@openfin/node-adapter 38.81.23 → 38.81.29

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -4525,6 +4525,17 @@ declare type DeviceInfo = {
4525
4525
  productId: string | number;
4526
4526
  };
4527
4527
 
4528
+ /**
4529
+ * Permission string keys for device APIs
4530
+ *
4531
+ * @remarks We currently only support USB and HID devices. Permissions for individual devices
4532
+ * must be granted in {@link Permissions.devices}.
4533
+ *
4534
+ * `usb`: Access to one or more USB devices
4535
+ * `hid : Access to one or more HID devices
4536
+ */
4537
+ declare type DevicePermissionName = 'usb' | 'hid';
4538
+
4528
4539
  /**
4529
4540
  * Generated when a page's theme color changes. This is usually due to encountering a meta tag.
4530
4541
  * @interface
@@ -7552,9 +7563,7 @@ declare class InteropClient extends Base {
7552
7563
  * ```
7553
7564
  *
7554
7565
  *
7555
- * We are also testing the ability to add a context handler for specific contexts. If you would like to use
7556
- * this, please make sure you add your context handlers at the top level of your application, on a page that
7557
- * does not navigate/reload/re-render, to avoid memory leaks. This feature is experimental:
7566
+ * Passing in a context type as the second parameter will cause the handler to only be invoked with that context type.
7558
7567
  *
7559
7568
  * ```js
7560
7569
  * function handleInstrumentContext(contextInfo) {
@@ -9835,6 +9844,8 @@ declare namespace OpenFin {
9835
9844
  ApplicationPermissions,
9836
9845
  LaunchExternalProcessRule,
9837
9846
  SystemPermissions,
9847
+ DevicePermissionName,
9848
+ WebPermissionName,
9838
9849
  WebPermission,
9839
9850
  VerboseWebPermission,
9840
9851
  OpenExternalPermission,
@@ -14641,8 +14652,13 @@ declare class System extends EmitterBase<OpenFin.SystemEvent> {
14641
14652
  launchManifest(manifestUrl: string, opts?: OpenFin.RvmLaunchOptions): Promise<OpenFin.Manifest>;
14642
14653
  /**
14643
14654
  * Query permission of a secured api in current context.
14655
+ *
14644
14656
  * @param apiName - The full name of a secured API.
14645
14657
  *
14658
+ * @remarks If a function has a structured permission value, the value of `granted` will reflect the `enabled` key
14659
+ * of the call's permissions literal. In this case, *permission may still be denied to a call* pending arguments or other
14660
+ * runtime state. This is indicated with `state: unavailable`.
14661
+ *
14646
14662
  * @example
14647
14663
  * ```js
14648
14664
  * fin.System.queryPermissionForCurrentContext('System.launchExternalProcess').then(result => console.log(result)).catch(err => console.log(err));
@@ -17217,18 +17233,38 @@ declare namespace WebContentsEvents {
17217
17233
  *
17218
17234
  * @remarks We only support those web APIs listed by electron.
17219
17235
  *
17220
- * `audio`: Request access to audio devices.<br>
17221
- * `video`: Request access to video devices.<br>
17222
- * `geolocation`: Request access to user's current location.<br>
17236
+ * `audio`: Access to audio devices.<br>
17237
+ * `video`: Access to video devices.<br>
17238
+ * `geolocation`: Access to user's current location.<br>
17239
+ * `notifications`: Request notification creation and the ability to display them in the user's system tray.<br>
17240
+ * `midiSysex`: Use of system exclusive messages in the webmidi API.<br>
17241
+ * `pointerLock`: Access to mouse movements as an input method.<br>
17242
+ * `fullscreen`: Access to fullscreen mode.<br>
17243
+ * `openExternal`: Access to open links in external applications.<br>
17244
+ * `clipboard-read`: Access to read from the clipboard.<br>
17245
+ * `clipboard-sanitized-write`: Access to write to the clipboard.
17246
+ * `usb`: Access to one or more USB devices
17247
+ * `hid : Access to one or more HID devices
17248
+ */
17249
+ declare type WebPermission = WebPermissionName | DevicePermissionName | OpenExternalPermission;
17250
+
17251
+ /**
17252
+ * Permission string keys for webAPIs
17253
+ *
17254
+ * @remarks We only support those web APIs listed by electron.
