"description":"fs:default -> # Tauri `fs` default permissions\n\nThis configuration file defines the default permissions granted\nto the filesystem.\n\n### Granted Permissions\n\nThis default permission set enables all read-related commands and\nallows access to the `$APP` folder and sub directories created in it.\nThe location of the `$APP` folder depends on the operating system,\nwhere the application is run.\n\nIn general the `$APP` folder needs to be manually created\nby the application at runtime, before accessing files or folders\nin it is possible.\n\n### Denied Permissions\n\nThis default permission set prevents access to critical components\nof the Tauri application by default.\nOn Windows the webview data folder access is denied.\n\n",
"description":"fs:default -> This set of permissions describes the what kind of\nfile system access the `fs` plugin has enabled or denied by default.\n\n#### Granted Permissions\n\nThis default permission set enables read access to the\napplication specific directories (AppConfig, AppData, AppLocalData, AppCache,\nAppLog) and all files and sub directories created in it.\nThe location of these directories depends on the operating system,\nwhere the application is run.\n\nIn general these directories need to be manually created\nby the application at runtime, before accessing files or folders\nin it is possible.\n\nTherefore, it is also allowed to create all of these folders via\nthe `mkdir` command.\n\n#### Denied Permissions\n\nThis default permission set prevents access to critical components\nof the Tauri application by default.\nOn Windows the webview data folder access is denied.\n\n",
"type":"string",
"enum":[
"fs:default"
@ -1373,6 +1373,13 @@
"fs:allow-write-text-file"
]
},
{
"description":"fs:create-app-specific-dirs -> This permissions allows to create the application specific directories.\n",
"type":"string",
"enum":[
"fs:create-app-specific-dirs"
]
},
{
"description":"fs:deny-copy-file -> Denies the copy_file command without any pre-configured scope.",
"type":"string",
@ -1562,6 +1569,13 @@
"fs:read-all"
]
},
{
"description":"fs:read-app-specific-dirs-recursive -> This permission allows recursive read functionality on the application\nspecific base directories. \n",
"type":"string",
"enum":[
"fs:read-app-specific-dirs-recursive"
]
},
{
"description":"fs:read-dirs -> This enables directory read and file metadata related commands without any pre-configured accessible paths.",
"type":"string",
@ -2190,7 +2204,7 @@
"identifier":{
"oneOf":[
{
"description":"http:default -> Allows all fetch operations",
"description":"http:default -> This permission set configures what kind of\nfetch operations are available from the http plugin.\n\nThis enables all fetch operations but does not\nallow explicitly any origins to be fetched. This needs to\nbe manually configured before usage.\n\n#### Granted Permissions\n\nAll fetch operations are enabled.\n\n",
"type":"string",
"enum":[
"http:default"
@ -2313,6 +2327,7 @@
"identifier":{
"oneOf":[
{
"description":"shell:default -> This permission set configures which\nshell functionality is exposed by default.\n\n#### Granted Permissions\n\nIt allows to use the `open` functionality without any specific\nscope pre-configured. It will allow opening `http(s)://`,\n`tel:` and `mailto:` links.\n",
"type":"string",
"enum":[
"shell:default"
@ -2567,6 +2582,7 @@
]
},
{
"description":"clipboard-manager:default -> No features are enabled by default, as we believe\nthe clipboard can be inherently dangerous and it is \napplication specific if read and/or write access is needed.\n\nClipboard interaction needs to be explicitly enabled.\n",
"type":"string",
"enum":[
"clipboard-manager:default"
@ -2657,6 +2673,7 @@
]
},
{
"description":"dialog:default -> This permission set configures the types of dialogs\navailable from the dialog plugin.\n\n#### Granted Permissions\n\nAll dialog types are enabled.\n\n\n",
"type":"string",
"enum":[
"dialog:default"
@ -3853,7 +3870,7 @@
]
},
{
