commit
31085b8213
@ -0,0 +1,5 @@
|
|||||||
|
---
|
||||||
|
'single-instance': patch
|
||||||
|
---
|
||||||
|
|
||||||
|
Fix doesn't shutdown immediately.
|
@ -0,0 +1,6 @@
|
|||||||
|
---
|
||||||
|
"shell": "patch"
|
||||||
|
"shell-js": "patch"
|
||||||
|
---
|
||||||
|
|
||||||
|
On Windows, fix `open` can't open file if the file is being used by a program.
|
@ -0,0 +1,57 @@
|
|||||||
|
---
|
||||||
|
"authenticator": patch
|
||||||
|
"autostart": patch
|
||||||
|
"barcode-scanner": patch
|
||||||
|
"biometric": patch
|
||||||
|
"cli": patch
|
||||||
|
"clipboard-manager": patch
|
||||||
|
"deep-link": patch
|
||||||
|
"dialog": patch
|
||||||
|
"fs": patch
|
||||||
|
"global-shortcut": patch
|
||||||
|
"http": patch
|
||||||
|
"localhost": patch
|
||||||
|
"log-plugin": patch
|
||||||
|
"nfc": patch
|
||||||
|
"notification": patch
|
||||||
|
"os": patch
|
||||||
|
"persisted-scope": patch
|
||||||
|
"positioner": patch
|
||||||
|
"process": patch
|
||||||
|
"shell": patch
|
||||||
|
"single-instance": patch
|
||||||
|
"sql": patch
|
||||||
|
"store": patch
|
||||||
|
"stronghold": patch
|
||||||
|
"updater": patch
|
||||||
|
"upload": patch
|
||||||
|
"websocket": patch
|
||||||
|
"window-state": patch
|
||||||
|
"authenticator-js": patch
|
||||||
|
"autostart-js": patch
|
||||||
|
"barcode-scanner-js": patch
|
||||||
|
"biometric-js": patch
|
||||||
|
"cli-js": patch
|
||||||
|
"clipboard-manager-js": patch
|
||||||
|
"deep-link-js": patch
|
||||||
|
"dialog-js": patch
|
||||||
|
"fs-js": patch
|
||||||
|
"global-shortcut-js": patch
|
||||||
|
"http-js": patch
|
||||||
|
"log-js": patch
|
||||||
|
"nfc-js": patch
|
||||||
|
"notification-js": patch
|
||||||
|
"os-js": patch
|
||||||
|
"positioner-js": patch
|
||||||
|
"process-js": patch
|
||||||
|
"shell-js": patch
|
||||||
|
"sql-js": patch
|
||||||
|
"store-js": patch
|
||||||
|
"stronghold-js": patch
|
||||||
|
"updater-js": patch
|
||||||
|
"upload-js": patch
|
||||||
|
"websocket-js": patch
|
||||||
|
"window-state-js": patch
|
||||||
|
---
|
||||||
|
|
||||||
|
Update to tauri beta.8.
|
@ -1,4 +1,8 @@
|
|||||||
target
|
target
|
||||||
node_modules
|
node_modules
|
||||||
dist-js
|
dist-js
|
||||||
dist
|
dist
|
||||||
|
.idea
|
||||||
|
.vscode
|
||||||
|
.gradle
|
||||||
|
**/capabilities/schemas
|
||||||
|
@ -0,0 +1,23 @@
|
|||||||
|
# Security Policy
|
||||||
|
|
||||||
|
**Do not report security vulnerabilities through public GitHub issues.**
|
||||||
|
|
||||||
|
**Please use the [Private Vulnerability Disclosure](https://docs.github.com/en/code-security/security-advisories/guidance-on-reporting-and-writing-information-about-vulnerabilities/privately-reporting-a-security-vulnerability#privately-reporting-a-security-vulnerability) feature of GitHub.**
|
||||||
|
|
||||||
|
Include as much of the following information:
|
||||||
|
|
||||||
|
- Type of issue (e.g. improper input parsing, privilege escalation, etc.)
|
||||||
|
- The location of the affected source code (tag/branch/commit or direct URL)
|
||||||
|
- Any special configuration required to reproduce the issue
|
||||||
|
- The distribution affected or used to help us with reproduction of the issue
|
||||||
|
- Step-by-step instructions to reproduce the issue
|
||||||
|
- Ideally a reproduction repository
|
||||||
|
- Impact of the issue, including how an attacker might exploit the issue
|
||||||
|
|
||||||
|
We prefer to receive reports in English.
|
||||||
|
|
||||||
|
## Contact
|
||||||
|
|
||||||
|
Please disclose a vulnerability or security relevant issue here: [https://github.com/tauri-apps/plugins-workspace/security/advisories/new](https://github.com/tauri-apps/plugins-workspace/security/advisories/new).
|
||||||
|
|
||||||
|
Alternatively, you can also contact us by email via [security@tauri.app](mailto:security@tauri.app).
|
@ -0,0 +1,23 @@
|
|||||||
|
# Security Policy
|
||||||
|
|
||||||
|
**Do not report security vulnerabilities through public GitHub issues.**
|
||||||
|
|
||||||
|
**Please use the [Private Vulnerability Disclosure](https://docs.github.com/en/code-security/security-advisories/guidance-on-reporting-and-writing-information-about-vulnerabilities/privately-reporting-a-security-vulnerability#privately-reporting-a-security-vulnerability) feature of GitHub.**
|
||||||
|
|
||||||
|
Include as much of the following information:
|
||||||
|
|
||||||
|
- Type of issue (e.g. improper input parsing, privilege escalation, etc.)
|
||||||
|
- The location of the affected source code (tag/branch/commit or direct URL)
|
||||||
|
- Any special configuration required to reproduce the issue
|
||||||
|
- The distribution affected or used to help us with reproduction of the issue
|
||||||
|
- Step-by-step instructions to reproduce the issue
|
||||||
|
- Ideally a reproduction repository
|
||||||
|
- Impact of the issue, including how an attacker might exploit the issue
|
||||||
|
|
||||||
|
We prefer to receive reports in English.
|
||||||
|
|
||||||
|
## Contact
|
||||||
|
|
||||||
|
Please disclose a vulnerability or security relevant issue here: [https://github.com/tauri-apps/plugins-workspace/security/advisories/new](https://github.com/tauri-apps/plugins-workspace/security/advisories/new).
|
||||||
|
|
||||||
|
Alternatively, you can also contact us by email via [security@tauri.app](mailto:security@tauri.app).
|
@ -1,42 +1,12 @@
|
|||||||
# Permissions
|
| Permission | Description |
|
||||||
|
|------|-----|
|
||||||
## allow-init-auth
|
|`allow-init-auth`|Enables the init_auth command without any pre-configured scope.|
|
||||||
|
|`deny-init-auth`|Denies the init_auth command without any pre-configured scope.|
|
||||||
Enables the init_auth command without any pre-configured scope.
|
|`allow-register`|Enables the register command without any pre-configured scope.|
|
||||||
|
|`deny-register`|Denies the register command without any pre-configured scope.|
|
||||||
## deny-init-auth
|
|`allow-sign`|Enables the sign command without any pre-configured scope.|
|
||||||
|
|`deny-sign`|Denies the sign command without any pre-configured scope.|
|
||||||
Denies the init_auth command without any pre-configured scope.
|
|`allow-verify-registration`|Enables the verify_registration command without any pre-configured scope.|
|
||||||
|
|`deny-verify-registration`|Denies the verify_registration command without any pre-configured scope.|
|
||||||
## allow-register
|
|`allow-verify-signature`|Enables the verify_signature command without any pre-configured scope.|
|
||||||
|
|`deny-verify-signature`|Denies the verify_signature command without any pre-configured scope.|
|
||||||
Enables the register command without any pre-configured scope.
|
|
||||||
|
|
||||||
## deny-register
|
|
||||||
|
|
||||||
Denies the register command without any pre-configured scope.
|
|
||||||
|
|
||||||
## allow-sign
|
|
||||||
|
|
||||||
Enables the sign command without any pre-configured scope.
|
|
||||||
|
|
||||||
## deny-sign
|
|
||||||
|
|
||||||
Denies the sign command without any pre-configured scope.
|
|
||||||
|
|
||||||
## allow-verify-registration
|
|
||||||
|
|
||||||
Enables the verify_registration command without any pre-configured scope.
|
|
||||||
|
|
||||||
## deny-verify-registration
|
|
||||||
|
|
||||||
Denies the verify_registration command without any pre-configured scope.
|
|
||||||
|
|
||||||
## allow-verify-signature
|
|
||||||
|
|
||||||
Enables the verify_signature command without any pre-configured scope.
|
|
||||||
|
|
||||||
## deny-verify-signature
|
|
||||||
|
|
||||||
Denies the verify_signature command without any pre-configured scope.
|
|
||||||
|
|
||||||
|
@ -0,0 +1,23 @@
|
|||||||
|
# Security Policy
|
||||||
|
|
||||||
|
**Do not report security vulnerabilities through public GitHub issues.**
|
||||||
|
|
||||||
|
**Please use the [Private Vulnerability Disclosure](https://docs.github.com/en/code-security/security-advisories/guidance-on-reporting-and-writing-information-about-vulnerabilities/privately-reporting-a-security-vulnerability#privately-reporting-a-security-vulnerability) feature of GitHub.**
|
||||||
|
|
||||||
|
Include as much of the following information:
|
||||||
|
|
||||||
|
- Type of issue (e.g. improper input parsing, privilege escalation, etc.)
|
||||||
|
- The location of the affected source code (tag/branch/commit or direct URL)
|
||||||
|
- Any special configuration required to reproduce the issue
|
||||||
|
- The distribution affected or used to help us with reproduction of the issue
|
||||||
|
- Step-by-step instructions to reproduce the issue
|
||||||
|
- Ideally a reproduction repository
|
||||||
|
- Impact of the issue, including how an attacker might exploit the issue
|
||||||
|
|
||||||
|
We prefer to receive reports in English.
|
||||||
|
|
||||||
|
## Contact
|
||||||
|
|
||||||
|
Please disclose a vulnerability or security relevant issue here: [https://github.com/tauri-apps/plugins-workspace/security/advisories/new](https://github.com/tauri-apps/plugins-workspace/security/advisories/new).
|
||||||
|
|
||||||
|
Alternatively, you can also contact us by email via [security@tauri.app](mailto:security@tauri.app).
|
@ -1,26 +1,8 @@
|
|||||||
# Permissions
|
| Permission | Description |
|
||||||
|
|------|-----|
|
||||||
## allow-disable
|
|`allow-disable`|Enables the disable command without any pre-configured scope.|
|
||||||
|
|`deny-disable`|Denies the disable command without any pre-configured scope.|
|
||||||
Enables the disable command without any pre-configured scope.
|
|`allow-enable`|Enables the enable command without any pre-configured scope.|
|
||||||
|
|`deny-enable`|Denies the enable command without any pre-configured scope.|
|
||||||
## deny-disable
|
|`allow-is-enabled`|Enables the is_enabled command without any pre-configured scope.|
|
||||||
|
|`deny-is-enabled`|Denies the is_enabled command without any pre-configured scope.|
|
||||||
Denies the disable command without any pre-configured scope.
|
|
||||||
|
|
||||||
## allow-enable
|
|
||||||
|
|
||||||
Enables the enable command without any pre-configured scope.
|
|
||||||
|
|
||||||
## deny-enable
|
|
||||||
|
|
||||||
Denies the enable command without any pre-configured scope.
|
|
||||||
|
|
||||||
## allow-is-enabled
|
|
||||||
|
|
||||||
Enables the is_enabled command without any pre-configured scope.
|
|
||||||
|
|
||||||
## deny-is-enabled
|
|
||||||
|
|
||||||
Denies the is_enabled command without any pre-configured scope.
|
|
||||||
|
|
||||||
|
@ -1,50 +1,14 @@
|
|||||||
# Permissions
|
| Permission | Description |
|
||||||
|
|------|-----|
|
||||||
## allow-cancel
|
|`allow-cancel`|Enables the cancel command without any pre-configured scope.|
|
||||||
|
|`deny-cancel`|Denies the cancel command without any pre-configured scope.|
|
||||||
Enables the cancel command without any pre-configured scope.
|
|`allow-check-permissions`|Enables the check_permissions command without any pre-configured scope.|
|
||||||
|
|`deny-check-permissions`|Denies the check_permissions command without any pre-configured scope.|
|
||||||
## deny-cancel
|
|`allow-open-app-settings`|Enables the open_app_settings command without any pre-configured scope.|
|
||||||
|
|`deny-open-app-settings`|Denies the open_app_settings command without any pre-configured scope.|
|
||||||
Denies the cancel command without any pre-configured scope.
|
|`allow-request-permissions`|Enables the request_permissions command without any pre-configured scope.|
|
||||||
|
|`deny-request-permissions`|Denies the request_permissions command without any pre-configured scope.|
|
||||||
## allow-check-permissions
|
|`allow-scan`|Enables the scan command without any pre-configured scope.|
|
||||||
|
|`deny-scan`|Denies the scan command without any pre-configured scope.|
|
||||||
Enables the check_permissions command without any pre-configured scope.
|
|`allow-vibrate`|Enables the vibrate command without any pre-configured scope.|
|
||||||
|
|`deny-vibrate`|Denies the vibrate command without any pre-configured scope.|
|
||||||
## deny-check-permissions
|
|
||||||
|
|
||||||
Denies the check_permissions command without any pre-configured scope.
