@lifeready/core 7.2.3 → 8.0.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/bundles/lifeready-core.umd.js +7 -9
- package/bundles/lifeready-core.umd.js.map +1 -1
- package/bundles/lifeready-core.umd.min.js +1 -1
- package/bundles/lifeready-core.umd.min.js.map +1 -1
- package/esm2015/lib/api/query-processor/tp-password-reset-processor.service.js +2 -2
- package/esm2015/lib/api/types/lr-graphql.types.js +1 -6
- package/esm2015/lib/auth/auth.gql.private.js +1 -1
- package/esm2015/lib/auth/auth.service.js +5 -3
- package/esm2015/lib/auth/auth.types.js +1 -3
- package/esm2015/lib/plan/plan.types.js +1 -1
- package/fesm2015/lifeready-core.js +6 -11
- package/fesm2015/lifeready-core.js.map +1 -1
- package/lib/api/query-processor/tp-password-reset-processor.service.d.ts +2 -2
- package/lib/api/types/lr-graphql.types.d.ts +2 -9
- package/lib/auth/auth.gql.private.d.ts +3 -3
- package/lib/auth/auth.types.d.ts +3 -2
- package/lib/plan/plan.types.d.ts +0 -1
- package/package.json +1 -1
|
@@ -4,8 +4,6 @@ export var RecoveryStatus;
|
|
|
4
4
|
RecoveryStatus["NEW_PASSWORD"] = "NEW_PASSWORD";
|
|
5
5
|
RecoveryStatus["OLD_PASSWORD"] = "OLD_PASSWORD";
|
|
6
6
|
})(RecoveryStatus || (RecoveryStatus = {}));
|
|
7
|
-
// TODO restrict this type
|
|
8
|
-
// export type AuthResetUser = TpPasswordResetUserNode;
|
|
9
7
|
export var PasswordChangeStatus;
|
|
10
8
|
(function (PasswordChangeStatus) {
|
|
11
9
|
PasswordChangeStatus["IN_PROGRESS"] = "IN_PROGRESS";
|
|
@@ -18,4 +16,4 @@ export var CognitoChallengeName;
|
|
|
18
16
|
CognitoChallengeName["SOFTWARE_TOKEN_MFA"] = "SOFTWARE_TOKEN_MFA";
|
|
19
17
|
CognitoChallengeName["MFA_SETUP"] = "MFA_SETUP";
|
|
20
18
|
})(CognitoChallengeName || (CognitoChallengeName = {}));
|
|
21
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
19
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -1,2 +1,2 @@
|
|
|
1
1
|
export {};
|
|
2
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
2
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -1936,7 +1936,7 @@ let TpPasswordResetProcessorService = class TpPasswordResetProcessorService {
|
|
|
1936
1936
|
this.ngZone = ngZone;
|
|
1937
1937
|
this.keyGraph = keyGraph;
|
|
1938
1938
|
}
|
|
1939
|
-
|
|
1939
|
+
processTpPasswordResetUser(node) {
|
|
1940
1940
|
var _a;
|
|
1941
1941
|
return __awaiter(this, void 0, void 0, function* () {
|
|
1942
1942
|
const pxk = ((_a = node.pxk) === null || _a === void 0 ? void 0 : _a.id) && (yield this.keyGraph.getKey(node.pxk.id));
|
|
@@ -2977,11 +2977,6 @@ var LinkTypeField;
|
|
|
2977
2977
|
LinkTypeField["HARD"] = "HARD";
|
|
2978
2978
|
LinkTypeField["SOFT"] = "SOFT";
|
|
2979
2979
|
})(LinkTypeField || (LinkTypeField = {}));
|
|
2980
|
-
var BillingPeriodField;
|
|
2981
|
-
(function (BillingPeriodField) {
|
|
2982
|
-
BillingPeriodField["MONTHLY"] = "MONTHLY";
|
|
2983
|
-
BillingPeriodField["ANNUAL"] = "ANNUAL";
|
|
2984
|
-
})(BillingPeriodField || (BillingPeriodField = {}));
|
|
2985
2980
|
var PlanStateField;
|
|
2986
2981
|
(function (PlanStateField) {
|
|
2987
2982
|
PlanStateField["TRIALLING"] = "TRIALLING";
|
|
@@ -5114,8 +5109,6 @@ var RecoveryStatus;
|
|
|
5114
5109
|
RecoveryStatus["NEW_PASSWORD"] = "NEW_PASSWORD";
|
|
5115
5110
|
RecoveryStatus["OLD_PASSWORD"] = "OLD_PASSWORD";
|
|
5116
5111
|
})(RecoveryStatus || (RecoveryStatus = {}));
|
|
5117
|
-
// TODO restrict this type
|
|
5118
|
-
// export type AuthResetUser = TpPasswordResetUserNode;
|
|
5119
5112
|
