@lifeready/core 1.1.6 → 1.1.7
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/bundles/lifeready-core.umd.js +7 -22
- package/bundles/lifeready-core.umd.js.map +1 -1
- package/bundles/lifeready-core.umd.min.js +1 -1
- package/bundles/lifeready-core.umd.min.js.map +1 -1
- package/esm2015/lib/api/types/lr-graphql.types.js +1 -1
- package/esm2015/lib/auth/life-ready-auth.service.js +3 -7
- package/esm2015/lib/item2/item2.service.js +1 -2
- package/esm2015/lib/key/key-graph.service.js +1 -4
- package/esm2015/lib/scenario/scenario.service.js +1 -2
- package/esm2015/lib/tp-assembly/tp-assembly.js +1 -3
- package/esm2015/lib/tp-password-reset/tp-password-reset-request.service.js +1 -3
- package/esm2015/lib/tp-password-reset/tp-password-reset-user.service.js +3 -4
- package/fesm2015/lifeready-core.js +4 -18
- package/fesm2015/lifeready-core.js.map +1 -1
- package/lib/api/types/lr-graphql.types.d.ts +7 -0
- package/package.json +1 -1
|
@@ -72,8 +72,7 @@ let TpPasswordResetUserService = class TpPasswordResetUserService extends LrServ
|
|
|
72
72
|
master_key_wrapped_prk: masterKeyWrappedPrk,
|
|
73
73
|
})
|
|
74
74
|
.toPromise();
|
|
75
|
-
console.log(
|
|
76
|
-
console.log('Using new password: ', this.passwordService.getPassIdpString(passKeyBundle.passIdp));
|
|
75
|
+
console.log('Using new password');
|
|
77
76
|
// API call to create user on cognito
|
|
78
77
|
const signUpResult = yield this.auth.signUp({
|
|
79
78
|
username: requestResetResult.reset_username,
|
|
@@ -85,7 +84,7 @@ let TpPasswordResetUserService = class TpPasswordResetUserService extends LrServ
|
|
|
85
84
|
}),
|
|
86
85
|
},
|
|
87
86
|
});
|
|
88
|
-
console.log('requestRest done
|
|
87
|
+
console.log('requestRest done');
|
|
89
88
|
return {
|
|
90
89
|
requestResetResult,
|
|
91
90
|
signUpResult,
|
|
@@ -115,4 +114,4 @@ TpPasswordResetUserService = __decorate([
|
|
|
115
114
|
})
|
|
116
115
|
], TpPasswordResetUserService);
|
|
117
116
|
export { TpPasswordResetUserService };
|
|
118
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
117
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"tp-password-reset-user.service.js","sourceRoot":"","sources":["../../../../../../projects/core/src/lib/tp-password-reset/tp-password-reset-user.service.ts"],"names":[],"mappings":";AAAA,OAAO,EAAE,UAAU,EAAE,MAAM,sBAAsB,CAAC;AAClD,OAAO,EAAE,MAAM,EAAE,UAAU,EAAE,QAAQ,EAAE,MAAM,EAAE,MAAM,eAAe,CAAC;AACrE,OAAO,EAAE,SAAS,EAAE,MAAM,gCAAgC,CAAC;AAE3D,OAAO,EAAE,SAAS,EAAE,MAAM,mBAAmB,CAAC;AAC9C,OAAO,EAAE,iBAAiB,EAAE,MAAM,kCAAkC,CAAC;AACrE,OAAO,EAAE,iBAAiB,EAAE,MAAM,4BAA4B,CAAC;AAC/D,OAAO,EAAmB,SAAS,EAAE,MAAM,sBAAsB,CAAC;AAClE,OAAO,EAAE,eAAe,EAAE,MAAM,