@openfin/remote-adapter 38.81.24 → 38.81.29
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/out/remote-adapter-alpha.d.ts +49 -11
- package/out/remote-adapter-beta.d.ts +49 -11
- package/out/remote-adapter-public.d.ts +49 -11
- package/out/remote-adapter.d.ts +49 -11
- package/out/remote-adapter.js +5 -0
- package/package.json +1 -1
|
@@ -4545,6 +4545,17 @@ declare type DeviceInfo = {
|
|
|
4545
4545
|
productId: string | number;
|
|
4546
4546
|
};
|
|
4547
4547
|
|
|
4548
|
+
/**
|
|
4549
|
+
* Permission string keys for device APIs
|
|
4550
|
+
*
|
|
4551
|
+
* @remarks We currently only support USB and HID devices. Permissions for individual devices
|
|
4552
|
+
* must be granted in {@link Permissions.devices}.
|
|
4553
|
+
*
|
|
4554
|
+
* `usb`: Access to one or more USB devices
|
|
4555
|
+
* `hid : Access to one or more HID devices
|
|
4556
|
+
*/
|
|
4557
|
+
declare type DevicePermissionName = 'usb' | 'hid';
|
|
4558
|
+
|
|
4548
4559
|
/**
|
|
4549
4560
|
* Generated when a page's theme color changes. This is usually due to encountering a meta tag.
|
|
4550
4561
|
* @interface
|
|
@@ -9866,6 +9877,8 @@ declare namespace OpenFin {
|
|
|
9866
9877
|
ApplicationPermissions,
|
|
9867
9878
|
LaunchExternalProcessRule,
|
|
9868
9879
|
SystemPermissions,
|
|
9880
|
+
DevicePermissionName,
|
|
9881
|
+
WebPermissionName,
|
|
9869
9882
|
WebPermission,
|
|
9870
9883
|
VerboseWebPermission,
|
|
9871
9884
|
OpenExternalPermission,
|
|
@@ -14671,8 +14684,13 @@ declare class System extends EmitterBase<OpenFin.SystemEvent> {
|
|
|
14671
14684
|
launchManifest(manifestUrl: string, opts?: OpenFin.RvmLaunchOptions): Promise<OpenFin.Manifest>;
|
|
14672
14685
|
/**
|
|
14673
14686
|
* Query permission of a secured api in current context.
|
|
14687
|
+
*
|
|
14674
14688
|
* @param apiName - The full name of a secured API.
|
|
14675
14689
|
*
|
|
14690
|
+
* @remarks If a function has a structured permission value, the value of `granted` will reflect the `enabled` key
|
|
14691
|
+
* of the call's permissions literal. In this case, *permission may still be denied to a call* pending arguments or other
|
|
14692
|
+
* runtime state. This is indicated with `state: unavailable`.
|
|
14693
|
+
*
|
|
14676
14694
|
* @example
|
|
14677
14695
|
* ```js
|
|
14678
14696
|
* fin.System.queryPermissionForCurrentContext('System.launchExternalProcess').then(result => console.log(result)).catch(err => console.log(err));
|
|
@@ -17247,18 +17265,38 @@ declare namespace WebContentsEvents {
|
|
|
17247
17265
|
*
|
|
17248
17266
|
* @remarks We only support those web APIs listed by electron.
|
|
17249
17267
|
*
|
|
17250
|
-
* `audio`:
|
|
17251
|
-
* `video`:
|
|
17252
|
-
* `geolocation`:
|
|
17268
|
+
* `audio`: Access to audio devices.<br>
|
|
17269
|
+
* `video`: Access to video devices.<br>
|
|
17270
|
+
* `geolocation`: Access to user's current location.<br>
|
|
17271
|
+
* `notifications`: Request notification creation and the ability to display them in the user's system tray.<br>
|
|
17272
|
+
* `midiSysex`: Use of system exclusive messages in the webmidi API.<br>
|
|
17273
|
+
* `pointerLock`: Access to mouse movements as an input method.<br>
|
|
17274
|
+
* `fullscreen`: Access to fullscreen mode.<br>
|
|
17275
|
+
* `openExternal`: Access to open links in external applications.<br>
|
|
17276
|
+
* `clipboard-read`: Access to read from the clipboard.<br>
|
|
17277
|
+
* `clipboard-sanitized-write`: Access to write to the clipboard.
