@bitwarden/sdk-internal 0.2.0-main.230 → 0.2.0-main.232

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/VERSION CHANGED
@@ -1 +1 @@
1
- 212e190d2b69657f85ea04c2d7e9a5f30f7e58c1
1
+ bdcb5f5480053b181dab1e6c80c5df0ab93e440f
@@ -136,6 +136,10 @@ export interface InitUserCryptoRequest {
136
136
  * The user\'s signing key
137
137
  */
138
138
  signingKey: EncString | undefined;
139
+ /**
140
+ * The user\'s security state
141
+ */
142
+ securityState: SignedSecurityState | undefined;
139
143
  /**
140
144
  * The initialization method to use
141
145
  */
@@ -273,49 +277,45 @@ export interface VerifyAsymmetricKeysResponse {
273
277
  }
274
278
 
275
279
  /**
276
- * A new signing key pair along with the signed public key
280
+ * Response for the `make_keys_for_user_crypto_v2`, containing a set of keys for a user
277
281
  */
278
- export interface MakeUserSigningKeysResponse {
282
+ export interface UserCryptoV2KeysResponse {
279
283
  /**
280
- * Base64 encoded verifying key
284
+ * User key
281
285
  */
282
- verifyingKey: string;
286
+ userKey: string;
283
287
  /**
284
- * Signing key, encrypted with the user\'s symmetric key
288
+ * Wrapped private key
285
289
  */
286
- signingKey: EncString;
290
+ privateKey: EncString;
287
291
  /**
288
- * The user\'s public key, signed by the signing key
292
+ * Public key
289
293
  */
290
- signedPublicKey: SignedPublicKey;
291
- }
292
-
293
- /**
294
- * A rotated set of account keys for a user
295
- */
296
- export interface RotateUserKeysResponse {
294
+ publicKey: string;
297
295
  /**
298
- * The verifying key
296
+ * The user\'s public key, signed by the signing key
299
297
  */
300
- verifyingKey: string;
298
+ signedPublicKey: SignedPublicKey;
301
299
  /**
302
- * Signing key, encrypted with a symmetric key (user key, org key)
300
+ * Signing key, encrypted with the user\'s symmetric key
303
301
  */
304
302
  signingKey: EncString;
305
303
  /**
306
- * The user\'s public key, signed by the signing key
304
+ * Base64 encoded verifying key
307
305
  */
308
- signedPublicKey: string;
306
+ verifyingKey: string;
309
307
  /**
310
- * The user\'s public key, without signature
308
+ * The user\'s signed security state
311
309
  */
312
- publicKey: string;
310
+ securityState: SignedSecurityState;
313
311
  /**
314
- * The user\'s private key, encrypted with the user key
312
+ * The security state\'s version
315
313
  */
316
- privateKey: EncString;
314
+ securityVersion: number;
317
315
  }
318
316
 
317
+ export type SignedSecurityState = string;
318
+
319
319
  /**
320
320
  * NewType wrapper for `OrganizationId`
321
321
  */
@@ -342,6 +342,13 @@ export interface CryptoClientError extends Error {
342
342
 
343
343
  export function isCryptoClientError(error: any): error is CryptoClientError;
344
344
 
345
+ export interface StatefulCryptoError extends Error {
346
+ name: "StatefulCryptoError";
347
+ variant: "MissingSecurityState" | "WrongAccountCryptoVersion" | "CryptoError";
348
+ }
349
+
350
+ export function isStatefulCryptoError(error: any): error is StatefulCryptoError;
351
+
345
352
  export interface EncryptionSettingsError extends Error {
346
353
  name: "EncryptionSettingsError";
347
354
  variant:
@@ -350,6 +357,7 @@ export interface EncryptionSettingsError extends Error {
350
357
  | "VaultLocked"
351
358
  | "InvalidPrivateKey"
352
359
  | "InvalidSigningKey"
360
+ | "InvalidSecurityState"
353
361
  | "MissingPrivateKey"
354
362
  | "UserIdAlreadySetError";
355
363
  }
@@ -990,6 +998,16 @@ export interface SecureNoteView {
990
998
  type: SecureNoteType;
991
999
  }
992
1000
 
