@lifeready/core 8.0.16 → 9.0.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,2 +1,2 @@
1
1
  export {};
2
- //# sourceMappingURL=data:application/json;base64,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
2
+ //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoidHJ1c3RlZC1wYXJ0eS50eXBlcy5qcyIsInNvdXJjZVJvb3QiOiIiLCJzb3VyY2VzIjpbIi4uLy4uLy4uLy4uLy4uLy4uL3Byb2plY3RzL2NvcmUvc3JjL2xpYi90cnVzdGVkLXBhcnR5L3RydXN0ZWQtcGFydHkudHlwZXMudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6IiIsInNvdXJjZXNDb250ZW50IjpbImltcG9ydCB7XG4gIEFjY2Vzc1JvbGVDaG9pY2UsXG4gIEpTT05PYmplY3QsXG4gIExyUmVsYXlJZElucHV0LFxuICBTaGFyZVR5cGVDaG9pY2UsXG59IGZyb20gJy4uL2FwaS90eXBlcyc7XG5pbXBvcnQgeyBJZEtleVBhaXIgfSBmcm9tICcuLi9pdGVtL2l0ZW0udHlwZXMnO1xuXG5leHBvcnQgaW50ZXJmYWNlIENyZWF0ZUl0ZW1TaGFyZU9wdGlvbnMge1xuICB0cElkOiBMclJlbGF5SWRJbnB1dDtcbiAgYWNjZXNzUm9sZTogQWNjZXNzUm9sZUNob2ljZTtcbiAgc2hhcmVUeXBlOiBTaGFyZVR5cGVDaG9pY2U7XG4gIHBsYWluTWV0YUpzb24/OiBKU09OT2JqZWN0O1xuICBpdGVtPzogSWRLZXlQYWlyO1xuICBpdGVtSWQ/OiBMclJlbGF5SWRJbnB1dDtcbiAgaXRlbUtleUlkPzogTHJSZWxheUlkSW5wdXQ7XG4gIC8vIE9wdGlvbmFsIHRvIGltcHJvdmUgZWZmaWNpZW5jeVxuICB0cFNoYXJlZEtleUlkPzogTHJSZWxheUlkSW5wdXQ7XG59XG5cbmV4cG9ydCBpbnRlcmZhY2UgVXBkYXRlSXRlbVNoYXJlT3B0aW9ucyB7XG4gIGl0ZW1TaGFyZUlkOiBMclJlbGF5SWRJbnB1dDtcbiAgYWNjZXNzUm9sZT86IEFjY2Vzc1JvbGVDaG9pY2U7XG4gIHBsYWluTWV0YUpzb24/OiBKU09OT2JqZWN0O1xuICAvLyBPcHRpb25hbCB0byBpbXByb3ZlIGVmZmljaWVuY3lcbiAgaXRlbT86IElkS2V5UGFpcjtcbiAgaXRlbUlkPzogTHJSZWxheUlkSW5wdXQ7XG4gIGl0ZW1LZXlJZD86IExyUmVsYXlJZElucHV0O1xuICB0cElkPzogTHJSZWxheUlkSW5wdXQ7XG4gIHRwU2hhcmVkS2V5SWQ/OiBMclJlbGF5SWRJbnB1dDtcbn1cblxuZXhwb3J0IGludGVyZmFjZSBVcGRhdGVEZXRhY2hlZEl0ZW1TaGFyZU9wdGlvbnMge1xuICBpdGVtU2hhcmVJZDogTHJSZWxheUlkSW5wdXQ7XG4gIGFjY2Vzc1JvbGU/OiBBY2Nlc3NSb2xlQ2hvaWNlO1xuICBwbGFpbk1ldGFKc29uPzogSlNPTk9iamVjdDtcbn1cblxuZXhwb3J0IGludGVyZmFjZSBDb21wbGV0ZURldGFjaGVkSXRlbVNoYXJlT3B0aW9ucyB7XG4gIGl0ZW1TaGFyZUlkOiBMclJlbGF5SWRJbnB1dDtcbiAgLy8gT3B0aW9uYWwgdG8gaW1wcm92ZSBlZmZpY2llbmN5XG4gIGl0ZW1LZXlJZD86IExyUmVsYXlJZElucHV0O1xufVxuIl19
@@ -286,16 +286,13 @@ function getAccessJwtToken(auth) {
286
286
  }
287
287
  });
288
288
  }
289
- function assert_xor(options) {
289
+ function assertExactlyOne(options) {
290
290
  const keys = Object.keys(options);
291
- if (keys.length != 2) {
292
- throw new KcBadLogicException('You must provide exactly 2 fields in the argument.');
291
