@bitwarden/sdk-internal 0.2.0-main.230 → 0.2.0-main.232
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/VERSION +1 -1
- package/bitwarden_wasm_internal.d.ts +100 -25
- package/bitwarden_wasm_internal_bg.js +187 -26
- package/bitwarden_wasm_internal_bg.wasm +0 -0
- package/bitwarden_wasm_internal_bg.wasm.d.ts +11 -7
- package/bitwarden_wasm_internal_bg.wasm.js +1 -1
- package/node/bitwarden_wasm_internal.d.ts +100 -25
- package/node/bitwarden_wasm_internal.js +187 -26
- package/node/bitwarden_wasm_internal_bg.wasm +0 -0
- package/node/bitwarden_wasm_internal_bg.wasm.d.ts +11 -7
- package/package.json +1 -1
package/VERSION
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
|
|
1
|
+
bdcb5f5480053b181dab1e6c80c5df0ab93e440f
|
|
@@ -136,6 +136,10 @@ export interface InitUserCryptoRequest {
|
|
|
136
136
|
* The user\'s signing key
|
|
137
137
|
*/
|
|
138
138
|
signingKey: EncString | undefined;
|
|
139
|
+
/**
|
|
140
|
+
* The user\'s security state
|
|
141
|
+
*/
|
|
142
|
+
securityState: SignedSecurityState | undefined;
|
|
139
143
|
/**
|
|
140
144
|
* The initialization method to use
|
|
141
145
|
*/
|
|
@@ -273,49 +277,45 @@ export interface VerifyAsymmetricKeysResponse {
|
|
|
273
277
|
}
|
|
274
278
|
|
|
275
279
|
/**
|
|
276
|
-
*
|
|
280
|
+
* Response for the `make_keys_for_user_crypto_v2`, containing a set of keys for a user
|
|
277
281
|
*/
|
|
278
|
-
export interface
|
|
282
|
+
export interface UserCryptoV2KeysResponse {
|
|
279
283
|
/**
|
|
280
|
-
*
|
|
284
|
+
* User key
|
|
281
285
|
*/
|
|
282
|
-
|
|
286
|
+
userKey: string;
|
|
283
287
|
/**
|
|
284
|
-
*
|
|
288
|
+
* Wrapped private key
|
|
285
289
|
*/
|
|
286
|
-
|
|
290
|
+
privateKey: EncString;
|
|
287
291
|
/**
|
|
288
|
-
*
|
|
292
|
+
* Public key
|
|
289
293
|
*/
|
|
290
|
-
|
|
291
|
-
}
|
|
292
|
-
|
|
293
|
-
/**
|
|
294
|
-
* A rotated set of account keys for a user
|
|
295
|
-
*/
|
|
296
|
-
export interface RotateUserKeysResponse {
|
|
294
|
+
publicKey: string;
|
|
297
295
|
/**
|
|
298
|
-
* The
|
|
296
|
+
* The user\'s public key, signed by the signing key
|
|
299
297
|
*/
|
|
300
|
-
|
|
298
|
+
signedPublicKey: SignedPublicKey;
|
|
301
299
|
/**
|
|
302
|
-
* Signing key, encrypted with
|
|
300
|
+
* Signing key, encrypted with the user\'s symmetric key
|
|
303
301
|
*/
|
|
304
302
|
signingKey: EncString;
|
|
305
303
|
/**
|
|
306
|
-
*
|
|
304
|
+
* Base64 encoded verifying key
|
|
307
305
|
*/
|
|
308
|
-
|
|
306
|
+
verifyingKey: string;
|
|
309
307
|
/**
|
|
310
|
-
* The user\'s
|
|
308
|
+
* The user\'s signed security state
|
|
311
309
|
*/
|
|
312
|
-
|
|
310
|
+
securityState: SignedSecurityState;
|
|
313
311
|
/**
|
|
314
|
-
* The
|
|
312
|
+
* The security state\'s version
|
|
315
313
|
*/
|
|
316
|
-
|
|
314
|
+
securityVersion: number;
|
|
317
315
|
}
|
|
318
316
|
|
|
317
|
+
export type SignedSecurityState = string;
|
|
318
|
+
|
|
319
319
|
/**
|
|
320
320
|
* NewType wrapper for `OrganizationId`
|
|
321
321
|
*/
|
|
@@ -342,6 +342,13 @@ export interface CryptoClientError extends Error {
|
|
|
342
342
|
|
|
343
343
|
export function isCryptoClientError(error: any): error is CryptoClientError;
|
|
344
344
|
|
|
345
|
+
export interface StatefulCryptoError extends Error {
|
|
346
|
+
name: "StatefulCryptoError";
|
|
347
|
+
variant: "MissingSecurityState" | "WrongAccountCryptoVersion" | "CryptoError";
|
|
348
|
+
}
|
|
349
|
+
|
|
350
|
+
export function isStatefulCryptoError(error: any): error is StatefulCryptoError;
|
|
351
|
+
|
|
345
352
|
export interface EncryptionSettingsError extends Error {
|
|
346
353
|
name: "EncryptionSettingsError";
|
|
347
354
|
variant:
|
|
@@ -350,6 +357,7 @@ export interface EncryptionSettingsError extends Error {
|
|
|
350
357
|
| "VaultLocked"
|
|
351
358
|
| "InvalidPrivateKey"
|
|
352
359
|
| "InvalidSigningKey"
|
|
360
|
+
| "InvalidSecurityState"
|
|
353
361
|
| "MissingPrivateKey"
|
|
354
362
|
| "UserIdAlreadySetError";
|
|
355
363
|
}
|
|
@@ -990,6 +998,16 @@ export interface SecureNoteView {
|
|
|
990
998
|
type: SecureNoteType;
|
|
991
999
|
}
|
|
992
1000
|
|
|
1001
|
+
/**
|
|
1002
|
+
* Request to add or edit a folder.
