@haex-space/vault-sdk 2.4.0 → 2.5.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/{client-ClYpUDoI.d.mts → client-DTqEEmX-.d.mts} +1 -1
- package/dist/{client-BSdAg7D1.d.ts → client-DfmTO8Mz.d.ts} +1 -1
- package/dist/index.d.mts +16 -5
- package/dist/index.d.ts +16 -5
- package/dist/index.js +43 -4
- package/dist/index.js.map +1 -1
- package/dist/index.mjs +40 -5
- package/dist/index.mjs.map +1 -1
- package/dist/node.d.mts +1 -1
- package/dist/node.d.ts +1 -1
- package/dist/react.d.mts +2 -2
- package/dist/react.d.ts +2 -2
- package/dist/react.js +3 -5
- package/dist/react.js.map +1 -1
- package/dist/react.mjs +3 -5
- package/dist/react.mjs.map +1 -1
- package/dist/runtime/nuxt.plugin.client.d.mts +2 -2
- package/dist/runtime/nuxt.plugin.client.d.ts +2 -2
- package/dist/runtime/nuxt.plugin.client.js +3 -5
- package/dist/runtime/nuxt.plugin.client.js.map +1 -1
- package/dist/runtime/nuxt.plugin.client.mjs +3 -5
- package/dist/runtime/nuxt.plugin.client.mjs.map +1 -1
- package/dist/svelte.d.mts +2 -2
- package/dist/svelte.d.ts +2 -2
- package/dist/svelte.js +3 -5
- package/dist/svelte.js.map +1 -1
- package/dist/svelte.mjs +3 -5
- package/dist/svelte.mjs.map +1 -1
- package/dist/{types-CmPqOcLB.d.mts → types-Dzp3QG4t.d.mts} +99 -4
- package/dist/{types-CmPqOcLB.d.ts → types-Dzp3QG4t.d.ts} +99 -4
- package/dist/vue.d.mts +2 -2
- package/dist/vue.d.ts +2 -2
- package/dist/vue.js +3 -5
- package/dist/vue.js.map +1 -1
- package/dist/vue.mjs +3 -5
- package/dist/vue.mjs.map +1 -1
- package/package.json +1 -1
package/dist/index.mjs
CHANGED
|
@@ -373,9 +373,13 @@ var HAEXTENSION_EVENTS = {
|
|
|
373
373
|
/** Context (theme, locale, platform) has changed */
|
|
374
374
|
CONTEXT_CHANGED: "haextension:context:changed",
|
|
375
375
|
/** Search request from HaexHub */
|
|
376
|
-
SEARCH_REQUEST: "haextension:search:request"
|
|
377
|
-
|
|
378
|
-
|
|
376
|
+
SEARCH_REQUEST: "haextension:search:request"
|
|
377
|
+
};
|
|
378
|
+
var EXTERNAL_EVENTS = {
|
|
379
|
+
/** External request from authorized client */
|
|
380
|
+
REQUEST: "haextension:external:request",
|
|
381
|
+
/** New external client requesting authorization */
|
|
382
|
+
AUTHORIZATION_REQUEST: "external:authorization-request"
|
|
379
383
|
};
|
|
380
384
|
|
|
381
385
|
// src/types.ts
|
|
@@ -390,6 +394,20 @@ var PermissionStatus = /* @__PURE__ */ ((PermissionStatus2) => {
|
|
|
390
394
|
PermissionStatus2["ASK"] = "ask";
|
|
391
395
|
return PermissionStatus2;
|
|
392
396
|
})(PermissionStatus || {});
|
|
397
|
+
var ExternalConnectionState = /* @__PURE__ */ ((ExternalConnectionState2) => {
|
|
398
|
+
ExternalConnectionState2["DISCONNECTED"] = "disconnected";
|
|
399
|
+
ExternalConnectionState2["CONNECTING"] = "connecting";
|
|
400
|
+
ExternalConnectionState2["CONNECTED"] = "connected";
|
|
401
|
+
ExternalConnectionState2["PENDING_APPROVAL"] = "pending_approval";
|
|
402
|
+
ExternalConnectionState2["PAIRED"] = "paired";
|
|
403
|
+
return ExternalConnectionState2;
|
|
404
|
+
})(ExternalConnectionState || {});
|
|
405
|
+
function isExternalClientConnected(state) {
|
|
406
|
+
return state === "connected" /* CONNECTED */ || state === "pending_approval" /* PENDING_APPROVAL */ || state === "paired" /* PAIRED */;
|
|
407
|
+
}
|
|
408
|
+
function canExternalClientSendRequests(state) {
|
|
