@bitwarden/commercial-sdk-internal 0.2.0-main.437 → 0.2.0-main.439

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -180,51 +180,57 @@ export interface TokenProvider {
180
180
  get_access_token(): Promise<string | undefined>;
181
181
  }
182
182
 
183
- export interface IndexedDbConfiguration {
184
- db_name: string;
185
- }
186
-
187
183
  export interface Repositories {
188
184
  cipher: Repository<Cipher> | null;
189
185
  folder: Repository<Folder> | null;
190
186
  }
191
187
 
188
+ export interface IndexedDbConfiguration {
189
+ db_name: string;
190
+ }
191
+
192
192
  /**
193
193
  * Active feature flags for the SDK.
194
194
  */
195
195
  export interface FeatureFlags extends Map<string, boolean> {}
196
196
 
197
197
  /**
198
- * The credentials used for send access requests.
198
+ * Credentials for sending an OTP to the user\'s email address.
199
+ * This is used when the send requires email verification with an OTP.
199
200
  */
200
- export type SendAccessCredentials =
201
- | SendPasswordCredentials
202
- | SendEmailOtpCredentials
203
- | SendEmailCredentials;
201
+ export interface SendEmailCredentials {
202
+ /**
203
+ * The email address to which the OTP will be sent.
204
+ */
205
+ email: string;
206
+ }
204
207
 
205
208
  /**
206
- * A request structure for requesting a send access token from the API.
209
+ * Credentials for getting a send access token using an email and OTP.
207
210
  */
208
- export interface SendAccessTokenRequest {
211
+ export interface SendEmailOtpCredentials {
209
212
  /**
210
- * The id of the send for which the access token is requested.
213
+ * The email address to which the OTP will be sent.
211
214
  */
212
- sendId: string;
215
+ email: string;
213
216
  /**
214
- * The optional send access credentials.
217
+ * The one-time password (OTP) that the user has received via email.
215
218
  */
216
- sendAccessCredentials?: SendAccessCredentials;
219
+ otp: string;
217
220
  }
218
221
 
219
222
  /**
220
- * Credentials for sending an OTP to the user\'s email address.
221
- * This is used when the send requires email verification with an OTP.
223
+ * A request structure for requesting a send access token from the API.
222
224
  */
223
- export interface SendEmailCredentials {
225
+ export interface SendAccessTokenRequest {
224
226
  /**
225
- * The email address to which the OTP will be sent.
227
+ * The id of the send for which the access token is requested.
226
228
  */
227
- email: string;
229
+ sendId: string;
230
+ /**
231
+ * The optional send access credentials.
232
+ */
233
+ sendAccessCredentials?: SendAccessCredentials;
228
234
  }
229
235
 
230
236
  /**
@@ -240,18 +246,12 @@ export interface SendPasswordCredentials {
240
246
  }
241
247
 
242
248
  /**
243
- * Credentials for getting a send access token using an email and OTP.
249
+ * The credentials used for send access requests.
244
250
  */
245
- export interface SendEmailOtpCredentials {
246
- /**
247
- * The email address to which the OTP will be sent.
248
- */
249
- email: string;
250
- /**
251
- * The one-time password (OTP) that the user has received via email.
252
- */
253
- otp: string;
254
- }
251
+ export type SendAccessCredentials =
252
+ | SendPasswordCredentials
253
+ | SendEmailOtpCredentials
254
+ | SendEmailCredentials;
255
255
 
256
256
  /**
257
257
  * A send access token which can be used to access a send.
@@ -267,14 +267,6 @@ export interface SendAccessTokenResponse {
267
267
  expiresAt: number;
268
268
  }
269
269
 
270
- /**
271
- * Represents errors that can occur when requesting a send access token.
272
- * It includes expected and unexpected API errors.
273
- */
274
- export type SendAccessTokenError =
275
- | { kind: "unexpected"; data: UnexpectedIdentityError }
276
- | { kind: "expected"; data: SendAccessTokenApiErrorResponse };
277
-
278
270
  /**
279
271
  * Any unexpected error that occurs when making requests to identity. This could be
280
272
  * local/transport/decoding failure from the HTTP client (DNS/TLS/connect/read timeout,
@@ -286,14 +278,21 @@ export type SendAccessTokenError =
286
278
  export type UnexpectedIdentityError = string;
287
279
 
