devtools-protocol 0.0.1413902 → 0.0.1418467

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1821,7 +1821,8 @@
1821
1821
  "InvalidFieldsSpecified",
1822
1822
  "RelyingPartyOriginIsOpaque",
1823
1823
  "TypeNotMatching",
1824
- "UiDismissedNoEmbargo"
1824
+ "UiDismissedNoEmbargo",
1825
+ "CorsError"
1825
1826
  ]
1826
1827
  },
1827
1828
  {
@@ -2288,6 +2289,17 @@
2288
2289
  }
2289
2290
  ]
2290
2291
  },
2292
+ {
2293
+ "name": "uninstall",
2294
+ "description": "Uninstalls an unpacked extension (others not supported) from the profile.\nAvailable if the client is connected using the --remote-debugging-pipe flag\nand the --enable-unsafe-extension-debugging.",
2295
+ "parameters": [
2296
+ {
2297
+ "name": "id",
2298
+ "description": "Extension id.",
2299
+ "type": "string"
2300
+ }
2301
+ ]
2302
+ },
2291
2303
  {
2292
2304
  "name": "getStorageItems",
2293
2305
  "description": "Gets data from extension storage in the given `storageArea`. If `keys` is\nspecified, these are used to filter the result.",
@@ -17624,6 +17636,19 @@
17624
17636
  }
17625
17637
  ]
17626
17638
  },
17639
+ {
17640
+ "id": "SecurityOriginDetails",
17641
+ "description": "Additional information about the frame document's security origin.",
17642
+ "experimental": true,
17643
+ "type": "object",
17644
+ "properties": [
17645
+ {
17646
+ "name": "isLocalhost",
17647
+ "description": "Indicates whether the frame document's security origin is one\nof the local hostnames (e.g. \"localhost\") or IP addresses (IPv4\n127.0.0.0/8 or IPv6 ::1).",
17648
+ "type": "boolean"
17649
+ }
17650
+ ]
17651
+ },
17627
17652
  {
17628
17653
  "id": "Frame",
17629
17654
  "description": "Information about the Frame on the page.",
@@ -17674,6 +17699,13 @@
17674
17699
  "description": "Frame document's security origin.",
17675
17700
  "type": "string"
17676
17701
  },
17702
+ {
17703
+ "name": "securityOriginDetails",
17704
+ "description": "Additional details about the frame document's security origin.",
17705
+ "experimental": true,
17706
+ "optional": true,
17707
+ "$ref": "SecurityOriginDetails"
17708
+ },
17677
17709
  {
17678
17710
  "name": "mimeType",
17679
17711
  "description": "Frame document's mimeType as determined by the browser.",
@@ -23936,6 +23968,12 @@
23936
23968
  "description": "Binding name, 'cdp' if not specified.",
23937
23969
  "optional": true,
23938
23970
  "type": "string"
23971
+ },
23972
+ {
23973
+ "name": "inheritPermissions",
23974
+ "description": "If true, inherits the current root session's permissions (default: false).",
23975
+ "optional": true,
23976
+ "type": "boolean"
23939
23977
  }
23940
23978
  ]
23941
23979
  },
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "devtools-protocol",
3
- "version": "0.0.1413902",
3
+ "version": "0.0.1418467",
4
4
  "description": "The Chrome DevTools Protocol JSON",
5
5
  "repository": "https://github.com/ChromeDevTools/devtools-protocol",
6
6
  "author": "The Chromium Authors",
@@ -950,6 +950,7 @@ experimental domain Audits
950
950
  RelyingPartyOriginIsOpaque
951
951
  TypeNotMatching
952
952
  UiDismissedNoEmbargo
953
+ CorsError
953
954
 
954
955
  type FederatedAuthUserInfoRequestIssueDetails extends object
955
956
  properties
@@ -1171,6 +1172,13 @@ experimental domain Extensions
1171
1172
  returns
1172
1173
  # Extension id.
1173
1174
  string id
1175
+ # Uninstalls an unpacked extension (others not supported) from the profile.
1176
+ # Available if the client is connected using the --remote-debugging-pipe flag
1177
+ # and the --enable-unsafe-extension-debugging.
1178
+ command uninstall
1179
+ parameters
1180
+ # Extension id.
1181
+ string id
1174
1182
  # Gets data from extension storage in the given `storageArea`. If `keys` is
1175
1183
  # specified, these are used to filter the result.
1176
1184
  command getStorageItems
@@ -8355,6 +8363,14 @@ domain Page
8355
8363
  OriginTrialStatus status
8356
8364
  array of OriginTrialTokenWithStatus tokensWithStatus
8357
8365
 
