@lifeready/core 1.0.17 → 1.0.19
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/bundles/lifeready-core.umd.js +104 -131
- package/bundles/lifeready-core.umd.js.map +1 -1
- package/bundles/lifeready-core.umd.min.js +1 -1
- package/bundles/lifeready-core.umd.min.js.map +1 -1
- package/esm2015/lib/api/contact-card.service.js +1 -1
- package/esm2015/lib/api/contact-card2.service.js +1 -1
- package/esm2015/lib/api/key-exchange.types.js +1 -12
- package/esm2015/lib/api/key-exchange2.gql.js +1 -1
- package/esm2015/lib/api/key-exchange2.service.js +3 -2
- package/esm2015/lib/api/shared-contact-card.service.js +1 -1
- package/esm2015/lib/api/types/graphql.types.js +1 -1
- package/esm2015/lib/api/types/lr-graphql.types.js +10 -1
- package/esm2015/lib/auth/auth.types.js +1 -1
- package/esm2015/lib/cryptography/key-factory.service.js +1 -1
- package/esm2015/lib/cryptography/key-graph.service.js +1 -1
- package/esm2015/lib/items2/item2.service.js +3 -2
- package/esm2015/lib/scenario/scenario.service.js +1 -1
- package/esm2015/lib/scenario/scenario.types.js +1 -1
- package/esm2015/lib/trusted-parties/tp-password-reset.gql.js +1 -1
- package/esm2015/lib/users/profile.types.js +1 -1
- package/esm2015/lib/users/user.service.js +1 -1
- package/esm2015/lib/users/user.types.js +1 -5
- package/esm2015/lifeready-core.js +16 -9
- package/esm2015/public-api.js +2 -9
- package/fesm2015/lifeready-core.js +14 -19
- package/fesm2015/lifeready-core.js.map +1 -1
- package/lib/api/contact-card.service.d.ts +8 -7
- package/lib/api/contact-card2.service.d.ts +4 -3
- package/lib/api/key-exchange.types.d.ts +5 -13
- package/lib/api/key-exchange2.gql.d.ts +3 -3
- package/lib/api/key-exchange2.service.d.ts +3 -3
- package/lib/api/shared-contact-card.service.d.ts +4 -3
- package/lib/api/types/graphql.types.d.ts +1 -0
- package/lib/api/types/lr-graphql.types.d.ts +84 -33
- package/lib/auth/auth.types.d.ts +2 -3
- package/lib/cryptography/key-graph.service.d.ts +2 -1
- package/lib/scenario/scenario.types.d.ts +3 -3
- package/lib/trusted-parties/tp-password-reset.gql.d.ts +6 -6
- package/lib/users/profile.types.d.ts +2 -2
- package/lib/users/user.service.d.ts +3 -2
- package/lib/users/user.types.d.ts +0 -7
- package/lifeready-core.d.ts +15 -8
- package/lifeready-core.metadata.json +1 -1
- package/package.json +1 -1
- package/public-api.d.ts +1 -8
|
@@ -604,14 +604,16 @@
|
|
|
604
604
|
return Object.assign({ link: core.from([retryLink, promoteGqlErrors, authLink, httpLink]), cache: new core.InMemoryCache(), defaultOptions: defaultOptions }, config.apolloConfig);
|
|
605
605
|
};
|
|
606
606
|
|
|
607
|
+
var NodeType;
|
|
607
608
|
(function (NodeType) {
|
|
608
609
|
NodeType["Key"] = "key";
|
|
609
610
|
NodeType["PassKey"] = "passKey";
|
|
610
|
-
})(
|
|
611
|
+
})(NodeType || (NodeType = {}));
|
|
612
|
+
var EdgeType;
|
|
611
613
|
(function (EdgeType) {
|
|
612
614
|
EdgeType["KeyLink"] = "keyLink";
|
|
613
615
|
EdgeType["PassKeyLink"] = "passKeyLink";
|
|
614
|
-
})(
|
|
616
|
+
})(EdgeType || (EdgeType = {}));
|
|
615
617
|
|
|
616
618
|
// "why?" you ask: https://stackoverflow.com/questions/59735280/angular-8-moment-error-cannot-call-a-namespace-moment
|
|
617
619
|
var moment = moment_;
|
|
@@ -768,10 +770,11 @@
|
|
|
768
770
|
]; };
|
|
769
771
|
var templateObject_1;
|
|
770
772
|
|
|
773
|
+
var JoseSerialization;
|
|
771
774
|
(function (JoseSerialization) {
|
|
772
775
|
JoseSerialization["JSON"] = "JSON";
|
|
773
776
|
JoseSerialization["COMPACT"] = "COMPACT";
|
|
774
|
-
})(
|
|
777
|
+
})(JoseSerialization || (JoseSerialization = {}));
|
|
775
778
|
var VERIFY_OPTIONS_DEFAULT = {
|
|
776
779
|
payloadType: 'json',
|
|
777
780
|
returnOnlyPayload: true,
|
|
@@ -779,7 +782,7 @@
|
|
|
779
782
|
var DECRYPT_OPTIONS_DEFAULT = {
|
|
780
783
|
payloadType: 'json',
|
|
781
784
|
returnOnlyPayload: true,
|
|
782
|
-
serializations: [
|
|
785
|
+
serializations: [JoseSerialization.JSON],
|
|
783
786
|
};
|
|
784
787
|
function isSymmetricKey(key) {
|
|
785
788
|
// TODO: make sure this covers all cases.
|
|
@@ -819,12 +822,12 @@
|
|
|
819
822
|
key = key.jwk;
|
|
820
823
|
}
|
|
821
824
|
if (typeof jwe === 'string') {
|
|
822
|
-
if (options.serializations.includes(
|
|
825
|
+
if (options.serializations.includes(JoseSerialization.JSON)) {
|
|
823
826
|
try {
|
|
824
827
|
jwe = JSON.parse(jwe);
|
|
825
828
|
}
|
|
826
829
|
catch (error) {
|
|
827
|
-
if (options.serializations.includes(
|
|
830
|
+
if (options.serializations.includes(JoseSerialization.COMPACT)) {
|
|
828
831
|
console.log('Not a JSON-formatted JWE, it maybe compact serialisation format.');
|
|
829
832
|
}
|
|
830
833
|
else {
|
|
@@ -1771,10 +1774,10 @@
|
|
|
1771
1774
|
return node.data;
|
|
1772
1775
|
};
|
|
1773
1776
|
KeyGraphService.prototype.key = function (id) {
|
|
1774
|
-
return this.getNode(id,
|
|
1777
|
+
return this.getNode(id, NodeType.Key);
|
|
1775
1778
|
};
|
|
1776
1779
|
KeyGraphService.prototype.passKey = function (id) {
|
|
1777
|
-
return this.getNode(id,
|
|
1780
|
+
return this.getNode(id, NodeType.PassKey);
|
|
1778
1781
|
};
|
|
1779
1782
|
KeyGraphService.prototype.addKeys = function (src) {
|
|
1780
1783
|
var e_1, _a, e_2, _b, e_3, _c;
|
|
@@ -1790,7 +1793,7 @@
|
|
|
1790
1793
|
continue;
|
|
1791
1794
|
}
|
|
1792
1795
|
var node = {
|
|
1793
|
-
type:
|
|
1796
|
+
type: NodeType.Key,
|
|
1794
1797
|
data: ___default.cloneDeep(key),
|
|
1795
1798
|
};
|
|
1796
1799
|
this.graph.setNode(key.id, node);
|
|
@@ -1813,7 +1816,7 @@
|
|
|
1813
1816
|
continue;
|
|
1814
1817
|
}
|
|
1815
1818
|
var edge = {
|
|
1816
|
-
type:
|
|
1819
|
+
type: EdgeType.KeyLink,
|
|
1817
1820
|
data: ___default.cloneDeep(keyLink),
|
|
1818
1821
|
};
|
|
1819
1822
|
// Edge goes from wrapping key to wrapped key.
|
|
@@ -1837,7 +1840,7 @@
|
|
|
1837
1840
|
continue;
|
|
1838
1841
|
}
|
|
1839
1842
|
var edge = {
|
|
1840
|
-
type:
|
|
1843
|
+
type: EdgeType.PassKeyLink,
|
|
1841
1844
|
data: ___default.cloneDeep(passKeyLink),
|
|
1842
1845
|
};
|
|
1843
1846
|
// Edge goes from wrapping key to wrapped key.
