1
0
Fork 0
mirror of https://github.com/denoland/deno.git synced 2024-12-26 00:59:24 -05:00

refactor(permissions): factor out PermissionPrompter trait, add callbacks (#16975)

This commit refactors several things in "runtime/permissions" module:
- splits it into "mod.rs" and "prompter.rs"
- adds "PermissionPrompter" trait with two implementations:
 * "TtyPrompter"
 * "TestPrompter"
- adds "before" and "after" prompt callback which can be used to hide
progress bar in the CLI (to be done in a follow up)
- "permissions_prompt" API returns "PromptResponse" enum, instead
of a boolean; this allows to add "allow all"/"deny all" functionality
for the prompt
This commit is contained in:
Bartek Iwańczuk 2022-12-18 01:12:28 +01:00
parent 7095cc6b50
commit 3eb366093e
No known key found for this signature in database
GPG key ID: 0C6BCDDC3B3AD750
2 changed files with 419 additions and 297 deletions

View file

@ -6,8 +6,6 @@ use deno_core::error::custom_error;
use deno_core::error::type_error; use deno_core::error::type_error;
use deno_core::error::uri_error; use deno_core::error::uri_error;
use deno_core::error::AnyError; use deno_core::error::AnyError;
#[cfg(test)]
use deno_core::parking_lot::Mutex;
use deno_core::serde::de; use deno_core::serde::de;
use deno_core::serde::Deserialize; use deno_core::serde::Deserialize;
use deno_core::serde::Deserializer; use deno_core::serde::Deserializer;
@ -24,12 +22,14 @@ use std::hash::Hash;
use std::path::{Path, PathBuf}; use std::path::{Path, PathBuf};
use std::str::FromStr; use std::str::FromStr;
use std::string::ToString; use std::string::ToString;
#[cfg(test)]
use std::sync::atomic::AtomicBool;
#[cfg(test)]
use std::sync::atomic::Ordering;
const PERMISSION_EMOJI: &str = "⚠️"; mod prompter;
use prompter::permission_prompt;
use prompter::PromptResponse;
use prompter::PERMISSION_EMOJI;
pub use prompter::set_prompt_callbacks;
pub use prompter::PromptCallback;
static DEBUG_LOG_ENABLED: Lazy<bool> = static DEBUG_LOG_ENABLED: Lazy<bool> =
Lazy::new(|| log::log_enabled!(log::Level::Debug)); Lazy::new(|| log::log_enabled!(log::Level::Debug));
@ -110,7 +110,7 @@ impl PermissionState {
name, name,
info().map_or(String::new(), |info| { format!(" to {}", info) }), info().map_or(String::new(), |info| { format!(" to {}", info) }),
); );
if permission_prompt(&msg, name, api_name) { if PromptResponse::Allow == permission_prompt(&msg, name, api_name) {
Self::log_perm_access(name, info); Self::log_perm_access(name, info);
(Ok(()), true) (Ok(()), true)
} else { } else {
@ -153,11 +153,13 @@ impl UnitPermission {
pub fn request(&mut self) -> PermissionState { pub fn request(&mut self) -> PermissionState {
if self.state == PermissionState::Prompt { if self.state == PermissionState::Prompt {
if permission_prompt( if PromptResponse::Allow
&format!("access to {}", self.description), == permission_prompt(
self.name, &format!("access to {}", self.description),
Some("Deno.permissions.query()"), self.name,
) { Some("Deno.permissions.query()"),
)
{
self.state = PermissionState::Granted; self.state = PermissionState::Granted;
} else { } else {
self.state = PermissionState::Denied; self.state = PermissionState::Denied;
@ -352,11 +354,13 @@ impl UnaryPermission<ReadDescriptor> {
let (resolved_path, display_path) = resolved_and_display_path(path); let (resolved_path, display_path) = resolved_and_display_path(path);
let state = self.query(Some(&resolved_path)); let state = self.query(Some(&resolved_path));
if state == PermissionState::Prompt { if state == PermissionState::Prompt {
if permission_prompt( if PromptResponse::Allow
&format!("read access to \"{}\"", display_path.display()), == permission_prompt(
self.name, &format!("read access to \"{}\"", display_path.display()),
Some("Deno.permissions.query()"), self.name,
) { Some("Deno.permissions.query()"),
)
{
self.granted_list.insert(ReadDescriptor(resolved_path)); self.granted_list.insert(ReadDescriptor(resolved_path));
PermissionState::Granted PermissionState::Granted
} else { } else {
@ -373,11 +377,13 @@ impl UnaryPermission<ReadDescriptor> {
} else { } else {
let state = self.query(None); let state = self.query(None);
if state == PermissionState::Prompt { if state == PermissionState::Prompt {
