@haex-space/vault-sdk 2.5.2 → 2.5.6

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,4 +1,4 @@
1
- import { D as DatabaseQueryResult, M as Migration, b as MigrationResult, W as WebRequestOptions, c as WebResponse, H as HaexHubConfig, a as ExtensionInfo, A as ApplicationContext, d as DatabasePermissionRequest, P as PermissionResponse, S as SearchResult, e as ExternalRequestHandler, f as ExternalResponse, g as EventCallback } from './types-Dzp3QG4t.mjs';
1
+ import { D as DatabaseQueryResult, M as Migration, b as MigrationResult, W as WebRequestOptions, c as WebResponse, H as HaexHubConfig, a as ExtensionInfo, A as ApplicationContext, d as DatabasePermissionRequest, P as PermissionResponse, S as SearchResult, e as ExternalRequestHandler, f as ExternalResponse, g as EventCallback } from './types-CAHAohTY.mjs';
2
2
  import { SqliteRemoteDatabase } from 'drizzle-orm/sqlite-proxy';
3
3
 
4
4
  declare class StorageAPI {
@@ -1,4 +1,4 @@
1
- import { D as DatabaseQueryResult, M as Migration, b as MigrationResult, W as WebRequestOptions, c as WebResponse, H as HaexHubConfig, a as ExtensionInfo, A as ApplicationContext, d as DatabasePermissionRequest, P as PermissionResponse, S as SearchResult, e as ExternalRequestHandler, f as ExternalResponse, g as EventCallback } from './types-Dzp3QG4t.js';
1
+ import { D as DatabaseQueryResult, M as Migration, b as MigrationResult, W as WebRequestOptions, c as WebResponse, H as HaexHubConfig, a as ExtensionInfo, A as ApplicationContext, d as DatabasePermissionRequest, P as PermissionResponse, S as SearchResult, e as ExternalRequestHandler, f as ExternalResponse, g as EventCallback } from './types-CAHAohTY.js';
2
2
  import { SqliteRemoteDatabase } from 'drizzle-orm/sqlite-proxy';
3
3
 
4
4
  declare class StorageAPI {
package/dist/index.d.mts CHANGED
@@ -1,7 +1,7 @@
1
- import { H as HaexVaultClient } from './client-DTqEEmX-.mjs';
2
- export { A as AddBackendOptions, m as AddSyncRuleOptions, C as CreateSpaceOptions, D as DatabaseAPI, n as DownloadFileOptions, c as FileInfo, b as FileSpace, a as FileSyncAPI, d as FileSyncState, F as FilesystemAPI, L as ListFilesOptions, P as PermissionsAPI, g as S3BackendConfig, e as StorageBackendInfo, f as StorageBackendType, i as SyncDirection, k as SyncError, l as SyncProgress, h as SyncRule, j as SyncStatus, U as UploadFileOptions, W as WebAPI } from './client-DTqEEmX-.mjs';
3
- import { E as ExtensionManifest, H as HaexHubConfig } from './types-Dzp3QG4t.mjs';
4
- export { A as ApplicationContext, t as AuthorizedClient, B as BlockedClient, C as ContextChangedEvent, z as DEFAULT_TIMEOUT, o as DatabaseColumnInfo, m as DatabaseExecuteParams, k as DatabasePermission, d as DatabasePermissionRequest, l as DatabaseQueryParams, D as DatabaseQueryResult, n as DatabaseTableInfo, O as EXTERNAL_EVENTS, y as ErrorCode, g as EventCallback, a as ExtensionInfo, v as ExternalAuthDecision, w as ExternalConnection, G as ExternalConnectionState, Q as ExternalEvent, s as ExternalRequest, r as ExternalRequestEvent, e as ExternalRequestHandler, f as ExternalResponse, L as HAEXTENSION_EVENTS, j as HaexHubEvent, h as HaexHubRequest, i as HaexHubResponse, K as HaexVaultSdkError, N as HaextensionEvent, u as PendingAuthorization, P as PermissionResponse, x as PermissionStatus, p as SearchQuery, q as SearchRequestEvent, S as SearchResult, T as TABLE_SEPARATOR, W as WebRequestOptions, c as WebResponse, J as canExternalClientSendRequests, F as getTableName, I as isExternalClientConnected } from './types-Dzp3QG4t.mjs';
