@haex-space/vault-sdk 3.1.0 → 3.2.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/{client-C0DPNG62.d.mts → client-GeColu97.d.mts} +263 -2
- package/dist/{client-B_B6rLIw.d.ts → client-z1jTcuQE.d.ts} +263 -2
- package/dist/index.d.mts +76 -6
- package/dist/index.d.ts +76 -6
- package/dist/index.js +212 -24
- package/dist/index.js.map +1 -1
- package/dist/index.mjs +209 -25
- package/dist/index.mjs.map +1 -1
- package/dist/node.d.mts +1 -1
- package/dist/node.d.ts +1 -1
- package/dist/nuxt.js +16 -6
- package/dist/nuxt.js.map +1 -1
- package/dist/nuxt.mjs +16 -6
- package/dist/nuxt.mjs.map +1 -1
- package/dist/react.d.mts +2 -2
- package/dist/react.d.ts +2 -2
- package/dist/react.js +205 -23
- package/dist/react.js.map +1 -1
- package/dist/react.mjs +205 -23
- package/dist/react.mjs.map +1 -1
- package/dist/runtime/nuxt.plugin.client.d.mts +2 -2
- package/dist/runtime/nuxt.plugin.client.d.ts +2 -2
- package/dist/runtime/nuxt.plugin.client.js +205 -27
- package/dist/runtime/nuxt.plugin.client.js.map +1 -1
- package/dist/runtime/nuxt.plugin.client.mjs +205 -27
- package/dist/runtime/nuxt.plugin.client.mjs.map +1 -1
- package/dist/svelte.d.mts +2 -2
- package/dist/svelte.d.ts +2 -2
- package/dist/svelte.js +205 -23
- package/dist/svelte.js.map +1 -1
- package/dist/svelte.mjs +205 -23
- package/dist/svelte.mjs.map +1 -1
- package/dist/{types-DmCSegdY.d.mts → types-CDMBvvjl.d.mts} +2 -0
- package/dist/{types-DmCSegdY.d.ts → types-CDMBvvjl.d.ts} +2 -0
- package/dist/vite.js +15 -5
- package/dist/vite.js.map +1 -1
- package/dist/vite.mjs +15 -5
- package/dist/vite.mjs.map +1 -1
- package/dist/vue.d.mts +2 -2
- package/dist/vue.d.ts +2 -2
- package/dist/vue.js +205 -23
- package/dist/vue.js.map +1 -1
- package/dist/vue.mjs +205 -23
- package/dist/vue.mjs.map +1 -1
- package/package.json +1 -1
package/dist/index.mjs
CHANGED
|
@@ -1047,6 +1047,40 @@ var SHELL_COMMANDS = {
|
|
|
1047
1047
|
close: "extension_shell_close"
|
|
1048
1048
|
};
|
|
1049
1049
|
|
|
1050
|
+
// src/commands/passwords.ts
|
|
1051
|
+
var PASSWORD_COMMANDS = {
|
|
1052
|
+
/** List items (no secrets) within the extension's tag scope */
|
|
1053
|
+
list: "extension_password_list",
|
|
1054
|
+
/** Read full item including secrets, by id */
|
|
1055
|
+
read: "extension_password_read",
|
|
1056
|
+
/** Create item — must include >=1 tag in scope */
|
|
1057
|
+
create: "extension_password_create",
|
|
1058
|
+
/** Update item — keeps >=1 tag in scope */
|
|
1059
|
+
update: "extension_password_update",
|
|
1060
|
+
/** Delete item — must be in scope */
|
|
1061
|
+
delete: "extension_password_delete"
|
|
1062
|
+
};
|
|
1063
|
+
|
|
1064
|
+
// src/commands/mail.ts
|
|
1065
|
+
var MAIL_COMMANDS = {
|
|
1066
|
+
/** LIST mailboxes + optional STATUS counts */
|
|
1067
|
+
listMailboxes: "extension_mail_list_mailboxes",
|
|
1068
|
+
/** Lightweight envelope fetch for list views */
|
|
1069
|
+
fetchEnvelopes: "extension_mail_fetch_envelopes",
|
|
1070
|
+
/** Full message fetch (envelope + body + attachment metadata) */
|
|
