chrome-devtools-frontend 1.0.1542501 → 1.0.1543472

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (74) hide show
  1. package/AUTHORS +1 -0
  2. package/front_end/core/common/Gzip.ts +4 -4
  3. package/front_end/core/common/common.ts +0 -2
  4. package/front_end/core/host/InspectorFrontendHost.ts +0 -3
  5. package/front_end/core/root/DevToolsContext.ts +60 -0
  6. package/front_end/core/root/Runtime.ts +0 -10
  7. package/front_end/core/root/root.ts +6 -1
  8. package/front_end/core/sdk/NetworkManager.ts +0 -7
  9. package/front_end/core/sdk/NetworkRequest.ts +0 -10
  10. package/front_end/core/sdk/TargetManager.ts +5 -6
  11. package/front_end/entrypoints/inspector_main/InspectorMain.ts +1 -13
  12. package/front_end/entrypoints/inspector_main/RenderingOptions.ts +5 -5
  13. package/front_end/entrypoints/main/MainImpl.ts +3 -5
  14. package/front_end/entrypoints/main/main-meta.ts +1 -5
  15. package/front_end/foundation/Universe.ts +13 -1
  16. package/front_end/generated/Deprecation.ts +0 -14
  17. package/front_end/generated/InspectorBackendCommands.ts +1 -1
  18. package/front_end/generated/protocol.ts +0 -1
  19. package/front_end/models/ai_assistance/BuiltInAi.ts +13 -7
  20. package/front_end/models/bindings/CompilerScriptMapping.ts +3 -2
  21. package/front_end/models/bindings/DebuggerWorkspaceBinding.ts +14 -9
  22. package/front_end/models/trace/handlers/SamplesHandler.ts +64 -6
  23. package/front_end/models/trace/types/TraceEvents.ts +16 -0
  24. package/front_end/models/workspace/IgnoreListManager.ts +10 -9
  25. package/front_end/models/workspace/WorkspaceImpl.ts +5 -10
  26. package/front_end/panels/application/ApplicationPanelSidebar.ts +0 -1
  27. package/front_end/panels/application/OpenedWindowDetailsView.ts +0 -2
  28. package/front_end/panels/application/ServiceWorkersView.ts +0 -2
  29. package/front_end/panels/application/StorageView.ts +0 -1
  30. package/front_end/panels/application/components/BackForwardCacheView.ts +12 -9
  31. package/front_end/panels/application/components/FrameDetailsView.ts +468 -447
  32. package/front_end/panels/console/ConsolePrompt.ts +1 -1
  33. package/front_end/panels/console/ConsoleView.ts +12 -7
  34. package/front_end/panels/console/ConsoleViewMessage.ts +19 -9
  35. package/front_end/panels/explain/components/ConsoleInsight.ts +314 -310
  36. package/front_end/panels/network/NetworkDataGridNode.ts +0 -7
  37. package/front_end/panels/network/NetworkLogView.ts +1 -45
  38. package/front_end/panels/security/SecurityPanel.ts +0 -2
  39. package/front_end/panels/security/SecurityPanelSidebar.ts +0 -16
  40. package/front_end/panels/security/security.ts +0 -2
  41. package/front_end/panels/settings/SettingsScreen.ts +3 -6
  42. package/front_end/panels/settings/components/SyncSection.ts +218 -226
  43. package/front_end/panels/settings/components/syncSection.css +81 -80
