@lifeready/core 8.0.16 → 9.0.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,2 +1,2 @@
1
1
  export {};
2
- //# sourceMappingURL=data:application/json;base64,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
2
+ //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoidHJ1c3RlZC1wYXJ0eS50eXBlcy5qcyIsInNvdXJjZVJvb3QiOiIiLCJzb3VyY2VzIjpbIi4uLy4uLy4uLy4uLy4uLy4uL3Byb2plY3RzL2NvcmUvc3JjL2xpYi90cnVzdGVkLXBhcnR5L3RydXN0ZWQtcGFydHkudHlwZXMudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6IiIsInNvdXJjZXNDb250ZW50IjpbImltcG9ydCB7XG4gIEFjY2Vzc1JvbGVDaG9pY2UsXG4gIEpTT05PYmplY3QsXG4gIExyUmVsYXlJZElucHV0LFxuICBTaGFyZVR5cGVDaG9pY2UsXG59IGZyb20gJy4uL2FwaS90eXBlcyc7XG5pbXBvcnQgeyBJZEtleVBhaXIgfSBmcm9tICcuLi9pdGVtL2l0ZW0udHlwZXMnO1xuXG5leHBvcnQgaW50ZXJmYWNlIENyZWF0ZUl0ZW1TaGFyZU9wdGlvbnMge1xuICB0cElkOiBMclJlbGF5SWRJbnB1dDtcbiAgYWNjZXNzUm9sZTogQWNjZXNzUm9sZUNob2ljZTtcbiAgc2hhcmVUeXBlOiBTaGFyZVR5cGVDaG9pY2U7XG4gIHBsYWluTWV0YUpzb24/OiBKU09OT2JqZWN0O1xuICBpdGVtPzogSWRLZXlQYWlyO1xuICBpdGVtSWQ/OiBMclJlbGF5SWRJbnB1dDtcbiAgaXRlbUtleUlkPzogTHJSZWxheUlkSW5wdXQ7XG4gIC8vIE9wdGlvbmFsIHRvIGltcHJvdmUgZWZmaWNpZW5jeVxuICB0cFNoYXJlZEtleUlkPzogTHJSZWxheUlkSW5wdXQ7XG59XG5cbmV4cG9ydCBpbnRlcmZhY2UgVXBkYXRlSXRlbVNoYXJlT3B0aW9ucyB7XG4gIGl0ZW1TaGFyZUlkOiBMclJlbGF5SWRJbnB1dDtcbiAgYWNjZXNzUm9sZT86IEFjY2Vzc1JvbGVDaG9pY2U7XG4gIHBsYWluTWV0YUpzb24/OiBKU09OT2JqZWN0O1xuICAvLyBPcHRpb25hbCB0byBpbXByb3ZlIGVmZmljaWVuY3lcbiAgaXRlbT86IElkS2V5UGFpcjtcbiAgaXRlbUlkPzogTHJSZWxheUlkSW5wdXQ7XG4gIGl0ZW1LZXlJZD86IExyUmVsYXlJZElucHV0O1xuICB0cElkPzogTHJSZWxheUlkSW5wdXQ7XG4gIHRwU2hhcmVkS2V5SWQ/OiBMclJlbGF5SWRJbnB1dDtcbn1cblxuZXhwb3J0IGludGVyZmFjZSBVcGRhdGVEZXRhY2hlZEl0ZW1TaGFyZU9wdGlvbnMge1xuICBpdGVtU2hhcmVJZDogTHJSZWxheUlkSW5wdXQ7XG4gIGFjY2Vzc1JvbGU/OiBBY2Nlc3NSb2xlQ2hvaWNlO1xuICBwbGFpbk1ldGFKc29uPzogSlNPTk9iamVjdDtcbn1cblxuZXhwb3J0IGludGVyZmFjZSBDb21wbGV0ZURldGFjaGVkSXRlbVNoYXJlT3B0aW9ucyB7XG4gIGl0ZW1TaGFyZUlkOiBMclJlbGF5SWRJbnB1dDtcbiAgLy8gT3B0aW9uYWwgdG8gaW1wcm92ZSBlZmZpY2llbmN5XG4gIGl0ZW1LZXlJZD86IExyUmVsYXlJZElucHV0O1xufVxuIl19
@@ -286,16 +286,13 @@ function getAccessJwtToken(auth) {
286
286
  }
287
287
  });
288
288
  }
289
- function assert_xor(options) {
289
+ function assertExactlyOne(options) {
290
290
  const keys = Object.keys(options);
291
- if (keys.length != 2) {
292
- throw new KcBadLogicException('You must provide exactly 2 fields in the argument.');
291
+ if (keys.length < 2) {
292