|
|
||||||
|
|
||||||
## allow-open-app-settings
|
|
||||||
|
|
||||||
Enables the open_app_settings command without any pre-configured scope.
|
|
||||||
|
|
||||||
## deny-open-app-settings
|
|
||||||
|
|
||||||
Denies the open_app_settings command without any pre-configured scope.
|
|
||||||
|
|
||||||
## allow-request-permissions
|
|
||||||
|
|
||||||
Enables the request_permissions command without any pre-configured scope.
|
|
||||||
|
|
||||||
## deny-request-permissions
|
|
||||||
|
|
||||||
Denies the request_permissions command without any pre-configured scope.
|
|
||||||
|
|
||||||
## allow-scan
|
|
||||||
|
|
||||||
Enables the scan command without any pre-configured scope.
|
|
||||||
|
|
||||||
## deny-scan
|
|
||||||
|
|
||||||
Denies the scan command without any pre-configured scope.
|
|
||||||
|
|
||||||
## allow-vibrate
|
|
||||||
|
|
||||||
Enables the vibrate command without any pre-configured scope.
|
|
||||||
|
|
||||||
## deny-vibrate
|
|
||||||
|
|
||||||
Denies the vibrate command without any pre-configured scope.
|
|
||||||
|
|
||||||
|
@ -0,0 +1,23 @@
|
|||||||
|
# Security Policy
|
||||||
|
|
||||||
|
**Do not report security vulnerabilities through public GitHub issues.**
|
||||||
|
|
||||||
|
**Please use the [Private Vulnerability Disclosure](https://docs.github.com/en/code-security/security-advisories/guidance-on-reporting-and-writing-information-about-vulnerabilities/privately-reporting-a-security-vulnerability#privately-reporting-a-security-vulnerability) feature of GitHub.**
|
||||||
|
|
||||||
|
Include as much of the following information:
|
||||||
|
|
||||||
|
- Type of issue (e.g. improper input parsing, privilege escalation, etc.)
|
||||||
|
- The location of the affected source code (tag/branch/commit or direct URL)
|
||||||
|
- Any special configuration required to reproduce the issue
|
||||||
|
- The distribution affected or used to help us with reproduction of the issue
|
||||||
|
- Step-by-step instructions to reproduce the issue
|
||||||
|
- Ideally a reproduction repository
|
||||||
|
- Impact of the issue, including how an attacker might exploit the issue
|
||||||
|
|
||||||
|
We prefer to receive reports in English.
|
||||||
|
|
||||||
|
## Contact
|
||||||
|
|
||||||
|
Please disclose a vulnerability or security relevant issue here: [https://github.com/tauri-apps/plugins-workspace/security/advisories/new](https://github.com/tauri-apps/plugins-workspace/security/advisories/new).
|
||||||
|
|
||||||
|
Alternatively, you can also contact us by email via [security@tauri.app](mailto:security@tauri.app).
|
@ -1,18 +1,6 @@
|
|||||||
# Permissions
|
| Permission | Description |
|
||||||
|
|------|-----|
|
||||||
## allow-authenticate
|
|`allow-authenticate`|Enables the authenticate command without any pre-configured scope.|
|
||||||
|
|`deny-authenticate`|Denies the authenticate command without any pre-configured scope.|
|
||||||
Enables the authenticate command without any pre-configured scope.
|
|`allow-status`|Enables the status command without any pre-configured scope.|
|
||||||
|
|`deny-status`|Denies the status command without any pre-configured scope.|
|
||||||
## deny-authenticate
|
|
||||||
|
|
||||||
Denies the authenticate command without any pre-configured scope.
|
|
||||||
|
|
||||||
## allow-status
|
|
||||||
|
|
||||||
Enables the status command without any pre-configured scope.
|
|
||||||
|
|
||||||
## deny-status
|
|
||||||
|
|
||||||
Denies the status command without any pre-configured scope.
|
|
||||||
|
|
||||||
|
@ -0,0 +1,23 @@
|
|||||||
|
# Security Policy
|
||||||
|
|
||||||
|
**Do not report security vulnerabilities through public GitHub issues.**
|
||||||
|
|
||||||
|
**Please use the [Private Vulnerability Disclosure](https://docs.github.com/en/code-security/security-advisories/guidance-on-reporting-and-writing-information-about-vulnerabilities/privately-reporting-a-security-vulnerability#privately-reporting-a-security-vulnerability) feature of GitHub.**
|
||||||
|
|
||||||
|
Include as much of the following information:
|
||||||
|
|
||||||
|
- Type of issue (e.g. improper input parsing, privilege escalation, etc.)
|
||||||
|
- The location of the affected source code (tag/branch/commit or direct URL)
|
||||||
|
- Any special configuration required to reproduce the issue
|
||||||
|
- The distribution affected or used to help us with reproduction of the issue
|
||||||
|
- Step-by-step instructions to reproduce the issue
|
||||||
|
- Ideally a reproduction repository
|
||||||
|
- Impact of the issue, including how an attacker might exploit the issue
|
||||||
|
|
||||||
|
We prefer to receive reports in English.
|
||||||
|
|
||||||
|
## Contact
|
||||||
|
|
||||||
|
Please disclose a vulnerability or security relevant issue here: [https://github.com/tauri-apps/plugins-workspace/security/advisories/new](https://github.com/tauri-apps/plugins-workspace/security/advisories/new).
|
||||||
|
|
||||||
|
Alternatively, you can also contact us by email via [security@tauri.app](mailto:security@tauri.app).
|
@ -1,14 +1,5 @@
|
|||||||
# Permissions
|
| Permission | Description |
|
||||||
|
|------|-----|
|
||||||
## allow-cli-matches
|
|`allow-cli-matches`|Enables the cli_matches command without any pre-configured scope.|
|
||||||
|
|`deny-cli-matches`|Denies the cli_matches command without any pre-configured scope.|
|
||||||
Enables the cli_matches command without any pre-configured scope.
|
|`default`|Allows reading the CLI matches|
|
||||||
|
|
||||||
## deny-cli-matches
|
|
||||||
|
|
||||||
Denies the cli_matches command without any pre-configured scope.
|
|
||||||
|
|
||||||
## default
|
|
||||||
|
|
||||||
Allows reading the CLI matches
|
|
||||||
|
|
||||||
|
@ -0,0 +1,23 @@
|
|||||||
|
# Security Policy
|
||||||
|
|
||||||
|
**Do not report security vulnerabilities through public GitHub issues.**
|
||||||
|
|
||||||
|
**Please use the [Private Vulnerability Disclosure](https://docs.github.com/en/code-security/security-advisories/guidance-on-reporting-and-writing-information-about-vulnerabilities/privately-reporting-a-security-vulnerability#privately-reporting-a-security-vulnerability) feature of GitHub.**
|
||||||
|
|
||||||
|
Include as much of the following information:
|
||||||
|
|
||||||
|
- Type of issue (e.g. improper input parsing, privilege escalation, etc.)
|
||||||
|
- The location of the affected source code (tag/branch/commit or direct URL)
|
||||||
|
- Any special configuration required to reproduce the issue
|
||||||
|
- The distribution affected or used to help us with reproduction of the issue
|
||||||
|
- Step-by-step instructions to reproduce the issue
|
||||||
|
- Ideally a reproduction repository
|
||||||
|
- Impact of the issue, including how an attacker might exploit the issue
|
||||||
|
|
||||||
|
We prefer to receive reports in English.
|
||||||
|
|
||||||
|
## Contact
|
||||||
|
|
||||||
|
Please disclose a vulnerability or security relevant issue here: [https://github.com/tauri-apps/plugins-workspace/security/advisories/new](https://github.com/tauri-apps/plugins-workspace/security/advisories/new).
|
||||||
|
|
||||||
|
Alternatively, you can also contact us by email via [security@tauri.app](mailto:security@tauri.app).
|
@ -1,18 +1,6 @@
|
|||||||
# Permissions
|
| Permission | Description |
|
||||||
|
|------|-----|
|
||||||
## allow-read
|
|`allow-read`|Enables the read command without any pre-configured scope.|
|
||||||
|
|`deny-read`|Denies the read command without any pre-configured scope.|
|
||||||
Enables the read command without any pre-configured scope.
|
|`allow-write`|Enables the write command without any pre-configured scope.|
|
||||||
|
|`deny-write`|Denies the write command without any pre-configured scope.|
|
||||||
## deny-read
|
|
||||||
|
|
||||||
Denies the read command without any pre-configured scope.
|
|
||||||
|
|
||||||
## allow-write
|
|
||||||
|
|
||||||
Enables the write command without any pre-configured scope.
|
|
||||||
|
|
||||||
## deny-write
|
|
||||||
|
|
||||||
Denies the write command without any pre-configured scope.
|
|
||||||
|
|
||||||
|
@ -0,0 +1,23 @@
|
|||||||
|
# Security Policy
|
||||||
|
|
||||||
|
**Do not report security vulnerabilities through public GitHub issues.**
|
||||||
|
|
||||||
|
**Please use the [Private Vulnerability Disclosure](https://docs.github.com/en/code-security/security-advisories/guidance-on-reporting-and-writing-information-about-vulnerabilities/privately-reporting-a-security-vulnerability#privately-reporting-a-security-vulnerability) feature of GitHub.**
|
||||||
|
|
||||||
|
Include as much of the following information:
|
||||||
|
|
||||||
|
- Type of issue (e.g. improper input parsing, privilege escalation, etc.)
|
||||||
|
- The location of the affected source code (tag/branch/commit or direct URL)
|
||||||
|
- Any special configuration required to reproduce the issue
|
||||||
|
- The distribution affected or used to help us with reproduction of the issue
|
||||||
|
- Step-by-step instructions to reproduce the issue
|
||||||
|
- Ideally a reproduction repository
|
||||||
|
- Impact of the issue, including how an attacker might exploit the issue
|
||||||
|
|
||||||
|
We prefer to receive reports in English.
|
||||||
|
|
||||||
|
## Contact
|
||||||
|
|
||||||
|
Please disclose a vulnerability or security relevant issue here: [https://github.com/tauri-apps/plugins-workspace/security/advisories/new](https://github.com/tauri-apps/plugins-workspace/security/advisories/new).
|
||||||
|
|
||||||
|
Alternatively, you can also contact us by email via [security@tauri.app](mailto:security@tauri.app).
|
@ -1,14 +1,5 @@
|
|||||||
# Permissions
|
| Permission | Description |
|
||||||
|
|------|-----|
|
||||||
## allow-get-current
|
|`allow-get-current`|Enables the get_current command without any pre-configured scope.|
|
||||||
|
|`deny-get-current`|Denies the get_current command without any pre-configured scope.|
|
||||||
Enables the get_current command without any pre-configured scope.
|
|`default`|Allows reading the opened deep link via the get_current command|
|
||||||
|
|
||||||
## deny-get-current
|
|
||||||
|
|
||||||
Denies the get_current command without any pre-configured scope.
|
|
||||||
|
|
||||||
## default
|
|
||||||
|
|
||||||
Allows reading the opened deep link via the get_current command
|
|
||||||
|
|
||||||
|
@ -1 +1 @@
|
|||||||
if("__TAURI__"in window){var __TAURI_PLUGIN_DEEPLINK__=function(e){"use strict";function n(e,n=!1){return window.__TAURI_INTERNALS__.transformCallback(e,n)}async function t(e,n={},t){return window.__TAURI_INTERNALS__.invoke(e,n,t)}var r;async function _(e,r,_){const i="string"==typeof _?.target?{kind:"AnyLabel",label:_.target}:_?.target??{kind:"Any"};return t("plugin:event|listen",{event:e,target:i,handler:n(r)}).then((n=>async()=>async function(e,n){await t("plugin:event|unlisten",{event:e,eventId:n})}(e,n)))}async function i(){return await t("plugin:deep-link|get_current")}return"function"==typeof SuppressedError&&SuppressedError,function(e){e.WINDOW_RESIZED="tauri://resize",e.WINDOW_MOVED="tauri://move",e.WINDOW_CLOSE_REQUESTED="tauri://close-requested",e.WINDOW_DESTROYED="tauri://destroyed",e.WINDOW_FOCUS="tauri://focus",e.WINDOW_BLUR="tauri://blur",e.WINDOW_SCALE_FACTOR_CHANGED="tauri://scale-change",e.WINDOW_THEME_CHANGED="tauri://theme-changed",e.WEBVIEW_CREATED="tauri://webview-created",e.WEBVIEW_FILE_DROP="tauri://file-drop",e.WEBVIEW_FILE_DROP_HOVER="tauri://file-drop-hover",e.WEBVIEW_FILE_DROP_CANCELLED="tauri://file-drop-cancelled"}(r||(r={})),e.getCurrent=i,e.onOpenUrl=async function(e){const n=await i();return null!=n&&e(n),await _("deep-link://new-url",(n=>e(n.payload)))},e}({});Object.defineProperty(window.__TAURI__,"deepLink",{value:__TAURI_PLUGIN_DEEPLINK__})}
|
if("__TAURI__"in window){var __TAURI_PLUGIN_DEEPLINK__=function(e){"use strict";function n(e,n=!1){return window.__TAURI_INTERNALS__.transformCallback(e,n)}async function t(e,n={},t){return window.__TAURI_INTERNALS__.invoke(e,n,t)}var r;async function i(e,r,i){const _="string"==typeof i?.target?{kind:"AnyLabel",label:i.target}:i?.target??{kind:"Any"};return t("plugin:event|listen",{event:e,target:_,handler:n(r)}).then((n=>async()=>async function(e,n){await t("plugin:event|unlisten",{event:e,eventId:n})}(e,n)))}async function _(){return await t("plugin:deep-link|get_current")}return"function"==typeof SuppressedError&&SuppressedError,function(e){e.WINDOW_RESIZED="tauri://resize",e.WINDOW_MOVED="tauri://move",e.WINDOW_CLOSE_REQUESTED="tauri://close-requested",e.WINDOW_DESTROYED="tauri://destroyed",e.WINDOW_FOCUS="tauri://focus",e.WINDOW_BLUR="tauri://blur",e.WINDOW_SCALE_FACTOR_CHANGED="tauri://scale-change",e.WINDOW_THEME_CHANGED="tauri://theme-changed",e.WEBVIEW_CREATED="tauri://webview-created",e.FILE_DROP="tauri://file-drop",e.FILE_DROP_HOVER="tauri://file-drop-hover",e.FILE_DROP_CANCELLED="tauri://file-drop-cancelled"}(r||(r={})),e.getCurrent=_,e.onOpenUrl=async function(e){const n=await _();return null!=n&&e(n),await i("deep-link://new-url",(n=>e(n.payload)))},e}({});Object.defineProperty(window.__TAURI__,"deepLink",{value:__TAURI_PLUGIN_DEEPLINK__})}
|
||||||
|
@ -0,0 +1,23 @@
|
|||||||
|
# Security Policy
|
||||||
|
|
||||||
|
**Do not report security vulnerabilities through public GitHub issues.**
|
||||||
|
|
||||||
|
**Please use the [Private Vulnerability Disclosure](https://docs.github.com/en/code-security/security-advisories/guidance-on-reporting-and-writing-information-about-vulnerabilities/privately-reporting-a-security-vulnerability#privately-reporting-a-security-vulnerability) feature of GitHub.**
|
||||||
|
|
||||||
|
Include as much of the following information:
|
||||||
|
|
||||||
|
- Type of issue (e.g. improper input parsing, privilege escalation, etc.)