|
|
17278
|
+
* `usb`: Access to one or more USB devices
|
|
17279
|
+
* `hid : Access to one or more HID devices
|
|
17280
|
+
*/
|
|
17281
|
+
declare type WebPermission = WebPermissionName | DevicePermissionName | OpenExternalPermission;
|
|
17282
|
+
|
|
17283
|
+
/**
|
|
17284
|
+
* Permission string keys for webAPIs
|
|
17285
|
+
*
|
|
17286
|
+
* @remarks We only support those web APIs listed by electron.
|
|
17287
|
+
*
|
|
17288
|
+
* `audio`: Access to audio devices.<br>
|
|
17289
|
+
* `video`: Access to video devices.<br>
|
|
17290
|
+
* `geolocation`: Access to user's current location.<br>
|
|
17253
17291
|
* `notifications`: Request notification creation and the ability to display them in the user's system tray.<br>
|
|
17254
|
-
* `midiSysex`:
|
|
17255
|
-
* `pointerLock`:
|
|
17256
|
-
* `fullscreen`:
|
|
17257
|
-
* `openExternal`:
|
|
17258
|
-
* `clipboard-read`:
|
|
17259
|
-
* `clipboard-sanitized-write`:
|
|
17260
|
-
*/
|
|
17261
|
-
declare type
|
|
17292
|
+
* `midiSysex`: Use of system exclusive messages in the webmidi API.<br>
|
|
17293
|
+
* `pointerLock`: Access to mouse movements as an input method.<br>
|
|
17294
|
+
* `fullscreen`: Access to fullscreen mode.<br>
|
|
17295
|
+
* `openExternal`: Access to open links in external applications.<br>
|
|
17296
|
+
* `clipboard-read`: Access to read from the clipboard.<br>
|
|
17297
|
+
* `clipboard-sanitized-write`: Access to write to the clipboard.
|
|
17298
|
+
*/
|
|
17299
|
+
declare type WebPermissionName = 'audio' | 'video' | 'geolocation' | 'notifications' | 'midiSysex' | 'pointerLock' | 'fullscreen' | 'openExternal' | 'clipboard-read' | 'clipboard-sanitized-write';
|
|
17262
17300
|
|
|
17263
17301
|
/**
|
|
17264
17302
|
* Object representing headers and their values, where the
|
|
@@ -4545,6 +4545,17 @@ declare type DeviceInfo = {
|
|
|
4545
4545
|
productId: string | number;
|
|
4546
4546
|
};
|
|
4547
4547
|
|
|
4548
|
+
/**
|
|
4549
|
+
* Permission string keys for device APIs
|
|
4550
|
+
*
|
|
4551
|
+
* @remarks We currently only support USB and HID devices. Permissions for individual devices
|
|
4552
|
+
* must be granted in {@link Permissions.devices}.
|
|
4553
|
+
*
|
|
4554
|
+
* `usb`: Access to one or more USB devices
|
|
4555
|
+
* `hid : Access to one or more HID devices
|
|
4556
|
+
*/
|
|
4557
|
+
declare type DevicePermissionName = 'usb' | 'hid';
|
|
4558
|
+
|
|
4548
4559
|
/**
|
|
4549
4560
|
* Generated when a page's theme color changes. This is usually due to encountering a meta tag.
|
|
4550
4561
|
* @interface
|
|
@@ -9866,6 +9877,8 @@ declare namespace OpenFin {
|
|
|
9866
9877
|
ApplicationPermissions,
|
|
9867
9878
|
LaunchExternalProcessRule,
|
|
9868
9879
|
SystemPermissions,
|
|
9880
|
+
DevicePermissionName,
|
|
9881
|
+
WebPermissionName,
|
|
9869
9882
|
WebPermission,
|
|
9870
9883
|
VerboseWebPermission,
|
|
9871
9884
|
OpenExternalPermission,
|
|
@@ -14671,8 +14684,13 @@ declare class System extends EmitterBase<OpenFin.SystemEvent> {
|
|
|
14671
14684
|
launchManifest(manifestUrl: string, opts?: OpenFin.RvmLaunchOptions): Promise<OpenFin.Manifest>;
|
|
14672
14685
|
/**
|
|
14673
14686
|
* Query permission of a secured api in current context.
|
|
14687
|
+
*
|
|
14674
14688
|
* @param apiName - The full name of a secured API.
