chrome-types 0.1.153 → 0.1.155
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/_all.d.ts +79 -2
- package/index.d.ts +79 -2
- package/package.json +2 -2
package/_all.d.ts
CHANGED
|
@@ -14,8 +14,8 @@
|
|
|
14
14
|
* limitations under the License.
|
|
15
15
|
*/
|
|
16
16
|
|
|
17
|
-
// Generated on
|
|
18
|
-
// Built at
|
|
17
|
+
// Generated on Thu Dec 15 2022 22:27:57 GMT+0000 (Coordinated Universal Time)
|
|
18
|
+
// Built at 87da37160ce98a019c47f8eb44f91ec49b750236
|
|
19
19
|
|
|
20
20
|
// Includes all types, including MV2 + Platform Apps APIs.
|
|
21
21
|
|
|
@@ -3227,6 +3227,11 @@ declare namespace chrome {
|
|
|
3227
3227
|
*/
|
|
3228
3228
|
suspendMedia(): void;
|
|
3229
3229
|
|
|
3230
|
+
/**
|
|
3231
|
+
* Simulates long click on node.
|
|
3232
|
+
*/
|
|
3233
|
+
longClick(): void;
|
|
3234
|
+
|
|
3230
3235
|
/**
|
|
3231
3236
|
* Scrolls this scrollable container backward.
|
|
3232
3237
|
*
|
|
@@ -12473,6 +12478,52 @@ declare namespace chrome {
|
|
|
12473
12478
|
softwareBackedSubtleCrypto: SubtleCrypto;
|
|
12474
12479
|
}
|
|
12475
12480
|
|
|
12481
|
+
/**
|
|
12482
|
+
* Whether to use the Enterprise User Key or the Enterprise Machine Key.
|
|
12483
|
+
*
|
|
12484
|
+
* @since Pending
|
|
12485
|
+
*/
|
|
12486
|
+
export type Scope = "USER" | "MACHINE";
|
|
12487
|
+
|
|
12488
|
+
/**
|
|
12489
|
+
* Type of key to generate.
|
|
12490
|
+
*
|
|
12491
|
+
* @since Pending
|
|
12492
|
+
*/
|
|
12493
|
+
export type Algorithm = "RSA" | "ECDSA";
|
|
12494
|
+
|
|
12495
|
+
/**
|
|
12496
|
+
* @since Pending
|
|
12497
|
+
*/
|
|
12498
|
+
export interface RegisterKeyOptions {
|
|
12499
|
+
|
|
12500
|
+
/**
|
|
12501
|
+
* Which algorithm the registered key should use.
|
|
12502
|
+
*/
|
|
12503
|
+
algorithm: Algorithm;
|
|
12504
|
+
}
|
|
12505
|
+
|
|
12506
|
+
/**
|
|
12507
|
+
* @since Pending
|
|
12508
|
+
*/
|
|
12509
|
+
export interface ChallengeKeyOptions {
|
|
12510
|
+
|
|
12511
|
+
/**
|
|
12512
|
+
* A challenge as emitted by the Verified Access Web API.
|
|
12513
|
+
*/
|
|
12514
|
+
challenge: ArrayBuffer;
|
|
12515
|
+
|
|
12516
|
+
/**
|
|
12517
|
+
* If present, registers the challenged key with the specified `scope`'s token. The key can then be associated with a certificate and used like any other signing key. Subsequent calls to this function will then generate a new Enterprise Key in the specified `scope`.
|
|
12518
|
+
*/
|
|
12519
|
+
registerKey?: RegisterKeyOptions;
|
|
12520
|
+
|
|
12521
|
+
/**
|
|
12522
|
+
* Which Enterprise Key to challenge.
|
|
12523
|
+
*/
|
|
12524
|
+
scope: Scope;
|
|
12525
|
+
}
|
|
12526
|
+
|
|
12476
12527
|
/**
|
|
12477
12528
|
* Returns the available Tokens. In a regular user's session the list will always contain the user's token with `id` `"user"`. If a system-wide TPM token is available, the returned list will also contain the system-wide token with `id` `"system"`. The system-wide token will be the same for all sessions on this device (device in the sense of e.g. a Chromebook).
|
|
12478
12529
|
*
|
|
@@ -12538,12 +12589,36 @@ declare namespace chrome {
|
|
|
12538
12589
|
callback?: () => void,
|
|
12539
12590
|
): void;
|
|
12540
12591
|
|
|
12592
|
+
/**
|
|
12593
|
+
* Similar to `challengeMachineKey` and `challengeUserKey`, but allows specifying the algorithm of a registered key. Challenges a hardware-backed Enterprise Machine Key and emits the response as part of a remote attestation protocol. Only useful on Chrome OS and in conjunction with the Verified Access Web API which both issues challenges and verifies responses.
