@lifeready/core 8.0.16 → 9.0.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/bundles/lifeready-core.umd.js +64 -44
- package/bundles/lifeready-core.umd.js.map +1 -1
- package/bundles/lifeready-core.umd.min.js +1 -1
- package/bundles/lifeready-core.umd.min.js.map +1 -1
- package/esm2015/lib/_common/utils.js +6 -9
- package/esm2015/lib/api/types/lr-graphql.types.js +7 -1
- package/esm2015/lib/item/item.gql.js +3 -1
- package/esm2015/lib/item/item.service.js +24 -18
- package/esm2015/lib/item/item.types.js +1 -1
- package/esm2015/lib/scenario/scenario.service.js +6 -6
- package/esm2015/lib/trusted-party/trusted-party.service.js +20 -12
- package/esm2015/lib/trusted-party/trusted-party.types.js +1 -1
- package/fesm2015/lifeready-core.js +57 -38
- package/fesm2015/lifeready-core.js.map +1 -1
- package/lib/_common/utils.d.ts +1 -1
- package/lib/api/types/lr-graphql.types.d.ts +2 -0
- package/lib/item/item.gql.d.ts +6 -18
- package/lib/item/item.types.d.ts +7 -4
- package/lib/trusted-party/trusted-party.types.d.ts +4 -1
- package/lifeready-core.metadata.json +1 -1
- package/package.json +1 -1
|
@@ -1,2 +1,2 @@
|
|
|
1
1
|
export {};
|
|
2
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
2
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -286,16 +286,13 @@ function getAccessJwtToken(auth) {
|
|
|
286
286
|
}
|
|
287
287
|
});
|
|
288
288
|
}
|
|
289
|
-
function
|
|
289
|
+
function assertExactlyOne(options) {
|
|
290
290
|
const keys = Object.keys(options);
|
|
291
|
-
if (keys.length
|
|
292
|
-
throw new KcBadLogicException('You must provide
|
|
291
|
+
if (keys.length < 2) {
|
|
292
|
+
throw new KcBadLogicException('You must provide 2 or more fields in the argument.');
|
|
293
293
|
}
|
|
294
|
-
if (
|
|
295
|
-
throw new KcBadLogicException(`You
|
|
296
|
-
}
|
|
297
|
-
if (options[keys[0]] == null && options[keys[1]] == null) {
|
|
298
|
-
throw new KcBadLogicException(`You must specify either ${keys[0]} and ${keys[1]}`);
|
|
294
|
+
if (keys.filter((key) => options[key] != null).length != 1) {
|
|
295
|
+
throw new KcBadLogicException(`You must provide exactly one argument that != null.`);
|
|
299
296
|
}
|
|
300
297
|
}
|
|
301
298
|
|
|
@@ -2753,6 +2750,12 @@ class LrService {
|
|
|
2753
2750
|
function mapEdges(connection) {
|
|
2754
2751
|
return connection.edges.map((edge) => edge.node);
|
|
2755
2752
|
}
|
|
2753
|
+
function toIdKeyPair(t) {
|
|
2754
|
+
return {
|
|
2755
|
+
id: t.id,
|
|
2756
|
+
keyId: t.keyId,
|
|
2757
|
+
};
|
|
2758
|
+
}
|
|
2756
2759
|
var UserDeleteState;
|
|
2757
2760
|
(function (UserDeleteState) {
|
|
2758
2761
|
UserDeleteState["REQUESTED"] = "REQUESTED";
|
|
@@ -5908,6 +5911,7 @@ mutation ChangeDirectoryParentsMutation($input: ChangeDirectoryParentsInput!) {
|
|
|
5908
5911
|
changeDirectoryParents(input: $input) {
|
|
5909
5912
|
directory {
|
|
5910
5913
|
id
|
|
5914
|