1001
+ /**
1002
+ * Request to add or edit a folder.
1003
+ */
1004
+ export interface FolderAddEditRequest {
1005
+ /**
1006
+ * The new name of the folder.
1007
+ */
1008
+ name: string;
1009
+ }
1010
+
993
1011
  export interface Folder {
994
1012
  id: Uuid | undefined;
995
1013
  name: EncString;
@@ -1044,6 +1062,34 @@ export interface PasswordHistory {
1044
1062
  lastUsedDate: DateTime<Utc>;
1045
1063
  }
1046
1064
 
1065
+ export interface GetFolderError extends Error {
1066
+ name: "GetFolderError";
1067
+ variant: "ItemNotFound" | "Crypto" | "RepositoryError";
1068
+ }
1069
+
1070
+ export function isGetFolderError(error: any): error is GetFolderError;
1071
+
1072
+ export interface EditFolderError extends Error {
1073
+ name: "EditFolderError";
1074
+ variant:
1075
+ | "ItemNotFound"
1076
+ | "Crypto"
1077
+ | "Api"
1078
+ | "VaultParse"
1079
+ | "MissingField"
1080
+ | "RepositoryError"
1081
+ | "Uuid";
1082
+ }
1083
+
1084
+ export function isEditFolderError(error: any): error is EditFolderError;
1085
+
1086
+ export interface CreateFolderError extends Error {
1087
+ name: "CreateFolderError";
1088
+ variant: "Crypto" | "Api" | "VaultParse" | "MissingField" | "RepositoryError";
1089
+ }
1090
+
1091
+ export function isCreateFolderError(error: any): error is CreateFolderError;
1092
+
1047
1093
  export interface Collection {
1048
1094
  id: Uuid | undefined;
1049
1095
  organizationId: Uuid;
@@ -1359,11 +1405,11 @@ export class CryptoClient {
1359
1405
  /**
1360
1406
  * Makes a new signing key pair and signs the public key for the user
1361
1407
  */
1362
- make_user_signing_keys_for_enrollment(): MakeUserSigningKeysResponse;
1408
+ make_keys_for_user_crypto_v2(): UserCryptoV2KeysResponse;
1363
1409
  /**
1364
1410
  * Creates a rotated set of account keys for the current state
1365
1411
  */
1366
- get_v2_rotated_account_keys(user_key: string): RotateUserKeysResponse;
1412
+ get_v2_rotated_account_keys(): UserCryptoV2KeysResponse;
1367
1413
  }
1368
1414
  export class ExporterClient {
1369
1415
  private constructor();
@@ -1393,12 +1439,40 @@ export class ExporterClient {
1393
1439
  */
1394
1440
  import_cxf(payload: string): Cipher[];
1395
1441
  }
1442
+ /**
1443
+ * Wrapper for folder specific functionality.
1444
+ */
1396
1445
  export class FoldersClient {
1397
1446
  private constructor();
1398
1447
  free(): void;
1448
+ /**
1449
+ * Encrypt a [FolderView] to a [Folder].
1450
+ */
1399
1451
  encrypt(folder_view: FolderView): Folder;
1452
+ /**
1453
+ * Encrypt a [Folder] to [FolderView].
1454
+ */
1400
1455
  decrypt(folder: Folder): FolderView;
1456
+ /**
1457
+ * Decrypt a list of [Folder]s to a list of [FolderView]s.
1458
+ */
1401
1459
  decrypt_list(folders: Folder[]): FolderView[];
1460
+ /**
1461
+ * Get all folders from state and decrypt them to a list of [FolderView].
1462
+ */
1463
+ list(): Promise<FolderView[]>;
1464
+ /**
1465
+ * Get a specific [Folder] by its ID from state and decrypt it to a [FolderView].
1466
+ */
1467
+ get(folder_id: string): Promise<FolderView>;
1468
+ /**
1469
+ * Create a new [Folder] and save it to the server.
1470
+ */
1471
+ create(request: FolderAddEditRequest): Promise<FolderView>;
1472
+ /**
1473
+ * Edit the [Folder] and save it to the server.
1474
+ */
1475
+ edit(folder_id: string, request: FolderAddEditRequest): Promise<FolderView>;
1402
1476
  }
1403
1477
  export class GeneratorClient {
1404
1478
  private constructor();
@@ -1644,6 +1718,7 @@ export class StateClient {
1644
1718
  private constructor();
1645
1719
  free(): void;
1646
1720
  register_cipher_repository(store: Repository<Cipher>): void;
1721
+ register_folder_repository(store: Repository<Folder>): void;
1647
1722
  }
1648
1723
  export class TotpClient {
1649
1724
  private constructor();
@@ -290,6 +290,19 @@ export function isCryptoClientError(error) {
290
290
  }
291
291
  }
292
292
 
