@lifeready/core 6.1.3 → 6.1.4
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/bundles/lifeready-core.umd.js +301 -293
- package/bundles/lifeready-core.umd.js.map +1 -1
- package/bundles/lifeready-core.umd.min.js +1 -1
- package/bundles/lifeready-core.umd.min.js.map +1 -1
- package/esm2015/lib/auth/auth.config.js +57 -0
- package/esm2015/lib/auth/auth.gql.private.js +85 -0
- package/esm2015/lib/auth/auth.service.js +602 -0
- package/esm2015/lib/auth/auth.types.js +21 -0
- package/esm2015/lib/item/item.gql.js +164 -0
- package/esm2015/lib/item/item.gql.private.js +23 -0
- package/esm2015/lib/item/item.service.js +592 -0
- package/esm2015/lib/item/item.types.js +2 -0
- package/esm2015/lib/key-exchange/key-exchange.gql.js +174 -0
- package/esm2015/lib/key-exchange/key-exchange.service.js +480 -0
- package/esm2015/lib/lbop/lbop.service.js +7 -15
- package/esm2015/lib/life-ready.module.js +2 -2
- package/esm2015/lib/password/password.service.js +1 -1
- package/esm2015/lib/plan/plan.gql.js +91 -0
- package/esm2015/lib/plan/plan.service.js +191 -0
- package/esm2015/lib/plan/plan.types.js +2 -0
- package/esm2015/lib/profile/profile.gql.js +2 -2
- package/esm2015/lib/profile/profile.service.js +1 -8
- package/esm2015/lib/profile/profile.types.js +1 -8
- package/esm2015/lib/scenario/scenario.service.js +8 -8
- package/esm2015/lib/shared-contact-card/shared-contact-card2.service.js +1 -1
- package/esm2015/lib/trusted-party/trusted-party.gql.js +64 -0
- package/esm2015/lib/trusted-party/trusted-party.gql.private.js +25 -0
- package/esm2015/lib/trusted-party/trusted-party.service.js +240 -0
- package/esm2015/lib/trusted-party/trusted-party.types.js +2 -0
- package/esm2015/public-api.js +17 -12
- package/fesm2015/lifeready-core.js +189 -211
- package/fesm2015/lifeready-core.js.map +1 -1
- package/lib/{auth2/auth2.service.d.ts → auth/auth.service.d.ts} +2 -2
- package/lib/{item2/item2.service.d.ts → item/item.service.d.ts} +39 -39
- package/lib/key-exchange/{key-exchange2.service.d.ts → key-exchange.service.d.ts} +2 -2
- package/lib/lbop/lbop.service.d.ts +1 -5
- package/lib/password/password.service.d.ts +1 -1
- package/lib/{plan2/plan2.service.d.ts → plan/plan.service.d.ts} +20 -20
- package/lib/profile/profile.service.d.ts +1 -2
- package/lib/profile/profile.types.d.ts +2 -15
- package/lib/scenario/scenario.service.d.ts +3 -3
- package/lib/shared-contact-card/shared-contact-card2.service.d.ts +1 -1
- package/lib/trusted-party/{trusted-party2.service.d.ts → trusted-party.service.d.ts} +6 -6
- package/lifeready-core.metadata.json +1 -1
- package/package.json +1 -1
- package/public-api.d.ts +16 -11
- package/esm2015/lib/auth2/auth.config.js +0 -57
- package/esm2015/lib/auth2/auth2.gql.private.js +0 -85
- package/esm2015/lib/auth2/auth2.service.js +0 -602
- package/esm2015/lib/auth2/auth2.types.js +0 -21
- package/esm2015/lib/item2/item2.gql.js +0 -164
- package/esm2015/lib/item2/item2.gql.private.js +0 -23
- package/esm2015/lib/item2/item2.service.js +0 -592
- package/esm2015/lib/item2/item2.types.js +0 -2
- package/esm2015/lib/key-exchange/key-exchange2.gql.js +0 -174
- package/esm2015/lib/key-exchange/key-exchange2.service.js +0 -480
- package/esm2015/lib/plan2/plan2.gql.js +0 -91
- package/esm2015/lib/plan2/plan2.service.js +0 -191
- package/esm2015/lib/plan2/plan2.types.js +0 -2
- package/esm2015/lib/trusted-party/trusted-party2.gql.js +0 -64
- package/esm2015/lib/trusted-party/trusted-party2.gql.private.js +0 -25
- package/esm2015/lib/trusted-party/trusted-party2.service.js +0 -240
- package/esm2015/lib/trusted-party/trusted-party2.types.js +0 -2
- /package/lib/{auth2 → auth}/auth.config.d.ts +0 -0
- /package/lib/{auth2/auth2.gql.private.d.ts → auth/auth.gql.private.d.ts} +0 -0
- /package/lib/{auth2/auth2.types.d.ts → auth/auth.types.d.ts} +0 -0
- /package/lib/{item2/item2.gql.d.ts → item/item.gql.d.ts} +0 -0
- /package/lib/{item2/item2.gql.private.d.ts → item/item.gql.private.d.ts} +0 -0
- /package/lib/{item2/item2.types.d.ts → item/item.types.d.ts} +0 -0
- /package/lib/key-exchange/{key-exchange2.gql.d.ts → key-exchange.gql.d.ts} +0 -0
- /package/lib/{plan2/plan2.gql.d.ts → plan/plan.gql.d.ts} +0 -0
- /package/lib/{plan2/plan2.types.d.ts → plan/plan.types.d.ts} +0 -0
- /package/lib/trusted-party/{trusted-party2.gql.d.ts → trusted-party.gql.d.ts} +0 -0
- /package/lib/trusted-party/{trusted-party2.gql.private.d.ts → trusted-party.gql.private.d.ts} +0 -0
- /package/lib/trusted-party/{trusted-party2.types.d.ts → trusted-party.types.d.ts} +0 -0
|
@@ -3580,13 +3580,6 @@ class MainContactCardFields {
|
|
|
3580
3580
|
}
|
|
3581
3581
|
class MainContactCardPlainFields {
|
|
3582
3582
|
}
|
|
3583
|
-
var PasswordChangeStatus;
|
|
3584
|
-
(function (PasswordChangeStatus) {
|
|
3585
|
-
PasswordChangeStatus["InProgress"] = "IN_PROGRESS";
|
|
3586
|
-
PasswordChangeStatus["Recovery"] = "RECOVERY";
|
|
3587
|
-
})(PasswordChangeStatus || (PasswordChangeStatus = {}));
|
|
3588
|
-
class PassIdpApiResult {
|
|
3589
|
-
}
|
|
3590
3583
|
class TrustedPartyDetails {
|
|
3591
3584
|
}
|
|
3592
3585
|
class SharedTrustedPartyDetails extends TrustedPartyDetails {
|
|
@@ -3884,13 +3877,6 @@ class ProfileService {
|
|
|
3884
3877
|
this.keyGraph = keyGraph;
|
|
3885
3878
|
this.encryptionService = encryptionService;