"description":"fs:default -> # Tauri `fs` default permissions\n\nThis configuration file defines the default permissions granted\nto the filesystem.\n\n### Granted Permissions\n\nThis default permission set enables all read-related commands and\nallows access to the `$APP` folder and sub directories created in it.\nThe location of the `$APP` folder depends on the operating system,\nwhere the application is run.\n\nIn general the `$APP` folder needs to be manually created\nby the application at runtime, before accessing files or folders\nin it is possible.\n\n### Denied Permissions\n\nThis default permission set prevents access to critical components\nof the Tauri application by default.\nOn Windows the webview data folder access is denied.\n\n",
"description":"fs:default -> This set of permissions describes the what kind of\nfile system access the `fs` plugin has enabled or denied by default.\n\n#### Granted Permissions\n\nThis default permission set enables read access to the\napplication specific directories (AppConfig, AppData, AppLocalData, AppCache,\nAppLog) and all files and sub directories created in it.\nThe location of these directories depends on the operating system,\nwhere the application is run.\n\nIn general these directories need to be manually created\nby the application at runtime, before accessing files or folders\nin it is possible.\n\nTherefore, it is also allowed to create all of these folders via\nthe `mkdir` command.\n\n#### Denied Permissions\n\nThis default permission set prevents access to critical components\nof the Tauri application by default.\nOn Windows the webview data folder access is denied.\n\n",
"type":"string",
"enum":[
"fs:default"
@ -4027,6 +4044,13 @@
"fs:allow-write-text-file"
]
},
{
"description":"fs:create-app-specific-dirs -> This permissions allows to create the application specific directories.\n",
"type":"string",
"enum":[
"fs:create-app-specific-dirs"
]
},
{
"description":"fs:deny-copy-file -> Denies the copy_file command without any pre-configured scope.",
"type":"string",
@ -4216,6 +4240,13 @@
"fs:read-all"
]
},
{
"description":"fs:read-app-specific-dirs-recursive -> This permission allows recursive read functionality on the application\nspecific base directories. \n",
"type":"string",
"enum":[
"fs:read-app-specific-dirs-recursive"
]
},
{
"description":"fs:read-dirs -> This enables directory read and file metadata related commands without any pre-configured accessible paths.",
"type":"string",
@ -4784,6 +4815,7 @@
]
},
{
"description":"global-shortcut:default -> No features are enabled by default, as we believe\nthe shortcuts can be inherently dangerous and it is \napplication specific if specific shortcuts should be\nregistered or unregistered.\n",
"type":"string",
"enum":[
"global-shortcut:default"
@ -4860,7 +4892,7 @@
]
},
{
"description":"http:default -> Allows all fetch operations",
"description":"http:default -> This permission set configures what kind of\nfetch operations are available from the http plugin.\n\nThis enables all fetch operations but does not\nallow explicitly any origins to be fetched. This needs to\nbe manually configured before usage.\n\n#### Granted Permissions\n\nAll fetch operations are enabled.\n\n",
"type":"string",
"enum":[
"http:default"
@ -5336,12 +5368,61 @@
]
},
{
"description":"notification:default -> Allows requesting permission, checking permission state and sending notifications",
"description":"notification:default -> This permission set configures which\nnotification features are by default exposed.\n\n#### Granted Permissions\n\nIt allows all notification related features.\n\n",
"type":"string",
"enum":[
"notification:default"
]
},
{
"description":"notification:allow-batch -> Enables the batch command without any pre-configured scope.",
"type":"string",
"enum":[
"notification:allow-batch"
]
},
{
"description":"notification:allow-cancel -> Enables the cancel command without any pre-configured scope.",
"type":"string",
"enum":[
"notification:allow-cancel"
]
},
{
"description":"notification:allow-check-permissions -> Enables the check_permissions command without any pre-configured scope.",
"type":"string",
"enum":[
"notification:allow-check-permissions"
]
},
{
"description":"notification:allow-create-channel -> Enables the create_channel command without any pre-configured scope.",
"type":"string",
"enum":[
"notification:allow-create-channel"
]
},
{
"description":"notification:allow-delete-channel -> Enables the delete_channel command without any pre-configured scope.",
