@lifeready/core 6.1.1 → 6.1.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/bundles/lifeready-core.umd.js +98 -142
- package/bundles/lifeready-core.umd.js.map +1 -1
- package/bundles/lifeready-core.umd.min.js +1 -1
- package/bundles/lifeready-core.umd.min.js.map +1 -1
- package/esm2015/lib/encryption/encryption.service.js +7 -6
- package/esm2015/lib/item2/item2.service.js +3 -2
- package/esm2015/lib/key/key-graph.service.js +3 -3
- package/esm2015/lib/key/key-meta.service.js +1 -57
- package/esm2015/lib/key/key.types.js +6 -1
- package/esm2015/lib/key-exchange/key-exchange2.gql.js +27 -25
- package/esm2015/lib/key-exchange/key-exchange2.service.js +1 -1
- package/esm2015/lib/profile/profile.gql.js +2 -64
- package/esm2015/public-api.js +2 -1
- package/fesm2015/lifeready-core.js +197 -309
- package/fesm2015/lifeready-core.js.map +1 -1
- package/lib/item2/item2.service.d.ts +1 -1
- package/lib/key/key.types.d.ts +4 -1
- package/lib/key-exchange/key-exchange2.gql.d.ts +27 -13
- package/lib/key-exchange/key-exchange2.service.d.ts +4 -4
- package/lib/profile/profile.gql.d.ts +0 -2
- package/lifeready-core.metadata.json +1 -1
- package/package.json +1 -1
- package/public-api.d.ts +1 -0
|
@@ -19,6 +19,22 @@ import { Keepalive, NgIdleKeepaliveModule } from '@ng-idle/keepalive';
|
|
|
19
19
|
import { Slip39Helper, Slip39 } from 'slip39';
|
|
20
20
|
import Auth from '@aws-amplify/auth';
|
|
21
21
|
|
|
22
|
+
var KeyGraphNodeType;
|
|
23
|
+
(function (KeyGraphNodeType) {
|
|
24
|
+
KeyGraphNodeType["Key"] = "key";
|
|
25
|
+
KeyGraphNodeType["PassKey"] = "passKey";
|
|
26
|
+
})(KeyGraphNodeType || (KeyGraphNodeType = {}));
|
|
27
|
+
var KeyGraphEdgeType;
|
|
28
|
+
(function (KeyGraphEdgeType) {
|
|
29
|
+
KeyGraphEdgeType["KeyLink"] = "keyLink";
|
|
30
|
+
KeyGraphEdgeType["PassKeyLink"] = "passKeyLink";
|
|
31
|
+
})(KeyGraphEdgeType || (KeyGraphEdgeType = {}));
|
|
32
|
+
var PayloadType;
|
|
33
|
+
(function (PayloadType) {
|
|
34
|
+
PayloadType["JSON"] = "JSON";
|
|
35
|
+
PayloadType["UINT_8_ARRAY"] = "UINT_8_ARRAY";
|
|
36
|
+
})(PayloadType || (PayloadType = {}));
|
|
37
|
+
|
|
22
38
|
function handleApolloError(errors) {
|
|
23
39
|
if (!errors || !errors.length)
|
|
24
40
|
return;
|
|
@@ -411,11 +427,11 @@ var JoseSerialization;
|
|
|
411
427
|
JoseSerialization["COMPACT"] = "COMPACT";
|
|
412
428
|
})(JoseSerialization || (JoseSerialization = {}));
|
|
413
429
|
const VERIFY_OPTIONS_DEFAULT = {
|
|
414
|
-
payloadType:
|
|
430
|
+
payloadType: PayloadType.JSON,
|
|
415
431
|
returnOnlyPayload: true,
|
|
416
432
|
};
|
|
417
433
|
const DECRYPT_OPTIONS_DEFAULT = {
|
|
418
|
-
payloadType:
|
|
434
|
+
payloadType: PayloadType.JSON,
|
|
419
435
|
returnOnlyPayload: true,
|
|
420
436
|
serializations: [JoseSerialization.JSON],
|
|
421
437
|
};
|
|
@@ -483,7 +499,7 @@ class EncryptionService {
|
|
|
483
499
|
}
|
|
484
500
|
});
|
|
485
501
|
}
|
|
486
|
-
// TODO rename this to encrypt() and use as the most common
|
|
502
|
+
// TODO rename this to encrypt() and use as the most common use case
|
|
487
503
|
encryptToString(key, content) {
|
|
488
504
|
return __awaiter(this, void 0, void 0, function* () {
|
|
489
505
|
return JSON.stringify(yield this.encrypt(key, content));
|
|
@@ -565,9 +581,9 @@ class EncryptionService {
|
|
|
565
581
|
}
|
|
566
582
|
decodePayload(payloadType, payload) {
|
|
567
583
|
switch (payloadType) {
|
|
568
|
-
case
|
|
584
|
+
case PayloadType.JSON:
|
|
569
585
|
return JSON.parse(new TextDecoder().decode(payload));
|
|
570
|
-
case
|
|
586
|
+
case PayloadType.UINT_8_ARRAY:
|
|
571
587
|
return payload;
|
|
572
588
|
default:
|
|
573
589
|
throw new KcBadArgumentException(`Unknown payloadType: ${payloadType}`);
