Skip to content

Commit 93bcfce

Browse files
committed
fix(deep-link): revert the breaking change introduced by tauri-apps#2928
1 parent 9021a73 commit 93bcfce

File tree

23 files changed

+58
-58
lines changed

23 files changed

+58
-58
lines changed

.changes/fix-deep-link-semver.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
---
2+
deep-link: patch
3+
deep-link-js: patch
4+
---
5+
6+
Reverts the breaking change introduced by [#2928](https://github.com/tauri-apps/plugins-workspace/pull/2928).

plugins/autostart/permissions/schemas/schema.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -331,10 +331,10 @@
331331
"markdownDescription": "Denies the is_enabled command without any pre-configured scope."
332332
},
333333
{
334-
"description": "This permission set configures if your\napplication can enable or disable auto\nstarting the application on boot.\n\n#### Granted Permissions\n\nIt allows all to check, enable and\ndisable the automatic start on boot.\n\n\n#### This default permission set includes:\n\n- `allow-enable`\n- `allow-disable`\n- `allow-is-enabled`",
334+
"description": "This permission set configures if your\r\napplication can enable or disable auto\r\nstarting the application on boot.\r\n\r\n#### Granted Permissions\r\n\r\nIt allows all to check, enable and\r\ndisable the automatic start on boot.\r\n\r\n\n#### This default permission set includes:\n\n- `allow-enable`\n- `allow-disable`\n- `allow-is-enabled`",
335335
"type": "string",
336336
"const": "default",
337-
"markdownDescription": "This permission set configures if your\napplication can enable or disable auto\nstarting the application on boot.\n\n#### Granted Permissions\n\nIt allows all to check, enable and\ndisable the automatic start on boot.\n\n\n#### This default permission set includes:\n\n- `allow-enable`\n- `allow-disable`\n- `allow-is-enabled`"
337+
"markdownDescription": "This permission set configures if your\r\napplication can enable or disable auto\r\nstarting the application on boot.\r\n\r\n#### Granted Permissions\r\n\r\nIt allows all to check, enable and\r\ndisable the automatic start on boot.\r\n\r\n\n#### This default permission set includes:\n\n- `allow-enable`\n- `allow-disable`\n- `allow-is-enabled`"
338338
}
339339
]
340340
}

plugins/barcode-scanner/permissions/schemas/schema.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -367,10 +367,10 @@
367367
"markdownDescription": "Denies the vibrate command without any pre-configured scope."
368368
},
369369
{
370-
"description": "This permission set configures which\nbarcode scanning features are by default exposed.\n\n#### Granted Permissions\n\nIt allows all barcode related features.\n\n\n#### This default permission set includes:\n\n- `allow-cancel`\n- `allow-check-permissions`\n- `allow-open-app-settings`\n- `allow-request-permissions`\n- `allow-scan`\n- `allow-vibrate`",
370+
"description": "This permission set configures which\r\nbarcode scanning features are by default exposed.\r\n\r\n#### Granted Permissions\r\n\r\nIt allows all barcode related features.\r\n\r\n\n#### This default permission set includes:\n\n- `allow-cancel`\n- `allow-check-permissions`\n- `allow-open-app-settings`\n- `allow-request-permissions`\n- `allow-scan`\n- `allow-vibrate`",
371371
"type": "string",
372372
"const": "default",
373-
"markdownDescription": "This permission set configures which\nbarcode scanning features are by default exposed.\n\n#### Granted Permissions\n\nIt allows all barcode related features.\n\n\n#### This default permission set includes:\n\n- `allow-cancel`\n- `allow-check-permissions`\n- `allow-open-app-settings`\n- `allow-request-permissions`\n- `allow-scan`\n- `allow-vibrate`"
373+
"markdownDescription": "This permission set configures which\r\nbarcode scanning features are by default exposed.\r\n\r\n#### Granted Permissions\r\n\r\nIt allows all barcode related features.\r\n\r\n\n#### This default permission set includes:\n\n- `allow-cancel`\n- `allow-check-permissions`\n- `allow-open-app-settings`\n- `allow-request-permissions`\n- `allow-scan`\n- `allow-vibrate`"
374374
}
375375
]
376376
}