|
||||||
|
- The location of the affected source code (tag/branch/commit or direct URL)
|
||||||
|
- Any special configuration required to reproduce the issue
|
||||||
|
- The distribution affected or used to help us with reproduction of the issue
|
||||||
|
- Step-by-step instructions to reproduce the issue
|
||||||
|
- Ideally a reproduction repository
|
||||||
|
- Impact of the issue, including how an attacker might exploit the issue
|
||||||
|
|
||||||
|
We prefer to receive reports in English.
|
||||||
|
|
||||||
|
## Contact
|
||||||
|
|
||||||
|
Please disclose a vulnerability or security relevant issue here: [https://github.com/tauri-apps/plugins-workspace/security/advisories/new](https://github.com/tauri-apps/plugins-workspace/security/advisories/new).
|
||||||
|
|
||||||
|
Alternatively, you can also contact us by email via [security@tauri.app](mailto:security@tauri.app).
|
@ -1,42 +1,12 @@
|
|||||||
# Permissions
|
| Permission | Description |
|
||||||
|
|------|-----|
|
||||||
## allow-ask
|
|`allow-ask`|Enables the ask command without any pre-configured scope.|
|
||||||
|
|`deny-ask`|Denies the ask command without any pre-configured scope.|
|
||||||
Enables the ask command without any pre-configured scope.
|
|`allow-confirm`|Enables the confirm command without any pre-configured scope.|
|
||||||
|
|`deny-confirm`|Denies the confirm command without any pre-configured scope.|
|
||||||
## deny-ask
|
|`allow-message`|Enables the message command without any pre-configured scope.|
|
||||||
|
|`deny-message`|Denies the message command without any pre-configured scope.|
|
||||||
Denies the ask command without any pre-configured scope.
|
|`allow-open`|Enables the open command without any pre-configured scope.|
|
||||||
|
|`deny-open`|Denies the open command without any pre-configured scope.|
|
||||||
## allow-confirm
|
|`allow-save`|Enables the save command without any pre-configured scope.|
|
||||||
|
|`deny-save`|Denies the save command without any pre-configured scope.|
|
||||||
Enables the confirm command without any pre-configured scope.
|
|
||||||
|
|
||||||
## deny-confirm
|
|
||||||
|
|
||||||
Denies the confirm command without any pre-configured scope.
|
|
||||||
|
|
||||||
## allow-message
|
|
||||||
|
|
||||||
Enables the message command without any pre-configured scope.
|
|
||||||
|
|
||||||
## deny-message
|
|
||||||
|
|
||||||
Denies the message command without any pre-configured scope.
|
|
||||||
|
|
||||||
## allow-open
|
|
||||||
|
|
||||||
Enables the open command without any pre-configured scope.
|
|
||||||
|
|
||||||
## deny-open
|
|
||||||
|
|
||||||
Denies the open command without any pre-configured scope.
|
|
||||||
|
|
||||||
## allow-save
|
|
||||||
|
|
||||||
Enables the save command without any pre-configured scope.
|
|
||||||
|
|
||||||
## deny-save
|
|
||||||
|
|
||||||
Denies the save command without any pre-configured scope.
|
|
||||||
|
|
||||||
|
File diff suppressed because it is too large
Load Diff
@ -0,0 +1,23 @@
|
|||||||
|
# Security Policy
|
||||||
|
|
||||||
|
**Do not report security vulnerabilities through public GitHub issues.**
|
||||||
|
|
||||||
|
**Please use the [Private Vulnerability Disclosure](https://docs.github.com/en/code-security/security-advisories/guidance-on-reporting-and-writing-information-about-vulnerabilities/privately-reporting-a-security-vulnerability#privately-reporting-a-security-vulnerability) feature of GitHub.**
|
||||||
|
|
||||||
|
Include as much of the following information:
|
||||||
|
|
||||||
|
- Type of issue (e.g. improper input parsing, privilege escalation, etc.)
|
||||||
|
- The location of the affected source code (tag/branch/commit or direct URL)
|
||||||
|
- Any special configuration required to reproduce the issue
|
||||||
|
- The distribution affected or used to help us with reproduction of the issue
|
||||||
|
- Step-by-step instructions to reproduce the issue
|
||||||
|
- Ideally a reproduction repository
|
||||||
|
- Impact of the issue, including how an attacker might exploit the issue
|
||||||
|
|
||||||
|
We prefer to receive reports in English.
|
||||||
|
|
||||||
|
## Contact
|
||||||
|
|
||||||
|
Please disclose a vulnerability or security relevant issue here: [https://github.com/tauri-apps/plugins-workspace/security/advisories/new](https://github.com/tauri-apps/plugins-workspace/security/advisories/new).
|
||||||
|
|
||||||
|
Alternatively, you can also contact us by email via [security@tauri.app](mailto:security@tauri.app).
|
@ -1,42 +1,12 @@
|
|||||||
# Permissions
|
| Permission | Description |
|
||||||
|
|------|-----|
|
||||||
## allow-is-registered
|
|`allow-is-registered`|Enables the is_registered command without any pre-configured scope.|
|
||||||
|
|`deny-is-registered`|Denies the is_registered command without any pre-configured scope.|
|
||||||
Enables the is_registered command without any pre-configured scope.
|
|`allow-register`|Enables the register command without any pre-configured scope.|
|
||||||
|
|`deny-register`|Denies the register command without any pre-configured scope.|
|
||||||
## deny-is-registered
|
|`allow-register-all`|Enables the register_all command without any pre-configured scope.|
|
||||||
|
|`deny-register-all`|Denies the register_all command without any pre-configured scope.|
|
||||||
Denies the is_registered command without any pre-configured scope.
|
|`allow-unregister`|Enables the unregister command without any pre-configured scope.|
|
||||||
|
|`deny-unregister`|Denies the unregister command without any pre-configured scope.|
|
||||||
## allow-register
|
|`allow-unregister-all`|Enables the unregister_all command without any pre-configured scope.|
|
||||||
|
|`deny-unregister-all`|Denies the unregister_all command without any pre-configured scope.|
|
||||||
Enables the register command without any pre-configured scope.
|
|
||||||
|
|
||||||
## deny-register
|
|
||||||
|
|
||||||
Denies the register command without any pre-configured scope.
|
|
||||||
|
|
||||||
## allow-register-all
|
|
||||||
|
|
||||||
Enables the register_all command without any pre-configured scope.
|
|
||||||
|
|
||||||
## deny-register-all
|
|
||||||
|
|
||||||
Denies the register_all command without any pre-configured scope.
|
|
||||||
|
|
||||||
## allow-unregister
|
|
||||||
|
|
||||||
Enables the unregister command without any pre-configured scope.
|
|
||||||
|
|
||||||
## deny-unregister
|
|
||||||
|
|
||||||
Denies the unregister command without any pre-configured scope.
|
|
||||||
|
|
||||||
## allow-unregister-all
|
|
||||||
|
|
||||||
Enables the unregister_all command without any pre-configured scope.
|
|
||||||
|
|
||||||
## deny-unregister-all
|
|
||||||
|
|
||||||
Denies the unregister_all command without any pre-configured scope.
|
|
||||||
|
|
||||||
|
@ -0,0 +1,23 @@
|
|||||||
|
# Security Policy
|
||||||
|
|
||||||
|
**Do not report security vulnerabilities through public GitHub issues.**
|
||||||
|
|
||||||
|
**Please use the [Private Vulnerability Disclosure](https://docs.github.com/en/code-security/security-advisories/guidance-on-reporting-and-writing-information-about-vulnerabilities/privately-reporting-a-security-vulnerability#privately-reporting-a-security-vulnerability) feature of GitHub.**
|
||||||
|
|
||||||
|
Include as much of the following information:
|
||||||
|
|
||||||
|
- Type of issue (e.g. improper input parsing, privilege escalation, etc.)
|
||||||
|
- The location of the affected source code (tag/branch/commit or direct URL)
|
||||||
|
- Any special configuration required to reproduce the issue
|
||||||
|
- The distribution affected or used to help us with reproduction of the issue
|
||||||
|
- Step-by-step instructions to reproduce the issue
|
||||||
|
- Ideally a reproduction repository
|
||||||
|
- Impact of the issue, including how an attacker might exploit the issue
|
||||||
|
|
||||||
|
We prefer to receive reports in English.
|
||||||
|
|
||||||
|
## Contact
|
||||||
|
|
||||||
|
Please disclose a vulnerability or security relevant issue here: [https://github.com/tauri-apps/plugins-workspace/security/advisories/new](https://github.com/tauri-apps/plugins-workspace/security/advisories/new).
|
||||||
|
|
||||||
|
Alternatively, you can also contact us by email via [security@tauri.app](mailto:security@tauri.app).
|
@ -1,38 +1,11 @@
|
|||||||
# Permissions
|
| Permission | Description |
|
||||||
|
|------|-----|
|
||||||
## allow-fetch
|
|`allow-fetch`|Enables the fetch command without any pre-configured scope.|
|
||||||
|
|`deny-fetch`|Denies the fetch command without any pre-configured scope.|
|
||||||
Enables the fetch command without any pre-configured scope.
|
|`allow-fetch-cancel`|Enables the fetch_cancel command without any pre-configured scope.|
|
||||||
|
|`deny-fetch-cancel`|Denies the fetch_cancel command without any pre-configured scope.|
|
||||||
## deny-fetch
|
|`allow-fetch-read-body`|Enables the fetch_read_body command without any pre-configured scope.|
|
||||||
|
|`deny-fetch-read-body`|Denies the fetch_read_body command without any pre-configured scope.|
|
||||||
Denies the fetch command without any pre-configured scope.
|
|`allow-fetch-send`|Enables the fetch_send command without any pre-configured scope.|
|
||||||
|
|`deny-fetch-send`|Denies the fetch_send command without any pre-configured scope.|
|
||||||
## allow-fetch-cancel
|
|`default`|Allows all fetch operations|
|
||||||
|
|
||||||
Enables the fetch_cancel command without any pre-configured scope.
|
|
||||||
|
|
||||||
## deny-fetch-cancel
|
|
||||||
|
|
||||||
Denies the fetch_cancel command without any pre-configured scope.
|
|
||||||
|
|
||||||
## allow-fetch-read-body
|
|
||||||
|
|
||||||
Enables the fetch_read_body command without any pre-configured scope.
|
|
||||||
|
|
||||||
## deny-fetch-read-body
|
|
||||||
|
|
||||||
Denies the fetch_read_body command without any pre-configured scope.
|
|
||||||
|
|
||||||
## allow-fetch-send
|
|
||||||
|
|
||||||
Enables the fetch_send command without any pre-configured scope.
|
|
||||||
|
|
||||||
## deny-fetch-send
|
|
||||||
|
|
||||||
Denies the fetch_send command without any pre-configured scope.
|
|
||||||
|
|
||||||
## default
|
|
||||||
|
|
||||||
Allows all fetch operations
|
|
||||||
|
|
||||||
|
@ -0,0 +1,23 @@
|
|||||||
|
# Security Policy
|
||||||
|
|
||||||
|
**Do not report security vulnerabilities through public GitHub issues.**
|
||||||
|
|
||||||
|
**Please use the [Private Vulnerability Disclosure](https://docs.github.com/en/code-security/security-advisories/guidance-on-reporting-and-writing-information-about-vulnerabilities/privately-reporting-a-security-vulnerability#privately-reporting-a-security-vulnerability) feature of GitHub.**
|
||||||
|
|
||||||
|
Include as much of the following information:
|
||||||
|
|
||||||
|
- Type of issue (e.g. improper input parsing, privilege escalation, etc.)
