1
0
mirror of https://github.com/bitwarden/browser synced 2025-12-17 16:53:34 +00:00

[deps] Autofill: Update prettier to v3 (#7014)

* [deps] Autofill: Update prettier to v3

* prettier formatting updates

---------

Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
Co-authored-by: Jonathan Prusik <jprusik@classynemesis.com>
This commit is contained in:
renovate[bot]
2023-11-29 16:15:20 -05:00
committed by GitHub
parent 4ff5f38e89
commit 28de9439be
1145 changed files with 5898 additions and 5612 deletions

View File

@@ -31,7 +31,7 @@ describe("AccountKeys", () => {
const accountKeys = new AccountKeys();
const deviceKeyBytesLength = 64;
accountKeys.deviceKey = new SymmetricCryptoKey(
new Uint8Array(deviceKeyBytesLength).buffer as CsprngArray
new Uint8Array(deviceKeyBytesLength).buffer as CsprngArray,
) as DeviceKey;
// Act

View File

@@ -51,7 +51,7 @@ export class EncryptionPair<TEncrypted, TDecrypted> {
static fromJSON<TEncrypted, TDecrypted>(
obj: { encrypted?: Jsonify<TEncrypted>; decrypted?: string | Jsonify<TDecrypted> },
decryptedFromJson?: (decObj: Jsonify<TDecrypted> | string) => TDecrypted,
encryptedFromJson?: (encObj: Jsonify<TEncrypted>) => TEncrypted
encryptedFromJson?: (encObj: Jsonify<TEncrypted>) => TEncrypted,
) {
if (obj == null) {
return null;
@@ -159,12 +159,12 @@ export class AccountKeys {
cryptoMasterKey: SymmetricCryptoKey.fromJSON(obj?.cryptoMasterKey),
cryptoSymmetricKey: EncryptionPair.fromJSON(
obj?.cryptoSymmetricKey,
SymmetricCryptoKey.fromJSON
SymmetricCryptoKey.fromJSON,
),
organizationKeys: AccountKeys.initRecordEncryptionPairsFromJSON(obj?.organizationKeys),
providerKeys: AccountKeys.initRecordEncryptionPairsFromJSON(obj?.providerKeys),
privateKey: EncryptionPair.fromJSON<string, Uint8Array>(obj?.privateKey, (decObj: string) =>
Utils.fromByteStringToArray(decObj)
Utils.fromByteStringToArray(decObj),
),
publicKey: Utils.fromByteStringToArray(obj?.publicKey),
});
@@ -266,7 +266,7 @@ export class AccountSettings {
environmentUrls: EnvironmentUrls.fromJSON(obj?.environmentUrls),
pinProtected: EncryptionPair.fromJSON<string, EncString>(
obj?.pinProtected,
EncString.fromJSON
EncString.fromJSON,
),
serverConfig: ServerConfigData.fromJSON(obj?.serverConfig),
});
@@ -330,13 +330,13 @@ export class AccountDecryptionOptions {
accountDecryptionOptions.trustedDeviceOption = new TrustedDeviceUserDecryptionOption(
responseOptions.trustedDeviceOption.hasAdminApproval,
responseOptions.trustedDeviceOption.hasLoginApprovingDevice,
responseOptions.trustedDeviceOption.hasManageResetPasswordPermission
responseOptions.trustedDeviceOption.hasManageResetPasswordPermission,
);
}
if (responseOptions.keyConnectorOption) {
accountDecryptionOptions.keyConnectorOption = new KeyConnectorUserDecryptionOption(
responseOptions.keyConnectorOption.keyConnectorUrl
responseOptions.keyConnectorOption.keyConnectorUrl,
);
}
} else {
@@ -349,7 +349,7 @@ export class AccountDecryptionOptions {
accountDecryptionOptions.hasMasterPassword = !usingKeyConnector;
if (usingKeyConnector) {
accountDecryptionOptions.keyConnectorOption = new KeyConnectorUserDecryptionOption(
response.keyConnectorUrl
response.keyConnectorUrl,
);
}
}
@@ -367,13 +367,13 @@ export class AccountDecryptionOptions {
accountDecryptionOptions.trustedDeviceOption = new TrustedDeviceUserDecryptionOption(
obj.trustedDeviceOption.hasAdminApproval,
obj.trustedDeviceOption.hasLoginApprovingDevice,
obj.trustedDeviceOption.hasManageResetPasswordPermission
obj.trustedDeviceOption.hasManageResetPasswordPermission,
);
}
if (obj.keyConnectorOption) {
accountDecryptionOptions.keyConnectorOption = new KeyConnectorUserDecryptionOption(
obj.keyConnectorOption.keyConnectorUrl
obj.keyConnectorOption.keyConnectorUrl,
);
}

