@lifeready/core 8.0.16 → 9.0.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/bundles/lifeready-core.umd.js +72 -44
- package/bundles/lifeready-core.umd.js.map +1 -1
- package/bundles/lifeready-core.umd.min.js +1 -1
- package/bundles/lifeready-core.umd.min.js.map +1 -1
- package/esm2015/lib/_common/utils.js +6 -9
- package/esm2015/lib/api/types/lr-graphql.types.js +15 -1
- package/esm2015/lib/item/item.gql.js +3 -1
- package/esm2015/lib/item/item.service.js +24 -18
- package/esm2015/lib/item/item.types.js +1 -1
- package/esm2015/lib/scenario/scenario.service.js +6 -6
- package/esm2015/lib/trusted-party/trusted-party.service.js +20 -12
- package/esm2015/lib/trusted-party/trusted-party.types.js +1 -1
- package/fesm2015/lifeready-core.js +65 -38
- package/fesm2015/lifeready-core.js.map +1 -1
- package/lib/_common/utils.d.ts +1 -1
- package/lib/api/types/lr-graphql.types.d.ts +2 -0
- package/lib/item/item.gql.d.ts +6 -18
- package/lib/item/item.types.d.ts +7 -4
- package/lib/trusted-party/trusted-party.types.d.ts +4 -1
- package/lifeready-core.metadata.json +1 -1
- package/package.json +1 -1
|
@@ -1,2 +1,2 @@
|
|
|
1
1
|
export {};
|
|
2
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
2
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -286,16 +286,13 @@ function getAccessJwtToken(auth) {
|
|
|
286
286
|
}
|
|
287
287
|
});
|
|
288
288
|
}
|
|
289
|
-
function
|
|
289
|
+
function assertExactlyOne(options) {
|
|
290
290
|
const keys = Object.keys(options);
|
|
291
|
-
if (keys.length
|
|
292
|
-
throw new KcBadLogicException('You must provide
|
|
291
|
+
if (keys.length < 2) {
|
|
292
|
+
throw new KcBadLogicException('You must provide 2 or more fields in the argument.');
|
|
293
293
|
}
|
|
294
|
-
if (
|
|
295
|
-
throw new KcBadLogicException(`You
|
|
296
|
-
}
|
|
297
|
-
if (options[keys[0]] == null && options[keys[1]] == null) {
|
|
298
|
-
throw new KcBadLogicException(`You must specify either ${keys[0]} and ${keys[1]}`);
|
|
294
|
+
if (keys.filter((key) => options[key] != null).length != 1) {
|
|
295
|
+
throw new KcBadLogicException(`You must provide exactly one argument that != null.`);
|
|
299
296
|
}
|
|
300
297
|
}
|
|
301
298
|
|
|
@@ -2753,6 +2750,20 @@ class LrService {
|
|
|
2753
2750
|
function mapEdges(connection) {
|
|
2754
2751
|
return connection.edges.map((edge) => edge.node);
|
|
2755
2752
|
}
|
|
2753
|
+
function toIdKeyPair(t) {
|
|
2754
|
+
if (t === undefined) {
|
|
2755
|
+
return undefined;
|
|
2756
|
+
}
|
|
2757
|
+
else if (t === null) {
|
|
2758
|
+
return null;
|
|
2759
|
+
}
|
|
2760
|
+
else {
|
|
2761
|
+
return {
|
|
2762
|
+
id: t.id,
|
|
2763
|
+
keyId: t.keyId,
|
|
2764
|
+
};
|
|
2765
|
+
}
|
|
2766
|
+
}
|
|
2756
2767
|
var UserDeleteState;
|
|
2757
2768
|
(function (UserDeleteState) {
|
|
2758
2769
|
UserDeleteState["REQUESTED"] = "REQUESTED";
|
|
@@ -5908,6 +5919,7 @@ mutation ChangeDirectoryParentsMutation($input: ChangeDirectoryParentsInput!) {
|
|
|
5908
5919
|
