@openfin/core 38.81.24 → 38.81.29
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/out/mock-alpha.d.ts +49 -11
- package/out/mock-beta.d.ts +49 -11
- package/out/mock-public.d.ts +49 -11
- package/out/mock.d.ts +49 -11
- package/out/mock.js +5 -0
- package/package.json +1 -1
package/out/mock-alpha.d.ts
CHANGED
@@ -4521,6 +4521,17 @@ declare type DeviceInfo = {
|
|
4521
4521
|
productId: string | number;
|
4522
4522
|
};
|
4523
4523
|
|
4524
|
+
/**
|
4525
|
+
* Permission string keys for device APIs
|
4526
|
+
*
|
4527
|
+
* @remarks We currently only support USB and HID devices. Permissions for individual devices
|
4528
|
+
* must be granted in {@link Permissions.devices}.
|
4529
|
+
*
|
4530
|
+
* `usb`: Access to one or more USB devices
|
4531
|
+
* `hid : Access to one or more HID devices
|
4532
|
+
*/
|
4533
|
+
declare type DevicePermissionName = 'usb' | 'hid';
|
4534
|
+
|
4524
4535
|
/**
|
4525
4536
|
* Generated when a page's theme color changes. This is usually due to encountering a meta tag.
|
4526
4537
|
* @interface
|
@@ -9823,6 +9834,8 @@ declare namespace OpenFin_2 {
|
|
9823
9834
|
ApplicationPermissions,
|
9824
9835
|
LaunchExternalProcessRule,
|
9825
9836
|
SystemPermissions,
|
9837
|
+
DevicePermissionName,
|
9838
|
+
WebPermissionName,
|
9826
9839
|
WebPermission,
|
9827
9840
|
VerboseWebPermission,
|
9828
9841
|
OpenExternalPermission,
|
@@ -14629,8 +14642,13 @@ declare class System extends EmitterBase<OpenFin_2.SystemEvent> {
|
|
14629
14642
|
launchManifest(manifestUrl: string, opts?: OpenFin_2.RvmLaunchOptions): Promise<OpenFin_2.Manifest>;
|
14630
14643
|
/**
|
14631
14644
|
* Query permission of a secured api in current context.
|
14645
|
+
*
|
14632
14646
|
* @param apiName - The full name of a secured API.
|
14633
14647
|
*
|
14648
|
+
* @remarks If a function has a structured permission value, the value of `granted` will reflect the `enabled` key
|
14649
|
+
* of the call's permissions literal. In this case, *permission may still be denied to a call* pending arguments or other
|
14650
|
+
* runtime state. This is indicated with `state: unavailable`.
|
14651
|
+
*
|
14634
14652
|
* @example
|
14635
14653
|
* ```js
|
14636
14654
|
* fin.System.queryPermissionForCurrentContext('System.launchExternalProcess').then(result => console.log(result)).catch(err => console.log(err));
|
@@ -17205,18 +17223,38 @@ declare namespace WebContentsEvents {
|
|
17205
17223
|
*
|
17206
17224
|
* @remarks We only support those web APIs listed by electron.
|
17207
17225
|
*
|
17208
|
-
* `audio`:
|
17209
|
-
* `video`:
|
17210
|
-
* `geolocation`:
|
17226
|
+
* `audio`: Access to audio devices.<br>
|
17227
|
+
* `video`: Access to video devices.<br>
|
17228
|
+
* `geolocation`: Access to user's current location.<br>
|
17229
|
+
* `notifications`: Request notification creation and the ability to display them in the user's system tray.<br>
|
17230
|
+
* `midiSysex`: Use of system exclusive messages in the webmidi API.<br>
|
17231
|
+
* `pointerLock`: Access to mouse movements as an input method.<br>
|
17232
|
+
* `fullscreen`: Access to fullscreen mode.<br>
|
17233
|
+
* `openExternal`: Access to open links in external applications.<br>
|
17234
|
+
* `clipboard-read`: Access to read from the clipboard.<br>
|
17235
|
+
* `clipboard-sanitized-write`: Access to write to the clipboard.