|
|
1003
|
+
*/
|
|
1004
|
+
export interface FolderAddEditRequest {
|
|
1005
|
+
/**
|
|
1006
|
+
* The new name of the folder.
|
|
1007
|
+
*/
|
|
1008
|
+
name: string;
|
|
1009
|
+
}
|
|
1010
|
+
|
|
993
1011
|
export interface Folder {
|
|
994
1012
|
id: Uuid | undefined;
|
|
995
1013
|
name: EncString;
|
|
@@ -1044,6 +1062,34 @@ export interface PasswordHistory {
|
|
|
1044
1062
|
lastUsedDate: DateTime<Utc>;
|
|
1045
1063
|
}
|
|
1046
1064
|
|
|
1065
|
+
export interface GetFolderError extends Error {
|
|
1066
|
+
name: "GetFolderError";
|
|
1067
|
+
variant: "ItemNotFound" | "Crypto" | "RepositoryError";
|
|
1068
|
+
}
|
|
1069
|
+
|
|
1070
|
+
export function isGetFolderError(error: any): error is GetFolderError;
|
|
1071
|
+
|
|
1072
|
+
export interface EditFolderError extends Error {
|
|
1073
|
+
name: "EditFolderError";
|
|
1074
|
+
variant:
|
|
1075
|
+
| "ItemNotFound"
|
|
1076
|
+
| "Crypto"
|
|
1077
|
+
| "Api"
|
|
1078
|
+
| "VaultParse"
|
|
1079
|
+
| "MissingField"
|
|
1080
|
+
| "RepositoryError"
|
|
1081
|
+
| "Uuid";
|
|
1082
|
+
}
|
|
1083
|
+
|
|
1084
|
+
export function isEditFolderError(error: any): error is EditFolderError;
|
|
1085
|
+
|
|
1086
|
+
export interface CreateFolderError extends Error {
|
|
1087
|
+
name: "CreateFolderError";
|
|
1088
|
+
variant: "Crypto" | "Api" | "VaultParse" | "MissingField" | "RepositoryError";
|
|
1089
|
+
}
|
|
1090
|
+
|
|
1091
|
+
export function isCreateFolderError(error: any): error is CreateFolderError;
|
|
1092
|
+
|
|
1047
1093
|
export interface Collection {
|
|
1048
1094
|
id: Uuid | undefined;
|
|
1049
1095
|
organizationId: Uuid;
|
|
@@ -1359,11 +1405,11 @@ export class CryptoClient {
|
|
|
1359
1405
|
/**
|
|
1360
1406
|
* Makes a new signing key pair and signs the public key for the user
|
|
1361
1407
|
*/
|
|
1362
|
-
|
|
1408
|
+
make_keys_for_user_crypto_v2(): UserCryptoV2KeysResponse;
|
|
1363
1409
|
/**
|
|
1364
1410
|
* Creates a rotated set of account keys for the current state
|
|
1365
1411
|
*/
|
|
1366
|
-
get_v2_rotated_account_keys(
|
|
1412
|
+
get_v2_rotated_account_keys(): UserCryptoV2KeysResponse;
|
|
1367
1413
|
}
|
|
1368
1414
|
export class ExporterClient {
|
|
1369
1415
|
private constructor();
|
|
@@ -1393,12 +1439,40 @@ export class ExporterClient {
|
|
|
1393
1439
|
*/
|
|
1394
1440
|
import_cxf(payload: string): Cipher[];
|
|
1395
1441
|
}
|
|
1442
|
+
/**
|
|
1443
|
+
* Wrapper for folder specific functionality.
|
|
1444
|
+
*/
|
|
1396
1445
|
export class FoldersClient {
|
|
1397
1446
|
private constructor();
|
|
1398
1447
|
free(): void;
|
|
1448
|
+
/**
|
|
1449
|
+
* Encrypt a [FolderView] to a [Folder].