1071
|
+
fetchMessage: "extension_mail_fetch_message",
|
|
1072
|
+
/** Set or unset IMAP flags on a UID set */
|
|
1073
|
+
setFlags: "extension_mail_set_flags",
|
|
1074
|
+
/** MOVE messages between mailboxes (COPY+EXPUNGE fallback) */
|
|
1075
|
+
moveMessages: "extension_mail_move_messages",
|
|
1076
|
+
/** APPEND a base64-encoded RFC822 message into a mailbox */
|
|
1077
|
+
appendMessage: "extension_mail_append_message",
|
|
1078
|
+
/** SMTP send. Returns the assigned Message-ID. */
|
|
1079
|
+
sendMessage: "extension_mail_send_message",
|
|
1080
|
+
/** Build RFC822 bytes without sending (for Drafts via APPEND) */
|
|
1081
|
+
buildRfc822: "extension_mail_build_rfc822"
|
|
1082
|
+
};
|
|
1083
|
+
|
|
1050
1084
|
// src/commands/index.ts
|
|
1051
1085
|
var TAURI_COMMANDS = {
|
|
1052
1086
|
database: DATABASE_COMMANDS,
|
|
@@ -1059,7 +1093,9 @@ var TAURI_COMMANDS = {
|
|
|
1059
1093
|
remoteStorage: REMOTE_STORAGE_COMMANDS,
|
|
1060
1094
|
localsend: LOCALSEND_COMMANDS,
|
|
1061
1095
|
spaces: SPACE_COMMANDS,
|
|
1062
|
-
shell: SHELL_COMMANDS
|
|
1096
|
+
shell: SHELL_COMMANDS,
|
|
1097
|
+
passwords: PASSWORD_COMMANDS,
|
|
1098
|
+
mail: MAIL_COMMANDS
|
|
1063
1099
|
};
|
|
1064
1100
|
|
|
1065
1101
|
// src/api/storage.ts
|
|
@@ -1085,6 +1121,12 @@ var StorageAPI = class {
|
|
|
1085
1121
|
};
|
|
1086
1122
|
|
|
1087
1123
|
// src/api/database.ts
|
|
1124
|
+
function quoteIdent(identifier) {
|
|
1125
|
+
if (identifier.startsWith('"') && identifier.endsWith('"')) {
|
|
1126
|
+
return identifier;
|
|
1127
|
+
}
|
|
1128
|
+
return `"${identifier.replace(/"/g, '""')}"`;
|
|
1129
|
+
}
|
|
1088
1130
|
var DatabaseAPI = class {
|
|
1089
1131
|
constructor(client) {
|
|
1090
1132
|
this.client = client;
|
|
@@ -1115,11 +1157,11 @@ var DatabaseAPI = class {
|
|
|
1115
1157
|
});
|
|
1116
1158
|
}
|
|
1117
1159
|
async createTable(tableName, columns) {
|
|
1118
|
-
const query = `CREATE TABLE IF NOT EXISTS ${tableName} (${columns})`;
|
|
1160
|
+
const query = `CREATE TABLE IF NOT EXISTS ${quoteIdent(tableName)} (${columns})`;
|
|
1119
1161
|
await this.execute(query);
|
|
1120
1162
|
}
|
|
1121
1163
|
async dropTable(tableName) {
|
|
1122
|
-
const query = `DROP TABLE IF EXISTS ${tableName}`;
|
|
1164
|
+
const query = `DROP TABLE IF EXISTS ${quoteIdent(tableName)}`;
|
|
1123
1165
|
await this.execute(query);
|
|
1124
1166
|
}
|
|
1125
1167
|
/**
|
|
@@ -1148,18 +1190,17 @@ var DatabaseAPI = class {
|
|
|
1148
1190
|
async insert(tableName, data) {
|
|
1149
1191
|
const keys = Object.keys(data);
|
|
1150
1192
|
const values = Object.values(data);
|
|
1193
|
+
const quotedCols = keys.map(quoteIdent).join(", ");
|
|
1151
1194
|
const placeholders = keys.map(() => "?").join(", ");
|
|
1152
|
-
const query = `INSERT INTO ${tableName} (${
|
|
1153
|
-
", "
|
|
1154
|
-
)}) VALUES (${placeholders})`;
|
|
1195
|
+
const query = `INSERT INTO ${quoteIdent(tableName)} (${quotedCols}) VALUES (${placeholders})`;
|
|
1155
1196
|
const result = await this.execute(query, values);
|
|
1156