|
17236
|
+
* `usb`: Access to one or more USB devices
|
17237
|
+
* `hid : Access to one or more HID devices
|
17238
|
+
*/
|
17239
|
+
declare type WebPermission = WebPermissionName | DevicePermissionName | OpenExternalPermission;
|
17240
|
+
|
17241
|
+
/**
|
17242
|
+
* Permission string keys for webAPIs
|
17243
|
+
*
|
17244
|
+
* @remarks We only support those web APIs listed by electron.
|
17245
|
+
*
|
17246
|
+
* `audio`: Access to audio devices.<br>
|
17247
|
+
* `video`: Access to video devices.<br>
|
17248
|
+
* `geolocation`: Access to user's current location.<br>
|
17211
17249
|
* `notifications`: Request notification creation and the ability to display them in the user's system tray.<br>
|
17212
|
-
* `midiSysex`:
|
17213
|
-
* `pointerLock`:
|
17214
|
-
* `fullscreen`:
|
17215
|
-
* `openExternal`:
|
17216
|
-
* `clipboard-read`:
|
17217
|
-
* `clipboard-sanitized-write`:
|
17218
|
-
*/
|
17219
|
-
declare type
|
17250
|
+
* `midiSysex`: Use of system exclusive messages in the webmidi API.<br>
|
17251
|
+
* `pointerLock`: Access to mouse movements as an input method.<br>
|
17252
|
+
* `fullscreen`: Access to fullscreen mode.<br>
|
17253
|
+
* `openExternal`: Access to open links in external applications.<br>
|
17254
|
+
* `clipboard-read`: Access to read from the clipboard.<br>
|
17255
|
+
* `clipboard-sanitized-write`: Access to write to the clipboard.
|
17256
|
+
*/
|
17257
|
+
declare type WebPermissionName = 'audio' | 'video' | 'geolocation' | 'notifications' | 'midiSysex' | 'pointerLock' | 'fullscreen' | 'openExternal' | 'clipboard-read' | 'clipboard-sanitized-write';
|
17220
17258
|
|
17221
17259
|
/**
|
17222
17260
|
* Object representing headers and their values, where the
|
package/out/mock-beta.d.ts
CHANGED
@@ -4521,6 +4521,17 @@ declare type DeviceInfo = {
|
|
4521
4521
|
productId: string | number;
|
4522
4522
|
};
|
4523
4523
|
|
4524
|
+
/**
|
4525
|
+
* Permission string keys for device APIs
|
4526
|
+
*
|
4527
|
+
* @remarks We currently only support USB and HID devices. Permissions for individual devices
|
4528
|
+
* must be granted in {@link Permissions.devices}.
|
4529
|
+
*
|
4530
|
+
* `usb`: Access to one or more USB devices
|
4531
|
+
* `hid : Access to one or more HID devices
|
4532
|
+
*/
|
4533
|
+
declare type DevicePermissionName = 'usb' | 'hid';
|
4534
|
+
|
4524
4535
|
/**
|
4525
4536
|
* Generated when a page's theme color changes. This is usually due to encountering a meta tag.
|
4526
4537
|
* @interface
|
@@ -9823,6 +9834,8 @@ declare namespace OpenFin_2 {
|
|
9823
9834
|
ApplicationPermissions,
|
9824
9835
|
LaunchExternalProcessRule,
|
9825
9836
|
SystemPermissions,
|
9837
|
+
DevicePermissionName,
|
9838
|
+
WebPermissionName,
|
9826
9839
|
WebPermission,
|
9827
9840
|
VerboseWebPermission,
|
9828
9841
|
OpenExternalPermission,
|
@@ -14629,8 +14642,13 @@ declare class System extends EmitterBase<OpenFin_2.SystemEvent> {
|
|
14629
14642
|
launchManifest(manifestUrl: string, opts?: OpenFin_2.RvmLaunchOptions): Promise<OpenFin_2.Manifest>;
|
14630
14643
|
/**
|
14631
14644
|
* Query permission of a secured api in current context.
|
14645
|
+
*
|
14632
14646
|
* @param apiName - The full name of a secured API.
