|
1 | 1 |
|
2 | 2 |
|
| 3 | +## Roll protocol to r1590631 — _2026-02-26T05:00:08.000Z_ |
| 4 | +###### Diff: [`708011c...5e29205`](https://github.com/ChromeDevTools/devtools-protocol/compare/708011c...5e29205) |
| 5 | + |
| 6 | +```diff |
| 7 | +@@ domains/Audits.pdl:7 @@ @@ -7,6 +7,7 @@ |
| 8 | + # Audits domain allows investigation of page violations and possible improvements. |
| 9 | + experimental domain Audits |
| 10 | + depends on Network |
| 11 | ++ depends on Runtime |
| 12 | + |
| 13 | + # Information about a cookie that is affected by an inspector issue. |
| 14 | + type AffectedCookie extends object |
| 15 | +@@ -696,6 +697,41 @@ experimental domain Audits |
| 16 | + # Used for messages about activation disabled reason |
| 17 | + optional string disableReason |
| 18 | + |
| 19 | ++ # Metadata about the ad script that was on the stack that caused the current |
| 20 | ++ # script in the `AdAncestry` to be considered ad related. |
| 21 | ++ type AdScriptIdentifier extends object |
| 22 | ++ properties |
| 23 | ++ # The script's v8 identifier. |
| 24 | ++ Runtime.ScriptId scriptId |
| 25 | ++ # v8's debugging id for the v8::Context. |
| 26 | ++ Runtime.UniqueDebuggerId debuggerId |
| 27 | ++ # The script's url (or generated name based on id if inline script). |
| 28 | ++ string name |
| 29 | ++ |
| 30 | ++ # Providence about how an ad script was determined to be such. It is an ad |
| 31 | ++ # because its url matched a filterlist rule, or because some other ad script |
| 32 | ++ # was on the stack when this script was loaded. |
| 33 | ++ type AdAncestry extends object |
| 34 | ++ properties |
| 35 | ++ # The ad-script in the stack when the offending script was loaded. This is |
| 36 | ++ # recursive down to the root script that was tagged due to the filterlist |
| 37 | ++ # rule. |
| 38 | ++ array of AdScriptIdentifier adAncestryChain |
| 39 | ++ # The filterlist rule that caused the root (last) script in |
| 40 | ++ # `adAncestry` to be ad-tagged. |
| 41 | ++ optional string rootScriptFilterlistRule |
| 42 | ++ |
| 43 | ++ # The issue warns about blocked calls to privacy sensitive APIs via the |
| 44 | ++ # Selective Permissions Intervention. |
| 45 | ++ type SelectivePermissionsInterventionIssueDetails extends object |
| 46 | ++ properties |
| 47 | ++ # Which API was intervened on. |
| 48 | ++ string apiName |
| 49 | ++ # Why the ad script using the API is considered an ad. |
| 50 | ++ AdAncestry adAncestry |
| 51 | ++ # The stack trace at the time of the intervention. |
| 52 | ++ optional Runtime.StackTrace stackTrace |
| 53 | ++ |
| 54 | + # A unique identifier for the type of issue. Each type may use one of the |
| 55 | + # optional fields in InspectorIssueDetails to convey more specific |
| 56 | + # information about the kind of issue. |
| 57 | +@@ -731,6 +767,7 @@ experimental domain Audits |
| 58 | + UserReidentificationIssue |
| 59 | + PermissionElementIssue |
| 60 | + PerformanceIssue |
| 61 | ++ SelectivePermissionsInterventionIssue |
| 62 | + |
| 63 | + # This struct holds a list of optional fields with additional information |
| 64 | + # specific to the kind of issue. When adding a new issue code, please also |
| 65 | +@@ -766,6 +803,7 @@ experimental domain Audits |
| 66 | + optional UserReidentificationIssueDetails userReidentificationIssueDetails |
| 67 | + optional PermissionElementIssueDetails permissionElementIssueDetails |
| 68 | + optional PerformanceIssueDetails performanceIssueDetails |
| 69 | ++ optional SelectivePermissionsInterventionIssueDetails selectivePermissionsInterventionIssueDetails |
| 70 | + |
| 71 | + # A unique id for a DevTools inspector issue. Allows other entities (e.g. |
| 72 | + # exceptions, CDP message, console messages, etc.) to reference an issue. |
| 73 | +diff --git a/pdl/domains/Emulation.pdl b/pdl/domains/Emulation.pdl |