1
+ import { H as HaexVaultClient } from './client-Bcysw57u.mjs';
2
+ export { A as AddBackendOptions, m as AddSyncRuleOptions, C as CreateSpaceOptions, D as DatabaseAPI, n as DownloadFileOptions, c as FileInfo, b as FileSpace, a as FileSyncAPI, d as FileSyncState, F as FilesystemAPI, L as ListFilesOptions, P as PermissionsAPI, g as S3BackendConfig, e as StorageBackendInfo, f as StorageBackendType, i as SyncDirection, k as SyncError, l as SyncProgress, h as SyncRule, j as SyncStatus, U as UploadFileOptions, W as WebAPI } from './client-Bcysw57u.mjs';
3
+ import { E as ExtensionManifest, H as HaexHubConfig } from './types-CAHAohTY.mjs';
4
+ export { A as ApplicationContext, t as AuthorizedClient, B as BlockedClient, C as ContextChangedEvent, F as DEFAULT_TIMEOUT, o as DatabaseColumnInfo, m as DatabaseExecuteParams, k as DatabasePermission, d as DatabasePermissionRequest, l as DatabaseQueryParams, D as DatabaseQueryResult, n as DatabaseTableInfo, R as EXTERNAL_EVENTS, z as ErrorCode, g as EventCallback, a as ExtensionInfo, v as ExternalAuthDecision, x as ExternalConnection, J as ExternalConnectionErrorCode, I as ExternalConnectionState, U as ExternalEvent, s as ExternalRequest, r as ExternalRequestEvent, e as ExternalRequestHandler, f as ExternalResponse, O as HAEXTENSION_EVENTS, j as HaexHubEvent, h as HaexHubRequest, i as HaexHubResponse, N as HaexVaultSdkError, Q as HaextensionEvent, u as PendingAuthorization, P as PermissionResponse, y as PermissionStatus, p as SearchQuery, q as SearchRequestEvent, S as SearchResult, w as SessionAuthorization, T as TABLE_SEPARATOR, W as WebRequestOptions, c as WebResponse, L as canExternalClientSendRequests, G as getTableName, K as isExternalClientConnected } from './types-CAHAohTY.mjs';
5
5
  export { H as HaextensionConfig } from './config-D_HXjsEV.mjs';
6
6
  import 'drizzle-orm/sqlite-proxy';
7
7
 
@@ -194,6 +194,8 @@ declare const TAURI_COMMANDS: {
194
194
  readonly clientBlock: "external_client_block";
195
195
  readonly getAuthorizedClients: "external_get_authorized_clients";
196
196
  readonly revokeClient: "external_revoke_client";
197
+ readonly getSessionAuthorizations: "external_get_session_authorizations";
198
+ readonly revokeSessionAuthorization: "external_revoke_session_authorization";
197
199
  readonly getBlockedClients: "external_get_blocked_clients";
198
200
  readonly unblockClient: "external_unblock_client";
199
201
  readonly isClientBlocked: "external_is_client_blocked";
package/dist/index.d.ts CHANGED
@@ -1,7 +1,7 @@
1
- import { H as HaexVaultClient } from './client-DfmTO8Mz.js';
2
- export { A as AddBackendOptions, m as AddSyncRuleOptions, C as CreateSpaceOptions, D as DatabaseAPI, n as DownloadFileOptions, c as FileInfo, b as FileSpace, a as FileSyncAPI, d as FileSyncState, F as FilesystemAPI, L as ListFilesOptions, P as PermissionsAPI, g as S3BackendConfig, e as StorageBackendInfo, f as StorageBackendType, i as SyncDirection, k as SyncError, l as SyncProgress, h as SyncRule, j as SyncStatus, U as UploadFileOptions, W as WebAPI } from './client-DfmTO8Mz.js';