var PasswordChangeStatus;
|
|
5120
5113
|
(function (PasswordChangeStatus) {
|
|
5121
5114
|
PasswordChangeStatus["IN_PROGRESS"] = "IN_PROGRESS";
|
|
@@ -5480,9 +5473,10 @@ let AuthService = AuthService_1 = class AuthService extends LrService {
|
|
|
5480
5473
|
});
|
|
5481
5474
|
// Regular user populates all keys
|
|
5482
5475
|
yield this.keyGraphService.populateKeys(currentUser.currentUserKey);
|
|
5483
|
-
const { username } = currentUser;
|
|
5476
|
+
const { id, username } = currentUser;
|
|
5484
5477
|
const userAttributes = yield this.cognito.userAttributes(cognitoUser);
|
|
5485
5478
|
return {
|
|
5479
|
+
id,
|
|
5486
5480
|
username,
|
|
5487
5481
|
sub: this.getCognitoUserAttribute('sub', userAttributes),
|
|
5488
5482
|
loginEmail: this.getCognitoUserAttribute('email', userAttributes),
|
|
@@ -5634,7 +5628,7 @@ let AuthService = AuthService_1 = class AuthService extends LrService {
|
|
|
5634
5628
|
debugLoadUser(password) {
|
|
5635
5629
|
return __awaiter(this, void 0, void 0, function* () {
|
|
5636
5630
|
const currentUser = yield this.fetchCurrentUser();
|
|
5637
|
-
const { username, currentUserKey } = currentUser;
|
|
5631
|
+
const { id, username, currentUserKey } = currentUser;
|
|
5638
5632
|
// Debug mode can not deal with session encryption key yet.
|
|
5639
5633
|
// NO SESSION ENCRYPTION KEY.
|
|
5640
5634
|
const passKey = (yield this.keyFactoryService.derivePassKey(Object.assign({ password }, currentUserKey.passKey.passKeyParams))).jwk;
|
|
@@ -5642,6 +5636,7 @@ let AuthService = AuthService_1 = class AuthService extends LrService {
|
|
|
5642
5636
|
yield this.idleService.persistMasterKey(masterKey);
|
|
5643
5637
|
yield this.keyGraphService.populateKeys(currentUserKey);
|
|
5644
5638
|
this.user = {
|
|
5639
|
+
id,
|
|
5645
5640
|
username,
|
|
5646
5641
|
resetUser: null,
|
|
5647
5642
|
sub: 'DEBUG_MODE',
|
|
@@ -10760,5 +10755,5 @@ UserService.ctorParameters = () => [
|
|
|
10760
10755
|
* Generated bundle index. Do not edit.
|
|
10761
10756
|
*/
|
|
10762
10757
|
|
|
10763
|
-
export { AccessRoleChoice, AccessRoleChoiceOrder, AccessRoleMethodChoice, ApiContactCard, ApiCurrentUser, ApproveScenarioClaimMutation, ApproveTpPasswordResetRequestMutation, ArchiveDirectoryMutation, ArchiveFileMutation, AuthService, BeginDeleteChildItemLinksWindowMutation,
|
|
10758
|
+
export { AccessRoleChoice, AccessRoleChoiceOrder, AccessRoleMethodChoice, ApiContactCard, ApiCurrentUser, ApproveScenarioClaimMutation, ApproveTpPasswordResetRequestMutation, ArchiveDirectoryMutation, ArchiveFileMutation, AuthService, BeginDeleteChildItemLinksWindowMutation, CancelKeyExchangeMutation, CancelScenarioClaimMutation, CancelTpPasswordResetRequestMutation, CancelUserDeleteMutation, ChangeDirectoryParentsMutation, ChangeFileParentsMutation, ClaimApproverState, ClaimState, CognitoChallengeName, CommonProcessorsService, CompleteKeyExchangeOtkMutation, CompleteTpPasswordResetRequestMutation, Config, ContactCard2Service, ContactCardAddress, ContactCardName, ContactCardsQuery, CreateContactCardMutation$1 as