1197
|
return result.lastInsertId ?? -1;
|
|
1157
1198
|
}
|
|
1158
1199
|
async update(tableName, data, where, whereParams) {
|
|
1159
1200
|
const keys = Object.keys(data);
|
|
1160
1201
|
const values = Object.values(data);
|
|
1161
|
-
const setClause = keys.map((key) => `${key} = ?`).join(", ");
|
|
1162
|
-
const query = `UPDATE ${tableName} SET ${setClause} WHERE ${where}`;
|
|
1202
|
+
const setClause = keys.map((key) => `${quoteIdent(key)} = ?`).join(", ");
|
|
1203
|
+
const query = `UPDATE ${quoteIdent(tableName)} SET ${setClause} WHERE ${where}`;
|
|
1163
1204
|
const result = await this.execute(query, [
|
|
1164
1205
|
...values,
|
|
1165
1206
|
...whereParams || []
|
|
@@ -1167,12 +1208,12 @@ var DatabaseAPI = class {
|
|
|
1167
1208
|
return result.rowsAffected;
|
|
1168
1209
|
}
|
|
1169
1210
|
async delete(tableName, where, whereParams) {
|
|
1170
|
-
const query = `DELETE FROM ${tableName} WHERE ${where}`;
|
|
1211
|
+
const query = `DELETE FROM ${quoteIdent(tableName)} WHERE ${where}`;
|
|
1171
1212
|
const result = await this.execute(query, whereParams);
|
|
1172
1213
|
return result.rowsAffected;
|
|
1173
1214
|
}
|
|
1174
1215
|
async count(tableName, where, whereParams) {
|
|
1175
|
-
const query = where ? `SELECT COUNT(*) as count FROM ${tableName} WHERE ${where}` : `SELECT COUNT(*) as count FROM ${tableName}`;
|
|
1216
|
+
const query = where ? `SELECT COUNT(*) as count FROM ${quoteIdent(tableName)} WHERE ${where}` : `SELECT COUNT(*) as count FROM ${quoteIdent(tableName)}`;
|
|
1176
1217
|
const result = await this.queryOne(query, whereParams);
|
|
1177
1218
|
return result?.count ?? 0;
|
|
1178
1219
|
}
|
|
@@ -2003,6 +2044,140 @@ var ShellAPI = class {
|
|
|
2003
2044
|
}
|
|
2004
2045
|
};
|
|
2005
2046
|
|
|
2047
|
+
// src/api/passwords.ts
|
|
2048
|
+
var PasswordsAPI = class {
|
|
2049
|
+
constructor(client) {
|
|
2050
|
+
this.client = client;
|
|
2051
|
+
}
|
|
2052
|
+
/** List items in scope — summaries only, no secrets. */
|
|
2053
|
+
async listAsync() {
|
|
2054
|
+
return this.client.request(
|
|
2055
|
+
PASSWORD_COMMANDS.list,
|
|
2056
|
+
{}
|
|
2057
|
+
);
|
|
2058
|
+
}
|
|
2059
|
+
/** Read a single item by id with full secrets. */
|
|
2060
|
+
async readAsync(itemId) {
|
|
2061
|
+
return this.client.request(PASSWORD_COMMANDS.read, {
|
|
2062
|
+
itemId
|
|
2063
|
+
});
|
|
2064
|
+
}
|
|
2065
|
+
/**
|
|
2066
|
+
* Create a new password item. `input.tags` must contain at least one
|
|
2067
|
+
* tag within the extension's permission scope, otherwise the write
|
|
2068
|
+
* is rejected as a security violation.
|
|
2069
|
+
*
|
|
2070
|
+
* Returns the new item id.
|
|
2071
|
+
*/
|
|
2072
|
+
async createAsync(input) {
|
|
2073
|
+
return this.client.request(PASSWORD_COMMANDS.create, { input });
|
|
2074
|
+
}
|
|
2075
|
+
/**
|
|
2076
|
+
* Update an existing item. The item must already be in scope, and
|
|
2077
|
+
* the new tag set must keep at least one tag in scope (extensions
|
|
2078
|
+
* cannot orphan an item out of their own reach).
