@openfin/core 38.81.23 → 38.81.29

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -4521,6 +4521,17 @@ declare type DeviceInfo = {
4521
4521
  productId: string | number;
4522
4522
  };
4523
4523
 
4524
+ /**
4525
+ * Permission string keys for device APIs
4526
+ *
4527
+ * @remarks We currently only support USB and HID devices. Permissions for individual devices
4528
+ * must be granted in {@link Permissions.devices}.
4529
+ *
4530
+ * `usb`: Access to one or more USB devices
4531
+ * `hid : Access to one or more HID devices
4532
+ */
4533
+ declare type DevicePermissionName = 'usb' | 'hid';
4534
+
4524
4535
  /**
4525
4536
  * Generated when a page's theme color changes. This is usually due to encountering a meta tag.
4526
4537
  * @interface
@@ -7544,9 +7555,7 @@ declare class InteropClient extends Base {
7544
7555
  * ```
7545
7556
  *
7546
7557
  *
7547
- * We are also testing the ability to add a context handler for specific contexts. If you would like to use
7548
- * this, please make sure you add your context handlers at the top level of your application, on a page that
7549
- * does not navigate/reload/re-render, to avoid memory leaks. This feature is experimental:
7558
+ * Passing in a context type as the second parameter will cause the handler to only be invoked with that context type.
7550
7559
  *
7551
7560
  * ```js
7552
7561
  * function handleInstrumentContext(contextInfo) {
@@ -9825,6 +9834,8 @@ declare namespace OpenFin_2 {
9825
9834
  ApplicationPermissions,
9826
9835
  LaunchExternalProcessRule,
9827
9836
  SystemPermissions,
9837
+ DevicePermissionName,
9838
+ WebPermissionName,
9828
9839
  WebPermission,
9829
9840
  VerboseWebPermission,
9830
9841
  OpenExternalPermission,
@@ -14631,8 +14642,13 @@ declare class System extends EmitterBase<OpenFin_2.SystemEvent> {
14631
14642
  launchManifest(manifestUrl: string, opts?: OpenFin_2.RvmLaunchOptions): Promise<OpenFin_2.Manifest>;
14632
14643
  /**
14633
14644
  * Query permission of a secured api in current context.
14645
+ *
14634
14646
  * @param apiName - The full name of a secured API.
14635
14647
  *
14648
+ * @remarks If a function has a structured permission value, the value of `granted` will reflect the `enabled` key
14649
+ * of the call's permissions literal. In this case, *permission may still be denied to a call* pending arguments or other
14650
+ * runtime state. This is indicated with `state: unavailable`.
14651
+ *
14636
14652
  * @example
14637
14653
  * ```js
14638
14654
  * fin.System.queryPermissionForCurrentContext('System.launchExternalProcess').then(result => console.log(result)).catch(err => console.log(err));
@@ -17207,18 +17223,38 @@ declare namespace WebContentsEvents {
17207
17223
  *
17208
17224
  * @remarks We only support those web APIs listed by electron.
17209
17225
  *
17210
- * `audio`: Request access to audio devices.<br>
17211
- * `video`: Request access to video devices.<br>
17212
- * `geolocation`: Request access to user's current location.<br>
17226
+ * `audio`: Access to audio devices.<br>
17227
+ * `video`: Access to video devices.<br>
17228
+ * `geolocation`: Access to user's current location.<br>
17229
+ * `notifications`: Request notification creation and the ability to display them in the user's system tray.<br>
17230
+ * `midiSysex`: Use of system exclusive messages in the webmidi API.<br>
17231
+ * `pointerLock`: Access to mouse movements as an input method.<br>
17232
+ * `fullscreen`: Access to fullscreen mode.<br>
17233
+ * `openExternal`: Access to open links in external applications.<br>
17234
+ * `clipboard-read`: Access to read from the clipboard.<br>
17235
+ * `clipboard-sanitized-write`: Access to write to the clipboard.
