@openfin/node-adapter 38.81.23 → 38.81.29
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/out/node-adapter-alpha.d.ts +50 -14
- package/out/node-adapter-beta.d.ts +50 -14
- package/out/node-adapter-public.d.ts +50 -14
- package/out/node-adapter.d.ts +50 -14
- package/out/node-adapter.js +6 -4
- package/package.json +1 -1
@@ -4525,6 +4525,17 @@ declare type DeviceInfo = {
|
|
4525
4525
|
productId: string | number;
|
4526
4526
|
};
|
4527
4527
|
|
4528
|
+
/**
|
4529
|
+
* Permission string keys for device APIs
|
4530
|
+
*
|
4531
|
+
* @remarks We currently only support USB and HID devices. Permissions for individual devices
|
4532
|
+
* must be granted in {@link Permissions.devices}.
|
4533
|
+
*
|
4534
|
+
* `usb`: Access to one or more USB devices
|
4535
|
+
* `hid : Access to one or more HID devices
|
4536
|
+
*/
|
4537
|
+
declare type DevicePermissionName = 'usb' | 'hid';
|
4538
|
+
|
4528
4539
|
/**
|
4529
4540
|
* Generated when a page's theme color changes. This is usually due to encountering a meta tag.
|
4530
4541
|
* @interface
|
@@ -7552,9 +7563,7 @@ declare class InteropClient extends Base {
|
|
7552
7563
|
* ```
|
7553
7564
|
*
|
7554
7565
|
*
|
7555
|
-
*
|
7556
|
-
* this, please make sure you add your context handlers at the top level of your application, on a page that
|
7557
|
-
* does not navigate/reload/re-render, to avoid memory leaks. This feature is experimental:
|
7566
|
+
* Passing in a context type as the second parameter will cause the handler to only be invoked with that context type.
|
7558
7567
|
*
|
7559
7568
|
* ```js
|
7560
7569
|
* function handleInstrumentContext(contextInfo) {
|
@@ -9835,6 +9844,8 @@ declare namespace OpenFin {
|
|
9835
9844
|
ApplicationPermissions,
|
9836
9845
|
LaunchExternalProcessRule,
|
9837
9846
|
SystemPermissions,
|
9847
|
+
DevicePermissionName,
|
9848
|
+
WebPermissionName,
|
9838
9849
|
WebPermission,
|
9839
9850
|
VerboseWebPermission,
|
9840
9851
|
OpenExternalPermission,
|
@@ -14641,8 +14652,13 @@ declare class System extends EmitterBase<OpenFin.SystemEvent> {
|
|
14641
14652
|
launchManifest(manifestUrl: string, opts?: OpenFin.RvmLaunchOptions): Promise<OpenFin.Manifest>;
|
14642
14653
|
/**
|
14643
14654
|
* Query permission of a secured api in current context.
|
14655
|
+
*
|
14644
14656
|
* @param apiName - The full name of a secured API.
|
14645
14657
|
*
|
14658
|
+
* @remarks If a function has a structured permission value, the value of `granted` will reflect the `enabled` key
|
14659
|
+
* of the call's permissions literal. In this case, *permission may still be denied to a call* pending arguments or other
|
14660
|
+
* runtime state. This is indicated with `state: unavailable`.
|
14661
|
+
*
|
14646
14662
|
* @example
|
14647
14663
|
* ```js
|
14648
14664
|
* fin.System.queryPermissionForCurrentContext('System.launchExternalProcess').then(result => console.log(result)).catch(err => console.log(err));
|
@@ -17217,18 +17233,38 @@ declare namespace WebContentsEvents {
|
|
17217
17233
|
*
|
17218
17234
|
* @remarks We only support those web APIs listed by electron.
