Skip to content

Commit f36bd66

Browse files
committed
fixup! lib,permission: add permission.drop
1 parent e17f890 commit f36bd66

12 files changed

+30
-35
lines changed

doc/api/process.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4660,7 +4660,6 @@ cases:
46604660
[`ChildProcess.disconnect()`]: child_process.md#subprocessdisconnect
46614661
[`ChildProcess.send()`]: child_process.md#subprocesssendmessage-sendhandle-options-callback
46624662
[`ChildProcess`]: child_process.md#class-childprocess
4663-
[`ERR_ACCESS_DENIED`]: errors.md#err_access_denied
46644663
[`Error`]: errors.md#class-error
46654664
[`EventEmitter`]: events.md#class-eventemitter
46664665
[`NODE_OPTIONS`]: cli.md#node_optionsoptions

src/permission/addon_permission.cc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,8 +15,8 @@ void AddonPermission::Apply(Environment* env,
1515
}
1616

1717
void AddonPermission::Drop(Environment* env,
18-
PermissionScope scope,
19-
const std::string_view& param) {
18+
PermissionScope scope,
19+
const std::string_view& param) {
2020
deny_all_ = true;
2121
}
2222

src/permission/child_process_permission.cc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,8 +16,8 @@ void ChildProcessPermission::Apply(Environment* env,
1616
}
1717

1818
void ChildProcessPermission::Drop(Environment* env,
19-
PermissionScope scope,
20-
const std::string_view& param) {
19+
PermissionScope scope,
20+
const std::string_view& param) {
2121
deny_all_ = true;
2222
}
2323

src/permission/fs_permission.cc

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -155,8 +155,8 @@ void FSPermission::Apply(Environment* env,
155155
}
156156

157157
void FSPermission::Drop(Environment* env,
158-
PermissionScope scope,
159-
const std::string_view& param) {
158+
PermissionScope scope,
159+
const std::string_view& param) {
160160
if (param.empty()) {
161161
// Drop all access for this scope
162162
if (scope == PermissionScope::kFileSystemRead ||
@@ -192,19 +192,18 @@ void FSPermission::Drop(Environment* env,
192192
}
193193
}
194194

195-
void FSPermission::RevokeAccess(PermissionScope perm,
196-
const std::string& res) {
195+
void FSPermission::RevokeAccess(PermissionScope perm, const std::string& res) {
197196
const std::string path = WildcardIfDir(res);
198197
if (perm == PermissionScope::kFileSystemRead) {
199-
auto it = std::find(granted_paths_in_.begin(),
200-
granted_paths_in_.end(), path);
198+
auto it =
199+
std::find(granted_paths_in_.begin(), granted_paths_in_.end(), path);
201200
if (it != granted_paths_in_.end()) {
202201
granted_paths_in_.erase(it);
203202
RebuildTree(PermissionScope::kFileSystemRead);
204203
}
205204
} else if (perm == PermissionScope::kFileSystemWrite) {
206-
auto it = std::find(granted_paths_out_.begin(),
207-
granted_paths_out_.end(), path);
205+
auto it =
206+
std::find(granted_paths_out_.begin(), granted_paths_out_.end(), path);
208207
if (it != granted_paths_out_.end()) {
209208
granted_paths_out_.erase(it);
210209
RebuildTree(PermissionScope::kFileSystemWrite);

src/permission/inspector_permission.cc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,8 +15,8 @@ void InspectorPermission::Apply(Environment* env,
1515
}
1616

1717
void InspectorPermission::Drop(Environment* env,
18-
PermissionScope scope,
19-
const std::string_view& param) {
18+
PermissionScope scope,
19+
const std::string_view& param) {
2020
deny_all_ = true;
2121
}
2222

src/permission/net_permission.cc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,8 +14,8 @@ void NetPermission::Apply(Environment* env,
1414
}
1515

1616
void NetPermission::Drop(Environment* env,
17-
PermissionScope scope,
18-
const std::string_view& param) {
17+
PermissionScope scope,
18+
const std::string_view& param) {
1919
allow_net_ = false;
2020
}
2121

src/permission/permission.cc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -300,8 +300,8 @@ void Permission::Apply(Environment* env,
300300
}
301301

