@haex-space/vault-sdk 2.4.0 → 2.5.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist/index.mjs CHANGED
@@ -373,9 +373,13 @@ var HAEXTENSION_EVENTS = {
373
373
  /** Context (theme, locale, platform) has changed */
374
374
  CONTEXT_CHANGED: "haextension:context:changed",
375
375
  /** Search request from HaexHub */
376
- SEARCH_REQUEST: "haextension:search:request",
377
- /** External request from authorized client (browser extension, CLI, server, etc.) */
378
- EXTERNAL_REQUEST: "haextension:external:request"
376
+ SEARCH_REQUEST: "haextension:search:request"
377
+ };
378
+ var EXTERNAL_EVENTS = {
379
+ /** External request from authorized client */
380
+ REQUEST: "haextension:external:request",
381
+ /** New external client requesting authorization */
382
+ AUTHORIZATION_REQUEST: "external:authorization-request"
379
383
  };
380
384
 
381
385
  // src/types.ts
@@ -390,6 +394,20 @@ var PermissionStatus = /* @__PURE__ */ ((PermissionStatus2) => {
390
394
  PermissionStatus2["ASK"] = "ask";
391
395
  return PermissionStatus2;
392
396
  })(PermissionStatus || {});
397
+ var ExternalConnectionState = /* @__PURE__ */ ((ExternalConnectionState2) => {
398
+ ExternalConnectionState2["DISCONNECTED"] = "disconnected";
399
+ ExternalConnectionState2["CONNECTING"] = "connecting";
400
+ ExternalConnectionState2["CONNECTED"] = "connected";
401
+ ExternalConnectionState2["PENDING_APPROVAL"] = "pending_approval";
402
+ ExternalConnectionState2["PAIRED"] = "paired";
403
+ return ExternalConnectionState2;
404
+ })(ExternalConnectionState || {});
405
+ function isExternalClientConnected(state) {
406
+ return state === "connected" /* CONNECTED */ || state === "pending_approval" /* PENDING_APPROVAL */ || state === "paired" /* PAIRED */;
407
+ }
408
+ function canExternalClientSendRequests(state) {
409
+ return state === "paired" /* PAIRED */;
410
+ }
393
411
  var ErrorCode = /* @__PURE__ */ ((ErrorCode2) => {
394
412
  ErrorCode2["TIMEOUT"] = "TIMEOUT";
395
413
  ErrorCode2["NOT_IN_IFRAME"] = "NOT_IN_IFRAME";
@@ -1264,7 +1282,24 @@ var TAURI_COMMANDS = {
1264
1282
  showImage: "webview_extension_fs_show_image"
1265
1283
  },
1266
1284
  external: {
1267
- respond: "webview_extension_external_respond"
1285
+ // Response handling (called by extensions)
1286
+ respond: "external_respond",
1287
+ // Bridge server management
1288
+ bridgeStart: "external_bridge_start",
1289
+ bridgeStop: "external_bridge_stop",
1290
+ bridgeGetStatus: "external_bridge_get_status",
1291
+ // Client authorization (unified API with remember flag)
1292
+ clientAllow: "external_client_allow",
1293
+ clientBlock: "external_client_block",
1294
+ // Authorized clients management
1295
+ getAuthorizedClients: "external_get_authorized_clients",
1296
+ revokeClient: "external_revoke_client",
1297
+ // Blocked clients management
1298
+ getBlockedClients: "external_get_blocked_clients",
1299
+ unblockClient: "external_unblock_client",
1300
+ isClientBlocked: "external_is_client_blocked",
1301
+ // Pending authorizations
1302
+ getPendingAuthorizations: "external_get_pending_authorizations"
1268
1303
  },
1269
1304
  extension: {
1270
1305
  getInfo: "webview_extension_get_info",
@@ -2443,6 +2478,6 @@ function createHaexVaultClient(config = {}) {
2443
2478
  return new HaexVaultClient(config);
2444
2479
  }
2445
2480
 
2446
- export { DEFAULT_TIMEOUT, DatabaseAPI, ErrorCode, FileSyncAPI, FilesystemAPI, HAEXSPACE_MESSAGE_TYPES, HAEXTENSION_EVENTS, HAEXTENSION_METHODS, HaexVaultClient, HaexVaultSdkError, PermissionStatus, PermissionsAPI, TABLE_SEPARATOR, TAURI_COMMANDS, WebAPI, arrayBufferToBase64, base64ToArrayBuffer, createHaexVaultClient, decryptCrdtData, decryptString, decryptVaultKey, decryptVaultName, deriveKeyFromPassword, encryptCrdtData, encryptString, encryptVaultKey, generateVaultKey, getTableName, hexToBytes, installBaseTag, installCookiePolyfill, installHistoryPolyfill, installLocalStoragePolyfill, installPolyfills, installSessionStoragePolyfill, sortObjectKeysRecursively, unwrapKey, verifyExtensionSignature, wrapKey };
2481
+ export { DEFAULT_TIMEOUT, DatabaseAPI, EXTERNAL_EVENTS, ErrorCode, ExternalConnectionState, FileSyncAPI, FilesystemAPI, HAEXSPACE_MESSAGE_TYPES, HAEXTENSION_EVENTS, HAEXTENSION_METHODS, HaexVaultClient, HaexVaultSdkError, PermissionStatus, PermissionsAPI, TABLE_SEPARATOR, TAURI_COMMANDS, WebAPI, arrayBufferToBase64, base64ToArrayBuffer, canExternalClientSendRequests, createHaexVaultClient, decryptCrdtData, decryptString, decryptVaultKey, decryptVaultName, deriveKeyFromPassword, encryptCrdtData, encryptString, encryptVaultKey, generateVaultKey, getTableName, hexToBytes, installBaseTag, installCookiePolyfill, installHistoryPolyfill, installLocalStoragePolyfill, installPolyfills, installSessionStoragePolyfill, isExternalClientConnected, sortObjectKeysRecursively, unwrapKey, verifyExtensionSignature, wrapKey };
2447
2482
  //# sourceMappingURL=index.mjs.map
2448
2483
  //# sourceMappingURL=index.mjs.map