Skip to content

Commit ddd8d2e

Browse files
authored
Merge branch 'main' into dependabot/cargo/rusty_vault-0.2.1
2 parents cf0a22d + ebf50c0 commit ddd8d2e

File tree

104 files changed

+123
-88
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

104 files changed

+123
-88
lines changed

.github/ISSUE_TEMPLATE/r2cn.md

+32

.gitmodules

-4
This file was deleted.

Cargo.toml

+1-4
Original file line numberDiff line numberDiff line change
@@ -9,11 +9,9 @@ members = [
99
"ceres",
1010
"libra",
1111
"vault",
12-
"neptune",
1312
"aries",
1413
"saturn",
1514
"taurus",
16-
"lunar/src-tauri",
1715
"atlas",
1816
"orion",
1917
"panel",
@@ -30,7 +28,6 @@ ceres = { path = "ceres" }
3028
callisto = { path = "jupiter/callisto" }
3129
gemini = { path = "gemini" }
3230
vault = { path = "vault" }
33-
neptune = { path = "neptune" }
3431
saturn = { path = "saturn" }
3532
taurus = { path = "taurus" }
3633
mega = { path = "mega" }
@@ -92,4 +89,4 @@ base64 = "0.22.1"
9289
encoding_rs = "0.8.31"
9390

9491
[profile.release]
95-
debug = true
92+
debug = true
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.

lunar/src-tauri/gen/schemas/desktop-schema.json archived/lunar/src-tauri/gen/schemas/desktop-schema.json

+2-2
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@
3737
],
3838
"definitions": {
3939
"Capability": {
40-
"description": "A grouping and boundary mechanism developers can use to isolate access to the IPC layer.\n\nIt controls application windows fine grained access to the Tauri core, application, or plugin commands. If a window is not matching any capability then it has no access to the IPC layer at all.\n\nThis can be done to create groups of windows, based on their required system access, which can reduce impact of frontend vulnerabilities in less privileged windows. Windows can be added to a capability by exact name (e.g. `main-window`) or glob patterns like `*` or `admin-*`. A Window can have none, one, or multiple associated capabilities.\n\n## Example\n\n```json { \"identifier\": \"main-user-files-write\", \"description\": \"This capability allows the `main` window on macOS and Windows access to `filesystem` write related commands and `dialog` commands to enable programatic access to files selected by the user.\", \"windows\": [ \"main\" ], \"permissions\": [ \"core:default\", \"dialog:open\", { \"identifier\": \"fs:allow-write-text-file\", \"allow\": [{ \"path\": \"$HOME/test.txt\" }] }, \"platforms\": [\"macOS\",\"windows\"] } ```",
40+
"description": "A grouping and boundary mechanism developers can use to isolate access to the IPC layer.\n\nIt controls application windows fine grained access to the Tauri core, application, or plugin commands. If a window is not matching any capability then it has no access to the IPC layer at all.\n\nThis can be done to create groups of windows, based on their required system access, which can reduce impact of frontend vulnerabilities in less privileged windows. Windows can be added to a capability by exact name (e.g. `main-window`) or glob patterns like `*` or `admin-*`. A Window can have none, one, or multiple associated capabilities.\n\n## Example\n\n```json { \"identifier\": \"main-user-files-write\", \"description\": \"This capability allows the `main` window on macOS and Windows access to `filesystem` write related commands and `dialog` commands to enable programatic access to files selected by the user.\", \"windows\": [ \"main\" ], \"permissions\": [ \"core:default\", \"dialog:open\", { \"identifier\": \"fs:allow-write-text-file\", \"allow\": [{ \"path\": \"$HOME/test.txt\" }] }, ], \"platforms\": [\"macOS\",\"windows\"] } ```",
4141
"type": "object",
4242
"required": [
4343
"identifier",
@@ -84,7 +84,7 @@
8484
}
8585
},
8686
"permissions": {
87-
"description": "List of permissions attached to this capability.\n\nMust include the plugin name as prefix in the form of `${plugin-name}:${permission-name}`. For commands directly implemented in the application itself only `${permission-name}` is required.\n\n## Example\n\n```json [ \"core:default\", \"shell:allow-open\", \"dialog:open\", { \"identifier\": \"fs:allow-write-text-file\", \"allow\": [{ \"path\": \"$HOME/test.txt\" }] } ```",
87+
"description": "List of permissions attached to this capability.\n\nMust include the plugin name as prefix in the form of `${plugin-name}:${permission-name}`. For commands directly implemented in the application itself only `${permission-name}` is required.\n\n## Example\n\n```json [ \"core:default\", \"shell:allow-open\", \"dialog:open\", { \"identifier\": \"fs:allow-write-text-file\", \"allow\": [{ \"path\": \"$HOME/test.txt\" }] } ] ```",
8888
"type": "array",
8989
"items": {
9090
"$ref": "#/definitions/PermissionEntry"

lunar/src-tauri/gen/schemas/macOS-schema.json archived/lunar/src-tauri/gen/schemas/macOS-schema.json