288
280
  /**
289
- * Invalid grant errors - typically due to invalid credentials.
281
+ * Represents errors that can occur when requesting a send access token.
282
+ * It includes expected and unexpected API errors.
290
283
  */
291
- export type SendAccessTokenInvalidGrantError =
292
- | "send_id_invalid"
293
- | "password_hash_b64_invalid"
294
- | "email_invalid"
295
- | "otp_invalid"
296
- | "otp_generation_failed"
284
+ export type SendAccessTokenError =
285
+ | { kind: "unexpected"; data: UnexpectedIdentityError }
286
+ | { kind: "expected"; data: SendAccessTokenApiErrorResponse };
287
+
288
+ /**
289
+ * Invalid request errors - typically due to missing parameters.
290
+ */
291
+ export type SendAccessTokenInvalidRequestError =
292
+ | "send_id_required"
293
+ | "password_hash_b64_required"
294
+ | "email_required"
295
+ | "email_and_otp_required_otp_sent"
297
296
  | "unknown";
298
297
 
299
298
  /**
@@ -317,15 +316,68 @@ export type SendAccessTokenApiErrorResponse =
317
316
  | { error: "invalid_target"; error_description?: string };
318
317
 
319
318
  /**
320
- * Invalid request errors - typically due to missing parameters.
319
+ * Invalid grant errors - typically due to invalid credentials.
321
320
  */
322
- export type SendAccessTokenInvalidRequestError =
323
- | "send_id_required"
324
- | "password_hash_b64_required"
325
- | "email_required"
326
- | "email_and_otp_required_otp_sent"
321
+ export type SendAccessTokenInvalidGrantError =
322
+ | "send_id_invalid"
323
+ | "password_hash_b64_invalid"
324
+ | "email_invalid"
325
+ | "otp_invalid"
326
+ | "otp_generation_failed"
327
327
  | "unknown";
328
328
 
329
+ /**
330
+ * Result of TDE registration process.
331
+ */
332
+ export interface TdeRegistrationResponse {
333
+ /**
334
+ * The account cryptographic state of the user
335
+ */
336
+ account_cryptographic_state: WrappedAccountCryptographicState;
337
+ /**
338
+ * The device key
339
+ */
340
+ device_key: B64;
341
+ /**
342
+ * The decrypted user key. This can be used to get the consuming client to an unlocked state.
343
+ */
344
+ user_key: B64;
345
+ }
346
+
347
+ export interface RegistrationError extends Error {
348
+ name: "RegistrationError";
349
+ variant: "Api" | "Crypto";
350
+ }
351
+
352
+ export function isRegistrationError(error: any): error is RegistrationError;
353
+
354
+ /**
355
+ * Request parameters for TDE (Trusted Device Encryption) registration.
356
+ */
357
+ export interface TdeRegistrationRequest {
358
+ /**
359
+ * Organization ID to enroll in
360
+ */
361
+ org_id: OrganizationId;
362
+ /**
363
+ * Organization\'s public key for encrypting the reset password key. This should be verified by
364
+ * the client and not verifying may compromise the security of the user\'s account.
365
+ */
366
+ org_public_key: B64;
367
+ /**
368
+ * User ID for the account being initialized
369
+ */
370
+ user_id: UserId;
371
+ /**
372
+ * Device identifier for TDE enrollment
373
+ */
374
+ device_identifier: string;
375
+ /**
376
+ * Whether to trust this device for TDE
377
+ */
378
+ trust_device: boolean;
379
+ }
380
+
329
381
  /**
330
382
  * NewType wrapper for `CollectionId`
331
383
  */
@@ -560,6 +612,13 @@ export interface VerifyAsymmetricKeysRequest {
560
612
  userKeyEncryptedPrivateKey: EncString;
561
613
  }
562
614
 
615
+ export interface MakeKeysError extends Error {
616
+ name: "MakeKeysError";
617
+ variant: "AccountCryptographyInitialization" | "RequestModelCreation" | "Crypto";
618
+ }
619
+
620
+ export function isMakeKeysError(error: any): error is MakeKeysError;
621
+
563
622
  /**
564
623
  * Response for the `make_keys_for_user_crypto_v2`, containing a set of keys for a user
565
624
  */
@@ -790,6 +849,25 @@ export type UnsignedSharedKey = Tagged<string, "UnsignedSharedKey">;
790
849
 