if permission_prompt( if PromptResponse::Allow
"read access", == permission_prompt(
self.name, "read access",
Some("Deno.permissions.query()"), self.name,
) { Some("Deno.permissions.query()"),
)
{
self.granted_list.clear(); self.granted_list.clear();
self.global_state = PermissionState::Granted; self.global_state = PermissionState::Granted;
PermissionState::Granted PermissionState::Granted
@ -521,11 +527,13 @@ impl UnaryPermission<WriteDescriptor> {
let (resolved_path, display_path) = resolved_and_display_path(path); let (resolved_path, display_path) = resolved_and_display_path(path);
let state = self.query(Some(&resolved_path)); let state = self.query(Some(&resolved_path));
if state == PermissionState::Prompt { if state == PermissionState::Prompt {
if permission_prompt( if PromptResponse::Allow
&format!("write access to \"{}\"", display_path.display()), == permission_prompt(
self.name, &format!("write access to \"{}\"", display_path.display()),
Some("Deno.permissions.query()"), self.name,
) { Some("Deno.permissions.query()"),
)
{
self.granted_list.insert(WriteDescriptor(resolved_path)); self.granted_list.insert(WriteDescriptor(resolved_path));
PermissionState::Granted PermissionState::Granted
} else { } else {
@ -542,11 +550,13 @@ impl UnaryPermission<WriteDescriptor> {
} else { } else {
let state = self.query(None); let state = self.query(None);
if state == PermissionState::Prompt { if state == PermissionState::Prompt {
if permission_prompt( if PromptResponse::Allow
"write access", == permission_prompt(
self.name, "write access",
Some("Deno.permissions.query()"), self.name,
) { Some("Deno.permissions.query()"),
)
{
self.granted_list.clear(); self.granted_list.clear();
self.global_state = PermissionState::Granted; self.global_state = PermissionState::Granted;
PermissionState::Granted PermissionState::Granted
@ -672,11 +682,13 @@ impl UnaryPermission<NetDescriptor> {
let state = self.query(Some(host)); let state = self.query(Some(host));
let host = NetDescriptor::new(&host); let host = NetDescriptor::new(&host);
if state == PermissionState::Prompt { if state == PermissionState::Prompt {
if permission_prompt( if PromptResponse::Allow
&format!("network access to \"{}\"", host), == permission_prompt(
self.name, &format!("network access to \"{}\"", host),
Some("Deno.permissions.query()"), self.name,
) { Some("Deno.permissions.query()"),
)
{
self.granted_list.insert(host); self.granted_list.insert(host);
PermissionState::Granted PermissionState::Granted
} else { } else {
@ -693,11 +705,13 @@ impl UnaryPermission<NetDescriptor> {
} else { } else {
let state = self.query::<&str>(None); let state = self.query::<&str>(None);
if state == PermissionState::Prompt { if state == PermissionState::Prompt {
if permission_prompt( if PromptResponse::Allow
"network access", == permission_prompt(
self.name, "network access",
Some("Deno.permissions.query()"), self.name,
) { Some("Deno.permissions.query()"),
)
{
self.granted_list.clear(); self.granted_list.clear();
self.global_state = PermissionState::Granted; self.global_state = PermissionState::Granted;
PermissionState::Granted PermissionState::Granted
@ -842,11 +856,13 @@ impl UnaryPermission<EnvDescriptor> {
if let Some(env) = env { if let Some(env) = env {
let state = self.query(Some(env)); let state = self.query(Some(env));
if state == PermissionState::Prompt { if state == PermissionState::Prompt {
if permission_prompt( if PromptResponse::Allow
&format!("env access to \"{}\"", env), == permission_prompt(
self.name, &format!("env access to \"{}\"", env),
Some("Deno.permissions.query()"), self.name,
) { Some("Deno.permissions.query()"),
)
{
self.granted_list.insert(EnvDescriptor::new(env)); self.granted_list.insert(EnvDescriptor::new(env));
PermissionState::Granted PermissionState::Granted
} else { } else {
@ -863,11 +879,13 @@ impl UnaryPermission<EnvDescriptor> {
} else { } else {
let state = self.query(None); let state = self.query(None);
if state == PermissionState::Prompt { if state == PermissionState::Prompt {
if permission_prompt( if PromptResponse::Allow
"env access", == permission_prompt(
self.name, "env access",
Some("Deno.permissions.query()"), self.name,