|
|
@@ -4181,7 +4184,7 @@
|
|
|
4181
4184
|
})
|
|
4182
4185
|
], exports.CommonProcessorsService);
|
|
4183
4186
|
|
|
4184
|
-
exports.ɵ
|
|
4187
|
+
exports.ɵi = /** @class */ (function () {
|
|
4185
4188
|
function TpPasswordResetProcessorService(ngZone, keyGraph) {
|
|
4186
4189
|
this.ngZone = ngZone;
|
|
4187
4190
|
this.keyGraph = keyGraph;
|
|
@@ -4321,21 +4324,21 @@
|
|
|
4321
4324
|
};
|
|
4322
4325
|
return TpPasswordResetProcessorService;
|
|
4323
4326
|
}());
|
|
4324
|
-
exports.ɵ
|
|
4325
|
-
exports.ɵ
|
|
4327
|
+
exports.ɵi.ɵprov = i0.ɵɵdefineInjectable({ factory: function TpPasswordResetProcessorService_Factory() { return new exports.ɵi(i0.ɵɵinject(i0.NgZone), i0.ɵɵinject(KeyGraphService)); }, token: exports.ɵi, providedIn: "root" });
|
|
4328
|
+
exports.ɵi.decorators = [
|
|
4326
4329
|
{ type: i0.Injectable, args: [{
|
|
4327
4330
|
providedIn: 'root',
|
|
4328
4331
|
},] }
|
|
4329
4332
|
];
|
|
4330
|
-
exports.ɵ
|
|
4333
|
+
exports.ɵi.ctorParameters = function () { return [
|
|
4331
4334
|
{ type: i0.NgZone },
|
|
4332
4335
|
{ type: KeyGraphService }
|
|
4333
4336
|
]; };
|
|
4334
|
-
exports.ɵ
|
|
4337
|
+
exports.ɵi = __decorate([
|
|
4335
4338
|
RunOutsideAngular({
|
|
4336
4339
|
ngZoneName: 'ngZone',
|
|
4337
4340
|
})
|
|
4338
|
-
], exports.ɵ
|
|
4341
|
+
], exports.ɵi);
|
|
4339
4342
|
|
|
4340
4343
|
function extendPath(context, key) {
|
|
4341
4344
|
return Object.assign(Object.assign({}, context), { path: __spread(context.path, [key]) });
|
|
@@ -4624,7 +4627,7 @@
|
|
|
4624
4627
|
};
|
|
4625
4628
|
return QueryProcessorService;
|
|
4626
4629
|
}());
|
|
4627
|
-
exports.QueryProcessorService.ɵprov = i0.ɵɵdefineInjectable({ factory: function QueryProcessorService_Factory() { return new exports.QueryProcessorService(i0.ɵɵinject(i0.NgZone), i0.ɵɵinject(KeyService), i0.ɵɵinject(exports.CommonProcessorsService), i0.ɵɵinject(exports.ɵ
|
|
4630
|
+
exports.QueryProcessorService.ɵprov = i0.ɵɵdefineInjectable({ factory: function QueryProcessorService_Factory() { return new exports.QueryProcessorService(i0.ɵɵinject(i0.NgZone), i0.ɵɵinject(KeyService), i0.ɵɵinject(exports.CommonProcessorsService), i0.ɵɵinject(exports.ɵi)); }, token: exports.QueryProcessorService, providedIn: "root" });
|
|
4628
4631
|
exports.QueryProcessorService.decorators = [
|
|
4629
4632
|
{ type: i0.Injectable, args: [{
|
|
4630
4633
|
providedIn: 'root',
|
|
@@ -4634,7 +4637,7 @@
|
|
|
4634
4637
|
{ type: i0.NgZone },
|
|
4635
4638
|
{ type: KeyService },
|
|
4636
4639
|
{ type: exports.CommonProcessorsService },
|
|
4637
|
-
{ type: exports.ɵ
|
|
4640
|
+
{ type: exports.ɵi }
|
|
4638
4641
|
]; };
|
|
4639
4642
|
exports.QueryProcessorService = __decorate([
|
|
4640
4643
|
RunOutsideAngular({
|
|
@@ -5000,7 +5003,7 @@
|
|
|
5000
5003
|
// --------------------------------------------------------------------------
|
|
5001
5004
|
var keyGraphFieldAstSelection = getQuery(gql(templateObject_1$9 || (templateObject_1$9 = __makeTemplateObject(["\nquery {\n ", "\n}\n"], ["\nquery {\n ", "\n}\n"])), KeyGraphField)).selectionSet.selections[0];
|
|
5002
5005
|
var fetchKeyGraphFieldAstSelection = getQuery(gql(templateObject_2$7 || (templateObject_2$7 = __makeTemplateObject(["\nquery {\n ", "\n}\n"], ["\nquery {\n ", "\n}\n"])), FetchKeyGraphField)).selectionSet.selections[0];
|
|
5003
|
-
exports.ɵ
|
|
5006
|
+
exports.ɵh = /** @class */ (function () {
|
|
5004
5007
|
function LrGraphQLService(ngZone, apollo, keyGraph, queryProcessor) {
|
|
5005
5008
|
this.ngZone = ngZone;
|
|
5006
5009
|
this.apollo = apollo;
|
|
@@ -5138,28 +5141,28 @@
|
|
|
5138
5141
|
};
|
|
5139
5142
|
return LrGraphQLService;
|
|
5140
5143
|
}());
|
|
5141
|
-
exports.ɵ
|
|
5142
|
-
exports.ɵ
|
|
5144
|
+
exports.ɵh.ɵprov = i0.ɵɵdefineInjectable({ factory: function LrGraphQLService_Factory() { return new exports.ɵh(i0.ɵɵinject(i0.NgZone), i0.ɵɵinject(i1.Apollo), i0.ɵɵinject(KeyGraphService), i0.ɵɵinject(exports.QueryProcessorService)); }, token: exports.ɵh, providedIn: "root" });
|
|
5145
|
+
exports.ɵh.decorators = [
|
|
5143
5146
|
{ type: i0.Injectable, args: [{
|
|
5144
5147
|
providedIn: 'root',
|
|
5145
5148
|
},] }
|
|
5146
5149
|
];
|
|
5147
|
-
exports.ɵ
|
|
5150
|
+
exports.ɵh.ctorParameters = function () { return [
|
|
5148
5151
|
{ type: i0.NgZone },
|
|
5149
5152
|
{ type: i1.Apollo },
|
|
5150
5153
|
{ type: KeyGraphService },
|
|
5151
5154
|
{ type: exports.QueryProcessorService }
|
|
5152
5155
|
]; };
|
|
5153
|
-
exports.ɵ
|
|
5156
|
+
exports.ɵh = __decorate([
|
|
5154
5157
|
RunOutsideAngular({
|
|
5155
5158
|
ngZoneName: 'ngZone',
|
|
5156
5159
|
})
|
|
5157
|
-
], exports.ɵ
|
|
5160
|
+
], exports.ɵh);
|
|
5158
5161
|
var templateObject_1$9, templateObject_2$7;
|
|
5159
5162
|
|
|
5160
5163
|
var LrService = /** @class */ (function () {
|
|
5161
5164
|
function LrService(injector) {
|
|
5162
|
-
this.lrGraphQL = injector.get(exports.ɵ
|
|
5165
|
+
this.lrGraphQL = injector.get(exports.ɵh);
|
|
5163
5166
|
}
|
|
5164
5167
|
LrService.prototype.mutate = function (lrMutation, options) {
|
|
5165
5168
|
return __awaiter(this, void 0, void 0, function () {
|
|
@@ -5188,46 +5191,46 @@
|
|
|
5188
5191
|
function mapEdges(connection) {
|
|
5189
5192
|
return connection.edges.map(function (edge) { return edge.node; });
|
|
5190
5193
|
}
|
|
5191
|
-
|
|
5194
|
+
(function (UserDeleteState) {
|
|
5195
|
+
UserDeleteState["REQUESTED"] = "REQUESTED";
|
|
5196
|
+
})(exports.UserDeleteState || (exports.UserDeleteState = {}));
|
|
5197
|
+
(function (PlanState) {
|
|
5198
|
+
PlanState["ENABLED"] = "ENABLED";
|
|
5199
|
+
PlanState["DISABLED"] = "DISABLED";
|
|
5200
|
+
})(exports.PlanState || (exports.PlanState = {}));
|
|
5192
5201
|
(function (AccessRoleChoice) {
|
|
5193
5202
|
AccessRoleChoice["READER"] = "READER";
|
|
5194
5203
|
AccessRoleChoice["WRITER"] = "WRITER";
|
|
5195
5204
|
AccessRoleChoice["ADMIN"] = "ADMIN";
|
|
5196
5205
|
AccessRoleChoice["DENY"] = "DENY";
