chrome-types 0.1.154 → 0.1.156
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/_all.d.ts +78 -6
- package/index.d.ts +78 -6
- package/package.json +2 -2
package/_all.d.ts
CHANGED
|
@@ -14,8 +14,8 @@
|
|
|
14
14
|
* limitations under the License.
|
|
15
15
|
*/
|
|
16
16
|
|
|
17
|
-
// Generated on
|
|
18
|
-
// Built at
|
|
17
|
+
// Generated on Thu Dec 22 2022 22:27:41 GMT+0000 (Coordinated Universal Time)
|
|
18
|
+
// Built at 12d52ff24d056467f2e20300c60e3a0db1038604
|
|
19
19
|
|
|
20
20
|
// Includes all types, including MV2 + Platform Apps APIs.
|
|
21
21
|
|
|
@@ -12478,6 +12478,52 @@ declare namespace chrome {
|
|
|
12478
12478
|
softwareBackedSubtleCrypto: SubtleCrypto;
|
|
12479
12479
|
}
|
|
12480
12480
|
|
|
12481
|
+
/**
|
|
12482
|
+
* Whether to use the Enterprise User Key or the Enterprise Machine Key.
|
|
12483
|
+
*
|
|
12484
|
+
* @since Pending
|
|
12485
|
+
*/
|
|
12486
|
+
export type Scope = "USER" | "MACHINE";
|
|
12487
|
+
|
|
12488
|
+
/**
|
|
12489
|
+
* Type of key to generate.
|
|
12490
|
+
*
|
|
12491
|
+
* @since Pending
|
|
12492
|
+
*/
|
|
12493
|
+
export type Algorithm = "RSA" | "ECDSA";
|
|
12494
|
+
|
|
12495
|
+
/**
|
|
12496
|
+
* @since Pending
|
|
12497
|
+
*/
|
|
12498
|
+
export interface RegisterKeyOptions {
|
|
12499
|
+
|
|
12500
|
+
/**
|
|
12501
|
+
* Which algorithm the registered key should use.
|
|
12502
|
+
*/
|
|
12503
|
+
algorithm: Algorithm;
|
|
12504
|
+
}
|
|
12505
|
+
|
|
12506
|
+
/**
|
|
12507
|
+
* @since Pending
|
|
12508
|
+
*/
|
|
12509
|
+
export interface ChallengeKeyOptions {
|
|
12510
|
+
|
|
12511
|
+
/**
|
|
12512
|
+
* A challenge as emitted by the Verified Access Web API.
|
|
12513
|
+
*/
|
|
12514
|
+
challenge: ArrayBuffer;
|
|
12515
|
+
|
|
12516
|
+
/**
|
|
12517
|
+
* If present, registers the challenged key with the specified `scope`'s token. The key can then be associated with a certificate and used like any other signing key. Subsequent calls to this function will then generate a new Enterprise Key in the specified `scope`.
|
|
12518
|
+
*/
|
|
12519
|
+
registerKey?: RegisterKeyOptions;
|
|
12520
|
+
|
|
12521
|
+
/**
|
|
12522
|
+
* Which Enterprise Key to challenge.
|
|
12523
|
+
*/
|
|
12524
|
+
scope: Scope;
|
|
12525
|
+
}
|
|
12526
|
+
|
|
12481
12527
|
/**
|
|
12482
12528
|
* Returns the available Tokens. In a regular user's session the list will always contain the user's token with `id` `"user"`. If a system-wide TPM token is available, the returned list will also contain the system-wide token with `id` `"system"`. The system-wide token will be the same for all sessions on this device (device in the sense of e.g. a Chromebook).
|
|
12483
12529
|
*
|
|
@@ -12543,12 +12589,36 @@ declare namespace chrome {
|
|
|
12543
12589
|
callback?: () => void,
|
|
12544
12590
|
): void;
|
|
12545
12591
|
|
|
12592
|
+
/**
|
|
12593
|
+
* Similar to `challengeMachineKey` and `challengeUserKey`, but allows specifying the algorithm of a registered key. Challenges a hardware-backed Enterprise Machine Key and emits the response as part of a remote attestation protocol. Only useful on Chrome OS and in conjunction with the Verified Access Web API which both issues challenges and verifies responses.
