chrome-types 0.1.154 → 0.1.155
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/_all.d.ts +74 -2
- package/index.d.ts +74 -2
- package/package.json +2 -2
package/_all.d.ts
CHANGED
|
@@ -14,8 +14,8 @@
|
|
|
14
14
|
* limitations under the License.
|
|
15
15
|
*/
|
|
16
16
|
|
|
17
|
-
// Generated on
|
|
18
|
-
// Built at
|
|
17
|
+
// Generated on Thu Dec 15 2022 22:27:57 GMT+0000 (Coordinated Universal Time)
|
|
18
|
+
// Built at 87da37160ce98a019c47f8eb44f91ec49b750236
|
|
19
19
|
|
|
20
20
|
// Includes all types, including MV2 + Platform Apps APIs.
|
|
21
21
|
|
|
@@ -12478,6 +12478,52 @@ declare namespace chrome {
|
|
|
12478
12478
|
softwareBackedSubtleCrypto: SubtleCrypto;
|
|
12479
12479
|
}
|
|
12480
12480
|
|
|
12481
|
+
/**
|
|
12482
|
+
* Whether to use the Enterprise User Key or the Enterprise Machine Key.
|
|
12483
|
+
*
|
|
12484
|
+
* @since Pending
|
|
12485
|
+
*/
|
|
12486
|
+
export type Scope = "USER" | "MACHINE";
|
|
12487
|
+
|
|
12488
|
+
/**
|
|
12489
|
+
* Type of key to generate.
|
|
12490
|
+
*
|
|
12491
|
+
* @since Pending
|
|
12492
|
+
*/
|
|
12493
|
+
export type Algorithm = "RSA" | "ECDSA";
|
|
12494
|
+
|
|
12495
|
+
/**
|
|
12496
|
+
* @since Pending
|
|
12497
|
+
*/
|
|
12498
|
+
export interface RegisterKeyOptions {
|
|
12499
|
+
|
|
12500
|
+
/**
|
|
12501
|
+
* Which algorithm the registered key should use.
|
|
12502
|
+
*/
|
|
12503
|
+
algorithm: Algorithm;
|
|
12504
|
+
}
|
|
12505
|
+
|
|
12506
|
+
/**
|
|
12507
|
+
* @since Pending
|
|
12508
|
+
*/
|
|
12509
|
+
export interface ChallengeKeyOptions {
|
|
12510
|
+
|
|
12511
|
+
/**
|
|
12512
|
+
* A challenge as emitted by the Verified Access Web API.
|
|
12513
|
+
*/
|
|
12514
|
+
challenge: ArrayBuffer;
|
|
12515
|
+
|
|
12516
|
+
/**
|
|
12517
|
+
* If present, registers the challenged key with the specified `scope`'s token. The key can then be associated with a certificate and used like any other signing key. Subsequent calls to this function will then generate a new Enterprise Key in the specified `scope`.
|
|
12518
|
+
*/
|
|
12519
|
+
registerKey?: RegisterKeyOptions;
|
|
12520
|
+
|
|
12521
|
+
/**
|
|
12522
|
+
* Which Enterprise Key to challenge.
|
|
12523
|
+
*/
|
|
12524
|
+
scope: Scope;
|
|
12525
|
+
}
|
|
12526
|
+
|
|
12481
12527
|
/**
|
|
12482
12528
|
* Returns the available Tokens. In a regular user's session the list will always contain the user's token with `id` `"user"`. If a system-wide TPM token is available, the returned list will also contain the system-wide token with `id` `"system"`. The system-wide token will be the same for all sessions on this device (device in the sense of e.g. a Chromebook).
|
|
12483
12529
|
*
|
|
@@ -12543,12 +12589,36 @@ declare namespace chrome {
|
|
|
12543
12589
|
callback?: () => void,
|
|
12544
12590
|
): void;
|
|
12545
12591
|
|
|
12592
|
+
/**
|
|
12593
|
+
* Similar to `challengeMachineKey` and `challengeUserKey`, but allows specifying the algorithm of a registered key. Challenges a hardware-backed Enterprise Machine Key and emits the response as part of a remote attestation protocol. Only useful on Chrome OS and in conjunction with the Verified Access Web API which both issues challenges and verifies responses.
|
|
12594
|
+
*
|
|
12595
|
+
* A successful verification by the Verified Access Web API is a strong signal that the current device is a legitimate Chrome OS device, the current device is managed by the domain specified during verification, the current signed-in user is managed by the domain specified during verification, and the current device state complies with enterprise device policy. For example, a policy may specify that the device must not be in developer mode. Any device identity emitted by the verification is tightly bound to the hardware of the current device. If `"user"` Scope is specified, the identity is also tighly bound to the current signed-in user.
