@openfin/core 38.81.23 → 38.81.29
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/out/mock-alpha.d.ts +50 -14
- package/out/mock-beta.d.ts +50 -14
- package/out/mock-public.d.ts +50 -14
- package/out/mock.d.ts +50 -14
- package/out/mock.js +6 -4
- package/package.json +1 -1
package/out/mock-alpha.d.ts
CHANGED
@@ -4521,6 +4521,17 @@ declare type DeviceInfo = {
|
|
4521
4521
|
productId: string | number;
|
4522
4522
|
};
|
4523
4523
|
|
4524
|
+
/**
|
4525
|
+
* Permission string keys for device APIs
|
4526
|
+
*
|
4527
|
+
* @remarks We currently only support USB and HID devices. Permissions for individual devices
|
4528
|
+
* must be granted in {@link Permissions.devices}.
|
4529
|
+
*
|
4530
|
+
* `usb`: Access to one or more USB devices
|
4531
|
+
* `hid : Access to one or more HID devices
|
4532
|
+
*/
|
4533
|
+
declare type DevicePermissionName = 'usb' | 'hid';
|
4534
|
+
|
4524
4535
|
/**
|
4525
4536
|
* Generated when a page's theme color changes. This is usually due to encountering a meta tag.
|
4526
4537
|
* @interface
|
@@ -7544,9 +7555,7 @@ declare class InteropClient extends Base {
|
|
7544
7555
|
* ```
|
7545
7556
|
*
|
7546
7557
|
*
|
7547
|
-
*
|
7548
|
-
* this, please make sure you add your context handlers at the top level of your application, on a page that
|
7549
|
-
* does not navigate/reload/re-render, to avoid memory leaks. This feature is experimental:
|
7558
|
+
* Passing in a context type as the second parameter will cause the handler to only be invoked with that context type.
|
7550
7559
|
*
|
7551
7560
|
* ```js
|
7552
7561
|
* function handleInstrumentContext(contextInfo) {
|
@@ -9825,6 +9834,8 @@ declare namespace OpenFin_2 {
|
|
9825
9834
|
ApplicationPermissions,
|
9826
9835
|
LaunchExternalProcessRule,
|
9827
9836
|
SystemPermissions,
|
9837
|
+
DevicePermissionName,
|
9838
|
+
WebPermissionName,
|
9828
9839
|
WebPermission,
|
9829
9840
|
VerboseWebPermission,
|
9830
9841
|
OpenExternalPermission,
|
@@ -14631,8 +14642,13 @@ declare class System extends EmitterBase<OpenFin_2.SystemEvent> {
|
|
14631
14642
|
launchManifest(manifestUrl: string, opts?: OpenFin_2.RvmLaunchOptions): Promise<OpenFin_2.Manifest>;
|
14632
14643
|
/**
|
14633
14644
|
* Query permission of a secured api in current context.
|
14645
|
+
*
|
14634
14646
|
* @param apiName - The full name of a secured API.
|
14635
14647
|
*
|
14648
|
+
* @remarks If a function has a structured permission value, the value of `granted` will reflect the `enabled` key
|
14649
|
+
* of the call's permissions literal. In this case, *permission may still be denied to a call* pending arguments or other
|
14650
|
+
* runtime state. This is indicated with `state: unavailable`.
|
14651
|
+
*
|
14636
14652
|
* @example
|
14637
14653
|
* ```js
|
14638
14654
|
* fin.System.queryPermissionForCurrentContext('System.launchExternalProcess').then(result => console.log(result)).catch(err => console.log(err));
|
@@ -17207,18 +17223,38 @@ declare namespace WebContentsEvents {
|
|
17207
17223
|
*
|
17208
17224
|
* @remarks We only support those web APIs listed by electron.
