@lifeready/core 1.1.6 → 1.1.7
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/bundles/lifeready-core.umd.js +7 -22
- package/bundles/lifeready-core.umd.js.map +1 -1
- package/bundles/lifeready-core.umd.min.js +1 -1
- package/bundles/lifeready-core.umd.min.js.map +1 -1
- package/esm2015/lib/api/types/lr-graphql.types.js +1 -1
- package/esm2015/lib/auth/life-ready-auth.service.js +3 -7
- package/esm2015/lib/item2/item2.service.js +1 -2
- package/esm2015/lib/key/key-graph.service.js +1 -4
- package/esm2015/lib/scenario/scenario.service.js +1 -2
- package/esm2015/lib/tp-assembly/tp-assembly.js +1 -3
- package/esm2015/lib/tp-password-reset/tp-password-reset-request.service.js +1 -3
- package/esm2015/lib/tp-password-reset/tp-password-reset-user.service.js +3 -4
- package/fesm2015/lifeready-core.js +4 -18
- package/fesm2015/lifeready-core.js.map +1 -1
- package/lib/api/types/lr-graphql.types.d.ts +7 -0
- package/package.json +1 -1
|
@@ -1994,10 +1994,8 @@
|
|
|
1994
1994
|
if (!!path_1_1.done) return [3 /*break*/, 4];
|
|
1995
1995
|
link = path_1_1.value;
|
|
1996
1996
|
dstKey = this.key(link.data.keyId);
|
|
1997
|
-
// console.log("key: ", link.data.keyId);
|
|
1998
1997
|
if (dstKey.jwk) {
|
|
1999
1998
|
key = dstKey.jwk;
|
|
2000
|
-
// console.log("Returning cached key: ", link.data.keyId);
|
|
2001
1999
|
return [3 /*break*/, 3];
|
|
2002
2000
|
}
|
|
2003
2001
|
if (!dstKey.task) {
|
|
@@ -5633,7 +5631,6 @@
|
|
|
5633
5631
|
case 0: return [4 /*yield*/, this.keyFactory.createKey()];
|
|
5634
5632
|
case 1:
|
|
5635
5633
|
assemblyKey = _c.sent();
|
|
5636
|
-
console.log('prepareAssembly assemblyKey', assemblyKey);
|
|
5637
5634
|
_a = assemblyKey.toJSON(true), rawAssemblyKey = _a.k, assemblyKeyParams = __rest(_a, ["k"]);
|
|
5638
5635
|
return [4 /*yield*/, this.keyFactory.createPkcSignKey()];
|
|
5639
5636
|
case 2:
|
|
@@ -6004,7 +6001,6 @@
|
|
|
6004
6001
|
},
|
|
6005
6002
|
assemblyKeyParams: assemblyKeyParams,
|
|
6006
6003
|
};
|
|
6007
|
-
console.log('partialAssemblyKey', partialAssemblyKey);
|
|
6008
6004
|
return [4 /*yield*/, this.encryptionService.encryptToString(sharedKey, tp.sharedCipherDataClearJson || '')];
|
|
6009
6005
|
case 5:
|
|
6010
6006
|
sharedCipherData = _c.sent();
|
|
@@ -6622,13 +6618,13 @@
|
|
|
6622
6618
|
cognitoUser = _b.sent();
|
|
6623
6619
|
refreshToken = cognitoUser.getSignInUserSession().getRefreshToken();
|
|
6624
6620
|
return [2 /*return*/, new Promise(function (resolve, reject) {
|
|
6625
|
-
cognitoUser.refreshSession(refreshToken, function (err
|
|
6621
|
+
cognitoUser.refreshSession(refreshToken, function (err) {
|
|
6626
6622
|
if (err) {
|
|
6627
6623
|
console.error('Error refreshing token: ', err);
|
|
6628
6624
|
reject(err);
|
|
6629
6625
|
}
|
|
6630
6626
|
else {
|
|
6631
|
-
console.log('Token refresh complete
|
|
6627
|
+
console.log('Token refresh complete');
|
|
6632
6628
|
resolve(0);
|
|
6633
6629
|
}
|
|
6634
6630
|
});
|
|
@@ -6655,7 +6651,6 @@
|
|
|
6655
6651
|
return [4 /*yield*/, this.encryptionService.decrypt(assemblyKey, resetUser.assemblyCipherData)];
|
|
6656
6652
|
case 3:
|
|
6657
6653
|
rootKey = (_b.sent()).rootKey;
|
|
6658
|
-
console.log(rootKey);
|
|
6659
6654
|
return [4 /*yield*/, nodeJose.JWK.asKey(rootKey)];
|
|
6660
6655
|
case 4:
|
|
6661
6656
|
rootKeyJwk = _b.sent();
|
|
@@ -6679,11 +6674,9 @@
|
|
|
6679
6674
|
})];
|
|
6680
6675
|
case 8:
|
|
6681
6676
|
challenge = (_b.sent()).createTpAssemblyKeyChallenge.challenge;
|
|
6682
|
-
console.log(challenge);
|
|
6683
6677
|
// Sign the challenge
|
|
6684
6678
|
// Generate a client side nonce that's no in the server's control.