3
- import { E as ExtensionManifest, H as HaexHubConfig } from './types-Dzp3QG4t.js';
4
- export { A as ApplicationContext, t as AuthorizedClient, B as BlockedClient, C as ContextChangedEvent, z as DEFAULT_TIMEOUT, o as DatabaseColumnInfo, m as DatabaseExecuteParams, k as DatabasePermission, d as DatabasePermissionRequest, l as DatabaseQueryParams, D as DatabaseQueryResult, n as DatabaseTableInfo, O as EXTERNAL_EVENTS, y as ErrorCode, g as EventCallback, a as ExtensionInfo, v as ExternalAuthDecision, w as ExternalConnection, G as ExternalConnectionState, Q as ExternalEvent, s as ExternalRequest, r as ExternalRequestEvent, e as ExternalRequestHandler, f as ExternalResponse, L as HAEXTENSION_EVENTS, j as HaexHubEvent, h as HaexHubRequest, i as HaexHubResponse, K as HaexVaultSdkError, N as HaextensionEvent, u as PendingAuthorization, P as PermissionResponse, x as PermissionStatus, p as SearchQuery, q as SearchRequestEvent, S as SearchResult, T as TABLE_SEPARATOR, W as WebRequestOptions, c as WebResponse, J as canExternalClientSendRequests, F as getTableName, I as isExternalClientConnected } from './types-Dzp3QG4t.js';
1
+ import { H as HaexVaultClient } from './client-K4BOBLQE.js';
2
+ export { A as AddBackendOptions, m as AddSyncRuleOptions, C as CreateSpaceOptions, D as DatabaseAPI, n as DownloadFileOptions, c as FileInfo, b as FileSpace, a as FileSyncAPI, d as FileSyncState, F as FilesystemAPI, L as ListFilesOptions, P as PermissionsAPI, g as S3BackendConfig, e as StorageBackendInfo, f as StorageBackendType, i as SyncDirection, k as SyncError, l as SyncProgress, h as SyncRule, j as SyncStatus, U as UploadFileOptions, W as WebAPI } from './client-K4BOBLQE.js';
3
+ import { E as ExtensionManifest, H as HaexHubConfig } from './types-CAHAohTY.js';
4
+ export { A as ApplicationContext, t as AuthorizedClient, B as BlockedClient, C as ContextChangedEvent, F as DEFAULT_TIMEOUT, o as DatabaseColumnInfo, m as DatabaseExecuteParams, k as DatabasePermission, d as DatabasePermissionRequest, l as DatabaseQueryParams, D as DatabaseQueryResult, n as DatabaseTableInfo, R as EXTERNAL_EVENTS, z as ErrorCode, g as EventCallback, a as ExtensionInfo, v as ExternalAuthDecision, x as ExternalConnection, J as ExternalConnectionErrorCode, I as ExternalConnectionState, U as ExternalEvent, s as ExternalRequest, r as ExternalRequestEvent, e as ExternalRequestHandler, f as ExternalResponse, O as HAEXTENSION_EVENTS, j as HaexHubEvent, h as HaexHubRequest, i as HaexHubResponse, N as HaexVaultSdkError, Q as HaextensionEvent, u as PendingAuthorization, P as PermissionResponse, y as PermissionStatus, p as SearchQuery, q as SearchRequestEvent, S as SearchResult, w as SessionAuthorization, T as TABLE_SEPARATOR, W as WebRequestOptions, c as WebResponse, L as canExternalClientSendRequests, G as getTableName, K as isExternalClientConnected } from './types-CAHAohTY.js';
5
5
  export { H as HaextensionConfig } from './config-D_HXjsEV.js';
6
6
  import 'drizzle-orm/sqlite-proxy';
7
7
 