changeDirectoryParents(input: $input) {
|
|
5909
5920
|
directory {
|
|
5910
5921
|
id
|
|
5922
|
+
keyId
|
|
5911
5923
|
}
|
|
5912
5924
|
}
|
|
5913
5925
|
}
|
|
@@ -5917,6 +5929,7 @@ mutation ChangeFileParentsMutation($input: ChangeFileParentsInput!) {
|
|
|
5917
5929
|
changeFileParents(input: $input) {
|
|
5918
5930
|
file {
|
|
5919
5931
|
id
|
|
5932
|
+
keyId
|
|
5920
5933
|
}
|
|
5921
5934
|
}
|
|
5922
5935
|
}
|
|
@@ -6461,8 +6474,7 @@ let ItemService = ItemService_1 = class ItemService extends LrService {
|
|
|
6461
6474
|
cipherMetaClearJson: options.cipherMetaClearJson,
|
|
6462
6475
|
parentDirectories: [
|
|
6463
6476
|
{
|
|
6464
|
-
|
|
6465
|
-
wrappingKeyId: tempDir.keyId,
|
|
6477
|
+
directory: tempDir,
|
|
6466
6478
|
},
|
|
6467
6479
|
],
|
|
6468
6480
|
plainMetaJson: options.plainMetaJson,
|
|
@@ -6503,8 +6515,7 @@ let ItemService = ItemService_1 = class ItemService extends LrService {
|
|
|
6503
6515
|
// Create the file
|
|
6504
6516
|
const file = (yield this.createFile(Object.assign(Object.assign({}, options), { parentDirectories: [
|
|
6505
6517
|
{
|
|
6506
|
-
|
|
6507
|
-
wrappingKeyId: tempDir.keyId,
|
|
6518
|
+
directory: tempDir,
|
|
6508
6519
|
},
|
|
6509
6520
|
] }))).createFile.file;
|
|
6510
6521
|
// Call back with item that's currently in staging.
|
|
@@ -6516,8 +6527,7 @@ let ItemService = ItemService_1 = class ItemService extends LrService {
|
|
|
6516
6527
|
// TODO return the server time where delete is scheduled. Expirable mutation
|
|
6517
6528
|
// Return the mutation that moves the directory into the dst directories
|
|
6518
6529
|
return this.changeFileParentsMutation({
|
|
6519
|
-
|
|
6520
|
-
fileKeyId: file.keyId,
|
|
6530
|
+
file,
|
|
6521
6531
|
parentsToRemove: [tempDir.id],
|
|
6522
6532
|
parentsToAdd: options.parentDirectories,
|
|
6523
6533
|
});
|
|
@@ -6566,22 +6576,23 @@ let ItemService = ItemService_1 = class ItemService extends LrService {
|
|
|
6566
6576
|
// ------------------------------------------------------------------------------
|
|
6567
6577
|
prepareParentDirectory(options, newKey) {
|
|
6568
6578
|
return __awaiter(this, void 0, void 0, function* () {
|
|
6569
|
-
const { directoryId, linkType,
|
|
6579
|
+
const { directoryId: _directoryId, wrappingKeyId: _wrappingKeyId, linkType, } = options;
|
|
6580
|
+
const directory = options.directory || {
|
|
6581
|
+
id: _directoryId,
|
|
6582
|
+
keyId: _wrappingKeyId,
|
|
6583
|
+
};
|
|
6570
6584
|
if (linkType == LinkTypeField.REFERENCE) {
|
|
6571
|
-
if (wrappingKeyId) {
|
|
6572
|
-
throw new KcBadArgumentException('Do not specify wrappingKeyId when link type is REFERENCE.');
|
|
6573
|
-
}
|
|
6574
6585
|
return {
|
|
6575
|
-
directoryId,
|
|
6586
|
+
directoryId: directory.id,
|
|
6576
6587
|
linkType,
|
|
6577
6588
|
};
|
|
6578
6589
|
}
|
|
6579
6590
|
else {
|
|
6580
6591
|
// If directory's key is not already in the key graph, then need to
|
|
6581
6592
|
// fetch the directory's key.
