Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
7 changes: 7 additions & 0 deletions test/fixtures/permission/config-fs-read-only.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,7 @@
{
"permission": {
"allow-fs-read": [
"*"
]
}
}
102 changes: 63 additions & 39 deletions test/parallel/test-permission-config-file.mjs
Original file line number Diff line number Diff line change
Expand Up @@ -5,15 +5,16 @@ import { describe, it } from 'node:test';

describe('Permission model config file support', () => {
it('should load filesystem read/write permissions from config file', async () => {
const configPath = fixtures.path('permission/config-fs-read-write.json');
const readWriteConfigPath = fixtures.path('permission/config-fs-read-write.json');
const readOnlyConfigPath = fixtures.path('permission/config-fs-read-only.json');
const readTestPath = fixtures.path('permission/fs-read-test.js');
const writeTestPath = fixtures.path('permission/fs-write-test.js');

{
const result = await spawnPromisified(process.execPath, [
'--permission',
'--experimental-config-file',
configPath,
readOnlyConfigPath,
readTestPath,
]);
assert.strictEqual(result.code, 0);
Expand All @@ -23,40 +24,78 @@ describe('Permission model config file support', () => {
const result = await spawnPromisified(process.execPath, [
'--permission',
'--experimental-config-file',
configPath,
readWriteConfigPath,
writeTestPath,
]);
assert.strictEqual(result.code, 0);
}

{
const result = await spawnPromisified(process.execPath, [
'--permission',
'--experimental-config-file',
readOnlyConfigPath,
writeTestPath,
]);
assert.strictEqual(result.code, 1);
assert.match(result.stderr, /Access to this API has been restricted\. Use --allow-fs-write to manage permissions/);
}
});

it('should load child process and worker permissions from config file', async () => {
const configPath = fixtures.path('permission/config-child-worker.json');
const readOnlyConfigPath = fixtures.path('permission/config-fs-read-only.json');
const childTestPath = fixtures.path('permission/child-process-test.js');

const result = await spawnPromisified(process.execPath, [
'--permission',
'--experimental-config-file',
configPath,
'--allow-fs-read=*',
childTestPath,
]);
assert.strictEqual(result.code, 0);
{
const result = await spawnPromisified(process.execPath, [
'--permission',
'--experimental-config-file',
configPath,
childTestPath,
]);
assert.strictEqual(result.code, 0);
}

{
const result = await spawnPromisified(process.execPath, [
'--permission',
'--experimental-config-file',
readOnlyConfigPath,
childTestPath,
]);
assert.strictEqual(result.code, 1, result.stderr);
assert.match(result.stderr, /Access to this API has been restricted\. Use --allow-child-process to manage permissions/);
}
});

it('should load network and inspector permissions from config file', async () => {
const configPath = fixtures.path('permission/config-net-inspector.json');
const readOnlyConfigPath = fixtures.path('permission/config-fs-read-only.json');

const result = await spawnPromisified(process.execPath, [
'--permission',
'--experimental-config-file',
configPath,
'--allow-fs-read=*',
'-p',
'process.permission.has("net") && process.permission.has("inspector")',
]);
assert.match(result.stdout, /true/);
assert.strictEqual(result.code, 0);
{
const result = await spawnPromisified(process.execPath, [
'--permission',
'--experimental-config-file',
configPath,
'-p',
'process.permission.has("net") && process.permission.has("inspector")',
]);
assert.match(result.stdout, /true/);
assert.strictEqual(result.code, 0);
}

{
const result = await spawnPromisified(process.execPath, [
'--permission',
'--experimental-config-file',
readOnlyConfigPath,
'-p',
'process.permission.has("net") + process.permission.has("inspector")',
]);
assert.match(result.stdout, /0/);
assert.strictEqual(result.code, 0);
}
});

it('should load addons and wasi permissions from config file', async () => {
Expand All @@ -74,32 +113,17 @@ describe('Permission model config file support', () => {
assert.strictEqual(result.code, 0);
});

it('should deny operations when permissions are not in config file', async () => {
const configPath = fixtures.path('permission/config-fs-read-write.json');

const result = await spawnPromisified(process.execPath, [
'--permission',
'--experimental-config-file',
configPath,
'--allow-fs-read=*',
'-p',
'process.permission.has("child")',
]);
assert.match(result.stdout, /false/);
assert.strictEqual(result.code, 0);
});

it('should combine config file permissions with CLI flags', async () => {
const configPath = fixtures.path('permission/config-fs-read-write.json');
const configPath = fixtures.path('permission/config-fs-read-only.json');

const result = await spawnPromisified(process.execPath, [
'--permission',
'--experimental-config-file',
configPath,
'--allow-child-process',
'--allow-fs-read=*',
'--allow-fs-write=*',
'-p',
'process.permission.has("child") && process.permission.has("fs.read")',
'process.permission.has("child") && process.permission.has("fs.read") && process.permission.has("fs.write")',
]);
assert.match(result.stdout, /true/);
assert.strictEqual(result.code, 0);
Expand Down
Loading