@lifeready/core 1.0.3 → 1.0.5
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +62 -62
- package/bundles/lifeready-core.umd.js +15445 -15445
- package/bundles/lifeready-core.umd.js.map +1 -1
- package/bundles/lifeready-core.umd.min.js.map +1 -1
- package/esm2015/lib/_common/ast.js +40 -40
- package/esm2015/lib/_common/deferred-promise.js +24 -24
- package/esm2015/lib/_common/exceptions.js +157 -157
- package/esm2015/lib/_common/queries.gql.js +190 -190
- package/esm2015/lib/_common/run-outside-angular.js +79 -79
- package/esm2015/lib/_common/types.js +1 -1
- package/esm2015/lib/_common/utils.js +44 -44
- package/esm2015/lib/api/contact-card.gql.js +79 -79
- package/esm2015/lib/api/contact-card.service.js +154 -154
- package/esm2015/lib/api/contact-card2.gql.js +60 -60
- package/esm2015/lib/api/contact-card2.service.js +103 -103
- package/esm2015/lib/api/file.service.js +74 -74
- package/esm2015/lib/api/item2.gql.js +110 -110
- package/esm2015/lib/api/item2.service.js +311 -311
- package/esm2015/lib/api/key-exchange.gql.js +188 -188
- package/esm2015/lib/api/key-exchange.service.js +442 -442
- package/esm2015/lib/api/key-exchange.types.js +18 -18
- package/esm2015/lib/api/key-exchange2.gql.js +171 -171
- package/esm2015/lib/api/key-exchange2.service.js +479 -479
- package/esm2015/lib/api/lock.gql.js +40 -40
- package/esm2015/lib/api/lock.service.js +64 -64
- package/esm2015/lib/api/lr-apollo.service.js +46 -46
- package/esm2015/lib/api/lr-graphql/index.js +6 -6
- package/esm2015/lib/api/lr-graphql/lr-graphql.service.js +155 -155
- package/esm2015/lib/api/lr-graphql/lr-merged-mutation.js +213 -213
- package/esm2015/lib/api/lr-graphql/lr-mutation-base.js +51 -51
- package/esm2015/lib/api/lr-graphql/lr-mutation.js +48 -48
- package/esm2015/lib/api/lr-graphql/lr.service.js +18 -18
- package/esm2015/lib/api/message.service.js +138 -138
- package/esm2015/lib/api/persist.service.js +181 -181
- package/esm2015/lib/api/query-processor/common-processors.service.js +93 -93
- package/esm2015/lib/api/query-processor/index.js +3 -3
- package/esm2015/lib/api/query-processor/query-processor.service.js +192 -192
- package/esm2015/lib/api/query-processor/tp-password-reset-processor.service.js +109 -109
- package/esm2015/lib/api/shared-contact-card.service.js +119 -119
- package/esm2015/lib/api/shared-contact-card2.gql.js +41 -41
- package/esm2015/lib/api/shared-contact-card2.service.js +117 -117
- package/esm2015/lib/api/time.service.js +146 -146
- package/esm2015/lib/api/types/graphql.types.js +7 -7
- package/esm2015/lib/api/types/index.js +3 -3
- package/esm2015/lib/api/types/lr-graphql.types.js +71 -71
- package/esm2015/lib/auth/auth.config.js +57 -57
- package/esm2015/lib/auth/auth.gql.js +48 -48
- package/esm2015/lib/auth/auth.types.js +27 -27
- package/esm2015/lib/auth/idle.service.js +168 -168
- package/esm2015/lib/auth/idle.types.js +7 -7
- package/esm2015/lib/auth/lbop.service.js +355 -355
- package/esm2015/lib/auth/life-ready-auth.service.js +500 -500
- package/esm2015/lib/auth/password.service.js +320 -320
- package/esm2015/lib/auth/register.service.js +172 -172
- package/esm2015/lib/auth/two-factor.service.js +74 -74
- package/esm2015/lib/category/category-meta.service.js +99 -99
- package/esm2015/lib/category/category.gql.js +406 -406
- package/esm2015/lib/category/category.service.js +390 -390
- package/esm2015/lib/category/category.types.js +29 -29
- package/esm2015/lib/cryptography/cryptography.types.js +11 -11
- package/esm2015/lib/cryptography/encryption.service.js +189 -189
- package/esm2015/lib/cryptography/key-factory.service.js +237 -237
- package/esm2015/lib/cryptography/key-graph.service.js +280 -280
- package/esm2015/lib/cryptography/key-meta.service.js +200 -200
- package/esm2015/lib/cryptography/key.service.js +124 -124
- package/esm2015/lib/cryptography/slip39.service.js +169 -169
- package/esm2015/lib/cryptography/web-crypto.service.js +29 -29
- package/esm2015/lib/life-ready.config.js +84 -84
- package/esm2015/lib/life-ready.module.js +74 -74
- package/esm2015/lib/plan/plan.gql.js +123 -123
- package/esm2015/lib/plan/plan.service.js +149 -149
- package/esm2015/lib/plan/plan.types.js +11 -11
- package/esm2015/lib/record/record-attachment.service.js +101 -101
- package/esm2015/lib/record/record.gql.js +179 -179
- package/esm2015/lib/record/record.service.js +206 -206
- package/esm2015/lib/record/record.types.js +15 -15
- package/esm2015/lib/record-type/record-type.service.js +75 -75
- package/esm2015/lib/record-type/record-type.types.js +28 -28
- package/esm2015/lib/scenario/approvals/scenario-approval.gql.js +105 -105
- package/esm2015/lib/scenario/approvals/scenario-approval.types.js +1 -1
- package/esm2015/lib/scenario/approvals/scenario-approver.service.js +300 -300
- package/esm2015/lib/scenario/claimants/scenario-claimant.gql.js +52 -52
- package/esm2015/lib/scenario/claimants/scenario-claimant.service.js +97 -97
- package/esm2015/lib/scenario/claimants/scenario-claimant.types.js +1 -1
- package/esm2015/lib/scenario/receivers/scenario-receiver.gql.js +150 -150
- package/esm2015/lib/scenario/receivers/scenario-receiver.service.js +229 -229
- package/esm2015/lib/scenario/receivers/scenario-receiver.types.js +1 -1
- package/esm2015/lib/scenario/scenario-setup.service.js +269 -269
- package/esm2015/lib/scenario/scenario.gql.js +368 -368
- package/esm2015/lib/scenario/scenario.service.js +611 -611
- package/esm2015/lib/scenario/scenario.types.js +64 -64
- package/esm2015/lib/search/search.gql.js +62 -62
- package/esm2015/lib/search/search.service.js +156 -156
- package/esm2015/lib/search/search.types.js +6 -6
- package/esm2015/lib/trusted-parties/tp-password-reset-request.service.js +112 -112
- package/esm2015/lib/trusted-parties/tp-password-reset-user.service.js +129 -129
- package/esm2015/lib/trusted-parties/tp-password-reset.constants.js +4 -4
- package/esm2015/lib/trusted-parties/tp-password-reset.gql.js +232 -232
- package/esm2015/lib/trusted-parties/tp-password-reset.service.js +299 -299
- package/esm2015/lib/trusted-parties/trusted-party.gql.js +148 -148
- package/esm2015/lib/trusted-parties/trusted-party.service.js +326 -326
- package/esm2015/lib/trusted-parties/trusted-party.types.js +41 -41
- package/esm2015/lib/trusted-parties/trusted-party2.gql.js +87 -87
- package/esm2015/lib/trusted-parties/trusted-party2.service.js +215 -215
- package/esm2015/lib/users/profile-details.service.js +214 -214
- package/esm2015/lib/users/profile.gql.js +97 -97
- package/esm2015/lib/users/profile.service.js +169 -169
- package/esm2015/lib/users/profile.types.js +34 -34
- package/esm2015/lib/users/user.gql.js +60 -60
- package/esm2015/lib/users/user.service.js +79 -79
- package/esm2015/lib/users/user.types.js +5 -5
- package/esm2015/lifeready-core.js +10 -10
- package/esm2015/public-api.js +81 -81
- package/fesm2015/lifeready-core.js +13088 -13088
- package/fesm2015/lifeready-core.js.map +1 -1
- package/lib/_common/ast.d.ts +11 -11
- package/lib/_common/deferred-promise.d.ts +12 -12
- package/lib/_common/exceptions.d.ts +109 -109
- package/lib/_common/queries.gql.d.ts +10 -10
- package/lib/_common/run-outside-angular.d.ts +14 -14
- package/lib/_common/types.d.ts +10 -10
- package/lib/_common/utils.d.ts +3 -3
- package/lib/api/contact-card.gql.d.ts +7 -7
- package/lib/api/contact-card.service.d.ts +52 -52
- package/lib/api/contact-card2.gql.d.ts +34 -34
- package/lib/api/contact-card2.service.d.ts +49 -49
- package/lib/api/file.service.d.ts +18 -18
- package/lib/api/item2.gql.d.ts +96 -96
- package/lib/api/item2.service.d.ts +177 -177
- package/lib/api/key-exchange.gql.d.ts +9 -9
- package/lib/api/key-exchange.service.d.ts +39 -39
- package/lib/api/key-exchange.types.d.ts +196 -196
- package/lib/api/key-exchange2.gql.d.ts +125 -125
- package/lib/api/key-exchange2.service.d.ts +187 -187
