Skip to content

Commit 8d0eb7b

Browse files
committed
Roll protocol to r1431913
1 parent e968b49 commit 8d0eb7b

8 files changed

Lines changed: 148 additions & 5 deletions

changelog.md

Lines changed: 49 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,55 @@
11

22

3+
## Roll protocol to r1431913 — _2025-03-13T04:30:01.000Z_
4+
###### Diff: [`e968b49...41a2b17`](https://github.com/ChromeDevTools/devtools-protocol/compare/e968b49...41a2b17)
5+
6+
```diff
7+
@@ browser_protocol.pdl:1481 @@ domain Browser
8+
idleDetection
9+
keyboardLock
10+
localFonts
11+
+ localNetworkAccess
12+
midi
13+
midiSysex
14+
nfc
15+
@@ -1740,6 +1741,25 @@ domain Browser
16+
parameters
17+
string url
18+
19+
+ experimental type PrivacySandboxAPI extends string
20+
+ enum
21+
+ BiddingAndAuctionServices
22+
+ TrustedKeyValue
23+
+
24+
+ # Configures encryption keys used with a given privacy sandbox API to talk
25+
+ # to a trusted coordinator. Since this is intended for test automation only,
26+
+ # coordinatorOrigin must be a .test domain. No existing coordinator
27+
+ # configuration for the origin may exist.
28+
+ command addPrivacySandboxCoordinatorKeyConfig
29+
+ parameters
30+
+ PrivacySandboxAPI api
31+
+ string coordinatorOrigin
32+
+ string keyConfig
33+
+ # BrowserContext to perform the action in. When omitted, default browser
34+
+ # context is used.
35+
+ optional BrowserContextID browserContextId
36+
+
37+
+
38+
# This domain exposes CSS read/write operations. All CSS objects (stylesheets, rules, and styles)
39+
# have an associated `id` used in subsequent operations on the related object. Each object type has
40+
# a specific `id` structure, and those are not interchangeable between objects of different kinds.
41+
@@ -7466,6 +7486,7 @@ domain Network
42+
PreflightBlock
43+
PreflightWarn
44+
PermissionBlock
45+
+ PermissionWarn
46+
47+
experimental type IPAddressSpace extends string
48+
enum
49+
```
50+
351
## Roll protocol to r1430640 — _2025-03-11T04:29:58.000Z_
4-
###### Diff: [`e1bdcc8...39a3d29`](https://github.com/ChromeDevTools/devtools-protocol/compare/e1bdcc8...39a3d29)
52+
###### Diff: [`e1bdcc8...e968b49`](https://github.com/ChromeDevTools/devtools-protocol/compare/e1bdcc8...e968b49)
553