plugins/biometric/permissions/schemas/schema.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -319,10 +319,10 @@
319319
"markdownDescription": "Denies the status command without any pre-configured scope."
320320
},
321321
{
322-
"description": "This permission set configures which\nbiometric features are by default exposed.\n\n#### Granted Permissions\n\nIt allows acccess to all biometric commands.\n\n\n#### This default permission set includes:\n\n- `allow-authenticate`\n- `allow-status`",
322+
"description": "This permission set configures which\r\nbiometric features are by default exposed.\r\n\r\n#### Granted Permissions\r\n\r\nIt allows acccess to all biometric commands.\r\n\r\n\n#### This default permission set includes:\n\n- `allow-authenticate`\n- `allow-status`",
323323
"type": "string",
324324
"const": "default",
325-
"markdownDescription": "This permission set configures which\nbiometric features are by default exposed.\n\n#### Granted Permissions\n\nIt allows acccess to all biometric commands.\n\n\n#### This default permission set includes:\n\n- `allow-authenticate`\n- `allow-status`"
325+
"markdownDescription": "This permission set configures which\r\nbiometric features are by default exposed.\r\n\r\n#### Granted Permissions\r\n\r\nIt allows acccess to all biometric commands.\r\n\r\n\n#### This default permission set includes:\n\n- `allow-authenticate`\n- `allow-status`"
326326
}
327327
]
328328
}

plugins/clipboard-manager/permissions/schemas/schema.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -367,10 +367,10 @@
367367
"markdownDescription": "Denies the write_text command without any pre-configured scope."
368368
},
369369
{
370-
"description": "No features are enabled by default, as we believe\nthe clipboard can be inherently dangerous and it is \napplication specific if read and/or write access is needed.\n\nClipboard interaction needs to be explicitly enabled.\n",
370+
"description": "No features are enabled by default, as we believe\r\nthe clipboard can be inherently dangerous and it is \r\napplication specific if read and/or write access is needed.\r\n\r\nClipboard interaction needs to be explicitly enabled.\r\n",
371371
"type": "string",
372372
"const": "default",
373-
"markdownDescription": "No features are enabled by default, as we believe\nthe clipboard can be inherently dangerous and it is \napplication specific if read and/or write access is needed.\n\nClipboard interaction needs to be explicitly enabled.\n"
373+
"markdownDescription": "No features are enabled by default, as we believe\r\nthe clipboard can be inherently dangerous and it is \r\napplication specific if read and/or write access is needed.\r\n\r\nClipboard interaction needs to be explicitly enabled.\r\n"
374374
}
375375
]
376376
}

plugins/deep-link/src/error.rs

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ pub type Result<T> = std::result::Result<T, Error>;
1010
pub enum Error {
1111
#[error("unsupported platform")]
1212
UnsupportedPlatform,
13-
#[error(transparent)]
13+
#[error("Failed to run `xdg-mime` or`update-desktop-database` command: {0}")]
1414
Io(#[from] std::io::Error),
1515
#[error(transparent)]
1616
Tauri(#[from] tauri::Error),
@@ -23,9 +23,6 @@ pub enum Error {
2323
#[cfg(target_os = "linux")]
2424
#[error(transparent)]
2525
ParseIni(#[from] ini::ParseError),
26-
#[cfg(target_os = "linux")]
27-
#[error("Failed to run OS command `{0}`: {1}")]
28-
Execute(&'static str, #[source] std::io::Error),
2926
#[cfg(mobile)]
3027
#[error(transparent)]
3128
PluginInvoke(#[from] tauri::plugin::mobile::PluginInvokeError),

plugins/deep-link/src/lib.rs

Lines changed: 3 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -333,13 +333,11 @@ mod imp {
333333

334334
Command::new("update-desktop-database")
335335
.arg(target)
336-
.status()
337-
.map_err(|error| crate::Error::Execute("update-desktop-database", error))?;
336+
.status()?;
338337

339338
Command::new("xdg-mime")
340339
.args(["default", &file_name, mime_type.as_str()])
341-
.status()
342-
.map_err(|error| crate::Error::Execute("xdg-mime", error))?;
340+
.status()?;
343341

344342
Ok(())
345343
}
@@ -443,8 +441,7 @@ mod imp {
443441
"default",
444442
&format!("x-scheme-handler/{}", _protocol.as_ref()),
445443
])
446-
.output()
447-
.map_err(|error| crate::Error::Execute("xdg-mime", error))?;
444+
.output()?;
448445

449446
Ok(String::from_utf8_lossy(&output.stdout).contains(&file_name))
450447
}

plugins/dialog/permissions/schemas/schema.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -355,10 +355,10 @@
355355
"markdownDescription": "Denies the save command without any pre-configured scope."
356356
},
357357
{
358-
"description": "This permission set configures the types of dialogs\navailable from the dialog plugin.\n\n#### Granted Permissions\n\nAll dialog types are enabled.\n\n\n\n#### This default permission set includes:\n\n- `allow-ask`\n- `allow-confirm`\n- `allow-message`\n- `allow-save`\n- `allow-open`",
358+
"description": "This permission set configures the types of dialogs\r\navailable from the dialog plugin.\r\n\r\n#### Granted Permissions\r\n\r\nAll dialog types are enabled.\r\n\r\n\r\n\n#### This default permission set includes:\n\n- `allow-ask`\n- `allow-confirm`\n- `allow-message`\n- `allow-save`\n- `allow-open`",
359359
"type": "string",
360360
"const": "default",
361-
"markdownDescription": "This permission set configures the types of dialogs\navailable from the dialog plugin.\n\n#### Granted Permissions\n\nAll dialog types are enabled.\n\n\n\n#### This default permission set includes:\n\n- `allow-ask`\n- `allow-confirm`\n- `allow-message`\n- `allow-save`\n- `allow-open`"
361+
"markdownDescription": "This permission set configures the types of dialogs\r\navailable from the dialog plugin.\r\n\r\n#### Granted Permissions\r\n\r\nAll dialog types are enabled.\r\n\r\n\r\n\n#### This default permission set includes:\n\n- `allow-ask`\n- `allow-confirm`\n- `allow-message`\n- `allow-save`\n- `allow-open`"
362362
}
363363
]
364364
}

