devtools-protocol 0.0.1575685 → 0.0.1578551
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/json/browser_protocol.json +29 -3
- package/package.json +1 -1
- package/pdl/domains/Extensions.pdl +13 -0
- package/pdl/domains/Network.pdl +2 -2
- package/types/protocol-mapping.d.ts +9 -0
- package/types/protocol-proxy-api.d.ts +7 -0
- package/types/protocol-tests-proxy-api.d.ts +7 -0
- package/types/protocol.d.ts +18 -2
|
@@ -11589,6 +11589,22 @@
|
|
|
11589
11589
|
}
|
|
11590
11590
|
],
|
|
11591
11591
|
"commands": [
|
|
11592
|
+
{
|
|
11593
|
+
"name": "triggerAction",
|
|
11594
|
+
"description": "Runs an extension default action.\nAvailable if the client is connected using the --remote-debugging-pipe\nflag and the --enable-unsafe-extension-debugging flag is set.",
|
|
11595
|
+
"parameters": [
|
|
11596
|
+
{
|
|
11597
|
+
"name": "id",
|
|
11598
|
+
"description": "Extension id.",
|
|
11599
|
+
"type": "string"
|
|
11600
|
+
},
|
|
11601
|
+
{
|
|
11602
|
+
"name": "targetId",
|
|
11603
|
+
"description": "A tab target ID to trigger the default extension action on.",
|
|
11604
|
+
"type": "string"
|
|
11605
|
+
}
|
|
11606
|
+
]
|
|
11607
|
+
},
|
|
11592
11608
|
{
|
|
11593
11609
|
"name": "loadUnpacked",
|
|
11594
11610
|
"description": "Installs an unpacked extension from the filesystem similar to\n--load-extension CLI flags. Returns extension ID once the extension\nhas been installed. Available if the client is connected using the\n--remote-debugging-pipe flag and the --enable-unsafe-extension-debugging\nflag is set.",
|
|
@@ -11597,6 +11613,12 @@
|
|
|
11597
11613
|
"name": "path",
|
|
11598
11614
|
"description": "Absolute file path.",
|
|
11599
11615
|
"type": "string"
|
|
11616
|
+
},
|
|
11617
|
+
{
|
|
11618
|
+
"name": "enableInIncognito",
|
|
11619
|
+
"description": "Enable the extension in incognito",
|
|
11620
|
+
"optional": true,
|
|
11621
|
+
"type": "boolean"
|
|
11600
11622
|
}
|
|
11601
11623
|
],
|
|
11602
11624
|
"returns": [
|
|
@@ -16867,7 +16889,7 @@
|
|
|
16867
16889
|
]
|
|
16868
16890
|
},
|
|
16869
16891
|
{
|
|
16870
|
-
"id": "
|
|
16892
|
+
"id": "LocalNetworkAccessRequestPolicy",
|
|
16871
16893
|
"experimental": true,
|
|
16872
16894
|
"type": "string",
|
|
16873
16895
|
"enum": [
|
|
@@ -16915,8 +16937,8 @@
|
|
|
16915
16937
|
"$ref": "IPAddressSpace"
|
|
16916
16938
|
},
|
|
16917
16939
|
{
|
|
16918
|
-
"name": "
|
|
16919
|
-
"$ref": "
|
|
16940
|
+
"name": "localNetworkAccessRequestPolicy",
|
|
16941
|
+
"$ref": "LocalNetworkAccessRequestPolicy"
|
|
16920
16942
|
}
|
|
16921
16943
|
]
|
|
16922
16944
|
},
|
|
@@ -26207,6 +26229,10 @@
|
|
|
26207
26229
|
{
|
|
26208
26230
|
"name": "requestId",
|
|
26209
26231
|
"type": "string"
|
|
26232
|
+
},
|
|
26233
|
+
{
|
|
26234
|
+
"name": "handle",
|
|
26235
|
+
"type": "integer"
|
|
26210
26236
|
}
|
|
26211
26237
|
]