|
17219
17235
|
*
|
17220
|
-
* `audio`:
|
17221
|
-
* `video`:
|
17222
|
-
* `geolocation`:
|
17236
|
+
* `audio`: Access to audio devices.<br>
|
17237
|
+
* `video`: Access to video devices.<br>
|
17238
|
+
* `geolocation`: Access to user's current location.<br>
|
17239
|
+
* `notifications`: Request notification creation and the ability to display them in the user's system tray.<br>
|
17240
|
+
* `midiSysex`: Use of system exclusive messages in the webmidi API.<br>
|
17241
|
+
* `pointerLock`: Access to mouse movements as an input method.<br>
|
17242
|
+
* `fullscreen`: Access to fullscreen mode.<br>
|
17243
|
+
* `openExternal`: Access to open links in external applications.<br>
|
17244
|
+
* `clipboard-read`: Access to read from the clipboard.<br>
|
17245
|
+
* `clipboard-sanitized-write`: Access to write to the clipboard.
|
17246
|
+
* `usb`: Access to one or more USB devices
|
17247
|
+
* `hid : Access to one or more HID devices
|
17248
|
+
*/
|
17249
|
+
declare type WebPermission = WebPermissionName | DevicePermissionName | OpenExternalPermission;
|
17250
|
+
|
17251
|
+
/**
|
17252
|
+
* Permission string keys for webAPIs
|
17253
|
+
*
|
17254
|
+
* @remarks We only support those web APIs listed by electron.
|
17255
|
+
*
|
17256
|
+
* `audio`: Access to audio devices.<br>
|
17257
|
+
* `video`: Access to video devices.<br>
|
17258
|
+
* `geolocation`: Access to user's current location.<br>
|
17223
17259
|
* `notifications`: Request notification creation and the ability to display them in the user's system tray.<br>
|
17224
|
-
* `midiSysex`:
|
17225
|
-
* `pointerLock`:
|
17226
|
-
* `fullscreen`:
|
17227
|
-
* `openExternal`:
|
17228
|
-
* `clipboard-read`:
|
17229
|
-
* `clipboard-sanitized-write`:
|
17230
|
-
*/
|
17231
|
-
declare type
|
17260
|
+
* `midiSysex`: Use of system exclusive messages in the webmidi API.<br>
|
17261
|
+
* `pointerLock`: Access to mouse movements as an input method.<br>
|
17262
|
+
* `fullscreen`: Access to fullscreen mode.<br>
|
17263
|
+
* `openExternal`: Access to open links in external applications.<br>
|
17264
|
+
* `clipboard-read`: Access to read from the clipboard.<br>
|
17265
|
+
* `clipboard-sanitized-write`: Access to write to the clipboard.
|
17266
|
+
*/
|
17267
|
+
declare type WebPermissionName = 'audio' | 'video' | 'geolocation' | 'notifications' | 'midiSysex' | 'pointerLock' | 'fullscreen' | 'openExternal' | 'clipboard-read' | 'clipboard-sanitized-write';
|
17232
17268
|
|
17233
17269
|
/**
|
17234
17270
|
* Object representing headers and their values, where the
|
@@ -4525,6 +4525,17 @@ declare type DeviceInfo = {
|
|
4525
4525
|
productId: string | number;
|
4526
4526
|
};
|
4527
4527
|
|
4528
|
+
/**
|
4529
|
+
* Permission string keys for device APIs
|
4530
|
+
*
|
4531
|
+
* @remarks We currently only support USB and HID devices. Permissions for individual devices
|
4532
|
+
* must be granted in {@link Permissions.devices}.
|
4533
|
+
*
|
4534
|
+
* `usb`: Access to one or more USB devices
|
4535
|
+
* `hid : Access to one or more HID devices
|
4536
|
+
*/
|
4537
|
+
declare type DevicePermissionName = 'usb' | 'hid';
|
4538
|
+
|
4528
4539
|
/**
|
4529
4540
|
* Generated when a page's theme color changes. This is usually due to encountering a meta tag.
|
4530
4541
|
* @interface
|
@@ -7552,9 +7563,7 @@ declare class InteropClient extends Base {
|
|
7552
7563
|
* ```
|
7553
7564
|
*
|
7554
7565
|
*
|
7555
|
-
*
|
7556
|
-
* this, please make sure you add your context handlers at the top level of your application, on a page that
|
7557
|
-
* does not navigate/reload/re-render, to avoid memory leaks. This feature is experimental:
|
7566
|
+
* Passing in a context type as the second parameter will cause the handler to only be invoked with that context type.