+46-46
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@
3737
],
3838
"definitions": {
3939
"Capability": {
40-
"description": "A grouping and boundary mechanism developers can use to isolate access to the IPC layer.\n\nIt controls application windows fine grained access to the Tauri core, application, or plugin commands. If a window is not matching any capability then it has no access to the IPC layer at all.\n\nThis can be done to create groups of windows, based on their required system access, which can reduce impact of frontend vulnerabilities in less privileged windows. Windows can be added to a capability by exact name (e.g. `main-window`) or glob patterns like `*` or `admin-*`. A Window can have none, one, or multiple associated capabilities.\n\n## Example\n\n```json { \"identifier\": \"main-user-files-write\", \"description\": \"This capability allows the `main` window on macOS and Windows access to `filesystem` write related commands and `dialog` commands to enable programatic access to files selected by the user.\", \"windows\": [ \"main\" ], \"permissions\": [ \"core:default\", \"dialog:open\", { \"identifier\": \"fs:allow-write-text-file\", \"allow\": [{ \"path\": \"$HOME/test.txt\" }] }, \"platforms\": [\"macOS\",\"windows\"] } ```",
40+
"description": "A grouping and boundary mechanism developers can use to isolate access to the IPC layer.\n\nIt controls application windows fine grained access to the Tauri core, application, or plugin commands. If a window is not matching any capability then it has no access to the IPC layer at all.\n\nThis can be done to create groups of windows, based on their required system access, which can reduce impact of frontend vulnerabilities in less privileged windows. Windows can be added to a capability by exact name (e.g. `main-window`) or glob patterns like `*` or `admin-*`. A Window can have none, one, or multiple associated capabilities.\n\n## Example\n\n```json { \"identifier\": \"main-user-files-write\", \"description\": \"This capability allows the `main` window on macOS and Windows access to `filesystem` write related commands and `dialog` commands to enable programatic access to files selected by the user.\", \"windows\": [ \"main\" ], \"permissions\": [ \"core:default\", \"dialog:open\", { \"identifier\": \"fs:allow-write-text-file\", \"allow\": [{ \"path\": \"$HOME/test.txt\" }] }, ], \"platforms\": [\"macOS\",\"windows\"] } ```",
4141
"type": "object",
4242
"required": [
4343
"identifier",
@@ -84,7 +84,7 @@
8484
}
8585
},
8686
"permissions": {
87-
"description": "List of permissions attached to this capability.\n\nMust include the plugin name as prefix in the form of `${plugin-name}:${permission-name}`. For commands directly implemented in the application itself only `${permission-name}` is required.\n\n## Example\n\n```json [ \"core:default\", \"shell:allow-open\", \"dialog:open\", { \"identifier\": \"fs:allow-write-text-file\", \"allow\": [{ \"path\": \"$HOME/test.txt\" }] } ```",
87+
"description": "List of permissions attached to this capability.\n\nMust include the plugin name as prefix in the form of `${plugin-name}:${permission-name}`. For commands directly implemented in the application itself only `${permission-name}` is required.\n\n## Example\n\n```json [ \"core:default\", \"shell:allow-open\", \"dialog:open\", { \"identifier\": \"fs:allow-write-text-file\", \"allow\": [{ \"path\": \"$HOME/test.txt\" }] } ] ```",
8888
"type": "array",
8989
"items": {
9090
"$ref": "#/definitions/PermissionEntry"
@@ -1714,21 +1714,21 @@
17141714
"name"
17151715
],
17161716
"properties": {
1717+
"name": {
1718+
"description": "The name for this allowed shell command configuration.\n\nThis name will be used inside of the webview API to call this command along with any specified arguments.",
1719+
"type": "string"
1720+
},
1721+
"cmd": {
1722+
"description": "The command name. It can start with a variable that resolves to a system base directory. The variables are: `$AUDIO`, `$CACHE`, `$CONFIG`, `$DATA`, `$LOCALDATA`, `$DESKTOP`, `$DOCUMENT`, `$DOWNLOAD`, `$EXE`, `$FONT`, `$HOME`, `$PICTURE`, `$PUBLIC`, `$RUNTIME`, `$TEMPLATE`, `$VIDEO`, `$RESOURCE`, `$LOG`, `$TEMP`, `$APPCONFIG`, `$APPDATA`, `$APPLOCALDATA`, `$APPCACHE`, `$APPLOG`.",
