chrome-types 0.1.154 → 0.1.155

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (3) hide show
  1. package/_all.d.ts +74 -2
  2. package/index.d.ts +74 -2
  3. package/package.json +2 -2
package/_all.d.ts CHANGED
@@ -14,8 +14,8 @@
14
14
  * limitations under the License.
15
15
  */
16
16
 
17
- // Generated on Tue Dec 13 2022 22:30:27 GMT+0000 (Coordinated Universal Time)
18
- // Built at b5f497b891fee3e82a12b18530e5f27a78db9399
17
+ // Generated on Thu Dec 15 2022 22:27:57 GMT+0000 (Coordinated Universal Time)
18
+ // Built at 87da37160ce98a019c47f8eb44f91ec49b750236
19
19
 
20
20
  // Includes all types, including MV2 + Platform Apps APIs.
21
21
 
@@ -12478,6 +12478,52 @@ declare namespace chrome {
12478
12478
  softwareBackedSubtleCrypto: SubtleCrypto;
12479
12479
  }
12480
12480
 
12481
+ /**
12482
+ * Whether to use the Enterprise User Key or the Enterprise Machine Key.
12483
+ *
12484
+ * @since Pending
12485
+ */
12486
+ export type Scope = "USER" | "MACHINE";
12487
+
12488
+ /**
12489
+ * Type of key to generate.
12490
+ *
12491
+ * @since Pending
12492
+ */
12493
+ export type Algorithm = "RSA" | "ECDSA";
12494
+
12495
+ /**
12496
+ * @since Pending
12497
+ */
12498
+ export interface RegisterKeyOptions {
12499
+
12500
+ /**
12501
+ * Which algorithm the registered key should use.
12502
+ */
12503
+ algorithm: Algorithm;
12504
+ }
12505
+
12506
+ /**
12507
+ * @since Pending
12508
+ */
12509
+ export interface ChallengeKeyOptions {
12510
+
12511
+ /**
12512
+ * A challenge as emitted by the Verified Access Web API.
12513
+ */
12514
+ challenge: ArrayBuffer;
12515
+
12516
+ /**
12517
+ * If present, registers the challenged key with the specified `scope`'s token. The key can then be associated with a certificate and used like any other signing key. Subsequent calls to this function will then generate a new Enterprise Key in the specified `scope`.
12518
+ */
12519
+ registerKey?: RegisterKeyOptions;
12520
+
12521
+ /**
12522
+ * Which Enterprise Key to challenge.
12523
+ */
12524
+ scope: Scope;
12525
+ }
12526
+
12481
12527
  /**
12482
12528
  * Returns the available Tokens. In a regular user's session the list will always contain the user's token with `id` `"user"`. If a system-wide TPM token is available, the returned list will also contain the system-wide token with `id` `"system"`. The system-wide token will be the same for all sessions on this device (device in the sense of e.g. a Chromebook).
12483
12529
  *
@@ -12543,12 +12589,36 @@ declare namespace chrome {
12543
12589
  callback?: () => void,
12544
12590
  ): void;
12545
12591
 
