@lifeready/core 7.2.3 → 8.0.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/bundles/lifeready-core.umd.js +239 -186
- package/bundles/lifeready-core.umd.js.map +1 -1
- package/bundles/lifeready-core.umd.min.js +1 -1
- package/bundles/lifeready-core.umd.min.js.map +1 -1
- package/esm2015/lib/_common/queries.gql.js +2 -149
- package/esm2015/lib/api/lr-graphql/lr-mutation.js +5 -3
- package/esm2015/lib/api/query-processor/tp-password-reset-processor.service.js +2 -2
- package/esm2015/lib/api/types/lr-graphql.types.js +11 -16
- package/esm2015/lib/auth/auth.gql.private.js +1 -1
- package/esm2015/lib/auth/auth.service.js +5 -3
- package/esm2015/lib/auth/auth.types.js +1 -3
- package/esm2015/lib/item/item.gql.private.js +7 -7
- package/esm2015/lib/item/item.service.js +10 -10
- package/esm2015/lib/key/key-graph.service.js +14 -1
- package/esm2015/lib/key/key.types.js +1 -1
- package/esm2015/lib/plan/plan.types.js +1 -1
- package/esm2015/lib/scenario/scenario.gql.js +1 -1
- package/esm2015/lib/scenario/scenario.private.gql.js +36 -31
- package/esm2015/lib/scenario/scenario.service.js +32 -10
- package/esm2015/lib/trusted-party/trusted-party.gql.js +35 -35
- package/esm2015/lib/trusted-party/trusted-party.service.js +32 -32
- package/esm2015/lib/trusted-party/trusted-party.types.js +1 -1
- package/fesm2015/lifeready-core.js +178 -288
- package/fesm2015/lifeready-core.js.map +1 -1
- package/lib/_common/queries.gql.d.ts +0 -6
- package/lib/api/query-processor/tp-password-reset-processor.service.d.ts +2 -2
- package/lib/api/types/lr-graphql.types.d.ts +26 -29
- package/lib/auth/auth.gql.private.d.ts +3 -3
- package/lib/auth/auth.types.d.ts +3 -2
- package/lib/item/item.gql.private.d.ts +6 -6
- package/lib/item/item.service.d.ts +2 -2
- package/lib/key/key.types.d.ts +1 -0
- package/lib/plan/plan.types.d.ts +0 -1
- package/lib/scenario/scenario.gql.d.ts +1 -1
- package/lib/scenario/scenario.service.d.ts +11 -6
- package/lib/trusted-party/trusted-party.gql.d.ts +34 -34
- package/lib/trusted-party/trusted-party.service.d.ts +16 -16
- package/lib/trusted-party/trusted-party.types.d.ts +2 -2
- package/lifeready-core.metadata.json +1 -1
- package/package.json +1 -1
|
@@ -1383,6 +1383,19 @@ class KeyGraphService {
|
|
|
1383
1383
|
else {
|
|
1384
1384
|
nextRawKey = yield this.encryptionService.decrypt(wrappingKey, wrappedKey);
|
|
1385
1385
|
}
|
|
1386
|
+
// Handle nested keys. i.e. Enc{K1}{K2}{K3}(raw key 4), where:
|
|
1387
|
+
// K1: link.wrappingKey
|
|
1388
|
+
// K2: link.nestedWrappingKey[0]
|
|
1389
|
+
// K3: link.nestedWrappingKey[1]
|
|
1390
|
+
if (link.type == KeyGraphEdgeType.KeyLink) {
|
|
1391
|
+
const data = link.data;
|
|
1392
|
+
if (data.nestedWrappingKeyIds) {
|
|
1393
|
+
for (const nestedWrappingKeyId of data.nestedWrappingKeyIds) {
|
|
1394
|
+
const key = yield this.getKey(nestedWrappingKeyId);
|
|
1395
|
+
nextRawKey = yield this.encryptionService.decrypt(key.jwk, nextRawKey);
|
|
1396
|
+
}
|
|
1397
|
+
}
|
|
1398
|
+
}
|
|
1386
1399
|
dstKey.jwk = yield KeyFactoryService.asKey(nextRawKey);
|
|
1387
1400
|
dstKey.task = null;
|
|
1388
1401
|
});
|
|
@@ -1586,6 +1599,7 @@ const KeyGraphFragmentBase = `
|
|
|
1586
1599
|
keyLinks {
|
|
1587
1600
|
keyId
|
|
1588
1601
|
wrappingKeyId
|
|
1602
|
+
nestedWrappingKeyIds
|
|
1589
1603
|
wrappedKey
|
|
1590
1604
|
}
|
|
1591
1605
|
passKeys {
|
|
@@ -1604,51 +1618,6 @@ fragment KeyGraphFragment on KeyGraphType ${KeyGraphFragmentBase}
|
|
|
1604
1618
|
`;
|
|
1605
1619
|
const KeyGraphField = `keyGraph ${KeyGraphFragmentBase}`;
|
|
1606
1620
|
const FetchKeyGraphField = `keyGraph: fetchKeyGraph ${KeyGraphFragmentBase}`;
|
|
1607
|
-
const FileQuery = gql `
|
|
1608
|
-
query File($id: LrRelayIdInput!, $cachedKeyIds: [LrRelayIdInput!]) {
|
|
1609
|
-
file(id: $id) {
|
|
1610
|
-
id
|
|
1611
|
-
keyId
|
|
1612
|
-
currentVersion {
|
|
1613
|
-
id
|
|
1614
|
-
operation
|
|
1615
|
-
state {
|
|
1616
|
-
keyId
|
|
1617
|
-
plainMeta
|
|
1618
|
-
cipherMeta
|
|
1619
|
-
contentResource
|
|
1620
|
-
}
|
|
1621
|
-
}
|
|
1622
|
-
versions {
|
|
1623
|
-
edges {
|
|
1624
|
-
node {
|
|
1625
|
-
id
|
|
1626
|
-
state {
|
|
1627
|
-
keyId
|
|
1628
|
-
plainMeta
|
|
1629
|
-
cipherMeta
|
|
1630
|
-
contentResource
|
|
1631
|
-
}
|
|
1632
|
-
}
|
|
1633
|
-
}
|
|
1634
|
-
}
|
|
1635
|
-
parentDirectoryLinks {
|
|
1636
|
-
edges {
|
|
1637
|
-
node {
|
|
1638
|
-
parentDirectory {
|
|
1639
|
-
id
|
|
1640
|
-
plainMeta
|
|
1641
|
-
}
|
|
1642
|
-
}
|
|
1643
|
-
}
|
|
1644
|
-
}
|
|
1645
|
-
}
|
|
1646
|
-
keyGraph(cachedKeyIds: $cachedKeyIds) {
