diff --git a/Cargo.lock b/Cargo.lock index fc207054..2d2ad53c 100644 --- a/Cargo.lock +++ b/Cargo.lock @@ -6565,7 +6565,9 @@ dependencies = [ "serde_repr", "tauri", "tauri-plugin", + "tauri-utils", "thiserror 2.0.3", + "toml 0.8.19", "url", "uuid", ] diff --git a/plugins/fs/build.rs b/plugins/fs/build.rs index ffed25d0..e45af528 100644 --- a/plugins/fs/build.rs +++ b/plugins/fs/build.rs @@ -228,7 +228,11 @@ permissions = [ let mut permission_file = toml::from_str::(&content) .unwrap_or_else(|_| panic!("failed to deserialize {command}.toml")); - for p in permission_file.permission.iter_mut() { + for p in permission_file + .permission + .iter_mut() + .filter(|p| p.identifier.starts_with("allow")) + { p.commands .allow .extend(nested_commands.iter().map(|s| s.to_string())); diff --git a/plugins/fs/permissions/autogenerated/commands/read_text_file_lines.toml b/plugins/fs/permissions/autogenerated/commands/read_text_file_lines.toml index 86f35818..84b4ebb2 100644 --- a/plugins/fs/permissions/autogenerated/commands/read_text_file_lines.toml +++ b/plugins/fs/permissions/autogenerated/commands/read_text_file_lines.toml @@ -18,5 +18,5 @@ identifier = "deny-read-text-file-lines" description = "Denies the read_text_file_lines command without any pre-configured scope." [permission.commands] -allow = ["read_text_file_lines_next"] +allow = [] deny = ["read_text_file_lines"] diff --git a/plugins/fs/permissions/autogenerated/commands/write_file.toml b/plugins/fs/permissions/autogenerated/commands/write_file.toml index 258eeb97..ea7d5136 100644 --- a/plugins/fs/permissions/autogenerated/commands/write_file.toml +++ b/plugins/fs/permissions/autogenerated/commands/write_file.toml @@ -19,8 +19,5 @@ identifier = "deny-write-file" description = "Denies the write_file command without any pre-configured scope." [permission.commands] -allow = [ - "open", - "write", -] +allow = [] deny = ["write_file"]