|
|
12594
|
+
*
|
|
12595
|
+
* A successful verification by the Verified Access Web API is a strong signal that the current device is a legitimate Chrome OS device, the current device is managed by the domain specified during verification, the current signed-in user is managed by the domain specified during verification, and the current device state complies with enterprise device policy. For example, a policy may specify that the device must not be in developer mode. Any device identity emitted by the verification is tightly bound to the hardware of the current device. If `"user"` Scope is specified, the identity is also tighly bound to the current signed-in user.
|
|
12596
|
+
*
|
|
12597
|
+
* This function is highly restricted and will fail if the current device is not managed, the current user is not managed, or if this operation has not explicitly been enabled for the caller by enterprise device policy. The challenged key does not reside in the `"system"` or `"user"` token and is not accessible by any other API.
|
|
12598
|
+
*
|
|
12599
|
+
* @param options Object containing the fields defined in {@link ChallengeKeyOptions}.
|
|
12600
|
+
* @param callback Called back with the challenge response.
|
|
12601
|
+
* @since Pending
|
|
12602
|
+
*/
|
|
12603
|
+
export function challengeKey(
|
|
12604
|
+
|
|
12605
|
+
options: ChallengeKeyOptions,
|
|
12606
|
+
|
|
12607
|
+
/**
|
|
12608
|
+
* @param response The challenge response.
|
|
12609
|
+
*/
|
|
12610
|
+
callback: (
|
|
12611
|
+
response: ArrayBuffer,
|
|
12612
|
+
) => void,
|
|
12613
|
+
): void;
|
|
12614
|
+
|
|
12546
12615
|
/**
|
|
12547
12616
|
* Challenges a hardware-backed Enterprise Machine Key and emits the response as part of a remote attestation protocol. Only useful on Chrome OS and in conjunction with the Verified Access Web API which both issues challenges and verifies responses. A successful verification by the Verified Access Web API is a strong signal of all of the following: \* The current device is a legitimate Chrome OS device. \* The current device is managed by the domain specified during verification. \* The current signed-in user is managed by the domain specified during verification. \* The current device state complies with enterprise device policy. For example, a policy may specify that the device must not be in developer mode. \* Any device identity emitted by the verification is tightly bound to the hardware of the current device. This function is highly restricted and will fail if the current device is not managed, the current user is not managed, or if this operation has not explicitly been enabled for the caller by enterprise device policy. The Enterprise Machine Key does not reside in the `"system"` token and is not accessible by any other API.
|
|
12548
12617
|
*
|
|
12549
12618
|
* @param challenge A challenge as emitted by the Verified Access Web API.
|
|
12550
12619
|
* @param registerKey If set, the current Enterprise Machine Key is registered with the `"system"` token and relinquishes the Enterprise Machine Key role. The key can then be associated with a certificate and used like any other signing key. This key is 2048-bit RSA. Subsequent calls to this function will then generate a new Enterprise Machine Key.
|
|
12551
12620
|
* @param callback Called back with the challenge response.
|
|
12621
|
+
* @deprecated Use {@link challengeKey} instead.
|
|
12552
12622
|
* @since Chrome 50
|
|
12553
12623
|
*/
|
|
12554
12624
|
export function challengeMachineKey(
|
|
@@ -12573,6 +12643,7 @@ declare namespace chrome {
|
|
|
12573
12643
|
*
|
|
12574
12644
|
* @param challenge A challenge as emitted by the Verified Access Web API.
|
|
12575
12645
|
* @param callback Called back with the challenge response.
|
|
12646
|
+
* @deprecated Use {@link challengeKey} instead.
|
|
12576
12647
|
* @since Chrome 50
|
|
12577
12648
|
*/
|
|
12578
12649
|
export function challengeMachineKey(
|
|
@@ -12593,6 +12664,7 @@ declare namespace chrome {
|
|
|
12593
12664
|
* @param challenge A challenge as emitted by the Verified Access Web API.