+ if (keys.length < 2) {
292
+ throw new KcBadLogicException('You must provide 2 or more fields in the argument.');
293
293
  }
294
- if (options[keys[0]] != null && options[keys[1]] != null) {
295
- throw new KcBadLogicException(`You can not specify both ${keys[0]} and ${keys[1]}`);
296
- }
297
- if (options[keys[0]] == null && options[keys[1]] == null) {
298
- throw new KcBadLogicException(`You must specify either ${keys[0]} and ${keys[1]}`);
294
+ if (keys.filter((key) => options[key] != null).length != 1) {
295
+ throw new KcBadLogicException(`You must provide exactly one argument that != null.`);
299
296
  }
300
297
  }
301
298
 
@@ -2753,6 +2750,12 @@ class LrService {
2753
2750
  function mapEdges(connection) {
2754
2751
  return connection.edges.map((edge) => edge.node);
2755
2752
  }
2753
+ function toIdKeyPair(t) {
2754
+ return {
2755
+ id: t.id,
2756
+ keyId: t.keyId,
2757
+ };
2758
+ }
2756
2759
  var UserDeleteState;
2757
2760
  (function (UserDeleteState) {
2758
2761
  UserDeleteState["REQUESTED"] = "REQUESTED";
@@ -5908,6 +5911,7 @@ mutation ChangeDirectoryParentsMutation($input: ChangeDirectoryParentsInput!) {
5908
5911
  changeDirectoryParents(input: $input) {
5909
5912
  directory {
5910
5913
  id
5914
+ keyId
5911
5915
  }
5912
5916
  }
5913
5917
  }
@@ -5917,6 +5921,7 @@ mutation ChangeFileParentsMutation($input: ChangeFileParentsInput!) {
5917
5921
  changeFileParents(input: $input) {
5918
5922
  file {
5919
5923
  id
5924
+ keyId
5920
5925
  }
5921
5926
  }
5922
5927
  }
@@ -6461,8 +6466,7 @@ let ItemService = ItemService_1 = class ItemService extends LrService {
6461
6466
  cipherMetaClearJson: options.cipherMetaClearJson,
6462
6467
  parentDirectories: [
6463
6468
  {
6464
- directoryId: tempDir.id,
6465
- wrappingKeyId: tempDir.keyId,
6469
+ directory: tempDir,
6466
6470
  },
6467
6471
  ],
6468
6472
  plainMetaJson: options.plainMetaJson,
@@ -6503,8 +6507,7 @@ let ItemService = ItemService_1 = class ItemService extends LrService {
6503
6507
  // Create the file
6504
6508
  const file = (yield this.createFile(Object.assign(Object.assign({}, options), { parentDirectories: [
6505
6509
  {
6506
- directoryId: tempDir.id,
6507
- wrappingKeyId: tempDir.keyId,
6510
+ directory: tempDir,
6508
6511
  },
6509
6512
  ] }))).createFile.file;
6510
6513
  // Call back with item that's currently in staging.