17236
+ * `usb`: Access to one or more USB devices
17237
+ * `hid : Access to one or more HID devices
17238
+ */
17239
+ declare type WebPermission = WebPermissionName | DevicePermissionName | OpenExternalPermission;
17240
+
17241
+ /**
17242
+ * Permission string keys for webAPIs
17243
+ *
17244
+ * @remarks We only support those web APIs listed by electron.
17245
+ *
17246
+ * `audio`: Access to audio devices.<br>
17247
+ * `video`: Access to video devices.<br>
17248
+ * `geolocation`: Access to user's current location.<br>
17213
17249
  * `notifications`: Request notification creation and the ability to display them in the user's system tray.<br>
17214
- * `midiSysex`: Request the use of system exclusive messages in the webmidi API.<br>
17215
- * `pointerLock`: Request to directly interpret mouse movements as an input method.<br>
17216
- * `fullscreen`: Request for the app to enter fullscreen mode.<br>
17217
- * `openExternal`: Request to open links in external applications.<br>
17218
- * `clipboard-read`: Request access to read from the clipboard.<br>
17219
- * `clipboard-sanitized-write`: Request access to write to the clipboard.
17220
- */
17221
- declare type WebPermission = 'audio' | 'video' | 'geolocation' | 'notifications' | 'midiSysex' | 'pointerLock' | 'fullscreen' | 'openExternal' | 'clipboard-read' | 'clipboard-sanitized-write' | 'hid' | 'usb' | OpenExternalPermission;
17250
+ * `midiSysex`: Use of system exclusive messages in the webmidi API.<br>
17251
+ * `pointerLock`: Access to mouse movements as an input method.<br>
17252
+ * `fullscreen`: Access to fullscreen mode.<br>
17253
+ * `openExternal`: Access to open links in external applications.<br>
17254
+ * `clipboard-read`: Access to read from the clipboard.<br>
17255
+ * `clipboard-sanitized-write`: Access to write to the clipboard.
17256
+ */
17257
+ declare type WebPermissionName = 'audio' | 'video' | 'geolocation' | 'notifications' | 'midiSysex' | 'pointerLock' | 'fullscreen' | 'openExternal' | 'clipboard-read' | 'clipboard-sanitized-write';
17222
17258
 
17223
17259
  /**
17224
17260
  * Object representing headers and their values, where the
@@ -4521,6 +4521,17 @@ declare type DeviceInfo = {
4521
4521
  productId: string | number;
4522
4522
  };
4523
4523
 
4524
+ /**
4525
+ * Permission string keys for device APIs
4526
+ *
4527
+ * @remarks We currently only support USB and HID devices. Permissions for individual devices
4528
+ * must be granted in {@link Permissions.devices}.
4529
+ *
4530
+ * `usb`: Access to one or more USB devices
4531
+ * `hid : Access to one or more HID devices
4532
+ */
4533
+ declare type DevicePermissionName = 'usb' | 'hid';
4534
+
4524
4535
  /**
4525
4536
  * Generated when a page's theme color changes. This is usually due to encountering a meta tag.
4526
4537
  * @interface
@@ -7544,9 +7555,7 @@ declare class InteropClient extends Base {
7544
7555
  * ```
7545
7556
  *
7546
7557
  *
7547
- * We are also testing the ability to add a context handler for specific contexts. If you would like to use
7548
- * this, please make sure you add your context handlers at the top level of your application, on a page that
7549
- * does not navigate/reload/re-render, to avoid memory leaks. This feature is experimental:
7558
+ * Passing in a context type as the second parameter will cause the handler to only be invoked with that context type.
