@bitwarden/sdk-internal 0.2.0-main.226 → 0.2.0-main.227

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/VERSION CHANGED
@@ -1 +1 @@
1
- 52116674dae8f72b3bcf688058db0c6cd012e4ac
1
+ 18041b7067ef31b99667d327ca4a1b01ed608e1e
@@ -921,6 +921,22 @@ export interface Fido2CredentialView {
921
921
  creationDate: DateTime<Utc>;
922
922
  }
923
923
 
924
+ export interface Fido2CredentialFullView {
925
+ credentialId: string;
926
+ keyType: string;
927
+ keyAlgorithm: string;
928
+ keyCurve: string;
929
+ keyValue: string;
930
+ rpId: string;
931
+ userHandle: string | undefined;
932
+ userName: string | undefined;
933
+ counter: string;
934
+ rpName: string | undefined;
935
+ userDisplayName: string | undefined;
936
+ discoverable: string;
937
+ creationDate: DateTime<Utc>;
938
+ }
939
+
924
940
  export interface Fido2CredentialNewView {
925
941
  credentialId: string;
926
942
  keyType: string;
@@ -1299,6 +1315,17 @@ export class CiphersClient {
1299
1315
  */
1300
1316
  decrypt_list_with_failures(ciphers: Cipher[]): DecryptCipherListResult;
1301
1317
  decrypt_fido2_credentials(cipher_view: CipherView): Fido2CredentialView[];
1318
+ /**
1319
+ * Temporary method used to re-encrypt FIDO2 credentials for a cipher view.
1320
+ * Necessary until the TS clients utilize the SDK entirely for FIDO2 credentials management.
1321
+ * TS clients create decrypted FIDO2 credentials that need to be encrypted manually when
1322
+ * encrypting the rest of the CipherView.
1323
+ * TODO: Remove once TS passkey provider implementation uses SDK - PM-8313
1324
+ */
1325
+ set_fido2_credentials(
1326
+ cipher_view: CipherView,
1327
+ fido2_credentials: Fido2CredentialFullView[],
1328
+ ): CipherView;
1302
1329
  move_to_organization(cipher_view: CipherView, organization_id: OrganizationId): CipherView;
1303
1330
  decrypt_fido2_private_key(cipher_view: CipherView): string;
1304
1331
  }
@@ -753,7 +753,7 @@ function __wbg_adapter_56(arg0, arg1, arg2) {
753
753
  );
754
754
  }
755
755
 
756
- function __wbg_adapter_279(arg0, arg1, arg2, arg3) {
756
+ function __wbg_adapter_280(arg0, arg1, arg2, arg3) {
757
757
  wasm.wasm_bindgen__convert__closures__invoke2_mut__h8776500d04a3e634(
758
758
  arg0,
759
759
  arg1,
@@ -1237,6 +1237,39 @@ export class CiphersClient {
1237
1237
  wasm.__wbindgen_add_to_stack_pointer(16);
1238
1238
  }
1239
1239
  }
1240
+ /**
1241
+ * Temporary method used to re-encrypt FIDO2 credentials for a cipher view.
1242
+ * Necessary until the TS clients utilize the SDK entirely for FIDO2 credentials management.
1243
+ * TS clients create decrypted FIDO2 credentials that need to be encrypted manually when
1244
+ * encrypting the rest of the CipherView.
1245
+ * TODO: Remove once TS passkey provider implementation uses SDK - PM-8313
1246
+ * @param {CipherView} cipher_view
1247
+ * @param {Fido2CredentialFullView[]} fido2_credentials
1248
+ * @returns {CipherView}
1249
+ */
1250
+ set_fido2_credentials(cipher_view, fido2_credentials) {
1251
+ try {
1252
+ const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
1253
+ const ptr0 = passArrayJsValueToWasm0(fido2_credentials, wasm.__wbindgen_malloc);
1254
+ const len0 = WASM_VECTOR_LEN;
1255
+ wasm.ciphersclient_set_fido2_credentials(
1256
+ retptr,
1257
+ this.__wbg_ptr,
1258
+ addHeapObject(cipher_view),
1259
+ ptr0,
1260
+ len0,
1261
+ );
1262
+ var r0 = getDataViewMemory0().getInt32(retptr + 4 * 0, true);
1263
+ var r1 = getDataViewMemory0().getInt32(retptr + 4 * 1, true);
1264
+ var r2 = getDataViewMemory0().getInt32(retptr + 4 * 2, true);
1265
+ if (r2) {
1266
+ throw takeObject(r1);
1267
+ }
1268
+ return takeObject(r0);
1269
+ } finally {
1270
+ wasm.__wbindgen_add_to_stack_pointer(16);
1271
+ }
1272
+ }
1240
1273
  /**
1241
1274
  * @param {CipherView} cipher_view
1242
1275
  * @param {OrganizationId} organization_id
@@ -3388,7 +3421,7 @@ export function __wbg_get_b9b93047fe3cf45b(arg0, arg1) {
3388
3421
  return addHeapObject(ret);
3389
3422
  }
3390
3423
 
