@lifeready/core 1.1.2 → 1.1.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -2739,11 +2739,23 @@ var AccessRoleChoice;
2739
2739
  AccessRoleChoice["DENY"] = "DENY";
2740
2740
  AccessRoleChoice["OWNER"] = "OWNER";
2741
2741
  })(AccessRoleChoice || (AccessRoleChoice = {}));
2742
- var AccessRoleMethod;
2743
- (function (AccessRoleMethod) {
2744
- AccessRoleMethod["inherited"] = "inherited";
2745
- AccessRoleMethod["direct"] = "direct";
2746
- })(AccessRoleMethod || (AccessRoleMethod = {}));
2742
+ var AccessRoleMethodChoice;
2743
+ (function (AccessRoleMethodChoice) {
2744
+ AccessRoleMethodChoice["INHERITED"] = "INHERITED";
2745
+ AccessRoleMethodChoice["DIRECT"] = "DIRECT";
2746
+ })(AccessRoleMethodChoice || (AccessRoleMethodChoice = {}));
2747
+ var PermissionChoice;
2748
+ (function (PermissionChoice) {
2749
+ PermissionChoice["CREATE"] = "CREATE";
2750
+ PermissionChoice["READ"] = "READ";
2751
+ PermissionChoice["UPDATE"] = "UPDATE";
2752
+ PermissionChoice["DELETE"] = "DELETE";
2753
+ PermissionChoice["SHARE"] = "SHARE";
2754
+ PermissionChoice["ARCHIVE"] = "ARCHIVE";
2755
+ PermissionChoice["ACCESS_ARCHIVED"] = "ACCESS_ARCHIVED";
2756
+ PermissionChoice["UNARCHIVE"] = "UNARCHIVE";
2757
+ PermissionChoice["SET_CONFIDENTIAL"] = "SET_CONFIDENTIAL";
2758
+ })(PermissionChoice || (PermissionChoice = {}));
2747
2759
  var FileOperationField;
2748
2760
  (function (FileOperationField) {
2749
2761
  FileOperationField["CREATE"] = "CREATE";
@@ -3193,18 +3205,6 @@ const RecordFilter = JSON.stringify({
3193
3205
  },
3194
3206
  ],
3195
3207
  });
3196
- const AccessFields = `
3197
- accessRoles {
3198
- role
3199
- method
3200
- inheritedFrom {
3201
- id
3202
- }
3203
- trustedParty {
3204
- id
3205
- }
3206
- isIssuer
3207
- }`;
3208
3208
  const descendantDirectories = `
3209
3209
  descendantDirectories(depth: ${DEFAULT_DESCENDANTS_DEPTH}, plainMeta: $categoryFilter, archived: false) {
3210
3210
  recordsCount: directoriesCount(plainMeta: $recordFilter, archived: false)
@@ -3216,7 +3216,6 @@ const CategoryFields = `
3216
3216
  archived
3217
3217
  plainMeta
3218
3218
  cipherMeta
3219
- ${AccessFields}
3220
3219
  ${descendantDirectories}
3221
3220
  `;
3222
3221
  const VaultFields = `
@@ -3237,24 +3236,20 @@ const GetRootDirectoryIdsQuery = gql `
3237
3236
  }
3238
3237
  `;
3239
3238
  const GetCategoriesQuery = gql `
3240
- query GetCategories($vaultFilter: LrJSONFilter!, $categoryFilter: LrJSONFilter!, $recordFilter: LrJSONFilter!, $archived: Boolean, $cachedKeyIds: [LrRelayIdInput!])