17255
+ *
17256
+ * `audio`: Access to audio devices.<br>
17257
+ * `video`: Access to video devices.<br>
17258
+ * `geolocation`: Access to user's current location.<br>
17223
17259
  * `notifications`: Request notification creation and the ability to display them in the user's system tray.<br>
17224
- * `midiSysex`: Request the use of system exclusive messages in the webmidi API.<br>
17225
- * `pointerLock`: Request to directly interpret mouse movements as an input method.<br>
17226
- * `fullscreen`: Request for the app to enter fullscreen mode.<br>
17227
- * `openExternal`: Request to open links in external applications.<br>
17228
- * `clipboard-read`: Request access to read from the clipboard.<br>
17229
- * `clipboard-sanitized-write`: Request access to write to the clipboard.
17230
- */
17231
- declare type WebPermission = 'audio' | 'video' | 'geolocation' | 'notifications' | 'midiSysex' | 'pointerLock' | 'fullscreen' | 'openExternal' | 'clipboard-read' | 'clipboard-sanitized-write' | 'hid' | 'usb' | OpenExternalPermission;
17260
+ * `midiSysex`: Use of system exclusive messages in the webmidi API.<br>
17261
+ * `pointerLock`: Access to mouse movements as an input method.<br>
17262
+ * `fullscreen`: Access to fullscreen mode.<br>
17263
+ * `openExternal`: Access to open links in external applications.<br>
17264
+ * `clipboard-read`: Access to read from the clipboard.<br>
17265
+ * `clipboard-sanitized-write`: Access to write to the clipboard.
17266
+ */
17267
+ declare type WebPermissionName = 'audio' | 'video' | 'geolocation' | 'notifications' | 'midiSysex' | 'pointerLock' | 'fullscreen' | 'openExternal' | 'clipboard-read' | 'clipboard-sanitized-write';
17232
17268
 
17233
17269
  /**
17234
17270
  * Object representing headers and their values, where the
@@ -4525,6 +4525,17 @@ declare type DeviceInfo = {
4525
4525
  productId: string | number;
4526
4526
  };
4527
4527
 
4528
+ /**
4529
+ * Permission string keys for device APIs
4530
+ *
4531
+ * @remarks We currently only support USB and HID devices. Permissions for individual devices
4532
+ * must be granted in {@link Permissions.devices}.
4533
+ *
4534
+ * `usb`: Access to one or more USB devices
4535
+ * `hid : Access to one or more HID devices
4536
+ */
4537
+ declare type DevicePermissionName = 'usb' | 'hid';
4538
+
4528
4539
  /**
4529
4540
  * Generated when a page's theme color changes. This is usually due to encountering a meta tag.
4530
4541
  * @interface
@@ -7552,9 +7563,7 @@ declare class InteropClient extends Base {
7552
7563
  * ```
7553
7564
  *
7554
7565
  *
7555
- * We are also testing the ability to add a context handler for specific contexts. If you would like to use
7556
- * this, please make sure you add your context handlers at the top level of your application, on a page that
7557
- * does not navigate/reload/re-render, to avoid memory leaks. This feature is experimental:
7566
+ * Passing in a context type as the second parameter will cause the handler to only be invoked with that context type.
7558
7567
  *
7559
7568
  * ```js
7560
7569
  * function handleInstrumentContext(contextInfo) {
@@ -9835,6 +9844,8 @@ declare namespace OpenFin {
9835
9844
  ApplicationPermissions,
9836
9845
  LaunchExternalProcessRule,
9837
9846
  SystemPermissions,
9847
+ DevicePermissionName,
9848
+ WebPermissionName,
9838
9849
  WebPermission,
9839
9850
  VerboseWebPermission,
9840
9851
  OpenExternalPermission,
@@ -14641,8 +14652,13 @@ declare class System extends EmitterBase<OpenFin.SystemEvent> {
14641
14652
  launchManifest(manifestUrl: string, opts?: OpenFin.RvmLaunchOptions): Promise<OpenFin.Manifest>;
14642
14653
  /**
14643
14654
  * Query permission of a secured api in current context.
14655
+ *
14644
14656
  * @param apiName - The full name of a secured API.
14645
14657
  *
14658
+ * @remarks If a function has a structured permission value, the value of `granted` will reflect the `enabled` key
14659
+ * of the call's permissions literal. In this case, *permission may still be denied to a call* pending arguments or other
14660
+ * runtime state. This is indicated with `state: unavailable`.
14661
+ *
14646
14662
  * @example
14647
14663
  * ```js
14648
14664
  * fin.System.queryPermissionForCurrentContext('System.launchExternalProcess').then(result => console.log(result)).catch(err => console.log(err));
@@ -17217,18 +17233,38 @@ declare namespace WebContentsEvents {
17217
17233
  *
17218
17234
  * @remarks We only support those web APIs listed by electron.