+ throw new KcBadLogicException('You must provide 2 or more fields in the argument.');
293
293
  }
294
- if (options[keys[0]] != null && options[keys[1]] != null) {
295
- throw new KcBadLogicException(`You can not specify both ${keys[0]} and ${keys[1]}`);
296
- }
297
- if (options[keys[0]] == null && options[keys[1]] == null) {
298
- throw new KcBadLogicException(`You must specify either ${keys[0]} and ${keys[1]}`);
294
+ if (keys.filter((key) => options[key] != null).length != 1) {
295
+ throw new KcBadLogicException(`You must provide exactly one argument that != null.`);
299
296
  }
300
297
  }
301
298
 
@@ -2753,6 +2750,20 @@ class LrService {
2753
2750
  function mapEdges(connection) {
2754
2751
  return connection.edges.map((edge) => edge.node);
2755
2752
  }
2753
+ function toIdKeyPair(t) {
2754
+ if (t === undefined) {
2755
+ return undefined;
2756
+ }
2757
+ else if (t === null) {
2758
+ return null;
2759
+ }
2760
+ else {
2761
+ return {
2762
+ id: t.id,
2763
+ keyId: t.keyId,
2764
+ };
2765
+ }
2766
+ }
2756
2767
  var UserDeleteState;
2757
2768
  (function (UserDeleteState) {
2758
2769
  UserDeleteState["REQUESTED"] = "REQUESTED";
@@ -5908,6 +5919,7 @@ mutation ChangeDirectoryParentsMutation($input: ChangeDirectoryParentsInput!) {
5908
5919
  changeDirectoryParents(input: $input) {
5909
5920
  directory {
5910
5921
  id
5922
+ keyId
5911
5923
  }
5912
5924
  }
5913
5925
  }
@@ -5917,6 +5929,7 @@ mutation ChangeFileParentsMutation($input: ChangeFileParentsInput!) {
5917
5929
  changeFileParents(input: $input) {
5918
5930
  file {
5919
5931
  id
5932
+ keyId
5920
5933
  }
5921
5934
  }
5922
5935
  }
@@ -6461,8 +6474,7 @@ let ItemService = ItemService_1 = class ItemService extends LrService {
6461
6474
  cipherMetaClearJson: options.cipherMetaClearJson,
6462
6475
  parentDirectories: [
6463
6476
  {
6464
- directoryId: tempDir.id,
6465
- wrappingKeyId: tempDir.keyId,
6477
+ directory: tempDir,
6466
6478
  },
6467
6479
  ],
6468
6480
  plainMetaJson: options.plainMetaJson,
@@ -6503,8 +6515,7 @@ let ItemService = ItemService_1 = class ItemService extends LrService {
6503
6515
  // Create the file
6504
6516
  const file = (yield this.createFile(Object.assign(Object.assign({}, options), { parentDirectories: [
6505
6517
  {
6506
- directoryId: tempDir.id,
6507
- wrappingKeyId: tempDir.keyId,
6518
+ directory: tempDir,
6508
6519
  },
6509
6520
  ] }))).createFile.file;
6510
6521
  // Call back with item that's currently in staging.