plugins/fs/permissions/schemas/schema.json

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1945,16 +1945,16 @@
19451945
"markdownDescription": "Denies the write_text_file command without any pre-configured scope."
19461946
},
19471947
{
1948-
"description": "This permissions allows to create the application specific directories.\n",
1948+
"description": "This permissions allows to create the application specific directories.\r\n",
19491949
"type": "string",
19501950
"const": "create-app-specific-dirs",
1951-
"markdownDescription": "This permissions allows to create the application specific directories.\n"
1951+
"markdownDescription": "This permissions allows to create the application specific directories.\r\n"
19521952
},
19531953
{
1954-
"description": "This set of permissions describes the what kind of\nfile system access the `fs` plugin has enabled or denied by default.\n\n#### Granted Permissions\n\nThis default permission set enables read access to the\napplication specific directories (AppConfig, AppData, AppLocalData, AppCache,\nAppLog) and all files and sub directories created in it.\nThe location of these directories depends on the operating system,\nwhere the application is run.\n\nIn general these directories need to be manually created\nby the application at runtime, before accessing files or folders\nin it is possible.\n\nTherefore, it is also allowed to create all of these folders via\nthe `mkdir` command.\n\n#### Denied Permissions\n\nThis default permission set prevents access to critical components\nof the Tauri application by default.\nOn Windows the webview data folder access is denied.\n\n#### This default permission set includes:\n\n- `create-app-specific-dirs`\n- `read-app-specific-dirs-recursive`\n- `deny-default`",
1954+
"description": "This set of permissions describes the what kind of\r\nfile system access the `fs` plugin has enabled or denied by default.\r\n\r\n#### Granted Permissions\r\n\r\nThis default permission set enables read access to the\r\napplication specific directories (AppConfig, AppData, AppLocalData, AppCache,\r\nAppLog) and all files and sub directories created in it.\r\nThe location of these directories depends on the operating system,\r\nwhere the application is run.\r\n\r\nIn general these directories need to be manually created\r\nby the application at runtime, before accessing files or folders\r\nin it is possible.\r\n\r\nTherefore, it is also allowed to create all of these folders via\r\nthe `mkdir` command.\r\n\r\n#### Denied Permissions\r\n\r\nThis default permission set prevents access to critical components\r\nof the Tauri application by default.\r\nOn Windows the webview data folder access is denied.\r\n\n#### This default permission set includes:\n\n- `create-app-specific-dirs`\n- `read-app-specific-dirs-recursive`\n- `deny-default`",
19551955
"type": "string",
19561956
"const": "default",
1957-
"markdownDescription": "This set of permissions describes the what kind of\nfile system access the `fs` plugin has enabled or denied by default.\n\n#### Granted Permissions\n\nThis default permission set enables read access to the\napplication specific directories (AppConfig, AppData, AppLocalData, AppCache,\nAppLog) and all files and sub directories created in it.\nThe location of these directories depends on the operating system,\nwhere the application is run.\n\nIn general these directories need to be manually created\nby the application at runtime, before accessing files or folders\nin it is possible.\n\nTherefore, it is also allowed to create all of these folders via\nthe `mkdir` command.\n\n#### Denied Permissions\n\nThis default permission set prevents access to critical components\nof the Tauri application by default.\nOn Windows the webview data folder access is denied.\n\n#### This default permission set includes:\n\n- `create-app-specific-dirs`\n- `read-app-specific-dirs-recursive`\n- `deny-default`"
1957+
"markdownDescription": "This set of permissions describes the what kind of\r\nfile system access the `fs` plugin has enabled or denied by default.\r\n\r\n#### Granted Permissions\r\n\r\nThis default permission set enables read access to the\r\napplication specific directories (AppConfig, AppData, AppLocalData, AppCache,\r\nAppLog) and all files and sub directories created in it.\r\nThe location of these directories depends on the operating system,\r\nwhere the application is run.\r\n\r\nIn general these directories need to be manually created\r\nby the application at runtime, before accessing files or folders\r\nin it is possible.\r\n\r\nTherefore, it is also allowed to create all of these folders via\r\nthe `mkdir` command.\r\n\r\n#### Denied Permissions\r\n\r\nThis default permission set prevents access to critical components\r\nof the Tauri application by default.\r\nOn Windows the webview data folder access is denied.\r\n\n#### This default permission set includes:\n\n- `create-app-specific-dirs`\n- `read-app-specific-dirs-recursive`\n- `deny-default`"