|
|
26212
26238
|
},
|
package/package.json
CHANGED
|
@@ -13,6 +13,17 @@ experimental domain Extensions
|
|
|
13
13
|
local
|
|
14
14
|
sync
|
|
15
15
|
managed
|
|
16
|
+
|
|
17
|
+
# Runs an extension default action.
|
|
18
|
+
# Available if the client is connected using the --remote-debugging-pipe
|
|
19
|
+
# flag and the --enable-unsafe-extension-debugging flag is set.
|
|
20
|
+
command triggerAction
|
|
21
|
+
parameters
|
|
22
|
+
# Extension id.
|
|
23
|
+
string id
|
|
24
|
+
# A tab target ID to trigger the default extension action on.
|
|
25
|
+
string targetId
|
|
26
|
+
|
|
16
27
|
# Installs an unpacked extension from the filesystem similar to
|
|
17
28
|
# --load-extension CLI flags. Returns extension ID once the extension
|
|
18
29
|
# has been installed. Available if the client is connected using the
|
|
@@ -22,6 +33,8 @@ experimental domain Extensions
|
|
|
22
33
|
parameters
|
|
23
34
|
# Absolute file path.
|
|
24
35
|
string path
|
|
36
|
+
# Enable the extension in incognito
|
|
37
|
+
optional boolean enableInIncognito
|
|
25
38
|
returns
|
|
26
39
|
# Extension id.
|
|
27
40
|
string id
|
package/pdl/domains/Network.pdl
CHANGED
|
@@ -1769,7 +1769,7 @@ domain Network
|
|
|
1769
1769
|
DirectUDPMessage message
|
|
1770
1770
|
MonotonicTime timestamp
|
|
1771
1771
|
|
|
1772
|
-
experimental type
|
|
1772
|
+
experimental type LocalNetworkAccessRequestPolicy extends string
|
|
1773
1773
|
enum
|
|
1774
1774
|
Allow
|
|
1775
1775
|
BlockFromInsecureToMorePrivate
|
|
@@ -1795,7 +1795,7 @@ domain Network
|
|
|
1795
1795
|
properties
|
|
1796
1796
|
boolean initiatorIsSecureContext
|
|
1797
1797
|
IPAddressSpace initiatorIPAddressSpace
|
|
1798
|
-
|
|
1798
|
+
LocalNetworkAccessRequestPolicy localNetworkAccessRequestPolicy
|
|
1799
1799
|
|
|
1800
1800
|
# Fired when additional information about a requestWillBeSent event is available from the
|
|
1801
1801
|
# network stack. Not every requestWillBeSent event will have an additional
|
|
@@ -3598,6 +3598,15 @@ export namespace ProtocolMapping {
|
|
|
3598
3598
|
paramsType: [];
|
|
3599
3599
|
returnType: void;
|
|
3600
3600
|
};
|
|
3601
|
+
/**
|
|
3602
|
+
* Runs an extension default action.
|
|
3603
|
+
* Available if the client is connected using the --remote-debugging-pipe
|
|
3604
|
+
* flag and the --enable-unsafe-extension-debugging flag is set.
|
|
3605
|
+
*/
|
|
3606
|
+
'Extensions.triggerAction': {
|
|
3607
|
+
paramsType: [Protocol.Extensions.TriggerActionRequest];
|
|
3608
|
+
returnType: void;
|
|
3609
|
+
};
|
|
3601
3610
|
/**
|
|
3602
3611
|
* Installs an unpacked extension from the filesystem similar to
|
|
3603
3612
|
* --load-extension CLI flags. Returns extension ID once the extension
|
|
@@ -2410,6 +2410,13 @@ export namespace ProtocolProxyApi {
|
|
|
2410
2410
|
}
|
|
2411
2411
|
|
|
2412
2412
|
export interface ExtensionsApi {
|
|
2413
|
+
/**
|
|
2414
|
+
* Runs an extension default action.
|
|
2415
|
+
* Available if the client is connected using the --remote-debugging-pipe
|
|
2416
|
+
* flag and the --enable-unsafe-extension-debugging flag is set.
