{ "version": 3, "sources": ["apps/partner-center-client/src/app/core/guards/access-feature-flag-guard.service.ts", "apps/partner-center-client/src/app/core/guards/access-all-markets.service.ts", "apps/partner-center-client/src/app/core/guards/access-billing-guard.service.ts", "apps/partner-center-client/src/app/core/guards/access-business-priorities-guard.service.ts", "apps/partner-center-client/src/app/core/guards/access-editing-sales-orders.service.ts", "apps/partner-center-client/src/app/core/guards/access-pipeline-settings.service.ts", "apps/partner-center-client/src/app/core/guards/access-is-admin-guard.service.ts", "apps/partner-center-client/src/app/core/guards/automations-guard.ts", "apps/partner-center-client/src/app/core/guards/embed.guard.ts", "apps/partner-center-client/src/app/core/guards/manage-accounts-guard.service.ts", "apps/partner-center-client/src/app/core/guards/sign-up-guard.service.ts"], "sourcesContent": ["import { Inject, Injectable } from '@angular/core';\nimport { Route, Router, UrlSegment, UrlTree } from '@angular/router';\nimport { FeatureFlagService } from '@galaxy/partner';\nimport { Observable, combineLatest } from 'rxjs';\nimport { map, switchMap } from 'rxjs/operators';\n\n@Injectable({ providedIn: 'root' })\nexport class AccessFeatureFlagGuard {\n constructor(\n private readonly router: Router,\n private readonly featureService: FeatureFlagService,\n @Inject('PARTNER_ID') private readonly partnerId$: Observable,\n @Inject('MARKET_ID') private readonly marketId$: Observable,\n ) {}\n\n canMatch(route: Route, _segments: UrlSegment[]): Observable {\n const featureFlag = route.data.featureFlag;\n return combineLatest([this.partnerId$, this.marketId$]).pipe(\n switchMap(([partnerId, marketId]) => this.featureService.batchGetStatus(partnerId, marketId, [featureFlag])),\n map((flags) => {\n return !!flags[featureFlag];\n }),\n );\n }\n}\n", "import { Injectable } from '@angular/core';\nimport { Router, UrlTree } from '@angular/router';\nimport { AppConfigService } from '../../app-config.service';\n\n@Injectable({ providedIn: 'root' })\nexport class AccessAllMarketsGuard {\n constructor(private readonly configService: AppConfigService, private readonly router: Router) {}\n\n canActivate(): boolean | UrlTree {\n if (\n this.configService.config.accessibleMarketIds === null ||\n this.configService.config.accessibleMarketIds.length === 0\n ) {\n return true;\n }\n return this.router.createUrlTree(['/access-denied']);\n }\n}\n", "import { Injectable } from '@angular/core';\nimport { Router } from '@angular/router';\n\nimport { AppConfigService } from '../../app-config.service';\n\n@Injectable({ providedIn: 'root' })\nexport class AccessBillingGuard {\n constructor(private router: Router, private app: AppConfigService) {}\n\n canLoad(): boolean {\n const hasAccess =\n