You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: packages/app-builder-lib/scheme.json
+54
Original file line number
Diff line number
Diff line change
@@ -1284,6 +1284,49 @@
1284
1284
},
1285
1285
"type": "object"
1286
1286
},
1287
+
"FuseOptionsV1": {
1288
+
"additionalProperties": false,
1289
+
"description": "All options come from [@electron/fuses](https://github.com/electron/fuses)\nRef: https://raw.githubusercontent.com/electron/electron/refs/heads/main/docs/tutorial/fuses.md",
1290
+
"properties": {
1291
+
"enableCookieEncryption": {
1292
+
"description": "The cookieEncryption fuse toggles whether the cookie store on disk is encrypted using OS level cryptography keys. By default the sqlite database that Chromium uses to store cookies stores the values in plaintext. If you wish to ensure your apps cookies are encrypted in the same way Chrome does then you should enable this fuse. Please note it is a one-way transition, if you enable this fuse existing unencrypted cookies will be encrypted-on-write but if you then disable the fuse again your cookie store will effectively be corrupt and useless. Most apps can safely enable this fuse.",
1293
+
"type": "boolean"
1294
+
},
1295
+
"enableEmbeddedAsarIntegrityValidation": {
1296
+
"description": "The embeddedAsarIntegrityValidation fuse toggles an experimental feature on macOS that validates the content of the `app.asar` file when it is loaded. This feature is designed to have a minimal performance impact but may marginally slow down file reads from inside the `app.asar` archive.\nCurrently, ASAR integrity checking is supported on:\n- macOS as of electron>=16.0.0\n- Windows as of electron>=30.0.0\nFor more information on how to use asar integrity validation please read the [Asar Integrity](https://github.com/electron/electron/blob/main/docs/tutorial/asar-integrity.md) documentation.",
1297
+
"type": "boolean"
1298
+
},
1299
+
"enableNodeCliInspectArguments": {
1300
+
"description": "The nodeCliInspect fuse toggles whether the `--inspect`, `--inspect-brk`, etc. flags are respected or not. When disabled it also ensures that `SIGUSR1` signal does not initialize the main process inspector. Most apps can safely disable this fuse.",
1301
+
"type": "boolean"
1302
+
},
1303
+
"enableNodeOptionsEnvironmentVariable": {
1304
+
"description": "The nodeOptions fuse toggles whether the [`NODE_OPTIONS`](https://nodejs.org/api/cli.html#node_optionsoptions) and [`NODE_EXTRA_CA_CERTS`](https://github.com/nodejs/node/blob/main/doc/api/cli.md#node_extra_ca_certsfile) environment variables are respected. The `NODE_OPTIONS` environment variable can be used to pass all kinds of custom options to the Node.js runtime and isn't typically used by apps in production. Most apps can safely disable this fuse.",
1305
+
"type": "boolean"
1306
+
},
1307
+
"grantFileProtocolExtraPrivileges": {
1308
+
"description": "The grantFileProtocolExtraPrivileges fuse changes whether pages loaded from the `file://` protocol are given privileges beyond what they would receive in a traditional web browser. This behavior was core to Electron apps in original versions of Electron but is no longer required as apps should be [serving local files from custom protocols](https://github.com/electron/electron/blob/main/docs/tutorial/security.md#18-avoid-usage-of-the-file-protocol-and-prefer-usage-of-custom-protocols) now instead. If you aren't serving pages from `file://` you should disable this fuse.\nThe extra privileges granted to the `file://` protocol by this fuse are incompletely documented below:\n- `file://` protocol pages can use `fetch` to load other assets over `file://`\n- `file://` protocol pages can use service workers\n- `file://` protocol pages have universal access granted to child frames also running on `file://` protocols regardless of sandbox settings",
1309
+
"type": "boolean"
1310
+
},
1311
+
"loadBrowserProcessSpecificV8Snapshot": {
1312
+
