@lifeready/core 1.0.16 → 1.0.18
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/bundles/lifeready-core.umd.js +114 -139
- package/bundles/lifeready-core.umd.js.map +1 -1
- package/bundles/lifeready-core.umd.min.js +1 -1
- package/bundles/lifeready-core.umd.min.js.map +1 -1
- package/esm2015/lib/api/key-exchange.types.js +1 -12
- package/esm2015/lib/api/types/lr-graphql.types.js +1 -1
- package/esm2015/lib/items2/item2.service.js +4 -3
- package/esm2015/lib/trusted-parties/tp-password-reset.gql.js +2 -1
- package/esm2015/lib/trusted-parties/trusted-party2.service.js +16 -13
- package/esm2015/lifeready-core.js +16 -9
- package/esm2015/public-api.js +2 -9
- package/fesm2015/lifeready-core.js +14 -19
- package/fesm2015/lifeready-core.js.map +1 -1
- package/lib/api/key-exchange.types.d.ts +1 -9
- package/lib/api/types/lr-graphql.types.d.ts +2 -0
- package/lib/trusted-parties/tp-password-reset.gql.d.ts +1 -0
- package/lib/trusted-parties/tp-password-reset.service.d.ts +1 -0
- package/lib/trusted-parties/trusted-party2.service.d.ts +6 -5
- package/lifeready-core.d.ts +15 -8
- package/lifeready-core.metadata.json +1 -1
- package/package.json +1 -1
- package/public-api.d.ts +1 -8
|
@@ -604,14 +604,16 @@
|
|
|
604
604
|
return Object.assign({ link: core.from([retryLink, promoteGqlErrors, authLink, httpLink]), cache: new core.InMemoryCache(), defaultOptions: defaultOptions }, config.apolloConfig);
|
|
605
605
|
};
|
|
606
606
|
|
|
607
|
+
var NodeType;
|
|
607
608
|
(function (NodeType) {
|
|
608
609
|
NodeType["Key"] = "key";
|
|
609
610
|
NodeType["PassKey"] = "passKey";
|
|
610
|
-
})(
|
|
611
|
+
})(NodeType || (NodeType = {}));
|
|
612
|
+
var EdgeType;
|
|
611
613
|
(function (EdgeType) {
|
|
612
614
|
EdgeType["KeyLink"] = "keyLink";
|
|
613
615
|
EdgeType["PassKeyLink"] = "passKeyLink";
|
|
614
|
-
})(
|
|
616
|
+
})(EdgeType || (EdgeType = {}));
|
|
615
617
|
|
|
616
618
|
// "why?" you ask: https://stackoverflow.com/questions/59735280/angular-8-moment-error-cannot-call-a-namespace-moment
|
|
617
619
|
var moment = moment_;
|
|
@@ -768,10 +770,11 @@
|
|
|
768
770
|
]; };
|
|
769
771
|
var templateObject_1;
|
|
770
772
|
|
|
773
|
+
var JoseSerialization;
|
|
771
774
|
(function (JoseSerialization) {
|
|
772
775
|
JoseSerialization["JSON"] = "JSON";
|
|
773
776
|
JoseSerialization["COMPACT"] = "COMPACT";
|
|
774
|
-
})(
|
|
777
|
+
})(JoseSerialization || (JoseSerialization = {}));
|
|
775
778
|
var VERIFY_OPTIONS_DEFAULT = {
|
|
776
779
|
payloadType: 'json',
|
|
777
780
|
returnOnlyPayload: true,
|
|
@@ -779,7 +782,7 @@
|
|
|
779
782
|
var DECRYPT_OPTIONS_DEFAULT = {
|
|
780
783
|
payloadType: 'json',
|
|
781
784
|
returnOnlyPayload: true,
|
|
782
|
-
serializations: [
|
|
785
|
+
serializations: [JoseSerialization.JSON],
|
|
783
786
|
};
|
|
784
787
|
function isSymmetricKey(key) {
|
|
785
788
|
// TODO: make sure this covers all cases.
|
|
@@ -819,12 +822,12 @@
|
|
|
819
822
|
key = key.jwk;
|
|
820
823
|
}
|
|
821
824
|
if (typeof jwe === 'string') {
|
|
822
|
-
if (options.serializations.includes(
|
|
825
|
+
if (options.serializations.includes(JoseSerialization.JSON)) {
|
|
823
826
|
try {
|
|
824
827
|
jwe = JSON.parse(jwe);
|
|
825
828
|
}
|
|
826
829
|
catch (error) {
|
|
827
|
-
if (options.serializations.includes(
|
|
830
|
+
if (options.serializations.includes(JoseSerialization.COMPACT)) {
|
|
828
831
|
console.log('Not a JSON-formatted JWE, it maybe compact serialisation format.');
|
|
829
832
|
}
|
|
830
833
|
else {
|
|
@@ -1771,10 +1774,10 @@
|
|
|
1771
1774
|
return node.data;
|
|
1772
1775
|
};
|
|
1773
1776
|
KeyGraphService.prototype.key = function (id) {
|
|
1774
|
-
return this.getNode(id,
|
|
1777
|
+
return this.getNode(id, NodeType.Key);
|
|
1775
1778
|
};
|
|
1776
1779
|
KeyGraphService.prototype.passKey = function (id) {
|
|
1777
|
-
return this.getNode(id,
|
|
1780
|
+
return this.getNode(id, NodeType.PassKey);
|
|
1778
1781
|
};
|
|
1779
1782
|
KeyGraphService.prototype.addKeys = function (src) {
|
|
1780
1783
|
var e_1, _a, e_2, _b, e_3, _c;
|
|
@@ -1790,7 +1793,7 @@
|
|
|
1790
1793
|
continue;
|
|
1791
1794
|
}
|
|
1792
1795
|
var node = {
|
|
1793
|
-
type:
|
|
1796
|
+
type: NodeType.Key,
|
|
1794
1797
|
data: ___default.cloneDeep(key),
|
|
1795
1798
|
};
|
|
1796
1799
|
this.graph.setNode(key.id, node);
|
|
@@ -1813,7 +1816,7 @@
|
|
|
1813
1816
|
continue;
|
|
1814
1817
|
}
|
|
1815
1818
|
var edge = {
|
|
1816
|
-
type:
|
|
1819
|
+
type: EdgeType.KeyLink,
|
|
1817
1820
|
data: ___default.cloneDeep(keyLink),
|
|
1818
1821
|
};
|
|
1819
1822
|
// Edge goes from wrapping key to wrapped key.
|
|
@@ -1837,7 +1840,7 @@
|
|
|
1837
1840
|
continue;
|
|
1838
1841
|
}
|
|
1839
1842
|
var edge = {
|
|
1840
|
-
type:
|
|
1843
|
+
type: EdgeType.PassKeyLink,
|
|
1841
1844
|
data: ___default.cloneDeep(passKeyLink),
|
|
1842
1845
|
};
|
|
1843
1846
|
// Edge goes from wrapping key to wrapped key.