|
|
1647
|
-
...KeyGraphFragment
|
|
1648
|
-
}
|
|
1649
|
-
}
|
|
1650
|
-
${KeyGraphFragment}
|
|
1651
|
-
`;
|
|
1652
1621
|
const DirectoryQuery = gql `
|
|
1653
1622
|
query Directory($id: LrRelayIdInput!, $cachedKeyIds: [LrRelayIdInput!]) {
|
|
1654
1623
|
directory(id: $id) {
|
|
@@ -1663,109 +1632,6 @@ const DirectoryQuery = gql `
|
|
|
1663
1632
|
}
|
|
1664
1633
|
${KeyGraphFragment}
|
|
1665
1634
|
`;
|
|
1666
|
-
const CreateFileQuery = gql `
|
|
1667
|
-
mutation CreateFile($input: CreateFileInput!) {
|
|
1668
|
-
createFile(input: $input) {
|
|
1669
|
-
file {
|
|
1670
|
-
id
|
|
1671
|
-
}
|
|
1672
|
-
}
|
|
1673
|
-
}
|
|
1674
|
-
`;
|
|
1675
|
-
const UpdateFileQuery = gql `
|
|
1676
|
-
mutation UpdateFile($input: UpdateFileInput!) {
|
|
1677
|
-
updateFile(input: $input) {
|
|
1678
|
-
file {
|
|
1679
|
-
id
|
|
1680
|
-
currentVersion {
|
|
1681
|
-
id
|
|
1682
|
-
state {
|
|
1683
|
-
id
|
|
1684
|
-
}
|
|
1685
|
-
}
|
|
1686
|
-
}
|
|
1687
|
-
}
|
|
1688
|
-
}
|
|
1689
|
-
`;
|
|
1690
|
-
const RevertFileQuery = gql `
|
|
1691
|
-
mutation RevertFile($input: RevertFileInput!) {
|
|
1692
|
-
revertFile(input: $input) {
|
|
1693
|
-
file {
|
|
1694
|
-
id
|
|
1695
|
-
currentVersion {
|
|
1696
|
-
id
|
|
1697
|
-
state {
|
|
1698
|
-
id
|
|
1699
|
-
}
|
|
1700
|
-
}
|
|
1701
|
-
}
|
|
1702
|
-
}
|
|
1703
|
-
}
|
|
1704
|
-
`;
|
|
1705
|
-
const MoveFileQuery = gql `
|
|
1706
|
-
mutation MoveFile(
|
|
1707
|
-
$fileId: LrRelayIdInput!
|
|
1708
|
-
$fromParentDirectoryId: LrRelayIdInput!
|
|
1709
|
-
$toParentDirectoryId: LrRelayIdInput!
|
|
1710
|
-
$wrappingKeyId: LrRelayIdInput!
|
|
1711
|
-
$wrappedKey: String!
|
|
1712
|
-
) {
|
|
1713
|
-
moveFile(
|
|
1714
|
-
input: {
|
|
1715
|
-
fileId: $fileId
|
|
1716
|
-
fromParentDirectoryId: $fromParentDirectoryId
|
|
1717
|
-
toParentDirectoryId: $toParentDirectoryId
|
|
1718
|
-
wrappingKeyId: $wrappingKeyId
|
|
1719
|
-
wrappedKey: $wrappedKey
|
|
1720
|
-
}
|
|
1721
|
-
) {
|
|
1722
|
-
file {
|
|
1723
|
-
id
|
|
1724
|
-
parentDirectoryLinks {
|
|
1725
|
-
edges {
|
|
1726
|
-
node {
|
|
1727
|
-
parentDirectory {
|
|
1728
|
-
plainMeta
|
|
1729
|
-
}
|
|
1730
|
-
}
|
|
1731
|
-
}
|
|
1732
|
-
}
|
|
1733
|
-
}
|
|
1734
|
-
}
|
|
1735
|
-
}
|
|
1736
|
-
`;
|
|
1737
|
-
const MoveDirectoryQuery = gql `
|
|
1738
|
-
mutation MoveDirectory(
|
|
1739
|
-
$directoryId: LrRelayIdInput!
|
|
1740
|
-
$fromParentDirectoryId: LrRelayIdInput
|
|
1741
|
-
$toParentDirectoryId: LrRelayIdInput!
|
|
1742
|
-
$wrappedKey: String!
|
|
1743
|
-
$wrappingKeyId: LrRelayIdInput!
|
|
1744
|
-
) {
|
|
1745
|
-
moveDirectory(
|
|
1746
|
-
input: {
|
|
1747
|
-
directoryId: $directoryId
|
|
1748
|
-
fromParentDirectoryId: $fromParentDirectoryId
|
|
1749
|
-
toParentDirectoryId: $toParentDirectoryId
|
|
1750
|
-
wrappedKey: $wrappedKey
|
|
1751
|
-
wrappingKeyId: $wrappingKeyId
|
|
1752
|
-
}
|
|
1753
|
-
) {
|
|
1754
|
-
directory {
|
|
1755
|
-
id
|
|
1756
|
-
parentDirectoryLinks {
|
|
1757
|
-
edges {
|
|
1758
|
-
node {
|
|
1759
|
-
parentDirectory {
|
|
1760
|
-
plainMeta
|
|
1761
|
-
}
|
|
1762
|
-
}
|
|
1763
|
-
}
|
|
1764
|
-
}
|
|
1765
|
-
}
|
|
1766
|
-
}
|
|
1767
|
-
}
|
|
1768
|
-
`;
|
|
1769
1635
|
|
|
1770
1636
|
/* eslint-disable @typescript-eslint/no-explicit-any */
|
|
1771
1637
|
/**
|
|
@@ -1936,7 +1802,7 @@ let TpPasswordResetProcessorService = class TpPasswordResetProcessorService {
|
|
|
1936
1802
|
this.ngZone = ngZone;
|
|
1937
1803
|
this.keyGraph = keyGraph;
|
|
1938
1804
|
}
|
|
1939
|
-
|
|
1805
|
+
processTpPasswordResetUser(node) {
|
|
1940
1806
|
var _a;
|
|
1941
1807
|
return __awaiter(this, void 0, void 0, function* () {
|
|
1942
1808
|
const pxk = ((_a = node.pxk) === null || _a === void 0 ? void 0 : _a.id) && (yield this.keyGraph.getKey(node.pxk.id));
|
|
@@ -2415,7 +2281,9 @@ class LrMutation extends LrMutationBase {
|
|
|
2415
2281
|
const mutationNode = getMutation(mutationDoc);
|
|
2416
2282
|
const fragmentMap = {};
|
|
2417
2283
|
getFragments(fragments).forEach((fragment) => {
|
|
2418
|
-
|
|
2284
|
+
// Using '_' as the delimiter for the dummy suffix which only serves to make fragment names
|
|
2285
|
+
// unique since apollo client demands unique fragment names.
|
|
2286
|
+
fragmentMap[fragment.name.value.split('_')[0]] = fragment;
|
|
2419
2287
|
});
|
|
2420
2288
|
const replaceFieldSelection = (selection) => {
|
|
2421
2289
|
const field = selection;
|
|
@@ -2428,7 +2296,7 @@ class LrMutation extends LrMutationBase {
|
|
|
2428
2296
|
// a fragment using the same name as the mutation field.