  44. package/front_end/panels/sources/DebuggerPlugin.ts +3 -1
  45. package/front_end/panels/sources/ResourceOriginPlugin.ts +7 -3
  46. package/front_end/panels/timeline/TimelinePanel.ts +0 -21
  47. package/front_end/third_party/chromium/README.chromium +1 -1
  48. package/front_end/ui/components/docs/component_docs.ts +0 -4
  49. package/front_end/ui/components/expandable_list/ExpandableList.docs.ts +30 -0
  50. package/front_end/ui/components/report_view/ReportView.ts +4 -1
  51. package/front_end/ui/legacy/ReportView.ts +0 -5
  52. package/front_end/ui/legacy/TextPrompt.ts +65 -19
  53. package/front_end/ui/legacy/components/object_ui/JavaScriptREPL.ts +8 -4
  54. package/front_end/ui/legacy/components/object_ui/ObjectPropertiesSection.ts +90 -92
  55. package/front_end/ui/legacy/components/object_ui/RemoteObjectPreviewFormatter.ts +114 -184
  56. package/front_end/ui/legacy/components/utils/Linkifier.ts +46 -2
  57. package/front_end/ui/{components/docs/theme_colors/basic.ts → legacy/theme_support/ThemeColors.docs.ts} +33 -23
  58. package/package.json +1 -1
  59. package/front_end/core/common/QueryParamHandler.ts +0 -7
  60. package/front_end/panels/security/IPProtectionTreeElement.ts +0 -21
  61. package/front_end/panels/security/IPProtectionView.ts +0 -287
  62. package/front_end/ui/components/docs/expandable_list/basic.html +0 -24
  63. package/front_end/ui/components/docs/expandable_list/basic.ts +0 -30
  64. package/front_end/ui/components/docs/input/basic.html +0 -31
  65. package/front_end/ui/components/docs/input/basic.ts +0 -12
  66. package/front_end/ui/components/docs/report/basic.html +0 -27
  67. package/front_end/ui/components/docs/report/basic.ts +0 -48
  68. package/front_end/ui/components/docs/text_prompt/basic.html +0 -35
  69. package/front_end/ui/components/docs/text_prompt/basic.ts +0 -19
  70. package/front_end/ui/components/docs/theme_colors/basic.html +0 -56
  71. package/front_end/ui/components/docs/toggle_dark_mode.ts +0 -36
  72. package/front_end/ui/components/docs/toggle_fonts.ts +0 -74
  73. package/front_end/ui/components/docs/user_agent_client_hints/basic.html +0 -25
  74. package/front_end/ui/components/docs/user_agent_client_hints/basic.ts +0 -26
@@ -325,7 +325,6 @@ const UIStrings = {
325
325
  /**
326
326
  * @description Tooltip to explain why the request has an IPP icon
327
327
  */
328
- responseIsIpProtectedToolTip: 'This request was sent through IP Protection proxies.',
329
328
  } as const;
330
329
  const str_ = i18n.i18n.registerUIStrings('panels/network/NetworkDataGridNode.ts', UIStrings);
331
330
  const i18nString = i18n.i18n.getLocalizedString.bind(undefined, str_);
@@ -1175,12 +1174,6 @@ export class NetworkRequestNode extends NetworkNode {
1175
1174
  cell.addEventListener('focus', () => this.parentView().resetFocus());
1176
1175
 