|
|
1450
|
+
*/
|
|
1399
1451
|
encrypt(folder_view: FolderView): Folder;
|
|
1452
|
+
/**
|
|
1453
|
+
* Encrypt a [Folder] to [FolderView].
|
|
1454
|
+
*/
|
|
1400
1455
|
decrypt(folder: Folder): FolderView;
|
|
1456
|
+
/**
|
|
1457
|
+
* Decrypt a list of [Folder]s to a list of [FolderView]s.
|
|
1458
|
+
*/
|
|
1401
1459
|
decrypt_list(folders: Folder[]): FolderView[];
|
|
1460
|
+
/**
|
|
1461
|
+
* Get all folders from state and decrypt them to a list of [FolderView].
|
|
1462
|
+
*/
|
|
1463
|
+
list(): Promise<FolderView[]>;
|
|
1464
|
+
/**
|
|
1465
|
+
* Get a specific [Folder] by its ID from state and decrypt it to a [FolderView].
|
|
1466
|
+
*/
|
|
1467
|
+
get(folder_id: string): Promise<FolderView>;
|
|
1468
|
+
/**
|
|
1469
|
+
* Create a new [Folder] and save it to the server.
|
|
1470
|
+
*/
|
|
1471
|
+
create(request: FolderAddEditRequest): Promise<FolderView>;
|
|
1472
|
+
/**
|
|
1473
|
+
* Edit the [Folder] and save it to the server.
|
|
1474
|
+
*/
|
|
1475
|
+
edit(folder_id: string, request: FolderAddEditRequest): Promise<FolderView>;
|
|
1402
1476
|
}
|
|
1403
1477
|
export class GeneratorClient {
|
|
1404
1478
|
private constructor();
|
|
@@ -1644,6 +1718,7 @@ export class StateClient {
|
|
|
1644
1718
|
private constructor();
|
|
1645
1719
|
free(): void;
|
|
1646
1720
|
register_cipher_repository(store: Repository<Cipher>): void;
|
|
1721
|
+
register_folder_repository(store: Repository<Folder>): void;
|
|
1647
1722
|
}
|
|
1648
1723
|
export class TotpClient {
|
|
1649
1724
|
private constructor();
|
|
@@ -290,6 +290,19 @@ export function isCryptoClientError(error) {
|
|
|
290
290
|
}
|
|
291
291
|
}
|
|
292
292
|
|
|
293
|
+
/**
|
|
294
|
+
* @param {any} error
|
|
295
|
+
* @returns {boolean}
|
|
296
|
+
*/
|
|
297
|
+
export function isStatefulCryptoError(error) {
|
|
298
|
+
try {
|
|
299
|
+
const ret = wasm.isStatefulCryptoError(addBorrowedObject(error));
|
|
300
|
+
return ret !== 0;
|
|
301
|
+
} finally {
|
|
302
|
+
heap[stack_pointer++] = undefined;
|
|
303
|
+
}
|
|
304
|
+
}
|
|
305
|
+
|
|
293
306
|
/**
|
|
294
307
|
* @param {any} error
|
|
295
308
|
* @returns {boolean}
|
|
@@ -597,6 +610,45 @@ export function isTotpError(error) {
|
|
|
597
610
|
}
|
|
598
611
|
}
|
|
599
612
|
|
|
613
|
+
/**
|
|
614
|
+
* @param {any} error
|
|
615
|
+
* @returns {boolean}
|
|
616
|
+
*/
|
|
617
|
+
export function isGetFolderError(error) {
|
|
618
|
+
try {
|
|
619
|
+
const ret = wasm.isGetFolderError(addBorrowedObject(error));
|
|
620
|
+
return ret !== 0;
|
|
621
|
+
} finally {
|
|
622
|
+
heap[stack_pointer++] = undefined;
|
|
623
|
+
}
|
|
624
|
+
}
|
|
625
|
+
|
|
626
|
+
/**
|
|
627
|
+
* @param {any} error
|
|
628
|
+
* @returns {boolean}
|
|
629
|
+
*/
|
|
630
|
+
export function isEditFolderError(error) {
|
|
631
|
+
try {
|
|
632
|
+
const ret = wasm.isEditFolderError(addBorrowedObject(error));
|
|
633
|
+
return ret !== 0;
|
|
634
|
+
} finally {
|
|
635
|
+
heap[stack_pointer++] = undefined;
|
|
636
|
+
}
|
|
637
|
+
}
|
|
638
|
+
|
|
639
|
+
/**
|
|
640
|
+
* @param {any} error
|
|
641
|
+
* @returns {boolean}
|
|
642
|
+
*/
|
|
643
|
+
export function isCreateFolderError(error) {
|
|
644
|
+
try {
|
|
645
|
+
const ret = wasm.isCreateFolderError(addBorrowedObject(error));
|
|
646
|
+
return ret !== 0;
|
|
647
|
+
} finally {
|
|
648
|
+
heap[stack_pointer++] = undefined;
|
|
649
|
+
}
|
|
650
|
+
}
|
|
651
|