791
850
  export type EncString = Tagged<string, "EncString">;
792
851
 
852
+ export interface TrustDeviceResponse {
853
+ /**
854
+ * Base64 encoded device key
855
+ */
856
+ device_key: B64;
857
+ /**
858
+ * UserKey encrypted with DevicePublicKey
859
+ */
860
+ protected_user_key: UnsignedSharedKey;
861
+ /**
862
+ * DevicePrivateKey encrypted with [DeviceKey]
863
+ */
864
+ protected_device_private_key: EncString;
865
+ /**
866
+ * DevicePublicKey encrypted with [UserKey](super::UserKey)
867
+ */
868
+ protected_device_public_key: EncString;
869
+ }
870
+
793
871
  export type SignedPublicKey = Tagged<string, "SignedPublicKey">;
794
872
 
795
873
  /**
@@ -2532,6 +2610,11 @@ export class RegistrationClient {
2532
2610
  private constructor();
2533
2611
  free(): void;
2534
2612
  [Symbol.dispose](): void;
2613
+ /**
2614
+ * Initializes a new cryptographic state for a user and posts it to the server; enrolls in
2615
+ * admin password reset and finally enrolls the user to TDE unlock.
2616
+ */
2617
+ post_keys_for_tde_registration(request: TdeRegistrationRequest): Promise<TdeRegistrationResponse>;
2535
2618
  }
2536
2619
  /**
2537
2620
  * The `SendAccessClient` is used to interact with the Bitwarden API to get send access tokens.
@@ -205,16 +205,6 @@ function getArrayU8FromWasm0(ptr, len) {
205
205
  return getUint8ArrayMemory0().subarray(ptr / 1, ptr / 1 + len);
206
206
  }
207
207
 
208
- function getArrayJsValueFromWasm0(ptr, len) {
209
- ptr = ptr >>> 0;
210
- const mem = getDataViewMemory0();
211
- const result = [];
212
- for (let i = ptr; i < ptr + 4 * len; i += 4) {
213
- result.push(takeObject(mem.getUint32(i, true)));
214
- }
215
- return result;
216
- }
217
-
218
208
  const CLOSURE_DTORS =
219
209
  typeof FinalizationRegistry === "undefined"
220
210
  ? { register: () => {}, unregister: () => {} }
@@ -247,6 +237,16 @@ function makeMutClosure(arg0, arg1, dtor, f) {
247
237
  return real;
248
238
  }
249
239
 
240
+ function getArrayJsValueFromWasm0(ptr, len) {
241
+ ptr = ptr >>> 0;
242
+ const mem = getDataViewMemory0();
243
+ const result = [];
244
+ for (let i = ptr; i < ptr + 4 * len; i += 4) {
245
+ result.push(takeObject(mem.getUint32(i, true)));
246
+ }
247
+ return result;
248
+ }
249
+
250
250
  function passArray8ToWasm0(arg, malloc) {
251
251
  const ptr = malloc(arg.length * 1, 1) >>> 0;
252
252
  getUint8ArrayMemory0().set(arg, ptr / 1);
@@ -348,6 +348,19 @@ exports.isTestError = function (error) {
348
348
  }
349
349
  };
350
350
 
351
+ /**
352
+ * @param {any} error
353
+ * @returns {boolean}
354
+ */
355
+ exports.isRegistrationError = function (error) {
356
+ try {
357
+ const ret = wasm.isRegistrationError(addBorrowedObject(error));
358
+ return ret !== 0;
359
+ } finally {
360
+ heap[stack_pointer++] = undefined;
361
+ }
362
+ };
363
+
351
364
  /**
352
365
  * @param {any} error
353
366
  * @returns {boolean}
@@ -426,6 +439,19 @@ exports.isDeriveKeyConnectorError = function (error) {
426
439
  }
427
440
  };
428
441
 
442
+ /**
443
+ * @param {any} error
444
+ * @returns {boolean}
445
+ */
446
+ exports.isMakeKeysError = function (error) {
447
+ try {
448
+ const ret = wasm.isMakeKeysError(addBorrowedObject(error));
449
+ return ret !== 0;
450
+ } finally {
451
+ heap[stack_pointer++] = undefined;
452
+ }
453
+ };
454
+
429
455
  /**
430
456
  * @param {any} error
431
457
  * @returns {boolean}
@@ -872,14 +898,18 @@ exports.isGetFolderError = function (error) {
872
898
  }
873
899
  };
874
900
 