7550
7559
  *
7551
7560
  * ```js
7552
7561
  * function handleInstrumentContext(contextInfo) {
@@ -9825,6 +9834,8 @@ declare namespace OpenFin_2 {
9825
9834
  ApplicationPermissions,
9826
9835
  LaunchExternalProcessRule,
9827
9836
  SystemPermissions,
9837
+ DevicePermissionName,
9838
+ WebPermissionName,
9828
9839
  WebPermission,
9829
9840
  VerboseWebPermission,
9830
9841
  OpenExternalPermission,
@@ -14631,8 +14642,13 @@ declare class System extends EmitterBase<OpenFin_2.SystemEvent> {
14631
14642
  launchManifest(manifestUrl: string, opts?: OpenFin_2.RvmLaunchOptions): Promise<OpenFin_2.Manifest>;
14632
14643
  /**
14633
14644
  * Query permission of a secured api in current context.
14645
+ *
14634
14646
  * @param apiName - The full name of a secured API.
14635
14647
  *
14648
+ * @remarks If a function has a structured permission value, the value of `granted` will reflect the `enabled` key
14649
+ * of the call's permissions literal. In this case, *permission may still be denied to a call* pending arguments or other
14650
+ * runtime state. This is indicated with `state: unavailable`.
14651
+ *
14636
14652
  * @example
14637
14653
  * ```js
14638
14654
  * fin.System.queryPermissionForCurrentContext('System.launchExternalProcess').then(result => console.log(result)).catch(err => console.log(err));
@@ -17207,18 +17223,38 @@ declare namespace WebContentsEvents {
17207
17223
  *
17208
17224
  * @remarks We only support those web APIs listed by electron.
17209
17225
  *
17210
- * `audio`: Request access to audio devices.<br>
17211
- * `video`: Request access to video devices.<br>
17212
- * `geolocation`: Request access to user's current location.<br>
17226
+ * `audio`: Access to audio devices.<br>
17227
+ * `video`: Access to video devices.<br>
17228
+ * `geolocation`: Access to user's current location.<br>
17229
+ * `notifications`: Request notification creation and the ability to display them in the user's system tray.<br>
17230
+ * `midiSysex`: Use of system exclusive messages in the webmidi API.<br>
17231
+ * `pointerLock`: Access to mouse movements as an input method.<br>
17232
+ * `fullscreen`: Access to fullscreen mode.<br>
17233
+ * `openExternal`: Access to open links in external applications.<br>
17234
+ * `clipboard-read`: Access to read from the clipboard.<br>
17235
+ * `clipboard-sanitized-write`: Access to write to the clipboard.
17236
+ * `usb`: Access to one or more USB devices
17237
+ * `hid : Access to one or more HID devices
17238
+ */
17239
+ declare type WebPermission = WebPermissionName | DevicePermissionName | OpenExternalPermission;
17240
+
17241
+ /**
17242
+ * Permission string keys for webAPIs
17243
+ *
17244
+ * @remarks We only support those web APIs listed by electron.
17245
+ *
17246
+ * `audio`: Access to audio devices.<br>
17247
+ * `video`: Access to video devices.<br>
17248
+ * `geolocation`: Access to user's current location.<br>
17213
17249
  * `notifications`: Request notification creation and the ability to display them in the user's system tray.<br>
17214
- * `midiSysex`: Request the use of system exclusive messages in the webmidi API.<br>
17215
- * `pointerLock`: Request to directly interpret mouse movements as an input method.<br>
17216
- * `fullscreen`: Request for the app to enter fullscreen mode.<br>
17217
- * `openExternal`: Request to open links in external applications.<br>
17218
- * `clipboard-read`: Request access to read from the clipboard.<br>
17219
- * `clipboard-sanitized-write`: Request access to write to the clipboard.