this.app.config.userCanAccessBilling ||\n this.app.config.userCanAccessRetailBilling ||\n this.app.config.isImpersonated ||\n this.app.config.isSuperAdmin;\n if (!hasAccess) {\n this.router.navigateByUrl('dashboard');\n }\n return hasAccess;\n }\n}\n", "import { Injectable } from '@angular/core';\nimport { Router, UrlTree } from '@angular/router';\nimport { AppConfigService } from '../../app-config.service';\n\n@Injectable({ providedIn: 'root' })\nexport class AccessBusinessPrioritiesGuard {\n constructor(private readonly configService: AppConfigService, private readonly router: Router) {}\n\n canActivate(): boolean | UrlTree {\n if (this.configService.config.userCanAccessSales) {\n return true;\n }\n return this.router.createUrlTree(['/access-denied']);\n }\n}\n", "import { inject, Injectable } from '@angular/core';\nimport { ActivatedRouteSnapshot, Router, UrlTree } from '@angular/router';\nimport { AppConfigService } from '../../app-config.service';\n\n@Injectable({ providedIn: 'root' })\nexport class AccessEditingSalesOrdersGuard {\n private readonly configService = inject(AppConfigService);\n private readonly router = inject(Router);\n\n canActivate(route: ActivatedRouteSnapshot): boolean | UrlTree {\n const config = this.configService.config;\n if (config?.userCanAccessOrders) {\n return true;\n } else {\n const accountGroupId = route.paramMap.get('businessId');\n const orderId = route.paramMap.get('orderId');\n return this.router.createUrlTree(['order-management', accountGroupId, 'sales-order', orderId]);\n }\n }\n}\n", "import { inject, Injectable } from '@angular/core';\nimport { AppConfigService } from '../../app-config.service';\nimport { Observable, of, switchMap } from 'rxjs';\nimport { map } from 'rxjs/operators';\nimport { SalespersonService } from '@vendasta/sales';\nimport { Router, UrlTree } from '@angular/router';\n\n@Injectable({ providedIn: 'root' })\nexport class AccessPipelineSettingsGuard {\n private readonly configService = inject(AppConfigService);\n private readonly salespersonService = inject(SalespersonService);\n private readonly router = inject(Router);\n canActivate(): Observable {\n return this.configService.config$.pipe(\n switchMap((config) => {\n if ((config.userIsAdmin && config.userCanAccessSales) || config.isSuperAdmin) {\n return of(true);\n } else {\n return this.salespersonService\n .getSalespersonByUserId(config.partnerId, config.unifiedUserId)\n .pipe(map((salesperson) => salesperson?.isSalesManager === true));\n }\n }),\n map((hasAccess) => {\n if (hasAccess) {\n return true;\n } else {\n return this.router.createUrlTree(['pipeline/board']);\n }\n }),\n );\n }\n}\n", "import { Injectable } from '@angular/core';\nimport { Router, UrlTree } from '@angular/router';\nimport { AppConfigService } from '../../app-config.service';\n\n@Injectable({ providedIn: 'root' })\nexport