+
|
|
600
652
|
/**
|
|
601
653
|
* @param {any} error
|
|
602
654
|
* @returns {boolean}
|
|
@@ -731,21 +783,21 @@ export function isTestError(error) {
|
|
|
731
783
|
}
|
|
732
784
|
}
|
|
733
785
|
|
|
734
|
-
function
|
|
786
|
+
function __wbg_adapter_54(arg0, arg1) {
|
|
735
787
|
wasm._dyn_core__ops__function__FnMut_____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h31333524c3115e44(
|
|
736
788
|
arg0,
|
|
737
789
|
arg1,
|
|
738
790
|
);
|
|
739
791
|
}
|
|
740
792
|
|
|
741
|
-
function
|
|
793
|
+
function __wbg_adapter_57(arg0, arg1) {
|
|
742
794
|
wasm._dyn_core__ops__function__FnMut_____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h2b093e5f83b42fbd(
|
|
743
795
|
arg0,
|
|
744
796
|
arg1,
|
|
745
797
|
);
|
|
746
798
|
}
|
|
747
799
|
|
|
748
|
-
function
|
|
800
|
+
function __wbg_adapter_60(arg0, arg1, arg2) {
|
|
749
801
|
wasm._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__hb01d8be1001e4f40(
|
|
750
802
|
arg0,
|
|
751
803
|
arg1,
|
|
@@ -753,7 +805,7 @@ function __wbg_adapter_56(arg0, arg1, arg2) {
|
|
|
753
805
|
);
|
|
754
806
|
}
|
|
755
807
|
|
|
756
|
-
function
|
|
808
|
+
function __wbg_adapter_301(arg0, arg1, arg2, arg3) {
|
|
757
809
|
wasm.wasm_bindgen__convert__closures__invoke2_mut__h8776500d04a3e634(
|
|
758
810
|
arg0,
|
|
759
811
|
arg1,
|
|
@@ -1424,12 +1476,12 @@ export class CryptoClient {
|
|
|
1424
1476
|
}
|
|
1425
1477
|
/**
|
|
1426
1478
|
* Makes a new signing key pair and signs the public key for the user
|
|
1427
|
-
* @returns {
|
|
1479
|
+
* @returns {UserCryptoV2KeysResponse}
|
|
1428
1480
|
*/
|
|
1429
|
-
|
|
1481
|
+
make_keys_for_user_crypto_v2() {
|
|
1430
1482
|
try {
|
|
1431
1483
|
const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
|
|
1432
|
-
wasm.
|
|
1484
|
+
wasm.cryptoclient_make_keys_for_user_crypto_v2(retptr, this.__wbg_ptr);
|
|
1433
1485
|
var r0 = getDataViewMemory0().getInt32(retptr + 4 * 0, true);
|
|
1434
1486
|
var r1 = getDataViewMemory0().getInt32(retptr + 4 * 1, true);
|
|
1435
1487
|
var r2 = getDataViewMemory0().getInt32(retptr + 4 * 2, true);
|
|
@@ -1443,15 +1495,12 @@ export class CryptoClient {
|
|
|
1443
1495
|
}
|
|
1444
1496
|
/**
|
|
1445
1497
|
* Creates a rotated set of account keys for the current state
|
|
1446
|
-
* @
|
|
1447
|
-
* @returns {RotateUserKeysResponse}
|
|
1498
|
+
* @returns {UserCryptoV2KeysResponse}
|
|
1448
1499
|
*/
|
|
1449
|
-
get_v2_rotated_account_keys(
|
|
1500
|
+
get_v2_rotated_account_keys() {
|
|
1450
1501
|
try {
|
|
1451
1502
|
const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
|
|
1452
|
-
|
|
1453
|
-
const len0 = WASM_VECTOR_LEN;
|
|
1454
|
-
wasm.cryptoclient_get_v2_rotated_account_keys(retptr, this.__wbg_ptr, ptr0, len0);
|
|
1503
|
+
wasm.cryptoclient_get_v2_rotated_account_keys(retptr, this.__wbg_ptr);
|
|
1455
1504
|
var r0 = getDataViewMemory0().getInt32(retptr + 4 * 0, true);
|
|
1456
1505
|
var r1 = getDataViewMemory0().getInt32(retptr + 4 * 1, true);
|
|
1457
1506
|
var r2 = getDataViewMemory0().getInt32(retptr + 4 * 2, true);
|
|
@@ -1650,7 +1699,9 @@ const FoldersClientFinalization =
|
|
|
1650
1699
|
typeof FinalizationRegistry === "undefined"
|
|
1651
1700
|
? { register: () => {}, unregister: () => {} }
|
|
1652
1701
|
: new FinalizationRegistry((ptr) => wasm.__wbg_foldersclient_free(ptr >>> 0, 1));
|
|
1653
|
-
|
|
1702
|
+
/**
|
|
1703
|
+
* Wrapper for folder specific functionality.
