@lifeready/core 8.0.11 → 8.0.13

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (32) hide show
  1. package/bundles/lifeready-core.umd.js +212 -45
  2. package/bundles/lifeready-core.umd.js.map +1 -1
  3. package/bundles/lifeready-core.umd.min.js +1 -1
  4. package/bundles/lifeready-core.umd.min.js.map +1 -1
  5. package/esm2015/lib/_common/exceptions.js +4 -1
  6. package/esm2015/lib/_common/index.js +3 -0
  7. package/esm2015/lib/_common/kc-lodash.js +11 -0
  8. package/esm2015/lib/api/lr-graphql/lr-graphql.service.js +2 -2
  9. package/esm2015/lib/api/lr-graphql/lr-merged-mutation.js +2 -2
  10. package/esm2015/lib/api/lr-graphql/lr-mutation.js +2 -2
  11. package/esm2015/lib/api/types/lr-graphql.types.js +1 -1
  12. package/esm2015/lib/auth/auth.service.js +12 -5
  13. package/esm2015/lib/key/key-graph.service.js +5 -5
  14. package/esm2015/lib/profile/profile-details.service.js +5 -5
  15. package/esm2015/lib/scenario/scenario.service.js +5 -1
  16. package/esm2015/lib/scenario/scenario.types.js +1 -1
  17. package/esm2015/lib/trusted-party/trusted-party.gql.private.js +25 -1
  18. package/esm2015/lib/trusted-party/trusted-party.service.js +95 -15
  19. package/esm2015/lib/trusted-party/trusted-party.types.js +1 -1
  20. package/fesm2015/lifeready-core.js +149 -28
  21. package/fesm2015/lifeready-core.js.map +1 -1
  22. package/lib/_common/exceptions.d.ts +1 -0
  23. package/lib/_common/index.d.ts +2 -0
  24. package/lib/_common/kc-lodash.d.ts +5 -0
  25. package/lib/api/types/lr-graphql.types.d.ts +1 -0
  26. package/lib/scenario/scenario.service.d.ts +59 -0
  27. package/lib/scenario/scenario.types.d.ts +2 -0
  28. package/lib/trusted-party/trusted-party.gql.private.d.ts +16 -0
  29. package/lib/trusted-party/trusted-party.service.d.ts +55 -11
  30. package/lib/trusted-party/trusted-party.types.d.ts +6 -2
  31. package/lifeready-core.metadata.json +1 -1
  32. package/package.json +1 -1
@@ -17,6 +17,7 @@ export declare class KcError {
17
17
  private _type;
18
18
  code?: string;
19
19
  source?: string;
20
+ data?: any;
20
21
  message: string;
21
22
  debug?: {
22
23
  locations: {
@@ -0,0 +1,2 @@
1
+ import * as lodash from './kc-lodash';
2
+ export { lodash };
@@ -0,0 +1,5 @@
1
+ import cloneDeep from 'lodash/cloneDeep';
2
+ import isEqual from 'lodash/isEqual';
3
+ import keyBy from 'lodash/keyBy';
4
+ import omit from 'lodash/omit';
5
+ export { cloneDeep, isEqual, keyBy, omit };
@@ -558,6 +558,7 @@ export interface ScenarioNode extends Node, TimeStamped {
558
558
  claim?: ScenarioClaimNode;
559
559
  assemblyState?: ScenarioAssemblyState;
560
560
  latestClaim?: ScenarioLatestClaim;
561
+ inactiveSeconds?: number;
561
562
  }
562
563
  export interface ScenarioClaimNode extends Node, TimeStamped {
563
564
  claimant?: ScenarioClaimantNode;
@@ -25,6 +25,7 @@ export declare class ScenarioService extends LrService {
25
25
  createScenarioMutation(options: CreateScenarioOptions): Promise<LrMutation<import("./scenario.gql").CreateScenarioMutationResult, {