|
|
2429
2297
|
// We will also rename the fragment to the same name.
|
|
2430
2298
|
field.selectionSet.selections = [
|
|
2431
|
-
Object.assign(Object.assign({}, fragmentSpreadAstSelection), { name: name(
|
|
2299
|
+
Object.assign(Object.assign({}, fragmentSpreadAstSelection), { name: name(fragment.name.value) }),
|
|
2432
2300
|
];
|
|
2433
2301
|
};
|
|
2434
2302
|
mutationNode.selectionSet.selections.forEach((selection) => {
|
|
@@ -2838,16 +2706,16 @@ var PlanState;
|
|
|
2838
2706
|
PlanState["ENABLED"] = "ENABLED";
|
|
2839
2707
|
PlanState["DISABLED"] = "DISABLED";
|
|
2840
2708
|
})(PlanState || (PlanState = {}));
|
|
2841
|
-
var
|
|
2842
|
-
(function (
|
|
2843
|
-
|
|
2844
|
-
|
|
2845
|
-
})(
|
|
2846
|
-
var
|
|
2847
|
-
(function (
|
|
2848
|
-
|
|
2849
|
-
|
|
2850
|
-
})(
|
|
2709
|
+
var ShareTypeChoice;
|
|
2710
|
+
(function (ShareTypeChoice) {
|
|
2711
|
+
ShareTypeChoice["TP"] = "TP";
|
|
2712
|
+
ShareTypeChoice["DETACHED"] = "DETACHED";
|
|
2713
|
+
})(ShareTypeChoice || (ShareTypeChoice = {}));
|
|
2714
|
+
var DetachedShareStateChoice;
|
|
2715
|
+
(function (DetachedShareStateChoice) {
|
|
2716
|
+
DetachedShareStateChoice["IN_PROGRESS"] = "IN_PROGRESS";
|
|
2717
|
+
DetachedShareStateChoice["COMPLETED"] = "COMPLETED";
|
|
2718
|
+
})(DetachedShareStateChoice || (DetachedShareStateChoice = {}));
|
|
2851
2719
|
var AccessRoleChoice;
|
|
2852
2720
|
(function (AccessRoleChoice) {
|
|
2853
2721
|
AccessRoleChoice["READER"] = "READER";
|
|
@@ -2977,11 +2845,6 @@ var LinkTypeField;
|
|
|
2977
2845
|
LinkTypeField["HARD"] = "HARD";
|
|
2978
2846
|
LinkTypeField["SOFT"] = "SOFT";
|
|
2979
2847
|
})(LinkTypeField || (LinkTypeField = {}));
|
|
2980
|
-
var BillingPeriodField;
|
|
2981
|
-
(function (BillingPeriodField) {
|
|
2982
|
-
BillingPeriodField["MONTHLY"] = "MONTHLY";
|
|
2983
|
-
BillingPeriodField["ANNUAL"] = "ANNUAL";
|
|
2984
|
-
})(BillingPeriodField || (BillingPeriodField = {}));
|
|
2985
2848
|
var PlanStateField;
|
|
2986
2849
|
(function (PlanStateField) {
|
|
2987
2850
|
PlanStateField["TRIALLING"] = "TRIALLING";
|
|
@@ -5114,8 +4977,6 @@ var RecoveryStatus;
|
|
|
5114
4977
|
RecoveryStatus["NEW_PASSWORD"] = "NEW_PASSWORD";
|
|
5115
4978
|
RecoveryStatus["OLD_PASSWORD"] = "OLD_PASSWORD";
|
|
5116
4979
|
})(RecoveryStatus || (RecoveryStatus = {}));
|
|
5117
|
-
// TODO restrict this type
|
|
5118
|
-
// export type AuthResetUser = TpPasswordResetUserNode;
|
|
5119
4980
|
var PasswordChangeStatus;
|
|
5120
4981
|
(function (PasswordChangeStatus) {
|
|
5121
4982
|
PasswordChangeStatus["IN_PROGRESS"] = "IN_PROGRESS";
|
|
@@ -5480,9 +5341,10 @@ let AuthService = AuthService_1 = class AuthService extends LrService {
|
|
|
5480
5341
|
});
|
|
5481
5342
|
// Regular user populates all keys
|
|
5482
5343
|
yield this.keyGraphService.populateKeys(currentUser.currentUserKey);
|
|
5483
|
-
const { username } = currentUser;
|
|
5344
|
+
const { id, username } = currentUser;
|
|
5484
5345
|
const userAttributes = yield this.cognito.userAttributes(cognitoUser);
|
|
5485
5346
|
return {
|
|
5347
|
+
id,
|
|
5486
5348
|
username,
|
|
5487
5349
|
sub: this.getCognitoUserAttribute('sub', userAttributes),
|
|
5488
5350
|
loginEmail: this.getCognitoUserAttribute('email', userAttributes),
|
|
@@ -5634,7 +5496,7 @@ let AuthService = AuthService_1 = class AuthService extends LrService {
|
|
|
5634
5496
|
debugLoadUser(password) {
|
|
5635
5497
|
return __awaiter(this, void 0, void 0, function* () {
|
|
5636
5498
|
const currentUser = yield this.fetchCurrentUser();
|
|
5637
|
-
const { username, currentUserKey } = currentUser;
|
|
5499
|
+
const { id, username, currentUserKey } = currentUser;
|
|
5638
5500
|
// Debug mode can not deal with session encryption key yet.
|
|
5639
5501
|
// NO SESSION ENCRYPTION KEY.
|
|
5640
5502
|
const passKey = (yield this.keyFactoryService.derivePassKey(Object.assign({ password }, currentUserKey.passKey.passKeyParams))).jwk;
|
|
@@ -5642,6 +5504,7 @@ let AuthService = AuthService_1 = class AuthService extends LrService {
|
|
|
5642
5504
|
yield this.idleService.persistMasterKey(masterKey);
|
|
5643
5505
|
yield this.keyGraphService.populateKeys(currentUserKey);
|
|
5644
5506
|
this.user = {
|
|
5507
|
+
id,
|
|
5645
5508
|
username,
|
|
5646
5509
|
resetUser: null,
|
|
5647
5510
|
sub: 'DEBUG_MODE',
|
|
@@ -6141,18 +6004,18 @@ query FileKeyQuery($id: LrRelayIdInput!) {
|
|
|
6141
6004
|
}
|
|
6142
6005
|
}
|
|
6143
6006
|
`;
|
|
6144
|
-
const
|
|
6145
|
-
query
|
|
6146
|
-
|
|
6007
|
+
const DirectoryKeyFromDirectoryShareQuery = gqlTyped `
|
|
6008
|
+
query DirectoryKeyFromDirectoryShareQuery($id: LrRelayIdInput!) {
|
|
6009
|
+
directoryShare(id: $id) {
|
|
6147
6010
|
item {
|
|
6148
6011
|
keyId
|
|
6149
6012
|
}
|
|
6150
6013
|
}
|
|
6151
6014
|
}
|
|
6152
6015
|
`;
|
|
6153
|
-
const
|
|
6154
|
-
query
|
|
6155
|
-
|
|
6016
|
+
const FileKeyFromFileShareQuery = gqlTyped `
|
|
6017
|
+
query FileKeyFromFileShareQuery($id: LrRelayIdInput!) {
|
|
6018
|
+
fileShare(id: $id) {
|
|
6156
6019
|
item {
|
|
6157
6020
|
keyId
|
|
6158
6021
|
}
|
|
@@ -6212,24 +6075,24 @@ let ItemService = ItemService_1 = class ItemService extends LrService {
|
|
|
6212
6075
|
})).file.keyId;
|
|
6213
6076
|
});
|
|
6214
6077
|
}
|
|
6215
|
-
|
|
6078
|
+
getDirectoryKeyIdFromDirectoryShare(directoryShareId) {
|
|
6216
6079
|
return __awaiter(this, void 0, void 0, function* () {
|
|
6217
6080
|
return (yield this.query({
|
|
6218
|
-
query:
|
|
6081
|
+
query: DirectoryKeyFromDirectoryShareQuery,
|
|
6219
6082
|
variables: {
|
|
6220
|
-
id:
|
|
6083
|
+
id: directoryShareId,
|
|
6221
6084
|
},
|
|
6222
|
-
})).