|
|
6582
|
-
const wrappingKey = yield this.getDirectoryKey(
|
|
6593
|
+
const wrappingKey = yield this.getDirectoryKey(directory.id, directory.keyId);
|
|
6583
6594
|
return {
|
|
6584
|
-
directoryId,
|
|
6595
|
+
directoryId: directory.id,
|
|
6585
6596
|
wrappingKeyId: wrappingKey.id,
|
|
6586
6597
|
wrappedKey: yield this.keyGraph.wrapKey(wrappingKey, newKey),
|
|
6587
6598
|
linkType,
|
|
@@ -6690,16 +6701,24 @@ let ItemService = ItemService_1 = class ItemService extends LrService {
|
|
|
6690
6701
|
}
|
|
6691
6702
|
prepareChangeDirectoryParents(options) {
|
|
6692
6703
|
return __awaiter(this, void 0, void 0, function* () {
|
|
6693
|
-
const
|
|
6704
|
+
const directory = options.directory || {
|
|
6705
|
+
id: options.directoryId,
|
|
6706
|
+
keyId: options.directoryKeyId,
|
|
6707
|
+
};
|
|
6708
|
+
const directoryKey = yield this.getDirectoryKey(directory.id, directory.keyId);
|
|
6694
6709
|
const input = yield this.prepareChangeItemParents(options, directoryKey.jwk);
|
|
6695
|
-
return Object.assign(Object.assign({}, input), { directoryId:
|
|
6710
|
+
return Object.assign(Object.assign({}, input), { directoryId: directory.id });
|
|
6696
6711
|
});
|
|
6697
6712
|
}
|
|
6698
6713
|
prepareChangeFileParents(options) {
|
|
6699
6714
|
return __awaiter(this, void 0, void 0, function* () {
|
|
6700
|
-
const
|
|
6715
|
+
const file = options.file || {
|
|
6716
|
+
id: options.fileId,
|
|
6717
|
+
keyId: options.fileKeyId,
|
|
6718
|
+
};
|
|
6719
|
+
const fileKey = yield this.getFileKey(file.id, file.keyId);
|
|
6701
6720
|
const input = yield this.prepareChangeItemParents(options, fileKey.jwk);
|
|
6702
|
-
return Object.assign(Object.assign({}, input), { fileId:
|
|
6721
|
+
return Object.assign(Object.assign({}, input), { fileId: file.id });
|
|
6703
6722
|
});
|
|
6704
6723
|
}
|
|
6705
6724
|
onLogout() {
|
|
@@ -9136,7 +9155,7 @@ let ScenarioService = class ScenarioService extends LrService {
|
|
|
9136
9155
|
prepareReceiverItem(options) {
|
|
9137
9156
|
return __awaiter(this, void 0, void 0, function* () {
|
|
9138
9157
|
const { receiverItemOptions, receiverSharedKey, assemblyKey, directory, file, } = options;
|
|
9139
|
-
|
|
9158
|
+
assertExactlyOne({ directory, file });
|
|
9140
9159
|
const { accessRole } = receiverItemOptions;
|
|
9141
9160
|
if (accessRole == AccessRoleChoice.DENY) {
|
|
9142
9161
|
const ret = {
|
|
@@ -10382,15 +10401,19 @@ let TrustedPartyService = class TrustedPartyService extends LrService {
|
|
|
10382
10401
|
}
|
|
10383
10402
|
prepareCreateItemShareMutation(options) {
|
|
10384
10403
|
return __awaiter(this, void 0, void 0, function* () {
|
|
10385
|
-
const { itemId, itemKeyId, tpId, tpSharedKeyId, accessRole, isDirectory, shareType, plainMetaJson, } = options;
|
|
10404
|
+
const { itemId: _itemId, itemKeyId: _itemKeyId, tpId, tpSharedKeyId, accessRole, isDirectory, shareType, plainMetaJson, } = options;