8BAA8B,CAAC;AAC/D,OAAO,EAAE,iBAAiB,EAAE,MAAM,gCAAgC,CAAC;;;;;;;;IAStD,0BAA0B,SAA1B,0BAA2B,SAAQ,SAAS;IACvD,YACU,MAAc,EACd,QAAkB,EACC,MAAuB,EAC1C,UAA6B,EAC7B,iBAAoC,EACpC,eAAgC,EAChC,IAAgB,EAChB,IAAe;QAEvB,KAAK,CAAC,QAAQ,CAAC,CAAC;QATR,WAAM,GAAN,MAAM,CAAQ;QACd,aAAQ,GAAR,QAAQ,CAAU;QACC,WAAM,GAAN,MAAM,CAAiB;QAC1C,eAAU,GAAV,UAAU,CAAmB;QAC7B,sBAAiB,GAAjB,iBAAiB,CAAmB;QACpC,oBAAe,GAAf,eAAe,CAAiB;QAChC,SAAI,GAAJ,IAAI,CAAY;QAChB,SAAI,GAAJ,IAAI,CAAW;IAGzB,CAAC;IAEK,kBAAkB,CAAC,KAAK;;YAC5B,MAAM,MAAM,GAAG;gBACb,KAAK;aACN,CAAC;YACF,OAAO,CACL,IAAI,CAAC,IAAI;gBACP,8DAA8D;iBAC7D,IAAI,CACH,GAAG,IAAI,CAAC,MAAM,CAAC,OAAO,mCAAmC,EACzD,MAAM,CACP;iBACA,SAAS,EAAE,CACf,CAAC;QACJ,CAAC;KAAA;IAEK,oBAAoB,CACxB,OAAe,EACf,SAAiB;;YAEjB,MAAM,EAAE,KAAK,EAAE,GAAG,MAAM,IAAI,CAAC,IAAI;iBAC9B,IAAI,CAAY,GAAG,IAAI,CAAC,MAAM,CAAC,OAAO,eAAe,EAAE;gBACtD,QAAQ,EAAE,OAAO;gBACjB,MAAM,EAAE,SAAS;aAClB,CAAC;iBACD,SAAS,EAAE,CAAC;YACf,OAAO,KAAK,CAAC;QACf,CAAC;KAAA;IAEK,YAAY,CAChB,QAAgB,EAChB,OAAe,EACf,UAAkB;;YAKlB,6BAA6B;YAC7B,MAAM,aAAa,GAAG,MAAM,IAAI,CAAC,eAAe,CAAC,mBAAmB,CAClE,QAAQ,CACT,CAAC;YAEF,MAAM,SAAS,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,SAAS,EAAE,CAAC;YACpD,MAAM,gBAAgB,GAAG,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAC3D,aAAa,CAAC,OAAO,EACrB,SAAS,CAAC,MAAM,CAAC,IAAI,CAAC,CACvB,CAAC;YAEF,oBAAoB;YACpB,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,YAAY,EAAE,CAAC;YACjD,MAAM,mBAAmB,GAAG,MAAM,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAC9D,SAAS,EACT,GAAG,CAAC,MAAM,CAAC,IAAI,CAAC,CACjB,CAAC;YAEF,kCAAkC;YAClC,MAAM,kBAAkB,GAAG,MAAM,IAAI,CAAC,IAAI;iBACvC,IAAI,CACH,GAAG,IAAI,CAAC,MAAM,CAAC,OAAO,4BAA4B,EAClD;gBACE,OAAO;gBACP,UAAU;gBACV,eAAe,EAAE,aAAa,CAAC,aAAa;gBAC5C,eAAe,EAAE,aAAa,CAAC,aAAa;gBAC5C,qBAAqB,EAAE,aAAa,CAAC,eAAe,CAAC,MAAM,EAAE;gBAC7D,6BAA6B,EAC3B,aAAa,CAAC,yBAAyB;gBACzC,kBAAkB,EAAE,gBAAgB;gBACpC,GAAG,EAAE,GAAG,CAAC,MAAM,EAAE;gBACjB,sBAAsB,EAAE,mBAAmB;aAC5C,CACF;iBACA,SAAS,EAAE,CAAC;YAEf,OAAO,CAAC,GAAG,CAAC,oBAAoB,CAAC,CAAC;YAElC,qCAAqC;YACrC,MAAM,YAAY,GAAG,MAAM,IAAI,CAAC,IAAI,CAAC,MAAM,CAAC;gBAC1C,QAAQ,EAAE,kBAAkB,CAAC,cAAc;gBAC3C,QAAQ,EAAE,IAAI,CAAC,eAAe,CAAC,gBAAgB,CAAC,aAAa,CAAC,OAAO,CAAC;gBACtE,cAAc,EAAE;oBACd,yBAAyB,EAAE,IAAI,CAAC,SAAS,CAAC;wBACxC,EAAE,EAAE,kBAAkB,CAAC,EAAE;wBACzB,0BAA0B,EACxB,kBAAkB,CAAC,0BAA0B;qBAChD,CAAC;iBACH;aACF,CAAC,CAAC;YAEH,OAAO,CAAC,GAAG,CAAC,kBAAkB,CAAC,CAAC;YAEhC,OAAO;gBACL,kBAAkB;gBAClB,YAAY;aACb,CAAC;QACJ,CAAC;KAAA;CACF,CAAA;;;YAhHA,UAAU,SAAC;gBACV,UAAU,EAAE,MAAM;aACnB;;;YAhBsC,MAAM;YAAhB,QAAQ;4CAqBhC,MAAM,SAAC,SAAS;YAhBZ,iBAAiB;YADjB,iBAAiB;YAGjB,eAAe;YARf,UAAU;YAEV,SAAS;;AAgBL,0BAA0B;IANtC,iBAAiB,CAAC;QACjB,UAAU,EAAE,QAAQ;KACrB,CAAC;GAIW,0BAA0B,CA6GtC;SA7GY,0BAA0B","sourcesContent":["import { HttpClient } from '@angular/common/http';\nimport { Inject, Injectable, Injector, NgZone } from '@angular/core';\nimport { AuthClass } from '@aws-amplify/auth/lib-esm/Auth';\nimport { ISignUpResult } from 'amazon-cognito-identity-js';\nimport { LrService } from '../api/lr-graphql';\nimport { EncryptionService } from '../encryption/encryption.service';\nimport { KeyFactoryService } from '../key/key-factory.service';\nimport { LifeReadyConfig, LR_CONFIG } from '../life-ready.config';\nimport { PasswordService } from '../password/password.service';\nimport { RunOutsideAngular } from '../_common/run-outside-angular';\nimport { RequestResetResult } from './tp-password-reset.types';\n\n@RunOutsideAngular({\n  ngZoneName: 'ngZone',\n})\n@Injectable({\n  providedIn: 'root',\n})\nexport class TpPasswordResetUserService extends LrService {\n  constructor(\n    private ngZone: NgZone,\n    private injector: Injector,\n    @Inject(LR_CONFIG) private config: LifeReadyConfig,\n    private keyFactory: KeyFactoryService,\n    private encryptionService: EncryptionService,\n    private passwordService: PasswordService,\n    private http: HttpClient,\n    private auth: AuthClass\n  ) {\n    super(injector);\n  }\n\n  async verifyEmailContact(email): Promise<{ claimId: string }> {\n    const params = {\n      email,\n    };\n    return (\n      this.http\n        // eslint-disable-next-line @typescript-eslint/no-explicit-any\n        .post<any>(\n          `${this.config.authUrl}tp/password-reset/verify-contact/`,\n          params\n        )\n        .toPromise()\n    );\n  }\n\n  async verifyContactRespond(\n    claimId: string,\n    claimCode: string\n  ): Promise<string> {\n    const { token } = await this.http\n      .post<{ token }>(`${this.config.authUrl}cove/respond/`, {\n        claim_id: claimId,\n        v_code: claimCode,\n      })\n      .toPromise();\n    return token;\n  }\n\n  async requestReset(\n    password: string,\n    claimId: string,\n    claimToken: string\n  ): Promise<{\n    requestResetResult: RequestResetResult;\n    signUpResult: ISignUpResult;\n  }> {\n    // Generate the key materials\n    const passKeyBundle = await this.passwordService.createPassKeyBundle(\n      password\n    );\n\n    const masterKey = await this.keyFactory.createKey();\n    const wrappedMasterKey = await this.encryptionService.encrypt(\n      passKeyBundle.passKey,\n      masterKey.toJSON(true)\n    );\n\n    // Ephemeral PKC key\n    const prk = await this.keyFactory.createPkcKey();\n    const masterKeyWrappedPrk = await this.encryptionService.encrypt(\n      masterKey,\n      prk.toJSON(true)\n    );\n\n    // API call to setup reset request\n    const requestResetResult = await this.http\n      .post<RequestResetResult>(\n        `${this.config.authUrl}tp/password-reset/request/`,\n        {\n          claimId,\n          claimToken,\n          pass_key_params: passKeyBundle.passKeyParams,\n          pass_idp_params: passKeyBundle.passIdpParams,\n          pass_idp_verifier_pbk: passKeyBundle.passIdpVerifier.toJSON(), // public key\n          wrapped_pass_idp_verifier_prk:\n            passKeyBundle.wrappedPassIdpVerifierPrk,\n          wrapped_master_key: wrappedMasterKey,\n          pbk: prk.toJSON(), // ephemeral public key\n          master_key_wrapped_prk: masterKeyWrappedPrk,\n        }\n      )\n      .toPromise();\n\n    console.log('Using new password');\n\n    // API call to create user on cognito\n    const signUpResult = await this.auth.signUp({\n      username: requestResetResult.reset_username,\n      password: this.passwordService.getPassIdpString(passKeyBundle.passIdp),\n      clientMetadata: {\n        tp_password_reset_request: JSON.stringify({\n          id: requestResetResult.id,\n          associate_reset_user_token:\n            requestResetResult.associate_reset_user_token,\n        }),\n      },\n    });\n\n    console.log('requestRest done');\n\n    return {\n      requestResetResult,\n      signUpResult,\n    };\n  }\n}\n"]}
|
|
@@ -1279,7 +1279,6 @@ class KeyGraphService {
|
|
|
1279
1279
|
}
|
|
1280
1280
|
_unwrapLink(wrappingKey, link, dstKey) {
|
|
1281
1281
|
return __awaiter(this, void 0, void 0, function* () {
|
|
1282
|
-
// console.log("_unwrapLink:", link.data.keyId);
|
|
1283
1282
|
const wrappedKey = JSON.parse(link.data.wrappedKey);
|
|
1284
1283
|
// Signatures of keys contain the key itself. This way we only need
|
|
1285
1284
|
// to access the KeyLinks to decrypt/verify keys.
|
|
@@ -1298,10 +1297,8 @@ class KeyGraphService {
|
|
|
1298
1297
|
return __awaiter(this, void 0, void 0, function* () {
|
|
1299
1298
|
for (const link of path) {
|
|
1300
1299
|
const dstKey = this.key(link.data.keyId);
|
|
1301
|
-
// console.log("key: ", link.data.keyId);
|
|
1302
1300
|
if (dstKey.jwk) {
|
|
1303
1301
|
key = dstKey.jwk;
|
|
1304
|
-
// console.log("Returning cached key: ", link.data.keyId);
|
|
1305
1302
|
continue;
|
|
1306
1303
|
}
|
|
1307
1304
|
if (!dstKey.task) {
|
|
@@ -4821,7 +4818,6 @@ class TpAssemblyController {
|
|
|
4821
4818
|
prepareAssembly({ subjectKey, rootKey, }) {
|
|
4822
4819
|
return __awaiter(this, void 0, void 0, function* () {
|
|
4823
4820
|
const assemblyKey = yield this.keyFactory.createKey();
|
|
4824
|
-
