You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{ property: "csp", optional: true, type: "Csp", description: `The Content Security Policy that will be injected on all HTML files on the built application. If [\`dev_csp\`](SecurityConfig.dev_csp) is not specified, this value is also injected on dev. This is a really important part of the configuration since it helps you ensure your WebView is secured. See <ahref="https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP">https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP</a>.`, child: <PropertiesanchorRoot="tauri.security.csp"rows={[]}/> },
222
-
{ property: "dangerousDisableAssetCspModification", optional: true, type: "boolean", description: `Disables the Tauri-injected CSP sources. At compile time, Tauri parses all the frontend assets and changes the Content-Security-Policy to only allow loading of your own scripts and styles by injecting nonce and hash sources. This stricts your CSP, which may introduce issues when using along with other flexing sources. **WARNING:** Only disable this if you know what you are doing and have properly configured the CSP. Your application might be vulnerable to XSS attacks without this Tauri protection.` },
222
+
{ property: "dangerousDisableAssetCspModification", optional: true, type: "DisabledCspModificationKind", description: `Disables the Tauri-injected CSP sources. At compile time, Tauri parses all the frontend assets and changes the Content-Security-Policy to only allow loading of your own scripts and styles by injecting nonce and hash sources. This stricts your CSP, which may introduce issues when using along with other flexing sources. This configuration option allows both a boolean and a list of strings as value. A boolean instructs Tauri to disable the injection for all CSP injections, and a list of strings indicates the CSP directives that Tauri cannot inject. **WARNING:** Only disable this if you know what you are doing and have properly configured the CSP. Your application might be vulnerable to XSS attacks without this Tauri protection.` },
223
223
{ property: "devCsp", optional: true, type: "Csp", description: `The Content Security Policy that will be injected on all HTML files on development. This is a really important part of the configuration since it helps you ensure your WebView is secured. See <a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP">https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP</a>.`, child: <PropertiesanchorRoot="tauri.security.devCsp"rows={[]}/> },
224
224
{ property: "freezePrototype", optional: true, type: "boolean", description: `Freeze the \`Object.prototype\` when using the custom protocol.` },
0 commit comments