|
|
10405
|
+
const item = options.item || {
|
|
10406
|
+
id: _itemId,
|
|
10407
|
+
keyId: _itemKeyId,
|
|
10408
|
+
};
|
|
10386
10409
|
const plainMeta = plainMetaJson && JSON.stringify(plainMetaJson);
|
|
10387
10410
|
if (accessRole == AccessRoleChoice.DENY) {
|
|
10388
|
-
if (
|
|
10411
|
+
if (item.keyId || tpSharedKeyId) {
|
|
10389
10412
|
throw new KcBadArgumentException('If accessRole is AccessRoleChoice.DENY, must not specify any of itemId, itemKeyId, or tpSharedKeyId parameters');
|
|
10390
10413
|
}
|
|
10391
10414
|
return {
|
|
10392
10415
|
input: {
|
|
10393
|
-
itemId,
|
|
10416
|
+
itemId: item.id,
|
|
10394
10417
|
tpId,
|
|
10395
10418
|
accessRole,
|
|
10396
10419
|
itemKeyId: null,
|
|
@@ -10401,14 +10424,14 @@ let TrustedPartyService = class TrustedPartyService extends LrService {
|
|
|
10401
10424
|
},
|
|
10402
10425
|
};
|
|
10403
10426
|
}
|
|
10404
|
-
const itemKey = yield this.keyGraph.getKey(
|
|
10405
|
-
? this.itemService.getDirectoryKeyId(
|
|
10406
|
-
: this.itemService.getFileKeyId(
|
|
10427
|
+
const itemKey = yield this.keyGraph.getKey(item.keyId, () => isDirectory
|
|
10428
|
+
? this.itemService.getDirectoryKeyId(item.id)
|
|
10429
|
+
: this.itemService.getFileKeyId(item.id));
|
|
10407
10430
|
const wrappingKey = yield this.keyGraph.getKey(tpSharedKeyId, () => this.getTpCurrentUserSharedKey(tpId).then((res) => res.sharedKey.id));
|
|
10408
10431
|
const wrappedItemKey = yield this.keyGraph.wrapKey(wrappingKey, itemKey.jwk);
|
|
10409
10432
|
return {
|
|
10410
10433
|
input: {
|
|
10411
|
-
itemId,
|
|
10434
|
+
itemId: item.id,
|
|
10412
10435
|
tpId,
|
|
10413
10436
|
accessRole,
|
|
10414
10437
|
itemKeyId: itemKey.id,
|
|
@@ -10490,14 +10513,18 @@ let TrustedPartyService = class TrustedPartyService extends LrService {
|
|
|
10490
10513
|
}
|
|
10491
10514
|
prepareUpdateItemShareMutation(options) {
|
|
10492
10515
|
return __awaiter(this, void 0, void 0, function* () {
|
|
10493
|
-
const { itemShareId, accessRole, isDirectory, itemId, itemKeyId, tpId, tpSharedKeyId, plainMetaJson, } = options;
|
|
10516
|
+
const { itemShareId, accessRole, isDirectory, itemId: _itemId, itemKeyId: _itemKeyId, tpId, tpSharedKeyId, plainMetaJson, } = options;
|
|
10517
|
+
const item = options.item || {
|
|
10518
|
+
id: _itemId,
|
|
10519
|
+
keyId: _itemKeyId,
|
|
10520
|
+
};
|
|
10494
10521
|
// If plainMetaJson is undefined, then plainMeta is undefined
|
|
10495
10522
|
// If plainMetaJson is null, then plainMeta is null
|
|
10496
10523
|
// If plainMetaJson has value, then plainMeta is JSON.stringify(plainMetaJson)
|
|
10497
10524
|
const plainMeta = plainMetaJson && JSON.stringify(plainMetaJson);
|
|
10498
10525
|
// If not updating access role or updating to DENY role, then we don't need any key material.