|
|
@@ -1199,17 +1215,6 @@ KeyService.ctorParameters = () => [
|
|
|
1199
1215
|
{ type: PersistService }
|
|
1200
1216
|
];
|
|
1201
1217
|
|
|
1202
|
-
var KeyGraphNodeType;
|
|
1203
|
-
(function (KeyGraphNodeType) {
|
|
1204
|
-
KeyGraphNodeType["Key"] = "key";
|
|
1205
|
-
KeyGraphNodeType["PassKey"] = "passKey";
|
|
1206
|
-
})(KeyGraphNodeType || (KeyGraphNodeType = {}));
|
|
1207
|
-
var KeyGraphEdgeType;
|
|
1208
|
-
(function (KeyGraphEdgeType) {
|
|
1209
|
-
KeyGraphEdgeType["KeyLink"] = "keyLink";
|
|
1210
|
-
KeyGraphEdgeType["PassKeyLink"] = "passKeyLink";
|
|
1211
|
-
})(KeyGraphEdgeType || (KeyGraphEdgeType = {}));
|
|
1212
|
-
|
|
1213
1218
|
class KeyGraphService {
|
|
1214
1219
|
// private keyCache: {
|
|
1215
1220
|
// [id: string]: Key;
|
|
@@ -1431,7 +1436,7 @@ class KeyGraphService {
|
|
|
1431
1436
|
return __awaiter(this, void 0, void 0, function* () {
|
|
1432
1437
|
const key = yield this.getJwkKey(keyId);
|
|
1433
1438
|
return (yield this.encryptionService.decrypt(key, file, {
|
|
1434
|
-
payloadType:
|
|
1439
|
+
payloadType: PayloadType.UINT_8_ARRAY,
|
|
1435
1440
|
}));
|
|
1436
1441
|
});
|
|
1437
1442
|
}
|
|
@@ -3255,21 +3260,6 @@ class KeyMetaService {
|
|
|
3255
3260
|
this.keyService = keyService;
|
|
3256
3261
|
this.keyFactory = keyFactory;
|
|
3257
3262
|
}
|
|
3258
|
-
// async decryptFromString<T>(
|
|
3259
|
-
// keyOrId: string | Key,
|
|
3260
|
-
// cipherData: string,
|
|
3261
|
-
// options?: DecryptOptions
|
|
3262
|
-
// ): Promise<T> {
|
|
3263
|
-
// if (cipherData) {
|
|
3264
|
-
// const key = await this.keyGraphService.getJwkKey(keyOrId);
|
|
3265
|
-
// return (await this.encryptionService.decrypt(
|
|
3266
|
-
// key,
|
|
3267
|
-
// JSON.parse(cipherData),
|
|
3268
|
-
// options
|
|
3269
|
-
// )) as any;
|
|
3270
|
-
// }
|
|
3271
|
-
// return null;
|
|
3272
|
-
// }
|
|
3273
3263
|
decryptMeta(metaHaver) {
|
|
3274
3264
|
return __awaiter(this, void 0, void 0, function* () {
|
|
3275
3265
|
if (metaHaver.cipherMeta) {
|
|
@@ -3279,47 +3269,6 @@ class KeyMetaService {
|
|
|
3279
3269
|
return null;
|
|
3280
3270
|
});
|
|
3281
3271
|
}
|
|
3282
|
-
// async decryptFile(keyId: string, file: any): Promise<any> {
|
|
3283
|
-
// const key = await this.keyGraphService.getJwkKey(keyId);
|
|
3284
|
-
// return (await this.encryptionService.decrypt(key, file, {
|
|
3285
|
-
// payloadType: 'ArrayBuffer',
|
|
3286
|
-
// })) as any;
|
|
3287
|
-
// }
|
|
3288
|
-
// // TODO rename this to encrypt() and use as the most common usecase
|
|
3289
|
-
// async encryptToString(
|
|
3290
|
-
// key: string | Key | JWK.Key,
|
|
3291
|
-
// content: any
|
|
3292
|
-
// ): Promise<string> {
|
|
3293
|
-
// // Empty string should be encrypted since you want to clear the field.
|
|
3294
|
-
// // Null is not encrypted because it's not valid JSON in the old JSON spec. Use
|
|
3295
|
-
// // empty string instead. It'll function as a logic false as well.
|
|
3296
|
-
// // Note that passing in empty string means it'll be encrypted which verifies
|
|
3297
|
-
// // it's integrity. But we still want to have a way to set the DB field
|
|
3298
|
-
// // to NULL, so we explicitly return null when content == null. A null
|
|
3299
|
-
// // variable in graphql mutation on KC server clears the field to NULL.
|
|
3300
|
-
// if (content == null) {
|
|
3301
|
-
// return null;
|
|
3302
|
-
// }
|
|
3303
|
-
// const jwk =
|
|
3304
|
-
// asJwk(key) || (await this.keyGraphService.getJwkKey(key as string | Key));
|
|
3305
|
-
// return JSON.stringify(await this.encryptionService.encrypt(jwk, content));
|
|
3306
|
-
// }
|
|
3307
|
-
// // Wraps a symmetric encryption key.