875
- function wasm_bindgen__convert__closures_____invoke__h62b881a194105b80(arg0, arg1) {
876
- wasm.wasm_bindgen__convert__closures_____invoke__h62b881a194105b80(arg0, arg1);
901
+ function wasm_bindgen__convert__closures_____invoke__h08b1457fc8a42f9a(arg0, arg1, arg2) {
902
+ wasm.wasm_bindgen__convert__closures_____invoke__h08b1457fc8a42f9a(
903
+ arg0,
904
+ arg1,
905
+ addHeapObject(arg2),
906
+ );
877
907
  }
878
908
 
879
- function wasm_bindgen__convert__closures_____invoke__h4186fc9839e7cab3(arg0, arg1, arg2) {
909
+ function wasm_bindgen__convert__closures_____invoke__h9df016712e97254d(arg0, arg1, arg2) {
880
910
  try {
881
911
  const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
882
- wasm.wasm_bindgen__convert__closures_____invoke__h4186fc9839e7cab3(
912
+ wasm.wasm_bindgen__convert__closures_____invoke__h9df016712e97254d(
883
913
  retptr,
884
914
  arg0,
885
915
  arg1,
@@ -895,12 +925,8 @@ function wasm_bindgen__convert__closures_____invoke__h4186fc9839e7cab3(arg0, arg
895
925
  }
896
926
  }
897
927
 
898
- function wasm_bindgen__convert__closures_____invoke__h3ee6e6da36ea79fd(arg0, arg1, arg2) {
899
- wasm.wasm_bindgen__convert__closures_____invoke__h3ee6e6da36ea79fd(
900
- arg0,
901
- arg1,
902
- addHeapObject(arg2),
903
- );
928
+ function wasm_bindgen__convert__closures_____invoke__h62b881a194105b80(arg0, arg1) {
929
+ wasm.wasm_bindgen__convert__closures_____invoke__h62b881a194105b80(arg0, arg1);
904
930
  }
905
931
 
906
932
  function wasm_bindgen__convert__closures_____invoke__h92667cd2c3a9eee2(arg0, arg1, arg2, arg3) {
@@ -4297,6 +4323,19 @@ class RegistrationClient {
4297
4323
  const ptr = this.__destroy_into_raw();
4298
4324
  wasm.__wbg_registrationclient_free(ptr, 0);
4299
4325
  }
4326
+ /**
4327
+ * Initializes a new cryptographic state for a user and posts it to the server; enrolls in
4328
+ * admin password reset and finally enrolls the user to TDE unlock.
4329
+ * @param {TdeRegistrationRequest} request
4330
+ * @returns {Promise<TdeRegistrationResponse>}
4331
+ */
4332
+ post_keys_for_tde_registration(request) {
4333
+ const ret = wasm.registrationclient_post_keys_for_tde_registration(
4334
+ this.__wbg_ptr,
4335
+ addHeapObject(request),
4336
+ );
4337
+ return takeObject(ret);
4338
+ }
4300
4339
  }
4301
4340
  if (Symbol.dispose)
4302
4341
  RegistrationClient.prototype[Symbol.dispose] = RegistrationClient.prototype.free;
@@ -4725,7 +4764,7 @@ exports.__wbg_call_e762c39fa8ea36bf = function () {
4725
4764
  }, arguments);
4726
4765
  };
4727
4766
 
4728
- exports.__wbg_cipher_0c36627f8f30cc7e = function (arg0) {
4767
+ exports.__wbg_cipher_d8856dd2ce7150aa = function (arg0) {
4729
4768
  const ret = getObject(arg0).cipher;
4730
4769
  return isLikeNone(ret) ? 0 : addHeapObject(ret);
4731
4770
  };
@@ -4818,7 +4857,7 @@ exports.__wbg_fetch_f8ba0e29a9d6de0d = function (arg0, arg1) {
4818
4857
  return addHeapObject(ret);
4819
4858
  };
4820
4859
 
4821
- exports.__wbg_folder_10fbce592672ac71 = function (arg0) {
4860
+ exports.__wbg_folder_9c099dc41053c5a6 = function (arg0) {
4822
4861
  const ret = getObject(arg0).folder;
4823
4862
  return isLikeNone(ret) ? 0 : addHeapObject(ret);
4824
4863
  };
@@ -4851,7 +4890,7 @@ exports.__wbg_getTime_14776bfb48a1bff9 = function (arg0) {
4851
4890
  return ret;
4852
4891
  };
4853
4892
 
