diff options
author | Luca Casonato <luca.casonato@antipy.com> | 2020-06-13 19:09:39 +0200 |
---|---|---|
committer | GitHub <noreply@github.com> | 2020-06-13 13:09:39 -0400 |
commit | 0ffc99a61ddfa958a436beef0d003ecead630d0f (patch) | |
tree | 7a2d40621cabfab9b2f6efb15872d467d0e25165 /docs/getting_started | |
parent | 77545219a6d5c9d474032ea5e8ccfcd69897d76b (diff) |
Move to allowlist and blocklist (#6282)
Diffstat (limited to 'docs/getting_started')
-rw-r--r-- | docs/getting_started/command_line_interface.md | 2 | ||||
-rw-r--r-- | docs/getting_started/permissions.md | 16 |
2 files changed, 9 insertions, 9 deletions
diff --git a/docs/getting_started/command_line_interface.md b/docs/getting_started/command_line_interface.md index dfbd551a9..7d033161c 100644 --- a/docs/getting_started/command_line_interface.md +++ b/docs/getting_started/command_line_interface.md @@ -110,7 +110,7 @@ resolution, compilation configuration etc. --config <FILE> Load tsconfig.json configuration file --importmap <FILE> UNSTABLE: Load import map file --no-remote Do not resolve remote modules ---reload=<CACHE_BLACKLIST> Reload source code cache (recompile TypeScript) +--reload=<CACHE_BLOCKLIST> Reload source code cache (recompile TypeScript) --unstable Enable unstable APIs ``` diff --git a/docs/getting_started/permissions.md b/docs/getting_started/permissions.md index 7b1eac693..72cd9d6d6 100644 --- a/docs/getting_started/permissions.md +++ b/docs/getting_started/permissions.md @@ -23,26 +23,26 @@ The following permissions are available: - **--allow-hrtime** Allow high resolution time measurement. High resolution time can be used in timing attacks and fingerprinting. - **--allow-net=\<allow-net\>** Allow network access. You can specify an - optional, comma separated list of domains to provide a whitelist of allowed + optional, comma separated list of domains to provide a allow-list of allowed domains. - **--allow-plugin** Allow loading plugins. Please note that --allow-plugin is an unstable feature. - **--allow-read=\<allow-read\>** Allow file system read access. You can specify an optional, comma separated list of directories or files to provide a - whitelist of allowed file system access. + allow-list of allowed file system access. - **--allow-run** Allow running subprocesses. Be aware that subprocesses are not run in a sandbox and therefore do not have the same security restrictions as the deno process. Therefore, use with caution. - **--allow-write=\<allow-write\>** Allow file system write access. You can specify an optional, comma separated list of directories or files to provide a - whitelist of allowed file system access. + allow-list of allowed file system access. -### Permissions whitelist +### Permissions allow-list Deno also allows you to control the granularity of some permissions with -whitelists. +allow-lists. -This example restricts file system access by whitelisting only the `/usr` +This example restricts file system access by allow-listing only the `/usr` directory, however the execution fails as the process was attempting to access a file in the `/etc` directory: @@ -54,7 +54,7 @@ error: Uncaught PermissionDenied: read access to "/etc/passwd", run again with t ... ``` -Try it out again with the correct permissions by whitelisting `/etc` instead: +Try it out again with the correct permissions by allow-listing `/etc` instead: ```shell deno run --allow-read=/etc https://deno.land/std/examples/cat.ts /etc/passwd @@ -70,7 +70,7 @@ _fetch.ts_: const result = await fetch("https://deno.land/"); ``` -This is an example on how to whitelist hosts/urls: +This is an example on how to allow-list hosts/urls: ```shell deno run --allow-net=github.com,deno.land fetch.ts |