diff --git a/.changes/tauri-beta-23.md b/.changes/tauri-beta-23.md new file mode 100644 index 000000000..85414109e --- /dev/null +++ b/.changes/tauri-beta-23.md @@ -0,0 +1,57 @@ +--- +"authenticator": patch +"autostart": patch +"barcode-scanner": patch +"biometric": patch +"cli": patch +"clipboard-manager": patch +"deep-link": patch +"dialog": patch +"fs": patch +"global-shortcut": patch +"http": patch +"localhost": patch +"log-plugin": patch +"nfc": patch +"notification": patch +"os": patch +"persisted-scope": patch +"positioner": patch +"process": patch +"shell": patch +"single-instance": patch +"sql": patch +"store": patch +"stronghold": patch +"updater": patch +"upload": patch +"websocket": patch +"window-state": patch +"authenticator-js": patch +"autostart-js": patch +"barcode-scanner-js": patch +"biometric-js": patch +"cli-js": patch +"clipboard-manager-js": patch +"deep-link-js": patch +"dialog-js": patch +"fs-js": patch +"global-shortcut-js": patch +"http-js": patch +"log-js": patch +"nfc-js": patch +"notification-js": patch +"os-js": patch +"positioner-js": patch +"process-js": patch +"shell-js": patch +"sql-js": patch +"store-js": patch +"stronghold-js": patch +"updater-js": patch +"upload-js": patch +"websocket-js": patch +"window-state-js": patch +--- + +Update to tauri beta.23. diff --git a/.github/workflows/lint-rust.yml b/.github/workflows/lint-rust.yml index 5babd8c20..f534336c5 100644 --- a/.github/workflows/lint-rust.yml +++ b/.github/workflows/lint-rust.yml @@ -53,6 +53,9 @@ jobs: tauri-plugin-clipboard-manager: - .github/workflows/lint-rust.yml - plugins/clipboard-manager/** + tauri-plugin-deep-link: + - .github/workflows/lint-rust.yml + - plugins/deep-link/** tauri-plugin-dialog: - .github/workflows/lint-rust.yml - plugins/dialog/** diff --git a/Cargo.lock b/Cargo.lock index 1dbc1ec7d..ad111b2fc 100644 --- a/Cargo.lock +++ b/Cargo.lock @@ -1868,6 +1868,16 @@ version = "1.0.1" source = "registry+https://github.com/rust-lang/crates.io-index" checksum = "5443807d6dff69373d433ab9ef5378ad8df50ca6298caf15de6e52e24aaf54d5" +[[package]] +name = "erased-serde" +version = "0.4.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "24e2389d65ab4fab27dc2a5de7b191e1f6617d1f1c8855c0dc569c94a4cbb18d" +dependencies = [ + "serde", + "typeid", +] + [[package]] name = "errno" version = "0.3.9" @@ -5430,6 +5440,17 @@ dependencies = [ "serde_derive", ] +[[package]] +name = "serde-untagged" +version = "0.1.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "2676ba99bd82f75cae5cbd2c8eda6fa0b8760f18978ea840e980dd5567b5c5b6" +dependencies = [ + "erased-serde", + "serde", + "typeid", +] + [[package]] name = "serde_derive" version = "1.0.203" @@ -6248,14 +6269,14 @@ checksum = "e1fc403891a21bcfb7c37834ba66a547a8f402146eba7265b5a6d88059c9ff2f" [[package]] name = "tauri" -version = "2.0.0-beta.22" +version = "2.0.0-beta.23" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "5a258ecc5ac7ddade525f512c4962fd01cd0f5265e917b4572579c32c027bb31" +checksum = "68725c4f17f62f0fb1fa2eecaf391200bf00a9414c84f30783ddca10570690c3" dependencies = [ "anyhow", "bytes", "cocoa", - "dirs-next", + "dirs 5.0.1", "dunce", "embed_plist", "futures-util", @@ -6295,18 +6316,18 @@ dependencies = [ "webkit2gtk", "webview2-com", "window-vibrancy", - "windows 0.56.0", + "windows 0.57.0", ] [[package]] name = "tauri-build" -version = "2.0.0-beta.17" +version = "2.0.0-beta.18" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "82b964bb6d03d97e24e12f896aab463b02a3c2ff76a60f728cc37b5548eb470e" +checksum = "b1822847744f663babbfc8b7532a104734e9cf99e3408bba7109018bf9177917" dependencies = [ "anyhow", "cargo_toml", - "dirs-next", + "dirs 5.0.1", "glob", "heck 0.5.0", "json-patch", @@ -6324,9 +6345,9 @@ dependencies = [ [[package]] name = "tauri-codegen" -version = "2.0.0-beta.17" +version = "2.0.0-beta.18" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "3529cfa977ed7c097f2a5e8da19ecffbe61982450a6c819e6165b6d0cfd3dd3a" +checksum = "8e36fa3c2e3bd935827fef1eed459885414fb27c82f687d8b9a15112c8a5c8f0" dependencies = [ "base64 0.22.1", "brotli 3.5.0", @@ -6351,9 +6372,9 @@ dependencies = [ [[package]] name = "tauri-macros" -version = "2.0.0-beta.17" +version = "2.0.0-beta.18" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "36f97dd80334f29314aa5f40b5fad10cb9feffd08e5a5324fd728613841e5d33" +checksum = "34aba4bed4648c3cb17d421af5783c7c29a033a94ab8597ef3791dadea69289d" dependencies = [ "heck 0.5.0", "proc-macro2", @@ -6365,9 +6386,9 @@ dependencies = [ [[package]] name = "tauri-plugin" -version = "2.0.0-beta.17" +version = "2.0.0-beta.18" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "7c8385fd0a4f661f5652b0d9e2d7256187d553bb174f88564d10ebcfa6a3af53" +checksum = "431ac9636bf81e7a04042399918ffa6b9d2413926dabc9366a24f6b487f64653" dependencies = [ "anyhow", "glob", @@ -6831,9 +6852,9 @@ dependencies = [ [[package]] name = "tauri-runtime" -version = "2.0.0-beta.18" +version = "2.0.0-beta.19" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "d7dc96172a43536236ab55b7da7b8461bf75810985e668589e2395cb476937cb" +checksum = "e5fa872242a432195b814e87f91ce10f293ae5b01fbd1eb139455496260aa7c9" dependencies = [ "dpi", "gtk", @@ -6845,14 +6866,14 @@ dependencies = [ "tauri-utils", "thiserror", "url", - "windows 0.56.0", + "windows 0.57.0", ] [[package]] name = "tauri-runtime-wry" -version = "2.0.0-beta.18" +version = "2.0.0-beta.19" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "5d4fd913b1f14a9b618c7f3ae35656d3aa759767fcb95b72006357c12b9d0b09" +checksum = "3ad6d5ef3c05d1c4b6cf97b9eac1ca1ad8ff2a7057ad0a92b3e4c476f009341e" dependencies = [ "cocoa", "gtk", @@ -6868,15 +6889,15 @@ dependencies = [ "url", "webkit2gtk", "webview2-com", - "windows 0.56.0", + "windows 0.57.0", "wry", ] [[package]] name = "tauri-utils" -version = "2.0.0-beta.17" +version = "2.0.0-beta.18" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "4f24a9c20d676a3f025331cc1c3841256ba88c9f25fb7fae709d2b3089c50d90" +checksum = "1f81a672883c9a67eb24727c99cce583625c919a5fb696c661603b426c463c72" dependencies = [ "aes-gcm", "brotli 3.5.0", @@ -6898,6 +6919,7 @@ dependencies = [ "schemars", "semver", "serde", + "serde-untagged", "serde_json", "serde_with", "serialize-to-javascript", @@ -7373,6 +7395,12 @@ dependencies = [ "utf-8", ] +[[package]] +name = "typeid" +version = "1.0.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "059d83cc991e7a42fc37bd50941885db0888e34209f8cfd9aab07ddec03bc9cf" + [[package]] name = "typenum" version = "1.17.0" @@ -7825,16 +7853,16 @@ dependencies = [ [[package]] name = "webview2-com" -version = "0.30.0" +version = "0.31.0" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "5c914dd492a52f0377bef56fd1b6e74a79090f9ee631d625d5b505a00e4538b6" +checksum = "6516cfa64c6b3212686080eeec378e662c2af54bb2a5b2a22749673f5cb2226f" dependencies = [ "webview2-com-macros", "webview2-com-sys", - "windows 0.56.0", - "windows-core 0.56.0", - "windows-implement 0.56.0", - "windows-interface 0.56.0", + "windows 0.57.0", + "windows-core 0.57.0", + "windows-implement 0.57.0", + "windows-interface 0.57.0", ] [[package]] @@ -7850,13 +7878,13 @@ dependencies = [ [[package]] name = "webview2-com-sys" -version = "0.30.0" +version = "0.31.0" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "2a46bcf03482ec28eeb764ca788f67998cde4213adfbbfa90462622058530f5e" +checksum = "c76d5b77320ff155660be1df3e6588bc85c75f1a9feef938cc4dc4dd60d1d7cf" dependencies = [ "thiserror", - "windows 0.56.0", - "windows-core 0.56.0", + "windows 0.57.0", + "windows-core 0.57.0", ] [[package]] @@ -8353,9 +8381,9 @@ dependencies = [ [[package]] name = "wry" -version = "0.40.1" +version = "0.41.0" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "1fa597526af53f310a8e6218630c5024fdde8271f229e70d7d2fc70b52b8fb1e" +checksum = "68b00c945786b02d7805d09a969fa36d0eee4e0bd4fb3ec2a79d2bf45a1b44cd" dependencies = [ "base64 0.22.1", "block", @@ -8387,8 +8415,8 @@ dependencies = [ "webkit2gtk", "webkit2gtk-sys", "webview2-com", - "windows 0.56.0", - "windows-core 0.56.0", + "windows 0.57.0", + "windows-core 0.57.0", "windows-version", "x11-dl", ] diff --git a/Cargo.toml b/Cargo.toml index 6a1d31ca0..4e481aa61 100644 --- a/Cargo.toml +++ b/Cargo.toml @@ -10,10 +10,10 @@ resolver = "2" [workspace.dependencies] serde = { version = "1", features = ["derive"] } log = "0.4" -tauri = "2.0.0-beta.22" -tauri-build = "2.0.0-beta.17" -tauri-plugin = "2.0.0-beta.17" -tauri-utils = "2.0.0-beta.17" +tauri = "2.0.0-beta.23" +tauri-build = "2.0.0-beta.18" +tauri-plugin = "2.0.0-beta.18" +tauri-utils = "2.0.0-beta.18" serde_json = "1" thiserror = "1" url = "2" diff --git a/examples/api/package.json b/examples/api/package.json index 09016b206..66f63bf71 100644 --- a/examples/api/package.json +++ b/examples/api/package.json @@ -9,7 +9,7 @@ "serve": "vite preview" }, "dependencies": { - "@tauri-apps/api": "2.0.0-beta.13", + "@tauri-apps/api": "2.0.0-beta.14", "@tauri-apps/plugin-barcode-scanner": "2.0.0-beta.5", "@tauri-apps/plugin-biometric": "2.0.0-beta.5", "@tauri-apps/plugin-cli": "2.0.0-beta.5", @@ -30,7 +30,7 @@ "@iconify-json/codicon": "^1.1.37", "@iconify-json/ph": "^1.1.8", "@sveltejs/vite-plugin-svelte": "^3.0.1", - "@tauri-apps/cli": "2.0.0-beta.20", + "@tauri-apps/cli": "2.0.0-beta.21", "@unocss/extractor-svelte": "^0.61.0", "internal-ip": "7.0.0", "svelte": "^4.2.8", diff --git a/examples/api/src-tauri/gen/schemas/desktop-schema.json b/examples/api/src-tauri/gen/schemas/desktop-schema.json index 58277295a..40b64e2c7 100644 --- a/examples/api/src-tauri/gen/schemas/desktop-schema.json +++ b/examples/api/src-tauri/gen/schemas/desktop-schema.json @@ -37,7 +37,7 @@ ], "definitions": { "Capability": { - "description": "a grouping and boundary mechanism developers can use to separate windows or plugins functionality from each other at runtime.\n\nIf a window is not matching any capability then it has no access to the IPC layer at all.\n\nThis can be done to create trust groups and reduce impact of vulnerabilities in certain plugins or windows. Windows can be added to a capability by exact name or glob patterns like *, admin-* or main-window.", + "description": "A grouping and boundary mechanism developers can use to isolate access to the IPC layer.\n\nIt controls application windows fine grained access to the Tauri core, application, or plugin commands. If a window is not matching any capability then it has no access to the IPC layer at all.