@haex-space/vault-sdk 2.5.4 → 2.5.7

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,4 +1,4 @@
1
- import { D as DatabaseQueryResult, M as Migration, b as MigrationResult, W as WebRequestOptions, c as WebResponse, H as HaexHubConfig, a as ExtensionInfo, A as ApplicationContext, d as DatabasePermissionRequest, P as PermissionResponse, S as SearchResult, e as ExternalRequestHandler, f as ExternalResponse, g as EventCallback } from './types-mMVOhsmm.mjs';
1
+ import { D as DatabaseQueryResult, M as Migration, b as MigrationResult, W as WebRequestOptions, c as WebResponse, H as HaexHubConfig, a as ExtensionInfo, A as ApplicationContext, d as DatabasePermissionRequest, P as PermissionResponse, S as SearchResult, e as ExternalRequestHandler, f as ExternalResponse, g as EventCallback } from './types-CAHAohTY.mjs';
2
2
  import { SqliteRemoteDatabase } from 'drizzle-orm/sqlite-proxy';
3
3
 
4
4
  declare class StorageAPI {
@@ -1,4 +1,4 @@
1
- import { D as DatabaseQueryResult, M as Migration, b as MigrationResult, W as WebRequestOptions, c as WebResponse, H as HaexHubConfig, a as ExtensionInfo, A as ApplicationContext, d as DatabasePermissionRequest, P as PermissionResponse, S as SearchResult, e as ExternalRequestHandler, f as ExternalResponse, g as EventCallback } from './types-mMVOhsmm.js';
1
+ import { D as DatabaseQueryResult, M as Migration, b as MigrationResult, W as WebRequestOptions, c as WebResponse, H as HaexHubConfig, a as ExtensionInfo, A as ApplicationContext, d as DatabasePermissionRequest, P as PermissionResponse, S as SearchResult, e as ExternalRequestHandler, f as ExternalResponse, g as EventCallback } from './types-CAHAohTY.js';
2
2
  import { SqliteRemoteDatabase } from 'drizzle-orm/sqlite-proxy';
3
3
 
4
4
  declare class StorageAPI {
package/dist/index.d.mts CHANGED
@@ -1,7 +1,7 @@
1
- import { H as HaexVaultClient } from './client-Bw04hBmE.mjs';
2
- export { A as AddBackendOptions, m as AddSyncRuleOptions, C as CreateSpaceOptions, D as DatabaseAPI, n as DownloadFileOptions, c as FileInfo, b as FileSpace, a as FileSyncAPI, d as FileSyncState, F as FilesystemAPI, L as ListFilesOptions, P as PermissionsAPI, g as S3BackendConfig, e as StorageBackendInfo, f as StorageBackendType, i as SyncDirection, k as SyncError, l as SyncProgress, h as SyncRule, j as SyncStatus, U as UploadFileOptions, W as WebAPI } from './client-Bw04hBmE.mjs';
3
- import { E as ExtensionManifest, H as HaexHubConfig } from './types-mMVOhsmm.mjs';
4
- export { A as ApplicationContext, t as AuthorizedClient, B as BlockedClient, C as ContextChangedEvent, z as DEFAULT_TIMEOUT, o as DatabaseColumnInfo, m as DatabaseExecuteParams, k as DatabasePermission, d as DatabasePermissionRequest, l as DatabaseQueryParams, D as DatabaseQueryResult, n as DatabaseTableInfo, Q as EXTERNAL_EVENTS, y as ErrorCode, g as EventCallback, a as ExtensionInfo, v as ExternalAuthDecision, w as ExternalConnection, I as ExternalConnectionErrorCode, G as ExternalConnectionState, R as ExternalEvent, s as ExternalRequest, r as ExternalRequestEvent, e as ExternalRequestHandler, f as ExternalResponse, N as HAEXTENSION_EVENTS, j as HaexHubEvent, h as HaexHubRequest, i as HaexHubResponse, L as HaexVaultSdkError, O as HaextensionEvent, u as PendingAuthorization, P as PermissionResponse, x as PermissionStatus, p as SearchQuery, q as SearchRequestEvent, S as SearchResult, T as TABLE_SEPARATOR, W as WebRequestOptions, c as WebResponse, K as canExternalClientSendRequests, F as getTableName, J as isExternalClientConnected } from './types-mMVOhsmm.mjs';
1
+ import { H as HaexVaultClient } from './client-Bcysw57u.mjs';
2
+ export { A as AddBackendOptions, m as AddSyncRuleOptions, C as CreateSpaceOptions, D as DatabaseAPI, n as DownloadFileOptions, c as FileInfo, b as FileSpace, a as FileSyncAPI, d as FileSyncState, F as FilesystemAPI, L as ListFilesOptions, P as PermissionsAPI, g as S3BackendConfig, e as StorageBackendInfo, f as StorageBackendType, i as SyncDirection, k as SyncError, l as SyncProgress, h as SyncRule, j as SyncStatus, U as UploadFileOptions, W as WebAPI } from './client-Bcysw57u.mjs';
3
+ import { E as ExtensionManifest, H as HaexHubConfig } from './types-CAHAohTY.mjs';
4
+ export { A as ApplicationContext, t as AuthorizedClient, B as BlockedClient, C as ContextChangedEvent, F as DEFAULT_TIMEOUT, o as DatabaseColumnInfo, m as DatabaseExecuteParams, k as DatabasePermission, d as DatabasePermissionRequest, l as DatabaseQueryParams, D as DatabaseQueryResult, n as DatabaseTableInfo, R as EXTERNAL_EVENTS, z as ErrorCode, g as EventCallback, a as ExtensionInfo, v as ExternalAuthDecision, x as ExternalConnection, J as ExternalConnectionErrorCode, I as ExternalConnectionState, U as ExternalEvent, s as ExternalRequest, r as ExternalRequestEvent, e as ExternalRequestHandler, f as ExternalResponse, O as HAEXTENSION_EVENTS, j as HaexHubEvent, h as HaexHubRequest, i as HaexHubResponse, N as HaexVaultSdkError, Q as HaextensionEvent, u as PendingAuthorization, P as PermissionResponse, y as PermissionStatus, p as SearchQuery, q as SearchRequestEvent, S as SearchResult, w as SessionAuthorization, T as TABLE_SEPARATOR, W as WebRequestOptions, c as WebResponse, L as canExternalClientSendRequests, G as getTableName, K as isExternalClientConnected } from './types-CAHAohTY.mjs';
5
5
  export { H as HaextensionConfig } from './config-D_HXjsEV.mjs';
6
6
  import 'drizzle-orm/sqlite-proxy';
7
7
 