26
26
  input: {
27
27
  enabled: boolean;
28
+ inactiveSeconds: number;
28
29
  createAssembly: {
29
30
  singleReject: boolean;
30
31
  quorum: number;
@@ -55,42 +56,50 @@ export declare class ScenarioService extends LrService {
55
56
  addDirectories: ({
56
57
  directoryId: string;
57
58
  accessRole: AccessRoleChoice.DENY;
59
+ itemKeyId: any;
58
60
  wrappedItemKey: any;
59
61
  sharedCipherData: any;
60
62
  } | {
61
63
  fileId: string;
62
64
  accessRole: AccessRoleChoice.DENY;
65
+ itemKeyId: any;
63
66
  wrappedItemKey: any;
64
67
  sharedCipherData: any;
65
68
  } | {
66
69
  directoryId: string;
67
70
  accessRole: AccessRoleChoice.READER | AccessRoleChoice.WRITER | AccessRoleChoice.ADMIN | AccessRoleChoice.CUSTODIAN | AccessRoleChoice.OWNER;
71
+ itemKeyId: any;
68
72
  wrappedItemKey: string;
69
73
  sharedCipherData: string;
70
74
  } | {
71
75
  fileId: string;
72
76
  accessRole: AccessRoleChoice.READER | AccessRoleChoice.WRITER | AccessRoleChoice.ADMIN | AccessRoleChoice.CUSTODIAN | AccessRoleChoice.OWNER;
77
+ itemKeyId: any;
73
78
  wrappedItemKey: string;
74
79
  sharedCipherData: string;
75
80
  })[];
76
81
  addFiles: ({
77
82
  directoryId: string;
78
83
  accessRole: AccessRoleChoice.DENY;
84
+ itemKeyId: any;
79
85
  wrappedItemKey: any;
80
86
  sharedCipherData: any;
81
87
  } | {
82
88
  fileId: string;
83
89
  accessRole: AccessRoleChoice.DENY;
90
+ itemKeyId: any;
84
91
  wrappedItemKey: any;
85
92
  sharedCipherData: any;
86
93
  } | {
87
94
  directoryId: string;
88
95
  accessRole: AccessRoleChoice.READER | AccessRoleChoice.WRITER | AccessRoleChoice.ADMIN | AccessRoleChoice.CUSTODIAN | AccessRoleChoice.OWNER;
96
+ itemKeyId: any;
89
97
  wrappedItemKey: string;
90
98
  sharedCipherData: string;
91
99
  } | {
92
100
  fileId: string;
93
101
  accessRole: AccessRoleChoice.READER | AccessRoleChoice.WRITER | AccessRoleChoice.ADMIN | AccessRoleChoice.CUSTODIAN | AccessRoleChoice.OWNER;
102
+ itemKeyId: any;
94
103
  wrappedItemKey: string;
95
104
  sharedCipherData: string;
96
105
  })[];
@@ -112,6 +121,7 @@ export declare class ScenarioService extends LrService {
112
121
  input: {
113
122
  scenarioId: string;
114
123
  enabled: boolean;
124
+ inactiveSeconds: number;
115
125
  updateAssembly: {
116
126
  singleReject: boolean;
117
127
  quorum: number;
@@ -167,42 +177,50 @@ export declare class ScenarioService extends LrService {
167
177
  addDirectories: ({
168
178
  directoryId: string;
169
179
  accessRole: AccessRoleChoice.DENY;
180
+ itemKeyId: any;
170
181
  wrappedItemKey: any;
171
182
  sharedCipherData: any;
172
183
  } | {
173
184
  fileId: string;
174
185
  accessRole: AccessRoleChoice.DENY;
186
+ itemKeyId: any;
175
187
  wrappedItemKey: any;
176
188
  sharedCipherData: any;
177
189
  } | {
178
190
  directoryId: string;
179
191
  accessRole: AccessRoleChoice.READER | AccessRoleChoice.WRITER | AccessRoleChoice.ADMIN | AccessRoleChoice.CUSTODIAN | AccessRoleChoice.OWNER;
192
+ itemKeyId: any;
180
193
  wrappedItemKey: string;