12592
+ /**
12593
+ * Similar to `challengeMachineKey` and `challengeUserKey`, but allows specifying the algorithm of a registered key. Challenges a hardware-backed Enterprise Machine Key and emits the response as part of a remote attestation protocol. Only useful on Chrome OS and in conjunction with the Verified Access Web API which both issues challenges and verifies responses.
12594
+ *
12595
+ * A successful verification by the Verified Access Web API is a strong signal that the current device is a legitimate Chrome OS device, the current device is managed by the domain specified during verification, the current signed-in user is managed by the domain specified during verification, and the current device state complies with enterprise device policy. For example, a policy may specify that the device must not be in developer mode. Any device identity emitted by the verification is tightly bound to the hardware of the current device. If `"user"` Scope is specified, the identity is also tighly bound to the current signed-in user.
12596
+ *
12597
+ * This function is highly restricted and will fail if the current device is not managed, the current user is not managed, or if this operation has not explicitly been enabled for the caller by enterprise device policy. The challenged key does not reside in the `"system"` or `"user"` token and is not accessible by any other API.
12598
+ *
12599
+ * @param options Object containing the fields defined in {@link ChallengeKeyOptions}.
12600
+ * @param callback Called back with the challenge response.
12601
+ * @since Pending
12602
+ */
12603
+ export function challengeKey(
12604
+
12605
+ options: ChallengeKeyOptions,
12606
+
12607
+ /**
12608
+ * @param response The challenge response.
12609
+ */
12610
+ callback: (
12611
+ response: ArrayBuffer,
12612
+ ) => void,
12613
+ ): void;
12614
+
12546
12615
  /**
12547
12616
  * Challenges a hardware-backed Enterprise Machine Key and emits the response as part of a remote attestation protocol. Only useful on Chrome OS and in conjunction with the Verified Access Web API which both issues challenges and verifies responses. A successful verification by the Verified Access Web API is a strong signal of all of the following: \* The current device is a legitimate Chrome OS device. \* The current device is managed by the domain specified during verification. \* The current signed-in user is managed by the domain specified during verification. \* The current device state complies with enterprise device policy. For example, a policy may specify that the device must not be in developer mode. \* Any device identity emitted by the verification is tightly bound to the hardware of the current device. This function is highly restricted and will fail if the current device is not managed, the current user is not managed, or if this operation has not explicitly been enabled for the caller by enterprise device policy. The Enterprise Machine Key does not reside in the `"system"` token and is not accessible by any other API.
12548
12617
  *
12549
12618
  * @param challenge A challenge as emitted by the Verified Access Web API.
12550
12619
  * @param registerKey If set, the current Enterprise Machine Key is registered with the `"system"` token and relinquishes the Enterprise Machine Key role. The key can then be associated with a certificate and used like any other signing key. This key is 2048-bit RSA. Subsequent calls to this function will then generate a new Enterprise Machine Key.
12551
12620
  * @param callback Called back with the challenge response.
12621
+ * @deprecated Use {@link challengeKey} instead.
12552
12622
  * @since Chrome 50
12553
12623
  */
12554
12624
  export function challengeMachineKey(
@@ -12573,6 +12643,7 @@ declare namespace chrome {
12573
12643
  *
12574
12644
  * @param challenge A challenge as emitted by the Verified Access Web API.
12575
12645
  * @param callback Called back with the challenge response.
12646
+ * @deprecated Use {@link challengeKey} instead.
12576
12647
  * @since Chrome 50
12577
12648
  */
12578
12649
  export function challengeMachineKey(
@@ -12593,6 +12664,7 @@ declare namespace chrome {
12593
12664
  * @param challenge A challenge as emitted by the Verified Access Web API.
12594
12665
  * @param registerKey If set, the current Enterprise User Key is registered with the `"user"` token and relinquishes the Enterprise User Key role. The key can then be associated with a certificate and used like any other signing key. This key is 2048-bit RSA. Subsequent calls to this function will then generate a new Enterprise User Key.
12595
12666
  * @param callback Called back with the challenge response.
12667
+ * @deprecated Use {@link challengeKey} instead.
12596
12668
  * @since Chrome 50
12597
12669
  */
12598
12670
  export function challengeUserKey(
package/index.d.ts CHANGED
@@ -14,8 +14,8 @@
14
14
  * limitations under the License.
15
15
  */
16
16
 
17
- // Generated on Tue Dec 13 2022 22:30:21 GMT+0000 (Coordinated Universal Time)
18
- // Built at b5f497b891fee3e82a12b18530e5f27a78db9399
17
+ // Generated on Thu Dec 15 2022 22:27:52 GMT+0000 (Coordinated Universal Time)
18
+ // Built at 87da37160ce98a019c47f8eb44f91ec49b750236
19
19
 
20
20
  // Includes MV3+ APIs only.
21
21
 
@@ -8664,6 +8664,52 @@ declare namespace chrome {
8664
8664
  softwareBackedSubtleCrypto: SubtleCrypto;
8665
8665
  }
8666
8666
 
8667
+ /**
8668
+ * Whether to use the Enterprise User Key or the Enterprise Machine Key.
8669
+ *
8670
+ * @since Pending
8671
+ */
8672
+ export type Scope = "USER" | "MACHINE";
8673
+
8674
+ /**
8675
+ * Type of key to generate.
8676
+ *
8677
+ * @since Pending
8678
+ */
8679
+ export type Algorithm = "RSA" | "ECDSA";
8680
+
8681
+ /**
8682
+ * @since Pending
8683
+ */
8684
+ export interface RegisterKeyOptions {
8685
+
8686
+ /**
8687
+ * Which algorithm the registered key should use.
8688
+ */
8689
+ algorithm: Algorithm;
8690
+ }
8691
+
8692
+ /**
8693
+ * @since Pending
8694
+ */
8695
+ export interface ChallengeKeyOptions {
8696
+
8697
+ /**
8698
+ * A challenge as emitted by the Verified Access Web API.
8699
+ */
8700
+ challenge: ArrayBuffer;
8701
+
8702
+ /**
8703
+ * If present, registers the challenged key with the specified `scope`'s token. The key can then be associated with a certificate and used like any other signing key. Subsequent calls to this function will then generate a new Enterprise Key in the specified `scope`.
8704
+ */
8705
+ registerKey?: RegisterKeyOptions;
8706
+
8707
+ /**
8708
+ * Which Enterprise Key to challenge.
8709
+ */
8710
+ scope: Scope;
8711
+ }
8712
+
8667
8713
  /**
8668
8714
  * Returns the available Tokens. In a regular user's session the list will always contain the user's token with `id` `"user"`. If a system-wide TPM token is available, the returned list will also contain the system-wide token with `id` `"system"`. The system-wide token will be the same for all sessions on this device (device in the sense of e.g. a Chromebook).
8669
8715
  *
@@ -8729,12 +8775,36 @@ declare namespace chrome {
8729
8775
  callback?: () => void,
8730
8776
  ): void;
8731
8777
 