654
```diff
755
@@ browser_protocol.pdl:9527 @@ domain Page

json/browser_protocol.json

Lines changed: 36 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2930,6 +2930,7 @@
29302930
"idleDetection",
29312931
"keyboardLock",
29322932
"localFonts",
2933+
"localNetworkAccess",
29332934
"midi",
29342935
"midiSysex",
29352936
"nfc",
@@ -3068,6 +3069,15 @@
30683069
}
30693070
}
30703071
]
3072+
},
3073+
{
3074+
"id": "PrivacySandboxAPI",
3075+
"experimental": true,
3076+
"type": "string",
3077+
"enum": [
3078+
"BiddingAndAuctionServices",
3079+
"TrustedKeyValue"
3080+
]
30713081
}
30723082
],
30733083
"commands": [
@@ -3405,6 +3415,30 @@
34053415
"type": "string"
34063416
}
34073417
]
3418+
},
3419+
{
3420+
"name": "addPrivacySandboxCoordinatorKeyConfig",
3421+
"description": "Configures encryption keys used with a given privacy sandbox API to talk\nto a trusted coordinator. Since this is intended for test automation only,\ncoordinatorOrigin must be a .test domain. No existing coordinator\nconfiguration for the origin may exist.",
3422+
"parameters": [
3423+
{
3424+
"name": "api",
3425+
"$ref": "PrivacySandboxAPI"
3426+
},
3427+
{
3428+
"name": "coordinatorOrigin",
3429+
"type": "string"
3430+
},
3431+
{
3432+
"name": "keyConfig",
3433+
"type": "string"
3434+
},
3435+
{
3436+
"name": "browserContextId",
3437+
"description": "BrowserContext to perform the action in. When omitted, default browser\ncontext is used.",
3438+
"optional": true,
3439+
"$ref": "BrowserContextID"
3440+
}
3441+
]
34083442
}
34093443
],
34103444
"events": [
@@ -14490,7 +14524,8 @@
1449014524
"WarnFromInsecureToMorePrivate",
1449114525
"PreflightBlock",
1449214526
"PreflightWarn",
14493-
"PermissionBlock"
14527+
"PermissionBlock",
14528+
"PermissionWarn"
1449414529
]
1449514530
},
1449614531
{

package.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
{
22
"name": "devtools-protocol",
3-
"version": "0.0.1430640",
3+
"version": "0.0.1431913",
44
"description": "The Chrome DevTools Protocol JSON",
55
"repository": "https://github.com/ChromeDevTools/devtools-protocol",
66
"author": "The Chromium Authors",

pdl/browser_protocol.pdl

Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1481,6 +1481,7 @@ domain Browser
14811481
idleDetection
14821482
keyboardLock
14831483
localFonts
1484+
localNetworkAccess
14841485
midi
14851486
midiSysex
14861487
nfc
@@ -1740,6 +1741,25 @@ domain Browser
17401741
parameters
17411742
string url
17421743

1744+
experimental type PrivacySandboxAPI extends string
1745+
enum
1746+
BiddingAndAuctionServices
1747+
TrustedKeyValue
1748+
1749+
# Configures encryption keys used with a given privacy sandbox API to talk
1750+
# to a trusted coordinator. Since this is intended for test automation only,
1751+
# coordinatorOrigin must be a .test domain. No existing coordinator
1752+
# configuration for the origin may exist.
1753+
command addPrivacySandboxCoordinatorKeyConfig
1754+
parameters
1755+
PrivacySandboxAPI api
1756+
string coordinatorOrigin
1757+
string keyConfig
1758+
# BrowserContext to perform the action in. When omitted, default browser
1759+
# context is used.
1760+
optional BrowserContextID browserContextId
1761+
1762+
17431763
# This domain exposes CSS read/write operations. All CSS objects (stylesheets, rules, and styles)
17441764
# have an associated `id` used in subsequent operations on the related object. Each object type has
17451765
# a specific `id` structure, and those are not interchangeable between objects of different kinds.
@@ -7466,6 +7486,7 @@ domain Network
74667486
PreflightBlock
74677487
PreflightWarn
74687488
PermissionBlock
7489+
PermissionWarn
74697490

74707491
experimental type IPAddressSpace extends string
74717492
enum

types/protocol-mapping.d.ts

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1797,6 +1797,16 @@ export namespace ProtocolMapping {
17971797
paramsType: [Protocol.Browser.AddPrivacySandboxEnrollmentOverrideRequest];
17981798
returnType: void;
17991799
};
1800+
/**
1801+
* Configures encryption keys used with a given privacy sandbox API to talk
1802+
* to a trusted coordinator. Since this is intended for test automation only,
1803+
* coordinatorOrigin must be a .test domain. No existing coordinator
1804+
* configuration for the origin may exist.
1805+
*/
1806+
'Browser.addPrivacySandboxCoordinatorKeyConfig': {
1807+
paramsType: [Protocol.Browser.AddPrivacySandboxCoordinatorKeyConfigRequest];
1808+
returnType: void;
1809+
};
18001810
/**
18011811
* Inserts a new rule with the given `ruleText` in a stylesheet with given `styleSheetId`, at the
18021812
* position specified by `location`.

types/protocol-proxy-api.d.ts

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1014,6 +1014,14 @@ export namespace ProtocolProxyApi {
10141014