181
194
  sharedCipherData: string;
182
195
  } | {
183
196
  fileId: string;
184
197
  accessRole: AccessRoleChoice.READER | AccessRoleChoice.WRITER | AccessRoleChoice.ADMIN | AccessRoleChoice.CUSTODIAN | AccessRoleChoice.OWNER;
198
+ itemKeyId: any;
185
199
  wrappedItemKey: string;
186
200
  sharedCipherData: string;
187
201
  })[];
188
202
  addFiles: ({
189
203
  directoryId: string;
190
204
  accessRole: AccessRoleChoice.DENY;
205
+ itemKeyId: any;
191
206
  wrappedItemKey: any;
192
207
  sharedCipherData: any;
193
208
  } | {
194
209
  fileId: string;
195
210
  accessRole: AccessRoleChoice.DENY;
211
+ itemKeyId: any;
196
212
  wrappedItemKey: any;
197
213
  sharedCipherData: any;
198
214
  } | {
199
215
  directoryId: string;
200
216
  accessRole: AccessRoleChoice.READER | AccessRoleChoice.WRITER | AccessRoleChoice.ADMIN | AccessRoleChoice.CUSTODIAN | AccessRoleChoice.OWNER;
217
+ itemKeyId: any;
201
218
  wrappedItemKey: string;
202
219
  sharedCipherData: string;
203
220
  } | {
204
221
  fileId: string;
205
222
  accessRole: AccessRoleChoice.READER | AccessRoleChoice.WRITER | AccessRoleChoice.ADMIN | AccessRoleChoice.CUSTODIAN | AccessRoleChoice.OWNER;
223
+ itemKeyId: any;
206
224
  wrappedItemKey: string;
207
225
  sharedCipherData: string;
208
226
  })[];
@@ -215,84 +233,100 @@ export declare class ScenarioService extends LrService {
215
233
  addDirectories: ({
216
234
  directoryId: string;
217
235
  accessRole: AccessRoleChoice.DENY;
236
+ itemKeyId: any;
218
237
  wrappedItemKey: any;
219
238
  sharedCipherData: any;
220
239
  } | {
221
240
  fileId: string;
222
241
  accessRole: AccessRoleChoice.DENY;
242
+ itemKeyId: any;
223
243
  wrappedItemKey: any;
224
244
  sharedCipherData: any;
225
245
  } | {
226
246
  directoryId: string;
227
247
  accessRole: AccessRoleChoice.READER | AccessRoleChoice.WRITER | AccessRoleChoice.ADMIN | AccessRoleChoice.CUSTODIAN | AccessRoleChoice.OWNER;
248
+ itemKeyId: any;
228
249
  wrappedItemKey: string;
229
250
  sharedCipherData: string;
230
251
  } | {
231
252
  fileId: string;
232
253
  accessRole: AccessRoleChoice.READER | AccessRoleChoice.WRITER | AccessRoleChoice.ADMIN | AccessRoleChoice.CUSTODIAN | AccessRoleChoice.OWNER;
254
+ itemKeyId: any;
233
255
  wrappedItemKey: string;
234
256
  sharedCipherData: string;
235
257
  })[];
236
258
  addFiles: ({
237
259
  directoryId: string;
238
260
  accessRole: AccessRoleChoice.DENY;
261
+ itemKeyId: any;
239
262
  wrappedItemKey: any;
240
263
  sharedCipherData: any;
241
264
  } | {
242
265
  fileId: string;
243
266
  accessRole: AccessRoleChoice.DENY;
267
+ itemKeyId: any;
244
268
  wrappedItemKey: any;
245
269
  sharedCipherData: any;
246
270
  } | {
247
271
  directoryId: string;
248
272
  accessRole: AccessRoleChoice.READER | AccessRoleChoice.WRITER | AccessRoleChoice.ADMIN | AccessRoleChoice.CUSTODIAN | AccessRoleChoice.OWNER;
273
+ itemKeyId: any;
249
274
  wrappedItemKey: string;
250
275
  sharedCipherData: string;
251
276
  } | {
252
277
  fileId: string;
253
278