@@ -6516,8 +6527,7 @@ let ItemService = ItemService_1 = class ItemService extends LrService {
6516
6527
  // TODO return the server time where delete is scheduled. Expirable mutation
6517
6528
  // Return the mutation that moves the directory into the dst directories
6518
6529
  return this.changeFileParentsMutation({
6519
- fileId: file.id,
6520
- fileKeyId: file.keyId,
6530
+ file,
6521
6531
  parentsToRemove: [tempDir.id],
6522
6532
  parentsToAdd: options.parentDirectories,
6523
6533
  });
@@ -6566,22 +6576,23 @@ let ItemService = ItemService_1 = class ItemService extends LrService {
6566
6576
  // ------------------------------------------------------------------------------
6567
6577
  prepareParentDirectory(options, newKey) {
6568
6578
  return __awaiter(this, void 0, void 0, function* () {
6569
- const { directoryId, linkType, wrappingKeyId } = options;
6579
+ const { directoryId: _directoryId, wrappingKeyId: _wrappingKeyId, linkType, } = options;
6580
+ const directory = options.directory || {
6581
+ id: _directoryId,
6582
+ keyId: _wrappingKeyId,
6583
+ };
6570
6584
  if (linkType == LinkTypeField.REFERENCE) {
6571
- if (wrappingKeyId) {
6572
- throw new KcBadArgumentException('Do not specify wrappingKeyId when link type is REFERENCE.');
6573
- }
6574
6585
  return {
6575
- directoryId,
6586
+ directoryId: directory.id,
6576
6587
  linkType,
6577
6588
  };
6578
6589
  }
6579
6590
  else {
6580
6591
  // If directory's key is not already in the key graph, then need to
6581
6592
  // fetch the directory's key.
6582
- const wrappingKey = yield this.getDirectoryKey(directoryId, wrappingKeyId);
6593
+ const wrappingKey = yield this.getDirectoryKey(directory.id, directory.keyId);
6583
6594
  return {
6584
- directoryId,
6595
+ directoryId: directory.id,
6585
6596
  wrappingKeyId: wrappingKey.id,
6586
6597
  wrappedKey: yield this.keyGraph.wrapKey(wrappingKey, newKey),
6587
6598
  linkType,
@@ -6690,16 +6701,24 @@ let ItemService = ItemService_1 = class ItemService extends LrService {
6690
6701
  }
6691
6702
  prepareChangeDirectoryParents(options) {
6692
6703
  return __awaiter(this, void 0, void 0, function* () {
6693
- const directoryKey = yield this.getDirectoryKey(options.directoryId, options.directoryKeyId);
6704
+ const directory = options.directory || {
6705
+ id: options.directoryId,
6706
+ keyId: options.directoryKeyId,
6707
+ };
6708
+ const directoryKey = yield this.getDirectoryKey(directory.id, directory.keyId);
6694
6709
  const input = yield this.prepareChangeItemParents(options, directoryKey.jwk);
6695
- return Object.assign(Object.assign({}, input), { directoryId: options.directoryId });
6710
+ return Object.assign(Object.assign({}, input), { directoryId: directory.id });
6696
6711
  });
6697
6712
  }
6698
6713
  prepareChangeFileParents(options) {
6699
6714
  return __awaiter(this, void 0, void 0, function* () {
6700
- const fileKey = yield this.getFileKey(options.fileId, options.fileKeyId);
6715
+ const file = options.file || {
6716
+ id: options.fileId,
6717
+ keyId: options.fileKeyId,
6718
+ };
6719
+ const fileKey = yield this.getFileKey(file.id, file.keyId);
6701
6720
  const input = yield this.prepareChangeItemParents(options, fileKey.jwk);
6702
- return Object.assign(Object.assign({}, input), { fileId: options.fileId });
6721
+ return Object.assign(Object.assign({}, input), { fileId: file.id });
6703
6722
  });
6704
6723
  }
6705
6724
  onLogout() {
@@ -9136,7 +9155,7 @@ let ScenarioService = class ScenarioService extends LrService {
9136
9155