|
|
3308
|
-
// // Throws exception if wrapping public keys.
|
|
3309
|
-
// async wrapKey<T>(
|
|
3310
|
-
// wrappingKey: string | Key | JWK.Key,
|
|
3311
|
-
// key: JWK.Key
|
|
3312
|
-
// ): Promise<string> {
|
|
3313
|
-
// if (!isSymmetricKey(key)) {
|
|
3314
|
-
// throw new LrBadArgumentException(
|
|
3315
|
-
// 'Only allowing wrapping of symmetric keys.'
|
|
3316
|
-
// );
|
|
3317
|
-
// }
|
|
3318
|
-
// return this.encryptToString(wrappingKey, key.toJSON(true));
|
|
3319
|
-
// }
|
|
3320
|
-
// // TODO
|
|
3321
|
-
// // async wrapPublicKey<T>();
|
|
3322
|
-
// // async wrapPrivateKey<T>();
|
|
3323
3272
|
doubleWrapContent(secureContent, categoryIds, fileContent) {
|
|
3324
3273
|
return __awaiter(this, void 0, void 0, function* () {
|
|
3325
3274
|
const key = yield this.keyFactory.createKey();
|
|
@@ -3429,6 +3378,179 @@ KeyMetaService.ctorParameters = () => [
|
|
|
3429
3378
|
{ type: KeyFactoryService }
|
|
3430
3379
|
];
|
|
3431
3380
|
|
|
3381
|
+
const KeyExchangeFields = `
|
|
3382
|
+
id
|
|
3383
|
+
token
|
|
3384
|
+
state
|
|
3385
|
+
mode
|
|
3386
|
+
isInitiator
|
|
3387
|
+
initiator {
|
|
3388
|
+
id
|
|
3389
|
+
username
|
|
3390
|
+
config
|
|
3391
|
+
}
|
|
3392
|
+
responder {
|
|
3393
|
+
id
|
|
3394
|
+
username
|
|
3395
|
+
}
|
|
3396
|
+
created
|
|
3397
|
+
modified
|
|
3398
|
+
tokenExpiryTime
|
|
3399
|
+
isExpired
|
|
3400
|
+
initiatorRootKeyCipher
|
|
3401
|
+
initiatorActionRequired
|
|
3402
|
+
responderActionRequired
|
|
3403
|
+
responderEmailAddress
|
|
3404
|
+
otk {
|
|
3405
|
+
state
|
|
3406
|
+
otKeyParams
|
|
3407
|
+
otKeyCipher
|
|
3408
|
+
sharedKey {
|
|
3409
|
+
id
|
|
3410
|
+
}
|
|
3411
|
+
mkSharedKey {
|
|
3412
|
+
id
|
|
3413
|
+
}
|
|
3414
|
+
initiatorSigPxk {
|
|
3415
|
+
id
|
|
3416
|
+
}
|
|
3417
|
+
responderSigPxk {
|
|
3418
|
+
id
|
|
3419
|
+
}
|
|
3420
|
+
initiatorOneTimePbkCipher
|
|
3421
|
+
responderPbkCipher
|
|
3422
|
+
}
|
|
3423
|
+
`;
|
|
3424
|
+
const UserSharedKeyFields = `
|
|
3425
|
+
userSigPrk {
|
|
3426
|
+
id
|
|
3427
|
+
}
|
|
3428
|
+
otherSigPbk {
|
|
3429
|
+
id
|
|
3430
|
+
}
|
|
3431
|
+
sharedKey {
|
|
3432
|
+
id
|
|
3433
|
+
}
|
|
3434
|
+
mkSharedKey {
|
|
3435
|
+
id
|
|
3436
|
+
}
|
|
3437
|
+
mkPxk {
|
|
3438
|
+
id
|
|
3439
|
+
pbk
|
|
3440
|
+
}
|
|
3441
|
+
mkReshareRequestCipher
|
|
3442
|
+
mkReshareResponseCipher
|
|
3443
|
+
mkReshareRequestSent
|
|
3444
|
+
mkReshareResponseSent
|
|
3445
|
+
`;
|
|
3446
|
+
const KeyExchangesQuery2 = gqlTyped `
|
|
3447
|
+
query KeyExchangesQuery2($state: String) {
|
|
3448
|
+
keyExchanges(state: $state) {
|
|
3449
|
+
edges {
|
|
3450
|
+
node {
|
|
3451
|
+
${KeyExchangeFields}
|
|
3452
|
+
}
|
|
3453
|
+
}
|
|
3454
|
+
}
|
|
3455
|
+
}
|
|
3456
|
+
`;
|
|
3457
|
+
const KeyExchangeQuery2 = gqlTyped `
|
|
3458
|
+
query KeyExchangeQuery2($id: LrRelayIdInput!) {
|
|
3459
|
+
keyExchange(id: $id) {
|
|
3460
|
+
${KeyExchangeFields}
|
|
3461
|
+
}
|
|
3462
|
+
}
|
|
3463
|
+
`;
|
|
3464
|
+
const KeyExchangeTokenQuery2 = gqlTyped `
|
|
3465
|
+