|
|
@@ -3859,7 +3862,7 @@
|
|
|
3859
3862
|
var ApproveTpPasswordResetRequestMutation = gqlTyped(templateObject_8$3 || (templateObject_8$3 = __makeTemplateObject(["\nmutation ApproveTpPasswordResetRequestMutation(\n $input: ApproveTpPasswordResetRequestInput!\n) {\n approveTpPasswordResetRequest(input: $input) {\n claimApprover {\n id\n }\n }\n}"], ["\nmutation ApproveTpPasswordResetRequestMutation(\n $input: ApproveTpPasswordResetRequestInput!\n) {\n approveTpPasswordResetRequest(input: $input) {\n claimApprover {\n id\n }\n }\n}"])));
|
|
3860
3863
|
var RejectTpPasswordResetRequestMutation = gqlTyped(templateObject_9$2 || (templateObject_9$2 = __makeTemplateObject(["\nmutation RejectTpPasswordResetRequestMutation(\n $input: RejectTpPasswordResetRequestInput!\n) {\n rejectTpPasswordResetRequest(input: $input) {\n claimApprover {\n id\n }\n }\n}"], ["\nmutation RejectTpPasswordResetRequestMutation(\n $input: RejectTpPasswordResetRequestInput!\n) {\n rejectTpPasswordResetRequest(input: $input) {\n claimApprover {\n id\n }\n }\n}"])));
|
|
3861
3864
|
var TpPasswordResetUserQuery = gqlTyped(templateObject_10$2 || (templateObject_10$2 = __makeTemplateObject(["\nquery TpPasswordResetUserQuery {\n tpPasswordResetUser {\n username\n resetUsername\n state\n passKey {\n id\n passKeyParams\n passIdpParams\n }\n masterKey {\n id\n }\n pxk {\n id\n }\n sessionEncryptionKey\n assembly {\n singleReject\n quorum\n subAssemblies {\n singleReject\n quorum\n approvers {\n name\n email\n state\n }\n }\n }\n approvals {\n id\n modified\n approverEmail\n receiverCipher\n receiverCipherPartialAssemblyKey\n }\n assemblyCipherData\n wrappedAssemblyKeyVerifierPrk\n }\n}"], ["\nquery TpPasswordResetUserQuery {\n tpPasswordResetUser {\n username\n resetUsername\n state\n passKey {\n id\n passKeyParams\n passIdpParams\n }\n masterKey {\n id\n }\n pxk {\n id\n }\n sessionEncryptionKey\n assembly {\n singleReject\n quorum\n subAssemblies {\n singleReject\n quorum\n approvers {\n name\n email\n state\n }\n }\n }\n approvals {\n id\n modified\n approverEmail\n receiverCipher\n receiverCipherPartialAssemblyKey\n }\n assemblyCipherData\n wrappedAssemblyKeyVerifierPrk\n }\n}"])));
|
|
3862
|
-
var TpPasswordResetQuery = gqlTyped(templateObject_11$1 || (templateObject_11$1 = __makeTemplateObject(["\nquery TpPasswordResetQuery {\n tpPasswordReset {\n id\n applied\n assembly {\n singleReject\n quorum\n subjectCipherData\n subjectKey {\n id\n }\n assemblyKey {\n id\n }\n assemblyCipherData\n subAssemblies {\n edges {\n node {\n id\n singleReject\n quorum\n subjectCipherData\n subjectKey {\n id\n }\n approvers {\n edges {\n node {\n id\n tp {\n id\n }\n sharedKey {\n id\n }\n sharedCipherData\n }\n }\n }\n }\n }\n }\n }\n }\n}"], ["\nquery TpPasswordResetQuery {\n tpPasswordReset {\n id\n applied\n assembly {\n singleReject\n quorum\n subjectCipherData\n subjectKey {\n id\n }\n assemblyKey {\n id\n }\n assemblyCipherData\n subAssemblies {\n edges {\n node {\n id\n singleReject\n quorum\n subjectCipherData\n subjectKey {\n id\n }\n approvers {\n edges {\n node {\n id\n tp {\n id\n }\n sharedKey {\n id\n }\n sharedCipherData\n }\n }\n }\n }\n }\n }\n }\n }\n}"])));
|
|
3865
|
+
var TpPasswordResetQuery = gqlTyped(templateObject_11$1 || (templateObject_11$1 = __makeTemplateObject(["\nquery TpPasswordResetQuery {\n tpPasswordReset {\n id\n applied\n assembly {\n singleReject\n quorum\n canMeetQuorum\n subjectCipherData\n subjectKey {\n id\n }\n assemblyKey {\n id\n }\n assemblyCipherData\n subAssemblies {\n edges {\n node {\n id\n singleReject\n quorum\n subjectCipherData\n subjectKey {\n id\n }\n approvers {\n edges {\n node {\n id\n tp {\n id\n }\n sharedKey {\n id\n }\n sharedCipherData\n }\n }\n }\n }\n }\n }\n }\n }\n}"], ["\nquery TpPasswordResetQuery {\n tpPasswordReset {\n id\n applied\n assembly {\n singleReject\n quorum\n canMeetQuorum\n subjectCipherData\n subjectKey {\n id\n }\n assemblyKey {\n id\n }\n assemblyCipherData\n subAssemblies {\n edges {\n node {\n id\n singleReject\n quorum\n subjectCipherData\n subjectKey {\n id\n }\n approvers {\n edges {\n node {\n id\n tp {\n id\n }\n sharedKey {\n id\n }\n sharedCipherData\n }\n }\n }\n }\n }\n }\n }\n }\n}"])));
|
|
3863
3866
|
var CreateTpPasswordResetMutation = gqlTyped(templateObject_12$1 || (templateObject_12$1 = __makeTemplateObject(["\nmutation CreateTpPasswordResetMutation($input: CreateTpPasswordResetInput!) {\n createTpPasswordReset(input: $input) {\n tpPasswordReset {\n id\n }\n }\n}"], ["\nmutation CreateTpPasswordResetMutation($input: CreateTpPasswordResetInput!) {\n createTpPasswordReset(input: $input) {\n tpPasswordReset {\n id\n }\n }\n}"])));
|
|
3864
3867
|
var DeleteTpPasswordResetMutation = gqlTyped(templateObject_13$1 || (templateObject_13$1 = __makeTemplateObject(["\nmutation DeleteTpPasswordResetMutation {\n deleteTpPasswordReset(input: {}) {\n id\n }\n}"], ["\nmutation DeleteTpPasswordResetMutation {\n deleteTpPasswordReset(input: {}) {\n id\n }\n}"])));
|
|
3865
3868
|
var UpdateTpPasswordResetMutation = gqlTyped(templateObject_14 || (templateObject_14 = __makeTemplateObject(["\nmutation UpdateTpPasswordResetMutation($input: UpdateTpPasswordResetInput!) {\n updateTpPasswordReset(input: $input) {\n tpPasswordReset {\n id\n }\n }\n}"], ["\nmutation UpdateTpPasswordResetMutation($input: UpdateTpPasswordResetInput!) {\n updateTpPasswordReset(input: $input) {\n tpPasswordReset {\n id\n }\n }\n}"])));
|
|
@@ -4181,7 +4184,7 @@
|
|
|
4181
4184
|
})
|
|
4182
4185
|
], exports.CommonProcessorsService);
|
|
4183
4186
|
|
|
4184
|
-
exports.ɵ
|
|
4187
|
+
exports.ɵi = /** @class */ (function () {
|
|
4185
4188
|
function TpPasswordResetProcessorService(ngZone, keyGraph) {
|
|
4186
4189
|
this.ngZone = ngZone;
|
|
4187
4190
|
this.keyGraph = keyGraph;
|
|
@@ -4321,21 +4324,21 @@
|
|
|
4321
4324
|
};
|
|
4322
4325
|
return TpPasswordResetProcessorService;
|
|
4323
4326
|
}());
|
|
4324
|
-
exports.ɵ
|
|
4325
|
-
exports.ɵ
|
|
4327
|
+
exports.ɵi.ɵprov = i0.ɵɵdefineInjectable({ factory: function TpPasswordResetProcessorService_Factory() { return new exports.ɵi(i0.ɵɵinject(i0.NgZone), i0.ɵɵinject(KeyGraphService)); }, token: exports.ɵi, providedIn: "root" });
|
|
4328
|
+
exports.ɵi.decorators = [
|
|
4326
4329
|
{ type: i0.Injectable, args: [{
|
|
4327
4330
|
providedIn: 'root',
|
|
4328
4331
|
},] }
|
|
4329
4332
|
];
|
|
4330
|
-
exports.ɵ
|
|
4333
|
+
exports.ɵi.ctorParameters = function () { return [
|
|
4331
4334
|
{ type: i0.NgZone },
|
|
4332
4335
|
{ type: KeyGraphService }
|
|
4333
4336
|
]; };
|
|
4334
|
-
exports.ɵ
|
|
4337
|
+
exports.ɵi = __decorate([
|
|
4335
4338
|
RunOutsideAngular({
|
|
4336
4339
|
ngZoneName: 'ngZone',
|
|
4337
4340
|
})
|
|
4338
|
-
], exports.ɵ
|
|
4341
|
+
], exports.ɵi);
|
|
4339
4342
|
|
|
4340
4343
|
function extendPath(context, key) {
|
|
4341
4344
|
return Object.assign(Object.assign({}, context), { path: __spread(context.path, [key]) });
|
|
@@ -4624,7 +4627,7 @@
|
|
|
4624
4627
|
};
|
|
4625
4628
