Lucas Fernandes Nogueira
|
f284f9c545
|
refactor: configure URLs instead of domains on capability remote (#8898)
|
2024-02-19 11:14:09 -03:00 |
|
Lucas Fernandes Nogueira
|
0cb0a15ce2
|
feat(core): capabilities on multiwebview contexts (#8789)
* feat(core): capabilities on multiwebview contexts
* fix cli
* lint
* sort
|
2024-02-16 08:24:51 -03:00 |
|
Lucas Fernandes Nogueira
|
a35b416e38
|
refactor(core): merge scope and commands resolving permission sets (#8731)
|
2024-02-02 09:18:59 -03:00 |
|
Lucas Fernandes Nogueira
|
fd4bf94d4c
|
refactor(acl): allow extending scope on the capability file (#8674)
|
2024-01-24 23:36:07 -03:00 |
|
Lucas Fernandes Nogueira
|
30a64a9cda
|
refactor: global scope error handling, fix usage with multiple plugins (#8669)
* refactor: global scope error handling, fix usage with multiple plugins
* lint
|
2024-01-24 20:57:46 -03:00 |
|
tweidinger
|
3c2f79f6f3
|
Tauri ACL/Allowlist v2 Implementation and Plugin System Refactor (#8428)
* tauri-plugin concept
* wip
* move command module to its own directory
* wip: new command traits and generated code
* wip: whip
* wip: static dispatch
there is a man standing behind me
* wip
* re-add authority
* fix build [skip ci]
* parse plugin permissions
* merge permission files [skip ci]
* parse capabilities [skip ci]
* resolve acl (untested) [skip ci]
* split functionality, add some docs
* remove command2 stuff
* actually check runtime authority
* small fixes [skip ci]
* add function to auto generate basic permission for a command [skip ci]
* retrieve command scope, implement CommandArg [skip ci]
* fix tests [skip ci]
* global scope
* lint
* license headers [skip ci]
* skip canonicalize
* separate scope type in example
* remove inlinedpermission struct [skip ci]
* permission file schema
* capabilities schema
* move items from tauri-plugin to tauri-utils
this allows tauri-plugin to depend on tauri directly again
which will be used by the runtime feature as a superset to
existing plugin traits
* enable schema and glob [skip ci]
* fix glob [skip ci]
* fix capability schema [skip ci]
* enhance schema for permission set possible values [skip ci]
* permission set can reference other sets [skip ci]
* setup tests for resolving ACL
* fixture for permission set [skip ci]
* remote context test and small fix[skip ci]
* ignore empty scope [skip ci]
* code review [skip ci]
* lint [skip ci]
* runtime fixes
* readd schema feature on tauri-config-schema [skip ci]
* remove plugin example from workspace, it breaks workspace features resolution [skip ci]
* scope as array, add test [skip ci]
* accept new shapshot [skip ci]
* core plugin permissions, default is now a set
* license headers
* fix on windows
* update global api
* glob is no longer optional on tauri-utils
* add missing permissions on api example [skip ci]
* remove ipc scope and dangerous remote access config
* lint
* fix asset scope usage
* create out dir [skip ci]
* reuse cargo_pkg_name [skip ci]
* capability window glob pattern [skip ci]
* add platforms for capability [skip ci]
* per platform schema [skip ci]
* lint [skip ci]
* rename allowlist build mod [skip ci]
* check restricted visibility
* simplify capability target [skip ci]
* hide codegen build behind tauri-build::try_run
* optimize build scripts [skip ci]
* fix tests
* tests for RuntimeAuthority::resolve_access
* remote domain glob pattern
* lint
---------
Co-authored-by: Chip Reed <chip@chip.sh>
Co-authored-by: Lucas Nogueira <lucas@tauri.app>
Co-authored-by: Lucas Nogueira <lucas@crabnebula.dev>
Co-authored-by: Lucas Nogueira <lucas@tauri.studio>
|
2024-01-22 21:24:15 -03:00 |
|