293
+ /**
294
+ * @param {any} error
295
+ * @returns {boolean}
296
+ */
297
+ export function isStatefulCryptoError(error) {
298
+ try {
299
+ const ret = wasm.isStatefulCryptoError(addBorrowedObject(error));
300
+ return ret !== 0;
301
+ } finally {
302
+ heap[stack_pointer++] = undefined;
303
+ }
304
+ }
305
+
293
306
  /**
294
307
  * @param {any} error
295
308
  * @returns {boolean}
@@ -597,6 +610,45 @@ export function isTotpError(error) {
597
610
  }
598
611
  }
599
612
 
613
+ /**
614
+ * @param {any} error
615
+ * @returns {boolean}
616
+ */
617
+ export function isGetFolderError(error) {
618
+ try {
619
+ const ret = wasm.isGetFolderError(addBorrowedObject(error));
620
+ return ret !== 0;
621
+ } finally {
622
+ heap[stack_pointer++] = undefined;
623
+ }
624
+ }
625
+
626
+ /**
627
+ * @param {any} error
628
+ * @returns {boolean}
629
+ */
630
+ export function isEditFolderError(error) {
631
+ try {
632
+ const ret = wasm.isEditFolderError(addBorrowedObject(error));
633
+ return ret !== 0;
634
+ } finally {
635
+ heap[stack_pointer++] = undefined;
636
+ }
637
+ }
638
+
639
+ /**
640
+ * @param {any} error
641
+ * @returns {boolean}
642
+ */
643
+ export function isCreateFolderError(error) {
644
+ try {
645
+ const ret = wasm.isCreateFolderError(addBorrowedObject(error));
646
+ return ret !== 0;
647
+ } finally {
648
+ heap[stack_pointer++] = undefined;
649
+ }
650
+ }
651
+
600
652
  /**
601
653
  * @param {any} error
602
654
  * @returns {boolean}
@@ -731,21 +783,21 @@ export function isTestError(error) {
731
783
  }
732
784
  }
733
785
 
734
- function __wbg_adapter_50(arg0, arg1) {
786
+ function __wbg_adapter_54(arg0, arg1) {
735
787
  wasm._dyn_core__ops__function__FnMut_____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h31333524c3115e44(
736
788
  arg0,
737
789
  arg1,
738
790
  );
739
791
  }
740
792
 
741
- function __wbg_adapter_53(arg0, arg1) {
793
+ function __wbg_adapter_57(arg0, arg1) {
742
794
  wasm._dyn_core__ops__function__FnMut_____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h2b093e5f83b42fbd(
743
795
  arg0,
744
796
  arg1,
745
797
  );
746
798
  }
747
799
 
748
- function __wbg_adapter_56(arg0, arg1, arg2) {
800
+ function __wbg_adapter_60(arg0, arg1, arg2) {
749
801
  wasm._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__hb01d8be1001e4f40(
750
802
  arg0,
751
803
  arg1,
@@ -753,7 +805,7 @@ function __wbg_adapter_56(arg0, arg1, arg2) {
753
805
  );
754
806
  }
755
807
 