|
|
10499
10526
|
if (accessRole == null || accessRole == AccessRoleChoice.DENY) {
|
|
10500
|
-
if (
|
|
10527
|
+
if (item.id || item.keyId || tpId || tpSharedKeyId) {
|
|
10501
10528
|
throw new KcBadArgumentException('If accessRole is AccessRoleChoice.DENY, must not specify any of itemId, itemKeyId, tpId, or tpSharedKeyId parameters');
|
|
10502
10529
|
}
|
|
10503
10530
|
return {
|
|
@@ -10525,8 +10552,8 @@ let TrustedPartyService = class TrustedPartyService extends LrService {
|
|
|
10525
10552
|
}
|
|
10526
10553
|
return itemShare;
|
|
10527
10554
|
});
|
|
10528
|
-
const itemKey = yield this.keyGraph.getKey(
|
|
10529
|
-
const itemId_ =
|
|
10555
|
+
const itemKey = yield this.keyGraph.getKey(item.keyId, () => __awaiter(this, void 0, void 0, function* () {
|
|
10556
|
+
const itemId_ = item.id || (yield getItemShare()).item.id;
|
|
10530
10557
|
if (isDirectory) {
|
|
10531
10558
|
return this.itemService.getDirectoryKeyId(itemId_);
|
|
10532
10559
|
}
|
|
@@ -10920,5 +10947,5 @@ UserService.ctorParameters = () => [
|
|
|
10920
10947
|
* Generated bundle index. Do not edit.
|
|
10921
10948
|
*/
|
|
10922
10949
|
|
|
10923
|
-
export { AccessRoleChoice, AccessRoleChoiceOrder, AccessRoleMethodChoice, ApiContactCard, ApiCurrentUser, ApproveScenarioClaimMutation, ApproveTpPasswordResetRequestMutation, ArchiveDirectoryMutation, ArchiveFileMutation, AuthService, BeginDeleteChildItemLinksWindowMutation, BillingPeriodField, CancelKeyExchangeMutation, CancelScenarioClaimMutation, CancelTpPasswordResetRequestMutation, CancelUserDeleteMutation, ChangeDirectoryParentsMutation, ChangeFileParentsMutation, ClaimApproverState, ClaimState, CognitoChallengeName, CommonProcessorsService, CompleteKeyExchangeOtkMutation, CompleteTpPasswordResetRequestMutation, Config, ContactCard2Service, ContactCardAddress, ContactCardName, ContactCardsQuery, CreateContactCardMutation$1 as CreateContactCardMutation, CreateDirectoryMutation, CreateFileMutation, CreateLbopQuery, CreateScenarioClaimMutation, CreateScenarioMutation, CreateTpAssemblyKeyChallengeMutation, CreateTpPasswordResetMutation, CurrentUserKey, CurrentUserQuery, CurrentUserSharedKeyQuery2, DebugExpireScenarioClaimMutation, DebugExpireTpPasswordResetRequestMutation, DeclineKeyExchangeMutation, DefaultProcessorOptions, DeleteDirectoryMutation, DeleteFileMutation, DeleteLbopQuery, DeleteScenarioMutation, DeleteTpPasswordResetMutation, DetachedShareStateChoice, DirectoryQuery, ERROR_SOURCE, FeatureAction, Features, FetchKeyGraphField, FileOperationField, FileUploadService, GetOwnedContactCardKeyIdsQuery, GetReceivedContactCardKeyIdQuery, IdleService, InitiateKeyExchangeOtkMutation, ItemService, KC_CONFIG, KcAuthException, KcBadArgumentException, KcBadLogicException, KcBadRequestException, KcBadSignatureException, KcBadStateException, KcBadTimeSyncException, KcCodeMismatchException, KcConcurrentAccessException, KcEncryptionException, KcError, KcErrorCode, KcException, KcInternalErrorException, KcLbopErrorCode, KcLockedException, KcNotFoundException, KcSuspiciousOperationException, KcUnsupportedException, KeyExchangeFields, KeyExchangeMode, KeyExchangeOtkState, KeyExchangeQuery2, KeyExchangeService, KeyExchangeState, KeyExchangeTokenQuery2, KeyExchangesQuery2, KeyGraphField, KeyGraphFragment, LbopQuery, LbopService, LbopsQuery, LifeReadyModule, LinkTypeField, LockService, LockState, LoginHistoryQuery, LrApolloService, LrGraphQLService, LrMergedMutation, LrMutation, LrMutationBase, LrService, MainContactCardFields, MainContactCardPlainFields, MainContactCardProperty, NotificationService, OwnerPlainDataJson, PasswordChangeStatus, PasswordCheck, PasswordService, PermissionChoice, PersistService, PlanService, PlanState, PlanStateField, PreCompleteTpPasswordResetRequestMutation, ProfileDetailsService, ProfileService, QueryProcessorService, ReceiveScenarioClaimMutation, RecoveryStatus, RegisterResult, RegisterService, RejectScenarioClaimMutation, RejectTpPasswordResetRequestMutation, ReminderService, RequestUserDeleteMutation, RespondKeyExchangeOtkMutation, RevertFileMutation, ScenarioLastClaimState, ScenarioService, ScenarioState, ServerConfigService, ServerTimeQuery, SetDirectoryConfidentialMutation, SetFileConfidentialMutation, ShareTypeChoice, SharedContactCard2Service, SharedTrustedPartyDetails, SharedVaultFeature, TPFeatures, TempDirectoryQuery, TimeService, TpAssemblyState, TpClaimApproverState, TpClaimState, TpPasswordResetRequestService, TpPasswordResetService, TpPasswordResetUserService, TrustedPartiesQuery, TrustedParty, TrustedPartyDetails, TrustedPartyProperties, TrustedPartyService, TrustedPartyType, TwoFactorService, UnarchiveDirectoryMutation, UnarchiveFileMutation, UpdateContactCardMutation$1 as UpdateContactCardMutation, UpdateDirectoryMutation, UpdateFileMutation, UpdateLbopQuery, UpdateOwnedContactCardMutation, UpdateReceivedContactCardMutation, UpdateScenarioMutation, UpdateTpPasswordResetMutation, UserDeleteState, UserService, UserSharedKeyFields, WebCryptoService, awsFetch, configureAmplifyAuth, configureApollo, fragmentSpreadAstSelection, gqlTyped, handleApolloError, handleCognitoCallback, httpOptions, mapEdges, processConnection, throwClaimIdMismatch, throwClaimNotApproved, KeyGraphService as ɵa, EncryptionService as ɵb, KeyService as ɵc, KeyFactoryService as ɵd, LrService as ɵe, RunOutsideAngular as ɵf, LrGraphQLService as ɵg, KeyMetaService as ɵh, TpPasswordResetAssemblyController as ɵi, TpAssemblyController as ɵj, SharedContactCardFields as ɵk, SharedContactCardService as ɵl, ScenarioAssemblyController as ɵm, TpPasswordResetPrivateService as ɵn };
|
|
10950
|
+
export { AccessRoleChoice, AccessRoleChoiceOrder, AccessRoleMethodChoice, ApiContactCard, ApiCurrentUser, ApproveScenarioClaimMutation, ApproveTpPasswordResetRequestMutation, ArchiveDirectoryMutation, ArchiveFileMutation, AuthService, BeginDeleteChildItemLinksWindowMutation, BillingPeriodField, CancelKeyExchangeMutation, CancelScenarioClaimMutation, CancelTpPasswordResetRequestMutation, CancelUserDeleteMutation, ChangeDirectoryParentsMutation, ChangeFileParentsMutation, ClaimApproverState, ClaimState, CognitoChallengeName, CommonProcessorsService, CompleteKeyExchangeOtkMutation, CompleteTpPasswordResetRequestMutation, Config, ContactCard2Service, ContactCardAddress, ContactCardName, ContactCardsQuery, CreateContactCardMutation$1 as