|
|
2079
|
+
*/
|
|
2080
|
+
async updateAsync(itemId, input) {
|
|
2081
|
+
return this.client.request(PASSWORD_COMMANDS.update, {
|
|
2082
|
+
itemId,
|
|
2083
|
+
input
|
|
2084
|
+
});
|
|
2085
|
+
}
|
|
2086
|
+
/** Delete an item by id. Item must be in scope. */
|
|
2087
|
+
async deleteAsync(itemId) {
|
|
2088
|
+
return this.client.request(PASSWORD_COMMANDS.delete, { itemId });
|
|
2089
|
+
}
|
|
2090
|
+
};
|
|
2091
|
+
|
|
2092
|
+
// src/api/mail.ts
|
|
2093
|
+
var MailAPI = class {
|
|
2094
|
+
constructor(client) {
|
|
2095
|
+
this.client = client;
|
|
2096
|
+
}
|
|
2097
|
+
/**
|
|
2098
|
+
* LIST mailboxes for an IMAP account. Pass `includeStatus=true` for
|
|
2099
|
+
* EXISTS/UNSEEN/UIDVALIDITY/UIDNEXT per box (one extra round-trip
|
|
2100
|
+
* per mailbox — fine for typical accounts, expensive for large
|
|
2101
|
+
* trees).
|
|
2102
|
+
*/
|
|
2103
|
+
async listMailboxesAsync(imap, options = {}) {
|
|
2104
|
+
return this.client.request(MAIL_COMMANDS.listMailboxes, {
|
|
2105
|
+
imap,
|
|
2106
|
+
reference: options.reference,
|
|
2107
|
+
pattern: options.pattern,
|
|
2108
|
+
includeStatus: options.includeStatus
|
|
2109
|
+
});
|
|
2110
|
+
}
|
|
2111
|
+
/** Fetch lightweight envelopes for a mailbox + range (for list views). */
|
|
2112
|
+
async fetchEnvelopesAsync(imap, mailbox, range) {
|
|
2113
|
+
return this.client.request(
|
|
2114
|
+
MAIL_COMMANDS.fetchEnvelopes,
|
|
2115
|
+
{ imap, mailbox, range }
|
|
2116
|
+
);
|
|
2117
|
+
}
|
|
2118
|
+
/** Fetch a full message (envelope + body + attachment metadata) by UID. */
|
|
2119
|
+
async fetchMessageAsync(imap, mailbox, uid) {
|
|
2120
|
+
return this.client.request(MAIL_COMMANDS.fetchMessage, {
|
|
2121
|
+
imap,
|
|
2122
|
+
mailbox,
|
|
2123
|
+
uid
|
|
2124
|
+
});
|
|
2125
|
+
}
|
|
2126
|
+
/**
|
|
2127
|
+
* Set or unset IMAP flags. Use `flags=["\\Seen"]` + `add=true` to
|
|
2128
|
+
* mark messages as read; `add=false` removes the flag(s).
|
|
2129
|
+
*/
|
|
2130
|
+
async setFlagsAsync(imap, mailbox, uids, flags, add) {
|
|
2131
|
+
return this.client.request(MAIL_COMMANDS.setFlags, {
|
|
2132
|
+
imap,
|
|
2133
|
+
mailbox,
|
|
2134
|
+
uids,
|
|
2135
|
+
flags,
|
|
2136
|
+
add
|
|
2137
|
+
});
|
|
2138
|
+
}
|
|
2139
|
+
/** Move messages between mailboxes. Falls back to COPY+EXPUNGE on servers without MOVE. */
|
|
2140
|
+
async moveMessagesAsync(imap, sourceMailbox, destinationMailbox, uids) {
|
|
2141
|
+
return this.client.request(MAIL_COMMANDS.moveMessages, {
|
|
2142
|
+
imap,
|
|
2143
|
+
sourceMailbox,
|
|
2144
|
+
destinationMailbox,
|
|
2145
|
+
uids
|
|
2146
|
+
});
|
|
2147
|
+
}
|
|
2148
|
+
/**
|
|
2149
|
+
* APPEND a base64-encoded RFC822 message into a mailbox. Combine
|
|
2150
|
+
* with `buildRfc822Async` to save drafts, or with the bytes returned
|
|
2151
|
+
* after `sendMessageAsync` to mirror the sent copy into "Sent".