View File

@@ -9,7 +9,7 @@ export default class Domain {
domain: D,
dataObj: any,
map: any,
notEncList: any[] = []
notEncList: any[] = [],
) {
for (const prop in map) {
// eslint-disable-next-line
@@ -29,7 +29,7 @@ export default class Domain {
domain: D,
dataObj: any,
map: any,
notEncStringList: any[] = []
notEncStringList: any[] = [],
) {
for (const prop in map) {
// eslint-disable-next-line
@@ -50,7 +50,7 @@ export default class Domain {
viewModel: T,
map: any,
orgId: string,
key: SymmetricCryptoKey = null
key: SymmetricCryptoKey = null,
): Promise<T> {
const promises = [];
const self: any = this;

View File

@@ -28,7 +28,7 @@ export class EncArrayBuffer implements Encrypted {
this.ivBytes = encBytes.slice(ENC_TYPE_LENGTH, ENC_TYPE_LENGTH + IV_LENGTH);
this.macBytes = encBytes.slice(
ENC_TYPE_LENGTH + IV_LENGTH,
ENC_TYPE_LENGTH + IV_LENGTH + MAC_LENGTH
ENC_TYPE_LENGTH + IV_LENGTH + MAC_LENGTH,
);
this.dataBytes = encBytes.slice(ENC_TYPE_LENGTH + IV_LENGTH + MAC_LENGTH);
break;
@@ -52,7 +52,7 @@ export class EncArrayBuffer implements Encrypted {
private throwDecryptionError() {
throw new Error(
"Error parsing encrypted ArrayBuffer: data is corrupted or has an invalid format."
"Error parsing encrypted ArrayBuffer: data is corrupted or has an invalid format.",
);
}

View File

@@ -66,7 +66,7 @@ describe("EncString", () => {
const cryptoService = mock<CryptoService>();
cryptoService.hasUserKey.mockResolvedValue(true);
cryptoService.getUserKeyWithLegacySupport.mockResolvedValue(
new SymmetricCryptoKey(makeStaticByteArray(32)) as UserKey
new SymmetricCryptoKey(makeStaticByteArray(32)) as UserKey,
);
const encryptService = mock<EncryptService>();
@@ -77,7 +77,7 @@ describe("EncString", () => {
beforeEach(() => {
(window as any).bitwardenContainerService = new ContainerService(
cryptoService,
encryptService
encryptService,
);
});
@@ -206,7 +206,7 @@ describe("EncString", () => {
(window as any).bitwardenContainerService = new ContainerService(
cryptoService,
encryptService
encryptService,
);
});
@@ -215,7 +215,7 @@ describe("EncString", () => {
(window as any).bitwardenContainerService = new ContainerService(
cryptoService,
encryptService
encryptService,
);
const decrypted = await encString.decrypt(null);

View File

@@ -18,7 +18,7 @@ export class EncString implements Encrypted {
encryptedStringOrType: string | EncryptionType,
data?: string,
iv?: string,
mac?: string
mac?: string,
) {
if (data != null) {
this.initFromData(encryptedStringOrType as EncryptionType, data, iv, mac);

View File

@@ -21,7 +21,7 @@ describe("state", () => {
userId: {},
},
},
Account.fromJSON
Account.fromJSON,
);
expect(state.accounts["userId"]).toBeInstanceOf(Account);

View File

@@ -5,7 +5,7 @@ import { GlobalState } from "./global-state";
export class State<
TGlobalState extends GlobalState = GlobalState,
TAccount extends Account = Account
TAccount extends Account = Account,
> {
accounts: { [userId: string]: TAccount } = {};
globals: TGlobalState;
@@ -20,7 +20,7 @@ export class State<
// TODO, make Jsonify<State,TGlobalState,TAccount> work. It currently doesn't because Globals doesn't implement Jsonify.
static fromJSON<TGlobalState extends GlobalState, TAccount extends Account>(
obj: any,
accountDeserializer: (json: Jsonify<TAccount>) => TAccount
accountDeserializer: (json: Jsonify<TAccount>) => TAccount,
): State<TGlobalState, TAccount> {
if (obj == null) {
return null;
@@ -33,7 +33,7 @@ export class State<
private static buildAccountMapFromJSON<TAccount extends Account>(
jsonAccounts: { [userId: string]: Jsonify<TAccount> },
accountDeserializer: (json: Jsonify<TAccount>) => TAccount
accountDeserializer: (json: Jsonify<TAccount>) => TAccount,
) {
if (!jsonAccounts) {
return {};