\n\nThis can be done to create groups of windows, based on their required system access, which can reduce impact of frontend vulnerabilities in less privileged windows. Windows can be added to a capability by exact name (e.g. `main-window`) or glob patterns like `*` or `admin-*`. A Window can have none, one, or multiple associated capabilities.\n\n## Example\n\n```json { \"identifier\": \"main-user-files-write\", \"description\": \"This capability allows the `main` window on macOS and Windows access to `filesystem` write related commands and `dialog` commands to enable programatic access to files selected by the user.\", \"windows\": [ \"main\" ], \"permissions\": [ \"path:default\", \"dialog:open\", { \"identifier\": \"fs:allow-write-text-file\", \"allow\": [{ \"path\": \"$HOME/test.txt\" }] }, \"platforms\": [\"macOS\",\"windows\"] } ```", "type": "object", "required": [ "identifier", @@ -45,16 +45,16 @@ ], "properties": { "identifier": { - "description": "Identifier of the capability.", + "description": "Identifier of the capability.\n\n## Example\n\n`main-user-files-write`", "type": "string" }, "description": { - "description": "Description of the capability.", + "description": "Description of what the capability is intended to allow on associated windows.\n\nIt should contain a description of what the grouped permissions should allow.\n\n## Example\n\nThis capability allows the `main` window access to `filesystem` write related commands and `dialog` commands to enable programatic access to files selected by the user.", "default": "", "type": "string" }, "remote": { - "description": "Configure remote URLs that can use the capability permissions.", + "description": "Configure remote URLs that can use the capability permissions.\n\nThis setting is optional and defaults to not being set, as our default use case is that the content is served from our local application.\n\n:::caution Make sure you understand the security implications of providing remote sources with local system access. :::\n\n## Example\n\n```json { \"urls\": [\"https://*.mydomain.dev\"] } ```", "anyOf": [ { "$ref": "#/definitions/CapabilityRemote" @@ -70,28 +70,29 @@ "type": "boolean" }, "windows": { - "description": "List of windows that uses this capability. Can be a glob pattern.\n\nOn multiwebview windows, prefer [`Self::webviews`] for a fine grained access control.", + "description": "List of windows that are affected by this capability. Can be a glob pattern.\n\nOn multiwebview windows, prefer [`Self::webviews`] for a fine grained access control.\n\n## Example\n\n`[\"main\"]`", "type": "array", "items": { "type": "string" } }, "webviews": { - "description": "List of webviews that uses this capability. Can be a glob pattern.\n\nThis is only required when using on multiwebview contexts, by default all child webviews of a window that matches [`Self::windows`] are linked.", + "description": "List of webviews that are affected by this capability. Can be a glob pattern.\n\nThis is only required when using on multiwebview contexts, by default all child webviews of a window that matches [`Self::windows`] are linked.\n\n## Example\n\n`[\"sub-webview-one\", \"sub-webview-two\"]`", "type": "array", "items": { "type": "string" } }, "permissions": { - "description": "List of permissions attached to this capability. Must include the plugin name as prefix in the form of `${plugin-name}:${permission-name}`.", + "description": "List of permissions attached to this capability.\n\nMust include the plugin name as prefix in the form of `${plugin-name}:${permission-name}`. For commands directly implemented in the application itself only `${permission-name}` is required.\n\n## Example\n\n```json [ \"path:default\", \"event:default\", \"window:default\", \"app:default\", \"image:default\", \"resources:default\", \"menu:default\", \"tray:default\", \"shell:allow-open\", \"dialog:open\", { \"identifier\": \"fs:allow-write-text-file\", \"allow\": [{ \"path\": \"$HOME/test.txt\" }] } ```", "type": "array", "items": { "$ref": "#/definitions/PermissionEntry" - } + }, + "uniqueItems": true }, "platforms": { - "description": "Target platforms this capability applies. By default all platforms are affected by this capability.", + "description": "Limit which target platforms this capability applies to.\n\nBy default all platforms are targeted.\n\n## Example\n\n`[\"macOS\",\"windows\"]`", "type": [ "array", "null" @@ -110,7 +111,7 @@ ], "properties": { "urls": { - "description": "Remote domains this capability refers to using the [URLPattern standard](https://urlpattern.spec.whatwg.org/).\n\n# Examples\n\n- \"https://*.mydomain.dev\": allows subdomains of mydomain.dev - \"https://mydomain.dev/api/*\": allows any subpath of mydomain.dev/api", + "description": "Remote domains this capability refers to using the [URLPattern standard](https://urlpattern.spec.whatwg.org/).\n\n## Examples\n\n- \"https://*.mydomain.dev\": allows subdomains of mydomain.dev - \"https://mydomain.dev/api/*\": allows any subpath of mydomain.dev/api", "type": "array", "items": { "type": "string" @@ -2504,6 +2505,13 @@ "app:allow-app-show" ] }, + { + "description": "app:allow-default-window-icon -> Enables the default_window_icon command without any pre-configured scope.", + "type": "string", + "enum": [ + "app:allow-default-window-icon" + ] + }, { "description": "app:allow-name -> Enables the name command without any pre-configured scope.", "type": "string", @@ -2539,6 +2547,13 @@ "app:deny-app-show" ] }, + { + "description": "app:deny-default-window-icon -> Denies the default_window_icon command without any pre-configured scope.", + "type": "string", + "enum": [ + "app:deny-default-window-icon" + ] + }, { "description": "app:deny-name -> Denies the name command without any pre-configured scope.", "type": "string", diff --git a/plugins/authenticator/package.json b/plugins/authenticator/package.json index e4d149493..fd94191ab 100644 --- a/plugins/authenticator/package.json +++ b/plugins/authenticator/package.json @@ -24,6 +24,6 @@ "LICENSE" ], "dependencies": { - "@tauri-apps/api": "2.0.0-beta.13" + "@tauri-apps/api": "2.0.0-beta.14" } } diff --git a/plugins/authenticator/permissions/autogenerated/reference.md b/plugins/authenticator/permissions/autogenerated/reference.md index c82e61c79..71b941ea7 100644 --- a/plugins/authenticator/permissions/autogenerated/reference.md +++ b/plugins/authenticator/permissions/autogenerated/reference.md @@ -1,12 +1,140 @@ -| Permission | Description | -|------|-----| -|`allow-init-auth`|Enables the init_auth command without any pre-configured scope.| -|`deny-init-auth`|Denies the init_auth command without any pre-configured scope.| -|`allow-register`|Enables the register command without any pre-configured scope.| -|`deny-register`|Denies the register command without any pre-configured scope.| -|`allow-sign`|Enables the sign command without any pre-configured scope.| -|`deny-sign`|Denies the sign command without any pre-configured scope.| -|`allow-verify-registration`|Enables the verify_registration command without any pre-configured scope.| -|`deny-verify-registration`|Denies the verify_registration command without any pre-configured scope.| -|`allow-verify-signature`|Enables the verify_signature command without any pre-configured scope.| -|`deny-verify-signature`|Denies the verify_signature command without any pre-configured scope.| + +### Permission Table + +
Identifier | +Description | +
---|---|
+ +`authenticator:allow-init-auth` + + | ++ +Enables the init_auth command without any pre-configured scope. + + | +
+ +`authenticator:deny-init-auth` + + | ++ +Denies the init_auth command without any pre-configured scope. + + | +
+ +`authenticator:allow-register` + + | ++ +Enables the register command without any pre-configured scope. + + | +
+ +`authenticator:deny-register` + + | ++ +Denies the register command without any pre-configured scope. + + | +
+ +`authenticator:allow-sign` + + | ++ +Enables the sign command without any pre-configured scope. + + | +
+ +`authenticator:deny-sign` + + | ++ +Denies the sign command without any pre-configured scope. + + | +
+ +`authenticator:allow-verify-registration` + + | ++ +Enables the verify_registration command without any pre-configured scope. + + | +
+ +`authenticator:deny-verify-registration` + + | ++ +Denies the verify_registration command without any pre-configured scope. + + | +
+ +`authenticator:allow-verify-signature` + + | ++ +Enables the verify_signature command without any pre-configured scope. + + | +
+ +`authenticator:deny-verify-signature` + + | ++ +Denies the verify_signature command without any pre-configured scope. + + | +
Identifier | +Description | +
---|---|
+ +`autostart:allow-disable` + + | ++ +Enables the disable command without any pre-configured scope. + + | +
+ +`autostart:deny-disable` + + | ++ +Denies the disable command without any pre-configured scope. + + | +
+ +`autostart:allow-enable` + + | ++ +Enables the enable command without any pre-configured scope. + + | +
+ +`autostart:deny-enable` + + | ++ +Denies the enable command without any pre-configured scope. + + | +
+ +`autostart:allow-is-enabled` + + | ++ +Enables the is_enabled command without any pre-configured scope. + + | +
+ +`autostart:deny-is-enabled` + + | ++ +Denies the is_enabled command without any pre-configured scope. + + | +
Identifier | +Description | +
---|---|
+ +`barcode-scanner:allow-cancel` + + | ++ +Enables the cancel command without any pre-configured scope. + + | +
+ +`barcode-scanner:deny-cancel` + + | ++ +Denies the cancel command without any pre-configured scope. + + | +
+ +`barcode-scanner:allow-check-permissions` + + | ++ +Enables the check_permissions command without any pre-configured scope. + + | +
+ +`barcode-scanner:deny-check-permissions` + + | ++ +Denies the check_permissions command without any pre-configured scope. + + | +
+ +`barcode-scanner:allow-open-app-settings` + + | ++ +Enables the open_app_settings command without any pre-configured scope. + + | +
+ +`barcode-scanner:deny-open-app-settings` + + | ++ +Denies the open_app_settings command without any pre-configured scope. + + | +
+ +`barcode-scanner:allow-request-permissions` + + | ++ +Enables the request_permissions command without any pre-configured scope. + + | +
+ +`barcode-scanner:deny-request-permissions` + + | ++ +Denies the request_permissions command without any pre-configured scope. + + | +
