@lifeready/core 1.1.6 → 1.1.7

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1994,10 +1994,8 @@
1994
1994
  if (!!path_1_1.done) return [3 /*break*/, 4];
1995
1995
  link = path_1_1.value;
1996
1996
  dstKey = this.key(link.data.keyId);
1997
- // console.log("key: ", link.data.keyId);
1998
1997
  if (dstKey.jwk) {
1999
1998
  key = dstKey.jwk;
2000
- // console.log("Returning cached key: ", link.data.keyId);
2001
1999
  return [3 /*break*/, 3];
2002
2000
  }
2003
2001
  if (!dstKey.task) {
@@ -5633,7 +5631,6 @@
5633
5631
  case 0: return [4 /*yield*/, this.keyFactory.createKey()];
5634
5632
  case 1:
5635
5633
  assemblyKey = _c.sent();
5636
- console.log('prepareAssembly assemblyKey', assemblyKey);
5637
5634
  _a = assemblyKey.toJSON(true), rawAssemblyKey = _a.k, assemblyKeyParams = __rest(_a, ["k"]);
5638
5635
  return [4 /*yield*/, this.keyFactory.createPkcSignKey()];
5639
5636
  case 2:
@@ -6004,7 +6001,6 @@
6004
6001
  },
6005
6002
  assemblyKeyParams: assemblyKeyParams,
6006
6003
  };
6007
- console.log('partialAssemblyKey', partialAssemblyKey);
6008
6004
  return [4 /*yield*/, this.encryptionService.encryptToString(sharedKey, tp.sharedCipherDataClearJson || '')];
6009
6005
  case 5:
6010
6006
  sharedCipherData = _c.sent();
@@ -6622,13 +6618,13 @@
6622
6618
  cognitoUser = _b.sent();
6623
6619
  refreshToken = cognitoUser.getSignInUserSession().getRefreshToken();
6624
6620
  return [2 /*return*/, new Promise(function (resolve, reject) {
6625
- cognitoUser.refreshSession(refreshToken, function (err, data) {
6621
+ cognitoUser.refreshSession(refreshToken, function (err) {
6626
6622
  if (err) {
6627
6623
  console.error('Error refreshing token: ', err);
6628
6624
  reject(err);
6629
6625
  }
6630
6626
  else {
6631
- console.log('Token refresh complete: ', data);
6627
+ console.log('Token refresh complete');
6632
6628
  resolve(0);
6633
6629
  }
6634
6630
  });
@@ -6655,7 +6651,6 @@
6655
6651
  return [4 /*yield*/, this.encryptionService.decrypt(assemblyKey, resetUser.assemblyCipherData)];
6656
6652
  case 3:
6657
6653
  rootKey = (_b.sent()).rootKey;
6658
- console.log(rootKey);
6659
6654
  return [4 /*yield*/, nodeJose.JWK.asKey(rootKey)];
6660
6655
  case 4:
6661
6656
  rootKeyJwk = _b.sent();
@@ -6679,11 +6674,9 @@
6679
6674
  })];
6680
6675
  case 8:
6681
6676
  challenge = (_b.sent()).createTpAssemblyKeyChallenge.challenge;
6682
- console.log(challenge);
6683
6677
  // Sign the challenge
6684
6678
  // Generate a client side nonce that's no in the server's control.