|
17209
17225
|
*
|
17210
|
-
* `audio`:
|
17211
|
-
* `video`:
|
17212
|
-
* `geolocation`:
|
17226
|
+
* `audio`: Access to audio devices.<br>
|
17227
|
+
* `video`: Access to video devices.<br>
|
17228
|
+
* `geolocation`: Access to user's current location.<br>
|
17229
|
+
* `notifications`: Request notification creation and the ability to display them in the user's system tray.<br>
|
17230
|
+
* `midiSysex`: Use of system exclusive messages in the webmidi API.<br>
|
17231
|
+
* `pointerLock`: Access to mouse movements as an input method.<br>
|
17232
|
+
* `fullscreen`: Access to fullscreen mode.<br>
|
17233
|
+
* `openExternal`: Access to open links in external applications.<br>
|
17234
|
+
* `clipboard-read`: Access to read from the clipboard.<br>
|
17235
|
+
* `clipboard-sanitized-write`: Access to write to the clipboard.
|
17236
|
+
* `usb`: Access to one or more USB devices
|
17237
|
+
* `hid : Access to one or more HID devices
|
17238
|
+
*/
|
17239
|
+
declare type WebPermission = WebPermissionName | DevicePermissionName | OpenExternalPermission;
|
17240
|
+
|
17241
|
+
/**
|
17242
|
+
* Permission string keys for webAPIs
|
17243
|
+
*
|
17244
|
+
* @remarks We only support those web APIs listed by electron.
|
17245
|
+
*
|
17246
|
+
* `audio`: Access to audio devices.<br>
|
17247
|
+
* `video`: Access to video devices.<br>
|
17248
|
+
* `geolocation`: Access to user's current location.<br>
|
17213
17249
|
* `notifications`: Request notification creation and the ability to display them in the user's system tray.<br>
|
17214
|
-
* `midiSysex`:
|
17215
|
-
* `pointerLock`:
|
17216
|
-
* `fullscreen`:
|
17217
|
-
* `openExternal`:
|
17218
|
-
* `clipboard-read`:
|
17219
|
-
* `clipboard-sanitized-write`:
|
17220
|
-
*/
|
17221
|
-
declare type
|
17250
|
+
* `midiSysex`: Use of system exclusive messages in the webmidi API.<br>
|
17251
|
+
* `pointerLock`: Access to mouse movements as an input method.<br>
|
17252
|
+
* `fullscreen`: Access to fullscreen mode.<br>
|
17253
|
+
* `openExternal`: Access to open links in external applications.<br>
|
17254
|
+
* `clipboard-read`: Access to read from the clipboard.<br>
|
17255
|
+
* `clipboard-sanitized-write`: Access to write to the clipboard.
|
17256
|
+
*/
|
17257
|
+
declare type WebPermissionName = 'audio' | 'video' | 'geolocation' | 'notifications' | 'midiSysex' | 'pointerLock' | 'fullscreen' | 'openExternal' | 'clipboard-read' | 'clipboard-sanitized-write';
|
17222
17258
|
|
17223
17259
|
/**
|
17224
17260
|
* Object representing headers and their values, where the
|
package/out/mock-beta.d.ts
CHANGED
@@ -4521,6 +4521,17 @@ declare type DeviceInfo = {
|
|
4521
4521
|
productId: string | number;
|
4522
4522
|
};
|
4523
4523
|
|
4524
|
+
/**
|
4525
|
+
* Permission string keys for device APIs
|
4526
|
+
*
|
4527
|
+
* @remarks We currently only support USB and HID devices. Permissions for individual devices
|
4528
|
+
* must be granted in {@link Permissions.devices}.
|
4529
|
+
*
|
4530
|
+
* `usb`: Access to one or more USB devices
|
4531
|
+
* `hid : Access to one or more HID devices
|
4532
|
+
*/
|
4533
|
+
declare type DevicePermissionName = 'usb' | 'hid';
|
4534
|
+
|
4524
4535
|
/**
|
4525
4536
|
* Generated when a page's theme color changes. This is usually due to encountering a meta tag.
|
4526
4537
|
* @interface
|
@@ -7544,9 +7555,7 @@ declare class InteropClient extends Base {
|
|
7544
7555
|
* ```
|
7545
7556
|
*
|
7546
7557
|
*
|
7547
|
-
*
|
7548
|
-
* this, please make sure you add your context handlers at the top level of your application, on a page that
|
7549
|
-
* does not navigate/reload/re-render, to avoid memory leaks. This feature is experimental:
|
7558
|
+
* Passing in a context type as the second parameter will cause the handler to only be invoked with that context type.