+ +`barcode-scanner:allow-scan` + + | ++ +Enables the scan command without any pre-configured scope. + + | +
+ +`barcode-scanner:deny-scan` + + | ++ +Denies the scan command without any pre-configured scope. + + | +
+ +`barcode-scanner:allow-vibrate` + + | ++ +Enables the vibrate command without any pre-configured scope. + + | +
+ +`barcode-scanner:deny-vibrate` + + | ++ +Denies the vibrate command without any pre-configured scope. + + | +
Identifier | +Description | +
---|---|
+ +`biometric:allow-authenticate` + + | ++ +Enables the authenticate command without any pre-configured scope. + + | +
+ +`biometric:deny-authenticate` + + | ++ +Denies the authenticate command without any pre-configured scope. + + | +
+ +`biometric:allow-status` + + | ++ +Enables the status command without any pre-configured scope. + + | +
+ +`biometric:deny-status` + + | ++ +Denies the status command without any pre-configured scope. + + | +
Identifier | +Description | +
---|---|
+ +`cli:allow-cli-matches` + + | ++ +Enables the cli_matches command without any pre-configured scope. + + | +
+ +`cli:deny-cli-matches` + + | ++ +Denies the cli_matches command without any pre-configured scope. + + | +
Identifier | +Description | +
---|---|
+ +`clipboard-manager:allow-clear` + + | ++ +Enables the clear command without any pre-configured scope. + + | +
+ +`clipboard-manager:deny-clear` + + | ++ +Denies the clear command without any pre-configured scope. + + | +
+ +`clipboard-manager:allow-read-image` + + | ++ +Enables the read_image command without any pre-configured scope. + + | +
+ +`clipboard-manager:deny-read-image` + + | ++ +Denies the read_image command without any pre-configured scope. + + | +
+ +`clipboard-manager:allow-read-text` + + | ++ +Enables the read_text command without any pre-configured scope. + + | +
+ +`clipboard-manager:deny-read-text` + + | ++ +Denies the read_text command without any pre-configured scope. + + | +
+ +`clipboard-manager:allow-write-html` + + | ++ +Enables the write_html command without any pre-configured scope. + + | +
+ +`clipboard-manager:deny-write-html` + + | ++ +Denies the write_html command without any pre-configured scope. + + | +
+ +`clipboard-manager:allow-write-image` + + | ++ +Enables the write_image command without any pre-configured scope. + + | +
+ +`clipboard-manager:deny-write-image` + + | ++ +Denies the write_image command without any pre-configured scope. + + | +
+ +`clipboard-manager:allow-write-text` + + | ++ +Enables the write_text command without any pre-configured scope. + + | +
+ +`clipboard-manager:deny-write-text` + + | ++ +Denies the write_text command without any pre-configured scope. + + | +
Identifier | +Description | +
---|---|
+ +`deep-link:allow-get-current` + + | ++ +Enables the get_current command without any pre-configured scope. + + | +
+ +`deep-link:deny-get-current` + + | ++ +Denies the get_current command without any pre-configured scope. + + | +
+ +`deep-link:allow-is-registered` + + | ++ +Enables the is_registered command without any pre-configured scope. + + | +
+ +`deep-link:deny-is-registered` + + | ++ +Denies the is_registered command without any pre-configured scope. + + | +
+ +`deep-link:allow-register` + + | ++ +Enables the register command without any pre-configured scope. + + | +
+ +`deep-link:deny-register` + + | ++ +Denies the register command without any pre-configured scope. + + | +
+ +`deep-link:allow-unregister` + + | ++ +Enables the unregister command without any pre-configured scope. + + | +
+ +`deep-link:deny-unregister` + + | ++ +Denies the unregister command without any pre-configured scope. + + | +
Identifier | +Description | +
---|---|
+ +`dialog:allow-ask` + + | ++ +Enables the ask command without any pre-configured scope. + + | +
+ +`dialog:deny-ask` + + | ++ +Denies the ask command without any pre-configured scope. + + | +
+ +`dialog:allow-confirm` + + | ++ +Enables the confirm command without any pre-configured scope. + + | +
+ +`dialog:deny-confirm` + + | ++ +Denies the confirm command without any pre-configured scope. + + | +
+ +`dialog:allow-message` + + | ++ +Enables the message command without any pre-configured scope. + + | +
+ +`dialog:deny-message` + + | ++ +Denies the message command without any pre-configured scope. + + | +
+ +`dialog:allow-open` + + | ++ +Enables the open command without any pre-configured scope. + + | +
+ +`dialog:deny-open` + + | ++ +Denies the open command without any pre-configured scope. + + | +
+ +`dialog:allow-save` + + | ++ +Enables the save command without any pre-configured scope. + + | +
+ +`dialog:deny-save` + + | ++ +Denies the save command without any pre-configured scope. + + | +
Identifier | +Description | +
---|---|
+ +`fs:allow-app-read-recursive` + + | ++ +This allows full recursive read access to the complete `$APP` folder, files and subdirectories. + + | +
+ +`fs:allow-app-write-recursive` + + | ++ +This allows full recursive write access to the complete `$APP` folder, files and subdirectories. + + | +
+ +`fs:allow-app-read` + + | ++ +This allows non-recursive read access to the `$APP` folder. + + | +
+ +`fs:allow-app-write` + + | ++ +This allows non-recursive write access to the `$APP` folder. + + | +
+ +`fs:allow-app-meta-recursive` + + | ++ +This allows full recursive read access to metadata of the `$APP` folder, including file listing and statistics. + + | +
+ +`fs:allow-app-meta` + + | ++ +This allows non-recursive read access to metadata of the `$APP` folder, including file listing and statistics. + + | +
+ +`fs:scope-app-recursive` + + | ++ +This scope permits recursive access to the complete `$APP` folder, including sub directories and files. + + | +
+ +`fs:scope-app` + + | ++ +This scope permits access to all files and list content of top level directories in the `$APP`folder. + + | +
+ +`fs:scope-app-index` + + | ++ +This scope permits to list all files and folders in the `$APP`folder. + + | +
+ +`fs:allow-appcache-read-recursive` + + | ++ +This allows full recursive read access to the complete `$APPCACHE` folder, files and subdirectories. + + | +
+ +`fs:allow-appcache-write-recursive` + + | ++ +This allows full recursive write access to the complete `$APPCACHE` folder, files and subdirectories. + + | +
+ +`fs:allow-appcache-read` + + | ++ +This allows non-recursive read access to the `$APPCACHE` folder. + + | +
+ +`fs:allow-appcache-write` + + | ++ +This allows non-recursive write access to the `$APPCACHE` folder. + + | +
+ +`fs:allow-appcache-meta-recursive` + + | ++ +This allows full recursive read access to metadata of the `$APPCACHE` folder, including file listing and statistics. + + | +
+ +`fs:allow-appcache-meta` + + | ++ +This allows non-recursive read access to metadata of the `$APPCACHE` folder, including file listing and statistics. + + | +
+ +`fs:scope-appcache-recursive` + + | ++ +This scope permits recursive access to the complete `$APPCACHE` folder, including sub directories and files. + + | +
+ +`fs:scope-appcache` + + | ++ +This scope permits access to all files and list content of top level directories in the `$APPCACHE`folder. + + | +
+ +`fs:scope-appcache-index` + + | ++ +This scope permits to list all files and folders in the `$APPCACHE`folder. + + | +
+ +`fs:allow-appconfig-read-recursive` + + | ++ +This allows full recursive read access to the complete `$APPCONFIG` folder, files and subdirectories. + + | +
+ +`fs:allow-appconfig-write-recursive` + + | ++ +This allows full recursive write access to the complete `$APPCONFIG` folder, files and subdirectories. + + | +
+ +`fs:allow-appconfig-read` + + | ++ +This allows non-recursive read access to the `$APPCONFIG` folder. + + | +
+ +`fs:allow-appconfig-write` + + | ++ +This allows non-recursive write access to the `$APPCONFIG` folder. + + | +
+ +`fs:allow-appconfig-meta-recursive` + + | ++ +This allows full recursive read access to metadata of the `$APPCONFIG` folder, including file listing and statistics. + + | +
+ +`fs:allow-appconfig-meta` + + | ++ +This allows non-recursive read access to metadata of the `$APPCONFIG` folder, including file listing and statistics. + + | +
+ +`fs:scope-appconfig-recursive` + + | ++ +This scope permits recursive access to the complete `$APPCONFIG` folder, including sub directories and files. + + | +
+ +`fs:scope-appconfig` + + | ++ +This scope permits access to all files and list content of top level directories in the `$APPCONFIG`folder. + + | +
+ +`fs:scope-appconfig-index` + + | ++ +This scope permits to list all files and folders in the `$APPCONFIG`folder. + + | +
+ +`fs:allow-appdata-read-recursive` + + | ++ +This allows full recursive read access to the complete `$APPDATA` folder, files and subdirectories. + + | +
+ +`fs:allow-appdata-write-recursive` + + | ++ +This allows full recursive write access to the complete `$APPDATA` folder, files and subdirectories. + + | +
+ +`fs:allow-appdata-read` + + | ++ +This allows non-recursive read access to the `$APPDATA` folder. + + | +
+ +`fs:allow-appdata-write` + + | ++ +This allows non-recursive write access to the `$APPDATA` folder. + + | +
+ +`fs:allow-appdata-meta-recursive` + + | ++ +This allows full recursive read access to metadata of the `$APPDATA` folder, including file listing and statistics. + + | +
+ +`fs:allow-appdata-meta` + + | ++ +This allows non-recursive read access to metadata of the `$APPDATA` folder, including file listing and statistics. + + | +
+ +`fs:scope-appdata-recursive` + + | ++ +This scope permits recursive access to the complete `$APPDATA` folder, including sub directories and files. + + | +
+ +`fs:scope-appdata` + + | ++ +This scope permits access to all files and list content of top level directories in the `$APPDATA`folder. + + | +
+ +`fs:scope-appdata-index` + + | ++ +This scope permits to list all files and folders in the `$APPDATA`folder. + + | +
+ +`fs:allow-applocaldata-read-recursive` + + | ++ +This allows full recursive read access to the complete `$APPLOCALDATA` folder, files and subdirectories. + + | +
+ +`fs:allow-applocaldata-write-recursive` + + | ++ +This allows full recursive write access to the complete `$APPLOCALDATA` folder, files and subdirectories. + + | +
+ +`fs:allow-applocaldata-read` + + | ++ +This allows non-recursive read access to the `$APPLOCALDATA` folder. + + | +
