@bitwarden/sdk-internal 0.2.0-main.230 → 0.2.0-main.232

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -136,6 +136,10 @@ export interface InitUserCryptoRequest {
136
136
  * The user\'s signing key
137
137
  */
138
138
  signingKey: EncString | undefined;
139
+ /**
140
+ * The user\'s security state
141
+ */
142
+ securityState: SignedSecurityState | undefined;
139
143
  /**
140
144
  * The initialization method to use
141
145
  */
@@ -273,49 +277,45 @@ export interface VerifyAsymmetricKeysResponse {
273
277
  }
274
278
 
275
279
  /**
276
- * A new signing key pair along with the signed public key
280
+ * Response for the `make_keys_for_user_crypto_v2`, containing a set of keys for a user
277
281
  */
278
- export interface MakeUserSigningKeysResponse {
282
+ export interface UserCryptoV2KeysResponse {
279
283
  /**
280
- * Base64 encoded verifying key
284
+ * User key
281
285
  */
282
- verifyingKey: string;
286
+ userKey: string;
283
287
  /**
284
- * Signing key, encrypted with the user\'s symmetric key
288
+ * Wrapped private key
285
289
  */
286
- signingKey: EncString;
290
+ privateKey: EncString;
287
291
  /**
288
- * The user\'s public key, signed by the signing key
292
+ * Public key
289
293
  */
290
- signedPublicKey: SignedPublicKey;
291
- }
292
-
293
- /**
294
- * A rotated set of account keys for a user
295
- */
296
- export interface RotateUserKeysResponse {
294
+ publicKey: string;
297
295
  /**
298
- * The verifying key
296
+ * The user\'s public key, signed by the signing key
299
297
  */
300
- verifyingKey: string;
298
+ signedPublicKey: SignedPublicKey;
301
299
  /**
302
- * Signing key, encrypted with a symmetric key (user key, org key)
300
+ * Signing key, encrypted with the user\'s symmetric key
303
301
  */
304
302
  signingKey: EncString;
305
303
  /**
306
- * The user\'s public key, signed by the signing key
304
+ * Base64 encoded verifying key
307
305
  */
308
- signedPublicKey: string;
306
+ verifyingKey: string;
309
307
  /**
310
- * The user\'s public key, without signature
308
+ * The user\'s signed security state
311
309
  */
312
- publicKey: string;
310
+ securityState: SignedSecurityState;
313
311
  /**
314
- * The user\'s private key, encrypted with the user key
312
+ * The security state\'s version
315
313
  */
316
- privateKey: EncString;
314
+ securityVersion: number;
317
315
  }
318
316
 
317
+ export type SignedSecurityState = string;
318
+
319
319
  /**
320
320
  * NewType wrapper for `OrganizationId`
321
321
  */
@@ -342,6 +342,13 @@ export interface CryptoClientError extends Error {
342
342
 
343
343
  export function isCryptoClientError(error: any): error is CryptoClientError;
344
344
 
345
+ export interface StatefulCryptoError extends Error {
346
+ name: "StatefulCryptoError";
347
+ variant: "MissingSecurityState" | "WrongAccountCryptoVersion" | "CryptoError";
348
+ }
349
+
350
+ export function isStatefulCryptoError(error: any): error is StatefulCryptoError;
351
+
345
352
  export interface EncryptionSettingsError extends Error {
346
353
  name: "EncryptionSettingsError";
347
354
  variant:
@@ -350,6 +357,7 @@ export interface EncryptionSettingsError extends Error {
350
357
  | "VaultLocked"
351
358
  | "InvalidPrivateKey"
352
359
  | "InvalidSigningKey"
360
+ | "InvalidSecurityState"
353
361
  | "MissingPrivateKey"
354
362
  | "UserIdAlreadySetError";
355
363
  }
@@ -990,6 +998,16 @@ export interface SecureNoteView {
990
998
  type: SecureNoteType;
991
999
  }
992
1000
 