|
|
5197
5206
|
AccessRoleChoice["OWNER"] = "OWNER";
|
|
5198
|
-
})(AccessRoleChoice || (AccessRoleChoice = {}));
|
|
5199
|
-
var AccessRoleMethod;
|
|
5207
|
+
})(exports.AccessRoleChoice || (exports.AccessRoleChoice = {}));
|
|
5200
5208
|
(function (AccessRoleMethod) {
|
|
5201
5209
|
AccessRoleMethod["inherited"] = "inherited";
|
|
5202
5210
|
AccessRoleMethod["direct"] = "direct";
|
|
5203
|
-
})(AccessRoleMethod || (AccessRoleMethod = {}));
|
|
5204
|
-
var FileVersionOperation;
|
|
5211
|
+
})(exports.AccessRoleMethod || (exports.AccessRoleMethod = {}));
|
|
5205
5212
|
(function (FileVersionOperation) {
|
|
5206
5213
|
FileVersionOperation["CREATE"] = "CREATE";
|
|
5207
5214
|
FileVersionOperation["READ"] = "READ";
|
|
5208
5215
|
FileVersionOperation["UPDATE"] = "UPDATE";
|
|
5209
5216
|
FileVersionOperation["REVERT"] = "REVERT";
|
|
5210
5217
|
FileVersionOperation["DELETE"] = "DELETE";
|
|
5211
|
-
})(FileVersionOperation || (FileVersionOperation = {}));
|
|
5212
|
-
var KeyExchangeOtkState;
|
|
5218
|
+
})(exports.FileVersionOperation || (exports.FileVersionOperation = {}));
|
|
5213
5219
|
(function (KeyExchangeOtkState) {
|
|
5214
5220
|
KeyExchangeOtkState["OTK_INITIATED"] = "OTK_INITIATED";
|
|
5215
5221
|
KeyExchangeOtkState["OTK_ACCEPTED"] = "OTK_ACCEPTED";
|
|
5216
5222
|
KeyExchangeOtkState["OTK_COMPLETED"] = "OTK_COMPLETED";
|
|
5217
|
-
})(KeyExchangeOtkState || (KeyExchangeOtkState = {}));
|
|
5218
|
-
var KeyExchangeState;
|
|
5223
|
+
})(exports.KeyExchangeOtkState || (exports.KeyExchangeOtkState = {}));
|
|
5219
5224
|
(function (KeyExchangeState) {
|
|
5220
5225
|
KeyExchangeState["IN_PROGRESS"] = "IN_PROGRESS";
|
|
5221
5226
|
KeyExchangeState["COMPLETED"] = "COMPLETED";
|
|
5222
5227
|
KeyExchangeState["DECLINED"] = "DECLINED";
|
|
5223
5228
|
KeyExchangeState["CANCELLED"] = "CANCELLED";
|
|
5224
5229
|
KeyExchangeState["DELETED"] = "DELETED";
|
|
5225
|
-
})(KeyExchangeState || (KeyExchangeState = {}));
|
|
5226
|
-
var KeyExchangeMode;
|
|
5230
|
+
})(exports.KeyExchangeState || (exports.KeyExchangeState = {}));
|
|
5227
5231
|
(function (KeyExchangeMode) {
|
|
5228
5232
|
KeyExchangeMode["OTK"] = "OTK";
|
|
5229
|
-
})(KeyExchangeMode || (KeyExchangeMode = {}));
|
|
5230
|
-
var TpAssemblyState;
|
|
5233
|
+
})(exports.KeyExchangeMode || (exports.KeyExchangeMode = {}));
|
|
5231
5234
|
(function (TpAssemblyState) {
|
|
5232
5235
|
TpAssemblyState["DISABLED"] = "DISABLED";
|
|
5233
5236
|
TpAssemblyState["ENABLED"] = "ENABLED";
|
|
@@ -5237,8 +5240,7 @@
|
|
|
5237
5240
|
TpAssemblyState["EXPIRED"] = "EXPIRED";
|
|
5238
5241
|
TpAssemblyState["CANCELLED"] = "CANCELLED";
|
|
5239
5242
|
TpAssemblyState["RESET"] = "RESET";
|
|
5240
|
-
})(TpAssemblyState || (TpAssemblyState = {}));
|
|
5241
|
-
var TpClaimState;
|
|
5243
|
+
})(exports.TpAssemblyState || (exports.TpAssemblyState = {}));
|
|
5242
5244
|
(function (TpClaimState) {
|
|
5243
5245
|
TpClaimState["CLAIMED"] = "CLAIMED";
|
|
5244
5246
|
TpClaimState["APPROVED"] = "APPROVED";
|
|
@@ -5246,26 +5248,22 @@
|
|
|
5246
5248
|
TpClaimState["EXPIRED"] = "EXPIRED";
|
|
5247
5249
|
TpClaimState["CANCELLED"] = "CANCELLED";
|
|
5248
5250
|
TpClaimState["RESET"] = "RESET";
|
|
5249
|
-
})(TpClaimState || (TpClaimState = {}));
|
|
5250
|
-
var TpClaimApproverState;
|
|
5251
|
+
})(exports.TpClaimState || (exports.TpClaimState = {}));
|
|
5251
5252
|
(function (TpClaimApproverState) {
|
|
5252
5253
|
TpClaimApproverState["CLAIMED"] = "CLAIMED";
|
|
5253
5254
|
TpClaimApproverState["APPROVED"] = "APPROVED";
|
|
5254
5255
|
TpClaimApproverState["REJECTED"] = "REJECTED";
|
|
5255
|
-
})(TpClaimApproverState || (TpClaimApproverState = {}));
|
|
5256
|
-
var LockState;
|
|
5256
|
+
})(exports.TpClaimApproverState || (exports.TpClaimApproverState = {}));
|
|
5257
5257
|
(function (LockState) {
|
|
5258
5258
|
LockState["UNLOCKED"] = "UNLOCKED";
|
|
5259
5259
|
LockState["MUTEX_LOCKED"] = "MUTEX_LOCKED";
|
|
5260
|
-
})(LockState || (LockState = {}));
|
|
5261
|
-
var ScenarioState;
|
|
5260
|
+
})(exports.LockState || (exports.LockState = {}));
|
|
5262
5261
|
(function (ScenarioState) {
|
|
5263
5262
|
ScenarioState["DISABLED"] = "DISABLED";
|
|
5264
5263
|
ScenarioState["ENABLED"] = "ENABLED";
|
|
5265
5264
|
ScenarioState["CLAIMED"] = "CLAIMED";
|
|
5266
5265
|
ScenarioState["APPROVED"] = "APPROVED";
|
|
5267
|
-
})(ScenarioState || (ScenarioState = {}));
|
|
5268
|
-
var ClaimState;
|
|
5266
|
+
})(exports.ScenarioState || (exports.ScenarioState = {}));
|
|
5269
5267
|
(function (ClaimState) {
|
|
5270
5268
|
ClaimState["CLAIMED"] = "CLAIMED";
|
|
5271
5269
|
ClaimState["EXPIRED"] = "EXPIRED";
|
|
@@ -5273,18 +5271,16 @@
|
|
|
5273
5271
|
ClaimState["REJECTED"] = "REJECTED";
|
|
5274
5272
|
ClaimState["CANCELLED"] = "CANCELLED";
|
|
5275
5273
|
ClaimState["RESET"] = "RESET";
|
|
5276
|
-
})(ClaimState || (ClaimState = {}));
|
|
5277
|
-
var ClaimApproverState;
|
|
5274
|
+
})(exports.ClaimState || (exports.ClaimState = {}));
|
|
5278
5275
|
(function (ClaimApproverState) {
|
|
5279
5276
|
ClaimApproverState["CLAIMED"] = "CLAIMED";
|
|
5280
5277
|
ClaimApproverState["APPROVED"] = "APPROVED";
|
|
5281
5278
|
ClaimApproverState["REJECTED"] = "REJECTED";
|
|
5282
|
-
})(ClaimApproverState || (ClaimApproverState = {}));
|
|
5283
|
-
var LinkTypeField;
|
|
5279
|
+
})(exports.ClaimApproverState || (exports.ClaimApproverState = {}));
|
|
5284
5280
|
(function (LinkTypeField) {
|
|
5285
5281
|
LinkTypeField["HARD"] = "HARD";
|
|
5286
5282
|
LinkTypeField["SOFT"] = "SOFT";
|
|
5287
|
-
})(LinkTypeField || (LinkTypeField = {}));
|
|
5283
|
+
})(exports.LinkTypeField || (exports.LinkTypeField = {}));
|
|
5288
5284
|
|
|
5289
5285
|
var SecretShare = /** @class */ (function () {
|
|
5290
5286
|
function SecretShare(assembly, subAssembly, mnemonics) {
|
|
@@ -5524,7 +5520,7 @@
|
|
|
5524
5520
|
this.encryptionService = injector.get(EncryptionService);
|
|
5525
5521
|
