mirror of
https://github.com/denoland/deno.git
synced 2024-11-29 16:30:56 -05:00
22e0ee92a6
Allowlist checking already uses hosts but for some reason requests, revokes and the runtime permissions API use URLs. - BREAKING(lib.deno.unstable.d.ts): Change NetPermissionDescriptor::url to NetPermissionDescriptor::host - fix(runtime/permissions): Don't add whole URLs to the allowlist on request - fix(runtime/permissions): Harden strength semantics: ({ name: "net", host: "127.0.0.1" } is stronger than { name: "net", host: "127.0.0.1:8000" }) for blocklisting - refactor(runtime/permissions): Use tuples for hosts, make the host optional in Permissions::{query_net, request_net, revoke_net}()
33 lines
938 B
TypeScript
33 lines
938 B
TypeScript
// Copyright 2018-2020 the Deno authors. All rights reserved. MIT license.
|
|
import {
|
|
assertEquals,
|
|
assertThrows,
|
|
assertThrowsAsync,
|
|
unitTest,
|
|
} from "./test_util.ts";
|
|
|
|
unitTest(async function permissionInvalidName(): Promise<void> {
|
|
await assertThrowsAsync(async () => {
|
|
// deno-lint-ignore no-explicit-any
|
|
await Deno.permissions.query({ name: "foo" as any });
|
|
}, Error);
|
|
});
|
|
|
|
unitTest(async function permissionNetInvalidHost(): Promise<void> {
|
|
await assertThrowsAsync(async () => {
|
|
await Deno.permissions.query({ name: "net", host: ":" });
|
|
}, URIError);
|
|
});
|
|
|
|
unitTest(function permissionsIllegalConstructor() {
|
|
assertThrows(() => new Deno.Permissions(), TypeError, "Illegal constructor.");
|
|
});
|
|
|
|
unitTest(function permissionStatusIllegalConstructor() {
|
|
assertThrows(
|
|
() => new Deno.PermissionStatus(),
|
|
TypeError,
|
|
"Illegal constructor.",
|
|
);
|
|
assertEquals(Deno.PermissionStatus.length, 0);
|
|
});
|