mirror of
https://github.com/bitwarden/browser
synced 2025-12-15 15:53:27 +00:00
* Passkey stuff Co-authored-by: Anders Åberg <github@andersaberg.com> * Ugly hacks * Work On Modal State Management * Applying modalStyles * modal * Improved hide/show * fixed promise * File name * fix prettier * Protecting against null API's and undefined data * Only show fake popup to devs * cleanup mock code * rename minmimal-app to modal-app * Added comment * Added comment * removed old comment * Avoided changing minimum size * Add small comment * Rename component * adress feedback * Fixed uppercase file * Fixed build * Added codeowners * added void * commentary * feat: reset setting on app start * Moved reset to be in main / process launch * Add comment to create window * Added a little bit of styling * Use Messaging service to loadUrl * Enable passkeysautofill * Add logging * halfbaked * Integration working * And now it works without extra delay * Clean up * add note about messaging * lb * removed console.logs * Cleanup and adress review feedback * This hides the swift UI * pick credential, draft * Remove logger * a whole lot of wiring * not working * Improved wiring * Cancel after 90s * Introduced observable * Launching bitwarden if its not running * Passing position from native to electron * Rename inModalMode to modalMode * remove tap * revert spaces * added back isDev * cleaned up a bit * Cleanup swift file * tweaked logging * clean up * Update apps/desktop/macos/autofill-extension/CredentialProviderViewController.swift Co-authored-by: Andreas Coroiu <acoroiu@bitwarden.com> * Update apps/desktop/src/platform/main/autofill/native-autofill.main.ts Co-authored-by: Andreas Coroiu <acoroiu@bitwarden.com> * Update apps/desktop/src/platform/services/desktop-settings.service.ts Co-authored-by: Andreas Coroiu <acoroiu@bitwarden.com> * adress position feedback * Update apps/desktop/macos/autofill-extension/CredentialProviderViewController.swift Co-authored-by: Andreas Coroiu <acoroiu@bitwarden.com> * Removed extra logging * Adjusted error logging * Use .error to log errors * remove dead code * Update desktop-autofill.service.ts * use parseCredentialId instead of guidToRawFormat * Update apps/desktop/src/autofill/services/desktop-autofill.service.ts Co-authored-by: Andreas Coroiu <acoroiu@bitwarden.com> * Change windowXy to a Record instead of [number,number] * Update apps/desktop/src/autofill/services/desktop-fido2-user-interface.service.ts Co-authored-by: Andreas Coroiu <acoroiu@bitwarden.com> * Remove unsued dep and comment * changed timeout to be spec recommended maxium, 10 minutes, for now. * Correctly assume UP * Removed extra cancelRequest in deinint * Add timeout and UV to confirmChoseCipher UV is performed by UI, not the service * Improved docs regarding undefined cipherId * cleanup: UP is no longer undefined * Run completeError if ipc messages conversion failed * don't throw, instead return undefined * Disabled passkey provider * Throw error if no activeUserId was found * removed comment * Fixed lint * removed unsued service * reset entitlement formatting * Update entitlements.mas.plist --------- Co-authored-by: Justin Baur <19896123+justindbaur@users.noreply.github.com> Co-authored-by: Colton Hurst <colton@coltonhurst.com> Co-authored-by: Andreas Coroiu <andreas.coroiu@gmail.com> Co-authored-by: Andreas Coroiu <acoroiu@bitwarden.com>
185 lines
7.2 KiB
TypeScript
185 lines
7.2 KiB
TypeScript
/* tslint:disable */
|
|
/* eslint-disable */
|
|
|
|
/* auto-generated by NAPI-RS */
|
|
|
|
export declare namespace passwords {
|
|
/** Fetch the stored password from the keychain. */
|
|
export function getPassword(service: string, account: string): Promise<string>
|
|
/** Save the password to the keychain. Adds an entry if none exists otherwise updates the existing entry. */
|
|
export function setPassword(service: string, account: string, password: string): Promise<void>
|
|
/** Delete the stored password from the keychain. */
|
|
export function deletePassword(service: string, account: string): Promise<void>
|
|
export function isAvailable(): Promise<boolean>
|
|
}
|
|
export declare namespace biometrics {
|
|
export function prompt(hwnd: Buffer, message: string): Promise<boolean>
|
|
export function available(): Promise<boolean>
|
|
export function setBiometricSecret(service: string, account: string, secret: string, keyMaterial: KeyMaterial | undefined | null, ivB64: string): Promise<string>
|
|
export function getBiometricSecret(service: string, account: string, keyMaterial?: KeyMaterial | undefined | null): Promise<string>
|
|
/**
|
|
* Derives key material from biometric data. Returns a string encoded with a
|
|
* base64 encoded key and the base64 encoded challenge used to create it
|
|
* separated by a `|` character.