@@ -6516,8 +6519,7 @@ let ItemService = ItemService_1 = class ItemService extends LrService {
6516
6519
  // TODO return the server time where delete is scheduled. Expirable mutation
6517
6520
  // Return the mutation that moves the directory into the dst directories
6518
6521
  return this.changeFileParentsMutation({
6519
- fileId: file.id,
6520
- fileKeyId: file.keyId,
6522
+ file,
6521
6523
  parentsToRemove: [tempDir.id],
6522
6524
  parentsToAdd: options.parentDirectories,
6523
6525
  });
@@ -6566,22 +6568,23 @@ let ItemService = ItemService_1 = class ItemService extends LrService {
6566
6568
  // ------------------------------------------------------------------------------
6567
6569
  prepareParentDirectory(options, newKey) {
6568
6570
  return __awaiter(this, void 0, void 0, function* () {
6569
- const { directoryId, linkType, wrappingKeyId } = options;
6571
+ const { directoryId: _directoryId, wrappingKeyId: _wrappingKeyId, linkType, } = options;
6572
+ const directory = options.directory || {
6573
+ id: _directoryId,
6574
+ keyId: _wrappingKeyId,
6575
+ };
6570
6576
  if (linkType == LinkTypeField.REFERENCE) {
6571
- if (wrappingKeyId) {
6572
- throw new KcBadArgumentException('Do not specify wrappingKeyId when link type is REFERENCE.');
6573
- }
6574
6577
  return {
6575
- directoryId,
6578
+ directoryId: directory.id,
6576
6579
  linkType,
6577
6580
  };
6578
6581
  }
6579
6582
  else {
6580
6583
  // If directory's key is not already in the key graph, then need to
6581
6584
  // fetch the directory's key.
6582
- const wrappingKey = yield this.getDirectoryKey(directoryId, wrappingKeyId);
6585
+ const wrappingKey = yield this.getDirectoryKey(directory.id, directory.keyId);
6583
6586
  return {
6584
- directoryId,
6587
+ directoryId: directory.id,
6585
6588
  wrappingKeyId: wrappingKey.id,
6586
6589
  wrappedKey: yield this.keyGraph.wrapKey(wrappingKey, newKey),
6587
6590
  linkType,
@@ -6690,16 +6693,24 @@ let ItemService = ItemService_1 = class ItemService extends LrService {
6690
6693
  }
6691
6694
  prepareChangeDirectoryParents(options) {
6692
6695
  return __awaiter(this, void 0, void 0, function* () {
6693
- const directoryKey = yield this.getDirectoryKey(options.directoryId, options.directoryKeyId);
6696
+ const directory = options.directory || {
6697
+ id: options.directoryId,
6698
+ keyId: options.directoryKeyId,
6699
+ };
6700
+ const directoryKey = yield this.getDirectoryKey(directory.id, directory.keyId);
6694
6701
  const input = yield this.prepareChangeItemParents(options, directoryKey.jwk);
6695
- return Object.assign(Object.assign({}, input), { directoryId: options.directoryId });
6702
+ return Object.assign(Object.assign({}, input), { directoryId: directory.id });
6696
6703
  });
6697
6704
  }
6698
6705
  prepareChangeFileParents(options) {
6699
6706
  return __awaiter(this, void 0, void 0, function* () {
6700
- const fileKey = yield this.getFileKey(options.fileId, options.fileKeyId);
6707
+ const file = options.file || {
6708
+ id: options.fileId,
6709
+ keyId: options.fileKeyId,
6710
+ };
6711
+ const fileKey = yield this.getFileKey(file.id, file.keyId);
6701
6712
  const input = yield this.prepareChangeItemParents(options, fileKey.jwk);
6702
- return Object.assign(Object.assign({}, input), { fileId: options.fileId });
6713
+ return Object.assign(Object.assign({}, input), { fileId: file.id });
6703
6714
  });
6704
6715
  }
6705
6716
  onLogout() {
@@ -9136,7 +9147,7 @@ let ScenarioService = class ScenarioService extends LrService {
9136
9147