|
|
3886
3879
|
}
|
|
3887
|
-
getPassIdpParams(emailOrPhone) {
|
|
3888
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
3889
|
-
return yield this.http
|
|
3890
|
-
.get(`${this.config.authUrl}users/pass-idp-params/?login_name=${encodeURIComponent(emailOrPhone)}`)
|
|
3891
|
-
.toPromise();
|
|
3892
|
-
});
|
|
3893
|
-
}
|
|
3894
3880
|
getCurrentUser() {
|
|
3895
3881
|
return __awaiter(this, void 0, void 0, function* () {
|
|
3896
3882
|
const { currentUser, contactCards } = yield this.lrApollo.query({
|
|
@@ -5098,11 +5084,11 @@ var RecoveryStatus;
|
|
|
5098
5084
|
})(RecoveryStatus || (RecoveryStatus = {}));
|
|
5099
5085
|
// TODO restrict this type
|
|
5100
5086
|
// export type AuthResetUser = TpPasswordResetUserNode;
|
|
5101
|
-
var PasswordChangeStatus
|
|
5087
|
+
var PasswordChangeStatus;
|
|
5102
5088
|
(function (PasswordChangeStatus) {
|
|
5103
5089
|
PasswordChangeStatus["IN_PROGRESS"] = "IN_PROGRESS";
|
|
5104
5090
|
PasswordChangeStatus["RECOVERY"] = "RECOVERY";
|
|
5105
|
-
})(PasswordChangeStatus
|
|
5091
|
+
})(PasswordChangeStatus || (PasswordChangeStatus = {}));
|
|
5106
5092
|
var CognitoChallengeName;
|
|
5107
5093
|
(function (CognitoChallengeName) {
|
|
5108
5094
|
CognitoChallengeName["NEW_PASSWORD_REQUIRED"] = "NEW_PASSWORD_REQUIRED";
|
|
@@ -5111,15 +5097,8 @@ var CognitoChallengeName;
|
|
|
5111
5097
|
CognitoChallengeName["MFA_SETUP"] = "MFA_SETUP";
|
|
5112
5098
|
})(CognitoChallengeName || (CognitoChallengeName = {}));
|
|
5113
5099
|
|
|
5114
|
-
var
|
|
5115
|
-
|
|
5116
|
-
get RecoveryStatus () { return RecoveryStatus; },
|
|
5117
|
-
get PasswordChangeStatus () { return PasswordChangeStatus$1; },
|
|
5118
|
-
get CognitoChallengeName () { return CognitoChallengeName; }
|
|
5119
|
-
});
|
|
5120
|
-
|
|
5121
|
-
var Auth2Service_1;
|
|
5122
|
-
let Auth2Service = Auth2Service_1 = class Auth2Service extends LrService {
|
|
5100
|
+
var AuthService_1;
|
|
5101
|
+
let AuthService = AuthService_1 = class AuthService extends LrService {
|
|
5123
5102
|
constructor(ngZone, injector, http, cognito, api, keyService, keyGraphService, keyFactoryService, passwordService, idleService, persistService, encryptionService, assemblyController, kcConfig) {
|
|
5124
5103
|
super(injector);
|
|
5125
5104
|
this.ngZone = ngZone;
|
|
@@ -5177,7 +5156,7 @@ let Auth2Service = Auth2Service_1 = class Auth2Service extends LrService {
|
|
|
5177
5156
|
let loginResult = yield this.loginImpl(emailOrPhone, password);
|
|
5178
5157
|
// Save the password for use after meeting challenge.
|
|
5179
5158
|
if (loginResult.challenge) {
|
|
5180
|
-
this.password = new KeyContainer(password,
|
|
5159
|
+
this.password = new KeyContainer(password, AuthService_1.CHALLENGE_TIMEOUT);
|
|
5181
5160
|
return loginResult;
|
|
5182
5161
|
}
|
|
5183
5162
|
if (tpPasswordResetAutoComplete &&
|
|
@@ -5314,10 +5293,10 @@ let Auth2Service = Auth2Service_1 = class Auth2Service extends LrService {
|
|
|
5314
5293
|
return __awaiter(this, void 0, void 0, function* () {
|
|
5315
5294
|
// Download the salt needed to derive the PassIdp
|
|
5316
5295
|
const passIdpApiResult = yield this.fetchPassIdpParams(emailOrPhone);
|
|
5317
|
-
if (passIdpApiResult.passwordChangeStatus === PasswordChangeStatus
|
|
5296
|
+
if (passIdpApiResult.passwordChangeStatus === PasswordChangeStatus.IN_PROGRESS) {
|
|
5318
5297
|
throw new KcConcurrentAccessException('A password change is in progress');
|
|
5319
5298
|
}
|
|
5320
|
-
if (passIdpApiResult.passwordChangeStatus === PasswordChangeStatus
|
|
5299
|
+
if (passIdpApiResult.passwordChangeStatus === PasswordChangeStatus.RECOVERY) {
|
|
5321
5300
|
console.log('In recovery mode.');
|
|
5322
5301
|
// Let's say we don't know if the password is the new one or the old one. We just have to try both.
|
|
5323
5302
|
try {
|
|
@@ -5653,14 +5632,14 @@ let Auth2Service = Auth2Service_1 = class Auth2Service extends LrService {
|
|
|
5653
5632
|
});
|
|
5654
5633
|
}
|
|
5655
5634
|
};
|
|
5656
|
-
|
|
5657
|
-
|
|
5658
|
-
|
|
5635
|
+
AuthService.CHALLENGE_TIMEOUT = 1000 * 60 * 5;
|
|
5636
|
+
AuthService.ɵprov = ɵɵdefineInjectable({ factory: function AuthService_Factory() { return new AuthService(ɵɵinject(NgZone), ɵɵinject(INJECTOR), ɵɵinject(HttpClient), ɵɵinject(AuthClass), ɵɵinject(LrGraphQLService), ɵɵinject(KeyService), ɵɵinject(KeyGraphService), ɵɵinject(KeyFactoryService), ɵɵinject(PasswordService), ɵɵinject(IdleService), ɵɵinject(PersistService), ɵɵinject(EncryptionService), ɵɵinject(TpPasswordResetAssemblyController), ɵɵinject(KC_CONFIG)); }, token: AuthService, providedIn: "root" });
|
|
5637
|
+
AuthService.decorators = [
|
|
5659
5638
|
{ type: Injectable, args: [{
|
|
5660
5639
|
providedIn: 'root',
|
|
5661
5640
|
},] }
|
|
5662
5641
|
];
|
|
5663
|
-
|
|
5642
|
+
AuthService.ctorParameters = () => [
|
|
5664
5643
|
{ type: NgZone },
|
|
5665
5644
|
{ type: Injector },
|
|
5666
5645
|
{ type: HttpClient },
|
|
@@ -5676,11 +5655,11 @@ Auth2Service.ctorParameters = () => [
|
|
|
5676
5655
|
{ type: TpPasswordResetAssemblyController },
|
|
5677
5656
|
{ type: undefined, decorators: [{ type: Inject, args: [KC_CONFIG,] }] }
|
|
5678
5657
|
];
|
|
5679
|
-
|
|
5658
|
+
AuthService = AuthService_1 = __decorate([
|
|
5680
5659
|
RunOutsideAngular({
|
|
