -27
- package/esm2015/lib/auth/idle.service.js +168 -168
- package/esm2015/lib/auth/idle.types.js +7 -7
- package/esm2015/lib/auth/lbop.service.js +355 -355
- package/esm2015/lib/auth/life-ready-auth.service.js +500 -500
- package/esm2015/lib/auth/password.service.js +320 -320
- package/esm2015/lib/auth/register.service.js +172 -172
- package/esm2015/lib/auth/two-factor.service.js +74 -74
- package/esm2015/lib/category/category-meta.service.js +99 -99
- package/esm2015/lib/category/category.gql.js +406 -406
- package/esm2015/lib/category/category.service.js +390 -390
- package/esm2015/lib/category/category.types.js +29 -29
- package/esm2015/lib/cryptography/cryptography.types.js +11 -11
- package/esm2015/lib/cryptography/encryption.service.js +189 -189
- package/esm2015/lib/cryptography/key-factory.service.js +237 -237
- package/esm2015/lib/cryptography/key-graph.service.js +280 -280
- package/esm2015/lib/cryptography/key-meta.service.js +200 -200
- package/esm2015/lib/cryptography/key.service.js +124 -124
- package/esm2015/lib/cryptography/slip39.service.js +169 -169
- package/esm2015/lib/cryptography/web-crypto.service.js +29 -29
- package/esm2015/lib/life-ready.config.js +84 -84
- package/esm2015/lib/life-ready.module.js +74 -74
- package/esm2015/lib/plan/plan.gql.js +123 -123
- package/esm2015/lib/plan/plan.service.js +149 -149
- package/esm2015/lib/plan/plan.types.js +11 -11
- package/esm2015/lib/record/record-attachment.service.js +101 -101
- package/esm2015/lib/record/record.gql.js +179 -179
- package/esm2015/lib/record/record.service.js +206 -206
- package/esm2015/lib/record/record.types.js +15 -15
- package/esm2015/lib/record-type/record-type.service.js +75 -75
- package/esm2015/lib/record-type/record-type.types.js +28 -28
- package/esm2015/lib/scenario/approvals/scenario-approval.gql.js +105 -105
- package/esm2015/lib/scenario/approvals/scenario-approval.types.js +1 -1
- package/esm2015/lib/scenario/approvals/scenario-approver.service.js +300 -300
- package/esm2015/lib/scenario/claimants/scenario-claimant.gql.js +52 -52
- package/esm2015/lib/scenario/claimants/scenario-claimant.service.js +97 -97
- package/esm2015/lib/scenario/claimants/scenario-claimant.types.js +1 -1
- package/esm2015/lib/scenario/receivers/scenario-receiver.gql.js +150 -150
- package/esm2015/lib/scenario/receivers/scenario-receiver.service.js +229 -229
- package/esm2015/lib/scenario/receivers/scenario-receiver.types.js +1 -1
- package/esm2015/lib/scenario/scenario-setup.service.js +269 -269
- package/esm2015/lib/scenario/scenario.gql.js +368 -368
- package/esm2015/lib/scenario/scenario.service.js +611 -611
- package/esm2015/lib/scenario/scenario.types.js +64 -64
- package/esm2015/lib/search/search.gql.js +62 -62
- package/esm2015/lib/search/search.service.js +156 -156
- package/esm2015/lib/search/search.types.js +6 -6
- package/esm2015/lib/trusted-parties/tp-password-reset-request.service.js +112 -112
- package/esm2015/lib/trusted-parties/tp-password-reset-user.service.js +129 -129
- package/esm2015/lib/trusted-parties/tp-password-reset.constants.js +4 -4
- package/esm2015/lib/trusted-parties/tp-password-reset.gql.js +232 -232
- package/esm2015/lib/trusted-parties/tp-password-reset.service.js +299 -299
- package/esm2015/lib/trusted-parties/trusted-party.gql.js +148 -148
- package/esm2015/lib/trusted-parties/trusted-party.service.js +326 -326
- package/esm2015/lib/trusted-parties/trusted-party.types.js +41 -41
- package/esm2015/lib/trusted-parties/trusted-party2.gql.js +87 -87
- package/esm2015/lib/trusted-parties/trusted-party2.service.js +215 -215
- package/esm2015/lib/users/profile-details.service.js +214 -214
- package/esm2015/lib/users/profile.gql.js +97 -97
- package/esm2015/lib/users/profile.service.js +169 -169
- package/esm2015/lib/users/profile.types.js +34 -34
- package/esm2015/lib/users/user.gql.js +60 -60
- package/esm2015/lib/users/user.service.js +79 -79
- package/esm2015/lib/users/user.types.js +5 -5
- package/esm2015/lifeready-core.js +10 -10
- package/esm2015/public-api.js +81 -81
- package/fesm2015/lifeready-core.js +13088 -13088
- package/fesm2015/lifeready-core.js.map +1 -1
- package/lib/_common/ast.d.ts +11 -11
- package/lib/_common/deferred-promise.d.ts +12 -12
- package/lib/_common/exceptions.d.ts +109 -109
- package/lib/_common/queries.gql.d.ts +10 -10
- package/lib/_common/run-outside-angular.d.ts +14 -14
- package/lib/_common/types.d.ts +10 -10
- package/lib/_common/utils.d.ts +3 -3