|
|
1704
|
+
*/
|
|
1654
1705
|
export class FoldersClient {
|
|
1655
1706
|
static __wrap(ptr) {
|
|
1656
1707
|
ptr = ptr >>> 0;
|
|
@@ -1672,6 +1723,7 @@ export class FoldersClient {
|
|
|
1672
1723
|
wasm.__wbg_foldersclient_free(ptr, 0);
|
|
1673
1724
|
}
|
|
1674
1725
|
/**
|
|
1726
|
+
* Encrypt a [FolderView] to a [Folder].
|
|
1675
1727
|
* @param {FolderView} folder_view
|
|
1676
1728
|
* @returns {Folder}
|
|
1677
1729
|
*/
|
|
@@ -1691,6 +1743,7 @@ export class FoldersClient {
|
|
|
1691
1743
|
}
|
|
1692
1744
|
}
|
|
1693
1745
|
/**
|
|
1746
|
+
* Encrypt a [Folder] to [FolderView].
|
|
1694
1747
|
* @param {Folder} folder
|
|
1695
1748
|
* @returns {FolderView}
|
|
1696
1749
|
*/
|
|
@@ -1710,6 +1763,7 @@ export class FoldersClient {
|
|
|
1710
1763
|
}
|
|
1711
1764
|
}
|
|
1712
1765
|
/**
|
|
1766
|
+
* Decrypt a list of [Folder]s to a list of [FolderView]s.
|
|
1713
1767
|
* @param {Folder[]} folders
|
|
1714
1768
|
* @returns {FolderView[]}
|
|
1715
1769
|
*/
|
|
@@ -1733,6 +1787,46 @@ export class FoldersClient {
|
|
|
1733
1787
|
wasm.__wbindgen_add_to_stack_pointer(16);
|
|
1734
1788
|
}
|
|
1735
1789
|
}
|
|
1790
|
+
/**
|
|
1791
|
+
* Get all folders from state and decrypt them to a list of [FolderView].
|
|
1792
|
+
* @returns {Promise<FolderView[]>}
|
|
1793
|
+
*/
|
|
1794
|
+
list() {
|
|
1795
|
+
const ret = wasm.foldersclient_list(this.__wbg_ptr);
|
|
1796
|
+
return takeObject(ret);
|
|
1797
|
+
}
|
|
1798
|
+
/**
|
|
1799
|
+
* Get a specific [Folder] by its ID from state and decrypt it to a [FolderView].
|
|
1800
|
+
* @param {string} folder_id
|
|
1801
|
+
* @returns {Promise<FolderView>}
|
|
1802
|
+
*/
|
|
1803
|
+
get(folder_id) {
|
|
1804
|
+
const ptr0 = passStringToWasm0(folder_id, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);
|
|
1805
|
+
const len0 = WASM_VECTOR_LEN;
|
|
1806
|
+
const ret = wasm.foldersclient_get(this.__wbg_ptr, ptr0, len0);
|
|
1807
|
+
return takeObject(ret);
|
|
1808
|
+
}
|
|
1809
|
+
/**
|
|
1810
|
+
* Create a new [Folder] and save it to the server.
|
|
1811
|
+
* @param {FolderAddEditRequest} request
|
|
1812
|
+
* @returns {Promise<FolderView>}
|
|
1813
|
+
*/
|
|
1814
|
+
create(request) {
|
|
1815
|
+
const ret = wasm.foldersclient_create(this.__wbg_ptr, addHeapObject(request));
|
|
1816
|
+
return takeObject(ret);
|
|
1817
|
+
}
|
|
1818
|
+
/**
|
|
1819
|
+
* Edit the [Folder] and save it to the server.