- package/lib/api/lock.gql.d.ts +27 -27
- package/lib/api/lock.service.d.ts +25 -25
- package/lib/api/lr-apollo.service.d.ts +15 -15
- package/lib/api/lr-graphql/index.d.ts +5 -5
- package/lib/api/lr-graphql/lr-graphql.service.d.ts +60 -60
- package/lib/api/lr-graphql/lr-merged-mutation.d.ts +27 -27
- package/lib/api/lr-graphql/lr-mutation-base.d.ts +28 -28
- package/lib/api/lr-graphql/lr-mutation.d.ts +8 -8
- package/lib/api/lr-graphql/lr.service.d.ts +9 -9
- package/lib/api/message.service.d.ts +58 -58
- package/lib/api/persist.service.d.ts +31 -31
- package/lib/api/query-processor/common-processors.service.d.ts +36 -36
- package/lib/api/query-processor/index.d.ts +2 -2
- package/lib/api/query-processor/query-processor.service.d.ts +18 -18
- package/lib/api/query-processor/tp-password-reset-processor.service.d.ts +15 -15
- package/lib/api/shared-contact-card.service.d.ts +33 -33
- package/lib/api/shared-contact-card2.gql.d.ts +36 -36
- package/lib/api/shared-contact-card2.service.d.ts +45 -45
- package/lib/api/time.service.d.ts +16 -16
- package/lib/api/types/graphql.types.d.ts +29 -29
- package/lib/api/types/index.d.ts +2 -2
- package/lib/api/types/lr-graphql.types.d.ts +385 -385
- package/lib/auth/auth.config.d.ts +5 -5
- package/lib/auth/auth.gql.d.ts +15 -15
- package/lib/auth/auth.types.d.ts +66 -66
- package/lib/auth/idle.service.d.ts +40 -40
- package/lib/auth/idle.types.d.ts +10 -10
- package/lib/auth/lbop.service.d.ts +91 -91
- package/lib/auth/life-ready-auth.service.d.ts +59 -59
- package/lib/auth/password.service.d.ts +78 -78
- package/lib/auth/register.service.d.ts +25 -25
- package/lib/auth/two-factor.service.d.ts +15 -15
- package/lib/category/category-meta.service.d.ts +23 -23
- package/lib/category/category.gql.d.ts +45 -45
- package/lib/category/category.service.d.ts +67 -67
- package/lib/category/category.types.d.ts +79 -79
- package/lib/cryptography/cryptography.types.d.ts +83 -83
- package/lib/cryptography/encryption.service.d.ts +41 -41
- package/lib/cryptography/key-factory.service.d.ts +38 -38
- package/lib/cryptography/key-graph.service.d.ts +33 -33
- package/lib/cryptography/key-meta.service.d.ts +44 -44
- package/lib/cryptography/key.service.d.ts +36 -36
- package/lib/cryptography/slip39.service.d.ts +43 -43
- package/lib/cryptography/web-crypto.service.d.ts +5 -5
- package/lib/life-ready.config.d.ts +14 -14
- package/lib/life-ready.module.d.ts +5 -5
- package/lib/plan/plan.gql.d.ts +11 -11
- package/lib/plan/plan.service.d.ts +33 -33
- package/lib/plan/plan.types.d.ts +31 -31
- package/lib/record/record-attachment.service.d.ts +16 -16
- package/lib/record/record.gql.d.ts +14 -14
- package/lib/record/record.service.d.ts +25 -25
- package/lib/record/record.types.d.ts +57 -57
- package/lib/record-type/record-type.service.d.ts +11 -11
- package/lib/record-type/record-type.types.d.ts +50 -50
- package/lib/scenario/approvals/scenario-approval.gql.d.ts +7 -7
- package/lib/scenario/approvals/scenario-approval.types.d.ts +63 -63
- package/lib/scenario/approvals/scenario-approver.service.d.ts +32 -32
- package/lib/scenario/claimants/scenario-claimant.gql.d.ts +5 -5
- package/lib/scenario/claimants/scenario-claimant.service.d.ts +17 -17
- package/lib/scenario/claimants/scenario-claimant.types.d.ts +18 -18
- package/lib/scenario/receivers/scenario-receiver.gql.d.ts +8 -8
- package/lib/scenario/receivers/scenario-receiver.service.d.ts +30 -30
- package/lib/scenario/receivers/scenario-receiver.types.d.ts +54 -54
- package/lib/scenario/scenario-setup.service.d.ts +22 -22
- package/lib/scenario/scenario.gql.d.ts +34 -34
- package/lib/scenario/scenario.service.d.ts +58 -58
- package/lib/scenario/scenario.types.d.ts +217 -217
- package/lib/search/search.gql.d.ts +1 -1
- package/lib/search/search.service.d.ts +25 -25
- package/lib/search/search.types.d.ts +20 -20
- package/lib/trusted-parties/tp-password-reset-request.service.d.ts +20 -20
- package/lib/trusted-parties/tp-password-reset-user.service.d.ts +35 -35
- package/lib/trusted-parties/tp-password-reset.constants.d.ts +3 -3
- package/lib/trusted-parties/tp-password-reset.gql.d.ts +218 -218
- package/lib/trusted-parties/tp-password-reset.service.d.ts +130 -130
- package/lib/trusted-parties/trusted-party.gql.d.ts +9 -9
- package/lib/trusted-parties/trusted-party.service.d.ts +44 -44
- package/lib/trusted-parties/trusted-party.types.d.ts +102 -102
- package/lib/trusted-parties/trusted-party2.gql.d.ts +79 -79
- package/lib/trusted-parties/trusted-party2.service.d.ts +114 -114
- package/lib/users/profile-details.service.d.ts +21 -21
- package/lib/users/profile.gql.d.ts +11 -11
- package/lib/users/profile.service.d.ts +35 -35
- package/lib/users/profile.types.d.ts +96 -96
- package/lib/users/user.gql.d.ts +9 -9
- package/lib/users/user.service.d.ts +12 -12
- package/lib/users/user.types.d.ts +23 -23
- package/lifeready-core.d.ts +9 -9
- package/package.json +1 -1
- package/public-api.d.ts +77 -77
|
@@ -1,172 +1,172 @@
|
|
|
1
|
-
import { __awaiter } from "tslib";
|
|
2
|
-
import { HttpClient } from '@angular/common/http';
|
|
3
|
-
import { Inject, Injectable } from '@angular/core';
|
|
4
|
-
import { AuthClass } from '@aws-amplify/auth/lib-esm/Auth';
|
|
5
|
-
import { EncryptionService } from '../cryptography/encryption.service';
|
|
6
|
-
import { KeyFactoryService } from '../cryptography/key-factory.service';
|
|
7
|
-
import { LR_CONFIG } from '../life-ready.config';
|
|
8
|
-
import { PasswordService } from './password.service';
|
|
9
|
-
import * as i0 from "@angular/core";
|
|
10
|
-
import * as i1 from "../life-ready.config";
|
|
11
|
-
import * as i2 from "@aws-amplify/auth/lib-esm/Auth";
|
|
12
|
-
import * as i3 from "@angular/common/http";
|
|
13
|
-
import * as i4 from "../cryptography/key-factory.service";
|
|
14
|
-
import * as i5 from "../cryptography/encryption.service";
|
|
15
|
-
import * as i6 from "./password.service";
|
|
16
|
-
export class RegisterService {
|
|
17
|
-
constructor(config, auth, http, keyFactory, encryptionService, passwordService) {
|
|
18
|
-
this.config = config;
|
|
19
|
-
this.auth = auth;
|
|
20
|
-
this.http = http;
|
|
21
|
-
this.keyFactory = keyFactory;
|
|
22
|
-
this.encryptionService = encryptionService;
|
|
23
|
-
this.passwordService = passwordService;
|
|
24
|
-
}
|
|
25
|
-
/**
|
|
26
|
-
* Request a verification code to be sent out to an email.
|
|
27
|
-
* @return Info needed to be submitted along with the verification code
|
|
28
|
-
*/
|
|
29
|
-
verifyEmail(email) {
|
|
30
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
31
|
-
const { claim_id } = yield this.http
|
|
32
|
-
.post(`${this.config.authUrl}cove/claim/email/`, {
|
|
33
|
-
address: email,
|
|
34
|
-
context: 'signup',
|
|
35
|
-
})
|
|
36
|
-
.toPromise();
|
|
37
|
-
return claim_id;
|
|
38
|
-
});
|
|
39
|
-
}
|
|
40
|
-
verifyPhone(phoneNumber) {
|
|
41
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
42
|
-
const { claim_id } = yield this.http
|
|
43
|
-
.post(`${this.config.authUrl}cove/claim/sms/`, {
|
|
44
|
-
address: phoneNumber,
|
|
45
|
-
context: 'signup',
|
|
46
|
-
})
|
|
47
|
-
.toPromise();
|
|
48
|
-
return claim_id;
|
|
49
|
-
});
|
|
50
|
-
}
|
|
51
|
-
confirmVerificationCode(verificationId, verificationCode) {
|
|
52
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
53
|
-
const { token } = yield this.http
|
|
54
|
-
.post(`${this.config.authUrl}cove/respond/`, {
|
|
55
|
-
claim_id: verificationId,
|
|
56
|
-
v_code: verificationCode,
|
|
57
|
-
})
|
|
58
|
-
.toPromise();
|
|
59
|
-
return token;
|
|
60
|
-
});
|
|
61
|
-
}
|
|
62
|
-
register(email, password, verificationId, verificationToken, verificationType = 'email') {
|
|
63
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
64
|
-
// Generate the key material needed for PassIdp which will be the password used for Cognito.