17220
- */
17221
- declare type WebPermission = 'audio' | 'video' | 'geolocation' | 'notifications' | 'midiSysex' | 'pointerLock' | 'fullscreen' | 'openExternal' | 'clipboard-read' | 'clipboard-sanitized-write' | 'hid' | 'usb' | OpenExternalPermission;
17250
+ * `midiSysex`: Use of system exclusive messages in the webmidi API.<br>
17251
+ * `pointerLock`: Access to mouse movements as an input method.<br>
17252
+ * `fullscreen`: Access to fullscreen mode.<br>
17253
+ * `openExternal`: Access to open links in external applications.<br>
17254
+ * `clipboard-read`: Access to read from the clipboard.<br>
17255
+ * `clipboard-sanitized-write`: Access to write to the clipboard.
17256
+ */
17257
+ declare type WebPermissionName = 'audio' | 'video' | 'geolocation' | 'notifications' | 'midiSysex' | 'pointerLock' | 'fullscreen' | 'openExternal' | 'clipboard-read' | 'clipboard-sanitized-write';
17222
17258
 
17223
17259
  /**
17224
17260
  * Object representing headers and their values, where the
@@ -4521,6 +4521,17 @@ declare type DeviceInfo = {
4521
4521
  productId: string | number;
4522
4522
  };
4523
4523
 
4524
+ /**
4525
+ * Permission string keys for device APIs
4526
+ *
4527
+ * @remarks We currently only support USB and HID devices. Permissions for individual devices
4528
+ * must be granted in {@link Permissions.devices}.
4529
+ *
4530
+ * `usb`: Access to one or more USB devices
4531
+ * `hid : Access to one or more HID devices
4532
+ */
4533
+ declare type DevicePermissionName = 'usb' | 'hid';
4534
+
4524
4535
  /**
4525
4536
  * Generated when a page's theme color changes. This is usually due to encountering a meta tag.
4526
4537
  * @interface
@@ -7544,9 +7555,7 @@ declare class InteropClient extends Base {
7544
7555
  * ```
7545
7556
  *
7546
7557
  *
7547
- * We are also testing the ability to add a context handler for specific contexts. If you would like to use
7548
- * this, please make sure you add your context handlers at the top level of your application, on a page that
7549
- * does not navigate/reload/re-render, to avoid memory leaks. This feature is experimental:
7558
+ * Passing in a context type as the second parameter will cause the handler to only be invoked with that context type.
7550
7559
  *
7551
7560
  * ```js
7552
7561
  * function handleInstrumentContext(contextInfo) {
@@ -9825,6 +9834,8 @@ declare namespace OpenFin_2 {
9825
9834
  ApplicationPermissions,
9826
9835
  LaunchExternalProcessRule,
9827
9836
  SystemPermissions,
9837
+ DevicePermissionName,
9838
+ WebPermissionName,
9828
9839
  WebPermission,
9829
9840
  VerboseWebPermission,
9830
9841
  OpenExternalPermission,
@@ -14631,8 +14642,13 @@ declare class System extends EmitterBase<OpenFin_2.SystemEvent> {
14631
14642
  launchManifest(manifestUrl: string, opts?: OpenFin_2.RvmLaunchOptions): Promise<OpenFin_2.Manifest>;
14632
14643
  /**
14633
14644
  * Query permission of a secured api in current context.
14645
+ *
14634
14646
  * @param apiName - The full name of a secured API.
14635
14647
  *
14648
+ * @remarks If a function has a structured permission value, the value of `granted` will reflect the `enabled` key
14649
+ * of the call's permissions literal. In this case, *permission may still be denied to a call* pending arguments or other
14650
+ * runtime state. This is indicated with `state: unavailable`.
14651
+ *
14636
14652
  * @example
14637
14653
  * ```js
14638
14654
  * fin.System.queryPermissionForCurrentContext('System.launchExternalProcess').then(result => console.log(result)).catch(err => console.log(err));
@@ -17207,18 +17223,38 @@ declare namespace WebContentsEvents {
17207
17223
  *
17208
17224
  * @remarks We only support those web APIs listed by electron.