  accessRole: AccessRoleChoice.READER | AccessRoleChoice.WRITER | AccessRoleChoice.ADMIN | AccessRoleChoice.CUSTODIAN | AccessRoleChoice.OWNER;
279
+ itemKeyId: any;
254
280
  wrappedItemKey: string;
255
281
  sharedCipherData: string;
256
282
  })[];
257
283
  updateDirectories: ({
258
284
  directoryId: string;
259
285
  accessRole: AccessRoleChoice.DENY;
286
+ itemKeyId: any;
260
287
  wrappedItemKey: any;
261
288
  sharedCipherData: any;
262
289
  } | {
263
290
  fileId: string;
264
291
  accessRole: AccessRoleChoice.DENY;
292
+ itemKeyId: any;
265
293
  wrappedItemKey: any;
266
294
  sharedCipherData: any;
267
295
  } | {
268
296
  directoryId: string;
269
297
  accessRole: AccessRoleChoice.READER | AccessRoleChoice.WRITER | AccessRoleChoice.ADMIN | AccessRoleChoice.CUSTODIAN | AccessRoleChoice.OWNER;
298
+ itemKeyId: any;
270
299
  wrappedItemKey: string;
271
300
  sharedCipherData: string;
272
301
  } | {
273
302
  fileId: string;
274
303
  accessRole: AccessRoleChoice.READER | AccessRoleChoice.WRITER | AccessRoleChoice.ADMIN | AccessRoleChoice.CUSTODIAN | AccessRoleChoice.OWNER;
304
+ itemKeyId: any;
275
305
  wrappedItemKey: string;
276
306
  sharedCipherData: string;
277
307
  })[];
278
308
  updateFiles: ({
279
309
  directoryId: string;
280
310
  accessRole: AccessRoleChoice.DENY;
311
+ itemKeyId: any;
281
312
  wrappedItemKey: any;
282
313
  sharedCipherData: any;
283
314
  } | {
284
315
  fileId: string;
285
316
  accessRole: AccessRoleChoice.DENY;
317
+ itemKeyId: any;
286
318
  wrappedItemKey: any;
287
319
  sharedCipherData: any;
288
320
  } | {
289
321
  directoryId: string;
290
322
  accessRole: AccessRoleChoice.READER | AccessRoleChoice.WRITER | AccessRoleChoice.ADMIN | AccessRoleChoice.CUSTODIAN | AccessRoleChoice.OWNER;
323
+ itemKeyId: any;
291
324
  wrappedItemKey: string;
292
325
  sharedCipherData: string;
293
326
  } | {
294
327
  fileId: string;
295
328
  accessRole: AccessRoleChoice.READER | AccessRoleChoice.WRITER | AccessRoleChoice.ADMIN | AccessRoleChoice.CUSTODIAN | AccessRoleChoice.OWNER;
329
+ itemKeyId: any;
296
330
  wrappedItemKey: string;
297
331
  sharedCipherData: string;
298
332
  })[];
@@ -322,6 +356,7 @@ export declare class ScenarioService extends LrService {
322
356
  input: {
323
357
  scenarioId: string;
324
358
  enabled: boolean;
359
+ inactiveSeconds: number;
325
360
  updateAssembly: {
326
361
  singleReject: boolean;
327
362
  quorum: number;
@@ -377,42 +412,50 @@ export declare class ScenarioService extends LrService {
377
412
  addDirectories: ({
378
413
  directoryId: string;
379
414
  accessRole: AccessRoleChoice.DENY;
415
+ itemKeyId: any;
380
416
  wrappedItemKey: any;
381
417
  sharedCipherData: any;
382
418
  } | {
383
419
  fileId: string;
384
420
  accessRole: AccessRoleChoice.DENY;
421
+ itemKeyId: any;
385
422
  wrappedItemKey: any;
386
423
  sharedCipherData: any;
387
424
  } | {
388
425
  directoryId: string;
389
426
  accessRole: AccessRoleChoice.READER | AccessRoleChoice.WRITER | AccessRoleChoice.ADMIN | AccessRoleChoice.CUSTODIAN | AccessRoleChoice.OWNER;