756
- function __wbg_adapter_280(arg0, arg1, arg2, arg3) {
808
+ function __wbg_adapter_301(arg0, arg1, arg2, arg3) {
757
809
  wasm.wasm_bindgen__convert__closures__invoke2_mut__h8776500d04a3e634(
758
810
  arg0,
759
811
  arg1,
@@ -1424,12 +1476,12 @@ export class CryptoClient {
1424
1476
  }
1425
1477
  /**
1426
1478
  * Makes a new signing key pair and signs the public key for the user
1427
- * @returns {MakeUserSigningKeysResponse}
1479
+ * @returns {UserCryptoV2KeysResponse}
1428
1480
  */
1429
- make_user_signing_keys_for_enrollment() {
1481
+ make_keys_for_user_crypto_v2() {
1430
1482
  try {
1431
1483
  const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
1432
- wasm.cryptoclient_make_user_signing_keys_for_enrollment(retptr, this.__wbg_ptr);
1484
+ wasm.cryptoclient_make_keys_for_user_crypto_v2(retptr, this.__wbg_ptr);
1433
1485
  var r0 = getDataViewMemory0().getInt32(retptr + 4 * 0, true);
1434
1486
  var r1 = getDataViewMemory0().getInt32(retptr + 4 * 1, true);
1435
1487
  var r2 = getDataViewMemory0().getInt32(retptr + 4 * 2, true);
@@ -1443,15 +1495,12 @@ export class CryptoClient {
1443
1495
  }
1444
1496
  /**
1445
1497
  * Creates a rotated set of account keys for the current state
1446
- * @param {string} user_key
1447
- * @returns {RotateUserKeysResponse}
1498
+ * @returns {UserCryptoV2KeysResponse}
1448
1499
  */
1449
- get_v2_rotated_account_keys(user_key) {
1500
+ get_v2_rotated_account_keys() {
1450
1501
  try {
1451
1502
  const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
1452
- const ptr0 = passStringToWasm0(user_key, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);
1453
- const len0 = WASM_VECTOR_LEN;
1454
- wasm.cryptoclient_get_v2_rotated_account_keys(retptr, this.__wbg_ptr, ptr0, len0);
1503
+ wasm.cryptoclient_get_v2_rotated_account_keys(retptr, this.__wbg_ptr);
1455
1504
  var r0 = getDataViewMemory0().getInt32(retptr + 4 * 0, true);
1456
1505
  var r1 = getDataViewMemory0().getInt32(retptr + 4 * 1, true);
1457
1506
  var r2 = getDataViewMemory0().getInt32(retptr + 4 * 2, true);
@@ -1650,7 +1699,9 @@ const FoldersClientFinalization =
1650
1699
  typeof FinalizationRegistry === "undefined"
1651
1700
  ? { register: () => {}, unregister: () => {} }
1652
1701
  : new FinalizationRegistry((ptr) => wasm.__wbg_foldersclient_free(ptr >>> 0, 1));
1653
-
1702
+ /**
1703
+ * Wrapper for folder specific functionality.
1704
+ */
1654
1705
  export class FoldersClient {
1655
1706
  static __wrap(ptr) {
1656
1707
  ptr = ptr >>> 0;
@@ -1672,6 +1723,7 @@ export class FoldersClient {
1672
1723
  wasm.__wbg_foldersclient_free(ptr, 0);
1673
1724
  }
1674
1725
  /**
1726
+ * Encrypt a [FolderView] to a [Folder].
1675
1727
  * @param {FolderView} folder_view
1676
1728
  * @returns {Folder}
1677
1729
  */
@@ -1691,6 +1743,7 @@ export class FoldersClient {
1691
1743
  }
1692
1744
  }
1693
1745
  /**
1746
+ * Encrypt a [Folder] to [FolderView].
1694
1747
  * @param {Folder} folder
1695
1748
  * @returns {FolderView}
1696
1749
  */
@@ -1710,6 +1763,7 @@ export class FoldersClient {
1710
1763
  }
1711
1764
  }
1712
1765
  /**
1766
+ * Decrypt a list of [Folder]s to a list of [FolderView]s.
1713
1767
  * @param {Folder[]} folders
1714
1768
  * @returns {FolderView[]}
1715
1769
  */
@@ -1733,6 +1787,46 @@ export class FoldersClient {
1733
1787
  wasm.__wbindgen_add_to_stack_pointer(16);
1734
1788
  }
1735
1789
  }
1790
+ /**
1791
+ * Get all folders from state and decrypt them to a list of [FolderView].
1792
+ * @returns {Promise<FolderView[]>}
1793
+ */
1794
+ list() {
1795
+ const ret = wasm.foldersclient_list(this.__wbg_ptr);
1796
+ return takeObject(ret);
1797
+ }
1798
+ /**
1799
+ * Get a specific [Folder] by its ID from state and decrypt it to a [FolderView].
1800
+ * @param {string} folder_id
1801
+ * @returns {Promise<FolderView>}
1802
+ */
1803
+ get(folder_id) {
1804
+ const ptr0 = passStringToWasm0(folder_id, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);
1805
+ const len0 = WASM_VECTOR_LEN;
1806
+ const ret = wasm.foldersclient_get(this.__wbg_ptr, ptr0, len0);
1807
+ return takeObject(ret);
1808
+ }
1809
+ /**
1810
+ * Create a new [Folder] and save it to the server.
1811
+ * @param {FolderAddEditRequest} request
1812
+ * @returns {Promise<FolderView>}
1813
+ */
1814
+ create(request) {
1815
+ const ret = wasm.foldersclient_create(this.__wbg_ptr, addHeapObject(request));
1816
+ return takeObject(ret);
1817
+ }
1818
+ /**
1819
+ * Edit the [Folder] and save it to the server.
1820
+ * @param {string} folder_id
1821
+ * @param {FolderAddEditRequest} request
1822
+ * @returns {Promise<FolderView>}
1823
+ */
1824
+ edit(folder_id, request) {
1825
+ const ptr0 = passStringToWasm0(folder_id, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);
1826
+ const len0 = WASM_VECTOR_LEN;
1827
+ const ret = wasm.foldersclient_edit(this.__wbg_ptr, ptr0, len0, addHeapObject(request));
1828
+ return takeObject(ret);
1829
+ }
1736
1830
  }
1737
1831
 