+ +`fs:allow-applocaldata-write` + + | ++ +This allows non-recursive write access to the `$APPLOCALDATA` folder. + + | +
+ +`fs:allow-applocaldata-meta-recursive` + + | ++ +This allows full recursive read access to metadata of the `$APPLOCALDATA` folder, including file listing and statistics. + + | +
+ +`fs:allow-applocaldata-meta` + + | ++ +This allows non-recursive read access to metadata of the `$APPLOCALDATA` folder, including file listing and statistics. + + | +
+ +`fs:scope-applocaldata-recursive` + + | ++ +This scope permits recursive access to the complete `$APPLOCALDATA` folder, including sub directories and files. + + | +
+ +`fs:scope-applocaldata` + + | ++ +This scope permits access to all files and list content of top level directories in the `$APPLOCALDATA`folder. + + | +
+ +`fs:scope-applocaldata-index` + + | ++ +This scope permits to list all files and folders in the `$APPLOCALDATA`folder. + + | +
+ +`fs:allow-applog-read-recursive` + + | ++ +This allows full recursive read access to the complete `$APPLOG` folder, files and subdirectories. + + | +
+ +`fs:allow-applog-write-recursive` + + | ++ +This allows full recursive write access to the complete `$APPLOG` folder, files and subdirectories. + + | +
+ +`fs:allow-applog-read` + + | ++ +This allows non-recursive read access to the `$APPLOG` folder. + + | +
+ +`fs:allow-applog-write` + + | ++ +This allows non-recursive write access to the `$APPLOG` folder. + + | +
+ +`fs:allow-applog-meta-recursive` + + | ++ +This allows full recursive read access to metadata of the `$APPLOG` folder, including file listing and statistics. + + | +
+ +`fs:allow-applog-meta` + + | ++ +This allows non-recursive read access to metadata of the `$APPLOG` folder, including file listing and statistics. + + | +
+ +`fs:scope-applog-recursive` + + | ++ +This scope permits recursive access to the complete `$APPLOG` folder, including sub directories and files. + + | +
+ +`fs:scope-applog` + + | ++ +This scope permits access to all files and list content of top level directories in the `$APPLOG`folder. + + | +
+ +`fs:scope-applog-index` + + | ++ +This scope permits to list all files and folders in the `$APPLOG`folder. + + | +
+ +`fs:allow-audio-read-recursive` + + | ++ +This allows full recursive read access to the complete `$AUDIO` folder, files and subdirectories. + + | +
+ +`fs:allow-audio-write-recursive` + + | ++ +This allows full recursive write access to the complete `$AUDIO` folder, files and subdirectories. + + | +
+ +`fs:allow-audio-read` + + | ++ +This allows non-recursive read access to the `$AUDIO` folder. + + | +
+ +`fs:allow-audio-write` + + | ++ +This allows non-recursive write access to the `$AUDIO` folder. + + | +
+ +`fs:allow-audio-meta-recursive` + + | ++ +This allows full recursive read access to metadata of the `$AUDIO` folder, including file listing and statistics. + + | +
+ +`fs:allow-audio-meta` + + | ++ +This allows non-recursive read access to metadata of the `$AUDIO` folder, including file listing and statistics. + + | +
+ +`fs:scope-audio-recursive` + + | ++ +This scope permits recursive access to the complete `$AUDIO` folder, including sub directories and files. + + | +
+ +`fs:scope-audio` + + | ++ +This scope permits access to all files and list content of top level directories in the `$AUDIO`folder. + + | +
+ +`fs:scope-audio-index` + + | ++ +This scope permits to list all files and folders in the `$AUDIO`folder. + + | +
+ +`fs:allow-cache-read-recursive` + + | ++ +This allows full recursive read access to the complete `$CACHE` folder, files and subdirectories. + + | +
+ +`fs:allow-cache-write-recursive` + + | ++ +This allows full recursive write access to the complete `$CACHE` folder, files and subdirectories. + + | +
+ +`fs:allow-cache-read` + + | ++ +This allows non-recursive read access to the `$CACHE` folder. + + | +
+ +`fs:allow-cache-write` + + | ++ +This allows non-recursive write access to the `$CACHE` folder. + + | +
+ +`fs:allow-cache-meta-recursive` + + | ++ +This allows full recursive read access to metadata of the `$CACHE` folder, including file listing and statistics. + + | +
+ +`fs:allow-cache-meta` + + | ++ +This allows non-recursive read access to metadata of the `$CACHE` folder, including file listing and statistics. + + | +
+ +`fs:scope-cache-recursive` + + | ++ +This scope permits recursive access to the complete `$CACHE` folder, including sub directories and files. + + | +
+ +`fs:scope-cache` + + | ++ +This scope permits access to all files and list content of top level directories in the `$CACHE`folder. + + | +
+ +`fs:scope-cache-index` + + | ++ +This scope permits to list all files and folders in the `$CACHE`folder. + + | +
+ +`fs:allow-config-read-recursive` + + | ++ +This allows full recursive read access to the complete `$CONFIG` folder, files and subdirectories. + + | +
+ +`fs:allow-config-write-recursive` + + | ++ +This allows full recursive write access to the complete `$CONFIG` folder, files and subdirectories. + + | +
+ +`fs:allow-config-read` + + | ++ +This allows non-recursive read access to the `$CONFIG` folder. + + | +
+ +`fs:allow-config-write` + + | ++ +This allows non-recursive write access to the `$CONFIG` folder. + + | +
+ +`fs:allow-config-meta-recursive` + + | ++ +This allows full recursive read access to metadata of the `$CONFIG` folder, including file listing and statistics. + + | +
+ +`fs:allow-config-meta` + + | ++ +This allows non-recursive read access to metadata of the `$CONFIG` folder, including file listing and statistics. + + | +
+ +`fs:scope-config-recursive` + + | ++ +This scope permits recursive access to the complete `$CONFIG` folder, including sub directories and files. + + | +
+ +`fs:scope-config` + + | ++ +This scope permits access to all files and list content of top level directories in the `$CONFIG`folder. + + | +
+ +`fs:scope-config-index` + + | ++ +This scope permits to list all files and folders in the `$CONFIG`folder. + + | +
+ +`fs:allow-data-read-recursive` + + | ++ +This allows full recursive read access to the complete `$DATA` folder, files and subdirectories. + + | +
+ +`fs:allow-data-write-recursive` + + | ++ +This allows full recursive write access to the complete `$DATA` folder, files and subdirectories. + + | +
+ +`fs:allow-data-read` + + | ++ +This allows non-recursive read access to the `$DATA` folder. + + | +
+ +`fs:allow-data-write` + + | ++ +This allows non-recursive write access to the `$DATA` folder. + + | +
+ +`fs:allow-data-meta-recursive` + + | ++ +This allows full recursive read access to metadata of the `$DATA` folder, including file listing and statistics. + + | +
+ +`fs:allow-data-meta` + + | ++ +This allows non-recursive read access to metadata of the `$DATA` folder, including file listing and statistics. + + | +
+ +`fs:scope-data-recursive` + + | ++ +This scope permits recursive access to the complete `$DATA` folder, including sub directories and files. + + | +
+ +`fs:scope-data` + + | ++ +This scope permits access to all files and list content of top level directories in the `$DATA`folder. + + | +
+ +`fs:scope-data-index` + + | ++ +This scope permits to list all files and folders in the `$DATA`folder. + + | +
+ +`fs:allow-desktop-read-recursive` + + | ++ +This allows full recursive read access to the complete `$DESKTOP` folder, files and subdirectories. + + | +
+ +`fs:allow-desktop-write-recursive` + + | ++ +This allows full recursive write access to the complete `$DESKTOP` folder, files and subdirectories. + + | +
+ +`fs:allow-desktop-read` + + | ++ +This allows non-recursive read access to the `$DESKTOP` folder. + + | +
+ +`fs:allow-desktop-write` + + | ++ +This allows non-recursive write access to the `$DESKTOP` folder. + + | +
+ +`fs:allow-desktop-meta-recursive` + + | ++ +This allows full recursive read access to metadata of the `$DESKTOP` folder, including file listing and statistics. + + | +
+ +`fs:allow-desktop-meta` + + | ++ +This allows non-recursive read access to metadata of the `$DESKTOP` folder, including file listing and statistics. + + | +
+ +`fs:scope-desktop-recursive` + + | ++ +This scope permits recursive access to the complete `$DESKTOP` folder, including sub directories and files. + + | +
+ +`fs:scope-desktop` + + | ++ +This scope permits access to all files and list content of top level directories in the `$DESKTOP`folder. + + | +
+ +`fs:scope-desktop-index` + + | ++ +This scope permits to list all files and folders in the `$DESKTOP`folder. + + | +
+ +`fs:allow-document-read-recursive` + + | ++ +This allows full recursive read access to the complete `$DOCUMENT` folder, files and subdirectories. + + | +
+ +`fs:allow-document-write-recursive` + + | ++ +This allows full recursive write access to the complete `$DOCUMENT` folder, files and subdirectories. + + | +
+ +`fs:allow-document-read` + + | ++ +This allows non-recursive read access to the `$DOCUMENT` folder. + + | +
+ +`fs:allow-document-write` + + | ++ +This allows non-recursive write access to the `$DOCUMENT` folder. + + | +
+ +`fs:allow-document-meta-recursive` + + | ++ +This allows full recursive read access to metadata of the `$DOCUMENT` folder, including file listing and statistics. + + | +
+ +`fs:allow-document-meta` + + | ++ +This allows non-recursive read access to metadata of the `$DOCUMENT` folder, including file listing and statistics. + + | +
+ +`fs:scope-document-recursive` + + | ++ +This scope permits recursive access to the complete `$DOCUMENT` folder, including sub directories and files. + + | +
+ +`fs:scope-document` + + | ++ +This scope permits access to all files and list content of top level directories in the `$DOCUMENT`folder. + + | +
+ +`fs:scope-document-index` + + | ++ +This scope permits to list all files and folders in the `$DOCUMENT`folder. + + | +
+ +`fs:allow-download-read-recursive` + + | ++ +This allows full recursive read access to the complete `$DOWNLOAD` folder, files and subdirectories. + + | +
+ +`fs:allow-download-write-recursive` + + | ++ +This allows full recursive write access to the complete `$DOWNLOAD` folder, files and subdirectories. + + | +
+ +`fs:allow-download-read` + + | ++ +This allows non-recursive read access to the `$DOWNLOAD` folder. + + | +
+ +`fs:allow-download-write` + + | ++ +This allows non-recursive write access to the `$DOWNLOAD` folder. + + | +
+ +`fs:allow-download-meta-recursive` + + | ++ +This allows full recursive read access to metadata of the `$DOWNLOAD` folder, including file listing and statistics. + + | +