1723+
"type": "string"
1724+
},
17171725
"args": {
17181726
"description": "The allowed arguments for the command execution.",
17191727
"allOf": [
17201728
{
17211729
"$ref": "#/definitions/ShellScopeEntryAllowedArgs"
17221730
}
17231731
]
1724-
},
1725-
"cmd": {
1726-
"description": "The command name. It can start with a variable that resolves to a system base directory. The variables are: `$AUDIO`, `$CACHE`, `$CONFIG`, `$DATA`, `$LOCALDATA`, `$DESKTOP`, `$DOCUMENT`, `$DOWNLOAD`, `$EXE`, `$FONT`, `$HOME`, `$PICTURE`, `$PUBLIC`, `$RUNTIME`, `$TEMPLATE`, `$VIDEO`, `$RESOURCE`, `$LOG`, `$TEMP`, `$APPCONFIG`, `$APPDATA`, `$APPLOCALDATA`, `$APPCACHE`, `$APPLOG`.",
1727-
"type": "string"
1728-
},
1729-
"name": {
1730-
"description": "The name for this allowed shell command configuration.\n\nThis name will be used inside of the webview API to call this command along with any specified arguments.",
1731-
"type": "string"
17321732
}
17331733
},
17341734
"additionalProperties": false
@@ -1740,6 +1740,10 @@
17401740
"sidecar"
17411741
],
17421742
"properties": {
1743+
"name": {
1744+
"description": "The name for this allowed shell command configuration.\n\nThis name will be used inside of the webview API to call this command along with any specified arguments.",
1745+
"type": "string"
1746+
},
17431747
"args": {
17441748
"description": "The allowed arguments for the command execution.",
17451749
"allOf": [
@@ -1748,10 +1752,6 @@
17481752
}
17491753
]
17501754
},
1751-
"name": {
1752-
"description": "The name for this allowed shell command configuration.\n\nThis name will be used inside of the webview API to call this command along with any specified arguments.",
1753-
"type": "string"
1754-
},
17551755
"sidecar": {
17561756
"description": "If this command is a sidecar command.",
17571757
"type": "boolean"
@@ -1774,21 +1774,21 @@
17741774
"name"
17751775
],
17761776
"properties": {
1777+
"name": {
1778+
"description": "The name for this allowed shell command configuration.\n\nThis name will be used inside of the webview API to call this command along with any specified arguments.",
1779+
"type": "string"
1780+
},
1781+
"cmd": {
1782+
"description": "The command name. It can start with a variable that resolves to a system base directory. The variables are: `$AUDIO`, `$CACHE`, `$CONFIG`, `$DATA`, `$LOCALDATA`, `$DESKTOP`, `$DOCUMENT`, `$DOWNLOAD`, `$EXE`, `$FONT`, `$HOME`, `$PICTURE`, `$PUBLIC`, `$RUNTIME`, `$TEMPLATE`, `$VIDEO`, `$RESOURCE`, `$LOG`, `$TEMP`, `$APPCONFIG`, `$APPDATA`, `$APPLOCALDATA`, `$APPCACHE`, `$APPLOG`.",
1783+
"type": "string"
1784+
},
17771785
"args": {
17781786
"description": "The allowed arguments for the command execution.",
17791787
"allOf": [
17801788
{
17811789
"$ref": "#/definitions/ShellScopeEntryAllowedArgs"
17821790
}
17831791
]
1784-
},
1785-
"cmd": {
1786-
"description": "The command name. It can start with a variable that resolves to a system base directory. The variables are: `$AUDIO`, `$CACHE`, `$CONFIG`, `$DATA`, `$LOCALDATA`, `$DESKTOP`, `$DOCUMENT`, `$DOWNLOAD`, `$EXE`, `$FONT`, `$HOME`, `$PICTURE`, `$PUBLIC`, `$RUNTIME`, `$TEMPLATE`, `$VIDEO`, `$RESOURCE`, `$LOG`, `$TEMP`, `$APPCONFIG`, `$APPDATA`, `$APPLOCALDATA`, `$APPCACHE`, `$APPLOG`.",
1787-
"type": "string"
1788-
},
1789-
"name": {
1790-
"description": "The name for this allowed shell command configuration.\n\nThis name will be used inside of the webview API to call this command along with any specified arguments.",
1791-
"type": "string"
17921792
}
17931793
},
17941794
"additionalProperties": false
@@ -1800,6 +1800,10 @@
18001800
"sidecar"
18011801
],
18021802
"properties": {
1803+
"name": {
1804+
"description": "The name for this allowed shell command configuration.\n\nThis name will be used inside of the webview API to call this command along with any specified arguments.",
1805+
"type": "string"
1806+
},
18031807
"args": {
18041808
"description": "The allowed arguments for the command execution.",
18051809
"allOf": [
@@ -1808,10 +1812,6 @@
18081812
}
18091813
]
18101814
},
1811-
"name": {
1812-
"description": "The name for this allowed shell command configuration.\n\nThis name will be used inside of the webview API to call this command along with any specified arguments.",
