From 989dac76922a31b6b9dc2e1a43dd19705e6704d5 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Tue, 2 Jul 2024 05:24:37 +0000 Subject: [PATCH 1/4] fix(deps): update tauri monorepo --- Cargo.lock | 98 +++++--- Cargo.toml | 8 +- examples/api/package.json | 4 +- plugins/authenticator/package.json | 2 +- plugins/autostart/package.json | 2 +- plugins/barcode-scanner/package.json | 2 +- plugins/biometric/package.json | 2 +- plugins/cli/package.json | 2 +- plugins/clipboard-manager/package.json | 2 +- plugins/deep-link/examples/app/package.json | 4 +- plugins/deep-link/package.json | 2 +- plugins/dialog/package.json | 2 +- plugins/fs/package.json | 2 +- plugins/global-shortcut/package.json | 2 +- plugins/http/package.json | 2 +- plugins/log/package.json | 2 +- plugins/nfc/package.json | 2 +- plugins/notification/package.json | 2 +- plugins/os/package.json | 2 +- plugins/positioner/package.json | 2 +- plugins/process/package.json | 2 +- plugins/shell/package.json | 2 +- .../examples/vanilla/package-lock.json | 88 +++---- .../examples/vanilla/package.json | 2 +- plugins/sql/package.json | 2 +- plugins/store/package.json | 2 +- plugins/stronghold/package.json | 2 +- plugins/updater/package.json | 2 +- plugins/upload/package.json | 2 +- .../websocket/examples/tauri-app/package.json | 2 +- plugins/websocket/package.json | 2 +- plugins/window-state/package.json | 2 +- pnpm-lock.yaml | 220 +++++++++--------- 33 files changed, 252 insertions(+), 224 deletions(-) diff --git a/Cargo.lock b/Cargo.lock index 1dbc1ec7d..ad111b2fc 100644 --- a/Cargo.lock +++ b/Cargo.lock @@ -1868,6 +1868,16 @@ version = "1.0.1" source = "registry+https://github.com/rust-lang/crates.io-index" checksum = "5443807d6dff69373d433ab9ef5378ad8df50ca6298caf15de6e52e24aaf54d5" +[[package]] +name = "erased-serde" +version = "0.4.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "24e2389d65ab4fab27dc2a5de7b191e1f6617d1f1c8855c0dc569c94a4cbb18d" +dependencies = [ + "serde", + "typeid", +] + [[package]] name = "errno" version = "0.3.9" @@ -5430,6 +5440,17 @@ dependencies = [ "serde_derive", ] +[[package]] +name = "serde-untagged" +version = "0.1.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "2676ba99bd82f75cae5cbd2c8eda6fa0b8760f18978ea840e980dd5567b5c5b6" +dependencies = [ + "erased-serde", + "serde", + "typeid", +] + [[package]] name = "serde_derive" version = "1.0.203" @@ -6248,14 +6269,14 @@ checksum = "e1fc403891a21bcfb7c37834ba66a547a8f402146eba7265b5a6d88059c9ff2f" [[package]] name = "tauri" -version = "2.0.0-beta.22" +version = "2.0.0-beta.23" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "5a258ecc5ac7ddade525f512c4962fd01cd0f5265e917b4572579c32c027bb31" +checksum = "68725c4f17f62f0fb1fa2eecaf391200bf00a9414c84f30783ddca10570690c3" dependencies = [ "anyhow", "bytes", "cocoa", - "dirs-next", + "dirs 5.0.1", "dunce", "embed_plist", "futures-util", @@ -6295,18 +6316,18 @@ dependencies = [ "webkit2gtk", "webview2-com", "window-vibrancy", - "windows 0.56.0", + "windows 0.57.0", ] [[package]] name = "tauri-build" -version = "2.0.0-beta.17" +version = "2.0.0-beta.18" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "82b964bb6d03d97e24e12f896aab463b02a3c2ff76a60f728cc37b5548eb470e" +checksum = "b1822847744f663babbfc8b7532a104734e9cf99e3408bba7109018bf9177917" dependencies = [ "anyhow", "cargo_toml", - "dirs-next", + "dirs 5.0.1", "glob", "heck 0.5.0", "json-patch", @@ -6324,9 +6345,9 @@ dependencies = [ [[package]] name = "tauri-codegen" -version = "2.0.0-beta.17" +version = "2.0.0-beta.18" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "3529cfa977ed7c097f2a5e8da19ecffbe61982450a6c819e6165b6d0cfd3dd3a" +checksum = "8e36fa3c2e3bd935827fef1eed459885414fb27c82f687d8b9a15112c8a5c8f0" dependencies = [ "base64 0.22.1", "brotli 3.5.0", @@ -6351,9 +6372,9 @@ dependencies = [ [[package]] name = "tauri-macros" -version = "2.0.0-beta.17" +version = "2.0.0-beta.18" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "36f97dd80334f29314aa5f40b5fad10cb9feffd08e5a5324fd728613841e5d33" +checksum = "34aba4bed4648c3cb17d421af5783c7c29a033a94ab8597ef3791dadea69289d" dependencies = [ "heck 0.5.0", "proc-macro2", @@ -6365,9 +6386,9 @@ dependencies = [ [[package]] name = "tauri-plugin" -version = "2.0.0-beta.17" +version = "2.0.0-beta.18" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "7c8385fd0a4f661f5652b0d9e2d7256187d553bb174f88564d10ebcfa6a3af53" +checksum = "431ac9636bf81e7a04042399918ffa6b9d2413926dabc9366a24f6b487f64653" dependencies = [ "anyhow", "glob", @@ -6831,9 +6852,9 @@ dependencies = [ [[package]] name = "tauri-runtime" -version = "2.0.0-beta.18" +version = "2.0.0-beta.19" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "d7dc96172a43536236ab55b7da7b8461bf75810985e668589e2395cb476937cb" +checksum = "e5fa872242a432195b814e87f91ce10f293ae5b01fbd1eb139455496260aa7c9" dependencies = [ "dpi", "gtk", @@ -6845,14 +6866,14 @@ dependencies = [ "tauri-utils", "thiserror", "url", - "windows 0.56.0", + "windows 0.57.0", ] [[package]] name = "tauri-runtime-wry" -version = "2.0.0-beta.18" +version = "2.0.0-beta.19" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "5d4fd913b1f14a9b618c7f3ae35656d3aa759767fcb95b72006357c12b9d0b09" +checksum = "3ad6d5ef3c05d1c4b6cf97b9eac1ca1ad8ff2a7057ad0a92b3e4c476f009341e" dependencies = [ "cocoa", "gtk", @@ -6868,15 +6889,15 @@ dependencies = [ "url", "webkit2gtk", "webview2-com", - "windows 0.56.0", + "windows 0.57.0", "wry", ] [[package]] name = "tauri-utils" -version = "2.0.0-beta.17" +version = "2.0.0-beta.18" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "4f24a9c20d676a3f025331cc1c3841256ba88c9f25fb7fae709d2b3089c50d90" +checksum = "1f81a672883c9a67eb24727c99cce583625c919a5fb696c661603b426c463c72" dependencies = [ "aes-gcm", "brotli 3.5.0", @@ -6898,6 +6919,7 @@ dependencies = [ "schemars", "semver", "serde", + "serde-untagged", "serde_json", "serde_with", "serialize-to-javascript", @@ -7373,6 +7395,12 @@ dependencies = [ "utf-8", ] +[[package]] +name = "typeid" +version = "1.0.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "059d83cc991e7a42fc37bd50941885db0888e34209f8cfd9aab07ddec03bc9cf" + [[package]] name = "typenum" version = "1.17.0" @@ -7825,16 +7853,16 @@ dependencies = [ [[package]] name = "webview2-com" -version = "0.30.0" +version = "0.31.0" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "5c914dd492a52f0377bef56fd1b6e74a79090f9ee631d625d5b505a00e4538b6" +checksum = "6516cfa64c6b3212686080eeec378e662c2af54bb2a5b2a22749673f5cb2226f" dependencies = [ "webview2-com-macros", "webview2-com-sys", - "windows 0.56.0", - "windows-core 0.56.0", - "windows-implement 0.56.0", - "windows-interface 0.56.0", + "windows 0.57.0", + "windows-core 0.57.0", + "windows-implement 0.57.0", + "windows-interface 0.57.0", ] [[package]] @@ -7850,13 +7878,13 @@ dependencies = [ [[package]] name = "webview2-com-sys" -version = "0.30.0" +version = "0.31.0" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "2a46bcf03482ec28eeb764ca788f67998cde4213adfbbfa90462622058530f5e" +checksum = "c76d5b77320ff155660be1df3e6588bc85c75f1a9feef938cc4dc4dd60d1d7cf" dependencies = [ "thiserror", - "windows 0.56.0", - "windows-core 0.56.0", + "windows 0.57.0", + "windows-core 0.57.0", ] [[package]] @@ -8353,9 +8381,9 @@ dependencies = [ [[package]] name = "wry" -version = "0.40.1" +version = "0.41.0" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "1fa597526af53f310a8e6218630c5024fdde8271f229e70d7d2fc70b52b8fb1e" +checksum = "68b00c945786b02d7805d09a969fa36d0eee4e0bd4fb3ec2a79d2bf45a1b44cd" dependencies = [ "base64 0.22.1", "block", @@ -8387,8 +8415,8 @@ dependencies = [ "webkit2gtk", "webkit2gtk-sys", "webview2-com", - "windows 0.56.0", - "windows-core 0.56.0", + "windows 0.57.0", + "windows-core 0.57.0", "windows-version", "x11-dl", ] diff --git a/Cargo.toml b/Cargo.toml index 6a1d31ca0..4e481aa61 100644 --- a/Cargo.toml +++ b/Cargo.toml @@ -10,10 +10,10 @@ resolver = "2" [workspace.dependencies] serde = { version = "1", features = ["derive"] } log = "0.4" -tauri = "2.0.0-beta.22" -tauri-build = "2.0.0-beta.17" -tauri-plugin = "2.0.0-beta.17" -tauri-utils = "2.0.0-beta.17" +tauri = "2.0.0-beta.23" +tauri-build = "2.0.0-beta.18" +tauri-plugin = "2.0.0-beta.18" +tauri-utils = "2.0.0-beta.18" serde_json = "1" thiserror = "1" url = "2" diff --git a/examples/api/package.json b/examples/api/package.json index 09016b206..66f63bf71 100644 --- a/examples/api/package.json +++ b/examples/api/package.json @@ -9,7 +9,7 @@ "serve": "vite preview" }, "dependencies": { - "@tauri-apps/api": "2.0.0-beta.13", + "@tauri-apps/api": "2.0.0-beta.14", "@tauri-apps/plugin-barcode-scanner": "2.0.0-beta.5", "@tauri-apps/plugin-biometric": "2.0.0-beta.5", "@tauri-apps/plugin-cli": "2.0.0-beta.5", @@ -30,7 +30,7 @@ "@iconify-json/codicon": "^1.1.37", "@iconify-json/ph": "^1.1.8", "@sveltejs/vite-plugin-svelte": "^3.0.1", - "@tauri-apps/cli": "2.0.0-beta.20", + "@tauri-apps/cli": "2.0.0-beta.21", "@unocss/extractor-svelte": "^0.61.0", "internal-ip": "7.0.0", "svelte": "^4.2.8", diff --git a/plugins/authenticator/package.json b/plugins/authenticator/package.json index e4d149493..fd94191ab 100644 --- a/plugins/authenticator/package.json +++ b/plugins/authenticator/package.json @@ -24,6 +24,6 @@ "LICENSE" ], "dependencies": { - "@tauri-apps/api": "2.0.0-beta.13" + "@tauri-apps/api": "2.0.0-beta.14" } } diff --git a/plugins/autostart/package.json b/plugins/autostart/package.json index 015307d69..c2890c8da 100644 --- a/plugins/autostart/package.json +++ b/plugins/autostart/package.json @@ -23,6 +23,6 @@ "LICENSE" ], "dependencies": { - "@tauri-apps/api": "2.0.0-beta.13" + "@tauri-apps/api": "2.0.0-beta.14" } } diff --git a/plugins/barcode-scanner/package.json b/plugins/barcode-scanner/package.json index 79cd04133..28c9a4e11 100644 --- a/plugins/barcode-scanner/package.json +++ b/plugins/barcode-scanner/package.json @@ -24,6 +24,6 @@ "LICENSE" ], "dependencies": { - "@tauri-apps/api": "2.0.0-beta.13" + "@tauri-apps/api": "2.0.0-beta.14" } } diff --git a/plugins/biometric/package.json b/plugins/biometric/package.json index 7d9c2d036..ec6f497ee 100644 --- a/plugins/biometric/package.json +++ b/plugins/biometric/package.json @@ -24,6 +24,6 @@ "LICENSE" ], "dependencies": { - "@tauri-apps/api": "2.0.0-beta.13" + "@tauri-apps/api": "2.0.0-beta.14" } } diff --git a/plugins/cli/package.json b/plugins/cli/package.json index 706a3b4ae..075062056 100644 --- a/plugins/cli/package.json +++ b/plugins/cli/package.json @@ -23,6 +23,6 @@ "LICENSE" ], "dependencies": { - "@tauri-apps/api": "2.0.0-beta.13" + "@tauri-apps/api": "2.0.0-beta.14" } } diff --git a/plugins/clipboard-manager/package.json b/plugins/clipboard-manager/package.json index aa797ba95..dc777fc58 100644 --- a/plugins/clipboard-manager/package.json +++ b/plugins/clipboard-manager/package.json @@ -23,6 +23,6 @@ "LICENSE" ], "dependencies": { - "@tauri-apps/api": "2.0.0-beta.13" + "@tauri-apps/api": "2.0.0-beta.14" } } diff --git a/plugins/deep-link/examples/app/package.json b/plugins/deep-link/examples/app/package.json index e4de3295c..bce309637 100644 --- a/plugins/deep-link/examples/app/package.json +++ b/plugins/deep-link/examples/app/package.json @@ -10,11 +10,11 @@ "tauri": "tauri" }, "dependencies": { - "@tauri-apps/api": "2.0.0-beta.13", + "@tauri-apps/api": "2.0.0-beta.14", "@tauri-apps/plugin-deep-link": "2.0.0-beta.7" }, "devDependencies": { - "@tauri-apps/cli": "2.0.0-beta.20", + "@tauri-apps/cli": "2.0.0-beta.21", "internal-ip": "7.0.0", "typescript": "^5.2.2", "vite": "^5.0.13" diff --git a/plugins/deep-link/package.json b/plugins/deep-link/package.json index 7595d3a23..38af64f3b 100644 --- a/plugins/deep-link/package.json +++ b/plugins/deep-link/package.json @@ -24,6 +24,6 @@ "LICENSE" ], "dependencies": { - "@tauri-apps/api": "2.0.0-beta.13" + "@tauri-apps/api": "2.0.0-beta.14" } } diff --git a/plugins/dialog/package.json b/plugins/dialog/package.json index 863f34134..c9167e085 100644 --- a/plugins/dialog/package.json +++ b/plugins/dialog/package.json @@ -23,6 +23,6 @@ "LICENSE" ], "dependencies": { - "@tauri-apps/api": "2.0.0-beta.13" + "@tauri-apps/api": "2.0.0-beta.14" } } diff --git a/plugins/fs/package.json b/plugins/fs/package.json index 91831d34c..a36885c18 100644 --- a/plugins/fs/package.json +++ b/plugins/fs/package.json @@ -24,6 +24,6 @@ "LICENSE" ], "dependencies": { - "@tauri-apps/api": "2.0.0-beta.13" + "@tauri-apps/api": "2.0.0-beta.14" } } diff --git a/plugins/global-shortcut/package.json b/plugins/global-shortcut/package.json index afb22aefe..d7bf46b63 100644 --- a/plugins/global-shortcut/package.json +++ b/plugins/global-shortcut/package.json @@ -23,6 +23,6 @@ "LICENSE" ], "dependencies": { - "@tauri-apps/api": "2.0.0-beta.13" + "@tauri-apps/api": "2.0.0-beta.14" } } diff --git a/plugins/http/package.json b/plugins/http/package.json index 7ea0cf26f..ff47d6fc6 100644 --- a/plugins/http/package.json +++ b/plugins/http/package.json @@ -23,6 +23,6 @@ "LICENSE" ], "dependencies": { - "@tauri-apps/api": "2.0.0-beta.13" + "@tauri-apps/api": "2.0.0-beta.14" } } diff --git a/plugins/log/package.json b/plugins/log/package.json index dda9a5253..5f66c5758 100644 --- a/plugins/log/package.json +++ b/plugins/log/package.json @@ -24,6 +24,6 @@ "LICENSE" ], "dependencies": { - "@tauri-apps/api": "2.0.0-beta.13" + "@tauri-apps/api": "2.0.0-beta.14" } } diff --git a/plugins/nfc/package.json b/plugins/nfc/package.json index ee2a8303b..2ef7ef572 100644 --- a/plugins/nfc/package.json +++ b/plugins/nfc/package.json @@ -24,6 +24,6 @@ "LICENSE" ], "dependencies": { - "@tauri-apps/api": "2.0.0-beta.13" + "@tauri-apps/api": "2.0.0-beta.14" } } diff --git a/plugins/notification/package.json b/plugins/notification/package.json index a40ba5f99..d303c3188 100644 --- a/plugins/notification/package.json +++ b/plugins/notification/package.json @@ -23,6 +23,6 @@ "LICENSE" ], "dependencies": { - "@tauri-apps/api": "2.0.0-beta.13" + "@tauri-apps/api": "2.0.0-beta.14" } } diff --git a/plugins/os/package.json b/plugins/os/package.json index 5713d1357..e1fbe8151 100644 --- a/plugins/os/package.json +++ b/plugins/os/package.json @@ -23,6 +23,6 @@ "LICENSE" ], "dependencies": { - "@tauri-apps/api": "2.0.0-beta.13" + "@tauri-apps/api": "2.0.0-beta.14" } } diff --git a/plugins/positioner/package.json b/plugins/positioner/package.json index df396376d..ccd8213fa 100644 --- a/plugins/positioner/package.json +++ b/plugins/positioner/package.json @@ -24,6 +24,6 @@ "LICENSE" ], "dependencies": { - "@tauri-apps/api": "2.0.0-beta.13" + "@tauri-apps/api": "2.0.0-beta.14" } } diff --git a/plugins/process/package.json b/plugins/process/package.json index 23264194c..4fae4ec1a 100644 --- a/plugins/process/package.json +++ b/plugins/process/package.json @@ -23,6 +23,6 @@ "LICENSE" ], "dependencies": { - "@tauri-apps/api": "2.0.0-beta.13" + "@tauri-apps/api": "2.0.0-beta.14" } } diff --git a/plugins/shell/package.json b/plugins/shell/package.json index 8845790b0..09826eeaf 100644 --- a/plugins/shell/package.json +++ b/plugins/shell/package.json @@ -23,6 +23,6 @@ "LICENSE" ], "dependencies": { - "@tauri-apps/api": "2.0.0-beta.13" + "@tauri-apps/api": "2.0.0-beta.14" } } diff --git a/plugins/single-instance/examples/vanilla/package-lock.json b/plugins/single-instance/examples/vanilla/package-lock.json index a871292d5..d62ae268b 100644 --- a/plugins/single-instance/examples/vanilla/package-lock.json +++ b/plugins/single-instance/examples/vanilla/package-lock.json @@ -9,13 +9,13 @@ "version": "1.0.0", "license": "MIT", "devDependencies": { - "@tauri-apps/cli": "2.0.0-beta.20" + "@tauri-apps/cli": "2.0.0-beta.21" } }, "node_modules/@tauri-apps/cli": { - "version": "2.0.0-beta.20", - "resolved": "https://registry.npmjs.org/@tauri-apps/cli/-/cli-2.0.0-beta.20.tgz", - "integrity": "sha512-707q9uIc2oNrYHd2dtMvxTrpZXVpart5EIktnRymNOpphkLlB6WUBjHD+ga45WqTU6cNGKbYvkKqTNfshNul9Q==", + "version": "2.0.0-beta.21", + "resolved": "https://registry.npmjs.org/@tauri-apps/cli/-/cli-2.0.0-beta.21.tgz", + "integrity": "sha512-lqV4pD0iTs8ASd19slH0eRoVAjbxtD0cCsZFVD7kG4sYkeZ0IkvtxbvnHAOUbALfvnHZr1dVXFDVxQUqJK2OXw==", "dev": true, "license": "Apache-2.0 OR MIT", "bin": { @@ -29,22 +29,22 @@ "url": "https://opencollective.com/tauri" }, "optionalDependencies": { - "@tauri-apps/cli-darwin-arm64": "2.0.0-beta.20", - "@tauri-apps/cli-darwin-x64": "2.0.0-beta.20", - "@tauri-apps/cli-linux-arm-gnueabihf": "2.0.0-beta.20", - "@tauri-apps/cli-linux-arm64-gnu": "2.0.0-beta.20", - "@tauri-apps/cli-linux-arm64-musl": "2.0.0-beta.20", - "@tauri-apps/cli-linux-x64-gnu": "2.0.0-beta.20", - "@tauri-apps/cli-linux-x64-musl": "2.0.0-beta.20", - "@tauri-apps/cli-win32-arm64-msvc": "2.0.0-beta.20", - "@tauri-apps/cli-win32-ia32-msvc": "2.0.0-beta.20", - "@tauri-apps/cli-win32-x64-msvc": "2.0.0-beta.20" + "@tauri-apps/cli-darwin-arm64": "2.0.0-beta.21", + "@tauri-apps/cli-darwin-x64": "2.0.0-beta.21", + "@tauri-apps/cli-linux-arm-gnueabihf": "2.0.0-beta.21", + "@tauri-apps/cli-linux-arm64-gnu": "2.0.0-beta.21", + "@tauri-apps/cli-linux-arm64-musl": "2.0.0-beta.21", + "@tauri-apps/cli-linux-x64-gnu": "2.0.0-beta.21", + "@tauri-apps/cli-linux-x64-musl": "2.0.0-beta.21", + "@tauri-apps/cli-win32-arm64-msvc": "2.0.0-beta.21", + "@tauri-apps/cli-win32-ia32-msvc": "2.0.0-beta.21", + "@tauri-apps/cli-win32-x64-msvc": "2.0.0-beta.21" } }, "node_modules/@tauri-apps/cli-darwin-arm64": { - "version": "2.0.0-beta.20", - "resolved": "https://registry.npmjs.org/@tauri-apps/cli-darwin-arm64/-/cli-darwin-arm64-2.0.0-beta.20.tgz", - "integrity": "sha512-oCJOCib7GuYkwkBXx+ekamR8NZZU+2i3MLP+DHpDxK5gS2uhCE+CBkamJkNt6y1x6xdVnwyqZOm5RvN4SRtyIA==", + "version": "2.0.0-beta.21", + "resolved": "https://registry.npmjs.org/@tauri-apps/cli-darwin-arm64/-/cli-darwin-arm64-2.0.0-beta.21.tgz", + "integrity": "sha512-okI7PRSC6RO4JfrOTqu4oWf0IfBPbkGHisyDOTay6K5uhz4zzry5fFJVa8S/DTrKtdjau4vcik/EDCxiGRun9Q==", "cpu": [ "arm64" ], @@ -59,9 +59,9 @@ } }, "node_modules/@tauri-apps/cli-darwin-x64": { - "version": "2.0.0-beta.20", - "resolved": "https://registry.npmjs.org/@tauri-apps/cli-darwin-x64/-/cli-darwin-x64-2.0.0-beta.20.tgz", - "integrity": "sha512-lC5QSnRExedYN4Ds6ZlSvC2PxP8qfIYBJQ5ktf+PJI5gQALdNeVtd6YnTG1ODCEklfLq9WKkGwp7JdALTU5wDA==", + "version": "2.0.0-beta.21", + "resolved": "https://registry.npmjs.org/@tauri-apps/cli-darwin-x64/-/cli-darwin-x64-2.0.0-beta.21.tgz", + "integrity": "sha512-mXoJDXB6CBoqUnFb4TCsSVC6FJRZsN1DHRZAyn6iNLIhOrObcM4L2xz8rzt3WirANwJ/ayrNv95fEt8Fq1jmgA==", "cpu": [ "x64" ], @@ -76,9 +76,9 @@ } }, "node_modules/@tauri-apps/cli-linux-arm-gnueabihf": { - "version": "2.0.0-beta.20", - "resolved": "https://registry.npmjs.org/@tauri-apps/cli-linux-arm-gnueabihf/-/cli-linux-arm-gnueabihf-2.0.0-beta.20.tgz", - "integrity": "sha512-nZCeBMHHye5DLOJV5k2w658hnCS+LYaOZ8y/G9l3ei+g0L/HBjlSy6r4simsAT5TG8+l3oCZzLBngfTMdDS/YA==", + "version": "2.0.0-beta.21", + "resolved": "https://registry.npmjs.org/@tauri-apps/cli-linux-arm-gnueabihf/-/cli-linux-arm-gnueabihf-2.0.0-beta.21.tgz", + "integrity": "sha512-LYPOx3LE2eZ0g8Zh/HYaNg6B1pZzH4BPMcma7wGZ0XPu+4fKLLGgav13xP2lknLnxiRP9jJCaTIBKXgcQEtLyg==", "cpu": [ "arm" ], @@ -93,9 +93,9 @@ } }, "node_modules/@tauri-apps/cli-linux-arm64-gnu": { - "version": "2.0.0-beta.20", - "resolved": "https://registry.npmjs.org/@tauri-apps/cli-linux-arm64-gnu/-/cli-linux-arm64-gnu-2.0.0-beta.20.tgz", - "integrity": "sha512-B79ISVLPVBgwnCchVqwTKU+vxnFYqxKomcR4rmsvxfs0NVtT5QuNzE1k4NUQnw3966yjwhYR3mnHsSJQSB4Eyw==", + "version": "2.0.0-beta.21", + "resolved": "https://registry.npmjs.org/@tauri-apps/cli-linux-arm64-gnu/-/cli-linux-arm64-gnu-2.0.0-beta.21.tgz", + "integrity": "sha512-VP2L729tgY889OZj5U436EntjwkI8MyVB+GrvBv8k2mj1nWB651KiVIpcUmsUgjXZ2r01bifN9J0l+3EFEXUAQ==", "cpu": [ "arm64" ], @@ -110,9 +110,9 @@ } }, "node_modules/@tauri-apps/cli-linux-arm64-musl": { - "version": "2.0.0-beta.20", - "resolved": "https://registry.npmjs.org/@tauri-apps/cli-linux-arm64-musl/-/cli-linux-arm64-musl-2.0.0-beta.20.tgz", - "integrity": "sha512-ojIkv/1uZHhcrgfIN8xgn4BBeo/Xg+bnV0wer6lD78zyxkUMWeEZ+u3mae1ejCJNhhaZOxNaUQ67MvDOiGyr5Q==", + "version": "2.0.0-beta.21", + "resolved": "https://registry.npmjs.org/@tauri-apps/cli-linux-arm64-musl/-/cli-linux-arm64-musl-2.0.0-beta.21.tgz", + "integrity": "sha512-s1rV01RIdowlPHfw7hTBnCEm2C3mZbynF+xpyRSv9vSczu4dpfwILMRwxB4nzMzdJ7RPHsf/R+5Ww86e8QM4Gw==", "cpu": [ "arm64" ], @@ -127,9 +127,9 @@ } }, "node_modules/@tauri-apps/cli-linux-x64-gnu": { - "version": "2.0.0-beta.20", - "resolved": "https://registry.npmjs.org/@tauri-apps/cli-linux-x64-gnu/-/cli-linux-x64-gnu-2.0.0-beta.20.tgz", - "integrity": "sha512-xBy1FNbHKlc7T6pOmFQQPECxJaI5A9QWX7Kb9N64cNVusoOGlvc3xHYkXMS4PTr7xXOT0yiE1Ww2OwDRJ3lYsg==", + "version": "2.0.0-beta.21", + "resolved": "https://registry.npmjs.org/@tauri-apps/cli-linux-x64-gnu/-/cli-linux-x64-gnu-2.0.0-beta.21.tgz", + "integrity": "sha512-yGh7ktUycHT3mAnKxC7cx/vjcbjJzoxQCxnjWpmIayVwq+iXLD1mK7nRXRdJpL/rnBFTqqD29CKuypCEFiq3/A==", "cpu": [ "x64" ], @@ -144,9 +144,9 @@ } }, "node_modules/@tauri-apps/cli-linux-x64-musl": { - "version": "2.0.0-beta.20", - "resolved": "https://registry.npmjs.org/@tauri-apps/cli-linux-x64-musl/-/cli-linux-x64-musl-2.0.0-beta.20.tgz", - "integrity": "sha512-+O6zq5jmtUxA1FUAAwF2ywPysy4NRo2Y6G+ESZDkY9XosRwdt5OUjqAsYktZA3AxDMZVei8r9buwTqUwi9ny/g==", + "version": "2.0.0-beta.21", + "resolved": "https://registry.npmjs.org/@tauri-apps/cli-linux-x64-musl/-/cli-linux-x64-musl-2.0.0-beta.21.tgz", + "integrity": "sha512-+79b8O3tsjbGR47pJtcSKGmtqj4rsSxB5AfMb4UCkmoNkbaOzB0YS/ZieUGAb+SHXZ/MMs7mcl96N9SqYOL7hw==", "cpu": [ "x64" ], @@ -161,9 +161,9 @@ } }, "node_modules/@tauri-apps/cli-win32-arm64-msvc": { - "version": "2.0.0-beta.20", - "resolved": "https://registry.npmjs.org/@tauri-apps/cli-win32-arm64-msvc/-/cli-win32-arm64-msvc-2.0.0-beta.20.tgz", - "integrity": "sha512-RswgMbWyOQcv53CHvIuiuhAh4kKDqaGyZfWD4VlxqX/XhkoF5gsNgr0MxzrY7pmoL+89oVI+fiGVJz4nOQE5vA==", + "version": "2.0.0-beta.21", + "resolved": "https://registry.npmjs.org/@tauri-apps/cli-win32-arm64-msvc/-/cli-win32-arm64-msvc-2.0.0-beta.21.tgz", + "integrity": "sha512-rKlpcjx6t1ECZciMmHT5xkXKjC+O+TVxRKmA21tEq/Ezt7XdnufGko1hduwQmVJWkHxKg6ab7uf98ImMpDC5UA==", "cpu": [ "arm64" ], @@ -178,9 +178,9 @@ } }, "node_modules/@tauri-apps/cli-win32-ia32-msvc": { - "version": "2.0.0-beta.20", - "resolved": "https://registry.npmjs.org/@tauri-apps/cli-win32-ia32-msvc/-/cli-win32-ia32-msvc-2.0.0-beta.20.tgz", - "integrity": "sha512-5lgWmDVXhX3SBGbiv5SduM1yajiRnUEJClWhSdRrEEJeXdsxpCsBEhxYnUnDCEzPKxLLn5fdBv3VrVctJ03csQ==", + "version": "2.0.0-beta.21", + "resolved": "https://registry.npmjs.org/@tauri-apps/cli-win32-ia32-msvc/-/cli-win32-ia32-msvc-2.0.0-beta.21.tgz", + "integrity": "sha512-ExdhvRfgAoZi4/7re6OkmfqsHvTJQgWouTNphHWRilUEqBM7TEQV1UxYtwWfgyOKelyx4cxUYDFAJxootTb2Nw==", "cpu": [ "ia32" ], @@ -195,9 +195,9 @@ } }, "node_modules/@tauri-apps/cli-win32-x64-msvc": { - "version": "2.0.0-beta.20", - "resolved": "https://registry.npmjs.org/@tauri-apps/cli-win32-x64-msvc/-/cli-win32-x64-msvc-2.0.0-beta.20.tgz", - "integrity": "sha512-SuSiiVQTQPSzWlsxQp/NMzWbzDS9TdVDOw7CCfgiG5wnT2GsxzrcIAVN6i7ILsVFLxrjr0bIgPldSJcdcH84Yw==", + "version": "2.0.0-beta.21", + "resolved": "https://registry.npmjs.org/@tauri-apps/cli-win32-x64-msvc/-/cli-win32-x64-msvc-2.0.0-beta.21.tgz", + "integrity": "sha512-JtNTwNXIOfE04Cs3ieTvkdcMyJM9Sujw5MM9zNmusJKE03s/OLqbNK/2ISlcb/puwYGGPhhyYtL5hCmYXIrHHQ==", "cpu": [ "x64" ], diff --git a/plugins/single-instance/examples/vanilla/package.json b/plugins/single-instance/examples/vanilla/package.json index 95adb3fb1..996eefb85 100644 --- a/plugins/single-instance/examples/vanilla/package.json +++ b/plugins/single-instance/examples/vanilla/package.json @@ -9,6 +9,6 @@ "author": "", "license": "MIT", "devDependencies": { - "@tauri-apps/cli": "2.0.0-beta.20" + "@tauri-apps/cli": "2.0.0-beta.21" } } diff --git a/plugins/sql/package.json b/plugins/sql/package.json index c006ca229..71f9c6719 100644 --- a/plugins/sql/package.json +++ b/plugins/sql/package.json @@ -24,6 +24,6 @@ "LICENSE" ], "dependencies": { - "@tauri-apps/api": "2.0.0-beta.13" + "@tauri-apps/api": "2.0.0-beta.14" } } diff --git a/plugins/store/package.json b/plugins/store/package.json index f1c72729f..e3277c5d6 100644 --- a/plugins/store/package.json +++ b/plugins/store/package.json @@ -24,6 +24,6 @@ "LICENSE" ], "dependencies": { - "@tauri-apps/api": "2.0.0-beta.13" + "@tauri-apps/api": "2.0.0-beta.14" } } diff --git a/plugins/stronghold/package.json b/plugins/stronghold/package.json index 4109a7fd2..a63b08a6b 100644 --- a/plugins/stronghold/package.json +++ b/plugins/stronghold/package.json @@ -24,6 +24,6 @@ "LICENSE" ], "dependencies": { - "@tauri-apps/api": "2.0.0-beta.13" + "@tauri-apps/api": "2.0.0-beta.14" } } diff --git a/plugins/updater/package.json b/plugins/updater/package.json index a0a5aed91..09cc527d4 100644 --- a/plugins/updater/package.json +++ b/plugins/updater/package.json @@ -23,6 +23,6 @@ "LICENSE" ], "dependencies": { - "@tauri-apps/api": "2.0.0-beta.13" + "@tauri-apps/api": "2.0.0-beta.14" } } diff --git a/plugins/upload/package.json b/plugins/upload/package.json index 777cbe3bf..1419e6a69 100644 --- a/plugins/upload/package.json +++ b/plugins/upload/package.json @@ -24,6 +24,6 @@ "LICENSE" ], "dependencies": { - "@tauri-apps/api": "2.0.0-beta.13" + "@tauri-apps/api": "2.0.0-beta.14" } } diff --git a/plugins/websocket/examples/tauri-app/package.json b/plugins/websocket/examples/tauri-app/package.json index 7f527d0d6..173446eff 100644 --- a/plugins/websocket/examples/tauri-app/package.json +++ b/plugins/websocket/examples/tauri-app/package.json @@ -9,7 +9,7 @@ "preview": "vite preview" }, "devDependencies": { - "@tauri-apps/cli": "2.0.0-beta.20", + "@tauri-apps/cli": "2.0.0-beta.21", "typescript": "^5.3.3", "vite": "^5.0.13" }, diff --git a/plugins/websocket/package.json b/plugins/websocket/package.json index bcb49e655..97f52074c 100644 --- a/plugins/websocket/package.json +++ b/plugins/websocket/package.json @@ -23,6 +23,6 @@ "LICENSE" ], "dependencies": { - "@tauri-apps/api": "2.0.0-beta.13" + "@tauri-apps/api": "2.0.0-beta.14" } } diff --git a/plugins/window-state/package.json b/plugins/window-state/package.json index f546d8691..590608e27 100644 --- a/plugins/window-state/package.json +++ b/plugins/window-state/package.json @@ -24,6 +24,6 @@ "LICENSE" ], "dependencies": { - "@tauri-apps/api": "2.0.0-beta.13" + "@tauri-apps/api": "2.0.0-beta.14" } } diff --git a/pnpm-lock.yaml b/pnpm-lock.yaml index 197777e04..b70c40f1c 100644 --- a/pnpm-lock.yaml +++ b/pnpm-lock.yaml @@ -58,8 +58,8 @@ importers: examples/api: dependencies: '@tauri-apps/api': - specifier: 2.0.0-beta.13 - version: 2.0.0-beta.13 + specifier: 2.0.0-beta.14 + version: 2.0.0-beta.14 '@tauri-apps/plugin-barcode-scanner': specifier: 2.0.0-beta.5 version: link:../../plugins/barcode-scanner @@ -116,8 +116,8 @@ importers: specifier: ^3.0.1 version: 3.1.1(svelte@4.2.18)(vite@5.3.2(terser@5.31.1)) '@tauri-apps/cli': - specifier: 2.0.0-beta.20 - version: 2.0.0-beta.20 + specifier: 2.0.0-beta.21 + version: 2.0.0-beta.21 '@unocss/extractor-svelte': specifier: ^0.61.0 version: 0.61.0 @@ -137,57 +137,57 @@ importers: plugins/authenticator: dependencies: '@tauri-apps/api': - specifier: 2.0.0-beta.13 - version: 2.0.0-beta.13 + specifier: 2.0.0-beta.14 + version: 2.0.0-beta.14 plugins/autostart: dependencies: '@tauri-apps/api': - specifier: 2.0.0-beta.13 - version: 2.0.0-beta.13 + specifier: 2.0.0-beta.14 + version: 2.0.0-beta.14 plugins/barcode-scanner: dependencies: '@tauri-apps/api': - specifier: 2.0.0-beta.13 - version: 2.0.0-beta.13 + specifier: 2.0.0-beta.14 + version: 2.0.0-beta.14 plugins/biometric: dependencies: '@tauri-apps/api': - specifier: 2.0.0-beta.13 - version: 2.0.0-beta.13 + specifier: 2.0.0-beta.14 + version: 2.0.0-beta.14 plugins/cli: dependencies: '@tauri-apps/api': - specifier: 2.0.0-beta.13 - version: 2.0.0-beta.13 + specifier: 2.0.0-beta.14 + version: 2.0.0-beta.14 plugins/clipboard-manager: dependencies: '@tauri-apps/api': - specifier: 2.0.0-beta.13 - version: 2.0.0-beta.13 + specifier: 2.0.0-beta.14 + version: 2.0.0-beta.14 plugins/deep-link: dependencies: '@tauri-apps/api': - specifier: 2.0.0-beta.13 - version: 2.0.0-beta.13 + specifier: 2.0.0-beta.14 + version: 2.0.0-beta.14 plugins/deep-link/examples/app: dependencies: '@tauri-apps/api': - specifier: 2.0.0-beta.13 - version: 2.0.0-beta.13 + specifier: 2.0.0-beta.14 + version: 2.0.0-beta.14 '@tauri-apps/plugin-deep-link': specifier: 2.0.0-beta.7 version: link:../.. devDependencies: '@tauri-apps/cli': - specifier: 2.0.0-beta.20 - version: 2.0.0-beta.20 + specifier: 2.0.0-beta.21 + version: 2.0.0-beta.21 internal-ip: specifier: 7.0.0 version: 7.0.0 @@ -201,92 +201,92 @@ importers: plugins/dialog: dependencies: '@tauri-apps/api': - specifier: 2.0.0-beta.13 - version: 2.0.0-beta.13 + specifier: 2.0.0-beta.14 + version: 2.0.0-beta.14 plugins/fs: dependencies: '@tauri-apps/api': - specifier: 2.0.0-beta.13 - version: 2.0.0-beta.13 + specifier: 2.0.0-beta.14 + version: 2.0.0-beta.14 plugins/global-shortcut: dependencies: '@tauri-apps/api': - specifier: 2.0.0-beta.13 - version: 2.0.0-beta.13 + specifier: 2.0.0-beta.14 + version: 2.0.0-beta.14 plugins/http: dependencies: '@tauri-apps/api': - specifier: 2.0.0-beta.13 - version: 2.0.0-beta.13 + specifier: 2.0.0-beta.14 + version: 2.0.0-beta.14 plugins/log: dependencies: '@tauri-apps/api': - specifier: 2.0.0-beta.13 - version: 2.0.0-beta.13 + specifier: 2.0.0-beta.14 + version: 2.0.0-beta.14 plugins/nfc: dependencies: '@tauri-apps/api': - specifier: 2.0.0-beta.13 - version: 2.0.0-beta.13 + specifier: 2.0.0-beta.14 + version: 2.0.0-beta.14 plugins/notification: dependencies: '@tauri-apps/api': - specifier: 2.0.0-beta.13 - version: 2.0.0-beta.13 + specifier: 2.0.0-beta.14 + version: 2.0.0-beta.14 plugins/os: dependencies: '@tauri-apps/api': - specifier: 2.0.0-beta.13 - version: 2.0.0-beta.13 + specifier: 2.0.0-beta.14 + version: 2.0.0-beta.14 plugins/positioner: dependencies: '@tauri-apps/api': - specifier: 2.0.0-beta.13 - version: 2.0.0-beta.13 + specifier: 2.0.0-beta.14 + version: 2.0.0-beta.14 plugins/process: dependencies: '@tauri-apps/api': - specifier: 2.0.0-beta.13 - version: 2.0.0-beta.13 + specifier: 2.0.0-beta.14 + version: 2.0.0-beta.14 plugins/shell: dependencies: '@tauri-apps/api': - specifier: 2.0.0-beta.13 - version: 2.0.0-beta.13 + specifier: 2.0.0-beta.14 + version: 2.0.0-beta.14 plugins/single-instance/examples/vanilla: devDependencies: '@tauri-apps/cli': - specifier: 2.0.0-beta.20 - version: 2.0.0-beta.20 + specifier: 2.0.0-beta.21 + version: 2.0.0-beta.21 plugins/sql: dependencies: '@tauri-apps/api': - specifier: 2.0.0-beta.13 - version: 2.0.0-beta.13 + specifier: 2.0.0-beta.14 + version: 2.0.0-beta.14 plugins/store: dependencies: '@tauri-apps/api': - specifier: 2.0.0-beta.13 - version: 2.0.0-beta.13 + specifier: 2.0.0-beta.14 + version: 2.0.0-beta.14 plugins/store/examples/AppSettingsManager: devDependencies: '@tauri-apps/cli': specifier: ^2.0.0-beta.15 - version: 2.0.0-beta.20 + version: 2.0.0-beta.21 typescript: specifier: ^5.3.3 version: 5.5.3 @@ -297,26 +297,26 @@ importers: plugins/stronghold: dependencies: '@tauri-apps/api': - specifier: 2.0.0-beta.13 - version: 2.0.0-beta.13 + specifier: 2.0.0-beta.14 + version: 2.0.0-beta.14 plugins/updater: dependencies: '@tauri-apps/api': - specifier: 2.0.0-beta.13 - version: 2.0.0-beta.13 + specifier: 2.0.0-beta.14 + version: 2.0.0-beta.14 plugins/upload: dependencies: '@tauri-apps/api': - specifier: 2.0.0-beta.13 - version: 2.0.0-beta.13 + specifier: 2.0.0-beta.14 + version: 2.0.0-beta.14 plugins/websocket: dependencies: '@tauri-apps/api': - specifier: 2.0.0-beta.13 - version: 2.0.0-beta.13 + specifier: 2.0.0-beta.14 + version: 2.0.0-beta.14 plugins/websocket/examples/tauri-app: dependencies: @@ -325,8 +325,8 @@ importers: version: link:../.. devDependencies: '@tauri-apps/cli': - specifier: 2.0.0-beta.20 - version: 2.0.0-beta.20 + specifier: 2.0.0-beta.21 + version: 2.0.0-beta.21 typescript: specifier: ^5.3.3 version: 5.5.3 @@ -337,8 +337,8 @@ importers: plugins/window-state: dependencies: '@tauri-apps/api': - specifier: 2.0.0-beta.13 - version: 2.0.0-beta.13 + specifier: 2.0.0-beta.14 + version: 2.0.0-beta.14 packages: @@ -907,72 +907,72 @@ packages: svelte: ^4.0.0 || ^5.0.0-next.0 vite: ^5.0.0 - '@tauri-apps/api@2.0.0-beta.13': - resolution: {integrity: sha512-Np1opKANzRMF3lgJ9gDquBCB9SxlE2lRmNpVx1+L6RyzAmigkuh0ZulT5jMnDA3JLsuSDU135r/s4t/Pmx4atg==} - engines: {node: '>= 18', npm: '>= 6.6.0', yarn: '>= 1.19.1'} + '@tauri-apps/api@2.0.0-beta.14': + resolution: {integrity: sha512-YLYgHqdwWswr4Y70+hRzaLD6kLIUgHhE3shLXNquPiTaQ9+cX3Q2dB0AFfqsua6NXYFNe7LfkmMzaqEzqv3yQg==} + engines: {node: '>= 18.18', npm: '>= 6.6.0', yarn: '>= 1.19.1'} - '@tauri-apps/cli-darwin-arm64@2.0.0-beta.20': - resolution: {integrity: sha512-oCJOCib7GuYkwkBXx+ekamR8NZZU+2i3MLP+DHpDxK5gS2uhCE+CBkamJkNt6y1x6xdVnwyqZOm5RvN4SRtyIA==} + '@tauri-apps/cli-darwin-arm64@2.0.0-beta.21': + resolution: {integrity: sha512-okI7PRSC6RO4JfrOTqu4oWf0IfBPbkGHisyDOTay6K5uhz4zzry5fFJVa8S/DTrKtdjau4vcik/EDCxiGRun9Q==} engines: {node: '>= 10'} cpu: [arm64] os: [darwin] - '@tauri-apps/cli-darwin-x64@2.0.0-beta.20': - resolution: {integrity: sha512-lC5QSnRExedYN4Ds6ZlSvC2PxP8qfIYBJQ5ktf+PJI5gQALdNeVtd6YnTG1ODCEklfLq9WKkGwp7JdALTU5wDA==} + '@tauri-apps/cli-darwin-x64@2.0.0-beta.21': + resolution: {integrity: sha512-mXoJDXB6CBoqUnFb4TCsSVC6FJRZsN1DHRZAyn6iNLIhOrObcM4L2xz8rzt3WirANwJ/ayrNv95fEt8Fq1jmgA==} engines: {node: '>= 10'} cpu: [x64] os: [darwin] - '@tauri-apps/cli-linux-arm-gnueabihf@2.0.0-beta.20': - resolution: {integrity: sha512-nZCeBMHHye5DLOJV5k2w658hnCS+LYaOZ8y/G9l3ei+g0L/HBjlSy6r4simsAT5TG8+l3oCZzLBngfTMdDS/YA==} + '@tauri-apps/cli-linux-arm-gnueabihf@2.0.0-beta.21': + resolution: {integrity: sha512-LYPOx3LE2eZ0g8Zh/HYaNg6B1pZzH4BPMcma7wGZ0XPu+4fKLLGgav13xP2lknLnxiRP9jJCaTIBKXgcQEtLyg==} engines: {node: '>= 10'} cpu: [arm] os: [linux] - '@tauri-apps/cli-linux-arm64-gnu@2.0.0-beta.20': - resolution: {integrity: sha512-B79ISVLPVBgwnCchVqwTKU+vxnFYqxKomcR4rmsvxfs0NVtT5QuNzE1k4NUQnw3966yjwhYR3mnHsSJQSB4Eyw==} + '@tauri-apps/cli-linux-arm64-gnu@2.0.0-beta.21': + resolution: {integrity: sha512-VP2L729tgY889OZj5U436EntjwkI8MyVB+GrvBv8k2mj1nWB651KiVIpcUmsUgjXZ2r01bifN9J0l+3EFEXUAQ==} engines: {node: '>= 10'} cpu: [arm64] os: [linux] - '@tauri-apps/cli-linux-arm64-musl@2.0.0-beta.20': - resolution: {integrity: sha512-ojIkv/1uZHhcrgfIN8xgn4BBeo/Xg+bnV0wer6lD78zyxkUMWeEZ+u3mae1ejCJNhhaZOxNaUQ67MvDOiGyr5Q==} + '@tauri-apps/cli-linux-arm64-musl@2.0.0-beta.21': + resolution: {integrity: sha512-s1rV01RIdowlPHfw7hTBnCEm2C3mZbynF+xpyRSv9vSczu4dpfwILMRwxB4nzMzdJ7RPHsf/R+5Ww86e8QM4Gw==} engines: {node: '>= 10'} cpu: [arm64] os: [linux] - '@tauri-apps/cli-linux-x64-gnu@2.0.0-beta.20': - resolution: {integrity: sha512-xBy1FNbHKlc7T6pOmFQQPECxJaI5A9QWX7Kb9N64cNVusoOGlvc3xHYkXMS4PTr7xXOT0yiE1Ww2OwDRJ3lYsg==} + '@tauri-apps/cli-linux-x64-gnu@2.0.0-beta.21': + resolution: {integrity: sha512-yGh7ktUycHT3mAnKxC7cx/vjcbjJzoxQCxnjWpmIayVwq+iXLD1mK7nRXRdJpL/rnBFTqqD29CKuypCEFiq3/A==} engines: {node: '>= 10'} cpu: [x64] os: [linux] - '@tauri-apps/cli-linux-x64-musl@2.0.0-beta.20': - resolution: {integrity: sha512-+O6zq5jmtUxA1FUAAwF2ywPysy4NRo2Y6G+ESZDkY9XosRwdt5OUjqAsYktZA3AxDMZVei8r9buwTqUwi9ny/g==} + '@tauri-apps/cli-linux-x64-musl@2.0.0-beta.21': + resolution: {integrity: sha512-+79b8O3tsjbGR47pJtcSKGmtqj4rsSxB5AfMb4UCkmoNkbaOzB0YS/ZieUGAb+SHXZ/MMs7mcl96N9SqYOL7hw==} engines: {node: '>= 10'} cpu: [x64] os: [linux] - '@tauri-apps/cli-win32-arm64-msvc@2.0.0-beta.20': - resolution: {integrity: sha512-RswgMbWyOQcv53CHvIuiuhAh4kKDqaGyZfWD4VlxqX/XhkoF5gsNgr0MxzrY7pmoL+89oVI+fiGVJz4nOQE5vA==} + '@tauri-apps/cli-win32-arm64-msvc@2.0.0-beta.21': + resolution: {integrity: sha512-rKlpcjx6t1ECZciMmHT5xkXKjC+O+TVxRKmA21tEq/Ezt7XdnufGko1hduwQmVJWkHxKg6ab7uf98ImMpDC5UA==} engines: {node: '>= 10'} cpu: [arm64] os: [win32] - '@tauri-apps/cli-win32-ia32-msvc@2.0.0-beta.20': - resolution: {integrity: sha512-5lgWmDVXhX3SBGbiv5SduM1yajiRnUEJClWhSdRrEEJeXdsxpCsBEhxYnUnDCEzPKxLLn5fdBv3VrVctJ03csQ==} + '@tauri-apps/cli-win32-ia32-msvc@2.0.0-beta.21': + resolution: {integrity: sha512-ExdhvRfgAoZi4/7re6OkmfqsHvTJQgWouTNphHWRilUEqBM7TEQV1UxYtwWfgyOKelyx4cxUYDFAJxootTb2Nw==} engines: {node: '>= 10'} cpu: [ia32] os: [win32] - '@tauri-apps/cli-win32-x64-msvc@2.0.0-beta.20': - resolution: {integrity: sha512-SuSiiVQTQPSzWlsxQp/NMzWbzDS9TdVDOw7CCfgiG5wnT2GsxzrcIAVN6i7ILsVFLxrjr0bIgPldSJcdcH84Yw==} + '@tauri-apps/cli-win32-x64-msvc@2.0.0-beta.21': + resolution: {integrity: sha512-JtNTwNXIOfE04Cs3ieTvkdcMyJM9Sujw5MM9zNmusJKE03s/OLqbNK/2ISlcb/puwYGGPhhyYtL5hCmYXIrHHQ==} engines: {node: '>= 10'} cpu: [x64] os: [win32] - '@tauri-apps/cli@2.0.0-beta.20': - resolution: {integrity: sha512-707q9uIc2oNrYHd2dtMvxTrpZXVpart5EIktnRymNOpphkLlB6WUBjHD+ga45WqTU6cNGKbYvkKqTNfshNul9Q==} + '@tauri-apps/cli@2.0.0-beta.21': + resolution: {integrity: sha512-lqV4pD0iTs8ASd19slH0eRoVAjbxtD0cCsZFVD7kG4sYkeZ0IkvtxbvnHAOUbALfvnHZr1dVXFDVxQUqJK2OXw==} engines: {node: '>= 10'} hasBin: true @@ -3036,50 +3036,50 @@ snapshots: transitivePeerDependencies: - supports-color - '@tauri-apps/api@2.0.0-beta.13': {} + '@tauri-apps/api@2.0.0-beta.14': {} - '@tauri-apps/cli-darwin-arm64@2.0.0-beta.20': + '@tauri-apps/cli-darwin-arm64@2.0.0-beta.21': optional: true - '@tauri-apps/cli-darwin-x64@2.0.0-beta.20': + '@tauri-apps/cli-darwin-x64@2.0.0-beta.21': optional: true - '@tauri-apps/cli-linux-arm-gnueabihf@2.0.0-beta.20': + '@tauri-apps/cli-linux-arm-gnueabihf@2.0.0-beta.21': optional: true - '@tauri-apps/cli-linux-arm64-gnu@2.0.0-beta.20': + '@tauri-apps/cli-linux-arm64-gnu@2.0.0-beta.21': optional: true - '@tauri-apps/cli-linux-arm64-musl@2.0.0-beta.20': + '@tauri-apps/cli-linux-arm64-musl@2.0.0-beta.21': optional: true - '@tauri-apps/cli-linux-x64-gnu@2.0.0-beta.20': + '@tauri-apps/cli-linux-x64-gnu@2.0.0-beta.21': optional: true - '@tauri-apps/cli-linux-x64-musl@2.0.0-beta.20': + '@tauri-apps/cli-linux-x64-musl@2.0.0-beta.21': optional: true - '@tauri-apps/cli-win32-arm64-msvc@2.0.0-beta.20': + '@tauri-apps/cli-win32-arm64-msvc@2.0.0-beta.21': optional: true - '@tauri-apps/cli-win32-ia32-msvc@2.0.0-beta.20': + '@tauri-apps/cli-win32-ia32-msvc@2.0.0-beta.21': optional: true - '@tauri-apps/cli-win32-x64-msvc@2.0.0-beta.20': + '@tauri-apps/cli-win32-x64-msvc@2.0.0-beta.21': optional: true - '@tauri-apps/cli@2.0.0-beta.20': + '@tauri-apps/cli@2.0.0-beta.21': optionalDependencies: - '@tauri-apps/cli-darwin-arm64': 2.0.0-beta.20 - '@tauri-apps/cli-darwin-x64': 2.0.0-beta.20 - '@tauri-apps/cli-linux-arm-gnueabihf': 2.0.0-beta.20 - '@tauri-apps/cli-linux-arm64-gnu': 2.0.0-beta.20 - '@tauri-apps/cli-linux-arm64-musl': 2.0.0-beta.20 - '@tauri-apps/cli-linux-x64-gnu': 2.0.0-beta.20 - '@tauri-apps/cli-linux-x64-musl': 2.0.0-beta.20 - '@tauri-apps/cli-win32-arm64-msvc': 2.0.0-beta.20 - '@tauri-apps/cli-win32-ia32-msvc': 2.0.0-beta.20 - '@tauri-apps/cli-win32-x64-msvc': 2.0.0-beta.20 + '@tauri-apps/cli-darwin-arm64': 2.0.0-beta.21 + '@tauri-apps/cli-darwin-x64': 2.0.0-beta.21 + '@tauri-apps/cli-linux-arm-gnueabihf': 2.0.0-beta.21 + '@tauri-apps/cli-linux-arm64-gnu': 2.0.0-beta.21 + '@tauri-apps/cli-linux-arm64-musl': 2.0.0-beta.21 + '@tauri-apps/cli-linux-x64-gnu': 2.0.0-beta.21 + '@tauri-apps/cli-linux-x64-musl': 2.0.0-beta.21 + '@tauri-apps/cli-win32-arm64-msvc': 2.0.0-beta.21 + '@tauri-apps/cli-win32-ia32-msvc': 2.0.0-beta.21 + '@tauri-apps/cli-win32-x64-msvc': 2.0.0-beta.21 '@types/eslint@8.56.10': dependencies: From e462494f2f0c3fae07301c7312f9aae18d0de606 Mon Sep 17 00:00:00 2001 From: Fabian-Lars Date: Tue, 2 Jul 2024 09:49:43 +0200 Subject: [PATCH 2/4] Create tauri-beta-23.md --- .changes/tauri-beta-23.md | 57 +++++++++++++++++++++++++++++++++++++++ 1 file changed, 57 insertions(+) create mode 100644 .changes/tauri-beta-23.md diff --git a/.changes/tauri-beta-23.md b/.changes/tauri-beta-23.md new file mode 100644 index 000000000..85414109e --- /dev/null +++ b/.changes/tauri-beta-23.md @@ -0,0 +1,57 @@ +--- +"authenticator": patch +"autostart": patch +"barcode-scanner": patch +"biometric": patch +"cli": patch +"clipboard-manager": patch +"deep-link": patch +"dialog": patch +"fs": patch +"global-shortcut": patch +"http": patch +"localhost": patch +"log-plugin": patch +"nfc": patch +"notification": patch +"os": patch +"persisted-scope": patch +"positioner": patch +"process": patch +"shell": patch +"single-instance": patch +"sql": patch +"store": patch +"stronghold": patch +"updater": patch +"upload": patch +"websocket": patch +"window-state": patch +"authenticator-js": patch +"autostart-js": patch +"barcode-scanner-js": patch +"biometric-js": patch +"cli-js": patch +"clipboard-manager-js": patch +"deep-link-js": patch +"dialog-js": patch +"fs-js": patch +"global-shortcut-js": patch +"http-js": patch +"log-js": patch +"nfc-js": patch +"notification-js": patch +"os-js": patch +"positioner-js": patch +"process-js": patch +"shell-js": patch +"sql-js": patch +"store-js": patch +"stronghold-js": patch +"updater-js": patch +"upload-js": patch +"websocket-js": patch +"window-state-js": patch +--- + +Update to tauri beta.23. From eb9c27062c0aba1251af16852055f1ab98ae4333 Mon Sep 17 00:00:00 2001 From: FabianLars Date: Tue, 2 Jul 2024 10:10:07 +0200 Subject: [PATCH 3/4] fix clippy - regen permissions --- .github/workflows/lint-rust.yml | 3 + .../src-tauri/gen/schemas/desktop-schema.json | 35 +- .../permissions/autogenerated/reference.md | 152 +- .../permissions/schemas/schema.json | 8 +- .../authenticator/src/u2f_crate/messages.rs | 1 + .../permissions/autogenerated/reference.md | 106 +- .../autostart/permissions/schemas/schema.json | 8 +- .../permissions/autogenerated/reference.md | 193 +- .../permissions/schemas/schema.json | 8 +- .../permissions/autogenerated/reference.md | 77 +- .../biometric/permissions/schemas/schema.json | 8 +- .../permissions/autogenerated/reference.md | 46 +- plugins/cli/permissions/schemas/schema.json | 8 +- .../permissions/autogenerated/reference.md | 187 +- .../permissions/schemas/schema.json | 8 +- .../permissions/autogenerated/reference.md | 130 +- .../deep-link/permissions/schemas/schema.json | 8 +- plugins/deep-link/src/config.rs | 2 + .../permissions/autogenerated/reference.md | 164 +- .../dialog/permissions/schemas/schema.json | 8 +- .../fs/permissions/autogenerated/reference.md | 4026 +++++++++++++++-- plugins/fs/permissions/schemas/schema.json | 8 +- .../permissions/autogenerated/reference.md | 159 +- .../permissions/schemas/schema.json | 8 +- .../permissions/autogenerated/reference.md | 135 +- plugins/http/permissions/schemas/schema.json | 8 +- .../permissions/autogenerated/reference.md | 46 +- plugins/log/permissions/schemas/schema.json | 8 +- .../permissions/autogenerated/reference.md | 105 +- plugins/nfc/permissions/schemas/schema.json | 8 +- .../permissions/autogenerated/reference.md | 483 +- .../permissions/schemas/schema.json | 8 +- .../os/permissions/autogenerated/reference.md | 250 +- plugins/os/permissions/schemas/schema.json | 8 +- .../permissions/autogenerated/reference.md | 46 +- .../permissions/schemas/schema.json | 8 +- .../permissions/autogenerated/reference.md | 77 +- .../process/permissions/schemas/schema.json | 8 +- .../permissions/autogenerated/reference.md | 160 +- plugins/shell/permissions/schemas/schema.json | 8 +- .../src/platform_impl/linux.rs | 2 - .../src/platform_impl/macos.rs | 2 - .../src/platform_impl/windows.rs | 2 - plugins/sql/Cargo.toml | 1 + .../permissions/autogenerated/reference.md | 134 +- plugins/sql/permissions/schemas/schema.json | 8 +- .../permissions/autogenerated/reference.md | 367 +- plugins/store/permissions/schemas/schema.json | 8 +- .../permissions/autogenerated/reference.md | 335 +- .../permissions/schemas/schema.json | 8 +- .../permissions/autogenerated/reference.md | 135 +- .../updater/permissions/schemas/schema.json | 8 +- .../permissions/autogenerated/reference.md | 77 +- .../upload/permissions/schemas/schema.json | 8 +- .../permissions/autogenerated/reference.md | 75 +- .../websocket/permissions/schemas/schema.json | 8 +- .../permissions/autogenerated/reference.md | 106 +- .../permissions/schemas/schema.json | 8 +- 58 files changed, 7288 insertions(+), 731 deletions(-) diff --git a/.github/workflows/lint-rust.yml b/.github/workflows/lint-rust.yml index 5babd8c20..f534336c5 100644 --- a/.github/workflows/lint-rust.yml +++ b/.github/workflows/lint-rust.yml @@ -53,6 +53,9 @@ jobs: tauri-plugin-clipboard-manager: - .github/workflows/lint-rust.yml - plugins/clipboard-manager/** + tauri-plugin-deep-link: + - .github/workflows/lint-rust.yml + - plugins/deep-link/** tauri-plugin-dialog: - .github/workflows/lint-rust.yml - plugins/dialog/** diff --git a/examples/api/src-tauri/gen/schemas/desktop-schema.json b/examples/api/src-tauri/gen/schemas/desktop-schema.json index 58277295a..40b64e2c7 100644 --- a/examples/api/src-tauri/gen/schemas/desktop-schema.json +++ b/examples/api/src-tauri/gen/schemas/desktop-schema.json @@ -37,7 +37,7 @@ ], "definitions": { "Capability": { - "description": "a grouping and boundary mechanism developers can use to separate windows or plugins functionality from each other at runtime.\n\nIf a window is not matching any capability then it has no access to the IPC layer at all.\n\nThis can be done to create trust groups and reduce impact of vulnerabilities in certain plugins or windows. Windows can be added to a capability by exact name or glob patterns like *, admin-* or main-window.", + "description": "A grouping and boundary mechanism developers can use to isolate access to the IPC layer.\n\nIt controls application windows fine grained access to the Tauri core, application, or plugin commands. If a window is not matching any capability then it has no access to the IPC layer at all.\n\nThis can be done to create groups of windows, based on their required system access, which can reduce impact of frontend vulnerabilities in less privileged windows. Windows can be added to a capability by exact name (e.g. `main-window`) or glob patterns like `*` or `admin-*`. A Window can have none, one, or multiple associated capabilities.\n\n## Example\n\n```json { \"identifier\": \"main-user-files-write\", \"description\": \"This capability allows the `main` window on macOS and Windows access to `filesystem` write related commands and `dialog` commands to enable programatic access to files selected by the user.\", \"windows\": [ \"main\" ], \"permissions\": [ \"path:default\", \"dialog:open\", { \"identifier\": \"fs:allow-write-text-file\", \"allow\": [{ \"path\": \"$HOME/test.txt\" }] }, \"platforms\": [\"macOS\",\"windows\"] } ```", "type": "object", "required": [ "identifier", @@ -45,16 +45,16 @@ ], "properties": { "identifier": { - "description": "Identifier of the capability.", + "description": "Identifier of the capability.\n\n## Example\n\n`main-user-files-write`", "type": "string" }, "description": { - "description": "Description of the capability.", + "description": "Description of what the capability is intended to allow on associated windows.\n\nIt should contain a description of what the grouped permissions should allow.\n\n## Example\n\nThis capability allows the `main` window access to `filesystem` write related commands and `dialog` commands to enable programatic access to files selected by the user.", "default": "", "type": "string" }, "remote": { - "description": "Configure remote URLs that can use the capability permissions.", + "description": "Configure remote URLs that can use the capability permissions.\n\nThis setting is optional and defaults to not being set, as our default use case is that the content is served from our local application.\n\n:::caution Make sure you understand the security implications of providing remote sources with local system access. :::\n\n## Example\n\n```json { \"urls\": [\"https://*.mydomain.dev\"] } ```", "anyOf": [ { "$ref": "#/definitions/CapabilityRemote" @@ -70,28 +70,29 @@ "type": "boolean" }, "windows": { - "description": "List of windows that uses this capability. Can be a glob pattern.\n\nOn multiwebview windows, prefer [`Self::webviews`] for a fine grained access control.", + "description": "List of windows that are affected by this capability. Can be a glob pattern.\n\nOn multiwebview windows, prefer [`Self::webviews`] for a fine grained access control.\n\n## Example\n\n`[\"main\"]`", "type": "array", "items": { "type": "string" } }, "webviews": { - "description": "List of webviews that uses this capability. Can be a glob pattern.\n\nThis is only required when using on multiwebview contexts, by default all child webviews of a window that matches [`Self::windows`] are linked.", + "description": "List of webviews that are affected by this capability. Can be a glob pattern.\n\nThis is only required when using on multiwebview contexts, by default all child webviews of a window that matches [`Self::windows`] are linked.\n\n## Example\n\n`[\"sub-webview-one\", \"sub-webview-two\"]`", "type": "array", "items": { "type": "string" } }, "permissions": { - "description": "List of permissions attached to this capability. Must include the plugin name as prefix in the form of `${plugin-name}:${permission-name}`.", + "description": "List of permissions attached to this capability.\n\nMust include the plugin name as prefix in the form of `${plugin-name}:${permission-name}`. For commands directly implemented in the application itself only `${permission-name}` is required.\n\n## Example\n\n```json [ \"path:default\", \"event:default\", \"window:default\", \"app:default\", \"image:default\", \"resources:default\", \"menu:default\", \"tray:default\", \"shell:allow-open\", \"dialog:open\", { \"identifier\": \"fs:allow-write-text-file\", \"allow\": [{ \"path\": \"$HOME/test.txt\" }] } ```", "type": "array", "items": { "$ref": "#/definitions/PermissionEntry" - } + }, + "uniqueItems": true }, "platforms": { - "description": "Target platforms this capability applies. By default all platforms are affected by this capability.", + "description": "Limit which target platforms this capability applies to.\n\nBy default all platforms are targeted.\n\n## Example\n\n`[\"macOS\",\"windows\"]`", "type": [ "array", "null" @@ -110,7 +111,7 @@ ], "properties": { "urls": { - "description": "Remote domains this capability refers to using the [URLPattern standard](https://urlpattern.spec.whatwg.org/).\n\n# Examples\n\n- \"https://*.mydomain.dev\": allows subdomains of mydomain.dev - \"https://mydomain.dev/api/*\": allows any subpath of mydomain.dev/api", + "description": "Remote domains this capability refers to using the [URLPattern standard](https://urlpattern.spec.whatwg.org/).\n\n## Examples\n\n- \"https://*.mydomain.dev\": allows subdomains of mydomain.dev - \"https://mydomain.dev/api/*\": allows any subpath of mydomain.dev/api", "type": "array", "items": { "type": "string" @@ -2504,6 +2505,13 @@ "app:allow-app-show" ] }, + { + "description": "app:allow-default-window-icon -> Enables the default_window_icon command without any pre-configured scope.", + "type": "string", + "enum": [ + "app:allow-default-window-icon" + ] + }, { "description": "app:allow-name -> Enables the name command without any pre-configured scope.", "type": "string", @@ -2539,6 +2547,13 @@ "app:deny-app-show" ] }, + { + "description": "app:deny-default-window-icon -> Denies the default_window_icon command without any pre-configured scope.", + "type": "string", + "enum": [ + "app:deny-default-window-icon" + ] + }, { "description": "app:deny-name -> Denies the name command without any pre-configured scope.", "type": "string", diff --git a/plugins/authenticator/permissions/autogenerated/reference.md b/plugins/authenticator/permissions/autogenerated/reference.md index c82e61c79..71b941ea7 100644 --- a/plugins/authenticator/permissions/autogenerated/reference.md +++ b/plugins/authenticator/permissions/autogenerated/reference.md @@ -1,12 +1,140 @@ -| Permission | Description | -|------|-----| -|`allow-init-auth`|Enables the init_auth command without any pre-configured scope.| -|`deny-init-auth`|Denies the init_auth command without any pre-configured scope.| -|`allow-register`|Enables the register command without any pre-configured scope.| -|`deny-register`|Denies the register command without any pre-configured scope.| -|`allow-sign`|Enables the sign command without any pre-configured scope.| -|`deny-sign`|Denies the sign command without any pre-configured scope.| -|`allow-verify-registration`|Enables the verify_registration command without any pre-configured scope.| -|`deny-verify-registration`|Denies the verify_registration command without any pre-configured scope.| -|`allow-verify-signature`|Enables the verify_signature command without any pre-configured scope.| -|`deny-verify-signature`|Denies the verify_signature command without any pre-configured scope.| + +### Permission Table + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
IdentifierDescription
+ +`authenticator:allow-init-auth` + + + +Enables the init_auth command without any pre-configured scope. + +
+ +`authenticator:deny-init-auth` + + + +Denies the init_auth command without any pre-configured scope. + +
+ +`authenticator:allow-register` + + + +Enables the register command without any pre-configured scope. + +
+ +`authenticator:deny-register` + + + +Denies the register command without any pre-configured scope. + +
+ +`authenticator:allow-sign` + + + +Enables the sign command without any pre-configured scope. + +
+ +`authenticator:deny-sign` + + + +Denies the sign command without any pre-configured scope. + +
+ +`authenticator:allow-verify-registration` + + + +Enables the verify_registration command without any pre-configured scope. + +
+ +`authenticator:deny-verify-registration` + + + +Denies the verify_registration command without any pre-configured scope. + +
+ +`authenticator:allow-verify-signature` + + + +Enables the verify_signature command without any pre-configured scope. + +
+ +`authenticator:deny-verify-signature` + + + +Denies the verify_signature command without any pre-configured scope. + +
diff --git a/plugins/authenticator/permissions/schemas/schema.json b/plugins/authenticator/permissions/schemas/schema.json index 427c3f5a3..423ed72f5 100644 --- a/plugins/authenticator/permissions/schemas/schema.json +++ b/plugins/authenticator/permissions/schemas/schema.json @@ -49,7 +49,7 @@ "minimum": 1.0 }, "description": { - "description": "Human-readable description of what the permission does.", + "description": "Human-readable description of what the permission does. Tauri convention is to use