302302
void Permission::Drop(Environment* env,
303-
PermissionScope scope,
304-
const std::string_view& param) {
303+
PermissionScope scope,
304+
const std::string_view& param) {
305305
auto permission = nodes_.find(scope);
306306
if (permission != nodes_.end()) {
307307
permission->second->Drop(env, scope, param);

src/permission/wasi_permission.cc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,8 +16,8 @@ void WASIPermission::Apply(Environment* env,
1616
}
1717

1818
void WASIPermission::Drop(Environment* env,
19-
PermissionScope scope,
20-
const std::string_view& param) {
19+
PermissionScope scope,
20+
const std::string_view& param) {
2121
deny_all_ = true;
2222
}
2323

src/permission/worker_permission.cc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,8 +16,8 @@ void WorkerPermission::Apply(Environment* env,
1616
}
1717

1818
void WorkerPermission::Drop(Environment* env,
19-
PermissionScope scope,
20-
const std::string_view& param) {
19+
PermissionScope scope,
20+
const std::string_view& param) {
2121
deny_all_ = true;
2222
}
2323

test/parallel/test-permission-drop-fs-granted-path.js

Lines changed: 6 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
'use strict';
22

3-
// Tests that drop() only revokes the exact resource that was explicitly granted.
3+
require('../common');
44

55
const { spawnSync } = require('child_process');
66
const assert = require('assert');
@@ -9,8 +9,6 @@ const { isMainThread } = require('worker_threads');
99
if (!isMainThread) {
1010
process.exit(0);
1111
}
12-
13-
require('../common');
1412
const tmpdir = require('../common/tmpdir');
1513
const fs = require('fs');
1614
const path = require('path');
@@ -45,7 +43,7 @@ fs.writeFileSync(path.join(dir, 'item2.txt'), 'bbb');
4543
if (child.status !== 0) {
4644
console.error('Case 1 stderr:', child.stderr?.toString());
4745
}
48-
assert.strictEqual(child.status, 0, 'Case 1 failed');
46+
assert.strictEqual(child.status, 0);
4947
}
5048

5149
// Grant a directory, drop the same directory - should revoke all access
@@ -69,7 +67,7 @@ fs.writeFileSync(path.join(dir, 'item2.txt'), 'bbb');
6967
if (child.status !== 0) {
7068
console.error('Case 2 stderr:', child.stderr?.toString());
7169
}
72-
assert.strictEqual(child.status, 0, 'Case 2 failed');
70+
assert.strictEqual(child.status, 0);
7371
}
7472

7573
// Grant two directories, drop one - the other remains accessible
@@ -105,7 +103,7 @@ fs.writeFileSync(path.join(dir, 'item2.txt'), 'bbb');
105103
if (child.status !== 0) {
106104
console.error('Case 3 stderr:', child.stderr?.toString());
107105
}
108-
assert.strictEqual(child.status, 0, 'Case 3 failed');
106+
assert.strictEqual(child.status, 0);
109107
}
110108

111109
// Grant a directory and a file inside it separately, drop the file
@@ -132,7 +130,7 @@ fs.writeFileSync(path.join(dir, 'item2.txt'), 'bbb');
132130
if (child.status !== 0) {
133131
console.error('Case 4 stderr:', child.stderr?.toString());
134132
}
135-
assert.strictEqual(child.status, 0, 'Case 4 failed');
133+
assert.strictEqual(child.status, 0);
136134
}
137135

138136
// Drop entire scope without reference - revokes everything
@@ -156,5 +154,5 @@ fs.writeFileSync(path.join(dir, 'item2.txt'), 'bbb');
156154
if (child.status !== 0) {
157155
console.error('Case 5 stderr:', child.stderr?.toString());
158156
}
159-
assert.strictEqual(child.status, 0, 'Case 5 failed');
157+
assert.strictEqual(child.status, 0);
160158
}

0 commit comments

Comments
 (0)