3239
+ query GetCategoriesQuery($vaultDirectoryId: LrRelayIdInput!, $categoryFilter: LrJSONFilter!, $recordFilter: LrJSONFilter!, $archived: Boolean)
3241
3240
  {
3242
- vaults: rootDirectories(plainMeta: $vaultFilter) {
3243
- edges {
3244
- node {
3245
- childDirectoryLinks(plainMeta: $categoryFilter, orderBy: "created", archived: $archived) {
3246
- edges {
3247
- node {
3248
- childDirectory {
3249
- ${CategoryFields}
3250
- }
3251
- }
3241
+ directory(id: $vaultDirectoryId) {
3242
+ childDirectoryLinks(plainMeta: $categoryFilter, orderBy: "created", archived: $archived) {
3243
+ edges {
3244
+ node {
3245
+ childDirectory {
3246
+ ${CategoryFields}
3252
3247
  }
3253
3248
  }
3254
3249
  }
3255
3250
  }
3256
3251
  }
3257
- keyGraph(cachedKeyIds: $cachedKeyIds) {
3252
+ keyGraph {
3258
3253
  ...KeyGraphFragment
3259
3254
  }
3260
3255
  }
@@ -3298,7 +3293,6 @@ query GetTrustedPartyCategoriesQuery($trustedPartyId: LrRelayIdInput!, $category
3298
3293
  cipherMeta
3299
3294
  created
3300
3295
  modified
3301
- ${AccessFields}
3302
3296
  content: childFileLinks(plainMeta: $contentFilter) {
3303
3297
  edges {
3304
3298
  node {
@@ -3351,7 +3345,6 @@ query GetMySharedCategoriesQuery($trustedPartyId: LrRelayIdInput!, $categoryFilt
3351
3345
  cipherMeta
3352
3346
  created
3353
3347
  modified
3354
- ${AccessFields}
3355
3348
  content: childFileLinks(plainMeta: $contentFilter) {
3356
3349
  edges {
3357
3350
  node {
@@ -3397,7 +3390,6 @@ parentCategories: parentDirectoryLinks(plainMeta: $categoryFilter) {
3397
3390
  plainMeta
3398
3391
  cipherMeta
3399
3392
  ${parentCategoriesField(depth - 1)}
3400
- ${AccessFields}
3401
3393
  }
3402
3394
  }
3403
3395
  }
@@ -3417,7 +3409,6 @@ query GetCategory(
3417
3409
  archived
3418
3410
  plainMeta
3419
3411
  cipherMeta
3420
- ${AccessFields}
3421
3412
  ${descendantDirectories}
3422
3413
  ${parentCategoriesField(depth)}
3423
3414
  subCategories: childDirectoryLinks(plainMeta: $categoryFilter, orderBy: "created") {
@@ -3440,7 +3431,6 @@ query GetCategory(
3440
3431
  cipherMeta
3441
3432
  created
3442
3433
  modified
3443
- ${AccessFields}
3444
3434
  content: childFileLinks(plainMeta: $contentFilter) {
3445
3435
  edges {
3446
3436
  node {
@@ -5917,7 +5907,10 @@ query Record(
5917
5907
  cipherMeta
5918
5908
  created
5919
5909
  modified
5920
- ${AccessFields}
5910
+ confidentiality {
5911
+ isConfidential
5912
+ method
5913
+ }
5921
5914
  ${parentCategoriesField(depth)}
5922
5915
  content: childFileLinks(plainMeta: $contentFilter) {
5923
5916
  edges {
@@ -6054,35 +6047,6 @@ const DeleteFileMutation = gql `
6054
6047
  }
6055
6048
  `;
6056
6049
 
6057
- var AccessLevel;
6058
- (function (AccessLevel) {
6059
- AccessLevel["Owner"] = "OWNER";
6060
- AccessLevel["Admin"] = "ADMIN";
6061
- AccessLevel["Writer"] = "WRITER";
6062
- AccessLevel["Reader"] = "READER";
6063
- AccessLevel["Deny"] = "DENY";
6064
- })(AccessLevel || (AccessLevel = {}));
6065
- class SharedAccess {
6066
- }
6067
- class DefaultCategory {
6068
- }
6069
- class VaultRecordType {
6070
- }
6071
- class VaultRecord {
6072
- }
6073
- class Category {
6074
- }
6075
- class CurrentCategory extends Category {
6076
- }
6077
- class VaultCategory {
6078
- }
6079
- class NewCategory {
6080
- }
6081
- class UpdatedCategory {
6082
- }
6083
- class Vault {
6084
- }
6085
-
6086
6050
  class CategoryService {
6087
6051
  constructor(lrApollo, keyMetaService, keyGraph) {
