1
0
Fork 0
mirror of https://github.com/denoland/deno.git synced 2024-11-21 15:04:11 -05:00

fix: permission prompt stuffing (#11931)

Fixes #9750
This commit is contained in:
Ryan Dahl 2021-09-09 08:38:47 -04:00 committed by GitHub
parent d947629292
commit fb35cd0ef4
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
10 changed files with 169 additions and 55 deletions

View file

@ -338,11 +338,17 @@ itest!(_089_run_allow_list {
#[cfg(unix)]
#[test]
fn _090_run_permissions_request() {
let args = "run 090_run_permissions_request.ts";
let output = "090_run_permissions_request.ts.out";
let input = b"y\nn\n";
util::test_pty(args, output, input);
let args = "run --quiet 090_run_permissions_request.ts";
use util::PtyData::*;
util::test_pty2(args, vec![
Output("⚠️ Deno requests run access to \"ls\". Allow? [y/n (y = yes allow, n = no deny)] "),
Input("y\n"),
Output("⚠️ Deno requests run access to \"cat\". Allow? [y/n (y = yes allow, n = no deny)] "),
Input("n\n"),
Output("granted\r\n"),
Output("prompt\r\n"),
Output("denied\r\n"),
]);
}
itest!(_091_use_define_for_class_fields {
@ -1717,21 +1723,31 @@ mod permissions {
#[cfg(unix)]
#[test]
fn _061_permissions_request() {
let args = "run 061_permissions_request.ts";
let output = "061_permissions_request.ts.out";
let input = b"y\nn\n";
util::test_pty(args, output, input);
let args = "run --quiet 061_permissions_request.ts";
use util::PtyData::*;
util::test_pty2(args, vec![
Output("⚠️ Deno requests read access to \"foo\". Allow? [y/n (y = yes allow, n = no deny)] "),
Input("y\n"),
Output("⚠️ Deno requests read access to \"bar\". Allow? [y/n (y = yes allow, n = no deny)] "),
Input("n\n"),
Output("granted\r\n"),
Output("prompt\r\n"),
Output("denied\r\n"),
]);
}
#[cfg(unix)]
#[test]
fn _062_permissions_request_global() {
let args = "run 062_permissions_request_global.ts";
let output = "062_permissions_request_global.ts.out";
let input = b"y\n";
util::test_pty(args, output, input);
let args = "run --quiet 062_permissions_request_global.ts";
use util::PtyData::*;
util::test_pty2(args, vec![
Output("⚠️ Deno requests read access. Allow? [y/n (y = yes allow, n = no deny)] "),
Input("y\n"),
Output("PermissionStatus { state: \"granted\", onchange: null }\r\n"),
Output("PermissionStatus { state: \"granted\", onchange: null }\r\n"),
Output("PermissionStatus { state: \"granted\", onchange: null }\r\n"),
]);
}
itest!(_063_permissions_revoke {
@ -1747,12 +1763,45 @@ mod permissions {
#[cfg(unix)]
#[test]
fn _066_prompt() {
let args = "run --unstable 066_prompt.ts";
let output = "066_prompt.ts.out";
// These are answers to prompt, confirm, and alert calls.
let input = b"John Doe\n\nfoo\nY\nN\nyes\n\nwindows\r\n\n\n";
util::test_pty(args, output, input);
let args = "run --quiet --unstable 066_prompt.ts";
use util::PtyData::*;
util::test_pty2(
args,
vec![
Output("What is your name? [Jane Doe] "),
Input("John Doe\n"),
Output("Your name is John Doe.\r\n"),
Output("What is your name? [Jane Doe] "),
Input("\n"),
Output("Your name is Jane Doe.\r\n"),
Output("Prompt "),
Input("foo\n"),
Output("Your input is foo.\r\n"),
Output("Question 0 [y/N] "),
Input("Y\n"),
Output("Your answer is true\r\n"),
Output("Question 1 [y/N] "),
Input("N\n"),
Output("Your answer is false\r\n"),
Output("Question 2 [y/N] "),
Input("yes\n"),
Output("Your answer is false\r\n"),
Output("Confirm [y/N] "),
Input("\n"),
Output("Your answer is false\r\n"),
Output("What is Windows EOL? "),
Input("windows\n"),
Output("Your answer is \"windows\"\r\n"),
Output("Hi [Enter] "),
Input("\n"),
Output("Alert [Enter] "),
Input("\n"),
Output("The end of test\r\n"),
Output("What is EOF? "),
Input("\n"),
Output("Your answer is null\r\n"),
],
);
}
itest!(dynamic_import_permissions_remote_remote {
@ -1806,6 +1855,24 @@ itest!(byte_order_mark {
output: "byte_order_mark.out",
});
#[cfg(unix)]
#[test]
fn issue9750() {
use util::PtyData::*;
util::test_pty2(
"run --prompt issue9750.js",
vec![
Output("Enter 'yy':\r\n"),
Input("yy\n"),
Output("⚠️ Deno requests env access. Allow? [y/n (y = yes allow, n = no deny)] "),
Input("n\n"),
Output("⚠️ Deno requests env access to \"SECRET\". Allow? [y/n (y = yes allow, n = no deny)] "),
Input("n\n"),
Output("error: Uncaught (in promise) PermissionDenied: Requires env access to \"SECRET\", run again with the --allow-env flag\r\n"),
],
);
}
// Regression test for https://github.com/denoland/deno/issues/11451.
itest!(dom_exception_formatting {
args: "run dom_exception_formatting.ts",

View file

@ -1,3 +0,0 @@
[WILDCARD]granted
prompt
denied

View file

@ -1,3 +0,0 @@
[WILDCARD]PermissionStatus { state: "granted", onchange: null }
PermissionStatus { state: "granted", onchange: null }
PermissionStatus { state: "granted", onchange: null }