this.keyGraph = injector.get(KeyGraphService);
|
|
5526
5522
|
this.slip39Service = injector.get(Slip39Service);
|
|
5527
|
-
this.lrGraphQl = injector.get(exports.ɵ
|
|
5523
|
+
this.lrGraphQl = injector.get(exports.ɵh);
|
|
5528
5524
|
}
|
|
5529
5525
|
TpAssemblyController.prototype.recoverAssemblyKey = function (partials) {
|
|
5530
5526
|
return __awaiter(this, void 0, void 0, function () {
|
|
@@ -6010,7 +6006,7 @@
|
|
|
6010
6006
|
return TpAssemblyController;
|
|
6011
6007
|
}());
|
|
6012
6008
|
|
|
6013
|
-
exports.ɵ
|
|
6009
|
+
exports.ɵl = /** @class */ (function (_super) {
|
|
6014
6010
|
__extends(TpPasswordResetAssemblyController, _super);
|
|
6015
6011
|
function TpPasswordResetAssemblyController(ngZone, injector) {
|
|
6016
6012
|
var _this = _super.call(this, injector) || this;
|
|
@@ -6024,21 +6020,21 @@
|
|
|
6024
6020
|
};
|
|
6025
6021
|
return TpPasswordResetAssemblyController;
|
|
6026
6022
|
}(TpAssemblyController));
|
|
6027
|
-
exports.ɵ
|
|
6028
|
-
exports.ɵ
|
|
6023
|
+
exports.ɵl.ɵprov = i0.ɵɵdefineInjectable({ factory: function TpPasswordResetAssemblyController_Factory() { return new exports.ɵl(i0.ɵɵinject(i0.NgZone), i0.ɵɵinject(i0.INJECTOR)); }, token: exports.ɵl, providedIn: "root" });
|
|
6024
|
+
exports.ɵl.decorators = [
|
|
6029
6025
|
{ type: i0.Injectable, args: [{
|
|
6030
6026
|
providedIn: 'root',
|
|
6031
6027
|
},] }
|
|
6032
6028
|
];
|
|
6033
|
-
exports.ɵ
|
|
6029
|
+
exports.ɵl.ctorParameters = function () { return [
|
|
6034
6030
|
{ type: i0.NgZone },
|
|
6035
6031
|
{ type: i0.Injector }
|
|
6036
6032
|
]; };
|
|
6037
|
-
exports.ɵ
|
|
6033
|
+
exports.ɵl = __decorate([
|
|
6038
6034
|
RunOutsideAngular({
|
|
6039
6035
|
ngZoneName: 'ngZone',
|
|
6040
6036
|
})
|
|
6041
|
-
], exports.ɵ
|
|
6037
|
+
], exports.ɵl);
|
|
6042
6038
|
|
|
6043
6039
|
var initialiseAuth = function (authService) {
|
|
6044
6040
|
return function () { return authService.initialise(); };
|
|
@@ -6218,7 +6214,7 @@
|
|
|
6218
6214
|
case 1:
|
|
6219
6215
|
loginResult = _b.sent();
|
|
6220
6216
|
if (!(tpPasswordResetAutoComplete &&
|
|
6221
|
-
((_a = loginResult.resetUser) === null || _a === void 0 ? void 0 : _a.state) === TpClaimState.APPROVED)) return [3 /*break*/, 4];
|
|
6217
|
+
((_a = loginResult.resetUser) === null || _a === void 0 ? void 0 : _a.state) === exports.TpClaimState.APPROVED)) return [3 /*break*/, 4];
|
|
6222
6218
|
return [4 /*yield*/, this.completeRequest(password)];
|
|
6223
6219
|
case 2:
|
|
6224
6220
|
_b.sent();
|
|
@@ -6550,7 +6546,7 @@
|
|
|
6550
6546
|
case 0: return [4 /*yield*/, this.getResetUser(true)];
|
|
6551
6547
|
case 1:
|
|
6552
6548
|
resetUser = _b.sent();
|
|
6553
|
-
if (resetUser.state !== TpClaimState.APPROVED) {
|
|
6549
|
+
if (resetUser.state !== exports.TpClaimState.APPROVED) {
|
|
6554
6550
|
throw new LrBadStateException('Password reset request has not been approved.');
|
|
6555
6551
|
}
|
|
6556
6552
|
return [4 /*yield*/, this.recoverAssemblyKey(resetUser)];
|
|
@@ -6681,7 +6677,7 @@
|
|
|
6681
6677
|
};
|
|
6682
6678
|
return LifeReadyAuthService;
|
|
6683
6679
|
}());
|
|
6684
|
-
LifeReadyAuthService.ɵprov = i0.ɵɵdefineInjectable({ factory: function LifeReadyAuthService_Factory() { return new LifeReadyAuthService(i0.ɵɵinject(LR_CONFIG), i0.ɵɵinject(i4.AuthClass), i0.ɵɵinject(KeyFactoryService), i0.ɵɵinject(KeyService), i0.ɵɵinject(ProfileService), i0.ɵɵinject(KeyGraphService), i0.ɵɵinject(PasswordService), i0.ɵɵinject(IdleService), i0.ɵɵinject(exports.ɵ
|
|
6680
|
+
LifeReadyAuthService.ɵprov = i0.ɵɵdefineInjectable({ factory: function LifeReadyAuthService_Factory() { return new LifeReadyAuthService(i0.ɵɵinject(LR_CONFIG), i0.ɵɵinject(i4.AuthClass), i0.ɵɵinject(KeyFactoryService), i0.ɵɵinject(KeyService), i0.ɵɵinject(ProfileService), i0.ɵɵinject(KeyGraphService), i0.ɵɵinject(PasswordService), i0.ɵɵinject(IdleService), i0.ɵɵinject(exports.ɵh), i0.ɵɵinject(exports.ɵi), i0.ɵɵinject(PersistService), i0.ɵɵinject(EncryptionService), i0.ɵɵinject(Slip39Service), i0.ɵɵinject(exports.ɵl)); }, token: LifeReadyAuthService, providedIn: "root" });
|
|
6685
6681
|
LifeReadyAuthService.decorators = [
|
|
6686
6682
|
{ type: i0.Injectable, args: [{
|
|
6687
6683
|
providedIn: 'root',
|
|
@@ -6696,12 +6692,12 @@
|
|
|
6696
6692
|
{ type: KeyGraphService },
|
|
6697
6693
|
{ type: PasswordService },
|
|
6698
6694
|
{ type: IdleService },
|
|
6699
|
-
{ type: exports.ɵ
|
|
6700
|
-
{ type: exports.ɵ
|
|
6695
|
+
{ type: exports.ɵh },
|
|
6696
|
+
{ type: exports.ɵi },
|
|
6701
6697
|
{ type: PersistService },
|
|
6702
6698
|
{ type: EncryptionService },
|
|
6703
6699
|
{ type: Slip39Service },
|
|
6704
|
-
{ type: exports.ɵ
|
|
6700
|
+
{ type: exports.ɵl }
|
|
6705
6701
|
]; };
|
|
6706
6702
|
|
|
6707
6703
|
var FileService = /** @class */ (function () {
|
|
@@ -6934,15 +6930,6 @@
|
|
|
6934
6930
|
OtkState["OTK_ACCEPTED"] = "OTK_ACCEPTED";
|
|
6935
6931
|
OtkState["OTK_COMPLETED"] = "OTK_COMPLETED";
|
|
6936
6932
|
})(exports.OtkState || (exports.OtkState = {}));
|
|
6937
|
-
(function (KeyExchangeState) {
|
|
6938
|
-
KeyExchangeState["IN_PROGRESS"] = "IN_PROGRESS";
|
|
6939
|
-
KeyExchangeState["COMPLETED"] = "COMPLETED";
|
|
6940
|
-
KeyExchangeState["DECLINED"] = "DECLINED";
|
|
6941
|
-
KeyExchangeState["CANCELLED"] = "CANCELLED";
|
|
6942
|
-
})(exports.KeyExchangeState || (exports.KeyExchangeState = {}));
|
|
6943
|
-
(function (KeyExchangeMode) {
|
|
6944
|
-
KeyExchangeMode["OTK"] = "OTK";
|
|
6945
|
-
})(exports.KeyExchangeMode || (exports.KeyExchangeMode = {}));
|
|
6946
6933
|
|
|
6947
6934
|
var moment$2 = moment_;
|
|
6948
6935
|
var KeyExchangeService = /** @class */ (function () {
|
|
@@ -7113,7 +7100,7 @@
|
|
|
7113
7100
|
case 3:
|
|
7114
7101
|
prk = _a.sent();
|
|
7115
7102
|
return [4 /*yield*/, this.encryptionService.decrypt(prk.jwk, JSON.parse(keyExchange.otk.responderPbkCipher), {
|
|
7116
|
-
serializations: [
|
|
7103
|
+
serializations: [JoseSerialization.COMPACT],
