@openfin/remote-adapter 38.81.23 → 38.81.29
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/out/remote-adapter-alpha.d.ts +50 -14
- package/out/remote-adapter-beta.d.ts +50 -14
- package/out/remote-adapter-public.d.ts +50 -14
- package/out/remote-adapter.d.ts +50 -14
- package/out/remote-adapter.js +6 -4
- package/package.json +1 -1
|
@@ -4545,6 +4545,17 @@ declare type DeviceInfo = {
|
|
|
4545
4545
|
productId: string | number;
|
|
4546
4546
|
};
|
|
4547
4547
|
|
|
4548
|
+
/**
|
|
4549
|
+
* Permission string keys for device APIs
|
|
4550
|
+
*
|
|
4551
|
+
* @remarks We currently only support USB and HID devices. Permissions for individual devices
|
|
4552
|
+
* must be granted in {@link Permissions.devices}.
|
|
4553
|
+
*
|
|
4554
|
+
* `usb`: Access to one or more USB devices
|
|
4555
|
+
* `hid : Access to one or more HID devices
|
|
4556
|
+
*/
|
|
4557
|
+
declare type DevicePermissionName = 'usb' | 'hid';
|
|
4558
|
+
|
|
4548
4559
|
/**
|
|
4549
4560
|
* Generated when a page's theme color changes. This is usually due to encountering a meta tag.
|
|
4550
4561
|
* @interface
|
|
@@ -7587,9 +7598,7 @@ declare class InteropClient extends Base {
|
|
|
7587
7598
|
* ```
|
|
7588
7599
|
*
|
|
7589
7600
|
*
|
|
7590
|
-
*
|
|
7591
|
-
* this, please make sure you add your context handlers at the top level of your application, on a page that
|
|
7592
|
-
* does not navigate/reload/re-render, to avoid memory leaks. This feature is experimental:
|
|
7601
|
+
* Passing in a context type as the second parameter will cause the handler to only be invoked with that context type.
|
|
7593
7602
|
*
|
|
7594
7603
|
* ```js
|
|
7595
7604
|
* function handleInstrumentContext(contextInfo) {
|
|
@@ -9868,6 +9877,8 @@ declare namespace OpenFin {
|
|
|
9868
9877
|
ApplicationPermissions,
|
|
9869
9878
|
LaunchExternalProcessRule,
|
|
9870
9879
|
SystemPermissions,
|
|
9880
|
+
DevicePermissionName,
|
|
9881
|
+
WebPermissionName,
|
|
9871
9882
|
WebPermission,
|
|
9872
9883
|
VerboseWebPermission,
|
|
9873
9884
|
OpenExternalPermission,
|
|
@@ -14673,8 +14684,13 @@ declare class System extends EmitterBase<OpenFin.SystemEvent> {
|
|
|
14673
14684
|
launchManifest(manifestUrl: string, opts?: OpenFin.RvmLaunchOptions): Promise<OpenFin.Manifest>;
|
|
14674
14685
|
/**
|
|
14675
14686
|
* Query permission of a secured api in current context.
|
|
14687
|
+
*
|
|
14676
14688
|
* @param apiName - The full name of a secured API.
|
|
14677
14689
|
*
|
|
14690
|
+
* @remarks If a function has a structured permission value, the value of `granted` will reflect the `enabled` key
|
|
14691
|
+
* of the call's permissions literal. In this case, *permission may still be denied to a call* pending arguments or other
|
|
14692
|
+
* runtime state. This is indicated with `state: unavailable`.
|
|
14693
|
+
*
|
|
14678
14694
|
* @example
|
|
14679
14695
|
* ```js
|
|
14680
14696
|
* fin.System.queryPermissionForCurrentContext('System.launchExternalProcess').then(result => console.log(result)).catch(err => console.log(err));
|
|
@@ -17249,18 +17265,38 @@ declare namespace WebContentsEvents {
|
|
|
17249
17265
|
*
|
|
17250
17266
|
* @remarks We only support those web APIs listed by electron.