"type":"string",
"enum":[
"notification:allow-delete-channel"
]
},
{
"description":"notification:allow-get-active -> Enables the get_active command without any pre-configured scope.",
"type":"string",
"enum":[
"notification:allow-get-active"
]
},
{
"description":"notification:allow-get-pending -> Enables the get_pending command without any pre-configured scope.",
"type":"string",
"enum":[
"notification:allow-get-pending"
]
},
{
"description":"notification:allow-is-permission-granted -> Enables the is_permission_granted command without any pre-configured scope.",
"type":"string",
@ -5349,6 +5430,13 @@
"notification:allow-is-permission-granted"
]
},
{
"description":"notification:allow-list-channels -> Enables the list_channels command without any pre-configured scope.",
"type":"string",
"enum":[
"notification:allow-list-channels"
]
},
{
"description":"notification:allow-notify -> Enables the notify command without any pre-configured scope.",
"type":"string",
@ -5356,6 +5444,13 @@
"notification:allow-notify"
]
},
{
"description":"notification:allow-permission-state -> Enables the permission_state command without any pre-configured scope.",
"type":"string",
"enum":[
"notification:allow-permission-state"
]
},
{
"description":"notification:allow-register-action-types -> Enables the register_action_types command without any pre-configured scope.",
"type":"string",
@ -5370,6 +5465,13 @@
"notification:allow-register-listener"
]
},
{
"description":"notification:allow-remove-active -> Enables the remove_active command without any pre-configured scope.",
"type":"string",
"enum":[
"notification:allow-remove-active"
]
},
{
"description":"notification:allow-request-permission -> Enables the request_permission command without any pre-configured scope.",
"type":"string",
@ -5377,6 +5479,62 @@
"notification:allow-request-permission"
]
},
{
"description":"notification:allow-show -> Enables the show command without any pre-configured scope.",
"type":"string",
"enum":[
"notification:allow-show"
]
},
{
"description":"notification:deny-batch -> Denies the batch command without any pre-configured scope.",
"type":"string",
"enum":[
"notification:deny-batch"
]
},
{
"description":"notification:deny-cancel -> Denies the cancel command without any pre-configured scope.",
"type":"string",
"enum":[
"notification:deny-cancel"
]
},
{
"description":"notification:deny-check-permissions -> Denies the check_permissions command without any pre-configured scope.",
"type":"string",
"enum":[
"notification:deny-check-permissions"
]
},
{
"description":"notification:deny-create-channel -> Denies the create_channel command without any pre-configured scope.",
"type":"string",
"enum":[
"notification:deny-create-channel"
]
},
{
"description":"notification:deny-delete-channel -> Denies the delete_channel command without any pre-configured scope.",
"type":"string",
"enum":[
"notification:deny-delete-channel"
]
},
{
"description":"notification:deny-get-active -> Denies the get_active command without any pre-configured scope.",
"type":"string",
"enum":[
"notification:deny-get-active"
]
},
{
"description":"notification:deny-get-pending -> Denies the get_pending command without any pre-configured scope.",
"type":"string",
"enum":[
"notification:deny-get-pending"
]
},
{
"description":"notification:deny-is-permission-granted -> Denies the is_permission_granted command without any pre-configured scope.",
"type":"string",
@ -5384,6 +5542,13 @@
"notification:deny-is-permission-granted"
]
},
{
"description":"notification:deny-list-channels -> Denies the list_channels command without any pre-configured scope.",
"type":"string",
"enum":[
"notification:deny-list-channels"
]
},
{
"description":"notification:deny-notify -> Denies the notify command without any pre-configured scope.",
"type":"string",
@ -5391,6 +5556,13 @@
"notification:deny-notify"
]
},
{
"description":"notification:deny-permission-state -> Denies the permission_state command without any pre-configured scope.",
"type":"string",
"enum":[
"notification:deny-permission-state"
]
},
{
"description":"notification:deny-register-action-types -> Denies the register_action_types command without any pre-configured scope.",