  prepareReceiverItem(options) {
9137
9148
  return __awaiter(this, void 0, void 0, function* () {
9138
9149
  const { receiverItemOptions, receiverSharedKey, assemblyKey, directory, file, } = options;
9139
- assert_xor({ directory, file });
9150
+ assertExactlyOne({ directory, file });
9140
9151
  const { accessRole } = receiverItemOptions;
9141
9152
  if (accessRole == AccessRoleChoice.DENY) {
9142
9153
  const ret = {
@@ -10382,15 +10393,19 @@ let TrustedPartyService = class TrustedPartyService extends LrService {
10382
10393
  }
10383
10394
  prepareCreateItemShareMutation(options) {
10384
10395
  return __awaiter(this, void 0, void 0, function* () {
10385
- const { itemId, itemKeyId, tpId, tpSharedKeyId, accessRole, isDirectory, shareType, plainMetaJson, } = options;
10396
+ const { itemId: _itemId, itemKeyId: _itemKeyId, tpId, tpSharedKeyId, accessRole, isDirectory, shareType, plainMetaJson, } = options;
10397
+ const item = options.item || {
10398
+ id: _itemId,
10399
+ keyId: _itemKeyId,
10400
+ };
10386
10401
  const plainMeta = plainMetaJson && JSON.stringify(plainMetaJson);
10387
10402
  if (accessRole == AccessRoleChoice.DENY) {
10388
- if (itemKeyId || tpSharedKeyId) {
10403
+ if (item.keyId || tpSharedKeyId) {
10389
10404
  throw new KcBadArgumentException('If accessRole is AccessRoleChoice.DENY, must not specify any of itemId, itemKeyId, or tpSharedKeyId parameters');
10390
10405
  }
10391
10406
  return {
10392
10407
  input: {
10393
- itemId,
10408
+ itemId: item.id,
10394
10409
  tpId,
10395
10410
  accessRole,
10396
10411
  itemKeyId: null,
@@ -10401,14 +10416,14 @@ let TrustedPartyService = class TrustedPartyService extends LrService {
10401
10416
  },
10402
10417
  };
10403
10418
  }
10404
- const itemKey = yield this.keyGraph.getKey(itemKeyId, () => isDirectory
10405
- ? this.itemService.getDirectoryKeyId(itemId)
10406
- : this.itemService.getFileKeyId(itemId));
10419
+ const itemKey = yield this.keyGraph.getKey(item.keyId, () => isDirectory
10420
+ ? this.itemService.getDirectoryKeyId(item.id)
10421
+ : this.itemService.getFileKeyId(item.id));
10407
10422
  const wrappingKey = yield this.keyGraph.getKey(tpSharedKeyId, () => this.getTpCurrentUserSharedKey(tpId).then((res) => res.sharedKey.id));
10408
10423
  const wrappedItemKey = yield this.keyGraph.wrapKey(wrappingKey, itemKey.jwk);
10409
10424
  return {
10410
10425
  input: {
10411
- itemId,
10426
+ itemId: item.id,
10412
10427
  tpId,
10413
10428
  accessRole,
10414
10429
  itemKeyId: itemKey.id,
@@ -10490,14 +10505,18 @@ let TrustedPartyService = class TrustedPartyService extends LrService {
10490
10505
  }
10491
10506
  prepareUpdateItemShareMutation(options) {
10492
10507
  return __awaiter(this, void 0, void 0, function* () {
10493
- const { itemShareId, accessRole, isDirectory, itemId, itemKeyId, tpId, tpSharedKeyId, plainMetaJson, } = options;
10508
+ const { itemShareId, accessRole, isDirectory, itemId: _itemId, itemKeyId: _itemKeyId, tpId, tpSharedKeyId, plainMetaJson, } = options;
10509
+ const item = options.item || {
10510
+ id: _itemId,
10511
+ keyId: _itemKeyId,
10512
+ };
10494
10513
  // If plainMetaJson is undefined, then plainMeta is undefined
10495
10514
  // If plainMetaJson is null, then plainMeta is null
10496
10515
  // If plainMetaJson has value, then plainMeta is JSON.stringify(plainMetaJson)
10497
10516
  const plainMeta = plainMetaJson && JSON.stringify(plainMetaJson);
10498
10517
  // If not updating access role or updating to DENY role, then we don't need any key material.