class AccessIsAdminGuard {\n constructor(private readonly configService: AppConfigService, private readonly router: Router) {}\n\n canActivate(): boolean | UrlTree {\n if (this.configService.config.userIsAdmin) {\n return true;\n }\n return this.router.createUrlTree(['/access-denied']);\n }\n}\n", "import { Inject, Injectable } from '@angular/core';\nimport { ActivatedRouteSnapshot, Router, RouterStateSnapshot, UrlTree } from '@angular/router';\nimport { Observable, of } from 'rxjs';\nimport { map } from 'rxjs/operators';\nimport { AppConfigService } from '../../app-config.service';\nimport { AccessService, StubAccessService } from '../access';\n\n@Injectable({ providedIn: 'root' })\nexport class AutomationsGuard {\n constructor(\n @Inject(StubAccessService) private access: AccessService,\n private readonly configService: AppConfigService,\n private readonly router: Router,\n ) {}\n\n canActivate(route: ActivatedRouteSnapshot, state: RouterStateSnapshot): Observable {\n const feature = route.data.feature;\n if (!this.userHasAccess()) {\n return of(this.router.createUrlTree(['/access-denied']));\n }\n return this.hasAccessToFeature(feature, state);\n }\n\n hasAccessToFeature(feature: any, state: RouterStateSnapshot): Observable {\n return this.access.hasAccessToFeature(feature).pipe(\n map((hasAccess) => {\n if (hasAccess) {\n return true;\n }\n return this.router.createUrlTree(['/restricted/', feature], { queryParams: { page: state.url } });\n }),\n );\n }\n\n userHasAccess(): boolean {\n return this.configService.config.isSuperAdmin || this.configService.config.userCanAccessAutomations;\n }\n}\n", "import { Injectable } from '@angular/core';\nimport { ActivatedRouteSnapshot, Router, RouterStateSnapshot } from '@angular/router';\nimport { FeatureFlagService } from '@galaxy/partner';\nimport { Observable, of } from 'rxjs';\nimport { filter, map, switchMap, take } from 'rxjs/operators';\nimport { AppConfigService } from '../../app-config.service';\nimport { UnifiedTOSService } from '../tos-unified.service';\n\n@Injectable({ providedIn: 'root' })\nexport class EmbedGuard {\n signupUrl = '/signup';\n newSignUpUrl = '/sign-up';\n tosUrl = '/terms-of-service';\n testLogin = '/login-two';\n\n constructor(\n private router: Router,\n private configService: AppConfigService,\n private unifiedTOSService: UnifiedTOSService,\n private feature: FeatureFlagService,\n ) {}\n\n canActivate(route: ActivatedRouteSnapshot, _state: RouterStateSnapshot): Observable {\n const redirectUrl: string = route.queryParams.embed || '/';\n if (\n redirectUrl.indexOf(this.signupUrl) === 0 ||\n redirectUrl.indexOf(this.newSignUpUrl) === 0 ||\n redirectUrl.indexOf(this.testLogin) === 0\n ) {\n return this.allowNavigation(redirectUrl);\n }\n return this.redirectToUnifiedTOS().pipe(\n take(1),\n switchMap((redirectToUnifiedTOS) => {\n