17219
17235
  *
17220
- * `audio`: Request access to audio devices.<br>
17221
- * `video`: Request access to video devices.<br>
17222
- * `geolocation`: Request access to user's current location.<br>
17236
+ * `audio`: Access to audio devices.<br>
17237
+ * `video`: Access to video devices.<br>
17238
+ * `geolocation`: Access to user's current location.<br>
17239
+ * `notifications`: Request notification creation and the ability to display them in the user's system tray.<br>
17240
+ * `midiSysex`: Use of system exclusive messages in the webmidi API.<br>
17241
+ * `pointerLock`: Access to mouse movements as an input method.<br>
17242
+ * `fullscreen`: Access to fullscreen mode.<br>
17243
+ * `openExternal`: Access to open links in external applications.<br>
17244
+ * `clipboard-read`: Access to read from the clipboard.<br>
17245
+ * `clipboard-sanitized-write`: Access to write to the clipboard.
17246
+ * `usb`: Access to one or more USB devices
17247
+ * `hid : Access to one or more HID devices
17248
+ */
17249
+ declare type WebPermission = WebPermissionName | DevicePermissionName | OpenExternalPermission;
17250
+
17251
+ /**
17252
+ * Permission string keys for webAPIs
17253
+ *
17254
+ * @remarks We only support those web APIs listed by electron.
17255
+ *
17256
+ * `audio`: Access to audio devices.<br>
17257
+ * `video`: Access to video devices.<br>
17258
+ * `geolocation`: Access to user's current location.<br>
17223
17259
  * `notifications`: Request notification creation and the ability to display them in the user's system tray.<br>
17224
- * `midiSysex`: Request the use of system exclusive messages in the webmidi API.<br>
17225
- * `pointerLock`: Request to directly interpret mouse movements as an input method.<br>
17226
- * `fullscreen`: Request for the app to enter fullscreen mode.<br>
17227
- * `openExternal`: Request to open links in external applications.<br>
17228
- * `clipboard-read`: Request access to read from the clipboard.<br>
17229
- * `clipboard-sanitized-write`: Request access to write to the clipboard.
17230
- */
17231
- declare type WebPermission = 'audio' | 'video' | 'geolocation' | 'notifications' | 'midiSysex' | 'pointerLock' | 'fullscreen' | 'openExternal' | 'clipboard-read' | 'clipboard-sanitized-write' | 'hid' | 'usb' | OpenExternalPermission;
17260
+ * `midiSysex`: Use of system exclusive messages in the webmidi API.<br>
17261
+ * `pointerLock`: Access to mouse movements as an input method.<br>
17262
+ * `fullscreen`: Access to fullscreen mode.<br>
17263
+ * `openExternal`: Access to open links in external applications.<br>
17264
+ * `clipboard-read`: Access to read from the clipboard.<br>
17265
+ * `clipboard-sanitized-write`: Access to write to the clipboard.
17266
+ */
17267
+ declare type WebPermissionName = 'audio' | 'video' | 'geolocation' | 'notifications' | 'midiSysex' | 'pointerLock' | 'fullscreen' | 'openExternal' | 'clipboard-read' | 'clipboard-sanitized-write';
17232
17268
 
17233
17269
  /**
17234
17270
  * Object representing headers and their values, where the
@@ -4525,6 +4525,17 @@ declare type DeviceInfo = {
4525
4525
  productId: string | number;
4526
4526
  };
4527
4527
 
4528
+ /**
4529
+ * Permission string keys for device APIs
4530
+ *
4531
+ * @remarks We currently only support USB and HID devices. Permissions for individual devices
4532
+ * must be granted in {@link Permissions.devices}.
4533
+ *
4534
+ * `usb`: Access to one or more USB devices
4535
+ * `hid : Access to one or more HID devices
4536
+ */
4537
+ declare type DevicePermissionName = 'usb' | 'hid';
4538
+
4528
4539
  /**
4529
4540
  * Generated when a page's theme color changes. This is usually due to encountering a meta tag.
4530
4541
  * @interface
@@ -7552,9 +7563,7 @@ declare class InteropClient extends Base {
7552
7563
  * ```
7553
7564
  *
7554
7565
  *
7555
- * We are also testing the ability to add a context handler for specific contexts. If you would like to use
7556
- * this, please make sure you add your context handlers at the top level of your application, on a page that
7557
- * does not navigate/reload/re-render, to avoid memory leaks. This feature is experimental:
7566
+ * Passing in a context type as the second parameter will cause the handler to only be invoked with that context type.