|
|
7117
7104
|
})];
|
|
7118
7105
|
case 4:
|
|
7119
7106
|
decryptedCipher = _a.sent();
|
|
@@ -10939,10 +10926,6 @@
|
|
|
10939
10926
|
{ type: LifeReadyAuthService }
|
|
10940
10927
|
]; };
|
|
10941
10928
|
|
|
10942
|
-
(function (UserDeleteState) {
|
|
10943
|
-
UserDeleteState["REQUESTED"] = "REQUESTED";
|
|
10944
|
-
})(exports.UserDeleteState || (exports.UserDeleteState = {}));
|
|
10945
|
-
|
|
10946
10929
|
var LifeReadyModule = /** @class */ (function () {
|
|
10947
10930
|
function LifeReadyModule() {
|
|
10948
10931
|
}
|
|
@@ -11203,7 +11186,7 @@
|
|
|
11203
11186
|
case 3:
|
|
11204
11187
|
prk = _a.sent();
|
|
11205
11188
|
return [4 /*yield*/, this.encryptionService.decrypt(prk.jwk, JSON.parse(keyExchange.otk.responderPbkCipher), {
|
|
11206
|
-
serializations: [
|
|
11189
|
+
serializations: [JoseSerialization.COMPACT],
|
|
11207
11190
|
})];
|
|
11208
11191
|
case 4:
|
|
11209
11192
|
decryptedCipher = _a.sent();
|
|
@@ -11810,7 +11793,8 @@
|
|
|
11810
11793
|
_o = (_m = JSON).stringify;
|
|
11811
11794
|
return [4 /*yield*/, this.encryptionService.sign(initiatorSigPrk.jwk, sharedCipherData)];
|
|
11812
11795
|
case 27:
|
|
11813
|
-
_l.sharedCipherDataSig =
|
|
11796
|
+
_l.sharedCipherDataSig =
|
|
11797
|
+
_o.apply(_m, [_p.sent()]);
|
|
11814
11798
|
_p.label = 28;
|
|
11815
11799
|
case 28:
|
|
11816
11800
|
// TODO ideally we update the shared data in the contact card sent to the responder as well since that
|
|
@@ -11839,7 +11823,7 @@
|
|
|
11839
11823
|
};
|
|
11840
11824
|
return KeyExchange2Service;
|
|
11841
11825
|
}());
|
|
11842
|
-
exports.KeyExchange2Service.ɵprov = i0.ɵɵdefineInjectable({ factory: function KeyExchange2Service_Factory() { return new exports.KeyExchange2Service(i0.ɵɵinject(i0.NgZone), i0.ɵɵinject(KeyFactoryService), i0.ɵɵinject(KeyService), i0.ɵɵinject(EncryptionService), i0.ɵɵinject(UserService), i0.ɵɵinject(KeyGraphService), i0.ɵɵinject(exports.ɵ
|
|
11826
|
+
exports.KeyExchange2Service.ɵprov = i0.ɵɵdefineInjectable({ factory: function KeyExchange2Service_Factory() { return new exports.KeyExchange2Service(i0.ɵɵinject(i0.NgZone), i0.ɵɵinject(KeyFactoryService), i0.ɵɵinject(KeyService), i0.ɵɵinject(EncryptionService), i0.ɵɵinject(UserService), i0.ɵɵinject(KeyGraphService), i0.ɵɵinject(exports.ɵh)); }, token: exports.KeyExchange2Service, providedIn: "root" });
|
|
11843
11827
|
exports.KeyExchange2Service.decorators = [
|
|
11844
11828
|
{ type: i0.Injectable, args: [{
|
|
11845
11829
|
providedIn: 'root',
|
|
@@ -11852,7 +11836,7 @@
|
|
|
11852
11836
|
{ type: EncryptionService },
|
|
11853
11837
|
{ type: UserService },
|
|
11854
11838
|
{ type: KeyGraphService },
|
|
11855
|
-
{ type: exports.ɵ
|
|
11839
|
+
{ type: exports.ɵh }
|
|
11856
11840
|
]; };
|
|
11857
11841
|
exports.KeyExchange2Service = __decorate([
|
|
11858
11842
|
RunOutsideAngular({
|
|
@@ -12002,7 +11986,7 @@
|
|
|
12002
11986
|
};
|
|
12003
11987
|
return SharedContactCard2Service;
|
|
12004
11988
|
}());
|
|
12005
|
-
exports.SharedContactCard2Service.ɵprov = i0.ɵɵdefineInjectable({ factory: function SharedContactCard2Service_Factory() { return new exports.SharedContactCard2Service(i0.ɵɵinject(i0.NgZone), i0.ɵɵinject(KeyService), i0.ɵɵinject(KeyGraphService), i0.ɵɵinject(EncryptionService), i0.ɵɵinject(exports.ɵ
|
|
11989
|
+
exports.SharedContactCard2Service.ɵprov = i0.ɵɵdefineInjectable({ factory: function SharedContactCard2Service_Factory() { return new exports.SharedContactCard2Service(i0.ɵɵinject(i0.NgZone), i0.ɵɵinject(KeyService), i0.ɵɵinject(KeyGraphService), i0.ɵɵinject(EncryptionService), i0.ɵɵinject(exports.ɵh)); }, token: exports.SharedContactCard2Service, providedIn: "root" });
|
|
12006
11990
|
exports.SharedContactCard2Service.decorators = [
|
|
12007
11991
|
{ type: i0.Injectable, args: [{
|
|
12008
11992
|
providedIn: 'root',
|
|
@@ -12013,7 +11997,7 @@
|
|
|
12013
11997
|
{ type: KeyService },
|
|
12014
11998
|
{ type: KeyGraphService },
|
|
12015
11999
|
{ type: EncryptionService },
|
|
12016
|
-
{ type: exports.ɵ
|
|
12000
|
+
{ type: exports.ɵh }
|
|
12017
12001
|
]; };
|
|
12018
12002
|
exports.SharedContactCard2Service = __decorate([
|
|
12019
12003
|
RunOutsideAngular({
|
|
@@ -12424,6 +12408,7 @@
|
|
|
12424
12408
|
*
|
|
12425
12409
|
*/
|
|
12426
12410
|
Item2Service.prototype.ensureTempDirectory = function () {
|
|
12411
|
+
var _a;
|
|
12427
12412
|
return __awaiter(this, void 0, void 0, function () {
|
|
12428
12413
|
var existing, createDirectory, updateLock, _c, createDirectoryResult, _, _d, id, keyId, _e, id, keyId;
|
|
12429
12414
|
return __generator(this, function (_f) {
|
|
@@ -12447,7 +12432,7 @@
|
|
|
12447
12432
|
case 2:
|
|
12448
12433
|
createDirectory = _f.sent();
|
|
12449
12434
|
updateLock = this.lockService.updateLockMutation({
|
|
12450
|
-
version: existing.lock.version,
|
|
12435
|
+
version: (_a = existing.lock) === null || _a === void 0 ? void 0 : _a.version,
|
|
12451
12436
|
});
|
|
12452
12437
|
return [4 /*yield*/, this.lrGraphQL.lrMutate(LrMergedMutation.create([createDirectory, updateLock]))];
|
|
12453
12438
|
case 3:
|
|
@@ -13211,7 +13196,7 @@
|
|
|
13211
13196
|
};
|
|
13212
13197
|
return TpPasswordResetService;
|
|
13213
13198
|
}(LrService));
|
|
13214
|
-
exports.TpPasswordResetService.ɵprov = i0.ɵɵdefineInjectable({ factory: function TpPasswordResetService_Factory() { return new exports.TpPasswordResetService(i0.ɵɵinject(i0.NgZone), i0.ɵɵinject(i0.INJECTOR), i0.ɵɵinject(exports.ɵ
|
|
13199
|
+
exports.TpPasswordResetService.ɵprov = i0.ɵɵdefineInjectable({ factory: function TpPasswordResetService_Factory() { return new exports.TpPasswordResetService(i0.ɵɵinject(i0.NgZone), i0.ɵɵinject(i0.INJECTOR), i0.ɵɵinject(exports.ɵl)); }, token: exports.TpPasswordResetService, providedIn: "root" });
|
|
13215
13200
|
exports.TpPasswordResetService.decorators = [
|
|
13216
13201
|
{ type: i0.Injectable, args: [{
|
|
13217
13202
|
providedIn: 'root',