|
|
1820
|
+
* @param {string} folder_id
|
|
1821
|
+
* @param {FolderAddEditRequest} request
|
|
1822
|
+
* @returns {Promise<FolderView>}
|
|
1823
|
+
*/
|
|
1824
|
+
edit(folder_id, request) {
|
|
1825
|
+
const ptr0 = passStringToWasm0(folder_id, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);
|
|
1826
|
+
const len0 = WASM_VECTOR_LEN;
|
|
1827
|
+
const ret = wasm.foldersclient_edit(this.__wbg_ptr, ptr0, len0, addHeapObject(request));
|
|
1828
|
+
return takeObject(ret);
|
|
1829
|
+
}
|
|
1736
1830
|
}
|
|
1737
1831
|
|
|
1738
1832
|
const GeneratorClientFinalization =
|
|
@@ -3150,6 +3244,12 @@ export class StateClient {
|
|
|
3150
3244
|
register_cipher_repository(store) {
|
|
3151
3245
|
wasm.stateclient_register_cipher_repository(this.__wbg_ptr, addHeapObject(store));
|
|
3152
3246
|
}
|
|
3247
|
+
/**
|
|
3248
|
+
* @param {Repository<Folder>} store
|
|
3249
|
+
*/
|
|
3250
|
+
register_folder_repository(store) {
|
|
3251
|
+
wasm.stateclient_register_folder_repository(this.__wbg_ptr, addHeapObject(store));
|
|
3252
|
+
}
|
|
3153
3253
|
}
|
|
3154
3254
|
|
|
3155
3255
|
const TotpClientFinalization =
|
|
@@ -3409,6 +3509,21 @@ export function __wbg_getTime_46267b1c24877e30(arg0) {
|
|
|
3409
3509
|
return ret;
|
|
3410
3510
|
}
|
|
3411
3511
|
|
|
3512
|
+
export function __wbg_get_1620f903ed9a676f() {
|
|
3513
|
+
return handleError(function (arg0, arg1, arg2) {
|
|
3514
|
+
let deferred0_0;
|
|
3515
|
+
let deferred0_1;
|
|
3516
|
+
try {
|
|
3517
|
+
deferred0_0 = arg1;
|
|
3518
|
+
deferred0_1 = arg2;
|
|
3519
|
+
const ret = getObject(arg0).get(getStringFromWasm0(arg1, arg2));
|
|
3520
|
+
return addHeapObject(ret);
|
|
3521
|
+
} finally {
|
|
3522
|
+
wasm.__wbindgen_free(deferred0_0, deferred0_1, 1);
|
|
3523
|
+
}
|
|
3524
|
+
}, arguments);
|
|
3525
|
+
}
|
|
3526
|
+
|
|
3412
3527
|
export function __wbg_get_67b2ba62fc30de12() {
|
|
3413
3528
|
return handleError(function (arg0, arg1) {
|
|
3414
3529
|
const ret = Reflect.get(getObject(arg0), getObject(arg1));
|
|
@@ -3421,7 +3536,7 @@ export function __wbg_get_b9b93047fe3cf45b(arg0, arg1) {
|
|
|
3421
3536
|
return addHeapObject(ret);
|
|
3422
3537
|
}
|
|
3423
3538
|
|
|
3424
|
-
export function
|
|
3539
|
+
export function __wbg_get_e94e796a5527c131() {
|
|
3425
3540
|
return handleError(function (arg0, arg1, arg2) {
|
|
3426
3541
|
let deferred0_0;
|
|
3427
3542
|
let deferred0_1;
|
|
@@ -3436,7 +3551,7 @@ export function __wbg_get_fe8b1fc2a9351d29() {
|
|
|
3436
3551
|
}, arguments);
|
|
3437
3552
|
}
|
|
3438
3553
|
|
|
3439
|
-
export function
|
|
3554
|
+
export function __wbg_getaccesstoken_115c028df526c10b(arg0) {
|
|
3440
3555
|
const ret = getObject(arg0).get_access_token();
|
|
3441
3556
|
return addHeapObject(ret);
|
|
3442
3557
|
}
|
|
@@ -3541,7 +3656,14 @@ export function __wbg_length_e2d2a49132c1b256(arg0) {
|
|
|
3541
3656
|
return ret;
|
|
3542
3657
|
}
|
|
3543
3658
|
|
|
3544
|
-
export function
|
|
3659
|
+
export function __wbg_list_2a92e7addacc7a2d() {
|
|
3660
|
+
return handleError(function (arg0) {
|
|
3661
|
+
const ret = getObject(arg0).list();
|
|
3662
|
+
return addHeapObject(ret);
|
|
3663
|
+
}, arguments);
|
|
3664
|
+
}
|
|
3665
|
+
|
|
3666
|
+
export function __wbg_list_6d9131c88a8d0a17() {
|
|
3545
3667
|
return handleError(function (arg0) {
|
|
3546
3668
|
const ret = getObject(arg0).list();
|
|
3547
3669
|
return addHeapObject(ret);
|
|
@@ -3576,7 +3698,7 @@ export function __wbg_new_23a2665fac83c611(arg0, arg1) {
|
|
|
3576
3698
|
const a = state0.a;
|
|
3577
3699
|
state0.a = 0;
|
|
3578
3700
|
try {
|
|
3579
|
-
return
|
|
3701
|
+