1738
1832
  const GeneratorClientFinalization =
@@ -3150,6 +3244,12 @@ export class StateClient {
3150
3244
  register_cipher_repository(store) {
3151
3245
  wasm.stateclient_register_cipher_repository(this.__wbg_ptr, addHeapObject(store));
3152
3246
  }
3247
+ /**
3248
+ * @param {Repository<Folder>} store
3249
+ */
3250
+ register_folder_repository(store) {
3251
+ wasm.stateclient_register_folder_repository(this.__wbg_ptr, addHeapObject(store));
3252
+ }
3153
3253
  }
3154
3254
 
3155
3255
  const TotpClientFinalization =
@@ -3409,6 +3509,21 @@ export function __wbg_getTime_46267b1c24877e30(arg0) {
3409
3509
  return ret;
3410
3510
  }
3411
3511
 
3512
+ export function __wbg_get_1620f903ed9a676f() {
3513
+ return handleError(function (arg0, arg1, arg2) {
3514
+ let deferred0_0;
3515
+ let deferred0_1;
3516
+ try {
3517
+ deferred0_0 = arg1;
3518
+ deferred0_1 = arg2;
3519
+ const ret = getObject(arg0).get(getStringFromWasm0(arg1, arg2));
3520
+ return addHeapObject(ret);
3521
+ } finally {
3522
+ wasm.__wbindgen_free(deferred0_0, deferred0_1, 1);
3523
+ }
3524
+ }, arguments);
3525
+ }
3526
+
3412
3527
  export function __wbg_get_67b2ba62fc30de12() {
3413
3528
  return handleError(function (arg0, arg1) {
3414
3529
  const ret = Reflect.get(getObject(arg0), getObject(arg1));
@@ -3421,7 +3536,7 @@ export function __wbg_get_b9b93047fe3cf45b(arg0, arg1) {
3421
3536
  return addHeapObject(ret);
3422
3537
  }
3423
3538
 
3424
- export function __wbg_get_fe8b1fc2a9351d29() {
3539
+ export function __wbg_get_e94e796a5527c131() {
3425
3540
  return handleError(function (arg0, arg1, arg2) {
3426
3541
  let deferred0_0;
3427
3542
  let deferred0_1;
@@ -3436,7 +3551,7 @@ export function __wbg_get_fe8b1fc2a9351d29() {
3436
3551
  }, arguments);
3437
3552
  }
3438
3553
 
3439
- export function __wbg_getaccesstoken_add1fa985a1fcf9b(arg0) {
3554
+ export function __wbg_getaccesstoken_115c028df526c10b(arg0) {
3440
3555
  const ret = getObject(arg0).get_access_token();
3441
3556
  return addHeapObject(ret);
3442
3557
  }
@@ -3541,7 +3656,14 @@ export function __wbg_length_e2d2a49132c1b256(arg0) {
3541
3656
  return ret;
3542
3657
  }
3543
3658
 