4854
- exports.__wbg_get_2a39e9542c1cdc94 = function () {
4893
+ exports.__wbg_get_72f445e17ec1aa21 = function () {
4855
4894
  return handleError(function (arg0, arg1, arg2) {
4856
4895
  let deferred0_0;
4857
4896
  let deferred0_1;
@@ -4871,7 +4910,12 @@ exports.__wbg_get_7bed016f185add81 = function (arg0, arg1) {
4871
4910
  return addHeapObject(ret);
4872
4911
  };
4873
4912
 
4874
- exports.__wbg_get_a500a1cf45d12e9b = function () {
4913
+ exports.__wbg_get_access_token_4c961c3c68d8878a = function (arg0) {
4914
+ const ret = getObject(arg0).get_access_token();
4915
+ return addHeapObject(ret);
4916
+ };
4917
+
4918
+ exports.__wbg_get_d96fcc610ee6c044 = function () {
4875
4919
  return handleError(function (arg0, arg1, arg2) {
4876
4920
  let deferred0_0;
4877
4921
  let deferred0_1;
@@ -4886,11 +4930,6 @@ exports.__wbg_get_a500a1cf45d12e9b = function () {
4886
4930
  }, arguments);
4887
4931
  };
4888
4932
 
4889
- exports.__wbg_get_access_token_acb10922a5e768ad = function (arg0) {
4890
- const ret = getObject(arg0).get_access_token();
4891
- return addHeapObject(ret);
4892
- };
4893
-
4894
4933
  exports.__wbg_get_efcb449f58ec27c2 = function () {
4895
4934
  return handleError(function (arg0, arg1) {
4896
4935
  const ret = Reflect.get(getObject(arg0), getObject(arg1));
@@ -5082,14 +5121,14 @@ exports.__wbg_length_cdd215e10d9dd507 = function (arg0) {
5082
5121
  return ret;
5083
5122
  };
5084
5123
 
5085
- exports.__wbg_list_87882139240c53e2 = function () {
5124
+ exports.__wbg_list_8b9cc57047c9d5a0 = function () {
5086
5125
  return handleError(function (arg0) {
5087
5126
  const ret = getObject(arg0).list();
5088
5127
  return addHeapObject(ret);
5089
5128
  }, arguments);
5090
5129
  };
5091
5130
 
5092
- exports.__wbg_list_cabbe4a6d3e09c15 = function () {
5131
+ exports.__wbg_list_99b0aedbac169079 = function () {
5093
5132
  return handleError(function (arg0) {
5094
5133
  const ret = getObject(arg0).list();
5095
5134
  return addHeapObject(ret);
@@ -5333,7 +5372,7 @@ exports.__wbg_randomFillSync_ac0988aba3254290 = function () {
5333
5372
  }, arguments);
5334
5373
  };
5335
5374
 
5336
- exports.__wbg_remove_491c4cc200722fdc = function () {
5375
+ exports.__wbg_remove_30835cf5f8b44c8a = function () {
5337
5376
  return handleError(function (arg0, arg1, arg2) {
5338
5377
  let deferred0_0;
5339
5378
  let deferred0_1;
@@ -5348,7 +5387,7 @@ exports.__wbg_remove_491c4cc200722fdc = function () {
5348
5387
  }, arguments);
5349
5388
  };
5350
5389
 
5351
- exports.__wbg_remove_ca1a2c33e546529e = function () {
5390
+ exports.__wbg_remove_4dc0918671fbf62d = function () {
5352
5391
  return handleError(function (arg0, arg1, arg2) {
5353
5392
  let deferred0_0;
5354
5393
  let deferred0_1;
@@ -5403,6 +5442,21 @@ exports.__wbg_set_907fb406c34a251d = function (arg0, arg1, arg2) {
5403
5442
  return addHeapObject(ret);
5404
5443
  };
5405
5444
 