|
|
6085
|
+
})).directoryShare.item.keyId;
|
|
6223
6086
|
});
|
|
6224
6087
|
}
|
|
6225
|
-
|
|
6088
|
+
getFileKeyIdFromFileShare(fileShareId) {
|
|
6226
6089
|
return __awaiter(this, void 0, void 0, function* () {
|
|
6227
6090
|
return (yield this.query({
|
|
6228
|
-
query:
|
|
6091
|
+
query: FileKeyFromFileShareQuery,
|
|
6229
6092
|
variables: {
|
|
6230
|
-
id:
|
|
6093
|
+
id: fileShareId,
|
|
6231
6094
|
},
|
|
6232
|
-
})).
|
|
6095
|
+
})).fileShare.item.keyId;
|
|
6233
6096
|
});
|
|
6234
6097
|
}
|
|
6235
6098
|
getDirectoryKey(directoryId, directoryKeyId) {
|
|
@@ -8706,36 +8569,38 @@ query ScenarioQuery(
|
|
|
8706
8569
|
id
|
|
8707
8570
|
}
|
|
8708
8571
|
sharedCipherData
|
|
8709
|
-
|
|
8710
|
-
|
|
8711
|
-
|
|
8712
|
-
|
|
8713
|
-
sharedCipherData
|
|
8714
|
-
sharedKey {
|
|
8715
|
-
id
|
|
8716
|
-
}
|
|
8717
|
-
accessRole
|
|
8718
|
-
itemKey {
|
|
8719
|
-
id
|
|
8720
|
-
}
|
|
8721
|
-
directory {
|
|
8572
|
+
receiverItems {
|
|
8573
|
+
receiverDirectories {
|
|
8574
|
+
edges {
|
|
8575
|
+
node {
|
|
8722
8576
|
id
|
|
8723
|
-
|
|
8577
|
+
sharedCipherData
|
|
8578
|
+
sharedKey {
|
|
8579
|
+
id
|
|
8580
|
+
}
|
|
8581
|
+
accessRole
|
|
8582
|
+
itemKey {
|
|
8583
|
+
id
|
|
8584
|
+
}
|
|
8585
|
+
directory {
|
|
8586
|
+
id
|
|
8587
|
+
keyId
|
|
8588
|
+
}
|
|
8724
8589
|
}
|
|
8725
8590
|
}
|
|
8726
8591
|
}
|
|
8727
|
-
|
|
8728
|
-
|
|
8729
|
-
|
|
8730
|
-
node {
|
|
8731
|
-
id
|
|
8732
|
-
sharedCipherData
|
|
8733
|
-
sharedKey {
|
|
8734
|
-
id
|
|
8735
|
-
}
|
|
8736
|
-
accessRole
|
|
8737
|
-
itemKey {
|
|
8592
|
+
receiverFiles {
|
|
8593
|
+
edges {
|
|
8594
|
+
node {
|
|
8738
8595
|
id
|
|
8596
|
+
sharedCipherData
|
|
8597
|
+
sharedKey {
|
|
8598
|
+
id
|
|
8599
|
+
}
|
|
8600
|
+
accessRole
|
|
8601
|
+
itemKey {
|
|
8602
|
+
id
|
|
8603
|
+
}
|
|
8739
8604
|
}
|
|
8740
8605
|
}
|
|
8741
8606
|
}
|
|
@@ -8767,11 +8632,13 @@ query SharedScenarioQuery($scenarioId: LrRelayIdInput!) {
|
|
|
8767
8632
|
pbk {
|
|
8768
8633
|
id
|
|
8769
8634
|
}
|
|
8770
|
-
|
|
8771
|
-
|
|
8772
|
-
|
|
8773
|
-
|
|
8774
|
-
|
|
8635
|
+
receiverItems {
|
|
8636
|
+
receiverDirectories {
|
|
8637
|
+
edges {
|
|
8638
|
+
node {
|
|
8639
|
+
id
|
|
8640
|
+
wrappedItemKey
|
|
8641
|
+
}
|
|
8775
8642
|
}
|
|
8776
8643
|
}
|
|
8777
8644
|
}
|
|
@@ -8820,6 +8687,7 @@ query SharedScenarioQuery($scenarioId: LrRelayIdInput!) {
|
|
|
8820
8687
|
}
|
|
8821
8688
|
asClaimReceiver {
|
|
8822
8689
|
received
|
|
8690
|
+
assemblyKeyId
|
|
8823
8691
|
approvals {
|
|
8824
8692
|
edges {
|
|
8825
8693
|
node {
|
|
@@ -8993,15 +8861,15 @@ let ScenarioService = class ScenarioService extends LrService {
|
|
|
8993
8861
|
}
|
|
8994
8862
|
receiveClaim(scenarioId, sharedClaimId) {
|
|
8995
8863
|
return __awaiter(this, void 0, void 0, function* () {
|
|
8996
|
-
return this.mutate(this.
|
|
8864
|
+
return this.mutate(this.receiveClaim2Mutation(scenarioId, sharedClaimId));
|
|
8997
8865
|
});
|
|
8998
8866
|
}
|
|
8999
|
-
|
|
8867
|
+
receiveClaim2Mutation(scenarioId, sharedClaimId) {
|
|
9000
8868
|
return __awaiter(this, void 0, void 0, function* () {
|
|
9001
8869
|
return new LrMutation({
|
|
9002
8870
|
mutation: ReceiveScenarioClaimMutation,
|
|
9003
8871
|
variables: {
|
|
9004
|
-
input: yield this.