if (redirectToUnifiedTOS) {\n this.router.navigateByUrl(this.tosUrl, { replaceUrl: true });\n return of(false);\n }\n return this.allowNavigation(redirectUrl);\n }),\n );\n }\n\n allowNavigation(redirectUrl: string): Observable {\n this.router.navigateByUrl(redirectUrl, { replaceUrl: true });\n return of(false);\n }\n\n redirectToUnifiedTOS(): Observable {\n return this.unifiedTOSService.tosDataLoaded$\n .pipe(\n filter((isReady) => isReady === true),\n take(1),\n )\n .pipe(\n map(() => {\n return this.unifiedTOSService.isClassicSubscription && !this.configService.config.acceptedTermsAndConditions;\n }),\n );\n }\n}\n", "import { Injectable } from '@angular/core';\nimport { Router, UrlTree } from '@angular/router';\nimport { AppConfigService } from '../../app-config.service';\n\n@Injectable({ providedIn: 'root' })\nexport class ManageAccountsGuard {\n constructor(\n private readonly configService: AppConfigService,\n private readonly router: Router,\n ) {}\n\n canActivate(): boolean | UrlTree {\n return this.configService.config.userCanAccessAccounts ? true : this.router.createUrlTree(['/access-denied']);\n }\n}\n", "import { Injectable } from '@angular/core';\nimport { ActivatedRouteSnapshot, RouterStateSnapshot } from '@angular/router';\nimport { Environment, EnvironmentService } from '@galaxy/core';\n\n@Injectable({ providedIn: 'root' })\nexport class SignUpGuard {\n constructor(private environmentService: EnvironmentService) {}\n\n canActivate(_route: ActivatedRouteSnapshot, _state: RouterStateSnapshot): boolean {\n let href = '';\n switch (this.environmentService.getEnvironment()) {\n case Environment.PROD: {\n href = 'https://signup.vendasta.com';\n break;\n }\n case Environment.DEMO: {\n href = 'https://partner-demo.vendasta-internal.com/';\n break;\n }\n default: {\n href = 'https://signup.vendasta.com';\n break;\n }\n }\n\n window.location.href = href;\n return true;\n }\n}\n"], "mappings": "2XAOA,IAAaA,GAAsB,IAAA,CAA7B,IAAOA,EAAP,MAAOA,CAAsB,CACjCC,YACmBC,EACAC,EACsBC,EACDC,EAA6B,CAHlD,KAAAH,OAAAA,EACA,KAAAC,eAAAA,EACsB,KAAAC,WAAAA,EACD,KAAAC,UAAAA,CACrC,CAEHC,SAASC,EAAcC,EAAuB,CAC5C,IAAMC,EAAcF,EAAMG,KAAKD,YAC/B,OAAOE,EAAc,CAAC,KAAKP,WAAY,KAAKC,SAAS,CAAC,EAAEO,KACtDC,EAAU,CAAC,CAACC,EAAWC,CAAQ,IAAM,KAAKZ,eAAea,eAAeF,EAAWC,EAAU,CAACN,CAAW,CAAC,CAAC,EAC3GQ,EAAKC,GACI,CAAC,CAACA,EAAMT,CAAW,CAC3B,CAAC,CAEN,yCAhBWT,GAAsBmB,EAAAC,CAAA,EAAAD,EAAAE,CAAA,EAAAF,EAIvB,YAAY,EAAAA,EACZ,WAAW,CAAA,CAAA,wBALVnB,EAAsBsB,QAAtBtB,EAAsBuB,UAAAC,WADT,MAAM,CAAA,EAC1B,IAAOxB,EAAPyB,SAAOzB,CAAsB,GAAA,ECFnC,IAAa0B,GAAqB,IAAA,CAA5B,IAAOA,EAAP,MAAOA,CAAqB,CAChCC,YAA6BC,EAAkDC,EAAc,CAAhE,KAAAD,cAAAA,EAAkD,KAAAC,OAAAA,CAAiB,CAEhGC,aAAW,CACT,OACE,KAAKF,cAAcG,OAAOC,sBAAwB,MAClD,KAAKJ,cAAcG,OAAOC,oBAAoBC,SAAW,EAElD,GAEF,KAAKJ,OAAOK,cAAc,CAAC,gBAAgB,CAAC,CACrD,yCAXWR,GAAqBS,EAAAC,CAAA,EAAAD,EAAAE,CAAA,CAAA,CAAA,wBAArBX,EAAqBY,QAArBZ,EAAqBa,UAAAC,WADR,MAAM,CAAA,EAC1B,IAAOd,EAAPe,SAAOf,CAAqB,GAAA,ECClC,IAAagB,GAAkB,IAAA,CAAzB,IAAOA,EAAP,MAAOA,CAAkB,CAC7BC,YAAoBC,EAAwBC,EAAqB,CAA7C,KAAAD,OAAAA,EAAwB,KAAAC,IAAAA,CAAwB,CAEpEC,SAAO,CACL,IAAMC,EACJ,KAAKF,IAAIG,OAAOC,sBAChB,KAAKJ,IAAIG,OAAOE,4BAChB,KAAKL,IAAIG,OAAOG,gBAChB,KAAKN,IAAIG,OAAOI,aAClB,OAAKL,GACH,KAAKH,OAAOS,cAAc,WAAW,EAEhCN,CACT,yCAbWL,GAAkBY,EAAAC,CAAA,EAAAD,EAAAE,CAAA,CAAA,CAAA,wBAAlBd,EAAkBe,QAAlBf,EAAkBgB,UAAAC,WADL,MAAM,CAAA,EAC1B,IAAOjB,EAAPkB,SAAOlB,CAAkB,GAAA,ECD/B,IAAamB,GAA6B,IAAA,CAApC,IAAOA,EAAP,MAAOA,CAA6B,CACxCC,YAA6BC,EAAkDC,EAAc,CAAhE,KAAAD,cAAAA,EAAkD,KAAAC,OAAAA,CAAiB,CAEhGC,aAAW,CACT,OAAI,KAAKF,cAAcG,OAAOC,mBACrB,GAEF,KAAKH,OAAOI,cAAc,CAAC,gBAAgB,CAAC,CACrD,yCARWP,GAA6BQ,EAAAC,CAAA,EAAAD,EAAAE,CAAA,CAAA,CAAA,wBAA7BV,EAA6BW,QAA7BX,EAA6BY,UAAAC,WADhB,MAAM,CAAA,EAC1B,IAAOb,EAAPc,SAAOd,CAA6B,GAAA,ECA1C,IAAae,GAA6B,IAAA,CAApC,IAAOA,EAAP,MAAOA,CAA6B,CAD1CC,aAAA,CAEmB,KAAAC,cAAgBC,EAAOC,CAAgB,EACvC,KAAAC,OAASF,EAAOG,CAAM,EAEvCC,YAAYC,EAA6B,CAEvC,GADe,KAAKN,cAAcO,QACtBC,oBACV,MAAO,GACF,CACL,IAAMC,EAAiBH,EAAMI,SAASC,IAAI,YAAY,EAChDC,EAAUN,EAAMI,SAASC,IAAI,SAAS,EAC5C,OAAO,KAAKR,OAAOU,cAAc,CAAC,mBAAoBJ,EAAgB,cAAeG,CAAO,CAAC,CAC/F,CACF,yCAbWd,EAA6B,wBAA7BA,EAA6BgB,QAA7BhB,EAA6BiB,UAAAC,WADhB,MAAM,CAAA,EAC1B,IAAOlB,EAAPmB,SAAOnB,CAA6B,GAAA,ECG1C,IAAaoB,GAA2B,IAAA,CAAlC,IAAOA,EAAP,MAAOA,CAA2B,CADxCC,aAAA,CAEmB,KAAAC,cAAgBC,EAAOC,CAAgB,EACvC,KAAAC,mBAAqBF,EAAOG,CAAkB,EAC9C,KAAAC,OAASJ,EAAOK,CAAM,EACvCC,aAAW,CACT,OAAO,KAAKP,cAAcQ,QAAQC,KAChCC,EAAWC,GACJA,EAAOC,aAAeD,EAAOE,oBAAuBF,EAAOG,aACvDC,EAAG,EAAI,EAEP,KAAKZ,mBACTa,uBAAuBL,EAAOM,UAAWN,EAAOO,aAAa,EAC7DT,KAAKU,EAAKC,GAAgBA,GAAaC,iBAAmB,EAAI,CAAC,CAErE,EACDF,EAAKG,GACCA,EACK,GAEA,KAAKjB,OAAOkB,cAAc,CAAC,gBAAgB,CAAC,CAEtD,CAAC,CAEN,yCAvBWzB,EAA2B,wBAA3BA,EAA2B0B,QAA3B1B,EAA2B2B,UAAAC,WADd,MAAM,CAAA,EAC1B,IAAO5B,EAAP6B,SAAO7B,CAA2B,GAAA,ECHxC,IAAa8B,IAAkB,IAAA,CAAzB,IAAOA,EAAP,MAAOA,CAAkB,CAC7BC,YAA6BC,EAAkDC,EAAc,CAAhE,KAAAD,cAAAA,EAAkD,KAAAC,OAAAA,CAAiB,CAEhGC,aAAW,CACT,OAAI,KAAKF,cAAcG,OAAOC,YACrB,GAEF,KAAKH,OAAOI,cAAc,CAAC,gBAAgB,CAAC,CACrD,yCARWP,GAAkBQ,EAAAC,CAAA,EAAAD,EAAAE,CAAA,CAAA,CAAA,wBAAlBV,EAAkBW,QAAlBX,EAAkBY,UAAAC,WADL,MAAM,CAAA,EAC1B,IAAOb,EAAPc,SAAOd,CAAkB,GAAA,ECG/B,IAAae,IAAgB,IAAA,CAAvB,IAAOA,EAAP,MAAOA,CAAgB,CAC3BC,YACqCC,EAClBC,EACAC,EAAc,CAFI,KAAAF,OAAAA,EAClB,KAAAC,cAAAA,EACA,KAAAC,OAAAA,CAChB,CAEHC,YAAYC,EAA+BC,EAA0B,CACnE,IAAMC,EAAUF,EAAMG,KAAKD,QAC3B,OAAK,KAAKE,cAAa,EAGhB,KAAKC,mBAAmBH,EAASD,CAAK,EAFpCK,EAAG,KAAKR,OAAOS,cAAc,CAAC,gBAAgB,CAAC,CAAC,CAG3D,CAEAF,mBAAmBH,EAAcD,EAA0B,CACzD,OAAO,KAAKL,OAAOS,mBAAmBH,CAAO,EAAEM,KAC7CC,EAAKC,GACCA,EACK,GAEF,KAAKZ,OAAOS,cAAc,CAAC,eAAgBL,CAAO,EAAG,CAAES,YAAa,CAAEC,KAAMX,EAAMY,GAAG,CAAE,CAAE,CACjG,CAAC,CAEN,CAEAT,eAAa,CACX,OAAO,KAAKP,cAAciB,OAAOC,cAAgB,KAAKlB,cAAciB,OAAOE,wBAC7E,yCA5BWtB,GAAgBuB,EAEjBC,CAAiB,EAAAD,EAAAE,CAAA,EAAAF,EAAAG,CAAA