|
|
*
|
|
* If the iv is provided, it will be used as the challenge. Otherwise a random challenge will be generated.
|
|
*
|
|
* `format!("<key_base64>|<iv_base64>")`
|
|
*/
|
|
export function deriveKeyMaterial(iv?: string | undefined | null): Promise<OsDerivedKey>
|
|
export interface KeyMaterial {
|
|
osKeyPartB64: string
|
|
clientKeyPartB64?: string
|
|
}
|
|
export interface OsDerivedKey {
|
|
keyB64: string
|
|
ivB64: string
|
|
}
|
|
}
|
|
export declare namespace clipboards {
|
|
export function read(): Promise<string>
|
|
export function write(text: string, password: boolean): Promise<void>
|
|
}
|
|
export declare namespace sshagent {
|
|
export interface PrivateKey {
|
|
privateKey: string
|
|
name: string
|
|
cipherId: string
|
|
}
|
|
export interface SshKey {
|
|
privateKey: string
|
|
publicKey: string
|
|
keyFingerprint: string
|
|
}
|
|
export interface SshUiRequest {
|
|
cipherId?: string
|
|
isList: boolean
|
|
processName: string
|
|
isForwarding: boolean
|
|
namespace?: string
|
|
}
|
|
export function serve(callback: (err: Error | null, arg: SshUiRequest) => any): Promise<SshAgentState>
|
|
export function stop(agentState: SshAgentState): void
|
|
export function isRunning(agentState: SshAgentState): boolean
|
|
export function setKeys(agentState: SshAgentState, newKeys: Array<PrivateKey>): void
|
|
export function lock(agentState: SshAgentState): void
|
|
export function clearKeys(agentState: SshAgentState): void
|
|
export class SshAgentState { }
|
|
}
|
|
export declare namespace processisolations {
|
|
export function disableCoredumps(): Promise<void>
|
|
export function isCoreDumpingDisabled(): Promise<boolean>
|
|
export function disableMemoryAccess(): Promise<void>
|
|
}
|
|
export declare namespace powermonitors {
|
|
export function onLock(callback: (err: Error | null, ) => any): Promise<void>
|
|
export function isLockMonitorAvailable(): Promise<boolean>
|
|
}
|
|
export declare namespace windows_registry {
|
|
export function createKey(key: string, subkey: string, value: string): Promise<void>
|
|
export function deleteKey(key: string, subkey: string): Promise<void>
|
|
}
|
|
export declare namespace ipc {
|
|
export interface IpcMessage {
|
|
clientId: number
|
|
kind: IpcMessageType
|
|
message?: string
|
|
}
|
|
export const enum IpcMessageType {
|
|
Connected = 0,
|
|
Disconnected = 1,
|
|
Message = 2
|
|
}
|
|
export class IpcServer {
|
|
/**
|
|
* Create and start the IPC server without blocking.
|
|
*
|
|
* @param name The endpoint name to listen on. This name uniquely identifies the IPC connection and must be the same for both the server and client.