|
7550
7559
|
*
|
7551
7560
|
* ```js
|
7552
7561
|
* function handleInstrumentContext(contextInfo) {
|
@@ -9825,6 +9834,8 @@ declare namespace OpenFin_2 {
|
|
9825
9834
|
ApplicationPermissions,
|
9826
9835
|
LaunchExternalProcessRule,
|
9827
9836
|
SystemPermissions,
|
9837
|
+
DevicePermissionName,
|
9838
|
+
WebPermissionName,
|
9828
9839
|
WebPermission,
|
9829
9840
|
VerboseWebPermission,
|
9830
9841
|
OpenExternalPermission,
|
@@ -14631,8 +14642,13 @@ declare class System extends EmitterBase<OpenFin_2.SystemEvent> {
|
|
14631
14642
|
launchManifest(manifestUrl: string, opts?: OpenFin_2.RvmLaunchOptions): Promise<OpenFin_2.Manifest>;
|
14632
14643
|
/**
|
14633
14644
|
* Query permission of a secured api in current context.
|
14645
|
+
*
|
14634
14646
|
* @param apiName - The full name of a secured API.
|
14635
14647
|
*
|
14648
|
+
* @remarks If a function has a structured permission value, the value of `granted` will reflect the `enabled` key
|
14649
|
+
* of the call's permissions literal. In this case, *permission may still be denied to a call* pending arguments or other
|
14650
|
+
* runtime state. This is indicated with `state: unavailable`.
|
14651
|
+
*
|
14636
14652
|
* @example
|
14637
14653
|
* ```js
|
14638
14654
|
* fin.System.queryPermissionForCurrentContext('System.launchExternalProcess').then(result => console.log(result)).catch(err => console.log(err));
|
@@ -17207,18 +17223,38 @@ declare namespace WebContentsEvents {
|
|
17207
17223
|
*
|
17208
17224
|
* @remarks We only support those web APIs listed by electron.
|
17209
17225
|
*
|
17210
|
-
* `audio`:
|
17211
|
-
* `video`:
|
17212
|
-
* `geolocation`:
|
17226
|
+
* `audio`: Access to audio devices.<br>
|
17227
|
+
* `video`: Access to video devices.<br>
|
17228
|
+
* `geolocation`: Access to user's current location.<br>
|
17229
|
+
* `notifications`: Request notification creation and the ability to display them in the user's system tray.<br>
|
17230
|
+
* `midiSysex`: Use of system exclusive messages in the webmidi API.<br>
|
17231
|
+
* `pointerLock`: Access to mouse movements as an input method.<br>
|
17232
|
+
* `fullscreen`: Access to fullscreen mode.<br>
|
17233
|
+
* `openExternal`: Access to open links in external applications.<br>
|
17234
|
+
* `clipboard-read`: Access to read from the clipboard.<br>
|
17235
|
+
* `clipboard-sanitized-write`: Access to write to the clipboard.
|
17236
|
+
* `usb`: Access to one or more USB devices
|
17237
|
+
* `hid : Access to one or more HID devices
|
17238
|
+
*/
|
17239
|
+
declare type WebPermission = WebPermissionName | DevicePermissionName | OpenExternalPermission;
|
17240
|
+
|
17241
|
+
/**
|
17242
|
+
* Permission string keys for webAPIs
|
17243
|
+
*
|
17244
|
+
* @remarks We only support those web APIs listed by electron.
