Create new interfaces for objects transmitted using the REST API

Changes:
- Create new IContact, IAccount, and IConversation interfaces in common/
    - These interfaces represent the serialized versions of the models which are transferred
    - The client models are classes which implement these interfaces
- Create new LookupResult interface for nameserver lookup results
- Create new IConversationMember interface for conversation members
    - The client interface ConversationMember extends this interface to have a Contact field rather than IContact
- Create new ConversationInfos interface for conversation infos
- Create new ContactDetails interface for contact details (used by contacts routes)
- Move request and response body interfaces into common/
- Merge AccountConfig into AccountDetails interface
- Create interfaces for server-only objects:
    - ConversationMemberInfos
    - ConversationRequestMetadata
- Ensure interfaces in jami-signal-interfaces.ts do not contain fields with JamiSwig types
- Rename models/ filenames to camelCase as they are not components
- Rewrite client models to have proper TypeScript accessors and remove unused getters
- Rewrite how client models are initialized from the serialized interface using .fromInterface static methods
- Make client models implement the interfaces in common/ for consistency
- Remove unneeded _next parameter for Express.js route handlers
- Use Partial<T> for all Express.js request body types on server
- Type all Axios response body types with interfaces

GitLab: #92
Change-Id: I4b2c75ac632ec5d9bf12a874a5ba04467c76fa6d
diff --git a/server/src/routers/auth-router.ts b/server/src/routers/auth-router.ts
index db82fd6..21ffefc 100644
--- a/server/src/routers/auth-router.ts
+++ b/server/src/routers/auth-router.ts
@@ -19,19 +19,13 @@
 import { Router } from 'express';
 import asyncHandler from 'express-async-handler';
 import { ParamsDictionary, Request } from 'express-serve-static-core';
-import { AccountDetails, HttpStatusCode } from 'jami-web-common';
+import { AccessToken, AccountDetails, HttpStatusCode, UserCredentials } from 'jami-web-common';
 import { Container } from 'typedi';
 
 import { Jamid } from '../jamid/jamid.js';
 import { Accounts } from '../storage/accounts.js';
 import { signJwt } from '../utils/jwt.js';
 
-interface Credentials {
-  username: string;
-  password: string;
-  isJams: boolean;
-}
-
 const jamid = Container.get(Jamid);
 const accounts = Container.get(Accounts);
 
@@ -39,7 +33,7 @@
 
 authRouter.post(
   '/new-account',
-  asyncHandler(async (req: Request<ParamsDictionary, string, Partial<Credentials>>, res, _next) => {
+  asyncHandler(async (req: Request<ParamsDictionary, string, Partial<UserCredentials>>, res) => {
     const { username, password, isJams } = req.body;
     if (username === undefined || password === undefined) {
       res.status(HttpStatusCode.BadRequest).send('Missing username or password in body');
@@ -60,7 +54,7 @@
     const hashedPassword = await argon2.hash(password, { type: argon2.argon2id });
 
     const accountDetails: Partial<AccountDetails> = {
-      // TODO: enable encrypted archives
+      // TODO: Enable encrypted archives
       // 'Account.archivePassword': password
     };
     if (isJams) {
@@ -99,37 +93,35 @@
 
 authRouter.post(
   '/login',
-  asyncHandler(
-    async (req: Request<ParamsDictionary, { accessToken: string } | string, Partial<Credentials>>, res, _next) => {
-      const { username, password, isJams } = req.body;
-      if (username === undefined || password === undefined) {
-        res.status(HttpStatusCode.BadRequest).send('Missing username or password in body');
-        return;
-      }
-
-      // Check if the account is stored stored on this daemon instance
-      const accountId = jamid.getAccountIdFromUsername(username);
-      if (accountId === undefined) {
-        res.status(HttpStatusCode.NotFound).send('Username not found');
-        return;
-      }
-
-      const hashedPassword = accounts.get(username, isJams);
-      if (hashedPassword === undefined) {
-        res
-          .status(HttpStatusCode.NotFound)
-          .send('Password not found (the account does not have a password set on the server)');
-        return;
-      }
-
-      const isPasswordVerified = await argon2.verify(hashedPassword, password);
-      if (!isPasswordVerified) {
-        res.status(HttpStatusCode.Unauthorized).send('Incorrect password');
-        return;
-      }
-
-      const jwt = await signJwt(accountId);
-      res.send({ accessToken: jwt });
+  asyncHandler(async (req: Request<ParamsDictionary, AccessToken | string, Partial<UserCredentials>>, res) => {
+    const { username, password, isJams } = req.body;
+    if (username === undefined || password === undefined) {
+      res.status(HttpStatusCode.BadRequest).send('Missing username or password in body');
+      return;
     }
-  )
+
+    // Check if the account is stored stored on this daemon instance
+    const accountId = jamid.getAccountIdFromUsername(username);
+    if (accountId === undefined) {
+      res.status(HttpStatusCode.NotFound).send('Username not found');
+      return;
+    }
+
+    const hashedPassword = accounts.get(username, isJams);
+    if (hashedPassword === undefined) {
+      res
+        .status(HttpStatusCode.NotFound)
+        .send('Password not found (the account does not have a password set on the server)');
+      return;
+    }
+
+    const isPasswordVerified = await argon2.verify(hashedPassword, password);
+    if (!isPasswordVerified) {
+      res.status(HttpStatusCode.Unauthorized).send('Incorrect password');
+      return;
+    }
+
+    const jwt = await signJwt(accountId);
+    res.send({ accessToken: jwt });
+  })
 );