3544
- export function __wbg_list_e78f0f65f8a26cd6() {
3659
+ export function __wbg_list_2a92e7addacc7a2d() {
3660
+ return handleError(function (arg0) {
3661
+ const ret = getObject(arg0).list();
3662
+ return addHeapObject(ret);
3663
+ }, arguments);
3664
+ }
3665
+
3666
+ export function __wbg_list_6d9131c88a8d0a17() {
3545
3667
  return handleError(function (arg0) {
3546
3668
  const ret = getObject(arg0).list();
3547
3669
  return addHeapObject(ret);
@@ -3576,7 +3698,7 @@ export function __wbg_new_23a2665fac83c611(arg0, arg1) {
3576
3698
  const a = state0.a;
3577
3699
  state0.a = 0;
3578
3700
  try {
3579
- return __wbg_adapter_280(a, state0.b, arg0, arg1);
3701
+ return __wbg_adapter_301(a, state0.b, arg0, arg1);
3580
3702
  } finally {
3581
3703
  state0.a = a;
3582
3704
  }
@@ -3718,7 +3840,22 @@ export function __wbg_randomFillSync_ac0988aba3254290() {
3718
3840
  }, arguments);
3719
3841
  }
3720
3842
 
3721
- export function __wbg_remove_ea8cb7fadc70e111() {
3843
+ export function __wbg_remove_050f4c22aba9e8c7() {
3844
+ return handleError(function (arg0, arg1, arg2) {
3845
+ let deferred0_0;
3846
+ let deferred0_1;
3847
+ try {
3848
+ deferred0_0 = arg1;
3849
+ deferred0_1 = arg2;
3850
+ const ret = getObject(arg0).remove(getStringFromWasm0(arg1, arg2));
3851
+ return addHeapObject(ret);
3852
+ } finally {
3853
+ wasm.__wbindgen_free(deferred0_0, deferred0_1, 1);
3854
+ }
3855
+ }, arguments);
3856
+ }
3857
+
3858
+ export function __wbg_remove_c9b8a1e5e4b15f5f() {
3722
3859
  return handleError(function (arg0, arg1, arg2) {
3723
3860
  let deferred0_0;
3724
3861
  let deferred0_1;
@@ -3769,7 +3906,22 @@ export function __wbg_set_65595bdd868b3009(arg0, arg1, arg2) {
3769
3906
  getObject(arg0).set(getObject(arg1), arg2 >>> 0);
3770
3907
  }
3771
3908
 
3772
- export function __wbg_set_84a98f482fda77e5() {
3909
+ export function __wbg_set_c0f7f01bcd881751() {
3910
+ return handleError(function (arg0, arg1, arg2, arg3) {
3911
+ let deferred0_0;
3912
+ let deferred0_1;
3913
+ try {
3914
+ deferred0_0 = arg1;
3915
+ deferred0_1 = arg2;
3916
+ const ret = getObject(arg0).set(getStringFromWasm0(arg1, arg2), takeObject(arg3));
3917
+ return addHeapObject(ret);
3918
+ } finally {
3919
+ wasm.__wbindgen_free(deferred0_0, deferred0_1, 1);
3920
+ }
3921
+ }, arguments);
3922
+ }
3923
+
3924
+ export function __wbg_set_f85eb67e00c0abef() {
3773
3925
  return handleError(function (arg0, arg1, arg2, arg3) {
3774
3926
  let deferred0_0;
3775
3927
  let deferred0_1;
@@ -3925,6 +4077,15 @@ export function __wbg_warn_aaf1f4664a035bd6(arg0, arg1, arg2, arg3) {
3925
4077
  console.warn(getObject(arg0), getObject(arg1), getObject(arg2), getObject(arg3));
3926
4078
  }
3927
4079
 
4080
+ export function __wbindgen_array_new() {
4081
+ const ret = [];
4082
+ return addHeapObject(ret);
4083
+ }
4084
+
4085
+ export function __wbindgen_array_push(arg0, arg1) {
4086
+ getObject(arg0).push(takeObject(arg1));
4087
+ }
4088
+
3928
4089
  export function __wbindgen_as_number(arg0) {
3929
4090
  const ret = +getObject(arg0);
3930
4091
  return ret;
@@ -3963,18 +4124,18 @@ export function __wbindgen_cb_drop(arg0) {
3963
4124
  return ret;
3964
4125
  }
3965
4126
 
3966
- export function __wbindgen_closure_wrapper2913(arg0, arg1, arg2) {
3967
- const ret = makeMutClosure(arg0, arg1, 920, __wbg_adapter_50);
4127
+ export function __wbindgen_closure_wrapper3245(arg0, arg1, arg2) {
4128
+ const ret = makeMutClosure(arg0, arg1, 1034, __wbg_adapter_54);
3968
4129
  return addHeapObject(ret);
3969
4130
  }
3970
4131
 