7558
7567
  *
7559
7568
  * ```js
7560
7569
  * function handleInstrumentContext(contextInfo) {
@@ -9835,6 +9844,8 @@ declare namespace OpenFin {
9835
9844
  ApplicationPermissions,
9836
9845
  LaunchExternalProcessRule,
9837
9846
  SystemPermissions,
9847
+ DevicePermissionName,
9848
+ WebPermissionName,
9838
9849
  WebPermission,
9839
9850
  VerboseWebPermission,
9840
9851
  OpenExternalPermission,
@@ -14641,8 +14652,13 @@ declare class System extends EmitterBase<OpenFin.SystemEvent> {
14641
14652
  launchManifest(manifestUrl: string, opts?: OpenFin.RvmLaunchOptions): Promise<OpenFin.Manifest>;
14642
14653
  /**
14643
14654
  * Query permission of a secured api in current context.
14655
+ *
14644
14656
  * @param apiName - The full name of a secured API.
14645
14657
  *
14658
+ * @remarks If a function has a structured permission value, the value of `granted` will reflect the `enabled` key
14659
+ * of the call's permissions literal. In this case, *permission may still be denied to a call* pending arguments or other
14660
+ * runtime state. This is indicated with `state: unavailable`.
14661
+ *
14646
14662
  * @example
14647
14663
  * ```js
14648
14664
  * fin.System.queryPermissionForCurrentContext('System.launchExternalProcess').then(result => console.log(result)).catch(err => console.log(err));
@@ -17217,18 +17233,38 @@ declare namespace WebContentsEvents {
17217
17233
  *
17218
17234
  * @remarks We only support those web APIs listed by electron.
17219
17235
  *
17220
- * `audio`: Request access to audio devices.<br>
17221
- * `video`: Request access to video devices.<br>
17222
- * `geolocation`: Request access to user's current location.<br>
17236
+ * `audio`: Access to audio devices.<br>
17237
+ * `video`: Access to video devices.<br>
17238
+ * `geolocation`: Access to user's current location.<br>
17239
+ * `notifications`: Request notification creation and the ability to display them in the user's system tray.<br>
17240
+ * `midiSysex`: Use of system exclusive messages in the webmidi API.<br>
17241
+ * `pointerLock`: Access to mouse movements as an input method.<br>
17242
+ * `fullscreen`: Access to fullscreen mode.<br>
17243
+ * `openExternal`: Access to open links in external applications.<br>
17244
+ * `clipboard-read`: Access to read from the clipboard.<br>
17245
+ * `clipboard-sanitized-write`: Access to write to the clipboard.
17246
+ * `usb`: Access to one or more USB devices
17247
+ * `hid : Access to one or more HID devices
17248
+ */
17249
+ declare type WebPermission = WebPermissionName | DevicePermissionName | OpenExternalPermission;
17250
+
17251
+ /**
17252
+ * Permission string keys for webAPIs
17253
+ *
17254
+ * @remarks We only support those web APIs listed by electron.
17255
+ *
17256
+ * `audio`: Access to audio devices.<br>
17257
+ * `video`: Access to video devices.<br>
17258
+ * `geolocation`: Access to user's current location.<br>
17223
17259
  * `notifications`: Request notification creation and the ability to display them in the user's system tray.<br>
17224
- * `midiSysex`: Request the use of system exclusive messages in the webmidi API.<br>
17225
- * `pointerLock`: Request to directly interpret mouse movements as an input method.<br>
17226
- * `fullscreen`: Request for the app to enter fullscreen mode.<br>
17227
- * `openExternal`: Request to open links in external applications.<br>
17228
- * `clipboard-read`: Request access to read from the clipboard.<br>
17229
- * `clipboard-sanitized-write`: Request access to write to the clipboard.
17230
- */
17231
- declare type WebPermission = 'audio' | 'video' | 'geolocation' | 'notifications' | 'midiSysex' | 'pointerLock' | 'fullscreen' | 'openExternal' | 'clipboard-read' | 'clipboard-sanitized-write' | 'hid' | 'usb' | OpenExternalPermission;
17260
+ * `midiSysex`: Use of system exclusive messages in the webmidi API.<br>
17261
+ * `pointerLock`: Access to mouse movements as an input method.<br>
17262
+ * `fullscreen`: Access to fullscreen mode.<br>
17263
+ * `openExternal`: Access to open links in external applications.<br>
17264
+ * `clipboard-read`: Access to read from the clipboard.<br>
17265
+ * `clipboard-sanitized-write`: Access to write to the clipboard.