|
|
12594
|
+
*
|
|
12595
|
+
* A successful verification by the Verified Access Web API is a strong signal that the current device is a legitimate Chrome OS device, the current device is managed by the domain specified during verification, the current signed-in user is managed by the domain specified during verification, and the current device state complies with enterprise device policy. For example, a policy may specify that the device must not be in developer mode. Any device identity emitted by the verification is tightly bound to the hardware of the current device. If `"user"` Scope is specified, the identity is also tighly bound to the current signed-in user.
|
|
12596
|
+
*
|
|
12597
|
+
* This function is highly restricted and will fail if the current device is not managed, the current user is not managed, or if this operation has not explicitly been enabled for the caller by enterprise device policy. The challenged key does not reside in the `"system"` or `"user"` token and is not accessible by any other API.
|
|
12598
|
+
*
|
|
12599
|
+
* @param options Object containing the fields defined in {@link ChallengeKeyOptions}.
|
|
12600
|
+
* @param callback Called back with the challenge response.
|
|
12601
|
+
* @since Pending
|
|
12602
|
+
*/
|
|
12603
|
+
export function challengeKey(
|
|
12604
|
+
|
|
12605
|
+
options: ChallengeKeyOptions,
|
|
12606
|
+
|
|
12607
|
+
/**
|
|
12608
|
+
* @param response The challenge response.
|
|
12609
|
+
*/
|
|
12610
|
+
callback: (
|
|
12611
|
+
response: ArrayBuffer,
|
|
12612
|
+
) => void,
|
|
12613
|
+
): void;
|
|
12614
|
+
|
|
12541
12615
|
/**
|
|
12542
12616
|
* Challenges a hardware-backed Enterprise Machine Key and emits the response as part of a remote attestation protocol. Only useful on Chrome OS and in conjunction with the Verified Access Web API which both issues challenges and verifies responses. A successful verification by the Verified Access Web API is a strong signal of all of the following: \* The current device is a legitimate Chrome OS device. \* The current device is managed by the domain specified during verification. \* The current signed-in user is managed by the domain specified during verification. \* The current device state complies with enterprise device policy. For example, a policy may specify that the device must not be in developer mode. \* Any device identity emitted by the verification is tightly bound to the hardware of the current device. This function is highly restricted and will fail if the current device is not managed, the current user is not managed, or if this operation has not explicitly been enabled for the caller by enterprise device policy. The Enterprise Machine Key does not reside in the `"system"` token and is not accessible by any other API.
|
|
12543
12617
|
*
|
|
12544
12618
|
* @param challenge A challenge as emitted by the Verified Access Web API.
|
|
12545
12619
|
* @param registerKey If set, the current Enterprise Machine Key is registered with the `"system"` token and relinquishes the Enterprise Machine Key role. The key can then be associated with a certificate and used like any other signing key. This key is 2048-bit RSA. Subsequent calls to this function will then generate a new Enterprise Machine Key.
|
|
12546
12620
|
* @param callback Called back with the challenge response.
|
|
12621
|
+
* @deprecated Use {@link challengeKey} instead.
|
|
12547
12622
|
* @since Chrome 50
|
|
12548
12623
|
*/
|
|
12549
12624
|
export function challengeMachineKey(
|
|
@@ -12568,6 +12643,7 @@ declare namespace chrome {
|
|
|
12568
12643
|
*
|
|
12569
12644
|
* @param challenge A challenge as emitted by the Verified Access Web API.
|
|
12570
12645
|
* @param callback Called back with the challenge response.
|
|
12646
|
+
* @deprecated Use {@link challengeKey} instead.
|
|
12571
12647
|
* @since Chrome 50
|
|
12572
12648
|
*/
|
|
12573
12649
|
export function challengeMachineKey(
|
|
@@ -12588,6 +12664,7 @@ declare namespace chrome {
|
|
|
12588
12664
|
* @param challenge A challenge as emitted by the Verified Access Web API.
|
|
12589
12665
|
* @param registerKey If set, the current Enterprise User Key is registered with the `"user"` token and relinquishes the Enterprise User Key role. The key can then be associated with a certificate and used like any other signing key. This key is 2048-bit RSA. Subsequent calls to this function will then generate a new Enterprise User Key.
|
|
12590
12666
|
* @param callback Called back with the challenge response.
|
|
12667
|
+
* @deprecated Use {@link challengeKey} instead.
|
|
12591
12668
|
* @since Chrome 50
|
|
12592
12669
|
*/
|
|
12593
12670
|
export function challengeUserKey(
|
package/index.d.ts
CHANGED
|
@@ -14,8 +14,8 @@
|
|
|
14
14
|
* limitations under the License.