- package/lib/api/contact-card.gql.d.ts +7 -7
- package/lib/api/contact-card.service.d.ts +52 -52
- package/lib/api/contact-card2.gql.d.ts +34 -34
- package/lib/api/contact-card2.service.d.ts +49 -49
- package/lib/api/file.service.d.ts +18 -18
- package/lib/api/item2.gql.d.ts +96 -96
- package/lib/api/item2.service.d.ts +177 -177
- package/lib/api/key-exchange.gql.d.ts +9 -9
- package/lib/api/key-exchange.service.d.ts +39 -39
- package/lib/api/key-exchange.types.d.ts +196 -196
- package/lib/api/key-exchange2.gql.d.ts +125 -125
- package/lib/api/key-exchange2.service.d.ts +187 -187
- package/lib/api/lock.gql.d.ts +27 -27
- package/lib/api/lock.service.d.ts +25 -25
- package/lib/api/lr-apollo.service.d.ts +15 -15
- package/lib/api/lr-graphql/index.d.ts +5 -5
- package/lib/api/lr-graphql/lr-graphql.service.d.ts +60 -60
- package/lib/api/lr-graphql/lr-merged-mutation.d.ts +27 -27
- package/lib/api/lr-graphql/lr-mutation-base.d.ts +28 -28
- package/lib/api/lr-graphql/lr-mutation.d.ts +8 -8
- package/lib/api/lr-graphql/lr.service.d.ts +9 -9
- package/lib/api/message.service.d.ts +58 -58
- package/lib/api/persist.service.d.ts +31 -31
- package/lib/api/query-processor/common-processors.service.d.ts +36 -36
- package/lib/api/query-processor/index.d.ts +2 -2
- package/lib/api/query-processor/query-processor.service.d.ts +18 -18
- package/lib/api/query-processor/tp-password-reset-processor.service.d.ts +15 -15
- package/lib/api/shared-contact-card.service.d.ts +33 -33
- package/lib/api/shared-contact-card2.gql.d.ts +36 -36
- package/lib/api/shared-contact-card2.service.d.ts +45 -45
- package/lib/api/time.service.d.ts +16 -16
- package/lib/api/types/graphql.types.d.ts +29 -29
- package/lib/api/types/index.d.ts +2 -2
- package/lib/api/types/lr-graphql.types.d.ts +385 -385
- package/lib/auth/auth.config.d.ts +5 -5
- package/lib/auth/auth.gql.d.ts +15 -15
- package/lib/auth/auth.types.d.ts +66 -66
- package/lib/auth/idle.service.d.ts +40 -40
- package/lib/auth/idle.types.d.ts +10 -10
- package/lib/auth/lbop.service.d.ts +91 -91
- package/lib/auth/life-ready-auth.service.d.ts +59 -59
- package/lib/auth/password.service.d.ts +78 -78
- package/lib/auth/register.service.d.ts +25 -25
- package/lib/auth/two-factor.service.d.ts +15 -15
- package/lib/category/category-meta.service.d.ts +23 -23
- package/lib/category/category.gql.d.ts +45 -45
- package/lib/category/category.service.d.ts +67 -67
- package/lib/category/category.types.d.ts +79 -79
- package/lib/cryptography/cryptography.types.d.ts +83 -83
- package/lib/cryptography/encryption.service.d.ts +41 -41
- package/lib/cryptography/key-factory.service.d.ts +38 -38
- package/lib/cryptography/key-graph.service.d.ts +33 -33
- package/lib/cryptography/key-meta.service.d.ts +44 -44
- package/lib/cryptography/key.service.d.ts +36 -36
- package/lib/cryptography/slip39.service.d.ts +43 -43
- package/lib/cryptography/web-crypto.service.d.ts +5 -5
- package/lib/life-ready.config.d.ts +14 -14
- package/lib/life-ready.module.d.ts +5 -5
- package/lib/plan/plan.gql.d.ts +11 -11
- package/lib/plan/plan.service.d.ts +33 -33
- package/lib/plan/plan.types.d.ts +31 -31
- package/lib/record/record-attachment.service.d.ts +16 -16
- package/lib/record/record.gql.d.ts +14 -14
- package/lib/record/record.service.d.ts +25 -25
- package/lib/record/record.types.d.ts +57 -57
- package/lib/record-type/record-type.service.d.ts +11 -11
- package/lib/record-type/record-type.types.d.ts +50 -50
- package/lib/scenario/approvals/scenario-approval.gql.d.ts +7 -7
- package/lib/scenario/approvals/scenario-approval.types.d.ts +63 -63
- package/lib/scenario/approvals/scenario-approver.service.d.ts +32 -32
- package/lib/scenario/claimants/scenario-claimant.gql.d.ts +5 -5
- package/lib/scenario/claimants/scenario-claimant.service.d.ts +17 -17
- package/lib/scenario/claimants/scenario-claimant.types.d.ts +18 -18
- package/lib/scenario/receivers/scenario-receiver.gql.d.ts +8 -8
- package/lib/scenario/receivers/scenario-receiver.service.d.ts +30 -30
- package/lib/scenario/receivers/scenario-receiver.types.d.ts +54 -54
- package/lib/scenario/scenario-setup.service.d.ts +22 -22
- package/lib/scenario/scenario.gql.d.ts +34 -34
- package/lib/scenario/scenario.service.d.ts +58 -58
- package/lib/scenario/scenario.types.d.ts +217 -217
- package/lib/search/search.gql.d.ts +1 -1
- package/lib/search/search.service.d.ts +25 -25
- package/lib/search/search.types.d.ts +20 -20