headings in markdown content for Tauri documentation generation purposes.", "type": [ "string", "null" @@ -111,7 +111,7 @@ "type": "string" }, "description": { - "description": "Human-readable description of what the permission does.", + "description": "Human-readable description of what the permission does. Tauri internal convention is to use

headings in markdown content for Tauri documentation generation purposes.", "type": [ "string", "null" @@ -172,7 +172,7 @@ } }, "Scopes": { - "description": "A restriction of the command/endpoint functionality.\n\nIt can be of any serde serializable type and is used for allowing or preventing certain actions inside a Tauri command.\n\nThe scope is passed to the command and handled/enforced by the command itself.", + "description": "An argument for fine grained behavior control of Tauri commands.\n\nIt can be of any serde serializable type and is used to allow or prevent certain actions inside a Tauri command. The configured scope is passed to the command and will be enforced by the command implementation.\n\n## Example\n\n```json { \"allow\": [{ \"path\": \"$HOME/**\" }], \"deny\": [{ \"path\": \"$HOME/secret.txt\" }] } ```", "type": "object", "properties": { "allow": { @@ -186,7 +186,7 @@ } }, "deny": { - "description": "Data that defines what is denied by the scope.", + "description": "Data that defines what is denied by the scope. This should be prioritized by validation logic.", "type": [ "array", "null" diff --git a/plugins/authenticator/src/u2f_crate/messages.rs b/plugins/authenticator/src/u2f_crate/messages.rs index be22f9651..fbae95111 100644 --- a/plugins/authenticator/src/u2f_crate/messages.rs +++ b/plugins/authenticator/src/u2f_crate/messages.rs @@ -34,6 +34,7 @@ pub struct RegisteredKey { #[serde(rename_all = "camelCase")] pub struct RegisterResponse { pub registration_data: String, + #[allow(unused)] pub version: String, pub client_data: String, } diff --git a/plugins/autostart/permissions/autogenerated/reference.md b/plugins/autostart/permissions/autogenerated/reference.md index 329e5a0be..46957bf53 100644 --- a/plugins/autostart/permissions/autogenerated/reference.md +++ b/plugins/autostart/permissions/autogenerated/reference.md @@ -1,12 +1,6 @@ -| Permission | Description | -|------|-----| -|`allow-disable`|Enables the disable command without any pre-configured scope.| -|`deny-disable`|Denies the disable command without any pre-configured scope.| -|`allow-enable`|Enables the enable command without any pre-configured scope.| -|`deny-enable`|Denies the enable command without any pre-configured scope.| -|`allow-is-enabled`|Enables the is_enabled command without any pre-configured scope.| -|`deny-is-enabled`|Denies the is_enabled command without any pre-configured scope.| -|`default`|This permission set configures if your +## Default Permission + +This permission set configures if your application can enable or disable auto starting the application on boot. @@ -15,4 +9,96 @@ starting the application on boot. It allows all to check, enable and disable the automatic start on boot. -| + + +- `allow-enable` +- `allow-disable` +- `allow-is-enabled` + +### Permission Table + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
IdentifierDescription
+ +`autostart:allow-disable` + + + +Enables the disable command without any pre-configured scope. + +
+ +`autostart:deny-disable` + + + +Denies the disable command without any pre-configured scope. + +
+ +`autostart:allow-enable` + + + +Enables the enable command without any pre-configured scope. + +
+ +`autostart:deny-enable` + + + +Denies the enable command without any pre-configured scope. + +
+ +`autostart:allow-is-enabled` + + + +Enables the is_enabled command without any pre-configured scope. + +
+ +`autostart:deny-is-enabled` + + + +Denies the is_enabled command without any pre-configured scope. + +
diff --git a/plugins/autostart/permissions/schemas/schema.json b/plugins/autostart/permissions/schemas/schema.json index 4ec9e10ef..1ecdac9b5 100644 --- a/plugins/autostart/permissions/schemas/schema.json +++ b/plugins/autostart/permissions/schemas/schema.json @@ -49,7 +49,7 @@ "minimum": 1.0 }, "description": { - "description": "Human-readable description of what the permission does.", + "description": "Human-readable description of what the permission does. Tauri convention is to use

headings in markdown content for Tauri documentation generation purposes.", "type": [ "string", "null" @@ -111,7 +111,7 @@ "type": "string" }, "description": { - "description": "Human-readable description of what the permission does.", + "description": "Human-readable description of what the permission does. Tauri internal convention is to use

headings in markdown content for Tauri documentation generation purposes.", "type": [ "string", "null" @@ -172,7 +172,7 @@ } }, "Scopes": { - "description": "A restriction of the command/endpoint functionality.\n\nIt can be of any serde serializable type and is used for allowing or preventing certain actions inside a Tauri command.\n\nThe scope is passed to the command and handled/enforced by the command itself.", + "description": "An argument for fine grained behavior control of Tauri commands.\n\nIt can be of any serde serializable type and is used to allow or prevent certain actions inside a Tauri command. The configured scope is passed to the command and will be enforced by the command implementation.\n\n## Example\n\n```json { \"allow\": [{ \"path\": \"$HOME/**\" }], \"deny\": [{ \"path\": \"$HOME/secret.txt\" }] } ```", "type": "object", "properties": { "allow": { @@ -186,7 +186,7 @@ } }, "deny": { - "description": "Data that defines what is denied by the scope.", + "description": "Data that defines what is denied by the scope. This should be prioritized by validation logic.", "type": [ "array", "null" diff --git a/plugins/barcode-scanner/permissions/autogenerated/reference.md b/plugins/barcode-scanner/permissions/autogenerated/reference.md index 452b1042f..1778df445 100644 --- a/plugins/barcode-scanner/permissions/autogenerated/reference.md +++ b/plugins/barcode-scanner/permissions/autogenerated/reference.md @@ -1,22 +1,183 @@ -| Permission | Description | -|------|-----| -|`allow-cancel`|Enables the cancel command without any pre-configured scope.| -|`deny-cancel`|Denies the cancel command without any pre-configured scope.| -|`allow-check-permissions`|Enables the check_permissions command without any pre-configured scope.| -|`deny-check-permissions`|Denies the check_permissions command without any pre-configured scope.| -|`allow-open-app-settings`|Enables the open_app_settings command without any pre-configured scope.| -|`deny-open-app-settings`|Denies the open_app_settings command without any pre-configured scope.| -|`allow-request-permissions`|Enables the request_permissions command without any pre-configured scope.| -|`deny-request-permissions`|Denies the request_permissions command without any pre-configured scope.| -|`allow-scan`|Enables the scan command without any pre-configured scope.| -|`deny-scan`|Denies the scan command without any pre-configured scope.| -|`allow-vibrate`|Enables the vibrate command without any pre-configured scope.| -|`deny-vibrate`|Denies the vibrate command without any pre-configured scope.| -|`default`|This permission set configures which +## Default Permission + +This permission set configures which barcode scanning features are by default exposed. #### Granted Permissions It allows all barcode related features. -| + + +- `allow-cancel` +- `allow-check-permissions` +- `allow-open-app-settings` +- `allow-request-permissions` +- `allow-scan` +- `allow-vibrate` + +### Permission Table + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
IdentifierDescription
+ +`barcode-scanner:allow-cancel` + + + +Enables the cancel command without any pre-configured scope. + +
+ +`barcode-scanner:deny-cancel` + + + +Denies the cancel command without any pre-configured scope. + +
+ +`barcode-scanner:allow-check-permissions` + + + +Enables the check_permissions command without any pre-configured scope. + +
+ +`barcode-scanner:deny-check-permissions` + + + +Denies the check_permissions command without any pre-configured scope. + +
+ +`barcode-scanner:allow-open-app-settings` + + + +Enables the open_app_settings command without any pre-configured scope. + +
+ +`barcode-scanner:deny-open-app-settings` + + + +Denies the open_app_settings command without any pre-configured scope. + +
+ +`barcode-scanner:allow-request-permissions` + + + +Enables the request_permissions command without any pre-configured scope. + +
+ +`barcode-scanner:deny-request-permissions` + + + +Denies the request_permissions command without any pre-configured scope. + +
+ +`barcode-scanner:allow-scan` + + + +Enables the scan command without any pre-configured scope. + +
+ +`barcode-scanner:deny-scan` + + + +Denies the scan command without any pre-configured scope. + +
+ +`barcode-scanner:allow-vibrate` + + + +Enables the vibrate command without any pre-configured scope. + +
+ +`barcode-scanner:deny-vibrate` + + + +Denies the vibrate command without any pre-configured scope. + +
diff --git a/plugins/barcode-scanner/permissions/schemas/schema.json b/plugins/barcode-scanner/permissions/schemas/schema.json index 7e99ee7c8..02286fcb7 100644 --- a/plugins/barcode-scanner/permissions/schemas/schema.json +++ b/plugins/barcode-scanner/permissions/schemas/schema.json @@ -49,7 +49,7 @@ "minimum": 1.0 }, "description": { - "description": "Human-readable description of what the permission does.", + "description": "Human-readable description of what the permission does. Tauri convention is to use

headings in markdown content for Tauri documentation generation purposes.", "type": [ "string", "null" @@ -111,7 +111,7 @@ "type": "string" }, "description": { - "description": "Human-readable description of what the permission does.", + "description": "Human-readable description of what the permission does. Tauri internal convention is to use

headings in markdown content for Tauri documentation generation purposes.", "type": [ "string", "null" @@ -172,7 +172,7 @@ } }, "Scopes": { - "description": "A restriction of the command/endpoint functionality.\n\nIt can be of any serde serializable type and is used for allowing or preventing certain actions inside a Tauri command.\n\nThe scope is passed to the command and handled/enforced by the command itself.", + "description": "An argument for fine grained behavior control of Tauri commands.\n\nIt can be of any serde serializable type and is used to allow or prevent certain actions inside a Tauri command. The configured scope is passed to the command and will be enforced by the command implementation.\n\n## Example\n\n```json { \"allow\": [{ \"path\": \"$HOME/**\" }], \"deny\": [{ \"path\": \"$HOME/secret.txt\" }] } ```", "type": "object", "properties": { "allow": { @@ -186,7 +186,7 @@ } }, "deny": { - "description": "Data that defines what is denied by the scope.", + "description": "Data that defines what is denied by the scope. This should be prioritized by validation logic.", "type": [ "array", "null" diff --git a/plugins/biometric/permissions/autogenerated/reference.md b/plugins/biometric/permissions/autogenerated/reference.md index 6f57ebd36..d54a40f06 100644 --- a/plugins/biometric/permissions/autogenerated/reference.md +++ b/plugins/biometric/permissions/autogenerated/reference.md @@ -1,14 +1,75 @@ -| Permission | Description | -|------|-----| -|`allow-authenticate`|Enables the authenticate command without any pre-configured scope.| -|`deny-authenticate`|Denies the authenticate command without any pre-configured scope.| -|`allow-status`|Enables the status command without any pre-configured scope.| -|`deny-status`|Denies the status command without any pre-configured scope.| -|`default`|This permission set configures which +## Default Permission + +This permission set configures which biometric features are by default exposed. #### Granted Permissions It allows acccess to all biometric commands. -| + + +- `allow-authenticate` +- `allow-status` + +### Permission Table + + + + + + + + + + + + + + + + + + + + + + + + + + + +
IdentifierDescription
+ +`biometric:allow-authenticate` + + + +Enables the authenticate command without any pre-configured scope. + +
+ +`biometric:deny-authenticate` + + + +Denies the authenticate command without any pre-configured scope. + +
+ +`biometric:allow-status` + + + +Enables the status command without any pre-configured scope. + +
+ +`biometric:deny-status` + + + +Denies the status command without any pre-configured scope. + +
diff --git a/plugins/biometric/permissions/schemas/schema.json b/plugins/biometric/permissions/schemas/schema.json index f992c8c68..8dbd11797 100644 --- a/plugins/biometric/permissions/schemas/schema.json +++ b/plugins/biometric/permissions/schemas/schema.json @@ -49,7 +49,7 @@ "minimum": 1.0 }, "description": { - "description": "Human-readable description of what the permission does.", + "description": "Human-readable description of what the permission does. Tauri convention is to use

headings in markdown content for Tauri documentation generation purposes.", "type": [ "string", "null" @@ -111,7 +111,7 @@ "type": "string" }, "description": { - "description": "Human-readable description of what the permission does.", + "description": "Human-readable description of what the permission does. Tauri internal convention is to use

headings in markdown content for Tauri documentation generation purposes.", "type": [ "string", "null" @@ -172,7 +172,7 @@ } }, "Scopes": { - "description": "A restriction of the command/endpoint functionality.\n\nIt can be of any serde serializable type and is used for allowing or preventing certain actions inside a Tauri command.\n\nThe scope is passed to the command and handled/enforced by the command itself.", + "description": "An argument for fine grained behavior control of Tauri commands.\n\nIt can be of any serde serializable type and is used to allow or prevent certain actions inside a Tauri command. The configured scope is passed to the command and will be enforced by the command implementation.\n\n## Example\n\n```json { \"allow\": [{ \"path\": \"$HOME/**\" }], \"deny\": [{ \"path\": \"$HOME/secret.txt\" }] } ```", "type": "object", "properties": { "allow": { @@ -186,7 +186,7 @@ } }, "deny": { - "description": "Data that defines what is denied by the scope.", + "description": "Data that defines what is denied by the scope. This should be prioritized by validation logic.", "type": [ "array", "null" diff --git a/plugins/cli/permissions/autogenerated/reference.md b/plugins/cli/permissions/autogenerated/reference.md index f1eedd3eb..93588921a 100644 --- a/plugins/cli/permissions/autogenerated/reference.md +++ b/plugins/cli/permissions/autogenerated/reference.md @@ -1,5 +1,41 @@ -| Permission | Description | -|------|-----| -|`allow-cli-matches`|Enables the cli_matches command without any pre-configured scope.| -|`deny-cli-matches`|Denies the cli_matches command without any pre-configured scope.| -|`default`|Allows reading the CLI matches| +## Default Permission + +Allows reading the CLI matches + +- `allow-cli-matches` + +### Permission Table + + + + + + + + + + + + + + + + + +
IdentifierDescription
+ +`cli:allow-cli-matches` + + + +Enables the cli_matches command without any pre-configured scope. + +
+ +`cli:deny-cli-matches` + + + +Denies the cli_matches command without any pre-configured scope. + +
diff --git a/plugins/cli/permissions/schemas/schema.json b/plugins/cli/permissions/schemas/schema.json index 00a7a1151..045c7197b 100644 --- a/plugins/cli/permissions/schemas/schema.json +++ b/plugins/cli/permissions/schemas/schema.json @@ -49,7 +49,7 @@ "minimum": 1.0 }, "description": { - "description": "Human-readable description of what the permission does.", + "description": "Human-readable description of what the permission does. Tauri convention is to use

headings in markdown content for Tauri documentation generation purposes.", "type": [ "string", "null" @@ -111,7 +111,7 @@ "type": "string" }, "description": { - "description": "Human-readable description of what the permission does.", + "description": "Human-readable description of what the permission does. Tauri internal convention is to use

headings in markdown content for Tauri documentation generation purposes.", "type": [ "string", "null" @@ -172,7 +172,7 @@ } }, "Scopes": { - "description": "A restriction of the command/endpoint functionality.\n\nIt can be of any serde serializable type and is used for allowing or preventing certain actions inside a Tauri command.\n\nThe scope is passed to the command and handled/enforced by the command itself.", + "description": "An argument for fine grained behavior control of Tauri commands.\n\nIt can be of any serde serializable type and is used to allow or prevent certain actions inside a Tauri command. The configured scope is passed to the command and will be enforced by the command implementation.\n\n## Example\n\n```json { \"allow\": [{ \"path\": \"$HOME/**\" }], \"deny\": [{ \"path\": \"$HOME/secret.txt\" }] } ```", "type": "object", "properties": { "allow": { @@ -186,7 +186,7 @@ } }, "deny": { - "description": "Data that defines what is denied by the scope.", + "description": "Data that defines what is denied by the scope. This should be prioritized by validation logic.", "type": [ "array", "null" diff --git a/plugins/clipboard-manager/permissions/autogenerated/reference.md b/plugins/clipboard-manager/permissions/autogenerated/reference.md index 4ce23a4e6..f712d5add 100644 --- a/plugins/clipboard-manager/permissions/autogenerated/reference.md +++ b/plugins/clipboard-manager/permissions/autogenerated/reference.md @@ -1,20 +1,175 @@ -| Permission | Description | -|------|-----| -|`allow-clear`|Enables the clear command without any pre-configured scope.| -|`deny-clear`|Denies the clear command without any pre-configured scope.| -|`allow-read-image`|Enables the read_image command without any pre-configured scope.| -|`deny-read-image`|Denies the read_image command without any pre-configured scope.| -|`allow-read-text`|Enables the read_text command without any pre-configured scope.| -|`deny-read-text`|Denies the read_text command without any pre-configured scope.| -|`allow-write-html`|Enables the write_html command without any pre-configured scope.| -|`deny-write-html`|Denies the write_html command without any pre-configured scope.| -|`allow-write-image`|Enables the write_image command without any pre-configured scope.| -|`deny-write-image`|Denies the write_image command without any pre-configured scope.| -|`allow-write-text`|Enables the write_text command without any pre-configured scope.| -|`deny-write-text`|Denies the write_text command without any pre-configured scope.| -|`default`|No features are enabled by default, as we believe +## Default Permission + +No features are enabled by default, as we believe the clipboard can be inherently dangerous and it is application specific if read and/or write access is needed. Clipboard interaction needs to be explicitly enabled. -| + + + +### Permission Table + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
IdentifierDescription
+ +`clipboard-manager:allow-clear` + + + +Enables the clear command without any pre-configured scope. + +
+ +`clipboard-manager:deny-clear` + + + +Denies the clear command without any pre-configured scope. + +
+ +`clipboard-manager:allow-read-image` + + + +Enables the read_image command without any pre-configured scope. + +
+ +`clipboard-manager:deny-read-image` + + + +Denies the read_image command without any pre-configured scope. + +
+ +`clipboard-manager:allow-read-text` + + + +Enables the read_text command without any pre-configured scope. + +
+ +`clipboard-manager:deny-read-text` + + + +Denies the read_text command without any pre-configured scope. + +
+ +`clipboard-manager:allow-write-html` + + + +Enables the write_html command without any pre-configured scope. + +
+ +`clipboard-manager:deny-write-html` + + + +Denies the write_html command without any pre-configured scope. + +
+ +`clipboard-manager:allow-write-image` + + + +Enables the write_image command without any pre-configured scope. + +
+ +`clipboard-manager:deny-write-image` + + + +Denies the write_image command without any pre-configured scope. + +
+ +`clipboard-manager:allow-write-text` + + + +Enables the write_text command without any pre-configured scope. + +
+ +`clipboard-manager:deny-write-text` + + + +Denies the write_text command without any pre-configured scope. + +
diff --git a/plugins/clipboard-manager/permissions/schemas/schema.json b/plugins/clipboard-manager/permissions/schemas/schema.json index 90e00c4d1..d579bae88 100644 --- a/plugins/clipboard-manager/permissions/schemas/schema.json +++ b/plugins/clipboard-manager/permissions/schemas/schema.json @@ -49,7 +49,7 @@ "minimum": 1.0 }, "description": { - "description": "Human-readable description of what the permission does.", + "description": "Human-readable description of what the permission does. Tauri convention is to use