|
17245
|
+
*
|
17246
|
+
* `audio`: Access to audio devices.<br>
|
17247
|
+
* `video`: Access to video devices.<br>
|
17248
|
+
* `geolocation`: Access to user's current location.<br>
|
17213
17249
|
* `notifications`: Request notification creation and the ability to display them in the user's system tray.<br>
|
17214
|
-
* `midiSysex`:
|
17215
|
-
* `pointerLock`:
|
17216
|
-
* `fullscreen`:
|
17217
|
-
* `openExternal`:
|
17218
|
-
* `clipboard-read`:
|
17219
|
-
* `clipboard-sanitized-write`:
|
17220
|
-
*/
|
17221
|
-
declare type
|
17250
|
+
* `midiSysex`: Use of system exclusive messages in the webmidi API.<br>
|
17251
|
+
* `pointerLock`: Access to mouse movements as an input method.<br>
|
17252
|
+
* `fullscreen`: Access to fullscreen mode.<br>
|
17253
|
+
* `openExternal`: Access to open links in external applications.<br>
|
17254
|
+
* `clipboard-read`: Access to read from the clipboard.<br>
|
17255
|
+
* `clipboard-sanitized-write`: Access to write to the clipboard.
|
17256
|
+
*/
|
17257
|
+
declare type WebPermissionName = 'audio' | 'video' | 'geolocation' | 'notifications' | 'midiSysex' | 'pointerLock' | 'fullscreen' | 'openExternal' | 'clipboard-read' | 'clipboard-sanitized-write';
|
17222
17258
|
|
17223
17259
|
/**
|
17224
17260
|
* Object representing headers and their values, where the
|
package/out/mock-public.d.ts
CHANGED
@@ -4521,6 +4521,17 @@ declare type DeviceInfo = {
|
|
4521
4521
|
productId: string | number;
|
4522
4522
|
};
|
4523
4523
|
|
4524
|
+
/**
|
4525
|
+
* Permission string keys for device APIs
|
4526
|
+
*
|
4527
|
+
* @remarks We currently only support USB and HID devices. Permissions for individual devices
|
4528
|
+
* must be granted in {@link Permissions.devices}.
|
4529
|
+
*
|
4530
|
+
* `usb`: Access to one or more USB devices
|
4531
|
+
* `hid : Access to one or more HID devices
|
4532
|
+
*/
|
4533
|
+
declare type DevicePermissionName = 'usb' | 'hid';
|
4534
|
+
|
4524
4535
|
/**
|
4525
4536
|
* Generated when a page's theme color changes. This is usually due to encountering a meta tag.
|
4526
4537
|
* @interface
|
@@ -7544,9 +7555,7 @@ declare class InteropClient extends Base {
|
|
7544
7555
|
* ```
|
7545
7556
|
*
|
7546
7557
|
*
|
7547
|
-
*
|
7548
|
-
* this, please make sure you add your context handlers at the top level of your application, on a page that
|
7549
|
-
* does not navigate/reload/re-render, to avoid memory leaks. This feature is experimental:
|
7558
|
+
* Passing in a context type as the second parameter will cause the handler to only be invoked with that context type.
|
7550
7559
|
*
|
7551
7560
|
* ```js
|
7552
7561
|
* function handleInstrumentContext(contextInfo) {
|
@@ -9825,6 +9834,8 @@ declare namespace OpenFin_2 {
|
|
9825
9834
|
ApplicationPermissions,
|
9826
9835
|
LaunchExternalProcessRule,
|
9827
9836
|
SystemPermissions,
|
9837
|
+
DevicePermissionName,
|
9838
|
+
WebPermissionName,
|
9828
9839
|
WebPermission,
|
9829
9840
|
VerboseWebPermission,
|
9830
9841
|
OpenExternalPermission,
|
@@ -14631,8 +14642,13 @@ declare class System extends EmitterBase<OpenFin_2.SystemEvent> {
|
|
14631
14642
|
launchManifest(manifestUrl: string, opts?: OpenFin_2.RvmLaunchOptions): Promise<OpenFin_2.Manifest>;
|
14632
14643
|
/**
|
14633
14644
|
* Query permission of a secured api in current context.
|
14645
|
+
*
|
14634
14646
|
* @param apiName - The full name of a secured API.
|
14635
14647
|
*
|
14648
|
+
* @remarks If a function has a structured permission value, the value of `granted` will reflect the `enabled` key
|
14649
|
+
* of the call's permissions literal. In this case, *permission may still be denied to a call* pending arguments or other
|
14650
|
+
* runtime state. This is indicated with `state: unavailable`.