- package/lib/trusted-parties/tp-password-reset-request.service.d.ts +20 -20
- package/lib/trusted-parties/tp-password-reset-user.service.d.ts +35 -35
- package/lib/trusted-parties/tp-password-reset.constants.d.ts +3 -3
- package/lib/trusted-parties/tp-password-reset.gql.d.ts +218 -218
- package/lib/trusted-parties/tp-password-reset.service.d.ts +130 -130
- package/lib/trusted-parties/trusted-party.gql.d.ts +9 -9
- package/lib/trusted-parties/trusted-party.service.d.ts +44 -44
- package/lib/trusted-parties/trusted-party.types.d.ts +102 -102
- package/lib/trusted-parties/trusted-party2.gql.d.ts +79 -79
- package/lib/trusted-parties/trusted-party2.service.d.ts +114 -114
- package/lib/users/profile-details.service.d.ts +21 -21
- package/lib/users/profile.gql.d.ts +11 -11
- package/lib/users/profile.service.d.ts +35 -35
- package/lib/users/profile.types.d.ts +96 -96
- package/lib/users/user.gql.d.ts +9 -9
- package/lib/users/user.service.d.ts +12 -12
- package/lib/users/user.types.d.ts +23 -23
- package/lifeready-core.d.ts +9 -9
- package/package.json +1 -1
- package/public-api.d.ts +77 -77
|
@@ -1,78 +1,78 @@
|
|
|
1
|
-
import { HttpClient } from '@angular/common/http';
|
|
2
|
-
import { AuthClass } from '@aws-amplify/auth/lib-esm/Auth';
|
|
3
|
-
import { JWK } from 'node-jose';
|
|
4
|
-
import { ProfileService } from '../users/profile.service';
|
|
5
|
-
import { EncryptionService } from '../cryptography/encryption.service';
|
|
6
|
-
import { KeyGraphService } from '../cryptography/key-graph.service';
|
|
7
|
-
import { LifeReadyConfig } from '../life-ready.config';
|
|
8
|
-
import { LrApolloService } from './../api/lr-apollo.service';
|
|
9
|
-
import { PassKeyBundle } from './auth.types';
|
|
10
|
-
import { WebCryptoService } from '../cryptography/web-crypto.service';
|
|
11
|
-
import { Duration } from 'moment';
|
|
12
|
-
import { IdleService } from '../auth/idle.service';
|
|
13
|
-
import { KeyFactoryService as KFS } from '../cryptography/key-factory.service';
|
|
14
|
-
export interface PasswordChangeConfig {
|
|
15
|
-
maxAuthAgeSeconds: number;
|
|
16
|
-
authTime: string | Date;
|
|
17
|
-
serverTime: string | Date;
|
|
18
|
-
}
|
|
19
|
-
export declare class PasswordCheck {
|
|
20
|
-
length?: number;
|
|
21
|
-
timeToCrack?: Duration;
|
|
22
|
-
passwordExposed?: number;
|
|
23
|
-
}
|
|
24
|
-
export declare class PasswordService {
|
|
25
|
-
private config;
|
|
26
|
-
private http;
|
|
27
|
-
private apollo;
|
|
28
|
-
private auth;
|
|
29
|
-
private profileService;
|
|
30
|
-
private keyFactory;
|
|
31
|
-
private encryptionService;
|
|
32
|
-
private keyGraph;
|
|
33
|
-
private webCryptoService;
|
|
34
|
-
private idleService;
|
|
35
|
-
private readonly CLIENT_NONCE_LENGTH;
|
|
36
|
-
constructor(config: LifeReadyConfig, http: HttpClient, apollo: LrApolloService, auth: AuthClass, profileService: ProfileService, keyFactory: KFS, encryptionService: EncryptionService, keyGraph: KeyGraphService, webCryptoService: WebCryptoService, idleService: IdleService);
|
|
37
|
-
checkPassword(password: string): Promise<PasswordCheck>;
|
|
38
|
-
getExposureCount(password: string): Promise<number>;
|
|
39
|
-
getPassIdpString(passIdp: JWK.Key): any;
|
|
40
|
-
createPassKeyBundle(password: string): Promise<PassKeyBundle>;
|
|
41
|
-
/**
|
|
42
|
-
* We need to allow for interruption of the process at any point. Each API call can be considered
|
|
43
|
-
* atomic and either succeeds or fails.
|
|
44
|
-
*
|
|
45
|
-
* The LR server APIs use semaphore tokens for locking critical operations, so concurrent calls will
|
|
46
|
-
* fail.
|
|
47
|
-
*
|
|
48
|
-
* We assume the worst case for IdP API calls. So we use the semaphore token from LR to prevent
|
|
49
|
-
* concurrent calls to IdP APIs, but we have to assume that the IdP API calls will either succeed or
|
|
50
|
-
* fail within a reasonable amount of time.
|
|
51
|
-
*
|
|
52
|
-
* Each location where the server state changes can be a potential point of interruption.
|
|
53
|
-
* Potential points of interruption are marked with: --Potential Failure Point--
|
|
54
|
-
*
|
|
55
|
-
* Places for timeout:
|
|
56
|
-
* - Login age too old at call to: verifyPassword()
|
|
57
|
-
* - Login age too old at call to: changePasswordMutation()
|
|
58
|
-
* - Semaphore token expires at call to: changePasswordComplete()
|
|
59
|
-
*
|
|
60
|
-
* Tests:
|
|
61
|
-
* - Potential Failure Point 1: should be able to restart the process, user remains signed in.