return __wbg_adapter_301(a, state0.b, arg0, arg1);
|
|
3580
3702
|
} finally {
|
|
3581
3703
|
state0.a = a;
|
|
3582
3704
|
}
|
|
@@ -3718,7 +3840,22 @@ export function __wbg_randomFillSync_ac0988aba3254290() {
|
|
|
3718
3840
|
}, arguments);
|
|
3719
3841
|
}
|
|
3720
3842
|
|
|
3721
|
-
export function
|
|
3843
|
+
export function __wbg_remove_050f4c22aba9e8c7() {
|
|
3844
|
+
return handleError(function (arg0, arg1, arg2) {
|
|
3845
|
+
let deferred0_0;
|
|
3846
|
+
let deferred0_1;
|
|
3847
|
+
try {
|
|
3848
|
+
deferred0_0 = arg1;
|
|
3849
|
+
deferred0_1 = arg2;
|
|
3850
|
+
const ret = getObject(arg0).remove(getStringFromWasm0(arg1, arg2));
|
|
3851
|
+
return addHeapObject(ret);
|
|
3852
|
+
} finally {
|
|
3853
|
+
wasm.__wbindgen_free(deferred0_0, deferred0_1, 1);
|
|
3854
|
+
}
|
|
3855
|
+
}, arguments);
|
|
3856
|
+
}
|
|
3857
|
+
|
|
3858
|
+
export function __wbg_remove_c9b8a1e5e4b15f5f() {
|
|
3722
3859
|
return handleError(function (arg0, arg1, arg2) {
|
|
3723
3860
|
let deferred0_0;
|
|
3724
3861
|
let deferred0_1;
|
|
@@ -3769,7 +3906,22 @@ export function __wbg_set_65595bdd868b3009(arg0, arg1, arg2) {
|
|
|
3769
3906
|
getObject(arg0).set(getObject(arg1), arg2 >>> 0);
|
|
3770
3907
|
}
|
|
3771
3908
|
|
|
3772
|
-
export function
|
|
3909
|
+
export function __wbg_set_c0f7f01bcd881751() {
|
|
3910
|
+
return handleError(function (arg0, arg1, arg2, arg3) {
|
|
3911
|
+
let deferred0_0;
|
|
3912
|
+
let deferred0_1;
|
|
3913
|
+
try {
|
|
3914
|
+
deferred0_0 = arg1;
|
|
3915
|
+
deferred0_1 = arg2;
|
|
3916
|
+
const ret = getObject(arg0).set(getStringFromWasm0(arg1, arg2), takeObject(arg3));
|
|
3917
|
+
return addHeapObject(ret);
|
|
3918
|
+
} finally {
|
|
3919
|
+
wasm.__wbindgen_free(deferred0_0, deferred0_1, 1);
|
|
3920
|
+
}
|
|
3921
|
+
}, arguments);
|
|
3922
|
+
}
|
|
3923
|
+
|
|
3924
|
+
export function __wbg_set_f85eb67e00c0abef() {
|
|
3773
3925
|
return handleError(function (arg0, arg1, arg2, arg3) {
|
|
3774
3926
|
let deferred0_0;
|
|
3775
3927
|
let deferred0_1;
|
|
@@ -3925,6 +4077,15 @@ export function __wbg_warn_aaf1f4664a035bd6(arg0, arg1, arg2, arg3) {
|
|
|
3925
4077
|
console.warn(getObject(arg0), getObject(arg1), getObject(arg2), getObject(arg3));
|
|
3926
4078
|
}
|
|
3927
4079
|
|
|
4080
|
+
export function __wbindgen_array_new() {
|
|
4081
|
+
const ret = [];
|
|
4082
|
+
return addHeapObject(ret);
|
|
4083
|
+
}
|
|
4084
|
+
|
|
4085
|
+
export function __wbindgen_array_push(arg0, arg1) {
|
|
4086
|
+
getObject(arg0).push(takeObject(arg1));
|
|
4087
|
+
}
|
|
4088
|
+
|
|
3928
4089
|
export function __wbindgen_as_number(arg0) {
|
|
3929
4090
|
const ret = +getObject(arg0);
|
|
3930
4091
|
return ret;
|
|
@@ -3963,18 +4124,18 @@ export function __wbindgen_cb_drop(arg0) {
|
|
|
3963
4124
|
return ret;
|
|
3964
4125
|
}
|
|
3965
4126
|
|
|
3966
|
-
export function
|
|
3967
|
-
const ret = makeMutClosure(arg0, arg1,
|
|
4127
|
+
export function __wbindgen_closure_wrapper3245(arg0, arg1, arg2) {
|
|
4128
|
+
const ret = makeMutClosure(arg0, arg1, 1034, __wbg_adapter_54);
|
|
3968
4129
|
return addHeapObject(ret);
|
|
3969
4130
|
}
|
|
3970
4131
|
|
|
3971
|
-
export function
|
|
3972
|
-
const ret = makeMutClosure(arg0, arg1,
|
|
4132
|
+
export function __wbindgen_closure_wrapper4086(arg0, arg1, arg2) {
|
|
4133
|
+
const ret = makeMutClosure(arg0, arg1, 1118, __wbg_adapter_57);
|
|
3973
4134
|
return addHeapObject(ret);
|
|
3974
4135
|
}
|
|
3975
4136
|
|
|
3976
|
-
export function
|
|
3977
|
-
const ret = makeMutClosure(arg0, arg1,
|
|
4137
|
+
export function __wbindgen_closure_wrapper4522(arg0, arg1, arg2) {
|