|
|
8872
|
+
input: yield this.prepareReceiveClaim2(scenarioId, sharedClaimId),
|
|
9005
8873
|
},
|
|
9006
8874
|
});
|
|
9007
8875
|
});
|
|
@@ -9152,8 +9020,6 @@ let ScenarioService = class ScenarioService extends LrService {
|
|
|
9152
9020
|
const directoryKey = yield this.itemService.getDirectoryKey(options.directoryId, options.directoryKeyId);
|
|
9153
9021
|
const sharedCipherData = yield this.keyGraph.encryptToString(receiverSharedKey, options.sharedCipherDataClearJson || '');
|
|
9154
9022
|
let wrappedItemKey = yield this.keyGraph.encryptToString(receiverSharedKey, directoryKey.jwk.toJSON(true));
|
|
9155
|
-
// TODO fetch assemblyKeyId. We are changing it such that there is always an assembly
|
|
9156
|
-
// before receivers can be added.
|
|
9157
9023
|
wrappedItemKey = yield this.keyGraph.encryptToString(assemblyKey, wrappedItemKey);
|
|
9158
9024
|
return {
|
|
9159
9025
|
directoryId: options.directoryId,
|
|
@@ -9177,7 +9043,7 @@ let ScenarioService = class ScenarioService extends LrService {
|
|
|
9177
9043
|
const deleteDirectoriesOptions = options.deleteDirectories || [];
|
|
9178
9044
|
const updateDirectoriesOptions = options.updateDirectories || [];
|
|
9179
9045
|
// Fill in any missing update directories
|
|
9180
|
-
mapEdges(existingReceiver.receiverDirectories).forEach((existingDirectory) => {
|
|
9046
|
+
mapEdges(existingReceiver.receiverItems.receiverDirectories).forEach((existingDirectory) => {
|
|
9181
9047
|
if (deleteDirectoriesOptions.includes(existingDirectory.directory.id)) {
|
|
9182
9048
|
return;
|
|
9183
9049
|
}
|
|
@@ -9200,7 +9066,7 @@ let ScenarioService = class ScenarioService extends LrService {
|
|
|
9200
9066
|
}
|
|
9201
9067
|
prepareExistingReceiver(existingReceiver, assemblyKey) {
|
|
9202
9068
|
return __awaiter(this, void 0, void 0, function* () {
|
|
9203
|
-
const updateDirectories = mapEdges(existingReceiver.receiverDirectories).map((receiverDirectory) => ({
|
|
9069
|
+
const updateDirectories = mapEdges(existingReceiver.receiverItems.receiverDirectories).map((receiverDirectory) => ({
|
|
9204
9070
|
directoryId: receiverDirectory.directory.id,
|
|
9205
9071
|
directoryKeyId: receiverDirectory.directory.keyId,
|
|
9206
9072
|
accessRole: receiverDirectory.accessRole,
|
|
@@ -9259,7 +9125,29 @@ let ScenarioService = class ScenarioService extends LrService {
|
|
|
9259
9125
|
return mutationInput;
|
|
9260
9126
|
});
|
|
9261
9127
|
}
|
|
9262
|
-
|
|
9128
|
+
prepareReceiveClaim2(scenarioId, sharedClaimId) {
|
|
9129
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
9130
|
+
// Get all the shared items
|
|
9131
|
+
const sharedScenario = (yield this.getSharedScenario(scenarioId, sharedClaimId)).sharedScenario;
|
|
9132
|
+
if (sharedScenario.state !== ScenarioState.APPROVED) {
|
|
9133
|
+
throwClaimNotApproved();
|
|
9134
|
+
}
|
|
9135
|
+
const approvals = mapEdges(sharedScenario.sharedClaim.asClaimReceiver.approvals);
|
|
9136
|
+
const assemblyKey = yield this.recoverAssemblyKey(approvals);
|
|
9137
|
+
// Wrap assembly key with shared key.
|
|
9138
|
+
//???
|
|
9139
|
+
// This sharedKey is created just for this scenario. It's wrapped by the tpSharedKey.
|
|
9140
|
+
const sharedKey = yield this.keyGraph.getKey(sharedScenario.asReceiver.sharedKey.id);
|
|
9141
|
+
const sharedKeyWrappedAssemblyKey = yield this.keyGraph.encryptToString(sharedKey, assemblyKey.toJSON(true));
|
|
9142
|
+
return {
|
|
9143
|
+
scenarioClaimId: sharedClaimId,
|
|
9144
|
+
sharedKeyWrappedAssemblyKey,
|
|
9145
|
+
sharedKeyId: sharedKey.id,
|
|
9146
|
+
assemblyKeyId: sharedScenario.sharedClaim.asClaimReceiver.assemblyKeyId,
|
|
9147
|
+
};
|
|
9148
|
+
});
|
|
9149
|
+
}
|
|
9150
|
+
prepareReceiveClaim(scenarioId, sharedClaimId) {
|
|
9263
9151
|
return __awaiter(this, void 0, void 0, function* () {
|
|
9264
9152
|
// Get all the shared items
|
|
9265
9153
|
const sharedScenario = (yield this.getSharedScenario(scenarioId, sharedClaimId)).sharedScenario;
|
|
@@ -9269,12 +9157,14 @@ let ScenarioService = class ScenarioService extends LrService {
|
|
|
9269
9157
|
const approvals = mapEdges(sharedScenario.sharedClaim.asClaimReceiver.approvals);
|
|
9270
9158
|
const assemblyKey = yield this.recoverAssemblyKey(approvals);
|
|
9271
9159
|
// Decrypt all items
|
|
9272
|
-
const receiverDirectories = yield Promise.all(sharedScenario.asReceiver.receiverDirectories.edges
|
|
9160
|
+
const receiverDirectories = yield Promise.all(sharedScenario.asReceiver.receiverItems.receiverDirectories.edges
|
|
9273
9161
|
.map((edge) => edge.node)
|
|
9274
9162
|
.map((receiverDirectory) => __awaiter(this, void 0, void 0, function* () {
|
|
9275
9163
|
const wrappedItemKey = yield this.encryptionService.decrypt(assemblyKey, receiverDirectory.wrappedItemKey);
|
|
9276
9164
|
return {
|
|
9277
9165
|
receiverDirectoryId: receiverDirectory.id,
|
|
9166
|
+
// Looks like receiverDirectory.wrappedItemKey has no other content in side it except a wrapped key.
|
|
9167
|
+
// So we can turn this in to a doubly wrapped key and just release the assembly key.