19581958
},
19591959
{
19601960
"description": "This denies access to dangerous Tauri relevant files and folders by default.\n#### This permission set includes:\n\n- `deny-webview-data-linux`\n- `deny-webview-data-windows`",
@@ -1963,16 +1963,16 @@
19631963
"markdownDescription": "This denies access to dangerous Tauri relevant files and folders by default.\n#### This permission set includes:\n\n- `deny-webview-data-linux`\n- `deny-webview-data-windows`"
19641964
},
19651965
{
1966-
"description": "This denies read access to the\n`$APPLOCALDATA` folder on linux as the webview data and configuration values are stored here.\nAllowing access can lead to sensitive information disclosure and should be well considered.",
1966+
"description": "This denies read access to the\r\n`$APPLOCALDATA` folder on linux as the webview data and configuration values are stored here.\r\nAllowing access can lead to sensitive information disclosure and should be well considered.",
19671967
"type": "string",
19681968
"const": "deny-webview-data-linux",
1969-
"markdownDescription": "This denies read access to the\n`$APPLOCALDATA` folder on linux as the webview data and configuration values are stored here.\nAllowing access can lead to sensitive information disclosure and should be well considered."
1969+
"markdownDescription": "This denies read access to the\r\n`$APPLOCALDATA` folder on linux as the webview data and configuration values are stored here.\r\nAllowing access can lead to sensitive information disclosure and should be well considered."
19701970
},
19711971
{
1972-
"description": "This denies read access to the\n`$APPLOCALDATA/EBWebView` folder on windows as the webview data and configuration values are stored here.\nAllowing access can lead to sensitive information disclosure and should be well considered.",
1972+
"description": "This denies read access to the\r\n`$APPLOCALDATA/EBWebView` folder on windows as the webview data and configuration values are stored here.\r\nAllowing access can lead to sensitive information disclosure and should be well considered.",
19731973
"type": "string",
19741974
"const": "deny-webview-data-windows",
1975-
"markdownDescription": "This denies read access to the\n`$APPLOCALDATA/EBWebView` folder on windows as the webview data and configuration values are stored here.\nAllowing access can lead to sensitive information disclosure and should be well considered."
1975+
"markdownDescription": "This denies read access to the\r\n`$APPLOCALDATA/EBWebView` folder on windows as the webview data and configuration values are stored here.\r\nAllowing access can lead to sensitive information disclosure and should be well considered."
19761976
},
19771977
{
19781978
"description": "This enables all read related commands without any pre-configured accessible paths.",
@@ -1981,10 +1981,10 @@
19811981
"markdownDescription": "This enables all read related commands without any pre-configured accessible paths."
19821982
},
19831983
{
1984-
"description": "This permission allows recursive read functionality on the application\nspecific base directories. \n",
1984+
"description": "This permission allows recursive read functionality on the application\r\nspecific base directories. \r\n",
19851985
"type": "string",
19861986
"const": "read-app-specific-dirs-recursive",
1987-
"markdownDescription": "This permission allows recursive read functionality on the application\nspecific base directories. \n"
1987+
"markdownDescription": "This permission allows recursive read functionality on the application\r\nspecific base directories. \r\n"
19881988
},
19891989
{
19901990
"description": "This enables directory read and file metadata related commands without any pre-configured accessible paths.",

plugins/global-shortcut/permissions/schemas/schema.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -355,10 +355,10 @@
355355
"markdownDescription": "Denies the unregister_all command without any pre-configured scope."
356356
},
357357
{
358-
"description": "No features are enabled by default, as we believe\nthe shortcuts can be inherently dangerous and it is\napplication specific if specific shortcuts should be\nregistered or unregistered.\n",
358+
"description": "No features are enabled by default, as we believe\r\nthe shortcuts can be inherently dangerous and it is\r\napplication specific if specific shortcuts should be\r\nregistered or unregistered.\r\n",
359359
"type": "string",
360360
"const": "default",
361-
"markdownDescription": "No features are enabled by default, as we believe\nthe shortcuts can be inherently dangerous and it is\napplication specific if specific shortcuts should be\nregistered or unregistered.\n"
361+
"markdownDescription": "No features are enabled by default, as we believe\r\nthe shortcuts can be inherently dangerous and it is\r\napplication specific if specific shortcuts should be\r\nregistered or unregistered.\r\n"
362362
}
363363
]
364364
}

0 commit comments

Comments
 (0)