|
|
@@ -13220,7 +13205,7 @@
|
|
|
13220
13205
|
exports.TpPasswordResetService.ctorParameters = function () { return [
|
|
13221
13206
|
{ type: i0.NgZone },
|
|
13222
13207
|
{ type: i0.Injector },
|
|
13223
|
-
{ type: exports.ɵ
|
|
13208
|
+
{ type: exports.ɵl }
|
|
13224
13209
|
]; };
|
|
13225
13210
|
exports.TpPasswordResetService = __decorate([
|
|
13226
13211
|
RunOutsideAngular({
|
|
@@ -13399,7 +13384,7 @@
|
|
|
13399
13384
|
};
|
|
13400
13385
|
TpPasswordResetRequestService.prototype.activeRequestOrRaise = function (sharedReset) {
|
|
13401
13386
|
var state = sharedReset.sharedRequest.claim.state;
|
|
13402
|
-
if (state !== TpAssemblyState.CLAIMED) {
|
|
13387
|
+
if (state !== exports.TpAssemblyState.CLAIMED) {
|
|
13403
13388
|
throw new LrBadStateException("Claim is already in " + state + " state.");
|
|
13404
13389
|
}
|
|
13405
13390
|
};
|
|
@@ -13416,7 +13401,7 @@
|
|
|
13416
13401
|
sharedReset = _a.sent();
|
|
13417
13402
|
this.activeRequestOrRaise(sharedReset);
|
|
13418
13403
|
return [2 /*return*/, LrMergedMutation.create(sharedReset.sharedRequest.claim.asClaimApprovers.edges
|
|
13419
|
-
.filter(function (edge) { return edge.node.state === TpClaimApproverState.CLAIMED; })
|
|
13404
|
+
.filter(function (edge) { return edge.node.state === exports.TpClaimApproverState.CLAIMED; })
|
|
13420
13405
|
.map(function (edge) { return new LrMutation({
|
|
13421
13406
|
mutation: RejectTpPasswordResetRequestMutation,
|
|
13422
13407
|
variables: { input: { claimApproverId: edge.node.id } },
|
|
@@ -13452,7 +13437,7 @@
|
|
|
13452
13437
|
case 2:
|
|
13453
13438
|
pbk = _c.sent();
|
|
13454
13439
|
console.log(pbk.toJSON());
|
|
13455
|
-
claimApprovers = sharedReset.sharedRequest.claim.asClaimApprovers.edges.filter(function (edge) { return edge.node.state === TpClaimApproverState.CLAIMED; });
|
|
13440
|
+
claimApprovers = sharedReset.sharedRequest.claim.asClaimApprovers.edges.filter(function (edge) { return edge.node.state === exports.TpClaimApproverState.CLAIMED; });
|
|
13456
13441
|
_b = (_a = LrMergedMutation).create;
|
|
13457
13442
|
return [4 /*yield*/, Promise.all(claimApprovers.map(function (approverEdge) { return __awaiter(_this, void 0, void 0, function () {
|
|
13458
13443
|
var ca, input, _a;
|
|
@@ -13673,7 +13658,7 @@
|
|
|
13673
13658
|
|
|
13674
13659
|
var SCENARIO_SLIP39_PASSPHRASE = 'lifeready';
|
|
13675
13660
|
|
|
13676
|
-
exports.ɵ
|
|
13661
|
+
exports.ɵq = /** @class */ (function (_super) {
|
|
13677
13662
|
__extends(ScenarioAssemblyController, _super);
|
|
13678
13663
|
function ScenarioAssemblyController(ngZone, injector) {
|
|
13679
13664
|
var _this = _super.call(this, injector) || this;
|
|
@@ -13687,21 +13672,21 @@
|
|
|
13687
13672
|
};
|
|
13688
13673
|
return ScenarioAssemblyController;
|
|
13689
13674
|
}(TpAssemblyController));
|
|
13690
|
-
exports.ɵ
|
|
13691
|
-
exports.ɵ
|
|
13675
|
+
exports.ɵq.ɵprov = i0.ɵɵdefineInjectable({ factory: function ScenarioAssemblyController_Factory() { return new exports.ɵq(i0.ɵɵinject(i0.NgZone), i0.ɵɵinject(i0.INJECTOR)); }, token: exports.ɵq, providedIn: "root" });
|
|
13676
|
+
exports.ɵq.decorators = [
|
|
13692
13677
|
{ type: i0.Injectable, args: [{
|
|
13693
13678
|
providedIn: 'root',
|
|
13694
13679
|
},] }
|
|
13695
13680
|
];
|
|
13696
|
-
exports.ɵ
|
|
13681
|
+
exports.ɵq.ctorParameters = function () { return [
|
|
13697
13682
|
{ type: i0.NgZone },
|
|
13698
13683
|
{ type: i0.Injector }
|
|
13699
13684
|
]; };
|
|
13700
|
-
exports.ɵ
|
|
13685
|
+
exports.ɵq = __decorate([
|
|
13701
13686
|
RunOutsideAngular({
|
|
13702
13687
|
ngZoneName: 'ngZone',
|
|
13703
13688
|
})
|
|
13704
|
-
], exports.ɵ
|
|
13689
|
+
], exports.ɵq);
|
|
13705
13690
|
|
|
13706
13691
|
var ScenarioQuery = gqlTyped(templateObject_1$q || (templateObject_1$q = __makeTemplateObject(["\nquery ScenarioQuery(\n $scenarioId: LrRelayIdInput!\n) {\n scenario(id: $scenarioId) {\n id\n state\n assembly {\n quorum\n singleReject\n assemblyKey {\n id\n }\n subjectKey {\n id\n }\n subjectCipherData\n subAssemblies {\n edges {\n node {\n id\n subjectKey {\n id\n }\n subjectCipherData\n quorum\n singleReject\n approvers {\n edges {\n node {\n id\n tp {\n id\n }\n sharedKey {\n id\n }\n }\n }\n }\n }\n }\n }\n }\n claimants {\n edges {\n node {\n tp {\n id\n }\n sharedKey {\n id\n }\n }\n }\n }\n receivers {\n edges {\n node {\n tp {\n id\n }\n sharedKey {\n id\n }\n sharedCipherData\n receiverDirectories {\n edges {\n node {\n id\n sharedCipherData\n sharedKey {\n id\n }\n accessRole\n itemKey {\n id\n }\n directory {\n id\n keyId\n }\n }\n }\n }\n receiverFiles {\n edges {\n node {\n id\n sharedCipherData\n sharedKey {\n id\n }\n accessRole\n itemKey {\n id\n }\n }\n }\n }\n }\n }\n }\n }\n}"], ["\nquery ScenarioQuery(\n $scenarioId: LrRelayIdInput!\n) {\n scenario(id: $scenarioId) {\n id\n state\n assembly {\n quorum\n singleReject\n assemblyKey {\n id\n }\n subjectKey {\n id\n }\n subjectCipherData\n subAssemblies {\n edges {\n node {\n id\n subjectKey {\n id\n }\n subjectCipherData\n quorum\n singleReject\n approvers {\n edges {\n node {\n id\n tp {\n id\n }\n sharedKey {\n id\n }\n }\n }\n }\n }\n }\n }\n }\n claimants {\n edges {\n node {\n tp {\n id\n }\n sharedKey {\n id\n }\n }\n }\n }\n receivers {\n edges {\n node {\n tp {\n id\n }\n sharedKey {\n id\n }\n sharedCipherData\n receiverDirectories {\n edges {\n node {\n id\n sharedCipherData\n sharedKey {\n id\n }\n accessRole\n itemKey {\n id\n }\n directory {\n id\n keyId\n }\n }\n }\n }\n receiverFiles {\n edges {\n node {\n id\n sharedCipherData\n sharedKey {\n id\n }\n accessRole\n itemKey {\n id\n }\n }\n }\n }\n }\n }\n }\n }\n}"])));
|
|
13707
13692
|