427
+ itemKeyId: any;
390
428
  wrappedItemKey: string;
391
429
  sharedCipherData: string;
392
430
  } | {
393
431
  fileId: string;
394
432
  accessRole: AccessRoleChoice.READER | AccessRoleChoice.WRITER | AccessRoleChoice.ADMIN | AccessRoleChoice.CUSTODIAN | AccessRoleChoice.OWNER;
433
+ itemKeyId: any;
395
434
  wrappedItemKey: string;
396
435
  sharedCipherData: string;
397
436
  })[];
398
437
  addFiles: ({
399
438
  directoryId: string;
400
439
  accessRole: AccessRoleChoice.DENY;
440
+ itemKeyId: any;
401
441
  wrappedItemKey: any;
402
442
  sharedCipherData: any;
403
443
  } | {
404
444
  fileId: string;
405
445
  accessRole: AccessRoleChoice.DENY;
446
+ itemKeyId: any;
406
447
  wrappedItemKey: any;
407
448
  sharedCipherData: any;
408
449
  } | {
409
450
  directoryId: string;
410
451
  accessRole: AccessRoleChoice.READER | AccessRoleChoice.WRITER | AccessRoleChoice.ADMIN | AccessRoleChoice.CUSTODIAN | AccessRoleChoice.OWNER;
452
+ itemKeyId: any;
411
453
  wrappedItemKey: string;
412
454
  sharedCipherData: string;
413
455
  } | {
414
456
  fileId: string;
415
457
  accessRole: AccessRoleChoice.READER | AccessRoleChoice.WRITER | AccessRoleChoice.ADMIN | AccessRoleChoice.CUSTODIAN | AccessRoleChoice.OWNER;
458
+ itemKeyId: any;
416
459
  wrappedItemKey: string;
417
460
  sharedCipherData: string;
418
461
  })[];
@@ -425,84 +468,100 @@ export declare class ScenarioService extends LrService {
425
468
  addDirectories: ({
426
469
  directoryId: string;
427
470
  accessRole: AccessRoleChoice.DENY;
471
+ itemKeyId: any;
428
472
  wrappedItemKey: any;
429
473
  sharedCipherData: any;
430
474
  } | {
431
475
  fileId: string;
432
476
  accessRole: AccessRoleChoice.DENY;
477
+ itemKeyId: any;
433
478
  wrappedItemKey: any;
434
479
  sharedCipherData: any;
435
480
  } | {
436
481
  directoryId: string;
437
482
  accessRole: AccessRoleChoice.READER | AccessRoleChoice.WRITER | AccessRoleChoice.ADMIN | AccessRoleChoice.CUSTODIAN | AccessRoleChoice.OWNER;
483
+ itemKeyId: any;
438
484
  wrappedItemKey: string;
439
485
  sharedCipherData: string;
440
486
  } | {
441
487
  fileId: string;
442
488
  accessRole: AccessRoleChoice.READER | AccessRoleChoice.WRITER | AccessRoleChoice.ADMIN | AccessRoleChoice.CUSTODIAN | AccessRoleChoice.OWNER;
489
+ itemKeyId: any;
443
490
  wrappedItemKey: string;
444
491
  sharedCipherData: string;
445
492
  })[];
446
493
  addFiles: ({
447
494
  directoryId: string;
448
495
  accessRole: AccessRoleChoice.DENY;
496
+ itemKeyId: any;
449
497
  wrappedItemKey: any;
450
498
  sharedCipherData: any;
451
499
  } | {
452
500
  fileId: string;
453
501
  accessRole: AccessRoleChoice.DENY;
502
+ itemKeyId: any;
454
503
  wrappedItemKey: any;
455
504
  sharedCipherData: any;
456
505
  } | {
457
506
  directoryId: string;
458
507
  accessRole: AccessRoleChoice.READER | AccessRoleChoice.WRITER | AccessRoleChoice.ADMIN | AccessRoleChoice.CUSTODIAN | AccessRoleChoice.OWNER;
508
+ itemKeyId: any;
459
509
