{ "_from": "cordova-plugin-whitelist@1", "_id": "cordova-plugin-whitelist@1.3.4", "_inBundle": false, "_integrity": "sha512-EYC5eQFVkoYXq39l7tYKE6lEjHJ04mvTmKXxGL7quHLdFPfJMNzru/UYpn92AOfpl3PQaZmou78C7EgmFOwFQQ==", "_location": "/cordova-plugin-whitelist", "_phantomChildren": {}, "_requested": { "escapedName": "cordova-plugin-whitelist", "fetchSpec": "1", "name": "cordova-plugin-whitelist", "raw": "cordova-plugin-whitelist@1", "rawSpec": "1", "registry": true, "saveSpec": null, "type": "range" }, "_requiredBy": [ "#DEV:/", "#USER" ], "_resolved": "https://registry.npmjs.org/cordova-plugin-whitelist/-/cordova-plugin-whitelist-1.3.4.tgz", "_shasum": "31938545c7c3e7de35c20ab08c2c3afa06e8a3f9", "_spec": "cordova-plugin-whitelist@1", "_where": "C:\\Users\\Chuch\\Documents\\Cordova\\test", "author": { "name": "Apache Software Foundation" }, "bugs": { "url": "https://github.com/apache/cordova-plugin-whitelist/issues" }, "bundleDependencies": false, "cordova": { "platforms": [ "android" ] }, "dependencies": {}, "deprecated": false, "description": "Cordova Whitelist Plugin", "devDependencies": {}, "engines": { "cordovaDependencies": { "0.0.0": { "cordova-android": ">=4.0.0" }, "2.0.0": { "cordova": ">100" } } }, "homepage": "https://github.com/apache/cordova-plugin-whitelist#readme", "keywords": [ "cordova", "cordova-android", "ecosystem:cordova", "whitelist" ], "license": "Apache-2.0", "name": "cordova-plugin-whitelist", "optionalDependencies": {}, "readme": "---\ntitle: Whitelist\ndescription: Whitelist external content accessible by your app.\n---\n\n\n# cordova-plugin-whitelist\n\nThis plugin implements a whitelist policy for navigating the application webview on Cordova 4.0\n\n## Installation\n\nYou can install whitelist plugin with Cordova CLI, from npm:\n\n```\n$ cordova plugin add cordova-plugin-whitelist\n$ cordova prepare\n```\n\n## Supported Cordova Platforms\n\n* Android 4.0.0 or above\n\n## Navigation Whitelist\n\nControls which URLs the WebView itself can be navigated to. Applies to\ntop-level navigations only.\n\nBy default navigations are only allowed to `file://` URLs. To allow others URLs, you must add `` tags to your `config.xml`:\n\n \n \n\n \n \n\n \n \n\n \n \n \n \n\nQuirks: on Android it also applies to iframes for non-http(s) schemes.\n\n## Intent Whitelist\n\nControls which URLs the app is allowed to ask the system to open.\n\nIn `config.xml`, add `` tags, like this:\n\n \n \n \n\n \n \n\n \n \n\n \n \n\n \n \n\n \n \n\n \n \n\nWithout any `` tags, no requests to external URLs are allowed. However, the default Cordova application includes a quite liberal set of `allow-intent` entries by default. It is advised to narrow this down based on each app's needs.\n\nOn Android, this equates to sending an intent of type BROWSEABLE.\n\nThis whitelist does not apply to plugins, only hyperlinks and calls to `window.open()`.\n\nNote: `allow-navigation` takes precedence over `allow-intent`. Allowing navigation to all URLs with `` for example has the side effect of \"capturing\" all intents, so the webview navigates to them instead of triggering e.g. external apps.\n\n## Network Request Whitelist\n\nControls which network requests (images, XHRs, etc) are allowed to be made (via cordova native hooks).\n\nNote: We suggest you use a Content Security Policy (see below), which is more secure. This whitelist is mostly historical for webviews which do not support CSP.\n\nIn `config.xml`, add `` tags, like this:\n\n \n \n \n\n \n \n\n \n \n\n \n \n\n \n \n\nWithout any `` tags, only requests to `file://` URLs are allowed. However, the default Cordova application includes `` by default.\n\nNote: Whitelist cannot block network redirects from a whitelisted remote website (i.e. http or https) to a non-whitelisted website. Use CSP rules to mitigate redirects to non-whitelisted websites for webviews that support CSP.\n\nQuirk: Android also allows requests to https://ssl.gstatic.com/accessibility/javascript/android/ by default, since this is required for TalkBack to function properly.\n\n### Content Security Policy\n\nControls which network requests (images, XHRs, etc) are allowed to be made (via webview directly).\n\nOn Android and iOS, the network request whitelist (see above) is not able to filter all types of requests (e.g. `