mirror of
https://github.com/denoland/deno.git
synced 2024-12-11 10:07:54 -05:00
6fb7e8d93b
This commit adds new "--deny-*" permission flags. These are complimentary to "--allow-*" flags. These flags can be used to restrict access to certain resources, even if they were granted using "--allow-*" flags or the "--allow-all" ("-A") flag. Eg. specifying "--allow-read --deny-read" will result in a permission error, while "--allow-read --deny-read=/etc" will allow read access to all FS but the "/etc" directory. Runtime permissions APIs ("Deno.permissions") were adjusted as well, mainly by adding, a new "PermissionStatus.partial" field. This field denotes that while permission might be granted to requested resource, it's only partial (ie. a "--deny-*" flag was specified that excludes some of the requested resources). Eg. specifying "--allow-read=foo/ --deny-read=foo/bar" and then querying for permissions like "Deno.permissions.query({ name: "read", path: "foo/" })" will return "PermissionStatus { state: "granted", onchange: null, partial: true }", denoting that some of the subpaths don't have read access. Closes #18804. --------- Co-authored-by: Bartek Iwańczuk <biwanczuk@gmail.com> Co-authored-by: Nayeem Rahman <nayeemrmn99@gmail.com>
174 lines
4.2 KiB
Rust
174 lines
4.2 KiB
Rust
// Copyright 2018-2023 the Deno authors. All rights reserved. MIT license.
|
|
|
|
mod interface;
|
|
mod ops;
|
|
mod std_fs;
|
|
pub mod sync;
|
|
|
|
pub use crate::interface::FileSystem;
|
|
pub use crate::interface::FileSystemRc;
|
|
pub use crate::interface::FsDirEntry;
|
|
pub use crate::interface::FsFileType;
|
|
pub use crate::interface::OpenOptions;
|
|
pub use crate::std_fs::RealFs;
|
|
pub use crate::sync::MaybeSend;
|
|
pub use crate::sync::MaybeSync;
|
|
|
|
use crate::ops::*;
|
|
|
|
use deno_core::error::AnyError;
|
|
use deno_core::OpState;
|
|
use std::cell::RefCell;
|
|
use std::path::Path;
|
|
use std::rc::Rc;
|
|
|
|
pub trait FsPermissions {
|
|
fn check_read(&mut self, path: &Path, api_name: &str)
|
|
-> Result<(), AnyError>;
|
|
fn check_read_all(&mut self, api_name: &str) -> Result<(), AnyError>;
|
|
fn check_read_blind(
|
|
&mut self,
|
|
p: &Path,
|
|
display: &str,
|
|
api_name: &str,
|
|
) -> Result<(), AnyError>;
|
|
fn check_write(
|
|
&mut self,
|
|
path: &Path,
|
|
api_name: &str,
|
|
) -> Result<(), AnyError>;
|
|
fn check_write_partial(
|
|
&mut self,
|
|
path: &Path,
|
|
api_name: &str,
|
|
) -> Result<(), AnyError>;
|
|
fn check_write_all(&mut self, api_name: &str) -> Result<(), AnyError>;
|
|
fn check_write_blind(
|
|
&mut self,
|
|
p: &Path,
|
|
display: &str,
|
|
api_name: &str,
|
|
) -> Result<(), AnyError>;
|
|
|
|
fn check(
|
|
&mut self,
|
|
open_options: &OpenOptions,
|
|
path: &Path,
|
|
api_name: &str,
|
|
) -> Result<(), AnyError> {
|
|
if open_options.read {
|
|
self.check_read(path, api_name)?;
|
|
}
|
|
if open_options.write || open_options.append {
|
|
self.check_write(path, api_name)?;
|
|
}
|
|
Ok(())
|
|
}
|
|
}
|
|
|
|
struct UnstableChecker {
|
|
pub unstable: bool,
|
|
}
|
|
|
|
impl UnstableChecker {
|
|
// NOTE(bartlomieju): keep in sync with `cli/program_state.rs`
|
|
pub fn check_unstable(&self, api_name: &str) {
|
|
if !self.unstable {
|
|
eprintln!(
|
|
"Unstable API '{api_name}'. The --unstable flag must be provided."
