@haex-space/vault-sdk 2.5.2 → 2.5.4

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist/index.mjs CHANGED
@@ -402,6 +402,18 @@ var ExternalConnectionState = /* @__PURE__ */ ((ExternalConnectionState2) => {
402
402
  ExternalConnectionState2["PAIRED"] = "paired";
403
403
  return ExternalConnectionState2;
404
404
  })(ExternalConnectionState || {});
405
+ var ExternalConnectionErrorCode = /* @__PURE__ */ ((ExternalConnectionErrorCode2) => {
406
+ ExternalConnectionErrorCode2["NONE"] = "none";
407
+ ExternalConnectionErrorCode2["CLIENT_NOT_AUTHORIZED"] = "client_not_authorized";
408
+ ExternalConnectionErrorCode2["CLIENT_BLOCKED"] = "client_blocked";
409
+ ExternalConnectionErrorCode2["CONNECTION_FAILED"] = "connection_failed";
410
+ ExternalConnectionErrorCode2["CONNECTION_TIMEOUT"] = "connection_timeout";
411
+ ExternalConnectionErrorCode2["CONNECTION_CLOSED"] = "connection_closed";
412
+ ExternalConnectionErrorCode2["DECRYPTION_FAILED"] = "decryption_failed";
413
+ ExternalConnectionErrorCode2["INVALID_MESSAGE"] = "invalid_message";
414
+ ExternalConnectionErrorCode2["UNKNOWN"] = "unknown";
415
+ return ExternalConnectionErrorCode2;
416
+ })(ExternalConnectionErrorCode || {});
405
417
  function isExternalClientConnected(state) {
406
418
  return state === "connected" /* CONNECTED */ || state === "pending_approval" /* PENDING_APPROVAL */ || state === "paired" /* PAIRED */;
407
419
  }
@@ -2478,6 +2490,6 @@ function createHaexVaultClient(config = {}) {
2478
2490
  return new HaexVaultClient(config);
2479
2491
  }
2480
2492
 
2481
- export { DEFAULT_TIMEOUT, DatabaseAPI, EXTERNAL_EVENTS, ErrorCode, ExternalConnectionState, FileSyncAPI, FilesystemAPI, HAEXSPACE_MESSAGE_TYPES, HAEXTENSION_EVENTS, HAEXTENSION_METHODS, HaexVaultClient, HaexVaultSdkError, PermissionStatus, PermissionsAPI, TABLE_SEPARATOR, TAURI_COMMANDS, WebAPI, arrayBufferToBase64, base64ToArrayBuffer, canExternalClientSendRequests, createHaexVaultClient, decryptCrdtData, decryptString, decryptVaultKey, decryptVaultName, deriveKeyFromPassword, encryptCrdtData, encryptString, encryptVaultKey, generateVaultKey, getTableName, hexToBytes, installBaseTag, installCookiePolyfill, installHistoryPolyfill, installLocalStoragePolyfill, installPolyfills, installSessionStoragePolyfill, isExternalClientConnected, sortObjectKeysRecursively, unwrapKey, verifyExtensionSignature, wrapKey };
2493
+ export { DEFAULT_TIMEOUT, DatabaseAPI, EXTERNAL_EVENTS, ErrorCode, ExternalConnectionErrorCode, ExternalConnectionState, FileSyncAPI, FilesystemAPI, HAEXSPACE_MESSAGE_TYPES, HAEXTENSION_EVENTS, HAEXTENSION_METHODS, HaexVaultClient, HaexVaultSdkError, PermissionStatus, PermissionsAPI, TABLE_SEPARATOR, TAURI_COMMANDS, WebAPI, arrayBufferToBase64, base64ToArrayBuffer, canExternalClientSendRequests, createHaexVaultClient, decryptCrdtData, decryptString, decryptVaultKey, decryptVaultName, deriveKeyFromPassword, encryptCrdtData, encryptString, encryptVaultKey, generateVaultKey, getTableName, hexToBytes, installBaseTag, installCookiePolyfill, installHistoryPolyfill, installLocalStoragePolyfill, installPolyfills, installSessionStoragePolyfill, isExternalClientConnected, sortObjectKeysRecursively, unwrapKey, verifyExtensionSignature, wrapKey };
2482
2494
  //# sourceMappingURL=index.mjs.map
2483
2495
  //# sourceMappingURL=index.mjs.map