5445
+ exports.__wbg_set_9bbfa30b630bbb2e = function () {
5446
+ return handleError(function (arg0, arg1, arg2, arg3) {
5447
+ let deferred0_0;
5448
+ let deferred0_1;
5449
+ try {
5450
+ deferred0_0 = arg1;
5451
+ deferred0_1 = arg2;
5452
+ const ret = getObject(arg0).set(getStringFromWasm0(arg1, arg2), takeObject(arg3));
5453
+ return addHeapObject(ret);
5454
+ } finally {
5455
+ wasm.__wbindgen_free(deferred0_0, deferred0_1, 1);
5456
+ }
5457
+ }, arguments);
5458
+ };
5459
+
5406
5460
  exports.__wbg_set_body_3c365989753d61f4 = function (arg0, arg1) {
5407
5461
  getObject(arg0).body = getObject(arg1);
5408
5462
  };
@@ -5422,22 +5476,7 @@ exports.__wbg_set_credentials_f621cd2d85c0c228 = function (arg0, arg1) {
5422
5476
  getObject(arg0).credentials = __wbindgen_enum_RequestCredentials[arg1];
5423
5477
  };
5424
5478
 
5425
- exports.__wbg_set_dd61f32bc8ce7525 = function () {
5426
- return handleError(function (arg0, arg1, arg2, arg3) {
5427
- let deferred0_0;
5428
- let deferred0_1;
5429
- try {
5430
- deferred0_0 = arg1;
5431
- deferred0_1 = arg2;
5432
- const ret = getObject(arg0).set(getStringFromWasm0(arg1, arg2), takeObject(arg3));
5433
- return addHeapObject(ret);
5434
- } finally {
5435
- wasm.__wbindgen_free(deferred0_0, deferred0_1, 1);
5436
- }
5437
- }, arguments);
5438
- };
5439
-
5440
- exports.__wbg_set_f3daacef771cf194 = function () {
5479
+ exports.__wbg_set_ea5d171269c04495 = function () {
5441
5480
  return handleError(function (arg0, arg1, arg2, arg3) {
5442
5481
  let deferred0_0;
5443
5482
  let deferred0_1;
@@ -5628,25 +5667,25 @@ exports.__wbindgen_cast_4625c577ab2ec9ee = function (arg0) {
5628
5667
  return addHeapObject(ret);
5629
5668
  };
5630
5669
 
5631
- exports.__wbindgen_cast_5fea77eff9dd275c = function (arg0, arg1) {
5632
- var v0 = getArrayJsValueFromWasm0(arg0, arg1).slice();
5633
- wasm.__wbindgen_free(arg0, arg1 * 4, 4);
5634
- // Cast intrinsic for `Vector(NamedExternref("CipherRiskResult")) -> Externref`.
5635
- const ret = v0;
5636
- return addHeapObject(ret);
5637
- };
5638
-
5639
- exports.__wbindgen_cast_66b9b6fddd3159a0 = function (arg0, arg1) {
5640
- // Cast intrinsic for `Closure(Closure { dtor_idx: 301, function: Function { arguments: [Externref], shim_idx: 46, ret: Unit, inner_ret: Some(Unit) }, mutable: true }) -> Externref`.
5670
+ exports.__wbindgen_cast_484dfa9f464c1222 = function (arg0, arg1) {
5671
+ // Cast intrinsic for `Closure(Closure { dtor_idx: 311, function: Function { arguments: [Externref], shim_idx: 46, ret: Unit, inner_ret: Some(Unit) }, mutable: true }) -> Externref`.
5641
5672
  const ret = makeMutClosure(
5642
5673
  arg0,
5643
5674
  arg1,
5644
5675
  wasm.wasm_bindgen__closure__destroy__h4e2596d1eeea1ddd,
5645
- wasm_bindgen__convert__closures_____invoke__h3ee6e6da36ea79fd,
5676
+ wasm_bindgen__convert__closures_____invoke__h08b1457fc8a42f9a,
5646
5677
  );
5647
5678
  return addHeapObject(ret);
5648
5679
  };
5649
5680
 
5681
+ exports.__wbindgen_cast_5fea77eff9dd275c = function (arg0, arg1) {
5682
+ var v0 = getArrayJsValueFromWasm0(arg0, arg1).slice();
5683
+ wasm.__wbindgen_free(arg0, arg1 * 4, 4);
5684
+ // Cast intrinsic for `Vector(NamedExternref("CipherRiskResult")) -> Externref`.
5685
+ const ret = v0;
5686
+ return addHeapObject(ret);
5687
+ };
5688
+
5650
5689
  exports.__wbindgen_cast_7a6d185652cd8149 = function (arg0, arg1) {
5651
5690
  var v0 = getArrayJsValueFromWasm0(arg0, arg1).slice();
5652
5691
  wasm.__wbindgen_free(arg0, arg1 * 4, 4);
@@ -5661,12 +5700,12 @@ exports.__wbindgen_cast_9ae0607507abb057 = function (arg0) {
5661
5700
  return addHeapObject(ret);
5662
5701
  };
5663
5702
 