"description": "The loadBrowserProcessSpecificV8Snapshot fuse changes which V8 snapshot file is used for the browser process. By default Electron's processes will all use the same V8 snapshot file. When this fuse is enabled the browser process uses the file called `browser_v8_context_snapshot.bin` for its V8 snapshot. The other processes will use the V8 snapshot file that they normally do.",
1313
+
"type": "boolean"
1314
+
},
1315
+
"onlyLoadAppFromAsar": {
1316
+
"description": "The onlyLoadAppFromAsar fuse changes the search system that Electron uses to locate your app code. By default Electron will search in the following order `app.asar` -> `app` -> `default_app.asar`. When this fuse is enabled the search order becomes a single entry `app.asar` thus ensuring that when combined with the `embeddedAsarIntegrityValidation` fuse it is impossible to load non-validated code.",
1317
+
"type": "boolean"
1318
+
},
1319
+
"resetAdHocDarwinSignature": {
1320
+
"description": "Resets the app signature, specifically used for macOS.\nNote: This should be unneeded since electron-builder signs the app directly after flipping the fuses.\nRef: https://github.com/electron/fuses?tab=readme-ov-file#apple-silicon",
1321
+
"type": "boolean"
1322
+
},
1323
+
"runAsNode": {
1324
+
"description": "The runAsNode fuse toggles whether the `ELECTRON_RUN_AS_NODE` environment variable is respected or not. Please note that if this fuse is disabled then `process.fork` in the main process will not function as expected as it depends on this environment variable to function. Instead, we recommend that you use [Utility Processes](https://github.com/electron/electron/blob/main/docs/api/utility-process.md), which work for many use cases where you need a standalone Node.js process (like a Sqlite server process or similar scenarios).",
1325
+
"type": "boolean"
1326
+
}
1327
+
},
1328
+
"type": "object"
1329
+
},
1287
1330
"GenericServerOptions": {
1288
1331
"additionalProperties": false,
1289
1332
"description": "Generic (any HTTP(S) server) options.\nIn all publish options [File Macros](./file-patterns.md#file-macros) are supported.",
@@ -7023,6 +7066,17 @@
7023
7066
"$ref": "#/definitions/ElectronDownloadOptions",
7024
7067
"description": "The [electron-download](https://github.com/electron-userland/electron-download#usage) options."
7025
7068
},
7069
+
"electronFuses": {
7070
+
"anyOf": [
7071
+
{
7072
+
"$ref": "#/definitions/FuseOptionsV1"
7073
+
},
7074
+
{
7075
+
"type": "null"
7076
+
}
7077
+
],
7078
+
"description": "Options to pass to `@electron/fuses`\nRef: https://github.com/electron/fuses"
*The runAsNode fuse toggles whether the `ELECTRON_RUN_AS_NODE` environment variable is respected or not. Please note that if this fuse is disabled then `process.fork` in the main process will not function as expected as it depends on this environment variable to function. Instead, we recommend that you use [Utility Processes](https://github.com/electron/electron/blob/main/docs/api/utility-process.md), which work for many use cases where you need a standalone Node.js process (like a Sqlite server process or similar scenarios).
392
+
*/
393
+
runAsNode?: boolean
394
+
/**
395
+
* The cookieEncryption fuse toggles whether the cookie store on disk is encrypted using OS level cryptography keys. By default the sqlite database that Chromium uses to store cookies stores the values in plaintext. If you wish to ensure your apps cookies are encrypted in the same way Chrome does then you should enable this fuse. Please note it is a one-way transition, if you enable this fuse existing unencrypted cookies will be encrypted-on-write but if you then disable the fuse again your cookie store will effectively be corrupt and useless. Most apps can safely enable this fuse.
396
+
*/
397
+
enableCookieEncryption?: boolean
398
+
/**
399
+
* The nodeOptions fuse toggles whether the [`NODE_OPTIONS`](https://nodejs.org/api/cli.html#node_optionsoptions) and [`NODE_EXTRA_CA_CERTS`](https://github.com/nodejs/node/blob/main/doc/api/cli.md#node_extra_ca_certsfile) environment variables are respected. The `NODE_OPTIONS` environment variable can be used to pass all kinds of custom options to the Node.js runtime and isn't typically used by apps in production. Most apps can safely disable this fuse.