|
|
14675
14689
|
*
|
|
14690
|
+
* @remarks If a function has a structured permission value, the value of `granted` will reflect the `enabled` key
|
|
14691
|
+
* of the call's permissions literal. In this case, *permission may still be denied to a call* pending arguments or other
|
|
14692
|
+
* runtime state. This is indicated with `state: unavailable`.
|
|
14693
|
+
*
|
|
14676
14694
|
* @example
|
|
14677
14695
|
* ```js
|
|
14678
14696
|
* fin.System.queryPermissionForCurrentContext('System.launchExternalProcess').then(result => console.log(result)).catch(err => console.log(err));
|
|
@@ -17247,18 +17265,38 @@ declare namespace WebContentsEvents {
|
|
|
17247
17265
|
*
|
|
17248
17266
|
* @remarks We only support those web APIs listed by electron.
|
|
17249
17267
|
*
|
|
17250
|
-
* `audio`:
|
|
17251
|
-
* `video`:
|
|
17252
|
-
* `geolocation`:
|
|
17268
|
+
* `audio`: Access to audio devices.<br>
|
|
17269
|
+
* `video`: Access to video devices.<br>
|
|
17270
|
+
* `geolocation`: Access to user's current location.<br>
|
|
17271
|
+
* `notifications`: Request notification creation and the ability to display them in the user's system tray.<br>
|
|
17272
|
+
* `midiSysex`: Use of system exclusive messages in the webmidi API.<br>
|
|
17273
|
+
* `pointerLock`: Access to mouse movements as an input method.<br>
|
|
17274
|
+
* `fullscreen`: Access to fullscreen mode.<br>
|
|
17275
|
+
* `openExternal`: Access to open links in external applications.<br>
|
|
17276
|
+
* `clipboard-read`: Access to read from the clipboard.<br>
|
|
17277
|
+
* `clipboard-sanitized-write`: Access to write to the clipboard.
|
|
17278
|
+
* `usb`: Access to one or more USB devices
|
|
17279
|
+
* `hid : Access to one or more HID devices
|
|
17280
|
+
*/
|
|
17281
|
+
declare type WebPermission = WebPermissionName | DevicePermissionName | OpenExternalPermission;
|
|
17282
|
+
|
|
17283
|
+
/**
|
|
17284
|
+
* Permission string keys for webAPIs
|
|
17285
|
+
*
|
|
17286
|
+
* @remarks We only support those web APIs listed by electron.
|
|
17287
|
+
*
|
|
17288
|
+
* `audio`: Access to audio devices.<br>
|
|
17289
|
+
* `video`: Access to video devices.<br>
|
|
17290
|
+
* `geolocation`: Access to user's current location.<br>
|
|
17253
17291
|
* `notifications`: Request notification creation and the ability to display them in the user's system tray.<br>
|
|
17254
|
-
* `midiSysex`:
|
|
17255
|
-
* `pointerLock`:
|
|
17256
|
-
* `fullscreen`:
|
|
17257
|
-
* `openExternal`:
|
|
17258
|
-
* `clipboard-read`:
|
|
17259
|
-
* `clipboard-sanitized-write`:
|
|
17260
|
-
*/
|
|
17261
|
-
declare type
|
|
17292
|
+
* `midiSysex`: Use of system exclusive messages in the webmidi API.<br>
|
|
17293
|
+
* `pointerLock`: Access to mouse movements as an input method.<br>
|
|
17294
|
+
* `fullscreen`: Access to fullscreen mode.<br>
|
|
17295
|
+
* `openExternal`: Access to open links in external applications.<br>
|
|
17296
|
+
* `clipboard-read`: Access to read from the clipboard.<br>
|
|
17297
|
+
* `clipboard-sanitized-write`: Access to write to the clipboard.
|
|
17298
|
+
*/
|
|
17299
|
+
declare type WebPermissionName = 'audio' | 'video' | 'geolocation' | 'notifications' | 'midiSysex' | 'pointerLock' | 'fullscreen' | 'openExternal' | 'clipboard-read' | 'clipboard-sanitized-write';
|
|
17262
17300
|
|
|
17263
17301
|
/**
|
|
17264
17302
|
* Object representing headers and their values, where the
|
|
@@ -4545,6 +4545,17 @@ declare type DeviceInfo = {
|
|
|
4545
4545
|
productId: string | number;
|
|
4546
4546
|
};
|
|
4547
4547
|
|
|
4548
|
+
/**
|
|
4549
|
+
* Permission string keys for device APIs
|
|
4550
|
+
*
|
|
4551
|
+
* @remarks We currently only support USB and HID devices. Permissions for individual devices
|
|
4552
|
+
* must be granted in {@link Permissions.devices}.