5681
5660
|
ngZoneName: 'ngZone',
|
|
5682
5661
|
})
|
|
5683
|
-
],
|
|
5662
|
+
], AuthService);
|
|
5684
5663
|
|
|
5685
5664
|
const CreateContactCardMutation$2 = gqlTyped `
|
|
5686
5665
|
mutation CreateContactCardMutation(
|
|
@@ -5857,102 +5836,6 @@ FileUploadService.ctorParameters = () => [
|
|
|
5857
5836
|
{ type: AuthClass }
|
|
5858
5837
|
];
|
|
5859
5838
|
|
|
5860
|
-
const LockFragment = gqlTyped `
|
|
5861
|
-
fragment LockFragment on LockField {
|
|
5862
|
-
created
|
|
5863
|
-
modified
|
|
5864
|
-
version
|
|
5865
|
-
expiryTime
|
|
5866
|
-
state
|
|
5867
|
-
}`;
|
|
5868
|
-
const UpdateLockMutation = gqlTyped `
|
|
5869
|
-
mutation UpdateLockMutation($input: UpdateLockInput!) {
|
|
5870
|
-
updateLock(input: $input) {
|
|
5871
|
-
lock {
|
|
5872
|
-
...LockFragment
|
|
5873
|
-
}
|
|
5874
|
-
}
|
|
5875
|
-
}
|
|
5876
|
-
${LockFragment}
|
|
5877
|
-
`;
|
|
5878
|
-
const AcquireLockMutation = gqlTyped `
|
|
5879
|
-
mutation AcquireLockMutation($input: AcquireLockInput!) {
|
|
5880
|
-
acquireLock(input: $input) {
|
|
5881
|
-
lock {
|
|
5882
|
-
...LockFragment
|
|
5883
|
-
}
|
|
5884
|
-
}
|
|
5885
|
-
}
|
|
5886
|
-
${LockFragment}
|
|
5887
|
-
`;
|
|
5888
|
-
const ReleaseLockMutation = gqlTyped `
|
|
5889
|
-
mutation ReleaseLockMutation($input: ReleaseLockInput!) {
|
|
5890
|
-
releaseLock(input: $input) {
|
|
5891
|
-
lock {
|
|
5892
|
-
...LockFragment
|
|
5893
|
-
}
|
|
5894
|
-
}
|
|
5895
|
-
}
|
|
5896
|
-
${LockFragment}
|
|
5897
|
-
`;
|
|
5898
|
-
|
|
5899
|
-
let LockService = class LockService extends LrService {
|
|
5900
|
-
constructor(ngZone, injector) {
|
|
5901
|
-
super(injector);
|
|
5902
|
-
this.ngZone = ngZone;
|
|
5903
|
-
this.injector = injector;
|
|
5904
|
-
}
|
|
5905
|
-
// Updating the lock version is always to be down along with another mutation.
|
|
5906
|
-
updateLockMutation(options) {
|
|
5907
|
-
return new LrMutation({
|
|
5908
|
-
mutation: UpdateLockMutation,
|
|
5909
|
-
variables: {
|
|
5910
|
-
input: {
|
|
5911
|
-
resourceId: options.resourceId,
|
|
5912
|
-
version: options.version,
|
|
5913
|
-
},
|
|
5914
|
-
},
|
|
5915
|
-
});
|
|
5916
|
-
}
|
|
5917
|
-
acquireLockMutation(options) {
|
|
5918
|
-
return new LrMutation({
|
|
5919
|
-
mutation: AcquireLockMutation,
|
|
5920
|
-
variables: {
|
|
5921
|
-
input: {
|
|
5922
|
-
resourceId: options.resourceId,
|
|
5923
|
-
timeoutMs: options.timeoutMs,
|
|
5924
|
-
},
|
|
5925
|
-
},
|
|
5926
|
-
});
|
|
5927
|
-
}
|
|
5928
|
-
releaseLockMutation(options) {
|
|
5929
|
-
return new LrMutation({
|
|
5930
|
-
mutation: ReleaseLockMutation,
|
|
5931
|
-
variables: {
|
|
5932
|
-
input: {
|
|
5933
|
-
resourceId: options.resourceId,
|
|
5934
|
-
version: options.version,
|
|
5935
|
-
},
|
|
5936
|
-
},
|
|
5937
|
-
});
|
|
5938
|
-
}
|
|
5939
|
-
};
|
|
5940
|
-
LockService.ɵprov = ɵɵdefineInjectable({ factory: function LockService_Factory() { return new LockService(ɵɵinject(NgZone), ɵɵinject(INJECTOR)); }, token: LockService, providedIn: "root" });
|
|
5941
|
-
LockService.decorators = [
|
|
5942
|
-
{ type: Injectable, args: [{
|
|
5943
|
-
providedIn: 'root',
|
|
5944
|
-
},] }
|
|
5945
|
-
];
|
|
5946
|
-
LockService.ctorParameters = () => [
|
|
5947
|
-
{ type: NgZone },
|
|
5948
|
-
{ type: Injector }
|
|
5949
|
-
];
|
|
5950
|
-
LockService = __decorate([
|
|
5951
|
-
RunOutsideAngular({
|
|
5952
|
-
ngZoneName: 'ngZone',
|
|
5953
|
-
})
|
|
5954
|
-
], LockService);
|
|
5955
|
-
|
|
5956
5839
|
const CreateDirectoryMutation = gqlTyped `
|
|
5957
5840
|
mutation CreateDirectoryMutation($input: CreateDirectoryInput!) {
|
|
5958
5841
|
createDirectory(input: $input) {
|
|
@@ -6116,6 +5999,102 @@ mutation SetDirectoryConfidentialMutation($input: SetDirectoryConfidentialInput!
|
|
|
6116
5999
|
}
|
|
6117
6000
|
`;
|
|
6118
6001
|
|
|
6002
|
+
const LockFragment = gqlTyped `
|
|
6003
|
+
fragment LockFragment on LockField {
|
|
6004
|
+
created
|
|
6005
|
+
modified
|
|
6006
|
+
version
|
|
6007
|
+
expiryTime
|
|
6008
|
+
state
|
|
6009
|
+
}`;
|
|
6010
|
+
const UpdateLockMutation = gqlTyped `
|
|
6011
|
+
mutation UpdateLockMutation($input: UpdateLockInput!) {
|
|
6012
|
+
updateLock(input: $input) {
|
|
6013
|
+
lock {
|
|
6014
|
+
...LockFragment
|
|
6015
|
+
}
|
|
6016
|
+
}
|
|
6017
|
+
}
|
|
6018
|
+
${LockFragment}
|
|
6019
|
+
`;
|
|
6020
|
+
const AcquireLockMutation = gqlTyped `
|
|
6021
|
+
mutation AcquireLockMutation($input: AcquireLockInput!) {
|
|
6022
|
+
acquireLock(input: $input) {
|
|
6023
|
+
lock {
|
|
6024
|
+
...LockFragment
|
|
6025
|
+
}
|
|
6026
|
+
}
|
|
6027
|
+
}
|
|
6028
|
+
${LockFragment}
|
|
6029
|
+
`;
|
|
6030
|
+
const ReleaseLockMutation = gqlTyped `
|
|
6031
|
+
mutation ReleaseLockMutation($input: ReleaseLockInput!) {
|
|
6032
|
+
releaseLock(input: $input) {
|
|
6033
|
+
lock {
|
|
6034
|
+
...LockFragment
|
|
6035
|
+
}
|
|
6036
|
+
}
|
|
6037
|
+
}
|
|
6038
|
+
${LockFragment}
|
|
6039
|
+
`;
|
|
6040
|
+
|
|
6041
|
+
let LockService = class LockService extends LrService {
|
|
6042
|
+
constructor(ngZone, injector) {
|
|
6043
|
+
super(injector);
|
|
6044
|
+
this.ngZone = ngZone;
|
|
6045
|
+
this.injector = injector;
|
|
6046
|
+
}
|
|
6047
|
+
// Updating the lock version is always to be down along with another mutation.