  prepareReceiverItem(options) {
9137
9156
  return __awaiter(this, void 0, void 0, function* () {
9138
9157
  const { receiverItemOptions, receiverSharedKey, assemblyKey, directory, file, } = options;
9139
- assert_xor({ directory, file });
9158
+ assertExactlyOne({ directory, file });
9140
9159
  const { accessRole } = receiverItemOptions;
9141
9160
  if (accessRole == AccessRoleChoice.DENY) {
9142
9161
  const ret = {
@@ -10382,15 +10401,19 @@ let TrustedPartyService = class TrustedPartyService extends LrService {
10382
10401
  }
10383
10402
  prepareCreateItemShareMutation(options) {
10384
10403
  return __awaiter(this, void 0, void 0, function* () {
10385
- const { itemId, itemKeyId, tpId, tpSharedKeyId, accessRole, isDirectory, shareType, plainMetaJson, } = options;
10404
+ const { itemId: _itemId, itemKeyId: _itemKeyId, tpId, tpSharedKeyId, accessRole, isDirectory, shareType, plainMetaJson, } = options;
10405
+ const item = options.item || {
10406
+ id: _itemId,
10407
+ keyId: _itemKeyId,
10408
+ };
10386
10409
  const plainMeta = plainMetaJson && JSON.stringify(plainMetaJson);
10387
10410
  if (accessRole == AccessRoleChoice.DENY) {
10388
- if (itemKeyId || tpSharedKeyId) {
10411
+ if (item.keyId || tpSharedKeyId) {
10389
10412
  throw new KcBadArgumentException('If accessRole is AccessRoleChoice.DENY, must not specify any of itemId, itemKeyId, or tpSharedKeyId parameters');
10390
10413
  }
10391
10414
  return {
10392
10415
  input: {
10393
- itemId,
10416
+ itemId: item.id,
10394
10417
  tpId,
10395
10418
  accessRole,
10396
10419
  itemKeyId: null,
@@ -10401,14 +10424,14 @@ let TrustedPartyService = class TrustedPartyService extends LrService {
10401
10424
  },
10402
10425
  };
10403
10426
  }
10404
- const itemKey = yield this.keyGraph.getKey(itemKeyId, () => isDirectory
10405
- ? this.itemService.getDirectoryKeyId(itemId)
10406
- : this.itemService.getFileKeyId(itemId));
10427
+ const itemKey = yield this.keyGraph.getKey(item.keyId, () => isDirectory
10428
+ ? this.itemService.getDirectoryKeyId(item.id)
10429
+ : this.itemService.getFileKeyId(item.id));
10407
10430
  const wrappingKey = yield this.keyGraph.getKey(tpSharedKeyId, () => this.getTpCurrentUserSharedKey(tpId).then((res) => res.sharedKey.id));
10408
10431
  const wrappedItemKey = yield this.keyGraph.wrapKey(wrappingKey, itemKey.jwk);
10409
10432
  return {
10410
10433
  input: {
10411
- itemId,
10434
+ itemId: item.id,
10412
10435
  tpId,
10413
10436
  accessRole,
10414
10437
  itemKeyId: itemKey.id,
@@ -10490,14 +10513,18 @@ let TrustedPartyService = class TrustedPartyService extends LrService {
10490
10513
  }
10491
10514
  prepareUpdateItemShareMutation(options) {
10492
10515
  return __awaiter(this, void 0, void 0, function* () {
10493
- const { itemShareId, accessRole, isDirectory, itemId, itemKeyId, tpId, tpSharedKeyId, plainMetaJson, } = options;
10516
+ const { itemShareId, accessRole, isDirectory, itemId: _itemId, itemKeyId: _itemKeyId, tpId, tpSharedKeyId, plainMetaJson, } = options;
10517
+ const item = options.item || {
10518
+ id: _itemId,
10519
+ keyId: _itemKeyId,
10520
+ };
10494
10521
  // If plainMetaJson is undefined, then plainMeta is undefined
10495
10522
  // If plainMetaJson is null, then plainMeta is null
10496
10523
  // If plainMetaJson has value, then plainMeta is JSON.stringify(plainMetaJson)
10497
10524
  const plainMeta = plainMetaJson && JSON.stringify(plainMetaJson);
10498
10525
  // If not updating access role or updating to DENY role, then we don't need any key material.