17209
17225
  *
17210
- * `audio`: Request access to audio devices.<br>
17211
- * `video`: Request access to video devices.<br>
17212
- * `geolocation`: Request access to user's current location.<br>
17226
+ * `audio`: Access to audio devices.<br>
17227
+ * `video`: Access to video devices.<br>
17228
+ * `geolocation`: Access to user's current location.<br>
17229
+ * `notifications`: Request notification creation and the ability to display them in the user's system tray.<br>
17230
+ * `midiSysex`: Use of system exclusive messages in the webmidi API.<br>
17231
+ * `pointerLock`: Access to mouse movements as an input method.<br>
17232
+ * `fullscreen`: Access to fullscreen mode.<br>
17233
+ * `openExternal`: Access to open links in external applications.<br>
17234
+ * `clipboard-read`: Access to read from the clipboard.<br>
17235
+ * `clipboard-sanitized-write`: Access to write to the clipboard.
17236
+ * `usb`: Access to one or more USB devices
17237
+ * `hid : Access to one or more HID devices
17238
+ */
17239
+ declare type WebPermission = WebPermissionName | DevicePermissionName | OpenExternalPermission;
17240
+
17241
+ /**
17242
+ * Permission string keys for webAPIs
17243
+ *
17244
+ * @remarks We only support those web APIs listed by electron.
17245
+ *
17246
+ * `audio`: Access to audio devices.<br>
17247
+ * `video`: Access to video devices.<br>
17248
+ * `geolocation`: Access to user's current location.<br>
17213
17249
  * `notifications`: Request notification creation and the ability to display them in the user's system tray.<br>
17214
- * `midiSysex`: Request the use of system exclusive messages in the webmidi API.<br>
17215
- * `pointerLock`: Request to directly interpret mouse movements as an input method.<br>
17216
- * `fullscreen`: Request for the app to enter fullscreen mode.<br>
17217
- * `openExternal`: Request to open links in external applications.<br>
17218
- * `clipboard-read`: Request access to read from the clipboard.<br>
17219
- * `clipboard-sanitized-write`: Request access to write to the clipboard.
17220
- */
17221
- declare type WebPermission = 'audio' | 'video' | 'geolocation' | 'notifications' | 'midiSysex' | 'pointerLock' | 'fullscreen' | 'openExternal' | 'clipboard-read' | 'clipboard-sanitized-write' | 'hid' | 'usb' | OpenExternalPermission;
17250
+ * `midiSysex`: Use of system exclusive messages in the webmidi API.<br>
17251
+ * `pointerLock`: Access to mouse movements as an input method.<br>
17252
+ * `fullscreen`: Access to fullscreen mode.<br>
17253
+ * `openExternal`: Access to open links in external applications.<br>
17254
+ * `clipboard-read`: Access to read from the clipboard.<br>
17255
+ * `clipboard-sanitized-write`: Access to write to the clipboard.
17256
+ */
17257
+ declare type WebPermissionName = 'audio' | 'video' | 'geolocation' | 'notifications' | 'midiSysex' | 'pointerLock' | 'fullscreen' | 'openExternal' | 'clipboard-read' | 'clipboard-sanitized-write';
17222
17258
 
17223
17259
  /**
17224
17260
  * Object representing headers and their values, where the
package/out/mock.d.ts CHANGED
@@ -4580,6 +4580,17 @@ declare type DeviceInfo = {
4580
4580
  productId: string | number;
4581
4581
  };
4582
4582
 
4583
+ /**
4584
+ * Permission string keys for device APIs
4585
+ *
4586
+ * @remarks We currently only support USB and HID devices. Permissions for individual devices
4587
+ * must be granted in {@link Permissions.devices}.
4588
+ *
4589
+ * `usb`: Access to one or more USB devices
4590
+ * `hid : Access to one or more HID devices
4591
+ */
4592
+ declare type DevicePermissionName = 'usb' | 'hid';
4593
+
4583
4594
  /**
4584
4595
  * Generated when a page's theme color changes. This is usually due to encountering a meta tag.
