Repositorio del curso CCOM4030 el semestre B91 del proyecto Artesanías con el Instituto de Cultura

package.json 9.4KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172
  1. {
  2. "_from": "cordova-plugin-whitelist@1",
  3. "_id": "cordova-plugin-whitelist@1.3.4",
  4. "_inBundle": false,
  5. "_integrity": "sha512-EYC5eQFVkoYXq39l7tYKE6lEjHJ04mvTmKXxGL7quHLdFPfJMNzru/UYpn92AOfpl3PQaZmou78C7EgmFOwFQQ==",
  6. "_location": "/cordova-plugin-whitelist",
  7. "_phantomChildren": {},
  8. "_requested": {
  9. "escapedName": "cordova-plugin-whitelist",
  10. "fetchSpec": "1",
  11. "name": "cordova-plugin-whitelist",
  12. "raw": "cordova-plugin-whitelist@1",
  13. "rawSpec": "1",
  14. "registry": true,
  15. "saveSpec": null,
  16. "type": "range"
  17. },
  18. "_requiredBy": [
  19. "#DEV:/",
  20. "#USER"
  21. ],
  22. "_resolved": "https://registry.npmjs.org/cordova-plugin-whitelist/-/cordova-plugin-whitelist-1.3.4.tgz",
  23. "_shasum": "31938545c7c3e7de35c20ab08c2c3afa06e8a3f9",
  24. "_spec": "cordova-plugin-whitelist@1",
  25. "_where": "C:\\Users\\Chuch\\Documents\\Cordova\\test",
  26. "author": {
  27. "name": "Apache Software Foundation"
  28. },
  29. "bugs": {
  30. "url": "https://github.com/apache/cordova-plugin-whitelist/issues"
  31. },
  32. "bundleDependencies": false,
  33. "cordova": {
  34. "platforms": [
  35. "android"
  36. ]
  37. },
  38. "dependencies": {},
  39. "deprecated": false,
  40. "description": "Cordova Whitelist Plugin",
  41. "devDependencies": {},
  42. "engines": {
  43. "cordovaDependencies": {
  44. "0.0.0": {
  45. "cordova-android": ">=4.0.0"
  46. },
  47. "2.0.0": {
  48. "cordova": ">100"
  49. }
  50. }
  51. },
  52. "homepage": "https://github.com/apache/cordova-plugin-whitelist#readme",
  53. "keywords": [
  54. "cordova",
  55. "cordova-android",
  56. "ecosystem:cordova",
  57. "whitelist"
  58. ],
  59. "license": "Apache-2.0",
  60. "name": "cordova-plugin-whitelist",
  61. "optionalDependencies": {},
  62. "readme": "---\ntitle: Whitelist\ndescription: Whitelist external content accessible by your app.\n---\n<!--\n# license: Licensed to the Apache Software Foundation (ASF) under one\n# or more contributor license agreements. See the NOTICE file\n# distributed with this work for additional information\n# regarding copyright ownership. The ASF licenses this file\n# to you under the Apache License, Version 2.0 (the\n# \"License\"); you may not use this file except in compliance\n# with the License. You may obtain a copy of the License at\n#\n# http://www.apache.org/licenses/LICENSE-2.0\n#\n# Unless required by applicable law or agreed to in writing,\n# software distributed under the License is distributed on an\n# \"AS IS\" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY\n# KIND, either express or implied. See the License for the\n# specific language governing permissions and limitations\n# under the License.\n-->\n\n# cordova-plugin-whitelist\n\nThis plugin implements a whitelist policy for navigating the application webview on Cordova 4.0\n\n## Installation\n\nYou can install whitelist plugin with Cordova CLI, from npm:\n\n```\n$ cordova plugin add cordova-plugin-whitelist\n$ cordova prepare\n```\n\n## Supported Cordova Platforms\n\n* Android 4.0.0 or above\n\n## Navigation Whitelist\n\nControls which URLs the WebView itself can be navigated to. Applies to\ntop-level navigations only.\n\nBy default navigations are only allowed to `file://` URLs. To allow others URLs, you must add `<allow-navigation>` tags to your `config.xml`:\n\n <!-- Allow links to example.com -->\n <allow-navigation href=\"http://example.com/*\" />\n\n <!-- Wildcards are allowed for the protocol, as a prefix\n to the host, or as a suffix to the path -->\n <allow-navigation href=\"*://*.example.com/*\" />\n\n <!-- A wildcard can be used to whitelist the entire network,\n over HTTP and HTTPS.\n *NOT RECOMMENDED* -->\n <allow-navigation href=\"*\" />\n\n <!-- The above is equivalent to these three declarations -->\n <allow-navigation href=\"http://*/*\" />\n <allow-navigation href=\"https://*/*\" />\n <allow-navigation href=\"data:*\" />\n\nQuirks: on Android it also applies to iframes for non-http(s) schemes.\n\n## Intent Whitelist\n\nControls which URLs the app is allowed to ask the system to open.\n\nIn `config.xml`, add `<allow-intent>` tags, like this:\n\n <!-- Allow links to web pages to open in a browser -->\n <allow-intent href=\"http://*/*\" />\n <allow-intent href=\"https://*/*\" />\n\n <!-- Allow links to example.com to open in a browser -->\n <allow-intent href=\"http://example.com/*\" />\n\n <!-- Wildcards are allowed for the protocol, as a prefix\n to the host, or as a suffix to the path -->\n <allow-intent href=\"*://*.example.com/*\" />\n\n <!