1813-
"type": "string"
1814-
},
18151815
"sidecar": {
18161816
"description": "If this command is a sidecar command.",
18171817
"type": "boolean"
@@ -4938,6 +4938,22 @@
49384938
}
49394939
]
49404940
},
4941+
"ShellScopeEntryAllowedArgs": {
4942+
"description": "A set of command arguments allowed to be executed by the webview API.\n\nA value of `true` will allow any arguments to be passed to the command. `false` will disable all arguments. A list of [`ShellScopeEntryAllowedArg`] will set those arguments as the only valid arguments to be passed to the attached command configuration.",
4943+
"anyOf": [
4944+
{
4945+
"description": "Use a simple boolean to allow all or disable all arguments to this command configuration.",
4946+
"type": "boolean"
4947+
},
4948+
{
4949+
"description": "A specific set of [`ShellScopeEntryAllowedArg`] that are valid to call for the command configuration.",
4950+
"type": "array",
4951+
"items": {
4952+
"$ref": "#/definitions/ShellScopeEntryAllowedArg"
4953+
}
4954+
}
4955+
]
4956+
},
49414957
"ShellScopeEntryAllowedArg": {
49424958
"description": "A command argument allowed to be executed by the webview API.",
49434959
"anyOf": [
@@ -4952,35 +4968,19 @@
49524968
"validator"
49534969
],
49544970
"properties": {
4971+
"validator": {
4972+
"description": "[regex] validator to require passed values to conform to an expected input.\n\nThis will require the argument value passed to this variable to match the `validator` regex before it will be executed.\n\nThe regex string is by default surrounded by `^...$` to match the full string. For example the `https?://\\w+` regex would be registered as `^https?://\\w+$`.\n\n[regex]: <https://docs.rs/regex/latest/regex/#syntax>",
4973+
"type": "string"
4974+
},
49554975
"raw": {
49564976
"description": "Marks the validator as a raw regex, meaning the plugin should not make any modification at runtime.\n\nThis means the regex will not match on the entire string by default, which might be exploited if your regex allow unexpected input to be considered valid. When using this option, make sure your regex is correct.",
49574977
"default": false,
49584978
"type": "boolean"
4959-
},
4960-
"validator": {
4961-
"description": "[regex] validator to require passed values to conform to an expected input.\n\nThis will require the argument value passed to this variable to match the `validator` regex before it will be executed.\n\nThe regex string is by default surrounded by `^...$` to match the full string. For example the `https?://\\w+` regex would be registered as `^https?://\\w+$`.\n\n[regex]: <https://docs.rs/regex/latest/regex/#syntax>",
4962-
"type": "string"
49634979
}
49644980
},
49654981
"additionalProperties": false
49664982
}
49674983
]
4968-
},
4969-
"ShellScopeEntryAllowedArgs": {
4970-
"description": "A set of command arguments allowed to be executed by the webview API.\n\nA value of `true` will allow any arguments to be passed to the command. `false` will disable all arguments. A list of [`ShellScopeEntryAllowedArg`] will set those arguments as the only valid arguments to be passed to the attached command configuration.",
4971-
"anyOf": [
4972-
{
4973-
"description": "Use a simple boolean to allow all or disable all arguments to this command configuration.",
4974-
"type": "boolean"
4975-
},
4976-
{
4977-
"description": "A specific set of [`ShellScopeEntryAllowedArg`] that are valid to call for the command configuration.",
4978-
"type": "array",
4979-
"items": {
4980-
"$ref": "#/definitions/ShellScopeEntryAllowedArg"
4981-
}
4982-
}
4983-
]
49844984
}
49854985
}
49864986
}
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.

aria/components/contexts/theme-provider.tsx

+2-1
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,8 @@
22

33
import * as React from "react";
44
import { ThemeProvider as NextThemesProvider } from "next-themes";
5-
import { type ThemeProviderProps } from "next-themes/dist/types";
5+
6+
type ThemeProviderProps = React.ComponentProps<typeof NextThemesProvider>;
67

78
export function ThemeProvider({ children, ...props }: ThemeProviderProps) {
89
return <NextThemesProvider {...props}>{children}</NextThemesProvider>;

0 commit comments

Comments
 (0)