10499
10526
  if (accessRole == null || accessRole == AccessRoleChoice.DENY) {
10500
- if (itemId || itemKeyId || tpId || tpSharedKeyId) {
10527
+ if (item.id || item.keyId || tpId || tpSharedKeyId) {
10501
10528
  throw new KcBadArgumentException('If accessRole is AccessRoleChoice.DENY, must not specify any of itemId, itemKeyId, tpId, or tpSharedKeyId parameters');
10502
10529
  }
10503
10530
  return {
@@ -10525,8 +10552,8 @@ let TrustedPartyService = class TrustedPartyService extends LrService {
10525
10552
  }
10526
10553
  return itemShare;
10527
10554
  });
10528
- const itemKey = yield this.keyGraph.getKey(itemKeyId, () => __awaiter(this, void 0, void 0, function* () {
10529
- const itemId_ = itemId || (yield getItemShare()).item.id;
10555
+ const itemKey = yield this.keyGraph.getKey(item.keyId, () => __awaiter(this, void 0, void 0, function* () {
10556
+ const itemId_ = item.id || (yield getItemShare()).item.id;
10530
10557
  if (isDirectory) {
10531
10558
  return this.itemService.getDirectoryKeyId(itemId_);
10532
10559
  }
@@ -10920,5 +10947,5 @@ UserService.ctorParameters = () => [
10920
10947
  * Generated bundle index. Do not edit.
10921
10948
  */
10922
10949
 
10923
- export { AccessRoleChoice, AccessRoleChoiceOrder, AccessRoleMethodChoice, ApiContactCard, ApiCurrentUser, ApproveScenarioClaimMutation, ApproveTpPasswordResetRequestMutation, ArchiveDirectoryMutation, ArchiveFileMutation, AuthService, BeginDeleteChildItemLinksWindowMutation, BillingPeriodField, CancelKeyExchangeMutation, CancelScenarioClaimMutation, CancelTpPasswordResetRequestMutation, CancelUserDeleteMutation, ChangeDirectoryParentsMutation, ChangeFileParentsMutation, ClaimApproverState, ClaimState, CognitoChallengeName, CommonProcessorsService, CompleteKeyExchangeOtkMutation, CompleteTpPasswordResetRequestMutation, Config, ContactCard2Service, ContactCardAddress, ContactCardName, ContactCardsQuery, CreateContactCardMutation$1 as CreateContactCardMutation, CreateDirectoryMutation, CreateFileMutation, CreateLbopQuery, CreateScenarioClaimMutation, CreateScenarioMutation, CreateTpAssemblyKeyChallengeMutation, CreateTpPasswordResetMutation, CurrentUserKey, CurrentUserQuery, CurrentUserSharedKeyQuery2, DebugExpireScenarioClaimMutation, DebugExpireTpPasswordResetRequestMutation, DeclineKeyExchangeMutation, DefaultProcessorOptions, DeleteDirectoryMutation, DeleteFileMutation, DeleteLbopQuery, DeleteScenarioMutation, DeleteTpPasswordResetMutation, DetachedShareStateChoice, DirectoryQuery, ERROR_SOURCE, FeatureAction, Features, FetchKeyGraphField, FileOperationField, FileUploadService, GetOwnedContactCardKeyIdsQuery, GetReceivedContactCardKeyIdQuery, IdleService, InitiateKeyExchangeOtkMutation, ItemService, KC_CONFIG, KcAuthException, KcBadArgumentException, KcBadLogicException, KcBadRequestException, KcBadSignatureException, KcBadStateException, KcBadTimeSyncException, KcCodeMismatchException, KcConcurrentAccessException, KcEncryptionException, KcError, KcErrorCode, KcException, KcInternalErrorException, KcLbopErrorCode, KcLockedException, KcNotFoundException, KcSuspiciousOperationException, KcUnsupportedException, KeyExchangeFields, KeyExchangeMode, KeyExchangeOtkState, KeyExchangeQuery2, KeyExchangeService, KeyExchangeState, KeyExchangeTokenQuery2, KeyExchangesQuery2, KeyGraphField, KeyGraphFragment, LbopQuery, LbopService, LbopsQuery, LifeReadyModule, LinkTypeField, LockService, LockState, LoginHistoryQuery, LrApolloService, LrGraphQLService, LrMergedMutation, LrMutation, LrMutationBase, LrService, MainContactCardFields, MainContactCardPlainFields, MainContactCardProperty, NotificationService, OwnerPlainDataJson, PasswordChangeStatus, PasswordCheck, PasswordService, PermissionChoice, PersistService, PlanService, PlanState, PlanStateField, PreCompleteTpPasswordResetRequestMutation, ProfileDetailsService, ProfileService, QueryProcessorService, ReceiveScenarioClaimMutation, RecoveryStatus, RegisterResult, RegisterService, RejectScenarioClaimMutation, RejectTpPasswordResetRequestMutation, ReminderService, RequestUserDeleteMutation, RespondKeyExchangeOtkMutation, RevertFileMutation, ScenarioLastClaimState, ScenarioService, ScenarioState, ServerConfigService, ServerTimeQuery, SetDirectoryConfidentialMutation, SetFileConfidentialMutation, ShareTypeChoice, SharedContactCard2Service, SharedTrustedPartyDetails, SharedVaultFeature, TPFeatures, TempDirectoryQuery, TimeService, TpAssemblyState, TpClaimApproverState, TpClaimState, TpPasswordResetRequestService, TpPasswordResetService, TpPasswordResetUserService, TrustedPartiesQuery, TrustedParty, TrustedPartyDetails, TrustedPartyProperties, TrustedPartyService, TrustedPartyType, TwoFactorService, UnarchiveDirectoryMutation, UnarchiveFileMutation, UpdateContactCardMutation$1 as UpdateContactCardMutation, UpdateDirectoryMutation, UpdateFileMutation, UpdateLbopQuery, UpdateOwnedContactCardMutation, UpdateReceivedContactCardMutation, UpdateScenarioMutation, UpdateTpPasswordResetMutation, UserDeleteState, UserService, UserSharedKeyFields, WebCryptoService, awsFetch, configureAmplifyAuth, configureApollo, fragmentSpreadAstSelection, gqlTyped, handleApolloError, handleCognitoCallback, httpOptions, mapEdges, processConnection, throwClaimIdMismatch, throwClaimNotApproved, KeyGraphService as ɵa, EncryptionService as ɵb, KeyService as ɵc, KeyFactoryService as ɵd, LrService as ɵe, RunOutsideAngular as ɵf, LrGraphQLService as ɵg, KeyMetaService as ɵh, TpPasswordResetAssemblyController as ɵi, TpAssemblyController as ɵj, SharedContactCardFields as ɵk, SharedContactCardService as ɵl, ScenarioAssemblyController as ɵm, TpPasswordResetPrivateService as ɵn };
10950
+ export { AccessRoleChoice, AccessRoleChoiceOrder, AccessRoleMethodChoice, ApiContactCard, ApiCurrentUser, ApproveScenarioClaimMutation, ApproveTpPasswordResetRequestMutation, ArchiveDirectoryMutation, ArchiveFileMutation, AuthService, BeginDeleteChildItemLinksWindowMutation, BillingPeriodField, CancelKeyExchangeMutation, CancelScenarioClaimMutation, CancelTpPasswordResetRequestMutation, CancelUserDeleteMutation, ChangeDirectoryParentsMutation, ChangeFileParentsMutation, ClaimApproverState, ClaimState, CognitoChallengeName, CommonProcessorsService, CompleteKeyExchangeOtkMutation, CompleteTpPasswordResetRequestMutation, Config, ContactCard2Service, ContactCardAddress, ContactCardName, ContactCardsQuery, CreateContactCardMutation$1 as