|
|
9278
9168
|
receiverSharedKeyWrappedItemKey: wrappedItemKey,
|
|
9279
9169
|
};
|
|
9280
9170
|
})));
|
|
@@ -10088,7 +9978,7 @@ mutation DeleteTpMutation($input: DeleteTpInput!) {
|
|
|
10088
9978
|
const ShareDirectoryMutation = gqlTyped `
|
|
10089
9979
|
mutation ShareDirectoryMutation($input: ShareDirectoryInput!) {
|
|
10090
9980
|
shareDirectory(input: $input) {
|
|
10091
|
-
|
|
9981
|
+
directoryShare {
|
|
10092
9982
|
id
|
|
10093
9983
|
}
|
|
10094
9984
|
}
|
|
@@ -10097,7 +9987,7 @@ const ShareDirectoryMutation = gqlTyped `
|
|
|
10097
9987
|
const UnshareDirectoryMutation = gqlTyped `
|
|
10098
9988
|
mutation UnshareDirectoryMutation($input: UnshareDirectoryInput!) {
|
|
10099
9989
|
unshareDirectory(input: $input) {
|
|
10100
|
-
|
|
9990
|
+
directoryShare {
|
|
10101
9991
|
id
|
|
10102
9992
|
}
|
|
10103
9993
|
}
|
|
@@ -10106,7 +9996,7 @@ const UnshareDirectoryMutation = gqlTyped `
|
|
|
10106
9996
|
const ShareFileMutation = gqlTyped `
|
|
10107
9997
|
mutation ShareFileMutation($input: ShareFileInput!) {
|
|
10108
9998
|
shareFile(input: $input) {
|
|
10109
|
-
|
|
9999
|
+
fileShare {
|
|
10110
10000
|
id
|
|
10111
10001
|
}
|
|
10112
10002
|
}
|
|
@@ -10115,75 +10005,75 @@ const ShareFileMutation = gqlTyped `
|
|
|
10115
10005
|
const UnshareFileMutation = gqlTyped `
|
|
10116
10006
|
mutation UnshareFileMutation($input: UnshareFileInput!) {
|
|
10117
10007
|
unshareFile(input: $input) {
|
|
10118
|
-
|
|
10008
|
+
fileShare {
|
|
10119
10009
|
id
|
|
10120
10010
|
}
|
|
10121
10011
|
}
|
|
10122
10012
|
}
|
|
10123
10013
|
`;
|
|
10124
|
-
const
|
|
10125
|
-
mutation
|
|
10126
|
-
|
|
10127
|
-
|
|
10014
|
+
const CreateDirectoryShareMutation = gqlTyped `
|
|
10015
|
+
mutation CreateDirectoryShareMutation($input: CreateDirectoryShareInput!) {
|
|
10016
|
+
createDirectoryShare(input: $input) {
|
|
10017
|
+
directoryShare {
|
|
10128
10018
|
id
|
|
10129
10019
|
}
|
|
10130
10020
|
}
|
|
10131
10021
|
}
|
|
10132
10022
|
`;
|
|
10133
|
-
const
|
|
10134
|
-
mutation
|
|
10135
|
-
|
|
10136
|
-
|
|
10023
|
+
const CreateFileShareMutation = gqlTyped `
|
|
10024
|
+
mutation CreateFileShareMutation($input: CreateFileShareInput!) {
|
|
10025
|
+
createFileShare(input: $input) {
|
|
10026
|
+
fileShare {
|
|
10137
10027
|
id
|
|
10138
10028
|
}
|
|
10139
10029
|
}
|
|
10140
10030
|
}
|
|
10141
10031
|
`;
|
|
10142
|
-
const
|
|
10143
|
-
mutation
|
|
10144
|
-
|
|
10145
|
-
|
|
10032
|
+
const UpdateDirectoryShareMutation = gqlTyped `
|
|
10033
|
+
mutation UpdateDirectoryShareMutation($input: UpdateDirectoryShareInput!) {
|
|
10034
|
+
updateDirectoryShare(input: $input) {
|
|
10035
|
+
directoryShare {
|
|
10146
10036
|
id
|
|
10147
10037
|
}
|
|
10148
10038
|
}
|
|
10149
10039
|
}
|
|
10150
10040
|
`;
|
|
10151
|
-
const
|
|
10152
|
-
mutation
|
|
10153
|
-
|
|
10154
|
-
|
|
10041
|
+
const UpdateFileShareMutation = gqlTyped `
|
|
10042
|
+
mutation UpdateFileShareMutation($input: UpdateFileShareInput!) {
|
|
10043
|
+
updateFileShare(input: $input) {
|
|
10044
|
+
fileShare {
|
|
10155
10045
|
id
|
|
10156
10046
|
}
|
|
10157
10047
|
}
|
|
10158
10048
|
}
|
|
10159
10049
|
`;
|
|
10160
|
-
const
|
|
10161
|
-
mutation
|
|
10162
|
-
|
|
10050
|
+
const DeleteDirectoryShareMutation = gqlTyped `
|
|
10051
|
+
mutation DeleteDirectoryShareMutation($input: DeleteDirectoryShareInput!) {
|
|
10052
|
+
deleteDirectoryShare(input: $input) {
|
|
10163
10053
|
id
|
|
10164
10054
|
}
|
|
10165
10055
|
}
|
|
10166
10056
|
`;
|
|
10167
|
-
const
|
|
10168
|
-
mutation
|
|
10169
|
-
|
|
10057
|
+
const DeleteFileShareMutation = gqlTyped `
|
|
10058
|
+
mutation DeleteFileShareMutation($input: DeleteFileShareInput!) {
|
|
10059
|
+
deleteFileShare(input: $input) {
|
|
10170
10060
|
id
|
|
10171
10061
|
}
|
|
10172
10062
|
}
|
|
10173
10063
|
`;
|
|
10174
|
-
const
|
|
10175
|
-
mutation
|
|
10176
|
-
|
|
10177
|
-
|
|
10064
|
+
const CompleteDetachedDirectoryShareMutation = gqlTyped `
|
|
10065
|
+
mutation CompleteDetachedDirectoryShareMutation($input: CompleteDetachedDirectoryShareInput!) {
|
|
10066
|
+
completeDetachedDirectoryShare(input: $input) {
|
|
10067
|
+
directoryShare {
|
|
10178
10068
|
id
|
|
10179
10069
|
}
|
|
10180
10070
|
}
|
|
10181
10071
|
}
|
|
10182
10072
|
`;
|
|
10183
|
-
const
|
|
10184
|
-
mutation
|
|
10185
|
-
|
|
10186
|
-
|
|
10073
|
+
const CompleteDetachedFileShareMutation = gqlTyped `
|
|
10074
|
+
mutation CompleteDetachedFileShareMutation($input: CompleteDetachedFileShareInput!) {
|
|
10075
|
+
completeDetachedFileShare(input: $input) {
|
|
10076
|
+
fileShare {
|
|
10187
10077
|
id
|
|
10188
10078
|
}
|
|
10189
10079
|
}
|
|
@@ -10336,28 +10226,28 @@ let TrustedPartyService = class TrustedPartyService extends LrService {
|
|
|
10336
10226
|
});
|
|
10337
10227
|
});
|
|
10338
10228
|
}
|
|
10339
|
-
|
|
10229
|
+
createDirectoryShare(options) {
|
|
10340
10230
|
return __awaiter(this, void 0, void 0, function* () {
|
|
10341
|
-
return this.mutate(this.