|
|
62
|
-
* - Potential Failure Point 2: should enter recovery flow
|
|
63
|
-
* - Potential Failure Point 3: should enter recovery flow
|
|
64
|
-
* - Potential Failure Point 4: should enter recovery flow
|
|
65
|
-
*
|
|
66
|
-
*/
|
|
67
|
-
isLoginRequired(): Promise<boolean>;
|
|
68
|
-
changePassword(password: string, newPassword: string): Promise<void>;
|
|
69
|
-
changePasswordComplete(accessToken: string, useNewPassword: boolean, token?: string): Promise<any>;
|
|
70
|
-
private getVerifierPrK;
|
|
71
|
-
private verifyPassword;
|
|
72
|
-
private changePasswordMutation;
|
|
73
|
-
getChangePasswordConfig(): Promise<PasswordChangeConfig>;
|
|
74
|
-
passwordStrength(password: any): {
|
|
75
|
-
years: number;
|
|
76
|
-
bits: number;
|
|
77
|
-
};
|
|
78
|
-
}
|
|
1
|
+
import { HttpClient } from '@angular/common/http';
|
|
2
|
+
import { AuthClass } from '@aws-amplify/auth/lib-esm/Auth';
|
|
3
|
+
import { JWK } from 'node-jose';
|
|
4
|
+
import { ProfileService } from '../users/profile.service';
|
|
5
|
+
import { EncryptionService } from '../cryptography/encryption.service';
|
|
6
|
+
import { KeyGraphService } from '../cryptography/key-graph.service';
|
|
7
|
+
import { LifeReadyConfig } from '../life-ready.config';
|
|
8
|
+
import { LrApolloService } from './../api/lr-apollo.service';
|
|
9
|
+
import { PassKeyBundle } from './auth.types';
|
|
10
|
+
import { WebCryptoService } from '../cryptography/web-crypto.service';
|
|
11
|
+
import { Duration } from 'moment';
|
|
12
|
+
import { IdleService } from '../auth/idle.service';
|
|
13
|
+
import { KeyFactoryService as KFS } from '../cryptography/key-factory.service';
|
|
14
|
+
export interface PasswordChangeConfig {
|
|
15
|
+
maxAuthAgeSeconds: number;
|
|
16
|
+
authTime: string | Date;
|
|
17
|
+
serverTime: string | Date;
|
|
18
|
+
}
|
|
19
|
+
export declare class PasswordCheck {
|
|
20
|
+
length?: number;
|
|
21
|
+
timeToCrack?: Duration;
|
|
22
|
+
passwordExposed?: number;
|
|
23
|
+
}
|
|
24
|
+
export declare class PasswordService {
|
|
25
|
+
private config;
|
|
26
|
+
private http;
|
|
27
|
+
private apollo;
|
|
28
|
+
private auth;
|
|
29
|
+
private profileService;
|
|
30
|
+
private keyFactory;
|
|
31
|
+
private encryptionService;
|
|
32
|
+
private keyGraph;
|
|
33
|
+
private webCryptoService;
|
|
34
|
+
private idleService;
|
|
35
|
+
private readonly CLIENT_NONCE_LENGTH;
|
|
36
|
+
constructor(config: LifeReadyConfig, http: HttpClient, apollo: LrApolloService, auth: AuthClass, profileService: ProfileService, keyFactory: KFS, encryptionService: EncryptionService, keyGraph: KeyGraphService, webCryptoService: WebCryptoService, idleService: IdleService);
|
|
37
|
+
checkPassword(password: string): Promise<PasswordCheck>;
|
|
38
|
+
getExposureCount(password: string): Promise<number>;
|
|
39
|
+
getPassIdpString(passIdp: JWK.Key): any;
|
|
40
|
+
createPassKeyBundle(password: string): Promise<PassKeyBundle>;
|
|
41
|
+
/**
|
|
42
|
+
* We need to allow for interruption of the process at any point. Each API call can be considered
|
|
43
|
+
* atomic and either succeeds or fails.
|
|
44
|
+
*
|
|
45
|
+
* The LR server APIs use semaphore tokens for locking critical operations, so concurrent calls will
|
|
46
|
+
* fail.
|
|
47
|
+
*
|
|
48
|
+
* We assume the worst case for IdP API calls. So we use the semaphore token from LR to prevent
|
|
49
|
+
* concurrent calls to IdP APIs, but we have to assume that the IdP API calls will either succeed or
|
|
50
|
+
* fail within a reasonable amount of time.
|
|
51
|
+
*
|
|
52
|
+
* Each location where the server state changes can be a potential point of interruption.
|
|
53
|
+
* Potential points of interruption are marked with: --Potential Failure Point--
|
|
54
|
+
*
|
|
55
|
+
* Places for timeout:
|
|
56
|
+
* - Login age too old at call to: verifyPassword()
|
|
57
|
+
* - Login age too old at call to: changePasswordMutation()
|
|
58
|
+
* - Semaphore token expires at call to: changePasswordComplete()
|
|
59
|
+
*
|
|
60
|
+
* Tests:
|
|
61
|
+
* - Potential Failure Point 1: should be able to restart the process, user remains signed in.
|
|
62
|
+
* - Potential Failure Point 2: should enter recovery flow
|
|
63
|
+
* - Potential Failure Point 3: should enter recovery flow
|
|
64
|
+
* - Potential Failure Point 4: should enter recovery flow
|
|
65
|
+
*
|
|
66
|
+
*/
|
|
67
|
+
isLoginRequired(): Promise<boolean>;
|
|
68
|
+
changePassword(password: string, newPassword: string): Promise<void>;
|
|
69
|
+
changePasswordComplete(accessToken: string, useNewPassword: boolean, token?: string): Promise<any>;
|
|
70
|
+
private getVerifierPrK;
|
|
71
|
+
private verifyPassword;
|
|
72
|
+
private changePasswordMutation;
|
|
73
|
+
getChangePasswordConfig(): Promise<PasswordChangeConfig>;
|
|
74
|
+
passwordStrength(password: any): {
|
|
75
|
+
years: number;
|
|
76
|
+
bits: number;
|
|
77
|
+
};
|
|
78
|
+
}
|
|
@@ -1,25 +1,25 @@
|
|
|
1
|
-
import { HttpClient } from '@angular/common/http';
|
|
2
|
-
import { AuthClass } from '@aws-amplify/auth/lib-esm/Auth';
|
|
3
|
-
import { EncryptionService } from '../cryptography/encryption.service';
|
|
4
|
-
import { KeyFactoryService } from '../cryptography/key-factory.service';
|
|
5
|
-
import { LifeReadyConfig } from '../life-ready.config';
|
|
6
|
-
import { PasswordService } from './password.service';
|
|
7
|
-
import { RegisterResult } from './auth.types';
|
|
8
|
-
export declare class RegisterService {
|
|
9
|
-
private config;
|
|
10
|
-
private auth;
|
|
11
|
-
private http;
|
|
12
|
-
private keyFactory;
|
|
13
|
-
private encryptionService;
|
|
14
|
-
private passwordService;
|
|
15
|
-
constructor(config: LifeReadyConfig, auth: AuthClass, http: HttpClient, keyFactory: KeyFactoryService, encryptionService: EncryptionService, passwordService: PasswordService);
|
|
16
|
-
/**
|
|
17
|
-
* Request a verification code to be sent out to an email.