|
|
6048
|
+
updateLockMutation(options) {
|
|
6049
|
+
return new LrMutation({
|
|
6050
|
+
mutation: UpdateLockMutation,
|
|
6051
|
+
variables: {
|
|
6052
|
+
input: {
|
|
6053
|
+
resourceId: options.resourceId,
|
|
6054
|
+
version: options.version,
|
|
6055
|
+
},
|
|
6056
|
+
},
|
|
6057
|
+
});
|
|
6058
|
+
}
|
|
6059
|
+
acquireLockMutation(options) {
|
|
6060
|
+
return new LrMutation({
|
|
6061
|
+
mutation: AcquireLockMutation,
|
|
6062
|
+
variables: {
|
|
6063
|
+
input: {
|
|
6064
|
+
resourceId: options.resourceId,
|
|
6065
|
+
timeoutMs: options.timeoutMs,
|
|
6066
|
+
},
|
|
6067
|
+
},
|
|
6068
|
+
});
|
|
6069
|
+
}
|
|
6070
|
+
releaseLockMutation(options) {
|
|
6071
|
+
return new LrMutation({
|
|
6072
|
+
mutation: ReleaseLockMutation,
|
|
6073
|
+
variables: {
|
|
6074
|
+
input: {
|
|
6075
|
+
resourceId: options.resourceId,
|
|
6076
|
+
version: options.version,
|
|
6077
|
+
},
|
|
6078
|
+
},
|
|
6079
|
+
});
|
|
6080
|
+
}
|
|
6081
|
+
};
|
|
6082
|
+
LockService.ɵprov = ɵɵdefineInjectable({ factory: function LockService_Factory() { return new LockService(ɵɵinject(NgZone), ɵɵinject(INJECTOR)); }, token: LockService, providedIn: "root" });
|
|
6083
|
+
LockService.decorators = [
|
|
6084
|
+
{ type: Injectable, args: [{
|
|
6085
|
+
providedIn: 'root',
|
|
6086
|
+
},] }
|
|
6087
|
+
];
|
|
6088
|
+
LockService.ctorParameters = () => [
|
|
6089
|
+
{ type: NgZone },
|
|
6090
|
+
{ type: Injector }
|
|
6091
|
+
];
|
|
6092
|
+
LockService = __decorate([
|
|
6093
|
+
RunOutsideAngular({
|
|
6094
|
+
ngZoneName: 'ngZone',
|
|
6095
|
+
})
|
|
6096
|
+
], LockService);
|
|
6097
|
+
|
|
6119
6098
|
const DirectoryKeyQuery$1 = gqlTyped `
|
|
6120
6099
|
query DirectoryKeyQuery($id: LrRelayIdInput!) {
|
|
6121
6100
|
directory(id: $id) {
|
|
@@ -6138,9 +6117,9 @@ query FileStateKeyQuery($id: LrRelayIdInput!) {
|
|
|
6138
6117
|
}
|
|
6139
6118
|
`;
|
|
6140
6119
|
|
|
6141
|
-
var
|
|
6142
|
-
let
|
|
6143
|
-
constructor(ngZone, injector, fileUploadService, keyService, keyFactory, keyGraph, lockService,
|
|
6120
|
+
var ItemService_1;
|
|
6121
|
+
let ItemService = ItemService_1 = class ItemService extends LrService {
|
|
6122
|
+
constructor(ngZone, injector, fileUploadService, keyService, keyFactory, keyGraph, lockService, authService) {
|
|
6144
6123
|
super(injector);
|
|
6145
6124
|
this.ngZone = ngZone;
|
|
6146
6125
|
this.injector = injector;
|
|
@@ -6149,10 +6128,10 @@ let Item2Service = Item2Service_1 = class Item2Service extends LrService {
|
|
|
6149
6128
|
this.keyFactory = keyFactory;
|
|
6150
6129
|
this.keyGraph = keyGraph;
|
|
6151
6130
|
this.lockService = lockService;
|
|
6152
|
-
this.
|
|
6131
|
+
this.authService = authService;
|
|
6153
6132
|
// Caching the temp directory.
|
|
6154
6133
|
this.tempDirectory = null;
|
|
6155
|
-
this.
|
|
6134
|
+
this.authService.addLogoutListener(() => this.onLogout());
|
|
6156
6135
|
}
|
|
6157
6136
|
downloadFileContent(options) {
|
|
6158
6137
|
return __awaiter(this, void 0, void 0, function* () {
|
|
@@ -6409,17 +6388,17 @@ let Item2Service = Item2Service_1 = class Item2Service extends LrService {
|
|
|
6409
6388
|
const existing = yield this.query({
|
|
6410
6389
|
query: TempDirectoryQuery,
|
|
6411
6390
|
variables: {
|
|
6412
|
-
plainMeta:
|
|
6391
|
+
plainMeta: ItemService_1.TEMP_DIRECTORY_PLAIN_META_FILTER,
|
|
6413
6392
|
},
|
|
6414
6393
|
});
|
|
6415
6394
|
if (existing.rootDirectories.edges.length > 1) {
|
|
6416
|
-
console.error(`There is more than 1 temp directory (plainMeta filter: ${
|
|
6395
|
+
console.error(`There is more than 1 temp directory (plainMeta filter: ${ItemService_1.TEMP_DIRECTORY_PLAIN_META_FILTER})`);
|
|
6417
6396
|
}
|
|
6418
6397
|
if (existing.rootDirectories.edges.length === 0) {
|
|
6419
6398
|
// Doesn't exist yet, create it
|
|
6420
6399
|
const createDirectory = yield this.createDirectoryMutation({
|
|
6421
6400
|
asRootDirectory: true,
|
|
6422
|
-
plainMetaJson:
|
|
6401
|
+
plainMetaJson: ItemService_1.TEMP_DIRECTORY_PLAIN_META,
|
|
6423
6402
|
});
|
|
6424
6403
|
// Optimistic lock on the current user.