|
|
10231
|
+
return this.mutate(this.createDirectoryShareMutation(options));
|
|
10342
10232
|
});
|
|
10343
10233
|
}
|
|
10344
|
-
|
|
10234
|
+
createDirectoryShareMutation(options) {
|
|
10345
10235
|
return __awaiter(this, void 0, void 0, function* () {
|
|
10346
10236
|
return new LrMutation({
|
|
10347
|
-
mutation:
|
|
10237
|
+
mutation: CreateDirectoryShareMutation,
|
|
10348
10238
|
variables: yield this.prepareCreateSharedItemMutation(Object.assign(Object.assign({}, options), { isDirectory: true })),
|
|
10349
10239
|
});
|
|
10350
10240
|
});
|
|
10351
10241
|
}
|
|
10352
|
-
|
|
10242
|
+
createFileShare(options) {
|
|
10353
10243
|
return __awaiter(this, void 0, void 0, function* () {
|
|
10354
|
-
return this.mutate(this.
|
|
10244
|
+
return this.mutate(this.createFileShareMutation(options));
|
|
10355
10245
|
});
|
|
10356
10246
|
}
|
|
10357
|
-
|
|
10247
|
+
createFileShareMutation(options) {
|
|
10358
10248
|
return __awaiter(this, void 0, void 0, function* () {
|
|
10359
10249
|
return new LrMutation({
|
|
10360
|
-
mutation:
|
|
10250
|
+
mutation: CreateFileShareMutation,
|
|
10361
10251
|
variables: yield this.prepareCreateSharedItemMutation(Object.assign(Object.assign({}, options), { isDirectory: false })),
|
|
10362
10252
|
});
|
|
10363
10253
|
});
|
|
@@ -10385,28 +10275,28 @@ let TrustedPartyService = class TrustedPartyService extends LrService {
|
|
|
10385
10275
|
};
|
|
10386
10276
|
});
|
|
10387
10277
|
}
|
|
10388
|
-
|
|
10278
|
+
updateDirectoryShare(options) {
|
|
10389
10279
|
return __awaiter(this, void 0, void 0, function* () {
|
|
10390
|
-
return this.mutate(this.
|
|
10280
|
+
return this.mutate(this.updateDirectoryShareMutation(options));
|
|
10391
10281
|
});
|
|
10392
10282
|
}
|
|
10393
|
-
|
|
10283
|
+
updateDirectoryShareMutation(options) {
|
|
10394
10284
|
return __awaiter(this, void 0, void 0, function* () {
|
|
10395
10285
|
return new LrMutation({
|
|
10396
|
-
mutation:
|
|
10286
|
+
mutation: UpdateDirectoryShareMutation,
|
|
10397
10287
|
variables: this.prepareUpdateSharedItemMutation(options),
|
|
10398
10288
|
});
|
|
10399
10289
|
});
|
|
10400
10290
|
}
|
|
10401
|
-
|
|
10291
|
+
updateFileShare(options) {
|
|
10402
10292
|
return __awaiter(this, void 0, void 0, function* () {
|
|
10403
|
-
return this.mutate(this.
|
|
10293
|
+
return this.mutate(this.updateFileShareMutation(options));
|
|
10404
10294
|
});
|
|
10405
10295
|
}
|
|
10406
|
-
|
|
10296
|
+
updateFileShareMutation(options) {
|
|
10407
10297
|
return __awaiter(this, void 0, void 0, function* () {
|
|
10408
10298
|
return new LrMutation({
|
|
10409
|
-
mutation:
|
|
10299
|
+
mutation: UpdateFileShareMutation,
|
|
10410
10300
|
variables: this.prepareUpdateSharedItemMutation(options),
|
|
10411
10301
|
});
|
|
10412
10302
|
});
|
|
@@ -10420,15 +10310,15 @@ let TrustedPartyService = class TrustedPartyService extends LrService {
|
|
|
10420
10310
|
},
|
|
10421
10311
|
};
|
|
10422
10312
|
}
|
|
10423
|
-
|
|
10313
|
+
deleteDirectoryShare(id) {
|
|
10424
10314
|
return __awaiter(this, void 0, void 0, function* () {
|
|
10425
|
-
return this.mutate(this.
|
|
10315
|
+
return this.mutate(this.deleteDirectoryShareMutation(id));
|
|
10426
10316
|
});
|
|
10427
10317
|
}
|
|
10428
|
-
|
|
10318
|
+
deleteDirectoryShareMutation(id) {
|
|
10429
10319
|
return __awaiter(this, void 0, void 0, function* () {
|
|
10430
10320
|
return new LrMutation({
|
|
10431
|
-
mutation:
|
|
10321
|
+
mutation: DeleteDirectoryShareMutation,
|
|
10432
10322
|
variables: {
|
|
10433
10323
|
input: {
|
|
10434
10324
|
id,
|
|
@@ -10437,28 +10327,28 @@ let TrustedPartyService = class TrustedPartyService extends LrService {
|
|
|
10437
10327
|
});
|
|
10438
10328
|
});
|
|
10439
10329
|
}
|
|
10440
|
-
|
|
10330
|
+
completeDetachedDirectoryShare(options) {
|
|
10441
10331
|
return __awaiter(this, void 0, void 0, function* () {
|
|
10442
|
-
return this.mutate(this.
|
|
10332
|
+
return this.mutate(this.completeDetachedDirectoryShareMutation(options));
|
|
10443
10333
|
});
|
|
10444
10334
|
}
|
|
10445
|
-
|
|
10335
|
+
completeDetachedDirectoryShareMutation(options) {
|
|
10446
10336
|
return __awaiter(this, void 0, void 0, function* () {
|
|
10447
10337
|
return new LrMutation({
|
|
10448
|
-
mutation:
|
|
10338
|
+
mutation: CompleteDetachedDirectoryShareMutation,
|
|
10449
10339
|
variables: yield this.prepareCompleteDetachedSharedItemMutation(Object.assign(Object.assign({}, options), { isDirectory: true })),
|
|
10450
10340
|
});
|
|
10451
10341
|
});
|
|
10452
10342
|
}
|
|
10453
|
-
|
|
10343
|
+
completeDetachedFileShare(options) {
|
|
10454
10344
|
return __awaiter(this, void 0, void 0, function* () {
|
|
10455
|
-
return this.mutate(this.
|
|
10345
|
+
return this.mutate(this.completeDetachedFileShareMutation(options));
|
|
10456
10346
|
});
|
|
10457
10347
|
}
|
|
10458
|
-
|
|
10348
|
+
completeDetachedFileShareMutation(options) {
|
|
10459
10349
|
return __awaiter(this, void 0, void 0, function* () {
|
|
10460
10350
|
return new LrMutation({
|
|
10461
|
-
mutation:
|
|
10351
|
+
mutation: CompleteDetachedFileShareMutation,
|
|
10462
10352
|
variables: yield this.prepareCompleteDetachedSharedItemMutation(Object.assign(Object.assign({}, options), { isDirectory: false })),
|
|
10463
10353
|
});
|
|
10464
10354
|
});
|
|
@@ -10467,8 +10357,8 @@ let TrustedPartyService = class TrustedPartyService extends LrService {
|
|
|
10467
10357
|
return __awaiter(this, void 0, void 0, function* () {
|
|
10468
10358
|
const { sharedItemId, itemKeyId, isDirectory } = options;
|
|
10469
10359
|
const itemKey = yield this.keyGraph.getKey(itemKeyId, () => isDirectory
|
|
10470
|
-
? this.itemService.