|
|
2152
|
+
*/
|
|
2153
|
+
async appendMessageAsync(imap, mailbox, rfc822Base64, flags) {
|
|
2154
|
+
return this.client.request(MAIL_COMMANDS.appendMessage, {
|
|
2155
|
+
imap,
|
|
2156
|
+
mailbox,
|
|
2157
|
+
rfc822Base64,
|
|
2158
|
+
flags
|
|
2159
|
+
});
|
|
2160
|
+
}
|
|
2161
|
+
/** Send a message via SMTP. Returns the assigned Message-ID (no angle brackets). */
|
|
2162
|
+
async sendMessageAsync(smtp, message) {
|
|
2163
|
+
return this.client.request(MAIL_COMMANDS.sendMessage, {
|
|
2164
|
+
smtp,
|
|
2165
|
+
message
|
|
2166
|
+
});
|
|
2167
|
+
}
|
|
2168
|
+
/**
|
|
2169
|
+
* Build RFC822 bytes for a message without sending — useful for
|
|
2170
|
+
* drafts that get APPENDed to a "Drafts" folder. Permission-wise
|
|
2171
|
+
* this is a fetch operation (no SMTP host involved).
|
|
2172
|
+
*/
|
|
2173
|
+
async buildRfc822Async(imapHost, message) {
|
|
2174
|
+
return this.client.request(MAIL_COMMANDS.buildRfc822, {
|
|
2175
|
+
imapHost,
|
|
2176
|
+
message
|
|
2177
|
+
});
|
|
2178
|
+
}
|
|
2179
|
+
};
|
|
2180
|
+
|
|
2006
2181
|
// src/client/tableName.ts
|
|
2007
2182
|
function validatePublicKey(publicKey) {
|
|
2008
2183
|
if (!publicKey || typeof publicKey !== "string" || publicKey.trim() === "") {
|
|
@@ -2359,7 +2534,7 @@ async function initIframeMode(ctx, log, messageHandler, request) {
|
|
|
2359
2534
|
publicKey: ctx.config.manifest.publicKey,
|
|
2360
2535
|
name: ctx.config.manifest.name,
|
|
2361
2536
|
version: ctx.config.manifest.version,
|
|
2362
|
-
displayName: ctx.config.manifest.name
|
|
2537
|
+
displayName: ctx.config.manifest.displayName ?? ctx.config.manifest.name
|
|
2363
2538
|
};
|
|
2364
2539
|
log("Extension info loaded from manifest:", ctx.state.extensionInfo);
|
|
2365
2540
|
}
|
|
@@ -2550,11 +2725,10 @@ function processEvent(event, log, eventListeners, onContextChanged, onExternalRe
|
|
|
2550
2725
|
emitEvent(event, log, eventListeners);
|
|
2551
2726
|
}
|
|
2552
2727
|
function emitEvent(event, log, eventListeners) {
|
|
2553
|
-
|
|
2554
|
-
|
|
2555
|
-
log("Event received:", event);
|
|
2728
|
+
log("emitEvent called with:", event.type, event);
|
|
2729
|
+
log("Registered event types:", Array.from(eventListeners.keys()));
|
|
2556
2730
|
const listeners = eventListeners.get(event.type);
|
|
2557
|
-
|
|
2731
|
+
log("Listeners for", event.type, ":", listeners?.size ?? 0);
|
|
2558
2732
|
if (listeners) {
|
|
2559
2733
|
listeners.forEach((callback) => callback(event));
|
|
2560
2734
|
}
|
|
@@ -2651,9 +2825,9 @@ function registerExternalHandler(action, handler, handlers, log) {
|
|
|
2651
2825
|
};
|
|
2652
2826
|
}
|
|
2653
2827
|
async function handleExternalRequest(request, handlers, respond, log) {
|
|
2654
|
-
|
|
2655
|
-
|
|
2656
|
-
|
|
2828
|
+
log("handleExternalRequest called");
|
|
2829
|
+
log("Request:", request);
|
|
2830
|
+
log("Available handlers:", Array.from(handlers.keys()));
|
|
2657
2831
|
log(`[ExternalRequest] Received request: ${request.action} from ${request.publicKey.substring(0, 20)}...`);
|
|
2658
2832
|
const handler = handlers.get(request.action);
|
|
2659
2833
|
if (!handler) {
|
|
@@ -2679,7 +2853,6 @@ async function handleExternalRequest(request, handlers, respond, log) {
|
|
|
2679
2853
|