  wrappedItemKey: string;
460
510
  sharedCipherData: string;
461
511
  } | {
462
512
  fileId: string;
463
513
  accessRole: AccessRoleChoice.READER | AccessRoleChoice.WRITER | AccessRoleChoice.ADMIN | AccessRoleChoice.CUSTODIAN | AccessRoleChoice.OWNER;
514
+ itemKeyId: any;
464
515
  wrappedItemKey: string;
465
516
  sharedCipherData: string;
466
517
  })[];
467
518
  updateDirectories: ({
468
519
  directoryId: string;
469
520
  accessRole: AccessRoleChoice.DENY;
521
+ itemKeyId: any;
470
522
  wrappedItemKey: any;
471
523
  sharedCipherData: any;
472
524
  } | {
473
525
  fileId: string;
474
526
  accessRole: AccessRoleChoice.DENY;
527
+ itemKeyId: any;
475
528
  wrappedItemKey: any;
476
529
  sharedCipherData: any;
477
530
  } | {
478
531
  directoryId: string;
479
532
  accessRole: AccessRoleChoice.READER | AccessRoleChoice.WRITER | AccessRoleChoice.ADMIN | AccessRoleChoice.CUSTODIAN | AccessRoleChoice.OWNER;
533
+ itemKeyId: any;
480
534
  wrappedItemKey: string;
481
535
  sharedCipherData: string;
482
536
  } | {
483
537
  fileId: string;
484
538
  accessRole: AccessRoleChoice.READER | AccessRoleChoice.WRITER | AccessRoleChoice.ADMIN | AccessRoleChoice.CUSTODIAN | AccessRoleChoice.OWNER;
539
+ itemKeyId: any;
485
540
  wrappedItemKey: string;
486
541
  sharedCipherData: string;
487
542
  })[];
488
543
  updateFiles: ({
489
544
  directoryId: string;
490
545
  accessRole: AccessRoleChoice.DENY;
546
+ itemKeyId: any;
491
547
  wrappedItemKey: any;
492
548
  sharedCipherData: any;
493
549
  } | {
494
550
  fileId: string;
495
551
  accessRole: AccessRoleChoice.DENY;
552
+ itemKeyId: any;
496
553
  wrappedItemKey: any;
497
554
  sharedCipherData: any;
498
555
  } | {
499
556
  directoryId: string;
500
557
  accessRole: AccessRoleChoice.READER | AccessRoleChoice.WRITER | AccessRoleChoice.ADMIN | AccessRoleChoice.CUSTODIAN | AccessRoleChoice.OWNER;
558
+ itemKeyId: any;
501
559
  wrappedItemKey: string;
502
560
  sharedCipherData: string;
503
561
  } | {
504
562
  fileId: string;
505
563
  accessRole: AccessRoleChoice.READER | AccessRoleChoice.WRITER | AccessRoleChoice.ADMIN | AccessRoleChoice.CUSTODIAN | AccessRoleChoice.OWNER;
564
+ itemKeyId: any;
506
565
  wrappedItemKey: string;
507
566
  sharedCipherData: string;
508
567
  })[];
@@ -41,6 +41,7 @@ export declare type CreateClaimantOptions = CreateParticipantOptions;
41
41
  export declare type UpdateClaimantOptions = UpdateParticipantOptions;
42
42
  export interface CreateScenarioOptions {
43
43
  enabled: boolean;
44
+ inactiveSeconds?: number;
44
45
  createAssembly?: CreateTpAssemblyInput;
45
46
  createReceivers?: CreateReceiverOptions[];
46
47
  createClaimants?: CreateClaimantOptions[];
@@ -48,6 +49,7 @@ export interface CreateScenarioOptions {
48
49
  export interface UpdateScenarioOptions {
49
50
  scenarioId: string;
50
51
  enabled: boolean;
52
+ inactiveSeconds?: number;
51
53
  updateAssembly?: UpdateTpAssemblyInput;
52
54
  createReceivers?: CreateReceiverOptions[];
53
55
  updateReceivers?: UpdateReceiverOptions[];