|
|
12594
12665
|
* @param registerKey If set, the current Enterprise User Key is registered with the `"user"` token and relinquishes the Enterprise User Key role. The key can then be associated with a certificate and used like any other signing key. This key is 2048-bit RSA. Subsequent calls to this function will then generate a new Enterprise User Key.
|
|
12595
12666
|
* @param callback Called back with the challenge response.
|
|
12667
|
+
* @deprecated Use {@link challengeKey} instead.
|
|
12596
12668
|
* @since Chrome 50
|
|
12597
12669
|
*/
|
|
12598
12670
|
export function challengeUserKey(
|
|
@@ -32726,7 +32798,7 @@ declare namespace chrome {
|
|
|
32726
32798
|
*
|
|
32727
32799
|
* Remote desktop extensions typically call this method after detecting attachment of a remote session to this host. Once this method returns without error, regular processing of WebAuthn requests is suspended, and events from this extension API are raised.
|
|
32728
32800
|
*
|
|
32729
|
-
* This method fails with an error if a different extension is already attached
|
|
32801
|
+
* This method fails with an error if a different extension is already attached.
|
|
32730
32802
|
*
|
|
32731
32803
|
* The attached extension must call \`detach()\` once the remote desktop session has ended in order to resume regular WebAuthn request processing. Extensions automatically become detached if they are unloaded.
|
|
32732
32804
|
*
|
|
@@ -32739,7 +32811,7 @@ declare namespace chrome {
|
|
|
32739
32811
|
*
|
|
32740
32812
|
* Remote desktop extensions typically call this method after detecting attachment of a remote session to this host. Once this method returns without error, regular processing of WebAuthn requests is suspended, and events from this extension API are raised.
|
|
32741
32813
|
*
|
|
32742
|
-
* This method fails with an error if a different extension is already attached
|
|
32814
|
+
* This method fails with an error if a different extension is already attached.
|
|
32743
32815
|
*
|
|
32744
32816
|
* The attached extension must call \`detach()\` once the remote desktop session has ended in order to resume regular WebAuthn request processing. Extensions automatically become detached if they are unloaded.
|
|
32745
32817
|
*
|
|
@@ -32755,7 +32827,7 @@ declare namespace chrome {
|
|
|
32755
32827
|
/**
|
|
32756
32828
|
* Removes this extension from being the active Web Authentication API request proxy.
|
|
32757
32829
|
*
|
|
32758
|
-
* This method is typically called when the extension detects that a remote desktop session was terminated. Once this method returns
|
|
32830
|
+
* This method is typically called when the extension detects that a remote desktop session was terminated. Once this method returns, the extension ceases to be the active Web Authentication API request proxy.
|
|
32759
32831
|
*
|
|
32760
32832
|
* Refer to the `onRemoteSessionStateChange` event for signaling a change of remote session attachment from a native application to to the (possibly suspended) extension.
|
|
32761
32833
|
*/
|
|
@@ -32764,7 +32836,7 @@ declare namespace chrome {
|
|
|
32764
32836
|
/**
|
|
32765
32837
|
* Removes this extension from being the active Web Authentication API request proxy.
|
|
32766
32838
|
*
|
|
32767
|
-
* This method is typically called when the extension detects that a remote desktop session was terminated. Once this method returns
|
|
32839
|
+
* This method is typically called when the extension detects that a remote desktop session was terminated. Once this method returns, the extension ceases to be the active Web Authentication API request proxy.
|
|
32768
32840
|
*
|
|
32769
32841
|
* Refer to the `onRemoteSessionStateChange` event for signaling a change of remote session attachment from a native application to to the (possibly suspended) extension.
|
|
32770
32842
|
*/
|
package/index.d.ts
CHANGED
|
@@ -14,8 +14,8 @@
|
|
|
14
14
|
* limitations under the License.