|
return QueryProcessorService;
|
|
4626
4629
|
}());
|
|
4627
|
-
exports.QueryProcessorService.ɵprov = i0.ɵɵdefineInjectable({ factory: function QueryProcessorService_Factory() { return new exports.QueryProcessorService(i0.ɵɵinject(i0.NgZone), i0.ɵɵinject(KeyService), i0.ɵɵinject(exports.CommonProcessorsService), i0.ɵɵinject(exports.ɵ
|
|
4630
|
+
exports.QueryProcessorService.ɵprov = i0.ɵɵdefineInjectable({ factory: function QueryProcessorService_Factory() { return new exports.QueryProcessorService(i0.ɵɵinject(i0.NgZone), i0.ɵɵinject(KeyService), i0.ɵɵinject(exports.CommonProcessorsService), i0.ɵɵinject(exports.ɵi)); }, token: exports.QueryProcessorService, providedIn: "root" });
|
|
4628
4631
|
exports.QueryProcessorService.decorators = [
|
|
4629
4632
|
{ type: i0.Injectable, args: [{
|
|
4630
4633
|
providedIn: 'root',
|
|
@@ -4634,7 +4637,7 @@
|
|
|
4634
4637
|
{ type: i0.NgZone },
|
|
4635
4638
|
{ type: KeyService },
|
|
4636
4639
|
{ type: exports.CommonProcessorsService },
|
|
4637
|
-
{ type: exports.ɵ
|
|
4640
|
+
{ type: exports.ɵi }
|
|
4638
4641
|
]; };
|
|
4639
4642
|
exports.QueryProcessorService = __decorate([
|
|
4640
4643
|
RunOutsideAngular({
|
|
@@ -5000,7 +5003,7 @@
|
|
|
5000
5003
|
// --------------------------------------------------------------------------
|
|
5001
5004
|
var keyGraphFieldAstSelection = getQuery(gql(templateObject_1$9 || (templateObject_1$9 = __makeTemplateObject(["\nquery {\n ", "\n}\n"], ["\nquery {\n ", "\n}\n"])), KeyGraphField)).selectionSet.selections[0];
|
|
5002
5005
|
var fetchKeyGraphFieldAstSelection = getQuery(gql(templateObject_2$7 || (templateObject_2$7 = __makeTemplateObject(["\nquery {\n ", "\n}\n"], ["\nquery {\n ", "\n}\n"])), FetchKeyGraphField)).selectionSet.selections[0];
|
|
5003
|
-
exports.ɵ
|
|
5006
|
+
exports.ɵh = /** @class */ (function () {
|
|
5004
5007
|
function LrGraphQLService(ngZone, apollo, keyGraph, queryProcessor) {
|
|
5005
5008
|
this.ngZone = ngZone;
|
|
5006
5009
|
this.apollo = apollo;
|
|
@@ -5138,28 +5141,28 @@
|
|
|
5138
5141
|
};
|
|
5139
5142
|
return LrGraphQLService;
|
|
5140
5143
|
}());
|
|
5141
|
-
exports.ɵ
|
|
5142
|
-
exports.ɵ
|
|
5144
|
+
exports.ɵh.ɵprov = i0.ɵɵdefineInjectable({ factory: function LrGraphQLService_Factory() { return new exports.ɵh(i0.ɵɵinject(i0.NgZone), i0.ɵɵinject(i1.Apollo), i0.ɵɵinject(KeyGraphService), i0.ɵɵinject(exports.QueryProcessorService)); }, token: exports.ɵh, providedIn: "root" });
|
|
5145
|
+
exports.ɵh.decorators = [
|
|
5143
5146
|
{ type: i0.Injectable, args: [{
|
|
5144
5147
|
providedIn: 'root',
|
|
5145
5148
|
},] }
|
|
5146
5149
|
];
|
|
5147
|
-
exports.ɵ
|
|
5150
|
+
exports.ɵh.ctorParameters = function () { return [
|
|
5148
5151
|
{ type: i0.NgZone },
|
|
5149
5152
|
{ type: i1.Apollo },
|
|
5150
5153
|
{ type: KeyGraphService },
|
|
5151
5154
|
{ type: exports.QueryProcessorService }
|
|
5152
5155
|
]; };
|
|
5153
|
-
exports.ɵ
|
|
5156
|
+
exports.ɵh = __decorate([
|
|
5154
5157
|
RunOutsideAngular({
|
|
5155
5158
|
ngZoneName: 'ngZone',
|
|
5156
5159
|
})
|
|
5157
|
-
], exports.ɵ
|
|
5160
|
+
], exports.ɵh);
|
|
5158
5161
|
var templateObject_1$9, templateObject_2$7;
|
|
5159
5162
|
|
|
5160
5163
|
var LrService = /** @class */ (function () {
|
|
5161
5164
|
function LrService(injector) {
|
|
5162
|
-
this.lrGraphQL = injector.get(exports.ɵ
|
|
5165
|
+
this.lrGraphQL = injector.get(exports.ɵh);
|
|
5163
5166
|
}
|
|
5164
5167
|
LrService.prototype.mutate = function (lrMutation, options) {
|
|
5165
5168
|
return __awaiter(this, void 0, void 0, function () {
|
|
@@ -5188,46 +5191,39 @@
|
|
|
5188
5191
|
function mapEdges(connection) {
|
|
5189
5192
|
return connection.edges.map(function (edge) { return edge.node; });
|
|
5190
5193
|
}
|
|
5191
|
-
var AccessRoleChoice;
|
|
5192
5194
|
(function (AccessRoleChoice) {
|
|
5193
5195
|
AccessRoleChoice["READER"] = "READER";
|
|
5194
5196
|
AccessRoleChoice["WRITER"] = "WRITER";
|
|
5195
5197
|
AccessRoleChoice["ADMIN"] = "ADMIN";
|
|
5196
5198
|
AccessRoleChoice["DENY"] = "DENY";
|
|
5197
5199
|
AccessRoleChoice["OWNER"] = "OWNER";
|
|
5198
|
-
})(AccessRoleChoice || (AccessRoleChoice = {}));
|
|
5199
|
-
var AccessRoleMethod;
|
|
5200
|
+
})(exports.AccessRoleChoice || (exports.AccessRoleChoice = {}));
|
|
5200
5201
|
(function (AccessRoleMethod) {
|
|
5201
5202
|
AccessRoleMethod["inherited"] = "inherited";
|
|
5202
5203
|
AccessRoleMethod["direct"] = "direct";
|
|
5203
|
-
})(AccessRoleMethod || (AccessRoleMethod = {}));
|
|
5204
|
-
var FileVersionOperation;
|
|
5204
|
+
})(exports.AccessRoleMethod || (exports.AccessRoleMethod = {}));
|
|
5205
5205
|
(function (FileVersionOperation) {
|
|
5206
5206
|
FileVersionOperation["CREATE"] = "CREATE";
|
|
5207
5207
|
FileVersionOperation["READ"] = "READ";
|
|
5208
5208
|
FileVersionOperation["UPDATE"] = "UPDATE";
|
|
5209
5209
|
FileVersionOperation["REVERT"] = "REVERT";
|
|
5210
5210
|
FileVersionOperation["DELETE"] = "DELETE";
|
|
5211
|
-
})(FileVersionOperation || (FileVersionOperation = {}));
|
|
5212
|
-
var KeyExchangeOtkState;
|
|
5211
|
+
})(exports.FileVersionOperation || (exports.FileVersionOperation = {}));
|
|
5213
5212
|
(function (KeyExchangeOtkState) {
|
|
5214
5213
|
KeyExchangeOtkState["OTK_INITIATED"] = "OTK_INITIATED";
|
|
5215
5214
|
KeyExchangeOtkState["OTK_ACCEPTED"] = "OTK_ACCEPTED";
|
|
5216
5215
|
KeyExchangeOtkState["OTK_COMPLETED"] = "OTK_COMPLETED";
|
|
5217
|
-
})(KeyExchangeOtkState || (KeyExchangeOtkState = {}));
|
|
5218
|
-
var KeyExchangeState;
|
|
5216
|
+
})(exports.KeyExchangeOtkState || (exports.KeyExchangeOtkState = {}));
|
|
5219
5217
|
(function (KeyExchangeState) {
|
|
5220
5218
|
KeyExchangeState["IN_PROGRESS"] = "IN_PROGRESS";
|
|
5221
5219
|
KeyExchangeState["COMPLETED"] = "COMPLETED";
|
|
5222
5220
|
KeyExchangeState["DECLINED"] = "DECLINED";
|
|
5223
5221
|
KeyExchangeState["CANCELLED"] = "CANCELLED";
|
|
5224
5222
|
KeyExchangeState["DELETED"] = "DELETED";
|
|
5225
|
-
})(KeyExchangeState || (KeyExchangeState = {}));
|
|
5226
|
-
var KeyExchangeMode;
|
|
5223
|
+
})(exports.KeyExchangeState || (exports.KeyExchangeState = {}));
|
|
5227
5224
|
(function (KeyExchangeMode) {
|
|
5228
5225
|
KeyExchangeMode["OTK"] = "OTK";
|
|
5229
|
-
})(KeyExchangeMode || (KeyExchangeMode = {}));
|
|
5230
|
-
var TpAssemblyState;
|
|
5226
|
+
})(exports.KeyExchangeMode || (exports.KeyExchangeMode = {}));
|
|
5231
5227
|
(function (TpAssemblyState) {
|
|
5232
5228
|
TpAssemblyState["DISABLED"] = "DISABLED";
|
|
5233
5229
|
TpAssemblyState["ENABLED"] = "ENABLED";
|
|
@@ -5237,8 +5233,7 @@
|
|
|
5237
5233
|
TpAssemblyState["EXPIRED"] = "EXPIRED";
|
|
5238
5234
|
TpAssemblyState["CANCELLED"] = "CANCELLED";
|
|
5239
5235
|
TpAssemblyState["RESET"] = "RESET";
|
|
5240
|
-
})(TpAssemblyState || (TpAssemblyState = {}));
|
|
5241
|
-
var TpClaimState;
|
|
5236
|
+
})(exports.TpAssemblyState || (exports.TpAssemblyState = {}));
|
|
5242
5237
|
(function (TpClaimState) {
|
|
5243
5238
|
TpClaimState["CLAIMED"] = "CLAIMED";