+ +`fs:allow-download-meta` + + | ++ +This allows non-recursive read access to metadata of the `$DOWNLOAD` folder, including file listing and statistics. + + | +
+ +`fs:scope-download-recursive` + + | ++ +This scope permits recursive access to the complete `$DOWNLOAD` folder, including sub directories and files. + + | +
+ +`fs:scope-download` + + | ++ +This scope permits access to all files and list content of top level directories in the `$DOWNLOAD`folder. + + | +
+ +`fs:scope-download-index` + + | ++ +This scope permits to list all files and folders in the `$DOWNLOAD`folder. + + | +
+ +`fs:allow-exe-read-recursive` + + | ++ +This allows full recursive read access to the complete `$EXE` folder, files and subdirectories. + + | +
+ +`fs:allow-exe-write-recursive` + + | ++ +This allows full recursive write access to the complete `$EXE` folder, files and subdirectories. + + | +
+ +`fs:allow-exe-read` + + | ++ +This allows non-recursive read access to the `$EXE` folder. + + | +
+ +`fs:allow-exe-write` + + | ++ +This allows non-recursive write access to the `$EXE` folder. + + | +
+ +`fs:allow-exe-meta-recursive` + + | ++ +This allows full recursive read access to metadata of the `$EXE` folder, including file listing and statistics. + + | +
+ +`fs:allow-exe-meta` + + | ++ +This allows non-recursive read access to metadata of the `$EXE` folder, including file listing and statistics. + + | +
+ +`fs:scope-exe-recursive` + + | ++ +This scope permits recursive access to the complete `$EXE` folder, including sub directories and files. + + | +
+ +`fs:scope-exe` + + | ++ +This scope permits access to all files and list content of top level directories in the `$EXE`folder. + + | +
+ +`fs:scope-exe-index` + + | ++ +This scope permits to list all files and folders in the `$EXE`folder. + + | +
+ +`fs:allow-font-read-recursive` + + | ++ +This allows full recursive read access to the complete `$FONT` folder, files and subdirectories. + + | +
+ +`fs:allow-font-write-recursive` + + | ++ +This allows full recursive write access to the complete `$FONT` folder, files and subdirectories. + + | +
+ +`fs:allow-font-read` + + | ++ +This allows non-recursive read access to the `$FONT` folder. + + | +
+ +`fs:allow-font-write` + + | ++ +This allows non-recursive write access to the `$FONT` folder. + + | +
+ +`fs:allow-font-meta-recursive` + + | ++ +This allows full recursive read access to metadata of the `$FONT` folder, including file listing and statistics. + + | +
+ +`fs:allow-font-meta` + + | ++ +This allows non-recursive read access to metadata of the `$FONT` folder, including file listing and statistics. + + | +
+ +`fs:scope-font-recursive` + + | ++ +This scope permits recursive access to the complete `$FONT` folder, including sub directories and files. + + | +
+ +`fs:scope-font` + + | ++ +This scope permits access to all files and list content of top level directories in the `$FONT`folder. + + | +
+ +`fs:scope-font-index` + + | ++ +This scope permits to list all files and folders in the `$FONT`folder. + + | +
+ +`fs:allow-home-read-recursive` + + | ++ +This allows full recursive read access to the complete `$HOME` folder, files and subdirectories. + + | +
+ +`fs:allow-home-write-recursive` + + | ++ +This allows full recursive write access to the complete `$HOME` folder, files and subdirectories. + + | +
+ +`fs:allow-home-read` + + | ++ +This allows non-recursive read access to the `$HOME` folder. + + | +
+ +`fs:allow-home-write` + + | ++ +This allows non-recursive write access to the `$HOME` folder. + + | +
+ +`fs:allow-home-meta-recursive` + + | ++ +This allows full recursive read access to metadata of the `$HOME` folder, including file listing and statistics. + + | +
+ +`fs:allow-home-meta` + + | ++ +This allows non-recursive read access to metadata of the `$HOME` folder, including file listing and statistics. + + | +
+ +`fs:scope-home-recursive` + + | ++ +This scope permits recursive access to the complete `$HOME` folder, including sub directories and files. + + | +
+ +`fs:scope-home` + + | ++ +This scope permits access to all files and list content of top level directories in the `$HOME`folder. + + | +
+ +`fs:scope-home-index` + + | ++ +This scope permits to list all files and folders in the `$HOME`folder. + + | +
+ +`fs:allow-localdata-read-recursive` + + | ++ +This allows full recursive read access to the complete `$LOCALDATA` folder, files and subdirectories. + + | +
+ +`fs:allow-localdata-write-recursive` + + | ++ +This allows full recursive write access to the complete `$LOCALDATA` folder, files and subdirectories. + + | +
+ +`fs:allow-localdata-read` + + | ++ +This allows non-recursive read access to the `$LOCALDATA` folder. + + | +
+ +`fs:allow-localdata-write` + + | ++ +This allows non-recursive write access to the `$LOCALDATA` folder. + + | +
+ +`fs:allow-localdata-meta-recursive` + + | ++ +This allows full recursive read access to metadata of the `$LOCALDATA` folder, including file listing and statistics. + + | +
+ +`fs:allow-localdata-meta` + + | ++ +This allows non-recursive read access to metadata of the `$LOCALDATA` folder, including file listing and statistics. + + | +
+ +`fs:scope-localdata-recursive` + + | ++ +This scope permits recursive access to the complete `$LOCALDATA` folder, including sub directories and files. + + | +
+ +`fs:scope-localdata` + + | ++ +This scope permits access to all files and list content of top level directories in the `$LOCALDATA`folder. + + | +
+ +`fs:scope-localdata-index` + + | ++ +This scope permits to list all files and folders in the `$LOCALDATA`folder. + + | +
+ +`fs:allow-log-read-recursive` + + | ++ +This allows full recursive read access to the complete `$LOG` folder, files and subdirectories. + + | +
+ +`fs:allow-log-write-recursive` + + | ++ +This allows full recursive write access to the complete `$LOG` folder, files and subdirectories. + + | +
+ +`fs:allow-log-read` + + | ++ +This allows non-recursive read access to the `$LOG` folder. + + | +
+ +`fs:allow-log-write` + + | ++ +This allows non-recursive write access to the `$LOG` folder. + + | +
+ +`fs:allow-log-meta-recursive` + + | ++ +This allows full recursive read access to metadata of the `$LOG` folder, including file listing and statistics. + + | +
+ +`fs:allow-log-meta` + + | ++ +This allows non-recursive read access to metadata of the `$LOG` folder, including file listing and statistics. + + | +
+ +`fs:scope-log-recursive` + + | ++ +This scope permits recursive access to the complete `$LOG` folder, including sub directories and files. + + | +
+ +`fs:scope-log` + + | ++ +This scope permits access to all files and list content of top level directories in the `$LOG`folder. + + | +
+ +`fs:scope-log-index` + + | ++ +This scope permits to list all files and folders in the `$LOG`folder. + + | +
+ +`fs:allow-picture-read-recursive` + + | ++ +This allows full recursive read access to the complete `$PICTURE` folder, files and subdirectories. + + | +
+ +`fs:allow-picture-write-recursive` + + | ++ +This allows full recursive write access to the complete `$PICTURE` folder, files and subdirectories. + + | +
+ +`fs:allow-picture-read` + + | ++ +This allows non-recursive read access to the `$PICTURE` folder. + + | +
+ +`fs:allow-picture-write` + + | ++ +This allows non-recursive write access to the `$PICTURE` folder. + + | +
+ +`fs:allow-picture-meta-recursive` + + | ++ +This allows full recursive read access to metadata of the `$PICTURE` folder, including file listing and statistics. + + | +
+ +`fs:allow-picture-meta` + + | ++ +This allows non-recursive read access to metadata of the `$PICTURE` folder, including file listing and statistics. + + | +
+ +`fs:scope-picture-recursive` + + | ++ +This scope permits recursive access to the complete `$PICTURE` folder, including sub directories and files. + + | +
+ +`fs:scope-picture` + + | ++ +This scope permits access to all files and list content of top level directories in the `$PICTURE`folder. + + | +
+ +`fs:scope-picture-index` + + | ++ +This scope permits to list all files and folders in the `$PICTURE`folder. + + | +
+ +`fs:allow-public-read-recursive` + + | ++ +This allows full recursive read access to the complete `$PUBLIC` folder, files and subdirectories. + + | +
+ +`fs:allow-public-write-recursive` + + | ++ +This allows full recursive write access to the complete `$PUBLIC` folder, files and subdirectories. + + | +
+ +`fs:allow-public-read` + + | ++ +This allows non-recursive read access to the `$PUBLIC` folder. + + | +
+ +`fs:allow-public-write` + + | ++ +This allows non-recursive write access to the `$PUBLIC` folder. + + | +
+ +`fs:allow-public-meta-recursive` + + | ++ +This allows full recursive read access to metadata of the `$PUBLIC` folder, including file listing and statistics. + + | +
+ +`fs:allow-public-meta` + + | ++ +This allows non-recursive read access to metadata of the `$PUBLIC` folder, including file listing and statistics. + + | +
+ +`fs:scope-public-recursive` + + | ++ +This scope permits recursive access to the complete `$PUBLIC` folder, including sub directories and files. + + | +
+ +`fs:scope-public` + + | ++ +This scope permits access to all files and list content of top level directories in the `$PUBLIC`folder. + + | +
+ +`fs:scope-public-index` + + | ++ +This scope permits to list all files and folders in the `$PUBLIC`folder. + + | +
+ +`fs:allow-resource-read-recursive` + + | ++ +This allows full recursive read access to the complete `$RESOURCE` folder, files and subdirectories. + + | +
+ +`fs:allow-resource-write-recursive` + + | ++ +This allows full recursive write access to the complete `$RESOURCE` folder, files and subdirectories. + + | +
+ +`fs:allow-resource-read` + + | ++ +This allows non-recursive read access to the `$RESOURCE` folder. + + | +
+ +`fs:allow-resource-write` + + | ++ +This allows non-recursive write access to the `$RESOURCE` folder. + + | +
+ +`fs:allow-resource-meta-recursive` + + | ++ +This allows full recursive read access to metadata of the `$RESOURCE` folder, including file listing and statistics. + + | +
+ +`fs:allow-resource-meta` + + | ++ +This allows non-recursive read access to metadata of the `$RESOURCE` folder, including file listing and statistics. + + | +
+ +`fs:scope-resource-recursive` + + | ++ +This scope permits recursive access to the complete `$RESOURCE` folder, including sub directories and files. + + | +