|
|
15
15
|
*/
|
|
16
16
|
|
|
17
|
-
// Generated on
|
|
18
|
-
// Built at
|
|
17
|
+
// Generated on Thu Dec 22 2022 22:27:36 GMT+0000 (Coordinated Universal Time)
|
|
18
|
+
// Built at 12d52ff24d056467f2e20300c60e3a0db1038604
|
|
19
19
|
|
|
20
20
|
// Includes MV3+ APIs only.
|
|
21
21
|
|
|
@@ -8664,6 +8664,52 @@ declare namespace chrome {
|
|
|
8664
8664
|
softwareBackedSubtleCrypto: SubtleCrypto;
|
|
8665
8665
|
}
|
|
8666
8666
|
|
|
8667
|
+
/**
|
|
8668
|
+
* Whether to use the Enterprise User Key or the Enterprise Machine Key.
|
|
8669
|
+
*
|
|
8670
|
+
* @since Pending
|
|
8671
|
+
*/
|
|
8672
|
+
export type Scope = "USER" | "MACHINE";
|
|
8673
|
+
|
|
8674
|
+
/**
|
|
8675
|
+
* Type of key to generate.
|
|
8676
|
+
*
|
|
8677
|
+
* @since Pending
|
|
8678
|
+
*/
|
|
8679
|
+
export type Algorithm = "RSA" | "ECDSA";
|
|
8680
|
+
|
|
8681
|
+
/**
|
|
8682
|
+
* @since Pending
|
|
8683
|
+
*/
|
|
8684
|
+
export interface RegisterKeyOptions {
|
|
8685
|
+
|
|
8686
|
+
/**
|
|
8687
|
+
* Which algorithm the registered key should use.
|
|
8688
|
+
*/
|
|
8689
|
+
algorithm: Algorithm;
|
|
8690
|
+
}
|
|
8691
|
+
|
|
8692
|
+
/**
|
|
8693
|
+
* @since Pending
|
|
8694
|
+
*/
|
|
8695
|
+
export interface ChallengeKeyOptions {
|
|
8696
|
+
|
|
8697
|
+
/**
|
|
8698
|
+
* A challenge as emitted by the Verified Access Web API.
|
|
8699
|
+
*/
|
|
8700
|
+
challenge: ArrayBuffer;
|
|
8701
|
+
|
|
8702
|
+
/**
|
|
8703
|
+
* If present, registers the challenged key with the specified `scope`'s token. The key can then be associated with a certificate and used like any other signing key. Subsequent calls to this function will then generate a new Enterprise Key in the specified `scope`.
|
|
8704
|
+
*/
|
|
8705
|
+
registerKey?: RegisterKeyOptions;
|
|
8706
|
+
|
|
8707
|
+
/**
|
|
8708
|
+
* Which Enterprise Key to challenge.
|
|
8709
|
+
*/
|
|
8710
|
+
scope: Scope;
|
|
8711
|
+
}
|
|
8712
|
+
|
|
8667
8713
|
/**
|
|
8668
8714
|
* Returns the available Tokens. In a regular user's session the list will always contain the user's token with `id` `"user"`. If a system-wide TPM token is available, the returned list will also contain the system-wide token with `id` `"system"`. The system-wide token will be the same for all sessions on this device (device in the sense of e.g. a Chromebook).
|
|
8669
8715
|
*
|
|
@@ -8729,12 +8775,36 @@ declare namespace chrome {
|
|
|
8729
8775
|
callback?: () => void,
|
|
8730
8776
|
): void;
|
|
8731
8777
|
|
|
8778
|
+
/**
|
|
8779
|
+
* Similar to `challengeMachineKey` and `challengeUserKey`, but allows specifying the algorithm of a registered key. Challenges a hardware-backed Enterprise Machine Key and emits the response as part of a remote attestation protocol. Only useful on Chrome OS and in conjunction with the Verified Access Web API which both issues challenges and verifies responses.
|
|
8780
|
+
*
|
|
8781
|
+
* A successful verification by the Verified Access Web API is a strong signal that the current device is a legitimate Chrome OS device, the current device is managed by the domain specified during verification, the current signed-in user is managed by the domain specified during verification, and the current device state complies with enterprise device policy. For example, a policy may specify that the device must not be in developer mode. Any device identity emitted by the verification is tightly bound to the hardware of the current device. If `"user"` Scope is specified, the identity is also tighly bound to the current signed-in user.