|
|
10471
|
-
: this.itemService.
|
|
10360
|
+
? this.itemService.getDirectoryKeyIdFromDirectoryShare(sharedItemId)
|
|
10361
|
+
: this.itemService.getFileKeyIdFromFileShare(sharedItemId));
|
|
10472
10362
|
const rootKey = this.keyService.currentRootKey;
|
|
10473
10363
|
const wrappedKey = yield this.keyGraph.wrapKey(rootKey, itemKey.jwk);
|
|
10474
10364
|
return {
|
|
@@ -10760,5 +10650,5 @@ UserService.ctorParameters = () => [
|
|
|
10760
10650
|
* Generated bundle index. Do not edit.
|
|
10761
10651
|
*/
|
|
10762
10652
|
|
|
10763
|
-
export { AccessRoleChoice, AccessRoleChoiceOrder, AccessRoleMethodChoice, ApiContactCard, ApiCurrentUser, ApproveScenarioClaimMutation, ApproveTpPasswordResetRequestMutation, ArchiveDirectoryMutation, ArchiveFileMutation, AuthService, BeginDeleteChildItemLinksWindowMutation,
|
|
10653
|
+
export { AccessRoleChoice, AccessRoleChoiceOrder, AccessRoleMethodChoice, ApiContactCard, ApiCurrentUser, ApproveScenarioClaimMutation, ApproveTpPasswordResetRequestMutation, ArchiveDirectoryMutation, ArchiveFileMutation, AuthService, BeginDeleteChildItemLinksWindowMutation, CancelKeyExchangeMutation, CancelScenarioClaimMutation, CancelTpPasswordResetRequestMutation, CancelUserDeleteMutation, ChangeDirectoryParentsMutation, ChangeFileParentsMutation, ClaimApproverState, ClaimState, CognitoChallengeName, CommonProcessorsService, CompleteKeyExchangeOtkMutation, CompleteTpPasswordResetRequestMutation, Config, ContactCard2Service, ContactCardAddress, ContactCardName, ContactCardsQuery, CreateContactCardMutation$1 as CreateContactCardMutation, CreateDirectoryMutation, CreateFileMutation, CreateLbopQuery, CreateScenarioClaimMutation, CreateScenarioMutation, CreateTpAssemblyKeyChallengeMutation, CreateTpPasswordResetMutation, CurrentUserKey, CurrentUserQuery, CurrentUserSharedKeyQuery2, DebugExpireScenarioClaimMutation, DebugExpireTpPasswordResetRequestMutation, DeclineKeyExchangeMutation, DefaultProcessorOptions, DeleteDirectoryMutation, DeleteFileMutation, DeleteLbopQuery, DeleteScenarioMutation, DeleteTpPasswordResetMutation, DetachedShareStateChoice, DirectoryQuery, ERROR_SOURCE, FeatureAction, Features, FetchKeyGraphField, FileOperationField, FileUploadService, GetOwnedContactCardKeyIdsQuery, GetReceivedContactCardKeyIdQuery, IdleService, InitiateKeyExchangeOtkMutation, ItemService, KC_CONFIG, KcAuthException, KcBadArgumentException, KcBadLogicException, KcBadRequestException, KcBadSignatureException, KcBadStateException, KcBadTimeSyncException, KcCodeMismatchException, KcConcurrentAccessException, KcEncryptionException, KcError, KcErrorCode, KcException, KcInternalErrorException, KcLbopErrorCode, KcLockedException, KcNotFoundException, KcSuspiciousOperationException, KcUnsupportedException, KeyExchangeFields, KeyExchangeMode, KeyExchangeOtkState, KeyExchangeQuery2, KeyExchangeService, KeyExchangeState, KeyExchangeTokenQuery2, KeyExchangesQuery2, KeyGraphField, KeyGraphFragment, LbopQuery, LbopService, LbopsQuery, LifeReadyModule, LinkTypeField, LockService, LockState, LoginHistoryQuery, LrApolloService, LrGraphQLService, LrMergedMutation, LrMutation, LrMutationBase, LrService, MainContactCardFields, MainContactCardPlainFields, MainContactCardProperty, NotificationService, OwnerPlainDataJson, PasswordChangeStatus, PasswordCheck, PasswordService, PermissionChoice, PersistService, PlanService, PlanState, PlanStateField, PreCompleteTpPasswordResetRequestMutation, ProfileDetailsService, ProfileService, QueryProcessorService, ReceiveScenarioClaimMutation, RecoveryStatus, RegisterResult, RegisterService, RejectScenarioClaimMutation, RejectTpPasswordResetRequestMutation, ReminderService, RequestUserDeleteMutation, RespondKeyExchangeOtkMutation, RevertFileMutation, ScenarioLastClaimState, ScenarioService, ScenarioState, ServerConfigService, ServerTimeQuery, SetDirectoryConfidentialMutation, SetFileConfidentialMutation, ShareTypeChoice, SharedContactCard2Service, SharedTrustedPartyDetails, SharedVaultFeature, TPFeatures, TempDirectoryQuery, TimeService, TpAssemblyState, TpClaimApproverState, TpClaimState, TpPasswordResetRequestService, TpPasswordResetService, TpPasswordResetUserService, TrustedPartiesQuery, TrustedParty, TrustedPartyDetails, TrustedPartyProperties, TrustedPartyService, TrustedPartyType, TwoFactorService, UnarchiveDirectoryMutation, UnarchiveFileMutation, UpdateContactCardMutation$1 as UpdateContactCardMutation, UpdateDirectoryMutation, UpdateFileMutation, UpdateLbopQuery, UpdateOwnedContactCardMutation, UpdateReceivedContactCardMutation, UpdateScenarioMutation, UpdateTpPasswordResetMutation, UserDeleteState, UserService, UserSharedKeyFields, WebCryptoService, awsFetch, configureAmplifyAuth, configureApollo, fragmentSpreadAstSelection, gqlTyped, handleApolloError, handleCognitoCallback, httpOptions, mapEdges, processConnection, throwClaimIdMismatch, throwClaimNotApproved, KeyGraphService as ɵa, EncryptionService as ɵb, KeyService as ɵc, KeyFactoryService as ɵd, LrService as ɵe, RunOutsideAngular as ɵf, LrGraphQLService as ɵg, KeyMetaService as ɵh, TpPasswordResetAssemblyController as ɵi, TpAssemblyController as ɵj, SharedContactCardFields as ɵk, SharedContactCardService as ɵl, ScenarioAssemblyController as ɵm, TpPasswordResetPrivateService as ɵn };
|
|
10764
10654
|
//# sourceMappingURL=lifeready-core.js.map
|