@@ -21,3 +21,19 @@ export interface TpCurrentUserSharedKeyQuery {
21
21
  };
22
22
  }
23
23
  export declare const TpCurrentUserSharedKeyQuery: import("../_common/ast").TypedDocumentNode<TpCurrentUserSharedKeyQuery>;
24
+ export interface ItemShareQueryResult {
25
+ item: {
26
+ id: string;
27
+ };
28
+ tp: {
29
+ id: string;
30
+ };
31
+ }
32
+ export interface DirectoryShareQueryResult {
33
+ directoryShare: ItemShareQueryResult;
34
+ }
35
+ export declare const DirectoryShareQuery: import("../_common/ast").TypedDocumentNode<DirectoryShareQueryResult>;
36
+ export interface FileShareQueryResult {
37
+ fileShare: ItemShareQueryResult;
38
+ }
39
+ export declare const FileShareQuery: import("../_common/ast").TypedDocumentNode<FileShareQueryResult>;
@@ -1,6 +1,6 @@
1
1
  import { Injector, NgZone } from '@angular/core';
2
2
  import { LrMutation, LrService } from '../api/lr-graphql';
3
- import { LrRelayIdInput } from '../api/types';
3
+ import { AccessRoleChoice, LrRelayIdInput } from '../api/types';
4
4
  import { EncryptionService } from '../encryption/encryption.service';
5
5
  import { ItemService } from '../item/item.service';
6
6
  import { KeyFactoryService } from '../key/key-factory.service';
@@ -26,24 +26,44 @@ export declare class TrustedPartyService extends LrService {
26
26
  createDirectoryShare(options: CreateItemShareOptions): Promise<import("./trusted-party.gql").CreateDirectoryShareMutationResult>;
27
27
  createDirectoryShareMutation(options: CreateItemShareOptions): Promise<LrMutation<import("./trusted-party.gql").CreateDirectoryShareMutationResult, {
28
28
  input: {
29
- id: string;
29
+ itemId: string;
30
30
  tpId: string;
31
- accessRole: import("../api/types").AccessRoleChoice;
32
- keyId: string;
31
+ accessRole: AccessRoleChoice.DENY;
32
+ itemKeyId: any;
33
+ wrappingKeyId: any;
34
+ wrappedItemKey: any;
35
+ shareType: import("../api/types").ShareTypeChoice;
36
+ };
37
+ } | {
38
+ input: {
39
+ itemId: string;
40
+ tpId: string;
41
+ accessRole: AccessRoleChoice.READER | AccessRoleChoice.WRITER | AccessRoleChoice.ADMIN | AccessRoleChoice.CUSTODIAN | AccessRoleChoice.OWNER;
42
+ itemKeyId: string;
33
43
  wrappingKeyId: string;
34
- wrappedKey: string;
44
+ wrappedItemKey: string;
35
45
  shareType: import("../api/types").ShareTypeChoice;
36
46
  };
37
47
  }>>;
38
48
  createFileShare(options: CreateItemShareOptions): Promise<import("./trusted-party.gql").CreateFileShareMutationResult>;
39
49
  createFileShareMutation(options: CreateItemShareOptions): Promise<LrMutation<import("./trusted-party.gql").CreateFileShareMutationResult, {
40
50
  input: {
41
- id: string;
51
+ itemId: string;
42
52
  tpId: string;
43
- accessRole: import("../api/types").AccessRoleChoice;
44
- keyId: string;
53
+ accessRole: AccessRoleChoice.DENY;
54
+ itemKeyId: any;
55
+ wrappingKeyId: any;
56
+ wrappedItemKey: any;
57
+ shareType: import("../api/types").ShareTypeChoice;
58
+ };
59
+ } | {
60
+ input: {
61
+ itemId: string;
62
+ tpId: string;
63