+ +`fs:scope-resource` + + | ++ +This scope permits access to all files and list content of top level directories in the `$RESOURCE`folder. + + | +
+ +`fs:scope-resource-index` + + | ++ +This scope permits to list all files and folders in the `$RESOURCE`folder. + + | +
+ +`fs:allow-runtime-read-recursive` + + | ++ +This allows full recursive read access to the complete `$RUNTIME` folder, files and subdirectories. + + | +
+ +`fs:allow-runtime-write-recursive` + + | ++ +This allows full recursive write access to the complete `$RUNTIME` folder, files and subdirectories. + + | +
+ +`fs:allow-runtime-read` + + | ++ +This allows non-recursive read access to the `$RUNTIME` folder. + + | +
+ +`fs:allow-runtime-write` + + | ++ +This allows non-recursive write access to the `$RUNTIME` folder. + + | +
+ +`fs:allow-runtime-meta-recursive` + + | ++ +This allows full recursive read access to metadata of the `$RUNTIME` folder, including file listing and statistics. + + | +
+ +`fs:allow-runtime-meta` + + | ++ +This allows non-recursive read access to metadata of the `$RUNTIME` folder, including file listing and statistics. + + | +
+ +`fs:scope-runtime-recursive` + + | ++ +This scope permits recursive access to the complete `$RUNTIME` folder, including sub directories and files. + + | +
+ +`fs:scope-runtime` + + | ++ +This scope permits access to all files and list content of top level directories in the `$RUNTIME`folder. + + | +
+ +`fs:scope-runtime-index` + + | ++ +This scope permits to list all files and folders in the `$RUNTIME`folder. + + | +
+ +`fs:allow-temp-read-recursive` + + | ++ +This allows full recursive read access to the complete `$TEMP` folder, files and subdirectories. + + | +
+ +`fs:allow-temp-write-recursive` + + | ++ +This allows full recursive write access to the complete `$TEMP` folder, files and subdirectories. + + | +
+ +`fs:allow-temp-read` + + | ++ +This allows non-recursive read access to the `$TEMP` folder. + + | +
+ +`fs:allow-temp-write` + + | ++ +This allows non-recursive write access to the `$TEMP` folder. + + | +
+ +`fs:allow-temp-meta-recursive` + + | ++ +This allows full recursive read access to metadata of the `$TEMP` folder, including file listing and statistics. + + | +
+ +`fs:allow-temp-meta` + + | ++ +This allows non-recursive read access to metadata of the `$TEMP` folder, including file listing and statistics. + + | +
+ +`fs:scope-temp-recursive` + + | ++ +This scope permits recursive access to the complete `$TEMP` folder, including sub directories and files. + + | +
+ +`fs:scope-temp` + + | ++ +This scope permits access to all files and list content of top level directories in the `$TEMP`folder. + + | +
+ +`fs:scope-temp-index` + + | ++ +This scope permits to list all files and folders in the `$TEMP`folder. + + | +
+ +`fs:allow-template-read-recursive` + + | ++ +This allows full recursive read access to the complete `$TEMPLATE` folder, files and subdirectories. + + | +
+ +`fs:allow-template-write-recursive` + + | ++ +This allows full recursive write access to the complete `$TEMPLATE` folder, files and subdirectories. + + | +
+ +`fs:allow-template-read` + + | ++ +This allows non-recursive read access to the `$TEMPLATE` folder. + + | +
+ +`fs:allow-template-write` + + | ++ +This allows non-recursive write access to the `$TEMPLATE` folder. + + | +
+ +`fs:allow-template-meta-recursive` + + | ++ +This allows full recursive read access to metadata of the `$TEMPLATE` folder, including file listing and statistics. + + | +
+ +`fs:allow-template-meta` + + | ++ +This allows non-recursive read access to metadata of the `$TEMPLATE` folder, including file listing and statistics. + + | +
+ +`fs:scope-template-recursive` + + | ++ +This scope permits recursive access to the complete `$TEMPLATE` folder, including sub directories and files. + + | +
+ +`fs:scope-template` + + | ++ +This scope permits access to all files and list content of top level directories in the `$TEMPLATE`folder. + + | +
+ +`fs:scope-template-index` + + | ++ +This scope permits to list all files and folders in the `$TEMPLATE`folder. + + | +
+ +`fs:allow-video-read-recursive` + + | ++ +This allows full recursive read access to the complete `$VIDEO` folder, files and subdirectories. + + | +
+ +`fs:allow-video-write-recursive` + + | ++ +This allows full recursive write access to the complete `$VIDEO` folder, files and subdirectories. + + | +
+ +`fs:allow-video-read` + + | ++ +This allows non-recursive read access to the `$VIDEO` folder. + + | +
+ +`fs:allow-video-write` + + | ++ +This allows non-recursive write access to the `$VIDEO` folder. + + | +
+ +`fs:allow-video-meta-recursive` + + | ++ +This allows full recursive read access to metadata of the `$VIDEO` folder, including file listing and statistics. + + | +
+ +`fs:allow-video-meta` + + | ++ +This allows non-recursive read access to metadata of the `$VIDEO` folder, including file listing and statistics. + + | +
+ +`fs:scope-video-recursive` + + | ++ +This scope permits recursive access to the complete `$VIDEO` folder, including sub directories and files. + + | +
+ +`fs:scope-video` + + | ++ +This scope permits access to all files and list content of top level directories in the `$VIDEO`folder. + + | +
+ +`fs:scope-video-index` + + | ++ +This scope permits to list all files and folders in the `$VIDEO`folder. + + | +
+ +`fs:allow-copy-file` + + | ++ +Enables the copy_file command without any pre-configured scope. + + | +
+ +`fs:deny-copy-file` + + | ++ +Denies the copy_file command without any pre-configured scope. + + | +
+ +`fs:allow-create` + + | ++ +Enables the create command without any pre-configured scope. + + | +
+ +`fs:deny-create` + + | ++ +Denies the create command without any pre-configured scope. + + | +
+ +`fs:allow-exists` + + | ++ +Enables the exists command without any pre-configured scope. + + | +
+ +`fs:deny-exists` + + | ++ +Denies the exists command without any pre-configured scope. + + | +
+ +`fs:allow-fstat` + + | ++ +Enables the fstat command without any pre-configured scope. + + | +
+ +`fs:deny-fstat` + + | ++ +Denies the fstat command without any pre-configured scope. + + | +
+ +`fs:allow-ftruncate` + + | ++ +Enables the ftruncate command without any pre-configured scope. + + | +
+ +`fs:deny-ftruncate` + + | ++ +Denies the ftruncate command without any pre-configured scope. + + | +
+ +`fs:allow-lstat` + + | ++ +Enables the lstat command without any pre-configured scope. + + | +
+ +`fs:deny-lstat` + + | ++ +Denies the lstat command without any pre-configured scope. + + | +
+ +`fs:allow-mkdir` + + | ++ +Enables the mkdir command without any pre-configured scope. + + | +
+ +`fs:deny-mkdir` + + | ++ +Denies the mkdir command without any pre-configured scope. + + | +
+ +`fs:allow-open` + + | ++ +Enables the open command without any pre-configured scope. + + | +
+ +`fs:deny-open` + + | ++ +Denies the open command without any pre-configured scope. + + | +
+ +`fs:allow-read` + + | ++ +Enables the read command without any pre-configured scope. + + | +
+ +`fs:deny-read` + + | ++ +Denies the read command without any pre-configured scope. + + | +
+ +`fs:allow-read-dir` + + | ++ +Enables the read_dir command without any pre-configured scope. + + | +
+ +`fs:deny-read-dir` + + | ++ +Denies the read_dir command without any pre-configured scope. + + | +
+ +`fs:allow-read-file` + + | ++ +Enables the read_file command without any pre-configured scope. + + | +
+ +`fs:deny-read-file` + + | ++ +Denies the read_file command without any pre-configured scope. + + | +
+ +`fs:allow-read-text-file` + + | ++ +Enables the read_text_file command without any pre-configured scope. + + | +
+ +`fs:deny-read-text-file` + + | ++ +Denies the read_text_file command without any pre-configured scope. + + | +
+ +`fs:allow-read-text-file-lines` + + | ++ +Enables the read_text_file_lines command without any pre-configured scope. + + | +
+ +`fs:deny-read-text-file-lines` + + | ++ +Denies the read_text_file_lines command without any pre-configured scope. + + | +
+ +`fs:allow-read-text-file-lines-next` + + | ++ +Enables the read_text_file_lines_next command without any pre-configured scope. + + | +
+ +`fs:deny-read-text-file-lines-next` + + | ++ +Denies the read_text_file_lines_next command without any pre-configured scope. + + | +
+ +`fs:allow-remove` + + | ++ +Enables the remove command without any pre-configured scope. + + | +
+ +`fs:deny-remove` + + | ++ +Denies the remove command without any pre-configured scope. + + | +
+ +`fs:allow-rename` + + | ++ +Enables the rename command without any pre-configured scope. + + | +
+ +`fs:deny-rename` + + | ++ +Denies the rename command without any pre-configured scope. + + | +
+ +`fs:allow-seek` + + | ++ +Enables the seek command without any pre-configured scope. + + | +
+ +`fs:deny-seek` + + | ++ +Denies the seek command without any pre-configured scope. + + | +
+ +`fs:allow-stat` + + | ++ +Enables the stat command without any pre-configured scope. + + | +
+ +`fs:deny-stat` + + | ++ +Denies the stat command without any pre-configured scope. + + | +
+ +`fs:allow-truncate` + + | ++ +Enables the truncate command without any pre-configured scope. + + | +
+ +`fs:deny-truncate` + + | ++ +Denies the truncate command without any pre-configured scope. + + | +
+ +`fs:allow-unwatch` + + | ++ +Enables the unwatch command without any pre-configured scope. + + | +
+ +`fs:deny-unwatch` + + | ++ +Denies the unwatch command without any pre-configured scope. + + | +
+ +`fs:allow-watch` + + | ++ +Enables the watch command without any pre-configured scope. + + | +
+ +`fs:deny-watch` + + | ++ +Denies the watch command without any pre-configured scope. + + | +
+ +`fs:allow-write` + + | ++ +Enables the write command without any pre-configured scope. + + | +
+ +`fs:deny-write` + + | ++ +Denies the write command without any pre-configured scope. + + | +
+ +`fs:allow-write-file` + + | ++ +Enables the write_file command without any pre-configured scope. + + | +
+ +`fs:deny-write-file` + + | ++ +Denies the write_file command without any pre-configured scope. + + | +
+ +`fs:allow-write-text-file` + + | ++ +Enables the write_text_file command without any pre-configured scope. + + | +
+ +`fs:deny-write-text-file` + + | ++ +Denies the write_text_file command without any pre-configured scope. + + | +