query KeyExchangeTokenQuery2($id: LrRelayIdInput!, $token: String) {
|
|
3466
|
+
keyExchange(id: $id, token: $token) {
|
|
3467
|
+
${KeyExchangeFields}
|
|
3468
|
+
}
|
|
3469
|
+
}
|
|
3470
|
+
`;
|
|
3471
|
+
const CancelKeyExchangeMutation = gqlTyped `
|
|
3472
|
+
mutation CancelKeyExchangeMutation($input: CancelKeyExchangeInput!) {
|
|
3473
|
+
cancelKeyExchange(input: $input) {
|
|
3474
|
+
keyExchange {
|
|
3475
|
+
id
|
|
3476
|
+
}
|
|
3477
|
+
}
|
|
3478
|
+
}
|
|
3479
|
+
`;
|
|
3480
|
+
const DeclineKeyExchangeMutation = gqlTyped `
|
|
3481
|
+
mutation DeclineKeyExchangeMutation($input: DeclineKeyExchangeInput!) {
|
|
3482
|
+
declineKeyExchange(input: $input) {
|
|
3483
|
+
keyExchange {
|
|
3484
|
+
id
|
|
3485
|
+
}
|
|
3486
|
+
}
|
|
3487
|
+
}
|
|
3488
|
+
`;
|
|
3489
|
+
const InitiateKeyExchangeOtkMutation = gqlTyped `
|
|
3490
|
+
mutation InitiateKeyExchangeOtkMutation(
|
|
3491
|
+
$input: InitiateKeyExchangeOtkInput!
|
|
3492
|
+
) {
|
|
3493
|
+
initiateKeyExchangeOtk(input: $input) {
|
|
3494
|
+
keyExchange {
|
|
3495
|
+
${KeyExchangeFields}
|
|
3496
|
+
}
|
|
3497
|
+
}
|
|
3498
|
+
}
|
|
3499
|
+
`;
|
|
3500
|
+
const RespondKeyExchangeOtkMutation = gqlTyped `
|
|
3501
|
+
mutation RespondKeyExchangeOtkMutation($input: RespondKeyExchangeOtkInput!) {
|
|
3502
|
+
respondKeyExchangeOtk(input: $input) {
|
|
3503
|
+
keyExchange {
|
|
3504
|
+
${KeyExchangeFields}
|
|
3505
|
+
}
|
|
3506
|
+
userSharedKey {
|
|
3507
|
+
${UserSharedKeyFields}
|
|
3508
|
+
}
|
|
3509
|
+
tp {
|
|
3510
|
+
id
|
|
3511
|
+
user {
|
|
3512
|
+
config
|
|
3513
|
+
}
|
|
3514
|
+
}
|
|
3515
|
+
}
|
|
3516
|
+
}
|
|
3517
|
+
`;
|
|
3518
|
+
const CompleteKeyExchangeOtkMutation = gqlTyped `
|
|
3519
|
+
mutation CompleteKeyExchangeOtkMutation(
|
|
3520
|
+
$input: CompleteKeyExchangeOtkInput!
|
|
3521
|
+
) {
|
|
3522
|
+
completeKeyExchangeOtk(input: $input) {
|
|
3523
|
+
keyExchange {
|
|
3524
|
+
${KeyExchangeFields}
|
|
3525
|
+
}
|
|
3526
|
+
userSharedKey {
|
|
3527
|
+
${UserSharedKeyFields}
|
|
3528
|
+
}
|
|
3529
|
+
tp {
|
|
3530
|
+
id
|
|
3531
|
+
user {
|
|
3532
|
+
config
|
|
3533
|
+
}
|
|
3534
|
+
}
|
|
3535
|
+
}
|
|
3536
|
+
}
|
|
3537
|
+
`;
|
|
3538
|
+
const CurrentUserSharedKeyQuery2 = gqlTyped `
|
|
3539
|
+
query CurrentUserSharedKeyQuery2(
|
|
3540
|
+
$username: String
|
|
3541
|
+
$userId: LrRelayIdInput
|
|
3542
|
+
) {
|
|
3543
|
+
currentUserSharedKey(
|
|
3544
|
+
username: $username
|
|
3545
|
+
userId: $userId
|
|
3546
|
+
) {
|
|
3547
|
+
userSharedKey {
|
|
3548
|
+
${UserSharedKeyFields}
|
|
3549
|
+
}
|
|
3550
|
+
}
|
|
3551
|
+
}
|
|
3552
|
+
`;
|
|
3553
|
+
|
|
3432
3554
|
var FeatureAction;
|
|
3433
3555
|
(function (FeatureAction) {
|
|
3434
3556
|
// Just the one for now
|
|
@@ -3588,69 +3710,6 @@ SharedContactCardService.ctorParameters = () => [
|
|
|
3588
3710
|
];
|
|
3589
3711
|
|
|
3590
3712
|
/* eslint-disable @typescript-eslint/no-explicit-any */
|
|
3591
|
-
const UserSharedKeyFields = `
|
|
3592
|
-
userSigPrk {
|
|
3593
|
-
id
|
|
3594
|
-
}
|
|
3595
|
-
otherSigPbk {
|
|
3596
|
-
id
|
|