|
|
65
|
-
const passKeyBundle = yield this.passwordService.createPassKeyBundle(password);
|
|
66
|
-
const masterKey = yield this.keyFactory.createKey();
|
|
67
|
-
const wrappedMasterKey = yield this.encryptionService.encrypt(passKeyBundle.passKey, masterKey.toJSON(true));
|
|
68
|
-
const rootKey = yield this.keyFactory.createKey();
|
|
69
|
-
const wrappedRootKey = yield this.encryptionService.encrypt(masterKey, rootKey.toJSON(true));
|
|
70
|
-
// Encryption PKC key
|
|
71
|
-
const prk = yield this.keyFactory.createPkcKey();
|
|
72
|
-
const wrappedPrk = yield this.encryptionService.encrypt(rootKey, prk.toJSON(true));
|
|
73
|
-
// Signing PKC key
|
|
74
|
-
const sigPrk = yield this.keyFactory.createPkcSignKey();
|
|
75
|
-
const wrappedSigPrk = yield this.encryptionService.encrypt(rootKey, sigPrk.toJSON(true));
|
|
76
|
-
// API call to setup profile
|
|
77
|
-
const user = yield this.http
|
|
78
|
-
.post(`${this.config.authUrl}users/`, {
|
|
79
|
-
claims: [
|
|
80
|
-
{
|
|
81
|
-
type: verificationType,
|
|
82
|
-
token: verificationToken,
|
|
83
|
-
claim_id: verificationId,
|
|
84
|
-
},
|
|
85
|
-
],
|
|
86
|
-
pass_idp_params: passKeyBundle.passIdpParams,
|
|
87
|
-
pass_idp_verifier_pbk: passKeyBundle.passIdpVerifier.toJSON(),
|
|
88
|
-
wrapped_pass_idp_verifier_prk: passKeyBundle.wrappedPassIdpVerifierPrk,
|
|
89
|
-
pass_key_params: passKeyBundle.passKeyParams,
|
|
90
|
-
wrapped_master_key: wrappedMasterKey,
|
|
91
|
-
wrapped_root_key: wrappedRootKey,
|
|
92
|
-
pbk: prk.toJSON(),
|
|
93
|
-
wrapped_prk: wrappedPrk,
|
|
94
|
-
sig_pbk: sigPrk.toJSON(),
|
|
95
|
-
wrapped_sig_prk: wrappedSigPrk,
|
|
96
|
-
})
|
|
97
|
-
.toPromise();
|
|
98
|
-
// API call to create user on cognito
|
|
99
|
-
const attributes = {};
|
|
100
|
-
user.claims.forEach((claim) => {
|
|
101
|
-
attributes[claim.type] = claim.value;
|
|
102
|
-
});
|
|
103
|
-
// Random suffix for uniqueness. If there's a duplicate, then used just needs to
|
|
104
|
-
// sign up again. But chances of collision is low.
|
|
105
|
-
const suffix = this.keyFactory.randomDigitsNoZeros(4);
|
|
106
|
-
const cognitoUser = yield this.auth.signUp({
|
|
107
|
-
username: `${email.split('@')[0]}.${suffix}`,
|
|
108
|
-
password: this.passwordService.getPassIdpString(passKeyBundle.passIdp),
|
|
109
|
-
attributes,
|
|
110
|
-
// Unfortunately, validationData is not passed to the post
|
|
111
|
-
// confirmation cognito trigger. So can can't do the association there.
|
|
112
|
-
// The current workflow will create a new user on LR before signing up
|
|
113
|
-
// with Cognito. Then Cognito can use the user.id and user.pre_sign_up_token to
|
|
114
|
-
// do the validation of the attributes.
|
|
115
|
-
// validationData: [
|
|
116
|
-
// new CognitoUserAttribute({
|
|
117
|
-
// Name: "user_id",
|
|
118
|
-
// Value: String(user.id)
|
|
119
|
-
// }),
|
|
120
|
-
// new CognitoUserAttribute({
|
|
121
|
-
// Name: "user_pre_sign_up_token",
|
|
122
|
-
// Value: user.pre_sign_up_token
|
|
123
|
-
// })
|
|
124
|
-
// ]
|
|
125
|
-
clientMetadata: {
|
|
126
|
-
user_id: String(user.id),
|
|
127
|
-
user_pre_sign_up_token: String(user.pre_sign_up_token),
|
|
128
|
-
},
|
|
129
|
-
});
|
|
130
|
-
return {
|
|
131
|
-
username: cognitoUser.user.getUsername(),
|
|
132
|
-
userId: user.id,
|
|
133
|
-
preSignUpToken: user.pre_sign_up_token,
|
|
134
|
-
userSub: cognitoUser.userSub,
|
|
135
|
-
};
|
|
136
|
-
});
|
|
137
|
-
}
|
|
138
|
-
hibpBreachedAccounts(account) {
|
|
139
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
140
|
-
// The account is just the email
|
|
141
|
-
try {
|
|
142
|
-
const response = yield this.http
|
|
143
|
-
.get(`${this.config.authUrl}users/hibp/breachedaccount/${account}/?truncateResponse=false`)
|
|
144
|
-
.toPromise();
|
|
145
|
-
return response;
|
|
146
|
-
}
|
|
147
|
-
catch (error) {
|
|
148
|
-
if (error.status === 404) {
|
|
149
|
-
return null;
|
|
150
|
-
}
|
|
151
|
-
else {
|
|
152
|
-
throw error;
|
|
153
|
-
}
|
|
154
|
-
}
|
|
155
|
-
});
|
|
156
|
-
}
|
|
157
|
-
}
|
|
158
|
-
RegisterService.ɵprov = i0.ɵɵdefineInjectable({ factory: function RegisterService_Factory() { return new RegisterService(i0.ɵɵinject(i1.LR_CONFIG), i0.ɵɵinject(i2.AuthClass), i0.ɵɵinject(i3.HttpClient), i0.ɵɵinject(i4.KeyFactoryService), i0.ɵɵinject(i5.EncryptionService), i0.ɵɵinject(i6.PasswordService)); }, token: RegisterService, providedIn: "root" });
|
|
159
|
-
RegisterService.decorators = [
|
|
160
|
-
{ type: Injectable, args: [{
|
|
161
|
-
providedIn: 'root',
|
|
162
|
-
},] }
|
|
163
|
-
];
|
|
164
|
-
RegisterService.ctorParameters = () => [
|
|
165
|
-
{ type: undefined, decorators: [{ type: Inject, args: [LR_CONFIG,] }] },
|
|
166
|
-
{ type: AuthClass },
|
|
167
|
-
{ type: HttpClient },
|
|
168
|
-
{ type: KeyFactoryService },
|
|
169
|
-
{ type: EncryptionService },
|
|
170
|
-
{ type: PasswordService }
|
|
171
|
-
];
|
|
172
|
-
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"register.service.js","sourceRoot":"C:/Projects/newrepo/kc-client/projects/core/src/","sources":["lib/auth/register.service.ts"],"names":[],"mappings":";AAAA,OAAO,EAAE,UAAU,EAAE,MAAM,sBAAsB,CAAC;AAClD,OAAO,EAAE,MAAM,EAAE,UAAU,EAAE,MAAM,eAAe,CAAC;AACnD,OAAO,EAAE,SAAS,EAAE,MAAM,gCAAgC,CAAC;AAC3D,OAAO,EAAE,iBAAiB,EAAE,MAAM,oCAAoC,CAAC;AACvE,OAAO,EAAE,iBAAiB,EAAE,MAAM,qCAAqC,CAAC;AACxE,OAAO,EAAmB,SAAS,EAAE,MAAM,sBAAsB,CAAC;AAClE,OAAO,EAAE,eAAe,EAAE,MAAM,oBAAoB,CAAC;;;;;;;;AAMrD,MAAM,OAAO,eAAe;IAC1B,YAC6B,MAAuB,EAC1C,IAAe,EACf,IAAgB,EAChB,UAA6B,EAC7B,iBAAoC,EACpC,eAAgC;QALb,WAAM,GAAN,MAAM,CAAiB;QAC1C,SAAI,GAAJ,IAAI,CAAW;QACf,SAAI,GAAJ,IAAI,CAAY;QAChB,eAAU,GAAV,UAAU,CAAmB;QAC7B,sBAAiB,GAAjB,iBAAiB,CAAmB;QACpC,oBAAe,GAAf,eAAe,CAAiB;IACvC,CAAC;IAEJ;;;OAGG;IACU,WAAW,CAAC,KAAa;;YACpC,MAAM,EAAE,QAAQ,EAAE,GAAG,MAAM,IAAI,CAAC,IAAI;iBACjC,IAAI,CAAe,GAAG,IAAI,CAAC,MAAM,CAAC,OAAO,mBAAmB,EAAE;gBAC7D,OAAO,EAAE,KAAK;gBACd,OAAO,EAAE,QAAQ;aAClB,CAAC;iBACD,SAAS,EAAE,CAAC;YACf,OAAO,QAAQ,CAAC;QAClB,CAAC;KAAA;IAEY,WAAW,CAAC,WAAmB;;YAC1C,MAAM,EAAE,QAAQ,EAAE,GAAG,MAAM,IAAI,CAAC,IAAI;iBACjC,IAAI,CAAe,GAAG,IAAI,CAAC,MAAM,CAAC,OAAO,iBAAiB,EAAE;gBAC3D,OAAO,EAAE,WAAW;gBACpB,OAAO,EAAE,QAAQ;aAClB,CAAC;iBACD,SAAS,EAAE,CAAC;YACf,OAAO,QAAQ,CAAC;QAClB,CAAC;KAAA;IAEY,uBAAuB,CAClC,cAAsB,EACtB,gBAAwB;;YAExB,MAAM,EAAE,KAAK,EAAE,GAAG,MAAM,IAAI,CAAC,IAAI;iBAC9B,IAAI,CAAY,GAAG,IAAI,CAAC,MAAM,CAAC,OAAO,eAAe,EAAE;gBACtD,QAAQ,EAAE,cAAc;gBACxB,MAAM,EAAE,gBAAgB;aACzB,CAAC;iBACD,SAAS,EAAE,CAAC;YACf,OAAO,KAAK,CAAC;QACf,CAAC;KAAA;IAEY,QAAQ,CACnB,KAAa,EACb,QAAgB,EAChB,cAAsB,EACtB,iBAAyB,EACzB,mBAAsC,OAAO;;YAE7C,4FAA4F;YAC5F,MAAM,aAAa,GAAG,MAAM,IAAI,CAAC,eAAe,CAAC,mBAAmB,CAClE,QAAQ,CACT,CAAC;YAEF,MAAM,SAAS,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,SAAS,EAAE,CAAC;YACpD,MAAM,gBAAgB,GAAG,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAC3D,aAAa,CAAC,OAAO,EACrB,SAAS,CAAC,MAAM,CAAC,IAAI,CAAC,CACvB,CAAC;YAEF,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,SAAS,EAAE,CAAC;YAClD,MAAM,cAAc,GAAG,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