2022-04-05 16:54:44 +02:00
/* tslint:disable */
/* eslint-disable */
/* auto-generated by NAPI-RS */
2024-10-03 13:13:42 +02:00
export declare namespace passwords {
2022-04-05 16:54:44 +02:00
/** Fetch the stored password from the keychain. */
export function getPassword ( service : string , account : string ) : Promise < string >
/** Fetch the stored password from the keychain that was stored with Keytar. */
export function getPasswordKeytar ( service : string , account : string ) : Promise < string >
/** Save the password to the keychain. Adds an entry if none exists otherwise updates the existing entry. */
export function setPassword ( service : string , account : string , password : string ) : Promise < void >
/** Delete the stored password from the keychain. */
export function deletePassword ( service : string , account : string ) : Promise < void >
2024-08-06 17:04:17 +02:00
export function isAvailable ( ) : Promise < boolean >
2022-04-05 16:54:44 +02:00
}
2024-10-03 13:13:42 +02:00
export declare namespace biometrics {
2022-07-25 13:24:13 +02:00
export function prompt ( hwnd : Buffer , message : string ) : Promise < boolean >
export function available ( ) : Promise < boolean >
2023-04-18 15:09:47 +02:00
export function setBiometricSecret ( service : string , account : string , secret : string , keyMaterial : KeyMaterial | undefined | null , ivB64 : string ) : Promise < string >
export function getBiometricSecret ( service : string , account : string , keyMaterial? : KeyMaterial | undefined | null ) : Promise < string >
/ * *
* Derives key material from biometric data . Returns a string encoded with a
* base64 encoded key and the base64 encoded challenge used to create it
* separated by a ` | ` character .
*
* If the iv is provided , it will be used as the challenge . Otherwise a random challenge will be generated .
*
* ` format!("<key_base64>|<iv_base64>") `
* /
export function deriveKeyMaterial ( iv? : string | undefined | null ) : Promise < OsDerivedKey >
export interface KeyMaterial {
osKeyPartB64 : string
clientKeyPartB64? : string
}
export interface OsDerivedKey {
keyB64 : string
ivB64 : string
}
2022-07-25 13:24:13 +02:00
}
2024-10-03 13:13:42 +02:00
export declare namespace clipboards {
2023-10-02 18:50:57 +02:00
export function read ( ) : Promise < string >
export function write ( text : string , password : boolean ) : Promise < void >
}
2024-11-08 11:01:31 +01:00
export declare namespace sshagent {
export interface PrivateKey {
privateKey : string
name : string
cipherId : string
}
export interface SshKey {
privateKey : string
publicKey : string
keyFingerprint : string
}
export const enum SshKeyImportStatus {
/** ssh key was parsed correctly and will be returned in the result */
Success = 0 ,
/** ssh key was parsed correctly but is encrypted and requires a password */
PasswordRequired = 1 ,
/** ssh key was parsed correctly, and a password was provided when calling the import, but it was incorrect */
WrongPassword = 2 ,
/** ssh key could not be parsed, either due to an incorrect / unsupported format (pkcs#8) or key type (ecdsa), or because the input is not an ssh key */
ParsingError = 3 ,
/** ssh key type is not supported (e.g. ecdsa) */
UnsupportedKeyType = 4
}
export interface SshKeyImportResult {
status : SshKeyImportStatus
sshKey? : SshKey
}
export function serve ( callback : ( err : Error | null , arg : string ) = > any ) : Promise < SshAgentState >
export function stop ( agentState : SshAgentState ) : void
export function setKeys ( agentState : SshAgentState , newKeys : Array < PrivateKey > ) : void
export function lock ( agentState : SshAgentState ) : void
export function importKey ( encodedKey : string , password : string ) : SshKeyImportResult
export function generateKeypair ( keyAlgorithm : string ) : Promise < SshKey >
export class SshAgentState { }
}
2024-10-03 13:13:42 +02:00
export declare namespace processisolations {
2024-08-05 21:51:38 +02:00
export function disableCoredumps ( ) : Promise < void >
export function isCoreDumpingDisabled ( ) : Promise < boolean >
export function disableMemoryAccess ( ) : Promise < void >
}
2024-10-03 13:13:42 +02:00
export declare namespace powermonitors {
2024-07-25 17:09:03 +02:00
export function onLock ( callback : ( err : Error | null , ) = > any ) : Promise < void >
export function isLockMonitorAvailable ( ) : Promise < boolean >
}
2024-11-04 14:50:05 +01:00
export declare namespace windows_registry {
export function createKey ( key : string , subkey : string , value : string ) : Promise < void >
export function deleteKey ( key : string , subkey : string ) : Promise < void >
}
2024-10-11 20:10:20 +02:00
export declare namespace ipc {
2024-10-01 16:28:56 +02:00
export interface IpcMessage {
clientId : number
kind : IpcMessageType
message? : string
}
export const enum IpcMessageType {
Connected = 0 ,
Disconnected = 1 ,
Message = 2
}
export class IpcServer {
/ * *
* Create and start the IPC server without blocking .
*
* @param name The endpoint name to listen on . This name uniquely identifies the IPC connection and must be the same for both the server and client .
* @param callback This function will be called whenever a message is received from a client .
* /
static listen ( name : string , callback : ( error : null | Error , message : IpcMessage ) = > void ) : Promise < IpcServer >
/** Stop the IPC server. */
stop ( ) : void
/ * *
* Send a message over the IPC server to all the connected clients
*
* @return The number of clients that the message was sent to . Note that the number of messages
* actually received may be less , as some clients could disconnect before receiving the message .
* /
send ( message : string ) : number
}
}