4585
4596
  * @interface
@@ -7656,9 +7667,7 @@ declare class InteropClient extends Base {
7656
7667
  * ```
7657
7668
  *
7658
7669
  *
7659
- * We are also testing the ability to add a context handler for specific contexts. If you would like to use
7660
- * this, please make sure you add your context handlers at the top level of your application, on a page that
7661
- * does not navigate/reload/re-render, to avoid memory leaks. This feature is experimental:
7670
+ * Passing in a context type as the second parameter will cause the handler to only be invoked with that context type.
7662
7671
  *
7663
7672
  * ```js
7664
7673
  * function handleInstrumentContext(contextInfo) {
@@ -10140,6 +10149,8 @@ declare namespace OpenFin_2 {
10140
10149
  ApplicationPermissions,
10141
10150
  LaunchExternalProcessRule,
10142
10151
  SystemPermissions,
10152
+ DevicePermissionName,
10153
+ WebPermissionName,
10143
10154
  WebPermission,
10144
10155
  VerboseWebPermission,
10145
10156
  OpenExternalPermission,
@@ -15030,8 +15041,13 @@ declare class System extends EmitterBase<OpenFin_2.SystemEvent> {
15030
15041
  launchManifest(manifestUrl: string, opts?: OpenFin_2.RvmLaunchOptions): Promise<OpenFin_2.Manifest>;
15031
15042
  /**
15032
15043
  * Query permission of a secured api in current context.
15044
+ *
15033
15045
  * @param apiName - The full name of a secured API.
15034
15046
  *
15047
+ * @remarks If a function has a structured permission value, the value of `granted` will reflect the `enabled` key
15048
+ * of the call's permissions literal. In this case, *permission may still be denied to a call* pending arguments or other
15049
+ * runtime state. This is indicated with `state: unavailable`.
15050
+ *
15035
15051
  * @example
15036
15052
  * ```js
15037
15053
  * fin.System.queryPermissionForCurrentContext('System.launchExternalProcess').then(result => console.log(result)).catch(err => console.log(err));
@@ -17650,18 +17666,38 @@ declare namespace WebContentsEvents {
17650
17666
  *
17651
17667
  * @remarks We only support those web APIs listed by electron.
17652
17668
  *
17653
- * `audio`: Request access to audio devices.<br>
17654
- * `video`: Request access to video devices.<br>
17655
- * `geolocation`: Request access to user's current location.<br>
17669
+ * `audio`: Access to audio devices.<br>
17670
+ * `video`: Access to video devices.<br>
17671
+ * `geolocation`: Access to user's current location.<br>
17672
+ * `notifications`: Request notification creation and the ability to display them in the user's system tray.<br>
17673
+ * `midiSysex`: Use of system exclusive messages in the webmidi API.<br>
17674
+ * `pointerLock`: Access to mouse movements as an input method.<br>
17675
+ * `fullscreen`: Access to fullscreen mode.<br>
17676
+ * `openExternal`: Access to open links in external applications.<br>
17677
+ * `clipboard-read`: Access to read from the clipboard.<br>
17678
+ * `clipboard-sanitized-write`: Access to write to the clipboard.
17679
+ * `usb`: Access to one or more USB devices
17680
+ * `hid : Access to one or more HID devices
17681
+ */
17682
+ declare type WebPermission = WebPermissionName | DevicePermissionName | OpenExternalPermission;
17683
+
17684
+ /**
17685
+ * Permission string keys for webAPIs
17686
+ *
17687
+ * @remarks We only support those web APIs listed by electron.