) { Some("Deno.permissions.query()"),
)
{
self.granted_list.clear(); self.granted_list.clear();
self.global_state = PermissionState::Granted; self.global_state = PermissionState::Granted;
PermissionState::Granted PermissionState::Granted
@ -972,11 +990,13 @@ impl UnaryPermission<SysDescriptor> {
} }
if let Some(kind) = kind { if let Some(kind) = kind {
let desc = SysDescriptor(kind.to_string()); let desc = SysDescriptor(kind.to_string());
if permission_prompt( if PromptResponse::Allow
&format!("sys access to \"{}\"", kind), == permission_prompt(
self.name, &format!("sys access to \"{}\"", kind),
Some("Deno.permissions.query()"), self.name,
) { Some("Deno.permissions.query()"),
)
{
self.granted_list.insert(desc); self.granted_list.insert(desc);
PermissionState::Granted PermissionState::Granted
} else { } else {
@ -985,11 +1005,13 @@ impl UnaryPermission<SysDescriptor> {
PermissionState::Denied PermissionState::Denied
} }
} else { } else {
if permission_prompt( if PromptResponse::Allow
"sys access", == permission_prompt(
self.name, "sys access",
Some("Deno.permissions.query()"), self.name,
) { Some("Deno.permissions.query()"),
)
{
self.global_state = PermissionState::Granted; self.global_state = PermissionState::Granted;
} else { } else {
self.granted_list.clear(); self.granted_list.clear();
@ -1091,11 +1113,13 @@ impl UnaryPermission<RunDescriptor> {
if let Some(cmd) = cmd { if let Some(cmd) = cmd {
let state = self.query(Some(cmd)); let state = self.query(Some(cmd));
if state == PermissionState::Prompt { if state == PermissionState::Prompt {
if permission_prompt( if PromptResponse::Allow
&format!("run access to \"{}\"", cmd), == permission_prompt(
self.name, &format!("run access to \"{}\"", cmd),
Some("Deno.permissions.query()"), self.name,
) { Some("Deno.permissions.query()"),
)
{
self self
.granted_list .granted_list
.insert(RunDescriptor::from_str(cmd).unwrap()); .insert(RunDescriptor::from_str(cmd).unwrap());
@ -1118,11 +1142,13 @@ impl UnaryPermission<RunDescriptor> {
} else { } else {
let state = self.query(None); let state = self.query(None);
if state == PermissionState::Prompt { if state == PermissionState::Prompt {
if permission_prompt( if PromptResponse::Allow
"run access", == permission_prompt(
self.name, "run access",
Some("Deno.permissions.query()"), self.name,
) { Some("Deno.permissions.query()"),
)
{
self.granted_list.clear(); self.granted_list.clear();
self.global_state = PermissionState::Granted; self.global_state = PermissionState::Granted;
PermissionState::Granted PermissionState::Granted
@ -1238,11 +1264,13 @@ impl UnaryPermission<FfiDescriptor> {
let (resolved_path, display_path) = resolved_and_display_path(path); let (resolved_path, display_path) = resolved_and_display_path(path);
let state = self.query(Some(&resolved_path)); let state = self.query(Some(&resolved_path));
if state == PermissionState::Prompt { if state == PermissionState::Prompt {
if permission_prompt( if PromptResponse::Allow
&format!("ffi access to \"{}\"", display_path.display()), == permission_prompt(
self.name, &format!("ffi access to \"{}\"", display_path.display()),
Some("Deno.permissions.query()"), self.name,
) { Some("Deno.permissions.query()"),
)
{
self.granted_list.insert(FfiDescriptor(resolved_path)); self.granted_list.insert(FfiDescriptor(resolved_path));
PermissionState::Granted PermissionState::Granted
} else { } else {
@ -1259,11 +1287,13 @@ impl UnaryPermission<FfiDescriptor> {
} else { } else {
let state = self.query(None); let state = self.query(None);
if state == PermissionState::Prompt { if state == PermissionState::Prompt {
if permission_prompt( if PromptResponse::Allow
"ffi access", == permission_prompt(
self.name, "ffi access",
Some("Deno.permissions.query()"), self.name,
) { Some("Deno.permissions.query()"),
)
{
self.granted_list.clear(); self.granted_list.clear();
self.global_state = PermissionState::Granted; self.global_state = PermissionState::Granted;
PermissionState::Granted PermissionState::Granted
@ -2262,225 +2292,12 @@ pub fn create_child_permissions(
Ok(worker_perms) Ok(worker_perms)
} }
/// Shows the permission prompt and returns the answer according to the user input.
/// This loops until the user gives the proper input.