|
|
8782
|
+
*
|
|
8783
|
+
* This function is highly restricted and will fail if the current device is not managed, the current user is not managed, or if this operation has not explicitly been enabled for the caller by enterprise device policy. The challenged key does not reside in the `"system"` or `"user"` token and is not accessible by any other API.
|
|
8784
|
+
*
|
|
8785
|
+
* @param options Object containing the fields defined in {@link ChallengeKeyOptions}.
|
|
8786
|
+
* @param callback Called back with the challenge response.
|
|
8787
|
+
* @since Pending
|
|
8788
|
+
*/
|
|
8789
|
+
export function challengeKey(
|
|
8790
|
+
|
|
8791
|
+
options: ChallengeKeyOptions,
|
|
8792
|
+
|
|
8793
|
+
/**
|
|
8794
|
+
* @param response The challenge response.
|
|
8795
|
+
*/
|
|
8796
|
+
callback: (
|
|
8797
|
+
response: ArrayBuffer,
|
|
8798
|
+
) => void,
|
|
8799
|
+
): void;
|
|
8800
|
+
|
|
8732
8801
|
/**
|
|
8733
8802
|
* Challenges a hardware-backed Enterprise Machine Key and emits the response as part of a remote attestation protocol. Only useful on Chrome OS and in conjunction with the Verified Access Web API which both issues challenges and verifies responses. A successful verification by the Verified Access Web API is a strong signal of all of the following: \* The current device is a legitimate Chrome OS device. \* The current device is managed by the domain specified during verification. \* The current signed-in user is managed by the domain specified during verification. \* The current device state complies with enterprise device policy. For example, a policy may specify that the device must not be in developer mode. \* Any device identity emitted by the verification is tightly bound to the hardware of the current device. This function is highly restricted and will fail if the current device is not managed, the current user is not managed, or if this operation has not explicitly been enabled for the caller by enterprise device policy. The Enterprise Machine Key does not reside in the `"system"` token and is not accessible by any other API.
|
|
8734
8803
|
*
|
|
8735
8804
|
* @param challenge A challenge as emitted by the Verified Access Web API.
|
|
8736
8805
|
* @param registerKey If set, the current Enterprise Machine Key is registered with the `"system"` token and relinquishes the Enterprise Machine Key role. The key can then be associated with a certificate and used like any other signing key. This key is 2048-bit RSA. Subsequent calls to this function will then generate a new Enterprise Machine Key.
|
|
8737
8806
|
* @param callback Called back with the challenge response.
|
|
8807
|
+
* @deprecated Use {@link challengeKey} instead.
|
|
8738
8808
|
* @since Chrome 50
|
|
8739
8809
|
*/
|
|
8740
8810
|
export function challengeMachineKey(
|
|
@@ -8759,6 +8829,7 @@ declare namespace chrome {
|
|
|
8759
8829
|
*
|
|
8760
8830
|
* @param challenge A challenge as emitted by the Verified Access Web API.
|
|
8761
8831
|
* @param callback Called back with the challenge response.
|
|
8832
|
+
* @deprecated Use {@link challengeKey} instead.
|
|
8762
8833
|
* @since Chrome 50
|
|
8763
8834
|
*/
|
|
8764
8835
|
export function challengeMachineKey(
|
|
@@ -8779,6 +8850,7 @@ declare namespace chrome {
|
|
|
8779
8850
|
* @param challenge A challenge as emitted by the Verified Access Web API.
|
|
8780
8851
|
* @param registerKey If set, the current Enterprise User Key is registered with the `"user"` token and relinquishes the Enterprise User Key role. The key can then be associated with a certificate and used like any other signing key. This key is 2048-bit RSA. Subsequent calls to this function will then generate a new Enterprise User Key.
|
|
8781
8852
|
* @param callback Called back with the challenge response.
|
|
8853
|
+
* @deprecated Use {@link challengeKey} instead.