headings in markdown content for Tauri documentation generation purposes.", "type": [ "string", "null" @@ -111,7 +111,7 @@ "type": "string" }, "description": { - "description": "Human-readable description of what the permission does.", + "description": "Human-readable description of what the permission does. Tauri internal convention is to use

headings in markdown content for Tauri documentation generation purposes.", "type": [ "string", "null" @@ -172,7 +172,7 @@ } }, "Scopes": { - "description": "A restriction of the command/endpoint functionality.\n\nIt can be of any serde serializable type and is used for allowing or preventing certain actions inside a Tauri command.\n\nThe scope is passed to the command and handled/enforced by the command itself.", + "description": "An argument for fine grained behavior control of Tauri commands.\n\nIt can be of any serde serializable type and is used to allow or prevent certain actions inside a Tauri command. The configured scope is passed to the command and will be enforced by the command implementation.\n\n## Example\n\n```json { \"allow\": [{ \"path\": \"$HOME/**\" }], \"deny\": [{ \"path\": \"$HOME/secret.txt\" }] } ```", "type": "object", "properties": { "allow": { @@ -186,7 +186,7 @@ } }, "deny": { - "description": "Data that defines what is denied by the scope.", + "description": "Data that defines what is denied by the scope. This should be prioritized by validation logic.", "type": [ "array", "null" diff --git a/plugins/deep-link/permissions/autogenerated/reference.md b/plugins/deep-link/permissions/autogenerated/reference.md index 583e39de8..2b815a0c9 100644 --- a/plugins/deep-link/permissions/autogenerated/reference.md +++ b/plugins/deep-link/permissions/autogenerated/reference.md @@ -1,11 +1,119 @@ -| Permission | Description | -|------|-----| -|`allow-get-current`|Enables the get_current command without any pre-configured scope.| -|`deny-get-current`|Denies the get_current command without any pre-configured scope.| -|`allow-is-registered`|Enables the is_registered command without any pre-configured scope.| -|`deny-is-registered`|Denies the is_registered command without any pre-configured scope.| -|`allow-register`|Enables the register command without any pre-configured scope.| -|`deny-register`|Denies the register command without any pre-configured scope.| -|`allow-unregister`|Enables the unregister command without any pre-configured scope.| -|`deny-unregister`|Denies the unregister command without any pre-configured scope.| -|`default`|Allows reading the opened deep link via the get_current command| +## Default Permission + +Allows reading the opened deep link via the get_current command + +- `allow-get-current` + +### Permission Table + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
IdentifierDescription
+ +`deep-link:allow-get-current` + + + +Enables the get_current command without any pre-configured scope. + +
+ +`deep-link:deny-get-current` + + + +Denies the get_current command without any pre-configured scope. + +
+ +`deep-link:allow-is-registered` + + + +Enables the is_registered command without any pre-configured scope. + +
+ +`deep-link:deny-is-registered` + + + +Denies the is_registered command without any pre-configured scope. + +
+ +`deep-link:allow-register` + + + +Enables the register command without any pre-configured scope. + +
+ +`deep-link:deny-register` + + + +Denies the register command without any pre-configured scope. + +
+ +`deep-link:allow-unregister` + + + +Enables the unregister command without any pre-configured scope. + +
+ +`deep-link:deny-unregister` + + + +Denies the unregister command without any pre-configured scope. + +
diff --git a/plugins/deep-link/permissions/schemas/schema.json b/plugins/deep-link/permissions/schemas/schema.json index 3589379a3..32a079450 100644 --- a/plugins/deep-link/permissions/schemas/schema.json +++ b/plugins/deep-link/permissions/schemas/schema.json @@ -49,7 +49,7 @@ "minimum": 1.0 }, "description": { - "description": "Human-readable description of what the permission does.", + "description": "Human-readable description of what the permission does. Tauri convention is to use

headings in markdown content for Tauri documentation generation purposes.", "type": [ "string", "null" @@ -111,7 +111,7 @@ "type": "string" }, "description": { - "description": "Human-readable description of what the permission does.", + "description": "Human-readable description of what the permission does. Tauri internal convention is to use

headings in markdown content for Tauri documentation generation purposes.", "type": [ "string", "null" @@ -172,7 +172,7 @@ } }, "Scopes": { - "description": "A restriction of the command/endpoint functionality.\n\nIt can be of any serde serializable type and is used for allowing or preventing certain actions inside a Tauri command.\n\nThe scope is passed to the command and handled/enforced by the command itself.", + "description": "An argument for fine grained behavior control of Tauri commands.\n\nIt can be of any serde serializable type and is used to allow or prevent certain actions inside a Tauri command. The configured scope is passed to the command and will be enforced by the command implementation.\n\n## Example\n\n```json { \"allow\": [{ \"path\": \"$HOME/**\" }], \"deny\": [{ \"path\": \"$HOME/secret.txt\" }] } ```", "type": "object", "properties": { "allow": { @@ -186,7 +186,7 @@ } }, "deny": { - "description": "Data that defines what is denied by the scope.", + "description": "Data that defines what is denied by the scope. This should be prioritized by validation logic.", "type": [ "array", "null" diff --git a/plugins/deep-link/src/config.rs b/plugins/deep-link/src/config.rs index f0db1dafd..1796aa636 100644 --- a/plugins/deep-link/src/config.rs +++ b/plugins/deep-link/src/config.rs @@ -35,11 +35,13 @@ pub struct Config { pub mobile: Vec, /// Desktop requires urls starting with `://`. /// These urls are also active in dev mode on Android. + #[allow(unused)] // Used in tauri-bundler pub desktop: DesktopProtocol, } #[derive(Deserialize)] #[serde(untagged)] +#[allow(unused)] // Used in tauri-bundler pub enum DesktopProtocol { One(DeepLinkProtocol), List(Vec), diff --git a/plugins/dialog/permissions/autogenerated/reference.md b/plugins/dialog/permissions/autogenerated/reference.md index e69bf5d8d..e99293850 100644 --- a/plugins/dialog/permissions/autogenerated/reference.md +++ b/plugins/dialog/permissions/autogenerated/reference.md @@ -1,16 +1,6 @@ -| Permission | Description | -|------|-----| -|`allow-ask`|Enables the ask command without any pre-configured scope.| -|`deny-ask`|Denies the ask command without any pre-configured scope.| -|`allow-confirm`|Enables the confirm command without any pre-configured scope.| -|`deny-confirm`|Denies the confirm command without any pre-configured scope.| -|`allow-message`|Enables the message command without any pre-configured scope.| -|`deny-message`|Denies the message command without any pre-configured scope.| -|`allow-open`|Enables the open command without any pre-configured scope.| -|`deny-open`|Denies the open command without any pre-configured scope.| -|`allow-save`|Enables the save command without any pre-configured scope.| -|`deny-save`|Denies the save command without any pre-configured scope.| -|`default`|This permission set configures the types of dialogs +## Default Permission + +This permission set configures the types of dialogs available from the dialog plugin. #### Granted Permissions @@ -18,4 +8,150 @@ available from the dialog plugin. All dialog types are enabled. -| + + +- `allow-ask` +- `allow-confirm` +- `allow-message` +- `allow-save` +- `allow-open` + +### Permission Table + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
IdentifierDescription
+ +`dialog:allow-ask` + + + +Enables the ask command without any pre-configured scope. + +
+ +`dialog:deny-ask` + + + +Denies the ask command without any pre-configured scope. + +
+ +`dialog:allow-confirm` + + + +Enables the confirm command without any pre-configured scope. + +
+ +`dialog:deny-confirm` + + + +Denies the confirm command without any pre-configured scope. + +
+ +`dialog:allow-message` + + + +Enables the message command without any pre-configured scope. + +
+ +`dialog:deny-message` + + + +Denies the message command without any pre-configured scope. + +
+ +`dialog:allow-open` + + + +Enables the open command without any pre-configured scope. + +
+ +`dialog:deny-open` + + + +Denies the open command without any pre-configured scope. + +
+ +`dialog:allow-save` + + + +Enables the save command without any pre-configured scope. + +
+ +`dialog:deny-save` + + + +Denies the save command without any pre-configured scope. + +
diff --git a/plugins/dialog/permissions/schemas/schema.json b/plugins/dialog/permissions/schemas/schema.json index 4a8d59af9..e913aba23 100644 --- a/plugins/dialog/permissions/schemas/schema.json +++ b/plugins/dialog/permissions/schemas/schema.json @@ -49,7 +49,7 @@ "minimum": 1.0 }, "description": { - "description": "Human-readable description of what the permission does.", + "description": "Human-readable description of what the permission does. Tauri convention is to use

headings in markdown content for Tauri documentation generation purposes.", "type": [ "string", "null" @@ -111,7 +111,7 @@ "type": "string" }, "description": { - "description": "Human-readable description of what the permission does.", + "description": "Human-readable description of what the permission does. Tauri internal convention is to use