"type":"string",
@ -5405,6 +5577,13 @@
"notification:deny-register-listener"
]
},
{
"description":"notification:deny-remove-active -> Denies the remove_active command without any pre-configured scope.",
"type":"string",
"enum":[
"notification:deny-remove-active"
]
},
{
"description":"notification:deny-request-permission -> Denies the request_permission command without any pre-configured scope.",
"type":"string",
@ -5413,6 +5592,14 @@
]
},
{
"description":"notification:deny-show -> Denies the show command without any pre-configured scope.",
"type":"string",
"enum":[
"notification:deny-show"
]
},
{
"description":"os:default -> This permission set configures which\noperating system information are available\nto gather from the frontend.\n\n#### Granted Permissions\n\nAll information except the host name are available.\n\n",
"type":"string",
"enum":[
"os:default"
@ -5650,6 +5837,7 @@
]
},
{
"description":"process:default -> This permission set configures which\nprocess feeatures are by default exposed.\n\n#### Granted Permissions\n\nThis enables to quit via `allow-exit` and restart via `allow-restart`\nthe application.\n",
"type":"string",
"enum":[
"process:default"
@ -5705,6 +5893,7 @@
]
},
{
"description":"shell:default -> This permission set configures which\nshell functionality is exposed by default.\n\n#### Granted Permissions\n\nIt allows to use the `open` functionality without any specific\nscope pre-configured. It will allow opening `http(s)://`,\n`tel:` and `mailto:` links.\n",
"type":"string",
"enum":[
"shell:default"
@ -5942,7 +6131,7 @@
]
},
{
"description":"updater:default -> Allows checking for new updates and installing them",
"description":"updater:default -> This permission set configures which kind of\nupdater functions are exposed to the frontend.\n\n#### Granted Permissions\n\nThe full workflow from checking for updates to installing them\nis enabled.\n\n",
"description":"default -> This permission set configures if your\napplication can enable or disable auto\nstarting the application on boot.\n\n#### Granted Permissions\n\nIt allows all to check, enable and\ndisable the automatic start on boot.\n\n",
"description":"default -> This permission set configures which\nbarcode scanning features are by default exposed.\n\n#### Granted Permissions\n\nIt allows all barcode related features.\n\n",
"description":"default -> This permission set configures which\nbiometric features are by default exposed.\n\n#### Granted Permissions\n\nIt allows acccess to all biometric commands.\n\n",
"description":"default -> No features are enabled by default, as we believe\nthe clipboard can be inherently dangerous and it is \napplication specific if read and/or write access is needed.\n\nClipboard interaction needs to be explicitly enabled.\n",
"description":"default -> This permission set configures the types of dialogs\navailable from the dialog plugin.\n\n#### Granted Permissions\n\nAll dialog types are enabled.\n\n\n",
"description":"default -> # Tauri `fs` default permissions\n\nThis configuration file defines the default permissions granted\nto the filesystem.\n\n### Granted Permissions\n\nThis default permission set enables all read-related commands and\nallows access to the `$APP` folder and sub directories created in it.\nThe location of the `$APP` folder depends on the operating system,\nwhere the application is run.\n\nIn general the `$APP` folder needs to be manually created\nby the application at runtime, before accessing files or folders\nin it is possible.\n\n### Denied Permissions\n\nThis default permission set prevents access to critical components\nof the Tauri application by default.\nOn Windows the webview data folder access is denied.\n\n",
"description":"create-app-specific-dirs -> This permissions allows to create the application specific directories.\n",
"type":"string",
"enum":[
"create-app-specific-dirs"
]
},
{