1177
1176
  // render icons
1178
- if (this.requestInternal.isIpProtectionUsed()) {
1179
- const ippIcon = IconButton.Icon.create('shield', 'icon');
1180
- ippIcon.title = i18nString(UIStrings.responseIsIpProtectedToolTip);
1181
- ippIcon.style.color = 'var(--sys-color-on-surface-subtle);';
1182
- cell.appendChild(ippIcon);
1183
- }
1184
1177
 
1185
1178
  const iconElement = PanelUtils.getIconForNetworkRequest(this.requestInternal);
1186
1179
  // eslint-disable-next-line @devtools/no-lit-render-outside-of-view
@@ -128,14 +128,6 @@ const UIStrings = {
128
128
  * @description Tooltip for a filter in the Network panel
129
129
  */
130
130
  onlyShowThirdPartyRequests: 'Show only requests with origin different from page origin',
131
- /**
132
- * @description Label for a filter in the Network panel
133
- */
134
- ippRequests: 'IP Protected requests',
135
- /**
136
- * @description Tooltip for a filter in the Network panel
137
- */
138
- onlyShowIPProtectedRequests: 'Show only requests sent to IP Protection proxies. Has no effect in regular browsing.',
139
131
  /**
140
132
  * @description Text that appears when user drag and drop something (for example, a file) in Network Log View of the Network panel
141
133
  */
@@ -530,7 +522,6 @@ export class NetworkLogView extends Common.ObjectWrapper.eventMixin<EventTypes,
530
522
  private readonly networkOnlyThirdPartySetting: Common.Settings.Setting<boolean>;
531
523
  private readonly networkResourceTypeFiltersSetting: Common.Settings.Setting<Record<string, boolean>>;
532
524
  private readonly networkShowOptionsToGenerateHarWithSensitiveData: Common.Settings.Setting<boolean>;
533
- private readonly networkOnlyIPProtectedRequestsSetting: Common.Settings.Setting<boolean>;
534
525
  private readonly progressBarContainer: Element;
535
526
  private readonly networkLogLargeRowsSetting: Common.Settings.Setting<boolean>;
536
527
  private rowHeightInternal: number;
@@ -586,8 +577,6 @@ export class NetworkLogView extends Common.ObjectWrapper.eventMixin<EventTypes,
586
577
  Common.Settings.Settings.instance().createSetting('network-only-blocked-requests', false);
587
578
  this.networkOnlyThirdPartySetting =
588
579
  Common.Settings.Settings.instance().createSetting('network-only-third-party-setting', false);
589
- this.networkOnlyIPProtectedRequestsSetting =
590
- Common.Settings.Settings.instance().createSetting('network-only-ip-protected-requests', false);
591
580
  this.networkResourceTypeFiltersSetting =
592
581
  Common.Settings.Settings.instance().createSetting('network-resource-type-filters', {});
593
582
  this.networkShowOptionsToGenerateHarWithSensitiveData = Common.Settings.Settings.instance().createSetting(
@@ -1603,7 +1592,6 @@ export class NetworkLogView extends Common.ObjectWrapper.eventMixin<EventTypes,
1603
1592
  this.networkOnlyBlockedRequestsSetting.set(false);
1604
1593
  this.networkOnlyThirdPartySetting.set(false);
1605
1594
  this.networkHideChromeExtensions.set(false);
1606
- this.networkOnlyIPProtectedRequestsSetting.set(false);
1607
1595
  this.resourceCategoryFilterUI.reset();
1608
1596
  }
1609
1597
 
@@ -2108,16 +2096,12 @@ export class NetworkLogView extends Common.ObjectWrapper.eventMixin<EventTypes,
2108
2096
  if (!this.resourceCategoryFilterUI.accept(categoryName)) {
2109
2097
  return false;
2110
2098
  }
2111
- const [hideDataURL, blockedCookies, blockedRequests, thirdParty, hideExtensionURL, ippRequests] = [
2099
+ const [hideDataURL, blockedCookies, blockedRequests, thirdParty, hideExtensionURL] = [
2112
2100
  this.networkHideDataURLSetting.get(),
2113
2101
  this.networkShowBlockedCookiesOnlySetting.get(),
2114
2102
  this.networkOnlyBlockedRequestsSetting.get(),
2115
2103
  this.networkOnlyThirdPartySetting.get(),
2116
2104
  this.networkHideChromeExtensions.get(),
2117
- // TODO(crbug.com/425645896): Remove this guard once IP Protection is fully launched.
2118
- Root.Runtime.hostConfig.devToolsIpProtectionInDevTools?.enabled ?
2119
- this.networkOnlyIPProtectedRequestsSetting.get() :
2120
- false,
2121
2105
  ];
2122
2106
 
