remove nested commands from deny

pull/1964/head
amrbashir 8 months ago
parent 5ccca82779
commit 57034948d9
No known key found for this signature in database
GPG Key ID: BBD7A47A2003FF33

2
Cargo.lock generated

@ -6565,7 +6565,9 @@ dependencies = [
"serde_repr", "serde_repr",
"tauri", "tauri",
"tauri-plugin", "tauri-plugin",
"tauri-utils",
"thiserror 2.0.3", "thiserror 2.0.3",
"toml 0.8.19",
"url", "url",
"uuid", "uuid",
] ]

@ -228,7 +228,11 @@ permissions = [
let mut permission_file = toml::from_str::<PermissionFile>(&content) let mut permission_file = toml::from_str::<PermissionFile>(&content)
.unwrap_or_else(|_| panic!("failed to deserialize {command}.toml")); .unwrap_or_else(|_| panic!("failed to deserialize {command}.toml"));
for p in permission_file.permission.iter_mut() { for p in permission_file
.permission
.iter_mut()
.filter(|p| p.identifier.starts_with("allow"))
{
p.commands p.commands
.allow .allow
.extend(nested_commands.iter().map(|s| s.to_string())); .extend(nested_commands.iter().map(|s| s.to_string()));

@ -18,5 +18,5 @@ identifier = "deny-read-text-file-lines"
description = "Denies the read_text_file_lines command without any pre-configured scope." description = "Denies the read_text_file_lines command without any pre-configured scope."
[permission.commands] [permission.commands]
allow = ["read_text_file_lines_next"] allow = []
deny = ["read_text_file_lines"] deny = ["read_text_file_lines"]

@ -19,8 +19,5 @@ identifier = "deny-write-file"
description = "Denies the write_file command without any pre-configured scope." description = "Denies the write_file command without any pre-configured scope."
[permission.commands] [permission.commands]
allow = [ allow = []
"open",
"write",
]
deny = ["write_file"] deny = ["write_file"]

Loading…
Cancel
Save