CACzD,SAAS,EACT,OAAO,CAAC,MAAM,CAAC,IAAI,CAAC,CACrB,CAAC;YAEF,qBAAqB;YACrB,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,YAAY,EAAE,CAAC;YACjD,MAAM,UAAU,GAAG,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CACrD,OAAO,EACP,GAAG,CAAC,MAAM,CAAC,IAAI,CAAC,CACjB,CAAC;YAEF,kBAAkB;YAClB,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,gBAAgB,EAAE,CAAC;YACxD,MAAM,aAAa,GAAG,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CACxD,OAAO,EACP,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CACpB,CAAC;YAEF,4BAA4B;YAC5B,MAAM,IAAI,GAAG,MAAM,IAAI,CAAC,IAAI;iBACzB,IAAI,CAAM,GAAG,IAAI,CAAC,MAAM,CAAC,OAAO,QAAQ,EAAE;gBACzC,MAAM,EAAE;oBACN;wBACE,IAAI,EAAE,gBAAgB;wBACtB,KAAK,EAAE,iBAAiB;wBACxB,QAAQ,EAAE,cAAc;qBACzB;iBACF;gBACD,eAAe,EAAE,aAAa,CAAC,aAAa;gBAC5C,qBAAqB,EAAE,aAAa,CAAC,eAAe,CAAC,MAAM,EAAE;gBAC7D,6BAA6B,EAAE,aAAa,CAAC,yBAAyB;gBACtE,eAAe,EAAE,aAAa,CAAC,aAAa;gBAC5C,kBAAkB,EAAE,gBAAgB;gBACpC,gBAAgB,EAAE,cAAc;gBAChC,GAAG,EAAE,GAAG,CAAC,MAAM,EAAE;gBACjB,WAAW,EAAE,UAAU;gBACvB,OAAO,EAAE,MAAM,CAAC,MAAM,EAAE;gBACxB,eAAe,EAAE,aAAa;aAC/B,CAAC;iBACD,SAAS,EAAE,CAAC;YAEf,qCAAqC;YACrC,MAAM,UAAU,GAAG,EAAE,CAAC;YACtB,IAAI,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC,KAAK,EAAE,EAAE;gBAC5B,UAAU,CAAC,KAAK,CAAC,IAAI,CAAC,GAAG,KAAK,CAAC,KAAK,CAAC;YACvC,CAAC,CAAC,CAAC;YAEH,gFAAgF;YAChF,kDAAkD;YAClD,MAAM,MAAM,GAAG,IAAI,CAAC,UAAU,CAAC,mBAAmB,CAAC,CAAC,CAAC,CAAC;YAEtD,MAAM,WAAW,GAAG,MAAM,IAAI,CAAC,IAAI,CAAC,MAAM,CAAC;gBACzC,QAAQ,EAAE,GAAG,KAAK,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,IAAI,MAAM,EAAE;gBAC5C,QAAQ,EAAE,IAAI,CAAC,eAAe,CAAC,gBAAgB,CAAC,aAAa,CAAC,OAAO,CAAC;gBACtE,UAAU;gBACV,0DAA0D;gBAC1D,uEAAuE;gBACvE,sEAAsE;gBACtE,+EAA+E;gBAC/E,uCAAuC;gBACvC,oBAAoB;gBACpB,+BAA+B;gBAC/B,uBAAuB;gBACvB,6BAA6B;gBAC7B,QAAQ;gBACR,+BAA+B;gBAC/B,sCAAsC;gBACtC,oCAAoC;gBACpC,OAAO;gBACP,IAAI;gBACJ,cAAc,EAAE;oBACd,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,EAAE,CAAC;oBACxB,sBAAsB,EAAE,MAAM,CAAC,IAAI,CAAC,iBAAiB,CAAC;iBACvD;aACF,CAAC,CAAC;YAEH,OAAO;gBACL,QAAQ,EAAE,WAAW,CAAC,IAAI,CAAC,WAAW,EAAE;gBACxC,MAAM,EAAE,IAAI,CAAC,EAAE;gBACf,cAAc,EAAE,IAAI,CAAC,iBAAiB;gBACtC,OAAO,EAAE,WAAW,CAAC,OAAO;aAC7B,CAAC;QACJ,CAAC;KAAA;IAEY,oBAAoB,CAAC,OAAe;;YAC/C,gCAAgC;YAChC,IAAI;gBACF,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,IAAI;qBAC7B,GAAG,CACF,GAAG,IAAI,CAAC,MAAM,CAAC,OAAO,8BAA8B,OAAO,0BAA0B,CACtF;qBACA,SAAS,EAAE,CAAC;gBACf,OAAO,QAAQ,CAAC;aACjB;YAAC,OAAO,KAAK,EAAE;gBACd,IAAI,KAAK,CAAC,MAAM,KAAK,GAAG,EAAE;oBACxB,OAAO,IAAI,CAAC;iBACb;qBAAM;oBACL,MAAM,KAAK,CAAC;iBACb;aACF;QACH,CAAC;KAAA;;;;YA1KF,UAAU,SAAC;gBACV,UAAU,EAAE,MAAM;aACnB;;;4CAGI,MAAM,SAAC,SAAS;YAZZ,SAAS;YAFT,UAAU;YAIV,iBAAiB;YADjB,iBAAiB;YAGjB,eAAe","sourcesContent":["import { HttpClient } from '@angular/common/http';\r\nimport { Inject, Injectable } from '@angular/core';\r\nimport { AuthClass } from '@aws-amplify/auth/lib-esm/Auth';\r\nimport { EncryptionService } from '../cryptography/encryption.service';\r\nimport { KeyFactoryService } from '../cryptography/key-factory.service';\r\nimport { LifeReadyConfig, LR_CONFIG } from '../life-ready.config';\r\nimport { PasswordService } from './password.service';\r\nimport { RegisterResult } from './auth.types';\r\n\r\n@Injectable({\r\n  providedIn: 'root',\r\n})\r\nexport class RegisterService {\r\n  constructor(\r\n    @Inject(LR_CONFIG) private config: LifeReadyConfig,\r\n    private auth: AuthClass,\r\n    private http: HttpClient,\r\n    private keyFactory: KeyFactoryService,\r\n    private encryptionService: EncryptionService,\r\n    private passwordService: PasswordService\r\n  ) {}\r\n\r\n  /**\r\n   * Request a verification code to be sent out to an email.\r\n   * @return Info needed to be submitted along with the verification code\r\n   */\r\n  public async verifyEmail(email: string): Promise<string> {\r\n    const { claim_id } = await this.http\r\n      .post<{ claim_id }>(`${this.config.authUrl}cove/claim/email/`, {\r\n        address: email,\r\n        context: 'signup',\r\n      })\r\n      .toPromise();\r\n    return claim_id;\r\n  }\r\n\r\n  public async verifyPhone(phoneNumber: string): Promise<string> {\r\n    const { claim_id } = await this.http\r\n      .post<{ claim_id }>(`${this.config.authUrl}cove/claim/sms/`, {\r\n        address: phoneNumber,\r\n        context: 'signup',\r\n      })\r\n      .toPromise();\r\n    return claim_id;\r\n  }\r\n\r\n  public async confirmVerificationCode(\r\n    verificationId: string,\r\n    verificationCode: string\r\n  ): Promise<string> {\r\n    const { token } = await this.http\r\n      .post<{ token }>(`${this.config.authUrl}cove/respond/`, {\r\n        claim_id: verificationId,\r\n        v_code: verificationCode,\r\n      })\r\n      .toPromise();\r\n    return token;\r\n  }\r\n\r\n  public async register(\r\n    email: string,\r\n    password: string,\r\n    verificationId: string,\r\n    verificationToken: string,\r\n    verificationType: 'email' | 'phone' = 'email'\r\n  ): Promise<RegisterResult> {\r\n    // Generate the key material needed for PassIdp which will be the password used for Cognito.\r\n    const passKeyBundle = await this.passwordService.createPassKeyBundle(\r\n      password\r\n    );\r\n\r\n    const masterKey = await this.keyFactory.createKey();\r\n    const wrappedMasterKey = await this.encryptionService.encrypt(\r\n      passKeyBundle.passKey,\r\n      masterKey.toJSON(true)\r\n    );\r\n\r\n    const rootKey = await this.keyFactory.createKey();\r\n    const wrappedRootKey = await this.encryptionService.encrypt(\r\n      masterKey,\r\n      rootKey.toJSON(true)\r\n    );\r\n\r\n    // Encryption PKC key\r\n    const prk = await this.keyFactory.createPkcKey();\r\n    const wrappedPrk = await this.encryptionService.encrypt(\r\n      rootKey,\r\n      prk.toJSON(true)\r\n    );\r\n\r\n    // Signing PKC key\r\n    const sigPrk = await this.keyFactory.createPkcSignKey();\r\n    const wrappedSigPrk = await this.encryptionService.encrypt(\r\n      rootKey,\r\n      sigPrk.toJSON(true)\r\n    );\r\n\r\n    // API call to setup profile\r\n    const user = await this.http\r\n      .post<any>(`${this.config.authUrl}users/`, {\r\n        claims: [\r\n          {\r\n            type: verificationType,\r\n            token: verificationToken,\r\n            claim_id: verificationId,\r\n          },\r\n        ],\r\n        pass_idp_params: passKeyBundle.passIdpParams,\r\n        pass_idp_verifier_pbk: passKeyBundle.passIdpVerifier.toJSON(),\r\n        wrapped_pass_idp_verifier_prk: passKeyBundle.wrappedPassIdpVerifierPrk,\r\n        pass_key_params: passKeyBundle.passKeyParams,\r\n        wrapped_master_key: wrappedMasterKey,\r\n        wrapped_root_key: wrappedRootKey,\r\n        pbk: prk.toJSON(), // public encryption key\r\n        wrapped_prk: wrappedPrk,\r\n        sig_pbk: sigPrk.toJSON(), // public signing key\r\n        wrapped_sig_prk: wrappedSigPrk,\r\n      })\r\n      .toPromise();\r\n\r\n    // API call to create user on cognito\r\n    const attributes = {};\r\n    user.claims.forEach((claim) => {\r\n      attributes[claim.type] = claim.value;\r\n    });\r\n\r\n    // Random suffix for uniqueness. If there's a duplicate, then used just needs to\r\n    // sign up again. But chances of collision is low.