@@ -194,6 +194,8 @@ declare const TAURI_COMMANDS: {
194
194
  readonly clientBlock: "external_client_block";
195
195
  readonly getAuthorizedClients: "external_get_authorized_clients";
196
196
  readonly revokeClient: "external_revoke_client";
197
+ readonly getSessionAuthorizations: "external_get_session_authorizations";
198
+ readonly revokeSessionAuthorization: "external_revoke_session_authorization";
197
199
  readonly getBlockedClients: "external_get_blocked_clients";
198
200
  readonly unblockClient: "external_unblock_client";
199
201
  readonly isClientBlocked: "external_is_client_blocked";
package/dist/index.d.ts CHANGED
@@ -1,7 +1,7 @@
1
- import { H as HaexVaultClient } from './client-CJC-_fwd.js';
2
- export { A as AddBackendOptions, m as AddSyncRuleOptions, C as CreateSpaceOptions, D as DatabaseAPI, n as DownloadFileOptions, c as FileInfo, b as FileSpace, a as FileSyncAPI, d as FileSyncState, F as FilesystemAPI, L as ListFilesOptions, P as PermissionsAPI, g as S3BackendConfig, e as StorageBackendInfo, f as StorageBackendType, i as SyncDirection, k as SyncError, l as SyncProgress, h as SyncRule, j as SyncStatus, U as UploadFileOptions, W as WebAPI } from './client-CJC-_fwd.js';
3
- import { E as ExtensionManifest, H as HaexHubConfig } from './types-mMVOhsmm.js';
4
- export { A as ApplicationContext, t as AuthorizedClient, B as BlockedClient, C as ContextChangedEvent, z as DEFAULT_TIMEOUT, o as DatabaseColumnInfo, m as DatabaseExecuteParams, k as DatabasePermission, d as DatabasePermissionRequest, l as DatabaseQueryParams, D as DatabaseQueryResult, n as DatabaseTableInfo, Q as EXTERNAL_EVENTS, y as ErrorCode, g as EventCallback, a as ExtensionInfo, v as ExternalAuthDecision, w as ExternalConnection, I as ExternalConnectionErrorCode, G as ExternalConnectionState, R as ExternalEvent, s as ExternalRequest, r as ExternalRequestEvent, e as ExternalRequestHandler, f as ExternalResponse, N as HAEXTENSION_EVENTS, j as HaexHubEvent, h as HaexHubRequest, i as HaexHubResponse, L as HaexVaultSdkError, O as HaextensionEvent, u as PendingAuthorization, P as PermissionResponse, x as PermissionStatus, p as SearchQuery, q as SearchRequestEvent, S as SearchResult, T as TABLE_SEPARATOR, W as WebRequestOptions, c as WebResponse, K as canExternalClientSendRequests, F as getTableName, J as isExternalClientConnected } from './types-mMVOhsmm.js';
1
+ import { H as HaexVaultClient } from './client-K4BOBLQE.js';
2
+ export { A as AddBackendOptions, m as AddSyncRuleOptions, C as CreateSpaceOptions, D as DatabaseAPI, n as DownloadFileOptions, c as FileInfo, b as FileSpace, a as FileSyncAPI, d as FileSyncState, F as FilesystemAPI, L as ListFilesOptions, P as PermissionsAPI, g as S3BackendConfig, e as StorageBackendInfo, f as StorageBackendType, i as SyncDirection, k as SyncError, l as SyncProgress, h as SyncRule, j as SyncStatus, U as UploadFileOptions, W as WebAPI } from './client-K4BOBLQE.js';
3
+ import { E as ExtensionManifest, H as HaexHubConfig } from './types-CAHAohTY.js';
4
+ export { A as ApplicationContext, t as AuthorizedClient, B as BlockedClient, C as ContextChangedEvent, F as DEFAULT_TIMEOUT, o as DatabaseColumnInfo, m as DatabaseExecuteParams, k as DatabasePermission, d as DatabasePermissionRequest, l as DatabaseQueryParams, D as DatabaseQueryResult, n as DatabaseTableInfo, R as EXTERNAL_EVENTS, z as ErrorCode, g as EventCallback, a as ExtensionInfo, v as ExternalAuthDecision, x as ExternalConnection, J as ExternalConnectionErrorCode, I as ExternalConnectionState, U as ExternalEvent, s as ExternalRequest, r as ExternalRequestEvent, e as ExternalRequestHandler, f as ExternalResponse, O as HAEXTENSION_EVENTS, j as HaexHubEvent, h as HaexHubRequest, i as HaexHubResponse, N as HaexVaultSdkError, Q as HaextensionEvent, u as PendingAuthorization, P as PermissionResponse, y as PermissionStatus, p as SearchQuery, q as SearchRequestEvent, S as SearchResult, w as SessionAuthorization, T as TABLE_SEPARATOR, W as WebRequestOptions, c as WebResponse, L as canExternalClientSendRequests, G as getTableName, K as isExternalClientConnected } from './types-CAHAohTY.js';
5
5
  export { H as HaextensionConfig } from './config-D_HXjsEV.js';
6
6
  import 'drizzle-orm/sqlite-proxy';
7
7
 