|
7558
7567
|
*
|
7559
7568
|
* ```js
|
7560
7569
|
* function handleInstrumentContext(contextInfo) {
|
@@ -9835,6 +9844,8 @@ declare namespace OpenFin {
|
|
9835
9844
|
ApplicationPermissions,
|
9836
9845
|
LaunchExternalProcessRule,
|
9837
9846
|
SystemPermissions,
|
9847
|
+
DevicePermissionName,
|
9848
|
+
WebPermissionName,
|
9838
9849
|
WebPermission,
|
9839
9850
|
VerboseWebPermission,
|
9840
9851
|
OpenExternalPermission,
|
@@ -14641,8 +14652,13 @@ declare class System extends EmitterBase<OpenFin.SystemEvent> {
|
|
14641
14652
|
launchManifest(manifestUrl: string, opts?: OpenFin.RvmLaunchOptions): Promise<OpenFin.Manifest>;
|
14642
14653
|
/**
|
14643
14654
|
* Query permission of a secured api in current context.
|
14655
|
+
*
|
14644
14656
|
* @param apiName - The full name of a secured API.
|
14645
14657
|
*
|
14658
|
+
* @remarks If a function has a structured permission value, the value of `granted` will reflect the `enabled` key
|
14659
|
+
* of the call's permissions literal. In this case, *permission may still be denied to a call* pending arguments or other
|
14660
|
+
* runtime state. This is indicated with `state: unavailable`.
|
14661
|
+
*
|
14646
14662
|
* @example
|
14647
14663
|
* ```js
|
14648
14664
|
* fin.System.queryPermissionForCurrentContext('System.launchExternalProcess').then(result => console.log(result)).catch(err => console.log(err));
|
@@ -17217,18 +17233,38 @@ declare namespace WebContentsEvents {
|
|
17217
17233
|
*
|
17218
17234
|
* @remarks We only support those web APIs listed by electron.
|
17219
17235
|
*
|
17220
|
-
* `audio`:
|
17221
|
-
* `video`:
|
17222
|
-
* `geolocation`:
|
17236
|
+
* `audio`: Access to audio devices.<br>
|
17237
|
+
* `video`: Access to video devices.<br>
|
17238
|
+
* `geolocation`: Access to user's current location.<br>
|
17239
|
+
* `notifications`: Request notification creation and the ability to display them in the user's system tray.<br>
|
17240
|
+
* `midiSysex`: Use of system exclusive messages in the webmidi API.<br>
|
17241
|
+
* `pointerLock`: Access to mouse movements as an input method.<br>
|
17242
|
+
* `fullscreen`: Access to fullscreen mode.<br>
|
17243
|
+
* `openExternal`: Access to open links in external applications.<br>
|
17244
|
+
* `clipboard-read`: Access to read from the clipboard.<br>
|
17245
|
+
* `clipboard-sanitized-write`: Access to write to the clipboard.
|
17246
|
+
* `usb`: Access to one or more USB devices
|
17247
|
+
* `hid : Access to one or more HID devices
|
17248
|
+
*/
|
17249
|
+
declare type WebPermission = WebPermissionName | DevicePermissionName | OpenExternalPermission;
|
17250
|
+
|
17251
|
+
/**
|
17252
|
+
* Permission string keys for webAPIs
|
17253
|
+
*
|
17254
|
+
* @remarks We only support those web APIs listed by electron.
