summaryrefslogtreecommitdiff
path: root/runtime/permissions/mod.rs
diff options
context:
space:
mode:
Diffstat (limited to 'runtime/permissions/mod.rs')
-rw-r--r--runtime/permissions/mod.rs47
1 files changed, 23 insertions, 24 deletions
diff --git a/runtime/permissions/mod.rs b/runtime/permissions/mod.rs
index 494e603a3..298146312 100644
--- a/runtime/permissions/mod.rs
+++ b/runtime/permissions/mod.rs
@@ -67,7 +67,7 @@ impl PermissionState {
format!(
"{} access{}",
name,
- info().map_or(String::new(), |info| { format!(" to {}", info) }),
+ info().map_or(String::new(), |info| { format!(" to {info}") }),
)
}
@@ -111,7 +111,7 @@ impl PermissionState {
let msg = format!(
"{} access{}",
name,
- info().map_or(String::new(), |info| { format!(" to {}", info) }),
+ info().map_or(String::new(), |info| { format!(" to {info}") }),
);
if PromptResponse::Allow == permission_prompt(&msg, name, api_name) {
Self::log_perm_access(name, info);
@@ -314,7 +314,7 @@ pub fn parse_sys_kind(kind: &str) -> Result<&str, AnyError> {
match kind {
"hostname" | "osRelease" | "osUptime" | "loadavg" | "networkInterfaces"
| "systemMemoryInfo" | "uid" | "gid" => Ok(kind),
- _ => Err(type_error(format!("unknown system info kind \"{}\"", kind))),
+ _ => Err(type_error(format!("unknown system info kind \"{kind}\""))),
}
}
@@ -451,7 +451,7 @@ impl UnaryPermission<ReadDescriptor> {
let (result, prompted) = self.query(Some(&resolved_path)).check(
self.name,
Some(api_name),
- Some(&format!("<{}>", display)),
+ Some(&format!("<{display}>")),
self.prompt,
);
if prompted {
@@ -687,7 +687,7 @@ impl UnaryPermission<NetDescriptor> {
if state == PermissionState::Prompt {
if PromptResponse::Allow
== permission_prompt(
- &format!("network access to \"{}\"", host),
+ &format!("network access to \"{host}\""),
self.name,
Some("Deno.permissions.query()"),
)
@@ -759,7 +759,7 @@ impl UnaryPermission<NetDescriptor> {
let (result, prompted) = self.query(Some(host)).check(
self.name,
api_name,
- Some(&format!("\"{}\"", new_host)),
+ Some(&format!("\"{new_host}\"")),
self.prompt,
);
if prompted {
@@ -784,13 +784,13 @@ impl UnaryPermission<NetDescriptor> {
.to_string();
let display_host = match url.port() {
None => hostname.clone(),
- Some(port) => format!("{}:{}", hostname, port),
+ Some(port) => format!("{hostname}:{port}"),
};
let host = &(&hostname, url.port_or_known_default());
let (result, prompted) = self.query(Some(host)).check(
self.name,
api_name,
- Some(&format!("\"{}\"", display_host)),
+ Some(&format!("\"{display_host}\"")),
self.prompt,
);
if prompted {
@@ -861,7 +861,7 @@ impl UnaryPermission<EnvDescriptor> {
if state == PermissionState::Prompt {
if PromptResponse::Allow
== permission_prompt(
- &format!("env access to \"{}\"", env),
+ &format!("env access to \"{env}\""),
self.name,
Some("Deno.permissions.query()"),
)
@@ -918,7 +918,7 @@ impl UnaryPermission<EnvDescriptor> {
let (result, prompted) = self.query(Some(env)).check(
self.name,
None,
- Some(&format!("\"{}\"", env)),
+ Some(&format!("\"{env}\"")),
self.prompt,
);
if prompted {
@@ -995,7 +995,7 @@ impl UnaryPermission<SysDescriptor> {
let desc = SysDescriptor(kind.to_string());
if PromptResponse::Allow
== permission_prompt(
- &format!("sys access to \"{}\"", kind),
+ &format!("sys access to \"{kind}\""),
self.name,
Some("Deno.permissions.query()"),