3597
|
-
}
|
|
3598
|
-
sharedKey {
|
|
3599
|
-
id
|
|
3600
|
-
}
|
|
3601
|
-
mkSharedKey {
|
|
3602
|
-
id
|
|
3603
|
-
}
|
|
3604
|
-
mkPxk {
|
|
3605
|
-
id
|
|
3606
|
-
pbk
|
|
3607
|
-
}
|
|
3608
|
-
mkReshareRequestCipher
|
|
3609
|
-
mkReshareResponseCipher
|
|
3610
|
-
mkReshareRequestSent
|
|
3611
|
-
mkReshareResponseSent
|
|
3612
|
-
`;
|
|
3613
|
-
const KeyExchangeFields = `
|
|
3614
|
-
id
|
|
3615
|
-
token
|
|
3616
|
-
state
|
|
3617
|
-
mode
|
|
3618
|
-
isInitiator
|
|
3619
|
-
initiator {
|
|
3620
|
-
id
|
|
3621
|
-
username
|
|
3622
|
-
}
|
|
3623
|
-
responder {
|
|
3624
|
-
id
|
|
3625
|
-
username
|
|
3626
|
-
}
|
|
3627
|
-
created
|
|
3628
|
-
modified
|
|
3629
|
-
tokenExpiryTime
|
|
3630
|
-
isExpired
|
|
3631
|
-
initiatorRootKeyCipher
|
|
3632
|
-
initiatorActionRequired
|
|
3633
|
-
responderActionRequired
|
|
3634
|
-
responderEmailAddress
|
|
3635
|
-
otk {
|
|
3636
|
-
state
|
|
3637
|
-
otKeyParams
|
|
3638
|
-
otKeyCipher
|
|
3639
|
-
sharedKey {
|
|
3640
|
-
id
|
|
3641
|
-
}
|
|
3642
|
-
mkSharedKey {
|
|
3643
|
-
id
|
|
3644
|
-
}
|
|
3645
|
-
initiatorSigPxk {
|
|
3646
|
-
id
|
|
3647
|
-
}
|
|
3648
|
-
responderSigPxk {
|
|
3649
|
-
id
|
|
3650
|
-
}
|
|
3651
|
-
initiatorOneTimePbkCipher
|
|
3652
|
-
responderPbkCipher
|
|
3653
|
-
}`;
|
|
3654
3713
|
const TrustedPartyProperties = `
|
|
3655
3714
|
id
|
|
3656
3715
|
user {
|
|
@@ -6100,7 +6159,7 @@ let Item2Service = Item2Service_1 = class Item2Service extends LrService {
|
|
|
6100
6159
|
const fileContent = yield this.fileUploadService.downloadEncryptedFile(options.fileStateNodeId);
|
|
6101
6160
|
const fileStateKey = yield this.keyGraph.getKey(options.fileStateKeyId, () => this.getFileStateKeyId(options.fileStateNodeId));
|
|
6102
6161
|
return this.keyGraph.decryptFromString(fileStateKey, fileContent, {
|
|
6103
|
-
payloadType:
|
|
6162
|
+
payloadType: PayloadType.UINT_8_ARRAY,
|
|
6104
6163
|
});
|
|
6105
6164
|
});
|
|
6106
6165
|
}
|
|
@@ -6649,177 +6708,6 @@ Item2Service = Item2Service_1 = __decorate([
|
|
|
6649
6708
|
})
|
|
6650
6709
|
], Item2Service);
|
|
6651
6710
|
|
|
6652
|
-
const KeyExchangeFragment = gqlTyped `
|
|
6653
|
-
fragment KeyExchangeFragment on KeyExchangeNode {
|
|
6654
|
-
id
|
|
6655
|
-
token
|
|
6656
|
-
state
|
|
6657
|
-
mode
|
|
6658
|
-
isInitiator
|
|
6659
|
-
initiator {
|
|
6660
|
-
id
|
|
6661
|
-
username
|
|
6662
|
-
config
|
|
6663
|
-
}
|
|
6664
|
-
responder {
|
|
6665
|
-
id
|
|
6666
|
-
username
|
|
6667
|
-
}
|
|
6668
|
-
created
|
|
6669
|
-
modified
|
|
6670
|
-
tokenExpiryTime
|
|
6671
|
-
isExpired
|
|
6672
|
-
initiatorRootKeyCipher
|
|
6673
|
-
initiatorActionRequired
|
|
6674
|
-
responderActionRequired
|
|
6675
|
-
responderEmailAddress
|
|
6676
|
-
otk {
|
|
6677
|
-
state
|
|
6678
|
-
otKeyParams
|
|
6679
|
-
otKeyCipher
|
|
6680
|
-
sharedKey {
|
|
6681
|
-
id
|
|
6682
|
-
}
|
|
6683
|
-
mkSharedKey {
|
|
6684
|
-
id
|
|
6685
|
-
}
|
|
6686
|
-
initiatorSigPxk {
|
|
6687
|
-
id
|
|
6688
|
-
}
|
|
6689
|
-
responderSigPxk {
|
|
6690
|
-
id
|
|
6691
|
-
}
|
|
6692