console.log('prepareAssembly assemblyKey', assemblyKey);
|
|
4825
4821
|
const _a = assemblyKey.toJSON(true), { k: rawAssemblyKey } = _a, assemblyKeyParams = __rest(_a, ["k"]);
|
|
4826
4822
|
const assemblyKeyVerifierPrk = yield this.keyFactory.createPkcSignKey();
|
|
4827
4823
|
const wrappedAssemblyKeyVerifierPrk = yield this.encryptionService.encryptToString(assemblyKey, assemblyKeyVerifierPrk.toJSON(true));
|
|
@@ -5090,7 +5086,6 @@ class TpAssemblyController {
|
|
|
5090
5086
|
},
|
|
5091
5087
|
assemblyKeyParams,
|
|
5092
5088
|
};
|
|
5093
|
-
console.log('partialAssemblyKey', partialAssemblyKey);
|
|
5094
5089
|
const sharedCipherData = yield this.encryptionService.encryptToString(sharedKey, tp.sharedCipherDataClearJson || '');
|
|
5095
5090
|
const sharedCipherApprovalData = yield this.encryptionService.encryptToString(sharedKey, tp.sharedCipherApprovalDataClearJson || '');
|
|
5096
5091
|
const sharedCipherPartialAssemblyKey = yield this.encryptionService.encryptToString(sharedKey, partialAssemblyKey);
|
|
@@ -5725,13 +5720,13 @@ class LifeReadyAuthService {
|
|
|
5725
5720
|
const cognitoUser = yield this.auth.currentAuthenticatedUser();
|
|
5726
5721
|
const refreshToken = cognitoUser.getSignInUserSession().getRefreshToken();
|
|
5727
5722
|
return new Promise((resolve, reject) => {
|
|
5728
|
-
cognitoUser.refreshSession(refreshToken, (err
|
|
5723
|
+
cognitoUser.refreshSession(refreshToken, (err) => {
|
|
5729
5724
|
if (err) {
|
|
5730
5725
|
console.error('Error refreshing token: ', err);
|
|
5731
5726
|
reject(err);
|
|
5732
5727
|
}
|
|
5733
5728
|
else {
|
|
5734
|
-
console.log('Token refresh complete
|
|
5729
|
+
console.log('Token refresh complete');
|
|
5735
5730
|
resolve(0);
|
|
5736
5731
|
}
|
|
5737
5732
|
});
|
|
@@ -5749,7 +5744,6 @@ class LifeReadyAuthService {
|
|
|
5749
5744
|
// --------------------------------------------------------------
|
|
5750
5745
|
const assemblyKey = yield this.recoverAssemblyKey(resetUser);
|
|
5751
5746
|
const { rootKey } = yield this.encryptionService.decrypt(assemblyKey, resetUser.assemblyCipherData);
|
|
5752
|
-
console.log(rootKey);
|
|
5753
5747
|
// Making sure it's a valid key.
|
|
5754
5748
|
const rootKeyJwk = yield JWK.asKey(rootKey);
|
|
5755
5749
|
const masterKey = yield this.keyGraphService.getKey(resetUser.masterKey.id);
|
|
@@ -5768,11 +5762,9 @@ class LifeReadyAuthService {
|
|
|
5768
5762
|
}), {
|
|
5769
5763
|
includeKeyGraph: false,
|
|
5770
5764
|
})).createTpAssemblyKeyChallenge.challenge;
|
|
5771
|
-
console.log(challenge);
|
|
5772
5765
|
// Sign the challenge
|
|
5773
5766
|
// Generate a client side nonce that's no in the server's control.