|
|
5244
5239
|
TpClaimState["APPROVED"] = "APPROVED";
|
|
@@ -5246,26 +5241,22 @@
|
|
|
5246
5241
|
TpClaimState["EXPIRED"] = "EXPIRED";
|
|
5247
5242
|
TpClaimState["CANCELLED"] = "CANCELLED";
|
|
5248
5243
|
TpClaimState["RESET"] = "RESET";
|
|
5249
|
-
})(TpClaimState || (TpClaimState = {}));
|
|
5250
|
-
var TpClaimApproverState;
|
|
5244
|
+
})(exports.TpClaimState || (exports.TpClaimState = {}));
|
|
5251
5245
|
(function (TpClaimApproverState) {
|
|
5252
5246
|
TpClaimApproverState["CLAIMED"] = "CLAIMED";
|
|
5253
5247
|
TpClaimApproverState["APPROVED"] = "APPROVED";
|
|
5254
5248
|
TpClaimApproverState["REJECTED"] = "REJECTED";
|
|
5255
|
-
})(TpClaimApproverState || (TpClaimApproverState = {}));
|
|
5256
|
-
var LockState;
|
|
5249
|
+
})(exports.TpClaimApproverState || (exports.TpClaimApproverState = {}));
|
|
5257
5250
|
(function (LockState) {
|
|
5258
5251
|
LockState["UNLOCKED"] = "UNLOCKED";
|
|
5259
5252
|
LockState["MUTEX_LOCKED"] = "MUTEX_LOCKED";
|
|
5260
|
-
})(LockState || (LockState = {}));
|
|
5261
|
-
var ScenarioState;
|
|
5253
|
+
})(exports.LockState || (exports.LockState = {}));
|
|
5262
5254
|
(function (ScenarioState) {
|
|
5263
5255
|
ScenarioState["DISABLED"] = "DISABLED";
|
|
5264
5256
|
ScenarioState["ENABLED"] = "ENABLED";
|
|
5265
5257
|
ScenarioState["CLAIMED"] = "CLAIMED";
|
|
5266
5258
|
ScenarioState["APPROVED"] = "APPROVED";
|
|
5267
|
-
})(ScenarioState || (ScenarioState = {}));
|
|
5268
|
-
var ClaimState;
|
|
5259
|
+
})(exports.ScenarioState || (exports.ScenarioState = {}));
|
|
5269
5260
|
(function (ClaimState) {
|
|
5270
5261
|
ClaimState["CLAIMED"] = "CLAIMED";
|
|
5271
5262
|
ClaimState["EXPIRED"] = "EXPIRED";
|
|
@@ -5273,18 +5264,16 @@
|
|
|
5273
5264
|
ClaimState["REJECTED"] = "REJECTED";
|
|
5274
5265
|
ClaimState["CANCELLED"] = "CANCELLED";
|
|
5275
5266
|
ClaimState["RESET"] = "RESET";
|
|
5276
|
-
})(ClaimState || (ClaimState = {}));
|
|
5277
|
-
var ClaimApproverState;
|
|
5267
|
+
})(exports.ClaimState || (exports.ClaimState = {}));
|
|
5278
5268
|
(function (ClaimApproverState) {
|
|
5279
5269
|
ClaimApproverState["CLAIMED"] = "CLAIMED";
|
|
5280
5270
|
ClaimApproverState["APPROVED"] = "APPROVED";
|
|
5281
5271
|
ClaimApproverState["REJECTED"] = "REJECTED";
|
|
5282
|
-
})(ClaimApproverState || (ClaimApproverState = {}));
|
|
5283
|
-
var LinkTypeField;
|
|
5272
|
+
})(exports.ClaimApproverState || (exports.ClaimApproverState = {}));
|
|
5284
5273
|
(function (LinkTypeField) {
|
|
5285
5274
|
LinkTypeField["HARD"] = "HARD";
|
|
5286
5275
|
LinkTypeField["SOFT"] = "SOFT";
|
|
5287
|
-
})(LinkTypeField || (LinkTypeField = {}));
|
|
5276
|
+
})(exports.LinkTypeField || (exports.LinkTypeField = {}));
|
|
5288
5277
|
|
|
5289
5278
|
var SecretShare = /** @class */ (function () {
|
|
5290
5279
|
function SecretShare(assembly, subAssembly, mnemonics) {
|
|
@@ -5524,7 +5513,7 @@
|
|
|
5524
5513
|
this.encryptionService = injector.get(EncryptionService);
|
|
5525
5514
|
this.keyGraph = injector.get(KeyGraphService);
|
|
5526
5515
|
this.slip39Service = injector.get(Slip39Service);
|
|
5527
|
-
this.lrGraphQl = injector.get(exports.ɵ
|
|
5516
|
+
this.lrGraphQl = injector.get(exports.ɵh);
|
|
5528
5517
|
}
|
|
5529
5518
|
TpAssemblyController.prototype.recoverAssemblyKey = function (partials) {
|
|
5530
5519
|
return __awaiter(this, void 0, void 0, function () {
|
|
@@ -6010,7 +5999,7 @@
|
|
|
6010
5999
|
return TpAssemblyController;
|
|
6011
6000
|
}());
|
|
6012
6001
|
|
|
6013
|
-
exports.ɵ
|
|
6002
|
+
exports.ɵl = /** @class */ (function (_super) {
|
|
6014
6003
|
__extends(TpPasswordResetAssemblyController, _super);
|
|
6015
6004
|
function TpPasswordResetAssemblyController(ngZone, injector) {
|
|
6016
6005
|
var _this = _super.call(this, injector) || this;
|
|
@@ -6024,21 +6013,21 @@
|
|
|
6024
6013
|
};
|
|
6025
6014
|
return TpPasswordResetAssemblyController;
|
|
6026
6015
|
}(TpAssemblyController));
|
|
6027
|
-
exports.ɵ
|
|
6028
|
-
exports.ɵ
|
|
6016
|
+
exports.ɵl.ɵprov = i0.ɵɵdefineInjectable({ factory: function TpPasswordResetAssemblyController_Factory() { return new exports.ɵl(i0.ɵɵinject(i0.NgZone), i0.ɵɵinject(i0.INJECTOR)); }, token: exports.ɵl, providedIn: "root" });
|
|
6017
|
+
exports.ɵl.decorators = [
|
|
6029
6018
|
{ type: i0.Injectable, args: [{
|
|
6030
6019
|
providedIn: 'root',
|
|
6031
6020
|
},] }
|
|
6032
6021
|
];
|
|
6033
|
-
exports.ɵ
|
|
6022
|
+
exports.ɵl.ctorParameters = function () { return [
|
|
6034
6023
|
{ type: i0.NgZone },
|
|
6035
6024
|
{ type: i0.Injector }
|
|
6036
6025
|
]; };
|
|
6037
|
-
exports.ɵ
|
|
6026
|
+
exports.ɵl = __decorate([
|
|
6038
6027
|
RunOutsideAngular({
|
|
6039
6028
|
ngZoneName: 'ngZone',
|
|
6040
6029
|
})
|
|
6041
|
-
], exports.ɵ
|
|
6030
|
+
], exports.ɵl);
|
|
6042
6031
|
|
|
6043
6032
|
var initialiseAuth = function (authService) {
|
|
6044
6033
|
return function () { return authService.initialise(); };
|
|
@@ -6218,7 +6207,7 @@
|
|
|
6218
6207
|
case 1:
|
|
6219
6208
|
loginResult = _b.sent();
|
|
6220
6209
|
if (!(tpPasswordResetAutoComplete &&
|
|
6221
|
-
((_a = loginResult.resetUser) === null || _a === void 0 ? void 0 : _a.state) === TpClaimState.APPROVED)) return [3 /*break*/, 4];
|
|
6210
|
+
((_a = loginResult.resetUser) === null || _a === void 0 ? void 0 : _a.state) === exports.TpClaimState.APPROVED)) return [3 /*break*/, 4];
|
|
6222
6211
|
return [4 /*yield*/, this.completeRequest(password)];
|
|
6223
6212
|
case 2:
|
|
6224
6213
|
_b.sent();
|
|
@@ -6550,7 +6539,7 @@
|
|
|
6550
6539
|
case 0: return [4 /*yield*/, this.getResetUser(true)];
|
|
6551
6540
|
case 1:
|
|
6552
6541
|
resetUser = _b.sent();
|
|
6553
|
-
if (resetUser.state !== TpClaimState.APPROVED) {
|
|
6542
|
+
if (resetUser.state !== exports.TpClaimState.APPROVED) {
|
|
6554
6543
|
throw new LrBadStateException('Password reset request has not been approved.');
|
|
6555
6544
|
}
|
|
6556
6545
|
return [4 /*yield*/, this.recoverAssemblyKey(resetUser)];
|
|
@@ -6681,7 +6670,7 @@
|
|
|
6681
6670
|
};
|
|
6682
6671
|
return LifeReadyAuthService;
|
|
6683
6672
|
}());
|
|
6684
|
-
LifeReadyAuthService.ɵprov = i0.ɵɵdefineInjectable({ factory: function LifeReadyAuthService_Factory() { return new LifeReadyAuthService(i0.ɵɵinject(LR_CONFIG), i0.ɵɵinject(i4.AuthClass), i0.ɵɵinject(KeyFactoryService), i0.ɵɵinject(KeyService), i0.ɵɵinject(ProfileService), i0.ɵɵinject(KeyGraphService), i0.ɵɵinject(PasswordService), i0.ɵɵinject(IdleService), i0.ɵɵinject(exports.ɵ
|
|
6673
|
+
LifeReadyAuthService.ɵprov = i0.ɵɵdefineInjectable({ factory: function LifeReadyAuthService_Factory() { return new LifeReadyAuthService(i0.ɵɵinject(LR_CONFIG), i0.ɵɵinject(i4.AuthClass), i0.ɵɵinject(KeyFactoryService), i0.ɵɵinject(KeyService), i0.ɵɵinject(ProfileService), i0.ɵɵinject(KeyGraphService), i0.ɵɵinject(PasswordService), i0.ɵɵinject(IdleService), i0.ɵɵinject(exports.ɵh), i0.ɵɵinject(exports.ɵi), i0.ɵɵinject(PersistService), i0.ɵɵinject(EncryptionService), i0.ɵɵinject(Slip39Service), i0.ɵɵinject(exports.ɵl)); }, token: LifeReadyAuthService, providedIn: "root" });