|
14651
|
+
*
|
14636
14652
|
* @example
|
14637
14653
|
* ```js
|
14638
14654
|
* fin.System.queryPermissionForCurrentContext('System.launchExternalProcess').then(result => console.log(result)).catch(err => console.log(err));
|
@@ -17207,18 +17223,38 @@ declare namespace WebContentsEvents {
|
|
17207
17223
|
*
|
17208
17224
|
* @remarks We only support those web APIs listed by electron.
|
17209
17225
|
*
|
17210
|
-
* `audio`:
|
17211
|
-
* `video`:
|
17212
|
-
* `geolocation`:
|
17226
|
+
* `audio`: Access to audio devices.<br>
|
17227
|
+
* `video`: Access to video devices.<br>
|
17228
|
+
* `geolocation`: Access to user's current location.<br>
|
17229
|
+
* `notifications`: Request notification creation and the ability to display them in the user's system tray.<br>
|
17230
|
+
* `midiSysex`: Use of system exclusive messages in the webmidi API.<br>
|
17231
|
+
* `pointerLock`: Access to mouse movements as an input method.<br>
|
17232
|
+
* `fullscreen`: Access to fullscreen mode.<br>
|
17233
|
+
* `openExternal`: Access to open links in external applications.<br>
|
17234
|
+
* `clipboard-read`: Access to read from the clipboard.<br>
|
17235
|
+
* `clipboard-sanitized-write`: Access to write to the clipboard.
|
17236
|
+
* `usb`: Access to one or more USB devices
|
17237
|
+
* `hid : Access to one or more HID devices
|
17238
|
+
*/
|
17239
|
+
declare type WebPermission = WebPermissionName | DevicePermissionName | OpenExternalPermission;
|
17240
|
+
|
17241
|
+
/**
|
17242
|
+
* Permission string keys for webAPIs
|
17243
|
+
*
|
17244
|
+
* @remarks We only support those web APIs listed by electron.
|
17245
|
+
*
|
17246
|
+
* `audio`: Access to audio devices.<br>
|
17247
|
+
* `video`: Access to video devices.<br>
|
17248
|
+
* `geolocation`: Access to user's current location.<br>
|
17213
17249
|
* `notifications`: Request notification creation and the ability to display them in the user's system tray.<br>
|
17214
|
-
* `midiSysex`:
|
17215
|
-
* `pointerLock`:
|
17216
|
-
* `fullscreen`:
|
17217
|
-
* `openExternal`:
|
17218
|
-
* `clipboard-read`:
|
17219
|
-
* `clipboard-sanitized-write`:
|
17220
|
-
*/
|
17221
|
-
declare type
|
17250
|
+
* `midiSysex`: Use of system exclusive messages in the webmidi API.<br>
|
17251
|
+
* `pointerLock`: Access to mouse movements as an input method.<br>
|
17252
|
+
* `fullscreen`: Access to fullscreen mode.<br>
|
17253
|
+
* `openExternal`: Access to open links in external applications.<br>
|
17254
|
+
* `clipboard-read`: Access to read from the clipboard.<br>
|
17255
|
+
* `clipboard-sanitized-write`: Access to write to the clipboard.
|
17256
|
+
*/
|
17257
|
+
declare type WebPermissionName = 'audio' | 'video' | 'geolocation' | 'notifications' | 'midiSysex' | 'pointerLock' | 'fullscreen' | 'openExternal' | 'clipboard-read' | 'clipboard-sanitized-write';
|
17222
17258
|
|
17223
17259
|
/**
|
17224
17260
|
* Object representing headers and their values, where the
|
package/out/mock.d.ts
CHANGED
@@ -4580,6 +4580,17 @@ declare type DeviceInfo = {
|
|
4580
4580
|
productId: string | number;
|
4581
4581
|
};
|
4582
4582
|
|
4583
|
+
/**
|
4584
|
+
* Permission string keys for device APIs
|
4585
|
+
*
|
4586
|
+
* @remarks We currently only support USB and HID devices. Permissions for individual devices
|
4587
|
+
* must be granted in {@link Permissions.devices}.