|
-
initiatorOneTimePbkCipher
|
|
6693
|
-
responderPbkCipher
|
|
6694
|
-
}
|
|
6695
|
-
}
|
|
6696
|
-
`;
|
|
6697
|
-
const UserSharedKeyFragment = gqlTyped `
|
|
6698
|
-
fragment UserSharedKeyFragment on UserSharedKeyNode {
|
|
6699
|
-
userSigPrk {
|
|
6700
|
-
id
|
|
6701
|
-
}
|
|
6702
|
-
otherSigPbk {
|
|
6703
|
-
id
|
|
6704
|
-
}
|
|
6705
|
-
sharedKey {
|
|
6706
|
-
id
|
|
6707
|
-
}
|
|
6708
|
-
mkSharedKey {
|
|
6709
|
-
id
|
|
6710
|
-
}
|
|
6711
|
-
}`;
|
|
6712
|
-
const KeyExchangesQuery2 = gqlTyped `
|
|
6713
|
-
query KeyExchangesQuery2($state: String) {
|
|
6714
|
-
keyExchanges(state: $state) {
|
|
6715
|
-
edges {
|
|
6716
|
-
node {
|
|
6717
|
-
...KeyExchangeFragment
|
|
6718
|
-
}
|
|
6719
|
-
}
|
|
6720
|
-
}
|
|
6721
|
-
}
|
|
6722
|
-
${KeyExchangeFragment}
|
|
6723
|
-
`;
|
|
6724
|
-
const KeyExchangeQuery2 = gqlTyped `
|
|
6725
|
-
query KeyExchangeQuery2($id: LrRelayIdInput!) {
|
|
6726
|
-
keyExchange(id: $id) {
|
|
6727
|
-
...KeyExchangeFragment
|
|
6728
|
-
}
|
|
6729
|
-
}
|
|
6730
|
-
${KeyExchangeFragment}
|
|
6731
|
-
`;
|
|
6732
|
-
const KeyExchangeTokenQuery2 = gqlTyped `
|
|
6733
|
-
query KeyExchangeTokenQuery2($id: LrRelayIdInput!, $token: String) {
|
|
6734
|
-
keyExchange(id: $id, token: $token) {
|
|
6735
|
-
...KeyExchangeFragment
|
|
6736
|
-
}
|
|
6737
|
-
}
|
|
6738
|
-
${KeyExchangeFragment}
|
|
6739
|
-
`;
|
|
6740
|
-
const CancelKeyExchangeMutation = gqlTyped `
|
|
6741
|
-
mutation CancelKeyExchangeMutation($input: CancelKeyExchangeInput!) {
|
|
6742
|
-
cancelKeyExchange(input: $input) {
|
|
6743
|
-
keyExchange {
|
|
6744
|
-
id
|
|
6745
|
-
}
|
|
6746
|
-
}
|
|
6747
|
-
}
|
|
6748
|
-
`;
|
|
6749
|
-
const DeclineKeyExchangeMutation = gqlTyped `
|
|
6750
|
-
mutation DeclineKeyExchangeMutation($input: DeclineKeyExchangeInput!) {
|
|
6751
|
-
declineKeyExchange(input: $input) {
|
|
6752
|
-
keyExchange {
|
|
6753
|
-
id
|
|
6754
|
-
}
|
|
6755
|
-
}
|
|
6756
|
-
}
|
|
6757
|
-
`;
|
|
6758
|
-
const InitiateKeyExchangeOtkMutation = gqlTyped `
|
|
6759
|
-
mutation InitiateKeyExchangeOtkMutation(
|
|
6760
|
-
$input: InitiateKeyExchangeOtkInput!
|
|
6761
|
-
) {
|
|
6762
|
-
initiateKeyExchangeOtk(input: $input) {
|
|
6763
|
-
keyExchange {
|
|
6764
|
-
...KeyExchangeFragment
|
|
6765
|
-
}
|
|
6766
|
-
}
|
|
6767
|
-
}
|
|
6768
|
-
${KeyExchangeFragment}
|
|
6769
|
-
`;
|
|
6770
|
-
const RespondKeyExchangeOtkMutation = gqlTyped `
|
|
6771
|
-
mutation RespondKeyExchangeOtkMutation($input: RespondKeyExchangeOtkInput!) {
|
|
6772
|
-
respondKeyExchangeOtk(input: $input) {
|
|
6773
|
-
keyExchange {
|
|
6774
|
-
...KeyExchangeFragment
|
|
6775
|
-
}
|
|
6776
|
-
userSharedKey {
|
|
6777
|
-
...UserSharedKeyFragment
|
|
6778
|
-
}
|
|
6779
|
-
tp {
|
|
6780
|
-
id
|
|
6781
|
-
}
|
|
6782
|
-
}
|
|
6783
|
-
}
|
|
6784
|
-
${KeyExchangeFragment}
|
|
6785
|
-
${UserSharedKeyFragment}
|
|
6786
|
-
`;
|
|
6787
|
-
const CompleteKeyExchangeOtkMutation = gqlTyped `
|
|
6788
|
-
mutation CompleteKeyExchangeOtkMutation(
|
|
6789
|
-
$input: CompleteKeyExchangeOtkInput!