|
|
15
15
|
*/
|
|
16
16
|
|
|
17
|
-
// Generated on
|
|
18
|
-
// Built at
|
|
17
|
+
// Generated on Thu Dec 15 2022 22:27:52 GMT+0000 (Coordinated Universal Time)
|
|
18
|
+
// Built at 87da37160ce98a019c47f8eb44f91ec49b750236
|
|
19
19
|
|
|
20
20
|
// Includes MV3+ APIs only.
|
|
21
21
|
|
|
@@ -2477,6 +2477,11 @@ declare namespace chrome {
|
|
|
2477
2477
|
*/
|
|
2478
2478
|
suspendMedia(): void;
|
|
2479
2479
|
|
|
2480
|
+
/**
|
|
2481
|
+
* Simulates long click on node.
|
|
2482
|
+
*/
|
|
2483
|
+
longClick(): void;
|
|
2484
|
+
|
|
2480
2485
|
/**
|
|
2481
2486
|
* Scrolls this scrollable container backward.
|
|
2482
2487
|
*
|
|
@@ -8659,6 +8664,52 @@ declare namespace chrome {
|
|
|
8659
8664
|
softwareBackedSubtleCrypto: SubtleCrypto;
|
|
8660
8665
|
}
|
|
8661
8666
|
|
|
8667
|
+
/**
|
|
8668
|
+
* Whether to use the Enterprise User Key or the Enterprise Machine Key.
|
|
8669
|
+
*
|
|
8670
|
+
* @since Pending
|
|
8671
|
+
*/
|
|
8672
|
+
export type Scope = "USER" | "MACHINE";
|
|
8673
|
+
|
|
8674
|
+
/**
|
|
8675
|
+
* Type of key to generate.
|
|
8676
|
+
*
|
|
8677
|
+
* @since Pending
|
|
8678
|
+
*/
|
|
8679
|
+
export type Algorithm = "RSA" | "ECDSA";
|
|
8680
|
+
|
|
8681
|
+
/**
|
|
8682
|
+
* @since Pending
|
|
8683
|
+
*/
|
|
8684
|
+
export interface RegisterKeyOptions {
|
|
8685
|
+
|
|
8686
|
+
/**
|
|
8687
|
+
* Which algorithm the registered key should use.
|
|
8688
|
+
*/
|
|
8689
|
+
algorithm: Algorithm;
|
|
8690
|
+
}
|
|
8691
|
+
|
|
8692
|
+
/**
|
|
8693
|
+
* @since Pending
|
|
8694
|
+
*/
|
|
8695
|
+
export interface ChallengeKeyOptions {
|
|
8696
|
+
|
|
8697
|
+
/**
|
|
8698
|
+
* A challenge as emitted by the Verified Access Web API.
|
|
8699
|
+
*/
|
|
8700
|
+
challenge: ArrayBuffer;
|
|
8701
|
+
|
|
8702
|
+
/**
|
|
8703
|
+
* If present, registers the challenged key with the specified `scope`'s token. The key can then be associated with a certificate and used like any other signing key. Subsequent calls to this function will then generate a new Enterprise Key in the specified `scope`.
|
|
8704
|
+
*/
|
|
8705
|
+
registerKey?: RegisterKeyOptions;
|
|
8706
|
+
|
|
8707
|
+
/**
|
|
8708
|
+
* Which Enterprise Key to challenge.
|
|
8709
|
+
*/
|
|
8710
|
+
scope: Scope;
|
|
8711
|
+
}
|
|
8712
|
+
|
|
8662
8713
|
/**
|
|
8663
8714
|
* Returns the available Tokens. In a regular user's session the list will always contain the user's token with `id` `"user"`. If a system-wide TPM token is available, the returned list will also contain the system-wide token with `id` `"system"`. The system-wide token will be the same for all sessions on this device (device in the sense of e.g. a Chromebook).
|
|
8664
8715
|
*
|
|
@@ -8724,12 +8775,36 @@ declare namespace chrome {
|
|
|
8724
8775
|
callback?: () => void,
|
|
8725
8776
|
): void;
|
|
8726
8777
|
|
|
8778
|
+
/**
|
|
8779
|
+
* Similar to `challengeMachineKey` and `challengeUserKey`, but allows specifying the algorithm of a registered key. Challenges a hardware-backed Enterprise Machine Key and emits the response as part of a remote attestation protocol. Only useful on Chrome OS and in conjunction with the Verified Access Web API which both issues challenges and verifies responses.
|
|
8780
|
+
*
|
|
8781
|
+
* A successful verification by the Verified Access Web API is a strong signal that the current device is a legitimate Chrome OS device, the current device is managed by the domain specified during verification, the current signed-in user is managed by the domain specified during verification, and the current device state complies with enterprise device policy. For example, a policy may specify that the device must not be in developer mode. Any device identity emitted by the verification is tightly bound to the hardware of the current device. If `"user"` Scope is specified, the identity is also tighly bound to the current signed-in user.