|
14633
14647
|
*
|
14648
|
+
* @remarks If a function has a structured permission value, the value of `granted` will reflect the `enabled` key
|
14649
|
+
* of the call's permissions literal. In this case, *permission may still be denied to a call* pending arguments or other
|
14650
|
+
* runtime state. This is indicated with `state: unavailable`.
|
14651
|
+
*
|
14634
14652
|
* @example
|
14635
14653
|
* ```js
|
14636
14654
|
* fin.System.queryPermissionForCurrentContext('System.launchExternalProcess').then(result => console.log(result)).catch(err => console.log(err));
|
@@ -17205,18 +17223,38 @@ declare namespace WebContentsEvents {
|
|
17205
17223
|
*
|
17206
17224
|
* @remarks We only support those web APIs listed by electron.
|
17207
17225
|
*
|
17208
|
-
* `audio`:
|
17209
|
-
* `video`:
|
17210
|
-
* `geolocation`:
|
17226
|
+
* `audio`: Access to audio devices.<br>
|
17227
|
+
* `video`: Access to video devices.<br>
|
17228
|
+
* `geolocation`: Access to user's current location.<br>
|
17229
|
+
* `notifications`: Request notification creation and the ability to display them in the user's system tray.<br>
|
17230
|
+
* `midiSysex`: Use of system exclusive messages in the webmidi API.<br>
|
17231
|
+
* `pointerLock`: Access to mouse movements as an input method.<br>
|
17232
|
+
* `fullscreen`: Access to fullscreen mode.<br>
|
17233
|
+
* `openExternal`: Access to open links in external applications.<br>
|
17234
|
+
* `clipboard-read`: Access to read from the clipboard.<br>
|
17235
|
+
* `clipboard-sanitized-write`: Access to write to the clipboard.
|
17236
|
+
* `usb`: Access to one or more USB devices
|
17237
|
+
* `hid : Access to one or more HID devices
|
17238
|
+
*/
|
17239
|
+
declare type WebPermission = WebPermissionName | DevicePermissionName | OpenExternalPermission;
|
17240
|
+
|
17241
|
+
/**
|
17242
|
+
* Permission string keys for webAPIs
|
17243
|
+
*
|
17244
|
+
* @remarks We only support those web APIs listed by electron.
|
17245
|
+
*
|
17246
|
+
* `audio`: Access to audio devices.<br>
|
17247
|
+
* `video`: Access to video devices.<br>
|
17248
|
+
* `geolocation`: Access to user's current location.<br>
|
17211
17249
|
* `notifications`: Request notification creation and the ability to display them in the user's system tray.<br>
|
17212
|
-
* `midiSysex`:
|
17213
|
-
* `pointerLock`:
|
17214
|
-
* `fullscreen`:
|
17215
|
-
* `openExternal`:
|
17216
|
-
* `clipboard-read`:
|
17217
|
-
* `clipboard-sanitized-write`:
|
17218
|
-
*/
|
17219
|
-
declare type
|
17250
|
+
* `midiSysex`: Use of system exclusive messages in the webmidi API.<br>
|
17251
|
+
* `pointerLock`: Access to mouse movements as an input method.<br>
|
17252
|
+
* `fullscreen`: Access to fullscreen mode.<br>
|
17253
|
+
* `openExternal`: Access to open links in external applications.<br>
|
17254
|
+
* `clipboard-read`: Access to read from the clipboard.<br>
|
17255
|
+
* `clipboard-sanitized-write`: Access to write to the clipboard.
|
17256
|
+
*/
|
17257
|
+
declare type WebPermissionName = 'audio' | 'video' | 'geolocation' | 'notifications' | 'midiSysex' | 'pointerLock' | 'fullscreen' | 'openExternal' | 'clipboard-read' | 'clipboard-sanitized-write';
|
17220
17258
|
|
17221
17259
|
/**
|
17222
17260
|
* Object representing headers and their values, where the
|
package/out/mock-public.d.ts
CHANGED
@@ -4521,6 +4521,17 @@ declare type DeviceInfo = {
|
|
4521
4521
|
productId: string | number;
|
4522
4522
|
};
|
4523
4523
|
|
4524
|
+
/**
|
4525
|
+
* Permission string keys for device APIs
|
4526
|
+
*
|
4527
|
+
* @remarks We currently only support USB and HID devices. Permissions for individual devices
|
4528
|
+
* must be granted in {@link Permissions.devices}.