,CAAA,CAAA,wBAFhB1B,EAAgB2B,QAAhB3B,EAAgB4B,UAAAC,WADH,MAAM,CAAA,EAC1B,IAAO7B,EAAP8B,SAAO9B,CAAgB,GAAA,ECC7B,IAAa+B,IAAU,IAAA,CAAjB,IAAOA,EAAP,MAAOA,CAAU,CAMrBC,YACUC,EACAC,EACAC,EACAC,EAA2B,CAH3B,KAAAH,OAAAA,EACA,KAAAC,cAAAA,EACA,KAAAC,kBAAAA,EACA,KAAAC,QAAAA,EATV,KAAAC,UAAY,UACZ,KAAAC,aAAe,WACf,KAAAC,OAAS,oBACT,KAAAC,UAAY,YAOT,CAEHC,YAAYC,EAA+BC,EAA2B,CACpE,IAAMC,EAAsBF,EAAMG,YAAYC,OAAS,IACvD,OACEF,EAAYG,QAAQ,KAAKV,SAAS,IAAM,GACxCO,EAAYG,QAAQ,KAAKT,YAAY,IAAM,GAC3CM,EAAYG,QAAQ,KAAKP,SAAS,IAAM,EAEjC,KAAKQ,gBAAgBJ,CAAW,EAElC,KAAKK,qBAAoB,EAAGC,KACjCC,EAAK,CAAC,EACNC,EAAWH,GACLA,GACF,KAAKhB,OAAOoB,cAAc,KAAKd,OAAQ,CAAEe,WAAY,EAAI,CAAE,EACpDC,EAAG,EAAK,GAEV,KAAKP,gBAAgBJ,CAAW,CACxC,CAAC,CAEN,CAEAI,gBAAgBJ,EAAmB,CACjC,YAAKX,OAAOoB,cAAcT,EAAa,CAAEU,WAAY,EAAI,CAAE,EACpDC,EAAG,EAAK,CACjB,CAEAN,sBAAoB,CAClB,OAAO,KAAKd,kBAAkBqB,eAC3BN,KACCO,EAAQC,GAAYA,IAAY,EAAI,EACpCP,EAAK,CAAC,CAAC,EAERD,KACCS,EAAI,IACK,KAAKxB,kBAAkByB,uBAAyB,CAAC,KAAK1B,cAAc2B,OAAOC,0BACnF,CAAC,CAER,yCAlDW/B,GAAUgC,EAAAC,CAAA,EAAAD,EAAAE,CAAA,EAAAF,EAAAG,CAAA,EAAAH,EAAAI,CAAA,CAAA,CAAA,wBAAVpC,EAAUqC,QAAVrC,EAAUsC,UAAAC,WADG,MAAM,CAAA,EAC1B,IAAOvC,EAAPwC,SAAOxC,CAAU,GAAA,ECJvB,IAAayC,GAAmB,IAAA,CAA1B,IAAOA,EAAP,MAAOA,CAAmB,CAC9BC,YACmBC,EACAC,EAAc,CADd,KAAAD,cAAAA,EACA,KAAAC,OAAAA,CAChB,CAEHC,aAAW,CACT,OAAO,KAAKF,cAAcG,OAAOC,sBAAwB,GAAO,KAAKH,OAAOI,cAAc,CAAC,gBAAgB,CAAC,CAC9G,yCARWP,GAAmBQ,EAAAC,CAAA,EAAAD,EAAAE,CAAA,CAAA,CAAA,wBAAnBV,EAAmBW,QAAnBX,EAAmBY,UAAAC,WADN,MAAM,CAAA,EAC1B,IAAOb,EAAPc,SAAOd,CAAmB,GAAA,ECAhC,IAAae,IAAW,IAAA,CAAlB,IAAOA,EAAP,MAAOA,CAAW,CACtBC,YAAoBC,EAAsC,CAAtC,KAAAA,mBAAAA,CAAyC,CAE7DC,YAAYC,EAAgCC,EAA2B,CACrE,IAAIC,EAAO,GACX,OAAQ,KAAKJ,mBAAmBK,eAAc,EAAE,CAC9C,KAAKC,EAAYC,KAAM,CACrBH,EAAO,8BACP,KACF,CACA,KAAKE,EAAYE,KAAM,CACrBJ,EAAO,8CACP,KACF,CACA,QAAS,CACPA,EAAO,8BACP,KACF,CACF,CAEAK,cAAOC,SAASN,KAAOA,EAChB,EACT,yCAtBWN,GAAWa,EAAAC,CAAA,CAAA,CAAA,wBAAXd,EAAWe,QAAXf,EAAWgB,UAAAC,WADE,MAAM,CAAA,EAC1B,IAAOjB,EAAPkB,SAAOlB,CAAW,GAAA", "names": ["AccessFeatureFlagGuard", "constructor", "router", "featureService", "partnerId$", "marketId$", "canMatch", "route", "_segments", "featureFlag", "data", "combineLatest", "pipe", "switchMap", "partnerId", "marketId", "batchGetStatus", "map", "flags", "\u0275\u0275inject", "Router", "FeatureFlagService", "factory", "\u0275fac", "providedIn", "_AccessFeatureFlagGuard", "AccessAllMarketsGuard", "constructor", "configService", "router", "canActivate", "config", "accessibleMarketIds", "length", "createUrlTree", "\u0275\u0275inject", "AppConfigService", "Router", "factory", "\u0275fac", "providedIn", "_AccessAllMarketsGuard", "AccessBillingGuard", "constructor", "router", "app", "canLoad", "hasAccess", "config", "userCanAccessBilling", "userCanAccessRetailBilling", "isImpersonated", "isSuperAdmin", "navigateByUrl", "\u0275\u0275inject", "Router", "AppConfigService", "factory", "\u0275