1001
+ /**
1002
+ * Request to add or edit a folder.
1003
+ */
1004
+ export interface FolderAddEditRequest {
1005
+ /**
1006
+ * The new name of the folder.
1007
+ */
1008
+ name: string;
1009
+ }
1010
+
993
1011
  export interface Folder {
994
1012
  id: Uuid | undefined;
995
1013
  name: EncString;
@@ -1044,6 +1062,34 @@ export interface PasswordHistory {
1044
1062
  lastUsedDate: DateTime<Utc>;
1045
1063
  }
1046
1064
 
1065
+ export interface GetFolderError extends Error {
1066
+ name: "GetFolderError";
1067
+ variant: "ItemNotFound" | "Crypto" | "RepositoryError";
1068
+ }
1069
+
1070
+ export function isGetFolderError(error: any): error is GetFolderError;
1071
+
1072
+ export interface EditFolderError extends Error {
1073
+ name: "EditFolderError";
1074
+ variant:
1075
+ | "ItemNotFound"
1076
+ | "Crypto"
1077
+ | "Api"
1078
+ | "VaultParse"
1079
+ | "MissingField"
1080
+ | "RepositoryError"
1081
+ | "Uuid";
1082
+ }
1083
+
1084
+ export function isEditFolderError(error: any): error is EditFolderError;
1085
+
1086
+ export interface CreateFolderError extends Error {
1087
+ name: "CreateFolderError";
1088
+ variant: "Crypto" | "Api" | "VaultParse" | "MissingField" | "RepositoryError";
1089
+ }
1090
+
1091
+ export function isCreateFolderError(error: any): error is CreateFolderError;
1092
+
1047
1093
  export interface Collection {
1048
1094
  id: Uuid | undefined;
1049
1095
  organizationId: Uuid;
@@ -1359,11 +1405,11 @@ export class CryptoClient {
1359
1405
  /**
1360
1406
  * Makes a new signing key pair and signs the public key for the user
1361
1407
  */
1362
- make_user_signing_keys_for_enrollment(): MakeUserSigningKeysResponse;
1408
+ make_keys_for_user_crypto_v2(): UserCryptoV2KeysResponse;
1363
1409
  /**
1364
1410
  * Creates a rotated set of account keys for the current state
1365
1411
  */
1366
- get_v2_rotated_account_keys(user_key: string): RotateUserKeysResponse;
1412
+ get_v2_rotated_account_keys(): UserCryptoV2KeysResponse;
1367
1413
  }
1368
1414
  export class ExporterClient {
1369
1415
  private constructor();
@@ -1393,12 +1439,40 @@ export class ExporterClient {
1393
1439
  */
1394
1440
  import_cxf(payload: string): Cipher[];
1395
1441
  }
1442
+ /**
1443
+ * Wrapper for folder specific functionality.
1444
+ */
1396
1445
  export class FoldersClient {
1397
1446
  private constructor();
1398
1447
  free(): void;
1448
+ /**
1449
+ * Encrypt a [FolderView] to a [Folder].
1450
+ */
1399
1451
  encrypt(folder_view: FolderView): Folder;
1452
+ /**
1453
+ * Encrypt a [Folder] to [FolderView].
1454
+ */
1400
1455
  decrypt(folder: Folder): FolderView;
1456
+ /**
1457
+ * Decrypt a list of [Folder]s to a list of [FolderView]s.
1458
+ */
1401
1459
  decrypt_list(folders: Folder[]): FolderView[];
1460
+ /**
1461
+ * Get all folders from state and decrypt them to a list of [FolderView].
1462
+ */
1463
+ list(): Promise<FolderView[]>;
1464
+ /**
1465
+ * Get a specific [Folder] by its ID from state and decrypt it to a [FolderView].
1466
+ */
1467
+ get(folder_id: string): Promise<FolderView>;
1468
+ /**
1469
+ * Create a new [Folder] and save it to the server.
1470
+ */
1471
+ create(request: FolderAddEditRequest): Promise<FolderView>;
1472
+ /**
1473
+ * Edit the [Folder] and save it to the server.
1474
+ */
1475
+ edit(folder_id: string, request: FolderAddEditRequest): Promise<FolderView>;
1402
1476
  }
1403
1477
  export class GeneratorClient {
1404
1478
  private constructor();
@@ -1644,6 +1718,7 @@ export class StateClient {
1644
1718
  private constructor();
1645
1719
  free(): void;
1646
1720
  register_cipher_repository(store: Repository<Cipher>): void;
1721
+ register_folder_repository(store: Repository<Folder>): void;
1647
1722
  }
1648
1723
  export class TotpClient {
1649
1724
  private constructor();
@@ -284,6 +284,19 @@ module.exports.isCryptoClientError = function (error) {
284
284
  }
285
285
  };
286
286
 