2123
2107
  if (hideDataURL && (request.parsedURL.isDataURL() || request.parsedURL.isBlobURL())) {
@@ -2135,12 +2119,6 @@ export class NetworkLogView extends Common.ObjectWrapper.eventMixin<EventTypes,
2135
2119
  if (hideExtensionURL && request.scheme === 'chrome-extension') {
2136
2120
  return false;
2137
2121
  }
2138
- // TODO(crbug.com/425645896): Remove this guard once IP Protection is fully launched.
2139
- if (Root.Runtime.hostConfig.devToolsIpProtectionInDevTools?.enabled) {
2140
- if (ippRequests && !request.isIpProtectionUsed()) {
2141
- return false;
2142
- }
2143
- }
2144
2122
  for (let i = 0; i < this.filters.length; ++i) {
2145
2123
  if (!this.filters[i](request)) {
2146
2124
  return false;
@@ -2756,7 +2734,6 @@ export class MoreFiltersDropDownUI extends Common.ObjectWrapper.ObjectWrapper<UI
2756
2734
  private networkShowBlockedCookiesOnlySetting: Common.Settings.Setting<boolean>;
2757
2735
  private networkOnlyBlockedRequestsSetting: Common.Settings.Setting<boolean>;
2758
2736
  private networkOnlyThirdPartySetting: Common.Settings.Setting<boolean>;
2759
- private networkOnlyIPProtectedRequestsSetting: Common.Settings.Setting<boolean>;
2760
2737
  private activeFiltersCount: HTMLElement;
2761
2738
  private activeFiltersCountAdorner: Adorners.Adorner.Adorner;
2762
2739
 
@@ -2772,8 +2749,6 @@ export class MoreFiltersDropDownUI extends Common.ObjectWrapper.ObjectWrapper<UI
2772
2749
  Common.Settings.Settings.instance().createSetting('network-only-blocked-requests', false);
2773
2750
  this.networkOnlyThirdPartySetting =
2774
2751
  Common.Settings.Settings.instance().createSetting('network-only-third-party-setting', false);
2775
- this.networkOnlyIPProtectedRequestsSetting =
2776
- Common.Settings.Settings.instance().createSetting('network-only-ip-protected-requests', false);
2777
2752
 
2778
2753
  this.filterElement = document.createElement('div');
2779
2754
  this.filterElement.setAttribute('aria-label', 'Show only/hide requests dropdown');
@@ -2810,10 +2785,6 @@ export class MoreFiltersDropDownUI extends Common.ObjectWrapper.ObjectWrapper<UI
2810
2785
  this.networkShowBlockedCookiesOnlySetting.addChangeListener(this.#onSettingChanged.bind(this));
2811
2786
  this.networkOnlyBlockedRequestsSetting.addChangeListener(this.#onSettingChanged.bind(this));
2812
2787
  this.networkOnlyThirdPartySetting.addChangeListener(this.#onSettingChanged.bind(this));
2813
- // TODO(crbug.com/425645896): Remove this guard once IP Protection is fully launched.
2814
- if (Root.Runtime.hostConfig.devToolsIpProtectionInDevTools?.enabled) {
2815
- this.networkOnlyIPProtectedRequestsSetting.addChangeListener(this.#onSettingChanged.bind(this));
2816
- }
2817
2788
 
2818
2789
  contextMenu.defaultSection().appendCheckboxItem(
2819
2790
  i18nString(UIStrings.hideDataUrls),
@@ -2845,17 +2816,6 @@ export class MoreFiltersDropDownUI extends Common.ObjectWrapper.ObjectWrapper<UI
2845
2816
  tooltip: i18nString(UIStrings.onlyShowBlockedRequests),
2846
2817
  jslogContext: 'only-blocked-requests',
2847
2818
  });
2848
- // Disable this filter if in regular browsing, as IP Protection is only available in incognito mode.
2849
- // TODO(crbug.com/425645896): Remove this guard once IP Protection is fully launched.
2850
- if (Root.Runtime.hostConfig.devToolsIpProtectionInDevTools?.enabled) {
2851
- contextMenu.defaultSection().appendCheckboxItem(
2852
- i18nString(UIStrings.ippRequests),
2853
- () => this.networkOnlyIPProtectedRequestsSetting.set(!this.networkOnlyIPProtectedRequestsSetting.get()), {
2854
- checked: this.networkOnlyIPProtectedRequestsSetting.get(),
2855
- tooltip: i18nString(UIStrings.onlyShowIPProtectedRequests),
2856
- jslogContext: 'only-ip-protected-requests',
2857
- });
2858
- }
2859
2819
  contextMenu.defaultSection().appendCheckboxItem(
2860
2820
  i18nString(UIStrings.thirdParty),
2861
2821
  () => this.networkOnlyThirdPartySetting.set(!this.networkOnlyThirdPartySetting.get()), {
@@ -2872,10 +2832,6 @@ export class MoreFiltersDropDownUI extends Common.ObjectWrapper.ObjectWrapper<UI
2872
2832
  ...this.networkShowBlockedCookiesOnlySetting.get() ? [i18nString(UIStrings.hasBlockedCookies)] : [],
2873
2833
  ...this.networkOnlyBlockedRequestsSetting.get() ? [i18nString(UIStrings.blockedRequests)] : [],
2874
2834
  ...this.networkOnlyThirdPartySetting.get() ? [i18nString(UIStrings.thirdParty)] : [],
2875
- ...Root.Runtime.hostConfig.devToolsIpProtectionInDevTools?.enabled &&
2876
- this.networkOnlyIPProtectedRequestsSetting.get() ?
2877
- [i18nString(UIStrings.ippRequests)] :
2878
- [],
2879
2835
  ];
2880
2836
  return filters;
2881
2837
  }
@@ -17,7 +17,6 @@ import * as VisualLogging from '../../ui/visual_logging/visual_logging.js';
17
17
 