fac", "providedIn", "_AccessBillingGuard", "AccessBusinessPrioritiesGuard", "constructor", "configService", "router", "canActivate", "config", "userCanAccessSales", "createUrlTree", "\u0275\u0275inject", "AppConfigService", "Router", "factory", "\u0275fac", "providedIn", "_AccessBusinessPrioritiesGuard", "AccessEditingSalesOrdersGuard", "constructor", "configService", "inject", "AppConfigService", "router", "Router", "canActivate", "route", "config", "userCanAccessOrders", "accountGroupId", "paramMap", "get", "orderId", "createUrlTree", "factory", "\u0275fac", "providedIn", "_AccessEditingSalesOrdersGuard", "AccessPipelineSettingsGuard", "constructor", "configService", "inject", "AppConfigService", "salespersonService", "SalespersonService", "router", "Router", "canActivate", "config$", "pipe", "switchMap", "config", "userIsAdmin", "userCanAccessSales", "isSuperAdmin", "of", "getSalespersonByUserId", "partnerId", "unifiedUserId", "map", "salesperson", "isSalesManager", "hasAccess", "createUrlTree", "factory", "\u0275fac", "providedIn", "_AccessPipelineSettingsGuard", "AccessIsAdminGuard", "constructor", "configService", "router", "canActivate", "config", "userIsAdmin", "createUrlTree", "\u0275\u0275inject", "AppConfigService", "Router", "factory", "\u0275fac", "providedIn", "_AccessIsAdminGuard", "AutomationsGuard", "constructor", "access", "configService", "router", "canActivate", "route", "state", "feature", "data", "userHasAccess", "hasAccessToFeature", "of", "createUrlTree", "pipe", "map", "hasAccess", "queryParams", "page", "url", "config", "isSuperAdmin", "userCanAccessAutomations", "\u0275\u0275inject", "StubAccessService", "AppConfigService", "Router", "factory", "\u0275fac", "providedIn", "_AutomationsGuard", "EmbedGuard", "constructor", "router", "configService", "unifiedTOSService", "feature", "signupUrl", "newSignUpUrl", "tosUrl", "testLogin", "canActivate", "route", "_state", "redirectUrl", "queryParams", "embed", "indexOf", "allowNavigation", "redirectToUnifiedTOS", "pipe", "take", "switchMap", "navigateByUrl", "replaceUrl", "of", "tosDataLoaded$", "filter", "isReady", "map", "isClassicSubscription", "config", "acceptedTermsAndConditions", "\u0275\u0275inject", "Router", "AppConfigService", "UnifiedTOSService", "FeatureFlagService", "factory", "\u0275fac", "providedIn", "_EmbedGuard", "ManageAccountsGuard", "constructor", "configService", "router", "canActivate", "config", "userCanAccessAccounts", "createUrlTree", "\u0275\u0275inject", "AppConfigService", "Router", "factory", "\u0275fac", "providedIn", "_ManageAccountsGuard", "SignUpGuard", "constructor", "environmentService", "canActivate", "_route", "_state", "href", "getEnvironment", "Environment", "PROD", "DEMO", "window", "location", "\u0275\u0275inject", "EnvironmentService", "factory", "\u0275fac", "providedIn", "_SignUpGuard"] }