|
|
* @param callback This function will be called whenever a message is received from a client.
|
|
*/
|
|
static listen(name: string, callback: (error: null | Error, message: IpcMessage) => void): Promise<IpcServer>
|
|
/** Return the path to the IPC server. */
|
|
getPath(): string
|
|
/** Stop the IPC server. */
|
|
stop(): void
|
|
/**
|
|
* Send a message over the IPC server to all the connected clients
|
|
*
|
|
* @return The number of clients that the message was sent to. Note that the number of messages
|
|
* actually received may be less, as some clients could disconnect before receiving the message.
|
|
*/
|
|
send(message: string): number
|
|
}
|
|
}
|
|
export declare namespace autofill {
|
|
export function runCommand(value: string): Promise<string>
|
|
export const enum UserVerification {
|
|
Preferred = 'preferred',
|
|
Required = 'required',
|
|
Discouraged = 'discouraged'
|
|
}
|
|
export interface Position {
|
|
x: number
|
|
y: number
|
|
}
|
|
export interface PasskeyRegistrationRequest {
|
|
rpId: string
|
|
userName: string
|
|
userHandle: Array<number>
|
|
clientDataHash: Array<number>
|
|
userVerification: UserVerification
|
|
supportedAlgorithms: Array<number>
|
|
windowXy: Position
|
|
}
|
|
export interface PasskeyRegistrationResponse {
|
|
rpId: string
|
|
clientDataHash: Array<number>
|
|
credentialId: Array<number>
|
|
attestationObject: Array<number>
|
|
}
|
|
export interface PasskeyAssertionRequest {
|
|
rpId: string
|
|
clientDataHash: Array<number>
|
|
userVerification: UserVerification
|
|
allowedCredentials: Array<Array<number>>
|
|
windowXy: Position
|
|
}
|
|
export interface PasskeyAssertionWithoutUserInterfaceRequest {
|
|
rpId: string
|
|
credentialId: Array<number>
|
|
userName: string
|
|
userHandle: Array<number>
|
|
recordIdentifier?: string
|
|
clientDataHash: Array<number>
|
|
userVerification: UserVerification
|
|
windowXy: Position
|
|
}
|
|
export interface PasskeyAssertionResponse {
|
|
rpId: string
|
|
userHandle: Array<number>
|
|
signature: Array<number>
|
|
clientDataHash: Array<number>
|
|
authenticatorData: Array<number>
|
|
credentialId: Array<number>
|
|
}
|
|
export class IpcServer {
|
|
/**
|
|
* Create and start the IPC server without blocking.
|
|
*
|
|
* @param name The endpoint name to listen on. This name uniquely identifies the IPC connection and must be the same for both the server and client.
|
|
* @param callback This function will be called whenever a message is received from a client.
|
|
*/
|
|
static listen(name: string, registrationCallback: (error: null | Error, clientId: number, sequenceNumber: number, message: PasskeyRegistrationRequest) => void, assertionCallback: (error: null | Error, clientId: number, sequenceNumber: number, message: PasskeyAssertionRequest) => void, assertionWithoutUserInterfaceCallback: (error: null | Error, clientId: number, sequenceNumber: number, message: PasskeyAssertionWithoutUserInterfaceRequest) => void): Promise<IpcServer>
|
|
/** Return the path to the IPC server. */
|
|
getPath(): string
|
|
/** Stop the IPC server. */
|
|
stop(): void
|
|
completeRegistration(clientId: number, sequenceNumber: number, response: PasskeyRegistrationResponse): number
|
|
completeAssertion(clientId: number, sequenceNumber: number, response: PasskeyAssertionResponse): number
|
|
completeError(clientId: number, sequenceNumber: number, error: string): number
|
|
}
|
|
}
|
|
export declare namespace crypto {
|
|
export function argon2(secret: Buffer, salt: Buffer, iterations: number, memory: number, parallelism: number): Promise<Buffer>
|
|
}
|