6088
6052
  this.lrApollo = lrApollo;
@@ -6115,27 +6079,24 @@ class CategoryService {
6115
6079
  return defaultVaults[0] || null;
6116
6080
  });
6117
6081
  }
6118
- getCategories(input = null) {
6082
+ getCategories(input) {
6083
+ var _a;
6119
6084
  return __awaiter(this, void 0, void 0, function* () {
6085
+ const vaultDirectoryId = (input === null || input === void 0 ? void 0 : input.vaultDirectoryId) || ((_a = (yield this.getDefaultVault())) === null || _a === void 0 ? void 0 : _a.id);
6086
+ if (!vaultDirectoryId) {
6087
+ console.error('There is no default vault.');
6088
+ return [];
6089
+ }
6120
6090
  const res = yield this.lrApollo.query({
6121
6091
  query: GetCategoriesQuery,
6122
6092
  variables: {
6123
- vaultFilter: DefaultVaultFilter,
6093
+ vaultDirectoryId,
6124
6094
  categoryFilter: CategoryFilter,
6125
6095
  recordFilter: RecordFilter,
6126
- archived: input && input.archived,
6096
+ archived: input === null || input === void 0 ? void 0 : input.archived,
6127
6097
  },
6128
6098
  });
6129
- if (res.vaults.edges.length > 1) {
6130
- throw new LrBadStateException('There is more than one default vault');
6131
- }
6132
- else if (res.vaults.edges.length < 1) {
6133
- console.error('There is no default vault.');
6134
- return [];
6135
- }
6136
- else {
6137
- return yield this.mapCategories(res.vaults.edges[0].node.childDirectoryLinks);
6138
- }
6099
+ return this.mapCategories(res.directory.childDirectoryLinks);
6139
6100
  });
6140
6101
  }
6141
6102
  getTrustedPartyCategories(trustedPartyId) {
@@ -6375,8 +6336,6 @@ class CategoryService {
6375
6336
  try {
6376
6337
  const { name, isCustom, allowRecords, allowCustomCategories, code } = (yield this.keyMetaService.decryptMeta(node)) || {};
6377
6338
  const { isHidden } = (node.plainMeta && JSON.parse(node.plainMeta)) || {};
6378
- const isOwner = node.accessRoles &&
6379
- node.accessRoles.some((x) => x.role === AccessLevel.Owner);
6380
6339
  return {
6381
6340
  id: node.id,
6382
6341
  keyId: node.keyId,
@@ -6391,17 +6350,6 @@ class CategoryService {
6391
6350
  ? node.descendantDirectories.recordsCount === 0
6392
6351
  : null,
6393
6352
  allRecordsCount: (_a = node.descendantDirectories) === null || _a === void 0 ? void 0 : _a.recordsCount,
6394
- myAccessLevel: isOwner ? AccessLevel.Owner : node.accessRoles[0].role,
6395
- sharedAccess: isOwner
6396
- ? node.accessRoles
6397
- .filter((x) => x.role !== AccessLevel.Owner)
6398
- .map((x) => ({
6399
- trustedPartyId: x.trustedParty && x.trustedParty.id,
6400
- accessLevel: x.role,
6401
- isInherited: x.method === 'inherited',
6402
- inheritedFrom: x.inheritedFrom && x.inheritedFrom.id,
6403
- }))
6404
- : [],
6405
6353
  };
6406
6354
  }
6407
6355
  catch (e) {
@@ -6415,8 +6363,6 @@ class CategoryService {
6415
6363
  try {
6416
6364
  const contents = node.content.edges[0].node.childFile;
6417
6365
  const { name, recordType } = (yield this.keyMetaService.decryptMeta(contents.currentVersion.state)) || {};
6418
- const isOwner = node.accessRoles &&
6419
- node.accessRoles.some((x) => x.role === AccessLevel.Owner);
6420
6366
  return {
6421
6367
  id: node.id,
6422
6368
  keyId: node.keyId,
@@ -6428,17 +6374,6 @@ class CategoryService {
6428
6374
  new Date(contents.currentVersion.state.modified)
6429
6375
  ? node.modified
6430
6376
  : contents.currentVersion.state.modified,
6431
- myAccessLevel: isOwner ? AccessLevel.Owner : node.accessRoles[0].role,