CreateContactCardMutation, CreateDirectoryMutation, CreateFileMutation, CreateLbopQuery, CreateScenarioClaimMutation, CreateScenarioMutation, CreateTpAssemblyKeyChallengeMutation, CreateTpPasswordResetMutation, CurrentUserKey, CurrentUserQuery, CurrentUserSharedKeyQuery2, DebugExpireScenarioClaimMutation, DebugExpireTpPasswordResetRequestMutation, DeclineKeyExchangeMutation, DefaultProcessorOptions, DeleteDirectoryMutation, DeleteFileMutation, DeleteLbopQuery, DeleteScenarioMutation, DeleteTpPasswordResetMutation, DetachedShareStateChoice, DirectoryQuery, ERROR_SOURCE, FeatureAction, Features, FetchKeyGraphField, FileOperationField, FileUploadService, GetOwnedContactCardKeyIdsQuery, GetReceivedContactCardKeyIdQuery, IdleService, InitiateKeyExchangeOtkMutation, ItemService, KC_CONFIG, KcAuthException, KcBadArgumentException, KcBadLogicException, KcBadRequestException, KcBadSignatureException, KcBadStateException, KcBadTimeSyncException, KcCodeMismatchException, KcConcurrentAccessException, KcEncryptionException, KcError, KcErrorCode, KcException, KcInternalErrorException, KcLbopErrorCode, KcLockedException, KcNotFoundException, KcSuspiciousOperationException, KcUnsupportedException, KeyExchangeFields, KeyExchangeMode, KeyExchangeOtkState, KeyExchangeQuery2, KeyExchangeService, KeyExchangeState, KeyExchangeTokenQuery2, KeyExchangesQuery2, KeyGraphField, KeyGraphFragment, LbopQuery, LbopService, LbopsQuery, LifeReadyModule, LinkTypeField, LockService, LockState, LoginHistoryQuery, LrApolloService, LrGraphQLService, LrMergedMutation, LrMutation, LrMutationBase, LrService, MainContactCardFields, MainContactCardPlainFields, MainContactCardProperty, NotificationService, OwnerPlainDataJson, PasswordChangeStatus, PasswordCheck, PasswordService, PermissionChoice, PersistService, PlanService, PlanState, PlanStateField, PreCompleteTpPasswordResetRequestMutation, ProfileDetailsService, ProfileService, QueryProcessorService, ReceiveScenarioClaimMutation, RecoveryStatus, RegisterResult, RegisterService, RejectScenarioClaimMutation, RejectTpPasswordResetRequestMutation, ReminderService, RequestUserDeleteMutation, RespondKeyExchangeOtkMutation, RevertFileMutation, ScenarioLastClaimState, ScenarioService, ScenarioState, ServerConfigService, ServerTimeQuery, SetDirectoryConfidentialMutation, SetFileConfidentialMutation, ShareTypeChoice, SharedContactCard2Service, SharedTrustedPartyDetails, SharedVaultFeature, TPFeatures, TempDirectoryQuery, TimeService, TpAssemblyState, TpClaimApproverState, TpClaimState, TpPasswordResetRequestService, TpPasswordResetService, TpPasswordResetUserService, TrustedPartiesQuery, TrustedParty, TrustedPartyDetails, TrustedPartyProperties, TrustedPartyService, TrustedPartyType, TwoFactorService, UnarchiveDirectoryMutation, UnarchiveFileMutation, UpdateContactCardMutation$1 as UpdateContactCardMutation, UpdateDirectoryMutation, UpdateFileMutation, UpdateLbopQuery, UpdateOwnedContactCardMutation, UpdateReceivedContactCardMutation, UpdateScenarioMutation, UpdateTpPasswordResetMutation, UserDeleteState, UserService, UserSharedKeyFields, WebCryptoService, awsFetch, configureAmplifyAuth, configureApollo, fragmentSpreadAstSelection, gqlTyped, handleApolloError, handleCognitoCallback, httpOptions, mapEdges, processConnection, throwClaimIdMismatch, throwClaimNotApproved, toIdKeyPair, KeyGraphService as ɵa, EncryptionService as ɵb, KeyService as ɵc, KeyFactoryService as ɵd, LrService as ɵe, RunOutsideAngular as ɵf, LrGraphQLService as ɵg, KeyMetaService as ɵh, TpPasswordResetAssemblyController as ɵi, TpAssemblyController as ɵj, SharedContactCardFields as ɵk, SharedContactCardService as ɵl, ScenarioAssemblyController as ɵm, TpPasswordResetPrivateService as ɵn };
|
|
10924
10951
|
//# sourceMappingURL=lifeready-core.js.map
|