287
+ /**
288
+ * @param {any} error
289
+ * @returns {boolean}
290
+ */
291
+ module.exports.isStatefulCryptoError = function (error) {
292
+ try {
293
+ const ret = wasm.isStatefulCryptoError(addBorrowedObject(error));
294
+ return ret !== 0;
295
+ } finally {
296
+ heap[stack_pointer++] = undefined;
297
+ }
298
+ };
299
+
287
300
  /**
288
301
  * @param {any} error
289
302
  * @returns {boolean}
@@ -591,6 +604,45 @@ module.exports.isTotpError = function (error) {
591
604
  }
592
605
  };
593
606
 
607
+ /**
608
+ * @param {any} error
609
+ * @returns {boolean}
610
+ */
611
+ module.exports.isGetFolderError = function (error) {
612
+ try {
613
+ const ret = wasm.isGetFolderError(addBorrowedObject(error));
614
+ return ret !== 0;
615
+ } finally {
616
+ heap[stack_pointer++] = undefined;
617
+ }
618
+ };
619
+
620
+ /**
621
+ * @param {any} error
622
+ * @returns {boolean}
623
+ */
624
+ module.exports.isEditFolderError = function (error) {
625
+ try {
626
+ const ret = wasm.isEditFolderError(addBorrowedObject(error));
627
+ return ret !== 0;
628
+ } finally {
629
+ heap[stack_pointer++] = undefined;
630
+ }
631
+ };
632
+
633
+ /**
634
+ * @param {any} error
635
+ * @returns {boolean}
636
+ */
637
+ module.exports.isCreateFolderError = function (error) {
638
+ try {
639
+ const ret = wasm.isCreateFolderError(addBorrowedObject(error));
640
+ return ret !== 0;
641
+ } finally {
642
+ heap[stack_pointer++] = undefined;
643
+ }
644
+ };
645
+
594
646
  /**
595
647
  * @param {any} error
596
648
  * @returns {boolean}
@@ -725,21 +777,21 @@ module.exports.isTestError = function (error) {
725
777
  }
726
778
  };
727
779
 
728
- function __wbg_adapter_50(arg0, arg1) {
780
+ function __wbg_adapter_54(arg0, arg1) {
729
781
  wasm._dyn_core__ops__function__FnMut_____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h31333524c3115e44(
730
782
  arg0,
731
783
  arg1,
732
784
  );
733
785
  }
734
786
 
735
- function __wbg_adapter_53(arg0, arg1) {
787
+ function __wbg_adapter_57(arg0, arg1) {
736
788
  wasm._dyn_core__ops__function__FnMut_____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h2b093e5f83b42fbd(
737
789
  arg0,
738
790
  arg1,
739
791
  );
740
792
  }
741
793
 