6432
- sharedAccess: isOwner
6433
- ? node.accessRoles
6434
- .filter((x) => x.role !== AccessLevel.Owner)
6435
- .map((x) => ({
6436
- trustedPartyId: x.trustedParty && x.trustedParty.id,
6437
- accessLevel: x.role,
6438
- isInherited: x.method === 'inherited',
6439
- inheritedFrom: x.inheritedFrom && x.inheritedFrom.id,
6440
- }))
6441
- : [],
6442
6377
  };
6443
6378
  }
6444
6379
  catch (e) {
@@ -6552,6 +6487,35 @@ CategoryMetaService.ctorParameters = () => [
6552
6487
  { type: CategoryService }
6553
6488
  ];
6554
6489
 
6490
+ var AccessLevel;
6491
+ (function (AccessLevel) {
6492
+ AccessLevel["Owner"] = "OWNER";
6493
+ AccessLevel["Admin"] = "ADMIN";
6494
+ AccessLevel["Writer"] = "WRITER";
6495
+ AccessLevel["Reader"] = "READER";
6496
+ AccessLevel["Deny"] = "DENY";
6497
+ })(AccessLevel || (AccessLevel = {}));
6498
+ class SharedAccess {
6499
+ }
6500
+ class DefaultCategory {
6501
+ }
6502
+ class VaultRecordType {
6503
+ }
6504
+ class VaultRecord {
6505
+ }
6506
+ class Category {
6507
+ }
6508
+ class CurrentCategory extends Category {
6509
+ }
6510
+ class VaultCategory {
6511
+ }
6512
+ class NewCategory {
6513
+ }
6514
+ class UpdatedCategory {
6515
+ }
6516
+ class Vault {
6517
+ }
6518
+
6555
6519
  const CreateContactCardMutation$2 = gqlTyped `
6556
6520
  mutation CreateContactCardMutation(
6557
6521
  $input: CreateContactCardInput!
@@ -6952,6 +6916,24 @@ query TempDirectoryQuery($plainMeta: LrJSONFilter!) {
6952
6916
  }
6953
6917
  }
6954
6918
  `;
6919
+ const SetFileConfidentialMutation = gqlTyped `
6920
+ mutation SetFileConfidentialMutation($input: SetFileConfidentialInput!) {
6921
+ setFileConfidential(input: $input) {
6922
+ file {
6923
+ id
6924
+ }
6925
+ }
6926
+ }
6927
+ `;
6928
+ const SetDirectoryConfidentialMutation = gqlTyped `
6929
+ mutation SetDirectoryConfidentialMutation($input: SetDirectoryConfidentialInput!) {
6930
+ setDirectoryConfidential(input: $input) {
6931
+ directory {
6932
+ id
6933
+ }
6934
+ }
6935
+ }
6936
+ `;
6955
6937
 
6956
6938
  const DirectoryKeyQuery = gqlTyped `
6957
6939
  query DirectoryKeyQuery($id: LrRelayIdInput!) {
@@ -7309,6 +7291,42 @@ let Item2Service = Item2Service_1 = class Item2Service extends LrService {
7309
7291
  });
7310
7292
  });
7311
7293
  }
7294
+ setFileConfidential(options) {
7295
+ return __awaiter(this, void 0, void 0, function* () {
7296
+ return this.mutate(this.setFileConfidentialMutation(options));
7297
+ });
7298
+ }
7299
+ setFileConfidentialMutation(options) {
7300
+ return __awaiter(this, void 0, void 0, function* () {
7301
+ return new LrMutation({
7302
+ mutation: SetFileConfidentialMutation,
7303
+ variables: {
7304
+ input: {
7305
+ fileId: options.fileId,
7306
+ confidential: options.confidential,
7307
+ },
7308
+ },
7309
+ });
7310
+ });
7311
+ }
7312
+ setDirectoryConfidential(options) {
7313
+ return __awaiter(this, void 0, void 0, function* () {
7314
+ return this.mutate(this.setDirectoryConfidentialMutation(options));
7315
+ });
7316
+ }
7317
+ setDirectoryConfidentialMutation(options) {
7318
+ return __awaiter(this, void 0, void 0, function* () {
7319
+ return new LrMutation({
7320
+ mutation: SetDirectoryConfidentialMutation,
7321
+ variables: {
7322
+ input: {
7323
+ directoryId: options.directoryId,
7324
+ confidential: options.confidential,
7325
+ },
7326
+ },
7327
+ });
7328
+ });
7329
+ }
7312
7330
  // ------------------------------------------------------------------------------