|
|
12596
|
+
*
|
|
12597
|
+
* This function is highly restricted and will fail if the current device is not managed, the current user is not managed, or if this operation has not explicitly been enabled for the caller by enterprise device policy. The challenged key does not reside in the `"system"` or `"user"` token and is not accessible by any other API.
|
|
12598
|
+
*
|
|
12599
|
+
* @param options Object containing the fields defined in {@link ChallengeKeyOptions}.
|
|
12600
|
+
* @param callback Called back with the challenge response.
|
|
12601
|
+
* @since Pending
|
|
12602
|
+
*/
|
|
12603
|
+
export function challengeKey(
|
|
12604
|
+
|
|
12605
|
+
options: ChallengeKeyOptions,
|
|
12606
|
+
|
|
12607
|
+
/**
|
|
12608
|
+
* @param response The challenge response.
|
|
12609
|
+
*/
|
|
12610
|
+
callback: (
|
|
12611
|
+
response: ArrayBuffer,
|
|
12612
|
+
) => void,
|
|
12613
|
+
): void;
|
|
12614
|
+
|
|
12546
12615
|
/**
|
|
12547
12616
|
* Challenges a hardware-backed Enterprise Machine Key and emits the response as part of a remote attestation protocol. Only useful on Chrome OS and in conjunction with the Verified Access Web API which both issues challenges and verifies responses. A successful verification by the Verified Access Web API is a strong signal of all of the following: \* The current device is a legitimate Chrome OS device. \* The current device is managed by the domain specified during verification. \* The current signed-in user is managed by the domain specified during verification. \* The current device state complies with enterprise device policy. For example, a policy may specify that the device must not be in developer mode. \* Any device identity emitted by the verification is tightly bound to the hardware of the current device. This function is highly restricted and will fail if the current device is not managed, the current user is not managed, or if this operation has not explicitly been enabled for the caller by enterprise device policy. The Enterprise Machine Key does not reside in the `"system"` token and is not accessible by any other API.
|
|
12548
12617
|
*
|
|
12549
12618
|
* @param challenge A challenge as emitted by the Verified Access Web API.
|
|
12550
12619
|
* @param registerKey If set, the current Enterprise Machine Key is registered with the `"system"` token and relinquishes the Enterprise Machine Key role. The key can then be associated with a certificate and used like any other signing key. This key is 2048-bit RSA. Subsequent calls to this function will then generate a new Enterprise Machine Key.
|
|
12551
12620
|
* @param callback Called back with the challenge response.
|
|
12621
|
+
* @deprecated Use {@link challengeKey} instead.
|
|
12552
12622
|
* @since Chrome 50
|
|
12553
12623
|
*/
|
|
12554
12624
|
export function challengeMachineKey(
|
|
@@ -12573,6 +12643,7 @@ declare namespace chrome {
|
|
|
12573
12643
|
*
|
|
12574
12644
|
* @param challenge A challenge as emitted by the Verified Access Web API.
|
|
12575
12645
|
* @param callback Called back with the challenge response.
|
|
12646
|
+
* @deprecated Use {@link challengeKey} instead.
|
|
12576
12647
|
* @since Chrome 50
|
|
12577
12648
|
*/
|
|
12578
12649
|
export function challengeMachineKey(
|
|
@@ -12593,6 +12664,7 @@ declare namespace chrome {
|
|
|
12593
12664
|
* @param challenge A challenge as emitted by the Verified Access Web API.
|
|
12594
12665
|
* @param registerKey If set, the current Enterprise User Key is registered with the `"user"` token and relinquishes the Enterprise User Key role. The key can then be associated with a certificate and used like any other signing key. This key is 2048-bit RSA. Subsequent calls to this function will then generate a new Enterprise User Key.
|
|
12595
12666
|
* @param callback Called back with the challenge response.
|
|
12667
|
+
* @deprecated Use {@link challengeKey} instead.
|
|
12596
12668
|
* @since Chrome 50
|
|
12597
12669
|
*/
|
|
12598
12670
|
export function challengeUserKey(
|
package/index.d.ts
CHANGED
|
@@ -14,8 +14,8 @@
|
|
|
14
14
|
* limitations under the License.