18
18
  import {CookieControlsView} from './CookieControlsView.js';
19
19
  import {CookieReportView} from './CookieReportView.js';
20
- import {IPProtectionView} from './IPProtectionView.js';
21
20
  import lockIconStyles from './lockIcon.css.js';
22
21
  import mainViewStyles from './mainView.css.js';
23
22
  import {ShowOriginEvent} from './OriginTreeElement.js';
@@ -556,7 +555,6 @@ const DEFAULT_VIEW: View = (input: ViewInput, output: ViewOutput, target: HTMLEl
556
555
  <devtools-widget
557
556
  slot="sidebar"
558
557
  .widgetConfig=${widgetConfig(SecurityPanelSidebar)}
559
- @showIPProtection=${() => output.setVisibleView(new IPProtectionView())}
560
558
  @showCookieReport=${()=>output.setVisibleView(new CookieReportView())}
561
559
  @showFlagControls=${() => output.setVisibleView(new CookieControlsView())}
562
560
  ${UI.Widget.widgetRef(SecurityPanelSidebar, e => {output.sidebar = e;})}>
@@ -13,7 +13,6 @@ import * as UI from '../../ui/legacy/legacy.js';
13
13
 
14
14
  import {CookieControlsTreeElement} from './CookieControlsTreeElement.js';
15
15
  import {CookieReportTreeElement} from './CookieReportTreeElement.js';
16
- import {IPProtectionTreeElement} from './IPProtectionTreeElement.js';
17
16
  import lockIconStyles from './lockIcon.css.js';
18
17
  import {OriginTreeElement} from './OriginTreeElement.js';
19
18
  import {
@@ -42,10 +41,6 @@ const UIStrings = {
42
41
  * @description Sidebar element text in the Security panel
43
42
  */
44
43
  flagControls: 'Controls',
45
- /**
46
- * @description Sidebar element text in the Security panel
47
- */
48
- ipProtection: 'IP Protection',
49
44
  /**
50
45
  * @description Text in Security Panel of the Security panel
51
46
  */
@@ -83,7 +78,6 @@ export class SecurityPanelSidebar extends UI.Widget.VBox {
83
78
  securityOverviewElement: OriginTreeElement;
84
79
  readonly #cookieControlsTreeElement: CookieControlsTreeElement|undefined;
85
80
  readonly cookieReportTreeElement: CookieReportTreeElement|undefined;
86
- readonly ipProtectionTreeElement: IPProtectionTreeElement|undefined;
87
81
  readonly #elementsByOrigin: Map<string, OriginTreeElement>;
88
82
  readonly #mainViewReloadMessage: UI.TreeOutline.TreeElement;
89
83
  #mainOrigin: string|null;
@@ -108,11 +102,6 @@ export class SecurityPanelSidebar extends UI.Widget.VBox {
108
102
  this.cookieReportTreeElement = new CookieReportTreeElement(i18nString(UIStrings.cookieReport), 'cookie-report');
109
103
  privacyTreeSection.appendChild(this.cookieReportTreeElement);
110
104
 