|
|
6685
6679
|
challenge.clientNonce = this.keyFactory.randomString(TP_PASSWORD_RESET_CLIENT_NONCE_LENGTH);
|
|
6686
|
-
console.log(challenge);
|
|
6687
6680
|
return [4 /*yield*/, this.encryptionService.decrypt(assemblyKey, resetUser.wrappedAssemblyKeyVerifierPrk)];
|
|
6688
6681
|
case 9:
|
|
6689
6682
|
assemblyKeyVerifierPrk = _b.sent();
|
|
@@ -6711,7 +6704,6 @@
|
|
|
6711
6704
|
return [2 /*return*/];
|
|
6712
6705
|
}
|
|
6713
6706
|
core$1.Hub.remove('auth', listener);
|
|
6714
|
-
console.log(data.payload);
|
|
6715
6707
|
return [4 /*yield*/, this.auth.signIn(resetUser.username, newIdpPassword)];
|
|
6716
6708
|
case 1:
|
|
6717
6709
|
_b.sent();
|
|
@@ -8453,7 +8445,7 @@
|
|
|
8453
8445
|
_l.label = 3;
|
|
8454
8446
|
case 3:
|
|
8455
8447
|
fileContent = _c;
|
|
8456
|
-
if (!fileContent) return [3 /*break*/,
|
|
8448
|
+
if (!fileContent) return [3 /*break*/, 8];
|
|
8457
8449
|
return [4 /*yield*/, this.keyGraph.encryptToString(fileStateKey, fileContent)];
|
|
8458
8450
|
case 4:
|
|
8459
8451
|
cipherFileContent = _l.sent();
|
|
@@ -8469,18 +8461,15 @@
|
|
|
8469
8461
|
contentResource = _l.sent();
|
|
8470
8462
|
_l.label = 8;
|
|
8471
8463
|
case 8:
|
|
8472
|
-
console.log('contentResource', contentResource);
|
|
8473
|
-
_l.label = 9;
|
|
8474
|
-
case 9:
|
|
8475
8464
|
_e = (_d = Object).assign;
|
|
8476
8465
|
_g = (_f = Object).assign;
|
|
8477
8466
|
_h = [{}];
|
|
8478
8467
|
return [4 /*yield*/, this.prepareItem(fileStateKey, options)];
|
|
8479
|
-
case
|
|
8468
|
+
case 9:
|
|
8480
8469
|
_j = [_g.apply(_f, _h.concat([(_l.sent())]))];
|
|
8481
8470
|
_k = {};
|
|
8482
8471
|
return [4 /*yield*/, this.keyGraph.wrapKey(fileKey, fileStateKey)];
|
|
8483
|
-
case
|
|
8472
|
+
case 10: return [2 /*return*/, _e.apply(_d, _j.concat([(_k.wrappedStateKey = _l.sent(), _k.contentResource = contentResource, _k)]))];
|
|
8484
8473
|
}
|
|
8485
8474
|
});
|
|
8486
8475
|
});
|
|
@@ -13495,7 +13484,6 @@
|
|
|
13495
13484
|
return [4 /*yield*/, this.recoverAssemblyKey(approvals)];
|
|
13496
13485
|
case 2:
|
|
13497
13486
|
assemblyKey = _a.sent();
|
|
13498
|
-
console.log('receiveClaimMutation assemblyKey', assemblyKey);
|
|
13499
13487
|
return [4 /*yield*/, Promise.all(sharedScenario.asReceiver.receiverDirectories.edges
|
|
13500
13488
|
.map(function (edge) { return edge.node; })
|
|
13501
13489
|
.map(function (receiverDirectory) { return __awaiter(_this, void 0, void 0, function () {
|
|
@@ -13954,7 +13942,6 @@
|
|
|
13954
13942
|
return [4 /*yield*/, nodeJose.JWK.asKey(JSON.parse(sharedReset.sharedRequest.pxk.pbk))];
|
|
13955
13943
|
case 2:
|
|
13956
13944
|
pbk = _c.sent();
|
|
13957
|
-
console.log(pbk.toJSON());
|
|
13958
13945
|
claimApprovers = sharedReset.sharedRequest.claim.asClaimApprovers.edges.filter(function (edge) { return edge.node.state === exports.TpClaimApproverState.CLAIMED; });
|
|
13959
13946
|
_b = (_a = LrMergedMutation).create;
|
|
13960
13947
|
return [4 /*yield*/, Promise.all(claimApprovers.map(function (approverEdge) { return __awaiter(_this, void 0, void 0, function () {
|
|
@@ -13986,7 +13973,6 @@
|
|
|
13986
13973
|
case 1:
|
|
13987
13974
|
input = (_a.receiverApprovals = _b.sent(),
|
|
13988
13975
|
_a);
|
|
13989
|
-
console.log(input);
|
|
13990
13976
|
return [2 /*return*/, new LrMutation({
|
|
13991
13977
|
mutation: ApproveTpPasswordResetRequestMutation,
|
|
13992
13978
|
variables: {
|
|
@@ -14105,8 +14091,7 @@
|
|
|
14105
14091
|
.toPromise()];
|
|
14106
14092
|
case 6:
|
|
14107
14093
|
requestResetResult = _a.sent();
|
|
14108
|
-
console.log(
|
|
14109
|
-
console.log('Using new password: ', this.passwordService.getPassIdpString(passKeyBundle.passIdp));
|
|
14094
|
+
console.log('Using new password');
|
|
14110
14095
|
return [4 /*yield*/, this.auth.signUp({
|
|
14111
14096
|
username: requestResetResult.reset_username,
|
|
14112
14097
|
password: this.passwordService.getPassIdpString(passKeyBundle.passIdp),
|
|
@@ -14119,7 +14104,7 @@
|
|
|
14119
14104
|
})];
|
|
14120
14105
|
case 7:
|
|
14121
14106
|
signUpResult = _a.sent();
|
|
14122
|
-
console.log('requestRest done
|
|
14107
|
+
console.log('requestRest done');
|
|
14123
14108
|
return [2 /*return*/, {
|
|
14124
14109
|
requestResetResult: requestResetResult,
|
|
14125
14110
|
signUpResult: signUpResult,
|