409
|
+
return state === "paired" /* PAIRED */;
|
|
410
|
+
}
|
|
393
411
|
var ErrorCode = /* @__PURE__ */ ((ErrorCode2) => {
|
|
394
412
|
ErrorCode2["TIMEOUT"] = "TIMEOUT";
|
|
395
413
|
ErrorCode2["NOT_IN_IFRAME"] = "NOT_IN_IFRAME";
|
|
@@ -1264,7 +1282,24 @@ var TAURI_COMMANDS = {
|
|
|
1264
1282
|
showImage: "webview_extension_fs_show_image"
|
|
1265
1283
|
},
|
|
1266
1284
|
external: {
|
|
1267
|
-
|
|
1285
|
+
// Response handling (called by extensions)
|
|
1286
|
+
respond: "external_respond",
|
|
1287
|
+
// Bridge server management
|
|
1288
|
+
bridgeStart: "external_bridge_start",
|
|
1289
|
+
bridgeStop: "external_bridge_stop",
|
|
1290
|
+
bridgeGetStatus: "external_bridge_get_status",
|
|
1291
|
+
// Client authorization (unified API with remember flag)
|
|
1292
|
+
clientAllow: "external_client_allow",
|
|
1293
|
+
clientBlock: "external_client_block",
|
|
1294
|
+
// Authorized clients management
|
|
1295
|
+
getAuthorizedClients: "external_get_authorized_clients",
|
|
1296
|
+
revokeClient: "external_revoke_client",
|
|
1297
|
+
// Blocked clients management
|
|
1298
|
+
getBlockedClients: "external_get_blocked_clients",
|
|
1299
|
+
unblockClient: "external_unblock_client",
|
|
1300
|
+
isClientBlocked: "external_is_client_blocked",
|
|
1301
|
+
// Pending authorizations
|
|
1302
|
+
getPendingAuthorizations: "external_get_pending_authorizations"
|
|
1268
1303
|
},
|
|
1269
1304
|
extension: {
|
|
1270
1305
|
getInfo: "webview_extension_get_info",
|
|
@@ -2443,6 +2478,6 @@ function createHaexVaultClient(config = {}) {
|
|
|
2443
2478
|
return new HaexVaultClient(config);
|
|
2444
2479
|
}
|
|
2445
2480
|
|
|
2446
|
-
export { DEFAULT_TIMEOUT, DatabaseAPI, ErrorCode, FileSyncAPI, FilesystemAPI, HAEXSPACE_MESSAGE_TYPES, HAEXTENSION_EVENTS, HAEXTENSION_METHODS, HaexVaultClient, HaexVaultSdkError, PermissionStatus, PermissionsAPI, TABLE_SEPARATOR, TAURI_COMMANDS, WebAPI, arrayBufferToBase64, base64ToArrayBuffer, createHaexVaultClient, decryptCrdtData, decryptString, decryptVaultKey, decryptVaultName, deriveKeyFromPassword, encryptCrdtData, encryptString, encryptVaultKey, generateVaultKey, getTableName, hexToBytes, installBaseTag, installCookiePolyfill, installHistoryPolyfill, installLocalStoragePolyfill, installPolyfills, installSessionStoragePolyfill, sortObjectKeysRecursively, unwrapKey, verifyExtensionSignature, wrapKey };
|
|
2481
|
+
export { DEFAULT_TIMEOUT, DatabaseAPI, EXTERNAL_EVENTS, ErrorCode, ExternalConnectionState, FileSyncAPI, FilesystemAPI, HAEXSPACE_MESSAGE_TYPES, HAEXTENSION_EVENTS, HAEXTENSION_METHODS, HaexVaultClient, HaexVaultSdkError, PermissionStatus, PermissionsAPI, TABLE_SEPARATOR, TAURI_COMMANDS, WebAPI, arrayBufferToBase64, base64ToArrayBuffer, canExternalClientSendRequests, createHaexVaultClient, decryptCrdtData, decryptString, decryptVaultKey, decryptVaultName, deriveKeyFromPassword, encryptCrdtData, encryptString, encryptVaultKey, generateVaultKey, getTableName, hexToBytes, installBaseTag, installCookiePolyfill, installHistoryPolyfill, installLocalStoragePolyfill, installPolyfills, installSessionStoragePolyfill, isExternalClientConnected, sortObjectKeysRecursively, unwrapKey, verifyExtensionSignature, wrapKey };
|
|
2447
2482
|
//# sourceMappingURL=index.mjs.map
|
|
2448
2483
|
//# sourceMappingURL=index.mjs.map
|