|
|
18
|
-
* @return Info needed to be submitted along with the verification code
|
|
19
|
-
*/
|
|
20
|
-
verifyEmail(email: string): Promise<string>;
|
|
21
|
-
verifyPhone(phoneNumber: string): Promise<string>;
|
|
22
|
-
confirmVerificationCode(verificationId: string, verificationCode: string): Promise<string>;
|
|
23
|
-
register(email: string, password: string, verificationId: string, verificationToken: string, verificationType?: 'email' | 'phone'): Promise<RegisterResult>;
|
|
24
|
-
hibpBreachedAccounts(account: string): Promise<any>;
|
|
25
|
-
}
|
|
1
|
+
import { HttpClient } from '@angular/common/http';
|
|
2
|
+
import { AuthClass } from '@aws-amplify/auth/lib-esm/Auth';
|
|
3
|
+
import { EncryptionService } from '../cryptography/encryption.service';
|
|
4
|
+
import { KeyFactoryService } from '../cryptography/key-factory.service';
|
|
5
|
+
import { LifeReadyConfig } from '../life-ready.config';
|
|
6
|
+
import { PasswordService } from './password.service';
|
|
7
|
+
import { RegisterResult } from './auth.types';
|
|
8
|
+
export declare class RegisterService {
|
|
9
|
+
private config;
|
|
10
|
+
private auth;
|
|
11
|
+
private http;
|
|
12
|
+
private keyFactory;
|
|
13
|
+
private encryptionService;
|
|
14
|
+
private passwordService;
|
|
15
|
+
constructor(config: LifeReadyConfig, auth: AuthClass, http: HttpClient, keyFactory: KeyFactoryService, encryptionService: EncryptionService, passwordService: PasswordService);
|
|
16
|
+
/**
|
|
17
|
+
* Request a verification code to be sent out to an email.
|
|
18
|
+
* @return Info needed to be submitted along with the verification code
|
|
19
|
+
*/
|
|
20
|
+
verifyEmail(email: string): Promise<string>;
|
|
21
|
+
verifyPhone(phoneNumber: string): Promise<string>;
|
|
22
|
+
confirmVerificationCode(verificationId: string, verificationCode: string): Promise<string>;
|
|
23
|
+
register(email: string, password: string, verificationId: string, verificationToken: string, verificationType?: 'email' | 'phone'): Promise<RegisterResult>;
|
|
24
|
+
hibpBreachedAccounts(account: string): Promise<any>;
|
|
25
|
+
}
|
|
@@ -1,15 +1,15 @@
|
|
|
1
|
-
import { AuthClass } from '@aws-amplify/auth/lib-esm/Auth';
|
|
2
|
-
export declare class TwoFactorService {
|
|
3
|
-
private auth;
|
|
4
|
-
constructor(auth: AuthClass);
|
|
5
|
-
getPreferredMFA(): Promise<string>;
|
|
6
|
-
setPreferredMFA(method: 'TOTP' | 'SMS' | 'NOMFA'): Promise<void>;
|
|
7
|
-
setPhoneNumber(phone: any): Promise<void>;
|
|
8
|
-
getSMSCode(): Promise<void>;
|
|
9
|
-
verifySMSCode(verificationCode: string): Promise<void>;
|
|
10
|
-
getSoftwareToken(): Promise<{
|
|
11
|
-
code: string;
|
|
12
|
-
codeUri: string;
|
|
13
|
-
}>;
|
|
14
|
-
verifySoftwareToken(totpCode: string): Promise<void>;
|
|
15
|
-
}
|
|
1
|
+
import { AuthClass } from '@aws-amplify/auth/lib-esm/Auth';
|
|
2
|
+
export declare class TwoFactorService {
|
|
3
|
+
private auth;
|
|
4
|
+
constructor(auth: AuthClass);
|
|
5
|
+
getPreferredMFA(): Promise<string>;
|
|
6
|
+
setPreferredMFA(method: 'TOTP' | 'SMS' | 'NOMFA'): Promise<void>;
|
|
7
|
+
setPhoneNumber(phone: any): Promise<void>;
|
|
8
|
+
getSMSCode(): Promise<void>;
|
|
9
|
+
verifySMSCode(verificationCode: string): Promise<void>;
|
|
10
|
+
getSoftwareToken(): Promise<{
|
|
11
|
+
code: string;
|
|
12
|
+
codeUri: string;
|
|
13
|
+
}>;
|
|
14
|
+
verifySoftwareToken(totpCode: string): Promise<void>;
|
|
15
|
+
}
|
|
@@ -1,23 +1,23 @@
|
|
|
1
|
-
import { HttpClient } from '@angular/common/http';
|
|
2
|
-
import { CategoryService } from './category.service';
|
|
3
|
-
import { AccessLevel, CurrentCategory, DefaultCategory } from './category.types';
|
|
4
|
-
export declare class LoadedCategoryTree {
|
|
5
|
-
categories: CurrentCategory[];
|
|
6
|
-
missingCategories: string[][];
|
|
7
|
-
}
|
|
8
|
-
export declare class CategoryMetaService {
|
|
9
|
-
private http;
|
|
10
|
-
private categoryService;
|
|
11
|
-
private categories;
|
|
12
|
-
constructor(http: HttpClient, categoryService: CategoryService);
|
|
13
|
-
getCoreCategories(): Promise<DefaultCategory[]>;
|
|
14
|
-