}
|
|
2680
2854
|
}
|
|
2681
2855
|
async function respondToExternalRequest(response, request) {
|
|
2682
|
-
console.log("[SDK Debug] respondToExternalRequest called with:", JSON.stringify(response, null, 2));
|
|
2683
2856
|
await request(EXTERNAL_BRIDGE_COMMANDS.respond, response);
|
|
2684
2857
|
}
|
|
2685
2858
|
|
|
@@ -2737,11 +2910,17 @@ var HaexVaultSdk = class {
|
|
|
2737
2910
|
this.localsend = new LocalSendAPI(this);
|
|
2738
2911
|
this.spaces = new SpacesAPI(this);
|
|
2739
2912
|
this.shell = new ShellAPI(this);
|
|
2913
|
+
this.passwords = new PasswordsAPI(this);
|
|
2914
|
+
this.mail = new MailAPI(this);
|
|
2740
2915
|
installConsoleForwarding(this.config.debug);
|
|
2741
|
-
this.readyPromise = new Promise((resolve) => {
|
|
2916
|
+
this.readyPromise = new Promise((resolve, reject) => {
|
|
2742
2917
|
this.resolveReady = resolve;
|
|
2918
|
+
this.rejectReady = reject;
|
|
2919
|
+
});
|
|
2920
|
+
this.init().catch((error) => {
|
|
2921
|
+
this.log("Init failed:", error);
|
|
2922
|
+
this.rejectReady(error);
|
|
2743
2923
|
});
|
|
2744
|
-
this.init();
|
|
2745
2924
|
}
|
|
2746
2925
|
// ==========================================================================
|
|
2747
2926
|
// Lifecycle
|
|
@@ -2769,9 +2948,14 @@ var HaexVaultSdk = class {
|
|
|
2769
2948
|
return this.setupPromise;
|
|
2770
2949
|
}
|
|
2771
2950
|
destroy() {
|
|
2772
|
-
if (this.messageHandler) {
|
|
2773
|
-
|
|
2951
|
+
if (this.messageHandler && this.hostPort) {
|
|
2952
|
+
this.hostPort.removeEventListener("message", this.messageHandler);
|
|
2953
|
+
}
|
|
2954
|
+
if (this.hostPort) {
|
|
2955
|
+
this.hostPort.close();
|
|
2956
|
+
this.hostPort = null;
|
|
2774
2957
|
}
|
|
2958
|
+
this.messageHandler = null;
|
|
2775
2959
|
this.pendingRequests.forEach(({ timeout }) => clearTimeout(timeout));
|
|
2776
2960
|
this.pendingRequests.clear();
|
|
2777
2961
|
this.eventListeners.clear();
|
|
@@ -2999,7 +3183,7 @@ var HaexVaultSdk = class {
|
|
|
2999
3183
|
publicKey: this.config.manifest.publicKey,
|
|
3000
3184
|
name: this.config.manifest.name,
|
|
3001
3185
|
version: this.config.manifest.version,
|
|
3002
|
-
displayName: this.config.manifest.name
|
|
3186
|
+
displayName: this.config.manifest.displayName ?? this.config.manifest.name
|
|
3003
3187
|
};
|
|
3004
3188
|
this.notifySubscribersInternal();
|
|
3005
3189
|
}
|
|
@@ -3654,6 +3838,6 @@ function createHaexVaultSdk(config = {}) {
|
|
|
3654
3838
|
return new HaexVaultSdk(config);
|
|
3655
3839
|
}
|
|
3656
3840
|
|
|
3657
|
-
export { COSE_ALGORITHM, DEFAULT_TIMEOUT, DatabaseAPI, EXTERNAL_EVENTS, ErrorCode, ExternalConnectionErrorCode, ExternalConnectionState, FilesystemAPI, HAEXSPACE_MESSAGE_TYPES, HAEXTENSION_EVENTS, HaexVaultSdk, HaexVaultSdkError, KEY_AGREEMENT_ALGO, KnownPath, LOCALSEND_EVENTS, LocalSendAPI, PermissionErrorCode, PermissionStatus, PermissionsAPI, RemoteStorageAPI, SHELL_EVENTS, SIGNING_ALGO, SPACE_COMMANDS, ShellAPI, SpacesAPI, TABLE_SEPARATOR, TAURI_COMMANDS, WebAPI, arrayBufferToBase64, base58btcDecode, base58btcEncode, base64ToArrayBuffer, canExternalClientSendRequests, createHaexVaultSdk, decryptCrdtData, decryptPrivateKeyAsync, decryptSpaceNameAsync, decryptString, decryptVaultKey, decryptVaultName, decryptWithPrivateKeyAsync, deriveKeyFromPassword, didKeyToPublicKeyAsync, encryptCrdtData, encryptPrivateKeyAsync, encryptSpaceNameAsync, encryptString, encryptVaultKey, encryptWithPublicKeyAsync, exportKeyPairAsync, exportPrivateKeyAsync, exportPublicKeyAsync, exportPublicKeyCoseAsync, exportUserKeypairAsync, generateCredentialId, generateIdentityAsync, generatePasskeyPairAsync, generateSpaceKey, generateUserKeypairAsync, generateVaultKey, getTableName, hexToBytes, importPrivateKeyAsync, importPrivateKeyForKeyAgreementAsync, importPublicKeyAsync, importPublicKeyForKeyAgreementAsync, importUserPrivateKeyAsync, importUserPublicKeyAsync, installBaseTag, installCookiePolyfill, installHistoryPolyfill, installLocalStoragePolyfill, installPolyfills, installSessionStoragePolyfill, isExternalClientConnected, isPermissionDeniedError, isPermissionError, isPermissionPromptError, publicKeyToDidKeyAsync, signClaimPresentationAsync, signRecordAsync, signSpaceChallengeAsync, signWithPasskeyAsync, sortObjectKeysRecursively, unwrapKey, verifyClaimPresentationAsync, verifyExtensionSignature, verifyRecordSignatureAsync, verifySpaceChallengeAsync, verifyWithPasskeyAsync, wrapKey };
|
|
3841
|
+
export { COSE_ALGORITHM, DEFAULT_TIMEOUT, DatabaseAPI, EXTERNAL_EVENTS, ErrorCode, ExternalConnectionErrorCode, ExternalConnectionState, FilesystemAPI, HAEXSPACE_MESSAGE_TYPES, HAEXTENSION_EVENTS, HaexVaultSdk, HaexVaultSdkError, KEY_AGREEMENT_ALGO, KnownPath, LOCALSEND_EVENTS, LocalSendAPI, MAIL_COMMANDS, MailAPI, PASSWORD_COMMANDS, PasswordsAPI, PermissionErrorCode, PermissionStatus, PermissionsAPI, RemoteStorageAPI, SHELL_EVENTS, SIGNING_ALGO, SPACE_COMMANDS, ShellAPI, SpacesAPI, TABLE_SEPARATOR, TAURI_COMMANDS, WebAPI, arrayBufferToBase64, base58btcDecode, base58btcEncode, base64ToArrayBuffer, canExternalClientSendRequests, createHaexVaultSdk, decryptCrdtData, decryptPrivateKeyAsync, decryptSpaceNameAsync, decryptString, decryptVaultKey, decryptVaultName, decryptWithPrivateKeyAsync, deriveKeyFromPassword, didKeyToPublicKeyAsync, encryptCrdtData, encryptPrivateKeyAsync, encryptSpaceNameAsync, encryptString, encryptVaultKey, encryptWithPublicKeyAsync, exportKeyPairAsync, exportPrivateKeyAsync, exportPublicKeyAsync, exportPublicKeyCoseAsync, exportUserKeypairAsync, generateCredentialId, generateIdentityAsync, generatePasskeyPairAsync, generateSpaceKey, generateUserKeypairAsync, generateVaultKey, getTableName, hexToBytes, importPrivateKeyAsync, importPrivateKeyForKeyAgreementAsync, importPublicKeyAsync, importPublicKeyForKeyAgreementAsync, importUserPrivateKeyAsync, importUserPublicKeyAsync, installBaseTag, installCookiePolyfill, installHistoryPolyfill, installLocalStoragePolyfill, installPolyfills, installSessionStoragePolyfill, isExternalClientConnected, isPermissionDeniedError, isPermissionError, isPermissionPromptError, publicKeyToDidKeyAsync, signClaimPresentationAsync, signRecordAsync, signSpaceChallengeAsync, signWithPasskeyAsync, sortObjectKeysRecursively, unwrapKey, verifyClaimPresentationAsync, verifyExtensionSignature, verifyRecordSignatureAsync, verifySpaceChallengeAsync, verifyWithPasskeyAsync, wrapKey };
|
|
3658
3842
|
//# sourceMappingURL=index.mjs.map
|
|
3659
3843
|
//# sourceMappingURL=index.mjs.map
|