|
17255
|
+
*
|
17256
|
+
* `audio`: Access to audio devices.<br>
|
17257
|
+
* `video`: Access to video devices.<br>
|
17258
|
+
* `geolocation`: Access to user's current location.<br>
|
17223
17259
|
* `notifications`: Request notification creation and the ability to display them in the user's system tray.<br>
|
17224
|
-
* `midiSysex`:
|
17225
|
-
* `pointerLock`:
|
17226
|
-
* `fullscreen`:
|
17227
|
-
* `openExternal`:
|
17228
|
-
* `clipboard-read`:
|
17229
|
-
* `clipboard-sanitized-write`:
|
17230
|
-
*/
|
17231
|
-
declare type
|
17260
|
+
* `midiSysex`: Use of system exclusive messages in the webmidi API.<br>
|
17261
|
+
* `pointerLock`: Access to mouse movements as an input method.<br>
|
17262
|
+
* `fullscreen`: Access to fullscreen mode.<br>
|
17263
|
+
* `openExternal`: Access to open links in external applications.<br>
|
17264
|
+
* `clipboard-read`: Access to read from the clipboard.<br>
|
17265
|
+
* `clipboard-sanitized-write`: Access to write to the clipboard.
|
17266
|
+
*/
|
17267
|
+
declare type WebPermissionName = 'audio' | 'video' | 'geolocation' | 'notifications' | 'midiSysex' | 'pointerLock' | 'fullscreen' | 'openExternal' | 'clipboard-read' | 'clipboard-sanitized-write';
|
17232
17268
|
|
17233
17269
|
/**
|
17234
17270
|
* Object representing headers and their values, where the
|
@@ -4525,6 +4525,17 @@ declare type DeviceInfo = {
|
|
4525
4525
|
productId: string | number;
|
4526
4526
|
};
|
4527
4527
|
|
4528
|
+
/**
|
4529
|
+
* Permission string keys for device APIs
|
4530
|
+
*
|
4531
|
+
* @remarks We currently only support USB and HID devices. Permissions for individual devices
|
4532
|
+
* must be granted in {@link Permissions.devices}.
|
4533
|
+
*
|
4534
|
+
* `usb`: Access to one or more USB devices
|
4535
|
+
* `hid : Access to one or more HID devices
|
4536
|
+
*/
|
4537
|
+
declare type DevicePermissionName = 'usb' | 'hid';
|
4538
|
+
|
4528
4539
|
/**
|
4529
4540
|
* Generated when a page's theme color changes. This is usually due to encountering a meta tag.
|
4530
4541
|
* @interface
|
@@ -7552,9 +7563,7 @@ declare class InteropClient extends Base {
|
|
7552
7563
|
* ```
|
7553
7564
|
*
|
7554
7565
|
*
|
7555
|
-
*
|
7556
|
-
* this, please make sure you add your context handlers at the top level of your application, on a page that
|
7557
|
-
* does not navigate/reload/re-render, to avoid memory leaks. This feature is experimental:
|
7566
|
+
* Passing in a context type as the second parameter will cause the handler to only be invoked with that context type.
|
7558
7567
|
*
|
7559
7568
|
* ```js
|
7560
7569
|
* function handleInstrumentContext(contextInfo) {
|
@@ -9835,6 +9844,8 @@ declare namespace OpenFin {
|
|
9835
9844
|
ApplicationPermissions,
|
9836
9845
|
LaunchExternalProcessRule,
|
9837
9846
|
SystemPermissions,
|
9847
|
+
DevicePermissionName,
|
9848
|
+
WebPermissionName,
|
9838
9849
|
WebPermission,
|
9839
9850
|
VerboseWebPermission,
|
9840
9851
|
OpenExternalPermission,
|
@@ -14641,8 +14652,13 @@ declare class System extends EmitterBase<OpenFin.SystemEvent> {
|
|
14641
14652
|
launchManifest(manifestUrl: string, opts?: OpenFin.RvmLaunchOptions): Promise<OpenFin.Manifest>;
|
14642
14653
|
/**
|
14643
14654
|
* Query permission of a secured api in current context.
|
14655
|
+
*
|
14644
14656
|
* @param apiName - The full name of a secured API.
|
14645
14657
|
*
|
14658
|
+
* @remarks If a function has a structured permission value, the value of `granted` will reflect the `enabled` key
|
14659
|
+
* of the call's permissions literal. In this case, *permission may still be denied to a call* pending arguments or other
|
14660
|
+
* runtime state. This is indicated with `state: unavailable`.
