summaryrefslogtreecommitdiff
path: root/ext/node/polyfills/_fs/_fs_access.ts
diff options
context:
space:
mode:
Diffstat (limited to 'ext/node/polyfills/_fs/_fs_access.ts')
-rw-r--r--ext/node/polyfills/_fs/_fs_access.ts127
1 files changed, 127 insertions, 0 deletions
diff --git a/ext/node/polyfills/_fs/_fs_access.ts b/ext/node/polyfills/_fs/_fs_access.ts
new file mode 100644
index 000000000..9450c2f01
--- /dev/null
+++ b/ext/node/polyfills/_fs/_fs_access.ts
@@ -0,0 +1,127 @@
+// Copyright 2018-2023 the Deno authors. All rights reserved. MIT license.
+
+import {
+ type CallbackWithError,
+ makeCallback,
+} from "internal:deno_node/polyfills/_fs/_fs_common.ts";
+import { fs } from "internal:deno_node/polyfills/internal_binding/constants.ts";
+import { codeMap } from "internal:deno_node/polyfills/internal_binding/uv.ts";
+import {
+ getValidatedPath,
+ getValidMode,
+} from "internal:deno_node/polyfills/internal/fs/utils.mjs";
+import type { Buffer } from "internal:deno_node/polyfills/buffer.ts";
+import { promisify } from "internal:deno_node/polyfills/internal/util.mjs";
+
+export function access(
+ path: string | Buffer | URL,
+ mode: number | CallbackWithError,
+ callback?: CallbackWithError,
+) {
+ if (typeof mode === "function") {
+ callback = mode;
+ mode = fs.F_OK;
+ }
+
+ path = getValidatedPath(path).toString();
+ mode = getValidMode(mode, "access");
+ const cb = makeCallback(callback);
+
+ Deno.lstat(path).then((info) => {
+ if (info.mode === null) {
+ // If the file mode is unavailable, we pretend it has
+ // the permission
+ cb(null);
+ return;
+ }
+ const m = +mode || 0;
+ let fileMode = +info.mode || 0;
+ if (Deno.build.os !== "windows" && info.uid === Deno.uid()) {
+ // If the user is the owner of the file, then use the owner bits of
+ // the file permission
+ fileMode >>= 6;
+ }
+ // TODO(kt3k): Also check the case when the user belong to the group
+ // of the file
+ if ((m & fileMode) === m) {
+ // all required flags exist
+ cb(null);
+ } else {
+ // some required flags don't
+ // deno-lint-ignore no-explicit-any
+ const e: any = new Error(`EACCES: permission denied, access '${path}'`);
+ e.path = path;
+ e.syscall = "access";
+ e.errno = codeMap.get("EACCES");
+ e.code = "EACCES";
+ cb(e);
+ }
+ }, (err) => {
+ if (err instanceof Deno.errors.NotFound) {
+ // deno-lint-ignore no-explicit-any
+ const e: any = new Error(
+ `ENOENT: no such file or directory, access '${path}'`,
+ );
+ e.path = path;
+ e.syscall = "access";
+ e.errno = codeMap.get("ENOENT");
+ e.code = "ENOENT";
+ cb(e);
+ } else {
+ cb(err);
+ }
+ });
+}
+
+export const accessPromise = promisify(access) as (
+ path: string | Buffer | URL,
+ mode?: number,
+) => Promise<void>;
+
+export function accessSync(path: string | Buffer | URL, mode?: number) {
+ path = getValidatedPath(path).toString();
+ mode = getValidMode(mode, "access");
+ try {
+ const info = Deno.lstatSync(path.toString());
+ if (info.mode === null) {
+ // If the file mode is unavailable, we pretend it has
+ // the permission
+ return;
+ }
+ const m = +mode! || 0;
+ let fileMode = +info.mode! || 0;
+ if (Deno.build.os !== "windows" && info.uid === Deno.uid()) {
+ // If the user is the owner of the file, then use the owner bits of
+ // the file permission
+ fileMode >>= 6;
+ }
+ // TODO(kt3k): Also check the case when the user belong to the group
+ // of the file
+ if ((m & fileMode) === m) {
+ // all required flags exist
+ } else {
+ // some required flags don't
+ // deno-lint-ignore no-explicit-any
+ const e: any = new Error(`EACCES: permission denied, access '${path}'`);
+ e.path = path;
+ e.syscall = "access";
+ e.errno = codeMap.get("EACCES");
+ e.code = "EACCES";
+ throw e;
+ }
+ } catch (err) {
+ if (err instanceof Deno.errors.NotFound) {
+ // deno-lint-ignore no-explicit-any
+ const e: any = new Error(
+ `ENOENT: no such file or directory, access '${path}'`,
+ );
+ e.path = path;
+ e.syscall = "access";
+ e.errno = codeMap.get("ENOENT");
+ e.code = "ENOENT";
+ throw e;
+ } else {
+ throw err;
+ }
+ }
+}