10499
10518
  if (accessRole == null || accessRole == AccessRoleChoice.DENY) {
10500
- if (itemId || itemKeyId || tpId || tpSharedKeyId) {
10519
+ if (item.id || item.keyId || tpId || tpSharedKeyId) {
10501
10520
  throw new KcBadArgumentException('If accessRole is AccessRoleChoice.DENY, must not specify any of itemId, itemKeyId, tpId, or tpSharedKeyId parameters');
10502
10521
  }
10503
10522
  return {
@@ -10525,8 +10544,8 @@ let TrustedPartyService = class TrustedPartyService extends LrService {
10525
10544
  }
10526
10545
  return itemShare;
10527
10546
  });
10528
- const itemKey = yield this.keyGraph.getKey(itemKeyId, () => __awaiter(this, void 0, void 0, function* () {
10529
- const itemId_ = itemId || (yield getItemShare()).item.id;
10547
+ const itemKey = yield this.keyGraph.getKey(item.keyId, () => __awaiter(this, void 0, void 0, function* () {
10548
+ const itemId_ = item.id || (yield getItemShare()).item.id;
10530
10549
  if (isDirectory) {
10531
10550
  return this.itemService.getDirectoryKeyId(itemId_);
10532
10551
  }
@@ -10920,5 +10939,5 @@ UserService.ctorParameters = () => [
10920
10939
  * Generated bundle index. Do not edit.
10921
10940
  */
10922
10941
 
10923
- export { AccessRoleChoice, AccessRoleChoiceOrder, AccessRoleMethodChoice, ApiContactCard, ApiCurrentUser, ApproveScenarioClaimMutation, ApproveTpPasswordResetRequestMutation, ArchiveDirectoryMutation, ArchiveFileMutation, AuthService, BeginDeleteChildItemLinksWindowMutation, BillingPeriodField, CancelKeyExchangeMutation, CancelScenarioClaimMutation, CancelTpPasswordResetRequestMutation, CancelUserDeleteMutation, ChangeDirectoryParentsMutation, ChangeFileParentsMutation, ClaimApproverState, ClaimState, CognitoChallengeName, CommonProcessorsService, CompleteKeyExchangeOtkMutation, CompleteTpPasswordResetRequestMutation, Config, ContactCard2Service, ContactCardAddress, ContactCardName, ContactCardsQuery, CreateContactCardMutation$1 as CreateContactCardMutation, CreateDirectoryMutation, CreateFileMutation, CreateLbopQuery, CreateScenarioClaimMutation, CreateScenarioMutation, CreateTpAssemblyKeyChallengeMutation, CreateTpPasswordResetMutation, CurrentUserKey, CurrentUserQuery, CurrentUserSharedKeyQuery2, DebugExpireScenarioClaimMutation, DebugExpireTpPasswordResetRequestMutation, DeclineKeyExchangeMutation, DefaultProcessorOptions, DeleteDirectoryMutation, DeleteFileMutation, DeleteLbopQuery, DeleteScenarioMutation, DeleteTpPasswordResetMutation, DetachedShareStateChoice, DirectoryQuery, ERROR_SOURCE, FeatureAction, Features, FetchKeyGraphField, FileOperationField, FileUploadService, GetOwnedContactCardKeyIdsQuery, GetReceivedContactCardKeyIdQuery, IdleService, InitiateKeyExchangeOtkMutation, ItemService, KC_CONFIG, KcAuthException, KcBadArgumentException, KcBadLogicException, KcBadRequestException, KcBadSignatureException, KcBadStateException, KcBadTimeSyncException, KcCodeMismatchException, KcConcurrentAccessException, KcEncryptionException, KcError, KcErrorCode, KcException, KcInternalErrorException, KcLbopErrorCode, KcLockedException, KcNotFoundException, KcSuspiciousOperationException, KcUnsupportedException, KeyExchangeFields, KeyExchangeMode, KeyExchangeOtkState, KeyExchangeQuery2, KeyExchangeService, KeyExchangeState, KeyExchangeTokenQuery2, KeyExchangesQuery2, KeyGraphField, KeyGraphFragment, LbopQuery, LbopService, LbopsQuery, LifeReadyModule, LinkTypeField, LockService, LockState, LoginHistoryQuery, LrApolloService, LrGraphQLService, LrMergedMutation, LrMutation, LrMutationBase, LrService, MainContactCardFields, MainContactCardPlainFields, MainContactCardProperty, NotificationService, OwnerPlainDataJson, PasswordChangeStatus, PasswordCheck, PasswordService, PermissionChoice, PersistService, PlanService, PlanState, PlanStateField, PreCompleteTpPasswordResetRequestMutation, ProfileDetailsService, ProfileService, QueryProcessorService, ReceiveScenarioClaimMutation, RecoveryStatus, RegisterResult, RegisterService, RejectScenarioClaimMutation, RejectTpPasswordResetRequestMutation, ReminderService, RequestUserDeleteMutation, RespondKeyExchangeOtkMutation, RevertFileMutation, ScenarioLastClaimState, ScenarioService, ScenarioState, ServerConfigService, ServerTimeQuery, SetDirectoryConfidentialMutation, SetFileConfidentialMutation, ShareTypeChoice, SharedContactCard2Service, SharedTrustedPartyDetails, SharedVaultFeature, TPFeatures, TempDirectoryQuery, TimeService, TpAssemblyState, TpClaimApproverState, TpClaimState, TpPasswordResetRequestService, TpPasswordResetService, TpPasswordResetUserService, TrustedPartiesQuery, TrustedParty, TrustedPartyDetails, TrustedPartyProperties, TrustedPartyService, TrustedPartyType, TwoFactorService, UnarchiveDirectoryMutation, UnarchiveFileMutation, UpdateContactCardMutation$1 as UpdateContactCardMutation, UpdateDirectoryMutation, UpdateFileMutation, UpdateLbopQuery, UpdateOwnedContactCardMutation, UpdateReceivedContactCardMutation, UpdateScenarioMutation, UpdateTpPasswordResetMutation, UserDeleteState, UserService, UserSharedKeyFields, WebCryptoService, awsFetch, configureAmplifyAuth, configureApollo, fragmentSpreadAstSelection, gqlTyped, handleApolloError, handleCognitoCallback, httpOptions, mapEdges, processConnection, throwClaimIdMismatch, throwClaimNotApproved, KeyGraphService as ɵa, EncryptionService as ɵb, KeyService as ɵc, KeyFactoryService as ɵd, LrService as ɵe, RunOutsideAngular as ɵf, LrGraphQLService as ɵg, KeyMetaService as ɵh, TpPasswordResetAssemblyController as ɵi, TpAssemblyController as ɵj, SharedContactCardFields as ɵk, SharedContactCardService as ɵl, ScenarioAssemblyController as ɵm, TpPasswordResetPrivateService as ɵn };
10942
+ export { AccessRoleChoice, AccessRoleChoiceOrder, AccessRoleMethodChoice, ApiContactCard, ApiCurrentUser, ApproveScenarioClaimMutation, ApproveTpPasswordResetRequestMutation, ArchiveDirectoryMutation, ArchiveFileMutation, AuthService, BeginDeleteChildItemLinksWindowMutation, BillingPeriodField, CancelKeyExchangeMutation, CancelScenarioClaimMutation, CancelTpPasswordResetRequestMutation, CancelUserDeleteMutation, ChangeDirectoryParentsMutation, ChangeFileParentsMutation, ClaimApproverState, ClaimState, CognitoChallengeName, CommonProcessorsService, CompleteKeyExchangeOtkMutation, CompleteTpPasswordResetRequestMutation, Config, ContactCard2Service, ContactCardAddress, ContactCardName, ContactCardsQuery, CreateContactCardMutation$1 as