headings in markdown content for Tauri documentation generation purposes.", "type": [ "string", "null" @@ -172,7 +172,7 @@ } }, "Scopes": { - "description": "A restriction of the command/endpoint functionality.\n\nIt can be of any serde serializable type and is used for allowing or preventing certain actions inside a Tauri command.\n\nThe scope is passed to the command and handled/enforced by the command itself.", + "description": "An argument for fine grained behavior control of Tauri commands.\n\nIt can be of any serde serializable type and is used to allow or prevent certain actions inside a Tauri command. The configured scope is passed to the command and will be enforced by the command implementation.\n\n## Example\n\n```json { \"allow\": [{ \"path\": \"$HOME/**\" }], \"deny\": [{ \"path\": \"$HOME/secret.txt\" }] } ```", "type": "object", "properties": { "allow": { @@ -186,7 +186,7 @@ } }, "deny": { - "description": "Data that defines what is denied by the scope.", + "description": "Data that defines what is denied by the scope. This should be prioritized by validation logic.", "type": [ "array", "null" diff --git a/plugins/fs/permissions/autogenerated/reference.md b/plugins/fs/permissions/autogenerated/reference.md index 045d1a0be..dfbed74e0 100644 --- a/plugins/fs/permissions/autogenerated/reference.md +++ b/plugins/fs/permissions/autogenerated/reference.md @@ -1,281 +1,6 @@ -| Permission | Description | -|------|-----| -|`allow-app-read-recursive`|This allows full recursive read access to the complete `$APP` folder, files and subdirectories.| -|`allow-app-write-recursive`|This allows full recursive write access to the complete `$APP` folder, files and subdirectories.| -|`allow-app-read`|This allows non-recursive read access to the `$APP` folder.| -|`allow-app-write`|This allows non-recursive write access to the `$APP` folder.| -|`allow-app-meta-recursive`|This allows full recursive read access to metadata of the `$APP` folder, including file listing and statistics.| -|`allow-app-meta`|This allows non-recursive read access to metadata of the `$APP` folder, including file listing and statistics.| -|`scope-app-recursive`|This scope permits recursive access to the complete `$APP` folder, including sub directories and files.| -|`scope-app`|This scope permits access to all files and list content of top level directories in the `$APP`folder.| -|`scope-app-index`|This scope permits to list all files and folders in the `$APP`folder.| -|`allow-appcache-read-recursive`|This allows full recursive read access to the complete `$APPCACHE` folder, files and subdirectories.| -|`allow-appcache-write-recursive`|This allows full recursive write access to the complete `$APPCACHE` folder, files and subdirectories.| -|`allow-appcache-read`|This allows non-recursive read access to the `$APPCACHE` folder.| -|`allow-appcache-write`|This allows non-recursive write access to the `$APPCACHE` folder.| -|`allow-appcache-meta-recursive`|This allows full recursive read access to metadata of the `$APPCACHE` folder, including file listing and statistics.| -|`allow-appcache-meta`|This allows non-recursive read access to metadata of the `$APPCACHE` folder, including file listing and statistics.| -|`scope-appcache-recursive`|This scope permits recursive access to the complete `$APPCACHE` folder, including sub directories and files.| -|`scope-appcache`|This scope permits access to all files and list content of top level directories in the `$APPCACHE`folder.| -|`scope-appcache-index`|This scope permits to list all files and folders in the `$APPCACHE`folder.| -|`allow-appconfig-read-recursive`|This allows full recursive read access to the complete `$APPCONFIG` folder, files and subdirectories.| -|`allow-appconfig-write-recursive`|This allows full recursive write access to the complete `$APPCONFIG` folder, files and subdirectories.| -|`allow-appconfig-read`|This allows non-recursive read access to the `$APPCONFIG` folder.| -|`allow-appconfig-write`|This allows non-recursive write access to the `$APPCONFIG` folder.| -|`allow-appconfig-meta-recursive`|This allows full recursive read access to metadata of the `$APPCONFIG` folder, including file listing and statistics.| -|`allow-appconfig-meta`|This allows non-recursive read access to metadata of the `$APPCONFIG` folder, including file listing and statistics.| -|`scope-appconfig-recursive`|This scope permits recursive access to the complete `$APPCONFIG` folder, including sub directories and files.| -|`scope-appconfig`|This scope permits access to all files and list content of top level directories in the `$APPCONFIG`folder.| -|`scope-appconfig-index`|This scope permits to list all files and folders in the `$APPCONFIG`folder.| -|`allow-appdata-read-recursive`|This allows full recursive read access to the complete `$APPDATA` folder, files and subdirectories.| -|`allow-appdata-write-recursive`|This allows full recursive write access to the complete `$APPDATA` folder, files and subdirectories.| -|`allow-appdata-read`|This allows non-recursive read access to the `$APPDATA` folder.| -|`allow-appdata-write`|This allows non-recursive write access to the `$APPDATA` folder.| -|`allow-appdata-meta-recursive`|This allows full recursive read access to metadata of the `$APPDATA` folder, including file listing and statistics.| -|`allow-appdata-meta`|This allows non-recursive read access to metadata of the `$APPDATA` folder, including file listing and statistics.| -|`scope-appdata-recursive`|This scope permits recursive access to the complete `$APPDATA` folder, including sub directories and files.| -|`scope-appdata`|This scope permits access to all files and list content of top level directories in the `$APPDATA`folder.| -|`scope-appdata-index`|This scope permits to list all files and folders in the `$APPDATA`folder.| -|`allow-applocaldata-read-recursive`|This allows full recursive read access to the complete `$APPLOCALDATA` folder, files and subdirectories.| -|`allow-applocaldata-write-recursive`|This allows full recursive write access to the complete `$APPLOCALDATA` folder, files and subdirectories.| -|`allow-applocaldata-read`|This allows non-recursive read access to the `$APPLOCALDATA` folder.| -|`allow-applocaldata-write`|This allows non-recursive write access to the `$APPLOCALDATA` folder.| -|`allow-applocaldata-meta-recursive`|This allows full recursive read access to metadata of the `$APPLOCALDATA` folder, including file listing and statistics.| -|`allow-applocaldata-meta`|This allows non-recursive read access to metadata of the `$APPLOCALDATA` folder, including file listing and statistics.| -|`scope-applocaldata-recursive`|This scope permits recursive access to the complete `$APPLOCALDATA` folder, including sub directories and files.| -|`scope-applocaldata`|This scope permits access to all files and list content of top level directories in the `$APPLOCALDATA`folder.| -|`scope-applocaldata-index`|This scope permits to list all files and folders in the `$APPLOCALDATA`folder.| -|`allow-applog-read-recursive`|This allows full recursive read access to the complete `$APPLOG` folder, files and subdirectories.| -|`allow-applog-write-recursive`|This allows full recursive write access to the complete `$APPLOG` folder, files and subdirectories.| -|`allow-applog-read`|This allows non-recursive read access to the `$APPLOG` folder.| -|`allow-applog-write`|This allows non-recursive write access to the `$APPLOG` folder.| -|`allow-applog-meta-recursive`|This allows full recursive read access to metadata of the `$APPLOG` folder, including file listing and statistics.| -|`allow-applog-meta`|This allows non-recursive read access to metadata of the `$APPLOG` folder, including file listing and statistics.| -|`scope-applog-recursive`|This scope permits recursive access to the complete `$APPLOG` folder, including sub directories and files.| -|`scope-applog`|This scope permits access to all files and list content of top level directories in the `$APPLOG`folder.| -|`scope-applog-index`|This scope permits to list all files and folders in the `$APPLOG`folder.| -|`allow-audio-read-recursive`|This allows full recursive read access to the complete `$AUDIO` folder, files and subdirectories.| -|`allow-audio-write-recursive`|This allows full recursive write access to the complete `$AUDIO` folder, files and subdirectories.| -|`allow-audio-read`|This allows non-recursive read access to the `$AUDIO` folder.| -|`allow-audio-write`|This allows non-recursive write access to the `$AUDIO` folder.| -|`allow-audio-meta-recursive`|This allows full recursive read access to metadata of the `$AUDIO` folder, including file listing and statistics.| -|`allow-audio-meta`|This allows non-recursive read access to metadata of the `$AUDIO` folder, including file listing and statistics.| -|`scope-audio-recursive`|This scope permits recursive access to the complete `$AUDIO` folder, including sub directories and files.| -|`scope-audio`|This scope permits access to all files and list content of top level directories in the `$AUDIO`folder.| -|`scope-audio-index`|This scope permits to list all files and folders in the `$AUDIO`folder.| -|`allow-cache-read-recursive`|This allows full recursive read access to the complete `$CACHE` folder, files and subdirectories.| -|`allow-cache-write-recursive`|This allows full recursive write access to the complete `$CACHE` folder, files and subdirectories.| -|`allow-cache-read`|This allows non-recursive read access to the `$CACHE` folder.| -|`allow-cache-write`|This allows non-recursive write access to the `$CACHE` folder.| -|`allow-cache-meta-recursive`|This allows full recursive read access to metadata of the `$CACHE` folder, including file listing and statistics.| -|`allow-cache-meta`|This allows non-recursive read access to metadata of the `$CACHE` folder, including file listing and statistics.| -|`scope-cache-recursive`|This scope permits recursive access to the complete `$CACHE` folder, including sub directories and files.| -|`scope-cache`|This scope permits access to all files and list content of top level directories in the `$CACHE`folder.| -|`scope-cache-index`|This scope permits to list all files and folders in the `$CACHE`folder.| -|`allow-config-read-recursive`|This allows full recursive read access to the complete `$CONFIG` folder, files and subdirectories.| -|`allow-config-write-recursive`|This allows full recursive write access to the complete `$CONFIG` folder, files and subdirectories.| -|`allow-config-read`|This allows non-recursive read access to the `$CONFIG` folder.| -|`allow-config-write`|This allows non-recursive write access to the `$CONFIG` folder.| -|`allow-config-meta-recursive`|This allows full recursive read access to metadata of the `$CONFIG` folder, including file listing and statistics.| -|`allow-config-meta`|This allows non-recursive read access to metadata of the `$CONFIG` folder, including file listing and statistics.| -|`scope-config-recursive`|This scope permits recursive access to the complete `$CONFIG` folder, including sub directories and files.| -|`scope-config`|This scope permits access to all files and list content of top level directories in the `$CONFIG`folder.| -|`scope-config-index`|This scope permits to list all files and folders in the `$CONFIG`folder.| -|`allow-data-read-recursive`|This allows full recursive read access to the complete `$DATA` folder, files and subdirectories.| -|`allow-data-write-recursive`|This allows full recursive write access to the complete `$DATA` folder, files and subdirectories.| -|`allow-data-read`|This allows non-recursive read access to the `$DATA` folder.| -|`allow-data-write`|This allows non-recursive write access to the `$DATA` folder.| -|`allow-data-meta-recursive`|This allows full recursive read access to metadata of the `$DATA` folder, including file listing and statistics.| -|`allow-data-meta`|This allows non-recursive read access to metadata of the `$DATA` folder, including file listing and statistics.| -|`scope-data-recursive`|This scope permits recursive access to the complete `$DATA` folder, including sub directories and files.| -|`scope-data`|This scope permits access to all files and list content of top level directories in the `$DATA`folder.| -|`scope-data-index`|This scope permits to list all files and folders in the `$DATA`folder.| -|`allow-desktop-read-recursive`|This allows full recursive read access to the complete `$DESKTOP` folder, files and subdirectories.| -|`allow-desktop-write-recursive`|This allows full recursive write access to the complete `$DESKTOP` folder, files and subdirectories.| -|`allow-desktop-read`|This allows non-recursive read access to the `$DESKTOP` folder.| -|`allow-desktop-write`|This allows non-recursive write access to the `$DESKTOP` folder.| -|`allow-desktop-meta-recursive`|This allows full recursive read access to metadata of the `$DESKTOP` folder, including file listing and statistics.| -|`allow-desktop-meta`|This allows non-recursive read access to metadata of the `$DESKTOP` folder, including file listing and statistics.| -|`scope-desktop-recursive`|This scope permits recursive access to the complete `$DESKTOP` folder, including sub directories and files.| -|`scope-desktop`|This scope permits access to all files and list content of top level directories in the `$DESKTOP`folder.| -|`scope-desktop-index`|This scope permits to list all files and folders in the `$DESKTOP`folder.| -|`allow-document-read-recursive`|This allows full recursive read access to the complete `$DOCUMENT` folder, files and subdirectories.| -|`allow-document-write-recursive`|This allows full recursive write access to the complete `$DOCUMENT` folder, files and subdirectories.| -|`allow-document-read`|This allows non-recursive read access to the `$DOCUMENT` folder.| -|`allow-document-write`|This allows non-recursive write access to the `$DOCUMENT` folder.| -|`allow-document-meta-recursive`|This allows full recursive read access to metadata of the `$DOCUMENT` folder, including file listing and statistics.| -|`allow-document-meta`|This allows non-recursive read access to metadata of the `$DOCUMENT` folder, including file listing and statistics.| -|`scope-document-recursive`|This scope permits recursive access to the complete `$DOCUMENT` folder, including sub directories and files.| -|`scope-document`|This scope permits access to all files and list content of top level directories in the `$DOCUMENT`folder.| -|`scope-document-index`|This scope permits to list all files and folders in the `$DOCUMENT`folder.| -|`allow-download-read-recursive`|This allows full recursive read access to the complete `$DOWNLOAD` folder, files and subdirectories.| -|`allow-download-write-recursive`|This allows full recursive write access to the complete `$DOWNLOAD` folder, files and subdirectories.| -|`allow-download-read`|This allows non-recursive read access to the `$DOWNLOAD` folder.| -|`allow-download-write`|This allows non-recursive write access to the `$DOWNLOAD` folder.| -|`allow-download-meta-recursive`|This allows full recursive read access to metadata of the `$DOWNLOAD` folder, including file listing and statistics.| -|`allow-download-meta`|This allows non-recursive read access to metadata of the `$DOWNLOAD` folder, including file listing and statistics.| -|`scope-download-recursive`|This scope permits recursive access to the complete `$DOWNLOAD` folder, including sub directories and files.| -|`scope-download`|This scope permits access to all files and list content of top level directories in the `$DOWNLOAD`folder.| -|`scope-download-index`|This scope permits to list all files and folders in the `$DOWNLOAD`folder.| -|`allow-exe-read-recursive`|This allows full recursive read access to the complete `$EXE` folder, files and subdirectories.| -|`allow-exe-write-recursive`|This allows full recursive write access to the complete `$EXE` folder, files and subdirectories.| -|`allow-exe-read`|This allows non-recursive read access to the `$EXE` folder.| -|`allow-exe-write`|This allows non-recursive write access to the `$EXE` folder.| -|`allow-exe-meta-recursive`|This allows full recursive read access to metadata of the `$EXE` folder, including file listing and statistics.| -|`allow-exe-meta`|This allows non-recursive read access to metadata of the `$EXE` folder, including file listing and statistics.| -|`scope-exe-recursive`|This scope permits recursive access to the complete `$EXE` folder, including sub directories and files.| -|`scope-exe`|This scope permits access to all files and list content of top level directories in the `$EXE`folder.| -|`scope-exe-index`|This scope permits to list all files and folders in the `$EXE`folder.| -|`allow-font-read-recursive`|This allows full recursive read access to the complete `$FONT` folder, files and subdirectories.| -|`allow-font-write-recursive`|This allows full recursive write access to the complete `$FONT` folder, files and subdirectories.| -|`allow-font-read`|This allows non-recursive read access to the `$FONT` folder.| -|`allow-font-write`|This allows non-recursive write access to the `$FONT` folder.| -|`allow-font-meta-recursive`|This allows full recursive read access to metadata of the `$FONT` folder, including file listing and statistics.| -|`allow-font-meta`|This allows non-recursive read access to metadata of the `$FONT` folder, including file listing and statistics.| -|`scope-font-recursive`|This scope permits recursive access to the complete `$FONT` folder, including sub directories and files.| -|`scope-font`|This scope permits access to all files and list content of top level directories in the `$FONT`folder.| -|`scope-font-index`|This scope permits to list all files and folders in the `$FONT`folder.| -|`allow-home-read-recursive`|This allows full recursive read access to the complete `$HOME` folder, files and subdirectories.| -|`allow-home-write-recursive`|This allows full recursive write access to the complete `$HOME` folder, files and subdirectories.| -|`allow-home-read`|This allows non-recursive read access to the `$HOME` folder.| -|`allow-home-write`|This allows non-recursive write access to the `$HOME` folder.| -|`allow-home-meta-recursive`|This allows full recursive read access to metadata of the `$HOME` folder, including file listing and statistics.| -|`allow-home-meta`|This allows non-recursive read access to metadata of the `$HOME` folder, including file listing and statistics.| -|`scope-home-recursive`|This scope permits recursive access to the complete `$HOME` folder, including sub directories and files.| -|`scope-home`|This scope permits access to all files and list content of top level directories in the `$HOME`folder.| -|`scope-home-index`|This scope permits to list all files and folders in the `$HOME`folder.| -|`allow-localdata-read-recursive`|This allows full recursive read access to the complete `$LOCALDATA` folder, files and subdirectories.| -|`allow-localdata-write-recursive`|This allows full recursive write access to the complete `$LOCALDATA` folder, files and subdirectories.| -|`allow-localdata-read`|This allows non-recursive read access to the `$LOCALDATA` folder.| -|`allow-localdata-write`|This allows non-recursive write access to the `$LOCALDATA` folder.| -|`allow-localdata-meta-recursive`|This allows full recursive read access to metadata of the `$LOCALDATA` folder, including file listing and statistics.| -|`allow-localdata-meta`|This allows non-recursive read access to metadata of the `$LOCALDATA` folder, including file listing and statistics.| -|`scope-localdata-recursive`|This scope permits recursive access to the complete `$LOCALDATA` folder, including sub directories and files.| -|`scope-localdata`|This scope permits access to all files and list content of top level directories in the `$LOCALDATA`folder.| -|`scope-localdata-index`|This scope permits to list all files and folders in the `$LOCALDATA`folder.| -|`allow-log-read-recursive`|This allows full recursive read access to the complete `$LOG` folder, files and subdirectories.| -|`allow-log-write-recursive`|This allows full recursive write access to the complete `$LOG` folder, files and subdirectories.| -|`allow-log-read`|This allows non-recursive read access to the `$LOG` folder.| -|`allow-log-write`|This allows non-recursive write access to the `$LOG` folder.| -|`allow-log-meta-recursive`|This allows full recursive read access to metadata of the `$LOG` folder, including file listing and statistics.| -|`allow-log-meta`|This allows non-recursive read access to metadata of the `$LOG` folder, including file listing and statistics.| -|`scope-log-recursive`|This scope permits recursive access to the complete `$LOG` folder, including sub directories and files.| -|`scope-log`|This scope permits access to all files and list content of top level directories in the `$LOG`folder.| -|`scope-log-index`|This scope permits to list all files and folders in the `$LOG`folder.| -|`allow-picture-read-recursive`|This allows full recursive read access to the complete `$PICTURE` folder, files and subdirectories.| -|`allow-picture-write-recursive`|This allows full recursive write access to the complete `$PICTURE` folder, files and subdirectories.| -|`allow-picture-read`|This allows non-recursive read access to the `$PICTURE` folder.| -|`allow-picture-write`|This allows non-recursive write access to the `$PICTURE` folder.| -|`allow-picture-meta-recursive`|This allows full recursive read access to metadata of the `$PICTURE` folder, including file listing and statistics.| -|`allow-picture-meta`|This allows non-recursive read access to metadata of the `$PICTURE` folder, including file listing and statistics.| -|`scope-picture-recursive`|This scope permits recursive access to the complete `$PICTURE` folder, including sub directories and files.| -|`scope-picture`|This scope permits access to all files and list content of top level directories in the `$PICTURE`folder.| -|`scope-picture-index`|This scope permits to list all files and folders in the `$PICTURE`folder.| -|`allow-public-read-recursive`|This allows full recursive read access to the complete `$PUBLIC` folder, files and subdirectories.| -|`allow-public-write-recursive`|This allows full recursive write access to the complete `$PUBLIC` folder, files and subdirectories.| -|`allow-public-read`|This allows non-recursive read access to the `$PUBLIC` folder.| -|`allow-public-write`|This allows non-recursive write access to the `$PUBLIC` folder.| -|`allow-public-meta-recursive`|This allows full recursive read access to metadata of the `$PUBLIC` folder, including file listing and statistics.| -|`allow-public-meta`|This allows non-recursive read access to metadata of the `$PUBLIC` folder, including file listing and statistics.| -|`scope-public-recursive`|This scope permits recursive access to the complete `$PUBLIC` folder, including sub directories and files.| -|`scope-public`|This scope permits access to all files and list content of top level directories in the `$PUBLIC`folder.| -|`scope-public-index`|This scope permits to list all files and folders in the `$PUBLIC`folder.| -|`allow-resource-read-recursive`|This allows full recursive read access to the complete `$RESOURCE` folder, files and subdirectories.| -|`allow-resource-write-recursive`|This allows full recursive write access to the complete `$RESOURCE` folder, files and subdirectories.| -|`allow-resource-read`|This allows non-recursive read access to the `$RESOURCE` folder.| -|`allow-resource-write`|This allows non-recursive write access to the `$RESOURCE` folder.| -|`allow-resource-meta-recursive`|This allows full recursive read access to metadata of the `$RESOURCE` folder, including file listing and statistics.| -|`allow-resource-meta`|This allows non-recursive read access to metadata of the `$RESOURCE` folder, including file listing and statistics.| -|`scope-resource-recursive`|This scope permits recursive access to the complete `$RESOURCE` folder, including sub directories and files.| -|`scope-resource`|This scope permits access to all files and list content of top level directories in the `$RESOURCE`folder.| -|`scope-resource-index`|This scope permits to list all files and folders in the `$RESOURCE`folder.| -|`allow-runtime-read-recursive`|This allows full recursive read access to the complete `$RUNTIME` folder, files and subdirectories.| -|`allow-runtime-write-recursive`|This allows full recursive write access to the complete `$RUNTIME` folder, files and subdirectories.| -|`allow-runtime-read`|This allows non-recursive read access to the `$RUNTIME` folder.| -|`allow-runtime-write`|This allows non-recursive write access to the `$RUNTIME` folder.| -|`allow-runtime-meta-recursive`|This allows full recursive read access to metadata of the `$RUNTIME` folder, including file listing and statistics.| -|`allow-runtime-meta`|This allows non-recursive read access to metadata of the `$RUNTIME` folder, including file listing and statistics.| -|`scope-runtime-recursive`|This scope permits recursive access to the complete `$RUNTIME` folder, including sub directories and files.| -|`scope-runtime`|This scope permits access to all files and list content of top level directories in the `$RUNTIME`folder.| -|`scope-runtime-index`|This scope permits to list all files and folders in the `$RUNTIME`folder.| -|`allow-temp-read-recursive`|This allows full recursive read access to the complete `$TEMP` folder, files and subdirectories.| -|`allow-temp-write-recursive`|This allows full recursive write access to the complete `$TEMP` folder, files and subdirectories.| -|`allow-temp-read`|This allows non-recursive read access to the `$TEMP` folder.| -|`allow-temp-write`|This allows non-recursive write access to the `$TEMP` folder.| -|`allow-temp-meta-recursive`|This allows full recursive read access to metadata of the `$TEMP` folder, including file listing and statistics.| -|`allow-temp-meta`|This allows non-recursive read access to metadata of the `$TEMP` folder, including file listing and statistics.| -|`scope-temp-recursive`|This scope permits recursive access to the complete `$TEMP` folder, including sub directories and files.| -|`scope-temp`|This scope permits access to all files and list content of top level directories in the `$TEMP`folder.| -|`scope-temp-index`|This scope permits to list all files and folders in the `$TEMP`folder.| -|`allow-template-read-recursive`|This allows full recursive read access to the complete `$TEMPLATE` folder, files and subdirectories.| -|`allow-template-write-recursive`|This allows full recursive write access to the complete `$TEMPLATE` folder, files and subdirectories.| -|`allow-template-read`|This allows non-recursive read access to the `$TEMPLATE` folder.| -|`allow-template-write`|This allows non-recursive write access to the `$TEMPLATE` folder.| -|`allow-template-meta-recursive`|This allows full recursive read access to metadata of the `$TEMPLATE` folder, including file listing and statistics.| -|`allow-template-meta`|This allows non-recursive read access to metadata of the `$TEMPLATE` folder, including file listing and statistics.| -|`scope-template-recursive`|This scope permits recursive access to the complete `$TEMPLATE` folder, including sub directories and files.| -|`scope-template`|This scope permits access to all files and list content of top level directories in the `$TEMPLATE`folder.| -|`scope-template-index`|This scope permits to list all files and folders in the `$TEMPLATE`folder.| -|`allow-video-read-recursive`|This allows full recursive read access to the complete `$VIDEO` folder, files and subdirectories.| -|`allow-video-write-recursive`|This allows full recursive write access to the complete `$VIDEO` folder, files and subdirectories.| -|`allow-video-read`|This allows non-recursive read access to the `$VIDEO` folder.| -|`allow-video-write`|This allows non-recursive write access to the `$VIDEO` folder.| -|`allow-video-meta-recursive`|This allows full recursive read access to metadata of the `$VIDEO` folder, including file listing and statistics.| -|`allow-video-meta`|This allows non-recursive read access to metadata of the `$VIDEO` folder, including file listing and statistics.| -|`scope-video-recursive`|This scope permits recursive access to the complete `$VIDEO` folder, including sub directories and files.| -|`scope-video`|This scope permits access to all files and list content of top level directories in the `$VIDEO`folder.| -|`scope-video-index`|This scope permits to list all files and folders in the `$VIDEO`folder.| -|`allow-copy-file`|Enables the copy_file command without any pre-configured scope.| -|`deny-copy-file`|Denies the copy_file command without any pre-configured scope.| -|`allow-create`|Enables the create command without any pre-configured scope.| -|`deny-create`|Denies the create command without any pre-configured scope.| -|`allow-exists`|Enables the exists command without any pre-configured scope.| -|`deny-exists`|Denies the exists command without any pre-configured scope.| -|`allow-fstat`|Enables the fstat command without any pre-configured scope.| -|`deny-fstat`|Denies the fstat command without any pre-configured scope.| -|`allow-ftruncate`|Enables the ftruncate command without any pre-configured scope.| -|`deny-ftruncate`|Denies the ftruncate command without any pre-configured scope.| -|`allow-lstat`|Enables the lstat command without any pre-configured scope.| -|`deny-lstat`|Denies the lstat command without any pre-configured scope.| -|`allow-mkdir`|Enables the mkdir command without any pre-configured scope.| -|`deny-mkdir`|Denies the mkdir command without any pre-configured scope.| -|`allow-open`|Enables the open command without any pre-configured scope.| -|`deny-open`|Denies the open command without any pre-configured scope.| -|`allow-read`|Enables the read command without any pre-configured scope.| -|`deny-read`|Denies the read command without any pre-configured scope.| -|`allow-read-dir`|Enables the read_dir command without any pre-configured scope.| -|`deny-read-dir`|Denies the read_dir command without any pre-configured scope.| -|`allow-read-file`|Enables the read_file command without any pre-configured scope.| -|`deny-read-file`|Denies the read_file command without any pre-configured scope.| -|`allow-read-text-file`|Enables the read_text_file command without any pre-configured scope.| -|`deny-read-text-file`|Denies the read_text_file command without any pre-configured scope.| -|`allow-read-text-file-lines`|Enables the read_text_file_lines command without any pre-configured scope.| -|`deny-read-text-file-lines`|Denies the read_text_file_lines command without any pre-configured scope.| -|`allow-read-text-file-lines-next`|Enables the read_text_file_lines_next command without any pre-configured scope.| -|`deny-read-text-file-lines-next`|Denies the read_text_file_lines_next command without any pre-configured scope.| -|`allow-remove`|Enables the remove command without any pre-configured scope.| -|`deny-remove`|Denies the remove command without any pre-configured scope.| -|`allow-rename`|Enables the rename command without any pre-configured scope.| -|`deny-rename`|Denies the rename command without any pre-configured scope.| -|`allow-seek`|Enables the seek command without any pre-configured scope.| -|`deny-seek`|Denies the seek command without any pre-configured scope.| -|`allow-stat`|Enables the stat command without any pre-configured scope.| -|`deny-stat`|Denies the stat command without any pre-configured scope.| -|`allow-truncate`|Enables the truncate command without any pre-configured scope.| -|`deny-truncate`|Denies the truncate command without any pre-configured scope.| -|`allow-unwatch`|Enables the unwatch command without any pre-configured scope.| -|`deny-unwatch`|Denies the unwatch command without any pre-configured scope.| -|`allow-watch`|Enables the watch command without any pre-configured scope.| -|`deny-watch`|Denies the watch command without any pre-configured scope.| -|`allow-write`|Enables the write command without any pre-configured scope.| -|`deny-write`|Denies the write command without any pre-configured scope.| -|`allow-write-file`|Enables the write_file command without any pre-configured scope.| -|`deny-write-file`|Denies the write_file command without any pre-configured scope.| -|`allow-write-text-file`|Enables the write_text_file command without any pre-configured scope.| -|`deny-write-text-file`|Denies the write_text_file command without any pre-configured scope.| -|`create-app-specific-dirs`|This permissions allows to create the application specific directories. -| -|`default`|This set of permissions describes the what kind of +## Default Permission + +This set of permissions describes the what kind of file system access the `fs` plugin has enabled or denied by default. #### Granted Permissions @@ -299,21 +24,3730 @@ This default permission set prevents access to critical components of the Tauri application by default. On Windows the webview data folder access is denied. -| -|`deny-default`|This denies access to dangerous Tauri relevant files and folders by default.| -|`deny-webview-data-linux`|This denies read access to the -`$APPLOCALDATA` folder on linux as the webview data and configuration values are stored here. -Allowing access can lead to sensitive information disclosure and should be well considered.| -|`deny-webview-data-windows`|This denies read access to the -`$APPLOCALDATA/EBWebView` folder on windows as the webview data and configuration values are stored here. -Allowing access can lead to sensitive information disclosure and should be well considered.| -|`read-all`|This enables all read related commands without any pre-configured accessible paths.| -|`read-app-specific-dirs-recursive`|This permission allows recursive read functionality on the application -specific base directories. -| -|`read-dirs`|This enables directory read and file metadata related commands without any pre-configured accessible paths.| -|`read-files`|This enables file read related commands without any pre-configured accessible paths.| -|`read-meta`|This enables all index or metadata related commands without any pre-configured accessible paths.| -|`scope`|An empty permission you can use to modify the global scope.| -|`write-all`|This enables all write related commands without any pre-configured accessible paths.| -|`write-files`|This enables all file write related commands without any pre-configured accessible paths.| + + +- `create-app-specific-dirs` +- `read-app-specific-dirs-recursive` +- `deny-default` + +### Permission Table + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
IdentifierDescription
+ +`fs:allow-app-read-recursive` + + + +This allows full recursive read access to the complete `$APP` folder, files and subdirectories. + +
+ +`fs:allow-app-write-recursive` + + + +This allows full recursive write access to the complete `$APP` folder, files and subdirectories. + +
+ +`fs:allow-app-read` + + + +This allows non-recursive read access to the `$APP` folder. + +
+ +`fs:allow-app-write` + + + +This allows non-recursive write access to the `$APP` folder. + +
+ +`fs:allow-app-meta-recursive` + + + +This allows full recursive read access to metadata of the `$APP` folder, including file listing and statistics. + +
+ +`fs:allow-app-meta` + + + +This allows non-recursive read access to metadata of the `$APP` folder, including file listing and statistics. + +
+ +`fs:scope-app-recursive` + + + +This scope permits recursive access to the complete `$APP` folder, including sub directories and files. + +
+ +`fs:scope-app` + + + +This scope permits access to all files and list content of top level directories in the `$APP`folder. + +
+ +`fs:scope-app-index` + + + +This scope permits to list all files and folders in the `$APP`folder. + +
+ +`fs:allow-appcache-read-recursive` + + + +This allows full recursive read access to the complete `$APPCACHE` folder, files and subdirectories. + +
+ +`fs:allow-appcache-write-recursive` + + + +This allows full recursive write access to the complete `$APPCACHE` folder, files and subdirectories. + +
+ +`fs:allow-appcache-read` + + + +This allows non-recursive read access to the `$APPCACHE` folder. + +
+ +`fs:allow-appcache-write` + + + +This allows non-recursive write access to the `$APPCACHE` folder. + +
+ +`fs:allow-appcache-meta-recursive` + + + +This allows full recursive read access to metadata of the `$APPCACHE` folder, including file listing and statistics. + +
+ +`fs:allow-appcache-meta` + + + +This allows non-recursive read access to metadata of the `$APPCACHE` folder, including file listing and statistics. + +
+ +`fs:scope-appcache-recursive` + + + +This scope permits recursive access to the complete `$APPCACHE` folder, including sub directories and files. + +
+ +`fs:scope-appcache` + + + +This scope permits access to all files and list content of top level directories in the `$APPCACHE`folder. + +
+ +`fs:scope-appcache-index` + + + +This scope permits to list all files and folders in the `$APPCACHE`folder. + +
+ +`fs:allow-appconfig-read-recursive` + + + +This allows full recursive read access to the complete `$APPCONFIG` folder, files and subdirectories. + +
+ +`fs:allow-appconfig-write-recursive` + + + +This allows full recursive write access to the complete `$APPCONFIG` folder, files and subdirectories. + +
+ +`fs:allow-appconfig-read` + + + +This allows non-recursive read access to the `$APPCONFIG` folder. + +
+ +`fs:allow-appconfig-write` + + + +This allows non-recursive write access to the `$APPCONFIG` folder. + +
+ +`fs:allow-appconfig-meta-recursive` + + + +This allows full recursive read access to metadata of the `$APPCONFIG` folder, including file listing and statistics. + +
+ +`fs:allow-appconfig-meta` + + + +This allows non-recursive read access to metadata of the `$APPCONFIG` folder, including file listing and statistics. + +
+ +`fs:scope-appconfig-recursive` + + + +This scope permits recursive access to the complete `$APPCONFIG` folder, including sub directories and files. + +
+ +`fs:scope-appconfig` + + + +This scope permits access to all files and list content of top level directories in the `$APPCONFIG`folder. + +
+ +`fs:scope-appconfig-index` + + + +This scope permits to list all files and folders in the `$APPCONFIG`folder. + +
+ +`fs:allow-appdata-read-recursive` + + + +This allows full recursive read access to the complete `$APPDATA` folder, files and subdirectories. + +
+ +`fs:allow-appdata-write-recursive` + + + +This allows full recursive write access to the complete `$APPDATA` folder, files and subdirectories. + +
+ +`fs:allow-appdata-read` + + + +This allows non-recursive read access to the `$APPDATA` folder. + +
+ +`fs:allow-appdata-write` + + + +This allows non-recursive write access to the `$APPDATA` folder. + +
+ +`fs:allow-appdata-meta-recursive` + + + +This allows full recursive read access to metadata of the `$APPDATA` folder, including file listing and statistics. + +
+ +`fs:allow-appdata-meta` + + + +This allows non-recursive read access to metadata of the `$APPDATA` folder, including file listing and statistics. + +
+ +`fs:scope-appdata-recursive` + + + +This scope permits recursive access to the complete `$APPDATA` folder, including sub directories and files. + +
+ +`fs:scope-appdata` + + + +This scope permits access to all files and list content of top level directories in the `$APPDATA`folder. + +
+ +`fs:scope-appdata-index` + + + +This scope permits to list all files and folders in the `$APPDATA`folder. + +
+ +`fs:allow-applocaldata-read-recursive` + + + +This allows full recursive read access to the complete `$APPLOCALDATA` folder, files and subdirectories. + +
+ +`fs:allow-applocaldata-write-recursive` + + + +This allows full recursive write access to the complete `$APPLOCALDATA` folder, files and subdirectories. + +
+ +`fs:allow-applocaldata-read` + + + +This allows non-recursive read access to the `$APPLOCALDATA` folder. + +
+ +`fs:allow-applocaldata-write` + + + +This allows non-recursive write access to the `$APPLOCALDATA` folder. + +
+ +`fs:allow-applocaldata-meta-recursive` + + + +This allows full recursive read access to metadata of the `$APPLOCALDATA` folder, including file listing and statistics. + +
+ +`fs:allow-applocaldata-meta` + + + +This allows non-recursive read access to metadata of the `$APPLOCALDATA` folder, including file listing and statistics. + +
+ +`fs:scope-applocaldata-recursive` + + + +This scope permits recursive access to the complete `$APPLOCALDATA` folder, including sub directories and files. + +
+ +`fs:scope-applocaldata` + + + +This scope permits access to all files and list content of top level directories in the `$APPLOCALDATA`folder. + +
+ +`fs:scope-applocaldata-index` + + + +This scope permits to list all files and folders in the `$APPLOCALDATA`folder. + +
+ +`fs:allow-applog-read-recursive` + + + +This allows full recursive read access to the complete `$APPLOG` folder, files and subdirectories. + +
+ +`fs:allow-applog-write-recursive` + + + +This allows full recursive write access to the complete `$APPLOG` folder, files and subdirectories. + +
+ +`fs:allow-applog-read` + + + +This allows non-recursive read access to the `$APPLOG` folder. + +
+ +`fs:allow-applog-write` + + + +This allows non-recursive write access to the `$APPLOG` folder. + +
+ +`fs:allow-applog-meta-recursive` + + + +This allows full recursive read access to metadata of the `$APPLOG` folder, including file listing and statistics. + +
+ +`fs:allow-applog-meta` + + + +This allows non-recursive read access to metadata of the `$APPLOG` folder, including file listing and statistics. + +
+ +`fs:scope-applog-recursive` + + + +This scope permits recursive access to the complete `$APPLOG` folder, including sub directories and files. + +
+ +`fs:scope-applog` + + + +This scope permits access to all files and list content of top level directories in the `$APPLOG`folder. + +
+ +`fs:scope-applog-index` + + + +This scope permits to list all files and folders in the `$APPLOG`folder. + +
+ +`fs:allow-audio-read-recursive` + + + +This allows full recursive read access to the complete `$AUDIO` folder, files and subdirectories. + +
+ +`fs:allow-audio-write-recursive` + + + +This allows full recursive write access to the complete `$AUDIO` folder, files and subdirectories. + +
+ +`fs:allow-audio-read` + + + +This allows non-recursive read access to the `$AUDIO` folder. + +
+ +`fs:allow-audio-write` + + + +This allows non-recursive write access to the `$AUDIO` folder. + +
+ +`fs:allow-audio-meta-recursive` + + + +This allows full recursive read access to metadata of the `$AUDIO` folder, including file listing and statistics. + +
+ +`fs:allow-audio-meta` + + + +This allows non-recursive read access to metadata of the `$AUDIO` folder, including file listing and statistics. + +
+ +`fs:scope-audio-recursive` + + + +This scope permits recursive access to the complete `$AUDIO` folder, including sub directories and files. + +
+ +`fs:scope-audio` + + + +This scope permits access to all files and list content of top level directories in the `$AUDIO`folder. + +
+ +`fs:scope-audio-index` + + + +This scope permits to list all files and folders in the `$AUDIO`folder. + +
+ +`fs:allow-cache-read-recursive` + + + +This allows full recursive read access to the complete `$CACHE` folder, files and subdirectories. + +
+ +`fs:allow-cache-write-recursive` + + + +This allows full recursive write access to the complete `$CACHE` folder, files and subdirectories. + +
+ +`fs:allow-cache-read` + + + +This allows non-recursive read access to the `$CACHE` folder. + +
+ +`fs:allow-cache-write` + + + +This allows non-recursive write access to the `$CACHE` folder. + +
+ +`fs:allow-cache-meta-recursive` + + + +This allows full recursive read access to metadata of the `$CACHE` folder, including file listing and statistics. + +
+ +`fs:allow-cache-meta` + + + +This allows non-recursive read access to metadata of the `$CACHE` folder, including file listing and statistics. + +
+ +`fs:scope-cache-recursive` + + + +This scope permits recursive access to the complete `$CACHE` folder, including sub directories and files. + +
+ +`fs:scope-cache` + + + +This scope permits access to all files and list content of top level directories in the `$CACHE`folder. + +
+ +`fs:scope-cache-index` + + + +This scope permits to list all files and folders in the `$CACHE`folder. + +
+ +`fs:allow-config-read-recursive` + + + +This allows full recursive read access to the complete `$CONFIG` folder, files and subdirectories. + +
+ +`fs:allow-config-write-recursive` + + + +This allows full recursive write access to the complete `$CONFIG` folder, files and subdirectories. + +
+ +`fs:allow-config-read` + + + +This allows non-recursive read access to the `$CONFIG` folder. + +
+ +`fs:allow-config-write` + + + +This allows non-recursive write access to the `$CONFIG` folder. + +
+ +`fs:allow-config-meta-recursive` + + + +This allows full recursive read access to metadata of the `$CONFIG` folder, including file listing and statistics. + +
+ +`fs:allow-config-meta` + + + +This allows non-recursive read access to metadata of the `$CONFIG` folder, including file listing and statistics. + +
+ +`fs:scope-config-recursive` + + + +This scope permits recursive access to the complete `$CONFIG` folder, including sub directories and files. + +
+ +`fs:scope-config` + + + +This scope permits access to all files and list content of top level directories in the `$CONFIG`folder. + +
+ +`fs:scope-config-index` + + + +This scope permits to list all files and folders in the `$CONFIG`folder. + +
+ +`fs:allow-data-read-recursive` + + + +This allows full recursive read access to the complete `$DATA` folder, files and subdirectories. + +
+ +`fs:allow-data-write-recursive` + + + +This allows full recursive write access to the complete `$DATA` folder, files and subdirectories. + +
+ +`fs:allow-data-read` + + + +This allows non-recursive read access to the `$DATA` folder. + +
+ +`fs:allow-data-write` + + + +This allows non-recursive write access to the `$DATA` folder. + +
+ +`fs:allow-data-meta-recursive` + + + +This allows full recursive read access to metadata of the `$DATA` folder, including file listing and statistics. + +
+ +`fs:allow-data-meta` + + + +This allows non-recursive read access to metadata of the `$DATA` folder, including file listing and statistics. + +
+ +`fs:scope-data-recursive` + + + +This scope permits recursive access to the complete `$DATA` folder, including sub directories and files. + +
+ +`fs:scope-data` + + + +This scope permits access to all files and list content of top level directories in the `$DATA`folder. + +
+ +`fs:scope-data-index` + + + +This scope permits to list all files and folders in the `$DATA`folder. + +
+ +`fs:allow-desktop-read-recursive` + + + +This allows full recursive read access to the complete `$DESKTOP` folder, files and subdirectories. + +
+ +`fs:allow-desktop-write-recursive` + + + +This allows full recursive write access to the complete `$DESKTOP` folder, files and subdirectories. + +
+ +`fs:allow-desktop-read` + + + +This allows non-recursive read access to the `$DESKTOP` folder. + +
+ +`fs:allow-desktop-write` + + + +This allows non-recursive write access to the `$DESKTOP` folder. + +
+ +`fs:allow-desktop-meta-recursive` + + + +This allows full recursive read access to metadata of the `$DESKTOP` folder, including file listing and statistics. + +
+ +`fs:allow-desktop-meta` + + + +This allows non-recursive read access to metadata of the `$DESKTOP` folder, including file listing and statistics. + +
+ +`fs:scope-desktop-recursive` + + + +This scope permits recursive access to the complete `$DESKTOP` folder, including sub directories and files. + +
+ +`fs:scope-desktop` + + + +This scope permits access to all files and list content of top level directories in the `$DESKTOP`folder. + +
+ +`fs:scope-desktop-index` + + + +This scope permits to list all files and folders in the `$DESKTOP`folder. + +
+ +`fs:allow-document-read-recursive` + + + +This allows full recursive read access to the complete `$DOCUMENT` folder, files and subdirectories. + +
+ +`fs:allow-document-write-recursive` + + + +This allows full recursive write access to the complete `$DOCUMENT` folder, files and subdirectories. + +
+ +`fs:allow-document-read` + + + +This allows non-recursive read access to the `$DOCUMENT` folder. + +
+ +`fs:allow-document-write` + + + +This allows non-recursive write access to the `$DOCUMENT` folder. + +
+ +`fs:allow-document-meta-recursive` + + + +This allows full recursive read access to metadata of the `$DOCUMENT` folder, including file listing and statistics. + +
+ +`fs:allow-document-meta` + + + +This allows non-recursive read access to metadata of the `$DOCUMENT` folder, including file listing and statistics. + +
+ +`fs:scope-document-recursive` + + + +This scope permits recursive access to the complete `$DOCUMENT` folder, including sub directories and files. + +
+ +`fs:scope-document` + + + +This scope permits access to all files and list content of top level directories in the `$DOCUMENT`folder. + +
+ +`fs:scope-document-index` + + + +This scope permits to list all files and folders in the `$DOCUMENT`folder. + +
+ +`fs:allow-download-read-recursive` + + + +This allows full recursive read access to the complete `$DOWNLOAD` folder, files and subdirectories. + +
+ +`fs:allow-download-write-recursive` + + + +This allows full recursive write access to the complete `$DOWNLOAD` folder, files and subdirectories. + +
+ +`fs:allow-download-read` + + + +This allows non-recursive read access to the `$DOWNLOAD` folder. + +
+ +`fs:allow-download-write` + + + +This allows non-recursive write access to the `$DOWNLOAD` folder. + +
+ +`fs:allow-download-meta-recursive` + + + +This allows full recursive read access to metadata of the `$DOWNLOAD` folder, including file listing and statistics. + +
+ +`fs:allow-download-meta` + + + +This allows non-recursive read access to metadata of the `$DOWNLOAD` folder, including file listing and statistics. + +
+ +`fs:scope-download-recursive` + + + +This scope permits recursive access to the complete `$DOWNLOAD` folder, including sub directories and files. + +
+ +`fs:scope-download` + + + +This scope permits access to all files and list content of top level directories in the `$DOWNLOAD`folder. + +
+ +`fs:scope-download-index` + + + +This scope permits to list all files and folders in the `$DOWNLOAD`folder. + +
+ +`fs:allow-exe-read-recursive` + + + +This allows full recursive read access to the complete `$EXE` folder, files and subdirectories. + +
+ +`fs:allow-exe-write-recursive` + + + +This allows full recursive write access to the complete `$EXE` folder, files and subdirectories. + +
+ +`fs:allow-exe-read` + + + +This allows non-recursive read access to the `$EXE` folder. + +
+ +`fs:allow-exe-write` + + + +This allows non-recursive write access to the `$EXE` folder. + +
+ +`fs:allow-exe-meta-recursive` + + + +This allows full recursive read access to metadata of the `$EXE` folder, including file listing and statistics. + +
+ +`fs:allow-exe-meta` + + + +This allows non-recursive read access to metadata of the `$EXE` folder, including file listing and statistics. + +
+ +`fs:scope-exe-recursive` + + + +This scope permits recursive access to the complete `$EXE` folder, including sub directories and files. + +
+ +`fs:scope-exe` + + + +This scope permits access to all files and list content of top level directories in the `$EXE`folder. + +
+ +`fs:scope-exe-index` + + + +This scope permits to list all files and folders in the `$EXE`folder. + +
+ +`fs:allow-font-read-recursive` + + + +This allows full recursive read access to the complete `$FONT` folder, files and subdirectories. + +
+ +`fs:allow-font-write-recursive` + + + +This allows full recursive write access to the complete `$FONT` folder, files and subdirectories. + +
+ +`fs:allow-font-read` + + + +This allows non-recursive read access to the `$FONT` folder. + +
+ +`fs:allow-font-write` + + + +This allows non-recursive write access to the `$FONT` folder. + +
+ +`fs:allow-font-meta-recursive` + + + +This allows full recursive read access to metadata of the `$FONT` folder, including file listing and statistics. + +
+ +`fs:allow-font-meta` + + + +This allows non-recursive read access to metadata of the `$FONT` folder, including file listing and statistics. + +
+ +`fs:scope-font-recursive` + + + +This scope permits recursive access to the complete `$FONT` folder, including sub directories and files. + +
+ +`fs:scope-font` + + + +This scope permits access to all files and list content of top level directories in the `$FONT`folder. + +
+ +`fs:scope-font-index` + + + +This scope permits to list all files and folders in the `$FONT`folder. + +
+ +`fs:allow-home-read-recursive` + + + +This allows full recursive read access to the complete `$HOME` folder, files and subdirectories. + +
+ +`fs:allow-home-write-recursive` + + + +This allows full recursive write access to the complete `$HOME` folder, files and subdirectories. + +
+ +`fs:allow-home-read` + + + +This allows non-recursive read access to the `$HOME` folder. + +
+ +`fs:allow-home-write` + + + +This allows non-recursive write access to the `$HOME` folder. + +
+ +`fs:allow-home-meta-recursive` + + + +This allows full recursive read access to metadata of the `$HOME` folder, including file listing and statistics. + +
+ +`fs:allow-home-meta` + + + +This allows non-recursive read access to metadata of the `$HOME` folder, including file listing and statistics. + +
+ +`fs:scope-home-recursive` + + + +This scope permits recursive access to the complete `$HOME` folder, including sub directories and files. + +
+ +`fs:scope-home` + + + +This scope permits access to all files and list content of top level directories in the `$HOME`folder. + +
+ +`fs:scope-home-index` + + + +This scope permits to list all files and folders in the `$HOME`folder. + +
+ +`fs:allow-localdata-read-recursive` + + + +This allows full recursive read access to the complete `$LOCALDATA` folder, files and subdirectories. + +
+ +`fs:allow-localdata-write-recursive` + + + +This allows full recursive write access to the complete `$LOCALDATA` folder, files and subdirectories. + +
+ +`fs:allow-localdata-read` + + + +This allows non-recursive read access to the `$LOCALDATA` folder. + +
+ +`fs:allow-localdata-write` + + + +This allows non-recursive write access to the `$LOCALDATA` folder. + +
+ +`fs:allow-localdata-meta-recursive` + + + +This allows full recursive read access to metadata of the `$LOCALDATA` folder, including file listing and statistics. + +
+ +`fs:allow-localdata-meta` + + + +This allows non-recursive read access to metadata of the `$LOCALDATA` folder, including file listing and statistics. + +
+ +`fs:scope-localdata-recursive` + + + +This scope permits recursive access to the complete `$LOCALDATA` folder, including sub directories and files. + +
+ +`fs:scope-localdata` + + + +This scope permits access to all files and list content of top level directories in the `$LOCALDATA`folder. + +
+ +`fs:scope-localdata-index` + + + +This scope permits to list all files and folders in the `$LOCALDATA`folder. + +
+ +`fs:allow-log-read-recursive` + + + +This allows full recursive read access to the complete `$LOG` folder, files and subdirectories. + +
+ +`fs:allow-log-write-recursive` + + + +This allows full recursive write access to the complete `$LOG` folder, files and subdirectories. + +
+ +`fs:allow-log-read` + + + +This allows non-recursive read access to the `$LOG` folder. + +
+ +`fs:allow-log-write` + + + +This allows non-recursive write access to the `$LOG` folder. + +
+ +`fs:allow-log-meta-recursive` + + + +This allows full recursive read access to metadata of the `$LOG` folder, including file listing and statistics. + +
+ +`fs:allow-log-meta` + + + +This allows non-recursive read access to metadata of the `$LOG` folder, including file listing and statistics. + +
+ +`fs:scope-log-recursive` + + + +This scope permits recursive access to the complete `$LOG` folder, including sub directories and files. + +
+ +`fs:scope-log` + + + +This scope permits access to all files and list content of top level directories in the `$LOG`folder. + +
+ +`fs:scope-log-index` + + + +This scope permits to list all files and folders in the `$LOG`folder. + +
+ +`fs:allow-picture-read-recursive` + + + +This allows full recursive read access to the complete `$PICTURE` folder, files and subdirectories. + +
+ +`fs:allow-picture-write-recursive` + + + +This allows full recursive write access to the complete `$PICTURE` folder, files and subdirectories. + +
+ +`fs:allow-picture-read` + + + +This allows non-recursive read access to the `$PICTURE` folder. + +
+ +`fs:allow-picture-write` + + + +This allows non-recursive write access to the `$PICTURE` folder. + +
+ +`fs:allow-picture-meta-recursive` + + + +This allows full recursive read access to metadata of the `$PICTURE` folder, including file listing and statistics. + +
+ +`fs:allow-picture-meta` + + + +This allows non-recursive read access to metadata of the `$PICTURE` folder, including file listing and statistics. + +
+ +`fs:scope-picture-recursive` + + + +This scope permits recursive access to the complete `$PICTURE` folder, including sub directories and files. + +
+ +`fs:scope-picture` + + + +This scope permits access to all files and list content of top level directories in the `$PICTURE`folder. + +
+ +`fs:scope-picture-index` + + + +This scope permits to list all files and folders in the `$PICTURE`folder. + +
+ +`fs:allow-public-read-recursive` + + + +This allows full recursive read access to the complete `$PUBLIC` folder, files and subdirectories. + +
+ +`fs:allow-public-write-recursive` + + + +This allows full recursive write access to the complete `$PUBLIC` folder, files and subdirectories. + +
+ +`fs:allow-public-read` + + + +This allows non-recursive read access to the `$PUBLIC` folder. + +
+ +`fs:allow-public-write` + + + +This allows non-recursive write access to the `$PUBLIC` folder. + +
+ +`fs:allow-public-meta-recursive` + + + +This allows full recursive read access to metadata of the `$PUBLIC` folder, including file listing and statistics. + +
+ +`fs:allow-public-meta` + + + +This allows non-recursive read access to metadata of the `$PUBLIC` folder, including file listing and statistics. + +
+ +`fs:scope-public-recursive` + + + +This scope permits recursive access to the complete `$PUBLIC` folder, including sub directories and files. + +
+ +`fs:scope-public` + + + +This scope permits access to all files and list content of top level directories in the `$PUBLIC`folder. + +
+ +`fs:scope-public-index` + + + +This scope permits to list all files and folders in the `$PUBLIC`folder. + +
+ +`fs:allow-resource-read-recursive` + + + +This allows full recursive read access to the complete `$RESOURCE` folder, files and subdirectories. + +
+ +`fs:allow-resource-write-recursive` + + + +This allows full recursive write access to the complete `$RESOURCE` folder, files and subdirectories. + +
+ +`fs:allow-resource-read` + + + +This allows non-recursive read access to the `$RESOURCE` folder. + +
+ +`fs:allow-resource-write` + + + +This allows non-recursive write access to the `$RESOURCE` folder. + +
+ +`fs:allow-resource-meta-recursive` + + + +This allows full recursive read access to metadata of the `$RESOURCE` folder, including file listing and statistics. + +
+ +`fs:allow-resource-meta` + + + +This allows non-recursive read access to metadata of the `$RESOURCE` folder, including file listing and statistics. + +
+ +`fs:scope-resource-recursive` + + + +This scope permits recursive access to the complete `$RESOURCE` folder, including sub directories and files. + +
+ +`fs:scope-resource` + + + +This scope permits access to all files and list content of top level directories in the `$RESOURCE`folder. + +
+ +`fs:scope-resource-index` + + + +This scope permits to list all files and folders in the `$RESOURCE`folder. + +
+ +`fs:allow-runtime-read-recursive` + + + +This allows full recursive read access to the complete `$RUNTIME` folder, files and subdirectories. + +
+ +`fs:allow-runtime-write-recursive` + + + +This allows full recursive write access to the complete `$RUNTIME` folder, files and subdirectories. + +
+ +`fs:allow-runtime-read` + + + +This allows non-recursive read access to the `$RUNTIME` folder. + +
+ +`fs:allow-runtime-write` + + + +This allows non-recursive write access to the `$RUNTIME` folder. + +
+ +`fs:allow-runtime-meta-recursive` + + + +This allows full recursive read access to metadata of the `$RUNTIME` folder, including file listing and statistics. + +
+ +`fs:allow-runtime-meta` + + + +This allows non-recursive read access to metadata of the `$RUNTIME` folder, including file listing and statistics. + +
+ +`fs:scope-runtime-recursive` + + + +This scope permits recursive access to the complete `$RUNTIME` folder, including sub directories and files. + +
+ +`fs:scope-runtime` + + + +This scope permits access to all files and list content of top level directories in the `$RUNTIME`folder. + +
+ +`fs:scope-runtime-index` + + + +This scope permits to list all files and folders in the `$RUNTIME`folder. + +
+ +`fs:allow-temp-read-recursive` + + + +This allows full recursive read access to the complete `$TEMP` folder, files and subdirectories. + +
+ +`fs:allow-temp-write-recursive` + + + +This allows full recursive write access to the complete `$TEMP` folder, files and subdirectories. + +
+ +`fs:allow-temp-read` + + + +This allows non-recursive read access to the `$TEMP` folder. + +
+ +`fs:allow-temp-write` + + + +This allows non-recursive write access to the `$TEMP` folder. + +
+ +`fs:allow-temp-meta-recursive` + + + +This allows full recursive read access to metadata of the `$TEMP` folder, including file listing and statistics. + +
+ +`fs:allow-temp-meta` + + + +This allows non-recursive read access to metadata of the `$TEMP` folder, including file listing and statistics. + +
+ +`fs:scope-temp-recursive` + + + +This scope permits recursive access to the complete `$TEMP` folder, including sub directories and files. + +
+ +`fs:scope-temp` + + + +This scope permits access to all files and list content of top level directories in the `$TEMP`folder. + +
+ +`fs:scope-temp-index` + + + +This scope permits to list all files and folders in the `$TEMP`folder. + +
+ +`fs:allow-template-read-recursive` + + + +This allows full recursive read access to the complete `$TEMPLATE` folder, files and subdirectories. + +
+ +`fs:allow-template-write-recursive` + + + +This allows full recursive write access to the complete `$TEMPLATE` folder, files and subdirectories. + +
+ +`fs:allow-template-read` + + + +This allows non-recursive read access to the `$TEMPLATE` folder. + +
+ +`fs:allow-template-write` + + + +This allows non-recursive write access to the `$TEMPLATE` folder. + +
+ +`fs:allow-template-meta-recursive` + + + +This allows full recursive read access to metadata of the `$TEMPLATE` folder, including file listing and statistics. + +
+ +`fs:allow-template-meta` + + + +This allows non-recursive read access to metadata of the `$TEMPLATE` folder, including file listing and statistics. + +
+ +`fs:scope-template-recursive` + + + +This scope permits recursive access to the complete `$TEMPLATE` folder, including sub directories and files. + +
+ +`fs:scope-template` + + + +This scope permits access to all files and list content of top level directories in the `$TEMPLATE`folder. + +
+ +`fs:scope-template-index` + + + +This scope permits to list all files and folders in the `$TEMPLATE`folder. + +
+ +`fs:allow-video-read-recursive` + + + +This allows full recursive read access to the complete `$VIDEO` folder, files and subdirectories. + +
+ +`fs:allow-video-write-recursive` + + + +This allows full recursive write access to the complete `$VIDEO` folder, files and subdirectories. + +
+ +`fs:allow-video-read` + + + +This allows non-recursive read access to the `$VIDEO` folder. + +
+ +`fs:allow-video-write` + + + +This allows non-recursive write access to the `$VIDEO` folder. + +
+ +`fs:allow-video-meta-recursive` + + + +This allows full recursive read access to metadata of the `$VIDEO` folder, including file listing and statistics. + +
+ +`fs:allow-video-meta` + + + +This allows non-recursive read access to metadata of the `$VIDEO` folder, including file listing and statistics. + +
+ +`fs:scope-video-recursive` + + + +This scope permits recursive access to the complete `$VIDEO` folder, including sub directories and files. + +
+ +`fs:scope-video` + + + +This scope permits access to all files and list content of top level directories in the `$VIDEO`folder. + +
+ +`fs:scope-video-index` + + + +This scope permits to list all files and folders in the `$VIDEO`folder. + +
+ +`fs:allow-copy-file` + + + +Enables the copy_file command without any pre-configured scope. + +
+ +`fs:deny-copy-file` + + + +Denies the copy_file command without any pre-configured scope. + +
+ +`fs:allow-create` + + + +Enables the create command without any pre-configured scope. + +
+ +`fs:deny-create` + + + +Denies the create command without any pre-configured scope. + +
+ +`fs:allow-exists` + + + +Enables the exists command without any pre-configured scope. + +
+ +`fs:deny-exists` + + + +Denies the exists command without any pre-configured scope. + +
+ +`fs:allow-fstat` + + + +Enables the fstat command without any pre-configured scope. + +
+ +`fs:deny-fstat` + + + +Denies the fstat command without any pre-configured scope. + +
+ +`fs:allow-ftruncate` + + + +Enables the ftruncate command without any pre-configured scope. + +
+ +`fs:deny-ftruncate` + + + +Denies the ftruncate command without any pre-configured scope. + +
+ +`fs:allow-lstat` + + + +Enables the lstat command without any pre-configured scope. + +
+ +`fs:deny-lstat` + + + +Denies the lstat command without any pre-configured scope. + +
+ +`fs:allow-mkdir` + + + +Enables the mkdir command without any pre-configured scope. + +
+ +`fs:deny-mkdir` + + + +Denies the mkdir command without any pre-configured scope. + +
+ +`fs:allow-open` + + + +Enables the open command without any pre-configured scope. + +
+ +`fs:deny-open` + + + +Denies the open command without any pre-configured scope. + +
+ +`fs:allow-read` + + + +Enables the read command without any pre-configured scope. + +
+ +`fs:deny-read` + + + +Denies the read command without any pre-configured scope. + +
+ +`fs:allow-read-dir` + + + +Enables the read_dir command without any pre-configured scope. + +
+ +`fs:deny-read-dir` + + + +Denies the read_dir command without any pre-configured scope. + +
+ +`fs:allow-read-file` + + + +Enables the read_file command without any pre-configured scope. + +
+ +`fs:deny-read-file` + + + +Denies the read_file command without any pre-configured scope. + +
+ +`fs:allow-read-text-file` + + + +Enables the read_text_file command without any pre-configured scope. + +
+ +`fs:deny-read-text-file` + + + +Denies the read_text_file command without any pre-configured scope. + +
+ +`fs:allow-read-text-file-lines` + + + +Enables the read_text_file_lines command without any pre-configured scope. + +
+ +`fs:deny-read-text-file-lines` + + + +Denies the read_text_file_lines command without any pre-configured scope. + +
+ +`fs:allow-read-text-file-lines-next` + + + +Enables the read_text_file_lines_next command without any pre-configured scope. + +
+ +`fs:deny-read-text-file-lines-next` + + + +Denies the read_text_file_lines_next command without any pre-configured scope. + +
+ +`fs:allow-remove` + + + +Enables the remove command without any pre-configured scope. + +
+ +`fs:deny-remove` + + + +Denies the remove command without any pre-configured scope. + +
+ +`fs:allow-rename` + + + +Enables the rename command without any pre-configured scope. + +
+ +`fs:deny-rename` + + + +Denies the rename command without any pre-configured scope. + +
+ +`fs:allow-seek` + + + +Enables the seek command without any pre-configured scope. + +
+ +`fs:deny-seek` + + + +Denies the seek command without any pre-configured scope. + +
+ +`fs:allow-stat` + + + +Enables the stat command without any pre-configured scope. + +
+ +`fs:deny-stat` + + + +Denies the stat command without any pre-configured scope. + +
+ +`fs:allow-truncate` + + + +Enables the truncate command without any pre-configured scope. + +
+ +`fs:deny-truncate` + + + +Denies the truncate command without any pre-configured scope. + +
+ +`fs:allow-unwatch` + + + +Enables the unwatch command without any pre-configured scope. + +
+ +`fs:deny-unwatch` + + + +Denies the unwatch command without any pre-configured scope. + +
+ +`fs:allow-watch` + + + +Enables the watch command without any pre-configured scope. + +
+ +`fs:deny-watch` + + + +Denies the watch command without any pre-configured scope. + +
+ +`fs:allow-write` + + + +Enables the write command without any pre-configured scope. + +
+ +`fs:deny-write` + + + +Denies the write command without any pre-configured scope. + +
+ +`fs:allow-write-file` + + + +Enables the write_file command without any pre-configured scope. + +
+ +`fs:deny-write-file` + + + +Denies the write_file command without any pre-configured scope. + +
+ +`fs:allow-write-text-file` + + + +Enables the write_text_file command without any pre-configured scope. + +
+ +`fs:deny-write-text-file` + + + +Denies the write_text_file command without any pre-configured scope. + +
+ +`fs:create-app-specific-dirs` + + + +This permissions allows to create the application specific directories. + + +
+ +`fs:deny-default` + + + +This denies access to dangerous Tauri relevant files and folders by default. + +
+ +`fs:deny-webview-data-linux` + + + +This denies read access to the +`$APPLOCALDATA` folder on linux as the webview data and configuration values are stored here. +Allowing access can lead to sensitive information disclosure and should be well considered. + +
+ +`fs:deny-webview-data-windows` + + + +This denies read access to the +`$APPLOCALDATA/EBWebView` folder on windows as the webview data and configuration values are stored here. +Allowing access can lead to sensitive information disclosure and should be well considered. + +
+ +`fs:read-all` + + + +This enables all read related commands without any pre-configured accessible paths. + +
+ +`fs:read-app-specific-dirs-recursive` + + + +This permission allows recursive read functionality on the application +specific base directories. + + +
+ +`fs:read-dirs` + + + +This enables directory read and file metadata related commands without any pre-configured accessible paths. + +
+ +`fs:read-files` + + + +This enables file read related commands without any pre-configured accessible paths. + +
+ +`fs:read-meta` + + + +This enables all index or metadata related commands without any pre-configured accessible paths. + +
+ +`fs:scope` + + + +An empty permission you can use to modify the global scope. + +
+ +`fs:write-all` + + + +This enables all write related commands without any pre-configured accessible paths. + +
+ +`fs:write-files` + + + +This enables all file write related commands without any pre-configured accessible paths. + +
diff --git a/plugins/fs/permissions/schemas/schema.json b/plugins/fs/permissions/schemas/schema.json index 4910e9527..12fd7b341 100644 --- a/plugins/fs/permissions/schemas/schema.json +++ b/plugins/fs/permissions/schemas/schema.json @@ -49,7 +49,7 @@ "minimum": 1.0 }, "description": { - "description": "Human-readable description of what the permission does.", + "description": "Human-readable description of what the permission does. Tauri convention is to use