|
|
4553
|
+
*
|
|
4554
|
+
* `usb`: Access to one or more USB devices
|
|
4555
|
+
* `hid : Access to one or more HID devices
|
|
4556
|
+
*/
|
|
4557
|
+
declare type DevicePermissionName = 'usb' | 'hid';
|
|
4558
|
+
|
|
4548
4559
|
/**
|
|
4549
4560
|
* Generated when a page's theme color changes. This is usually due to encountering a meta tag.
|
|
4550
4561
|
* @interface
|
|
@@ -9866,6 +9877,8 @@ declare namespace OpenFin {
|
|
|
9866
9877
|
ApplicationPermissions,
|
|
9867
9878
|
LaunchExternalProcessRule,
|
|
9868
9879
|
SystemPermissions,
|
|
9880
|
+
DevicePermissionName,
|
|
9881
|
+
WebPermissionName,
|
|
9869
9882
|
WebPermission,
|
|
9870
9883
|
VerboseWebPermission,
|
|
9871
9884
|
OpenExternalPermission,
|
|
@@ -14671,8 +14684,13 @@ declare class System extends EmitterBase<OpenFin.SystemEvent> {
|
|
|
14671
14684
|
launchManifest(manifestUrl: string, opts?: OpenFin.RvmLaunchOptions): Promise<OpenFin.Manifest>;
|
|
14672
14685
|
/**
|
|
14673
14686
|
* Query permission of a secured api in current context.
|
|
14687
|
+
*
|
|
14674
14688
|
* @param apiName - The full name of a secured API.
|
|
14675
14689
|
*
|
|
14690
|
+
* @remarks If a function has a structured permission value, the value of `granted` will reflect the `enabled` key
|
|
14691
|
+
* of the call's permissions literal. In this case, *permission may still be denied to a call* pending arguments or other
|
|
14692
|
+
* runtime state. This is indicated with `state: unavailable`.
|
|
14693
|
+
*
|
|
14676
14694
|
* @example
|
|
14677
14695
|
* ```js
|
|
14678
14696
|
* fin.System.queryPermissionForCurrentContext('System.launchExternalProcess').then(result => console.log(result)).catch(err => console.log(err));
|
|
@@ -17247,18 +17265,38 @@ declare namespace WebContentsEvents {
|
|
|
17247
17265
|
*
|
|
17248
17266
|
* @remarks We only support those web APIs listed by electron.
|
|
17249
17267
|
*
|
|
17250
|
-
* `audio`:
|
|
17251
|
-
* `video`:
|
|
17252
|
-
* `geolocation`:
|
|
17268
|
+
* `audio`: Access to audio devices.<br>
|
|
17269
|
+
* `video`: Access to video devices.<br>
|
|
17270
|
+
* `geolocation`: Access to user's current location.<br>
|
|
17271
|
+
* `notifications`: Request notification creation and the ability to display them in the user's system tray.<br>
|
|
17272
|
+
* `midiSysex`: Use of system exclusive messages in the webmidi API.<br>
|
|
17273
|
+
* `pointerLock`: Access to mouse movements as an input method.<br>
|
|
17274
|
+
* `fullscreen`: Access to fullscreen mode.<br>
|
|
17275
|
+
* `openExternal`: Access to open links in external applications.<br>
|
|
17276
|
+
* `clipboard-read`: Access to read from the clipboard.<br>
|
|
17277
|
+
* `clipboard-sanitized-write`: Access to write to the clipboard.
|
|
17278
|
+
* `usb`: Access to one or more USB devices
|
|
17279
|
+
* `hid : Access to one or more HID devices
|
|
17280
|
+
*/
|
|
17281
|
+
declare type WebPermission = WebPermissionName | DevicePermissionName | OpenExternalPermission;
|
|
17282
|
+
|
|
17283
|
+
/**
|
|
17284
|
+
* Permission string keys for webAPIs
|
|
17285
|
+
*
|
|
17286
|
+
* @remarks We only support those web APIs listed by electron.