|
14661
|
+
*
|
14646
14662
|
* @example
|
14647
14663
|
* ```js
|
14648
14664
|
* fin.System.queryPermissionForCurrentContext('System.launchExternalProcess').then(result => console.log(result)).catch(err => console.log(err));
|
@@ -17217,18 +17233,38 @@ declare namespace WebContentsEvents {
|
|
17217
17233
|
*
|
17218
17234
|
* @remarks We only support those web APIs listed by electron.
|
17219
17235
|
*
|
17220
|
-
* `audio`:
|
17221
|
-
* `video`:
|
17222
|
-
* `geolocation`:
|
17236
|
+
* `audio`: Access to audio devices.<br>
|
17237
|
+
* `video`: Access to video devices.<br>
|
17238
|
+
* `geolocation`: Access to user's current location.<br>
|
17239
|
+
* `notifications`: Request notification creation and the ability to display them in the user's system tray.<br>
|
17240
|
+
* `midiSysex`: Use of system exclusive messages in the webmidi API.<br>
|
17241
|
+
* `pointerLock`: Access to mouse movements as an input method.<br>
|
17242
|
+
* `fullscreen`: Access to fullscreen mode.<br>
|
17243
|
+
* `openExternal`: Access to open links in external applications.<br>
|
17244
|
+
* `clipboard-read`: Access to read from the clipboard.<br>
|
17245
|
+
* `clipboard-sanitized-write`: Access to write to the clipboard.
|
17246
|
+
* `usb`: Access to one or more USB devices
|
17247
|
+
* `hid : Access to one or more HID devices
|
17248
|
+
*/
|
17249
|
+
declare type WebPermission = WebPermissionName | DevicePermissionName | OpenExternalPermission;
|
17250
|
+
|
17251
|
+
/**
|
17252
|
+
* Permission string keys for webAPIs
|
17253
|
+
*
|
17254
|
+
* @remarks We only support those web APIs listed by electron.
|
17255
|
+
*
|
17256
|
+
* `audio`: Access to audio devices.<br>
|
17257
|
+
* `video`: Access to video devices.<br>
|
17258
|
+
* `geolocation`: Access to user's current location.<br>
|
17223
17259
|
* `notifications`: Request notification creation and the ability to display them in the user's system tray.<br>
|
17224
|
-
* `midiSysex`:
|
17225
|
-
* `pointerLock`:
|
17226
|
-
* `fullscreen`:
|
17227
|
-
* `openExternal`:
|
17228
|
-
* `clipboard-read`:
|
17229
|
-
* `clipboard-sanitized-write`:
|
17230
|
-
*/
|
17231
|
-
declare type
|
17260
|
+
* `midiSysex`: Use of system exclusive messages in the webmidi API.<br>
|
17261
|
+
* `pointerLock`: Access to mouse movements as an input method.<br>
|
17262
|
+
* `fullscreen`: Access to fullscreen mode.<br>
|
17263
|
+
* `openExternal`: Access to open links in external applications.<br>
|
17264
|
+
* `clipboard-read`: Access to read from the clipboard.<br>
|
17265
|
+
* `clipboard-sanitized-write`: Access to write to the clipboard.
|
17266
|
+
*/
|
17267
|
+
declare type WebPermissionName = 'audio' | 'video' | 'geolocation' | 'notifications' | 'midiSysex' | 'pointerLock' | 'fullscreen' | 'openExternal' | 'clipboard-read' | 'clipboard-sanitized-write';
|
17232
17268
|
|
17233
17269
|
/**
|
17234
17270
|
* Object representing headers and their values, where the
|
package/out/node-adapter.d.ts
CHANGED
@@ -4584,6 +4584,17 @@ declare type DeviceInfo = {
|
|
4584
4584
|
productId: string | number;
|
4585
4585
|
};
|
4586
4586
|
|
4587
|
+
/**
|
4588
|
+
* Permission string keys for device APIs
|
4589
|
+
*
|
4590
|
+
* @remarks We currently only support USB and HID devices. Permissions for individual devices
|
4591
|
+
* must be granted in {@link Permissions.devices}.