headings in markdown content for Tauri documentation generation purposes.", "type": [ "string", "null" @@ -111,7 +111,7 @@ "type": "string" }, "description": { - "description": "Human-readable description of what the permission does.", + "description": "Human-readable description of what the permission does. Tauri internal convention is to use

headings in markdown content for Tauri documentation generation purposes.", "type": [ "string", "null" @@ -172,7 +172,7 @@ } }, "Scopes": { - "description": "A restriction of the command/endpoint functionality.\n\nIt can be of any serde serializable type and is used for allowing or preventing certain actions inside a Tauri command.\n\nThe scope is passed to the command and handled/enforced by the command itself.", + "description": "An argument for fine grained behavior control of Tauri commands.\n\nIt can be of any serde serializable type and is used to allow or prevent certain actions inside a Tauri command. The configured scope is passed to the command and will be enforced by the command implementation.\n\n## Example\n\n```json { \"allow\": [{ \"path\": \"$HOME/**\" }], \"deny\": [{ \"path\": \"$HOME/secret.txt\" }] } ```", "type": "object", "properties": { "allow": { @@ -186,7 +186,7 @@ } }, "deny": { - "description": "Data that defines what is denied by the scope.", + "description": "Data that defines what is denied by the scope. This should be prioritized by validation logic.", "type": [ "array", "null" diff --git a/plugins/global-shortcut/permissions/autogenerated/reference.md b/plugins/global-shortcut/permissions/autogenerated/reference.md index fed89448e..821bf9f91 100644 --- a/plugins/global-shortcut/permissions/autogenerated/reference.md +++ b/plugins/global-shortcut/permissions/autogenerated/reference.md @@ -1,17 +1,148 @@ -| Permission | Description | -|------|-----| -|`allow-is-registered`|Enables the is_registered command without any pre-configured scope.| -|`deny-is-registered`|Denies the is_registered command without any pre-configured scope.| -|`allow-register`|Enables the register command without any pre-configured scope.| -|`deny-register`|Denies the register command without any pre-configured scope.| -|`allow-register-all`|Enables the register_all command without any pre-configured scope.| -|`deny-register-all`|Denies the register_all command without any pre-configured scope.| -|`allow-unregister`|Enables the unregister command without any pre-configured scope.| -|`deny-unregister`|Denies the unregister command without any pre-configured scope.| -|`allow-unregister-all`|Enables the unregister_all command without any pre-configured scope.| -|`deny-unregister-all`|Denies the unregister_all command without any pre-configured scope.| -|`default`|No features are enabled by default, as we believe +## Default Permission + +No features are enabled by default, as we believe the shortcuts can be inherently dangerous and it is application specific if specific shortcuts should be registered or unregistered. -| + + + +### Permission Table + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
IdentifierDescription
+ +`global-shortcut:allow-is-registered` + + + +Enables the is_registered command without any pre-configured scope. + +
+ +`global-shortcut:deny-is-registered` + + + +Denies the is_registered command without any pre-configured scope. + +
+ +`global-shortcut:allow-register` + + + +Enables the register command without any pre-configured scope. + +
+ +`global-shortcut:deny-register` + + + +Denies the register command without any pre-configured scope. + +
+ +`global-shortcut:allow-register-all` + + + +Enables the register_all command without any pre-configured scope. + +
+ +`global-shortcut:deny-register-all` + + + +Denies the register_all command without any pre-configured scope. + +
+ +`global-shortcut:allow-unregister` + + + +Enables the unregister command without any pre-configured scope. + +
+ +`global-shortcut:deny-unregister` + + + +Denies the unregister command without any pre-configured scope. + +
+ +`global-shortcut:allow-unregister-all` + + + +Enables the unregister_all command without any pre-configured scope. + +
+ +`global-shortcut:deny-unregister-all` + + + +Denies the unregister_all command without any pre-configured scope. + +
diff --git a/plugins/global-shortcut/permissions/schemas/schema.json b/plugins/global-shortcut/permissions/schemas/schema.json index 615a8a181..5d861c96c 100644 --- a/plugins/global-shortcut/permissions/schemas/schema.json +++ b/plugins/global-shortcut/permissions/schemas/schema.json @@ -49,7 +49,7 @@ "minimum": 1.0 }, "description": { - "description": "Human-readable description of what the permission does.", + "description": "Human-readable description of what the permission does. Tauri convention is to use

headings in markdown content for Tauri documentation generation purposes.", "type": [ "string", "null" @@ -111,7 +111,7 @@ "type": "string" }, "description": { - "description": "Human-readable description of what the permission does.", + "description": "Human-readable description of what the permission does. Tauri internal convention is to use

headings in markdown content for Tauri documentation generation purposes.", "type": [ "string", "null" @@ -172,7 +172,7 @@ } }, "Scopes": { - "description": "A restriction of the command/endpoint functionality.\n\nIt can be of any serde serializable type and is used for allowing or preventing certain actions inside a Tauri command.\n\nThe scope is passed to the command and handled/enforced by the command itself.", + "description": "An argument for fine grained behavior control of Tauri commands.\n\nIt can be of any serde serializable type and is used to allow or prevent certain actions inside a Tauri command. The configured scope is passed to the command and will be enforced by the command implementation.\n\n## Example\n\n```json { \"allow\": [{ \"path\": \"$HOME/**\" }], \"deny\": [{ \"path\": \"$HOME/secret.txt\" }] } ```", "type": "object", "properties": { "allow": { @@ -186,7 +186,7 @@ } }, "deny": { - "description": "Data that defines what is denied by the scope.", + "description": "Data that defines what is denied by the scope. This should be prioritized by validation logic.", "type": [ "array", "null" diff --git a/plugins/http/permissions/autogenerated/reference.md b/plugins/http/permissions/autogenerated/reference.md index 27d924a95..b1988a0d9 100644 --- a/plugins/http/permissions/autogenerated/reference.md +++ b/plugins/http/permissions/autogenerated/reference.md @@ -1,14 +1,6 @@ -| Permission | Description | -|------|-----| -|`allow-fetch`|Enables the fetch command without any pre-configured scope.| -|`deny-fetch`|Denies the fetch command without any pre-configured scope.| -|`allow-fetch-cancel`|Enables the fetch_cancel command without any pre-configured scope.| -|`deny-fetch-cancel`|Denies the fetch_cancel command without any pre-configured scope.| -|`allow-fetch-read-body`|Enables the fetch_read_body command without any pre-configured scope.| -|`deny-fetch-read-body`|Denies the fetch_read_body command without any pre-configured scope.| -|`allow-fetch-send`|Enables the fetch_send command without any pre-configured scope.| -|`deny-fetch-send`|Denies the fetch_send command without any pre-configured scope.| -|`default`|This permission set configures what kind of +## Default Permission + +This permission set configures what kind of fetch operations are available from the http plugin. This enables all fetch operations but does not @@ -19,4 +11,123 @@ be manually configured before usage. All fetch operations are enabled. -| + + +- `allow-fetch` +- `allow-fetch-cancel` +- `allow-fetch-read-body` +- `allow-fetch-send` + +### Permission Table + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
IdentifierDescription
+ +`http:allow-fetch` + + + +Enables the fetch command without any pre-configured scope. + +
+ +`http:deny-fetch` + + + +Denies the fetch command without any pre-configured scope. + +
+ +`http:allow-fetch-cancel` + + + +Enables the fetch_cancel command without any pre-configured scope. + +
+ +`http:deny-fetch-cancel` + + + +Denies the fetch_cancel command without any pre-configured scope. + +
+ +`http:allow-fetch-read-body` + + + +Enables the fetch_read_body command without any pre-configured scope. + +
+ +`http:deny-fetch-read-body` + + + +Denies the fetch_read_body command without any pre-configured scope. + +
+ +`http:allow-fetch-send` + + + +Enables the fetch_send command without any pre-configured scope. + +
+ +`http:deny-fetch-send` + + + +Denies the fetch_send command without any pre-configured scope. + +
diff --git a/plugins/http/permissions/schemas/schema.json b/plugins/http/permissions/schemas/schema.json index 17ce3d3dd..88617be05 100644 --- a/plugins/http/permissions/schemas/schema.json +++ b/plugins/http/permissions/schemas/schema.json @@ -49,7 +49,7 @@ "minimum": 1.0 }, "description": { - "description": "Human-readable description of what the permission does.", + "description": "Human-readable description of what the permission does. Tauri convention is to use

headings in markdown content for Tauri documentation generation purposes.", "type": [ "string", "null" @@ -111,7 +111,7 @@ "type": "string" }, "description": { - "description": "Human-readable description of what the permission does.", + "description": "Human-readable description of what the permission does. Tauri internal convention is to use

headings in markdown content for Tauri documentation generation purposes.", "type": [ "string", "null" @@ -172,7 +172,7 @@ } }, "Scopes": { - "description": "A restriction of the command/endpoint functionality.\n\nIt can be of any serde serializable type and is used for allowing or preventing certain actions inside a Tauri command.\n\nThe scope is passed to the command and handled/enforced by the command itself.", + "description": "An argument for fine grained behavior control of Tauri commands.\n\nIt can be of any serde serializable type and is used to allow or prevent certain actions inside a Tauri command. The configured scope is passed to the command and will be enforced by the command implementation.\n\n## Example\n\n```json { \"allow\": [{ \"path\": \"$HOME/**\" }], \"deny\": [{ \"path\": \"$HOME/secret.txt\" }] } ```", "type": "object", "properties": { "allow": { @@ -186,7 +186,7 @@ } }, "deny": { - "description": "Data that defines what is denied by the scope.", + "description": "Data that defines what is denied by the scope. This should be prioritized by validation logic.", "type": [ "array", "null" diff --git a/plugins/log/permissions/autogenerated/reference.md b/plugins/log/permissions/autogenerated/reference.md index 075f183e2..a1f067228 100644 --- a/plugins/log/permissions/autogenerated/reference.md +++ b/plugins/log/permissions/autogenerated/reference.md @@ -1,5 +1,41 @@ -| Permission | Description | -|------|-----| -|`allow-log`|Enables the log command without any pre-configured scope.| -|`deny-log`|Denies the log command without any pre-configured scope.| -|`default`|Allows the log command| +## Default Permission + +Allows the log command + +- `allow-log` + +### Permission Table + + + + + + + + + + + + + + + + + +
IdentifierDescription
+ +`log:allow-log` + + + +Enables the log command without any pre-configured scope. + +
+ +`log:deny-log` + + + +Denies the log command without any pre-configured scope. + +
diff --git a/plugins/log/permissions/schemas/schema.json b/plugins/log/permissions/schemas/schema.json index 1eb694d3c..e1489b68f 100644 --- a/plugins/log/permissions/schemas/schema.json +++ b/plugins/log/permissions/schemas/schema.json @@ -49,7 +49,7 @@ "minimum": 1.0 }, "description": { - "description": "Human-readable description of what the permission does.", + "description": "Human-readable description of what the permission does. Tauri convention is to use

headings in markdown content for Tauri documentation generation purposes.", "type": [ "string", "null" @@ -111,7 +111,7 @@ "type": "string" }, "description": { - "description": "Human-readable description of what the permission does.", + "description": "Human-readable description of what the permission does. Tauri internal convention is to use

