2024-01-01 14:58:21 -05:00
|
|
|
// Copyright 2018-2024 the Deno authors. All rights reserved. MIT license.
|
2020-09-05 20:34:02 -04:00
|
|
|
|
2024-03-12 13:42:26 -04:00
|
|
|
use ::deno_permissions::PermissionState;
|
|
|
|
use ::deno_permissions::PermissionsContainer;
|
2023-09-11 18:10:43 -04:00
|
|
|
use deno_core::op2;
|
2020-09-10 09:57:45 -04:00
|
|
|
use deno_core::OpState;
|
2020-09-16 12:43:08 -04:00
|
|
|
use serde::Deserialize;
|
2023-08-03 07:19:19 -04:00
|
|
|
use serde::Serialize;
|
2019-08-14 11:03:02 -04:00
|
|
|
|
2023-03-17 14:22:15 -04:00
|
|
|
deno_core::extension!(
|
|
|
|
deno_permissions,
|
|
|
|
ops = [
|
|
|
|
op_query_permission,
|
|
|
|
op_revoke_permission,
|
|
|
|
op_request_permission,
|
2023-03-18 18:30:04 -04:00
|
|
|
],
|
2023-03-17 14:22:15 -04:00
|
|
|
);
|
2019-10-11 14:41:54 -04:00
|
|
|
|
2019-10-27 11:22:53 -04:00
|
|
|
#[derive(Deserialize)]
|
2021-03-18 14:42:01 -04:00
|
|
|
pub struct PermissionArgs {
|
2019-10-27 11:22:53 -04:00
|
|
|
name: String,
|
|
|
|
path: Option<String>,
|
2020-12-30 17:35:28 -05:00
|
|
|
host: Option<String>,
|
2021-04-13 07:25:21 -04:00
|
|
|
variable: Option<String>,
|
2022-09-28 08:46:50 -04:00
|
|
|
kind: Option<String>,
|
2021-04-09 18:12:00 -04:00
|
|
|
command: Option<String>,
|
2019-10-27 11:22:53 -04:00
|
|
|
}
|
|
|
|
|
2023-08-03 07:19:19 -04:00
|
|
|
#[derive(Serialize)]
|
|
|
|
pub struct PermissionStatus {
|
|
|
|
state: String,
|
|
|
|
partial: bool,
|
|
|
|
}
|
|
|
|
|
|
|
|
impl From<PermissionState> for PermissionStatus {
|
|
|
|
fn from(state: PermissionState) -> Self {
|
|
|
|
PermissionStatus {
|
|
|
|
state: if state == PermissionState::GrantedPartial {
|
|
|
|
PermissionState::Granted.to_string()
|
|
|
|
} else {
|
|
|
|
state.to_string()
|
|
|
|
},
|
|
|
|
partial: state == PermissionState::GrantedPartial,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2024-11-04 12:17:21 -05:00
|
|
|
#[derive(Debug, thiserror::Error)]
|
|
|
|
pub enum PermissionError {
|
|
|
|
#[error("No such permission name: {0}")]
|
|
|
|
InvalidPermissionName(String),
|
|
|
|
#[error("{0}")]
|
|
|
|
PathResolve(#[from] ::deno_permissions::PathResolveError),
|
|
|
|
#[error("{0}")]
|
|
|
|
NetDescriptorParse(#[from] ::deno_permissions::NetDescriptorParseError),
|
|
|
|
#[error("{0}")]
|
|
|
|
SysDescriptorParse(#[from] ::deno_permissions::SysDescriptorParseError),
|
|
|
|
#[error("{0}")]
|
|
|
|
RunDescriptorParse(#[from] ::deno_permissions::RunDescriptorParseError),
|
|
|
|
}
|
|
|
|
|
2023-09-11 18:10:43 -04:00
|
|
|
#[op2]
|
|
|
|
#[serde]
|
2019-10-27 11:22:53 -04:00
|
|
|
pub fn op_query_permission(
|
2020-09-10 09:57:45 -04:00
|
|
|
state: &mut OpState,
|
2023-09-11 18:10:43 -04:00
|
|
|
#[serde] args: PermissionArgs,
|
2024-11-04 12:17:21 -05:00
|
|
|
) -> Result<PermissionStatus, PermissionError> {
|
2024-09-30 09:19:24 -04:00
|
|
|
let permissions = state.borrow::<PermissionsContainer>();
|
2020-08-18 16:29:32 -04:00
|
|
|
let perm = match args.name.as_ref() {
|
2024-09-30 09:19:24 -04:00
|
|
|
"read" => permissions.query_read(args.path.as_deref())?,
|
|
|
|
"write" => permissions.query_write(args.path.as_deref())?,