+ +`fs:create-app-specific-dirs` + + | ++ +This permissions allows to create the application specific directories. + + + | +
+ +`fs:deny-default` + + | ++ +This denies access to dangerous Tauri relevant files and folders by default. + + | +
+ +`fs:deny-webview-data-linux` + + | ++ +This denies read access to the +`$APPLOCALDATA` folder on linux as the webview data and configuration values are stored here. +Allowing access can lead to sensitive information disclosure and should be well considered. + + | +
+ +`fs:deny-webview-data-windows` + + | ++ +This denies read access to the +`$APPLOCALDATA/EBWebView` folder on windows as the webview data and configuration values are stored here. +Allowing access can lead to sensitive information disclosure and should be well considered. + + | +
+ +`fs:read-all` + + | ++ +This enables all read related commands without any pre-configured accessible paths. + + | +
+ +`fs:read-app-specific-dirs-recursive` + + | ++ +This permission allows recursive read functionality on the application +specific base directories. + + + | +
+ +`fs:read-dirs` + + | ++ +This enables directory read and file metadata related commands without any pre-configured accessible paths. + + | +
+ +`fs:read-files` + + | ++ +This enables file read related commands without any pre-configured accessible paths. + + | +
+ +`fs:read-meta` + + | ++ +This enables all index or metadata related commands without any pre-configured accessible paths. + + | +
+ +`fs:scope` + + | ++ +An empty permission you can use to modify the global scope. + + | +
+ +`fs:write-all` + + | ++ +This enables all write related commands without any pre-configured accessible paths. + + | +
+ +`fs:write-files` + + | ++ +This enables all file write related commands without any pre-configured accessible paths. + + | +
Identifier | +Description | +
---|---|
+ +`global-shortcut:allow-is-registered` + + | ++ +Enables the is_registered command without any pre-configured scope. + + | +
+ +`global-shortcut:deny-is-registered` + + | ++ +Denies the is_registered command without any pre-configured scope. + + | +
+ +`global-shortcut:allow-register` + + | ++ +Enables the register command without any pre-configured scope. + + | +
+ +`global-shortcut:deny-register` + + | ++ +Denies the register command without any pre-configured scope. + + | +
+ +`global-shortcut:allow-register-all` + + | ++ +Enables the register_all command without any pre-configured scope. + + | +
+ +`global-shortcut:deny-register-all` + + | ++ +Denies the register_all command without any pre-configured scope. + + | +
+ +`global-shortcut:allow-unregister` + + | ++ +Enables the unregister command without any pre-configured scope. + + | +
+ +`global-shortcut:deny-unregister` + + | ++ +Denies the unregister command without any pre-configured scope. + + | +
+ +`global-shortcut:allow-unregister-all` + + | ++ +Enables the unregister_all command without any pre-configured scope. + + | +
+ +`global-shortcut:deny-unregister-all` + + | ++ +Denies the unregister_all command without any pre-configured scope. + + | +
Identifier | +Description | +
---|---|
+ +`http:allow-fetch` + + | ++ +Enables the fetch command without any pre-configured scope. + + | +
+ +`http:deny-fetch` + + | ++ +Denies the fetch command without any pre-configured scope. + + | +
+ +`http:allow-fetch-cancel` + + | ++ +Enables the fetch_cancel command without any pre-configured scope. + + | +
+ +`http:deny-fetch-cancel` + + | ++ +Denies the fetch_cancel command without any pre-configured scope. + + | +
+ +`http:allow-fetch-read-body` + + | ++ +Enables the fetch_read_body command without any pre-configured scope. + + | +
+ +`http:deny-fetch-read-body` + + | ++ +Denies the fetch_read_body command without any pre-configured scope. + + | +
+ +`http:allow-fetch-send` + + | ++ +Enables the fetch_send command without any pre-configured scope. + + | +
+ +`http:deny-fetch-send` + + | ++ +Denies the fetch_send command without any pre-configured scope. + + | +
Identifier | +Description | +
---|---|
+ +`log:allow-log` + + | ++ +Enables the log command without any pre-configured scope. + + | +
+ +`log:deny-log` + + | ++ +Denies the log command without any pre-configured scope. + + | +
Identifier | +Description | +
---|---|
+ +`nfc:allow-is-available` + + | ++ +Enables the is_available command without any pre-configured scope. + + | +
+ +`nfc:deny-is-available` + + | ++ +Denies the is_available command without any pre-configured scope. + + | +
+ +`nfc:allow-scan` + + | ++ +Enables the scan command without any pre-configured scope. + + | +
+ +`nfc:deny-scan` + + | ++ +Denies the scan command without any pre-configured scope. + + | +
+ +`nfc:allow-write` + + | ++ +Enables the write command without any pre-configured scope. + + | +
+ +`nfc:deny-write` + + | ++ +Denies the write command without any pre-configured scope. + + | +
Identifier | +Description | +
---|---|
+ +`notification:allow-batch` + + | ++ +Enables the batch command without any pre-configured scope. + + | +
+ +`notification:deny-batch` + + | ++ +Denies the batch command without any pre-configured scope. + + | +
+ +`notification:allow-cancel` + + | ++ +Enables the cancel command without any pre-configured scope. + + | +
+ +`notification:deny-cancel` + + | ++ +Denies the cancel command without any pre-configured scope. + + | +
+ +`notification:allow-check-permissions` + + | ++ +Enables the check_permissions command without any pre-configured scope. + + | +
+ +`notification:deny-check-permissions` + + | ++ +Denies the check_permissions command without any pre-configured scope. + + | +
+ +`notification:allow-create-channel` + + | ++ +Enables the create_channel command without any pre-configured scope. + + | +
+ +`notification:deny-create-channel` + + | ++ +Denies the create_channel command without any pre-configured scope. + + | +
+ +`notification:allow-delete-channel` + + | ++ +Enables the delete_channel command without any pre-configured scope. + + | +
+ +`notification:deny-delete-channel` + + | ++ +Denies the delete_channel command without any pre-configured scope. + + | +
+ +`notification:allow-get-active` + + | ++ +Enables the get_active command without any pre-configured scope. + + | +
+ +`notification:deny-get-active` + + | ++ +Denies the get_active command without any pre-configured scope. + + | +
+ +`notification:allow-get-pending` + + | ++ +Enables the get_pending command without any pre-configured scope. + + | +
+ +`notification:deny-get-pending` + + | ++ +Denies the get_pending command without any pre-configured scope. + + | +
+ +`notification:allow-is-permission-granted` + + | ++ +Enables the is_permission_granted command without any pre-configured scope. + + | +
+ +`notification:deny-is-permission-granted` + + | ++ +Denies the is_permission_granted command without any pre-configured scope. + + | +
+ +`notification:allow-list-channels` + + | ++ +Enables the list_channels command without any pre-configured scope. + + | +
+ +`notification:deny-list-channels` + + | ++ +Denies the list_channels command without any pre-configured scope. + + | +
+ +`notification:allow-notify` + + | ++ +Enables the notify command without any pre-configured scope. + + | +
+ +`notification:deny-notify` + + | ++ +Denies the notify command without any pre-configured scope. + + | +
+ +`notification:allow-permission-state` + + | ++ +Enables the permission_state command without any pre-configured scope. + + | +
+ +`notification:deny-permission-state` + + | ++ +Denies the permission_state command without any pre-configured scope. + + | +
+ +`notification:allow-register-action-types` + + | ++ +Enables the register_action_types command without any pre-configured scope. + + | +
+ +`notification:deny-register-action-types` + + | ++ +Denies the register_action_types command without any pre-configured scope. + + | +
+ +`notification:allow-register-listener` + + | ++ +Enables the register_listener command without any pre-configured scope. + + | +
+ +`notification:deny-register-listener` + + | ++ +Denies the register_listener command without any pre-configured scope. + + | +
+ +`notification:allow-remove-active` + + | ++ +Enables the remove_active command without any pre-configured scope. + + | +
+ +`notification:deny-remove-active` + + | ++ +Denies the remove_active command without any pre-configured scope. + + | +
+ +`notification:allow-request-permission` + + | ++ +Enables the request_permission command without any pre-configured scope. + + | +
+ +`notification:deny-request-permission` + + | ++ +Denies the request_permission command without any pre-configured scope. + + | +
+ +`notification:allow-show` + + | ++ +Enables the show command without any pre-configured scope. + + | +
+ +`notification:deny-show` + + | ++ +Denies the show command without any pre-configured scope. + + | +
Identifier | +Description | +
---|---|
+ +`os:allow-arch` + + | ++ +Enables the arch command without any pre-configured scope. + + | +
+ +`os:deny-arch` + + | ++ +Denies the arch command without any pre-configured scope. + + | +
+ +`os:allow-exe-extension` + + | ++ +Enables the exe_extension command without any pre-configured scope. + + | +
+ +`os:deny-exe-extension` + + | ++ +Denies the exe_extension command without any pre-configured scope. + + | +
+ +`os:allow-family` + + | ++ +Enables the family command without any pre-configured scope. + + | +
+ +`os:deny-family` + + | ++ +Denies the family command without any pre-configured scope. + + | +
+ +`os:allow-hostname` + + | ++ +Enables the hostname command without any pre-configured scope. + + | +
+ +`os:deny-hostname` + + | ++ +Denies the hostname command without any pre-configured scope. + + | +
+ +`os:allow-locale` + + | ++ +Enables the locale command without any pre-configured scope. + + | +
+ +`os:deny-locale` + + | ++ +Denies the locale command without any pre-configured scope. + + | +
+ +`os:allow-os-type` + + | ++ +Enables the os_type command without any pre-configured scope. + + | +
+ +`os:deny-os-type` + + | ++ +Denies the os_type command without any pre-configured scope. + + | +
+ +`os:allow-platform` + + | ++ +Enables the platform command without any pre-configured scope. + + | +
+ +`os:deny-platform` + + | ++ +Denies the platform command without any pre-configured scope. + + | +
+ +`os:allow-version` + + | ++ +Enables the version command without any pre-configured scope. + + | +
