1
0
Fork 0
mirror of https://github.com/denoland/deno.git synced 2024-11-01 09:24:20 -04:00
denoland-deno/cli/ops/permissions.rs

107 lines
3.1 KiB
Rust
Raw Normal View History

2020-01-02 15:13:47 -05:00
// Copyright 2018-2020 the Deno authors. All rights reserved. MIT license.
2019-08-26 08:50:21 -04:00
use super::dispatch_json::{Deserialize, JsonOp, Value};
use crate::fs as deno_fs;
use crate::op_error::OpError;
use crate::state::State;
use deno_core::*;
use std::path::Path;
pub fn init(i: &mut Isolate, s: &State) {
i.register_op(
2020-02-25 09:14:27 -05:00
"op_query_permission",
s.stateful_json_op(op_query_permission),
);
i.register_op(
2020-02-25 09:14:27 -05:00
"op_revoke_permission",
s.stateful_json_op(op_revoke_permission),
);
2019-11-11 10:33:29 -05:00
i.register_op(
2020-02-25 09:14:27 -05:00
"op_request_permission",
s.stateful_json_op(op_request_permission),
2019-11-11 10:33:29 -05:00
);
}
#[derive(Deserialize)]
struct PermissionArgs {
name: String,
url: Option<String>,
path: Option<String>,
}
fn resolve_path(path: &str) -> String {
deno_fs::resolve_from_cwd(Path::new(path))
.unwrap()
.to_str()
.unwrap()
.to_string()
}
pub fn op_query_permission(
state: &State,
args: Value,
2020-01-24 15:10:49 -05:00
_zero_copy: Option<ZeroCopyBuf>,
) -> Result<JsonOp, OpError> {
let args: PermissionArgs = serde_json::from_value(args)?;
let state = state.borrow();
2020-03-12 13:07:57 -04:00
let resolved_path = args.path.as_deref().map(resolve_path);
let perm = state.permissions.get_permission_state(
&args.name,
2020-03-12 13:07:57 -04:00
&args.url.as_deref(),
&resolved_path.as_deref().map(Path::new),
)?;
Ok(JsonOp::Sync(json!({ "state": perm.to_string() })))
}
pub fn op_revoke_permission(
state: &State,
2019-08-26 08:50:21 -04:00
args: Value,
2020-01-24 15:10:49 -05:00
_zero_copy: Option<ZeroCopyBuf>,
) -> Result<JsonOp, OpError> {
let args: PermissionArgs = serde_json::from_value(args)?;
let mut state = state.borrow_mut();
let permissions = &mut state.permissions;
match args.name.as_ref() {
"run" => permissions.allow_run.revoke(),
"read" => permissions.allow_read.revoke(),
"write" => permissions.allow_write.revoke(),
"net" => permissions.allow_net.revoke(),
"env" => permissions.allow_env.revoke(),
"plugin" => permissions.allow_plugin.revoke(),
"hrtime" => permissions.allow_hrtime.revoke(),
_ => {}
};
2020-03-12 13:07:57 -04:00
let resolved_path = args.path.as_deref().map(resolve_path);
let perm = permissions.get_permission_state(
&args.name,
2020-03-12 13:07:57 -04:00
&args.url.as_deref(),
&resolved_path.as_deref().map(Path::new),
)?;
Ok(JsonOp::Sync(json!({ "state": perm.to_string() })))
}
2019-11-11 10:33:29 -05:00
pub fn op_request_permission(
state: &State,
2019-11-11 10:33:29 -05:00
args: Value,
2020-01-24 15:10:49 -05:00
_zero_copy: Option<ZeroCopyBuf>,
) -> Result<JsonOp, OpError> {
2019-11-11 10:33:29 -05:00
let args: PermissionArgs = serde_json::from_value(args)?;
let mut state = state.borrow_mut();
let permissions = &mut state.permissions;
2020-03-12 13:07:57 -04:00
let resolved_path = args.path.as_deref().map(resolve_path);
2019-11-11 10:33:29 -05:00
let perm = match args.name.as_ref() {
"run" => Ok(permissions.request_run()),
2020-03-12 13:07:57 -04:00
"read" => {
Ok(permissions.request_read(&resolved_path.as_deref().map(Path::new)))
}
"write" => {
Ok(permissions.request_write(&resolved_path.as_deref().map(Path::new)))
}
"net" => permissions.request_net(&args.url.as_deref()),
"env" => Ok(permissions.request_env()),
"plugin" => Ok(permissions.request_plugin()),
"hrtime" => Ok(permissions.request_hrtime()),
n => Err(OpError::other(format!("No such permission name: {}", n))),
2019-11-11 10:33:29 -05:00
}?;
Ok(JsonOp::Sync(json!({ "state": perm.to_string() })))
}