8778
+ /**
8779
+ * Similar to `challengeMachineKey` and `challengeUserKey`, but allows specifying the algorithm of a registered key. Challenges a hardware-backed Enterprise Machine Key and emits the response as part of a remote attestation protocol. Only useful on Chrome OS and in conjunction with the Verified Access Web API which both issues challenges and verifies responses.
8780
+ *
8781
+ * A successful verification by the Verified Access Web API is a strong signal that the current device is a legitimate Chrome OS device, the current device is managed by the domain specified during verification, the current signed-in user is managed by the domain specified during verification, and the current device state complies with enterprise device policy. For example, a policy may specify that the device must not be in developer mode. Any device identity emitted by the verification is tightly bound to the hardware of the current device. If `"user"` Scope is specified, the identity is also tighly bound to the current signed-in user.
8782
+ *
8783
+ * This function is highly restricted and will fail if the current device is not managed, the current user is not managed, or if this operation has not explicitly been enabled for the caller by enterprise device policy. The challenged key does not reside in the `"system"` or `"user"` token and is not accessible by any other API.
8784
+ *
8785
+ * @param options Object containing the fields defined in {@link ChallengeKeyOptions}.
8786
+ * @param callback Called back with the challenge response.
8787
+ * @since Pending
8788
+ */
8789
+ export function challengeKey(
8790
+
8791
+ options: ChallengeKeyOptions,
8792
+
8793
+ /**
8794
+ * @param response The challenge response.
8795
+ */
8796
+ callback: (
8797
+ response: ArrayBuffer,
8798
+ ) => void,
8799
+ ): void;
8800
+
8732
8801
  /**
8733
8802
  * Challenges a hardware-backed Enterprise Machine Key and emits the response as part of a remote attestation protocol. Only useful on Chrome OS and in conjunction with the Verified Access Web API which both issues challenges and verifies responses. A successful verification by the Verified Access Web API is a strong signal of all of the following: \* The current device is a legitimate Chrome OS device. \* The current device is managed by the domain specified during verification. \* The current signed-in user is managed by the domain specified during verification. \* The current device state complies with enterprise device policy. For example, a policy may specify that the device must not be in developer mode. \* Any device identity emitted by the verification is tightly bound to the hardware of the current device. This function is highly restricted and will fail if the current device is not managed, the current user is not managed, or if this operation has not explicitly been enabled for the caller by enterprise device policy. The Enterprise Machine Key does not reside in the `"system"` token and is not accessible by any other API.
8734
8803
  *
8735
8804
  * @param challenge A challenge as emitted by the Verified Access Web API.
8736
8805
  * @param registerKey If set, the current Enterprise Machine Key is registered with the `"system"` token and relinquishes the Enterprise Machine Key role. The key can then be associated with a certificate and used like any other signing key. This key is 2048-bit RSA. Subsequent calls to this function will then generate a new Enterprise Machine Key.
8737
8806
  * @param callback Called back with the challenge response.
8807
+ * @deprecated Use {@link challengeKey} instead.
8738
8808
  * @since Chrome 50
8739
8809
  */
8740
8810
  export function challengeMachineKey(
@@ -8759,6 +8829,7 @@ declare namespace chrome {
8759
8829
  *
8760
8830
  * @param challenge A challenge as emitted by the Verified Access Web API.
8761
8831
  * @param callback Called back with the challenge response.
8832
+ * @deprecated Use {@link challengeKey} instead.
8762
8833
  * @since Chrome 50
8763
8834
  */
8764
8835
  export function challengeMachineKey(
@@ -8779,6 +8850,7 @@ declare namespace chrome {
8779
8850
  * @param challenge A challenge as emitted by the Verified Access Web API.
8780
8851
  * @param registerKey If set, the current Enterprise User Key is registered with the `"user"` token and relinquishes the Enterprise User Key role. The key can then be associated with a certificate and used like any other signing key. This key is 2048-bit RSA. Subsequent calls to this function will then generate a new Enterprise User Key.
8781
8852
  * @param callback Called back with the challenge response.
8853
+ * @deprecated Use {@link challengeKey} instead.
8782
8854
  * @since Chrome 50
8783
8855
  */
8784
8856
  export function challengeUserKey(
package/package.json CHANGED
@@ -5,7 +5,7 @@
5
5
  "type": "module",
6
6
  "name": "chrome-types",
7
7
  "config": {
8
- "build-hash": "587bd55b764a59f1"
8
+ "build-hash": "38d87769780ab1a4"
9
9
  },
10
10
  "repository": {
11
11
  "type": "git",
@@ -16,5 +16,5 @@
16
16
  "url": "https://github.com/GoogleChrome/chrome-types/issues"
17
17
  },
18
18
  "homepage": "https://github.com/GoogleChrome/chrome-types",
19
- "version": "0.1.154"
19
+ "version": "0.1.155"
20
20
  }