|
||||||
|
- The location of the affected source code (tag/branch/commit or direct URL)
|
||||||
|
- Any special configuration required to reproduce the issue
|
||||||
|
- The distribution affected or used to help us with reproduction of the issue
|
||||||
|
- Step-by-step instructions to reproduce the issue
|
||||||
|
- Ideally a reproduction repository
|
||||||
|
- Impact of the issue, including how an attacker might exploit the issue
|
||||||
|
|
||||||
|
We prefer to receive reports in English.
|
||||||
|
|
||||||
|
## Contact
|
||||||
|
|
||||||
|
Please disclose a vulnerability or security relevant issue here: [https://github.com/tauri-apps/plugins-workspace/security/advisories/new](https://github.com/tauri-apps/plugins-workspace/security/advisories/new).
|
||||||
|
|
||||||
|
Alternatively, you can also contact us by email via [security@tauri.app](mailto:security@tauri.app).
|
@ -1,14 +1,5 @@
|
|||||||
# Permissions
|
| Permission | Description |
|
||||||
|
|------|-----|
|
||||||
## allow-log
|
|`allow-log`|Enables the log command without any pre-configured scope.|
|
||||||
|
|`deny-log`|Denies the log command without any pre-configured scope.|
|
||||||
Enables the log command without any pre-configured scope.
|
|`default`|Allows the log command|
|
||||||
|
|
||||||
## deny-log
|
|
||||||
|
|
||||||
Denies the log command without any pre-configured scope.
|
|
||||||
|
|
||||||
## default
|
|
||||||
|
|
||||||
Allows the log command
|
|
||||||
|
|
||||||
|
@ -0,0 +1,23 @@
|
|||||||
|
# Security Policy
|
||||||
|
|
||||||
|
**Do not report security vulnerabilities through public GitHub issues.**
|
||||||
|
|
||||||
|
**Please use the [Private Vulnerability Disclosure](https://docs.github.com/en/code-security/security-advisories/guidance-on-reporting-and-writing-information-about-vulnerabilities/privately-reporting-a-security-vulnerability#privately-reporting-a-security-vulnerability) feature of GitHub.**
|
||||||
|
|
||||||
|
Include as much of the following information:
|
||||||
|
|
||||||
|
- Type of issue (e.g. improper input parsing, privilege escalation, etc.)
|
||||||
|
- The location of the affected source code (tag/branch/commit or direct URL)
|
||||||
|
- Any special configuration required to reproduce the issue
|
||||||
|
- The distribution affected or used to help us with reproduction of the issue
|
||||||
|
- Step-by-step instructions to reproduce the issue
|
||||||
|
- Ideally a reproduction repository
|
||||||
|
- Impact of the issue, including how an attacker might exploit the issue
|
||||||
|
|
||||||
|
We prefer to receive reports in English.
|
||||||
|
|
||||||
|
## Contact
|
||||||
|
|
||||||
|
Please disclose a vulnerability or security relevant issue here: [https://github.com/tauri-apps/plugins-workspace/security/advisories/new](https://github.com/tauri-apps/plugins-workspace/security/advisories/new).
|
||||||
|
|
||||||
|
Alternatively, you can also contact us by email via [security@tauri.app](mailto:security@tauri.app).
|
@ -1,26 +1,8 @@
|
|||||||
# Permissions
|
| Permission | Description |
|
||||||
|
|------|-----|
|
||||||
## allow-is-available
|
|`allow-is-available`|Enables the is_available command without any pre-configured scope.|
|
||||||
|
|`deny-is-available`|Denies the is_available command without any pre-configured scope.|
|
||||||
Enables the is_available command without any pre-configured scope.
|
|`allow-scan`|Enables the scan command without any pre-configured scope.|
|
||||||
|
|`deny-scan`|Denies the scan command without any pre-configured scope.|
|
||||||
## deny-is-available
|
|`allow-write`|Enables the write command without any pre-configured scope.|
|
||||||
|
|`deny-write`|Denies the write command without any pre-configured scope.|
|
||||||
Denies the is_available command without any pre-configured scope.
|
|
||||||
|
|
||||||
## allow-scan
|
|
||||||
|
|
||||||
Enables the scan command without any pre-configured scope.
|
|
||||||
|
|
||||||
## deny-scan
|
|
||||||
|
|
||||||
Denies the scan command without any pre-configured scope.
|
|
||||||
|
|
||||||
## allow-write
|
|
||||||
|
|
||||||
Enables the write command without any pre-configured scope.
|
|
||||||
|
|
||||||
## deny-write
|
|
||||||
|
|
||||||
Denies the write command without any pre-configured scope.
|
|
||||||
|
|
||||||
|
@ -0,0 +1,23 @@
|
|||||||
|
# Security Policy
|
||||||
|
|
||||||
|
**Do not report security vulnerabilities through public GitHub issues.**
|
||||||
|
|
||||||
|
**Please use the [Private Vulnerability Disclosure](https://docs.github.com/en/code-security/security-advisories/guidance-on-reporting-and-writing-information-about-vulnerabilities/privately-reporting-a-security-vulnerability#privately-reporting-a-security-vulnerability) feature of GitHub.**
|
||||||
|
|
||||||
|
Include as much of the following information:
|
||||||
|
|
||||||
|
- Type of issue (e.g. improper input parsing, privilege escalation, etc.)
|
||||||
|
- The location of the affected source code (tag/branch/commit or direct URL)
|
||||||
|
- Any special configuration required to reproduce the issue
|
||||||
|
- The distribution affected or used to help us with reproduction of the issue
|
||||||
|
- Step-by-step instructions to reproduce the issue
|
||||||
|
- Ideally a reproduction repository
|
||||||
|
- Impact of the issue, including how an attacker might exploit the issue
|
||||||
|
|
||||||
|
We prefer to receive reports in English.
|
||||||
|
|
||||||
|
## Contact
|
||||||
|
|
||||||
|
Please disclose a vulnerability or security relevant issue here: [https://github.com/tauri-apps/plugins-workspace/security/advisories/new](https://github.com/tauri-apps/plugins-workspace/security/advisories/new).
|
||||||
|
|
||||||
|
Alternatively, you can also contact us by email via [security@tauri.app](mailto:security@tauri.app).
|
@ -1,30 +1,9 @@
|
|||||||
# Permissions
|
| Permission | Description |
|
||||||
|
|------|-----|
|
||||||
## allow-is-permission-granted
|
|`allow-is-permission-granted`|Enables the is_permission_granted command without any pre-configured scope.|
|
||||||
|
|`deny-is-permission-granted`|Denies the is_permission_granted command without any pre-configured scope.|
|
||||||
Enables the is_permission_granted command without any pre-configured scope.
|
|`allow-notify`|Enables the notify command without any pre-configured scope.|
|
||||||
|
|`deny-notify`|Denies the notify command without any pre-configured scope.|
|
||||||
## deny-is-permission-granted
|
|`allow-request-permission`|Enables the request_permission command without any pre-configured scope.|
|
||||||
|
|`deny-request-permission`|Denies the request_permission command without any pre-configured scope.|
|
||||||
Denies the is_permission_granted command without any pre-configured scope.
|
|`default`|Allows requesting permission, checking permission state and sending notifications|
|
||||||
|
|
||||||
## allow-notify
|
|
||||||
|
|
||||||
Enables the notify command without any pre-configured scope.
|
|
||||||
|
|
||||||
## deny-notify
|
|
||||||
|
|
||||||
Denies the notify command without any pre-configured scope.
|
|
||||||
|
|
||||||
## allow-request-permission
|
|
||||||
|
|
||||||
Enables the request_permission command without any pre-configured scope.
|
|
||||||
|
|
||||||
## deny-request-permission
|
|
||||||
|
|
||||||
Denies the request_permission command without any pre-configured scope.
|
|
||||||
|
|
||||||
## default
|
|
||||||
|
|
||||||
Allows requesting permission, checking permission state and sending notifications
|
|
||||||
|
|
||||||
|
@ -0,0 +1,23 @@
|
|||||||
|
# Security Policy
|
||||||
|
|
||||||
|
**Do not report security vulnerabilities through public GitHub issues.**
|
||||||
|
|
||||||
|
**Please use the [Private Vulnerability Disclosure](https://docs.github.com/en/code-security/security-advisories/guidance-on-reporting-and-writing-information-about-vulnerabilities/privately-reporting-a-security-vulnerability#privately-reporting-a-security-vulnerability) feature of GitHub.**
|
||||||
|
|
||||||
|
Include as much of the following information:
|
||||||
|
|
||||||
|
- Type of issue (e.g. improper input parsing, privilege escalation, etc.)
|
||||||
|
- The location of the affected source code (tag/branch/commit or direct URL)
|
||||||
|
- Any special configuration required to reproduce the issue
|
||||||
|
- The distribution affected or used to help us with reproduction of the issue
|
||||||
|
- Step-by-step instructions to reproduce the issue
|
||||||
|
- Ideally a reproduction repository
|
||||||
|
- Impact of the issue, including how an attacker might exploit the issue
|
||||||
|
|
||||||
|
We prefer to receive reports in English.
|
||||||
|
|
||||||
|
## Contact
|
||||||
|
|
||||||
|
Please disclose a vulnerability or security relevant issue here: [https://github.com/tauri-apps/plugins-workspace/security/advisories/new](https://github.com/tauri-apps/plugins-workspace/security/advisories/new).
|
||||||
|
|
||||||
|
Alternatively, you can also contact us by email via [security@tauri.app](mailto:security@tauri.app).
|
@ -1,66 +1,18 @@
|
|||||||
# Permissions
|
| Permission | Description |
|
||||||
|
|------|-----|
|
||||||
## allow-arch
|
|`allow-arch`|Enables the arch command without any pre-configured scope.|
|
||||||
|
|`deny-arch`|Denies the arch command without any pre-configured scope.|
|
||||||
Enables the arch command without any pre-configured scope.
|
|`allow-exe-extension`|Enables the exe_extension command without any pre-configured scope.|
|
||||||
|
|`deny-exe-extension`|Denies the exe_extension command without any pre-configured scope.|
|
||||||
## deny-arch
|
|`allow-family`|Enables the family command without any pre-configured scope.|
|
||||||
|
|`deny-family`|Denies the family command without any pre-configured scope.|
|
||||||
Denies the arch command without any pre-configured scope.
|
|`allow-hostname`|Enables the hostname command without any pre-configured scope.|
|
||||||
|
|`deny-hostname`|Denies the hostname command without any pre-configured scope.|
|
||||||
## allow-exe-extension
|
|`allow-locale`|Enables the locale command without any pre-configured scope.|
|
||||||
|
|`deny-locale`|Denies the locale command without any pre-configured scope.|
|
||||||
Enables the exe_extension command without any pre-configured scope.
|
|`allow-os-type`|Enables the os_type command without any pre-configured scope.|
|
||||||
|
|`deny-os-type`|Denies the os_type command without any pre-configured scope.|
|
||||||
## deny-exe-extension
|
|`allow-platform`|Enables the platform command without any pre-configured scope.|
|
||||||
|
|`deny-platform`|Denies the platform command without any pre-configured scope.|
|
||||||
Denies the exe_extension command without any pre-configured scope.
|
|`allow-version`|Enables the version command without any pre-configured scope.|
|
||||||
|
|`deny-version`|Denies the version command without any pre-configured scope.|
|
||||||
## allow-family
|
|
||||||
|
|
||||||
Enables the family command without any pre-configured scope.
|
|
||||||
|
|
||||||
## deny-family
|
|
||||||
|
|
||||||
Denies the family command without any pre-configured scope.
|
|
||||||
|
|
||||||
## allow-hostname
|
|
||||||
|
|
||||||
Enables the hostname command without any pre-configured scope.
|
|
||||||
|
|
||||||
## deny-hostname
|
|
||||||
|
|
||||||
Denies the hostname command without any pre-configured scope.
|
|
||||||
|
|
||||||
## allow-locale
|
|
||||||
|
|
||||||
Enables the locale command without any pre-configured scope.
|
|
||||||
|
|
||||||
## deny-locale
|
|
||||||
|
|
||||||
Denies the locale command without any pre-configured scope.
|
|
||||||
|
|
||||||
## allow-os-type
|
|
||||||
|
|
||||||
Enables the os_type command without any pre-configured scope.
|
|
||||||
|
|
||||||
## deny-os-type
|
|
||||||
|
|
||||||
Denies the os_type command without any pre-configured scope.
|
|
||||||
|
|
||||||
## allow-platform
|
|
||||||
|
|
||||||
Enables the platform command without any pre-configured scope.
|
|
||||||
|
|
||||||
## deny-platform
|
|
||||||
|
|
||||||
Denies the platform command without any pre-configured scope.
|
|
||||||
|
|
||||||
## allow-version
|
|
||||||
|
|
||||||
Enables the version command without any pre-configured scope.
|
|
||||||
|
|
||||||
## deny-version
|
|
||||||
|
|
||||||
Denies the version command without any pre-configured scope.