742
- function __wbg_adapter_56(arg0, arg1, arg2) {
794
+ function __wbg_adapter_60(arg0, arg1, arg2) {
743
795
  wasm._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__hb01d8be1001e4f40(
744
796
  arg0,
745
797
  arg1,
@@ -747,7 +799,7 @@ function __wbg_adapter_56(arg0, arg1, arg2) {
747
799
  );
748
800
  }
749
801
 
750
- function __wbg_adapter_280(arg0, arg1, arg2, arg3) {
802
+ function __wbg_adapter_301(arg0, arg1, arg2, arg3) {
751
803
  wasm.wasm_bindgen__convert__closures__invoke2_mut__h8776500d04a3e634(
752
804
  arg0,
753
805
  arg1,
@@ -1421,12 +1473,12 @@ class CryptoClient {
1421
1473
  }
1422
1474
  /**
1423
1475
  * Makes a new signing key pair and signs the public key for the user
1424
- * @returns {MakeUserSigningKeysResponse}
1476
+ * @returns {UserCryptoV2KeysResponse}
1425
1477
  */
1426
- make_user_signing_keys_for_enrollment() {
1478
+ make_keys_for_user_crypto_v2() {
1427
1479
  try {
1428
1480
  const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
1429
- wasm.cryptoclient_make_user_signing_keys_for_enrollment(retptr, this.__wbg_ptr);
1481
+ wasm.cryptoclient_make_keys_for_user_crypto_v2(retptr, this.__wbg_ptr);
1430
1482
  var r0 = getDataViewMemory0().getInt32(retptr + 4 * 0, true);
1431
1483
  var r1 = getDataViewMemory0().getInt32(retptr + 4 * 1, true);
1432
1484
  var r2 = getDataViewMemory0().getInt32(retptr + 4 * 2, true);
@@ -1440,15 +1492,12 @@ class CryptoClient {
1440
1492
  }
1441
1493
  /**
1442
1494
  * Creates a rotated set of account keys for the current state
1443
- * @param {string} user_key
1444
- * @returns {RotateUserKeysResponse}
1495
+ * @returns {UserCryptoV2KeysResponse}
1445
1496
  */
1446
- get_v2_rotated_account_keys(user_key) {
1497
+ get_v2_rotated_account_keys() {
1447
1498
  try {
1448
1499
  const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
1449
- const ptr0 = passStringToWasm0(user_key, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);
1450
- const len0 = WASM_VECTOR_LEN;
1451
- wasm.cryptoclient_get_v2_rotated_account_keys(retptr, this.__wbg_ptr, ptr0, len0);
1500
+ wasm.cryptoclient_get_v2_rotated_account_keys(retptr, this.__wbg_ptr);
1452
1501
  var r0 = getDataViewMemory0().getInt32(retptr + 4 * 0, true);
1453
1502
  var r1 = getDataViewMemory0().getInt32(retptr + 4 * 1, true);
1454
1503
  var r2 = getDataViewMemory0().getInt32(retptr + 4 * 2, true);
@@ -1649,7 +1698,9 @@ const FoldersClientFinalization =
1649
1698
  typeof FinalizationRegistry === "undefined"
1650
1699
  ? { register: () => {}, unregister: () => {} }
1651
1700
  : new FinalizationRegistry((ptr) => wasm.__wbg_foldersclient_free(ptr >>> 0, 1));
1652
-