|
4592
|
+
*
|
4593
|
+
* `usb`: Access to one or more USB devices
|
4594
|
+
* `hid : Access to one or more HID devices
|
4595
|
+
*/
|
4596
|
+
declare type DevicePermissionName = 'usb' | 'hid';
|
4597
|
+
|
4587
4598
|
/**
|
4588
4599
|
* Generated when a page's theme color changes. This is usually due to encountering a meta tag.
|
4589
4600
|
* @interface
|
@@ -7686,9 +7697,7 @@ declare class InteropClient extends Base {
|
|
7686
7697
|
* ```
|
7687
7698
|
*
|
7688
7699
|
*
|
7689
|
-
*
|
7690
|
-
* this, please make sure you add your context handlers at the top level of your application, on a page that
|
7691
|
-
* does not navigate/reload/re-render, to avoid memory leaks. This feature is experimental:
|
7700
|
+
* Passing in a context type as the second parameter will cause the handler to only be invoked with that context type.
|
7692
7701
|
*
|
7693
7702
|
* ```js
|
7694
7703
|
* function handleInstrumentContext(contextInfo) {
|
@@ -10172,6 +10181,8 @@ declare namespace OpenFin {
|
|
10172
10181
|
ApplicationPermissions,
|
10173
10182
|
LaunchExternalProcessRule,
|
10174
10183
|
SystemPermissions,
|
10184
|
+
DevicePermissionName,
|
10185
|
+
WebPermissionName,
|
10175
10186
|
WebPermission,
|
10176
10187
|
VerboseWebPermission,
|
10177
10188
|
OpenExternalPermission,
|
@@ -15062,8 +15073,13 @@ declare class System extends EmitterBase<OpenFin.SystemEvent> {
|
|
15062
15073
|
launchManifest(manifestUrl: string, opts?: OpenFin.RvmLaunchOptions): Promise<OpenFin.Manifest>;
|
15063
15074
|
/**
|
15064
15075
|
* Query permission of a secured api in current context.
|
15076
|
+
*
|
15065
15077
|
* @param apiName - The full name of a secured API.
|
15066
15078
|
*
|
15079
|
+
* @remarks If a function has a structured permission value, the value of `granted` will reflect the `enabled` key
|
15080
|
+
* of the call's permissions literal. In this case, *permission may still be denied to a call* pending arguments or other
|
15081
|
+
* runtime state. This is indicated with `state: unavailable`.
|
15082
|
+
*
|
15067
15083
|
* @example
|
15068
15084
|
* ```js
|
15069
15085
|
* fin.System.queryPermissionForCurrentContext('System.launchExternalProcess').then(result => console.log(result)).catch(err => console.log(err));
|
@@ -17682,18 +17698,38 @@ declare namespace WebContentsEvents {
|
|
17682
17698
|
*
|
17683
17699
|
* @remarks We only support those web APIs listed by electron.
|
17684
17700
|
*
|
17685
|
-
* `audio`:
|
17686
|
-
* `video`:
|
17687
|
-
* `geolocation`:
|
17701
|
+
* `audio`: Access to audio devices.<br>
|
17702
|
+
* `video`: Access to video devices.<br>
|
17703
|
+
* `geolocation`: Access to user's current location.<br>
|
17704
|
+
* `notifications`: Request notification creation and the ability to display them in the user's system tray.<br>
|
17705
|
+
* `midiSysex`: Use of system exclusive messages in the webmidi API.<br>
|
17706
|
+
* `pointerLock`: Access to mouse movements as an input method.<br>
|
17707
|
+
* `fullscreen`: Access to fullscreen mode.<br>
|
17708
|
+
* `openExternal`: Access to open links in external applications.<br>
|
17709
|
+
* `clipboard-read`: Access to read from the clipboard.<br>
|
17710
|
+
* `clipboard-sanitized-write`: Access to write to the clipboard.
|
17711
|
+
* `usb`: Access to one or more USB devices
|
17712
|
+
* `hid : Access to one or more HID devices
|
17713
|
+
*/
|
17714
|
+
declare type WebPermission = WebPermissionName | DevicePermissionName | OpenExternalPermission;
|
17715
|
+
|
17716
|
+
/**
|
17717
|
+
* Permission string keys for webAPIs
|
17718
|
+
*
|
17719
|
+
* @remarks We only support those web APIs listed by electron.