|
|
5774
5767
|
challenge.clientNonce = this.keyFactory.randomString(TP_PASSWORD_RESET_CLIENT_NONCE_LENGTH);
|
|
5775
|
-
console.log(challenge);
|
|
5776
5768
|
const assemblyKeyVerifierPrk = yield this.encryptionService.decrypt(assemblyKey, resetUser.wrappedAssemblyKeyVerifierPrk);
|
|
5777
5769
|
const signedChallenge = yield this.encryptionService.sign(assemblyKeyVerifierPrk, challenge);
|
|
5778
5770
|
// --------------------------------------------------------------
|
|
@@ -5803,7 +5795,6 @@ class LifeReadyAuthService {
|
|
|
5803
5795
|
return;
|
|
5804
5796
|
}
|
|
5805
5797
|
Hub.remove('auth', listener);
|
|
5806
|
-
console.log(data.payload);
|
|
5807
5798
|
yield this.auth.signIn(resetUser.username, newIdpPassword);
|
|
5808
5799
|
// Switch over to the new set of keys
|
|
5809
5800
|
yield this.lrGraphQL.lrMutate(new LrMutation({
|
|
@@ -7372,7 +7363,6 @@ let Item2Service = Item2Service_1 = class Item2Service extends LrService {
|
|
|
7372
7363
|
encryptedContent: cipherFileContent,
|
|
7373
7364
|
});
|
|
7374
7365
|
}
|
|
7375
|
-
console.log('contentResource', contentResource);
|
|
7376
7366
|
}
|
|
7377
7367
|
return Object.assign(Object.assign({}, (yield this.prepareItem(fileStateKey, options))), { wrappedStateKey: yield this.keyGraph.wrapKey(fileKey, fileStateKey), contentResource });
|
|
7378
7368
|
});
|
|
@@ -11642,7 +11632,6 @@ let ScenarioService = class ScenarioService extends LrService {
|
|
|
11642
11632
|
}
|
|
11643
11633
|
const approvals = mapEdges(sharedScenario.sharedClaim.asClaimReceiver.approvals);
|
|
11644
11634
|
const assemblyKey = yield this.recoverAssemblyKey(approvals);
|
|
11645
|
-
console.log('receiveClaimMutation assemblyKey', assemblyKey);
|
|
11646
11635
|
// Decrypt all items
|
|
11647
11636
|
const receiverDirectories = yield Promise.all(sharedScenario.asReceiver.receiverDirectories.edges
|
|
11648
11637
|
.map((edge) => edge.node)
|
|
@@ -11975,7 +11964,6 @@ let TpPasswordResetRequestService = class TpPasswordResetRequestService extends
|
|
|
11975
11964
|
const sharedReset = yield this.privateService.getSharedReset(sharedResetId);
|
|
11976
11965
|
this.activeRequestOrRaise(sharedReset);
|
|
11977
11966
|
const pbk = yield JWK.asKey(JSON.parse(sharedReset.sharedRequest.pxk.pbk));
|
|
11978
|
-
console.log(pbk.toJSON());
|
|
11979
11967
|
// TODO <AZ> Verify pbk against pbkFingerPrint
|
|
11980
11968
|
const claimApprovers = sharedReset.sharedRequest.claim.asClaimApprovers.edges.filter((edge) => edge.node.state === TpClaimApproverState.CLAIMED);
|
|
11981
11969
|
// A single approver may belong to multiple sub-assemblies. We approve them all here in a single
|
|
@@ -11993,7 +11981,6 @@ let TpPasswordResetRequestService = class TpPasswordResetRequestService extends
|
|
|
11993
11981
|
};
|
|
11994
11982
|
}))),
|
|
11995
11983
|
};
|
|
11996
|
-
console.log(input);
|
|
11997
11984
|
return new LrMutation({
|
|
11998
11985
|
mutation: ApproveTpPasswordResetRequestMutation,
|
|
11999
11986
|
variables: {
|
|
@@ -12079,8 +12066,7 @@ let TpPasswordResetUserService = class TpPasswordResetUserService extends LrServ
|
|
|
12079
12066
|
master_key_wrapped_prk: masterKeyWrappedPrk,
|
|
12080
12067
|
})
|
|
12081
12068
|
.toPromise();
|
|
12082
|
-
console.log(
|
|
12083
|
-
console.log('Using new password: ', this.passwordService.getPassIdpString(passKeyBundle.passIdp));
|
|
12069
|
+
console.log('Using new password');
|
|
12084
12070
|
// API call to create user on cognito
|
|
12085
12071
|
const signUpResult = yield this.auth.signUp({
|
|
12086
12072
|
username: requestResetResult.reset_username,
|
|
@@ -12092,7 +12078,7 @@ let TpPasswordResetUserService = class TpPasswordResetUserService extends LrServ
|
|
|
12092
12078
|
}),
|
|
12093
12079
|
},
|
|
12094
12080
|
});
|
|
12095
|
-
console.log('requestRest done
|
|
12081
|
+
console.log('requestRest done');
|
|
12096
12082
|
return {
|
|
12097
12083
|
requestResetResult,
|
|
12098
12084
|
signUpResult,
|