|
4529
|
+
*
|
4530
|
+
* `usb`: Access to one or more USB devices
|
4531
|
+
* `hid : Access to one or more HID devices
|
4532
|
+
*/
|
4533
|
+
declare type DevicePermissionName = 'usb' | 'hid';
|
4534
|
+
|
4524
4535
|
/**
|
4525
4536
|
* Generated when a page's theme color changes. This is usually due to encountering a meta tag.
|
4526
4537
|
* @interface
|
@@ -9823,6 +9834,8 @@ declare namespace OpenFin_2 {
|
|
9823
9834
|
ApplicationPermissions,
|
9824
9835
|
LaunchExternalProcessRule,
|
9825
9836
|
SystemPermissions,
|
9837
|
+
DevicePermissionName,
|
9838
|
+
WebPermissionName,
|
9826
9839
|
WebPermission,
|
9827
9840
|
VerboseWebPermission,
|
9828
9841
|
OpenExternalPermission,
|
@@ -14629,8 +14642,13 @@ declare class System extends EmitterBase<OpenFin_2.SystemEvent> {
|
|
14629
14642
|
launchManifest(manifestUrl: string, opts?: OpenFin_2.RvmLaunchOptions): Promise<OpenFin_2.Manifest>;
|
14630
14643
|
/**
|
14631
14644
|
* Query permission of a secured api in current context.
|
14645
|
+
*
|
14632
14646
|
* @param apiName - The full name of a secured API.
|
14633
14647
|
*
|
14648
|
+
* @remarks If a function has a structured permission value, the value of `granted` will reflect the `enabled` key
|
14649
|
+
* of the call's permissions literal. In this case, *permission may still be denied to a call* pending arguments or other
|
14650
|
+
* runtime state. This is indicated with `state: unavailable`.
|
14651
|
+
*
|
14634
14652
|
* @example
|
14635
14653
|
* ```js
|
14636
14654
|
* fin.System.queryPermissionForCurrentContext('System.launchExternalProcess').then(result => console.log(result)).catch(err => console.log(err));
|
@@ -17205,18 +17223,38 @@ declare namespace WebContentsEvents {
|
|
17205
17223
|
*
|
17206
17224
|
* @remarks We only support those web APIs listed by electron.
|
17207
17225
|
*
|
17208
|
-
* `audio`:
|
17209
|
-
* `video`:
|
17210
|
-
* `geolocation`:
|
17226
|
+
* `audio`: Access to audio devices.<br>
|
17227
|
+
* `video`: Access to video devices.<br>
|
17228
|
+
* `geolocation`: Access to user's current location.<br>
|
17229
|
+
* `notifications`: Request notification creation and the ability to display them in the user's system tray.<br>
|
17230
|
+
* `midiSysex`: Use of system exclusive messages in the webmidi API.<br>
|
17231
|
+
* `pointerLock`: Access to mouse movements as an input method.<br>
|
17232
|
+
* `fullscreen`: Access to fullscreen mode.<br>
|
17233
|
+
* `openExternal`: Access to open links in external applications.<br>
|
17234
|
+
* `clipboard-read`: Access to read from the clipboard.<br>
|
17235
|
+
* `clipboard-sanitized-write`: Access to write to the clipboard.
|
17236
|
+
* `usb`: Access to one or more USB devices
|
17237
|
+
* `hid : Access to one or more HID devices
|
17238
|
+
*/
|
17239
|
+
declare type WebPermission = WebPermissionName | DevicePermissionName | OpenExternalPermission;
|
17240
|
+
|
17241
|
+
/**
|
17242
|
+
* Permission string keys for webAPIs
|
17243
|
+
*
|
17244
|
+
* @remarks We only support those web APIs listed by electron.