|
17720
|
+
*
|
17721
|
+
* `audio`: Access to audio devices.<br>
|
17722
|
+
* `video`: Access to video devices.<br>
|
17723
|
+
* `geolocation`: Access to user's current location.<br>
|
17688
17724
|
* `notifications`: Request notification creation and the ability to display them in the user's system tray.<br>
|
17689
|
-
* `midiSysex`:
|
17690
|
-
* `pointerLock`:
|
17691
|
-
* `fullscreen`:
|
17692
|
-
* `openExternal`:
|
17693
|
-
* `clipboard-read`:
|
17694
|
-
* `clipboard-sanitized-write`:
|
17695
|
-
*/
|
17696
|
-
declare type
|
17725
|
+
* `midiSysex`: Use of system exclusive messages in the webmidi API.<br>
|
17726
|
+
* `pointerLock`: Access to mouse movements as an input method.<br>
|
17727
|
+
* `fullscreen`: Access to fullscreen mode.<br>
|
17728
|
+
* `openExternal`: Access to open links in external applications.<br>
|
17729
|
+
* `clipboard-read`: Access to read from the clipboard.<br>
|
17730
|
+
* `clipboard-sanitized-write`: Access to write to the clipboard.
|
17731
|
+
*/
|
17732
|
+
declare type WebPermissionName = 'audio' | 'video' | 'geolocation' | 'notifications' | 'midiSysex' | 'pointerLock' | 'fullscreen' | 'openExternal' | 'clipboard-read' | 'clipboard-sanitized-write';
|
17697
17733
|
|
17698
17734
|
/**
|
17699
17735
|
* Object representing headers and their values, where the
|
package/out/node-adapter.js
CHANGED
@@ -7273,8 +7273,13 @@ class System extends base_1$i.EmitterBase {
|
|
7273
7273
|
}
|
7274
7274
|
/**
|
7275
7275
|
* Query permission of a secured api in current context.
|
7276
|
+
*
|
7276
7277
|
* @param apiName - The full name of a secured API.
|
7277
7278
|
*
|
7279
|
+
* @remarks If a function has a structured permission value, the value of `granted` will reflect the `enabled` key
|
7280
|
+
* of the call's permissions literal. In this case, *permission may still be denied to a call* pending arguments or other
|
7281
|
+
* runtime state. This is indicated with `state: unavailable`.
|
7282
|
+
*
|
7278
7283
|
* @example
|
7279
7284
|
* ```js
|
7280
7285
|
* fin.System.queryPermissionForCurrentContext('System.launchExternalProcess').then(result => console.log(result)).catch(err => console.log(err));
|
@@ -15682,9 +15687,7 @@ function requireInteropClient () {
|
|
15682
15687
|
* ```
|
15683
15688
|
*
|
15684
15689
|
*
|
15685
|
-
*
|
15686
|
-
* this, please make sure you add your context handlers at the top level of your application, on a page that
|
15687
|
-
* does not navigate/reload/re-render, to avoid memory leaks. This feature is experimental:
|
15690
|
+
* Passing in a context type as the second parameter will cause the handler to only be invoked with that context type.
|
15688
15691
|
*
|
15689
15692
|
* ```js
|
15690
15693
|
* function handleInstrumentContext(contextInfo) {
|
@@ -15713,7 +15716,6 @@ function requireInteropClient () {
|
|
15713
15716
|
let handlerId;
|
15714
15717
|
if (contextType) {
|
15715
15718
|
handlerId = `invokeContextHandler-${contextType}-${(0, utils_1.generateId)()}`;
|
15716
|
-
console.warn(`Warning: By providing a contextType (${contextType}), you are using the experimental addContextHandler. To avoid issues, make sure you are adding your context handlers at the top level in your application.`);
|
15717
15719
|
}
|
15718
15720
|
else {
|
15719
15721
|
handlerId = 'invokeContextHandler';
|