|
|
6685
6674
|
LifeReadyAuthService.decorators = [
|
|
6686
6675
|
{ type: i0.Injectable, args: [{
|
|
6687
6676
|
providedIn: 'root',
|
|
@@ -6696,12 +6685,12 @@
|
|
|
6696
6685
|
{ type: KeyGraphService },
|
|
6697
6686
|
{ type: PasswordService },
|
|
6698
6687
|
{ type: IdleService },
|
|
6699
|
-
{ type: exports.ɵ
|
|
6700
|
-
{ type: exports.ɵ
|
|
6688
|
+
{ type: exports.ɵh },
|
|
6689
|
+
{ type: exports.ɵi },
|
|
6701
6690
|
{ type: PersistService },
|
|
6702
6691
|
{ type: EncryptionService },
|
|
6703
6692
|
{ type: Slip39Service },
|
|
6704
|
-
{ type: exports.ɵ
|
|
6693
|
+
{ type: exports.ɵl }
|
|
6705
6694
|
]; };
|
|
6706
6695
|
|
|
6707
6696
|
var FileService = /** @class */ (function () {
|
|
@@ -6934,15 +6923,6 @@
|
|
|
6934
6923
|
OtkState["OTK_ACCEPTED"] = "OTK_ACCEPTED";
|
|
6935
6924
|
OtkState["OTK_COMPLETED"] = "OTK_COMPLETED";
|
|
6936
6925
|
})(exports.OtkState || (exports.OtkState = {}));
|
|
6937
|
-
(function (KeyExchangeState) {
|
|
6938
|
-
KeyExchangeState["IN_PROGRESS"] = "IN_PROGRESS";
|
|
6939
|
-
KeyExchangeState["COMPLETED"] = "COMPLETED";
|
|
6940
|
-
KeyExchangeState["DECLINED"] = "DECLINED";
|
|
6941
|
-
KeyExchangeState["CANCELLED"] = "CANCELLED";
|
|
6942
|
-
})(exports.KeyExchangeState || (exports.KeyExchangeState = {}));
|
|
6943
|
-
(function (KeyExchangeMode) {
|
|
6944
|
-
KeyExchangeMode["OTK"] = "OTK";
|
|
6945
|
-
})(exports.KeyExchangeMode || (exports.KeyExchangeMode = {}));
|
|
6946
6926
|
|
|
6947
6927
|
var moment$2 = moment_;
|
|
6948
6928
|
var KeyExchangeService = /** @class */ (function () {
|
|
@@ -7113,7 +7093,7 @@
|
|
|
7113
7093
|
case 3:
|
|
7114
7094
|
prk = _a.sent();
|
|
7115
7095
|
return [4 /*yield*/, this.encryptionService.decrypt(prk.jwk, JSON.parse(keyExchange.otk.responderPbkCipher), {
|
|
7116
|
-
serializations: [
|
|
7096
|
+
serializations: [JoseSerialization.COMPACT],
|
|
7117
7097
|
})];
|
|
7118
7098
|
case 4:
|
|
7119
7099
|
decryptedCipher = _a.sent();
|
|
@@ -11203,7 +11183,7 @@
|
|
|
11203
11183
|
case 3:
|
|
11204
11184
|
prk = _a.sent();
|
|
11205
11185
|
return [4 /*yield*/, this.encryptionService.decrypt(prk.jwk, JSON.parse(keyExchange.otk.responderPbkCipher), {
|
|
11206
|
-
serializations: [
|
|
11186
|
+
serializations: [JoseSerialization.COMPACT],
|
|
11207
11187
|
})];
|
|
11208
11188
|
case 4:
|
|
11209
11189
|
decryptedCipher = _a.sent();
|
|
@@ -11839,7 +11819,7 @@
|
|
|
11839
11819
|
};
|
|
11840
11820
|
return KeyExchange2Service;
|
|
11841
11821
|
}());
|
|
11842
|
-
exports.KeyExchange2Service.ɵprov = i0.ɵɵdefineInjectable({ factory: function KeyExchange2Service_Factory() { return new exports.KeyExchange2Service(i0.ɵɵinject(i0.NgZone), i0.ɵɵinject(KeyFactoryService), i0.ɵɵinject(KeyService), i0.ɵɵinject(EncryptionService), i0.ɵɵinject(UserService), i0.ɵɵinject(KeyGraphService), i0.ɵɵinject(exports.ɵ
|
|
11822
|
+
exports.KeyExchange2Service.ɵprov = i0.ɵɵdefineInjectable({ factory: function KeyExchange2Service_Factory() { return new exports.KeyExchange2Service(i0.ɵɵinject(i0.NgZone), i0.ɵɵinject(KeyFactoryService), i0.ɵɵinject(KeyService), i0.ɵɵinject(EncryptionService), i0.ɵɵinject(UserService), i0.ɵɵinject(KeyGraphService), i0.ɵɵinject(exports.ɵh)); }, token: exports.KeyExchange2Service, providedIn: "root" });
|
|
11843
11823
|
exports.KeyExchange2Service.decorators = [
|
|
11844
11824
|
{ type: i0.Injectable, args: [{
|
|
11845
11825
|
providedIn: 'root',
|
|
@@ -11852,7 +11832,7 @@
|
|
|
11852
11832
|
{ type: EncryptionService },
|
|
11853
11833
|
{ type: UserService },
|
|
11854
11834
|
{ type: KeyGraphService },
|
|
11855
|
-
{ type: exports.ɵ
|
|
11835
|
+
{ type: exports.ɵh }
|
|
11856
11836
|
]; };
|
|
11857
11837
|
exports.KeyExchange2Service = __decorate([
|
|
11858
11838
|
RunOutsideAngular({
|
|
@@ -12002,7 +11982,7 @@
|
|
|
12002
11982
|
};
|
|
12003
11983
|
return SharedContactCard2Service;
|
|
12004
11984
|
}());
|
|
12005
|
-
exports.SharedContactCard2Service.ɵprov = i0.ɵɵdefineInjectable({ factory: function SharedContactCard2Service_Factory() { return new exports.SharedContactCard2Service(i0.ɵɵinject(i0.NgZone), i0.ɵɵinject(KeyService), i0.ɵɵinject(KeyGraphService), i0.ɵɵinject(EncryptionService), i0.ɵɵinject(exports.ɵ
|
|
11985
|
+
exports.SharedContactCard2Service.ɵprov = i0.ɵɵdefineInjectable({ factory: function SharedContactCard2Service_Factory() { return new exports.SharedContactCard2Service(i0.ɵɵinject(i0.NgZone), i0.ɵɵinject(KeyService), i0.ɵɵinject(KeyGraphService), i0.ɵɵinject(EncryptionService), i0.ɵɵinject(exports.ɵh)); }, token: exports.SharedContactCard2Service, providedIn: "root" });
|
|
12006
11986
|
exports.SharedContactCard2Service.decorators = [
|
|
12007
11987
|
{ type: i0.Injectable, args: [{
|
|
12008
11988
|
providedIn: 'root',
|
|
@@ -12013,7 +11993,7 @@
|
|
|
12013
11993
|
{ type: KeyService },
|
|
12014
11994
|
{ type: KeyGraphService },
|
|
12015
11995
|
{ type: EncryptionService },
|
|
12016
|
-
{ type: exports.ɵ
|
|
11996
|
+
{ type: exports.ɵh }
|
|
12017
11997
|
]; };
|
|
12018
11998
|
exports.SharedContactCard2Service = __decorate([
|
|
12019
11999
|
RunOutsideAngular({
|
|
@@ -12424,6 +12404,7 @@
|
|
|
12424
12404
|
*
|
|
12425
12405
|
*/
|
|
12426
12406
|
Item2Service.prototype.ensureTempDirectory = function () {
|
|
12407
|
+
var _a;
|
|
12427
12408
|
return __awaiter(this, void 0, void 0, function () {
|
|
12428
12409
|
var existing, createDirectory, updateLock, _c, createDirectoryResult, _, _d, id, keyId, _e, id, keyId;
|
|
12429
12410
|
return __generator(this, function (_f) {
|
|
@@ -12447,7 +12428,7 @@
|
|
|
12447
12428
|
case 2:
|
|
12448
12429
|
createDirectory = _f.sent();
|
|
12449
12430
|
updateLock = this.lockService.updateLockMutation({
|
|
12450
|
-
version: existing.lock.version,
|
|
12431
|
+
version: (_a = existing.lock) === null || _a === void 0 ? void 0 : _a.version,
|
|
12451
12432
|
});
|
|
12452
12433
|
return [4 /*yield*/, this.lrGraphQL.lrMutate(LrMergedMutation.create([createDirectory, updateLock]))];
|
|
12453
12434
|
case 3:
|
|
@@ -12829,16 +12810,22 @@
|
|
|
12829
12810
|
var CompleteTpMkReshareMutation = gqlTyped(templateObject_9$5 || (templateObject_9$5 = __makeTemplateObject(["\nmutation CompleteTpMkReshareMutation($input: CompleteTpMkReshareInput!) {\n completeTpMkReshare(input: $input) {\n id\n }\n}"], ["\nmutation CompleteTpMkReshareMutation($input: CompleteTpMkReshareInput!) {\n completeTpMkReshare(input: $input) {\n id\n }\n}"])));
|
|
12830
12811
|
var templateObject_1$n, templateObject_2$j, templateObject_3$h, templateObject_4$g, templateObject_5$d, templateObject_6$b, templateObject_7$9, templateObject_8$8, templateObject_9$5;
|
|
12831
12812
|
|
|
12832
|
-
exports.TrustedParty2Service = /** @class */ (function () {
|
|
12833
|
-
|
|
12834
|
-
|
|
12835
|
-
|
|
12836
|
-
|
|
12837
|
-
|
|
12838
|
-
|
|
12839
|
-
|
|
12840
|
-
|
|
12813
|
+
exports.TrustedParty2Service = /** @class */ (function (_super) {
|
|
12814