|
17245
|
+
*
|
17246
|
+
* `audio`: Access to audio devices.<br>
|
17247
|
+
* `video`: Access to video devices.<br>
|
17248
|
+
* `geolocation`: Access to user's current location.<br>
|
17211
17249
|
* `notifications`: Request notification creation and the ability to display them in the user's system tray.<br>
|
17212
|
-
* `midiSysex`:
|
17213
|
-
* `pointerLock`:
|
17214
|
-
* `fullscreen`:
|
17215
|
-
* `openExternal`:
|
17216
|
-
* `clipboard-read`:
|
17217
|
-
* `clipboard-sanitized-write`:
|
17218
|
-
*/
|
17219
|
-
declare type
|
17250
|
+
* `midiSysex`: Use of system exclusive messages in the webmidi API.<br>
|
17251
|
+
* `pointerLock`: Access to mouse movements as an input method.<br>
|
17252
|
+
* `fullscreen`: Access to fullscreen mode.<br>
|
17253
|
+
* `openExternal`: Access to open links in external applications.<br>
|
17254
|
+
* `clipboard-read`: Access to read from the clipboard.<br>
|
17255
|
+
* `clipboard-sanitized-write`: Access to write to the clipboard.
|
17256
|
+
*/
|
17257
|
+
declare type WebPermissionName = 'audio' | 'video' | 'geolocation' | 'notifications' | 'midiSysex' | 'pointerLock' | 'fullscreen' | 'openExternal' | 'clipboard-read' | 'clipboard-sanitized-write';
|
17220
17258
|
|
17221
17259
|
/**
|
17222
17260
|
* Object representing headers and their values, where the
|
package/out/mock.d.ts
CHANGED
@@ -4580,6 +4580,17 @@ declare type DeviceInfo = {
|
|
4580
4580
|
productId: string | number;
|
4581
4581
|
};
|
4582
4582
|
|
4583
|
+
/**
|
4584
|
+
* Permission string keys for device APIs
|
4585
|
+
*
|
4586
|
+
* @remarks We currently only support USB and HID devices. Permissions for individual devices
|
4587
|
+
* must be granted in {@link Permissions.devices}.
|
4588
|
+
*
|
4589
|
+
* `usb`: Access to one or more USB devices
|
4590
|
+
* `hid : Access to one or more HID devices
|
4591
|
+
*/
|
4592
|
+
declare type DevicePermissionName = 'usb' | 'hid';
|
4593
|
+
|
4583
4594
|
/**
|
4584
4595
|
* Generated when a page's theme color changes. This is usually due to encountering a meta tag.
|
4585
4596
|
* @interface
|
@@ -10138,6 +10149,8 @@ declare namespace OpenFin_2 {
|
|
10138
10149
|
ApplicationPermissions,
|
10139
10150
|
LaunchExternalProcessRule,
|
10140
10151
|
SystemPermissions,
|
10152
|
+
DevicePermissionName,
|
10153
|
+
WebPermissionName,
|
10141
10154
|
WebPermission,
|
10142
10155
|
VerboseWebPermission,
|
10143
10156
|
OpenExternalPermission,
|
@@ -15028,8 +15041,13 @@ declare class System extends EmitterBase<OpenFin_2.SystemEvent> {
|
|
15028
15041
|
launchManifest(manifestUrl: string, opts?: OpenFin_2.RvmLaunchOptions): Promise<OpenFin_2.Manifest>;
|
15029
15042
|
/**
|
15030
15043
|
* Query permission of a secured api in current context.
|
15044
|
+
*
|
15031
15045
|
* @param apiName - The full name of a secured API.
|
15032
15046
|
*
|
15047
|
+
* @remarks If a function has a structured permission value, the value of `granted` will reflect the `enabled` key
|
15048
|
+
* of the call's permissions literal. In this case, *permission may still be denied to a call* pending arguments or other
|
15049
|
+
* runtime state. This is indicated with `state: unavailable`.
|
15050
|
+
*
|
15033
15051
|
* @example
|
15034
15052
|
* ```js
|
15035
15053
|
* fin.System.queryPermissionForCurrentContext('System.launchExternalProcess').then(result => console.log(result)).catch(err => console.log(err));
|
@@ -17648,18 +17666,38 @@ declare namespace WebContentsEvents {
|
|
17648
17666
|
*
|
17649
17667
|
* @remarks We only support those web APIs listed by electron.