+
keyId
|
|
5911
5915
|
}
|
|
5912
5916
|
}
|
|
5913
5917
|
}
|
|
@@ -5917,6 +5921,7 @@ mutation ChangeFileParentsMutation($input: ChangeFileParentsInput!) {
|
|
|
5917
5921
|
changeFileParents(input: $input) {
|
|
5918
5922
|
file {
|
|
5919
5923
|
id
|
|
5924
|
+
keyId
|
|
5920
5925
|
}
|
|
5921
5926
|
}
|
|
5922
5927
|
}
|
|
@@ -6461,8 +6466,7 @@ let ItemService = ItemService_1 = class ItemService extends LrService {
|
|
|
6461
6466
|
cipherMetaClearJson: options.cipherMetaClearJson,
|
|
6462
6467
|
parentDirectories: [
|
|
6463
6468
|
{
|
|
6464
|
-
|
|
6465
|
-
wrappingKeyId: tempDir.keyId,
|
|
6469
|
+
directory: tempDir,
|
|
6466
6470
|
},
|
|
6467
6471
|
],
|
|
6468
6472
|
plainMetaJson: options.plainMetaJson,
|
|
@@ -6503,8 +6507,7 @@ let ItemService = ItemService_1 = class ItemService extends LrService {
|
|
|
6503
6507
|
// Create the file
|
|
6504
6508
|
const file = (yield this.createFile(Object.assign(Object.assign({}, options), { parentDirectories: [
|
|
6505
6509
|
{
|
|
6506
|
-
|
|
6507
|
-
wrappingKeyId: tempDir.keyId,
|
|
6510
|
+
directory: tempDir,
|
|
6508
6511
|
},
|
|
6509
6512
|
] }))).createFile.file;
|
|
6510
6513
|
// Call back with item that's currently in staging.
|
|
@@ -6516,8 +6519,7 @@ let ItemService = ItemService_1 = class ItemService extends LrService {
|
|
|
6516
6519
|
// TODO return the server time where delete is scheduled. Expirable mutation
|
|
6517
6520
|
// Return the mutation that moves the directory into the dst directories
|
|
6518
6521
|
return this.changeFileParentsMutation({
|
|
6519
|
-
|
|
6520
|
-
fileKeyId: file.keyId,
|
|
6522
|
+
file,
|
|
6521
6523
|
parentsToRemove: [tempDir.id],
|
|
6522
6524
|
parentsToAdd: options.parentDirectories,
|
|
6523
6525
|
});
|
|
@@ -6566,22 +6568,23 @@ let ItemService = ItemService_1 = class ItemService extends LrService {
|
|
|
6566
6568
|
// ------------------------------------------------------------------------------
|
|
6567
6569
|
prepareParentDirectory(options, newKey) {
|
|
6568
6570
|
return __awaiter(this, void 0, void 0, function* () {
|
|
6569
|
-
const { directoryId, linkType,
|
|
6571
|
+
const { directoryId: _directoryId, wrappingKeyId: _wrappingKeyId, linkType, } = options;
|
|
6572
|
+
const directory = options.directory || {
|
|
6573
|
+
id: _directoryId,
|
|
6574
|
+
keyId: _wrappingKeyId,
|
|
6575
|
+
};
|
|
6570
6576
|
if (linkType == LinkTypeField.REFERENCE) {
|
|
6571
|
-
if (wrappingKeyId) {
|
|
6572
|
-
throw new KcBadArgumentException('Do not specify wrappingKeyId when link type is REFERENCE.');
|
|
6573
|
-
}
|
|
6574
6577
|
return {
|
|
6575
|
-
directoryId,
|
|
6578
|
+
directoryId: directory.id,
|
|
6576
6579
|
linkType,
|
|
6577
6580
|
};
|
|
6578
6581
|
}
|
|
6579
6582
|
else {
|
|
6580
6583
|
// If directory's key is not already in the key graph, then need to
|
|
6581
6584
|
// fetch the directory's key.