|
|
||||||
|
|
||||||
|
@ -0,0 +1,23 @@
|
|||||||
|
# Security Policy
|
||||||
|
|
||||||
|
**Do not report security vulnerabilities through public GitHub issues.**
|
||||||
|
|
||||||
|
**Please use the [Private Vulnerability Disclosure](https://docs.github.com/en/code-security/security-advisories/guidance-on-reporting-and-writing-information-about-vulnerabilities/privately-reporting-a-security-vulnerability#privately-reporting-a-security-vulnerability) feature of GitHub.**
|
||||||
|
|
||||||
|
Include as much of the following information:
|
||||||
|
|
||||||
|
- Type of issue (e.g. improper input parsing, privilege escalation, etc.)
|
||||||
|
- The location of the affected source code (tag/branch/commit or direct URL)
|
||||||
|
- Any special configuration required to reproduce the issue
|
||||||
|
- The distribution affected or used to help us with reproduction of the issue
|
||||||
|
- Step-by-step instructions to reproduce the issue
|
||||||
|
- Ideally a reproduction repository
|
||||||
|
- Impact of the issue, including how an attacker might exploit the issue
|
||||||
|
|
||||||
|
We prefer to receive reports in English.
|
||||||
|
|
||||||
|
## Contact
|
||||||
|
|
||||||
|
Please disclose a vulnerability or security relevant issue here: [https://github.com/tauri-apps/plugins-workspace/security/advisories/new](https://github.com/tauri-apps/plugins-workspace/security/advisories/new).
|
||||||
|
|
||||||
|
Alternatively, you can also contact us by email via [security@tauri.app](mailto:security@tauri.app).
|
@ -0,0 +1,23 @@
|
|||||||
|
# Security Policy
|
||||||
|
|
||||||
|
**Do not report security vulnerabilities through public GitHub issues.**
|
||||||
|
|
||||||
|
**Please use the [Private Vulnerability Disclosure](https://docs.github.com/en/code-security/security-advisories/guidance-on-reporting-and-writing-information-about-vulnerabilities/privately-reporting-a-security-vulnerability#privately-reporting-a-security-vulnerability) feature of GitHub.**
|
||||||
|
|
||||||
|
Include as much of the following information:
|
||||||
|
|
||||||
|
- Type of issue (e.g. improper input parsing, privilege escalation, etc.)
|
||||||
|
- The location of the affected source code (tag/branch/commit or direct URL)
|
||||||
|
- Any special configuration required to reproduce the issue
|
||||||
|
- The distribution affected or used to help us with reproduction of the issue
|
||||||
|
- Step-by-step instructions to reproduce the issue
|
||||||
|
- Ideally a reproduction repository
|
||||||
|
- Impact of the issue, including how an attacker might exploit the issue
|
||||||
|
|
||||||
|
We prefer to receive reports in English.
|
||||||
|
|
||||||
|
## Contact
|
||||||
|
|
||||||
|
Please disclose a vulnerability or security relevant issue here: [https://github.com/tauri-apps/plugins-workspace/security/advisories/new](https://github.com/tauri-apps/plugins-workspace/security/advisories/new).
|
||||||
|
|
||||||
|
Alternatively, you can also contact us by email via [security@tauri.app](mailto:security@tauri.app).
|
@ -1,14 +1,5 @@
|
|||||||
# Permissions
|
| Permission | Description |
|
||||||
|
|------|-----|
|
||||||
## allow-move-window
|
|`allow-move-window`|Enables the move_window command without any pre-configured scope.|
|
||||||
|
|`deny-move-window`|Denies the move_window command without any pre-configured scope.|
|
||||||
Enables the move_window command without any pre-configured scope.
|
|`default`|Allows the move_window command|
|
||||||
|
|
||||||
## deny-move-window
|
|
||||||
|
|
||||||
Denies the move_window command without any pre-configured scope.
|
|
||||||
|
|
||||||
## default
|
|
||||||
|
|
||||||
Allows the move_window command
|
|
||||||
|
|
||||||
|
@ -0,0 +1,23 @@
|
|||||||
|
# Security Policy
|
||||||
|
|
||||||
|
**Do not report security vulnerabilities through public GitHub issues.**
|
||||||
|
|
||||||
|
**Please use the [Private Vulnerability Disclosure](https://docs.github.com/en/code-security/security-advisories/guidance-on-reporting-and-writing-information-about-vulnerabilities/privately-reporting-a-security-vulnerability#privately-reporting-a-security-vulnerability) feature of GitHub.**
|
||||||
|
|
||||||
|
Include as much of the following information:
|
||||||
|
|
||||||
|
- Type of issue (e.g. improper input parsing, privilege escalation, etc.)
|
||||||
|
- The location of the affected source code (tag/branch/commit or direct URL)
|
||||||
|
- Any special configuration required to reproduce the issue
|
||||||
|
- The distribution affected or used to help us with reproduction of the issue
|
||||||
|
- Step-by-step instructions to reproduce the issue
|
||||||
|
- Ideally a reproduction repository
|
||||||
|
- Impact of the issue, including how an attacker might exploit the issue
|
||||||
|
|
||||||
|
We prefer to receive reports in English.
|
||||||
|
|
||||||
|
## Contact
|
||||||
|
|
||||||
|
Please disclose a vulnerability or security relevant issue here: [https://github.com/tauri-apps/plugins-workspace/security/advisories/new](https://github.com/tauri-apps/plugins-workspace/security/advisories/new).
|
||||||
|
|
||||||
|
Alternatively, you can also contact us by email via [security@tauri.app](mailto:security@tauri.app).
|
@ -1,18 +1,6 @@
|
|||||||
# Permissions
|
| Permission | Description |
|
||||||
|
|------|-----|
|
||||||
## allow-exit
|
|`allow-exit`|Enables the exit command without any pre-configured scope.|
|
||||||
|
|`deny-exit`|Denies the exit command without any pre-configured scope.|
|
||||||
Enables the exit command without any pre-configured scope.
|
|`allow-restart`|Enables the restart command without any pre-configured scope.|
|
||||||
|
|`deny-restart`|Denies the restart command without any pre-configured scope.|
|
||||||
## deny-exit
|
|
||||||
|
|
||||||
Denies the exit command without any pre-configured scope.
|
|
||||||
|
|
||||||
## allow-restart
|
|
||||||
|
|
||||||
Enables the restart command without any pre-configured scope.
|
|
||||||
|
|
||||||
## deny-restart
|
|
||||||
|
|
||||||
Denies the restart command without any pre-configured scope.
|
|
||||||
|
|
||||||
|
@ -0,0 +1,23 @@
|
|||||||
|
# Security Policy
|
||||||
|
|
||||||
|
**Do not report security vulnerabilities through public GitHub issues.**
|
||||||
|
|
||||||
|
**Please use the [Private Vulnerability Disclosure](https://docs.github.com/en/code-security/security-advisories/guidance-on-reporting-and-writing-information-about-vulnerabilities/privately-reporting-a-security-vulnerability#privately-reporting-a-security-vulnerability) feature of GitHub.**
|
||||||
|
|
||||||
|
Include as much of the following information:
|
||||||
|
|
||||||
|
- Type of issue (e.g. improper input parsing, privilege escalation, etc.)
|
||||||
|
- The location of the affected source code (tag/branch/commit or direct URL)
|
||||||
|
- Any special configuration required to reproduce the issue
|
||||||
|
- The distribution affected or used to help us with reproduction of the issue
|
||||||
|
- Step-by-step instructions to reproduce the issue
|
||||||
|
- Ideally a reproduction repository
|
||||||
|
- Impact of the issue, including how an attacker might exploit the issue
|
||||||
|
|
||||||
|
We prefer to receive reports in English.
|
||||||
|
|
||||||
|
## Contact
|
||||||
|
|
||||||
|
Please disclose a vulnerability or security relevant issue here: [https://github.com/tauri-apps/plugins-workspace/security/advisories/new](https://github.com/tauri-apps/plugins-workspace/security/advisories/new).
|
||||||
|
|
||||||
|
Alternatively, you can also contact us by email via [security@tauri.app](mailto:security@tauri.app).
|
@ -1,34 +1,10 @@
|
|||||||
# Permissions
|
| Permission | Description |
|
||||||
|
|------|-----|
|
||||||
## allow-execute
|
|`allow-execute`|Enables the execute command without any pre-configured scope.|
|
||||||
|
|`deny-execute`|Denies the execute command without any pre-configured scope.|
|
||||||
Enables the execute command without any pre-configured scope.
|
|`allow-kill`|Enables the kill command without any pre-configured scope.|
|
||||||
|
|`deny-kill`|Denies the kill command without any pre-configured scope.|
|
||||||
## deny-execute
|
|`allow-open`|Enables the open command without any pre-configured scope.|
|
||||||
|
|`deny-open`|Denies the open command without any pre-configured scope.|
|
||||||
Denies the execute command without any pre-configured scope.
|
|`allow-stdin-write`|Enables the stdin_write command without any pre-configured scope.|
|
||||||
|
|`deny-stdin-write`|Denies the stdin_write command without any pre-configured scope.|
|
||||||
## allow-kill
|
|
||||||
|
|
||||||
Enables the kill command without any pre-configured scope.
|
|
||||||
|
|
||||||
## deny-kill
|
|
||||||
|
|
||||||
Denies the kill command without any pre-configured scope.
|
|
||||||
|
|
||||||
## allow-open
|
|
||||||
|
|
||||||
Enables the open command without any pre-configured scope.
|
|
||||||
|
|
||||||
## deny-open
|
|
||||||
|
|
||||||
Denies the open command without any pre-configured scope.
|
|
||||||
|
|
||||||
## allow-stdin-write
|
|
||||||
|
|
||||||
Enables the stdin_write command without any pre-configured scope.
|
|
||||||
|
|
||||||
## deny-stdin-write
|
|
||||||
|
|
||||||
Denies the stdin_write command without any pre-configured scope.
|
|
||||||
|
|
||||||
|
@ -0,0 +1,23 @@
|
|||||||
|
# Security Policy
|
||||||
|
|
||||||
|
**Do not report security vulnerabilities through public GitHub issues.**
|
||||||
|
|
||||||
|
**Please use the [Private Vulnerability Disclosure](https://docs.github.com/en/code-security/security-advisories/guidance-on-reporting-and-writing-information-about-vulnerabilities/privately-reporting-a-security-vulnerability#privately-reporting-a-security-vulnerability) feature of GitHub.**
|
||||||
|
|
||||||
|
Include as much of the following information:
|
||||||
|
|
||||||
|
- Type of issue (e.g. improper input parsing, privilege escalation, etc.)
|
||||||
|
- The location of the affected source code (tag/branch/commit or direct URL)
|
||||||
|
- Any special configuration required to reproduce the issue
|
||||||
|
- The distribution affected or used to help us with reproduction of the issue
|
||||||
|
- Step-by-step instructions to reproduce the issue
|
||||||
|
- Ideally a reproduction repository
|
||||||
|
- Impact of the issue, including how an attacker might exploit the issue
|
||||||
|
|
||||||
|
We prefer to receive reports in English.
|
||||||
|
|
||||||
|
## Contact
|
||||||
|
|
||||||
|
Please disclose a vulnerability or security relevant issue here: [https://github.com/tauri-apps/plugins-workspace/security/advisories/new](https://github.com/tauri-apps/plugins-workspace/security/advisories/new).
|
||||||
|
|
||||||
|
Alternatively, you can also contact us by email via [security@tauri.app](mailto:security@tauri.app).
|
@ -0,0 +1,23 @@
|
|||||||
|
# Security Policy
|
||||||
|
|
||||||
|
**Do not report security vulnerabilities through public GitHub issues.**
|
||||||
|
|
||||||
|
**Please use the [Private Vulnerability Disclosure](https://docs.github.com/en/code-security/security-advisories/guidance-on-reporting-and-writing-information-about-vulnerabilities/privately-reporting-a-security-vulnerability#privately-reporting-a-security-vulnerability) feature of GitHub.**
|
||||||
|
|
||||||
|
Include as much of the following information:
|
||||||
|
|
||||||
|
- Type of issue (e.g. improper input parsing, privilege escalation, etc.)
|
||||||
|
- The location of the affected source code (tag/branch/commit or direct URL)
|
||||||
|
- Any special configuration required to reproduce the issue
|
||||||
|
- The distribution affected or used to help us with reproduction of the issue
|
||||||
|
- Step-by-step instructions to reproduce the issue
|
||||||
|
- Ideally a reproduction repository
|
||||||
|
- Impact of the issue, including how an attacker might exploit the issue
|
||||||
|
|
||||||
|
We prefer to receive reports in English.
|
||||||
|
|
||||||
|
## Contact
|
||||||
|
|
||||||
|
Please disclose a vulnerability or security relevant issue here: [https://github.com/tauri-apps/plugins-workspace/security/advisories/new](https://github.com/tauri-apps/plugins-workspace/security/advisories/new).
|
||||||
|
|
||||||
|
Alternatively, you can also contact us by email via [security@tauri.app](mailto:security@tauri.app).
|
@ -1,34 +1,10 @@
|
|||||||
# Permissions
|
| Permission | Description |
|
||||||
|
|------|-----|
|
||||||
## allow-close
|
|`allow-close`|Enables the close command without any pre-configured scope.|
|
||||||
|
|`deny-close`|Denies the close command without any pre-configured scope.|
|
||||||
Enables the close command without any pre-configured scope.