|
|
|
|
"net" => permissions.query_net(args.host.as_deref())?,
|
|
|
|
"env" => permissions.query_env(args.variable.as_deref()),
|
|
|
|
"sys" => permissions.query_sys(args.kind.as_deref())?,
|
|
|
|
"run" => permissions.query_run(args.command.as_deref())?,
|
|
|
|
"ffi" => permissions.query_ffi(args.path.as_deref())?,
|
2024-11-04 12:17:21 -05:00
|
|
|
_ => return Err(PermissionError::InvalidPermissionName(args.name)),
|
2020-08-18 16:29:32 -04:00
|
|
|
};
|
2023-08-03 07:19:19 -04:00
|
|
|
Ok(PermissionStatus::from(perm))
|
2019-08-14 11:03:02 -04:00
|
|
|
}
|
|
|
|
|
2023-09-11 18:10:43 -04:00
|
|
|
#[op2]
|
|
|
|
#[serde]
|
2019-08-14 11:03:02 -04:00
|
|
|
pub fn op_revoke_permission(
|
2020-09-10 09:57:45 -04:00
|
|
|
state: &mut OpState,
|
2023-09-11 18:10:43 -04:00
|
|
|
#[serde] args: PermissionArgs,
|
2024-11-04 12:17:21 -05:00
|
|
|
) -> Result<PermissionStatus, PermissionError> {
|
2024-09-30 09:19:24 -04:00
|
|
|
let permissions = state.borrow::<PermissionsContainer>();
|
2020-08-18 16:29:32 -04:00
|
|
|
let perm = match args.name.as_ref() {
|
2024-09-30 09:19:24 -04:00
|
|
|
"read" => permissions.revoke_read(args.path.as_deref())?,
|
|
|
|
"write" => permissions.revoke_write(args.path.as_deref())?,
|
|
|
|
"net" => permissions.revoke_net(args.host.as_deref())?,
|
|
|
|
"env" => permissions.revoke_env(args.variable.as_deref()),
|
|
|
|
"sys" => permissions.revoke_sys(args.kind.as_deref())?,
|
|
|
|
"run" => permissions.revoke_run(args.command.as_deref())?,
|
|
|
|
"ffi" => permissions.revoke_ffi(args.path.as_deref())?,
|
2024-11-04 12:17:21 -05:00
|
|
|
_ => return Err(PermissionError::InvalidPermissionName(args.name)),
|
2020-08-18 16:29:32 -04:00
|
|
|
};
|
2023-08-03 07:19:19 -04:00
|
|
|
Ok(PermissionStatus::from(perm))
|
2019-08-14 11:03:02 -04:00
|
|
|
}
|
2019-11-11 10:33:29 -05:00
|
|
|
|
2024-11-20 16:24:04 -05:00
|
|
|
#[op2(stack_trace)]
|
2023-09-11 18:10:43 -04:00
|
|
|
#[serde]
|
2019-11-11 10:33:29 -05:00
|
|
|
pub fn op_request_permission(
|
2020-09-10 09:57:45 -04:00
|
|
|
state: &mut OpState,
|
2023-09-11 18:10:43 -04:00
|
|
|
#[serde] args: PermissionArgs,
|
2024-11-04 12:17:21 -05:00
|
|
|
) -> Result<PermissionStatus, PermissionError> {
|
2024-09-30 09:19:24 -04:00
|
|
|
let permissions = state.borrow::<PermissionsContainer>();
|
2019-11-11 10:33:29 -05:00
|
|
|
let perm = match args.name.as_ref() {
|
2024-09-30 09:19:24 -04:00
|
|
|
"read" => permissions.request_read(args.path.as_deref())?,
|
|
|
|
"write" => permissions.request_write(args.path.as_deref())?,
|
|
|
|
"net" => permissions.request_net(args.host.as_deref())?,
|
|
|
|
"env" => permissions.request_env(args.variable.as_deref()),
|
|
|
|
"sys" => permissions.request_sys(args.kind.as_deref())?,
|
|
|
|
"run" => permissions.request_run(args.command.as_deref())?,
|
|
|
|
"ffi" => permissions.request_ffi(args.path.as_deref())?,
|
2024-11-04 12:17:21 -05:00
|
|
|
_ => return Err(PermissionError::InvalidPermissionName(args.name)),
|
2020-08-18 16:29:32 -04:00
|
|
|
};
|
2023-08-03 07:19:19 -04:00
|
|
|
Ok(PermissionStatus::from(perm))
|
2019-11-11 10:33:29 -05:00
|
|
|
}
|