1701
+ /**
1702
+ * Wrapper for folder specific functionality.
1703
+ */
1653
1704
  class FoldersClient {
1654
1705
  static __wrap(ptr) {
1655
1706
  ptr = ptr >>> 0;
@@ -1671,6 +1722,7 @@ class FoldersClient {
1671
1722
  wasm.__wbg_foldersclient_free(ptr, 0);
1672
1723
  }
1673
1724
  /**
1725
+ * Encrypt a [FolderView] to a [Folder].
1674
1726
  * @param {FolderView} folder_view
1675
1727
  * @returns {Folder}
1676
1728
  */
@@ -1690,6 +1742,7 @@ class FoldersClient {
1690
1742
  }
1691
1743
  }
1692
1744
  /**
1745
+ * Encrypt a [Folder] to [FolderView].
1693
1746
  * @param {Folder} folder
1694
1747
  * @returns {FolderView}
1695
1748
  */
@@ -1709,6 +1762,7 @@ class FoldersClient {
1709
1762
  }
1710
1763
  }
1711
1764
  /**
1765
+ * Decrypt a list of [Folder]s to a list of [FolderView]s.
1712
1766
  * @param {Folder[]} folders
1713
1767
  * @returns {FolderView[]}
1714
1768
  */
@@ -1732,6 +1786,46 @@ class FoldersClient {
1732
1786
  wasm.__wbindgen_add_to_stack_pointer(16);
1733
1787
  }
1734
1788
  }
1789
+ /**
1790
+ * Get all folders from state and decrypt them to a list of [FolderView].
1791
+ * @returns {Promise<FolderView[]>}
1792
+ */
1793
+ list() {
1794
+ const ret = wasm.foldersclient_list(this.__wbg_ptr);
1795
+ return takeObject(ret);
1796
+ }
1797
+ /**
1798
+ * Get a specific [Folder] by its ID from state and decrypt it to a [FolderView].
1799
+ * @param {string} folder_id
1800
+ * @returns {Promise<FolderView>}
1801
+ */
1802
+ get(folder_id) {
1803
+ const ptr0 = passStringToWasm0(folder_id, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);
1804
+ const len0 = WASM_VECTOR_LEN;
1805
+ const ret = wasm.foldersclient_get(this.__wbg_ptr, ptr0, len0);
1806
+ return takeObject(ret);
1807
+ }
1808
+ /**
1809
+ * Create a new [Folder] and save it to the server.
1810
+ * @param {FolderAddEditRequest} request
1811
+ * @returns {Promise<FolderView>}
1812
+ */
1813
+ create(request) {
1814
+ const ret = wasm.foldersclient_create(this.__wbg_ptr, addHeapObject(request));
1815
+ return takeObject(ret);
1816
+ }
1817
+ /**
1818
+ * Edit the [Folder] and save it to the server.
1819
+ * @param {string} folder_id
1820
+ * @param {FolderAddEditRequest} request
1821
+ * @returns {Promise<FolderView>}
1822
+ */
1823
+ edit(folder_id, request) {
1824
+ const ptr0 = passStringToWasm0(folder_id, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);
1825
+ const len0 = WASM_VECTOR_LEN;
1826
+ const ret = wasm.foldersclient_edit(this.__wbg_ptr, ptr0, len0, addHeapObject(request));
1827
+ return takeObject(ret);
1828
+ }
1735
1829
  }
1736
1830
  module.exports.FoldersClient = FoldersClient;
1737
1831
 