|
|
6582
|
-
const wrappingKey = yield this.getDirectoryKey(
|
|
6585
|
+
const wrappingKey = yield this.getDirectoryKey(directory.id, directory.keyId);
|
|
6583
6586
|
return {
|
|
6584
|
-
directoryId,
|
|
6587
|
+
directoryId: directory.id,
|
|
6585
6588
|
wrappingKeyId: wrappingKey.id,
|
|
6586
6589
|
wrappedKey: yield this.keyGraph.wrapKey(wrappingKey, newKey),
|
|
6587
6590
|
linkType,
|
|
@@ -6690,16 +6693,24 @@ let ItemService = ItemService_1 = class ItemService extends LrService {
|
|
|
6690
6693
|
}
|
|
6691
6694
|
prepareChangeDirectoryParents(options) {
|
|
6692
6695
|
return __awaiter(this, void 0, void 0, function* () {
|
|
6693
|
-
const
|
|
6696
|
+
const directory = options.directory || {
|
|
6697
|
+
id: options.directoryId,
|
|
6698
|
+
keyId: options.directoryKeyId,
|
|
6699
|
+
};
|
|
6700
|
+
const directoryKey = yield this.getDirectoryKey(directory.id, directory.keyId);
|
|
6694
6701
|
const input = yield this.prepareChangeItemParents(options, directoryKey.jwk);
|
|
6695
|
-
return Object.assign(Object.assign({}, input), { directoryId:
|
|
6702
|
+
return Object.assign(Object.assign({}, input), { directoryId: directory.id });
|
|
6696
6703
|
});
|
|
6697
6704
|
}
|
|
6698
6705
|
prepareChangeFileParents(options) {
|
|
6699
6706
|
return __awaiter(this, void 0, void 0, function* () {
|
|
6700
|
-
const
|
|
6707
|
+
const file = options.file || {
|
|
6708
|
+
id: options.fileId,
|
|
6709
|
+
keyId: options.fileKeyId,
|
|
6710
|
+
};
|
|
6711
|
+
const fileKey = yield this.getFileKey(file.id, file.keyId);
|
|
6701
6712
|
const input = yield this.prepareChangeItemParents(options, fileKey.jwk);
|
|
6702
|
-
return Object.assign(Object.assign({}, input), { fileId:
|
|
6713
|
+
return Object.assign(Object.assign({}, input), { fileId: file.id });
|
|
6703
6714
|
});
|
|
6704
6715
|
}
|
|
6705
6716
|
onLogout() {
|
|
@@ -9136,7 +9147,7 @@ let ScenarioService = class ScenarioService extends LrService {
|
|
|
9136
9147
|
prepareReceiverItem(options) {
|
|
9137
9148
|
return __awaiter(this, void 0, void 0, function* () {
|
|
9138
9149
|
const { receiverItemOptions, receiverSharedKey, assemblyKey, directory, file, } = options;
|
|
9139
|
-
|
|
9150
|
+
assertExactlyOne({ directory, file });
|
|
9140
9151
|
const { accessRole } = receiverItemOptions;
|
|
9141
9152
|
if (accessRole == AccessRoleChoice.DENY) {
|
|
9142
9153
|
const ret = {
|
|
@@ -10382,15 +10393,19 @@ let TrustedPartyService = class TrustedPartyService extends LrService {
|
|
|
10382
10393
|
}
|
|
10383
10394
|
prepareCreateItemShareMutation(options) {
|
|
10384
10395
|
return __awaiter(this, void 0, void 0, function* () {
|
|
10385
|
-
const { itemId, itemKeyId, tpId, tpSharedKeyId, accessRole, isDirectory, shareType, plainMetaJson, } = options;
|
|
10396
|
+
const { itemId: _itemId, itemKeyId: _itemKeyId, tpId, tpSharedKeyId, accessRole, isDirectory, shareType, plainMetaJson, } = options;