+ +`os:deny-version` + + | ++ +Denies the version command without any pre-configured scope. + + | +
Identifier | +Description | +
---|---|
+ +`positioner:allow-move-window` + + | ++ +Enables the move_window command without any pre-configured scope. + + | +
+ +`positioner:deny-move-window` + + | ++ +Denies the move_window command without any pre-configured scope. + + | +
Identifier | +Description | +
---|---|
+ +`process:allow-exit` + + | ++ +Enables the exit command without any pre-configured scope. + + | +
+ +`process:deny-exit` + + | ++ +Denies the exit command without any pre-configured scope. + + | +
+ +`process:allow-restart` + + | ++ +Enables the restart command without any pre-configured scope. + + | +
+ +`process:deny-restart` + + | ++ +Denies the restart command without any pre-configured scope. + + | +
Identifier | +Description | +
---|---|
+ +`shell:allow-execute` + + | ++ +Enables the execute command without any pre-configured scope. + + | +
+ +`shell:deny-execute` + + | ++ +Denies the execute command without any pre-configured scope. + + | +
+ +`shell:allow-kill` + + | ++ +Enables the kill command without any pre-configured scope. + + | +
+ +`shell:deny-kill` + + | ++ +Denies the kill command without any pre-configured scope. + + | +
+ +`shell:allow-open` + + | ++ +Enables the open command without any pre-configured scope. + + | +
+ +`shell:deny-open` + + | ++ +Denies the open command without any pre-configured scope. + + | +
+ +`shell:allow-spawn` + + | ++ +Enables the spawn command without any pre-configured scope. + + | +
+ +`shell:deny-spawn` + + | ++ +Denies the spawn command without any pre-configured scope. + + | +
+ +`shell:allow-stdin-write` + + | ++ +Enables the stdin_write command without any pre-configured scope. + + | +
+ +`shell:deny-stdin-write` + + | ++ +Denies the stdin_write command without any pre-configured scope. + + | +
Identifier | +Description | +
---|---|
+ +`sql:allow-close` + + | ++ +Enables the close command without any pre-configured scope. + + | +
+ +`sql:deny-close` + + | ++ +Denies the close command without any pre-configured scope. + + | +
+ +`sql:allow-execute` + + | ++ +Enables the execute command without any pre-configured scope. + + | +
+ +`sql:deny-execute` + + | ++ +Denies the execute command without any pre-configured scope. + + | +
+ +`sql:allow-load` + + | ++ +Enables the load command without any pre-configured scope. + + | +
+ +`sql:deny-load` + + | ++ +Denies the load command without any pre-configured scope. + + | +
+ +`sql:allow-select` + + | ++ +Enables the select command without any pre-configured scope. + + | +
+ +`sql:deny-select` + + | ++ +Denies the select command without any pre-configured scope. + + | +
Identifier | +Description | +
---|---|
+ +`store:allow-clear` + + | ++ +Enables the clear command without any pre-configured scope. + + | +
+ +`store:deny-clear` + + | ++ +Denies the clear command without any pre-configured scope. + + | +
+ +`store:allow-delete` + + | ++ +Enables the delete command without any pre-configured scope. + + | +
+ +`store:deny-delete` + + | ++ +Denies the delete command without any pre-configured scope. + + | +
+ +`store:allow-entries` + + | ++ +Enables the entries command without any pre-configured scope. + + | +
+ +`store:deny-entries` + + | ++ +Denies the entries command without any pre-configured scope. + + | +
+ +`store:allow-get` + + | ++ +Enables the get command without any pre-configured scope. + + | +
+ +`store:deny-get` + + | ++ +Denies the get command without any pre-configured scope. + + | +
+ +`store:allow-has` + + | ++ +Enables the has command without any pre-configured scope. + + | +
+ +`store:deny-has` + + | ++ +Denies the has command without any pre-configured scope. + + | +
+ +`store:allow-keys` + + | ++ +Enables the keys command without any pre-configured scope. + + | +
+ +`store:deny-keys` + + | ++ +Denies the keys command without any pre-configured scope. + + | +
+ +`store:allow-length` + + | ++ +Enables the length command without any pre-configured scope. + + | +
+ +`store:deny-length` + + | ++ +Denies the length command without any pre-configured scope. + + | +
+ +`store:allow-load` + + | ++ +Enables the load command without any pre-configured scope. + + | +
+ +`store:deny-load` + + | ++ +Denies the load command without any pre-configured scope. + + | +
+ +`store:allow-reset` + + | ++ +Enables the reset command without any pre-configured scope. + + | +
+ +`store:deny-reset` + + | ++ +Denies the reset command without any pre-configured scope. + + | +
+ +`store:allow-save` + + | ++ +Enables the save command without any pre-configured scope. + + | +
+ +`store:deny-save` + + | ++ +Denies the save command without any pre-configured scope. + + | +
+ +`store:allow-set` + + | ++ +Enables the set command without any pre-configured scope. + + | +
+ +`store:deny-set` + + | ++ +Denies the set command without any pre-configured scope. + + | +
+ +`store:allow-values` + + | ++ +Enables the values command without any pre-configured scope. + + | +
+ +`store:deny-values` + + | ++ +Denies the values command without any pre-configured scope. + + | +
Identifier | +Description | +
---|---|
+ +`stronghold:allow-create-client` + + | ++ +Enables the create_client command without any pre-configured scope. + + | +
+ +`stronghold:deny-create-client` + + | ++ +Denies the create_client command without any pre-configured scope. + + | +
+ +`stronghold:allow-destroy` + + | ++ +Enables the destroy command without any pre-configured scope. + + | +
+ +`stronghold:deny-destroy` + + | ++ +Denies the destroy command without any pre-configured scope. + + | +
+ +`stronghold:allow-execute-procedure` + + | ++ +Enables the execute_procedure command without any pre-configured scope. + + | +
+ +`stronghold:deny-execute-procedure` + + | ++ +Denies the execute_procedure command without any pre-configured scope. + + | +
+ +`stronghold:allow-get-store-record` + + | ++ +Enables the get_store_record command without any pre-configured scope. + + | +
+ +`stronghold:deny-get-store-record` + + | ++ +Denies the get_store_record command without any pre-configured scope. + + | +
+ +`stronghold:allow-initialize` + + | ++ +Enables the initialize command without any pre-configured scope. + + | +
+ +`stronghold:deny-initialize` + + | ++ +Denies the initialize command without any pre-configured scope. + + | +
+ +`stronghold:allow-load-client` + + | ++ +Enables the load_client command without any pre-configured scope. + + | +
+ +`stronghold:deny-load-client` + + | ++ +Denies the load_client command without any pre-configured scope. + + | +
+ +`stronghold:allow-remove-secret` + + | ++ +Enables the remove_secret command without any pre-configured scope. + + | +
+ +`stronghold:deny-remove-secret` + + | ++ +Denies the remove_secret command without any pre-configured scope. + + | +
+ +`stronghold:allow-remove-store-record` + + | ++ +Enables the remove_store_record command without any pre-configured scope. + + | +
+ +`stronghold:deny-remove-store-record` + + | ++ +Denies the remove_store_record command without any pre-configured scope. + + | +
+ +`stronghold:allow-save` + + | ++ +Enables the save command without any pre-configured scope. + + | +
+ +`stronghold:deny-save` + + | ++ +Denies the save command without any pre-configured scope. + + | +
+ +`stronghold:allow-save-secret` + + | ++ +Enables the save_secret command without any pre-configured scope. + + | +
+ +`stronghold:deny-save-secret` + + | ++ +Denies the save_secret command without any pre-configured scope. + + | +
+ +`stronghold:allow-save-store-record` + + | ++ +Enables the save_store_record command without any pre-configured scope. + + | +
+ +`stronghold:deny-save-store-record` + + | ++ +Denies the save_store_record command without any pre-configured scope. + + | +
Identifier | +Description | +
---|---|
+ +`updater:allow-check` + + | ++ +Enables the check command without any pre-configured scope. + + | +
+ +`updater:deny-check` + + | ++ +Denies the check command without any pre-configured scope. + + | +
+ +`updater:allow-download` + + | ++ +Enables the download command without any pre-configured scope. + + | +
+ +`updater:deny-download` + + | ++ +Denies the download command without any pre-configured scope. + + | +
+ +`updater:allow-download-and-install` + + | ++ +Enables the download_and_install command without any pre-configured scope. + + | +
+ +`updater:deny-download-and-install` + + | ++ +Denies the download_and_install command without any pre-configured scope. + + | +
+ +`updater:allow-install` + + | ++ +Enables the install command without any pre-configured scope. + + | +
+ +`updater:deny-install` + + | ++ +Denies the install command without any pre-configured scope. + + | +
Identifier | +Description | +
---|---|
+ +`upload:allow-download` + + | ++ +Enables the download command without any pre-configured scope. + + | +
+ +`upload:deny-download` + + | ++ +Denies the download command without any pre-configured scope. + + | +
+ +`upload:allow-upload` + + | ++ +Enables the upload command without any pre-configured scope. + + | +
+ +`upload:deny-upload` + + | ++ +Denies the upload command without any pre-configured scope. + + | +
Identifier | +Description | +
---|---|
+ +`websocket:allow-connect` + + | ++ +Enables the connect command without any pre-configured scope. + + | +
+ +`websocket:deny-connect` + + | ++ +Denies the connect command without any pre-configured scope. + + | +
+ +`websocket:allow-send` + + | ++ +Enables the send command without any pre-configured scope. + + | +
+ +`websocket:deny-send` + + | ++ +Denies the send command without any pre-configured scope. + + | +
Identifier | +Description | +
---|---|
+ +`window-state:allow-filename` + + | ++ +Enables the filename command without any pre-configured scope. + + | +
+ +`window-state:deny-filename` + + | ++ +Denies the filename command without any pre-configured scope. + + | +
+ +`window-state:allow-restore-state` + + | ++ +Enables the restore_state command without any pre-configured scope. + + | +
+ +`window-state:deny-restore-state` + + | ++ +Denies the restore_state command without any pre-configured scope. + + | +
+ +`window-state:allow-save-window-state` + + | ++ +Enables the save_window_state command without any pre-configured scope. + + | +
+ +`window-state:deny-save-window-state` + + | ++ +Denies the save_window_state command without any pre-configured scope. + + | +