@@ -3158,6 +3252,12 @@ class StateClient {
3158
3252
  register_cipher_repository(store) {
3159
3253
  wasm.stateclient_register_cipher_repository(this.__wbg_ptr, addHeapObject(store));
3160
3254
  }
3255
+ /**
3256
+ * @param {Repository<Folder>} store
3257
+ */
3258
+ register_folder_repository(store) {
3259
+ wasm.stateclient_register_folder_repository(this.__wbg_ptr, addHeapObject(store));
3260
+ }
3161
3261
  }
3162
3262
  module.exports.StateClient = StateClient;
3163
3263
 
@@ -3420,6 +3520,21 @@ module.exports.__wbg_getTime_46267b1c24877e30 = function (arg0) {
3420
3520
  return ret;
3421
3521
  };
3422
3522
 
3523
+ module.exports.__wbg_get_1620f903ed9a676f = function () {
3524
+ return handleError(function (arg0, arg1, arg2) {
3525
+ let deferred0_0;
3526
+ let deferred0_1;
3527
+ try {
3528
+ deferred0_0 = arg1;
3529
+ deferred0_1 = arg2;
3530
+ const ret = getObject(arg0).get(getStringFromWasm0(arg1, arg2));
3531
+ return addHeapObject(ret);
3532
+ } finally {
3533
+ wasm.__wbindgen_free(deferred0_0, deferred0_1, 1);
3534
+ }
3535
+ }, arguments);
3536
+ };
3537
+
3423
3538
  module.exports.__wbg_get_67b2ba62fc30de12 = function () {
3424
3539
  return handleError(function (arg0, arg1) {
3425
3540
  const ret = Reflect.get(getObject(arg0), getObject(arg1));
@@ -3432,7 +3547,7 @@ module.exports.__wbg_get_b9b93047fe3cf45b = function (arg0, arg1) {
3432
3547
  return addHeapObject(ret);
3433
3548
  };
3434
3549
 
3435
- module.exports.__wbg_get_fe8b1fc2a9351d29 = function () {
3550
+ module.exports.__wbg_get_e94e796a5527c131 = function () {
3436
3551
  return handleError(function (arg0, arg1, arg2) {
3437
3552
  let deferred0_0;
3438
3553
  let deferred0_1;
@@ -3447,7 +3562,7 @@ module.exports.__wbg_get_fe8b1fc2a9351d29 = function () {
3447
3562
  }, arguments);
3448
3563
  };
3449
3564
 
3450
- module.exports.__wbg_getaccesstoken_add1fa985a1fcf9b = function (arg0) {
3565
+ module.exports.__wbg_getaccesstoken_115c028df526c10b = function (arg0) {
3451
3566
  const ret = getObject(arg0).get_access_token();
3452
3567
  return addHeapObject(ret);
3453
3568
  };
@@ -3552,7 +3667,14 @@ module.exports.__wbg_length_e2d2a49132c1b256 = function (arg0) {
3552
3667
  return ret;
3553
3668
  };
3554
3669
 
3555
- module.exports.__wbg_list_e78f0f65f8a26cd6 = function () {
3670
+ module.exports.__wbg_list_2a92e7addacc7a2d = function () {
3671
+ return handleError(function (arg0) {
3672
+ const ret = getObject(arg0).list();
3673
+ return addHeapObject(ret);
3674
+ }, arguments);
3675
+ };
3676
+
3677
+ module.exports.__wbg_list_6d9131c88a8d0a17 = function () {
3556
3678
  return handleError(function (arg0) {
3557
3679
  const ret = getObject(arg0).list();
3558
3680
  return addHeapObject(ret);
@@ -3587,7 +3709,7 @@ module.exports.__wbg_new_23a2665fac83c611 = function (arg0, arg1) {
3587
3709
  const a = state0.a;
3588
3710
  state0.a = 0;
3589
3711
  try {
3590
- return __wbg_adapter_280(a, state0.b, arg0, arg1);
3712
+ return __wbg_adapter_301(a, state0.b, arg0, arg1);
3591
3713
  } finally {
3592
3714
  state0.a = a;
3593
3715
  }
@@ -3729,7 +3851,22 @@ module.exports.__wbg_randomFillSync_ac0988aba3254290 = function () {
3729
3851
  }, arguments);
3730
3852
  };
3731
3853
 
3732
- module.exports.__wbg_remove_ea8cb7fadc70e111 = function () {
3854
+ module.exports.__wbg_remove_050f4c22aba9e8c7 = function () {
3855
+ return handleError(function (arg0, arg1, arg2) {
3856
+ let deferred0_0;
3857
+ let deferred0_1;
3858
+ try {
3859
+ deferred0_0 = arg1;
3860
+ deferred0_1 = arg2;
3861
+ const ret = getObject(arg0).remove(getStringFromWasm0(arg1, arg2));
3862
+ return addHeapObject(ret);
3863
+ } finally {
3864
+ wasm.__wbindgen_free(deferred0_0, deferred0_1, 1);
3865
+ }
3866
+ }, arguments);
3867
+ };
3868
+
3869
+ module.exports.__wbg_remove_c9b8a1e5e4b15f5f = function () {
3733
3870
  return handleError(function (arg0, arg1, arg2) {
3734
3871
  let deferred0_0;
3735
3872
  let deferred0_1;
@@ -3780,7 +3917,22 @@ module.exports.__wbg_set_65595bdd868b3009 = function (arg0, arg1, arg2) {
3780
3917
  getObject(arg0).set(getObject(arg1), arg2 >>> 0);
3781
3918
  };
3782
3919
 