loadCategories(categoryTrees: string[][], selectedCategoryId?: string, trustedPartyId?: string): Promise<LoadedCategoryTree>;
|
|
15
|
-
loadCategoriesForRole(categories: {
|
|
16
|
-
category: string[];
|
|
17
|
-
accessLevel: AccessLevel;
|
|
18
|
-
}[]): Promise<{
|
|
19
|
-
category: CurrentCategory;
|
|
20
|
-
accessLevel: AccessLevel;
|
|
21
|
-
}[]>;
|
|
22
|
-
private loadCategory;
|
|
23
|
-
}
|
|
1
|
+
import { HttpClient } from '@angular/common/http';
|
|
2
|
+
import { CategoryService } from './category.service';
|
|
3
|
+
import { AccessLevel, CurrentCategory, DefaultCategory } from './category.types';
|
|
4
|
+
export declare class LoadedCategoryTree {
|
|
5
|
+
categories: CurrentCategory[];
|
|
6
|
+
missingCategories: string[][];
|
|
7
|
+
}
|
|
8
|
+
export declare class CategoryMetaService {
|
|
9
|
+
private http;
|
|
10
|
+
private categoryService;
|
|
11
|
+
private categories;
|
|
12
|
+
constructor(http: HttpClient, categoryService: CategoryService);
|
|
13
|
+
getCoreCategories(): Promise<DefaultCategory[]>;
|
|
14
|
+
loadCategories(categoryTrees: string[][], selectedCategoryId?: string, trustedPartyId?: string): Promise<LoadedCategoryTree>;
|
|
15
|
+
loadCategoriesForRole(categories: {
|
|
16
|
+
category: string[];
|
|
17
|
+
accessLevel: AccessLevel;
|
|
18
|
+
}[]): Promise<{
|
|
19
|
+
category: CurrentCategory;
|
|
20
|
+
accessLevel: AccessLevel;
|
|
21
|
+
}[]>;
|
|
22
|
+
private loadCategory;
|
|
23
|
+
}
|
|
@@ -1,45 +1,45 @@
|
|
|
1
|
-
import { HasKeyGraph } from './../cryptography/cryptography.types';
|
|
2
|
-
import { HasEdges } from '../_common/types';
|
|
3
|
-
export declare const DEFAULT_BREADCRUMB_DEPTH = 5;
|
|
4
|
-
export declare const DEFAULT_DESCENDANTS_DEPTH = 5;
|
|
5
|
-
export declare enum DirectoryType {
|
|
6
|
-
Vault = "vault",
|
|
7
|
-
Category = "category",
|
|
8
|
-
Record = "record"
|
|
9
|
-
}
|
|
10
|
-
export declare const DefaultVaultFilter: string;
|
|
11
|
-
export declare const CategoryFilter: string;
|
|
12
|
-
export declare const RecordFilter: string;
|
|
13
|
-
export declare const AccessFields = "\naccessRoles {\n role\n method\n inheritedFrom {\n id\n }\n trustedParty {\n id\n }\n isIssuer\n}";
|
|
14
|
-
export declare const CategoryFields: string;
|
|
15
|
-
export declare const VaultFields = "\n id\n keyId\n plainMeta\n cipherMeta\n";
|
|
16
|
-
export declare const GetRootDirectoryIdsQuery: import("graphql").DocumentNode;
|
|
17
|
-
export declare const GetCategoriesQuery: import("graphql").DocumentNode;
|
|
18
|
-
export declare const GetVaultsQuery: import("graphql").DocumentNode;
|
|
19
|
-
export interface GetTrustedPartyCategoriesQueryType extends HasKeyGraph {
|
|
20
|
-
tp: {
|
|
21
|
-
sharedItems: {
|
|
22
|
-
list: HasEdges<any>;
|
|
23
|
-
records: HasEdges<any>;
|
|
24
|
-
};
|
|
25
|
-
};
|
|
26
|
-
}
|
|
27
|
-
export declare const GetTrustedPartyCategoriesQuery: import("graphql").DocumentNode;
|
|
28
|
-
export interface GetMySharedCategoriesQueryType extends HasKeyGraph {
|
|
29
|
-
tp: {
|
|
30
|
-
myItems: {
|
|
31
|
-
list: HasEdges<any>;
|
|
32
|
-
records: HasEdges<any>;
|
|
33
|
-
};
|
|
34
|
-
};
|
|
35
|
-
}
|
|
36
|
-
export declare const GetMySharedCategoriesQuery: import("graphql").DocumentNode;
|
|
37
|
-
export declare const parentCategoriesField: (depth?: number) => any;
|
|
38
|
-
export declare const GetCategoryQuery: (depth?: number) => import("graphql").DocumentNode;
|
|
39
|
-
export declare const GetCategoryKeyIdQuery: import("graphql").DocumentNode;
|
|
40
|
-
export declare const CreateCategoryMutation: import("graphql").DocumentNode;
|
|
41
|
-
export declare const CreateVaultMutation: import("graphql").DocumentNode;
|
|
42
|
-
export declare const UpdateCategoryMutation: import("graphql").DocumentNode;
|
|
43
|
-
export declare const DeleteCategoryMutation: import("graphql").DocumentNode;
|
|
44
|
-
export declare const ArchiveDirectoryMutation: import("graphql").DocumentNode;
|
|
45
|
-
export declare const UnarchiveDirectoryMutation: import("graphql").DocumentNode;
|
|
1
|
+
import { HasKeyGraph } from './../cryptography/cryptography.types';
|
|
2
|
+