#[cfg(not(test))]
fn permission_prompt(
message: &str,
name: &str,
api_name: Option<&str>,
) -> bool {
if !atty::is(atty::Stream::Stdin) || !atty::is(atty::Stream::Stderr) {
return false;
};
#[cfg(unix)]
fn clear_stdin() -> Result<(), AnyError> {
// TODO(bartlomieju):
#[allow(clippy::undocumented_unsafe_blocks)]
let r = unsafe { libc::tcflush(0, libc::TCIFLUSH) };
assert_eq!(r, 0);
Ok(())
}
#[cfg(not(unix))]
fn clear_stdin() -> Result<(), AnyError> {
use deno_core::anyhow::bail;
use winapi::shared::minwindef::TRUE;
use winapi::shared::minwindef::UINT;
use winapi::shared::minwindef::WORD;
use winapi::shared::ntdef::WCHAR;
use winapi::um::processenv::GetStdHandle;
use winapi::um::winbase::STD_INPUT_HANDLE;
use winapi::um::wincon::FlushConsoleInputBuffer;
use winapi::um::wincon::PeekConsoleInputW;
use winapi::um::wincon::WriteConsoleInputW;
use winapi::um::wincontypes::INPUT_RECORD;
use winapi::um::wincontypes::KEY_EVENT;
use winapi::um::winnt::HANDLE;
use winapi::um::winuser::MapVirtualKeyW;
use winapi::um::winuser::MAPVK_VK_TO_VSC;
use winapi::um::winuser::VK_RETURN;
// SAFETY: winapi calls
unsafe {
let stdin = GetStdHandle(STD_INPUT_HANDLE);
// emulate an enter key press to clear any line buffered console characters
emulate_enter_key_press(stdin)?;
// read the buffered line or enter key press
read_stdin_line()?;
// check if our emulated key press was executed
if is_input_buffer_empty(stdin)? {
// if so, move the cursor up to prevent a blank line
move_cursor_up()?;
} else {
// the emulated key press is still pending, so a buffered line was read
// and we can flush the emulated key press
flush_input_buffer(stdin)?;
}
}
return Ok(());
unsafe fn flush_input_buffer(stdin: HANDLE) -> Result<(), AnyError> {
let success = FlushConsoleInputBuffer(stdin);
if success != TRUE {
bail!(
"Could not flush the console input buffer: {}",
std::io::Error::last_os_error()
)
}
Ok(())
}
unsafe fn emulate_enter_key_press(stdin: HANDLE) -> Result<(), AnyError> {
// https://github.com/libuv/libuv/blob/a39009a5a9252a566ca0704d02df8dabc4ce328f/src/win/tty.c#L1121-L1131
let mut input_record: INPUT_RECORD = std::mem::zeroed();
input_record.EventType = KEY_EVENT;
input_record.Event.KeyEvent_mut().bKeyDown = TRUE;
input_record.Event.KeyEvent_mut().wRepeatCount = 1;
input_record.Event.KeyEvent_mut().wVirtualKeyCode = VK_RETURN as WORD;
input_record.Event.KeyEvent_mut().wVirtualScanCode =
MapVirtualKeyW(VK_RETURN as UINT, MAPVK_VK_TO_VSC) as WORD;
*input_record.Event.KeyEvent_mut().uChar.UnicodeChar_mut() =
'\r' as WCHAR;
let mut record_written = 0;
let success =
WriteConsoleInputW(stdin, &input_record, 1, &mut record_written);
if success != TRUE {
bail!(
"Could not emulate enter key press: {}",
std::io::Error::last_os_error()
);
}
Ok(())
}
unsafe fn is_input_buffer_empty(stdin: HANDLE) -> Result<bool, AnyError> {
let mut buffer = Vec::with_capacity(1);
let mut events_read = 0;
let success =
PeekConsoleInputW(stdin, buffer.as_mut_ptr(), 1, &mut events_read);
if success != TRUE {
bail!(
"Could not peek the console input buffer: {}",
std::io::Error::last_os_error()
)
}
Ok(events_read == 0)
}
fn move_cursor_up() -> Result<(), AnyError> {
use std::io::Write;
write!(std::io::stderr(), "\x1B[1A")?;
Ok(())
}
fn read_stdin_line() -> Result<(), AnyError> {
let mut input = String::new();
let stdin = std::io::stdin();
stdin.read_line(&mut input)?;
Ok(())
}
}
// Clear n-lines in terminal and move cursor to the beginning of the line.
fn clear_n_lines(n: usize) {
eprint!("\x1B[{}A\x1B[0J", n);
}
// For security reasons we must consume everything in stdin so that previously
// buffered data cannot effect the prompt.
if let Err(err) = clear_stdin() {
eprintln!("Error clearing stdin for permission prompt. {:#}", err);
return false; // don't grant permission if this fails
}
// print to stderr so that if stdout is piped this is still displayed.
const OPTS: &str = "[y/n] (y = yes, allow; n = no, deny)";
eprint!("{}", PERMISSION_EMOJI);
eprint!("{}", colors::bold("Deno requests "));
eprint!("{}", colors::bold(message));
eprintln!("{}", colors::bold("."));
if let Some(api_name) = api_name {
eprintln!(" ├ Requested by `{}` API", api_name);
}
let msg = format!(
" ├ Run again with --allow-{} to bypass this prompt.",
name
);
eprintln!("{}", colors::italic(&msg));
eprint!("{}", colors::bold("Allow?"));
eprint!(" {} > ", OPTS);
loop {
let mut input = String::new();
let stdin = std::io::stdin();
let result = stdin.read_line(&mut input);
if result.is_err() {
return false;
};
let ch = match input.chars().next() {
None => return false,
Some(v) => v,
};
match ch.to_ascii_lowercase() {
'y' => {
clear_n_lines(if api_name.is_some() { 4 } else { 3 });
let msg = format!("Granted {}.", message);
eprintln!("{}", colors::bold(&msg));
return true;
}
'n' => {
clear_n_lines(if api_name.is_some() { 4 } else { 3 });
let msg = format!("Denied {}.", message);
eprintln!("{}", colors::bold(&msg));
return false;
}
_ => {
// If we don't get a recognized option try again.
clear_n_lines(1);
eprint!("{}", colors::bold("Unrecognized option. Allow?"));
eprint!(" {} > ", OPTS);
}
};
}
}
// When testing, permission prompt returns the value of STUB_PROMPT_VALUE
// which we set from the test functions.