|
|
15
15
|
*/
|
|
16
16
|
|
|
17
|
-
// Generated on
|
|
18
|
-
// Built at
|
|
17
|
+
// Generated on Thu Dec 15 2022 22:27:52 GMT+0000 (Coordinated Universal Time)
|
|
18
|
+
// Built at 87da37160ce98a019c47f8eb44f91ec49b750236
|
|
19
19
|
|
|
20
20
|
// Includes MV3+ APIs only.
|
|
21
21
|
|
|
@@ -8664,6 +8664,52 @@ declare namespace chrome {
|
|
|
8664
8664
|
softwareBackedSubtleCrypto: SubtleCrypto;
|
|
8665
8665
|
}
|
|
8666
8666
|
|
|
8667
|
+
/**
|
|
8668
|
+
* Whether to use the Enterprise User Key or the Enterprise Machine Key.
|
|
8669
|
+
*
|
|
8670
|
+
* @since Pending
|
|
8671
|
+
*/
|
|
8672
|
+
export type Scope = "USER" | "MACHINE";
|
|
8673
|
+
|
|
8674
|
+
/**
|
|
8675
|
+
* Type of key to generate.
|
|
8676
|
+
*
|
|
8677
|
+
* @since Pending
|
|
8678
|
+
*/
|
|
8679
|
+
export type Algorithm = "RSA" | "ECDSA";
|
|
8680
|
+
|
|
8681
|
+
/**
|
|
8682
|
+
* @since Pending
|
|
8683
|
+
*/
|
|
8684
|
+
export interface RegisterKeyOptions {
|
|
8685
|
+
|
|
8686
|
+
/**
|
|
8687
|
+
* Which algorithm the registered key should use.
|
|
8688
|
+
*/
|
|
8689
|
+
algorithm: Algorithm;
|
|
8690
|
+
}
|
|
8691
|
+
|
|
8692
|
+
/**
|
|
8693
|
+
* @since Pending
|
|
8694
|
+
*/
|
|
8695
|
+
export interface ChallengeKeyOptions {
|
|
8696
|
+
|
|
8697
|
+
/**
|
|
8698
|
+
* A challenge as emitted by the Verified Access Web API.
|
|
8699
|
+
*/
|
|
8700
|
+
challenge: ArrayBuffer;
|
|
8701
|
+
|
|
8702
|
+
/**
|
|
8703
|
+
* If present, registers the challenged key with the specified `scope`'s token. The key can then be associated with a certificate and used like any other signing key. Subsequent calls to this function will then generate a new Enterprise Key in the specified `scope`.
|
|
8704
|
+
*/
|
|
8705
|
+
registerKey?: RegisterKeyOptions;
|
|
8706
|
+
|
|
8707
|
+
/**
|
|
8708
|
+
* Which Enterprise Key to challenge.
|
|
8709
|
+
*/
|
|
8710
|
+
scope: Scope;
|
|
8711
|
+
}
|
|
8712
|
+
|
|
8667
8713
|
/**
|
|
8668
8714
|
* Returns the available Tokens. In a regular user's session the list will always contain the user's token with `id` `"user"`. If a system-wide TPM token is available, the returned list will also contain the system-wide token with `id` `"system"`. The system-wide token will be the same for all sessions on this device (device in the sense of e.g. a Chromebook).
|
|
8669
8715
|
*
|
|
@@ -8729,12 +8775,36 @@ declare namespace chrome {
|
|
|
8729
8775
|
callback?: () => void,
|
|
8730
8776
|
): void;
|
|
8731
8777
|
|
|
8778
|
+
/**
|
|
8779
|
+
* Similar to `challengeMachineKey` and `challengeUserKey`, but allows specifying the algorithm of a registered key. Challenges a hardware-backed Enterprise Machine Key and emits the response as part of a remote attestation protocol. Only useful on Chrome OS and in conjunction with the Verified Access Web API which both issues challenges and verifies responses.
|
|
8780
|
+
*
|
|
8781
|
+
* A successful verification by the Verified Access Web API is a strong signal that the current device is a legitimate Chrome OS device, the current device is managed by the domain specified during verification, the current signed-in user is managed by the domain specified during verification, and the current device state complies with enterprise device policy. For example, a policy may specify that the device must not be in developer mode. Any device identity emitted by the verification is tightly bound to the hardware of the current device. If `"user"` Scope is specified, the identity is also tighly bound to the current signed-in user.
|
|
8782
|
+
*
|
|
8783
|
+
* This function is highly restricted and will fail if the current device is not managed, the current user is not managed, or if this operation has not explicitly been enabled for the caller by enterprise device policy. The challenged key does not reside in the `"system"` or `"user"` token and is not accessible by any other API.
