tauri-cli 2.10.1

Command line interface for building Tauri apps
Documentation
// Copyright 2019-2024 Tauri Programme within The Commons Conservancy
// SPDX-License-Identifier: Apache-2.0
// SPDX-License-Identifier: MIT

use std::path::Path;

use clap::Parser;
use tauri_utils::acl::{manifest::PermissionFile, PERMISSION_SCHEMA_FILE_NAME};

use crate::{
  acl::FileFormat,
  error::{Context, ErrorExt},
  helpers::app_paths::resolve_tauri_dir,
  Result,
};

fn rm_permission_files(identifier: &str, dir: &Path) -> Result<()> {
  for entry in std::fs::read_dir(dir)
    .fs_context("failed to read permissions directory", dir.to_path_buf())?
    .flatten()
  {
    let file_type = entry
      .file_type()
      .fs_context("failed to get permission file type", entry.path())?;
    let path = entry.path();
    if file_type.is_dir() {
      rm_permission_files(identifier, &path)?;
    } else {
      if path
        .file_name()
        .map(|name| name == PERMISSION_SCHEMA_FILE_NAME)
        .unwrap_or_default()
      {
        continue;
      }

      let (mut permission_file, format): (PermissionFile, FileFormat) =
        match path.extension().and_then(|o| o.to_str()) {
          Some("toml") => {
            let content = std::fs::read_to_string(&path)
              .fs_context("failed to read permission file", path.clone())?;
            (
              toml::from_str(&content).context("failed to deserialize permission file")?,
              FileFormat::Toml,
            )
          }
          Some("json") => {
            let content =
              std::fs::read(&path).fs_context("failed to read permission file", path.clone())?;
            (
              serde_json::from_slice(&content)
                .context("failed to parse permission file as JSON")?,
              FileFormat::Json,
            )
          }
          _ => {
            continue;
          }
        };

      let mut updated;

      if identifier == "default" {
        updated = permission_file.default.is_some();
        permission_file.default = None;
      } else {
        let set_len = permission_file.set.len();
        permission_file
          .set
          .retain(|s| !identifier_match(identifier, &s.identifier));
        updated = permission_file.set.len() != set_len;

        let permission_len = permission_file.permission.len();
        permission_file
          .permission
          .retain(|s| !identifier_match(identifier, &s.identifier));
        updated = updated || permission_file.permission.len() != permission_len;
      }

      // if the file is empty, let's remove it
      if permission_file.default.is_none()
        && permission_file.set.is_empty()
        && permission_file.permission.is_empty()
      {
        std::fs::remove_file(&path).fs_context("failed to remove permission file", path.clone())?;
        log::info!(action = "Removed"; "file {}", dunce::simplified(&path).display());
      } else if updated {
        std::fs::write(
          &path,
          format
            .serialize(&permission_file)
            .context("failed to serialize permission")?,
        )
        .fs_context("failed to write permission file", path.clone())?;
        log::info!(action = "Removed"; "permission {identifier} from {}", dunce::simplified(&path).display());
      }
    }
  }

  Ok(())
}

fn rm_permission_from_capabilities(identifier: &str, dir: &Path) -> Result<()> {
  for entry in std::fs::read_dir(dir)
    .fs_context("failed to read capabilities directory", dir.to_path_buf())?
    .flatten()
  {
    let file_type = entry
      .file_type()
      .fs_context("failed to get capability file type", entry.path())?;
    if file_type.is_file() {
      let path = entry.path();
      match path.extension().and_then(|o| o.to_str()) {
        Some("toml") => {
          let content = std::fs::read_to_string(&path)
            .fs_context("failed to read capability file", path.clone())?;
          if let Ok(mut value) = content.parse::<toml_edit::DocumentMut>() {
            if let Some(permissions) = value.get_mut("permissions").and_then(|p| p.as_array_mut()) {
              let prev_len = permissions.len();
              permissions.retain(|p| match p {
                toml_edit::Value::String(s) => !identifier_match(identifier, s.value()),
                toml_edit::Value::InlineTable(o) => {
                  if let Some(toml_edit::Value::String(permission_name)) = o.get("identifier") {
                    return !identifier_match(identifier, permission_name.value());
                  }

                  true
                }
                _ => false,
              });
              if prev_len != permissions.len() {
                std::fs::write(&path, value.to_string())
                  .fs_context("failed to write capability file", path.clone())?;
                log::info!(action = "Removed"; "permission from capability at {}", dunce::simplified(&path).display());
              }
            }
          }
        }
        Some("json") => {
          let content =
            std::fs::read(&path).fs_context("failed to read capability file", path.clone())?;
          if let Ok(mut value) = serde_json::from_slice::<serde_json::Value>(&content) {
            if let Some(permissions) = value.get_mut("permissions").and_then(|p| p.as_array_mut()) {
              let prev_len = permissions.len();
              permissions.retain(|p| match p {
                serde_json::Value::String(s) => !identifier_match(identifier, s),
                serde_json::Value::Object(o) => {
                  if let Some(serde_json::Value::String(permission_name)) = o.get("identifier") {
                    return !identifier_match(identifier, permission_name);
                  }

                  true
                }
                _ => false,
              });
              if prev_len != permissions.len() {
                std::fs::write(
                  &path,
                  serde_json::to_vec_pretty(&value)
                    .context("failed to serialize capability JSON")?,
                )
                .fs_context("failed to write capability file", path.clone())?;
                log::info!(action = "Removed"; "permission from capability at {}", dunce::simplified(&path).display());
              }
            }
          }
        }
        _ => {}
      }
    }
  }

  Ok(())
}

fn identifier_match(identifier: &str, permission: &str) -> bool {
  match identifier.split_once(':') {
    Some((plugin_name, "*")) => permission.contains(plugin_name),
    _ => permission == identifier,
  }
}

#[derive(Debug, Parser)]
#[clap(about = "Remove a permission file, and its reference from any capability")]
pub struct Options {
  /// Permission to remove.
  ///
  /// To remove all permissions for a given plugin, provide `<plugin-name>:*`
  pub identifier: String,
}

pub fn command(options: Options) -> Result<()> {
  let permissions_dir = std::env::current_dir()
    .context("failed to resolve current directory")?
    .join("permissions");
  if permissions_dir.exists() {
    rm_permission_files(&options.identifier, &permissions_dir)?;
  }

  if let Some(tauri_dir) = resolve_tauri_dir() {
    let capabilities_dir = tauri_dir.join("capabilities");
    if capabilities_dir.exists() {
      rm_permission_from_capabilities(&options.identifier, &capabilities_dir)?;
    }
  }

  Ok(())
}