6685
6679
  challenge.clientNonce = this.keyFactory.randomString(TP_PASSWORD_RESET_CLIENT_NONCE_LENGTH);
6686
- console.log(challenge);
6687
6680
  return [4 /*yield*/, this.encryptionService.decrypt(assemblyKey, resetUser.wrappedAssemblyKeyVerifierPrk)];
6688
6681
  case 9:
6689
6682
  assemblyKeyVerifierPrk = _b.sent();
@@ -6711,7 +6704,6 @@
6711
6704
  return [2 /*return*/];
6712
6705
  }
6713
6706
  core$1.Hub.remove('auth', listener);
6714
- console.log(data.payload);
6715
6707
  return [4 /*yield*/, this.auth.signIn(resetUser.username, newIdpPassword)];
6716
6708
  case 1:
6717
6709
  _b.sent();
@@ -8453,7 +8445,7 @@
8453
8445
  _l.label = 3;
8454
8446
  case 3:
8455
8447
  fileContent = _c;
8456
- if (!fileContent) return [3 /*break*/, 9];
8448
+ if (!fileContent) return [3 /*break*/, 8];
8457
8449
  return [4 /*yield*/, this.keyGraph.encryptToString(fileStateKey, fileContent)];
8458
8450
  case 4:
8459
8451
  cipherFileContent = _l.sent();
@@ -8469,18 +8461,15 @@
8469
8461
  contentResource = _l.sent();
8470
8462
  _l.label = 8;
8471
8463
  case 8:
8472
- console.log('contentResource', contentResource);
8473
- _l.label = 9;
8474
- case 9:
8475
8464
  _e = (_d = Object).assign;
8476
8465
  _g = (_f = Object).assign;
8477
8466
  _h = [{}];
8478
8467
  return [4 /*yield*/, this.prepareItem(fileStateKey, options)];
8479
- case 10:
8468
+ case 9:
8480
8469
  _j = [_g.apply(_f, _h.concat([(_l.sent())]))];
8481
8470
  _k = {};
8482
8471
  return [4 /*yield*/, this.keyGraph.wrapKey(fileKey, fileStateKey)];
8483
- case 11: return [2 /*return*/, _e.apply(_d, _j.concat([(_k.wrappedStateKey = _l.sent(), _k.contentResource = contentResource, _k)]))];
8472
+ case 10: return [2 /*return*/, _e.apply(_d, _j.concat([(_k.wrappedStateKey = _l.sent(), _k.contentResource = contentResource, _k)]))];
8484
8473
  }
8485
8474
  });
8486
8475
  });
@@ -13495,7 +13484,6 @@
13495
13484
  return [4 /*yield*/, this.recoverAssemblyKey(approvals)];
13496
13485
  case 2:
13497
13486
  assemblyKey = _a.sent();
13498
- console.log('receiveClaimMutation assemblyKey', assemblyKey);
13499
13487
  return [4 /*yield*/, Promise.all(sharedScenario.asReceiver.receiverDirectories.edges
13500
13488
  .map(function (edge) { return edge.node; })
13501
13489
  .map(function (receiverDirectory) { return __awaiter(_this, void 0, void 0, function () {
@@ -13954,7 +13942,6 @@
13954
13942
  return [4 /*yield*/, nodeJose.JWK.asKey(JSON.parse(sharedReset.sharedRequest.pxk.pbk))];
13955
13943
  case 2:
13956
13944
  pbk = _c.sent();
13957
- console.log(pbk.toJSON());
13958
13945
  claimApprovers = sharedReset.sharedRequest.claim.asClaimApprovers.edges.filter(function (edge) { return edge.node.state === exports.TpClaimApproverState.CLAIMED; });
13959
13946
  _b = (_a = LrMergedMutation).create;
13960
13947
  return [4 /*yield*/, Promise.all(claimApprovers.map(function (approverEdge) { return __awaiter(_this, void 0, void 0, function () {
@@ -13986,7 +13973,6 @@
13986
13973
  case 1:
13987
13974
  input = (_a.receiverApprovals = _b.sent(),
13988
13975
  _a);
13989
- console.log(input);
13990
13976
  return [2 /*return*/, new LrMutation({
13991
13977
  mutation: ApproveTpPasswordResetRequestMutation,
13992
13978
  variables: {
@@ -14105,8 +14091,7 @@
14105
14091
  .toPromise()];
14106
14092
  case 6:
14107
14093
  requestResetResult = _a.sent();
14108
- console.log(requestResetResult);
14109
- console.log('Using new password: ', this.passwordService.getPassIdpString(passKeyBundle.passIdp));
14094
+ console.log('Using new password');
14110
14095
  return [4 /*yield*/, this.auth.signUp({
14111
14096
  username: requestResetResult.reset_username,
14112
14097
  password: this.passwordService.getPassIdpString(passKeyBundle.passIdp),
@@ -14119,7 +14104,7 @@
14119
14104
  })];
14120
14105
  case 7:
14121
14106
  signUpResult = _a.sent();
14122
- console.log('requestRest done: ', signUpResult);
14107
+ console.log('requestRest done');
14123
14108
  return [2 /*return*/, {
14124
14109
  requestResetResult: requestResetResult,
14125
14110
  signUpResult: signUpResult,