1
0
Fork 0
mirror of https://github.com/denoland/deno.git synced 2024-12-02 17:01:14 -05:00
denoland-deno/cli/ops/permissions.rs

95 lines
2.9 KiB
Rust
Raw Normal View History

2020-01-02 15:13:47 -05:00
// Copyright 2018-2020 the Deno authors. All rights reserved. MIT license.
2019-08-26 08:50:21 -04:00
use super::dispatch_json::{Deserialize, JsonOp, Value};
use crate::op_error::OpError;
use crate::state::State;
use deno_core::CoreIsolate;
use deno_core::ZeroCopyBuf;
use std::path::Path;
pub fn init(i: &mut CoreIsolate, s: &State) {
i.register_op(
2020-02-25 09:14:27 -05:00
"op_query_permission",
s.stateful_json_op(op_query_permission),
);
i.register_op(
2020-02-25 09:14:27 -05:00
"op_revoke_permission",
s.stateful_json_op(op_revoke_permission),
);
2019-11-11 10:33:29 -05:00
i.register_op(
2020-02-25 09:14:27 -05:00
"op_request_permission",
s.stateful_json_op(op_request_permission),
2019-11-11 10:33:29 -05:00
);
}
#[derive(Deserialize)]
struct PermissionArgs {
name: String,
url: Option<String>,
path: Option<String>,
}
pub fn op_query_permission(
state: &State,
args: Value,
_zero_copy: &mut [ZeroCopyBuf],
) -> Result<JsonOp, OpError> {
let args: PermissionArgs = serde_json::from_value(args)?;
let state = state.borrow();
let path = args.path.as_deref();
let perm = state.permissions.get_permission_state(
&args.name,
2020-03-12 13:07:57 -04:00
&args.url.as_deref(),
&path.as_deref().map(Path::new),
)?;
Ok(JsonOp::Sync(json!({ "state": perm.to_string() })))
}
pub fn op_revoke_permission(
state: &State,
2019-08-26 08:50:21 -04:00
args: Value,
_zero_copy: &mut [ZeroCopyBuf],
) -> Result<JsonOp, OpError> {
let args: PermissionArgs = serde_json::from_value(args)?;
let mut state = state.borrow_mut();
let permissions = &mut state.permissions;
match args.name.as_ref() {
"run" => permissions.allow_run.revoke(),
"read" => permissions.allow_read.revoke(),
"write" => permissions.allow_write.revoke(),
"net" => permissions.allow_net.revoke(),
"env" => permissions.allow_env.revoke(),
"plugin" => permissions.allow_plugin.revoke(),
"hrtime" => permissions.allow_hrtime.revoke(),
_ => {}
};
let path = args.path.as_deref();
let perm = permissions.get_permission_state(
&args.name,
2020-03-12 13:07:57 -04:00
&args.url.as_deref(),
&path.as_deref().map(Path::new),
)?;
Ok(JsonOp::Sync(json!({ "state": perm.to_string() })))
}
2019-11-11 10:33:29 -05:00
pub fn op_request_permission(
state: &State,
2019-11-11 10:33:29 -05:00
args: Value,
_zero_copy: &mut [ZeroCopyBuf],
) -> Result<JsonOp, OpError> {
2019-11-11 10:33:29 -05:00
let args: PermissionArgs = serde_json::from_value(args)?;
let mut state = state.borrow_mut();
let permissions = &mut state.permissions;
let path = args.path.as_deref();
2019-11-11 10:33:29 -05:00
let perm = match args.name.as_ref() {
"run" => Ok(permissions.request_run()),
"read" => Ok(permissions.request_read(&path.as_deref().map(Path::new))),
"write" => Ok(permissions.request_write(&path.as_deref().map(Path::new))),
2020-03-12 13:07:57 -04:00
"net" => permissions.request_net(&args.url.as_deref()),
"env" => Ok(permissions.request_env()),
"plugin" => Ok(permissions.request_plugin()),
"hrtime" => Ok(permissions.request_hrtime()),
n => Err(OpError::other(format!("No such permission name: {}", n))),
2019-11-11 10:33:29 -05:00
}?;
Ok(JsonOp::Sync(json!({ "state": perm.to_string() })))
}