3971
- export function __wbindgen_closure_wrapper3753(arg0, arg1, arg2) {
3972
- const ret = makeMutClosure(arg0, arg1, 1004, __wbg_adapter_53);
4132
+ export function __wbindgen_closure_wrapper4086(arg0, arg1, arg2) {
4133
+ const ret = makeMutClosure(arg0, arg1, 1118, __wbg_adapter_57);
3973
4134
  return addHeapObject(ret);
3974
4135
  }
3975
4136
 
3976
- export function __wbindgen_closure_wrapper4171(arg0, arg1, arg2) {
3977
- const ret = makeMutClosure(arg0, arg1, 1127, __wbg_adapter_56);
4137
+ export function __wbindgen_closure_wrapper4522(arg0, arg1, arg2) {
4138
+ const ret = makeMutClosure(arg0, arg1, 1251, __wbg_adapter_60);
3978
4139
  return addHeapObject(ret);
3979
4140
  }
3980
4141
 
Binary file
@@ -6,16 +6,12 @@ export const cryptoclient_initialize_user_crypto: (a: number, b: number) => numb
6
6
  export const cryptoclient_initialize_org_crypto: (a: number, b: number) => number;
7
7
  export const cryptoclient_make_key_pair: (a: number, b: number, c: number, d: number) => void;
8
8
  export const cryptoclient_verify_asymmetric_keys: (a: number, b: number, c: number) => void;
9
- export const cryptoclient_make_user_signing_keys_for_enrollment: (a: number, b: number) => void;
10
- export const cryptoclient_get_v2_rotated_account_keys: (
11
- a: number,
12
- b: number,
13
- c: number,
14
- d: number,
15
- ) => void;
9
+ export const cryptoclient_make_keys_for_user_crypto_v2: (a: number, b: number) => void;
10
+ export const cryptoclient_get_v2_rotated_account_keys: (a: number, b: number) => void;
16
11
  export const isDeriveKeyConnectorError: (a: number) => number;
17
12
  export const isEnrollAdminPasswordResetError: (a: number) => number;
18
13
  export const isCryptoClientError: (a: number) => number;
14
+ export const isStatefulCryptoError: (a: number) => number;
19
15
  export const isEncryptionSettingsError: (a: number) => number;
20
16
  export const isCryptoError: (a: number) => number;
21
17
  export const __wbg_exporterclient_free: (a: number, b: number) => void;
@@ -139,6 +135,10 @@ export const ciphersclient_decrypt_fido2_private_key: (a: number, b: number, c:
139
135
  export const foldersclient_encrypt: (a: number, b: number, c: number) => void;
140
136
  export const foldersclient_decrypt: (a: number, b: number, c: number) => void;
141
137
  export const foldersclient_decrypt_list: (a: number, b: number, c: number, d: number) => void;
138
+ export const foldersclient_list: (a: number) => number;
139
+ export const foldersclient_get: (a: number, b: number, c: number) => number;
140
+ export const foldersclient_create: (a: number, b: number) => number;
141
+ export const foldersclient_edit: (a: number, b: number, c: number, d: number) => number;
142
142
  export const vaultclient_attachments: (a: number) => number;
143
143
  export const totpclient_generate_totp: (
144
144
  a: number,
@@ -151,6 +151,9 @@ export const totpclient_generate_totp: (
151
151
  export const isDecryptError: (a: number) => number;
152
152
  export const isEncryptError: (a: number) => number;
153
153
  export const isTotpError: (a: number) => number;
154
+ export const isGetFolderError: (a: number) => number;
155
+ export const isEditFolderError: (a: number) => number;
156
+ export const isCreateFolderError: (a: number) => number;
154
157
  export const isCipherError: (a: number) => number;
155
158
  export const isDecryptFileError: (a: number) => number;
156
159
  export const isEncryptFileError: (a: number) => number;
@@ -172,6 +175,7 @@ export const bitwardenclient_platform: (a: number) => number;
172
175
  export const set_log_level: (a: number) => void;
173
176
  export const init_sdk: (a: number) => void;
174
177
  export const stateclient_register_cipher_repository: (a: number, b: number) => void;
178
+ export const stateclient_register_folder_repository: (a: number, b: number) => void;
175
179
  export const __wbg_purecrypto_free: (a: number, b: number) => void;
176
180
  export const purecrypto_symmetric_decrypt: (
177
181
  a: number,