*/
10151015
addPrivacySandboxEnrollmentOverride(params: Protocol.Browser.AddPrivacySandboxEnrollmentOverrideRequest): Promise<void>;
10161016

1017+
/**
1018+
* Configures encryption keys used with a given privacy sandbox API to talk
1019+
* to a trusted coordinator. Since this is intended for test automation only,
1020+
* coordinatorOrigin must be a .test domain. No existing coordinator
1021+
* configuration for the origin may exist.
1022+
*/
1023+
addPrivacySandboxCoordinatorKeyConfig(params: Protocol.Browser.AddPrivacySandboxCoordinatorKeyConfigRequest): Promise<void>;
1024+
10171025
/**
10181026
* Fired when page is about to start a download.
10191027
*/

types/protocol-tests-proxy-api.d.ts

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1078,6 +1078,14 @@ export namespace ProtocolTestsProxyApi {
10781078
*/
10791079
addPrivacySandboxEnrollmentOverride(params: Protocol.Browser.AddPrivacySandboxEnrollmentOverrideRequest): Promise<{id: number, result: void, sessionId: string}>;
10801080

1081+
/**
1082+
* Configures encryption keys used with a given privacy sandbox API to talk
1083+
* to a trusted coordinator. Since this is intended for test automation only,
1084+
* coordinatorOrigin must be a .test domain. No existing coordinator
1085+
* configuration for the origin may exist.
1086+
*/
1087+
addPrivacySandboxCoordinatorKeyConfig(params: Protocol.Browser.AddPrivacySandboxCoordinatorKeyConfigRequest): Promise<{id: number, result: void, sessionId: string}>;
1088+
10811089
/**
10821090
* Fired when page is about to start a download.
10831091
*/

types/protocol.d.ts

Lines changed: 15 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4228,7 +4228,7 @@ export namespace Protocol {
42284228
windowState?: WindowState;
42294229
}
42304230

4231-
export type PermissionType = ('ar' | 'audioCapture' | 'automaticFullscreen' | 'backgroundFetch' | 'backgroundSync' | 'cameraPanTiltZoom' | 'capturedSurfaceControl' | 'clipboardReadWrite' | 'clipboardSanitizedWrite' | 'displayCapture' | 'durableStorage' | 'geolocation' | 'handTracking' | 'idleDetection' | 'keyboardLock' | 'localFonts' | 'midi' | 'midiSysex' | 'nfc' | 'notifications' | 'paymentHandler' | 'periodicBackgroundSync' | 'pointerLock' | 'protectedMediaIdentifier' | 'sensors' | 'smartCard' | 'speakerSelection' | 'storageAccess' | 'topLevelStorageAccess' | 'videoCapture' | 'vr' | 'wakeLockScreen' | 'wakeLockSystem' | 'webAppInstallation' | 'webPrinting' | 'windowManagement');
4231+
export type PermissionType = ('ar' | 'audioCapture' | 'automaticFullscreen' | 'backgroundFetch' | 'backgroundSync' | 'cameraPanTiltZoom' | 'capturedSurfaceControl' | 'clipboardReadWrite' | 'clipboardSanitizedWrite' | 'displayCapture' | 'durableStorage' | 'geolocation' | 'handTracking' | 'idleDetection' | 'keyboardLock' | 'localFonts' | 'localNetworkAccess' | 'midi' | 'midiSysex' | 'nfc' | 'notifications' | 'paymentHandler' | 'periodicBackgroundSync' | 'pointerLock' | 'protectedMediaIdentifier' | 'sensors' | 'smartCard' | 'speakerSelection' | 'storageAccess' | 'topLevelStorageAccess' | 'videoCapture' | 'vr' | 'wakeLockScreen' | 'wakeLockSystem' | 'webAppInstallation' | 'webPrinting' | 'windowManagement');
42324232

42334233
export type PermissionSetting = ('granted' | 'denied' | 'prompt');
42344234

@@ -4310,6 +4310,8 @@ export namespace Protocol {
43104310
buckets: Bucket[];
43114311
}
43124312

4313+
export type PrivacySandboxAPI = ('BiddingAndAuctionServices' | 'TrustedKeyValue');
4314+
43134315
export interface SetPermissionRequest {
43144316
/**
43154317
* Descriptor of permission to override.
@@ -4518,6 +4520,17 @@ export namespace Protocol {
45184520
url: string;
45194521
}
45204522

4523+
export interface AddPrivacySandboxCoordinatorKeyConfigRequest {
4524+
api: PrivacySandboxAPI;
4525+
coordinatorOrigin: string;
4526+
keyConfig: string;
4527+
/**
4528+
* BrowserContext to perform the action in. When omitted, default browser
4529+
* context is used.
4530+
*/
4531+
browserContextId?: BrowserContextID;
4532+
}
4533+
45214534
/**
45224535
* Fired when page is about to start a download.
45234536
*/
@@ -11656,7 +11669,7 @@ export namespace Protocol {
1165611669
dnsQueryType?: DirectSocketDnsQueryType;
1165711670
}
1165811671

11659-
export type PrivateNetworkRequestPolicy = ('Allow' | 'BlockFromInsecureToMorePrivate' | 'WarnFromInsecureToMorePrivate' | 'PreflightBlock' | 'PreflightWarn' | 'PermissionBlock');
11672+
export type PrivateNetworkRequestPolicy = ('Allow' | 'BlockFromInsecureToMorePrivate' | 'WarnFromInsecureToMorePrivate' | 'PreflightBlock' | 'PreflightWarn' | 'PermissionBlock' | 'PermissionWarn');
1166011673

1166111674
export type IPAddressSpace = ('Local' | 'Private' | 'Public' | 'Unknown');
1166211675

0 commit comments

Comments
 (0)