#[cfg(test)]
fn permission_prompt(
_message: &str,
_flag: &str,
_api_name: Option<&str>,
) -> bool {
STUB_PROMPT_VALUE.load(Ordering::SeqCst)
}
#[cfg(test)]
static STUB_PROMPT_VALUE: AtomicBool = AtomicBool::new(true);
#[cfg(test)]
static PERMISSION_PROMPT_STUB_VALUE_SETTER: Lazy<
Mutex<PermissionPromptStubValueSetter>,
> = Lazy::new(|| Mutex::new(PermissionPromptStubValueSetter));
#[cfg(test)]
struct PermissionPromptStubValueSetter;
#[cfg(test)]
impl PermissionPromptStubValueSetter {
pub fn set(&self, value: bool) {
STUB_PROMPT_VALUE.store(value, Ordering::SeqCst);
}
}
#[cfg(test)] #[cfg(test)]
mod tests { mod tests {
use super::*; use super::*;
use deno_core::resolve_url_or_path; use deno_core::resolve_url_or_path;
use deno_core::serde_json::json; use deno_core::serde_json::json;
use prompter::tests::*;
// Creates vector of strings, Vec<String> // Creates vector of strings, Vec<String>
macro_rules! svec { macro_rules! svec {
@ -2489,6 +2306,7 @@ mod tests {
#[test] #[test]
fn check_paths() { fn check_paths() {
set_prompter(Box::new(TestPrompter));
let allowlist = vec![ let allowlist = vec![
PathBuf::from("/a/specific/dir/name"), PathBuf::from("/a/specific/dir/name"),
PathBuf::from("/a/specific"), PathBuf::from("/a/specific"),
@ -2590,6 +2408,7 @@ mod tests {
#[test] #[test]
fn test_check_net_with_values() { fn test_check_net_with_values() {
set_prompter(Box::new(TestPrompter));
let mut perms = Permissions::from_options(&PermissionsOptions { let mut perms = Permissions::from_options(&PermissionsOptions {
allow_net: Some(svec![ allow_net: Some(svec![
"localhost", "localhost",
@ -2633,6 +2452,7 @@ mod tests {
#[test] #[test]
fn test_check_net_only_flag() { fn test_check_net_only_flag() {
set_prompter(Box::new(TestPrompter));
let mut perms = Permissions::from_options(&PermissionsOptions { let mut perms = Permissions::from_options(&PermissionsOptions {
allow_net: Some(svec![]), // this means `--allow-net` is present without values following `=` sign allow_net: Some(svec![]), // this means `--allow-net` is present without values following `=` sign
..Default::default() ..Default::default()
@ -2668,6 +2488,7 @@ mod tests {
#[test] #[test]
fn test_check_net_no_flag() { fn test_check_net_no_flag() {
set_prompter(Box::new(TestPrompter));
let mut perms = Permissions::from_options(&PermissionsOptions { let mut perms = Permissions::from_options(&PermissionsOptions {
allow_net: None, allow_net: None,
..Default::default() ..Default::default()
@ -2763,6 +2584,7 @@ mod tests {
#[test] #[test]
fn check_specifiers() { fn check_specifiers() {
set_prompter(Box::new(TestPrompter));
let read_allowlist = if cfg!(target_os = "windows") { let read_allowlist = if cfg!(target_os = "windows") {
vec![PathBuf::from("C:\\a")] vec![PathBuf::from("C:\\a")]
} else { } else {
@ -2807,6 +2629,7 @@ mod tests {
#[test] #[test]
fn check_invalid_specifiers() { fn check_invalid_specifiers() {
set_prompter(Box::new(TestPrompter));
let mut perms = Permissions::allow_all(); let mut perms = Permissions::allow_all();
let mut test_cases = vec![]; let mut test_cases = vec![];
@ -2827,6 +2650,7 @@ mod tests {
#[test] #[test]
fn test_query() { fn test_query() {
set_prompter(Box::new(TestPrompter));
let perms1 = Permissions::allow_all(); let perms1 = Permissions::allow_all();
let perms2 = Permissions { let perms2 = Permissions {
read: UnaryPermission { read: UnaryPermission {
@ -2906,6 +2730,7 @@ mod tests {
#[test] #[test]
fn test_request() { fn test_request() {
set_prompter(Box::new(TestPrompter));
let mut perms: Permissions = Default::default(); let mut perms: Permissions = Default::default();
#[rustfmt::skip] #[rustfmt::skip]
{ {
@ -2953,6 +2778,7 @@ mod tests {
#[test] #[test]
fn test_revoke() { fn test_revoke() {
set_prompter(Box::new(TestPrompter));
let mut perms = Permissions { let mut perms = Permissions {