\r\n    const suffix = this.keyFactory.randomDigitsNoZeros(4);\r\n\r\n    const cognitoUser = await this.auth.signUp({\r\n      username: `${email.split('@')[0]}.${suffix}`,\r\n      password: this.passwordService.getPassIdpString(passKeyBundle.passIdp),\r\n      attributes,\r\n      // Unfortunately, validationData is not passed to the post\r\n      // confirmation cognito trigger. So can can't do the association there.\r\n      // The current workflow will create a new user on LR before signing up\r\n      // with Cognito. Then Cognito can use the user.id and user.pre_sign_up_token to\r\n      // do the validation of the attributes.\r\n      // validationData: [\r\n      //   new CognitoUserAttribute({\r\n      //     Name: \"user_id\",\r\n      //     Value: String(user.id)\r\n      //   }),\r\n      //   new CognitoUserAttribute({\r\n      //     Name: \"user_pre_sign_up_token\",\r\n      //     Value: user.pre_sign_up_token\r\n      //   })\r\n      // ]\r\n      clientMetadata: {\r\n        user_id: String(user.id),\r\n        user_pre_sign_up_token: String(user.pre_sign_up_token),\r\n      },\r\n    });\r\n\r\n    return {\r\n      username: cognitoUser.user.getUsername(),\r\n      userId: user.id,\r\n      preSignUpToken: user.pre_sign_up_token,\r\n      userSub: cognitoUser.userSub,\r\n    };\r\n  }\r\n\r\n  public async hibpBreachedAccounts(account: string): Promise<any> {\r\n    // The account is just the email\r\n    try {\r\n      const response = await this.http\r\n        .get(\r\n          `${this.config.authUrl}users/hibp/breachedaccount/${account}/?truncateResponse=false`\r\n        )\r\n        .toPromise();\r\n      return response;\r\n    } catch (error) {\r\n      if (error.status === 404) {\r\n        return null;\r\n      } else {\r\n        throw error;\r\n      }\r\n    }\r\n  }\r\n}\r\n"]}
|
|
1
|
+
import { __awaiter } from "tslib";
|
|
2
|
+
import { HttpClient } from '@angular/common/http';
|
|
3
|
+
import { Inject, Injectable } from '@angular/core';
|
|
4
|
+
import { AuthClass } from '@aws-amplify/auth/lib-esm/Auth';
|
|
5
|
+
import { EncryptionService } from '../cryptography/encryption.service';
|
|
6
|
+
import { KeyFactoryService } from '../cryptography/key-factory.service';
|
|
7
|
+
import { LR_CONFIG } from '../life-ready.config';
|
|
8
|
+
import { PasswordService } from './password.service';
|
|
9
|
+
import * as i0 from "@angular/core";
|
|
10
|
+
import * as i1 from "../life-ready.config";
|
|
11
|
+
import * as i2 from "@aws-amplify/auth/lib-esm/Auth";
|
|
12
|
+
import * as i3 from "@angular/common/http";
|
|
13
|
+
import * as i4 from "../cryptography/key-factory.service";
|
|
14
|
+
import * as i5 from "../cryptography/encryption.service";
|
|
15
|
+
import * as i6 from "./password.service";
|
|
16
|
+
export class RegisterService {
|
|
17
|
+
constructor(config, auth, http, keyFactory, encryptionService, passwordService) {
|
|
18
|
+
this.config = config;
|
|
19
|
+
this.auth = auth;
|
|
20
|
+
this.http = http;
|
|
21
|
+
this.keyFactory = keyFactory;
|
|
22
|
+
this.encryptionService = encryptionService;
|
|
23
|
+
this.passwordService = passwordService;
|
|
24
|
+
}
|
|
25
|
+
/**
|
|
26
|
+
* Request a verification code to be sent out to an email.
|
|
27
|
+
* @return Info needed to be submitted along with the verification code
|
|
28
|
+
*/
|
|
29
|
+
verifyEmail(email) {
|
|
30
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
31
|
+
const { claim_id } = yield this.http
|
|
32
|
+
.post(`${this.config.authUrl}cove/claim/email/`, {
|
|
33
|
+
address: email,
|
|
34
|
+
context: 'signup',
|
|
35
|
+
})
|
|
36
|
+
.toPromise();
|
|
37
|
+
return claim_id;
|
|
38
|
+
});
|
|
39
|
+
}
|
|
40
|
+
verifyPhone(phoneNumber) {
|
|
41
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
42
|
+
const { claim_id } = yield this.http
|
|
43
|
+
.post(`${this.config.authUrl}cove/claim/sms/`, {
|
|
44
|
+
address: phoneNumber,
|
|
45
|
+
context: 'signup',
|
|
46
|
+
})
|
|
47
|
+
.toPromise();
|
|
48
|
+
return claim_id;
|
|
49
|
+
});
|
|
50
|
+
}
|
|
51
|
+
confirmVerificationCode(verificationId, verificationCode) {
|
|
52
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
53
|
+
const { token } = yield this.http
|
|
54
|
+
.post(`${this.config.authUrl}cove/respond/`, {
|
|
55
|
+
claim_id: verificationId,
|
|
56
|
+
v_code: verificationCode,
|
|
57
|
+
})
|
|
58
|
+
.toPromise();
|
|
59
|
+
return token;
|
|
60
|
+
});
|
|
61
|
+
}
|
|
62
|
+
register(email, password, verificationId, verificationToken, verificationType = 'email') {
|
|
63
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
64
|
+
// Generate the key material needed for PassIdp which will be the password used for Cognito.
|
|
65
|
+
const passKeyBundle = yield this.passwordService.createPassKeyBundle(password);
|
|
66
|
+
const masterKey = yield this.keyFactory.createKey();
|
|
67
|
+
const wrappedMasterKey = yield this.encryptionService.encrypt(passKeyBundle.passKey, masterKey.toJSON(true));
|
|
68
|
+
const rootKey = yield this.keyFactory.createKey();
|
|
69
|
+
const wrappedRootKey = yield this.encryptionService.encrypt(masterKey, rootKey.toJSON(true));
|
|
70
|
+
// Encryption PKC key
|
|
71
|
+
const prk = yield this.keyFactory.createPkcKey();
|
|
72
|
+
const wrappedPrk = yield this.encryptionService.encrypt(rootKey, prk.toJSON(true));
|
|
73
|
+
// Signing PKC key
|
|
74
|
+
const sigPrk = yield this.keyFactory.createPkcSignKey();
|
|
75
|
+
const wrappedSigPrk = yield this.encryptionService.encrypt(rootKey, sigPrk.toJSON(true));
|
|
76
|
+
// API call to setup profile
|
|
77
|
+
const user = yield this.http
|
|
78
|
+
.post(`${this.config.authUrl}users/`, {
|
|
79
|
+
claims: [
|
|
80
|
+
{
|
|
81
|
+
type: verificationType,
|
|
82
|
+
token: verificationToken,
|
|
83
|
+
claim_id: verificationId,
|
|
84
|
+
},
|
|
85
|
+
],
|
|
86
|
+
pass_idp_params: passKeyBundle.passIdpParams,
|
|
87
|
+
pass_idp_verifier_pbk: passKeyBundle.passIdpVerifier.toJSON(),
|
|
88
|
+
wrapped_pass_idp_verifier_prk: passKeyBundle.wrappedPassIdpVerifierPrk,
|
|
89
|
+
pass_key_params: passKeyBundle.passKeyParams,
|
|
90
|
+
wrapped_master_key: wrappedMasterKey,
|
|
91
|
+
wrapped_root_key: wrappedRootKey,
|
|
92
|
+
pbk: prk.toJSON(),
|
|
93
|
+
wrapped_prk: wrappedPrk,
|
|
94
|
+
sig_pbk: sigPrk.toJSON(),
|
|
95
|
+
wrapped_sig_prk: wrappedSigPrk,
|
|
96
|
+
})
|
|
97
|
+
.toPromise();
|
|
98
|
+
// API call to create user on cognito
|
|
99
|
+
const attributes = {};
|
|
100
|
+
user.claims.forEach((claim) => {
|
|
101
|
+
attributes[claim.type] = claim.value;
|
|
102
|
+
});
|
|
103
|
+
// Random suffix for uniqueness. If there's a duplicate, then used just needs to
|
|
104
|
+
// sign up again. But chances of collision is low.