|
|
2417
|
+
*/
|
|
2418
|
+
triggerAction(params: Protocol.Extensions.TriggerActionRequest): Promise<void>;
|
|
2419
|
+
|
|
2413
2420
|
/**
|
|
2414
2421
|
* Installs an unpacked extension from the filesystem similar to
|
|
2415
2422
|
* --load-extension CLI flags. Returns extension ID once the extension
|
|
@@ -2548,6 +2548,13 @@ export namespace ProtocolTestsProxyApi {
|
|
|
2548
2548
|
}
|
|
2549
2549
|
|
|
2550
2550
|
export interface ExtensionsApi {
|
|
2551
|
+
/**
|
|
2552
|
+
* Runs an extension default action.
|
|
2553
|
+
* Available if the client is connected using the --remote-debugging-pipe
|
|
2554
|
+
* flag and the --enable-unsafe-extension-debugging flag is set.
|
|
2555
|
+
*/
|
|
2556
|
+
triggerAction(params: Protocol.Extensions.TriggerActionRequest): Promise<{id: number, result: void, sessionId: string}>;
|
|
2557
|
+
|
|
2551
2558
|
/**
|
|
2552
2559
|
* Installs an unpacked extension from the filesystem similar to
|
|
2553
2560
|
* --load-extension CLI flags. Returns extension ID once the extension
|
package/types/protocol.d.ts
CHANGED
|
@@ -9798,11 +9798,26 @@ export namespace Protocol {
|
|
|
9798
9798
|
*/
|
|
9799
9799
|
export type StorageArea = ('session' | 'local' | 'sync' | 'managed');
|
|
9800
9800
|
|
|
9801
|
+
export interface TriggerActionRequest {
|
|
9802
|
+
/**
|
|
9803
|
+
* Extension id.
|
|
9804
|
+
*/
|
|
9805
|
+
id: string;
|
|
9806
|
+
/**
|
|
9807
|
+
* A tab target ID to trigger the default extension action on.
|
|
9808
|
+
*/
|
|
9809
|
+
targetId: string;
|
|
9810
|
+
}
|
|
9811
|
+
|
|
9801
9812
|
export interface LoadUnpackedRequest {
|
|
9802
9813
|
/**
|
|
9803
9814
|
* Absolute file path.
|
|
9804
9815
|
*/
|
|
9805
9816
|
path: string;
|
|
9817
|
+
/**
|
|
9818
|
+
* Enable the extension in incognito
|
|
9819
|
+
*/
|
|
9820
|
+
enableInIncognito?: boolean;
|
|
9806
9821
|
}
|
|
9807
9822
|
|
|
9808
9823
|
export interface LoadUnpackedResponse {
|
|
@@ -13389,7 +13404,7 @@ export namespace Protocol {
|
|
|
13389
13404
|
/**
|
|
13390
13405
|
* @experimental
|
|
13391
13406
|
*/
|
|
13392
|
-
export type
|
|
13407
|
+
export type LocalNetworkAccessRequestPolicy = ('Allow' | 'BlockFromInsecureToMorePrivate' | 'WarnFromInsecureToMorePrivate' | 'PermissionBlock' | 'PermissionWarn');
|
|
13393
13408
|
|
|
13394
13409
|
/**
|
|
13395
13410
|
* @experimental
|
|
@@ -13414,7 +13429,7 @@ export namespace Protocol {
|
|
|
13414
13429
|
export interface ClientSecurityState {
|
|
13415
13430
|
initiatorIsSecureContext: boolean;
|
|
13416
13431
|
initiatorIPAddressSpace: IPAddressSpace;
|
|
13417
|
-
|
|
13432
|
+
localNetworkAccessRequestPolicy: LocalNetworkAccessRequestPolicy;
|
|
13418
13433
|
}
|
|
13419
13434
|
|
|
13420
13435
|
/**
|
|
@@ -19165,6 +19180,7 @@ export namespace Protocol {
|
|
|
19165
19180
|
|
|
19166
19181
|
export interface ReportBeginTransactionResultRequest {
|
|
19167
19182
|
requestId: string;
|
|
19183
|
+
handle: integer;
|
|
19168
19184
|
}
|
|
19169
19185
|
|
|
19170
19186
|
export interface ReportPlainResultRequest {
|