| 74 | +index 5491f4cf..8488dffc 100644 |
| 75 | +--- a/pdl/domains/Emulation.pdl |
| 76 | ++++ b/pdl/domains/Emulation.pdl |
| 77 | +@@ -297,6 +297,15 @@ domain Emulation |
| 78 | + # to continuous. |
| 79 | + # Deprecated, use Emulation.setDevicePostureOverride. |
| 80 | + experimental deprecated optional DevicePosture devicePosture |
| 81 | ++ # Scrollbar type. Default: `default`. |
| 82 | ++ experimental optional enum scrollbarType |
| 83 | ++ # Emulates scrollbars that float over the content, typically appearing |
| 84 | ++ # only when scrolling. |
| 85 | ++ overlay |
| 86 | ++ # Restores the platform's default scrollbar behavior, which might be |
| 87 | ++ # classic (occupying space within the layout) or overlay, depending |
| 88 | ++ # on the platform. Note: if `mobile` is `true`, the default scrollbar type is `overlay`. |
| 89 | ++ default |
| 90 | + |
| 91 | + # Start reporting the given posture value to the Device Posture API. |
| 92 | + # This override can also be set in setDeviceMetricsOverride(). |
| 93 | +diff --git a/pdl/domains/Extensions.pdl b/pdl/domains/Extensions.pdl |
| 94 | +index d50da280..8b3da102 100644 |
| 95 | +--- a/pdl/domains/Extensions.pdl |
| 96 | ++++ b/pdl/domains/Extensions.pdl |
| 97 | +@@ -38,6 +38,28 @@ experimental domain Extensions |
| 98 | + returns |
| 99 | + # Extension id. |
| 100 | + string id |
| 101 | ++ |
| 102 | ++ # Detailed information about an extension. |
| 103 | ++ type ExtensionInfo extends object |
| 104 | ++ properties |
| 105 | ++ # Extension id. |
| 106 | ++ string id |
| 107 | ++ # Extension name. |
| 108 | ++ string name |
| 109 | ++ # Extension version. |
| 110 | ++ string version |
| 111 | ++ # The path from which the extension was loaded. |
| 112 | ++ string path |
| 113 | ++ # Extension enabled status. |
| 114 | ++ boolean enabled |
| 115 | ++ |
| 116 | ++ # Gets a list of all unpacked extensions. |
| 117 | ++ # Available if the client is connected using the --remote-debugging-pipe flag |
| 118 | ++ # and the --enable-unsafe-extension-debugging flag is set. |
| 119 | ++ command getExtensions |
| 120 | ++ returns |
| 121 | ++ array of ExtensionInfo extensions |
| 122 | ++ |
| 123 | + # Uninstalls an unpacked extension (others not supported) from the profile. |
| 124 | + # Available if the client is connected using the --remote-debugging-pipe flag |
| 125 | + # and the --enable-unsafe-extension-debugging. |
| 126 | +``` |
| 127 | + |
3 | 128 | ## Roll protocol to r1589152 — _2026-02-24T05:03:10.000Z_ |
4 | | -###### Diff: [`6b927c9...a62c3cc`](https://github.com/ChromeDevTools/devtools-protocol/compare/6b927c9...a62c3cc) |
| 129 | +###### Diff: [`6b927c9...708011c`](https://github.com/ChromeDevTools/devtools-protocol/compare/6b927c9...708011c) |
5 | 130 |
|
6 | 131 | ```diff |
7 | 132 | @@ domains/Emulation.pdl:525 @@ domain Emulation |
@@ -42226,19 +42351,4 @@ index 0dbdc01d..7a3c772c 100644 |
42226 | 42351 | experimental optional boolean generateWebDriverValue |
42227 | 42352 | returns |
42228 | 42353 | # Evaluation result. |
42229 | | -``` |
42230 | | - |
42231 | | -## Roll protocol to r1138159 — _2023-05-02T04:26:48.000Z_ |
42232 | | -###### Diff: [`fb39cd1...fd2e02b`](https://github.com/ChromeDevTools/devtools-protocol/compare/fb39cd1...fd2e02b) |
42233 | | - |
42234 | | -```diff |
42235 | | -@@ browser_protocol.pdl:707 @@ experimental domain Audits |
42236 | | - # TODO(apaseltiner): Rename this to InvalidRegisterSourceHeader |
42237 | | - InvalidHeader |
42238 | | - InvalidRegisterTriggerHeader |
42239 | | -- # TODO(apaseltiner): Remove this issue once DevTools stops referencing it. |
42240 | | -- InvalidEligibleHeader |
42241 | | - SourceAndTriggerHeaders |
42242 | | - SourceIgnored |
42243 | | - TriggerIgnored |
42244 | 42354 | ``` |
0 commit comments