|
|
17251
17267
|
*
|
|
17252
|
-
* `audio`:
|
|
17253
|
-
* `video`:
|
|
17254
|
-
* `geolocation`:
|
|
17268
|
+
* `audio`: Access to audio devices.<br>
|
|
17269
|
+
* `video`: Access to video devices.<br>
|
|
17270
|
+
* `geolocation`: Access to user's current location.<br>
|
|
17271
|
+
* `notifications`: Request notification creation and the ability to display them in the user's system tray.<br>
|
|
17272
|
+
* `midiSysex`: Use of system exclusive messages in the webmidi API.<br>
|
|
17273
|
+
* `pointerLock`: Access to mouse movements as an input method.<br>
|
|
17274
|
+
* `fullscreen`: Access to fullscreen mode.<br>
|
|
17275
|
+
* `openExternal`: Access to open links in external applications.<br>
|
|
17276
|
+
* `clipboard-read`: Access to read from the clipboard.<br>
|
|
17277
|
+
* `clipboard-sanitized-write`: Access to write to the clipboard.
|
|
17278
|
+
* `usb`: Access to one or more USB devices
|
|
17279
|
+
* `hid : Access to one or more HID devices
|
|
17280
|
+
*/
|
|
17281
|
+
declare type WebPermission = WebPermissionName | DevicePermissionName | OpenExternalPermission;
|
|
17282
|
+
|
|
17283
|
+
/**
|
|
17284
|
+
* Permission string keys for webAPIs
|
|
17285
|
+
*
|
|
17286
|
+
* @remarks We only support those web APIs listed by electron.
|
|
17287
|
+
*
|
|
17288
|
+
* `audio`: Access to audio devices.<br>
|
|
17289
|
+
* `video`: Access to video devices.<br>
|
|
17290
|
+
* `geolocation`: Access to user's current location.<br>
|
|
17255
17291
|
* `notifications`: Request notification creation and the ability to display them in the user's system tray.<br>
|
|
17256
|
-
* `midiSysex`:
|
|
17257
|
-
* `pointerLock`:
|
|
17258
|
-
* `fullscreen`:
|
|
17259
|
-
* `openExternal`:
|
|
17260
|
-
* `clipboard-read`:
|
|
17261
|
-
* `clipboard-sanitized-write`:
|
|
17262
|
-
*/
|
|
17263
|
-
declare type
|
|
17292
|
+
* `midiSysex`: Use of system exclusive messages in the webmidi API.<br>
|
|
17293
|
+
* `pointerLock`: Access to mouse movements as an input method.<br>
|
|
17294
|
+
* `fullscreen`: Access to fullscreen mode.<br>
|
|
17295
|
+
* `openExternal`: Access to open links in external applications.<br>
|
|
17296
|
+
* `clipboard-read`: Access to read from the clipboard.<br>
|
|
17297
|
+
* `clipboard-sanitized-write`: Access to write to the clipboard.
|
|
17298
|
+
*/
|
|
17299
|
+
declare type WebPermissionName = 'audio' | 'video' | 'geolocation' | 'notifications' | 'midiSysex' | 'pointerLock' | 'fullscreen' | 'openExternal' | 'clipboard-read' | 'clipboard-sanitized-write';
|
|
17264
17300
|
|
|
17265
17301
|
/**
|
|
17266
17302
|
* Object representing headers and their values, where the
|
|
@@ -4545,6 +4545,17 @@ declare type DeviceInfo = {
|
|
|
4545
4545
|
productId: string | number;
|
|
4546
4546
|
};
|
|
4547
4547
|
|
|
4548
|
+
/**
|
|
4549
|
+
* Permission string keys for device APIs
|
|
4550
|
+
*
|
|
4551
|
+
* @remarks We currently only support USB and HID devices. Permissions for individual devices
|
|
4552
|
+
* must be granted in {@link Permissions.devices}.
|
|
4553
|
+
*
|
|
4554
|
+
* `usb`: Access to one or more USB devices
|
|
4555
|
+
* `hid : Access to one or more HID devices
|
|
4556
|
+
*/
|
|
4557
|
+
declare type DevicePermissionName = 'usb' | 'hid';
|
|
4558
|
+
|
|
4548
4559
|
/**
|
|
4549
4560
|
* Generated when a page's theme color changes. This is usually due to encountering a meta tag.
|
|
4550
4561
|
* @interface
|
|
@@ -7587,9 +7598,7 @@ declare class InteropClient extends Base {
|
|
|
7587
7598
|
* ```
|
|
7588
7599
|
*
|
|
7589
7600
|
*
|
|
7590
|
-
*
|
|
7591
|
-
* this, please make sure you add your context handlers at the top level of your application, on a page that
|
|
7592
|
-
* does not navigate/reload/re-render, to avoid memory leaks. This feature is experimental:
|
|
7601
|
+
* Passing in a context type as the second parameter will cause the handler to only be invoked with that context type.