17266
+ */
17267
+ declare type WebPermissionName = 'audio' | 'video' | 'geolocation' | 'notifications' | 'midiSysex' | 'pointerLock' | 'fullscreen' | 'openExternal' | 'clipboard-read' | 'clipboard-sanitized-write';
17232
17268
 
17233
17269
  /**
17234
17270
  * Object representing headers and their values, where the
@@ -4584,6 +4584,17 @@ declare type DeviceInfo = {
4584
4584
  productId: string | number;
4585
4585
  };
4586
4586
 
4587
+ /**
4588
+ * Permission string keys for device APIs
4589
+ *
4590
+ * @remarks We currently only support USB and HID devices. Permissions for individual devices
4591
+ * must be granted in {@link Permissions.devices}.
4592
+ *
4593
+ * `usb`: Access to one or more USB devices
4594
+ * `hid : Access to one or more HID devices
4595
+ */
4596
+ declare type DevicePermissionName = 'usb' | 'hid';
4597
+
4587
4598
  /**
4588
4599
  * Generated when a page's theme color changes. This is usually due to encountering a meta tag.
4589
4600
  * @interface
@@ -7686,9 +7697,7 @@ declare class InteropClient extends Base {
7686
7697
  * ```
7687
7698
  *
7688
7699
  *
7689
- * We are also testing the ability to add a context handler for specific contexts. If you would like to use
7690
- * this, please make sure you add your context handlers at the top level of your application, on a page that
7691
- * does not navigate/reload/re-render, to avoid memory leaks. This feature is experimental:
7700
+ * Passing in a context type as the second parameter will cause the handler to only be invoked with that context type.
7692
7701
  *
7693
7702
  * ```js
7694
7703
  * function handleInstrumentContext(contextInfo) {
@@ -10172,6 +10181,8 @@ declare namespace OpenFin {
10172
10181
  ApplicationPermissions,
10173
10182
  LaunchExternalProcessRule,
10174
10183
  SystemPermissions,
10184
+ DevicePermissionName,
10185
+ WebPermissionName,
10175
10186
  WebPermission,
10176
10187
  VerboseWebPermission,
10177
10188
  OpenExternalPermission,
@@ -15062,8 +15073,13 @@ declare class System extends EmitterBase<OpenFin.SystemEvent> {
15062
15073
  launchManifest(manifestUrl: string, opts?: OpenFin.RvmLaunchOptions): Promise<OpenFin.Manifest>;
15063
15074
  /**
15064
15075
  * Query permission of a secured api in current context.
15076
+ *
15065
15077
  * @param apiName - The full name of a secured API.
15066
15078
  *
15079
+ * @remarks If a function has a structured permission value, the value of `granted` will reflect the `enabled` key
15080
+ * of the call's permissions literal. In this case, *permission may still be denied to a call* pending arguments or other
15081
+ * runtime state. This is indicated with `state: unavailable`.
15082
+ *
15067
15083
  * @example
15068
15084
  * ```js
15069
15085
  * fin.System.queryPermissionForCurrentContext('System.launchExternalProcess').then(result => console.log(result)).catch(err => console.log(err));
@@ -17682,18 +17698,38 @@ declare namespace WebContentsEvents {
17682
17698
  *
17683
17699
  * @remarks We only support those web APIs listed by electron.
17684
17700
  *
17685
- * `audio`: Request access to audio devices.<br>
17686
- * `video`: Request access to video devices.<br>
17687
- * `geolocation`: Request access to user's current location.<br>
17701
+ * `audio`: Access to audio devices.<br>
17702
+ * `video`: Access to video devices.<br>
17703
+ * `geolocation`: Access to user's current location.<br>
17704
+ * `notifications`: Request notification creation and the ability to display them in the user's system tray.<br>
17705
+ * `midiSysex`: Use of system exclusive messages in the webmidi API.<br>
17706
+ * `pointerLock`: Access to mouse movements as an input method.<br>
17707
+ * `fullscreen`: Access to fullscreen mode.<br>
17708
+ * `openExternal`: Access to open links in external applications.<br>
17709
+ * `clipboard-read`: Access to read from the clipboard.<br>
17710
+ * `clipboard-sanitized-write`: Access to write to the clipboard.