|
|
105
|
+
const suffix = this.keyFactory.randomDigitsNoZeros(4);
|
|
106
|
+
const cognitoUser = yield this.auth.signUp({
|
|
107
|
+
username: `${email.split('@')[0]}.${suffix}`,
|
|
108
|
+
password: this.passwordService.getPassIdpString(passKeyBundle.passIdp),
|
|
109
|
+
attributes,
|
|
110
|
+
// Unfortunately, validationData is not passed to the post
|
|
111
|
+
// confirmation cognito trigger. So can can't do the association there.
|
|
112
|
+
// The current workflow will create a new user on LR before signing up
|
|
113
|
+
// with Cognito. Then Cognito can use the user.id and user.pre_sign_up_token to
|
|
114
|
+
// do the validation of the attributes.
|
|
115
|
+
// validationData: [
|
|
116
|
+
// new CognitoUserAttribute({
|
|
117
|
+
// Name: "user_id",
|
|
118
|
+
// Value: String(user.id)
|
|
119
|
+
// }),
|
|
120
|
+
// new CognitoUserAttribute({
|
|
121
|
+
// Name: "user_pre_sign_up_token",
|
|
122
|
+
// Value: user.pre_sign_up_token
|
|
123
|
+
// })
|
|
124
|
+
// ]
|
|
125
|
+
clientMetadata: {
|
|
126
|
+
user_id: String(user.id),
|
|
127
|
+
user_pre_sign_up_token: String(user.pre_sign_up_token),
|
|
128
|
+
},
|
|
129
|
+
});
|
|
130
|
+
return {
|
|
131
|
+
username: cognitoUser.user.getUsername(),
|
|
132
|
+
userId: user.id,
|
|
133
|
+
preSignUpToken: user.pre_sign_up_token,
|
|
134
|
+
userSub: cognitoUser.userSub,
|
|
135
|
+
};
|
|
136
|
+
});
|
|
137
|
+
}
|
|
138
|
+
hibpBreachedAccounts(account) {
|
|
139
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
140
|
+
// The account is just the email
|
|
141
|
+
try {
|
|
142
|
+
const response = yield this.http
|
|
143
|
+
.get(`${this.config.authUrl}users/hibp/breachedaccount/${account}/?truncateResponse=false`)
|
|
144
|
+
.toPromise();
|
|
145
|
+
return response;
|
|
146
|
+
}
|
|
147
|
+
catch (error) {
|
|
148
|
+
if (error.status === 404) {
|
|
149
|
+
return null;
|
|
150
|
+
}
|
|
151
|
+
else {
|
|
152
|
+
throw error;
|
|
153
|
+
}
|
|
154
|
+
}
|
|
155
|
+
});
|
|
156
|
+
}
|
|
157
|
+
}
|
|
158
|
+
RegisterService.ɵprov = i0.ɵɵdefineInjectable({ factory: function RegisterService_Factory() { return new RegisterService(i0.ɵɵinject(i1.LR_CONFIG), i0.ɵɵinject(i2.AuthClass), i0.ɵɵinject(i3.HttpClient), i0.ɵɵinject(i4.KeyFactoryService), i0.ɵɵinject(i5.EncryptionService), i0.ɵɵinject(i6.PasswordService)); }, token: RegisterService, providedIn: "root" });
|
|
159
|
+
RegisterService.decorators = [
|
|
160
|
+
{ type: Injectable, args: [{
|
|
161
|
+
providedIn: 'root',
|
|
162
|
+
},] }
|
|
163
|
+
];
|
|
164
|
+
RegisterService.ctorParameters = () => [
|
|
165
|
+
{ type: undefined, decorators: [{ type: Inject, args: [LR_CONFIG,] }] },
|
|
166
|
+
{ type: AuthClass },
|
|
167
|
+
{ type: HttpClient },
|
|
168
|
+
{ type: KeyFactoryService },
|
|
169
|
+
{ type: EncryptionService },
|
|
170
|
+
{ type: PasswordService }
|
|
171
|
+
];
|
|
172
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"register.service.js","sourceRoot":"/opt/atlassian/pipelines/agent/build/projects/core/src/","sources":["lib/auth/register.service.ts"],"names":[],"mappings":";AAAA,OAAO,EAAE,UAAU,EAAE,MAAM,sBAAsB,CAAC;AAClD,OAAO,EAAE,MAAM,EAAE,UAAU,EAAE,MAAM,eAAe,CAAC;AACnD,OAAO,EAAE,SAAS,EAAE,MAAM,gCAAgC,CAAC;AAC3D,OAAO,EAAE,iBAAiB,EAAE,MAAM,oCAAoC,CAAC;AACvE,OAAO,EAAE,iBAAiB,EAAE,MAAM,qCAAqC,CAAC;AACxE,OAAO,EAAmB,SAAS,EAAE,MAAM,sBAAsB,CAAC;AAClE,OAAO,EAAE,eAAe,EAAE,MAAM,oBAAoB,CAAC;;;;;;;;AAMrD,MAAM,OAAO,eAAe;IAC1B,YAC6B,MAAuB,EAC1C,IAAe,EACf,IAAgB,EAChB,UAA6B,EAC7B,iBAAoC,EACpC,eAAgC;QALb,WAAM,GAAN,MAAM,CAAiB;QAC1C,SAAI,GAAJ,IAAI,CAAW;QACf,SAAI,GAAJ,IAAI,CAAY;QAChB,eAAU,GAAV,UAAU,CAAmB;QAC7B,sBAAiB,GAAjB,iBAAiB,CAAmB;QACpC,oBAAe,GAAf,eAAe,CAAiB;IACvC,CAAC;IAEJ;;;OAGG;IACU,WAAW,CAAC,KAAa;;YACpC,MAAM,EAAE,QAAQ,EAAE,GAAG,MAAM,IAAI,CAAC,IAAI;iBACjC,IAAI,CAAe,GAAG,IAAI,CAAC,MAAM,CAAC,OAAO,mBAAmB,EAAE;gBAC7D,OAAO,EAAE,KAAK;gBACd,OAAO,EAAE,QAAQ;aAClB,CAAC;iBACD,SAAS,EAAE,CAAC;YACf,OAAO,QAAQ,CAAC;QAClB,CAAC;KAAA;IAEY,WAAW,CAAC,WAAmB;;YAC1C,MAAM,EAAE,QAAQ,EAAE,GAAG,MAAM,IAAI,CAAC,IAAI;iBACjC,IAAI,CAAe,GAAG,IAAI,CAAC,MAAM,CAAC,OAAO,iBAAiB,EAAE;gBAC3D,OAAO,EAAE,WAAW;gBACpB,OAAO,EAAE,QAAQ;aAClB,CAAC;iBACD,SAAS,EAAE,CAAC;YACf,OAAO,QAAQ,CAAC;QAClB,CAAC;KAAA;IAEY,uBAAuB,CAClC,cAAsB,EACtB,gBAAwB;;YAExB,MAAM,EAAE,KAAK,EAAE,GAAG,MAAM,IAAI,CAAC,IAAI;iBAC9B,IAAI,CAAY,GAAG,IAAI,CAAC,MAAM,CAAC,OAAO,eAAe,EAAE;gBACtD,QAAQ,EAAE,cAAc;gBACxB,MAAM,EAAE,gBAAgB;aACzB,CAAC;iBACD,SAAS,EAAE,CAAC;YACf,OAAO,KAAK,CAAC;QACf,CAAC;KAAA;IAEY,QAAQ,CACnB,KAAa,EACb,QAAgB,EAChB,cAAsB,EACtB,iBAAyB,EACzB,mBAAsC,OAAO;;YAE7C,4FAA4F;YAC5F,MAAM,aAAa,GAAG,MAAM,IAAI,CAAC,eAAe,CAAC,mBAAmB,CAClE,QAAQ,CACT,CAAC;YAEF,MAAM,SAAS,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,SAAS,EAAE,CAAC;YACpD,MAAM,gBAAgB,GAAG,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAC3D,aAAa,CAAC,OAAO,EACrB,SAAS,CAAC,MAAM,CAAC,IAAI,CAAC,CACvB,CAAC;YAEF,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,SAAS,EAAE,CAAC;YAClD,MAAM,cAAc,GAAG,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CACzD,SAAS,EACT,OAAO,CAAC,MAAM,CAAC,IAAI,CAAC,CACrB,CAAC;YAEF,qBAAqB;YACrB,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,YAAY,EAAE,CAAC;YACjD,MAAM,UAAU,GAAG,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CACrD,OAAO,EACP,GAAG,CAAC,MAAM,CAAC,IAAI,CAAC,CACjB,CAAC;YAEF,kBAAkB;YAClB,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,gBAAgB,EAAE,CAAC;YACxD,MAAM,aAAa,GAAG,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CACxD,OAAO,EACP,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CACpB,CAAC;YAEF,4BAA4B;YAC5B,MAAM,IAAI,GAAG,MAAM,IAAI,CAAC,IAAI;iBACzB,IAAI,CAAM,GAAG,IAAI,CAAC,MAAM,CAAC,OAAO,QAAQ,EAAE;gBACzC,MAAM,EAAE;oBACN;wBACE,IAAI,EAAE,gBAAgB;wBACtB,KAAK,EAAE,iBAAiB;wBACxB,QAAQ,EAAE,cAAc;qBACzB;iBACF;gBACD,eAAe,EAAE,aAAa,CAAC,aAAa;gBAC5C,qBAAqB,EAAE,aAAa,CAAC,eAAe,CAAC,MAAM,EAAE;gBAC7D,6BAA6B,EAAE,aAAa,CAAC,yBAAyB;gBACtE,eAAe,EAAE,aAAa,CAAC,aAAa;gBAC5C,kBAAkB,EAAE,gBAAgB;gBACpC,gBAAgB,EAAE,cAAc;gBAChC,GAAG,EAAE,GAAG,CAAC,MAAM,EAAE;gBACjB,WAAW,EAAE,UAAU;gBACvB,OAAO,EAAE,MAAM,CAAC,MAAM,EAAE;gBACxB,eAAe,EAAE,aAAa;aAC/B,CAAC;iBACD,SAAS,EAAE,CAAC;YAEf,qCAAqC;YACrC,MAAM,UAAU,GAAG,EAAE,CAAC;YACtB,IAAI,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC,KAAK,EAAE,EAAE;gBAC5B,UAAU,CAAC,KAAK,CAAC,IAAI,CAAC,GAAG,KAAK,CAAC,KAAK,CAAC;YACvC,CAAC,CAAC,CAAC;YAEH,gFAAgF;YAChF,kDAAkD;YAClD,MAAM,MAAM,GAAG,IAAI,CAAC,UAAU,CAAC,mBAAmB,CAAC,CAAC,CAAC,CAAC;YAEtD,MAAM,WAAW,GAAG,MAAM,IAAI,CAAC,IAAI,CAAC,MAAM,CAAC;gBACzC,QAAQ,EAAE,GAAG,KAAK,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,IAAI,MAAM,EAAE;gBAC5C,QAAQ,EAAE,IAAI,CAAC,eAAe,CAAC,gBAAgB,CAAC,aAAa,CAAC,OAAO,CAAC;gBACtE,UAAU;gBACV,0DAA0D;gBAC1D,uEAAuE;gBACvE,sEAAsE;gBACtE,+EAA+E;gBAC/E,uCAAuC;gBACvC,oBAAoB;gBACpB,+BAA+B;gBAC/B,uBAAuB;gBACvB,6BAA6B;gBAC7B,QAAQ;gBACR,+BAA+B;gBAC/B,sCAAsC;gBACtC,oCAAoC;gBACpC,OAAO;gBACP,IAAI;gBACJ,cAAc,EAAE;oBACd,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,EAAE,CAAC;oBACxB,sBAAsB,EAAE,MAAM,CAAC,IAAI,CAAC,iBAAiB,CAAC;iBACvD;aACF,CAAC,CAAC;YAEH,OAAO;gBACL,QAAQ,EAAE,WAAW,CAAC,IAAI,CAAC,WAAW,EAAE;gBACxC,MAAM,EAAE,IAAI,CAAC,EAAE;gBACf,cAAc,EAAE,IAAI,CAAC,iBAAiB;gBACtC,OAAO,EAAE,WAAW,CAAC,OAAO;aAC7B,CAAC;QACJ,CAAC;KAAA;IAEY,oBAAoB,CAAC,OAAe;;YAC/C,gCAAgC;YAChC,IAAI;gBACF,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,IAAI;qBAC7B,GAAG,CACF,GAAG,IAAI,CAAC,MAAM,CAAC,OAAO,8BAA8B,OAAO,0BAA0B,CACtF;qBACA,SAAS,EAAE,CAAC;gBACf,OAAO,QAAQ,CAAC;aACjB;YAAC,OAAO,KAAK,EAAE;gBACd,IAAI,KAAK,CAAC,MAAM,KAAK,GAAG,EAAE;oBACxB,OAAO,IAAI,CAAC;iBACb;qBAAM;oBACL,MAAM,KAAK,CAAC;iBACb;aACF;QACH,CAAC;KAAA;;;;YA1KF,UAAU,SAAC;gBACV,UAAU,EAAE,MAAM;aACnB;;;4CAGI,MAAM,SAAC,SAAS;YAZZ,SAAS;YAFT,UAAU;YAIV,iBAAiB;YADjB,iBAAiB;YAGjB,eAAe","sourcesContent":["import { HttpClient } from '@angular/common/http';\nimport { Inject, Injectable } from '@angular/core';\nimport { AuthClass } from '@aws-amplify/auth/lib-esm/Auth';\nimport { EncryptionService } from '../cryptography/encryption.service';\nimport { KeyFactoryService } from '../cryptography/key-factory.service';\nimport { LifeReadyConfig, LR_CONFIG } from '../life-ready.config';\nimport { PasswordService } from './password.service';\nimport { RegisterResult } from './auth.types';\n\n@Injectable({\n  providedIn: 'root',\n})\nexport class RegisterService {\n  constructor(\n    @Inject(LR_CONFIG) private config: LifeReadyConfig,\n    private auth: AuthClass,\n    private http: HttpClient,\n    private keyFactory: KeyFactoryService,\n    private encryptionService: EncryptionService,\n    private passwordService: PasswordService\n  ) {}\n\n  /**\n   * Request a verification code to be sent out to an email.\n   * @return Info needed to be submitted along with the verification code\n   */\n  public async verifyEmail(email: string): Promise<string> {\n    const { claim_id } = await this.http\n      .post<{ claim_id }>(`${this.config.authUrl}cove/claim/email/`, {\n        address: email,\n        context: 'signup',\n      })\n      .toPromise();\n    return claim_id;\n  }\n\n  public async verifyPhone(phoneNumber: string): Promise<string> {\n    const { claim_id } = await this.http\n      .post<{ claim_id }>(`${this.config.authUrl}cove/claim/sms/`, {\n        address: phoneNumber,\n        context: 'signup',\n      })\n      .toPromise();\n    return claim_id;\n  }\n\n  public async confirmVerificationCode(\n    verificationId: string,\n    verificationCode: string\n  ): Promise<string> {\n    const { token } = await this.http\n      .post<{ token }>(`${this.config.authUrl}cove/respond/`, {\n        claim_id: verificationId,\n        v_code: verificationCode,\n      })\n      .toPromise();\n    return token;\n  }\n\n  public async register(\n    email: string,\n    password: string,\n    verificationId: string,\n    verificationToken: string,\n    verificationType: 'email' | 'phone' = 'email'\n  ): Promise<RegisterResult> {\n    // Generate the key material needed for PassIdp which will be the password used for Cognito.\n    const passKeyBundle = await this.passwordService.createPassKeyBundle(\n      password\n    );\n\n    const masterKey = await this.keyFactory.createKey();\n    const wrappedMasterKey = await this.encryptionService.encrypt(\n      passKeyBundle.passKey,\n      masterKey.toJSON(true)\n    );\n\n    const rootKey = await this.keyFactory.createKey();\n    const wrappedRootKey = await this.encryptionService.encrypt(\n      masterKey,\n      rootKey.toJSON(true)\n    );\n\n    // Encryption PKC key\n    const prk = await this.keyFactory.createPkcKey();\n    const wrappedPrk = await this.encryptionService.encrypt(\n      rootKey,\n      prk.toJSON(true)\n    );\n\n    // Signing PKC key\n    const sigPrk = await this.keyFactory.createPkcSignKey();\n    const wrappedSigPrk = await this.encryptionService.encrypt(\n      rootKey,\n      sigPrk.toJSON(true)\n    );\n\n    // API call to setup profile\n    const user = await this.http\n      .post<any>(`${this.config.authUrl}users/`, {\n        claims: [\n          {\n            type: verificationType,\n            token: verificationToken,\n            claim_id: verificationId,\n          },\n        ],\n        pass_idp_params: passKeyBundle.passIdpParams,\n        pass_idp_verifier_pbk: passKeyBundle.passIdpVerifier.toJSON(),\n        wrapped_pass_idp_verifier_prk: passKeyBundle.wrappedPassIdpVerifierPrk,\n        pass_key_params: passKeyBundle.passKeyParams,\n        wrapped_master_key: wrappedMasterKey,\n        wrapped_root_key: wrappedRootKey,\n        pbk: prk.toJSON(), // public encryption key\n        wrapped_prk: wrappedPrk,\n        sig_pbk: sigPrk.toJSON(), // public signing key\n        wrapped_sig_prk: wrappedSigPrk,\n      })\n      .toPromise();\n\n    // API call to create user on cognito\n    const attributes = {};\n    user.claims.forEach((claim) => {\n      attributes[claim.type] = claim.value;\n    });\n\n    // Random suffix for uniqueness. If there's a duplicate, then used just needs to\n    // sign up again. But chances of collision is low.\n    const suffix = this.keyFactory.randomDigitsNoZeros(4);\n\n    const cognitoUser = await this.auth.signUp({\n      username: `${email.split('@')[0]}.${suffix}`,\n      password: this.passwordService.getPassIdpString(passKeyBundle.passIdp),\n      attributes,\n      // Unfortunately, validationData is not passed to the post\n      // confirmation cognito trigger. So can can't do the association there.\n      // The current workflow will create a new user on LR before signing up\n      // with Cognito. Then Cognito can use the user.id and user.pre_sign_up_token to\n      // do the validation of the attributes.\n      // validationData: [\n      //   new CognitoUserAttribute({\n      //     Name: \"user_id\",\n      //     Value: String(user.id)\n      //   }),\n      //   new CognitoUserAttribute({\n      //     Name: \"user_pre_sign_up_token\",\n      //     Value: user.pre_sign_up_token\n      //   })\n      // ]\n      clientMetadata: {\n        user_id: String(user.id),\n        user_pre_sign_up_token: String(user.pre_sign_up_token),\n      },\n    });\n\n    return {\n      username: cognitoUser.user.getUsername(),\n      userId: user.id,\n      preSignUpToken: user.pre_sign_up_token,\n      userSub: cognitoUser.userSub,\n    };\n  }\n\n  public async hibpBreachedAccounts(account: string): Promise<any> {\n    // The account is just the email\n    try {\n      const response = await this.http\n        .get(\n          `${this.config.authUrl}users/hibp/breachedaccount/${account}/?truncateResponse=false`\n        )\n        .toPromise();\n      return response;\n    } catch (error) {\n      if (error.status === 404) {\n        return null;\n      } else {\n        throw error;\n      }\n    }\n  }\n}\n"]}