read: UnaryPermission { read: UnaryPermission {
global_state: PermissionState::Prompt, global_state: PermissionState::Prompt,
@ -3026,6 +2852,7 @@ mod tests {
#[test] #[test]
fn test_check() { fn test_check() {
set_prompter(Box::new(TestPrompter));
let mut perms = Permissions { let mut perms = Permissions {
read: Permissions::new_read(&None, true).unwrap(), read: Permissions::new_read(&None, true).unwrap(),
write: Permissions::new_write(&None, true).unwrap(), write: Permissions::new_write(&None, true).unwrap(),
@ -3089,6 +2916,7 @@ mod tests {
#[test] #[test]
fn test_check_fail() { fn test_check_fail() {
set_prompter(Box::new(TestPrompter));
let mut perms = Permissions { let mut perms = Permissions {
read: Permissions::new_read(&None, true).unwrap(), read: Permissions::new_read(&None, true).unwrap(),
write: Permissions::new_write(&None, true).unwrap(), write: Permissions::new_write(&None, true).unwrap(),
@ -3169,6 +2997,7 @@ mod tests {
#[test] #[test]
#[cfg(windows)] #[cfg(windows)]
fn test_env_windows() { fn test_env_windows() {
set_prompter(Box::new(TestPrompter));
let prompt_value = PERMISSION_PROMPT_STUB_VALUE_SETTER.lock(); let prompt_value = PERMISSION_PROMPT_STUB_VALUE_SETTER.lock();
let mut perms = Permissions::allow_all(); let mut perms = Permissions::allow_all();
perms.env = UnaryPermission { perms.env = UnaryPermission {
@ -3187,6 +3016,7 @@ mod tests {
#[test] #[test]
fn test_deserialize_child_permissions_arg() { fn test_deserialize_child_permissions_arg() {
set_prompter(Box::new(TestPrompter));
assert_eq!( assert_eq!(
ChildPermissionsArg::inherit(), ChildPermissionsArg::inherit(),
ChildPermissionsArg { ChildPermissionsArg {
@ -3341,6 +3171,7 @@ mod tests {
#[test] #[test]
fn test_create_child_permissions() { fn test_create_child_permissions() {
set_prompter(Box::new(TestPrompter));
let mut main_perms = Permissions { let mut main_perms = Permissions {
env: Permissions::new_env(&Some(vec![]), false).unwrap(), env: Permissions::new_env(&Some(vec![]), false).unwrap(),
hrtime: Permissions::new_hrtime(true), hrtime: Permissions::new_hrtime(true),
@ -3393,6 +3224,7 @@ mod tests {
#[test] #[test]
fn test_create_child_permissions_with_prompt() { fn test_create_child_permissions_with_prompt() {
set_prompter(Box::new(TestPrompter));
let prompt_value = PERMISSION_PROMPT_STUB_VALUE_SETTER.lock(); let prompt_value = PERMISSION_PROMPT_STUB_VALUE_SETTER.lock();
let mut main_perms = Permissions::from_options(&PermissionsOptions { let mut main_perms = Permissions::from_options(&PermissionsOptions {
prompt: true, prompt: true,
@ -3414,6 +3246,7 @@ mod tests {
#[test] #[test]
fn test_create_child_permissions_with_inherited_denied_list() { fn test_create_child_permissions_with_inherited_denied_list() {
set_prompter(Box::new(TestPrompter));
let prompt_value = PERMISSION_PROMPT_STUB_VALUE_SETTER.lock(); let prompt_value = PERMISSION_PROMPT_STUB_VALUE_SETTER.lock();
let mut main_perms = Permissions::from_options(&PermissionsOptions { let mut main_perms = Permissions::from_options(&PermissionsOptions {
prompt: true, prompt: true,
@ -3432,6 +3265,7 @@ mod tests {
#[test] #[test]
fn test_handle_empty_value() { fn test_handle_empty_value() {
set_prompter(Box::new(TestPrompter));
assert!(Permissions::new_read(&Some(vec![PathBuf::new()]), false).is_err()); assert!(Permissions::new_read(&Some(vec![PathBuf::new()]), false).is_err());
assert!(Permissions::new_env(&Some(vec![String::new()]), false).is_err()); assert!(Permissions::new_env(&Some(vec![String::new()]), false).is_err());
assert!(Permissions::new_sys(&Some(vec![String::new()]), false).is_err()); assert!(Permissions::new_sys(&Some(vec![String::new()]), false).is_err());

View file

@ -0,0 +1,288 @@
// Copyright 2018-2022 the Deno authors. All rights reserved. MIT license.