|
|
6425
6404
|
const updateLock = this.lockService.updateLockMutation({
|
|
@@ -6678,21 +6657,21 @@ let Item2Service = Item2Service_1 = class Item2Service extends LrService {
|
|
|
6678
6657
|
this.tempDirectory = null;
|
|
6679
6658
|
}
|
|
6680
6659
|
};
|
|
6681
|
-
|
|
6682
|
-
|
|
6660
|
+
ItemService.TEMP_DIRECTORY_PLAIN_META = { kcType: 'temp' };
|
|
6661
|
+
ItemService.TEMP_DIRECTORY_PLAIN_META_FILTER = JSON.stringify({
|
|
6683
6662
|
filter: [
|
|
6684
6663
|
{
|
|
6685
|
-
contains:
|
|
6664
|
+
contains: ItemService_1.TEMP_DIRECTORY_PLAIN_META,
|
|
6686
6665
|
},
|
|
6687
6666
|
],
|
|
6688
6667
|
});
|
|
6689
|
-
|
|
6690
|
-
|
|
6668
|
+
ItemService.ɵprov = ɵɵdefineInjectable({ factory: function ItemService_Factory() { return new ItemService(ɵɵinject(NgZone), ɵɵinject(INJECTOR), ɵɵinject(FileUploadService), ɵɵinject(KeyService), ɵɵinject(KeyFactoryService), ɵɵinject(KeyGraphService), ɵɵinject(LockService), ɵɵinject(AuthService)); }, token: ItemService, providedIn: "root" });
|
|
6669
|
+
ItemService.decorators = [
|
|
6691
6670
|
{ type: Injectable, args: [{
|
|
6692
6671
|
providedIn: 'root',
|
|
6693
6672
|
},] }
|
|
6694
6673
|
];
|
|
6695
|
-
|
|
6674
|
+
ItemService.ctorParameters = () => [
|
|
6696
6675
|
{ type: NgZone },
|
|
6697
6676
|
{ type: Injector },
|
|
6698
6677
|
{ type: FileUploadService },
|
|
@@ -6700,15 +6679,15 @@ Item2Service.ctorParameters = () => [
|
|
|
6700
6679
|
{ type: KeyFactoryService },
|
|
6701
6680
|
{ type: KeyGraphService },
|
|
6702
6681
|
{ type: LockService },
|
|
6703
|
-
{ type:
|
|
6682
|
+
{ type: AuthService }
|
|
6704
6683
|
];
|
|
6705
|
-
|
|
6684
|
+
ItemService = ItemService_1 = __decorate([
|
|
6706
6685
|
RunOutsideAngular({
|
|
6707
6686
|
ngZoneName: 'ngZone',
|
|
6708
6687
|
})
|
|
6709
|
-
],
|
|
6688
|
+
], ItemService);
|
|
6710
6689
|
|
|
6711
|
-
let
|
|
6690
|
+
let KeyExchangeService = class KeyExchangeService extends LrService {
|
|
6712
6691
|
constructor(ngZone, injector, keyFactory, keyService, encryptionService, keyGraph) {
|
|
6713
6692
|
super(injector);
|
|
6714
6693
|
this.ngZone = ngZone;
|
|
@@ -7152,13 +7131,13 @@ let KeyExchange2Service = class KeyExchange2Service extends LrService {
|
|
|
7152
7131
|
});
|
|
7153
7132
|
}
|
|
7154
7133
|
};
|
|
7155
|
-
|
|
7156
|
-
|
|
7134
|
+
KeyExchangeService.ɵprov = ɵɵdefineInjectable({ factory: function KeyExchangeService_Factory() { return new KeyExchangeService(ɵɵinject(NgZone), ɵɵinject(INJECTOR), ɵɵinject(KeyFactoryService), ɵɵinject(KeyService), ɵɵinject(EncryptionService), ɵɵinject(KeyGraphService)); }, token: KeyExchangeService, providedIn: "root" });
|
|
7135
|
+
KeyExchangeService.decorators = [
|
|
7157
7136
|
{ type: Injectable, args: [{
|
|
7158
7137
|
providedIn: 'root',
|
|
7159
7138
|
},] }
|
|
7160
7139
|
];
|
|
7161
|
-
|
|
7140
|
+
KeyExchangeService.ctorParameters = () => [
|
|
7162
7141
|
{ type: NgZone },
|
|
7163
7142
|
{ type: Injector },
|
|
7164
7143
|
{ type: KeyFactoryService },
|
|
@@ -7166,11 +7145,11 @@ KeyExchange2Service.ctorParameters = () => [
|
|
|
7166
7145
|
{ type: EncryptionService },
|
|
7167
7146
|
{ type: KeyGraphService }
|
|
7168
7147
|
];
|
|
7169
|
-
|
|
7148
|
+
KeyExchangeService = __decorate([
|
|
7170
7149
|
RunOutsideAngular({
|
|
7171
7150
|
ngZoneName: 'ngZone',
|
|
7172
7151
|
})
|
|
7173
|
-
],
|
|
7152
|
+
], KeyExchangeService);
|
|
7174
7153
|
|
|
7175
7154
|
const ERROR_SOURCE = 'LBOP';
|
|
7176
7155
|
var KcLbopErrorCode;
|
|
@@ -7223,16 +7202,14 @@ const LbopsQuery = gql `
|
|
|
7223
7202
|
}
|
|
7224
7203
|
`;
|
|
7225
7204
|
class LbopService {
|
|
7226
|
-
constructor(config, http, lrApollo, auth,
|
|
7205
|
+
constructor(config, http, lrApollo, auth, keyFactory, keyService, encryptionService, passwordService) {
|
|
7227
7206
|
this.config = config;
|
|
7228
7207
|
this.http = http;
|
|
7229
7208
|
this.lrApollo = lrApollo;
|
|
7230
7209
|
this.auth = auth;
|
|
7231
|
-
this.auth2Service = auth2Service;
|
|
7232
7210
|
this.keyFactory = keyFactory;
|
|
7233
7211
|
this.keyService = keyService;
|
|
7234
7212
|
this.encryptionService = encryptionService;
|
|
7235
|
-
this.keyGraph = keyGraph;
|
|
7236
7213
|
this.passwordService = passwordService;
|
|
7237
7214
|
this.CLIENT_NONCE_LENGTH = 32;
|
|
7238
7215
|
// There are 1024 words (10 bits), so 25 words should give ~256 bits of entropy.