|
17650
17668
|
*
|
17651
|
-
* `audio`:
|
17652
|
-
* `video`:
|
17653
|
-
* `geolocation`:
|
17669
|
+
* `audio`: Access to audio devices.<br>
|
17670
|
+
* `video`: Access to video devices.<br>
|
17671
|
+
* `geolocation`: Access to user's current location.<br>
|
17672
|
+
* `notifications`: Request notification creation and the ability to display them in the user's system tray.<br>
|
17673
|
+
* `midiSysex`: Use of system exclusive messages in the webmidi API.<br>
|
17674
|
+
* `pointerLock`: Access to mouse movements as an input method.<br>
|
17675
|
+
* `fullscreen`: Access to fullscreen mode.<br>
|
17676
|
+
* `openExternal`: Access to open links in external applications.<br>
|
17677
|
+
* `clipboard-read`: Access to read from the clipboard.<br>
|
17678
|
+
* `clipboard-sanitized-write`: Access to write to the clipboard.
|
17679
|
+
* `usb`: Access to one or more USB devices
|
17680
|
+
* `hid : Access to one or more HID devices
|
17681
|
+
*/
|
17682
|
+
declare type WebPermission = WebPermissionName | DevicePermissionName | OpenExternalPermission;
|
17683
|
+
|
17684
|
+
/**
|
17685
|
+
* Permission string keys for webAPIs
|
17686
|
+
*
|
17687
|
+
* @remarks We only support those web APIs listed by electron.
|
17688
|
+
*
|
17689
|
+
* `audio`: Access to audio devices.<br>
|
17690
|
+
* `video`: Access to video devices.<br>
|
17691
|
+
* `geolocation`: Access to user's current location.<br>
|
17654
17692
|
* `notifications`: Request notification creation and the ability to display them in the user's system tray.<br>
|
17655
|
-
* `midiSysex`:
|
17656
|
-
* `pointerLock`:
|
17657
|
-
* `fullscreen`:
|
17658
|
-
* `openExternal`:
|
17659
|
-
* `clipboard-read`:
|
17660
|
-
* `clipboard-sanitized-write`:
|
17661
|
-
*/
|
17662
|
-
declare type
|
17693
|
+
* `midiSysex`: Use of system exclusive messages in the webmidi API.<br>
|
17694
|
+
* `pointerLock`: Access to mouse movements as an input method.<br>
|
17695
|
+
* `fullscreen`: Access to fullscreen mode.<br>
|
17696
|
+
* `openExternal`: Access to open links in external applications.<br>
|
17697
|
+
* `clipboard-read`: Access to read from the clipboard.<br>
|
17698
|
+
* `clipboard-sanitized-write`: Access to write to the clipboard.
|
17699
|
+
*/
|
17700
|
+
declare type WebPermissionName = 'audio' | 'video' | 'geolocation' | 'notifications' | 'midiSysex' | 'pointerLock' | 'fullscreen' | 'openExternal' | 'clipboard-read' | 'clipboard-sanitized-write';
|
17663
17701
|
|
17664
17702
|
/**
|
17665
17703
|
* Object representing headers and their values, where the
|
package/out/mock.js
CHANGED
@@ -7500,8 +7500,13 @@ class System extends base_1$i.EmitterBase {
|
|
7500
7500
|
}
|
7501
7501
|
/**
|
7502
7502
|
* Query permission of a secured api in current context.
|
7503
|
+
*
|
7503
7504
|
* @param apiName - The full name of a secured API.
|
7504
7505
|
*
|
7506
|
+
* @remarks If a function has a structured permission value, the value of `granted` will reflect the `enabled` key
|
7507
|
+
* of the call's permissions literal. In this case, *permission may still be denied to a call* pending arguments or other
|
7508
|
+
* runtime state. This is indicated with `state: unavailable`.
|
7509
|
+
*
|
7505
7510
|
* @example
|
7506
7511
|
* ```js
|
7507
7512
|
* fin.System.queryPermissionForCurrentContext('System.launchExternalProcess').then(result => console.log(result)).catch(err => console.log(err));
|