use crate::colors;
use deno_core::error::AnyError;
use deno_core::parking_lot::Mutex;
use once_cell::sync::Lazy;
pub const PERMISSION_EMOJI: &str = "⚠️";
#[derive(Debug, Eq, PartialEq)]
pub enum PromptResponse {
Allow,
Deny,
}
static PERMISSION_PROMPTER: Lazy<Mutex<Box<dyn PermissionPrompter>>> =
Lazy::new(|| Mutex::new(Box::new(TtyPrompter)));
static MAYBE_BEFORE_PROMPT_CALLBACK: Lazy<Mutex<Option<PromptCallback>>> =
Lazy::new(|| Mutex::new(None));
static MAYBE_AFTER_PROMPT_CALLBACK: Lazy<Mutex<Option<PromptCallback>>> =
Lazy::new(|| Mutex::new(None));
pub fn permission_prompt(
message: &str,
flag: &str,
api_name: Option<&str>,
) -> PromptResponse {
if let Some(before_callback) = MAYBE_BEFORE_PROMPT_CALLBACK.lock().as_mut() {
before_callback();
}
let r = PERMISSION_PROMPTER.lock().prompt(message, flag, api_name);
if let Some(after_callback) = MAYBE_AFTER_PROMPT_CALLBACK.lock().as_mut() {
after_callback();
}
r
}
pub fn set_prompt_callbacks(
before_callback: Option<PromptCallback>,
after_callback: Option<PromptCallback>,
) {
*MAYBE_BEFORE_PROMPT_CALLBACK.lock() = before_callback;
*MAYBE_AFTER_PROMPT_CALLBACK.lock() = after_callback;
}
pub type PromptCallback = Box<dyn FnMut() + Send + Sync>;
pub trait PermissionPrompter: Send + Sync {
fn prompt(
&mut self,
message: &str,
name: &str,
api_name: Option<&str>,
) -> PromptResponse;
}
pub struct TtyPrompter;
impl PermissionPrompter for TtyPrompter {
fn prompt(
&mut self,
message: &str,
name: &str,
api_name: Option<&str>,
) -> PromptResponse {
if !atty::is(atty::Stream::Stdin) || !atty::is(atty::Stream::Stderr) {
return PromptResponse::Deny;
};
#[cfg(unix)]
fn clear_stdin() -> Result<(), AnyError> {
// TODO(bartlomieju):
#[allow(clippy::undocumented_unsafe_blocks)]
let r = unsafe { libc::tcflush(0, libc::TCIFLUSH) };
assert_eq!(r, 0);
Ok(())
}
#[cfg(not(unix))]
fn clear_stdin() -> Result<(), AnyError> {
use deno_core::anyhow::bail;
use winapi::shared::minwindef::TRUE;
use winapi::shared::minwindef::UINT;
use winapi::shared::minwindef::WORD;
use winapi::shared::ntdef::WCHAR;
use winapi::um::processenv::GetStdHandle;
use winapi::um::winbase::STD_INPUT_HANDLE;
use winapi::um::wincon::FlushConsoleInputBuffer;
use winapi::um::wincon::PeekConsoleInputW;
use winapi::um::wincon::WriteConsoleInputW;
use winapi::um::wincontypes::INPUT_RECORD;
use winapi::um::wincontypes::KEY_EVENT;
use winapi::um::winnt::HANDLE;
use winapi::um::winuser::MapVirtualKeyW;
use winapi::um::winuser::MAPVK_VK_TO_VSC;
use winapi::um::winuser::VK_RETURN;
// SAFETY: winapi calls
unsafe {
let stdin = GetStdHandle(STD_INPUT_HANDLE);
// emulate an enter key press to clear any line buffered console characters
emulate_enter_key_press(stdin)?;
// read the buffered line or enter key press
read_stdin_line()?;
// check if our emulated key press was executed
if is_input_buffer_empty(stdin)? {
// if so, move the cursor up to prevent a blank line
move_cursor_up()?;
} else {
// the emulated key press is still pending, so a buffered line was read
// and we can flush the emulated key press
flush_input_buffer(stdin)?;
}
}
return Ok(());
unsafe fn flush_input_buffer(stdin: HANDLE) -> Result<(), AnyError> {
let success = FlushConsoleInputBuffer(stdin);
if success != TRUE {
bail!(
"Could not flush the console input buffer: {}",
std::io::Error::last_os_error()
)
}
Ok(())
}
unsafe fn emulate_enter_key_press(stdin: HANDLE) -> Result<(), AnyError> {
// https://github.com/libuv/libuv/blob/a39009a5a9252a566ca0704d02df8dabc4ce328f/src/win/tty.c#L1121-L1131
let mut input_record: INPUT_RECORD = std::mem::zeroed();
input_record.EventType = KEY_EVENT;
input_record.Event.KeyEvent_mut().bKeyDown = TRUE;
input_record.Event.KeyEvent_mut().wRepeatCount = 1;
input_record.Event.KeyEvent_mut().wVirtualKeyCode = VK_RETURN as WORD;