17688
+ *
17689
+ * `audio`: Access to audio devices.<br>
17690
+ * `video`: Access to video devices.<br>
17691
+ * `geolocation`: Access to user's current location.<br>
17656
17692
  * `notifications`: Request notification creation and the ability to display them in the user's system tray.<br>
17657
- * `midiSysex`: Request the use of system exclusive messages in the webmidi API.<br>
17658
- * `pointerLock`: Request to directly interpret mouse movements as an input method.<br>
17659
- * `fullscreen`: Request for the app to enter fullscreen mode.<br>
17660
- * `openExternal`: Request to open links in external applications.<br>
17661
- * `clipboard-read`: Request access to read from the clipboard.<br>
17662
- * `clipboard-sanitized-write`: Request access to write to the clipboard.
17663
- */
17664
- declare type WebPermission = 'audio' | 'video' | 'geolocation' | 'notifications' | 'midiSysex' | 'pointerLock' | 'fullscreen' | 'openExternal' | 'clipboard-read' | 'clipboard-sanitized-write' | 'hid' | 'usb' | OpenExternalPermission;
17693
+ * `midiSysex`: Use of system exclusive messages in the webmidi API.<br>
17694
+ * `pointerLock`: Access to mouse movements as an input method.<br>
17695
+ * `fullscreen`: Access to fullscreen mode.<br>
17696
+ * `openExternal`: Access to open links in external applications.<br>
17697
+ * `clipboard-read`: Access to read from the clipboard.<br>
17698
+ * `clipboard-sanitized-write`: Access to write to the clipboard.
17699
+ */
17700
+ declare type WebPermissionName = 'audio' | 'video' | 'geolocation' | 'notifications' | 'midiSysex' | 'pointerLock' | 'fullscreen' | 'openExternal' | 'clipboard-read' | 'clipboard-sanitized-write';
17665
17701
 
17666
17702
  /**
17667
17703
  * Object representing headers and their values, where the
package/out/mock.js CHANGED
@@ -7500,8 +7500,13 @@ class System extends base_1$i.EmitterBase {
7500
7500
  }
7501
7501
  /**
7502
7502
  * Query permission of a secured api in current context.
7503
+ *
7503
7504
  * @param apiName - The full name of a secured API.
7504
7505
  *
7506
+ * @remarks If a function has a structured permission value, the value of `granted` will reflect the `enabled` key
7507
+ * of the call's permissions literal. In this case, *permission may still be denied to a call* pending arguments or other
7508
+ * runtime state. This is indicated with `state: unavailable`.
7509
+ *
7505
7510
  * @example
7506
7511
  * ```js
7507
7512
  * fin.System.queryPermissionForCurrentContext('System.launchExternalProcess').then(result => console.log(result)).catch(err => console.log(err));
@@ -15909,9 +15914,7 @@ function requireInteropClient () {
15909
15914
  * ```
15910
15915
  *
15911
15916
  *
15912
- * We are also testing the ability to add a context handler for specific contexts. If you would like to use
15913
- * this, please make sure you add your context handlers at the top level of your application, on a page that
15914
- * does not navigate/reload/re-render, to avoid memory leaks. This feature is experimental:
15917
+ * Passing in a context type as the second parameter will cause the handler to only be invoked with that context type.
15915
15918
  *
15916
15919
  * ```js
15917
15920
  * function handleInstrumentContext(contextInfo) {
@@ -15940,7 +15943,6 @@ function requireInteropClient () {
15940
15943
  let handlerId;
15941
15944
  if (contextType) {
15942
15945
  handlerId = `invokeContextHandler-${contextType}-${(0, utils_1.generateId)()}`;
15943
- console.warn(`Warning: By providing a contextType (${contextType}), you are using the experimental addContextHandler. To avoid issues, make sure you are adding your context handlers at the top level in your application.`);
15944
15946
  }
15945
15947
  else {
15946
15948
  handlerId = 'invokeContextHandler';
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@openfin/core",
3
- "version": "38.81.23",
3
+ "version": "38.81.29",
4
4
  "description": "The core renderer entry point of OpenFin",
5
5
  "license": "SEE LICENSE IN LICENSE.md",
6
6
  "main": "out/mock.js",