|
|`allow-execute`|Enables the execute command without any pre-configured scope.|
|
||||||
|
|`deny-execute`|Denies the execute command without any pre-configured scope.|
|
||||||
## deny-close
|
|`allow-load`|Enables the load command without any pre-configured scope.|
|
||||||
|
|`deny-load`|Denies the load command without any pre-configured scope.|
|
||||||
Denies the close command without any pre-configured scope.
|
|`allow-select`|Enables the select command without any pre-configured scope.|
|
||||||
|
|`deny-select`|Denies the select command without any pre-configured scope.|
|
||||||
## allow-execute
|
|
||||||
|
|
||||||
Enables the execute command without any pre-configured scope.
|
|
||||||
|
|
||||||
## deny-execute
|
|
||||||
|
|
||||||
Denies the execute command without any pre-configured scope.
|
|
||||||
|
|
||||||
## allow-load
|
|
||||||
|
|
||||||
Enables the load command without any pre-configured scope.
|
|
||||||
|
|
||||||
## deny-load
|
|
||||||
|
|
||||||
Denies the load command without any pre-configured scope.
|
|
||||||
|
|
||||||
## allow-select
|
|
||||||
|
|
||||||
Enables the select command without any pre-configured scope.
|
|
||||||
|
|
||||||
## deny-select
|
|
||||||
|
|
||||||
Denies the select command without any pre-configured scope.
|
|
||||||
|
|
||||||
|
@ -0,0 +1,23 @@
|
|||||||
|
# Security Policy
|
||||||
|
|
||||||
|
**Do not report security vulnerabilities through public GitHub issues.**
|
||||||
|
|
||||||
|
**Please use the [Private Vulnerability Disclosure](https://docs.github.com/en/code-security/security-advisories/guidance-on-reporting-and-writing-information-about-vulnerabilities/privately-reporting-a-security-vulnerability#privately-reporting-a-security-vulnerability) feature of GitHub.**
|
||||||
|
|
||||||
|
Include as much of the following information:
|
||||||
|
|
||||||
|
- Type of issue (e.g. improper input parsing, privilege escalation, etc.)
|
||||||
|
- The location of the affected source code (tag/branch/commit or direct URL)
|
||||||
|
- Any special configuration required to reproduce the issue
|
||||||
|
- The distribution affected or used to help us with reproduction of the issue
|
||||||
|
- Step-by-step instructions to reproduce the issue
|
||||||
|
- Ideally a reproduction repository
|
||||||
|
- Impact of the issue, including how an attacker might exploit the issue
|
||||||
|
|
||||||
|
We prefer to receive reports in English.
|
||||||
|
|
||||||
|
## Contact
|
||||||
|
|
||||||
|
Please disclose a vulnerability or security relevant issue here: [https://github.com/tauri-apps/plugins-workspace/security/advisories/new](https://github.com/tauri-apps/plugins-workspace/security/advisories/new).
|
||||||
|
|
||||||
|
Alternatively, you can also contact us by email via [security@tauri.app](mailto:security@tauri.app).
|
@ -0,0 +1,40 @@
|
|||||||
|
plugins {
|
||||||
|
id("com.android.library")
|
||||||
|
id("org.jetbrains.kotlin.android")
|
||||||
|
}
|
||||||
|
|
||||||
|
android {
|
||||||
|
namespace = "app.tauri.store"
|
||||||
|
compileSdk = 33
|
||||||
|
|
||||||
|
defaultConfig {
|
||||||
|
minSdk = 19
|
||||||
|
targetSdk = 33
|
||||||
|
|
||||||
|
testInstrumentationRunner = "androidx.test.runner.AndroidJUnitRunner"
|
||||||
|
consumerProguardFiles("consumer-rules.pro")
|
||||||
|
}
|
||||||
|
|
||||||
|
buildTypes {
|
||||||
|
release {
|
||||||
|
isMinifyEnabled = false
|
||||||
|
proguardFiles(
|
||||||
|
getDefaultProguardFile("proguard-android-optimize.txt"),
|
||||||
|
"proguard-rules.pro"
|
||||||
|
)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
compileOptions {
|
||||||
|
sourceCompatibility = JavaVersion.VERSION_1_8
|
||||||
|
targetCompatibility = JavaVersion.VERSION_1_8
|
||||||
|
}
|
||||||
|
kotlinOptions {
|
||||||
|
jvmTarget = "1.8"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
dependencies {
|
||||||
|
implementation("androidx.core:core-ktx:1.9.0")
|
||||||
|
implementation("com.fasterxml.jackson.core:jackson-databind:2.15.3")
|
||||||
|
implementation(project(":tauri-android"))
|
||||||
|
}
|
@ -0,0 +1,21 @@
|
|||||||
|
# Add project specific ProGuard rules here.
|
||||||
|
# You can control the set of applied configuration files using the
|
||||||
|
# proguardFiles setting in build.gradle.
|
||||||
|
#
|
||||||
|
# For more details, see
|
||||||
|
# http://developer.android.com/guide/developing/tools/proguard.html
|
||||||
|
|
||||||
|
# If your project uses WebView with JS, uncomment the following
|
||||||
|
# and specify the fully qualified class name to the JavaScript interface
|
||||||
|
# class:
|
||||||
|
#-keepclassmembers class fqcn.of.javascript.interface.for.webview {
|
||||||
|
# public *;
|
||||||
|
#}
|
||||||
|
|
||||||
|
# Uncomment this to preserve the line number information for
|
||||||
|
# debugging stack traces.
|
||||||
|
#-keepattributes SourceFile,LineNumberTable
|
||||||
|
|
||||||
|
# If you keep the line number information, uncomment this to
|
||||||
|
# hide the original source file name.
|
||||||
|
#-renamesourcefileattribute SourceFile
|
@ -0,0 +1,2 @@
|
|||||||
|
include ':tauri-android'
|
||||||
|
project(':tauri-android').projectDir = new File('./.tauri/tauri-api')
|
@ -0,0 +1,3 @@
|
|||||||
|
<?xml version="1.0" encoding="utf-8"?>
|
||||||
|
<manifest xmlns:android="http://schemas.android.com/apk/res/android">
|
||||||
|
</manifest>
|
@ -0,0 +1,50 @@
|
|||||||
|
// Copyright 2019-2023 Tauri Programme within The Commons Conservancy
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
// SPDX-License-Identifier: MIT
|
||||||
|
|
||||||
|
package app.tauri.store
|
||||||
|
|
||||||
|
import android.app.Activity
|
||||||
|
import app.tauri.annotation.Command
|
||||||
|
import app.tauri.annotation.TauriPlugin
|
||||||
|
import app.tauri.plugin.Invoke
|
||||||
|
import app.tauri.plugin.Plugin
|
||||||
|
import com.fasterxml.jackson.databind.JsonNode
|
||||||
|
import com.fasterxml.jackson.databind.ObjectMapper
|
||||||
|
import java.io.File
|
||||||
|
|
||||||
|
@TauriPlugin
|
||||||
|
class StorePlugin(private val activity: Activity) : Plugin(activity) {
|
||||||
|
@Command
|
||||||
|
fun load(invoke: Invoke) {
|
||||||
|
try {
|
||||||
|
val path = invoke.parseArgs(String::class.java)
|
||||||
|
val file = File(activity.applicationContext.getExternalFilesDir(null), path)
|
||||||
|
|
||||||
|
invoke.resolveObject(ObjectMapper().readTree(file))
|
||||||
|
} catch (ex: Exception) {
|
||||||
|
invoke.reject(ex.message)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
@Command
|
||||||
|
fun save(invoke: Invoke) {
|
||||||
|
try {
|
||||||
|
val args = invoke.parseArgs(JsonNode::class.java)
|
||||||
|
val path = args.get("store").asText()
|
||||||
|
val cache = args.get("cache")
|
||||||
|
val file = File(activity.applicationContext.getExternalFilesDir(null), path)
|
||||||
|
|
||||||
|
if (!file.exists()) {
|
||||||
|
file.parentFile?.mkdirs()
|
||||||
|
file.createNewFile()
|
||||||
|
}
|
||||||
|
|
||||||
|
file.writeText(cache.toString())
|
||||||
|
|
||||||
|
invoke.resolve()
|
||||||
|
} catch (ex: Exception) {
|
||||||
|
invoke.reject(ex.message)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
@ -0,0 +1,16 @@
|
|||||||
|
{
|
||||||
|
"object": {
|
||||||
|
"pins": [
|
||||||
|
{
|
||||||
|
"package": "SwiftRs",
|
||||||
|
"repositoryURL": "https://github.com/Brendonovich/swift-rs",
|
||||||
|
"state": {
|
||||||
|
"branch": null,
|
||||||
|
"revision": "b5ed223fcdab165bc21219c1925dc1e77e2bef5e",
|
||||||
|
"version": "1.0.6"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"version": 1
|
||||||
|
}
|
@ -0,0 +1,33 @@
|
|||||||
|
// swift-tools-version:5.3
|
||||||
|
// Copyright 2019-2023 Tauri Programme within The Commons Conservancy
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
// SPDX-License-Identifier: MIT
|
||||||
|
|
||||||
|
import PackageDescription
|
||||||
|
|
||||||
|
let package = Package(
|
||||||
|
name: "tauri-plugin-store",
|
||||||
|
platforms: [
|
||||||
|
.iOS(.v13),
|
||||||
|
],
|
||||||
|
products: [
|
||||||
|
// Products define the executables and libraries a package produces, and make them visible to other packages.
|
||||||
|
.library(
|
||||||
|
name: "tauri-plugin-store",
|
||||||
|
type: .static,
|
||||||
|
targets: ["tauri-plugin-store"]),
|
||||||
|
],
|
||||||
|
dependencies: [
|
||||||
|
.package(name: "Tauri", path: "../.tauri/tauri-api")
|
||||||
|
],
|
||||||
|
targets: [
|
||||||
|
// Targets are the basic building blocks of a package. A target can define a module or a test suite.
|
||||||
|
// Targets can depend on other targets in this package, and on products in packages this package depends on.