-- Allow SMS links to open messaging app -->\n <allow-intent href=\"sms:*\" />\n\n <!-- Allow tel: links to open the dialer -->\n <allow-intent href=\"tel:*\" />\n\n <!-- Allow geo: links to open maps -->\n <allow-intent href=\"geo:*\" />\n\n <!-- Allow all unrecognized URLs to open installed apps\n *NOT RECOMMENDED* -->\n <allow-intent href=\"*\" />\n\nWithout any `<allow-intent>` tags, no requests to external URLs are allowed. However, the default Cordova application includes a quite liberal set of `allow-intent` entries by default. It is advised to narrow this down based on each app's needs.\n\nOn Android, this equates to sending an intent of type BROWSEABLE.\n\nThis whitelist does not apply to plugins, only hyperlinks and calls to `window.open()`.\n\nNote: `allow-navigation` takes precedence over `allow-intent`. Allowing navigation to all URLs with `<allow-navigation href=\"*\" />` for example has the side effect of \"capturing\" all intents, so the webview navigates to them instead of triggering e.g. external apps.\n\n## Network Request Whitelist\n\nControls which network requests (images, XHRs, etc) are allowed to be made (via cordova native hooks).\n\nNote: We suggest you use a Content Security Policy (see below), which is more secure. This whitelist is mostly historical for webviews which do not support CSP.\n\nIn `config.xml`, add `<access>` tags, like this:\n\n <!-- Allow images, xhrs, etc. to google.com -->\n <access origin=\"http://google.com\" />\n <access origin=\"https://google.com\" />\n\n <!-- Access to the subdomain maps.google.com -->\n <access origin=\"http://maps.google.com\" />\n\n <!-- Access to all the subdomains on google.com -->\n <access origin=\"http://*.google.com\" />\n\n <!-- Enable requests to content: URLs -->\n <access origin=\"content:///*\" />\n\n <!-- Don't block any requests -->\n <access origin=\"*\" />\n\nWithout any `<access>` tags, only requests to `file://` URLs are allowed. However, the default Cordova application includes `<access origin=\"*\">` by default.\n\nNote: Whitelist cannot block network redirects from a whitelisted remote website (i.e. http or https) to a non-whitelisted website. Use CSP rules to mitigate redirects to non-whitelisted websites for webviews that support CSP.\n\nQuirk: Android also allows requests to https://ssl.gstatic.com/accessibility/javascript/android/ by default, since this is required for TalkBack to function properly.\n\n### Content Security Policy\n\nControls which network requests (images, XHRs, etc) are allowed to be made (via webview directly).\n\nOn Android and iOS, the network request whitelist (see above) is not able to filter all types of requests (e.g. `<video>` & WebSockets are not blocked). So, in addition to the whitelist, you should use a [Content Security Policy](http://content-security-policy.com/) `<meta>` tag on all of your pages.\n\nOn Android, support for CSP within the system webview starts with KitKat (but is available on all versions using Crosswalk WebView).\n\nHere are some example CSP declarations for your `.html` pages:\n\n <!-- Good default declaration:\n * gap: is required only on iOS (when using UIWebView) and is needed for JS->native communication\n * https://ssl.gstatic.com is required only on Android and is needed for TalkBack to function properly\n * Disables use of eval() and inline scripts in order to mitigate risk of XSS vulnerabilities. To change this:\n * Enable inline JS: add 'unsafe-inline' to default-src\n * Enable eval(): add 'unsafe-eval' to default-src\n -->\n <meta http-equiv=\"Content-Security-Policy\" content=\"default-src 'self' data: gap: https://ssl.gstatic.com; style-src 'self' 'unsafe-inline'; media-src *\">\n\n <!-- Allow everything but only from the same origin and foo.com -->\n <meta http-equiv=\"Content-Security-Policy\" content=\"default-src 'self' foo.com\">\n\n <!-- This policy allows everything (eg CSS, AJAX, object, frame, media, etc) except that \n * CSS only from the same origin and inline styles,\n * scripts only from the same origin and inline styles, and eval()\n -->\n <meta http-equiv=\"Content-Security-Policy\" content=\"default-src *; style-src 'self' 'unsafe-inline'; script-src 'self' 'unsafe-inline' 'unsafe-eval'\">\n\n <!-- Allows XHRs only over HTTPS on the same domain. -->\n <meta http-equiv=\"Content-Security-Policy\" content=\"default-src 'self' https:\">\n\n <!-- Allow iframe to https://cordova.apache.org/ -->\n <meta http-equiv=\"Content-Security-Policy\" content=\"default-src 'self'; frame-src 'self' https://cordova.apache.org\">\n",
  63. "readmeFilename": "README.md",
  64. "repository": {
  65. "type": "git",
  66. "url": "git+https://github.com/apache/cordova-plugin-whitelist.git"
  67. },
  68. "scripts": {
  69. "test": "echo \"no tests implemented for this plugin\""
  70. },
  71. "version": "1.3.4"
  72. }