|
+
__extends(TrustedParty2Service, _super);
|
|
12815
|
+
function TrustedParty2Service(ngZone, injector, keyGraph, item2Service, keyService, keyFactory, encryptionService) {
|
|
12816
|
+
var _this = _super.call(this, injector) || this;
|
|
12817
|
+
_this.ngZone = ngZone;
|
|
12818
|
+
_this.injector = injector;
|
|
12819
|
+
_this.keyGraph = keyGraph;
|
|
12820
|
+
_this.item2Service = item2Service;
|
|
12821
|
+
_this.keyService = keyService;
|
|
12822
|
+
_this.keyFactory = keyFactory;
|
|
12823
|
+
_this.encryptionService = encryptionService;
|
|
12824
|
+
return _this;
|
|
12841
12825
|
}
|
|
12826
|
+
TrustedParty2Service.prototype.deleteTpExec = function (tpId) {
|
|
12827
|
+
return this.mutate(this.deleteTpMutation(tpId));
|
|
12828
|
+
};
|
|
12842
12829
|
// TODO: deprecate this
|
|
12843
12830
|
TrustedParty2Service.prototype.deleteTp = function (tpId) {
|
|
12844
12831
|
return this.deleteTpMutation(tpId);
|
|
@@ -13091,8 +13078,8 @@
|
|
|
13091
13078
|
});
|
|
13092
13079
|
};
|
|
13093
13080
|
return TrustedParty2Service;
|
|
13094
|
-
}());
|
|
13095
|
-
exports.TrustedParty2Service.ɵprov = i0.ɵɵdefineInjectable({ factory: function TrustedParty2Service_Factory() { return new exports.TrustedParty2Service(i0.ɵɵinject(i0.NgZone), i0.ɵɵinject(
|
|
13081
|
+
}(LrService));
|
|
13082
|
+
exports.TrustedParty2Service.ɵprov = i0.ɵɵdefineInjectable({ factory: function TrustedParty2Service_Factory() { return new exports.TrustedParty2Service(i0.ɵɵinject(i0.NgZone), i0.ɵɵinject(i0.INJECTOR), i0.ɵɵinject(KeyGraphService), i0.ɵɵinject(exports.Item2Service), i0.ɵɵinject(KeyService), i0.ɵɵinject(KeyFactoryService), i0.ɵɵinject(EncryptionService)); }, token: exports.TrustedParty2Service, providedIn: "root" });
|
|
13096
13083
|
exports.TrustedParty2Service.decorators = [
|
|
13097
13084
|
{ type: i0.Injectable, args: [{
|
|
13098
13085
|
providedIn: 'root',
|
|
@@ -13100,8 +13087,8 @@
|
|
|
13100
13087
|
];
|
|
13101
13088
|
exports.TrustedParty2Service.ctorParameters = function () { return [
|
|
13102
13089
|
{ type: i0.NgZone },
|
|
13090
|
+
{ type: i0.Injector },
|
|
13103
13091
|
{ type: KeyGraphService },
|
|
13104
|
-
{ type: exports.ɵb },
|
|
13105
13092
|
{ type: exports.Item2Service },
|
|
13106
13093
|
{ type: KeyService },
|
|
13107
13094
|
{ type: KeyFactoryService },
|
|
@@ -13205,7 +13192,7 @@
|
|
|
13205
13192
|
};
|
|
13206
13193
|
return TpPasswordResetService;
|
|
13207
13194
|
}(LrService));
|
|
13208
|
-
exports.TpPasswordResetService.ɵprov = i0.ɵɵdefineInjectable({ factory: function TpPasswordResetService_Factory() { return new exports.TpPasswordResetService(i0.ɵɵinject(i0.NgZone), i0.ɵɵinject(i0.INJECTOR), i0.ɵɵinject(exports.ɵ
|
|
13195
|
+
exports.TpPasswordResetService.ɵprov = i0.ɵɵdefineInjectable({ factory: function TpPasswordResetService_Factory() { return new exports.TpPasswordResetService(i0.ɵɵinject(i0.NgZone), i0.ɵɵinject(i0.INJECTOR), i0.ɵɵinject(exports.ɵl)); }, token: exports.TpPasswordResetService, providedIn: "root" });
|
|
13209
13196
|
exports.TpPasswordResetService.decorators = [
|
|
13210
13197
|
{ type: i0.Injectable, args: [{
|
|
13211
13198
|
providedIn: 'root',
|
|
@@ -13214,7 +13201,7 @@
|
|
|
13214
13201
|
exports.TpPasswordResetService.ctorParameters = function () { return [
|
|
13215
13202
|
{ type: i0.NgZone },
|
|
13216
13203
|
{ type: i0.Injector },
|
|
13217
|
-
{ type: exports.ɵ
|
|
13204
|
+
{ type: exports.ɵl }
|
|
13218
13205
|
]; };
|
|
13219
13206
|
exports.TpPasswordResetService = __decorate([
|
|
13220
13207
|
RunOutsideAngular({
|
|
@@ -13393,7 +13380,7 @@
|
|
|
13393
13380
|
};
|
|
13394
13381
|
TpPasswordResetRequestService.prototype.activeRequestOrRaise = function (sharedReset) {
|
|
13395
13382
|
var state = sharedReset.sharedRequest.claim.state;
|
|
13396
|
-
if (state !== TpAssemblyState.CLAIMED) {
|
|
13383
|
+
if (state !== exports.TpAssemblyState.CLAIMED) {
|
|
13397
13384
|
throw new LrBadStateException("Claim is already in " + state + " state.");
|
|
13398
13385
|
}
|
|
13399
13386
|
};
|
|
@@ -13410,7 +13397,7 @@
|
|
|
13410
13397
|
sharedReset = _a.sent();
|
|
13411
13398
|
this.activeRequestOrRaise(sharedReset);
|
|
13412
13399
|
return [2 /*return*/, LrMergedMutation.create(sharedReset.sharedRequest.claim.asClaimApprovers.edges
|
|
13413
|
-
.filter(function (edge) { return edge.node.state === TpClaimApproverState.CLAIMED; })
|
|
13400
|
+
.filter(function (edge) { return edge.node.state === exports.TpClaimApproverState.CLAIMED; })
|
|
13414
13401
|
.map(function (edge) { return new LrMutation({
|
|
13415
13402
|
mutation: RejectTpPasswordResetRequestMutation,
|
|
13416
13403
|
variables: { input: { claimApproverId: edge.node.id } },
|
|
@@ -13446,7 +13433,7 @@
|
|
|
13446
13433
|
case 2:
|
|
13447
13434
|
pbk = _c.sent();
|
|
13448
13435
|
console.log(pbk.toJSON());
|
|
13449
|
-
claimApprovers = sharedReset.sharedRequest.claim.asClaimApprovers.edges.filter(function (edge) { return edge.node.state === TpClaimApproverState.CLAIMED; });
|
|
13436
|
+
claimApprovers = sharedReset.sharedRequest.claim.asClaimApprovers.edges.filter(function (edge) { return edge.node.state === exports.TpClaimApproverState.CLAIMED; });
|
|
13450
13437
|
_b = (_a = LrMergedMutation).create;
|
|
13451
13438
|
return [4 /*yield*/, Promise.all(claimApprovers.map(function (approverEdge) { return __awaiter(_this, void 0, void 0, function () {
|
|
13452
13439
|
var ca, input, _a;
|
|
@@ -13667,7 +13654,7 @@
|
|
|
13667
13654
|
|
|
13668
13655
|
var SCENARIO_SLIP39_PASSPHRASE = 'lifeready';
|
|
13669
13656
|
|
|
13670
|
-
exports.ɵ
|
|
13657
|
+
exports.ɵq = /** @class */ (function (_super) {
|
|
13671
13658
|
__extends(ScenarioAssemblyController, _super);
|
|
13672
13659
|
function ScenarioAssemblyController(ngZone, injector) {
|
|
13673
13660
|
var _this = _super.call(this, injector) || this;
|
|
@@ -13681,21 +13668,21 @@
|
|
|
13681
13668
|
};
|
|
13682
13669
|
return ScenarioAssemblyController;
|
|
13683
13670
|
}(TpAssemblyController));
|
|
13684
|
-
exports.ɵ
|
|
13685
|
-
exports.ɵ
|
|
13671
|
+
exports.ɵq.ɵprov = i0.ɵɵdefineInjectable({ factory: function ScenarioAssemblyController_Factory() { return new exports.ɵq(i0.ɵɵinject(i0.NgZone), i0.ɵɵinject(i0.INJECTOR)); }, token: exports.ɵq, providedIn: "root" });
|
|
13672
|
+
exports.ɵq.decorators = [
|
|
13686
13673
|
{ type: i0.Injectable, args: [{
|
|
13687
13674
|
providedIn: 'root',
|
|
13688
13675
|
},] }
|
|
13689
13676
|
];
|
|
13690
|
-
exports.ɵ
|
|
13677
|
+
exports.ɵq.ctorParameters = function () { return [
|
|
13691
13678
|
{ type: i0.NgZone },
|
|
13692
13679
|
{ type: i0.Injector }
|
|
13693
13680
|
]; };
|
|
13694
|
-
exports.ɵ
|
|
13681
|
+
exports.ɵq = __decorate([
|
|
13695
13682
|
RunOutsideAngular({
|
|
13696
13683
|
ngZoneName: 'ngZone',
|
|
13697
13684
|
})
|
|
13698
|
-
], exports.ɵ
|
|
13685
|
+
], exports.ɵq);
|
|
13699
13686
|
|
|
13700
13687
|