17711
+ * `usb`: Access to one or more USB devices
17712
+ * `hid : Access to one or more HID devices
17713
+ */
17714
+ declare type WebPermission = WebPermissionName | DevicePermissionName | OpenExternalPermission;
17715
+
17716
+ /**
17717
+ * Permission string keys for webAPIs
17718
+ *
17719
+ * @remarks We only support those web APIs listed by electron.
17720
+ *
17721
+ * `audio`: Access to audio devices.<br>
17722
+ * `video`: Access to video devices.<br>
17723
+ * `geolocation`: Access to user's current location.<br>
17688
17724
  * `notifications`: Request notification creation and the ability to display them in the user's system tray.<br>
17689
- * `midiSysex`: Request the use of system exclusive messages in the webmidi API.<br>
17690
- * `pointerLock`: Request to directly interpret mouse movements as an input method.<br>
17691
- * `fullscreen`: Request for the app to enter fullscreen mode.<br>
17692
- * `openExternal`: Request to open links in external applications.<br>
17693
- * `clipboard-read`: Request access to read from the clipboard.<br>
17694
- * `clipboard-sanitized-write`: Request access to write to the clipboard.
17695
- */
17696
- declare type WebPermission = 'audio' | 'video' | 'geolocation' | 'notifications' | 'midiSysex' | 'pointerLock' | 'fullscreen' | 'openExternal' | 'clipboard-read' | 'clipboard-sanitized-write' | 'hid' | 'usb' | OpenExternalPermission;
17725
+ * `midiSysex`: Use of system exclusive messages in the webmidi API.<br>
17726
+ * `pointerLock`: Access to mouse movements as an input method.<br>
17727
+ * `fullscreen`: Access to fullscreen mode.<br>
17728
+ * `openExternal`: Access to open links in external applications.<br>
17729
+ * `clipboard-read`: Access to read from the clipboard.<br>
17730
+ * `clipboard-sanitized-write`: Access to write to the clipboard.
17731
+ */
17732
+ declare type WebPermissionName = 'audio' | 'video' | 'geolocation' | 'notifications' | 'midiSysex' | 'pointerLock' | 'fullscreen' | 'openExternal' | 'clipboard-read' | 'clipboard-sanitized-write';
17697
17733
 
17698
17734
  /**
17699
17735
  * Object representing headers and their values, where the
@@ -7273,8 +7273,13 @@ class System extends base_1$i.EmitterBase {
7273
7273
  }
7274
7274
  /**
7275
7275
  * Query permission of a secured api in current context.
7276
+ *
7276
7277
  * @param apiName - The full name of a secured API.
7277
7278
  *
7279
+ * @remarks If a function has a structured permission value, the value of `granted` will reflect the `enabled` key
7280
+ * of the call's permissions literal. In this case, *permission may still be denied to a call* pending arguments or other
7281
+ * runtime state. This is indicated with `state: unavailable`.
7282
+ *
7278
7283
  * @example
7279
7284
  * ```js
7280
7285
  * fin.System.queryPermissionForCurrentContext('System.launchExternalProcess').then(result => console.log(result)).catch(err => console.log(err));
@@ -15682,9 +15687,7 @@ function requireInteropClient () {
15682
15687
  * ```
15683
15688
  *
15684
15689
  *
15685
- * We are also testing the ability to add a context handler for specific contexts. If you would like to use
15686
- * this, please make sure you add your context handlers at the top level of your application, on a page that
15687
- * does not navigate/reload/re-render, to avoid memory leaks. This feature is experimental:
15690
+ * Passing in a context type as the second parameter will cause the handler to only be invoked with that context type.
15688
15691
  *
15689
15692
  * ```js
15690
15693
  * function handleInstrumentContext(contextInfo) {
@@ -15713,7 +15716,6 @@ function requireInteropClient () {
15713
15716
  let handlerId;
15714
15717
  if (contextType) {
15715
15718
  handlerId = `invokeContextHandler-${contextType}-${(0, utils_1.generateId)()}`;
15716
- console.warn(`Warning: By providing a contextType (${contextType}), you are using the experimental addContextHandler. To avoid issues, make sure you are adding your context handlers at the top level in your application.`);
15717
15719
  }
15718
15720
  else {
15719
15721
  handlerId = 'invokeContextHandler';
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@openfin/node-adapter",
3
- "version": "38.81.23",
3
+ "version": "38.81.29",
4
4
  "description": "See README.md",
5
5
  "main": "out/node-adapter.js",
6
6
  "types": "out/node-adapter.d.ts",