|
|
@@ -7485,7 +7462,7 @@ class LbopService {
|
|
|
7485
7462
|
});
|
|
7486
7463
|
}
|
|
7487
7464
|
}
|
|
7488
|
-
LbopService.ɵprov = ɵɵdefineInjectable({ factory: function LbopService_Factory() { return new LbopService(ɵɵinject(KC_CONFIG), ɵɵinject(HttpClient), ɵɵinject(LrApolloService), ɵɵinject(AuthClass), ɵɵinject(
|
|
7465
|
+
LbopService.ɵprov = ɵɵdefineInjectable({ factory: function LbopService_Factory() { return new LbopService(ɵɵinject(KC_CONFIG), ɵɵinject(HttpClient), ɵɵinject(LrApolloService), ɵɵinject(AuthClass), ɵɵinject(KeyFactoryService), ɵɵinject(KeyService), ɵɵinject(EncryptionService), ɵɵinject(PasswordService)); }, token: LbopService, providedIn: "root" });
|
|
7489
7466
|
LbopService.decorators = [
|
|
7490
7467
|
{ type: Injectable, args: [{
|
|
7491
7468
|
providedIn: 'root',
|
|
@@ -7496,11 +7473,9 @@ LbopService.ctorParameters = () => [
|
|
|
7496
7473
|
{ type: HttpClient },
|
|
7497
7474
|
{ type: LrApolloService },
|
|
7498
7475
|
{ type: AuthClass },
|
|
7499
|
-
{ type: Auth2Service },
|
|
7500
7476
|
{ type: KeyFactoryService },
|
|
7501
7477
|
{ type: KeyService },
|
|
7502
7478
|
{ type: EncryptionService },
|
|
7503
|
-
{ type: KeyGraphService },
|
|
7504
7479
|
{ type: PasswordService }
|
|
7505
7480
|
];
|
|
7506
7481
|
|
|
@@ -7781,7 +7756,7 @@ mutation ReactivatePlanMutation($input: ReactivatePlanInput!) {
|
|
|
7781
7756
|
}
|
|
7782
7757
|
`;
|
|
7783
7758
|
|
|
7784
|
-
let
|
|
7759
|
+
let PlanService = class PlanService extends LrService {
|
|
7785
7760
|
constructor(ngZone, injector) {
|
|
7786
7761
|
super(injector);
|
|
7787
7762
|
this.ngZone = ngZone;
|
|
@@ -7949,21 +7924,21 @@ let Plan2Service = class Plan2Service extends LrService {
|
|
|
7949
7924
|
});
|
|
7950
7925
|
}
|
|
7951
7926
|
};
|
|
7952
|
-
|
|
7953
|
-
|
|
7927
|
+
PlanService.ɵprov = ɵɵdefineInjectable({ factory: function PlanService_Factory() { return new PlanService(ɵɵinject(NgZone), ɵɵinject(INJECTOR)); }, token: PlanService, providedIn: "root" });
|
|
7928
|
+
PlanService.decorators = [
|
|
7954
7929
|
{ type: Injectable, args: [{
|
|
7955
7930
|
providedIn: 'root',
|
|
7956
7931
|
},] }
|
|
7957
7932
|
];
|
|
7958
|
-
|
|
7933
|
+
PlanService.ctorParameters = () => [
|
|
7959
7934
|
{ type: NgZone },
|
|
7960
7935
|
{ type: Injector }
|
|
7961
7936
|
];
|
|
7962
|
-
|
|
7937
|
+
PlanService = __decorate([
|
|
7963
7938
|
RunOutsideAngular({
|
|
7964
7939
|
ngZoneName: 'ngZone',
|
|
7965
7940
|
})
|
|
7966
|
-
],
|
|
7941
|
+
], PlanService);
|
|
7967
7942
|
|
|
7968
7943
|
var ContactFields;
|
|
7969
7944
|
(function (ContactFields) {
|
|
@@ -8370,6 +8345,9 @@ RegisterService.ctorParameters = () => [
|
|
|
8370
8345
|
{ type: PasswordService }
|
|
8371
8346
|
];
|
|
8372
8347
|
|
|
8348
|
+
class RegisterResult {
|
|
8349
|
+
}
|
|
8350
|
+
|
|
8373
8351
|
const CreateReminderMutation = gqlTyped `
|
|
8374
8352
|
mutation CreateReminderMutation($input: CreateReminderInput!) {
|
|
8375
8353
|
createReminder(input: $input) {
|
|
@@ -8474,35 +8452,6 @@ ReminderService = __decorate([
|
|
|
8474
8452
|
})
|
|
8475
8453
|
], ReminderService);
|
|
8476
8454
|
|
|
8477
|
-
const SCENARIO_SLIP39_PASSPHRASE = 'lifeready';
|
|
8478
|
-
|
|
8479
|
-
let ScenarioAssemblyController = class ScenarioAssemblyController extends TpAssemblyController {
|
|
8480
|
-
constructor(ngZone, injector) {
|
|
8481
|
-
super(injector);
|
|
8482
|
-
this.ngZone = ngZone;
|
|
8483
|
-
this.injector = injector;
|
|
8484
|
-
this.slip39Passphrase = SCENARIO_SLIP39_PASSPHRASE;
|
|
8485
|
-
}
|
|
8486
|
-
getTpWrappingKeyId(tp) {
|
|
8487
|
-
return tp.currentUserSharedKey.userSharedKey.sharedKey.id;
|
|
8488
|
-
}
|
|
8489
|
-
};
|
|
8490
|
-
ScenarioAssemblyController.ɵprov = ɵɵdefineInjectable({ factory: function ScenarioAssemblyController_Factory() { return new ScenarioAssemblyController(ɵɵinject(NgZone), ɵɵinject(INJECTOR)); }, token: ScenarioAssemblyController, providedIn: "root" });
|
|
8491
|
-
ScenarioAssemblyController.decorators = [
|
|
8492
|
-
{ type: Injectable, args: [{
|
|
8493
|
-
providedIn: 'root',
|
|
8494
|
-
},] }
|
|
8495
|
-
];
|
|
8496
|
-
ScenarioAssemblyController.ctorParameters = () => [
|
|
8497
|
-
{ type: NgZone },
|
|
8498
|
-
{ type: Injector }
|
|
8499
|
-
];
|
|
8500
|
-
ScenarioAssemblyController = __decorate([
|
|
8501
|
-
RunOutsideAngular({
|
|
8502
|
-
ngZoneName: 'ngZone',
|
|
8503
|
-
})
|
|
8504
|
-
], ScenarioAssemblyController);
|
|
8505
|
-
|
|
8506
8455
|
const CreateScenarioMutation = gqlTyped `
|
|
8507
8456
|
mutation CreateScenarioMutation($input: CreateScenarioInput!) {
|
|
8508
8457
|
createScenario(input: $input) {
|
|
@@ -8592,6 +8541,35 @@ mutation DebugExpireTpPasswordResetRequestMutation($input: DebugExpireTpPassword
|
|
|
8592
8541
|
}
|
|
8593
8542
|
`;
|
|
8594
8543
|
|
|
8544
|
+
const SCENARIO_SLIP39_PASSPHRASE = 'lifeready';
|
|
8545
|
+
|
|
8546
|
+
let ScenarioAssemblyController = class ScenarioAssemblyController extends TpAssemblyController {
|
|
8547
|
+
constructor(ngZone, injector) {
|
|
8548
|
+
super(injector);
|
|
8549
|
+
this.ngZone = ngZone;
|
|
8550
|
+
this.injector = injector;
|
|
8551
|
+
this.slip39Passphrase = SCENARIO_SLIP39_PASSPHRASE;
|
|
8552
|
+
}
|
|
8553
|
+
getTpWrappingKeyId(tp) {
|
|
8554
|
+
return tp.currentUserSharedKey.userSharedKey.sharedKey.id;
|
|
8555
|
+
}
|
|
8556
|
+
};
|
|
8557
|
+
ScenarioAssemblyController.ɵprov = ɵɵdefineInjectable({ factory: function ScenarioAssemblyController_Factory() { return new ScenarioAssemblyController(ɵɵinject(NgZone), ɵɵinject(INJECTOR)); }, token: ScenarioAssemblyController, providedIn: "root" });
|
|
8558
|
+
ScenarioAssemblyController.decorators = [
|
|
8559
|
+
{ type: Injectable, args: [{
|
|
8560
|
+
providedIn: 'root',
|
|
8561
|
+
},] }
|
|
8562
|
+
];
|
|
8563
|
+
ScenarioAssemblyController.ctorParameters = () => [
|
|
8564
|
+
{ type: NgZone },
|
|
8565
|
+
{ type: Injector }
|
|
8566
|
+
];
|
|
8567
|
+
ScenarioAssemblyController = __decorate([
|
|
8568
|
+
RunOutsideAngular({
|
|
8569
|
+
ngZoneName: 'ngZone',
|
|
8570
|
+
})
|
|
8571
|
+
], ScenarioAssemblyController);
|
|
8572
|
+
|
|
8595
8573
|
const ScenarioQuery = gqlTyped `
|
|
8596
8574
|
query ScenarioQuery(
|
|
8597
8575
|
$scenarioId: LrRelayIdInput!