8366
+ # Additional information about the frame document's security origin.
8367
+ experimental type SecurityOriginDetails extends object
8368
+ properties
8369
+ # Indicates whether the frame document's security origin is one
8370
+ # of the local hostnames (e.g. "localhost") or IP addresses (IPv4
8371
+ # 127.0.0.0/8 or IPv6 ::1).
8372
+ boolean isLocalhost
8373
+
8358
8374
  # Information about the Frame on the page.
8359
8375
  type Frame extends object
8360
8376
  properties
@@ -8377,6 +8393,8 @@ domain Page
8377
8393
  experimental string domainAndRegistry
8378
8394
  # Frame document's security origin.
8379
8395
  string securityOrigin
8396
+ # Additional details about the frame document's security origin.
8397
+ experimental optional SecurityOriginDetails securityOriginDetails
8380
8398
  # Frame document's mimeType as determined by the browser.
8381
8399
  string mimeType
8382
8400
  # If the frame failed to load, this contains the URL that could not be loaded. Note that unlike url above, this URL may contain a fragment.
@@ -11276,6 +11294,8 @@ domain Target
11276
11294
  TargetID targetId
11277
11295
  # Binding name, 'cdp' if not specified.
11278
11296
  optional string bindingName
11297
+ # If true, inherits the current root session's permissions (default: false).
11298
+ optional boolean inheritPermissions
11279
11299
 
11280
11300
  # Creates a new empty BrowserContext. Similar to an incognito profile but you can have more than
11281
11301
  # one.
@@ -1557,6 +1557,15 @@ export namespace ProtocolMapping {
1557
1557
  paramsType: [Protocol.Extensions.LoadUnpackedRequest];
1558
1558
  returnType: Protocol.Extensions.LoadUnpackedResponse;
1559
1559
  };
1560
+ /**
1561
+ * Uninstalls an unpacked extension (others not supported) from the profile.
1562
+ * Available if the client is connected using the --remote-debugging-pipe flag
1563
+ * and the --enable-unsafe-extension-debugging.
1564
+ */
1565
+ 'Extensions.uninstall': {
1566
+ paramsType: [Protocol.Extensions.UninstallRequest];
1567
+ returnType: void;
1568
+ };
1560
1569
  /**
1561
1570
  * Gets data from extension storage in the given `storageArea`. If `keys` is
1562
1571
  * specified, these are used to filter the result.
@@ -827,6 +827,13 @@ export namespace ProtocolProxyApi {
827
827
  */
828
828
  loadUnpacked(params: Protocol.Extensions.LoadUnpackedRequest): Promise<Protocol.Extensions.LoadUnpackedResponse>;
829
829
 
830
+ /**
831
+ * Uninstalls an unpacked extension (others not supported) from the profile.
832
+ * Available if the client is connected using the --remote-debugging-pipe flag
833
+ * and the --enable-unsafe-extension-debugging.
834
+ */
835
+ uninstall(params: Protocol.Extensions.UninstallRequest): Promise<void>;
836
+
830
837
  /**
831
838
  * Gets data from extension storage in the given `storageArea`. If `keys` is
832
839
  * specified, these are used to filter the result.
@@ -885,6 +885,13 @@ export namespace ProtocolTestsProxyApi {
885
885
  */
886
886
  loadUnpacked(params: Protocol.Extensions.LoadUnpackedRequest): Promise<{id: number, result: Protocol.Extensions.LoadUnpackedResponse, sessionId: string}>;
887
887
 