|
|
7593
7602
|
*
|
|
7594
7603
|
* ```js
|
|
7595
7604
|
* function handleInstrumentContext(contextInfo) {
|
|
@@ -9868,6 +9877,8 @@ declare namespace OpenFin {
|
|
|
9868
9877
|
ApplicationPermissions,
|
|
9869
9878
|
LaunchExternalProcessRule,
|
|
9870
9879
|
SystemPermissions,
|
|
9880
|
+
DevicePermissionName,
|
|
9881
|
+
WebPermissionName,
|
|
9871
9882
|
WebPermission,
|
|
9872
9883
|
VerboseWebPermission,
|
|
9873
9884
|
OpenExternalPermission,
|
|
@@ -14673,8 +14684,13 @@ declare class System extends EmitterBase<OpenFin.SystemEvent> {
|
|
|
14673
14684
|
launchManifest(manifestUrl: string, opts?: OpenFin.RvmLaunchOptions): Promise<OpenFin.Manifest>;
|
|
14674
14685
|
/**
|
|
14675
14686
|
* Query permission of a secured api in current context.
|
|
14687
|
+
*
|
|
14676
14688
|
* @param apiName - The full name of a secured API.
|
|
14677
14689
|
*
|
|
14690
|
+
* @remarks If a function has a structured permission value, the value of `granted` will reflect the `enabled` key
|
|
14691
|
+
* of the call's permissions literal. In this case, *permission may still be denied to a call* pending arguments or other
|
|
14692
|
+
* runtime state. This is indicated with `state: unavailable`.
|
|
14693
|
+
*
|
|
14678
14694
|
* @example
|
|
14679
14695
|
* ```js
|
|
14680
14696
|
* fin.System.queryPermissionForCurrentContext('System.launchExternalProcess').then(result => console.log(result)).catch(err => console.log(err));
|
|
@@ -17249,18 +17265,38 @@ declare namespace WebContentsEvents {
|
|
|
17249
17265
|
*
|
|
17250
17266
|
* @remarks We only support those web APIs listed by electron.
|
|
17251
17267
|
*
|
|
17252
|
-
* `audio`:
|
|
17253
|
-
* `video`:
|
|
17254
|
-
* `geolocation`:
|
|
17268
|
+
* `audio`: Access to audio devices.<br>
|
|
17269
|
+
* `video`: Access to video devices.<br>
|
|
17270
|
+
* `geolocation`: Access to user's current location.<br>
|
|
17271
|
+
* `notifications`: Request notification creation and the ability to display them in the user's system tray.<br>
|
|
17272
|
+
* `midiSysex`: Use of system exclusive messages in the webmidi API.<br>
|
|
17273
|
+
* `pointerLock`: Access to mouse movements as an input method.<br>
|
|
17274
|
+
* `fullscreen`: Access to fullscreen mode.<br>
|
|
17275
|
+
* `openExternal`: Access to open links in external applications.<br>
|
|
17276
|
+
* `clipboard-read`: Access to read from the clipboard.<br>
|
|
17277
|
+
* `clipboard-sanitized-write`: Access to write to the clipboard.
|
|
17278
|
+
* `usb`: Access to one or more USB devices
|
|
17279
|
+
* `hid : Access to one or more HID devices
|
|
17280
|
+
*/
|
|
17281
|
+
declare type WebPermission = WebPermissionName | DevicePermissionName | OpenExternalPermission;
|
|
17282
|
+
|
|
17283
|
+
/**
|
|
17284
|
+
* Permission string keys for webAPIs
|
|
17285
|
+
*
|
|
17286
|
+
* @remarks We only support those web APIs listed by electron.