|
|
8782
|
+
*
|
|
8783
|
+
* This function is highly restricted and will fail if the current device is not managed, the current user is not managed, or if this operation has not explicitly been enabled for the caller by enterprise device policy. The challenged key does not reside in the `"system"` or `"user"` token and is not accessible by any other API.
|
|
8784
|
+
*
|
|
8785
|
+
* @param options Object containing the fields defined in {@link ChallengeKeyOptions}.
|
|
8786
|
+
* @param callback Called back with the challenge response.
|
|
8787
|
+
* @since Pending
|
|
8788
|
+
*/
|
|
8789
|
+
export function challengeKey(
|
|
8790
|
+
|
|
8791
|
+
options: ChallengeKeyOptions,
|
|
8792
|
+
|
|
8793
|
+
/**
|
|
8794
|
+
* @param response The challenge response.
|
|
8795
|
+
*/
|
|
8796
|
+
callback: (
|
|
8797
|
+
response: ArrayBuffer,
|
|
8798
|
+
) => void,
|
|
8799
|
+
): void;
|
|
8800
|
+
|
|
8727
8801
|
/**
|
|
8728
8802
|
* Challenges a hardware-backed Enterprise Machine Key and emits the response as part of a remote attestation protocol. Only useful on Chrome OS and in conjunction with the Verified Access Web API which both issues challenges and verifies responses. A successful verification by the Verified Access Web API is a strong signal of all of the following: \* The current device is a legitimate Chrome OS device. \* The current device is managed by the domain specified during verification. \* The current signed-in user is managed by the domain specified during verification. \* The current device state complies with enterprise device policy. For example, a policy may specify that the device must not be in developer mode. \* Any device identity emitted by the verification is tightly bound to the hardware of the current device. This function is highly restricted and will fail if the current device is not managed, the current user is not managed, or if this operation has not explicitly been enabled for the caller by enterprise device policy. The Enterprise Machine Key does not reside in the `"system"` token and is not accessible by any other API.
|
|
8729
8803
|
*
|
|
8730
8804
|
* @param challenge A challenge as emitted by the Verified Access Web API.
|
|
8731
8805
|
* @param registerKey If set, the current Enterprise Machine Key is registered with the `"system"` token and relinquishes the Enterprise Machine Key role. The key can then be associated with a certificate and used like any other signing key. This key is 2048-bit RSA. Subsequent calls to this function will then generate a new Enterprise Machine Key.
|
|
8732
8806
|
* @param callback Called back with the challenge response.
|
|
8807
|
+
* @deprecated Use {@link challengeKey} instead.
|
|
8733
8808
|
* @since Chrome 50
|
|
8734
8809
|
*/
|
|
8735
8810
|
export function challengeMachineKey(
|
|
@@ -8754,6 +8829,7 @@ declare namespace chrome {
|
|
|
8754
8829
|
*
|
|
8755
8830
|
* @param challenge A challenge as emitted by the Verified Access Web API.
|
|
8756
8831
|
* @param callback Called back with the challenge response.
|
|
8832
|
+
* @deprecated Use {@link challengeKey} instead.
|
|
8757
8833
|
* @since Chrome 50
|
|
8758
8834
|
*/
|
|
8759
8835
|
export function challengeMachineKey(
|
|
@@ -8774,6 +8850,7 @@ declare namespace chrome {
|
|
|
8774
8850
|
* @param challenge A challenge as emitted by the Verified Access Web API.
|
|
8775
8851
|
* @param registerKey If set, the current Enterprise User Key is registered with the `"user"` token and relinquishes the Enterprise User Key role. The key can then be associated with a certificate and used like any other signing key. This key is 2048-bit RSA. Subsequent calls to this function will then generate a new Enterprise User Key.
|
|
8776
8852
|
* @param callback Called back with the challenge response.
|
|
8853
|
+
* @deprecated Use {@link challengeKey} instead.
|
|
8777
8854
|
* @since Chrome 50
|
|
8778
8855
|
*/
|
|
8779
8856
|
export function challengeUserKey(
|
package/package.json
CHANGED
|
@@ -5,7 +5,7 @@
|
|
|
5
5
|
"type": "module",
|
|
6
6
|
"name": "chrome-types",
|
|
7
7
|
"config": {
|
|
8
|
-
"build-hash": "
|
|
8
|
+
"build-hash": "38d87769780ab1a4"
|
|
9
9
|
},
|
|
10
10
|
"repository": {
|
|
11
11
|
"type": "git",
|
|
@@ -16,5 +16,5 @@
|
|
|
16
16
|
"url": "https://github.com/GoogleChrome/chrome-types/issues"
|
|
17
17
|
},
|
|
18
18
|
"homepage": "https://github.com/GoogleChrome/chrome-types",
|
|
19
|
-
"version": "0.1.
|
|
19
|
+
"version": "0.1.155"
|
|
20
20
|
}
|