CreateContactCardMutation, CreateDirectoryMutation, CreateFileMutation, CreateLbopQuery, CreateScenarioClaimMutation, CreateScenarioMutation, CreateTpAssemblyKeyChallengeMutation, CreateTpPasswordResetMutation, CurrentUserKey, CurrentUserQuery, CurrentUserSharedKeyQuery2, DebugExpireScenarioClaimMutation, DebugExpireTpPasswordResetRequestMutation, DeclineKeyExchangeMutation, DefaultProcessorOptions, DeleteDirectoryMutation, DeleteFileMutation, DeleteLbopQuery, DeleteScenarioMutation, DeleteTpPasswordResetMutation, DetachedShareStateChoice, DirectoryQuery, ERROR_SOURCE, FeatureAction, Features, FetchKeyGraphField, FileOperationField, FileUploadService, GetOwnedContactCardKeyIdsQuery, GetReceivedContactCardKeyIdQuery, IdleService, InitiateKeyExchangeOtkMutation, ItemService, KC_CONFIG, KcAuthException, KcBadArgumentException, KcBadLogicException, KcBadRequestException, KcBadSignatureException, KcBadStateException, KcBadTimeSyncException, KcCodeMismatchException, KcConcurrentAccessException, KcEncryptionException, KcError, KcErrorCode, KcException, KcInternalErrorException, KcLbopErrorCode, KcLockedException, KcNotFoundException, KcSuspiciousOperationException, KcUnsupportedException, KeyExchangeFields, KeyExchangeMode, KeyExchangeOtkState, KeyExchangeQuery2, KeyExchangeService, KeyExchangeState, KeyExchangeTokenQuery2, KeyExchangesQuery2, KeyGraphField, KeyGraphFragment, LbopQuery, LbopService, LbopsQuery, LifeReadyModule, LinkTypeField, LockService, LockState, LoginHistoryQuery, LrApolloService, LrGraphQLService, LrMergedMutation, LrMutation, LrMutationBase, LrService, MainContactCardFields, MainContactCardPlainFields, MainContactCardProperty, NotificationService, OwnerPlainDataJson, PasswordChangeStatus, PasswordCheck, PasswordService, PermissionChoice, PersistService, PlanService, PlanState, PlanStateField, PreCompleteTpPasswordResetRequestMutation, ProfileDetailsService, ProfileService, QueryProcessorService, ReceiveScenarioClaimMutation, RecoveryStatus, RegisterResult, RegisterService, RejectScenarioClaimMutation, RejectTpPasswordResetRequestMutation, ReminderService, RequestUserDeleteMutation, RespondKeyExchangeOtkMutation, RevertFileMutation, ScenarioLastClaimState, ScenarioService, ScenarioState, ServerConfigService, ServerTimeQuery, SetDirectoryConfidentialMutation, SetFileConfidentialMutation, ShareTypeChoice, SharedContactCard2Service, SharedTrustedPartyDetails, SharedVaultFeature, TPFeatures, TempDirectoryQuery, TimeService, TpAssemblyState, TpClaimApproverState, TpClaimState, TpPasswordResetRequestService, TpPasswordResetService, TpPasswordResetUserService, TrustedPartiesQuery, TrustedParty, TrustedPartyDetails, TrustedPartyProperties, TrustedPartyService, TrustedPartyType, TwoFactorService, UnarchiveDirectoryMutation, UnarchiveFileMutation, UpdateContactCardMutation$1 as UpdateContactCardMutation, UpdateDirectoryMutation, UpdateFileMutation, UpdateLbopQuery, UpdateOwnedContactCardMutation, UpdateReceivedContactCardMutation, UpdateScenarioMutation, UpdateTpPasswordResetMutation, UserDeleteState, UserService, UserSharedKeyFields, WebCryptoService, awsFetch, configureAmplifyAuth, configureApollo, fragmentSpreadAstSelection, gqlTyped, handleApolloError, handleCognitoCallback, httpOptions, mapEdges, processConnection, throwClaimIdMismatch, throwClaimNotApproved, toIdKeyPair, KeyGraphService as ɵa, EncryptionService as ɵb, KeyService as ɵc, KeyFactoryService as ɵd, LrService as ɵe, RunOutsideAngular as ɵf, LrGraphQLService as ɵg, KeyMetaService as ɵh, TpPasswordResetAssemblyController as ɵi, TpAssemblyController as ɵj, SharedContactCardFields as ɵk, SharedContactCardService as ɵl, ScenarioAssemblyController as ɵm, TpPasswordResetPrivateService as ɵn };
10924
10951
  //# sourceMappingURL=lifeready-core.js.map