|
||||||
|
.target(
|
||||||
|
name: "tauri-plugin-store",
|
||||||
|
dependencies: [
|
||||||
|
.byName(name: "Tauri")
|
||||||
|
],
|
||||||
|
path: "Sources")
|
||||||
|
]
|
||||||
|
)
|
@ -0,0 +1,217 @@
|
|||||||
|
// Copyright 2019-2023 Tauri Programme within The Commons Conservancy
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
// SPDX-License-Identifier: MIT
|
||||||
|
|
||||||
|
import Foundation
|
||||||
|
|
||||||
|
import SwiftRs
|
||||||
|
import Tauri
|
||||||
|
import UIKit
|
||||||
|
import WebKit
|
||||||
|
|
||||||
|
|
||||||
|
struct SaveStore: Codable {
|
||||||
|
let store: String
|
||||||
|
let cache: [String: JSON]
|
||||||
|
}
|
||||||
|
|
||||||
|
class StorePlugin: Plugin {
|
||||||
|
@objc public func save(_ invoke: Invoke) throws {
|
||||||
|
do {
|
||||||
|
let args = try invoke.parseArgs(SaveStore.self)
|
||||||
|
let store = args.store
|
||||||
|
let cache = args.cache
|
||||||
|
let fileURL = getUrlFromPath(path: store, createDirs: true)
|
||||||
|
|
||||||
|
try JSONEncoder().encode(cache).write(to: fileURL)
|
||||||
|
invoke.resolve()
|
||||||
|
} catch {
|
||||||
|
invoke.reject(error.localizedDescription)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
@objc public func load(_ invoke: Invoke) throws {
|
||||||
|
do {
|
||||||
|
let path = try invoke.parseArgs(String.self)
|
||||||
|
let fileURL = getUrlFromPath(path: path, createDirs: false)
|
||||||
|
let data = try String(contentsOf: fileURL)
|
||||||
|
let passData = dictionary(text: data)
|
||||||
|
|
||||||
|
invoke.resolve(passData)
|
||||||
|
} catch {
|
||||||
|
invoke.reject(error.localizedDescription)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func dictionary(text: String) -> [String: Any?] {
|
||||||
|
if let data = text.data(using: .utf8) {
|
||||||
|
do {
|
||||||
|
return try JSONSerialization.jsonObject(with: data, options: []) as! [String: Any]
|
||||||
|
} catch {
|
||||||
|
fatalError(error.localizedDescription)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return [:]
|
||||||
|
}
|
||||||
|
|
||||||
|
func getUrlFromPath(path: String, createDirs: Bool) -> URL {
|
||||||
|
do {
|
||||||
|
var url = try FileManager.default
|
||||||
|
.url(
|
||||||
|
for: .applicationSupportDirectory,
|
||||||
|
in: .userDomainMask,
|
||||||
|
appropriateFor: nil,
|
||||||
|
create: true
|
||||||
|
)
|
||||||
|
let components = path.split(separator: "/").map { element in String(element) }
|
||||||
|
|
||||||
|
if components.count == 1 {
|
||||||
|
return url.appendPath(path: path, isDirectory: false)
|
||||||
|
}
|
||||||
|
|
||||||
|
for i in 0..<components.count {
|
||||||
|
url = url.appendPath(path: components[i], isDirectory: true)
|
||||||
|
}
|
||||||
|
|
||||||
|
if components.count > 1 && createDirs {
|
||||||
|
try FileManager.default.createDirectory(at: url, withIntermediateDirectories: true)
|
||||||
|
}
|
||||||
|
|
||||||
|
url = url.appendPath(path: components.last!, isDirectory: false)
|
||||||
|
|
||||||
|
return url
|
||||||
|
} catch {
|
||||||
|
fatalError(error.localizedDescription)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
@_cdecl("init_plugin_store")
|
||||||
|
func initPlugin() -> Plugin {
|
||||||
|
return StorePlugin()
|
||||||
|
}
|
||||||
|
|
||||||
|
private extension URL {
|
||||||
|
func appendPath(path: String, isDirectory: Bool) -> URL {
|
||||||
|
if #available(iOS 16.0, *) {
|
||||||
|
return self.appending(path: path, directoryHint: isDirectory ? .isDirectory : .notDirectory)
|
||||||
|
} else {
|
||||||
|
return self.appendingPathComponent(path, isDirectory: isDirectory)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
public enum JSON : Codable {
|
||||||
|
case null
|
||||||
|
case number(NSNumber)
|
||||||
|
case string(String)
|
||||||
|
case array([JSON])
|
||||||
|
case bool(Bool)
|
||||||
|
case dictionary([String : JSON])
|
||||||
|
|
||||||
|
public var value: Any? {
|
||||||
|
switch self {
|
||||||
|
case .null: return nil
|
||||||
|
case .number(let number): return number
|
||||||
|
case .string(let string): return string
|
||||||
|
case .bool(let bool): return bool
|
||||||
|
case .array(let array): return array.map { $0.value }
|
||||||
|
case .dictionary(let dictionary): return dictionary.mapValues { $0.value }
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
public init?(_ value: Any?) {
|
||||||
|
guard let value = value else {
|
||||||
|
self = .null
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
if let bool = value as? Bool {
|
||||||
|
self = .bool(bool)
|
||||||
|
} else if let int = value as? Int {
|
||||||
|
self = .number(NSNumber(value: int))
|
||||||
|
} else if let double = value as? Double {
|
||||||
|
self = .number(NSNumber(value: double))
|
||||||
|
} else if let string = value as? String {
|
||||||
|
self = .string(string)
|
||||||
|
} else if let array = value as? [Any] {
|
||||||
|
var mapped = [JSON]()
|
||||||
|
for inner in array {
|
||||||
|
guard let inner = JSON(inner) else {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
mapped.append(inner)
|
||||||
|
}
|
||||||
|
|
||||||
|
self = .array(mapped)
|
||||||
|
} else if let dictionary = value as? [String : Any] {
|
||||||
|
var mapped = [String : JSON]()
|
||||||
|
for (key, inner) in dictionary {
|
||||||
|
guard let inner = JSON(inner) else {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
mapped[key] = inner
|
||||||
|
}
|
||||||
|
|
||||||
|
self = .dictionary(mapped)
|
||||||
|
} else {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
public init(from decoder: Decoder) throws {
|
||||||
|
let container = try decoder.singleValueContainer()
|
||||||
|
guard !container.decodeNil() else {
|
||||||
|
self = .null
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
if let bool = try container.decodeIfMatched(Bool.self) {
|
||||||
|
self = .bool(bool)
|
||||||
|
} else if let int = try container.decodeIfMatched(Int.self) {
|
||||||
|
self = .number(NSNumber(value: int))
|
||||||
|
} else if let double = try container.decodeIfMatched(Double.self) {
|
||||||
|
self = .number(NSNumber(value: double))
|
||||||
|
} else if let string = try container.decodeIfMatched(String.self) {
|
||||||
|
self = .string(string)
|
||||||
|
} else if let array = try container.decodeIfMatched([JSON].self) {
|
||||||
|
self = .array(array)
|
||||||
|
} else if let dictionary = try container.decodeIfMatched([String : JSON].self) {
|
||||||
|
self = .dictionary(dictionary)
|
||||||
|
} else {
|
||||||
|
throw DecodingError.typeMismatch(JSON.self, DecodingError.Context(codingPath: decoder.codingPath, debugDescription: "Unable to decode JSON as any of the possible types."))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
public func encode(to encoder: Encoder) throws {
|
||||||
|
var container = encoder.singleValueContainer()
|
||||||
|
|
||||||
|
switch self {
|
||||||
|
case .null: try container.encodeNil()
|
||||||
|
case .bool(let bool): try container.encode(bool)
|
||||||
|
case .number(let number):
|
||||||
|
if number.objCType.pointee == 0x64 /* 'd' */ {
|
||||||
|
try container.encode(number.doubleValue)
|
||||||
|
} else {
|
||||||
|
try container.encode(number.intValue)
|
||||||
|
}
|
||||||
|
case .string(let string): try container.encode(string)
|
||||||
|
case .array(let array): try container.encode(array)
|
||||||
|
case .dictionary(let dictionary): try container.encode(dictionary)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
fileprivate extension SingleValueDecodingContainer {
|
||||||
|
func decodeIfMatched<T : Decodable>(_ type: T.Type) throws -> T? {
|
||||||
|
do {
|
||||||
|
return try self.decode(T.self)
|
||||||
|
} catch DecodingError.typeMismatch {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
@ -1,98 +1,26 @@
|
|||||||
# Permissions
|
| Permission | Description |
|
||||||
|
|------|-----|
|
||||||
## allow-clear
|
|`allow-clear`|Enables the clear command without any pre-configured scope.|
|
||||||
|
|`deny-clear`|Denies the clear command without any pre-configured scope.|
|
||||||
Enables the clear command without any pre-configured scope.
|
|`allow-delete`|Enables the delete command without any pre-configured scope.|
|
||||||
|
|`deny-delete`|Denies the delete command without any pre-configured scope.|
|
||||||
## deny-clear
|
|`allow-entries`|Enables the entries command without any pre-configured scope.|
|
||||||
|
|`deny-entries`|Denies the entries command without any pre-configured scope.|
|
||||||
Denies the clear command without any pre-configured scope.
|
|`allow-get`|Enables the get command without any pre-configured scope.|
|
||||||
|
|`deny-get`|Denies the get command without any pre-configured scope.|
|
||||||
## allow-delete
|
|`allow-has`|Enables the has command without any pre-configured scope.|
|
||||||
|
|`deny-has`|Denies the has command without any pre-configured scope.|
|
||||||
Enables the delete command without any pre-configured scope.
|
|`allow-keys`|Enables the keys command without any pre-configured scope.|
|
||||||
|
|`deny-keys`|Denies the keys command without any pre-configured scope.|
|
||||||
## deny-delete
|
|`allow-length`|Enables the length command without any pre-configured scope.|
|
||||||
|
|`deny-length`|Denies the length command without any pre-configured scope.|
|
||||||
Denies the delete command without any pre-configured scope.
|
|`allow-load`|Enables the load command without any pre-configured scope.|
|
||||||
|
|`deny-load`|Denies the load command without any pre-configured scope.|
|
||||||
## allow-entries
|
|`allow-reset`|Enables the reset command without any pre-configured scope.|
|
||||||
|
|`deny-reset`|Denies the reset command without any pre-configured scope.|
|
||||||
Enables the entries command without any pre-configured scope.
|
|`allow-save`|Enables the save command without any pre-configured scope.|
|
||||||
|
|`deny-save`|Denies the save command without any pre-configured scope.|
|
||||||
## deny-entries
|
|`allow-set`|Enables the set command without any pre-configured scope.|
|
||||||
|
|`deny-set`|Denies the set command without any pre-configured scope.|
|
||||||
Denies the entries command without any pre-configured scope.
|
|`allow-values`|Enables the values command without any pre-configured scope.|
|
||||||
|
|`deny-values`|Denies the values command without any pre-configured scope.|
|
||||||
## allow-get
|
|
||||||
|
|
||||||
Enables the get command without any pre-configured scope.
|
|
||||||
|
|
||||||
## deny-get
|
|
||||||
|
|
||||||
Denies the get command without any pre-configured scope.
|
|
||||||
|
|
||||||
## allow-has
|
|
||||||
|
|
||||||
Enables the has command without any pre-configured scope.
|
|
||||||
|
|
||||||
## deny-has
|
|
||||||
|
|
||||||
Denies the has command without any pre-configured scope.
|
|
||||||
|
|
||||||
## allow-keys
|
|
||||||
|
|
||||||
Enables the keys command without any pre-configured scope.
|
|
||||||
|
|
||||||
## deny-keys
|
|
||||||
|
|
||||||
Denies the keys command without any pre-configured scope.
|
|
||||||
|
|
||||||
## allow-length
|
|
||||||
|
|
||||||
Enables the length command without any pre-configured scope.
|
|
||||||
|
|
||||||
## deny-length
|
|
||||||
|
|
||||||
Denies the length command without any pre-configured scope.
|
|
||||||
|
|
||||||
## allow-load
|
|
||||||
|
|
||||||
Enables the load command without any pre-configured scope.
|
|
||||||
|
|
||||||
## deny-load
|
|
||||||
|
|
||||||
Denies the load command without any pre-configured scope.
|
|
||||||
|
|
||||||
## allow-reset
|
|
||||||
|
|
||||||
Enables the reset command without any pre-configured scope.
|
|
||||||
|
|
||||||
## deny-reset
|
|
||||||
|
|
||||||
Denies the reset command without any pre-configured scope.
|
|
||||||
|
|
||||||
## allow-save
|
|
||||||
|
|
||||||
Enables the save command without any pre-configured scope.
|
|
||||||
|
|
||||||
## deny-save
|
|
||||||
|
|
||||||
Denies the save command without any pre-configured scope.
|
|
||||||
|
|
||||||
## allow-set
|
|
||||||
|
|
||||||
Enables the set command without any pre-configured scope.
|
|
||||||
|
|
||||||
## deny-set
|
|
||||||
|
|
||||||
Denies the set command without any pre-configured scope.
|
|
||||||
|
|
||||||
## allow-values
|
|
||||||
|
|
||||||
Enables the values command without any pre-configured scope.
|
|
||||||
|
|
||||||
## deny-values
|
|
||||||
|
|
||||||
Denies the values command without any pre-configured scope.
|
|
||||||
|
|
||||||
|
@ -0,0 +1,49 @@
|
|||||||
|
// Copyright 2019-2023 Tauri Programme within The Commons Conservancy
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
// SPDX-License-Identifier: MIT
|
||||||
|
|
||||||
|
use crate::Error;
|
||||||
|
use crate::Runtime;
|
||||||
|
use crate::Store;
|
||||||
|
use std::fs::create_dir_all;
|
||||||
|
use std::fs::read;
|
||||||
|
use std::fs::File;
|
||||||
|
use std::io::Write;
|
||||||
|
use tauri::Manager;
|
||||||
|
|
||||||
|
#[cfg(desktop)]
|
||||||
|
impl<R: Runtime> Store<R> {
|
||||||
|
pub fn save(&self) -> Result<(), Error> {
|
||||||
|
let app_dir = self
|
||||||
|
.app
|
||||||
|
.path()
|
||||||
|
.app_data_dir()
|
||||||
|
.expect("failed to resolve app dir");
|
||||||
|
let store_path = app_dir.join(&self.path);
|
||||||
|
|
||||||
|
create_dir_all(store_path.parent().expect("invalid store path"))?;
|
||||||
|
|
||||||
|
let bytes = (self.serialize)(&self.cache).map_err(Error::Serialize)?;
|
||||||
|
let mut f = File::create(&store_path)?;
|
||||||
|
f.write_all(&bytes)?;
|
||||||
|
|
||||||
|
Ok(())
|
||||||
|
}
|
||||||
|
|
||||||
|
/// Update the store from the on-disk state
|
||||||
|
pub fn load(&mut self) -> Result<(), Error> {
|
||||||
|
let app_dir = self
|
||||||
|
.app
|
||||||
|
.path()
|
||||||
|
.app_data_dir()
|
||||||
|
.expect("failed to resolve app dir");
|
||||||
|
let store_path = app_dir.join(&self.path);
|
||||||
|
|
||||||
|
let bytes = read(store_path)?;
|
||||||
|
|
||||||
|
self.cache
|
||||||
|
.extend((self.deserialize)(&bytes).map_err(Error::Deserialize)?);
|
||||||
|
|
||||||
|
Ok(())
|
||||||
|
}
|
||||||
|
}
|
@ -0,0 +1,53 @@
|
|||||||
|
// Copyright 2019-2023 Tauri Programme within The Commons Conservancy
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
// SPDX-License-Identifier: MIT
|
||||||
|
|
||||||
|
use tauri::Runtime;
|
||||||
|
|
||||||
|
use crate::error::Result;
|
||||||
|
use crate::Store;
|
||||||
|
use serde_json::Value;
|
||||||
|
use std::collections::HashMap;
|
||||||
|
|
||||||
|
#[derive(Debug, serde::Serialize, serde::Deserialize)]
|
||||||
|
#[serde(rename_all = "camelCase")]
|
||||||
|
pub struct LoadStore {
|
||||||
|
pub cache: HashMap<String, Value>,
|
||||||
|
}
|
||||||
|
|
||||||
|
#[derive(Debug, serde::Serialize, serde::Deserialize)]
|
||||||
|
#[serde(rename_all = "camelCase")]
|
||||||
|
pub struct SaveStore {
|
||||||
|
pub store: String,
|
||||||
|
pub cache: HashMap<String, Value>,
|
||||||
|
}
|
||||||
|
|
||||||
|
#[cfg(mobile)]
|
||||||
|
impl<R: Runtime> Store<R> {
|
||||||
|
pub fn save(&self) -> Result<()> {
|
||||||
|
self.mobile_plugin_handle
|
||||||
|
.as_ref()
|
||||||
|
.ok_or_else(|| crate::error::Error::MobilePluginHandleUnInitialized)?