|
|
);
|
|
std::process::exit(70);
|
|
}
|
|
}
|
|
}
|
|
|
|
/// Helper for checking unstable features. Used for sync ops.
|
|
pub(crate) fn check_unstable(state: &OpState, api_name: &str) {
|
|
state.borrow::<UnstableChecker>().check_unstable(api_name)
|
|
}
|
|
|
|
/// Helper for checking unstable features. Used for async ops.
|
|
pub(crate) fn check_unstable2(state: &Rc<RefCell<OpState>>, api_name: &str) {
|
|
let state = state.borrow();
|
|
state.borrow::<UnstableChecker>().check_unstable(api_name)
|
|
}
|
|
|
|
deno_core::extension!(deno_fs,
|
|
deps = [ deno_web ],
|
|
parameters = [P: FsPermissions],
|
|
ops = [
|
|
op_fs_cwd<P>,
|
|
op_fs_umask,
|
|
op_fs_chdir<P>,
|
|
|
|
op_fs_open_sync<P>,
|
|
op_fs_open_async<P>,
|
|
op_fs_mkdir_sync<P>,
|
|
op_fs_mkdir_async<P>,
|
|
op_fs_chmod_sync<P>,
|
|
op_fs_chmod_async<P>,
|
|
op_fs_chown_sync<P>,
|
|
op_fs_chown_async<P>,
|
|
op_fs_remove_sync<P>,
|
|
op_fs_remove_async<P>,
|
|
op_fs_copy_file_sync<P>,
|
|
op_fs_copy_file_async<P>,
|
|
op_fs_stat_sync<P>,
|
|
op_fs_stat_async<P>,
|
|
op_fs_lstat_sync<P>,
|
|
op_fs_lstat_async<P>,
|
|
op_fs_realpath_sync<P>,
|
|
op_fs_realpath_async<P>,
|
|
op_fs_read_dir_sync<P>,
|
|
op_fs_read_dir_async<P>,
|
|
op_fs_rename_sync<P>,
|
|
op_fs_rename_async<P>,
|
|
op_fs_link_sync<P>,
|
|
op_fs_link_async<P>,
|
|
op_fs_symlink_sync<P>,
|
|
op_fs_symlink_async<P>,
|
|
op_fs_read_link_sync<P>,
|
|
op_fs_read_link_async<P>,
|
|
op_fs_truncate_sync<P>,
|
|
op_fs_truncate_async<P>,
|
|
op_fs_utime_sync<P>,
|
|
op_fs_utime_async<P>,
|
|
op_fs_make_temp_dir_sync<P>,
|
|
op_fs_make_temp_dir_async<P>,
|
|
op_fs_make_temp_file_sync<P>,
|
|
op_fs_make_temp_file_async<P>,
|
|
op_fs_write_file_sync<P>,
|
|
op_fs_write_file_async<P>,
|
|
op_fs_read_file_sync<P>,
|
|
op_fs_read_file_async<P>,
|
|
op_fs_read_file_text_sync<P>,
|
|
op_fs_read_file_text_async<P>,
|
|
|
|
op_fs_seek_sync,
|
|
op_fs_seek_async,
|
|
op_fs_fdatasync_sync,
|
|
op_fs_fdatasync_async,
|
|
op_fs_fsync_sync,
|
|
op_fs_fsync_async,
|
|
op_fs_fstat_sync,
|
|
op_fs_fstat_async,
|
|
op_fs_flock_sync,
|
|
op_fs_flock_async,
|
|
op_fs_funlock_sync,
|
|
op_fs_funlock_async,
|
|
op_fs_ftruncate_sync,
|
|
op_fs_ftruncate_async,
|
|
op_fs_futime_sync,
|
|
op_fs_futime_async,
|
|
|
|
],
|
|
esm = [ "30_fs.js" ],
|
|
options = {
|
|
unstable: bool,
|
|
fs: FileSystemRc,
|
|
},
|
|
state = |state, options| {
|
|
state.put(UnstableChecker { unstable: options.unstable });
|
|
state.put(options.fs);
|
|
},
|
|
);
|