111
- if (Root.Runtime.hostConfig.devToolsIpProtectionPanelInDevTools?.enabled) {
112
- this.ipProtectionTreeElement = new IPProtectionTreeElement(i18nString(UIStrings.ipProtection), 'ip-protection');
113
- privacyTreeSection.appendChild(this.ipProtectionTreeElement);
114
- }
115
-
116
105
  // If this if the first time this setting is set, go to the controls tool
117
106
  if (this.#securitySidebarLastItemSetting.get() === '') {
118
107
  this.#securitySidebarLastItemSetting.set(this.#cookieControlsTreeElement.elemId);
@@ -192,11 +181,6 @@ export class SecurityPanelSidebar extends UI.Widget.VBox {
192
181
  this.#securitySidebarLastItemSetting.get() === this.cookieReportTreeElement.elemId) {
193
182
  this.cookieReportTreeElement.select();
194
183
  this.cookieReportTreeElement.showElement();
195
- } else if (
196
- this.ipProtectionTreeElement &&
197
- this.#securitySidebarLastItemSetting.get() === this.ipProtectionTreeElement.elemId) {
198
- this.ipProtectionTreeElement.select();
199
- this.ipProtectionTreeElement.showElement();
200
184
  } else {
201
185
  this.securityOverviewElement.select();
202
186
  this.securityOverviewElement.showElement();
@@ -4,14 +4,12 @@
4
4
 
5
5
  import * as CookieControlsView from './CookieControlsView.js';
6
6
  import * as CookieReportView from './CookieReportView.js';
7
- import * as IPProtectionView from './IPProtectionView.js';
8
7
  import * as SecurityModel from './SecurityModel.js';
9
8
  import * as SecurityPanel from './SecurityPanel.js';
10
9
 
11
10
  export {
12
11
  CookieControlsView,
13
12
  CookieReportView,
14
- IPProtectionView,
15
13
  SecurityModel,
16
14
  SecurityPanel,
17
15
  };
@@ -235,6 +235,7 @@ export class GenericSettingsTab extends UI.Widget.VBox implements SettingsTab {
235
235
  this.contentElement.createChild('div', 'settings-card-container-wrapper').createChild('div');
236
236
 
237
237
  this.containerElement.classList.add('settings-multicolumn-card-container');
238
+ this.syncSection.markAsRoot();
238
239
 
239
240
  // AI, GRID, MOBILE, EMULATION, and RENDERING are intentionally excluded from this list.
240
241
  // AI settings are displayed in their own tab.
@@ -316,11 +317,7 @@ export class GenericSettingsTab extends UI.Widget.VBox implements SettingsTab {
316
317
  new Promise<Host.InspectorFrontendHostAPI.SyncInformation>(
317
318
  resolve => Host.InspectorFrontendHost.InspectorFrontendHostInstance.getSyncInformation(resolve))
318
319
  .then(syncInfo => {
319
- this.syncSection.data = {
320
- syncInfo,
321
- syncSetting: Common.Settings.moduleSetting('sync-preferences') as Common.Settings.Setting<boolean>,
322
- receiveBadgesSetting: Common.Settings.Settings.instance().moduleSetting('receive-gdp-badges'),
323
- };
320
+ this.syncSection.syncInfo = syncInfo;
324
321
  if (!syncInfo.isSyncActive || !syncInfo.arePreferencesSynced) {
325
322
  this.#updateSyncSectionTimerId = window.setTimeout(this.updateSyncSection.bind(this), 500);
326
323
  }
@@ -342,7 +339,7 @@ export class GenericSettingsTab extends UI.Widget.VBox implements SettingsTab {
342
339
  } else if (category === Common.Settings.SettingCategory.ACCOUNT && settings.length > 0) {
343
340
  const syncCard = createSettingsCard(
344
341
  Common.SettingRegistration.getLocalizedSettingsCategory(Common.SettingRegistration.SettingCategory.ACCOUNT),
345
- this.syncSection);
342
+ this.syncSection.element);
346
343
  this.containerElement.appendChild(syncCard);
347
344
  } else if (settings.length > 0) {
348
345
  this.createStandardSectionElement(category, settings);