import { HasEdges } from '../_common/types';
|
|
3
|
+
export declare const DEFAULT_BREADCRUMB_DEPTH = 5;
|
|
4
|
+
export declare const DEFAULT_DESCENDANTS_DEPTH = 5;
|
|
5
|
+
export declare enum DirectoryType {
|
|
6
|
+
Vault = "vault",
|
|
7
|
+
Category = "category",
|
|
8
|
+
Record = "record"
|
|
9
|
+
}
|
|
10
|
+
export declare const DefaultVaultFilter: string;
|
|
11
|
+
export declare const CategoryFilter: string;
|
|
12
|
+
export declare const RecordFilter: string;
|
|
13
|
+
export declare const AccessFields = "\naccessRoles {\n role\n method\n inheritedFrom {\n id\n }\n trustedParty {\n id\n }\n isIssuer\n}";
|
|
14
|
+
export declare const CategoryFields: string;
|
|
15
|
+
export declare const VaultFields = "\n id\n keyId\n plainMeta\n cipherMeta\n";
|
|
16
|
+
export declare const GetRootDirectoryIdsQuery: import("graphql").DocumentNode;
|
|
17
|
+
export declare const GetCategoriesQuery: import("graphql").DocumentNode;
|
|
18
|
+
export declare const GetVaultsQuery: import("graphql").DocumentNode;
|
|
19
|
+
export interface GetTrustedPartyCategoriesQueryType extends HasKeyGraph {
|
|
20
|
+
tp: {
|
|
21
|
+
sharedItems: {
|
|
22
|
+
list: HasEdges<any>;
|
|
23
|
+
records: HasEdges<any>;
|
|
24
|
+
};
|
|
25
|
+
};
|
|
26
|
+
}
|
|
27
|
+
export declare const GetTrustedPartyCategoriesQuery: import("graphql").DocumentNode;
|
|
28
|
+
export interface GetMySharedCategoriesQueryType extends HasKeyGraph {
|
|
29
|
+
tp: {
|
|
30
|
+
myItems: {
|
|
31
|
+
list: HasEdges<any>;
|
|
32
|
+
records: HasEdges<any>;
|
|
33
|
+
};
|
|
34
|
+
};
|
|
35
|
+
}
|
|
36
|
+
export declare const GetMySharedCategoriesQuery: import("graphql").DocumentNode;
|
|
37
|
+
export declare const parentCategoriesField: (depth?: number) => any;
|
|
38
|
+
export declare const GetCategoryQuery: (depth?: number) => import("graphql").DocumentNode;
|
|
39
|
+
export declare const GetCategoryKeyIdQuery: import("graphql").DocumentNode;
|
|
40
|
+
export declare const CreateCategoryMutation: import("graphql").DocumentNode;
|
|
41
|
+
export declare const CreateVaultMutation: import("graphql").DocumentNode;
|
|
42
|
+
export declare const UpdateCategoryMutation: import("graphql").DocumentNode;
|
|
43
|
+
export declare const DeleteCategoryMutation: import("graphql").DocumentNode;
|
|
44
|
+
export declare const ArchiveDirectoryMutation: import("graphql").DocumentNode;
|
|
45
|
+
export declare const UnarchiveDirectoryMutation: import("graphql").DocumentNode;
|
|
@@ -1,67 +1,67 @@
|
|
|
1
|
-
import { LrApolloService } from '../api/lr-apollo.service';
|
|
2
|
-
import { KeyMetaService } from '../cryptography/key-meta.service';
|
|
3
|
-
import { Category, NewCategory, UpdatedCategory, VaultCategory, VaultRecord, Vault } from './category.types';
|
|
4
|
-
import { KeyGraphService } from '../cryptography/key-graph.service';
|
|
5
|
-
export declare class CategoryService {
|
|
6
|
-
private lrApollo;
|
|
7
|
-
private keyMetaService;
|
|
8
|
-
private keyGraph;
|
|
9
|
-
constructor(lrApollo: LrApolloService, keyMetaService: KeyMetaService, keyGraph: KeyGraphService);
|
|
10
|
-
getRootDirectoryIds(input?: {
|
|
11
|
-
archived: boolean;
|
|
12
|
-
}): Promise<string[]>;
|
|
13
|
-
getDefaultVault(): Promise<Vault>;
|
|
14
|
-
getCategories(input?: {
|
|
15
|
-
archived: boolean;
|
|
16
|
-
}): Promise<Category[]>;
|
|
17
|
-
getTrustedPartyCategories(trustedPartyId: string): Promise<{
|
|
18
|
-
categories: Category[];
|
|
19
|
-
records?: VaultRecord[];
|
|
20
|
-
}>;
|
|
21
|
-
getMySharedCategories(trustedPartyId: string): Promise<{
|
|
22
|
-
categories: Category[];
|
|
23
|
-
records?: VaultRecord[];
|
|
24
|
-
}>;
|
|
25
|
-
getCategory(categoryId: string): Promise<VaultCategory>;
|
|
26
|
-
private mapVaults;
|
|
27
|
-
private mapCategories;
|
|
28
|
-
private mapRecords;
|
|
29
|
-
createDefaultVault(): Promise<string>;
|
|
30
|
-
createCategory(newCategory: NewCategory): Promise<string>;
|
|
31
|
-
updateCategory(categoryId: string, keyId: string, updatedCategory: UpdatedCategory): Promise<void>;
|
|
32
|
-
setCategoryVisibility(categoryId: string, hide: boolean): Promise<void>;