|
|
8784
|
+
*
|
|
8785
|
+
* @param options Object containing the fields defined in {@link ChallengeKeyOptions}.
|
|
8786
|
+
* @param callback Called back with the challenge response.
|
|
8787
|
+
* @since Pending
|
|
8788
|
+
*/
|
|
8789
|
+
export function challengeKey(
|
|
8790
|
+
|
|
8791
|
+
options: ChallengeKeyOptions,
|
|
8792
|
+
|
|
8793
|
+
/**
|
|
8794
|
+
* @param response The challenge response.
|
|
8795
|
+
*/
|
|
8796
|
+
callback: (
|
|
8797
|
+
response: ArrayBuffer,
|
|
8798
|
+
) => void,
|
|
8799
|
+
): void;
|
|
8800
|
+
|
|
8732
8801
|
/**
|
|
8733
8802
|
* Challenges a hardware-backed Enterprise Machine Key and emits the response as part of a remote attestation protocol. Only useful on Chrome OS and in conjunction with the Verified Access Web API which both issues challenges and verifies responses. A successful verification by the Verified Access Web API is a strong signal of all of the following: \* The current device is a legitimate Chrome OS device. \* The current device is managed by the domain specified during verification. \* The current signed-in user is managed by the domain specified during verification. \* The current device state complies with enterprise device policy. For example, a policy may specify that the device must not be in developer mode. \* Any device identity emitted by the verification is tightly bound to the hardware of the current device. This function is highly restricted and will fail if the current device is not managed, the current user is not managed, or if this operation has not explicitly been enabled for the caller by enterprise device policy. The Enterprise Machine Key does not reside in the `"system"` token and is not accessible by any other API.
|
|
8734
8803
|
*
|
|
8735
8804
|
* @param challenge A challenge as emitted by the Verified Access Web API.
|
|
8736
8805
|
* @param registerKey If set, the current Enterprise Machine Key is registered with the `"system"` token and relinquishes the Enterprise Machine Key role. The key can then be associated with a certificate and used like any other signing key. This key is 2048-bit RSA. Subsequent calls to this function will then generate a new Enterprise Machine Key.
|
|
8737
8806
|
* @param callback Called back with the challenge response.
|
|
8807
|
+
* @deprecated Use {@link challengeKey} instead.
|
|
8738
8808
|
* @since Chrome 50
|
|
8739
8809
|
*/
|
|
8740
8810
|
export function challengeMachineKey(
|
|
@@ -8759,6 +8829,7 @@ declare namespace chrome {
|
|
|
8759
8829
|
*
|
|
8760
8830
|
* @param challenge A challenge as emitted by the Verified Access Web API.
|
|
8761
8831
|
* @param callback Called back with the challenge response.
|
|
8832
|
+
* @deprecated Use {@link challengeKey} instead.
|
|
8762
8833
|
* @since Chrome 50
|
|
8763
8834
|
*/
|
|
8764
8835
|
export function challengeMachineKey(
|
|
@@ -8779,6 +8850,7 @@ declare namespace chrome {
|
|
|
8779
8850
|
* @param challenge A challenge as emitted by the Verified Access Web API.
|
|
8780
8851
|
* @param registerKey If set, the current Enterprise User Key is registered with the `"user"` token and relinquishes the Enterprise User Key role. The key can then be associated with a certificate and used like any other signing key. This key is 2048-bit RSA. Subsequent calls to this function will then generate a new Enterprise User Key.
|
|
8781
8852
|
* @param callback Called back with the challenge response.
|
|
8853
|
+
* @deprecated Use {@link challengeKey} instead.
|
|
8782
8854
|
* @since Chrome 50
|
|
8783
8855
|
*/
|
|
8784
8856
|
export function challengeUserKey(
|
package/package.json
CHANGED
|
@@ -5,7 +5,7 @@
|
|
|
5
5
|
"type": "module",
|
|
6
6
|
"name": "chrome-types",
|
|
7
7
|
"config": {
|
|
8
|
-
"build-hash": "
|
|
8
|
+
"build-hash": "38d87769780ab1a4"
|
|
9
9
|
},
|
|
10
10
|
"repository": {
|
|
11
11
|
"type": "git",
|
|
@@ -16,5 +16,5 @@
|
|
|
16
16
|
"url": "https://github.com/GoogleChrome/chrome-types/issues"
|
|
17
17
|
},
|
|
18
18
|
"homepage": "https://github.com/GoogleChrome/chrome-types",
|
|
19
|
-
"version": "0.1.
|
|
19
|
+
"version": "0.1.155"
|
|
20
20
|
}
|