headings in markdown content for Tauri documentation generation purposes.", "type": [ "string", "null" @@ -172,7 +172,7 @@ } }, "Scopes": { - "description": "A restriction of the command/endpoint functionality.\n\nIt can be of any serde serializable type and is used for allowing or preventing certain actions inside a Tauri command.\n\nThe scope is passed to the command and handled/enforced by the command itself.", + "description": "An argument for fine grained behavior control of Tauri commands.\n\nIt can be of any serde serializable type and is used to allow or prevent certain actions inside a Tauri command. The configured scope is passed to the command and will be enforced by the command implementation.\n\n## Example\n\n```json { \"allow\": [{ \"path\": \"$HOME/**\" }], \"deny\": [{ \"path\": \"$HOME/secret.txt\" }] } ```", "type": "object", "properties": { "allow": { @@ -186,7 +186,7 @@ } }, "deny": { - "description": "Data that defines what is denied by the scope.", + "description": "Data that defines what is denied by the scope. This should be prioritized by validation logic.", "type": [ "array", "null" diff --git a/plugins/nfc/permissions/autogenerated/reference.md b/plugins/nfc/permissions/autogenerated/reference.md index b627f7083..885eb684a 100644 --- a/plugins/nfc/permissions/autogenerated/reference.md +++ b/plugins/nfc/permissions/autogenerated/reference.md @@ -1,12 +1,6 @@ -| Permission | Description | -|------|-----| -|`allow-is-available`|Enables the is_available command without any pre-configured scope.| -|`deny-is-available`|Denies the is_available command without any pre-configured scope.| -|`allow-scan`|Enables the scan command without any pre-configured scope.| -|`deny-scan`|Denies the scan command without any pre-configured scope.| -|`allow-write`|Enables the write command without any pre-configured scope.| -|`deny-write`|Denies the write command without any pre-configured scope.| -|`default`|This permission set configures what kind of +## Default Permission + +This permission set configures what kind of operations are available from the nfc plugin. #### Granted Permissions @@ -15,4 +9,95 @@ Checking if the NFC functionality is available and scanning nearby tags is allowed. Writing to tags needs to be manually enabled. -| + + +- `allow-is-available` +- `allow-scan` + +### Permission Table + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
IdentifierDescription
+ +`nfc:allow-is-available` + + + +Enables the is_available command without any pre-configured scope. + +
+ +`nfc:deny-is-available` + + + +Denies the is_available command without any pre-configured scope. + +
+ +`nfc:allow-scan` + + + +Enables the scan command without any pre-configured scope. + +
+ +`nfc:deny-scan` + + + +Denies the scan command without any pre-configured scope. + +
+ +`nfc:allow-write` + + + +Enables the write command without any pre-configured scope. + +
+ +`nfc:deny-write` + + + +Denies the write command without any pre-configured scope. + +
diff --git a/plugins/nfc/permissions/schemas/schema.json b/plugins/nfc/permissions/schemas/schema.json index e5d5931a9..0add3642c 100644 --- a/plugins/nfc/permissions/schemas/schema.json +++ b/plugins/nfc/permissions/schemas/schema.json @@ -49,7 +49,7 @@ "minimum": 1.0 }, "description": { - "description": "Human-readable description of what the permission does.", + "description": "Human-readable description of what the permission does. Tauri convention is to use

headings in markdown content for Tauri documentation generation purposes.", "type": [ "string", "null" @@ -111,7 +111,7 @@ "type": "string" }, "description": { - "description": "Human-readable description of what the permission does.", + "description": "Human-readable description of what the permission does. Tauri internal convention is to use

headings in markdown content for Tauri documentation generation purposes.", "type": [ "string", "null" @@ -172,7 +172,7 @@ } }, "Scopes": { - "description": "A restriction of the command/endpoint functionality.\n\nIt can be of any serde serializable type and is used for allowing or preventing certain actions inside a Tauri command.\n\nThe scope is passed to the command and handled/enforced by the command itself.", + "description": "An argument for fine grained behavior control of Tauri commands.\n\nIt can be of any serde serializable type and is used to allow or prevent certain actions inside a Tauri command. The configured scope is passed to the command and will be enforced by the command implementation.\n\n## Example\n\n```json { \"allow\": [{ \"path\": \"$HOME/**\" }], \"deny\": [{ \"path\": \"$HOME/secret.txt\" }] } ```", "type": "object", "properties": { "allow": { @@ -186,7 +186,7 @@ } }, "deny": { - "description": "Data that defines what is denied by the scope.", + "description": "Data that defines what is denied by the scope. This should be prioritized by validation logic.", "type": [ "array", "null" diff --git a/plugins/notification/permissions/autogenerated/reference.md b/plugins/notification/permissions/autogenerated/reference.md index e64232593..2dd889a78 100644 --- a/plugins/notification/permissions/autogenerated/reference.md +++ b/plugins/notification/permissions/autogenerated/reference.md @@ -1,42 +1,453 @@ -| Permission | Description | -|------|-----| -|`allow-batch`|Enables the batch command without any pre-configured scope.| -|`deny-batch`|Denies the batch command without any pre-configured scope.| -|`allow-cancel`|Enables the cancel command without any pre-configured scope.| -|`deny-cancel`|Denies the cancel command without any pre-configured scope.| -|`allow-check-permissions`|Enables the check_permissions command without any pre-configured scope.| -|`deny-check-permissions`|Denies the check_permissions command without any pre-configured scope.| -|`allow-create-channel`|Enables the create_channel command without any pre-configured scope.| -|`deny-create-channel`|Denies the create_channel command without any pre-configured scope.| -|`allow-delete-channel`|Enables the delete_channel command without any pre-configured scope.| -|`deny-delete-channel`|Denies the delete_channel command without any pre-configured scope.| -|`allow-get-active`|Enables the get_active command without any pre-configured scope.| -|`deny-get-active`|Denies the get_active command without any pre-configured scope.| -|`allow-get-pending`|Enables the get_pending command without any pre-configured scope.| -|`deny-get-pending`|Denies the get_pending command without any pre-configured scope.| -|`allow-is-permission-granted`|Enables the is_permission_granted command without any pre-configured scope.| -|`deny-is-permission-granted`|Denies the is_permission_granted command without any pre-configured scope.| -|`allow-list-channels`|Enables the list_channels command without any pre-configured scope.| -|`deny-list-channels`|Denies the list_channels command without any pre-configured scope.| -|`allow-notify`|Enables the notify command without any pre-configured scope.| -|`deny-notify`|Denies the notify command without any pre-configured scope.| -|`allow-permission-state`|Enables the permission_state command without any pre-configured scope.| -|`deny-permission-state`|Denies the permission_state command without any pre-configured scope.| -|`allow-register-action-types`|Enables the register_action_types command without any pre-configured scope.| -|`deny-register-action-types`|Denies the register_action_types command without any pre-configured scope.| -|`allow-register-listener`|Enables the register_listener command without any pre-configured scope.| -|`deny-register-listener`|Denies the register_listener command without any pre-configured scope.| -|`allow-remove-active`|Enables the remove_active command without any pre-configured scope.| -|`deny-remove-active`|Denies the remove_active command without any pre-configured scope.| -|`allow-request-permission`|Enables the request_permission command without any pre-configured scope.| -|`deny-request-permission`|Denies the request_permission command without any pre-configured scope.| -|`allow-show`|Enables the show command without any pre-configured scope.| -|`deny-show`|Denies the show command without any pre-configured scope.| -|`default`|This permission set configures which +## Default Permission + +This permission set configures which notification features are by default exposed. #### Granted Permissions It allows all notification related features. -| + + +- `allow-is-permission-granted` +- `allow-request-permission` +- `allow-notify` +- `allow-register-action-types` +- `allow-register-listener` +- `allow-cancel` +- `allow-get-pending` +- `allow-remove-active` +- `allow-get-active` +- `allow-check-permissions` +- `allow-show` +- `allow-batch` +- `allow-list-channels` +- `allow-delete-channel` +- `allow-create-channel` +- `allow-permission-state` + +### Permission Table + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
IdentifierDescription
+ +`notification:allow-batch` + + + +Enables the batch command without any pre-configured scope. + +
+ +`notification:deny-batch` + + + +Denies the batch command without any pre-configured scope. + +
+ +`notification:allow-cancel` + + + +Enables the cancel command without any pre-configured scope. + +
+ +`notification:deny-cancel` + + + +Denies the cancel command without any pre-configured scope. + +
+ +`notification:allow-check-permissions` + + + +Enables the check_permissions command without any pre-configured scope. + +
+ +`notification:deny-check-permissions` + + + +Denies the check_permissions command without any pre-configured scope. + +
+ +`notification:allow-create-channel` + + + +Enables the create_channel command without any pre-configured scope. + +
+ +`notification:deny-create-channel` + + + +Denies the create_channel command without any pre-configured scope. + +
+ +`notification:allow-delete-channel` + + + +Enables the delete_channel command without any pre-configured scope. + +
+ +`notification:deny-delete-channel` + + + +Denies the delete_channel command without any pre-configured scope. + +
+ +`notification:allow-get-active` + + + +Enables the get_active command without any pre-configured scope. + +
+ +`notification:deny-get-active` + + + +Denies the get_active command without any pre-configured scope. + +
+ +`notification:allow-get-pending` + + + +Enables the get_pending command without any pre-configured scope. + +
+ +`notification:deny-get-pending` + + + +Denies the get_pending command without any pre-configured scope. + +
+ +`notification:allow-is-permission-granted` + + + +Enables the is_permission_granted command without any pre-configured scope. + +
+ +`notification:deny-is-permission-granted` + + + +Denies the is_permission_granted command without any pre-configured scope. + +
+ +`notification:allow-list-channels` + + + +Enables the list_channels command without any pre-configured scope. + +
+ +`notification:deny-list-channels` + + + +Denies the list_channels command without any pre-configured scope. + +
+ +`notification:allow-notify` + + + +Enables the notify command without any pre-configured scope. + +
+ +`notification:deny-notify` + + + +Denies the notify command without any pre-configured scope. + +
+ +`notification:allow-permission-state` + + + +Enables the permission_state command without any pre-configured scope. + +
+ +`notification:deny-permission-state` + + + +Denies the permission_state command without any pre-configured scope. + +
+ +`notification:allow-register-action-types` + + + +Enables the register_action_types command without any pre-configured scope. + +
+ +`notification:deny-register-action-types` + + + +Denies the register_action_types command without any pre-configured scope. + +
+ +`notification:allow-register-listener` + + + +Enables the register_listener command without any pre-configured scope. + +
+ +`notification:deny-register-listener` + + + +Denies the register_listener command without any pre-configured scope. + +
+ +`notification:allow-remove-active` + + + +Enables the remove_active command without any pre-configured scope. + +
+ +`notification:deny-remove-active` + + + +Denies the remove_active command without any pre-configured scope. + +
+ +`notification:allow-request-permission` + + + +Enables the request_permission command without any pre-configured scope. + +
+ +`notification:deny-request-permission` + + + +Denies the request_permission command without any pre-configured scope. + +
+ +`notification:allow-show` + + + +Enables the show command without any pre-configured scope. + +
+ +`notification:deny-show` + + + +Denies the show command without any pre-configured scope. + +
diff --git a/plugins/notification/permissions/schemas/schema.json b/plugins/notification/permissions/schemas/schema.json index 0b20a6c5f..5c0aa2445 100644 --- a/plugins/notification/permissions/schemas/schema.json +++ b/plugins/notification/permissions/schemas/schema.json @@ -49,7 +49,7 @@ "minimum": 1.0 }, "description": { - "description": "Human-readable description of what the permission does.", + "description": "Human-readable description of what the permission does. Tauri convention is to use

headings in markdown content for Tauri documentation generation purposes.", "type": [ "string", "null" @@ -111,7 +111,7 @@ "type": "string" }, "description": { - "description": "Human-readable description of what the permission does.", + "description": "Human-readable description of what the permission does. Tauri internal convention is to use

headings in markdown content for Tauri documentation generation purposes.", "type": [ "string", "null" @@ -172,7 +172,7 @@ } }, "Scopes": { - "description": "A restriction of the command/endpoint functionality.\n\nIt can be of any serde serializable type and is used for allowing or preventing certain actions inside a Tauri command.\n\nThe scope is passed to the command and handled/enforced by the command itself.", + "description": "An argument for fine grained behavior control of Tauri commands.\n\nIt can be of any serde serializable type and is used to allow or prevent certain actions inside a Tauri command. The configured scope is passed to the command and will be enforced by the command implementation.\n\n## Example\n\n```json { \"allow\": [{ \"path\": \"$HOME/**\" }], \"deny\": [{ \"path\": \"$HOME/secret.txt\" }] } ```", "type": "object", "properties": { "allow": { @@ -186,7 +186,7 @@ } }, "deny": { - "description": "Data that defines what is denied by the scope.", + "description": "Data that defines what is denied by the scope. This should be prioritized by validation logic.", "type": [ "array", "null" diff --git a/plugins/os/permissions/autogenerated/reference.md b/plugins/os/permissions/autogenerated/reference.md index 73d43e51e..cab95f161 100644 --- a/plugins/os/permissions/autogenerated/reference.md +++ b/plugins/os/permissions/autogenerated/reference.md @@ -1,22 +1,6 @@ -| Permission | Description | -|------|-----| -|`allow-arch`|Enables the arch command without any pre-configured scope.| -|`deny-arch`|Denies the arch command without any pre-configured scope.| -|`allow-exe-extension`|Enables the exe_extension command without any pre-configured scope.| -|`deny-exe-extension`|Denies the exe_extension command without any pre-configured scope.| -|`allow-family`|Enables the family command without any pre-configured scope.| -|`deny-family`|Denies the family command without any pre-configured scope.| -|`allow-hostname`|Enables the hostname command without any pre-configured scope.| -|`deny-hostname`|Denies the hostname command without any pre-configured scope.| -|`allow-locale`|Enables the locale command without any pre-configured scope.| -|`deny-locale`|Denies the locale command without any pre-configured scope.| -|`allow-os-type`|Enables the os_type command without any pre-configured scope.| -|`deny-os-type`|Denies the os_type command without any pre-configured scope.| -|`allow-platform`|Enables the platform command without any pre-configured scope.| -|`deny-platform`|Denies the platform command without any pre-configured scope.| -|`allow-version`|Enables the version command without any pre-configured scope.| -|`deny-version`|Denies the version command without any pre-configured scope.| -|`default`|This permission set configures which +## Default Permission + +This permission set configures which operating system information are available to gather from the frontend. @@ -24,4 +8,230 @@ to gather from the frontend. All information except the host name are available. -| + + +- `allow-arch` +- `allow-exe-extension` +- `allow-family` +- `allow-locale` +- `allow-os-type` +- `allow-platform` +- `allow-version` + +### Permission Table + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
IdentifierDescription
+ +`os:allow-arch` + + + +Enables the arch command without any pre-configured scope. + +
+ +`os:deny-arch` + + + +Denies the arch command without any pre-configured scope. + +
+ +`os:allow-exe-extension` + + + +Enables the exe_extension command without any pre-configured scope. + +
+ +`os:deny-exe-extension` + + + +Denies the exe_extension command without any pre-configured scope. + +
+ +`os:allow-family` + + + +Enables the family command without any pre-configured scope. + +
+ +`os:deny-family` + + + +Denies the family command without any pre-configured scope. + +
+ +`os:allow-hostname` + + + +Enables the hostname command without any pre-configured scope. + +
+ +`os:deny-hostname` + + + +Denies the hostname command without any pre-configured scope. + +
+ +`os:allow-locale` + + + +Enables the locale command without any pre-configured scope. + +
+ +`os:deny-locale` + + + +Denies the locale command without any pre-configured scope. + +
+ +`os:allow-os-type` + + + +Enables the os_type command without any pre-configured scope. + +
+ +`os:deny-os-type` + + + +Denies the os_type command without any pre-configured scope. + +
+ +`os:allow-platform` + + + +Enables the platform command without any pre-configured scope. + +
+ +`os:deny-platform` + + + +Denies the platform command without any pre-configured scope. + +
+ +`os:allow-version` + + + +Enables the version command without any pre-configured scope. + +
+ +`os:deny-version` + + + +Denies the version command without any pre-configured scope. + +
diff --git a/plugins/os/permissions/schemas/schema.json b/plugins/os/permissions/schemas/schema.json index 5359f36cc..3d069d188 100644 --- a/plugins/os/permissions/schemas/schema.json +++ b/plugins/os/permissions/schemas/schema.json @@ -49,7 +49,7 @@ "minimum": 1.0 }, "description": { - "description": "Human-readable description of what the permission does.", + "description": "Human-readable description of what the permission does. Tauri convention is to use

headings in markdown content for Tauri documentation generation purposes.", "type": [ "string", "null" @@ -111,7 +111,7 @@ "type": "string" }, "description": { - "description": "Human-readable description of what the permission does.", + "description": "Human-readable description of what the permission does. Tauri internal convention is to use

headings in markdown content for Tauri documentation generation purposes.", "type": [ "string", "null" @@ -172,7 +172,7 @@ } }, "Scopes": { - "description": "A restriction of the command/endpoint functionality.\n\nIt can be of any serde serializable type and is used for allowing or preventing certain actions inside a Tauri command.\n\nThe scope is passed to the command and handled/enforced by the command itself.", + "description": "An argument for fine grained behavior control of Tauri commands.\n\nIt can be of any serde serializable type and is used to allow or prevent certain actions inside a Tauri command. The configured scope is passed to the command and will be enforced by the command implementation.\n\n## Example\n\n```json { \"allow\": [{ \"path\": \"$HOME/**\" }], \"deny\": [{ \"path\": \"$HOME/secret.txt\" }] } ```", "type": "object", "properties": { "allow": { @@ -186,7 +186,7 @@ } }, "deny": { - "description": "Data that defines what is denied by the scope.", + "description": "Data that defines what is denied by the scope. This should be prioritized by validation logic.", "type": [ "array", "null" diff --git a/plugins/positioner/permissions/autogenerated/reference.md b/plugins/positioner/permissions/autogenerated/reference.md index b373d4fae..d7fa07ecd 100644 --- a/plugins/positioner/permissions/autogenerated/reference.md +++ b/plugins/positioner/permissions/autogenerated/reference.md @@ -1,5 +1,41 @@ -| Permission | Description | -|------|-----| -|`allow-move-window`|Enables the move_window command without any pre-configured scope.| -|`deny-move-window`|Denies the move_window command without any pre-configured scope.| -|`default`|Allows the move_window command| +## Default Permission + +Allows the move_window command + +- `allow-move-window` + +### Permission Table + + + + + + + + + + + + + + + + + +
IdentifierDescription
+ +`positioner:allow-move-window` + + + +Enables the move_window command without any pre-configured scope. + +
+ +`positioner:deny-move-window` + + + +Denies the move_window command without any pre-configured scope. + +
diff --git a/plugins/positioner/permissions/schemas/schema.json b/plugins/positioner/permissions/schemas/schema.json index 7cf674b95..9a70b8472 100644 --- a/plugins/positioner/permissions/schemas/schema.json +++ b/plugins/positioner/permissions/schemas/schema.json @@ -49,7 +49,7 @@ "minimum": 1.0 }, "description": { - "description": "Human-readable description of what the permission does.", + "description": "Human-readable description of what the permission does. Tauri convention is to use

headings in markdown content for Tauri documentation generation purposes.", "type": [ "string", "null" @@ -111,7 +111,7 @@ "type": "string" }, "description": { - "description": "Human-readable description of what the permission does.", + "description": "Human-readable description of what the permission does. Tauri internal convention is to use

headings in markdown content for Tauri documentation generation purposes.", "type": [ "string", "null" @@ -172,7 +172,7 @@ } }, "Scopes": { - "description": "A restriction of the command/endpoint functionality.\n\nIt can be of any serde serializable type and is used for allowing or preventing certain actions inside a Tauri command.\n\nThe scope is passed to the command and handled/enforced by the command itself.", + "description": "An argument for fine grained behavior control of Tauri commands.\n\nIt can be of any serde serializable type and is used to allow or prevent certain actions inside a Tauri command. The configured scope is passed to the command and will be enforced by the command implementation.\n\n## Example\n\n```json { \"allow\": [{ \"path\": \"$HOME/**\" }], \"deny\": [{ \"path\": \"$HOME/secret.txt\" }] } ```", "type": "object", "properties": { "allow": { @@ -186,7 +186,7 @@ } }, "deny": { - "description": "Data that defines what is denied by the scope.", + "description": "Data that defines what is denied by the scope. This should be prioritized by validation logic.", "type": [ "array", "null" diff --git a/plugins/process/permissions/autogenerated/reference.md b/plugins/process/permissions/autogenerated/reference.md index 949bf6ac2..7ae1b4ba3 100644 --- a/plugins/process/permissions/autogenerated/reference.md +++ b/plugins/process/permissions/autogenerated/reference.md @@ -1,14 +1,75 @@ -| Permission | Description | -|------|-----| -|`allow-exit`|Enables the exit command without any pre-configured scope.| -|`deny-exit`|Denies the exit command without any pre-configured scope.| -|`allow-restart`|Enables the restart command without any pre-configured scope.| -|`deny-restart`|Denies the restart command without any pre-configured scope.| -|`default`|This permission set configures which +## Default Permission + +This permission set configures which process feeatures are by default exposed. #### Granted Permissions This enables to quit via `allow-exit` and restart via `allow-restart` the application. -| + + +- `allow-exit` +- `allow-restart` + +### Permission Table + + + + + + + + + + + + + + + + + + + + + + + + + + + +
IdentifierDescription
+ +`process:allow-exit` + + + +Enables the exit command without any pre-configured scope. + +
+ +`process:deny-exit` + + + +Denies the exit command without any pre-configured scope. + +
+ +`process:allow-restart` + + + +Enables the restart command without any pre-configured scope. + +
+ +`process:deny-restart` + + + +Denies the restart command without any pre-configured scope. + +
diff --git a/plugins/process/permissions/schemas/schema.json b/plugins/process/permissions/schemas/schema.json index 3dc97704b..55b9dd9fe 100644 --- a/plugins/process/permissions/schemas/schema.json +++ b/plugins/process/permissions/schemas/schema.json @@ -49,7 +49,7 @@ "minimum": 1.0 }, "description": { - "description": "Human-readable description of what the permission does.", + "description": "Human-readable description of what the permission does. Tauri convention is to use

headings in markdown content for Tauri documentation generation purposes.", "type": [ "string", "null" @@ -111,7 +111,7 @@ "type": "string" }, "description": { - "description": "Human-readable description of what the permission does.", + "description": "Human-readable description of what the permission does. Tauri internal convention is to use

headings in markdown content for Tauri documentation generation purposes.", "type": [ "string", "null" @@ -172,7 +172,7 @@ } }, "Scopes": { - "description": "A restriction of the command/endpoint functionality.\n\nIt can be of any serde serializable type and is used for allowing or preventing certain actions inside a Tauri command.\n\nThe scope is passed to the command and handled/enforced by the command itself.", + "description": "An argument for fine grained behavior control of Tauri commands.\n\nIt can be of any serde serializable type and is used to allow or prevent certain actions inside a Tauri command. The configured scope is passed to the command and will be enforced by the command implementation.\n\n## Example\n\n```json { \"allow\": [{ \"path\": \"$HOME/**\" }], \"deny\": [{ \"path\": \"$HOME/secret.txt\" }] } ```", "type": "object", "properties": { "allow": { @@ -186,7 +186,7 @@ } }, "deny": { - "description": "Data that defines what is denied by the scope.", + "description": "Data that defines what is denied by the scope. This should be prioritized by validation logic.", "type": [ "array", "null" diff --git a/plugins/shell/permissions/autogenerated/reference.md b/plugins/shell/permissions/autogenerated/reference.md index 00af0dc4c..157e67bf6 100644 --- a/plugins/shell/permissions/autogenerated/reference.md +++ b/plugins/shell/permissions/autogenerated/reference.md @@ -1,16 +1,6 @@ -| Permission | Description | -|------|-----| -|`allow-execute`|Enables the execute command without any pre-configured scope.| -|`deny-execute`|Denies the execute command without any pre-configured scope.| -|`allow-kill`|Enables the kill command without any pre-configured scope.| -|`deny-kill`|Denies the kill command without any pre-configured scope.| -|`allow-open`|Enables the open command without any pre-configured scope.| -|`deny-open`|Denies the open command without any pre-configured scope.| -|`allow-spawn`|Enables the spawn command without any pre-configured scope.| -|`deny-spawn`|Denies the spawn command without any pre-configured scope.| -|`allow-stdin-write`|Enables the stdin_write command without any pre-configured scope.| -|`deny-stdin-write`|Denies the stdin_write command without any pre-configured scope.| -|`default`|This permission set configures which +## Default Permission + +This permission set configures which shell functionality is exposed by default. #### Granted Permissions @@ -18,4 +8,146 @@ shell functionality is exposed by default. It allows to use the `open` functionality without any specific scope pre-configured. It will allow opening `http(s)://`, `tel:` and `mailto:` links. -| + + +- `allow-open` + +### Permission Table + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
IdentifierDescription
+ +`shell:allow-execute` + + + +Enables the execute command without any pre-configured scope. + +
+ +`shell:deny-execute` + + + +Denies the execute command without any pre-configured scope. + +
+ +`shell:allow-kill` + + + +Enables the kill command without any pre-configured scope. + +
+ +`shell:deny-kill` + + + +Denies the kill command without any pre-configured scope. + +
+ +`shell:allow-open` + + + +Enables the open command without any pre-configured scope. + +
+ +`shell:deny-open` + + + +Denies the open command without any pre-configured scope. + +
+ +`shell:allow-spawn` + + + +Enables the spawn command without any pre-configured scope. + +
+ +`shell:deny-spawn` + + + +Denies the spawn command without any pre-configured scope. + +
+ +`shell:allow-stdin-write` + + + +Enables the stdin_write command without any pre-configured scope. + +
+ +`shell:deny-stdin-write` + + + +Denies the stdin_write command without any pre-configured scope. + +
diff --git a/plugins/shell/permissions/schemas/schema.json b/plugins/shell/permissions/schemas/schema.json index 9730ecc72..93c399568 100644 --- a/plugins/shell/permissions/schemas/schema.json +++ b/plugins/shell/permissions/schemas/schema.json @@ -49,7 +49,7 @@ "minimum": 1.0 }, "description": { - "description": "Human-readable description of what the permission does.", + "description": "Human-readable description of what the permission does. Tauri convention is to use

headings in markdown content for Tauri documentation generation purposes.", "type": [ "string", "null" @@ -111,7 +111,7 @@ "type": "string" }, "description": { - "description": "Human-readable description of what the permission does.", + "description": "Human-readable description of what the permission does. Tauri internal convention is to use

headings in markdown content for Tauri documentation generation purposes.", "type": [ "string", "null" @@ -172,7 +172,7 @@ } }, "Scopes": { - "description": "A restriction of the command/endpoint functionality.\n\nIt can be of any serde serializable type and is used for allowing or preventing certain actions inside a Tauri command.\n\nThe scope is passed to the command and handled/enforced by the command itself.", + "description": "An argument for fine grained behavior control of Tauri commands.\n\nIt can be of any serde serializable type and is used to allow or prevent certain actions inside a Tauri command. The configured scope is passed to the command and will be enforced by the command implementation.\n\n## Example\n\n```json { \"allow\": [{ \"path\": \"$HOME/**\" }], \"deny\": [{ \"path\": \"$HOME/secret.txt\" }] } ```", "type": "object", "properties": { "allow": { @@ -186,7 +186,7 @@ } }, "deny": { - "description": "Data that defines what is denied by the scope.", + "description": "Data that defines what is denied by the scope. This should be prioritized by validation logic.", "type": [ "array", "null" diff --git a/plugins/single-instance/src/platform_impl/linux.rs b/plugins/single-instance/src/platform_impl/linux.rs index 59586d26c..3136074f3 100644 --- a/plugins/single-instance/src/platform_impl/linux.rs +++ b/plugins/single-instance/src/platform_impl/linux.rs @@ -2,8 +2,6 @@ // SPDX-License-Identifier: Apache-2.0 // SPDX-License-Identifier: MIT -#![cfg(target_os = "linux")] - #[cfg(feature = "semver")] use crate::semver_compat::semver_compat_string; diff --git a/plugins/single-instance/src/platform_impl/macos.rs b/plugins/single-instance/src/platform_impl/macos.rs index db9d558ee..8f35d76c8 100644 --- a/plugins/single-instance/src/platform_impl/macos.rs +++ b/plugins/single-instance/src/platform_impl/macos.rs @@ -2,8 +2,6 @@ // SPDX-License-Identifier: Apache-2.0 // SPDX-License-Identifier: MIT -#![cfg(target_os = "macos")] - use std::{ io::{BufWriter, Error, ErrorKind, Read, Write}, os::unix::net::{UnixListener, UnixStream}, diff --git a/plugins/single-instance/src/platform_impl/windows.rs b/plugins/single-instance/src/platform_impl/windows.rs index d7a5b4721..d5ff3b8ba 100644 --- a/plugins/single-instance/src/platform_impl/windows.rs +++ b/plugins/single-instance/src/platform_impl/windows.rs @@ -2,8 +2,6 @@ // SPDX-License-Identifier: Apache-2.0 // SPDX-License-Identifier: MIT -#![cfg(target_os = "windows")] - #[cfg(feature = "semver")] use crate::semver_compat::semver_compat_string; diff --git a/plugins/sql/Cargo.toml b/plugins/sql/Cargo.toml index 2def49325..bc48e385d 100644 --- a/plugins/sql/Cargo.toml +++ b/plugins/sql/Cargo.toml @@ -30,6 +30,7 @@ tokio = { version = "1", features = [ "sync" ] } indexmap = { version = "2.2.6", features = [ "serde" ] } [features] +default = ["sqlite"] sqlite = [ "sqlx/sqlite", "sqlx/runtime-tokio" ] mysql = [ "sqlx/mysql", "sqlx/runtime-tokio-rustls" ] postgres = [ "sqlx/postgres", "sqlx/runtime-tokio-rustls" ] diff --git a/plugins/sql/permissions/autogenerated/reference.md b/plugins/sql/permissions/autogenerated/reference.md index bbaa7b8eb..718a173f1 100644 --- a/plugins/sql/permissions/autogenerated/reference.md +++ b/plugins/sql/permissions/autogenerated/reference.md @@ -1,14 +1,6 @@ -| Permission | Description | -|------|-----| -|`allow-close`|Enables the close command without any pre-configured scope.| -|`deny-close`|Denies the close command without any pre-configured scope.| -|`allow-execute`|Enables the execute command without any pre-configured scope.| -|`deny-execute`|Denies the execute command without any pre-configured scope.| -|`allow-load`|Enables the load command without any pre-configured scope.| -|`deny-load`|Denies the load command without any pre-configured scope.| -|`allow-select`|Enables the select command without any pre-configured scope.| -|`deny-select`|Denies the select command without any pre-configured scope.| -|`default`|# Tauri SQL Default Permissions +## Default Permission + +# Tauri SQL Default Permissions This permission set configures what kind of database operations are available from the sql plugin. @@ -18,4 +10,122 @@ database operations are available from the sql plugin. All reading related operations are enabled. Also allows to load or close a connection. -| + + +- `allow-close` +- `allow-load` +- `allow-select` + +### Permission Table + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
IdentifierDescription
+ +`sql:allow-close` + + + +Enables the close command without any pre-configured scope. + +
+ +`sql:deny-close` + + + +Denies the close command without any pre-configured scope. + +
+ +`sql:allow-execute` + + + +Enables the execute command without any pre-configured scope. + +
+ +`sql:deny-execute` + + + +Denies the execute command without any pre-configured scope. + +
+ +`sql:allow-load` + + + +Enables the load command without any pre-configured scope. + +
+ +`sql:deny-load` + + + +Denies the load command without any pre-configured scope. + +
+ +`sql:allow-select` + + + +Enables the select command without any pre-configured scope. + +
+ +`sql:deny-select` + + + +Denies the select command without any pre-configured scope. + +
diff --git a/plugins/sql/permissions/schemas/schema.json b/plugins/sql/permissions/schemas/schema.json index 417e565df..9b1988f5a 100644 --- a/plugins/sql/permissions/schemas/schema.json +++ b/plugins/sql/permissions/schemas/schema.json @@ -49,7 +49,7 @@ "minimum": 1.0 }, "description": { - "description": "Human-readable description of what the permission does.", + "description": "Human-readable description of what the permission does. Tauri convention is to use