|
|
@@ -8796,12 +8774,12 @@ function throwClaimNotApproved() {
|
|
|
8796
8774
|
throw new KcBadStateException('Scenario claim has not been approved');
|
|
8797
8775
|
}
|
|
8798
8776
|
let ScenarioService = class ScenarioService extends LrService {
|
|
8799
|
-
constructor(ngZone, injector, keyGraph,
|
|
8777
|
+
constructor(ngZone, injector, keyGraph, itemService, assemblyController, encryptionService) {
|
|
8800
8778
|
super(injector);
|
|
8801
8779
|
this.ngZone = ngZone;
|
|
8802
8780
|
this.injector = injector;
|
|
8803
8781
|
this.keyGraph = keyGraph;
|
|
8804
|
-
this.
|
|
8782
|
+
this.itemService = itemService;
|
|
8805
8783
|
this.assemblyController = assemblyController;
|
|
8806
8784
|
this.encryptionService = encryptionService;
|
|
8807
8785
|
this.prepareAddReceiverDirectory = this.prepareReceiverDirectory;
|
|
@@ -9101,7 +9079,7 @@ let ScenarioService = class ScenarioService extends LrService {
|
|
|
9101
9079
|
prepareReceiverDirectory(options, receiverSharedKey, assemblyKey) {
|
|
9102
9080
|
return __awaiter(this, void 0, void 0, function* () {
|
|
9103
9081
|
// TODO this should be batched
|
|
9104
|
-
const directoryKey = yield this.
|
|
9082
|
+
const directoryKey = yield this.itemService.getDirectoryKey(options.directoryId, options.directoryKeyId);
|
|
9105
9083
|
const sharedCipherData = yield this.keyGraph.encryptToString(receiverSharedKey, options.sharedCipherDataClearJson || '');
|
|
9106
9084
|
let wrappedItemKey = yield this.keyGraph.encryptToString(receiverSharedKey, directoryKey.jwk.toJSON(true));
|
|
9107
9085
|
// TODO fetch assemblyKeyId. We are changing it such that there is always an assembly
|
|
@@ -9303,7 +9281,7 @@ let ScenarioService = class ScenarioService extends LrService {
|
|
|
9303
9281
|
}
|
|
9304
9282
|
};
|
|
9305
9283
|
ScenarioService.SLIP39_PASSPHRASE = 'lifeready';
|
|
9306
|
-
ScenarioService.ɵprov = ɵɵdefineInjectable({ factory: function ScenarioService_Factory() { return new ScenarioService(ɵɵinject(NgZone), ɵɵinject(INJECTOR), ɵɵinject(KeyGraphService), ɵɵinject(
|
|
9284
|
+
ScenarioService.ɵprov = ɵɵdefineInjectable({ factory: function ScenarioService_Factory() { return new ScenarioService(ɵɵinject(NgZone), ɵɵinject(INJECTOR), ɵɵinject(KeyGraphService), ɵɵinject(ItemService), ɵɵinject(ScenarioAssemblyController), ɵɵinject(EncryptionService)); }, token: ScenarioService, providedIn: "root" });
|
|
9307
9285
|
ScenarioService.decorators = [
|
|
9308
9286
|
{ type: Injectable, args: [{
|
|
9309
9287
|
providedIn: 'root',
|
|
@@ -9313,7 +9291,7 @@ ScenarioService.ctorParameters = () => [
|
|
|
9313
9291
|
{ type: NgZone },
|
|
9314
9292
|
{ type: Injector },
|
|
9315
9293
|
{ type: KeyGraphService },
|
|
9316
|
-
{ type:
|
|
9294
|
+
{ type: ItemService },
|
|
9317
9295
|
{ type: ScenarioAssemblyController },
|
|
9318
9296
|
{ type: EncryptionService }
|
|
9319
9297
|
];
|
|
@@ -10117,13 +10095,13 @@ query TpCurrentUserSharedKeyQuery($id: LrRelayIdInput!) {
|
|
|
10117
10095
|
}
|
|
10118
10096
|
`;
|
|
10119
10097
|
|
|
10120
|
-
let
|
|
10121
|
-
constructor(ngZone, injector, keyGraph,
|
|
10098
|
+
let TrustedPartyService = class TrustedPartyService extends LrService {
|
|
10099
|
+
constructor(ngZone, injector, keyGraph, itemService, keyService, keyFactory, encryptionService) {
|
|
10122
10100
|
super(injector);
|
|
10123
10101
|
this.ngZone = ngZone;
|
|
10124
10102
|
this.injector = injector;
|
|
10125
10103
|
this.keyGraph = keyGraph;
|
|
10126
|
-
this.
|
|
10104
|
+
this.itemService = itemService;
|
|
10127
10105
|
this.keyService = keyService;
|
|
10128
10106
|
this.keyFactory = keyFactory;
|
|
10129
10107
|
this.encryptionService = encryptionService;
|
|
@@ -10164,8 +10142,8 @@ let TrustedParty2Service = class TrustedParty2Service extends LrService {
|
|
|
10164
10142
|
shareItemMutation({ itemId, itemKeyId, tpId, tpSharedKeyId, accessRole, isDirectory, }) {
|
|
10165
10143
|
return __awaiter(this, void 0, void 0, function* () {
|
|
10166
10144
|
const itemKey = yield this.keyGraph.getKey(itemKeyId, () => isDirectory
|
|
10167
|
-
? this.
|
|
10168
|
-
: this.
