diff --git a/apps/desktop/desktop_native/index.d.ts b/apps/desktop/desktop_native/index.d.ts index 922e2fda24..5d5b7a8602 100644 --- a/apps/desktop/desktop_native/index.d.ts +++ b/apps/desktop/desktop_native/index.d.ts @@ -12,7 +12,7 @@ export namespace passwords { export function setPassword(service: string, account: string, password: string): Promise /** Delete the stored password from the keychain. */ export function deletePassword(service: string, account: string): Promise - export function osSupportsSecuredStorage(): boolean + export function osSupport(): boolean } export namespace biometrics { export function prompt(hwnd: Buffer, message: string): Promise diff --git a/apps/desktop/desktop_native/src/lib.rs b/apps/desktop/desktop_native/src/lib.rs index fa63aa6492..da45390ec8 100644 --- a/apps/desktop/desktop_native/src/lib.rs +++ b/apps/desktop/desktop_native/src/lib.rs @@ -42,7 +42,7 @@ pub mod passwords { } #[napi] - pub fn os_supports_secured_storage() -> bool { + pub fn os_support() -> bool { super::password::has_password_management() } } diff --git a/apps/desktop/src/main.ts b/apps/desktop/src/main.ts index ce994158f8..0ed3524f59 100644 --- a/apps/desktop/src/main.ts +++ b/apps/desktop/src/main.ts @@ -179,7 +179,7 @@ export class Main { this.tokenService = new TokenService( singleUserStateProvider, globalStateProvider, - passwords.osSupportsSecuredStorage(), + passwords.osSupport(), illegalSecureStorageService, this.keyGenerationService, this.encryptService, diff --git a/apps/desktop/src/platform/main/desktop-credential-storage-listener.ts b/apps/desktop/src/platform/main/desktop-credential-storage-listener.ts index 4d27742df3..aa4f7c73dc 100644 --- a/apps/desktop/src/platform/main/desktop-credential-storage-listener.ts +++ b/apps/desktop/src/platform/main/desktop-credential-storage-listener.ts @@ -19,8 +19,8 @@ export class DesktopCredentialStorageListener { init() { // Handle password management detection sync - ipcMain.on("osSupportsSecuredStorage", (event) => { - event.returnValue = passwords.osSupportsSecuredStorage(); + ipcMain.on("osSupportsPasswords", (event) => { + event.returnValue = passwords.osSupport(); }); ipcMain.handle("keytar", async (event: any, message: any) => { try { diff --git a/apps/desktop/src/platform/preload.ts b/apps/desktop/src/platform/preload.ts index 45113a1fc7..6c6a5ee986 100644 --- a/apps/desktop/src/platform/preload.ts +++ b/apps/desktop/src/platform/preload.ts @@ -34,7 +34,7 @@ const passwords = { ipcRenderer.invoke("keytar", { action: "setPassword", key, keySuffix, value }), delete: (key: string, keySuffix: string): Promise => ipcRenderer.invoke("keytar", { action: "deletePassword", key, keySuffix }), - osSupportsSecuredStorage: (): boolean => ipcRenderer.sendSync("osSupportsSecuredStorage"), + osSupport: (): boolean => ipcRenderer.sendSync("osSupportsPasswords"), }; const biometric = { diff --git a/apps/desktop/src/platform/services/electron-platform-utils.service.ts b/apps/desktop/src/platform/services/electron-platform-utils.service.ts index 06e9317347..49ce95af23 100644 --- a/apps/desktop/src/platform/services/electron-platform-utils.service.ts +++ b/apps/desktop/src/platform/services/electron-platform-utils.service.ts @@ -142,7 +142,7 @@ export class ElectronPlatformUtilsService implements PlatformUtilsService { } supportsSecureStorage(): boolean { - return ipc.platform.passwords.osSupportsSecuredStorage(); + return ipc.platform.passwords.osSupport(); } getAutofillKeyboardShortcut(): Promise {