CreateContactCardMutation, CreateDirectoryMutation, CreateFileMutation, CreateLbopQuery, CreateScenarioClaimMutation, CreateScenarioMutation, CreateTpAssemblyKeyChallengeMutation, CreateTpPasswordResetMutation, CurrentUserKey, CurrentUserQuery, CurrentUserSharedKeyQuery2, DebugExpireScenarioClaimMutation, DebugExpireTpPasswordResetRequestMutation, DeclineKeyExchangeMutation, DefaultProcessorOptions, DeleteDirectoryMutation, DeleteFileMutation, DeleteLbopQuery, DeleteScenarioMutation, DeleteTpPasswordResetMutation, DetachedShareStateChoice, DirectoryQuery, ERROR_SOURCE, FeatureAction, Features, FetchKeyGraphField, FileOperationField, FileUploadService, GetOwnedContactCardKeyIdsQuery, GetReceivedContactCardKeyIdQuery, IdleService, InitiateKeyExchangeOtkMutation, ItemService, KC_CONFIG, KcAuthException, KcBadArgumentException, KcBadLogicException, KcBadRequestException, KcBadSignatureException, KcBadStateException, KcBadTimeSyncException, KcCodeMismatchException, KcConcurrentAccessException, KcEncryptionException, KcError, KcErrorCode, KcException, KcInternalErrorException, KcLbopErrorCode, KcLockedException, KcNotFoundException, KcSuspiciousOperationException, KcUnsupportedException, KeyExchangeFields, KeyExchangeMode, KeyExchangeOtkState, KeyExchangeQuery2, KeyExchangeService, KeyExchangeState, KeyExchangeTokenQuery2, KeyExchangesQuery2, KeyGraphField, KeyGraphFragment, LbopQuery, LbopService, LbopsQuery, LifeReadyModule, LinkTypeField, LockService, LockState, LoginHistoryQuery, LrApolloService, LrGraphQLService, LrMergedMutation, LrMutation, LrMutationBase, LrService, MainContactCardFields, MainContactCardPlainFields, MainContactCardProperty, NotificationService, OwnerPlainDataJson, PasswordChangeStatus, PasswordCheck, PasswordService, PermissionChoice, PersistService, PlanService, PlanState, PlanStateField, PreCompleteTpPasswordResetRequestMutation, ProfileDetailsService, ProfileService, QueryProcessorService, ReceiveScenarioClaimMutation, RecoveryStatus, RegisterResult, RegisterService, RejectScenarioClaimMutation, RejectTpPasswordResetRequestMutation, ReminderService, RequestUserDeleteMutation, RespondKeyExchangeOtkMutation, RevertFileMutation, ScenarioLastClaimState, ScenarioService, ScenarioState, ServerConfigService, ServerTimeQuery, SetDirectoryConfidentialMutation, SetFileConfidentialMutation, ShareTypeChoice, SharedContactCard2Service, SharedTrustedPartyDetails, SharedVaultFeature, TPFeatures, TempDirectoryQuery, TimeService, TpAssemblyState, TpClaimApproverState, TpClaimState, TpPasswordResetRequestService, TpPasswordResetService, TpPasswordResetUserService, TrustedPartiesQuery, TrustedParty, TrustedPartyDetails, TrustedPartyProperties, TrustedPartyService, TrustedPartyType, TwoFactorService, UnarchiveDirectoryMutation, UnarchiveFileMutation, UpdateContactCardMutation$1 as UpdateContactCardMutation, UpdateDirectoryMutation, UpdateFileMutation, UpdateLbopQuery, UpdateOwnedContactCardMutation, UpdateReceivedContactCardMutation, UpdateScenarioMutation, UpdateTpPasswordResetMutation, UserDeleteState, UserService, UserSharedKeyFields, WebCryptoService, awsFetch, configureAmplifyAuth, configureApollo, fragmentSpreadAstSelection, gqlTyped, handleApolloError, handleCognitoCallback, httpOptions, mapEdges, processConnection, throwClaimIdMismatch, throwClaimNotApproved, toIdKeyPair, KeyGraphService as ɵa, EncryptionService as ɵb, KeyService as ɵc, KeyFactoryService as ɵd, LrService as ɵe, RunOutsideAngular as ɵf, LrGraphQLService as ɵg, KeyMetaService as ɵh, TpPasswordResetAssemblyController as ɵi, TpAssemblyController as ɵj, SharedContactCardFields as ɵk, SharedContactCardService as ɵl, ScenarioAssemblyController as ɵm, TpPasswordResetPrivateService as ɵn };
10924
10943
  //# sourceMappingURL=lifeready-core.js.map