var ScenarioQuery = gqlTyped(templateObject_1$q || (templateObject_1$q = __makeTemplateObject(["\nquery ScenarioQuery(\n $scenarioId: LrRelayIdInput!\n) {\n scenario(id: $scenarioId) {\n id\n state\n assembly {\n quorum\n singleReject\n assemblyKey {\n id\n }\n subjectKey {\n id\n }\n subjectCipherData\n subAssemblies {\n edges {\n node {\n id\n subjectKey {\n id\n }\n subjectCipherData\n quorum\n singleReject\n approvers {\n edges {\n node {\n id\n tp {\n id\n }\n sharedKey {\n id\n }\n }\n }\n }\n }\n }\n }\n }\n claimants {\n edges {\n node {\n tp {\n id\n }\n sharedKey {\n id\n }\n }\n }\n }\n receivers {\n edges {\n node {\n tp {\n id\n }\n sharedKey {\n id\n }\n sharedCipherData\n receiverDirectories {\n edges {\n node {\n id\n sharedCipherData\n sharedKey {\n id\n }\n accessRole\n itemKey {\n id\n }\n directory {\n id\n keyId\n }\n }\n }\n }\n receiverFiles {\n edges {\n node {\n id\n sharedCipherData\n sharedKey {\n id\n }\n accessRole\n itemKey {\n id\n }\n }\n }\n }\n }\n }\n }\n }\n}"], ["\nquery ScenarioQuery(\n $scenarioId: LrRelayIdInput!\n) {\n scenario(id: $scenarioId) {\n id\n state\n assembly {\n quorum\n singleReject\n assemblyKey {\n id\n }\n subjectKey {\n id\n }\n subjectCipherData\n subAssemblies {\n edges {\n node {\n id\n subjectKey {\n id\n }\n subjectCipherData\n quorum\n singleReject\n approvers {\n edges {\n node {\n id\n tp {\n id\n }\n sharedKey {\n id\n }\n }\n }\n }\n }\n }\n }\n }\n claimants {\n edges {\n node {\n tp {\n id\n }\n sharedKey {\n id\n }\n }\n }\n }\n receivers {\n edges {\n node {\n tp {\n id\n }\n sharedKey {\n id\n }\n sharedCipherData\n receiverDirectories {\n edges {\n node {\n id\n sharedCipherData\n sharedKey {\n id\n }\n accessRole\n itemKey {\n id\n }\n directory {\n id\n keyId\n }\n }\n }\n }\n receiverFiles {\n edges {\n node {\n id\n sharedCipherData\n sharedKey {\n id\n }\n accessRole\n itemKey {\n id\n }\n }\n }\n }\n }\n }\n }\n }\n}"])));
|
|
13701
13688
|
var SharedScenarioQuery = gqlTyped(templateObject_2$m || (templateObject_2$m = __makeTemplateObject(["\nquery SharedScenarioQuery($scenarioId: LrRelayIdInput!) {\n sharedScenario(id: $scenarioId) {\n id\n state\n tp {\n id\n }\n asClaimant {\n sharedKey {\n id\n }\n sharedCipherData\n }\n asReceiver {\n sharedKey {\n id\n }\n sharedCipherData\n pbk {\n id\n }\n receiverDirectories {\n edges {\n node {\n id\n wrappedItemKey\n }\n }\n }\n }\n assembly {\n asApprovers {\n edges {\n node {\n id\n sharedKey {\n id\n }\n sharedCipherData\n }\n }\n }\n }\n sharedClaim {\n\t \t\tid\n isClaimant\n claim {\n state\n asClaimApprovers {\n edges {\n node {\n id\n state\n sharedKey {\n id\n }\n sharedCipherApprovalData\n sharedCipherPartialAssemblyKey\n receiverApprovals {\n edges {\n node {\n id\n pxk {\n id\n }\n }\n }\n }\n }\n }\n }\n }\n asClaimReceiver {\n received\n approvals {\n edges {\n node {\n receiverCipher\n receiverCipherPartialAssemblyKey\n pxk {\n id\n }\n }\n }\n }\n }\n }\n }\n}\n"], ["\nquery SharedScenarioQuery($scenarioId: LrRelayIdInput!) {\n sharedScenario(id: $scenarioId) {\n id\n state\n tp {\n id\n }\n asClaimant {\n sharedKey {\n id\n }\n sharedCipherData\n }\n asReceiver {\n sharedKey {\n id\n }\n sharedCipherData\n pbk {\n id\n }\n receiverDirectories {\n edges {\n node {\n id\n wrappedItemKey\n }\n }\n }\n }\n assembly {\n asApprovers {\n edges {\n node {\n id\n sharedKey {\n id\n }\n sharedCipherData\n }\n }\n }\n }\n sharedClaim {\n\t \t\tid\n isClaimant\n claim {\n state\n asClaimApprovers {\n edges {\n node {\n id\n state\n sharedKey {\n id\n }\n sharedCipherApprovalData\n sharedCipherPartialAssemblyKey\n receiverApprovals {\n edges {\n node {\n id\n pxk {\n id\n }\n }\n }\n }\n }\n }\n }\n }\n asClaimReceiver {\n received\n approvals {\n edges {\n node {\n receiverCipher\n receiverCipherPartialAssemblyKey\n pxk {\n id\n }\n }\n }\n }\n }\n }\n }\n}\n"])));
|
|
@@ -14338,7 +14325,7 @@
|
|
|
14338
14325
|
case 0: return [4 /*yield*/, this.getSharedScenario(scenarioId, sharedClaimId)];
|
|
14339
14326
|
case 1:
|
|
14340
14327
|
sharedScenario = (_a.sent()).sharedScenario;
|
|
14341
|
-
if (sharedScenario.state !== ScenarioState.APPROVED) {
|
|
14328
|
+
if (sharedScenario.state !== exports.ScenarioState.APPROVED) {
|
|
14342
14329
|
throwClaimNotApproved();
|
|
14343
14330
|
}
|
|
14344
14331
|
approvals = mapEdges(sharedScenario.sharedClaim.asClaimReceiver.approvals);
|
|
@@ -14405,7 +14392,7 @@
|
|
|
14405
14392
|
var _this = this;
|
|
14406
14393
|
return __generator(this, function (_a) {
|
|
14407
14394
|
switch (_a.label) {
|
|
14408
|
-
case 0: return [4 /*yield*/, this.asClaimApprovers(sharedScenarioId, claimId, TpClaimApproverState.CLAIMED)];
|
|
14395
|
+
case 0: return [4 /*yield*/, this.asClaimApprovers(sharedScenarioId, claimId, exports.TpClaimApproverState.CLAIMED)];
|
|
14409
14396
|
case 1:
|
|
14410
14397
|
asClaimApprovers = _a.sent();
|
|
14411
14398
|
return [2 /*return*/, asClaimApprovers.map(function (asClaimApprover) { return __awaiter(_this, void 0, void 0, function () {
|
|
@@ -14474,7 +14461,7 @@
|
|
|
14474
14461
|
var _this = this;
|
|
14475
14462
|
return __generator(this, function (_a) {
|
|
14476
14463
|
switch (_a.label) {
|
|
14477
|
-
case 0: return [4 /*yield*/, this.asClaimApprovers(sharedScenarioId, claimId, TpClaimApproverState.CLAIMED)];
|
|
14464
|
+
case 0: return [4 /*yield*/, this.asClaimApprovers(sharedScenarioId, claimId, exports.TpClaimApproverState.CLAIMED)];
|
|
14478
14465
|
case 1:
|
|
14479
14466
|
asClaimApprovers = _a.sent();
|
|
14480
14467
|
return [2 /*return*/, asClaimApprovers.map(function (asClaimApprover) { return __awaiter(_this, void 0, void 0, function () {
|
|
@@ -14494,7 +14481,7 @@
|
|
|
14494
14481
|
return ScenarioService;
|
|
14495
14482
|
}(LrService));
|
|
14496
14483
|
exports.ScenarioService.SLIP39_PASSPHRASE = 'lifeready';
|
|
14497
|
-
exports.ScenarioService.ɵprov = i0.ɵɵdefineInjectable({ factory: function ScenarioService_Factory() { return new exports.ScenarioService(i0.ɵɵinject(i0.NgZone), i0.ɵɵinject(i0.INJECTOR), i0.ɵɵinject(KeyGraphService), i0.ɵɵinject(exports.Item2Service), i0.ɵɵinject(exports.ɵ
|
|
14484
|
+
exports.ScenarioService.ɵprov = i0.ɵɵdefineInjectable({ factory: function ScenarioService_Factory() { return new exports.ScenarioService(i0.ɵɵinject(i0.NgZone), i0.ɵɵinject(i0.INJECTOR), i0.ɵɵinject(KeyGraphService), i0.ɵɵinject(exports.Item2Service), i0.ɵɵinject(exports.ɵq), i0.ɵɵinject(EncryptionService)); }, token: exports.ScenarioService, providedIn: "root" });
|
|
14498
14485
|
exports.ScenarioService.decorators = [
|
|
14499
14486
|
{ type: i0.Injectable, args: [{
|
|
14500
14487
|
providedIn: 'root',
|
|
@@ -14505,7 +14492,7 @@
|
|
|
14505
14492
|
{ type: i0.Injector },
|
|
14506
14493
|
{ type: KeyGraphService },
|
|
14507
14494
|
{ type: exports.Item2Service },
|
|
14508
|
-
{ type: exports.ɵ
|
|
14495
|
+
{ type: exports.ɵq },
|
|
14509
14496
|
{ type: EncryptionService }
|
|
14510
14497
|
]; };
|
|
14511
14498
|
exports.ScenarioService = __decorate([
|
|
@@ -14527,7 +14514,6 @@
|
|
|
14527
14514
|
exports.ApiContactCard = ApiContactCard;
|
