Remove high-risk defaults and tighten data handling across auth, storage, IPC, provider calls, and capabilities so sensitive data is better protected by default. Also update README/wiki security guidance and add targeted tests for the new hardening behaviors. Made-with: Cursor
54 lines
1.2 KiB
TOML
54 lines
1.2 KiB
TOML
[package]
|
|
name = "tftsr"
|
|
version = "0.1.0"
|
|
edition = "2021"
|
|
|
|
[lib]
|
|
name = "tftsr_lib"
|
|
crate-type = ["staticlib", "cdylib", "rlib"]
|
|
|
|
[build-dependencies]
|
|
tauri-build = { version = "2", features = [] }
|
|
|
|
[dependencies]
|
|
tauri = { version = "2", features = [] }
|
|
tauri-plugin-stronghold = "2"
|
|
tauri-plugin-dialog = "2"
|
|
tauri-plugin-fs = "2"
|
|
tauri-plugin-shell = "2"
|
|
tauri-plugin-http = "2"
|
|
rusqlite = { version = "0.31", features = ["bundled-sqlcipher-vendored-openssl"] }
|
|
serde = { version = "1", features = ["derive"] }
|
|
serde_json = "1"
|
|
tokio = { version = "1", features = ["full"] }
|
|
reqwest = { version = "0.12", features = ["json", "stream"] }
|
|
regex = "1"
|
|
aho-corasick = "1"
|
|
uuid = { version = "1", features = ["v7"] }
|
|
printpdf = "0.7"
|
|
docx-rs = "0.4"
|
|
sha2 = { version = "0.10", features = ["std"] }
|
|
hex = "0.4"
|
|
anyhow = "1"
|
|
thiserror = "1"
|
|
tracing = "0.1"
|
|
tracing-subscriber = { version = "0.3", features = ["env-filter"] }
|
|
chrono = { version = "0.4", features = ["serde"] }
|
|
futures = "0.3"
|
|
async-trait = "0.1"
|
|
base64 = "0.22"
|
|
dirs = "5"
|
|
aes-gcm = "0.10"
|
|
rand = "0.8"
|
|
lazy_static = "1.4"
|
|
warp = "0.3"
|
|
urlencoding = "2"
|
|
|
|
[dev-dependencies]
|
|
tokio-test = "0.4"
|
|
mockito = "1.2"
|
|
|
|
[profile.release]
|
|
opt-level = "s"
|
|
strip = true
|