|
|
@@ -1,74 +1,74 @@
|
|
|
1
|
-
import { __awaiter } from "tslib";
|
|
2
|
-
import { Injectable } from '@angular/core';
|
|
3
|
-
import { AuthClass } from '@aws-amplify/auth/lib-esm/Auth';
|
|
4
|
-
import { LrBadArgumentException } from '../_common/exceptions';
|
|
5
|
-
import * as i0 from "@angular/core";
|
|
6
|
-
import * as i1 from "@aws-amplify/auth/lib-esm/Auth";
|
|
7
|
-
export class TwoFactorService {
|
|
8
|
-
constructor(auth) {
|
|
9
|
-
this.auth = auth;
|
|
10
|
-
}
|
|
11
|
-
getPreferredMFA() {
|
|
12
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
13
|
-
const cognitoUser = yield this.auth.currentAuthenticatedUser();
|
|
14
|
-
return yield this.auth.getPreferredMFA(cognitoUser);
|
|
15
|
-
});
|
|
16
|
-
}
|
|
17
|
-
setPreferredMFA(method) {
|
|
18
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
19
|
-
const cognitoUser = yield this.auth.currentAuthenticatedUser();
|
|
20
|
-
yield this.auth.setPreferredMFA(cognitoUser, method);
|
|
21
|
-
});
|
|
22
|
-
}
|
|
23
|
-
setPhoneNumber(phone) {
|
|
24
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
25
|
-
const cognitoUser = yield this.auth.currentAuthenticatedUser();
|
|
26
|
-
yield this.auth.updateUserAttributes(cognitoUser, {
|
|
27
|
-
phone_number: phone,
|
|
28
|
-
});
|
|
29
|
-
});
|
|
30
|
-
}
|
|
31
|
-
getSMSCode() {
|
|
32
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
33
|
-
yield this.auth.verifyCurrentUserAttribute('phone_number');
|
|
34
|
-
});
|
|
35
|
-
}
|
|
36
|
-
verifySMSCode(verificationCode) {
|
|
37
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
38
|
-
yield this.auth.verifyCurrentUserAttributeSubmit('phone_number', verificationCode);
|
|
39
|
-
});
|
|
40
|
-
}
|
|
41
|
-
getSoftwareToken() {
|
|
42
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
43
|
-
const [cognitoUser, userInfo] = yield Promise.all([
|
|
44
|
-
this.auth.currentAuthenticatedUser(),
|
|
45
|
-
this.auth.currentUserInfo(),
|
|
46
|
-
]);
|
|
47
|
-
const code = yield this.auth.setupTOTP(cognitoUser);
|
|
48
|
-
const email = userInfo.attributes.email;
|
|
49
|
-
if (!email) {
|
|
50
|
-
throw new LrBadArgumentException('No email associated with user.');
|
|
51
|
-
}
|
|
52
|
-
return {
|
|
53
|
-
code,
|
|
54
|
-
codeUri: `otpauth://totp/${email}?secret=${code}&issuer=LifeReady`,
|
|
55
|
-
};
|
|
56
|
-
});
|
|
57
|
-
}
|
|
58
|
-
verifySoftwareToken(totpCode) {
|
|
59
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
60
|
-
const cognitoUser = yield this.auth.currentAuthenticatedUser();
|
|
61
|
-
yield this.auth.verifyTotpToken(cognitoUser, totpCode);
|
|
62
|
-
});
|
|
63
|
-
}
|
|
64
|
-
}
|
|
65
|
-
TwoFactorService.ɵprov = i0.ɵɵdefineInjectable({ factory: function TwoFactorService_Factory() { return new TwoFactorService(i0.ɵɵinject(i1.AuthClass)); }, token: TwoFactorService, providedIn: "root" });
|
|
66
|
-
TwoFactorService.decorators = [
|
|
67
|
-
{ type: Injectable, args: [{
|
|
68
|
-
providedIn: 'root',
|
|
69
|
-
},] }
|
|
70
|
-
];
|
|
71
|
-
TwoFactorService.ctorParameters = () => [
|
|
72
|
-
{ type: AuthClass }
|
|
73
|
-
];
|
|
74
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
1
|
+
import { __awaiter } from "tslib";
|
|
2
|
+
import { Injectable } from '@angular/core';
|
|
3
|
+
import { AuthClass } from '@aws-amplify/auth/lib-esm/Auth';
|
|
4
|
+
import { LrBadArgumentException } from '../_common/exceptions';
|
|
5
|
+
import * as i0 from "@angular/core";
|
|
6
|
+
import * as i1 from "@aws-amplify/auth/lib-esm/Auth";
|
|
7
|
+
export class TwoFactorService {
|
|
8
|
+
constructor(auth) {
|
|
9
|
+
this.auth = auth;
|
|
10
|
+
}
|
|
11
|
+
getPreferredMFA() {
|
|
12
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
13
|
+
const cognitoUser = yield this.auth.currentAuthenticatedUser();
|
|
14
|
+
return yield this.auth.getPreferredMFA(cognitoUser);
|
|
15
|
+
});
|
|
16
|
+
}
|
|
17
|
+
setPreferredMFA(method) {
|
|
18
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
19
|
+
const cognitoUser = yield this.auth.currentAuthenticatedUser();
|
|
20
|
+
yield this.auth.setPreferredMFA(cognitoUser, method);
|
|
21
|
+
});
|
|
22
|
+
}
|
|
23
|
+
setPhoneNumber(phone) {
|
|
24
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
25
|
+
const cognitoUser = yield this.auth.currentAuthenticatedUser();
|
|
26
|
+
yield this.auth.updateUserAttributes(cognitoUser, {
|
|
27
|
+
phone_number: phone,
|
|
28
|
+
});
|
|
29
|
+
});
|
|
30
|
+
}
|
|
31
|
+
getSMSCode() {
|
|
32
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
33
|
+
yield this.auth.verifyCurrentUserAttribute('phone_number');
|
|
34
|
+
});
|
|
35
|
+
}
|
|
36
|
+
verifySMSCode(verificationCode) {
|
|
37
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
38
|
+
yield this.auth.verifyCurrentUserAttributeSubmit('phone_number', verificationCode);
|
|
39
|
+
});
|
|
40
|
+
}
|
|
41
|
+
getSoftwareToken() {
|
|
42
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
43
|
+
const [cognitoUser, userInfo] = yield Promise.all([
|
|
44
|
+
this.auth.currentAuthenticatedUser(),
|
|
45
|
+
this.auth.currentUserInfo(),
|
|
46
|
+
]);
|
|
47
|
+
const code = yield this.auth.setupTOTP(cognitoUser);
|
|
48
|
+
const email = userInfo.attributes.email;
|
|
49
|
+
if (!email) {
|
|
50
|
+
throw new LrBadArgumentException('No email associated with user.');
|
|
51
|
+
}
|
|
52
|
+
return {
|
|
53
|
+
code,
|
|
54
|
+
codeUri: `otpauth://totp/${email}?secret=${code}&issuer=LifeReady`,
|
|
55
|
+
};
|
|
56
|
+
});
|
|
57
|
+
}
|
|
58
|
+
verifySoftwareToken(totpCode) {
|
|
59
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
60
|
+
const cognitoUser = yield this.auth.currentAuthenticatedUser();
|
|
61
|
+
yield this.auth.verifyTotpToken(cognitoUser, totpCode);
|
|
62
|
+
});
|
|
63
|
+
}
|
|
64
|
+
}
|
|
65
|
+
TwoFactorService.ɵprov = i0.ɵɵdefineInjectable({ factory: function TwoFactorService_Factory() { return new TwoFactorService(i0.ɵɵinject(i1.AuthClass)); }, token: TwoFactorService, providedIn: "root" });
|
|
66
|
+
TwoFactorService.decorators = [
|
|
67
|
+
{ type: Injectable, args: [{
|
|
68
|
+
providedIn: 'root',
|
|
69
|
+
},] }
|
|
70
|
+
];
|
|
71
|
+
TwoFactorService.ctorParameters = () => [
|
|
72
|
+
{ type: AuthClass }
|
|
73
|
+
];
|
|
74
|
+
//# sourceMappingURL=data:application/json;base64,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
|