|
14528
14515
|
exports.ApiCurrentUser = ApiCurrentUser;
|
|
14529
14516
|
exports.ArchiveDirectoryMutation = ArchiveDirectoryMutation;
|
|
14530
|
-
exports.Assembly = Assembly;
|
|
14531
14517
|
exports.CancelTrustedPartyInvitationMutation = CancelTrustedPartyInvitationMutation;
|
|
14532
14518
|
exports.CancelUserDeleteMutation = CancelUserDeleteMutation;
|
|
14533
14519
|
exports.Category = Category;
|
|
@@ -14553,7 +14539,6 @@
|
|
|
14553
14539
|
exports.CurrentUserKey = CurrentUserKey;
|
|
14554
14540
|
exports.CurrentUserQuery = CurrentUserQuery;
|
|
14555
14541
|
exports.CurrentUserSharedKeyQuery = CurrentUserSharedKeyQuery;
|
|
14556
|
-
exports.DECRYPT_OPTIONS_DEFAULT = DECRYPT_OPTIONS_DEFAULT;
|
|
14557
14542
|
exports.DEFAULT_BREADCRUMB_DEPTH = DEFAULT_BREADCRUMB_DEPTH;
|
|
14558
14543
|
exports.DEFAULT_DESCENDANTS_DEPTH = DEFAULT_DESCENDANTS_DEPTH;
|
|
14559
14544
|
exports.DeclineTrustedPartyInvitationMutation = DeclineTrustedPartyInvitationMutation;
|
|
@@ -14566,7 +14551,6 @@
|
|
|
14566
14551
|
exports.DeleteRecordMutation = DeleteRecordMutation;
|
|
14567
14552
|
exports.DeleteTrustedPartyMutation = DeleteTrustedPartyMutation;
|
|
14568
14553
|
exports.DirectoryQuery = DirectoryQuery;
|
|
14569
|
-
exports.EncryptionService = EncryptionService;
|
|
14570
14554
|
exports.Features = Features;
|
|
14571
14555
|
exports.FetchKeyGraphField = FetchKeyGraphField;
|
|
14572
14556
|
exports.FileQuery = FileQuery;
|
|
@@ -14591,12 +14575,8 @@
|
|
|
14591
14575
|
exports.KeyExchangeService = KeyExchangeService;
|
|
14592
14576
|
exports.KeyExchangeTokenQuery = KeyExchangeTokenQuery;
|
|
14593
14577
|
exports.KeyExchangesQuery = KeyExchangesQuery;
|
|
14594
|
-
exports.KeyFactoryService = KeyFactoryService;
|
|
14595
14578
|
exports.KeyGraphField = KeyGraphField;
|
|
14596
14579
|
exports.KeyGraphFragment = KeyGraphFragment;
|
|
14597
|
-
exports.KeyGraphService = KeyGraphService;
|
|
14598
|
-
exports.KeyMetaService = KeyMetaService;
|
|
14599
|
-
exports.KeyService = KeyService;
|
|
14600
14580
|
exports.LR_CONFIG = LR_CONFIG;
|
|
14601
14581
|
exports.LbopQuery = LbopQuery;
|
|
14602
14582
|
exports.LbopService = LbopService;
|
|
@@ -14619,7 +14599,7 @@
|
|
|
14619
14599
|
exports.LrException = LrException;
|
|
14620
14600
|
exports.LrExpiredCodeException = LrExpiredCodeException;
|
|
14621
14601
|
exports.LrExpiredException = LrExpiredException;
|
|
14622
|
-
exports.LrGraphQLService = exports.ɵ
|
|
14602
|
+
exports.LrGraphQLService = exports.ɵh;
|
|
14623
14603
|
exports.LrLockedException = LrLockedException;
|
|
14624
14604
|
exports.LrMergedMutation = LrMergedMutation;
|
|
14625
14605
|
exports.LrMutation = LrMutation;
|
|
@@ -14650,7 +14630,6 @@
|
|
|
14650
14630
|
exports.PlanService = PlanService;
|
|
14651
14631
|
exports.ProfileDetailsService = ProfileDetailsService;
|
|
14652
14632
|
exports.ProfileService = ProfileService;
|
|
14653
|
-
exports.Quorum = Quorum;
|
|
14654
14633
|
exports.RecordAttachment = RecordAttachment;
|
|
14655
14634
|
exports.RecordAttachmentFilter = RecordAttachmentFilter;
|
|
14656
14635
|
exports.RecordAttachmentService = RecordAttachmentService;
|
|
@@ -14668,17 +14647,13 @@
|
|
|
14668
14647
|
exports.RequestUserDeleteMutation = RequestUserDeleteMutation;
|
|
14669
14648
|
exports.RespondOtkMutation = RespondOtkMutation;
|
|
14670
14649
|
exports.RevertFileQuery = RevertFileQuery;
|
|
14671
|
-
exports.SecretShare = SecretShare;
|
|
14672
14650
|
exports.SendMessageMutation = SendMessageMutation;
|
|
14673
14651
|
exports.ShareCategoryMutation = ShareCategoryMutation;
|
|
14674
14652
|
exports.SharedAccess = SharedAccess;
|
|
14675
14653
|
exports.SharedTrustedPartyDetails = SharedTrustedPartyDetails;
|
|
14676
14654
|
exports.SharedVaultFeature = SharedVaultFeature;
|
|
14677
|
-
exports.Slip39Service = Slip39Service;
|
|
14678
14655
|
exports.StripeBillingPortalSession = StripeBillingPortalSession;
|
|
14679
14656
|
exports.StripeCheckoutSession = StripeCheckoutSession;
|
|
14680
|
-
exports.SubAssembly = SubAssembly;
|
|
14681
|
-
exports.SubQuorum = SubQuorum;
|
|
14682
14657
|
exports.Subscription = Subscription;
|
|
14683
14658
|
exports.TPFeatures = TPFeatures;
|
|
14684
14659
|
exports.TrustedParties = TrustedParties;
|
|
@@ -14699,21 +14674,15 @@
|
|
|
14699
14674
|
exports.UpdateRecordMutation = UpdateRecordMutation;
|
|
14700
14675
|
exports.UpdatedCategory = UpdatedCategory;
|
|
14701
14676
|
exports.UpdatedRecord = UpdatedRecord;
|
|
14702
|
-
exports.UserKeys = UserKeys;
|
|
14703
14677
|
exports.UserPlan = UserPlan;
|
|
14704
14678
|
exports.UserQuery = UserQuery;
|
|
14705
14679
|
exports.UserService = UserService;
|
|
14706
14680
|
exports.UserSharedKeyFields = UserSharedKeyFields;
|
|
14707
|
-
exports.VERIFY_OPTIONS_DEFAULT = VERIFY_OPTIONS_DEFAULT;
|
|
14708
14681
|
exports.Vault = Vault;
|
|
14709
14682
|
exports.VaultCategory = VaultCategory;
|
|
14710
14683
|
exports.VaultFields = VaultFields;
|
|
14711
14684
|
exports.VaultRecord = VaultRecord;
|
|
14712
14685
|
exports.VaultRecordType = VaultRecordType;
|
|
14713
|
-
exports.WebCryptoService = WebCryptoService;
|
|
14714
|
-
exports.WrappedContent = WrappedContent;
|
|
14715
|
-
exports.WrappingKey = WrappingKey;
|
|
14716
|
-
exports.asJwk = asJwk;
|
|
14717
14686
|
exports.awsFetch = awsFetch;
|
|
14718
14687
|
exports.configureAmplifyAuth = configureAmplifyAuth;
|
|
14719
14688
|
exports.configureApollo = configureApollo;
|
|
@@ -14722,20 +14691,26 @@
|
|
|
14722
14691
|
exports.handleApolloError = handleApolloError;
|
|
14723
14692
|
exports.handleCognitoCallback = handleCognitoCallback;
|
|
14724
14693
|
exports.initialiseAuth = initialiseAuth;
|
|
14725
|
-
exports.
|
|
14694
|
+
exports.mapEdges = mapEdges;
|
|
14726
14695
|
exports.mapUserPlans = mapUserPlans;
|
|
14727
14696
|
exports.parentCategoriesField = parentCategoriesField;
|
|
14728
14697
|
exports.processConnection = processConnection;
|
|
14729
|
-
exports.sha256 = sha256;
|
|
14730
14698
|
exports.throwClaimIdMismatch = throwClaimIdMismatch;
|
|
14731
14699
|
exports.throwClaimNotApproved = throwClaimNotApproved;
|
|
14732
14700
|
exports.ɵ0 = ɵ0;
|
|
14733
|
-
exports.ɵa =
|
|
14734
|
-
exports.ɵ
|
|
14735
|
-
exports.ɵ
|
|
14736
|
-
exports.ɵ
|
|
14737
|
-
exports.ɵ
|
|
14738
|
-
exports.ɵ
|
|
14701
|
+
exports.ɵa = KeyFactoryService;
|
|
14702
|
+
exports.ɵb = WebCryptoService;
|
|
14703
|
+
exports.ɵc = KeyService;
|
|
14704
|
+
exports.ɵd = EncryptionService;
|
|
14705
|
+
exports.ɵe = TimeService;
|
|
14706
|
+
exports.ɵf = KeyGraphService;
|
|
14707
|
+
exports.ɵg = KeyMetaService;
|
|
14708
|
+
exports.ɵj = RunOutsideAngular;
|
|
14709
|
+
exports.ɵk = Slip39Service;
|
|
14710
|
+
exports.ɵm = TpAssemblyController;
|
|
14711
|
+
exports.ɵn = SharedContactCardFields;
|
|
14712
|
+
exports.ɵo = SharedContactCardService;
|
|
14713
|
+
exports.ɵp = LrService;
|
|
14739
14714
|
|
|
14740
14715
|
Object.defineProperty(exports, '__esModule', { value: true });
|
|
14741
14716
|
|