View file

@ -1,10 +0,0 @@
[WILDCARD]What is your name? [Jane Doe] Your name is John Doe.
What is your name? [Jane Doe] Your name is Jane Doe.
Prompt Your input is foo.
Question 0 [y/N] Your answer is true
Question 1 [y/N] Your answer is false
Question 2 [y/N] Your answer is false
Confirm [y/N] Your answer is false
What is Windows EOL? Your answer is "windows"
Hi [Enter] Alert [Enter] The end of test
What is EOF? Your answer is null

View file

@ -1,9 +1,18 @@
const status1 =
(await Deno.permissions.request({ name: "run", command: "ls" })).state;
if (status1 != "granted") {
throw Error(`unexpected status1 ${status1}`);
}
const status2 =
(await Deno.permissions.query({ name: "run", command: "cat" })).state;
if (status2 != "prompt") {
throw Error(`unexpected status2 ${status2}`);
}
const status3 =
(await Deno.permissions.request({ name: "run", command: "cat" })).state;
if (status3 != "denied") {
throw Error(`unexpected status3 ${status3}`);
}
console.log(status1);
console.log(status2);
console.log(status3);

View file

@ -1,3 +0,0 @@
[WILDCARD]granted
prompt
denied

6
cli/tests/testdata/issue9750.js vendored Normal file
View file

@ -0,0 +1,6 @@
// Run without permissions.
const buf = new Uint8Array(1);
console.log("Enter 'yy':");
await Deno.stdin.read(buf);
await Deno.permissions.request({ "name": "env" });
console.log("\n\nOwned", Deno.env.get("SECRET"));

View file

@ -85,7 +85,7 @@ uuid = { version = "0.8.2", features = ["v4"] }
[target.'cfg(windows)'.dependencies]
fwdansi = "1.1.0"
winapi = { version = "0.3.9", features = ["knownfolders", "mswsock", "objbase", "shlobj", "tlhelp32", "winbase", "winerror", "winsock2"] }
winapi = { version = "0.3.9", features = ["commapi", "knownfolders", "mswsock", "objbase", "shlobj", "tlhelp32", "winbase", "winerror", "winsock2"] }
[target.'cfg(unix)'.dependencies]
nix = "0.22.1"

View file

@ -1194,6 +1194,29 @@ fn permission_prompt(message: &str) -> bool {
if !atty::is(atty::Stream::Stdin) || !atty::is(atty::Stream::Stderr) {
return false;
};
#[cfg(unix)]
fn clear_stdin() {
let r = unsafe { libc::tcflush(0, libc::TCIFLUSH) };
assert_eq!(r, 0);
}
#[cfg(not(unix))]
fn clear_stdin() {
unsafe {
let stdin = winapi::um::processenv::GetStdHandle(
winapi::um::winbase::STD_INPUT_HANDLE,
);
let flags =
winapi::um::winbase::PURGE_TXCLEAR | winapi::um::winbase::PURGE_RXCLEAR;
winapi::um::commapi::PurgeComm(stdin, flags);
}
}
// For security reasons we must consume everything in stdin so that previously
// buffered data cannot effect the prompt.
clear_stdin();
let opts = "[y/n (y = yes allow, n = no deny)] ";
let msg = format!(
"{} Deno requests {}. Allow? {}",

View file

@ -1584,27 +1584,55 @@ pub fn pattern_match(pattern: &str, s: &str, wildcard: &str) -> bool {
t.1.is_empty()
}
/// Kind of reflects `itest!()`. Note that the pty's output (which also contains
/// stdin content) is compared against the content of the `output` path.
pub enum PtyData {
Input(&'static str),
Output(&'static str),
}
#[cfg(unix)]
pub fn test_pty(args: &str, output_path: &str, input: &[u8]) {
pub fn test_pty2(args: &str, data: Vec<PtyData>) {
use pty::fork::Fork;
use std::io::BufRead;
let tests_path = testdata_path();
let fork = Fork::from_ptmx().unwrap();
if let Ok(mut master) = fork.is_parent() {
let mut output_actual = String::new();
master.write_all(input).unwrap();
master.read_to_string(&mut output_actual).unwrap();
fork.wait().unwrap();
if let Ok(master) = fork.is_parent() {
let mut buf_reader = std::io::BufReader::new(master);
for d in data {
match d {
PtyData::Input(s) => {
println!("INPUT {}", s.escape_debug());
buf_reader.get_mut().write_all(s.as_bytes()).unwrap();
let output_expected =
std::fs::read_to_string(tests_path.join(output_path)).unwrap();
if !wildcard_match(&output_expected, &output_actual) {
println!("OUTPUT\n{}\nOUTPUT", output_actual);
println!("EXPECTED\n{}\nEXPECTED", output_expected);
panic!("pattern match failed");
// Because of tty echo, we should be able to read the same string back.
assert!(s.ends_with('\n'));
let mut echo = String::new();
buf_reader.read_line(&mut echo).unwrap();
println!("ECHO: {}", echo.escape_debug());
assert!(echo.starts_with(&s.trim()));
}
PtyData::Output(s) => {
let mut line = String::new();
if s.ends_with('\n') {
buf_reader.read_line(&mut line).unwrap();
} else {
while s != line {
let mut buf = [0; 64 * 1024];
let _n = buf_reader.read(&mut buf).unwrap();
let buf_str = std::str::from_utf8(&buf)
.unwrap()
.trim_end_matches(char::from(0));
line += buf_str;
assert!(s.starts_with(&line));
}
}
println!("OUTPUT {}", line.escape_debug());
assert_eq!(line, s);
}
}
}
fork.wait().unwrap();
} else {
deno_cmd()
.current_dir(tests_path)