|
|
17287
|
+
*
|
|
17288
|
+
* `audio`: Access to audio devices.<br>
|
|
17289
|
+
* `video`: Access to video devices.<br>
|
|
17290
|
+
* `geolocation`: Access to user's current location.<br>
|
|
17255
17291
|
* `notifications`: Request notification creation and the ability to display them in the user's system tray.<br>
|
|
17256
|
-
* `midiSysex`:
|
|
17257
|
-
* `pointerLock`:
|
|
17258
|
-
* `fullscreen`:
|
|
17259
|
-
* `openExternal`:
|
|
17260
|
-
* `clipboard-read`:
|
|
17261
|
-
* `clipboard-sanitized-write`:
|
|
17262
|
-
*/
|
|
17263
|
-
declare type
|
|
17292
|
+
* `midiSysex`: Use of system exclusive messages in the webmidi API.<br>
|
|
17293
|
+
* `pointerLock`: Access to mouse movements as an input method.<br>
|
|
17294
|
+
* `fullscreen`: Access to fullscreen mode.<br>
|
|
17295
|
+
* `openExternal`: Access to open links in external applications.<br>
|
|
17296
|
+
* `clipboard-read`: Access to read from the clipboard.<br>
|
|
17297
|
+
* `clipboard-sanitized-write`: Access to write to the clipboard.
|
|
17298
|
+
*/
|
|
17299
|
+
declare type WebPermissionName = 'audio' | 'video' | 'geolocation' | 'notifications' | 'midiSysex' | 'pointerLock' | 'fullscreen' | 'openExternal' | 'clipboard-read' | 'clipboard-sanitized-write';
|
|
17264
17300
|
|
|
17265
17301
|
/**
|
|
17266
17302
|
* Object representing headers and their values, where the
|
|
@@ -4545,6 +4545,17 @@ declare type DeviceInfo = {
|
|
|
4545
4545
|
productId: string | number;
|
|
4546
4546
|
};
|
|
4547
4547
|
|
|
4548
|
+
/**
|
|
4549
|
+
* Permission string keys for device APIs
|
|
4550
|
+
*
|
|
4551
|
+
* @remarks We currently only support USB and HID devices. Permissions for individual devices
|
|
4552
|
+
* must be granted in {@link Permissions.devices}.
|
|
4553
|
+
*
|
|
4554
|
+
* `usb`: Access to one or more USB devices
|
|
4555
|
+
* `hid : Access to one or more HID devices
|
|
4556
|
+
*/
|
|
4557
|
+
declare type DevicePermissionName = 'usb' | 'hid';
|
|
4558
|
+
|
|
4548
4559
|
/**
|
|
4549
4560
|
* Generated when a page's theme color changes. This is usually due to encountering a meta tag.
|
|
4550
4561
|
* @interface
|
|
@@ -7587,9 +7598,7 @@ declare class InteropClient extends Base {
|
|
|
7587
7598
|
* ```
|
|
7588
7599
|
*
|
|
7589
7600
|
*
|
|
7590
|
-
*
|
|
7591
|
-
* this, please make sure you add your context handlers at the top level of your application, on a page that
|
|
7592
|
-
* does not navigate/reload/re-render, to avoid memory leaks. This feature is experimental:
|
|
7601
|
+
* Passing in a context type as the second parameter will cause the handler to only be invoked with that context type.
|
|
7593
7602
|
*
|
|
7594
7603
|
* ```js
|
|
7595
7604
|
* function handleInstrumentContext(contextInfo) {
|
|
@@ -9868,6 +9877,8 @@ declare namespace OpenFin {
|
|
|
9868
9877
|
ApplicationPermissions,
|
|
9869
9878
|
LaunchExternalProcessRule,
|
|
9870
9879
|
SystemPermissions,
|
|
9880
|
+
DevicePermissionName,
|
|
9881
|
+
WebPermissionName,
|
|
9871
9882
|
WebPermission,
|
|
9872
9883
|
VerboseWebPermission,
|
|
9873
9884
|
OpenExternalPermission,
|
|
@@ -14673,8 +14684,13 @@ declare class System extends EmitterBase<OpenFin.SystemEvent> {
|
|
|
14673
14684
|
launchManifest(manifestUrl: string, opts?: OpenFin.RvmLaunchOptions): Promise<OpenFin.Manifest>;
|
|
14674
14685
|
/**
|
|
14675
14686
|
* Query permission of a secured api in current context.
|
|
14687
|
+
*
|
|
14676
14688
|
* @param apiName - The full name of a secured API.
|
|
14677
14689
|
*
|
|
14690
|
+
* @remarks If a function has a structured permission value, the value of `granted` will reflect the `enabled` key
|
|
14691
|
+
* of the call's permissions literal. In this case, *permission may still be denied to a call* pending arguments or other
|
|
14692
|
+
* runtime state. This is indicated with `state: unavailable`.