input_record.Event.KeyEvent_mut().wVirtualScanCode =
MapVirtualKeyW(VK_RETURN as UINT, MAPVK_VK_TO_VSC) as WORD;
*input_record.Event.KeyEvent_mut().uChar.UnicodeChar_mut() =
'\r' as WCHAR;
let mut record_written = 0;
let success =
WriteConsoleInputW(stdin, &input_record, 1, &mut record_written);
if success != TRUE {
bail!(
"Could not emulate enter key press: {}",
std::io::Error::last_os_error()
);
}
Ok(())
}
unsafe fn is_input_buffer_empty(stdin: HANDLE) -> Result<bool, AnyError> {
let mut buffer = Vec::with_capacity(1);
let mut events_read = 0;
let success =
PeekConsoleInputW(stdin, buffer.as_mut_ptr(), 1, &mut events_read);
if success != TRUE {
bail!(
"Could not peek the console input buffer: {}",
std::io::Error::last_os_error()
)
}
Ok(events_read == 0)
}
fn move_cursor_up() -> Result<(), AnyError> {
use std::io::Write;
write!(std::io::stderr(), "\x1B[1A")?;
Ok(())
}
fn read_stdin_line() -> Result<(), AnyError> {
let mut input = String::new();
let stdin = std::io::stdin();
stdin.read_line(&mut input)?;
Ok(())
}
}
// Clear n-lines in terminal and move cursor to the beginning of the line.
fn clear_n_lines(n: usize) {
eprint!("\x1B[{}A\x1B[0J", n);
}
// For security reasons we must consume everything in stdin so that previously
// buffered data cannot effect the prompt.
if let Err(err) = clear_stdin() {
eprintln!("Error clearing stdin for permission prompt. {:#}", err);
return PromptResponse::Deny; // don't grant permission if this fails
}
// print to stderr so that if stdout is piped this is still displayed.
const OPTS: &str = "[y/n] (y = yes, allow; n = no, deny)";
eprint!("{}", PERMISSION_EMOJI);
eprint!("{}", colors::bold("Deno requests "));
eprint!("{}", colors::bold(message));
eprintln!("{}", colors::bold("."));
if let Some(api_name) = api_name {
eprintln!(" ├ Requested by `{}` API", api_name);
}
let msg = format!(
" ├ Run again with --allow-{} to bypass this prompt.",
name
);
eprintln!("{}", colors::italic(&msg));
eprint!("{}", colors::bold("Allow?"));
eprint!(" {} > ", OPTS);
let value = loop {
let mut input = String::new();
let stdin = std::io::stdin();
let result = stdin.read_line(&mut input);
if result.is_err() {
break PromptResponse::Deny;
};
let ch = match input.chars().next() {
None => break PromptResponse::Deny,
Some(v) => v,
};
match ch.to_ascii_lowercase() {
'y' => {
clear_n_lines(if api_name.is_some() { 4 } else { 3 });
let msg = format!("Granted {}.", message);
eprintln!("{}", colors::bold(&msg));
break PromptResponse::Allow;
}
'n' => {
clear_n_lines(if api_name.is_some() { 4 } else { 3 });
let msg = format!("Denied {}.", message);
eprintln!("{}", colors::bold(&msg));
break PromptResponse::Deny;
}
_ => {
// If we don't get a recognized option try again.
clear_n_lines(1);
eprint!("{}", colors::bold("Unrecognized option. Allow?"));
eprint!(" {} > ", OPTS);
}
};
};
value
}
}
#[cfg(test)]
pub mod tests {
use super::*;
use std::sync::atomic::AtomicBool;
use std::sync::atomic::Ordering;
pub struct TestPrompter;
impl PermissionPrompter for TestPrompter {
fn prompt(
&mut self,
_message: &str,
_name: &str,
_api_name: Option<&str>,
) -> PromptResponse {
if STUB_PROMPT_VALUE.load(Ordering::SeqCst) {
PromptResponse::Allow
} else {
PromptResponse::Deny
}
}
}
static STUB_PROMPT_VALUE: AtomicBool = AtomicBool::new(true);
pub static PERMISSION_PROMPT_STUB_VALUE_SETTER: Lazy<
Mutex<PermissionPromptStubValueSetter>,
> = Lazy::new(|| Mutex::new(PermissionPromptStubValueSetter));
pub struct PermissionPromptStubValueSetter;
impl PermissionPromptStubValueSetter {
pub fn set(&self, value: bool) {
STUB_PROMPT_VALUE.store(value, Ordering::SeqCst);
}
}
pub fn set_prompter(prompter: Box<dyn PermissionPrompter>) {
*PERMISSION_PROMPTER.lock() = prompter;
}
}