@@ -194,6 +194,8 @@ declare const TAURI_COMMANDS: {
194
194
  readonly clientBlock: "external_client_block";
195
195
  readonly getAuthorizedClients: "external_get_authorized_clients";
196
196
  readonly revokeClient: "external_revoke_client";
197
+ readonly getSessionAuthorizations: "external_get_session_authorizations";
198
+ readonly revokeSessionAuthorization: "external_revoke_session_authorization";
197
199
  readonly getBlockedClients: "external_get_blocked_clients";
198
200
  readonly unblockClient: "external_unblock_client";
199
201
  readonly isClientBlocked: "external_is_client_blocked";
package/dist/index.js CHANGED
@@ -1216,11 +1216,11 @@ async function setupTauriEventListeners(ctx, log, onEvent, onContextChange) {
1216
1216
  log("Failed to setup context change listener:", error);
1217
1217
  }
1218
1218
  try {
1219
- await listen(HAEXTENSION_EVENTS.EXTERNAL_REQUEST, (event) => {
1219
+ await listen(EXTERNAL_EVENTS.REQUEST, (event) => {
1220
1220
  log("Received external request event:", event);
1221
1221
  if (event.payload) {
1222
1222
  onEvent({
1223
- type: HAEXTENSION_EVENTS.EXTERNAL_REQUEST,
1223
+ type: EXTERNAL_EVENTS.REQUEST,
1224
1224
  data: event.payload,
1225
1225
  timestamp: Date.now()
1226
1226
  });
@@ -1305,9 +1305,12 @@ var TAURI_COMMANDS = {
1305
1305
  // Client authorization (unified API with remember flag)
1306
1306
  clientAllow: "external_client_allow",
1307
1307
  clientBlock: "external_client_block",
1308
- // Authorized clients management
1308
+ // Authorized clients management (permanent - stored in database)
1309
1309
  getAuthorizedClients: "external_get_authorized_clients",
1310
1310
  revokeClient: "external_revoke_client",
1311
+ // Session-based authorizations (temporary - cleared when haex-vault restarts)
1312
+ getSessionAuthorizations: "external_get_session_authorizations",
1313
+ revokeSessionAuthorization: "external_revoke_session_authorization",
1311
1314
  // Blocked clients management
1312
1315
  getBlockedClients: "external_get_blocked_clients",
1313
1316
  unblockClient: "external_unblock_client",
@@ -1703,7 +1706,7 @@ function processEvent(event, log, eventListeners, onContextChanged, onExternalRe
1703
1706
  onContextChanged(contextEvent.data.context);
1704
1707
  log("Context updated:", contextEvent.data.context);
1705
1708
  }
1706
- if (event.type === HAEXTENSION_EVENTS.EXTERNAL_REQUEST) {
1709
+ if (event.type === EXTERNAL_EVENTS.REQUEST) {
1707
1710
  const externalEvent = event;
1708
1711
  onExternalRequest(externalEvent);
1709
1712
  return;