"description":"default -> This set of permissions describes the what kind of\nfile system access the `fs` plugin has enabled or denied by default.\n\n#### Granted Permissions\n\nThis default permission set enables read access to the\napplication specific directories (AppConfig, AppData, AppLocalData, AppCache,\nAppLog) and all files and sub directories created in it.\nThe location of these directories depends on the operating system,\nwhere the application is run.\n\nIn general these directories need to be manually created\nby the application at runtime, before accessing files or folders\nin it is possible.\n\nTherefore, it is also allowed to create all of these folders via\nthe `mkdir` command.\n\n#### Denied Permissions\n\nThis default permission set prevents access to critical components\nof the Tauri application by default.\nOn Windows the webview data folder access is denied.\n\n",
"type":"string",
"enum":[
"default"
@ -2240,6 +2247,13 @@
"read-all"
]
},
{
"description":"read-app-specific-dirs-recursive -> This permission allows recursive read functionality on the application\nspecific base directories. \n",
"type":"string",
"enum":[
"read-app-specific-dirs-recursive"
]
},
{
"description":"read-dirs -> This enables directory read and file metadata related commands without any pre-configured accessible paths.",
"description":"default -> No features are enabled by default, as we believe\nthe shortcuts can be inherently dangerous and it is \napplication specific if specific shortcuts should be\nregistered or unregistered.\n",
"description":"default -> Allows all fetch operations",
"description":"default -> This permission set configures what kind of\nfetch operations are available from the http plugin.\n\nThis enables all fetch operations but does not\nallow explicitly any origins to be fetched. This needs to\nbe manually configured before usage.\n\n#### Granted Permissions\n\nAll fetch operations are enabled.\n\n",
"description":"default -> This permission set configures what kind of\noperations are available from the nfc plugin.\n\n#### Granted Permissions\n\nChecking if the NFC functionality is available\nand scanning nearby tags is allowed.\nWriting to tags needs to be manually enabled.\n\n",
"description":"allow-batch -> Enables the batch command without any pre-configured scope.",
"type":"string",
"enum":[
"allow-batch"
]
},
{
"description":"deny-batch -> Denies the batch command without any pre-configured scope.",
"type":"string",
"enum":[
"deny-batch"
]
},
{
"description":"allow-cancel -> Enables the cancel command without any pre-configured scope.",
"type":"string",
"enum":[
"allow-cancel"
]
},
{
"description":"deny-cancel -> Denies the cancel command without any pre-configured scope.",
"type":"string",
"enum":[
"deny-cancel"
]
},
{
"description":"allow-check-permissions -> Enables the check_permissions command without any pre-configured scope.",
"type":"string",
"enum":[
"allow-check-permissions"
]
},
{
"description":"deny-check-permissions -> Denies the check_permissions command without any pre-configured scope.",
"type":"string",
"enum":[
"deny-check-permissions"
]
},
{
"description":"allow-create-channel -> Enables the create_channel command without any pre-configured scope.",
"type":"string",
"enum":[
"allow-create-channel"
]
},
{
"description":"deny-create-channel -> Denies the create_channel command without any pre-configured scope.",
"type":"string",
"enum":[
"deny-create-channel"
]
},
{
"description":"allow-delete-channel -> Enables the delete_channel command without any pre-configured scope.",
"type":"string",
"enum":[
"allow-delete-channel"
]
},
{
"description":"deny-delete-channel -> Denies the delete_channel command without any pre-configured scope.",
"type":"string",
"enum":[
"deny-delete-channel"
]
},
{
"description":"allow-get-active -> Enables the get_active command without any pre-configured scope.",
"type":"string",
"enum":[
"allow-get-active"
]
},
{
"description":"deny-get-active -> Denies the get_active command without any pre-configured scope.",
"type":"string",
"enum":[
"deny-get-active"
]
},
{
"description":"allow-get-pending -> Enables the get_pending command without any pre-configured scope.",
"type":"string",
"enum":[
"allow-get-pending"
]
},
{
"description":"deny-get-pending -> Denies the get_pending command without any pre-configured scope.",
"type":"string",
"enum":[
"deny-get-pending"
]
},
{
"description":"allow-is-permission-granted -> Enables the is_permission_granted command without any pre-configured scope.",
"type":"string",
@ -308,6 +406,20 @@