var SharedScenarioQuery = gqlTyped(templateObject_2$m || (templateObject_2$m = __makeTemplateObject(["\nquery SharedScenarioQuery($scenarioId: LrRelayIdInput!) {\n sharedScenario(id: $scenarioId) {\n id\n state\n tp {\n id\n }\n asClaimant {\n sharedKey {\n id\n }\n sharedCipherData\n }\n asReceiver {\n sharedKey {\n id\n }\n sharedCipherData\n pbk {\n id\n }\n receiverDirectories {\n edges {\n node {\n id\n wrappedItemKey\n }\n }\n }\n }\n assembly {\n asApprovers {\n edges {\n node {\n id\n sharedKey {\n id\n }\n sharedCipherData\n }\n }\n }\n }\n sharedClaim {\n\t \t\tid\n isClaimant\n claim {\n state\n asClaimApprovers {\n edges {\n node {\n id\n state\n sharedKey {\n id\n }\n sharedCipherApprovalData\n sharedCipherPartialAssemblyKey\n receiverApprovals {\n edges {\n node {\n id\n pxk {\n id\n }\n }\n }\n }\n }\n }\n }\n }\n asClaimReceiver {\n received\n approvals {\n edges {\n node {\n receiverCipher\n receiverCipherPartialAssemblyKey\n pxk {\n id\n }\n }\n }\n }\n }\n }\n }\n}\n"], ["\nquery SharedScenarioQuery($scenarioId: LrRelayIdInput!) {\n sharedScenario(id: $scenarioId) {\n id\n state\n tp {\n id\n }\n asClaimant {\n sharedKey {\n id\n }\n sharedCipherData\n }\n asReceiver {\n sharedKey {\n id\n }\n sharedCipherData\n pbk {\n id\n }\n receiverDirectories {\n edges {\n node {\n id\n wrappedItemKey\n }\n }\n }\n }\n assembly {\n asApprovers {\n edges {\n node {\n id\n sharedKey {\n id\n }\n sharedCipherData\n }\n }\n }\n }\n sharedClaim {\n\t \t\tid\n isClaimant\n claim {\n state\n asClaimApprovers {\n edges {\n node {\n id\n state\n sharedKey {\n id\n }\n sharedCipherApprovalData\n sharedCipherPartialAssemblyKey\n receiverApprovals {\n edges {\n node {\n id\n pxk {\n id\n }\n }\n }\n }\n }\n }\n }\n }\n asClaimReceiver {\n received\n approvals {\n edges {\n node {\n receiverCipher\n receiverCipherPartialAssemblyKey\n pxk {\n id\n }\n }\n }\n }\n }\n }\n }\n}\n"])));
|
|
@@ -14344,7 +14329,7 @@
|
|
|
14344
14329
|
case 0: return [4 /*yield*/, this.getSharedScenario(scenarioId, sharedClaimId)];
|
|
14345
14330
|
case 1:
|
|
14346
14331
|
sharedScenario = (_a.sent()).sharedScenario;
|
|
14347
|
-
if (sharedScenario.state !== ScenarioState.APPROVED) {
|
|
14332
|
+
if (sharedScenario.state !== exports.ScenarioState.APPROVED) {
|
|
14348
14333
|
throwClaimNotApproved();
|
|
14349
14334
|
}
|
|
14350
14335
|
approvals = mapEdges(sharedScenario.sharedClaim.asClaimReceiver.approvals);
|
|
@@ -14411,7 +14396,7 @@
|
|
|
14411
14396
|
var _this = this;
|
|
14412
14397
|
return __generator(this, function (_a) {
|
|
14413
14398
|
switch (_a.label) {
|
|
14414
|
-
case 0: return [4 /*yield*/, this.asClaimApprovers(sharedScenarioId, claimId, TpClaimApproverState.CLAIMED)];
|
|
14399
|
+
case 0: return [4 /*yield*/, this.asClaimApprovers(sharedScenarioId, claimId, exports.TpClaimApproverState.CLAIMED)];
|
|
14415
14400
|
case 1:
|
|
14416
14401
|
asClaimApprovers = _a.sent();
|
|
14417
14402
|
return [2 /*return*/, asClaimApprovers.map(function (asClaimApprover) { return __awaiter(_this, void 0, void 0, function () {
|
|
@@ -14480,7 +14465,7 @@
|
|
|
14480
14465
|
var _this = this;
|
|
14481
14466
|
return __generator(this, function (_a) {
|
|
14482
14467
|
switch (_a.label) {
|
|
14483
|
-
case 0: return [4 /*yield*/, this.asClaimApprovers(sharedScenarioId, claimId, TpClaimApproverState.CLAIMED)];
|
|
14468
|
+
case 0: return [4 /*yield*/, this.asClaimApprovers(sharedScenarioId, claimId, exports.TpClaimApproverState.CLAIMED)];
|
|
14484
14469
|
case 1:
|
|
14485
14470
|
asClaimApprovers = _a.sent();
|
|
14486
14471
|
return [2 /*return*/, asClaimApprovers.map(function (asClaimApprover) { return __awaiter(_this, void 0, void 0, function () {
|
|
@@ -14500,7 +14485,7 @@
|
|
|
14500
14485
|
return ScenarioService;
|
|
14501
14486
|
}(LrService));
|
|
14502
14487
|
exports.ScenarioService.SLIP39_PASSPHRASE = 'lifeready';
|
|
14503
|
-
exports.ScenarioService.ɵprov = i0.ɵɵdefineInjectable({ factory: function ScenarioService_Factory() { return new exports.ScenarioService(i0.ɵɵinject(i0.NgZone), i0.ɵɵinject(i0.INJECTOR), i0.ɵɵinject(KeyGraphService), i0.ɵɵinject(exports.Item2Service), i0.ɵɵinject(exports.ɵ
|
|
14488
|
+
exports.ScenarioService.ɵprov = i0.ɵɵdefineInjectable({ factory: function ScenarioService_Factory() { return new exports.ScenarioService(i0.ɵɵinject(i0.NgZone), i0.ɵɵinject(i0.INJECTOR), i0.ɵɵinject(KeyGraphService), i0.ɵɵinject(exports.Item2Service), i0.ɵɵinject(exports.ɵq), i0.ɵɵinject(EncryptionService)); }, token: exports.ScenarioService, providedIn: "root" });
|
|
14504
14489
|
exports.ScenarioService.decorators = [
|
|
14505
14490
|
{ type: i0.Injectable, args: [{
|
|
14506
14491
|
providedIn: 'root',
|
|
@@ -14511,7 +14496,7 @@
|
|
|
14511
14496
|
{ type: i0.Injector },
|
|
14512
14497
|
{ type: KeyGraphService },
|
|
14513
14498
|
{ type: exports.Item2Service },
|
|
14514
|
-
{ type: exports.ɵ
|
|
14499
|
+
{ type: exports.ɵq },
|
|
14515
14500
|
{ type: EncryptionService }
|
|
14516
14501
|
]; };
|
|
14517
14502
|
exports.ScenarioService = __decorate([
|
|
@@ -14533,7 +14518,6 @@
|
|
|
14533
14518
|
exports.ApiContactCard = ApiContactCard;
|
|
14534
14519
|
exports.ApiCurrentUser = ApiCurrentUser;
|
|
14535
14520
|
exports.ArchiveDirectoryMutation = ArchiveDirectoryMutation;
|
|
14536
|
-
exports.Assembly = Assembly;
|
|
14537
14521
|
exports.CancelTrustedPartyInvitationMutation = CancelTrustedPartyInvitationMutation;
|
|
14538
14522
|
exports.CancelUserDeleteMutation = CancelUserDeleteMutation;
|
|
14539
14523
|
exports.Category = Category;
|
|
@@ -14559,7 +14543,6 @@
|
|
|
14559
14543
|
exports.CurrentUserKey = CurrentUserKey;
|
|
14560
14544
|
exports.CurrentUserQuery = CurrentUserQuery;
|
|
14561
14545
|
exports.CurrentUserSharedKeyQuery = CurrentUserSharedKeyQuery;
|
|
14562
|
-
exports.DECRYPT_OPTIONS_DEFAULT = DECRYPT_OPTIONS_DEFAULT;
|
|
14563
14546
|
exports.DEFAULT_BREADCRUMB_DEPTH = DEFAULT_BREADCRUMB_DEPTH;
|
|
14564
14547
|
exports.DEFAULT_DESCENDANTS_DEPTH = DEFAULT_DESCENDANTS_DEPTH;
|
|
14565
14548
|
exports.DeclineTrustedPartyInvitationMutation = DeclineTrustedPartyInvitationMutation;
|
|
@@ -14572,7 +14555,6 @@
|
|
|
14572
14555
|