5664
- exports.__wbindgen_cast_b70019a15f201a96 = function (arg0, arg1) {
5665
- // Cast intrinsic for `Closure(Closure { dtor_idx: 552, function: Function { arguments: [], shim_idx: 302, ret: Unit, inner_ret: Some(Unit) }, mutable: true }) -> Externref`.
5703
+ exports.__wbindgen_cast_ab87f469c2c8c8ee = function (arg0, arg1) {
5704
+ // Cast intrinsic for `Closure(Closure { dtor_idx: 311, function: Function { arguments: [], shim_idx: 312, ret: Unit, inner_ret: Some(Unit) }, mutable: true }) -> Externref`.
5666
5705
  const ret = makeMutClosure(
5667
5706
  arg0,
5668
5707
  arg1,
5669
- wasm.wasm_bindgen__closure__destroy__he95e920b8d9de938,
5708
+ wasm.wasm_bindgen__closure__destroy__h4e2596d1eeea1ddd,
5670
5709
  wasm_bindgen__convert__closures_____invoke__h62b881a194105b80,
5671
5710
  );
5672
5711
  return addHeapObject(ret);
@@ -5683,8 +5722,8 @@ exports.__wbindgen_cast_d3c442d81884e8e4 = function (arg0, arg1) {
5683
5722
  const ret = makeMutClosure(
5684
5723
  arg0,
5685
5724
  arg1,
5686
- wasm.wasm_bindgen__closure__destroy__h03764d3cf8644af3,
5687
- wasm_bindgen__convert__closures_____invoke__h4186fc9839e7cab3,
5725
+ wasm.wasm_bindgen__closure__destroy__h176866a126b2a406,
5726
+ wasm_bindgen__convert__closures_____invoke__h9df016712e97254d,
5688
5727
  );
5689
5728
  return addHeapObject(ret);
5690
5729
  };
@@ -5700,18 +5739,18 @@ exports.__wbindgen_cast_d9da8617cf4d65f6 = function (arg0, arg1) {
5700
5739
  const ret = makeMutClosure(
5701
5740
  arg0,
5702
5741
  arg1,
5703
- wasm.wasm_bindgen__closure__destroy__h03764d3cf8644af3,
5704
- wasm_bindgen__convert__closures_____invoke__h3ee6e6da36ea79fd,
5742
+ wasm.wasm_bindgen__closure__destroy__h176866a126b2a406,
5743
+ wasm_bindgen__convert__closures_____invoke__h08b1457fc8a42f9a,
5705
5744
  );
5706
5745
  return addHeapObject(ret);
5707
5746
  };
5708
5747
 