+ accessRole: AccessRoleChoice.READER | AccessRoleChoice.WRITER | AccessRoleChoice.ADMIN | AccessRoleChoice.CUSTODIAN | AccessRoleChoice.OWNER;
64
+ itemKeyId: string;
45
65
  wrappingKeyId: string;
46
- wrappedKey: string;
66
+ wrappedItemKey: string;
47
67
  shareType: import("../api/types").ShareTypeChoice;
48
68
  };
49
69
  }>>;
@@ -52,16 +72,40 @@ export declare class TrustedPartyService extends LrService {
52
72
  updateDirectoryShareMutation(options: UpdateItemShareOptions): Promise<LrMutation<import("./trusted-party.gql").UpdateDirectoryShareMutationResult, {
53
73
  input: {
54
74
  id: string;
55
- accessRole: import("../api/types").AccessRoleChoice;
75
+ accessRole: AccessRoleChoice.DENY;
76
+ itemKeyId: any;
77
+ wrappingKeyId: any;
78
+ wrappedItemKey: any;
79
+ };
80
+ } | {
81
+ input: {
82
+ id: string;
83
+ accessRole: AccessRoleChoice.READER | AccessRoleChoice.WRITER | AccessRoleChoice.ADMIN | AccessRoleChoice.CUSTODIAN | AccessRoleChoice.OWNER;
84
+ itemKeyId: string;
85
+ wrappingKeyId: string;
86
+ wrappedItemKey: string;
56
87
  };
57
88
  }>>;
58
89
  updateFileShare(options: UpdateItemShareOptions): Promise<import("./trusted-party.gql").UpdateFileShareMutationResult>;
59
90
  updateFileShareMutation(options: UpdateItemShareOptions): Promise<LrMutation<import("./trusted-party.gql").UpdateFileShareMutationResult, {
60
91
  input: {
61
92
  id: string;
62
- accessRole: import("../api/types").AccessRoleChoice;
93
+ accessRole: AccessRoleChoice.DENY;
94
+ itemKeyId: any;
95
+ wrappingKeyId: any;
96
+ wrappedItemKey: any;
97
+ };
98
+ } | {
99
+ input: {
100
+ id: string;
101
+ accessRole: AccessRoleChoice.READER | AccessRoleChoice.WRITER | AccessRoleChoice.ADMIN | AccessRoleChoice.CUSTODIAN | AccessRoleChoice.OWNER;
102
+ itemKeyId: string;
103
+ wrappingKeyId: string;
104
+ wrappedItemKey: string;
63
105
  };
64
106
  }>>;
107
+ private getDirectoryShare;
108
+ private getFileShare;
65
109
  private prepareUpdateItemShareMutation;
66
110
  deleteDirectoryShare(id: string): Promise<import("./trusted-party.gql").DeleteDirectoryShareMutationResult>;
67
111
  deleteDirectoryShareMutation(id: string): Promise<LrMutation<import("./trusted-party.gql").DeleteDirectoryShareMutationResult, {
@@ -1,15 +1,19 @@
1
1
  import { AccessRoleChoice, LrRelayIdInput, ShareTypeChoice } from '../api/types';
2
2
  export interface CreateItemShareOptions {
3
3
  itemId: LrRelayIdInput;
4
- itemKeyId?: LrRelayIdInput;
5
4
  tpId: LrRelayIdInput;
6
- tpSharedKeyId?: LrRelayIdInput;
7
5
  accessRole: AccessRoleChoice;
8
6
  shareType: ShareTypeChoice;
7
+ itemKeyId?: LrRelayIdInput;
8
+ tpSharedKeyId?: LrRelayIdInput;
9
9
  }
10
10
  export interface UpdateItemShareOptions {
11
11
  itemShareId: LrRelayIdInput;
12
12
  accessRole: AccessRoleChoice;
13
+ itemId?: LrRelayIdInput;
14
+ itemKeyId?: LrRelayIdInput;
15
+ tpId?: LrRelayIdInput;
16
+ tpSharedKeyId?: LrRelayIdInput;
13
17
  }
14
18
  export interface CompleteDetachedItemShareOptions {
15
19
  itemShareId: LrRelayIdInput;