|
|
10397
|
+
const item = options.item || {
|
|
10398
|
+
id: _itemId,
|
|
10399
|
+
keyId: _itemKeyId,
|
|
10400
|
+
};
|
|
10386
10401
|
const plainMeta = plainMetaJson && JSON.stringify(plainMetaJson);
|
|
10387
10402
|
if (accessRole == AccessRoleChoice.DENY) {
|
|
10388
|
-
if (
|
|
10403
|
+
if (item.keyId || tpSharedKeyId) {
|
|
10389
10404
|
throw new KcBadArgumentException('If accessRole is AccessRoleChoice.DENY, must not specify any of itemId, itemKeyId, or tpSharedKeyId parameters');
|
|
10390
10405
|
}
|
|
10391
10406
|
return {
|
|
10392
10407
|
input: {
|
|
10393
|
-
itemId,
|
|
10408
|
+
itemId: item.id,
|
|
10394
10409
|
tpId,
|
|
10395
10410
|
accessRole,
|
|
10396
10411
|
itemKeyId: null,
|
|
@@ -10401,14 +10416,14 @@ let TrustedPartyService = class TrustedPartyService extends LrService {
|
|
|
10401
10416
|
},
|
|
10402
10417
|
};
|
|
10403
10418
|
}
|
|
10404
|
-
const itemKey = yield this.keyGraph.getKey(
|
|
10405
|
-
? this.itemService.getDirectoryKeyId(
|
|
10406
|
-
: this.itemService.getFileKeyId(
|
|
10419
|
+
const itemKey = yield this.keyGraph.getKey(item.keyId, () => isDirectory
|
|
10420
|
+
? this.itemService.getDirectoryKeyId(item.id)
|
|
10421
|
+
: this.itemService.getFileKeyId(item.id));
|
|
10407
10422
|
const wrappingKey = yield this.keyGraph.getKey(tpSharedKeyId, () => this.getTpCurrentUserSharedKey(tpId).then((res) => res.sharedKey.id));
|
|
10408
10423
|
const wrappedItemKey = yield this.keyGraph.wrapKey(wrappingKey, itemKey.jwk);
|
|
10409
10424
|
return {
|
|
10410
10425
|
input: {
|
|
10411
|
-
itemId,
|
|
10426
|
+
itemId: item.id,
|
|
10412
10427
|
tpId,
|
|
10413
10428
|
accessRole,
|
|
10414
10429
|
itemKeyId: itemKey.id,
|
|
@@ -10490,14 +10505,18 @@ let TrustedPartyService = class TrustedPartyService extends LrService {
|
|
|
10490
10505
|
}
|
|
10491
10506
|
prepareUpdateItemShareMutation(options) {
|
|
10492
10507
|
return __awaiter(this, void 0, void 0, function* () {
|
|
10493
|
-
const { itemShareId, accessRole, isDirectory, itemId, itemKeyId, tpId, tpSharedKeyId, plainMetaJson, } = options;
|
|
10508
|
+
const { itemShareId, accessRole, isDirectory, itemId: _itemId, itemKeyId: _itemKeyId, tpId, tpSharedKeyId, plainMetaJson, } = options;
|
|
10509
|
+
const item = options.item || {
|
|
10510
|
+
id: _itemId,
|
|
10511
|
+
keyId: _itemKeyId,
|
|
10512
|
+
};
|
|
10494
10513
|
// If plainMetaJson is undefined, then plainMeta is undefined
|
|
10495
10514
|
// If plainMetaJson is null, then plainMeta is null
|
|
10496
10515
|
// If plainMetaJson has value, then plainMeta is JSON.stringify(plainMetaJson)
|
|
10497
10516
|
const plainMeta = plainMetaJson && JSON.stringify(plainMetaJson);
|
|
10498
10517
|
// If not updating access role or updating to DENY role, then we don't need any key material.