7313
7331
  // ------------------------------------------------------------------------------
7314
7332
  // Helpers
@@ -10552,8 +10570,6 @@ class RecordService {
10552
10570
  ];
10553
10571
  })));
10554
10572
  const attachments = yield this.mapAttachments(record.attachments.edges);
10555
- const isOwner = record.accessRoles &&
10556
- record.accessRoles.some((x) => x.role === AccessLevel.Owner);
10557
10573
  return {
10558
10574
  id: record.id,
10559
10575
  keyId: record.keyId,
@@ -10564,18 +10580,8 @@ class RecordService {
10564
10580
  fields,
10565
10581
  categories,
10566
10582
  attachments,
10567
- myAccessLevel: isOwner ? AccessLevel.Owner : record.accessRoles[0].role,
10568
- sharedAccess: isOwner
10569
- ? record.accessRoles
10570
- .filter((x) => x.role !== AccessLevel.Owner)
10571
- .map((x) => ({
10572
- trustedPartyId: x.trustedParty && x.trustedParty.id,
10573
- accessLevel: x.role,
10574
- isInherited: x.method === 'inherited',
10575
- inheritedFrom: x.inheritedFrom && x.inheritedFrom.id,
10576
- }))
10577
- : [],
10578
10583
  isArchived: !!record.archived,
10584
+ isConfidential: record.confidentiality.isConfidential,
10579
10585
  createdOn: record.created,
10580
10586
  lastModified: new Date(record.modified) >
10581
10587
  new Date(contents.currentVersion.state.modified)
@@ -12528,5 +12534,5 @@ TwoFactorService.ctorParameters = () => [
12528
12534
  * Generated bundle index. Do not edit.
12529
12535
  */
12530
12536
 
12531
- export { AccessFields, AccessLevel, AccessRoleChoice, AccessRoleMethod, ApiContactCard, ApiCurrentUser, ArchiveDirectoryMutation, CancelUserDeleteMutation, Category, CategoryFields, CategoryFilter, CategoryMetaService, CategoryService, ClaimApproverState, ClaimState, CognitoChallengeUser, CommonProcessorsService, CompleteOtkMutation, Config, ContactCard2Service, ContactCardAddress, ContactCardName, CreateCategoryMutation, CreateContactCardMutation$1 as CreateContactCardMutation, CreateFileMutation, CreateFileQuery, CreateLbopQuery, CreateRecordContainerMutation, CreateRecordMutation, CreateVaultMutation, CurrentCategory, CurrentUser, CurrentUserKey, CurrentUserQuery, CurrentUserSharedKeyQuery, DEFAULT_BREADCRUMB_DEPTH, DEFAULT_DESCENDANTS_DEPTH, DefaultCategory, DefaultProcessorOptions, DefaultVaultFilter, DeleteCategoryMutation, DeleteFileMutation, DeleteLbopQuery, DeleteRecordMutation, DirectoryQuery, DirectoryType, FeatureAction, Features, FetchKeyGraphField, FileOperationField, FileQuery, FileType, FileUploadService, GetCategoriesQuery, GetCategoryKeyIdQuery, GetCategoryQuery, GetMySharedCategoriesQuery, GetRecordQuery, GetRootDirectoryIdsQuery, GetTrustedPartyCategoriesQuery, GetVaultsQuery, IdleService, InitiateOtkMutation, Item2Service, KeyExchange2Service, KeyExchangeFields, KeyExchangeMode, KeyExchangeOtkState, KeyExchangeQuery, KeyExchangeService, KeyExchangeState, KeyExchangeTokenQuery, KeyExchangesQuery, KeyGraphField, KeyGraphFragment, LR_CONFIG, LbopQuery, LbopService, LbopsQuery, LifeReadyAuthService, LifeReadyModule, LinkTypeField, LoadedCategoryTree, LockService, LockState, LoginHistoryQuery, LoginResult, LrApiErrorCode, LrApolloService, LrAuthException, LrBadArgumentException, LrBadLogicException, LrBadRequestException, LrBadStateException, LrCodeMismatchException, LrConcurrentAccessException, LrEncryptionException, LrError, LrErrorCode, LrException, LrExpiredCodeException, LrExpiredException