|
|
10145
|
+
? this.itemService.getDirectoryKeyId(itemId)
|
|
10146
|
+
: this.itemService.getFileKeyId(itemId));
|
|
10169
10147
|
const wrappingKey = yield this.keyGraph.getKey(tpSharedKeyId, () => this.getTpCurrentUserSharedKey(tpId).then((res) => res.sharedKey.id));
|
|
10170
10148
|
const wrappedKey = yield this.keyGraph.wrapKey(wrappingKey, itemKey.jwk);
|
|
10171
10149
|
return new LrMutation({
|
|
@@ -10316,26 +10294,26 @@ let TrustedParty2Service = class TrustedParty2Service extends LrService {
|
|
|
10316
10294
|
});
|
|
10317
10295
|
}
|
|
10318
10296
|
};
|
|
10319
|
-
|
|
10320
|
-
|
|
10297
|
+
TrustedPartyService.ɵprov = ɵɵdefineInjectable({ factory: function TrustedPartyService_Factory() { return new TrustedPartyService(ɵɵinject(NgZone), ɵɵinject(INJECTOR), ɵɵinject(KeyGraphService), ɵɵinject(ItemService), ɵɵinject(KeyService), ɵɵinject(KeyFactoryService), ɵɵinject(EncryptionService)); }, token: TrustedPartyService, providedIn: "root" });
|
|
10298
|
+
TrustedPartyService.decorators = [
|
|
10321
10299
|
{ type: Injectable, args: [{
|
|
10322
10300
|
providedIn: 'root',
|
|
10323
10301
|
},] }
|
|
10324
10302
|
];
|
|
10325
|
-
|
|
10303
|
+
TrustedPartyService.ctorParameters = () => [
|
|
10326
10304
|
{ type: NgZone },
|
|
10327
10305
|
{ type: Injector },
|
|
10328
10306
|
{ type: KeyGraphService },
|
|
10329
|
-
{ type:
|
|
10307
|
+
{ type: ItemService },
|
|
10330
10308
|
{ type: KeyService },
|
|
10331
10309
|
{ type: KeyFactoryService },
|
|
10332
10310
|
{ type: EncryptionService }
|
|
10333
10311
|
];
|
|
10334
|
-
|
|
10312
|
+
TrustedPartyService = __decorate([
|
|
10335
10313
|
RunOutsideAngular({
|
|
10336
10314
|
ngZoneName: 'ngZone',
|
|
10337
10315
|
})
|
|
10338
|
-
],
|
|
10316
|
+
], TrustedPartyService);
|
|
10339
10317
|
|
|
10340
10318
|
class TwoFactorService {
|
|
10341
10319
|
constructor(auth) {
|
|
@@ -10495,5 +10473,5 @@ UserService.ctorParameters = () => [
|
|
|
10495
10473
|
* Generated bundle index. Do not edit.
|
|
10496
10474
|
*/
|
|
10497
10475
|
|
|
10498
|
-
export { AccessRoleChoice, AccessRoleMethodChoice, ApiContactCard, ApiCurrentUser,
|
|
10476
|
+
export { AccessRoleChoice, AccessRoleMethodChoice, ApiContactCard, ApiCurrentUser, ApproveScenarioClaimMutation, ApproveTpPasswordResetRequestMutation, ArchiveDirectoryMutation, ArchiveFileMutation, AuthService, BeginDeleteChildItemLinksWindowMutation, CancelKeyExchangeMutation, CancelScenarioClaimMutation, CancelTpPasswordResetRequestMutation, CancelUserDeleteMutation, ChangeDirectoryParentsMutation, ChangeFileParentsMutation, ClaimApproverState, ClaimState, CognitoChallengeName, CommonProcessorsService, CompleteKeyExchangeOtkMutation, CompleteTpPasswordResetRequestMutation, Config, ContactCard2Service, ContactCardAddress, ContactCardName, ContactCardsQuery, CreateContactCardMutation$1 as CreateContactCardMutation, CreateDirectoryMutation, CreateFileMutation, CreateFileQuery, CreateLbopQuery, CreateScenarioClaimMutation, CreateScenarioMutation, CreateTpAssemblyKeyChallengeMutation, CreateTpPasswordResetMutation, CurrentUserKey, CurrentUserQuery, CurrentUserSharedKeyQuery2, DebugExpireScenarioClaimMutation, DebugExpireTpPasswordResetRequestMutation, DeclineKeyExchangeMutation, DefaultProcessorOptions, DeleteDirectoryMutation, DeleteFileMutation, DeleteLbopQuery, DeleteScenarioMutation, DeleteTpPasswordResetMutation, DirectoryQuery, ERROR_SOURCE, FeatureAction, Features, FetchKeyGraphField, FileOperationField, FileQuery, FileUploadService, GetOwnedContactCardKeyIdsQuery, GetReceivedContactCardKeyIdQuery, IdleService, InitiateKeyExchangeOtkMutation, ItemService, KC_CONFIG, KcAuthException, KcBadArgumentException, KcBadLogicException, KcBadRequestException, KcBadSignatureException, KcBadStateException, KcBadTimeSyncException, KcCodeMismatchException, KcConcurrentAccessException, KcEncryptionException, KcError, KcErrorCode, KcException, KcInternalErrorException, KcLbopErrorCode, KcLockedException, KcNotFoundException, KcSuspiciousOperationException, KcUnsupportedException, KeyExchangeFields, KeyExchangeMode, KeyExchangeOtkState, KeyExchangeQuery2, KeyExchangeService, KeyExchangeState, KeyExchangeTokenQuery2, KeyExchangesQuery2, KeyGraphField, KeyGraphFragment, LbopQuery, LbopService, LbopsQuery, LifeReadyModule, LinkTypeField, LockService, LockState, LoginHistoryQuery, LrApolloService, LrGraphQLService, LrMergedMutation, LrMutation, LrMutationBase, LrService, MainContactCardFields, MainContactCardPlainFields, MainContactCardProperty, MoveDirectoryQuery, MoveFileQuery, NotificationService, OwnerPlainDataJson, PasswordChangeStatus, PasswordCheck, PasswordService, PermissionChoice, PersistService, PlanService, PlanState, PlanStateField, PreCompleteTpPasswordResetRequestMutation, ProfileDetailsService, ProfileService, QueryProcessorService, ReceiveScenarioClaimMutation, RecoveryStatus, RegisterResult, RegisterService, RejectScenarioClaimMutation, RejectTpPasswordResetRequestMutation, ReminderService, RequestUserDeleteMutation, RespondKeyExchangeOtkMutation, RevertFileMutation, RevertFileQuery, ScenarioLastClaimState, ScenarioService, ScenarioState, ServerConfigService, ServerTimeQuery, SetDirectoryConfidentialMutation, SetFileConfidentialMutation, SharedContactCard2Service, SharedTrustedPartyDetails, SharedVaultFeature, TPFeatures, TempDirectoryQuery, TimeService, TpAssemblyState, TpClaimApproverState, TpClaimState, TpPasswordResetRequestService, TpPasswordResetService, TpPasswordResetUserService, TrustedPartiesQuery, TrustedParty, TrustedPartyDetails, TrustedPartyProperties, TrustedPartyService, TrustedPartyType, TwoFactorService, UnarchiveDirectoryMutation, UnarchiveFileMutation, UpdateContactCardMutation$1 as UpdateContactCardMutation, UpdateDirectoryMutation, UpdateFileMutation, UpdateFileQuery, UpdateLbopQuery, UpdateOwnedContactCardMutation, UpdateReceivedContactCardMutation, UpdateScenarioMutation, UpdateTpPasswordResetMutation, UserDeleteState, UserService, UserSharedKeyFields, WebCryptoService, awsFetch, configureAmplifyAuth, configureApollo, fragmentSpreadAstSelection, gqlTyped, handleApolloError, handleCognitoCallback, httpOptions, mapEdges, processConnection, throwClaimIdMismatch, throwClaimNotApproved, KeyGraphService as ɵa, EncryptionService as ɵb, KeyService as ɵc, KeyFactoryService as ɵd, LrService as ɵe, RunOutsideAngular as ɵf, LrGraphQLService as ɵg, KeyMetaService as ɵh, TpPasswordResetAssemblyController as ɵi, TpAssemblyController as ɵj, SharedContactCardFields as ɵk, SharedContactCardService as ɵl, ScenarioAssemblyController as ɵm, TpPasswordResetPrivateService as ɵn };
|
|
10499
10477
|
//# sourceMappingURL=lifeready-core.js.map
|