|
|
10499
10518
|
if (accessRole == null || accessRole == AccessRoleChoice.DENY) {
|
|
10500
|
-
if (
|
|
10519
|
+
if (item.id || item.keyId || tpId || tpSharedKeyId) {
|
|
10501
10520
|
throw new KcBadArgumentException('If accessRole is AccessRoleChoice.DENY, must not specify any of itemId, itemKeyId, tpId, or tpSharedKeyId parameters');
|
|
10502
10521
|
}
|
|
10503
10522
|
return {
|
|
@@ -10525,8 +10544,8 @@ let TrustedPartyService = class TrustedPartyService extends LrService {
|
|
|
10525
10544
|
}
|
|
10526
10545
|
return itemShare;
|
|
10527
10546
|
});
|
|
10528
|
-
const itemKey = yield this.keyGraph.getKey(
|
|
10529
|
-
const itemId_ =
|
|
10547
|
+
const itemKey = yield this.keyGraph.getKey(item.keyId, () => __awaiter(this, void 0, void 0, function* () {
|
|
10548
|
+
const itemId_ = item.id || (yield getItemShare()).item.id;
|
|
10530
10549
|
if (isDirectory) {
|
|
10531
10550
|
return this.itemService.getDirectoryKeyId(itemId_);
|
|
10532
10551
|
}
|
|
@@ -10920,5 +10939,5 @@ UserService.ctorParameters = () => [
|
|
|
10920
10939
|
* Generated bundle index. Do not edit.
|
|
10921
10940
|
*/
|
|
10922
10941
|
|
|
10923
|
-
export { AccessRoleChoice, AccessRoleChoiceOrder, AccessRoleMethodChoice, ApiContactCard, ApiCurrentUser, ApproveScenarioClaimMutation, ApproveTpPasswordResetRequestMutation, ArchiveDirectoryMutation, ArchiveFileMutation, AuthService, BeginDeleteChildItemLinksWindowMutation, BillingPeriodField, CancelKeyExchangeMutation, CancelScenarioClaimMutation, CancelTpPasswordResetRequestMutation, CancelUserDeleteMutation, ChangeDirectoryParentsMutation, ChangeFileParentsMutation, ClaimApproverState, ClaimState, CognitoChallengeName, CommonProcessorsService, CompleteKeyExchangeOtkMutation, CompleteTpPasswordResetRequestMutation, Config, ContactCard2Service, ContactCardAddress, ContactCardName, ContactCardsQuery, CreateContactCardMutation$1 as CreateContactCardMutation, CreateDirectoryMutation, CreateFileMutation, CreateLbopQuery, CreateScenarioClaimMutation, CreateScenarioMutation, CreateTpAssemblyKeyChallengeMutation, CreateTpPasswordResetMutation, CurrentUserKey, CurrentUserQuery, CurrentUserSharedKeyQuery2, DebugExpireScenarioClaimMutation, DebugExpireTpPasswordResetRequestMutation, DeclineKeyExchangeMutation, DefaultProcessorOptions, DeleteDirectoryMutation, DeleteFileMutation, DeleteLbopQuery, DeleteScenarioMutation, DeleteTpPasswordResetMutation, DetachedShareStateChoice, DirectoryQuery, ERROR_SOURCE, FeatureAction, Features, FetchKeyGraphField, FileOperationField, FileUploadService, GetOwnedContactCardKeyIdsQuery, GetReceivedContactCardKeyIdQuery, IdleService, InitiateKeyExchangeOtkMutation, ItemService, KC_CONFIG, KcAuthException, KcBadArgumentException, KcBadLogicException, KcBadRequestException, KcBadSignatureException, KcBadStateException, KcBadTimeSyncException, KcCodeMismatchException, KcConcurrentAccessException, KcEncryptionException, KcError, KcErrorCode, KcException, KcInternalErrorException, KcLbopErrorCode, KcLockedException, KcNotFoundException, KcSuspiciousOperationException, KcUnsupportedException, KeyExchangeFields, KeyExchangeMode, KeyExchangeOtkState, KeyExchangeQuery2, KeyExchangeService, KeyExchangeState, KeyExchangeTokenQuery2, KeyExchangesQuery2, KeyGraphField, KeyGraphFragment, LbopQuery, LbopService, LbopsQuery, LifeReadyModule, LinkTypeField, LockService, LockState, LoginHistoryQuery, LrApolloService, LrGraphQLService, LrMergedMutation, LrMutation, LrMutationBase, LrService, MainContactCardFields, MainContactCardPlainFields, MainContactCardProperty, NotificationService, OwnerPlainDataJson, PasswordChangeStatus, PasswordCheck, PasswordService, PermissionChoice, PersistService, PlanService, PlanState, PlanStateField, PreCompleteTpPasswordResetRequestMutation, ProfileDetailsService, ProfileService, QueryProcessorService, ReceiveScenarioClaimMutation, RecoveryStatus, RegisterResult, RegisterService, RejectScenarioClaimMutation, RejectTpPasswordResetRequestMutation, ReminderService, RequestUserDeleteMutation, RespondKeyExchangeOtkMutation, RevertFileMutation, ScenarioLastClaimState, ScenarioService, ScenarioState, ServerConfigService, ServerTimeQuery, SetDirectoryConfidentialMutation, SetFileConfidentialMutation, ShareTypeChoice, SharedContactCard2Service, SharedTrustedPartyDetails, SharedVaultFeature, TPFeatures, TempDirectoryQuery, TimeService, TpAssemblyState, TpClaimApproverState, TpClaimState, TpPasswordResetRequestService, TpPasswordResetService, TpPasswordResetUserService, TrustedPartiesQuery, TrustedParty, TrustedPartyDetails, TrustedPartyProperties, TrustedPartyService, TrustedPartyType, TwoFactorService, UnarchiveDirectoryMutation, UnarchiveFileMutation, UpdateContactCardMutation$1 as UpdateContactCardMutation, UpdateDirectoryMutation, UpdateFileMutation, UpdateLbopQuery, UpdateOwnedContactCardMutation, UpdateReceivedContactCardMutation, UpdateScenarioMutation, UpdateTpPasswordResetMutation, UserDeleteState, UserService, UserSharedKeyFields, WebCryptoService, awsFetch, configureAmplifyAuth, configureApollo, fragmentSpreadAstSelection, gqlTyped, handleApolloError, handleCognitoCallback, httpOptions, mapEdges, processConnection, throwClaimIdMismatch, throwClaimNotApproved, KeyGraphService as ɵa, EncryptionService as ɵb, KeyService as ɵc, KeyFactoryService as ɵd, LrService as ɵe, RunOutsideAngular as ɵf, LrGraphQLService as ɵg, KeyMetaService as ɵh, TpPasswordResetAssemblyController as ɵi, TpAssemblyController as ɵj, SharedContactCardFields as ɵk, SharedContactCardService as ɵl, ScenarioAssemblyController as ɵm, TpPasswordResetPrivateService as ɵn };
|
|
10942
|
+
export { AccessRoleChoice, AccessRoleChoiceOrder, AccessRoleMethodChoice, ApiContactCard, ApiCurrentUser, ApproveScenarioClaimMutation, ApproveTpPasswordResetRequestMutation, ArchiveDirectoryMutation, ArchiveFileMutation, AuthService, BeginDeleteChildItemLinksWindowMutation, BillingPeriodField, CancelKeyExchangeMutation, CancelScenarioClaimMutation, CancelTpPasswordResetRequestMutation, CancelUserDeleteMutation, ChangeDirectoryParentsMutation, ChangeFileParentsMutation, ClaimApproverState, ClaimState, CognitoChallengeName, CommonProcessorsService, CompleteKeyExchangeOtkMutation, CompleteTpPasswordResetRequestMutation, Config, ContactCard2Service, ContactCardAddress, ContactCardName, ContactCardsQuery, CreateContactCardMutation$1 as