headings in markdown content for Tauri documentation generation purposes.", "type": [ "string", "null" @@ -111,7 +111,7 @@ "type": "string" }, "description": { - "description": "Human-readable description of what the permission does.", + "description": "Human-readable description of what the permission does. Tauri internal convention is to use

headings in markdown content for Tauri documentation generation purposes.", "type": [ "string", "null" @@ -172,7 +172,7 @@ } }, "Scopes": { - "description": "A restriction of the command/endpoint functionality.\n\nIt can be of any serde serializable type and is used for allowing or preventing certain actions inside a Tauri command.\n\nThe scope is passed to the command and handled/enforced by the command itself.", + "description": "An argument for fine grained behavior control of Tauri commands.\n\nIt can be of any serde serializable type and is used to allow or prevent certain actions inside a Tauri command. The configured scope is passed to the command and will be enforced by the command implementation.\n\n## Example\n\n```json { \"allow\": [{ \"path\": \"$HOME/**\" }], \"deny\": [{ \"path\": \"$HOME/secret.txt\" }] } ```", "type": "object", "properties": { "allow": { @@ -186,7 +186,7 @@ } }, "deny": { - "description": "Data that defines what is denied by the scope.", + "description": "Data that defines what is denied by the scope. This should be prioritized by validation logic.", "type": [ "array", "null" diff --git a/plugins/store/permissions/autogenerated/reference.md b/plugins/store/permissions/autogenerated/reference.md index bab6429d7..9b54940b0 100644 --- a/plugins/store/permissions/autogenerated/reference.md +++ b/plugins/store/permissions/autogenerated/reference.md @@ -1,34 +1,345 @@ -| Permission | Description | -|------|-----| -|`allow-clear`|Enables the clear command without any pre-configured scope.| -|`deny-clear`|Denies the clear command without any pre-configured scope.| -|`allow-delete`|Enables the delete command without any pre-configured scope.| -|`deny-delete`|Denies the delete command without any pre-configured scope.| -|`allow-entries`|Enables the entries command without any pre-configured scope.| -|`deny-entries`|Denies the entries command without any pre-configured scope.| -|`allow-get`|Enables the get command without any pre-configured scope.| -|`deny-get`|Denies the get command without any pre-configured scope.| -|`allow-has`|Enables the has command without any pre-configured scope.| -|`deny-has`|Denies the has command without any pre-configured scope.| -|`allow-keys`|Enables the keys command without any pre-configured scope.| -|`deny-keys`|Denies the keys command without any pre-configured scope.| -|`allow-length`|Enables the length command without any pre-configured scope.| -|`deny-length`|Denies the length command without any pre-configured scope.| -|`allow-load`|Enables the load command without any pre-configured scope.| -|`deny-load`|Denies the load command without any pre-configured scope.| -|`allow-reset`|Enables the reset command without any pre-configured scope.| -|`deny-reset`|Denies the reset command without any pre-configured scope.| -|`allow-save`|Enables the save command without any pre-configured scope.| -|`deny-save`|Denies the save command without any pre-configured scope.| -|`allow-set`|Enables the set command without any pre-configured scope.| -|`deny-set`|Denies the set command without any pre-configured scope.| -|`allow-values`|Enables the values command without any pre-configured scope.| -|`deny-values`|Denies the values command without any pre-configured scope.| -|`default`|This permission set configures what kind of +## Default Permission + +This permission set configures what kind of operations are available from the store plugin. #### Granted Permissions All operations are enabled by default. -| + + +- `allow-clear` +- `allow-delete` +- `allow-entries` +- `allow-get` +- `allow-has` +- `allow-keys` +- `allow-length` +- `allow-load` +- `allow-reset` +- `allow-save` +- `allow-set` +- `allow-values` + +### Permission Table + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
IdentifierDescription
+ +`store:allow-clear` + + + +Enables the clear command without any pre-configured scope. + +
+ +`store:deny-clear` + + + +Denies the clear command without any pre-configured scope. + +
+ +`store:allow-delete` + + + +Enables the delete command without any pre-configured scope. + +
+ +`store:deny-delete` + + + +Denies the delete command without any pre-configured scope. + +
+ +`store:allow-entries` + + + +Enables the entries command without any pre-configured scope. + +
+ +`store:deny-entries` + + + +Denies the entries command without any pre-configured scope. + +
+ +`store:allow-get` + + + +Enables the get command without any pre-configured scope. + +
+ +`store:deny-get` + + + +Denies the get command without any pre-configured scope. + +
+ +`store:allow-has` + + + +Enables the has command without any pre-configured scope. + +
+ +`store:deny-has` + + + +Denies the has command without any pre-configured scope. + +
+ +`store:allow-keys` + + + +Enables the keys command without any pre-configured scope. + +
+ +`store:deny-keys` + + + +Denies the keys command without any pre-configured scope. + +
+ +`store:allow-length` + + + +Enables the length command without any pre-configured scope. + +
+ +`store:deny-length` + + + +Denies the length command without any pre-configured scope. + +
+ +`store:allow-load` + + + +Enables the load command without any pre-configured scope. + +
+ +`store:deny-load` + + + +Denies the load command without any pre-configured scope. + +
+ +`store:allow-reset` + + + +Enables the reset command without any pre-configured scope. + +
+ +`store:deny-reset` + + + +Denies the reset command without any pre-configured scope. + +
+ +`store:allow-save` + + + +Enables the save command without any pre-configured scope. + +
+ +`store:deny-save` + + + +Denies the save command without any pre-configured scope. + +
+ +`store:allow-set` + + + +Enables the set command without any pre-configured scope. + +
+ +`store:deny-set` + + + +Denies the set command without any pre-configured scope. + +
+ +`store:allow-values` + + + +Enables the values command without any pre-configured scope. + +
+ +`store:deny-values` + + + +Denies the values command without any pre-configured scope. + +
diff --git a/plugins/store/permissions/schemas/schema.json b/plugins/store/permissions/schemas/schema.json index 70c5986bf..01b67fe1f 100644 --- a/plugins/store/permissions/schemas/schema.json +++ b/plugins/store/permissions/schemas/schema.json @@ -49,7 +49,7 @@ "minimum": 1.0 }, "description": { - "description": "Human-readable description of what the permission does.", + "description": "Human-readable description of what the permission does. Tauri convention is to use

headings in markdown content for Tauri documentation generation purposes.", "type": [ "string", "null" @@ -111,7 +111,7 @@ "type": "string" }, "description": { - "description": "Human-readable description of what the permission does.", + "description": "Human-readable description of what the permission does. Tauri internal convention is to use

headings in markdown content for Tauri documentation generation purposes.", "type": [ "string", "null" @@ -172,7 +172,7 @@ } }, "Scopes": { - "description": "A restriction of the command/endpoint functionality.\n\nIt can be of any serde serializable type and is used for allowing or preventing certain actions inside a Tauri command.\n\nThe scope is passed to the command and handled/enforced by the command itself.", + "description": "An argument for fine grained behavior control of Tauri commands.\n\nIt can be of any serde serializable type and is used to allow or prevent certain actions inside a Tauri command. The configured scope is passed to the command and will be enforced by the command implementation.\n\n## Example\n\n```json { \"allow\": [{ \"path\": \"$HOME/**\" }], \"deny\": [{ \"path\": \"$HOME/secret.txt\" }] } ```", "type": "object", "properties": { "allow": { @@ -186,7 +186,7 @@ } }, "deny": { - "description": "Data that defines what is denied by the scope.", + "description": "Data that defines what is denied by the scope. This should be prioritized by validation logic.", "type": [ "array", "null" diff --git a/plugins/stronghold/permissions/autogenerated/reference.md b/plugins/stronghold/permissions/autogenerated/reference.md index 29b981eac..80f814952 100644 --- a/plugins/stronghold/permissions/autogenerated/reference.md +++ b/plugins/stronghold/permissions/autogenerated/reference.md @@ -1,32 +1,315 @@ -| Permission | Description | -|------|-----| -|`allow-create-client`|Enables the create_client command without any pre-configured scope.| -|`deny-create-client`|Denies the create_client command without any pre-configured scope.| -|`allow-destroy`|Enables the destroy command without any pre-configured scope.| -|`deny-destroy`|Denies the destroy command without any pre-configured scope.| -|`allow-execute-procedure`|Enables the execute_procedure command without any pre-configured scope.| -|`deny-execute-procedure`|Denies the execute_procedure command without any pre-configured scope.| -|`allow-get-store-record`|Enables the get_store_record command without any pre-configured scope.| -|`deny-get-store-record`|Denies the get_store_record command without any pre-configured scope.| -|`allow-initialize`|Enables the initialize command without any pre-configured scope.| -|`deny-initialize`|Denies the initialize command without any pre-configured scope.| -|`allow-load-client`|Enables the load_client command without any pre-configured scope.| -|`deny-load-client`|Denies the load_client command without any pre-configured scope.| -|`allow-remove-secret`|Enables the remove_secret command without any pre-configured scope.| -|`deny-remove-secret`|Denies the remove_secret command without any pre-configured scope.| -|`allow-remove-store-record`|Enables the remove_store_record command without any pre-configured scope.| -|`deny-remove-store-record`|Denies the remove_store_record command without any pre-configured scope.| -|`allow-save`|Enables the save command without any pre-configured scope.| -|`deny-save`|Denies the save command without any pre-configured scope.| -|`allow-save-secret`|Enables the save_secret command without any pre-configured scope.| -|`deny-save-secret`|Denies the save_secret command without any pre-configured scope.| -|`allow-save-store-record`|Enables the save_store_record command without any pre-configured scope.| -|`deny-save-store-record`|Denies the save_store_record command without any pre-configured scope.| -|`default`|This permission set configures what kind of +## Default Permission + +This permission set configures what kind of operations are available from the stronghold plugin. #### Granted Permissions All non-destructive operations are enabled by default. -| + + +- `allow-create-client` +- `allow-get-store-record` +- `allow-initialize` +- `allow-execute-procedure` +- `allow-load-client` +- `allow-save-secret` +- `allow-save-store-record` +- `allow-save` + +### Permission Table + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
IdentifierDescription
+ +`stronghold:allow-create-client` + + + +Enables the create_client command without any pre-configured scope. + +
+ +`stronghold:deny-create-client` + + + +Denies the create_client command without any pre-configured scope. + +
+ +`stronghold:allow-destroy` + + + +Enables the destroy command without any pre-configured scope. + +
+ +`stronghold:deny-destroy` + + + +Denies the destroy command without any pre-configured scope. + +
+ +`stronghold:allow-execute-procedure` + + + +Enables the execute_procedure command without any pre-configured scope. + +
+ +`stronghold:deny-execute-procedure` + + + +Denies the execute_procedure command without any pre-configured scope. + +
+ +`stronghold:allow-get-store-record` + + + +Enables the get_store_record command without any pre-configured scope. + +
+ +`stronghold:deny-get-store-record` + + + +Denies the get_store_record command without any pre-configured scope. + +
+ +`stronghold:allow-initialize` + + + +Enables the initialize command without any pre-configured scope. + +
+ +`stronghold:deny-initialize` + + + +Denies the initialize command without any pre-configured scope. + +
+ +`stronghold:allow-load-client` + + + +Enables the load_client command without any pre-configured scope. + +
+ +`stronghold:deny-load-client` + + + +Denies the load_client command without any pre-configured scope. + +
+ +`stronghold:allow-remove-secret` + + + +Enables the remove_secret command without any pre-configured scope. + +
+ +`stronghold:deny-remove-secret` + + + +Denies the remove_secret command without any pre-configured scope. + +
+ +`stronghold:allow-remove-store-record` + + + +Enables the remove_store_record command without any pre-configured scope. + +
+ +`stronghold:deny-remove-store-record` + + + +Denies the remove_store_record command without any pre-configured scope. + +
+ +`stronghold:allow-save` + + + +Enables the save command without any pre-configured scope. + +
+ +`stronghold:deny-save` + + + +Denies the save command without any pre-configured scope. + +
+ +`stronghold:allow-save-secret` + + + +Enables the save_secret command without any pre-configured scope. + +
+ +`stronghold:deny-save-secret` + + + +Denies the save_secret command without any pre-configured scope. + +
+ +`stronghold:allow-save-store-record` + + + +Enables the save_store_record command without any pre-configured scope. + +
+ +`stronghold:deny-save-store-record` + + + +Denies the save_store_record command without any pre-configured scope. + +
diff --git a/plugins/stronghold/permissions/schemas/schema.json b/plugins/stronghold/permissions/schemas/schema.json index e01eab994..84d7ad479 100644 --- a/plugins/stronghold/permissions/schemas/schema.json +++ b/plugins/stronghold/permissions/schemas/schema.json @@ -49,7 +49,7 @@ "minimum": 1.0 }, "description": { - "description": "Human-readable description of what the permission does.", + "description": "Human-readable description of what the permission does. Tauri convention is to use

headings in markdown content for Tauri documentation generation purposes.", "type": [ "string", "null" @@ -111,7 +111,7 @@ "type": "string" }, "description": { - "description": "Human-readable description of what the permission does.", + "description": "Human-readable description of what the permission does. Tauri internal convention is to use

headings in markdown content for Tauri documentation generation purposes.", "type": [ "string", "null" @@ -172,7 +172,7 @@ } }, "Scopes": { - "description": "A restriction of the command/endpoint functionality.\n\nIt can be of any serde serializable type and is used for allowing or preventing certain actions inside a Tauri command.\n\nThe scope is passed to the command and handled/enforced by the command itself.", + "description": "An argument for fine grained behavior control of Tauri commands.\n\nIt can be of any serde serializable type and is used to allow or prevent certain actions inside a Tauri command. The configured scope is passed to the command and will be enforced by the command implementation.\n\n## Example\n\n```json { \"allow\": [{ \"path\": \"$HOME/**\" }], \"deny\": [{ \"path\": \"$HOME/secret.txt\" }] } ```", "type": "object", "properties": { "allow": { @@ -186,7 +186,7 @@ } }, "deny": { - "description": "Data that defines what is denied by the scope.", + "description": "Data that defines what is denied by the scope. This should be prioritized by validation logic.", "type": [ "array", "null" diff --git a/plugins/updater/permissions/autogenerated/reference.md b/plugins/updater/permissions/autogenerated/reference.md index a2d74addf..0137b4df4 100644 --- a/plugins/updater/permissions/autogenerated/reference.md +++ b/plugins/updater/permissions/autogenerated/reference.md @@ -1,14 +1,6 @@ -| Permission | Description | -|------|-----| -|`allow-check`|Enables the check command without any pre-configured scope.| -|`deny-check`|Denies the check command without any pre-configured scope.| -|`allow-download`|Enables the download command without any pre-configured scope.| -|`deny-download`|Denies the download command without any pre-configured scope.| -|`allow-download-and-install`|Enables the download_and_install command without any pre-configured scope.| -|`deny-download-and-install`|Denies the download_and_install command without any pre-configured scope.| -|`allow-install`|Enables the install command without any pre-configured scope.| -|`deny-install`|Denies the install command without any pre-configured scope.| -|`default`|This permission set configures which kind of +## Default Permission + +This permission set configures which kind of updater functions are exposed to the frontend. #### Granted Permissions @@ -16,4 +8,123 @@ updater functions are exposed to the frontend. The full workflow from checking for updates to installing them is enabled. -| + + +- `allow-check` +- `allow-download` +- `allow-install` +- `allow-download-and-install` + +### Permission Table + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
IdentifierDescription
+ +`updater:allow-check` + + + +Enables the check command without any pre-configured scope. + +
+ +`updater:deny-check` + + + +Denies the check command without any pre-configured scope. + +
+ +`updater:allow-download` + + + +Enables the download command without any pre-configured scope. + +
+ +`updater:deny-download` + + + +Denies the download command without any pre-configured scope. + +
+ +`updater:allow-download-and-install` + + + +Enables the download_and_install command without any pre-configured scope. + +
+ +`updater:deny-download-and-install` + + + +Denies the download_and_install command without any pre-configured scope. + +
+ +`updater:allow-install` + + + +Enables the install command without any pre-configured scope. + +
+ +`updater:deny-install` + + + +Denies the install command without any pre-configured scope. + +
diff --git a/plugins/updater/permissions/schemas/schema.json b/plugins/updater/permissions/schemas/schema.json index b6eacc0ae..9d1671f1f 100644 --- a/plugins/updater/permissions/schemas/schema.json +++ b/plugins/updater/permissions/schemas/schema.json @@ -49,7 +49,7 @@ "minimum": 1.0 }, "description": { - "description": "Human-readable description of what the permission does.", + "description": "Human-readable description of what the permission does. Tauri convention is to use

headings in markdown content for Tauri documentation generation purposes.", "type": [ "string", "null" @@ -111,7 +111,7 @@ "type": "string" }, "description": { - "description": "Human-readable description of what the permission does.", + "description": "Human-readable description of what the permission does. Tauri internal convention is to use

headings in markdown content for Tauri documentation generation purposes.", "type": [ "string", "null" @@ -172,7 +172,7 @@ } }, "Scopes": { - "description": "A restriction of the command/endpoint functionality.\n\nIt can be of any serde serializable type and is used for allowing or preventing certain actions inside a Tauri command.\n\nThe scope is passed to the command and handled/enforced by the command itself.", + "description": "An argument for fine grained behavior control of Tauri commands.\n\nIt can be of any serde serializable type and is used to allow or prevent certain actions inside a Tauri command. The configured scope is passed to the command and will be enforced by the command implementation.\n\n## Example\n\n```json { \"allow\": [{ \"path\": \"$HOME/**\" }], \"deny\": [{ \"path\": \"$HOME/secret.txt\" }] } ```", "type": "object", "properties": { "allow": { @@ -186,7 +186,7 @@ } }, "deny": { - "description": "Data that defines what is denied by the scope.", + "description": "Data that defines what is denied by the scope. This should be prioritized by validation logic.", "type": [ "array", "null" diff --git a/plugins/upload/permissions/autogenerated/reference.md b/plugins/upload/permissions/autogenerated/reference.md index 2ad3df814..b7ca687f9 100644 --- a/plugins/upload/permissions/autogenerated/reference.md +++ b/plugins/upload/permissions/autogenerated/reference.md @@ -1,14 +1,75 @@ -| Permission | Description | -|------|-----| -|`allow-download`|Enables the download command without any pre-configured scope.| -|`deny-download`|Denies the download command without any pre-configured scope.| -|`allow-upload`|Enables the upload command without any pre-configured scope.| -|`deny-upload`|Denies the upload command without any pre-configured scope.| -|`default`|This permission set configures what kind of +## Default Permission + +This permission set configures what kind of operations are available from the upload plugin. #### Granted Permissions All operations are enabled by default. -| + + +- `allow-upload` +- `allow-download` + +### Permission Table + + + + + + + + + + + + + + + + + + + + + + + + + + + +
IdentifierDescription
+ +`upload:allow-download` + + + +Enables the download command without any pre-configured scope. + +
+ +`upload:deny-download` + + + +Denies the download command without any pre-configured scope. + +
+ +`upload:allow-upload` + + + +Enables the upload command without any pre-configured scope. + +
+ +`upload:deny-upload` + + + +Denies the upload command without any pre-configured scope. + +
diff --git a/plugins/upload/permissions/schemas/schema.json b/plugins/upload/permissions/schemas/schema.json index d0b242193..30e93b6e8 100644 --- a/plugins/upload/permissions/schemas/schema.json +++ b/plugins/upload/permissions/schemas/schema.json @@ -49,7 +49,7 @@ "minimum": 1.0 }, "description": { - "description": "Human-readable description of what the permission does.", + "description": "Human-readable description of what the permission does. Tauri convention is to use

headings in markdown content for Tauri documentation generation purposes.", "type": [ "string", "null" @@ -111,7 +111,7 @@ "type": "string" }, "description": { - "description": "Human-readable description of what the permission does.", + "description": "Human-readable description of what the permission does. Tauri internal convention is to use

headings in markdown content for Tauri documentation generation purposes.", "type": [ "string", "null" @@ -172,7 +172,7 @@ } }, "Scopes": { - "description": "A restriction of the command/endpoint functionality.\n\nIt can be of any serde serializable type and is used for allowing or preventing certain actions inside a Tauri command.\n\nThe scope is passed to the command and handled/enforced by the command itself.", + "description": "An argument for fine grained behavior control of Tauri commands.\n\nIt can be of any serde serializable type and is used to allow or prevent certain actions inside a Tauri command. The configured scope is passed to the command and will be enforced by the command implementation.\n\n## Example\n\n```json { \"allow\": [{ \"path\": \"$HOME/**\" }], \"deny\": [{ \"path\": \"$HOME/secret.txt\" }] } ```", "type": "object", "properties": { "allow": { @@ -186,7 +186,7 @@ } }, "deny": { - "description": "Data that defines what is denied by the scope.", + "description": "Data that defines what is denied by the scope. This should be prioritized by validation logic.", "type": [ "array", "null" diff --git a/plugins/websocket/permissions/autogenerated/reference.md b/plugins/websocket/permissions/autogenerated/reference.md index fe0b0727c..48ce4ec2f 100644 --- a/plugins/websocket/permissions/autogenerated/reference.md +++ b/plugins/websocket/permissions/autogenerated/reference.md @@ -1,7 +1,68 @@ -| Permission | Description | -|------|-----| -|`allow-connect`|Enables the connect command without any pre-configured scope.| -|`deny-connect`|Denies the connect command without any pre-configured scope.| -|`allow-send`|Enables the send command without any pre-configured scope.| -|`deny-send`|Denies the send command without any pre-configured scope.| -|`default`|Allows connecting and sending data to a WebSocket server| +## Default Permission + +Allows connecting and sending data to a WebSocket server + +- `allow-connect` +- `allow-send` + +### Permission Table + + + + + + + + + + + + + + + + + + + + + + + + + + + +
IdentifierDescription
+ +`websocket:allow-connect` + + + +Enables the connect command without any pre-configured scope. + +
+ +`websocket:deny-connect` + + + +Denies the connect command without any pre-configured scope. + +
+ +`websocket:allow-send` + + + +Enables the send command without any pre-configured scope. + +
+ +`websocket:deny-send` + + + +Denies the send command without any pre-configured scope. + +
diff --git a/plugins/websocket/permissions/schemas/schema.json b/plugins/websocket/permissions/schemas/schema.json index 35fb7fb7e..62ceff2cf 100644 --- a/plugins/websocket/permissions/schemas/schema.json +++ b/plugins/websocket/permissions/schemas/schema.json @@ -49,7 +49,7 @@ "minimum": 1.0 }, "description": { - "description": "Human-readable description of what the permission does.", + "description": "Human-readable description of what the permission does. Tauri convention is to use

headings in markdown content for Tauri documentation generation purposes.", "type": [ "string", "null" @@ -111,7 +111,7 @@ "type": "string" }, "description": { - "description": "Human-readable description of what the permission does.", + "description": "Human-readable description of what the permission does. Tauri internal convention is to use

headings in markdown content for Tauri documentation generation purposes.", "type": [ "string", "null" @@ -172,7 +172,7 @@ } }, "Scopes": { - "description": "A restriction of the command/endpoint functionality.\n\nIt can be of any serde serializable type and is used for allowing or preventing certain actions inside a Tauri command.\n\nThe scope is passed to the command and handled/enforced by the command itself.", + "description": "An argument for fine grained behavior control of Tauri commands.\n\nIt can be of any serde serializable type and is used to allow or prevent certain actions inside a Tauri command. The configured scope is passed to the command and will be enforced by the command implementation.\n\n## Example\n\n```json { \"allow\": [{ \"path\": \"$HOME/**\" }], \"deny\": [{ \"path\": \"$HOME/secret.txt\" }] } ```", "type": "object", "properties": { "allow": { @@ -186,7 +186,7 @@ } }, "deny": { - "description": "Data that defines what is denied by the scope.", + "description": "Data that defines what is denied by the scope. This should be prioritized by validation logic.", "type": [ "array", "null" diff --git a/plugins/window-state/permissions/autogenerated/reference.md b/plugins/window-state/permissions/autogenerated/reference.md index 7a0f628e3..5875fe759 100644 --- a/plugins/window-state/permissions/autogenerated/reference.md +++ b/plugins/window-state/permissions/autogenerated/reference.md @@ -1,16 +1,102 @@ -| Permission | Description | -|------|-----| -|`allow-filename`|Enables the filename command without any pre-configured scope.| -|`deny-filename`|Denies the filename command without any pre-configured scope.| -|`allow-restore-state`|Enables the restore_state command without any pre-configured scope.| -|`deny-restore-state`|Denies the restore_state command without any pre-configured scope.| -|`allow-save-window-state`|Enables the save_window_state command without any pre-configured scope.| -|`deny-save-window-state`|Denies the save_window_state command without any pre-configured scope.| -|`default`|This permission set configures what kind of +## Default Permission + +This permission set configures what kind of operations are available from the window state plugin. #### Granted Permissions All operations are enabled by default. -| + + +- `allow-filename` +- `allow-restore-state` +- `allow-save-window-state` + +### Permission Table + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
IdentifierDescription
+ +`window-state:allow-filename` + + + +Enables the filename command without any pre-configured scope. + +
+ +`window-state:deny-filename` + + + +Denies the filename command without any pre-configured scope. + +
+ +`window-state:allow-restore-state` + + + +Enables the restore_state command without any pre-configured scope. + +
+ +`window-state:deny-restore-state` + + + +Denies the restore_state command without any pre-configured scope. + +
+ +`window-state:allow-save-window-state` + + + +Enables the save_window_state command without any pre-configured scope. + +
+ +`window-state:deny-save-window-state` + + + +Denies the save_window_state command without any pre-configured scope. + +
diff --git a/plugins/window-state/permissions/schemas/schema.json b/plugins/window-state/permissions/schemas/schema.json index 008bdcb7c..1b23652dd 100644 --- a/plugins/window-state/permissions/schemas/schema.json +++ b/plugins/window-state/permissions/schemas/schema.json @@ -49,7 +49,7 @@ "minimum": 1.0 }, "description": { - "description": "Human-readable description of what the permission does.", + "description": "Human-readable description of what the permission does. Tauri convention is to use

headings in markdown content for Tauri documentation generation purposes.", "type": [ "string", "null" @@ -111,7 +111,7 @@ "type": "string" }, "description": { - "description": "Human-readable description of what the permission does.", + "description": "Human-readable description of what the permission does. Tauri internal convention is to use

headings in markdown content for Tauri documentation generation purposes.", "type": [ "string", "null" @@ -172,7 +172,7 @@ } }, "Scopes": { - "description": "A restriction of the command/endpoint functionality.\n\nIt can be of any serde serializable type and is used for allowing or preventing certain actions inside a Tauri command.\n\nThe scope is passed to the command and handled/enforced by the command itself.", + "description": "An argument for fine grained behavior control of Tauri commands.\n\nIt can be of any serde serializable type and is used to allow or prevent certain actions inside a Tauri command. The configured scope is passed to the command and will be enforced by the command implementation.\n\n## Example\n\n```json { \"allow\": [{ \"path\": \"$HOME/**\" }], \"deny\": [{ \"path\": \"$HOME/secret.txt\" }] } ```", "type": "object", "properties": { "allow": { @@ -186,7 +186,7 @@ } }, "deny": { - "description": "Data that defines what is denied by the scope.", + "description": "Data that defines what is denied by the scope. This should be prioritized by validation logic.", "type": [ "array", "null" From 0822665ea6ae3303ddbfc3f0689aac1446678556 Mon Sep 17 00:00:00 2001 From: Fabian-Lars Date: Tue, 2 Jul 2024 11:03:50 +0200 Subject: [PATCH 4/4] revert accidental cargo.toml change --- plugins/sql/Cargo.toml | 1 - 1 file changed, 1 deletion(-) diff --git a/plugins/sql/Cargo.toml b/plugins/sql/Cargo.toml index bc48e385d..2def49325 100644 --- a/plugins/sql/Cargo.toml +++ b/plugins/sql/Cargo.toml @@ -30,7 +30,6 @@ tokio = { version = "1", features = [ "sync" ] } indexmap = { version = "2.2.6", features = [ "serde" ] } [features] -default = ["sqlite"] sqlite = [ "sqlx/sqlite", "sqlx/runtime-tokio" ] mysql = [ "sqlx/mysql", "sqlx/runtime-tokio-rustls" ] postgres = [ "sqlx/postgres", "sqlx/runtime-tokio-rustls" ]