|
|
14693
|
+
*
|
|
14678
14694
|
* @example
|
|
14679
14695
|
* ```js
|
|
14680
14696
|
* fin.System.queryPermissionForCurrentContext('System.launchExternalProcess').then(result => console.log(result)).catch(err => console.log(err));
|
|
@@ -17249,18 +17265,38 @@ declare namespace WebContentsEvents {
|
|
|
17249
17265
|
*
|
|
17250
17266
|
* @remarks We only support those web APIs listed by electron.
|
|
17251
17267
|
*
|
|
17252
|
-
* `audio`:
|
|
17253
|
-
* `video`:
|
|
17254
|
-
* `geolocation`:
|
|
17268
|
+
* `audio`: Access to audio devices.<br>
|
|
17269
|
+
* `video`: Access to video devices.<br>
|
|
17270
|
+
* `geolocation`: Access to user's current location.<br>
|
|
17271
|
+
* `notifications`: Request notification creation and the ability to display them in the user's system tray.<br>
|
|
17272
|
+
* `midiSysex`: Use of system exclusive messages in the webmidi API.<br>
|
|
17273
|
+
* `pointerLock`: Access to mouse movements as an input method.<br>
|
|
17274
|
+
* `fullscreen`: Access to fullscreen mode.<br>
|
|
17275
|
+
* `openExternal`: Access to open links in external applications.<br>
|
|
17276
|
+
* `clipboard-read`: Access to read from the clipboard.<br>
|
|
17277
|
+
* `clipboard-sanitized-write`: Access to write to the clipboard.
|
|
17278
|
+
* `usb`: Access to one or more USB devices
|
|
17279
|
+
* `hid : Access to one or more HID devices
|
|
17280
|
+
*/
|
|
17281
|
+
declare type WebPermission = WebPermissionName | DevicePermissionName | OpenExternalPermission;
|
|
17282
|
+
|
|
17283
|
+
/**
|
|
17284
|
+
* Permission string keys for webAPIs
|
|
17285
|
+
*
|
|
17286
|
+
* @remarks We only support those web APIs listed by electron.
|
|
17287
|
+
*
|
|
17288
|
+
* `audio`: Access to audio devices.<br>
|
|
17289
|
+
* `video`: Access to video devices.<br>
|
|
17290
|
+
* `geolocation`: Access to user's current location.<br>
|
|
17255
17291
|
* `notifications`: Request notification creation and the ability to display them in the user's system tray.<br>
|
|
17256
|
-
* `midiSysex`:
|
|
17257
|
-
* `pointerLock`:
|
|
17258
|
-
* `fullscreen`:
|
|
17259
|
-
* `openExternal`:
|
|
17260
|
-
* `clipboard-read`:
|
|
17261
|
-
* `clipboard-sanitized-write`:
|
|
17262
|
-
*/
|
|
17263
|
-
declare type
|
|
17292
|
+
* `midiSysex`: Use of system exclusive messages in the webmidi API.<br>
|
|
17293
|
+
* `pointerLock`: Access to mouse movements as an input method.<br>
|
|
17294
|
+
* `fullscreen`: Access to fullscreen mode.<br>
|
|
17295
|
+
* `openExternal`: Access to open links in external applications.<br>
|
|
17296
|
+
* `clipboard-read`: Access to read from the clipboard.<br>
|
|
17297
|
+
* `clipboard-sanitized-write`: Access to write to the clipboard.
|
|
17298
|
+
*/
|
|
17299
|
+
declare type WebPermissionName = 'audio' | 'video' | 'geolocation' | 'notifications' | 'midiSysex' | 'pointerLock' | 'fullscreen' | 'openExternal' | 'clipboard-read' | 'clipboard-sanitized-write';
|
|
17264
17300
|
|
|
17265
17301
|
/**
|
|
17266
17302
|
* Object representing headers and their values, where the
|
package/out/remote-adapter.d.ts
CHANGED
|
@@ -4604,6 +4604,17 @@ declare type DeviceInfo = {
|
|
|
4604
4604
|
productId: string | number;
|
|
4605
4605
|
};
|
|
4606
4606
|
|
|
4607
|
+
/**
|
|
4608
|
+
* Permission string keys for device APIs
|
|
4609
|
+
*
|
|
4610
|
+
* @remarks We currently only support USB and HID devices. Permissions for individual devices
|
|
4611
|
+
* must be granted in {@link Permissions.devices}.