, LrGraphQLService, LrLockedException, LrMergedMutation, LrMutation, LrMutationBase, LrNotFoundException, LrRecord, LrService, LrSuspiciousException, LrUnsupportedException, MainContactCard, MainContactCardFields, MainContactCardPlainFields, MainContactCardProperty, MessageService, MoveDirectoryQuery, MoveFileQuery, NewAttachment, NewCategory, NewOrUpdatedAttachment, NewRecord, NotificationService, OtkState, OwnerPlainDataJson, PassIdpApiResult, PasswordChangeStatus, PasswordCheck, PasswordService, PersistService, Plan, PlanService, PlanState, ProfileDetailsService, ProfileService, QueryProcessorService, RecordAttachment, RecordAttachmentFilter, RecordAttachmentService, RecordContentFilter, RecordField, RecordFieldType, RecordFilter, RecordService, RecordType, RecordTypeField, RecordTypeFieldOption, RecordTypeService, RecordTypeSummary, RecoveryStatus, RegisterResult, RegisterService, RequestUserDeleteMutation, RespondOtkMutation, RevertFileQuery, ScenarioLastClaimState, ScenarioService, ScenarioState, SharedAccess, SharedContactCard2Service, StripeBillingPortalSession, StripeCheckoutSession, Subscription, TpAssemblyState, TpClaimApproverState, TpClaimState, TpPasswordResetRequestService, TpPasswordResetService, TpPasswordResetUserService, TrustedParty2Service, TrustedPartyDetails, TwoFactorService, UnarchiveDirectoryMutation, UpdateCategoryMutation, UpdateContactCardMutation$1 as UpdateContactCardMutation, UpdateFileQuery, UpdateLbopQuery, UpdateRecordContainerMutation, UpdateRecordMutation, UpdatedCategory, UpdatedRecord, UserDeleteState, UserPlan, UserQuery, UserService, UserSharedKeyFields, Vault, VaultCategory, VaultFields, VaultRecord, VaultRecordType, awsFetch, configureAmplifyAuth, configureApollo, fragmentSpreadAstSelection, gqlTyped, handleApolloError, handleCognitoCallback, initialiseAuth, mapEdges, mapUserPlans, parentCategoriesField, processConnection, throwClaimIdMismatch, throwClaimNotApproved, ɵ0, KeyGraphService as ɵa, EncryptionService as ɵb, TimeService as ɵc, KeyService as ɵd, KeyFactoryService as ɵe, WebCryptoService as ɵf, KeyMetaService as ɵg, LrGraphQLService as ɵh, TpPasswordResetProcessorService as ɵi, RunOutsideAngular as ɵj, Slip39Service as ɵk, TpPasswordResetAssemblyController as ɵl, TpAssemblyController as ɵm, LrService as ɵn, SharedContactCardService as ɵo, TrustedPartyService as ɵp, ScenarioAssemblyController as ɵq, TpPasswordResetPrivateService as ɵr };
12537
+ export { AccessLevel, AccessRoleChoice, AccessRoleMethodChoice, ApiContactCard, ApiCurrentUser, ArchiveDirectoryMutation, CancelUserDeleteMutation, Category, CategoryFields, CategoryFilter, CategoryMetaService, CategoryService, ClaimApproverState, ClaimState, CognitoChallengeUser, CommonProcessorsService, CompleteOtkMutation, Config, ContactCard2Service, ContactCardAddress, ContactCardName, CreateCategoryMutation, CreateContactCardMutation$1 as CreateContactCardMutation, CreateFileMutation, CreateFileQuery, CreateLbopQuery, CreateRecordContainerMutation, CreateRecordMutation, CreateVaultMutation, CurrentCategory, CurrentUser, CurrentUserKey, CurrentUserQuery, CurrentUserSharedKeyQuery, DEFAULT_BREADCRUMB_DEPTH, DEFAULT_DESCENDANTS_DEPTH, DefaultCategory, DefaultProcessorOptions, DefaultVaultFilter, DeleteCategoryMutation, DeleteFileMutation, DeleteLbopQuery, DeleteRecordMutation, DirectoryQuery, DirectoryType, FeatureAction, Features, FetchKeyGraphField, FileOperationField, FileQuery