3783
- module.exports.__wbg_set_84a98f482fda77e5 = function () {
3920
+ module.exports.__wbg_set_c0f7f01bcd881751 = function () {
3921
+ return handleError(function (arg0, arg1, arg2, arg3) {
3922
+ let deferred0_0;
3923
+ let deferred0_1;
3924
+ try {
3925
+ deferred0_0 = arg1;
3926
+ deferred0_1 = arg2;
3927
+ const ret = getObject(arg0).set(getStringFromWasm0(arg1, arg2), takeObject(arg3));
3928
+ return addHeapObject(ret);
3929
+ } finally {
3930
+ wasm.__wbindgen_free(deferred0_0, deferred0_1, 1);
3931
+ }
3932
+ }, arguments);
3933
+ };
3934
+
3935
+ module.exports.__wbg_set_f85eb67e00c0abef = function () {
3784
3936
  return handleError(function (arg0, arg1, arg2, arg3) {
3785
3937
  let deferred0_0;
3786
3938
  let deferred0_1;
@@ -3936,6 +4088,15 @@ module.exports.__wbg_warn_aaf1f4664a035bd6 = function (arg0, arg1, arg2, arg3) {
3936
4088
  console.warn(getObject(arg0), getObject(arg1), getObject(arg2), getObject(arg3));
3937
4089
  };
3938
4090
 
4091
+ module.exports.__wbindgen_array_new = function () {
4092
+ const ret = [];
4093
+ return addHeapObject(ret);
4094
+ };
4095
+
4096
+ module.exports.__wbindgen_array_push = function (arg0, arg1) {
4097
+ getObject(arg0).push(takeObject(arg1));
4098
+ };
4099
+
3939
4100
  module.exports.__wbindgen_as_number = function (arg0) {
3940
4101
  const ret = +getObject(arg0);
3941
4102
  return ret;
@@ -3974,18 +4135,18 @@ module.exports.__wbindgen_cb_drop = function (arg0) {
3974
4135
  return ret;
3975
4136
  };
3976
4137
 
3977
- module.exports.__wbindgen_closure_wrapper2913 = function (arg0, arg1, arg2) {
3978
- const ret = makeMutClosure(arg0, arg1, 920, __wbg_adapter_50);
4138
+ module.exports.__wbindgen_closure_wrapper3245 = function (arg0, arg1, arg2) {
4139
+ const ret = makeMutClosure(arg0, arg1, 1034, __wbg_adapter_54);
3979
4140
  return addHeapObject(ret);
3980
4141
  };
3981
4142
 
3982
- module.exports.__wbindgen_closure_wrapper3753 = function (arg0, arg1, arg2) {
3983
- const ret = makeMutClosure(arg0, arg1, 1004, __wbg_adapter_53);
4143
+ module.exports.__wbindgen_closure_wrapper4086 = function (arg0, arg1, arg2) {
4144
+ const ret = makeMutClosure(arg0, arg1, 1118, __wbg_adapter_57);
3984
4145
  return addHeapObject(ret);
3985
4146
  };
3986
4147
 
3987
- module.exports.__wbindgen_closure_wrapper4171 = function (arg0, arg1, arg2) {
3988
- const ret = makeMutClosure(arg0, arg1, 1127, __wbg_adapter_56);
4148
+ module.exports.__wbindgen_closure_wrapper4522 = function (arg0, arg1, arg2) {
4149
+ const ret = makeMutClosure(arg0, arg1, 1251, __wbg_adapter_60);
3989
4150
  return addHeapObject(ret);
3990
4151
  };
3991
4152
 