exports.DeleteRecordMutation = DeleteRecordMutation;
|
|
14573
14556
|
exports.DeleteTrustedPartyMutation = DeleteTrustedPartyMutation;
|
|
14574
14557
|
exports.DirectoryQuery = DirectoryQuery;
|
|
14575
|
-
exports.EncryptionService = EncryptionService;
|
|
14576
14558
|
exports.Features = Features;
|
|
14577
14559
|
exports.FetchKeyGraphField = FetchKeyGraphField;
|
|
14578
14560
|
exports.FileQuery = FileQuery;
|
|
@@ -14597,12 +14579,8 @@
|
|
|
14597
14579
|
exports.KeyExchangeService = KeyExchangeService;
|
|
14598
14580
|
exports.KeyExchangeTokenQuery = KeyExchangeTokenQuery;
|
|
14599
14581
|
exports.KeyExchangesQuery = KeyExchangesQuery;
|
|
14600
|
-
exports.KeyFactoryService = KeyFactoryService;
|
|
14601
14582
|
exports.KeyGraphField = KeyGraphField;
|
|
14602
14583
|
exports.KeyGraphFragment = KeyGraphFragment;
|
|
14603
|
-
exports.KeyGraphService = KeyGraphService;
|
|
14604
|
-
exports.KeyMetaService = KeyMetaService;
|
|
14605
|
-
exports.KeyService = KeyService;
|
|
14606
14584
|
exports.LR_CONFIG = LR_CONFIG;
|
|
14607
14585
|
exports.LbopQuery = LbopQuery;
|
|
14608
14586
|
exports.LbopService = LbopService;
|
|
@@ -14625,7 +14603,7 @@
|
|
|
14625
14603
|
exports.LrException = LrException;
|
|
14626
14604
|
exports.LrExpiredCodeException = LrExpiredCodeException;
|
|
14627
14605
|
exports.LrExpiredException = LrExpiredException;
|
|
14628
|
-
exports.LrGraphQLService = exports.ɵ
|
|
14606
|
+
exports.LrGraphQLService = exports.ɵh;
|
|
14629
14607
|
exports.LrLockedException = LrLockedException;
|
|
14630
14608
|
exports.LrMergedMutation = LrMergedMutation;
|
|
14631
14609
|
exports.LrMutation = LrMutation;
|
|
@@ -14656,7 +14634,6 @@
|
|
|
14656
14634
|
exports.PlanService = PlanService;
|
|
14657
14635
|
exports.ProfileDetailsService = ProfileDetailsService;
|
|
14658
14636
|
exports.ProfileService = ProfileService;
|
|
14659
|
-
exports.Quorum = Quorum;
|
|
14660
14637
|
exports.RecordAttachment = RecordAttachment;
|
|
14661
14638
|
exports.RecordAttachmentFilter = RecordAttachmentFilter;
|
|
14662
14639
|
exports.RecordAttachmentService = RecordAttachmentService;
|
|
@@ -14674,17 +14651,13 @@
|
|
|
14674
14651
|
exports.RequestUserDeleteMutation = RequestUserDeleteMutation;
|
|
14675
14652
|
exports.RespondOtkMutation = RespondOtkMutation;
|
|
14676
14653
|
exports.RevertFileQuery = RevertFileQuery;
|
|
14677
|
-
exports.SecretShare = SecretShare;
|
|
14678
14654
|
exports.SendMessageMutation = SendMessageMutation;
|
|
14679
14655
|
exports.ShareCategoryMutation = ShareCategoryMutation;
|
|
14680
14656
|
exports.SharedAccess = SharedAccess;
|
|
14681
14657
|
exports.SharedTrustedPartyDetails = SharedTrustedPartyDetails;
|
|
14682
14658
|
exports.SharedVaultFeature = SharedVaultFeature;
|
|
14683
|
-
exports.Slip39Service = Slip39Service;
|
|
14684
14659
|
exports.StripeBillingPortalSession = StripeBillingPortalSession;
|
|
14685
14660
|
exports.StripeCheckoutSession = StripeCheckoutSession;
|
|
14686
|
-
exports.SubAssembly = SubAssembly;
|
|
14687
|
-
exports.SubQuorum = SubQuorum;
|
|
14688
14661
|
exports.Subscription = Subscription;
|
|
14689
14662
|
exports.TPFeatures = TPFeatures;
|
|
14690
14663
|
exports.TrustedParties = TrustedParties;
|
|
@@ -14705,21 +14678,15 @@
|
|
|
14705
14678
|
exports.UpdateRecordMutation = UpdateRecordMutation;
|
|
14706
14679
|
exports.UpdatedCategory = UpdatedCategory;
|
|
14707
14680
|
exports.UpdatedRecord = UpdatedRecord;
|
|
14708
|
-
exports.UserKeys = UserKeys;
|
|
14709
14681
|
exports.UserPlan = UserPlan;
|
|
14710
14682
|
exports.UserQuery = UserQuery;
|
|
14711
14683
|
exports.UserService = UserService;
|
|
14712
14684
|
exports.UserSharedKeyFields = UserSharedKeyFields;
|
|
14713
|
-
exports.VERIFY_OPTIONS_DEFAULT = VERIFY_OPTIONS_DEFAULT;
|
|
14714
14685
|
exports.Vault = Vault;
|
|
14715
14686
|
exports.VaultCategory = VaultCategory;
|
|
14716
14687
|
exports.VaultFields = VaultFields;
|
|
14717
14688
|
exports.VaultRecord = VaultRecord;
|
|
14718
14689
|
exports.VaultRecordType = VaultRecordType;
|
|
14719
|
-
exports.WebCryptoService = WebCryptoService;
|
|
14720
|
-
exports.WrappedContent = WrappedContent;
|
|
14721
|
-
exports.WrappingKey = WrappingKey;
|
|
14722
|
-
exports.asJwk = asJwk;
|
|
14723
14690
|
exports.awsFetch = awsFetch;
|
|
14724
14691
|
exports.configureAmplifyAuth = configureAmplifyAuth;
|
|
14725
14692
|
exports.configureApollo = configureApollo;
|
|
@@ -14728,20 +14695,26 @@
|
|
|
14728
14695
|
exports.handleApolloError = handleApolloError;
|
|
14729
14696
|
exports.handleCognitoCallback = handleCognitoCallback;
|
|
14730
14697
|
exports.initialiseAuth = initialiseAuth;
|
|
14731
|
-
exports.
|
|
14698
|
+
exports.mapEdges = mapEdges;
|
|
14732
14699
|
exports.mapUserPlans = mapUserPlans;
|
|
14733
14700
|
exports.parentCategoriesField = parentCategoriesField;
|
|
14734
14701
|
exports.processConnection = processConnection;
|
|
14735
|
-
exports.sha256 = sha256;
|
|
14736
14702
|
exports.throwClaimIdMismatch = throwClaimIdMismatch;
|
|
14737
14703
|
exports.throwClaimNotApproved = throwClaimNotApproved;
|
|
14738
14704
|
exports.ɵ0 = ɵ0;
|
|
14739
|
-
exports.ɵa =
|
|
14740
|
-
exports.ɵ
|
|
14741
|
-
exports.ɵ
|
|
14742
|
-
exports.ɵ
|
|
14743
|
-
exports.ɵ
|
|
14744
|
-
exports.ɵ
|
|
14705
|
+
exports.ɵa = KeyFactoryService;
|
|
14706
|
+
exports.ɵb = WebCryptoService;
|
|
14707
|
+
exports.ɵc = KeyService;
|
|
14708
|
+
exports.ɵd = EncryptionService;
|
|
14709
|
+
exports.ɵe = TimeService;
|
|
14710
|
+
exports.ɵf = KeyGraphService;
|
|
14711
|
+
exports.ɵg = KeyMetaService;
|
|
14712
|
+
exports.ɵj = RunOutsideAngular;
|
|
14713
|
+
exports.ɵk = Slip39Service;
|
|
14714
|
+
exports.ɵm = TpAssemblyController;
|
|
14715
|
+
exports.ɵn = SharedContactCardFields;
|
|
14716
|
+
exports.ɵo = SharedContactCardService;
|
|
14717
|
+
exports.ɵp = LrService;
|
|
14745
14718
|
|
|
14746
14719
|
Object.defineProperty(exports, '__esModule', { value: true });
|
|
14747
14720
|
|