)
@@ -1044,7 +1044,7 @@ impl UnaryPermission<SysDescriptor> {
let (result, prompted) = self.query(Some(kind)).check(
self.name,
api_name,
- Some(&format!("\"{}\"", kind)),
+ Some(&format!("\"{kind}\"")),
self.prompt,
);
if prompted {
@@ -1118,7 +1118,7 @@ impl UnaryPermission<RunDescriptor> {
if state == PermissionState::Prompt {
if PromptResponse::Allow
== permission_prompt(
- &format!("run access to \"{}\"", cmd),
+ &format!("run access to \"{cmd}\""),
self.name,
Some("Deno.permissions.query()"),
)
@@ -1187,7 +1187,7 @@ impl UnaryPermission<RunDescriptor> {
let (result, prompted) = self.query(Some(cmd)).check(
self.name,
api_name,
- Some(&format!("\"{}\"", cmd)),
+ Some(&format!("\"{cmd}\"")),
self.prompt,
);
if prompted {
@@ -1606,8 +1606,7 @@ impl Permissions {
"file" => match specifier.to_file_path() {
Ok(path) => self.read.check(&path, Some("import()")),
Err(_) => Err(uri_error(format!(
- "Invalid file path.\n Specifier: {}",
- specifier
+ "Invalid file path.\n Specifier: {specifier}"
))),
},
"data" => Ok(()),
@@ -2121,42 +2120,42 @@ impl<'de> Deserialize<'de> for ChildPermissionsArg {
if key == "env" {
let arg = serde_json::from_value::<ChildUnaryPermissionArg>(value);
child_permissions_arg.env = arg.map_err(|e| {
- de::Error::custom(format!("(deno.permissions.env) {}", e))
+ de::Error::custom(format!("(deno.permissions.env) {e}"))
})?;
} else if key == "hrtime" {
let arg = serde_json::from_value::<ChildUnitPermissionArg>(value);
child_permissions_arg.hrtime = arg.map_err(|e| {
- de::Error::custom(format!("(deno.permissions.hrtime) {}", e))
+ de::Error::custom(format!("(deno.permissions.hrtime) {e}"))
})?;
} else if key == "net" {
let arg = serde_json::from_value::<ChildUnaryPermissionArg>(value);
child_permissions_arg.net = arg.map_err(|e| {
- de::Error::custom(format!("(deno.permissions.net) {}", e))
+ de::Error::custom(format!("(deno.permissions.net) {e}"))
})?;
} else if key == "ffi" {
let arg = serde_json::from_value::<ChildUnaryPermissionArg>(value);
child_permissions_arg.ffi = arg.map_err(|e| {
- de::Error::custom(format!("(deno.permissions.ffi) {}", e))
+ de::Error::custom(format!("(deno.permissions.ffi) {e}"))
})?;
} else if key == "read" {
let arg = serde_json::from_value::<ChildUnaryPermissionArg>(value);
child_permissions_arg.read = arg.map_err(|e| {
- de::Error::custom(format!("(deno.permissions.read) {}", e))
+ de::Error::custom(format!("(deno.permissions.read) {e}"))
})?;
} else if key == "run" {
let arg = serde_json::from_value::<ChildUnaryPermissionArg>(value);
child_permissions_arg.run = arg.map_err(|e| {
- de::Error::custom(format!("(deno.permissions.run) {}", e))
+ de::Error::custom(format!("(deno.permissions.run) {e}"))
})?;
} else if key == "sys" {
let arg = serde_json::from_value::<ChildUnaryPermissionArg>(value);
child_permissions_arg.sys = arg.map_err(|e| {
- de::Error::custom(format!("(deno.permissions.sys) {}", e))
+ de::Error::custom(format!("(deno.permissions.sys) {e}"))
})?;
} else if key == "write" {
let arg = serde_json::from_value::<ChildUnaryPermissionArg>(value);
child_permissions_arg.write = arg.map_err(|e| {
- de::Error::custom(format!("(deno.permissions.write) {}", e))
+ de::Error::custom(format!("(deno.permissions.write) {e}"))
})?;
} else {
return Err(de::Error::custom("unknown permission name"));