|
4588
|
+
*
|
4589
|
+
* `usb`: Access to one or more USB devices
|
4590
|
+
* `hid : Access to one or more HID devices
|
4591
|
+
*/
|
4592
|
+
declare type DevicePermissionName = 'usb' | 'hid';
|
4593
|
+
|
4583
4594
|
/**
|
4584
4595
|
* Generated when a page's theme color changes. This is usually due to encountering a meta tag.
|
4585
4596
|
* @interface
|
@@ -7656,9 +7667,7 @@ declare class InteropClient extends Base {
|
|
7656
7667
|
* ```
|
7657
7668
|
*
|
7658
7669
|
*
|
7659
|
-
*
|
7660
|
-
* this, please make sure you add your context handlers at the top level of your application, on a page that
|
7661
|
-
* does not navigate/reload/re-render, to avoid memory leaks. This feature is experimental:
|
7670
|
+
* Passing in a context type as the second parameter will cause the handler to only be invoked with that context type.
|
7662
7671
|
*
|
7663
7672
|
* ```js
|
7664
7673
|
* function handleInstrumentContext(contextInfo) {
|
@@ -10140,6 +10149,8 @@ declare namespace OpenFin_2 {
|
|
10140
10149
|
ApplicationPermissions,
|
10141
10150
|
LaunchExternalProcessRule,
|
10142
10151
|
SystemPermissions,
|
10152
|
+
DevicePermissionName,
|
10153
|
+
WebPermissionName,
|
10143
10154
|
WebPermission,
|
10144
10155
|
VerboseWebPermission,
|
10145
10156
|
OpenExternalPermission,
|
@@ -15030,8 +15041,13 @@ declare class System extends EmitterBase<OpenFin_2.SystemEvent> {
|
|
15030
15041
|
launchManifest(manifestUrl: string, opts?: OpenFin_2.RvmLaunchOptions): Promise<OpenFin_2.Manifest>;
|
15031
15042
|
/**
|
15032
15043
|
* Query permission of a secured api in current context.
|
15044
|
+
*
|
15033
15045
|
* @param apiName - The full name of a secured API.
|
15034
15046
|
*
|
15047
|
+
* @remarks If a function has a structured permission value, the value of `granted` will reflect the `enabled` key
|
15048
|
+
* of the call's permissions literal. In this case, *permission may still be denied to a call* pending arguments or other
|
15049
|
+
* runtime state. This is indicated with `state: unavailable`.
|
15050
|
+
*
|
15035
15051
|
* @example
|
15036
15052
|
* ```js
|
15037
15053
|
* fin.System.queryPermissionForCurrentContext('System.launchExternalProcess').then(result => console.log(result)).catch(err => console.log(err));
|
@@ -17650,18 +17666,38 @@ declare namespace WebContentsEvents {
|
|
17650
17666
|
*
|
17651
17667
|
* @remarks We only support those web APIs listed by electron.
|
17652
17668
|
*
|
17653
|
-
* `audio`:
|
17654
|
-
* `video`:
|
17655
|
-
* `geolocation`:
|
17669
|
+
* `audio`: Access to audio devices.<br>
|
17670
|
+
* `video`: Access to video devices.<br>
|
17671
|
+
* `geolocation`: Access to user's current location.<br>
|
17672
|
+
* `notifications`: Request notification creation and the ability to display them in the user's system tray.<br>
|
17673
|
+
* `midiSysex`: Use of system exclusive messages in the webmidi API.<br>
|
17674
|
+
* `pointerLock`: Access to mouse movements as an input method.<br>
|
17675
|
+
* `fullscreen`: Access to fullscreen mode.<br>
|
17676
|
+
* `openExternal`: Access to open links in external applications.<br>
|
17677
|
+
* `clipboard-read`: Access to read from the clipboard.<br>
|
17678
|
+
* `clipboard-sanitized-write`: Access to write to the clipboard.
|
17679
|
+
* `usb`: Access to one or more USB devices
|
17680
|
+
* `hid : Access to one or more HID devices
|
17681
|
+
*/
|
17682
|
+
declare type WebPermission = WebPermissionName | DevicePermissionName | OpenExternalPermission;
|
17683
|
+
|
17684
|
+
/**
|
17685
|
+
* Permission string keys for webAPIs
|
17686
|
+
*
|
17687
|
+
* @remarks We only support those web APIs listed by electron.