|
|
6790
|
-
) {
|
|
6791
|
-
completeKeyExchangeOtk(input: $input) {
|
|
6792
|
-
keyExchange {
|
|
6793
|
-
...KeyExchangeFragment
|
|
6794
|
-
}
|
|
6795
|
-
userSharedKey {
|
|
6796
|
-
...UserSharedKeyFragment
|
|
6797
|
-
}
|
|
6798
|
-
tp {
|
|
6799
|
-
id
|
|
6800
|
-
}
|
|
6801
|
-
}
|
|
6802
|
-
}
|
|
6803
|
-
${KeyExchangeFragment}
|
|
6804
|
-
${UserSharedKeyFragment}
|
|
6805
|
-
`;
|
|
6806
|
-
const CurrentUserSharedKeyQuery2 = gqlTyped `
|
|
6807
|
-
query CurrentUserSharedKeyQuery2(
|
|
6808
|
-
$username: String
|
|
6809
|
-
$userId: LrRelayIdInput
|
|
6810
|
-
) {
|
|
6811
|
-
currentUserSharedKey(
|
|
6812
|
-
username: $username
|
|
6813
|
-
userId: $userId
|
|
6814
|
-
) {
|
|
6815
|
-
userSharedKey {
|
|
6816
|
-
...UserSharedKeyFragment
|
|
6817
|
-
}
|
|
6818
|
-
}
|
|
6819
|
-
}
|
|
6820
|
-
${UserSharedKeyFragment}
|
|
6821
|
-
`;
|
|
6822
|
-
|
|
6823
6711
|
let KeyExchange2Service = class KeyExchange2Service extends LrService {
|
|
6824
6712
|
constructor(ngZone, injector, keyFactory, keyService, encryptionService, keyGraph) {
|
|
6825
6713
|
super(injector);
|
|
@@ -10607,5 +10495,5 @@ UserService.ctorParameters = () => [
|
|
|
10607
10495
|
* Generated bundle index. Do not edit.
|
|
10608
10496
|
*/
|
|
10609
10497
|
|
|
10610
|
-
export { AccessRoleChoice, AccessRoleMethodChoice, ApiContactCard, ApiCurrentUser, Auth2Service, auth2_types as AuthTypes, CancelUserDeleteMutation, ClaimApproverState, ClaimState, CommonProcessorsService, Config, ContactCard2Service, ContactCardAddress, ContactCardName, ContactCardsQuery, CreateContactCardMutation$1 as CreateContactCardMutation, CreateFileQuery, CreateLbopQuery, CurrentUserKey, CurrentUserQuery, DefaultProcessorOptions, DeleteLbopQuery, DirectoryQuery, ERROR_SOURCE, FeatureAction, Features, FetchKeyGraphField, FileOperationField, FileQuery, FileUploadService, IdleService, Item2Service, KC_CONFIG, KcAuthException, KcBadArgumentException, KcBadLogicException, KcBadRequestException, KcBadSignatureException, KcBadStateException, KcBadTimeSyncException, KcCodeMismatchException, KcConcurrentAccessException, KcEncryptionException, KcError, KcErrorCode, KcException, KcInternalErrorException, KcLbopErrorCode, KcLockedException, KcNotFoundException, KcSuspiciousOperationException, KcUnsupportedException, KeyExchange2Service, KeyExchangeFields, KeyExchangeMode, KeyExchangeOtkState, KeyExchangeState, KeyGraphField, KeyGraphFragment, LbopQuery, LbopService, LbopsQuery, LifeReadyModule, LinkTypeField, LockService, LockState, LoginHistoryQuery, LrApolloService, LrGraphQLService, LrMergedMutation, LrMutation, LrMutationBase, LrService, MainContactCardFields, MainContactCardPlainFields, MainContactCardProperty, MoveDirectoryQuery, MoveFileQuery, NotificationService, OwnerPlainDataJson, PassIdpApiResult, PasswordChangeStatus, PasswordCheck, PasswordService, PermissionChoice, PersistService, Plan2Service, PlanState, PlanStateField, ProfileDetailsService, ProfileService, QueryProcessorService, RegisterService, ReminderService, RequestUserDeleteMutation, RevertFileQuery, ScenarioLastClaimState, ScenarioService, ScenarioState, ServerConfigService, ServerTimeQuery, SharedContactCard2Service, SharedTrustedPartyDetails, SharedVaultFeature, TPFeatures, TimeService, TpAssemblyState, TpClaimApproverState, TpClaimState, TpPasswordResetRequestService, TpPasswordResetService, TpPasswordResetUserService, TrustedPartiesQuery, TrustedParty, TrustedParty2Service, TrustedPartyDetails, TrustedPartyProperties, TrustedPartyType, TwoFactorService, UpdateContactCardMutation$1 as UpdateContactCardMutation, UpdateFileQuery, UpdateLbopQuery, UserDeleteState, UserService, UserSharedKeyFields, WebCryptoService, awsFetch, configureAmplifyAuth, configureApollo, fragmentSpreadAstSelection, gqlTyped, handleApolloError, handleCognitoCallback, httpOptions, mapEdges, processConnection, throwClaimIdMismatch, throwClaimNotApproved, KeyGraphService as ɵa, EncryptionService as ɵb, KeyService as ɵc, KeyFactoryService as ɵd, LrService as ɵe, RunOutsideAngular as ɵf, LrGraphQLService as ɵg, KeyMetaService as ɵh, TpPasswordResetAssemblyController as ɵi, TpAssemblyController as ɵj, SharedContactCardFields as ɵk, SharedContactCardService as ɵl, ScenarioAssemblyController as ɵm, TpPasswordResetPrivateService as ɵn };
