Publish New Versions (v2)#2545
Merged
lucasfernog merged 1 commit intov2from Apr 2, 2025
Merged
Conversation
6f88343 to
566ca87
Compare
d87ceb0 to
f13775d
Compare
f88ed3d to
0ffe385
Compare
Contributor
Author
Package Changes Through 2c0f417There are 2 changes which include shell with patch, shell-js with patch Planned Package VersionsThe following package releases are the planned based on the context of changes in this pull request.
Add another change file through the GitHub UI by following this link. Read about change files or the docs at github.com/jbolda/covector |
2c0f417 to
9930334
Compare
gezihuzi
pushed a commit
to Hypobenthos/plugins-workspace
that referenced
this pull request
Jun 22, 2025
Co-authored-by: lucasfernog <20051258+lucasfernog@users.noreply.github.com>
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Version Updates
Merging this PR will release new versions of the following packages based on your change files.
api-example
[2.0.24]
Dependencies
http@2.4.3shell@2.2.1fs@2.2.1process@2.2.1updater@2.7.0dialog@2.2.1api-example-js
[2.0.20]
Dependencies
http-js@2.4.3shell-js@2.2.1fs-js@2.2.1process-js@2.2.1updater-js@2.7.0dialog-js@2.2.1deep-link-example-js
[2.2.1]
Dependencies
deep-link-js@2.2.1autostart
[2.3.0]
Builderfor more flexible settingsautostart-js
[2.3.0]
Builderfor more flexible settingsdeep-link
[2.2.1]
bug
is_registerednot being able to pickup deep link registered inHKEY_LOCAL_MACHINEon Windowsunregisternot being able to remove deep link registered inHKEY_LOCAL_MACHINEon Windowsdeep-link-js
[2.2.1]
bug
is_registerednot being able to pickup deep link registered inHKEY_LOCAL_MACHINEon Windowsunregisternot being able to remove deep link registered inHKEY_LOCAL_MACHINEon Windowsfs
[2.2.1]
bug
writeFileReadableStream handling due to missing async iterator support on macOS platformfs-js
[2.2.1]
bug
writeFileReadableStream handling due to missing async iterator support on macOS platformdialog
[2.2.1]
Dependencies
fs@2.2.1dialog-js
[2.2.1]
Dependencies
fs-js@2.2.1http
[2.4.3]
zstdcargo feature flag to enablereqwest/zstdflag.Dependencies
fs@2.2.1http-js
[2.4.3]
zstdcargo feature flag to enablereqwest/zstdflag.Dependencies
fs-js@2.2.1persisted-scope
[2.2.1]
Dependencies
fs@2.2.1process
[2.2.1]
request_restart#2581) Migrate restart to use tauri's newAppHandle::request_restartmethodprocess-js
[2.2.1]
request_restart#2581) Migrate restart to use tauri's newAppHandle::request_restartmethodshell
[2.2.1]
bug
^((mailto:\w+)|(tel:\w+)|(https?://\w+)).+when the open configuration is not set, preventing unchecked input from being used in this scenario (previously the plugin would skip validation when it should disable all calls). This keeps backwards compatibility while still fixing this vulnerability.The scope is no longer validated for Rust calls via
ShellExt::shell()so if you need to block JavaScript from calling the API you can simply settauri.conf.json > plugins > shell > opentofalse.shell-js
[2.2.1]
bug
^((mailto:\w+)|(tel:\w+)|(https?://\w+)).+when the open configuration is not set, preventing unchecked input from being used in this scenario (previously the plugin would skip validation when it should disable all calls). This keeps backwards compatibility while still fixing this vulnerability.The scope is no longer validated for Rust calls via
ShellExt::shell()so if you need to block JavaScript from calling the API you can simply settauri.conf.json > plugins > shell > opentofalse.single-instance
[2.2.3]
Dependencies
deep-link@2.2.1updater
[2.7.0]
bug
Update.dateto RFC 3339 #2573) Fix JS APIUpdate.datenot formatted to RFC 3339timeoutpassed tocheckgets re-used bydownloadanddownloadAndinstallupdater-js
[2.7.0]
bug
Update.dateto RFC 3339 #2573) Fix JS APIUpdate.datenot formatted to RFC 3339timeoutpassed tocheckgets re-used bydownloadanddownloadAndinstallwindow-state
[2.2.2]
window-state-js
[2.2.2]