|
17688
|
+
*
|
17689
|
+
* `audio`: Access to audio devices.<br>
|
17690
|
+
* `video`: Access to video devices.<br>
|
17691
|
+
* `geolocation`: Access to user's current location.<br>
|
17656
17692
|
* `notifications`: Request notification creation and the ability to display them in the user's system tray.<br>
|
17657
|
-
* `midiSysex`:
|
17658
|
-
* `pointerLock`:
|
17659
|
-
* `fullscreen`:
|
17660
|
-
* `openExternal`:
|
17661
|
-
* `clipboard-read`:
|
17662
|
-
* `clipboard-sanitized-write`:
|
17663
|
-
*/
|
17664
|
-
declare type
|
17693
|
+
* `midiSysex`: Use of system exclusive messages in the webmidi API.<br>
|
17694
|
+
* `pointerLock`: Access to mouse movements as an input method.<br>
|
17695
|
+
* `fullscreen`: Access to fullscreen mode.<br>
|
17696
|
+
* `openExternal`: Access to open links in external applications.<br>
|
17697
|
+
* `clipboard-read`: Access to read from the clipboard.<br>
|
17698
|
+
* `clipboard-sanitized-write`: Access to write to the clipboard.
|
17699
|
+
*/
|
17700
|
+
declare type WebPermissionName = 'audio' | 'video' | 'geolocation' | 'notifications' | 'midiSysex' | 'pointerLock' | 'fullscreen' | 'openExternal' | 'clipboard-read' | 'clipboard-sanitized-write';
|
17665
17701
|
|
17666
17702
|
/**
|
17667
17703
|
* Object representing headers and their values, where the
|
package/out/mock.js
CHANGED
@@ -7500,8 +7500,13 @@ class System extends base_1$i.EmitterBase {
|
|
7500
7500
|
}
|
7501
7501
|
/**
|
7502
7502
|
* Query permission of a secured api in current context.
|
7503
|
+
*
|
7503
7504
|
* @param apiName - The full name of a secured API.
|
7504
7505
|
*
|
7506
|
+
* @remarks If a function has a structured permission value, the value of `granted` will reflect the `enabled` key
|
7507
|
+
* of the call's permissions literal. In this case, *permission may still be denied to a call* pending arguments or other
|
7508
|
+
* runtime state. This is indicated with `state: unavailable`.
|
7509
|
+
*
|
7505
7510
|
* @example
|
7506
7511
|
* ```js
|
7507
7512
|
* fin.System.queryPermissionForCurrentContext('System.launchExternalProcess').then(result => console.log(result)).catch(err => console.log(err));
|
@@ -15909,9 +15914,7 @@ function requireInteropClient () {
|
|
15909
15914
|
* ```
|
15910
15915
|
*
|
15911
15916
|
*
|
15912
|
-
*
|
15913
|
-
* this, please make sure you add your context handlers at the top level of your application, on a page that
|
15914
|
-
* does not navigate/reload/re-render, to avoid memory leaks. This feature is experimental:
|
15917
|
+
* Passing in a context type as the second parameter will cause the handler to only be invoked with that context type.
|
15915
15918
|
*
|
15916
15919
|
* ```js
|
15917
15920
|
* function handleInstrumentContext(contextInfo) {
|
@@ -15940,7 +15943,6 @@ function requireInteropClient () {
|
|
15940
15943
|
let handlerId;
|
15941
15944
|
if (contextType) {
|
15942
15945
|
handlerId = `invokeContextHandler-${contextType}-${(0, utils_1.generateId)()}`;
|
15943
|
-
console.warn(`Warning: By providing a contextType (${contextType}), you are using the experimental addContextHandler. To avoid issues, make sure you are adding your context handlers at the top level in your application.`);
|
15944
15946
|
}
|
15945
15947
|
else {
|
15946
15948
|
handlerId = 'invokeContextHandler';
|