|
|
8782
8854
|
* @since Chrome 50
|
|
8783
8855
|
*/
|
|
8784
8856
|
export function challengeUserKey(
|
|
@@ -25934,7 +26006,7 @@ declare namespace chrome {
|
|
|
25934
26006
|
*
|
|
25935
26007
|
* Remote desktop extensions typically call this method after detecting attachment of a remote session to this host. Once this method returns without error, regular processing of WebAuthn requests is suspended, and events from this extension API are raised.
|
|
25936
26008
|
*
|
|
25937
|
-
* This method fails with an error if a different extension is already attached
|
|
26009
|
+
* This method fails with an error if a different extension is already attached.
|
|
25938
26010
|
*
|
|
25939
26011
|
* The attached extension must call \`detach()\` once the remote desktop session has ended in order to resume regular WebAuthn request processing. Extensions automatically become detached if they are unloaded.
|
|
25940
26012
|
*
|
|
@@ -25947,7 +26019,7 @@ declare namespace chrome {
|
|
|
25947
26019
|
*
|
|
25948
26020
|
* Remote desktop extensions typically call this method after detecting attachment of a remote session to this host. Once this method returns without error, regular processing of WebAuthn requests is suspended, and events from this extension API are raised.
|
|
25949
26021
|
*
|
|
25950
|
-
* This method fails with an error if a different extension is already attached
|
|
26022
|
+
* This method fails with an error if a different extension is already attached.
|
|
25951
26023
|
*
|
|
25952
26024
|
* The attached extension must call \`detach()\` once the remote desktop session has ended in order to resume regular WebAuthn request processing. Extensions automatically become detached if they are unloaded.
|
|
25953
26025
|
*
|
|
@@ -25963,7 +26035,7 @@ declare namespace chrome {
|
|
|
25963
26035
|
/**
|
|
25964
26036
|
* Removes this extension from being the active Web Authentication API request proxy.
|
|
25965
26037
|
*
|
|
25966
|
-
* This method is typically called when the extension detects that a remote desktop session was terminated. Once this method returns
|
|
26038
|
+
* This method is typically called when the extension detects that a remote desktop session was terminated. Once this method returns, the extension ceases to be the active Web Authentication API request proxy.
|
|
25967
26039
|
*
|
|
25968
26040
|
* Refer to the `onRemoteSessionStateChange` event for signaling a change of remote session attachment from a native application to to the (possibly suspended) extension.
|
|
25969
26041
|
*/
|
|
@@ -25972,7 +26044,7 @@ declare namespace chrome {
|
|
|
25972
26044
|
/**
|
|
25973
26045
|
* Removes this extension from being the active Web Authentication API request proxy.
|
|
25974
26046
|
*
|
|
25975
|
-
* This method is typically called when the extension detects that a remote desktop session was terminated. Once this method returns
|
|
26047
|
+
* This method is typically called when the extension detects that a remote desktop session was terminated. Once this method returns, the extension ceases to be the active Web Authentication API request proxy.
|
|
25976
26048
|
*
|
|
25977
26049
|
* Refer to the `onRemoteSessionStateChange` event for signaling a change of remote session attachment from a native application to to the (possibly suspended) extension.
|
|
25978
26050
|
*/
|
package/package.json
CHANGED
|
@@ -5,7 +5,7 @@
|
|
|
5
5
|
"type": "module",
|
|
6
6
|
"name": "chrome-types",
|
|
7
7
|
"config": {
|
|
8
|
-
"build-hash": "
|
|
8
|
+
"build-hash": "743591dce8b00784"
|
|
9
9
|
},
|
|
10
10
|
"repository": {
|
|
11
11
|
"type": "git",
|
|
@@ -16,5 +16,5 @@
|
|
|
16
16
|
"url": "https://github.com/GoogleChrome/chrome-types/issues"
|
|
17
17
|
},
|
|
18
18
|
"homepage": "https://github.com/GoogleChrome/chrome-types",
|
|
19
|
-
"version": "0.1.
|
|
19
|
+
"version": "0.1.156"
|
|
20
20
|
}
|