CreateContactCardMutation, CreateDirectoryMutation, CreateFileMutation, CreateFileQuery, CreateLbopQuery, CreateScenarioClaimMutation, CreateScenarioMutation, CreateTpAssemblyKeyChallengeMutation, CreateTpPasswordResetMutation, CurrentUserKey, CurrentUserQuery, CurrentUserSharedKeyQuery2, DebugExpireScenarioClaimMutation, DebugExpireTpPasswordResetRequestMutation, DeclineKeyExchangeMutation, DefaultProcessorOptions, DeleteDirectoryMutation, DeleteFileMutation, DeleteLbopQuery, DeleteScenarioMutation, DeleteTpPasswordResetMutation, DirectoryQuery, ERROR_SOURCE, FeatureAction, Features, FetchKeyGraphField, FileOperationField, FileQuery, FileUploadService, GetOwnedContactCardKeyIdsQuery, GetReceivedContactCardKeyIdQuery, IdleService, InitiateKeyExchangeOtkMutation, ItemService, KC_CONFIG, KcAuthException, KcBadArgumentException, KcBadLogicException, KcBadRequestException, KcBadSignatureException, KcBadStateException, KcBadTimeSyncException, KcCodeMismatchException, KcConcurrentAccessException, KcEncryptionException, KcError, KcErrorCode, KcException, KcInternalErrorException, KcLbopErrorCode, KcLockedException, KcNotFoundException, KcSuspiciousOperationException, KcUnsupportedException, KeyExchangeFields, KeyExchangeMode, KeyExchangeOtkState, KeyExchangeQuery2, KeyExchangeService, KeyExchangeState, KeyExchangeTokenQuery2, KeyExchangesQuery2, KeyGraphField, KeyGraphFragment, LbopQuery, LbopService, LbopsQuery, LifeReadyModule, LinkTypeField, LockService, LockState, LoginHistoryQuery, LrApolloService, LrGraphQLService, LrMergedMutation, LrMutation, LrMutationBase, LrService, MainContactCardFields, MainContactCardPlainFields, MainContactCardProperty, MoveDirectoryQuery, MoveFileQuery, NotificationService, OwnerPlainDataJson, PasswordChangeStatus, PasswordCheck, PasswordService, PermissionChoice, PersistService, PlanService, PlanState, PlanStateField, PreCompleteTpPasswordResetRequestMutation, ProfileDetailsService, ProfileService, QueryProcessorService, ReceiveScenarioClaimMutation, RecoveryStatus, RegisterResult, RegisterService, RejectScenarioClaimMutation, RejectTpPasswordResetRequestMutation, ReminderService, RequestUserDeleteMutation, RespondKeyExchangeOtkMutation, RevertFileMutation, RevertFileQuery, ScenarioLastClaimState, ScenarioService, ScenarioState, ServerConfigService, ServerTimeQuery, SetDirectoryConfidentialMutation, SetFileConfidentialMutation, SharedContactCard2Service, SharedTrustedPartyDetails, SharedVaultFeature, TPFeatures, TempDirectoryQuery, TimeService, TpAssemblyState, TpClaimApproverState, TpClaimState, TpDetachedShareStateChoice, TpPasswordResetRequestService, TpPasswordResetService, TpPasswordResetUserService, TpShareTypeChoice, TrustedPartiesQuery, TrustedParty, TrustedPartyDetails, TrustedPartyProperties, TrustedPartyService, TrustedPartyType, TwoFactorService, UnarchiveDirectoryMutation, UnarchiveFileMutation, UpdateContactCardMutation$1 as UpdateContactCardMutation, UpdateDirectoryMutation, UpdateFileMutation, UpdateFileQuery, UpdateLbopQuery, UpdateOwnedContactCardMutation, UpdateReceivedContactCardMutation, UpdateScenarioMutation, UpdateTpPasswordResetMutation, UserDeleteState, UserService, UserSharedKeyFields, WebCryptoService, awsFetch, configureAmplifyAuth, configureApollo, fragmentSpreadAstSelection, gqlTyped, handleApolloError, handleCognitoCallback, httpOptions, mapEdges, processConnection, throwClaimIdMismatch, throwClaimNotApproved, KeyGraphService as ɵa, EncryptionService as ɵb, KeyService as ɵc, KeyFactoryService as ɵd, LrService as ɵe, RunOutsideAngular as ɵf, LrGraphQLService as ɵg, KeyMetaService as ɵh, TpPasswordResetAssemblyController as ɵi, TpAssemblyController as ɵj, SharedContactCardFields as ɵk, SharedContactCardService as ɵl, ScenarioAssemblyController as ɵm, TpPasswordResetPrivateService as ɵn };
|
|
10764
10759
|
//# sourceMappingURL=lifeready-core.js.map
|