CreateContactCardMutation, CreateDirectoryMutation, CreateFileMutation, CreateLbopQuery, CreateScenarioClaimMutation, CreateScenarioMutation, CreateTpAssemblyKeyChallengeMutation, CreateTpPasswordResetMutation, CurrentUserKey, CurrentUserQuery, CurrentUserSharedKeyQuery2, DebugExpireScenarioClaimMutation, DebugExpireTpPasswordResetRequestMutation, DeclineKeyExchangeMutation, DefaultProcessorOptions, DeleteDirectoryMutation, DeleteFileMutation, DeleteLbopQuery, DeleteScenarioMutation, DeleteTpPasswordResetMutation, DetachedShareStateChoice, DirectoryQuery, ERROR_SOURCE, FeatureAction, Features, FetchKeyGraphField, FileOperationField, FileUploadService, GetOwnedContactCardKeyIdsQuery, GetReceivedContactCardKeyIdQuery, IdleService, InitiateKeyExchangeOtkMutation, ItemService, KC_CONFIG, KcAuthException, KcBadArgumentException, KcBadLogicException, KcBadRequestException, KcBadSignatureException, KcBadStateException, KcBadTimeSyncException, KcCodeMismatchException, KcConcurrentAccessException, KcEncryptionException, KcError, KcErrorCode, KcException, KcInternalErrorException, KcLbopErrorCode, KcLockedException, KcNotFoundException, KcSuspiciousOperationException, KcUnsupportedException, KeyExchangeFields, KeyExchangeMode, KeyExchangeOtkState, KeyExchangeQuery2, KeyExchangeService, KeyExchangeState, KeyExchangeTokenQuery2, KeyExchangesQuery2, KeyGraphField, KeyGraphFragment, LbopQuery, LbopService, LbopsQuery, LifeReadyModule, LinkTypeField, LockService, LockState, LoginHistoryQuery, LrApolloService, LrGraphQLService, LrMergedMutation, LrMutation, LrMutationBase, LrService, MainContactCardFields, MainContactCardPlainFields, MainContactCardProperty, NotificationService, OwnerPlainDataJson, PasswordChangeStatus, PasswordCheck, PasswordService, PermissionChoice, PersistService, PlanService, PlanState, PlanStateField, PreCompleteTpPasswordResetRequestMutation, ProfileDetailsService, ProfileService, QueryProcessorService, ReceiveScenarioClaimMutation, RecoveryStatus, RegisterResult, RegisterService, RejectScenarioClaimMutation, RejectTpPasswordResetRequestMutation, ReminderService, RequestUserDeleteMutation, RespondKeyExchangeOtkMutation, RevertFileMutation, ScenarioLastClaimState, ScenarioService, ScenarioState, ServerConfigService, ServerTimeQuery, SetDirectoryConfidentialMutation, SetFileConfidentialMutation, ShareTypeChoice, SharedContactCard2Service, SharedTrustedPartyDetails, SharedVaultFeature, TPFeatures, TempDirectoryQuery, TimeService, TpAssemblyState, TpClaimApproverState, TpClaimState, TpPasswordResetRequestService, TpPasswordResetService, TpPasswordResetUserService, TrustedPartiesQuery, TrustedParty, TrustedPartyDetails, TrustedPartyProperties, TrustedPartyService, TrustedPartyType, TwoFactorService, UnarchiveDirectoryMutation, UnarchiveFileMutation, UpdateContactCardMutation$1 as UpdateContactCardMutation, UpdateDirectoryMutation, UpdateFileMutation, UpdateLbopQuery, UpdateOwnedContactCardMutation, UpdateReceivedContactCardMutation, UpdateScenarioMutation, UpdateTpPasswordResetMutation, UserDeleteState, UserService, UserSharedKeyFields, WebCryptoService, awsFetch, configureAmplifyAuth, configureApollo, fragmentSpreadAstSelection, gqlTyped, handleApolloError, handleCognitoCallback, httpOptions, mapEdges, processConnection, throwClaimIdMismatch, throwClaimNotApproved, toIdKeyPair, KeyGraphService as ɵa, EncryptionService as ɵb, KeyService as ɵc, KeyFactoryService as ɵd, LrService as ɵe, RunOutsideAngular as ɵf, LrGraphQLService as ɵg, KeyMetaService as ɵh, TpPasswordResetAssemblyController as ɵi, TpAssemblyController as ɵj, SharedContactCardFields as ɵk, SharedContactCardService as ɵl, ScenarioAssemblyController as ɵm, TpPasswordResetPrivateService as ɵn };
|
|
10924
10943
|
//# sourceMappingURL=lifeready-core.js.map
|