400
+
*/
401
+
enableNodeOptionsEnvironmentVariable?: boolean
402
+
/**
403
+
* The nodeCliInspect fuse toggles whether the `--inspect`, `--inspect-brk`, etc. flags are respected or not. When disabled it also ensures that `SIGUSR1` signal does not initialize the main process inspector. Most apps can safely disable this fuse.
404
+
*/
405
+
enableNodeCliInspectArguments?: boolean
406
+
/**
407
+
* The embeddedAsarIntegrityValidation fuse toggles an experimental feature on macOS that validates the content of the `app.asar` file when it is loaded. This feature is designed to have a minimal performance impact but may marginally slow down file reads from inside the `app.asar` archive.
408
+
* Currently, ASAR integrity checking is supported on:
409
+
*
410
+
* - macOS as of electron>=16.0.0
411
+
* - Windows as of electron>=30.0.0
412
+
*
413
+
* For more information on how to use asar integrity validation please read the [Asar Integrity](https://github.com/electron/electron/blob/main/docs/tutorial/asar-integrity.md) documentation.
414
+
*/
415
+
enableEmbeddedAsarIntegrityValidation?: boolean
416
+
/**
417
+
* The onlyLoadAppFromAsar fuse changes the search system that Electron uses to locate your app code. By default Electron will search in the following order `app.asar` -> `app` -> `default_app.asar`. When this fuse is enabled the search order becomes a single entry `app.asar` thus ensuring that when combined with the `embeddedAsarIntegrityValidation` fuse it is impossible to load non-validated code.
418
+
*/
419
+
onlyLoadAppFromAsar?: boolean
420
+
/**
421
+
* The loadBrowserProcessSpecificV8Snapshot fuse changes which V8 snapshot file is used for the browser process. By default Electron's processes will all use the same V8 snapshot file. When this fuse is enabled the browser process uses the file called `browser_v8_context_snapshot.bin` for its V8 snapshot. The other processes will use the V8 snapshot file that they normally do.
422
+
*/
423
+
loadBrowserProcessSpecificV8Snapshot?: boolean
424
+
/**
425
+
* The grantFileProtocolExtraPrivileges fuse changes whether pages loaded from the `file://` protocol are given privileges beyond what they would receive in a traditional web browser. This behavior was core to Electron apps in original versions of Electron but is no longer required as apps should be [serving local files from custom protocols](https://github.com/electron/electron/blob/main/docs/tutorial/security.md#18-avoid-usage-of-the-file-protocol-and-prefer-usage-of-custom-protocols) now instead. If you aren't serving pages from `file://` you should disable this fuse.
426
+
* The extra privileges granted to the `file://` protocol by this fuse are incompletely documented below:
427
+
*
428
+
* - `file://` protocol pages can use `fetch` to load other assets over `file://`
429
+
* - `file://` protocol pages can use service workers
430
+
* - `file://` protocol pages have universal access granted to child frames also running on `file://` protocols regardless of sandbox settings
431
+
*/
432
+
grantFileProtocolExtraPrivileges?: boolean
433
+
/**
434
+
* Resets the app signature, specifically used for macOS.
435
+
* Note: This should be unneeded since electron-builder signs the app directly after flipping the fuses.
// this is annoying, but we must filter out undefined entries because some older electron versions will receive `the fuse wire in this version of Electron is not long enough` even if entry is set undefined
* Use `AfterPackContext` here to keep available for public API
379
+
* @param {AfterPackContext} context
380
+
* @param {FuseConfig} fuses
381
+
*
382
+
* Can be used in `afterPack` hook for custom fuse logic like below. It's an alternative approach if one wants to override electron-builder's @electron/fuses version
0 commit comments