, FileType, FileUploadService, GetCategoriesQuery, GetCategoryKeyIdQuery, GetCategoryQuery, GetMySharedCategoriesQuery, GetRecordQuery, GetRootDirectoryIdsQuery, GetTrustedPartyCategoriesQuery, GetVaultsQuery, IdleService, InitiateOtkMutation, Item2Service, KeyExchange2Service, KeyExchangeFields, KeyExchangeMode, KeyExchangeOtkState, KeyExchangeQuery, KeyExchangeService, KeyExchangeState, KeyExchangeTokenQuery, KeyExchangesQuery, KeyGraphField, KeyGraphFragment, LR_CONFIG, LbopQuery, LbopService, LbopsQuery, LifeReadyAuthService, LifeReadyModule, LinkTypeField, LoadedCategoryTree, LockService, LockState, LoginHistoryQuery, LoginResult, LrApiErrorCode, LrApolloService, LrAuthException, LrBadArgumentException, LrBadLogicException, LrBadRequestException, LrBadStateException, LrCodeMismatchException, LrConcurrentAccessException, LrEncryptionException, LrError, LrErrorCode, LrException, LrExpiredCodeException, LrExpiredException, LrGraphQLService, LrLockedException, LrMergedMutation, LrMutation, LrMutationBase, LrNotFoundException, LrRecord, LrService, LrSuspiciousException, LrUnsupportedException, MainContactCard, MainContactCardFields, MainContactCardPlainFields, MainContactCardProperty, MessageService, MoveDirectoryQuery, MoveFileQuery, NewAttachment, NewCategory, NewOrUpdatedAttachment, NewRecord, NotificationService, OtkState, OwnerPlainDataJson, PassIdpApiResult, PasswordChangeStatus, PasswordCheck, PasswordService, PermissionChoice, PersistService, Plan, PlanService, PlanState, ProfileDetailsService, ProfileService, QueryProcessorService, RecordAttachment, RecordAttachmentFilter, RecordAttachmentService, RecordContentFilter, RecordField, RecordFieldType, RecordFilter, RecordService, RecordType, RecordTypeField, RecordTypeFieldOption, RecordTypeService, RecordTypeSummary, RecoveryStatus, RegisterResult, RegisterService, RequestUserDeleteMutation, RespondOtkMutation, RevertFileQuery, ScenarioLastClaimState, ScenarioService, ScenarioState, SharedAccess, SharedContactCard2Service, StripeBillingPortalSession, StripeCheckoutSession, Subscription, TpAssemblyState, TpClaimApproverState, TpClaimState, TpPasswordResetRequestService, TpPasswordResetService, TpPasswordResetUserService, TrustedParty2Service, TrustedPartyDetails, TwoFactorService, UnarchiveDirectoryMutation, UpdateCategoryMutation, UpdateContactCardMutation$1 as UpdateContactCardMutation, UpdateFileQuery, UpdateLbopQuery, UpdateRecordContainerMutation, UpdateRecordMutation, UpdatedCategory, UpdatedRecord, UserDeleteState, UserPlan, UserQuery, UserService, UserSharedKeyFields, Vault, VaultCategory, VaultFields, VaultRecord, VaultRecordType, awsFetch, configureAmplifyAuth, configureApollo, fragmentSpreadAstSelection, gqlTyped, handleApolloError, handleCognitoCallback, initialiseAuth, mapEdges, mapUserPlans, parentCategoriesField, processConnection, throwClaimIdMismatch, throwClaimNotApproved, ɵ0, KeyGraphService as ɵa, EncryptionService as ɵb, TimeService as ɵc, KeyService as ɵd, KeyFactoryService as ɵe, WebCryptoService as ɵf, KeyMetaService as ɵg, LrGraphQLService as ɵh, TpPasswordResetProcessorService as ɵi, RunOutsideAngular as ɵj, Slip39Service as ɵk, TpPasswordResetAssemblyController as ɵl, TpAssemblyController as ɵm, LrService as ɵn, SharedContactCardService as ɵo, TrustedPartyService as ɵp, ScenarioAssemblyController as ɵq, TpPasswordResetPrivateService as ɵr };
12532
12538
  //# sourceMappingURL=lifeready-core.js.map