@@ -194,6 +194,8 @@ declare const TAURI_COMMANDS: {
194
194
  readonly clientBlock: "external_client_block";
195
195
  readonly getAuthorizedClients: "external_get_authorized_clients";
196
196
  readonly revokeClient: "external_revoke_client";
197
+ readonly getSessionAuthorizations: "external_get_session_authorizations";
198
+ readonly revokeSessionAuthorization: "external_revoke_session_authorization";
197
199
  readonly getBlockedClients: "external_get_blocked_clients";
198
200
  readonly unblockClient: "external_unblock_client";
199
201
  readonly isClientBlocked: "external_is_client_blocked";
package/dist/index.js CHANGED
@@ -404,6 +404,18 @@ var ExternalConnectionState = /* @__PURE__ */ ((ExternalConnectionState2) => {
404
404
  ExternalConnectionState2["PAIRED"] = "paired";
405
405
  return ExternalConnectionState2;
406
406
  })(ExternalConnectionState || {});
407
+ var ExternalConnectionErrorCode = /* @__PURE__ */ ((ExternalConnectionErrorCode2) => {
408
+ ExternalConnectionErrorCode2["NONE"] = "none";
409
+ ExternalConnectionErrorCode2["CLIENT_NOT_AUTHORIZED"] = "client_not_authorized";
410
+ ExternalConnectionErrorCode2["CLIENT_BLOCKED"] = "client_blocked";
411
+ ExternalConnectionErrorCode2["CONNECTION_FAILED"] = "connection_failed";
412
+ ExternalConnectionErrorCode2["CONNECTION_TIMEOUT"] = "connection_timeout";
413
+ ExternalConnectionErrorCode2["CONNECTION_CLOSED"] = "connection_closed";
414
+ ExternalConnectionErrorCode2["DECRYPTION_FAILED"] = "decryption_failed";
415
+ ExternalConnectionErrorCode2["INVALID_MESSAGE"] = "invalid_message";
416
+ ExternalConnectionErrorCode2["UNKNOWN"] = "unknown";
417
+ return ExternalConnectionErrorCode2;
418
+ })(ExternalConnectionErrorCode || {});
407
419
  function isExternalClientConnected(state) {
408
420
  return state === "connected" /* CONNECTED */ || state === "pending_approval" /* PENDING_APPROVAL */ || state === "paired" /* PAIRED */;
409
421
  }
@@ -1293,9 +1305,12 @@ var TAURI_COMMANDS = {
1293
1305
  // Client authorization (unified API with remember flag)
1294
1306
  clientAllow: "external_client_allow",
1295
1307
  clientBlock: "external_client_block",
1296
- // Authorized clients management
1308
+ // Authorized clients management (permanent - stored in database)
1297
1309
  getAuthorizedClients: "external_get_authorized_clients",
1298
1310
  revokeClient: "external_revoke_client",
1311
+ // Session-based authorizations (temporary - cleared when haex-vault restarts)
1312
+ getSessionAuthorizations: "external_get_session_authorizations",
1313
+ revokeSessionAuthorization: "external_revoke_session_authorization",
1299
1314
  // Blocked clients management
1300
1315
  getBlockedClients: "external_get_blocked_clients",
1301
1316
  unblockClient: "external_unblock_client",
@@ -2484,6 +2499,7 @@ exports.DEFAULT_TIMEOUT = DEFAULT_TIMEOUT;
2484
2499
  exports.DatabaseAPI = DatabaseAPI;
2485
2500
  exports.EXTERNAL_EVENTS = EXTERNAL_EVENTS;
2486
2501
  exports.ErrorCode = ErrorCode;
2502
+ exports.ExternalConnectionErrorCode = ExternalConnectionErrorCode;
2487
2503
  exports.ExternalConnectionState = ExternalConnectionState;
2488
2504
  exports.FileSyncAPI = FileSyncAPI;
2489
2505
  exports.FilesystemAPI = FilesystemAPI;