@haex-space/vault-sdk 2.4.0 → 2.5.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist/index.mjs CHANGED
@@ -373,9 +373,13 @@ var HAEXTENSION_EVENTS = {
373
373
  /** Context (theme, locale, platform) has changed */
374
374
  CONTEXT_CHANGED: "haextension:context:changed",
375
375
  /** Search request from HaexHub */
376
- SEARCH_REQUEST: "haextension:search:request",
377
- /** External request from authorized client (browser extension, CLI, server, etc.) */
378
- EXTERNAL_REQUEST: "haextension:external:request"
376
+ SEARCH_REQUEST: "haextension:search:request"
377
+ };
378
+ var EXTERNAL_EVENTS = {
379
+ /** External request from authorized client */
380
+ REQUEST: "haextension:external:request",
381
+ /** New external client requesting authorization */
382
+ AUTHORIZATION_REQUEST: "external:authorization-request"
379
383
  };
380
384
 
381
385
  // src/types.ts
@@ -1264,7 +1268,24 @@ var TAURI_COMMANDS = {
1264
1268
  showImage: "webview_extension_fs_show_image"
1265
1269
  },
1266
1270
  external: {
1267
- respond: "webview_extension_external_respond"
1271
+ // Response handling (called by extensions)
1272
+ respond: "external_respond",
1273
+ // Bridge server management
1274
+ bridgeStart: "external_bridge_start",
1275
+ bridgeStop: "external_bridge_stop",
1276
+ bridgeGetStatus: "external_bridge_get_status",
1277
+ // Client authorization (unified API with remember flag)
1278
+ clientAllow: "external_client_allow",
1279
+ clientBlock: "external_client_block",
1280
+ // Authorized clients management
1281
+ getAuthorizedClients: "external_get_authorized_clients",
1282
+ revokeClient: "external_revoke_client",
1283
+ // Blocked clients management
1284
+ getBlockedClients: "external_get_blocked_clients",
1285
+ unblockClient: "external_unblock_client",
1286
+ isClientBlocked: "external_is_client_blocked",
1287
+ // Pending authorizations
1288
+ getPendingAuthorizations: "external_get_pending_authorizations"
1268
1289
  },
1269
1290
  extension: {
1270
1291
  getInfo: "webview_extension_get_info",
@@ -2443,6 +2464,6 @@ function createHaexVaultClient(config = {}) {
2443
2464
  return new HaexVaultClient(config);
2444
2465
  }
2445
2466
 
2446
- export { DEFAULT_TIMEOUT, DatabaseAPI, ErrorCode, FileSyncAPI, FilesystemAPI, HAEXSPACE_MESSAGE_TYPES, HAEXTENSION_EVENTS, HAEXTENSION_METHODS, HaexVaultClient, HaexVaultSdkError, PermissionStatus, PermissionsAPI, TABLE_SEPARATOR, TAURI_COMMANDS, WebAPI, arrayBufferToBase64, base64ToArrayBuffer, createHaexVaultClient, decryptCrdtData, decryptString, decryptVaultKey, decryptVaultName, deriveKeyFromPassword, encryptCrdtData, encryptString, encryptVaultKey, generateVaultKey, getTableName, hexToBytes, installBaseTag, installCookiePolyfill, installHistoryPolyfill, installLocalStoragePolyfill, installPolyfills, installSessionStoragePolyfill, sortObjectKeysRecursively, unwrapKey, verifyExtensionSignature, wrapKey };
2467
+ export { DEFAULT_TIMEOUT, DatabaseAPI, EXTERNAL_EVENTS, ErrorCode, FileSyncAPI, FilesystemAPI, HAEXSPACE_MESSAGE_TYPES, HAEXTENSION_EVENTS, HAEXTENSION_METHODS, HaexVaultClient, HaexVaultSdkError, PermissionStatus, PermissionsAPI, TABLE_SEPARATOR, TAURI_COMMANDS, WebAPI, arrayBufferToBase64, base64ToArrayBuffer, createHaexVaultClient, decryptCrdtData, decryptString, decryptVaultKey, decryptVaultName, deriveKeyFromPassword, encryptCrdtData, encryptString, encryptVaultKey, generateVaultKey, getTableName, hexToBytes, installBaseTag, installCookiePolyfill, installHistoryPolyfill, installLocalStoragePolyfill, installPolyfills, installSessionStoragePolyfill, sortObjectKeysRecursively, unwrapKey, verifyExtensionSignature, wrapKey };
2447
2468
  //# sourceMappingURL=index.mjs.map
2448
2469
  //# sourceMappingURL=index.mjs.map