3391
- export function __wbg_get_d8ed5b5d3b3615a2() {
3424
+ export function __wbg_get_d1ac75c9c3657dc2() {
3392
3425
  return handleError(function (arg0, arg1, arg2) {
3393
3426
  let deferred0_0;
3394
3427
  let deferred0_1;
@@ -3403,7 +3436,7 @@ export function __wbg_get_d8ed5b5d3b3615a2() {
3403
3436
  }, arguments);
3404
3437
  }
3405
3438
 
3406
- export function __wbg_getaccesstoken_7760db37646be844(arg0) {
3439
+ export function __wbg_getaccesstoken_e4320b5f55eeabba(arg0) {
3407
3440
  const ret = getObject(arg0).get_access_token();
3408
3441
  return addHeapObject(ret);
3409
3442
  }
@@ -3508,7 +3541,7 @@ export function __wbg_length_e2d2a49132c1b256(arg0) {
3508
3541
  return ret;
3509
3542
  }
3510
3543
 
3511
- export function __wbg_list_851392eddef0ac3b() {
3544
+ export function __wbg_list_4073f967ea074894() {
3512
3545
  return handleError(function (arg0) {
3513
3546
  const ret = getObject(arg0).list();
3514
3547
  return addHeapObject(ret);
@@ -3543,7 +3576,7 @@ export function __wbg_new_23a2665fac83c611(arg0, arg1) {
3543
3576
  const a = state0.a;
3544
3577
  state0.a = 0;
3545
3578
  try {
3546
- return __wbg_adapter_279(a, state0.b, arg0, arg1);
3579
+ return __wbg_adapter_280(a, state0.b, arg0, arg1);
3547
3580
  } finally {
3548
3581
  state0.a = a;
3549
3582
  }
@@ -3685,7 +3718,7 @@ export function __wbg_randomFillSync_ac0988aba3254290() {
3685
3718
  }, arguments);
3686
3719
  }
3687
3720
 
3688
- export function __wbg_remove_9fd882e31e2b7ebc() {
3721
+ export function __wbg_remove_8bd4088f3e0d5ae1() {
3689
3722
  return handleError(function (arg0, arg1, arg2) {
3690
3723
  let deferred0_0;
3691
3724
  let deferred0_1;
@@ -3736,7 +3769,7 @@ export function __wbg_set_65595bdd868b3009(arg0, arg1, arg2) {
3736
3769
  getObject(arg0).set(getObject(arg1), arg2 >>> 0);
3737
3770
  }
3738
3771
 
3739
- export function __wbg_set_6b2801b1c2b2fcf3() {
3772
+ export function __wbg_set_9b96b6509594d7ff() {
3740
3773
  return handleError(function (arg0, arg1, arg2, arg3) {
3741
3774
  let deferred0_0;
3742
3775
  let deferred0_1;
@@ -3930,18 +3963,18 @@ export function __wbindgen_cb_drop(arg0) {
3930
3963
  return ret;
3931
3964
  }
3932
3965
 
3933
- export function __wbindgen_closure_wrapper2909(arg0, arg1, arg2) {
3934
- const ret = makeMutClosure(arg0, arg1, 919, __wbg_adapter_50);
3966
+ export function __wbindgen_closure_wrapper2913(arg0, arg1, arg2) {
3967
+ const ret = makeMutClosure(arg0, arg1, 920, __wbg_adapter_50);
3935
3968
  return addHeapObject(ret);
3936
3969
  }
3937
3970
 
3938
- export function __wbindgen_closure_wrapper3749(arg0, arg1, arg2) {
3939
- const ret = makeMutClosure(arg0, arg1, 1003, __wbg_adapter_53);
3971
+ export function __wbindgen_closure_wrapper3753(arg0, arg1, arg2) {
3972
+ const ret = makeMutClosure(arg0, arg1, 1004, __wbg_adapter_53);
3940
3973
  return addHeapObject(ret);
3941
3974
  }
3942
3975
 
3943
- export function __wbindgen_closure_wrapper4167(arg0, arg1, arg2) {
3944
- const ret = makeMutClosure(arg0, arg1, 1126, __wbg_adapter_56);
3976
+ export function __wbindgen_closure_wrapper4171(arg0, arg1, arg2) {
3977
+ const ret = makeMutClosure(arg0, arg1, 1127, __wbg_adapter_56);
3945
3978
  return addHeapObject(ret);
3946
3979
  }
3947
3980
 
Binary file
@@ -122,6 +122,13 @@ export const ciphersclient_decrypt: (a: number, b: number, c: number) => void;
122
122
  export const ciphersclient_decrypt_list: (a: number, b: number, c: number, d: number) => void;
123
123
  export const ciphersclient_decrypt_list_with_failures: (a: number, b: number, c: number) => number;
124
124
  export const ciphersclient_decrypt_fido2_credentials: (a: number, b: number, c: number) => void;
125
+ export const ciphersclient_set_fido2_credentials: (
126
+ a: number,
127
+ b: number,
128
+ c: number,
129
+ d: number,
130
+ e: number,
131
+ ) => void;
125
132
  export const ciphersclient_move_to_organization: (
126
133
  a: number,
127
134
  b: number,