|
4138
|
+
const ret = makeMutClosure(arg0, arg1, 1251, __wbg_adapter_60);
|
|
3978
4139
|
return addHeapObject(ret);
|
|
3979
4140
|
}
|
|
3980
4141
|
|
|
Binary file
|
|
@@ -6,16 +6,12 @@ export const cryptoclient_initialize_user_crypto: (a: number, b: number) => numb
|
|
|
6
6
|
export const cryptoclient_initialize_org_crypto: (a: number, b: number) => number;
|
|
7
7
|
export const cryptoclient_make_key_pair: (a: number, b: number, c: number, d: number) => void;
|
|
8
8
|
export const cryptoclient_verify_asymmetric_keys: (a: number, b: number, c: number) => void;
|
|
9
|
-
export const
|
|
10
|
-
export const cryptoclient_get_v2_rotated_account_keys: (
|
|
11
|
-
a: number,
|
|
12
|
-
b: number,
|
|
13
|
-
c: number,
|
|
14
|
-
d: number,
|
|
15
|
-
) => void;
|
|
9
|
+
export const cryptoclient_make_keys_for_user_crypto_v2: (a: number, b: number) => void;
|
|
10
|
+
export const cryptoclient_get_v2_rotated_account_keys: (a: number, b: number) => void;
|
|
16
11
|
export const isDeriveKeyConnectorError: (a: number) => number;
|
|
17
12
|
export const isEnrollAdminPasswordResetError: (a: number) => number;
|
|
18
13
|
export const isCryptoClientError: (a: number) => number;
|
|
14
|
+
export const isStatefulCryptoError: (a: number) => number;
|
|
19
15
|
export const isEncryptionSettingsError: (a: number) => number;
|
|
20
16
|
export const isCryptoError: (a: number) => number;
|
|
21
17
|
export const __wbg_exporterclient_free: (a: number, b: number) => void;
|
|
@@ -139,6 +135,10 @@ export const ciphersclient_decrypt_fido2_private_key: (a: number, b: number, c:
|
|
|
139
135
|
export const foldersclient_encrypt: (a: number, b: number, c: number) => void;
|
|
140
136
|
export const foldersclient_decrypt: (a: number, b: number, c: number) => void;
|
|
141
137
|
export const foldersclient_decrypt_list: (a: number, b: number, c: number, d: number) => void;
|
|
138
|
+
export const foldersclient_list: (a: number) => number;
|
|
139
|
+
export const foldersclient_get: (a: number, b: number, c: number) => number;
|
|
140
|
+
export const foldersclient_create: (a: number, b: number) => number;
|
|
141
|
+
export const foldersclient_edit: (a: number, b: number, c: number, d: number) => number;
|
|
142
142
|
export const vaultclient_attachments: (a: number) => number;
|
|
143
143
|
export const totpclient_generate_totp: (
|
|
144
144
|
a: number,
|
|
@@ -151,6 +151,9 @@ export const totpclient_generate_totp: (
|
|
|
151
151
|
export const isDecryptError: (a: number) => number;
|
|
152
152
|
export const isEncryptError: (a: number) => number;
|
|
153
153
|
export const isTotpError: (a: number) => number;
|
|
154
|
+
export const isGetFolderError: (a: number) => number;
|
|
155
|
+
export const isEditFolderError: (a: number) => number;
|
|
156
|
+
export const isCreateFolderError: (a: number) => number;
|
|
154
157
|
export const isCipherError: (a: number) => number;
|
|
155
158
|
export const isDecryptFileError: (a: number) => number;
|
|
156
159
|
export const isEncryptFileError: (a: number) => number;
|
|
@@ -172,6 +175,7 @@ export const bitwardenclient_platform: (a: number) => number;
|
|
|
172
175
|
export const set_log_level: (a: number) => void;
|
|
173
176
|
export const init_sdk: (a: number) => void;
|
|
174
177
|
export const stateclient_register_cipher_repository: (a: number, b: number) => void;
|
|
178
|
+
export const stateclient_register_folder_repository: (a: number, b: number) => void;
|
|
175
179
|
export const __wbg_purecrypto_free: (a: number, b: number) => void;
|
|
176
180
|
export const purecrypto_symmetric_decrypt: (
|
|
177
181
|
a: number,
|