"deny-is-permission-granted"
]
},
{
"description":"allow-list-channels -> Enables the list_channels command without any pre-configured scope.",
"type":"string",
"enum":[
"allow-list-channels"
]
},
{
"description":"deny-list-channels -> Denies the list_channels command without any pre-configured scope.",
"type":"string",
"enum":[
"deny-list-channels"
]
},
{
"description":"allow-notify -> Enables the notify command without any pre-configured scope.",
"type":"string",
@ -322,6 +434,20 @@
"deny-notify"
]
},
{
"description":"allow-permission-state -> Enables the permission_state command without any pre-configured scope.",
"type":"string",
"enum":[
"allow-permission-state"
]
},
{
"description":"deny-permission-state -> Denies the permission_state command without any pre-configured scope.",
"type":"string",
"enum":[
"deny-permission-state"
]
},
{
"description":"allow-register-action-types -> Enables the register_action_types command without any pre-configured scope.",
"type":"string",
@ -350,6 +476,20 @@
"deny-register-listener"
]
},
{
"description":"allow-remove-active -> Enables the remove_active command without any pre-configured scope.",
"type":"string",
"enum":[
"allow-remove-active"
]
},
{
"description":"deny-remove-active -> Denies the remove_active command without any pre-configured scope.",
"type":"string",
"enum":[
"deny-remove-active"
]
},
{
"description":"allow-request-permission -> Enables the request_permission command without any pre-configured scope.",
"type":"string",
@ -365,7 +505,21 @@
]
},
{
"description":"default -> Allows requesting permission, checking permission state and sending notifications",
"description":"allow-show -> Enables the show command without any pre-configured scope.",
"type":"string",
"enum":[
"allow-show"
]
},
{
"description":"deny-show -> Denies the show command without any pre-configured scope.",
"type":"string",
"enum":[
"deny-show"
]
},
{
"description":"default -> This permission set configures which\nnotification features are by default exposed.\n\n#### Granted Permissions\n\nIt allows all notification related features.\n\n",
"description":"default -> This permission set configures which\noperating system information are available\nto gather from the frontend.\n\n#### Granted Permissions\n\nAll information except the host name are available.\n\n",
"description":"default -> This permission set configures which\nprocess feeatures are by default exposed.\n\n#### Granted Permissions\n\nThis enables to quit via `allow-exit` and restart via `allow-restart`\nthe application.\n",
"description":"default -> This permission set configures which\nshell functionality is exposed by default.\n\n#### Granted Permissions\n\nIt allows to use the `open` functionality without any specific\nscope pre-configured. It will allow opening `http(s)://`,\n`tel:` and `mailto:` links.\n",
"description":"default -> # Tauri SQL Default Permissions\n\nThis permission set configures what kind of\ndatabase operations are available from the sql plugin.\n\n### Granted Permissions\n\nAll reading related operations are enabled.\nAlso allows to load or close a connection.\n\n",
"description":"default -> This permission set configures what kind of\noperations are available from the store plugin.\n\n#### Granted Permissions\n\nAll operations are enabled by default.\n\n",
"description":"default -> This permission set configures what kind of\noperations are available from the stronghold plugin.\n\n#### Granted Permissions\n\nAll non-destructive operations are enabled by default.\n\n",
"description":"default -> Allows checking for new updates and installing them",
"description":"default -> This permission set configures which kind of\nupdater functions are exposed to the frontend.\n\n#### Granted Permissions\n\nThe full workflow from checking for updates to installing them\nis enabled.\n\n",
"description":"default -> This permission set configures what kind of\noperations are available from the upload plugin.\n\n#### Granted Permissions\n\nAll operations are enabled by default.\n\n",
"description":"default -> This permission set configures what kind of\noperations are available from the window state plugin.\n\n#### Granted Permissions\n\nAll operations are enabled by default.\n\n",