|
|
4612
|
+
*
|
|
4613
|
+
* `usb`: Access to one or more USB devices
|
|
4614
|
+
* `hid : Access to one or more HID devices
|
|
4615
|
+
*/
|
|
4616
|
+
declare type DevicePermissionName = 'usb' | 'hid';
|
|
4617
|
+
|
|
4607
4618
|
/**
|
|
4608
4619
|
* Generated when a page's theme color changes. This is usually due to encountering a meta tag.
|
|
4609
4620
|
* @interface
|
|
@@ -7699,9 +7710,7 @@ declare class InteropClient extends Base {
|
|
|
7699
7710
|
* ```
|
|
7700
7711
|
*
|
|
7701
7712
|
*
|
|
7702
|
-
*
|
|
7703
|
-
* this, please make sure you add your context handlers at the top level of your application, on a page that
|
|
7704
|
-
* does not navigate/reload/re-render, to avoid memory leaks. This feature is experimental:
|
|
7713
|
+
* Passing in a context type as the second parameter will cause the handler to only be invoked with that context type.
|
|
7705
7714
|
*
|
|
7706
7715
|
* ```js
|
|
7707
7716
|
* function handleInstrumentContext(contextInfo) {
|
|
@@ -10183,6 +10192,8 @@ declare namespace OpenFin {
|
|
|
10183
10192
|
ApplicationPermissions,
|
|
10184
10193
|
LaunchExternalProcessRule,
|
|
10185
10194
|
SystemPermissions,
|
|
10195
|
+
DevicePermissionName,
|
|
10196
|
+
WebPermissionName,
|
|
10186
10197
|
WebPermission,
|
|
10187
10198
|
VerboseWebPermission,
|
|
10188
10199
|
OpenExternalPermission,
|
|
@@ -15072,8 +15083,13 @@ declare class System extends EmitterBase<OpenFin.SystemEvent> {
|
|
|
15072
15083
|
launchManifest(manifestUrl: string, opts?: OpenFin.RvmLaunchOptions): Promise<OpenFin.Manifest>;
|
|
15073
15084
|
/**
|
|
15074
15085
|
* Query permission of a secured api in current context.
|
|
15086
|
+
*
|
|
15075
15087
|
* @param apiName - The full name of a secured API.
|
|
15076
15088
|
*
|
|
15089
|
+
* @remarks If a function has a structured permission value, the value of `granted` will reflect the `enabled` key
|
|
15090
|
+
* of the call's permissions literal. In this case, *permission may still be denied to a call* pending arguments or other
|
|
15091
|
+
* runtime state. This is indicated with `state: unavailable`.
|
|
15092
|
+
*
|
|
15077
15093
|
* @example
|
|
15078
15094
|
* ```js
|
|
15079
15095
|
* fin.System.queryPermissionForCurrentContext('System.launchExternalProcess').then(result => console.log(result)).catch(err => console.log(err));
|
|
@@ -17692,18 +17708,38 @@ declare namespace WebContentsEvents {
|
|
|
17692
17708
|
*
|
|
17693
17709
|
* @remarks We only support those web APIs listed by electron.
|
|
17694
17710
|
*
|
|
17695
|
-
* `audio`:
|
|
17696
|
-
* `video`:
|
|
17697
|
-
* `geolocation`:
|
|
17711
|
+
* `audio`: Access to audio devices.<br>
|
|
17712
|
+
* `video`: Access to video devices.<br>
|
|
17713
|
+
* `geolocation`: Access to user's current location.<br>
|
|
17714
|
+
* `notifications`: Request notification creation and the ability to display them in the user's system tray.<br>
|
|
17715
|
+
* `midiSysex`: Use of system exclusive messages in the webmidi API.<br>
|
|
17716
|
+
* `pointerLock`: Access to mouse movements as an input method.<br>
|
|
17717
|
+
* `fullscreen`: Access to fullscreen mode.<br>
|
|
17718
|
+
* `openExternal`: Access to open links in external applications.<br>
|
|
17719
|
+
* `clipboard-read`: Access to read from the clipboard.<br>
|
|
17720
|
+
* `clipboard-sanitized-write`: Access to write to the clipboard.
|
|
17721
|
+
* `usb`: Access to one or more USB devices
|
|
17722
|
+
* `hid : Access to one or more HID devices
|
|
17723
|
+
*/
|
|
17724
|
+
declare type WebPermission = WebPermissionName | DevicePermissionName | OpenExternalPermission;
|
|
17725
|
+
|
|
17726
|
+
/**
|
|
17727
|
+
* Permission string keys for webAPIs
|
|
17728
|
+
*
|
|
17729
|
+
* @remarks We only support those web APIs listed by electron.