|
|
17287
|
+
*
|
|
17288
|
+
* `audio`: Access to audio devices.<br>
|
|
17289
|
+
* `video`: Access to video devices.<br>
|
|
17290
|
+
* `geolocation`: Access to user's current location.<br>
|
|
17253
17291
|
* `notifications`: Request notification creation and the ability to display them in the user's system tray.<br>
|
|
17254
|
-
* `midiSysex`:
|
|
17255
|
-
* `pointerLock`:
|
|
17256
|
-
* `fullscreen`:
|
|
17257
|
-
* `openExternal`:
|
|
17258
|
-
* `clipboard-read`:
|
|
17259
|
-
* `clipboard-sanitized-write`:
|
|
17260
|
-
*/
|
|
17261
|
-
declare type
|
|
17292
|
+
* `midiSysex`: Use of system exclusive messages in the webmidi API.<br>
|
|
17293
|
+
* `pointerLock`: Access to mouse movements as an input method.<br>
|
|
17294
|
+
* `fullscreen`: Access to fullscreen mode.<br>
|
|
17295
|
+
* `openExternal`: Access to open links in external applications.<br>
|
|
17296
|
+
* `clipboard-read`: Access to read from the clipboard.<br>
|
|
17297
|
+
* `clipboard-sanitized-write`: Access to write to the clipboard.
|
|
17298
|
+
*/
|
|
17299
|
+
declare type WebPermissionName = 'audio' | 'video' | 'geolocation' | 'notifications' | 'midiSysex' | 'pointerLock' | 'fullscreen' | 'openExternal' | 'clipboard-read' | 'clipboard-sanitized-write';
|
|
17262
17300
|
|
|
17263
17301
|
/**
|
|
17264
17302
|
* Object representing headers and their values, where the
|
package/out/remote-adapter.d.ts
CHANGED
|
@@ -4604,6 +4604,17 @@ declare type DeviceInfo = {
|
|
|
4604
4604
|
productId: string | number;
|
|
4605
4605
|
};
|
|
4606
4606
|
|
|
4607
|
+
/**
|
|
4608
|
+
* Permission string keys for device APIs
|
|
4609
|
+
*
|
|
4610
|
+
* @remarks We currently only support USB and HID devices. Permissions for individual devices
|
|
4611
|
+
* must be granted in {@link Permissions.devices}.
|
|
4612
|
+
*
|
|
4613
|
+
* `usb`: Access to one or more USB devices
|
|
4614
|
+
* `hid : Access to one or more HID devices
|
|
4615
|
+
*/
|
|
4616
|
+
declare type DevicePermissionName = 'usb' | 'hid';
|
|
4617
|
+
|
|
4607
4618
|
/**
|
|
4608
4619
|
* Generated when a page's theme color changes. This is usually due to encountering a meta tag.
|
|
4609
4620
|
* @interface
|
|
@@ -10181,6 +10192,8 @@ declare namespace OpenFin {
|
|
|
10181
10192
|
ApplicationPermissions,
|
|
10182
10193
|
LaunchExternalProcessRule,
|
|
10183
10194
|
SystemPermissions,
|
|
10195
|
+
DevicePermissionName,
|
|
10196
|
+
WebPermissionName,
|
|
10184
10197
|
WebPermission,
|
|
10185
10198
|
VerboseWebPermission,
|
|
10186
10199
|
OpenExternalPermission,
|
|
@@ -15070,8 +15083,13 @@ declare class System extends EmitterBase<OpenFin.SystemEvent> {
|
|
|
15070
15083
|
launchManifest(manifestUrl: string, opts?: OpenFin.RvmLaunchOptions): Promise<OpenFin.Manifest>;
|
|
15071
15084
|
/**
|
|
15072
15085
|
* Query permission of a secured api in current context.
|
|
15086
|
+
*
|
|
15073
15087
|
* @param apiName - The full name of a secured API.
|
|
15074
15088
|
*
|
|
15089
|
+
* @remarks If a function has a structured permission value, the value of `granted` will reflect the `enabled` key
|
|
15090
|
+
* of the call's permissions literal. In this case, *permission may still be denied to a call* pending arguments or other
|
|
15091
|
+
* runtime state. This is indicated with `state: unavailable`.
|
|
15092
|
+
*
|
|
15075
15093
|
* @example
|
|
15076
15094
|
* ```js
|
|
15077
15095
|
* fin.System.queryPermissionForCurrentContext('System.launchExternalProcess').then(result => console.log(result)).catch(err => console.log(err));
|
|
@@ -17690,18 +17708,38 @@ declare namespace WebContentsEvents {
|
|
|
17690
17708
|
*
|
|
17691
17709
|
* @remarks We only support those web APIs listed by electron.