|
|
33
|
-
deleteCategory(categoryId: string): Promise<void>;
|
|
34
|
-
archiveCategory(categoryId: string, recursive: boolean): Promise<void>;
|
|
35
|
-
unarchiveCategory(categoryId: string, recursive: boolean): Promise<void>;
|
|
36
|
-
archiveDirectory(directoryId: string, recursive: boolean): Promise<void>;
|
|
37
|
-
unarchiveDirectory(directoryId: string, recursive: boolean): Promise<void>;
|
|
38
|
-
mapVault(node: {
|
|
39
|
-
id: any;
|
|
40
|
-
keyId: any;
|
|
41
|
-
plainMeta: any;
|
|
42
|
-
cipherMeta: any;
|
|
43
|
-
}): Promise<Vault>;
|
|
44
|
-
mapParentCategories(category: {
|
|
45
|
-
parentCategories: any;
|
|
46
|
-
}): Promise<Category[]>;
|
|
47
|
-
mapCategory(node: {
|
|
48
|
-
id: any;
|
|
49
|
-
keyId: any;
|
|
50
|
-
plainMeta: any;
|
|
51
|
-
cipherMeta: any;
|
|
52
|
-
descendantDirectories: any;
|
|
53
|
-
accessRoles: any[];
|
|
54
|
-
archived: any;
|
|
55
|
-
}): Promise<Category>;
|
|
56
|
-
mapRecord(node: {
|
|
57
|
-
id: any;
|
|
58
|
-
keyId: any;
|
|
59
|
-
plainMeta: any;
|
|
60
|
-
cipherMeta: any;
|
|
61
|
-
created: any;
|
|
62
|
-
modified: any;
|
|
63
|
-
content: any;
|
|
64
|
-
accessRoles: any[];
|
|
65
|
-
archived: any;
|
|
66
|
-
}): Promise<VaultRecord>;
|
|
67
|
-
}
|
|
1
|
+
import { LrApolloService } from '../api/lr-apollo.service';
|
|
2
|
+
import { KeyMetaService } from '../cryptography/key-meta.service';
|
|
3
|
+
import { Category, NewCategory, UpdatedCategory, VaultCategory, VaultRecord, Vault } from './category.types';
|
|
4
|
+
import { KeyGraphService } from '../cryptography/key-graph.service';
|
|
5
|
+
export declare class CategoryService {
|
|
6
|
+
private lrApollo;
|
|
7
|
+
private keyMetaService;
|
|
8
|
+
private keyGraph;
|
|
9
|
+
constructor(lrApollo: LrApolloService, keyMetaService: KeyMetaService, keyGraph: KeyGraphService);
|
|
10
|
+
getRootDirectoryIds(input?: {
|
|
11
|
+
archived: boolean;
|
|
12
|
+
}): Promise<string[]>;
|
|
13
|
+
getDefaultVault(): Promise<Vault>;
|
|
14
|
+
getCategories(input?: {
|
|
15
|
+
archived: boolean;
|
|
16
|
+
}): Promise<Category[]>;
|
|
17
|
+
getTrustedPartyCategories(trustedPartyId: string): Promise<{
|
|
18
|
+
categories: Category[];
|
|
19
|
+
records?: VaultRecord[];
|
|
20
|
+
}>;
|
|
21
|
+
getMySharedCategories(trustedPartyId: string): Promise<{
|
|
22
|
+
categories: Category[];
|
|
23
|
+
records?: VaultRecord[];
|
|
24
|
+
}>;
|
|
25
|
+
getCategory(categoryId: string): Promise<VaultCategory>;
|
|
26
|
+
private mapVaults;
|
|
27
|
+
private mapCategories;
|
|
28
|
+
private mapRecords;
|
|
29
|
+
createDefaultVault(): Promise<string>;
|
|
30
|
+
createCategory(newCategory: NewCategory): Promise<string>;
|
|
31
|
+
updateCategory(categoryId: string, keyId: string, updatedCategory: UpdatedCategory): Promise<void>;
|
|
32
|
+
setCategoryVisibility(categoryId: string, hide: boolean): Promise<void>;
|
|
33
|
+
deleteCategory(categoryId: string): Promise<void>;
|
|
34
|
+
archiveCategory(categoryId: string, recursive: boolean): Promise<void>;
|
|
35
|
+
unarchiveCategory(categoryId: string, recursive: boolean): Promise<void>;
|
|
36
|
+
archiveDirectory(directoryId: string, recursive: boolean): Promise<void>;
|
|
37
|
+
unarchiveDirectory(directoryId: string, recursive: boolean): Promise<void>;
|
|
38
|
+
mapVault(node: {
|
|
39
|
+
id: any;
|
|
40
|
+
keyId: any;
|
|
41
|
+
plainMeta: any;
|
|
42
|
+
cipherMeta: any;
|
|
43
|
+
}): Promise<Vault>;
|
|
44
|
+
mapParentCategories(category: {
|
|
45
|
+
parentCategories: any;
|
|
46
|
+
}): Promise<Category[]>;
|
|
47
|
+
mapCategory(node: {
|
|
48
|
+
id: any;
|
|
49
|
+
keyId: any;
|
|
50
|
+
plainMeta: any;
|
|
51
|
+
cipherMeta: any;
|
|
52
|
+
descendantDirectories: any;
|
|
53
|
+
accessRoles: any[];
|
|
54
|
+
archived: any;
|
|
55
|
+
}): Promise<Category>;
|
|
56
|
+
mapRecord(node: {
|
|
57
|
+
id: any;
|
|
58
|
+
keyId: any;
|
|
59
|
+
plainMeta: any;
|
|
60
|
+
cipherMeta: any;
|
|
61
|
+
created: any;
|
|
62
|
+
modified: any;
|
|
63
|
+
content: any;
|
|
64
|
+
accessRoles: any[];
|
|
65
|
+
archived: any;
|
|
66
|
+
}): Promise<VaultRecord>;
|
|
67
|
+
}
|