|
|
17730
|
+
*
|
|
17731
|
+
* `audio`: Access to audio devices.<br>
|
|
17732
|
+
* `video`: Access to video devices.<br>
|
|
17733
|
+
* `geolocation`: Access to user's current location.<br>
|
|
17698
17734
|
* `notifications`: Request notification creation and the ability to display them in the user's system tray.<br>
|
|
17699
|
-
* `midiSysex`:
|
|
17700
|
-
* `pointerLock`:
|
|
17701
|
-
* `fullscreen`:
|
|
17702
|
-
* `openExternal`:
|
|
17703
|
-
* `clipboard-read`:
|
|
17704
|
-
* `clipboard-sanitized-write`:
|
|
17705
|
-
*/
|
|
17706
|
-
declare type
|
|
17735
|
+
* `midiSysex`: Use of system exclusive messages in the webmidi API.<br>
|
|
17736
|
+
* `pointerLock`: Access to mouse movements as an input method.<br>
|
|
17737
|
+
* `fullscreen`: Access to fullscreen mode.<br>
|
|
17738
|
+
* `openExternal`: Access to open links in external applications.<br>
|
|
17739
|
+
* `clipboard-read`: Access to read from the clipboard.<br>
|
|
17740
|
+
* `clipboard-sanitized-write`: Access to write to the clipboard.
|
|
17741
|
+
*/
|
|
17742
|
+
declare type WebPermissionName = 'audio' | 'video' | 'geolocation' | 'notifications' | 'midiSysex' | 'pointerLock' | 'fullscreen' | 'openExternal' | 'clipboard-read' | 'clipboard-sanitized-write';
|
|
17707
17743
|
|
|
17708
17744
|
/**
|
|
17709
17745
|
* Object representing headers and their values, where the
|
package/out/remote-adapter.js
CHANGED
|
@@ -1817,9 +1817,7 @@ function requireInteropClient () {
|
|
|
1817
1817
|
* ```
|
|
1818
1818
|
*
|
|
1819
1819
|
*
|
|
1820
|
-
*
|
|
1821
|
-
* this, please make sure you add your context handlers at the top level of your application, on a page that
|
|
1822
|
-
* does not navigate/reload/re-render, to avoid memory leaks. This feature is experimental:
|
|
1820
|
+
* Passing in a context type as the second parameter will cause the handler to only be invoked with that context type.
|
|
1823
1821
|
*
|
|
1824
1822
|
* ```js
|
|
1825
1823
|
* function handleInstrumentContext(contextInfo) {
|
|
@@ -1848,7 +1846,6 @@ function requireInteropClient () {
|
|
|
1848
1846
|
let handlerId;
|
|
1849
1847
|
if (contextType) {
|
|
1850
1848
|
handlerId = `invokeContextHandler-${contextType}-${(0, utils_1.generateId)()}`;
|
|
1851
|
-
console.warn(`Warning: By providing a contextType (${contextType}), you are using the experimental addContextHandler. To avoid issues, make sure you are adding your context handlers at the top level in your application.`);
|
|
1852
1849
|
}
|
|
1853
1850
|
else {
|
|
1854
1851
|
handlerId = 'invokeContextHandler';
|
|
@@ -12113,8 +12110,13 @@ class System extends base_1$d.EmitterBase {
|
|
|
12113
12110
|
}
|
|
12114
12111
|
/**
|
|
12115
12112
|
* Query permission of a secured api in current context.
|
|
12113
|
+
*
|
|
12116
12114
|
* @param apiName - The full name of a secured API.
|
|
12117
12115
|
*
|
|
12116
|
+
* @remarks If a function has a structured permission value, the value of `granted` will reflect the `enabled` key
|
|
12117
|
+
* of the call's permissions literal. In this case, *permission may still be denied to a call* pending arguments or other
|
|
12118
|
+
* runtime state. This is indicated with `state: unavailable`.
|
|
12119
|
+
*
|
|
12118
12120
|
* @example
|
|
12119
12121
|
* ```js
|
|
12120
12122
|
* fin.System.queryPermissionForCurrentContext('System.launchExternalProcess').then(result => console.log(result)).catch(err => console.log(err));
|