|
||||||
|
.run_mobile_plugin(
|
||||||
|
"save",
|
||||||
|
SaveStore {
|
||||||
|
store: self.path.to_string_lossy().to_string(),
|
||||||
|
cache: self.cache.clone(),
|
||||||
|
},
|
||||||
|
)
|
||||||
|
.map_err(Into::into)
|
||||||
|
}
|
||||||
|
|
||||||
|
pub fn load(&mut self) -> Result<()> {
|
||||||
|
let result: Value = self
|
||||||
|
.mobile_plugin_handle
|
||||||
|
.as_ref()
|
||||||
|
.ok_or_else(|| crate::error::Error::MobilePluginHandleUnInitialized)?
|
||||||
|
.run_mobile_plugin("load", self.path.to_string_lossy().to_string())?;
|
||||||
|
|
||||||
|
let map = serde_json::from_value::<HashMap<String, Value>>(result)?;
|
||||||
|
self.cache.extend(map);
|
||||||
|
|
||||||
|
Ok(())
|
||||||
|
}
|
||||||
|
}
|
@ -0,0 +1,23 @@
|
|||||||
|
# Security Policy
|
||||||
|
|
||||||
|
**Do not report security vulnerabilities through public GitHub issues.**
|
||||||
|
|
||||||
|
**Please use the [Private Vulnerability Disclosure](https://docs.github.com/en/code-security/security-advisories/guidance-on-reporting-and-writing-information-about-vulnerabilities/privately-reporting-a-security-vulnerability#privately-reporting-a-security-vulnerability) feature of GitHub.**
|
||||||
|
|
||||||
|
Include as much of the following information:
|
||||||
|
|
||||||
|
- Type of issue (e.g. improper input parsing, privilege escalation, etc.)
|
||||||
|
- The location of the affected source code (tag/branch/commit or direct URL)
|
||||||
|
- Any special configuration required to reproduce the issue
|
||||||
|
- The distribution affected or used to help us with reproduction of the issue
|
||||||
|
- Step-by-step instructions to reproduce the issue
|
||||||
|
- Ideally a reproduction repository
|
||||||
|
- Impact of the issue, including how an attacker might exploit the issue
|
||||||
|
|
||||||
|
We prefer to receive reports in English.
|
||||||
|
|
||||||
|
## Contact
|
||||||
|
|
||||||
|
Please disclose a vulnerability or security relevant issue here: [https://github.com/tauri-apps/plugins-workspace/security/advisories/new](https://github.com/tauri-apps/plugins-workspace/security/advisories/new).
|
||||||
|
|
||||||
|
Alternatively, you can also contact us by email via [security@tauri.app](mailto:security@tauri.app).
|
@ -1,90 +1,24 @@
|
|||||||
# Permissions
|
| Permission | Description |
|
||||||
|
|------|-----|
|
||||||
## allow-create-client
|
|`allow-create-client`|Enables the create_client command without any pre-configured scope.|
|
||||||
|
|`deny-create-client`|Denies the create_client command without any pre-configured scope.|
|
||||||
Enables the create_client command without any pre-configured scope.
|
|`allow-destroy`|Enables the destroy command without any pre-configured scope.|
|
||||||
|
|`deny-destroy`|Denies the destroy command without any pre-configured scope.|
|
||||||
## deny-create-client
|
|`allow-execute-procedure`|Enables the execute_procedure command without any pre-configured scope.|
|
||||||
|
|`deny-execute-procedure`|Denies the execute_procedure command without any pre-configured scope.|
|
||||||
Denies the create_client command without any pre-configured scope.
|
|`allow-get-store-record`|Enables the get_store_record command without any pre-configured scope.|
|
||||||
|
|`deny-get-store-record`|Denies the get_store_record command without any pre-configured scope.|
|
||||||
## allow-destroy
|
|`allow-initialize`|Enables the initialize command without any pre-configured scope.|
|
||||||
|
|`deny-initialize`|Denies the initialize command without any pre-configured scope.|
|
||||||
Enables the destroy command without any pre-configured scope.
|
|`allow-load-client`|Enables the load_client command without any pre-configured scope.|
|
||||||
|
|`deny-load-client`|Denies the load_client command without any pre-configured scope.|
|
||||||
## deny-destroy
|
|`allow-remove-secret`|Enables the remove_secret command without any pre-configured scope.|
|
||||||
|
|`deny-remove-secret`|Denies the remove_secret command without any pre-configured scope.|
|
||||||
Denies the destroy command without any pre-configured scope.
|
|`allow-remove-store-record`|Enables the remove_store_record command without any pre-configured scope.|
|
||||||
|
|`deny-remove-store-record`|Denies the remove_store_record command without any pre-configured scope.|
|
||||||
## allow-execute-procedure
|
|`allow-save`|Enables the save command without any pre-configured scope.|
|
||||||
|
|`deny-save`|Denies the save command without any pre-configured scope.|
|
||||||
Enables the execute_procedure command without any pre-configured scope.
|
|`allow-save-secret`|Enables the save_secret command without any pre-configured scope.|
|
||||||
|
|`deny-save-secret`|Denies the save_secret command without any pre-configured scope.|
|
||||||
## deny-execute-procedure
|
|`allow-save-store-record`|Enables the save_store_record command without any pre-configured scope.|
|
||||||
|
|`deny-save-store-record`|Denies the save_store_record command without any pre-configured scope.|
|
||||||
Denies the execute_procedure command without any pre-configured scope.
|
|
||||||
|
|
||||||
## allow-get-store-record
|
|
||||||
|
|
||||||
Enables the get_store_record command without any pre-configured scope.
|
|
||||||
|
|
||||||
## deny-get-store-record
|
|
||||||
|
|
||||||
Denies the get_store_record command without any pre-configured scope.
|
|
||||||
|
|
||||||
## allow-initialize
|
|
||||||
|
|
||||||
Enables the initialize command without any pre-configured scope.
|
|
||||||
|
|
||||||
## deny-initialize
|
|
||||||
|
|
||||||
Denies the initialize command without any pre-configured scope.
|
|
||||||
|
|
||||||
## allow-load-client
|
|
||||||
|
|
||||||
Enables the load_client command without any pre-configured scope.
|
|
||||||
|
|
||||||
## deny-load-client
|
|
||||||
|
|
||||||
Denies the load_client command without any pre-configured scope.
|
|
||||||
|
|
||||||
## allow-remove-secret
|
|
||||||
|
|
||||||
Enables the remove_secret command without any pre-configured scope.
|
|
||||||
|
|
||||||
## deny-remove-secret
|
|
||||||
|
|
||||||
Denies the remove_secret command without any pre-configured scope.
|
|
||||||
|
|
||||||
## allow-remove-store-record
|
|
||||||
|
|
||||||
Enables the remove_store_record command without any pre-configured scope.
|
|
||||||
|
|
||||||
## deny-remove-store-record
|
|
||||||
|
|
||||||
Denies the remove_store_record command without any pre-configured scope.
|
|
||||||
|
|
||||||
## allow-save
|
|
||||||
|
|
||||||
Enables the save command without any pre-configured scope.
|
|
||||||
|
|
||||||
## deny-save
|
|
||||||
|
|
||||||
Denies the save command without any pre-configured scope.
|
|
||||||
|
|
||||||
## allow-save-secret
|
|
||||||
|
|
||||||
Enables the save_secret command without any pre-configured scope.
|
|
||||||
|
|
||||||
## deny-save-secret
|
|
||||||
|
|
||||||
Denies the save_secret command without any pre-configured scope.
|
|
||||||
|
|
||||||
## allow-save-store-record
|
|
||||||
|
|
||||||
Enables the save_store_record command without any pre-configured scope.
|
|
||||||
|
|
||||||
## deny-save-store-record
|
|
||||||
|
|
||||||
Denies the save_store_record command without any pre-configured scope.
|
|
||||||
|
|
||||||
|
@ -0,0 +1,23 @@
|
|||||||
|
# Security Policy
|
||||||
|
|
||||||
|
**Do not report security vulnerabilities through public GitHub issues.**
|
||||||
|
|
||||||
|
**Please use the [Private Vulnerability Disclosure](https://docs.github.com/en/code-security/security-advisories/guidance-on-reporting-and-writing-information-about-vulnerabilities/privately-reporting-a-security-vulnerability#privately-reporting-a-security-vulnerability) feature of GitHub.**
|
||||||
|
|
||||||
|
Include as much of the following information:
|
||||||
|
|
||||||
|
- Type of issue (e.g. improper input parsing, privilege escalation, etc.)
|
||||||
|
- The location of the affected source code (tag/branch/commit or direct URL)
|
||||||
|
- Any special configuration required to reproduce the issue
|
||||||
|
- The distribution affected or used to help us with reproduction of the issue
|
||||||
|
- Step-by-step instructions to reproduce the issue
|
||||||
|
- Ideally a reproduction repository
|
||||||
|
- Impact of the issue, including how an attacker might exploit the issue
|
||||||
|
|
||||||
|
We prefer to receive reports in English.
|
||||||
|
|
||||||
|
## Contact
|
||||||
|
|
||||||
|
Please disclose a vulnerability or security relevant issue here: [https://github.com/tauri-apps/plugins-workspace/security/advisories/new](https://github.com/tauri-apps/plugins-workspace/security/advisories/new).
|
||||||
|
|
||||||
|
Alternatively, you can also contact us by email via [security@tauri.app](mailto:security@tauri.app).
|
@ -1,22 +1,7 @@
|
|||||||
# Permissions
|
| Permission | Description |
|
||||||
|
|------|-----|
|
||||||
## allow-check
|
|`allow-check`|Enables the check command without any pre-configured scope.|
|
||||||
|
|`deny-check`|Denies the check command without any pre-configured scope.|
|
||||||
Enables the check command without any pre-configured scope.
|
|`allow-download-and-install`|Enables the download_and_install command without any pre-configured scope.|
|
||||||
|
|`deny-download-and-install`|Denies the download_and_install command without any pre-configured scope.|
|
||||||
## deny-check
|
|`default`|Allows checking for new updates and installing them|
|
||||||
|
|
||||||
Denies the check command without any pre-configured scope.
|
|
||||||
|
|
||||||
## allow-download-and-install
|
|
||||||
|
|
||||||
Enables the download_and_install command without any pre-configured scope.
|
|
||||||
|
|
||||||
## deny-download-and-install
|
|
||||||
|
|
||||||
Denies the download_and_install command without any pre-configured scope.
|
|
||||||
|
|
||||||
## default
|
|
||||||
|
|
||||||
Allows checking for new updates and installing them
|
|
||||||
|
|
||||||
|
@ -0,0 +1,23 @@
|
|||||||
|
# Security Policy
|
||||||
|
|
||||||
|
**Do not report security vulnerabilities through public GitHub issues.**
|
||||||
|
|
||||||
|
**Please use the [Private Vulnerability Disclosure](https://docs.github.com/en/code-security/security-advisories/guidance-on-reporting-and-writing-information-about-vulnerabilities/privately-reporting-a-security-vulnerability#privately-reporting-a-security-vulnerability) feature of GitHub.**
|
||||||
|
|
||||||
|
Include as much of the following information:
|
||||||
|
|
||||||
|
- Type of issue (e.g. improper input parsing, privilege escalation, etc.)
|
||||||
|
- The location of the affected source code (tag/branch/commit or direct URL)
|
||||||
|
- Any special configuration required to reproduce the issue
|
||||||
|
- The distribution affected or used to help us with reproduction of the issue
|
||||||
|
- Step-by-step instructions to reproduce the issue
|
||||||
|
- Ideally a reproduction repository
|
||||||
|
- Impact of the issue, including how an attacker might exploit the issue
|
||||||
|
|
||||||
|
We prefer to receive reports in English.
|
||||||
|
|
||||||
|
## Contact
|
||||||
|
|
||||||
|
Please disclose a vulnerability or security relevant issue here: [https://github.com/tauri-apps/plugins-workspace/security/advisories/new](https://github.com/tauri-apps/plugins-workspace/security/advisories/new).
|
||||||
|
|
||||||
|
Alternatively, you can also contact us by email via [security@tauri.app](mailto:security@tauri.app).
|
@ -1,18 +1,6 @@
|
|||||||
# Permissions
|
| Permission | Description |
|
||||||
|
|------|-----|
|
||||||
## allow-download
|
|`allow-download`|Enables the download command without any pre-configured scope.|
|
||||||
|
|`deny-download`|Denies the download command without any pre-configured scope.|
|
||||||
Enables the download command without any pre-configured scope.
|
|`allow-upload`|Enables the upload command without any pre-configured scope.|
|
||||||
|
|`deny-upload`|Denies the upload command without any pre-configured scope.|
|
||||||
## deny-download
|
|
||||||
|
|
||||||
Denies the download command without any pre-configured scope.
|
|
||||||
|
|
||||||
## allow-upload
|
|
||||||
|
|
||||||
Enables the upload command without any pre-configured scope.
|
|
||||||
|
|
||||||
## deny-upload
|
|
||||||
|
|
||||||
Denies the upload command without any pre-configured scope.
|
|
||||||
|
|
||||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
Reference in new issue