888
+ /**
889
+ * Uninstalls an unpacked extension (others not supported) from the profile.
890
+ * Available if the client is connected using the --remote-debugging-pipe flag
891
+ * and the --enable-unsafe-extension-debugging.
892
+ */
893
+ uninstall(params: Protocol.Extensions.UninstallRequest): Promise<{id: number, result: void, sessionId: string}>;
894
+
888
895
  /**
889
896
  * Gets data from extension storage in the given `storageArea`. If `keys` is
890
897
  * specified, these are used to filter the result.
@@ -3643,7 +3643,7 @@ export namespace Protocol {
3643
3643
  * third_party/blink/public/mojom/devtools/inspector_issue.mojom to include
3644
3644
  * all cases except for success.
3645
3645
  */
3646
- export type FederatedAuthRequestIssueReason = ('ShouldEmbargo' | 'TooManyRequests' | 'WellKnownHttpNotFound' | 'WellKnownNoResponse' | 'WellKnownInvalidResponse' | 'WellKnownListEmpty' | 'WellKnownInvalidContentType' | 'ConfigNotInWellKnown' | 'WellKnownTooBig' | 'ConfigHttpNotFound' | 'ConfigNoResponse' | 'ConfigInvalidResponse' | 'ConfigInvalidContentType' | 'ClientMetadataHttpNotFound' | 'ClientMetadataNoResponse' | 'ClientMetadataInvalidResponse' | 'ClientMetadataInvalidContentType' | 'IdpNotPotentiallyTrustworthy' | 'DisabledInSettings' | 'DisabledInFlags' | 'ErrorFetchingSignin' | 'InvalidSigninResponse' | 'AccountsHttpNotFound' | 'AccountsNoResponse' | 'AccountsInvalidResponse' | 'AccountsListEmpty' | 'AccountsInvalidContentType' | 'IdTokenHttpNotFound' | 'IdTokenNoResponse' | 'IdTokenInvalidResponse' | 'IdTokenIdpErrorResponse' | 'IdTokenCrossSiteIdpErrorResponse' | 'IdTokenInvalidRequest' | 'IdTokenInvalidContentType' | 'ErrorIdToken' | 'Canceled' | 'RpPageNotVisible' | 'SilentMediationFailure' | 'ThirdPartyCookiesBlocked' | 'NotSignedInWithIdp' | 'MissingTransientUserActivation' | 'ReplacedByActiveMode' | 'InvalidFieldsSpecified' | 'RelyingPartyOriginIsOpaque' | 'TypeNotMatching' | 'UiDismissedNoEmbargo');
3646
+ export type FederatedAuthRequestIssueReason = ('ShouldEmbargo' | 'TooManyRequests' | 'WellKnownHttpNotFound' | 'WellKnownNoResponse' | 'WellKnownInvalidResponse' | 'WellKnownListEmpty' | 'WellKnownInvalidContentType' | 'ConfigNotInWellKnown' | 'WellKnownTooBig' | 'ConfigHttpNotFound' | 'ConfigNoResponse' | 'ConfigInvalidResponse' | 'ConfigInvalidContentType' | 'ClientMetadataHttpNotFound' | 'ClientMetadataNoResponse' | 'ClientMetadataInvalidResponse' | 'ClientMetadataInvalidContentType' | 'IdpNotPotentiallyTrustworthy' | 'DisabledInSettings' | 'DisabledInFlags' | 'ErrorFetchingSignin' | 'InvalidSigninResponse' | 'AccountsHttpNotFound' | 'AccountsNoResponse' | 'AccountsInvalidResponse' | 'AccountsListEmpty' | 'AccountsInvalidContentType' | 'IdTokenHttpNotFound' | 'IdTokenNoResponse' | 'IdTokenInvalidResponse' | 'IdTokenIdpErrorResponse' | 'IdTokenCrossSiteIdpErrorResponse' | 'IdTokenInvalidRequest' | 'IdTokenInvalidContentType' | 'ErrorIdToken' | 'Canceled' | 'RpPageNotVisible' | 'SilentMediationFailure' | 'ThirdPartyCookiesBlocked' | 'NotSignedInWithIdp' | 'MissingTransientUserActivation' | 'ReplacedByActiveMode' | 'InvalidFieldsSpecified' | 'RelyingPartyOriginIsOpaque' | 'TypeNotMatching' | 'UiDismissedNoEmbargo' | 'CorsError');
3647
3647
 
3648
3648
  export interface FederatedAuthUserInfoRequestIssueDetails {
3649
3649
  federatedAuthUserInfoRequestIssueReason: FederatedAuthUserInfoRequestIssueReason;
@@ -3865,6 +3865,13 @@ export namespace Protocol {
3865
3865
  id: string;
3866
3866
  }
3867
3867
 
3868
+ export interface UninstallRequest {
3869
+ /**
3870
+ * Extension id.
3871
+ */
3872
+ id: string;
3873
+ }
3874
+
3868
3875
  export interface GetStorageItemsRequest {
3869
3876
  /**
3870
3877
  * ID of extension.
@@ -13654,6 +13661,18 @@ export namespace Protocol {
13654
13661
  tokensWithStatus: OriginTrialTokenWithStatus[];
13655
13662
  }
13656
13663
 
13664
+ /**
13665
+ * Additional information about the frame document's security origin.
13666
+ */
13667
+ export interface SecurityOriginDetails {
13668
+ /**
13669
+ * Indicates whether the frame document's security origin is one
13670
+ * of the local hostnames (e.g. "localhost") or IP addresses (IPv4
13671
+ * 127.0.0.0/8 or IPv6 ::1).
13672
+ */
13673
+ isLocalhost: boolean;
13674
+ }
13675
+
13657
13676
  /**
13658
13677
  * Information about the Frame on the page.
13659
13678
  */
@@ -13693,6 +13712,10 @@ export namespace Protocol {
13693
13712
  * Frame document's security origin.
13694
13713
  */
13695
13714
  securityOrigin: string;
13715
+ /**
13716
+ * Additional details about the frame document's security origin.
13717
+ */
13718
+ securityOriginDetails?: SecurityOriginDetails;
13696
13719
  /**
13697
13720
  * Frame document's mimeType as determined by the browser.
13698
13721
  */
@@ -17245,6 +17268,10 @@ export namespace Protocol {
17245
17268
  * Binding name, 'cdp' if not specified.
17246
17269
  */
17247
17270
  bindingName?: string;
17271
+ /**
17272
+ * If true, inherits the current root session's permissions (default: false).
17273
+ */
17274
+ inheritPermissions?: boolean;
17248
17275
  }
17249
17276
 
17250
17277
  export interface CreateBrowserContextRequest {