@@ -6,16 +6,12 @@ export const cryptoclient_initialize_user_crypto: (a: number, b: number) => numb
6
6
  export const cryptoclient_initialize_org_crypto: (a: number, b: number) => number;
7
7
  export const cryptoclient_make_key_pair: (a: number, b: number, c: number, d: number) => void;
8
8
  export const cryptoclient_verify_asymmetric_keys: (a: number, b: number, c: number) => void;
9
- export const cryptoclient_make_user_signing_keys_for_enrollment: (a: number, b: number) => void;
10
- export const cryptoclient_get_v2_rotated_account_keys: (
11
- a: number,
12
- b: number,
13
- c: number,
14
- d: number,
15
- ) => void;
9
+ export const cryptoclient_make_keys_for_user_crypto_v2: (a: number, b: number) => void;
10
+ export const cryptoclient_get_v2_rotated_account_keys: (a: number, b: number) => void;
16
11
  export const isDeriveKeyConnectorError: (a: number) => number;
17
12
  export const isEnrollAdminPasswordResetError: (a: number) => number;
18
13
  export const isCryptoClientError: (a: number) => number;
14
+ export const isStatefulCryptoError: (a: number) => number;
19
15
  export const isEncryptionSettingsError: (a: number) => number;
20
16
  export const isCryptoError: (a: number) => number;
21
17
  export const __wbg_exporterclient_free: (a: number, b: number) => void;
@@ -139,6 +135,10 @@ export const ciphersclient_decrypt_fido2_private_key: (a: number, b: number, c:
139
135
  export const foldersclient_encrypt: (a: number, b: number, c: number) => void;
140
136
  export const foldersclient_decrypt: (a: number, b: number, c: number) => void;
141
137
  export const foldersclient_decrypt_list: (a: number, b: number, c: number, d: number) => void;
138
+ export const foldersclient_list: (a: number) => number;
139
+ export const foldersclient_get: (a: number, b: number, c: number) => number;
140
+ export const foldersclient_create: (a: number, b: number) => number;
141
+ export const foldersclient_edit: (a: number, b: number, c: number, d: number) => number;
142
142
  export const vaultclient_attachments: (a: number) => number;
143
143
  export const totpclient_generate_totp: (
144
144
  a: number,
@@ -151,6 +151,9 @@ export const totpclient_generate_totp: (
151
151
  export const isDecryptError: (a: number) => number;
152
152
  export const isEncryptError: (a: number) => number;
153
153
  export const isTotpError: (a: number) => number;
154
+ export const isGetFolderError: (a: number) => number;
155
+ export const isEditFolderError: (a: number) => number;
156
+ export const isCreateFolderError: (a: number) => number;
154
157
  export const isCipherError: (a: number) => number;
155
158
  export const isDecryptFileError: (a: number) => number;
156
159
  export const isEncryptFileError: (a: number) => number;
@@ -172,6 +175,7 @@ export const bitwardenclient_platform: (a: number) => number;
172
175
  export const set_log_level: (a: number) => void;
173
176
  export const init_sdk: (a: number) => void;
174
177
  export const stateclient_register_cipher_repository: (a: number, b: number) => void;
178
+ export const stateclient_register_folder_repository: (a: number, b: number) => void;
175
179
  export const __wbg_purecrypto_free: (a: number, b: number) => void;
176
180
  export const purecrypto_symmetric_decrypt: (
177
181
  a: number,
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@bitwarden/sdk-internal",
3
- "version": "0.2.0-main.230",
3
+ "version": "0.2.0-main.232",
4
4
  "license": "GPL-3.0",
5
5
  "files": [
6
6
  "bitwarden_wasm_internal_bg.js",