5709
- exports.__wbindgen_cast_e1b8613407289e9c = function (arg0, arg1) {
5710
- // Cast intrinsic for `Closure(Closure { dtor_idx: 301, function: Function { arguments: [], shim_idx: 302, ret: Unit, inner_ret: Some(Unit) }, mutable: true }) -> Externref`.
5748
+ exports.__wbindgen_cast_ebf67f1bd70fb06c = function (arg0, arg1) {
5749
+ // Cast intrinsic for `Closure(Closure { dtor_idx: 561, function: Function { arguments: [], shim_idx: 312, ret: Unit, inner_ret: Some(Unit) }, mutable: true }) -> Externref`.
5711
5750
  const ret = makeMutClosure(
5712
5751
  arg0,
5713
5752
  arg1,
5714
- wasm.wasm_bindgen__closure__destroy__h4e2596d1eeea1ddd,
5753
+ wasm.wasm_bindgen__closure__destroy__he95e920b8d9de938,
5715
5754
  wasm_bindgen__convert__closures_____invoke__h62b881a194105b80,
5716
5755
  );
5717
5756
  return addHeapObject(ret);
@@ -200,6 +200,8 @@ export const stateclient_register_folder_repository: (a: number, b: number) => v
200
200
  export const __wbg_authclient_free: (a: number, b: number) => void;
201
201
  export const __wbg_identityclient_free: (a: number, b: number) => void;
202
202
  export const authclient_identity: (a: number) => number;
203
+ export const isRegistrationError: (a: number) => number;
204
+ export const registrationclient_post_keys_for_tde_registration: (a: number, b: number) => number;
203
205
  export const sendaccessclient_request_send_access_token: (a: number, b: number) => number;
204
206
  export const isCollectionDecryptError: (a: number) => number;
205
207
  export const __wbg_commercialvaultclient_free: (a: number, b: number) => void;
@@ -236,6 +238,7 @@ export const isCryptoClientError: (a: number) => number;
236
238
  export const isDeriveKeyConnectorError: (a: number) => number;
237
239
  export const isEncryptionSettingsError: (a: number) => number;
238
240
  export const isEnrollAdminPasswordResetError: (a: number) => number;
241
+ export const isMakeKeysError: (a: number) => number;
239
242
  export const isMasterPasswordError: (a: number) => number;
240
243
  export const isStatefulCryptoError: (a: number) => number;
241
244
  export const isCryptoError: (a: number) => number;
@@ -443,6 +446,7 @@ export const vaultclient_ciphers: (a: number) => number;
443
446
  export const vaultclient_collections: (a: number) => number;
444
447
  export const vaultclient_folders: (a: number) => number;
445
448
  export const vaultclient_totp: (a: number) => number;
449
+ export const __wbg_registrationclient_free: (a: number, b: number) => void;
446
450
  export const __wbg_sendaccessclient_free: (a: number, b: number) => void;
447
451
  export const __wbg_cipherriskclient_free: (a: number, b: number) => void;
448
452
  export const __wbg_ciphersclient_free: (a: number, b: number) => void;
@@ -451,27 +455,26 @@ export const __wbg_foldersclient_free: (a: number, b: number) => void;
451
455
  export const __wbg_totpclient_free: (a: number, b: number) => void;
452
456
  export const __wbg_vaultclient_free: (a: number, b: number) => void;
453
457
  export const __wbg_get_outgoingmessage_destination: (a: number) => number;
454
- export const __wbg_registrationclient_free: (a: number, b: number) => void;
455
458
  export const __wbg_set_outgoingmessage_destination: (a: number, b: number) => void;
456
459
  export const __wbg_cryptoclient_free: (a: number, b: number) => void;
457
- export const wasm_bindgen__convert__closures_____invoke__h62b881a194105b80: (
460
+ export const wasm_bindgen__convert__closures_____invoke__h08b1457fc8a42f9a: (
458
461
  a: number,
459
462
  b: number,
463
+ c: number,
460
464
  ) => void;
461
- export const wasm_bindgen__closure__destroy__he95e920b8d9de938: (a: number, b: number) => void;
462
- export const wasm_bindgen__closure__destroy__h4e2596d1eeea1ddd: (a: number, b: number) => void;
463
- export const wasm_bindgen__convert__closures_____invoke__h4186fc9839e7cab3: (
465
+ export const wasm_bindgen__closure__destroy__h176866a126b2a406: (a: number, b: number) => void;
466
+ export const wasm_bindgen__convert__closures_____invoke__h9df016712e97254d: (
464
467
  a: number,
465
468
  b: number,
466
469
  c: number,
467
470
  d: number,
468
471
  ) => void;
469
- export const wasm_bindgen__closure__destroy__h03764d3cf8644af3: (a: number, b: number) => void;
470
- export const wasm_bindgen__convert__closures_____invoke__h3ee6e6da36ea79fd: (
472
+ export const wasm_bindgen__convert__closures_____invoke__h62b881a194105b80: (
471
473
  a: number,
472
474
  b: number,
473
- c: number,
474
475
  ) => void;
476
+ export const wasm_bindgen__closure__destroy__he95e920b8d9de938: (a: number, b: number) => void;
477
+ export const wasm_bindgen__closure__destroy__h4e2596d1eeea1ddd: (a: number, b: number) => void;
475
478
  export const wasm_bindgen__convert__closures_____invoke__h92667cd2c3a9eee2: (
476
479
  a: number,
477
480
  b: number,
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@bitwarden/commercial-sdk-internal",
3
- "version": "0.2.0-main.437",
3
+ "version": "0.2.0-main.439",
4
4
  "license": "BITWARDEN SOFTWARE DEVELOPMENT KIT LICENSE AGREEMENT",
5
5
  "repository": {
6
6
  "type": "git",