|
|
10498
|
+
export { AccessRoleChoice, AccessRoleMethodChoice, ApiContactCard, ApiCurrentUser, Auth2Service, auth2_types as AuthTypes, CancelKeyExchangeMutation, CancelUserDeleteMutation, ClaimApproverState, ClaimState, CommonProcessorsService, CompleteKeyExchangeOtkMutation, Config, ContactCard2Service, ContactCardAddress, ContactCardName, ContactCardsQuery, CreateContactCardMutation$1 as CreateContactCardMutation, CreateFileQuery, CreateLbopQuery, CurrentUserKey, CurrentUserQuery, CurrentUserSharedKeyQuery2, DeclineKeyExchangeMutation, DefaultProcessorOptions, DeleteLbopQuery, DirectoryQuery, ERROR_SOURCE, FeatureAction, Features, FetchKeyGraphField, FileOperationField, FileQuery, FileUploadService, IdleService, InitiateKeyExchangeOtkMutation, Item2Service, KC_CONFIG, KcAuthException, KcBadArgumentException, KcBadLogicException, KcBadRequestException, KcBadSignatureException, KcBadStateException, KcBadTimeSyncException, KcCodeMismatchException, KcConcurrentAccessException, KcEncryptionException, KcError, KcErrorCode, KcException, KcInternalErrorException, KcLbopErrorCode, KcLockedException, KcNotFoundException, KcSuspiciousOperationException, KcUnsupportedException, KeyExchange2Service, KeyExchangeFields, KeyExchangeMode, KeyExchangeOtkState, KeyExchangeQuery2, KeyExchangeState, KeyExchangeTokenQuery2, KeyExchangesQuery2, KeyGraphField, KeyGraphFragment, LbopQuery, LbopService, LbopsQuery, LifeReadyModule, LinkTypeField, LockService, LockState, LoginHistoryQuery, LrApolloService, LrGraphQLService, LrMergedMutation, LrMutation, LrMutationBase, LrService, MainContactCardFields, MainContactCardPlainFields, MainContactCardProperty, MoveDirectoryQuery, MoveFileQuery, NotificationService, OwnerPlainDataJson, PassIdpApiResult, PasswordChangeStatus, PasswordCheck, PasswordService, PermissionChoice, PersistService, Plan2Service, PlanState, PlanStateField, ProfileDetailsService, ProfileService, QueryProcessorService, RegisterService, ReminderService, RequestUserDeleteMutation, RespondKeyExchangeOtkMutation, RevertFileQuery, ScenarioLastClaimState, ScenarioService, ScenarioState, ServerConfigService, ServerTimeQuery, SharedContactCard2Service, SharedTrustedPartyDetails, SharedVaultFeature, TPFeatures, TimeService, TpAssemblyState, TpClaimApproverState, TpClaimState, TpPasswordResetRequestService, TpPasswordResetService, TpPasswordResetUserService, TrustedPartiesQuery, TrustedParty, TrustedParty2Service, TrustedPartyDetails, TrustedPartyProperties, TrustedPartyType, TwoFactorService, UpdateContactCardMutation$1 as UpdateContactCardMutation, UpdateFileQuery, UpdateLbopQuery, UserDeleteState, UserService, UserSharedKeyFields, WebCryptoService, awsFetch, configureAmplifyAuth, configureApollo, fragmentSpreadAstSelection, gqlTyped, handleApolloError, handleCognitoCallback, httpOptions, mapEdges, processConnection, throwClaimIdMismatch, throwClaimNotApproved, KeyGraphService as ɵa, EncryptionService as ɵb, KeyService as ɵc, KeyFactoryService as ɵd, LrService as ɵe, RunOutsideAngular as ɵf, LrGraphQLService as ɵg, KeyMetaService as ɵh, TpPasswordResetAssemblyController as ɵi, TpAssemblyController as ɵj, SharedContactCardFields as ɵk, SharedContactCardService as ɵl, ScenarioAssemblyController as ɵm, TpPasswordResetPrivateService as ɵn };
|
|
10611
10499
|
//# sourceMappingURL=lifeready-core.js.map
|