|
|
17692
17710
|
*
|
|
17693
|
-
* `audio`:
|
|
17694
|
-
* `video`:
|
|
17695
|
-
* `geolocation`:
|
|
17711
|
+
* `audio`: Access to audio devices.<br>
|
|
17712
|
+
* `video`: Access to video devices.<br>
|
|
17713
|
+
* `geolocation`: Access to user's current location.<br>
|
|
17714
|
+
* `notifications`: Request notification creation and the ability to display them in the user's system tray.<br>
|
|
17715
|
+
* `midiSysex`: Use of system exclusive messages in the webmidi API.<br>
|
|
17716
|
+
* `pointerLock`: Access to mouse movements as an input method.<br>
|
|
17717
|
+
* `fullscreen`: Access to fullscreen mode.<br>
|
|
17718
|
+
* `openExternal`: Access to open links in external applications.<br>
|
|
17719
|
+
* `clipboard-read`: Access to read from the clipboard.<br>
|
|
17720
|
+
* `clipboard-sanitized-write`: Access to write to the clipboard.
|
|
17721
|
+
* `usb`: Access to one or more USB devices
|
|
17722
|
+
* `hid : Access to one or more HID devices
|
|
17723
|
+
*/
|
|
17724
|
+
declare type WebPermission = WebPermissionName | DevicePermissionName | OpenExternalPermission;
|
|
17725
|
+
|
|
17726
|
+
/**
|
|
17727
|
+
* Permission string keys for webAPIs
|
|
17728
|
+
*
|
|
17729
|
+
* @remarks We only support those web APIs listed by electron.
|
|
17730
|
+
*
|
|
17731
|
+
* `audio`: Access to audio devices.<br>
|
|
17732
|
+
* `video`: Access to video devices.<br>
|
|
17733
|
+
* `geolocation`: Access to user's current location.<br>
|
|
17696
17734
|
* `notifications`: Request notification creation and the ability to display them in the user's system tray.<br>
|
|
17697
|
-
* `midiSysex`:
|
|
17698
|
-
* `pointerLock`:
|
|
17699
|
-
* `fullscreen`:
|
|
17700
|
-
* `openExternal`:
|
|
17701
|
-
* `clipboard-read`:
|
|
17702
|
-
* `clipboard-sanitized-write`:
|
|
17703
|
-
*/
|
|
17704
|
-
declare type
|
|
17735
|
+
* `midiSysex`: Use of system exclusive messages in the webmidi API.<br>
|
|
17736
|
+
* `pointerLock`: Access to mouse movements as an input method.<br>
|
|
17737
|
+
* `fullscreen`: Access to fullscreen mode.<br>
|
|
17738
|
+
* `openExternal`: Access to open links in external applications.<br>
|
|
17739
|
+
* `clipboard-read`: Access to read from the clipboard.<br>
|
|
17740
|
+
* `clipboard-sanitized-write`: Access to write to the clipboard.
|
|
17741
|
+
*/
|
|
17742
|
+
declare type WebPermissionName = 'audio' | 'video' | 'geolocation' | 'notifications' | 'midiSysex' | 'pointerLock' | 'fullscreen' | 'openExternal' | 'clipboard-read' | 'clipboard-sanitized-write';
|
|
17705
17743
|
|
|
17706
17744
|
/**
|
|
17707
17745
|
* Object representing headers and their values, where the
|
package/out/remote-adapter.js
CHANGED
|
@@ -12110,8 +12110,13 @@ class System extends base_1$d.EmitterBase {
|
|
|
12110
12110
|
}
|
|
12111
12111
|
/**
|
|
12112
12112
|
* Query permission of a secured api in current context.
|
|
12113
|
+
*
|
|
12113
12114
|
* @param apiName - The full name of a secured API.
|
|
12114
12115
|
*
|
|
12116
|
+
* @remarks If a function has a structured permission value, the value of `granted` will reflect the `enabled` key
|
|
12117
|
+
* of the call's permissions literal. In this case, *permission may still be denied to a call* pending arguments or other
|
|
12118
|
+
* runtime state. This is indicated with `state: unavailable`.
|
|
12119
|
+
*
|
|
12115
12120
|
* @example
|
|
12116
12121
|
* ```js
|
|
12117
12122
|
* fin.System.queryPermissionForCurrentContext('System.launchExternalProcess').then(result => console.log(result)).catch(err => console.log(err));
|