2021-01-11 12:13:41 -05:00
// Copyright 2018-2021 the Deno authors. All rights reserved. MIT license.
2020-09-21 12:36:37 -04:00
use deno_core ::futures ;
use deno_core ::futures ::prelude ::* ;
2021-01-04 09:52:22 -05:00
use deno_core ::serde_json ;
2020-09-16 14:28:07 -04:00
use deno_core ::url ;
2021-01-04 09:52:22 -05:00
use deno_runtime ::deno_fetch ::reqwest ;
2021-01-06 10:57:28 -05:00
use deno_runtime ::deno_websocket ::tokio_tungstenite ;
2021-05-10 19:49:57 -04:00
use deno_runtime ::ops ::tls ::rustls ;
use deno_runtime ::ops ::tls ::webpki ;
use deno_runtime ::ops ::tls ::TlsStream ;
2021-02-12 00:54:46 -05:00
use std ::fs ;
2021-04-10 16:04:44 -04:00
use std ::io ::BufReader ;
use std ::io ::Cursor ;
2021-02-12 00:54:46 -05:00
use std ::io ::{ BufRead , Read , Write } ;
2020-03-19 17:20:46 -04:00
use std ::process ::Command ;
2021-04-10 16:04:44 -04:00
use std ::sync ::Arc ;
2020-03-19 17:20:46 -04:00
use tempfile ::TempDir ;
2020-09-16 12:50:16 -04:00
use test_util as util ;
2021-05-10 19:49:57 -04:00
use tokio ::task ::LocalSet ;
2020-03-19 17:20:46 -04:00
2021-05-19 12:41:36 -04:00
// TODO(caspervonb): investiate why this fails on Windows.
#[ cfg(unix) ]
#[ test ]
fn typecheck_declarations_ns ( ) {
let status = util ::deno_cmd ( )
. arg ( " test " )
. arg ( " --allow-all " )
. arg ( " --doc " )
. arg ( util ::root_path ( ) . join ( " cli/dts/lib.deno.ns.d.ts " ) )
. spawn ( )
. unwrap ( )
. wait ( )
. unwrap ( ) ;
assert! ( status . success ( ) ) ;
}
// TODO(caspervonb): investiate why this fails on Windows.
#[ cfg(unix) ]
#[ test ]
fn typecheck_declarations_unstable ( ) {
let status = util ::deno_cmd ( )
. arg ( " test " )
. arg ( " --doc " )
. arg ( " --allow-all " )
. arg ( " --unstable " )
. arg ( util ::root_path ( ) . join ( " cli/dts/lib.deno.unstable.d.ts " ) )
. spawn ( )
. unwrap ( )
. wait ( )
. unwrap ( ) ;
assert! ( status . success ( ) ) ;
}
2021-01-09 07:08:03 -05:00
#[ test ]
2021-02-01 13:09:25 -05:00
fn js_unit_tests_lint ( ) {
2020-09-13 08:15:38 -04:00
let status = util ::deno_cmd ( )
. arg ( " lint " )
. arg ( " --unstable " )
2020-06-19 05:05:37 -04:00
. arg ( util ::root_path ( ) . join ( " cli/tests/unit " ) )
2020-06-12 09:19:29 -04:00
. spawn ( )
. unwrap ( )
. wait ( )
. unwrap ( ) ;
assert! ( status . success ( ) ) ;
}
2020-05-09 12:43:24 -04:00
#[ test ]
2021-02-01 13:09:25 -05:00
fn js_unit_tests ( ) {
2020-08-10 17:31:05 -04:00
let _g = util ::http_server ( ) ;
2021-04-27 07:14:01 -04:00
2021-04-28 14:17:04 -04:00
// Note that the unit tests are not safe for concurrency and must be run with a concurrency limit
// of one because there are some chdir tests in there.
// TODO(caspervonb) split these tests into two groups: parallel and serial.
2021-02-01 13:09:25 -05:00
let mut deno = util ::deno_cmd ( )
2020-05-09 12:43:24 -04:00
. current_dir ( util ::root_path ( ) )
2021-04-27 07:14:01 -04:00
. arg ( " test " )
2021-02-01 13:09:25 -05:00
. arg ( " --unstable " )
2021-04-27 07:14:01 -04:00
. arg ( " --location=http://js-unit-tests/foo/bar " )
2021-02-01 13:09:25 -05:00
. arg ( " -A " )
2021-04-27 07:14:01 -04:00
. arg ( " cli/tests/unit " )
2020-05-21 10:35:36 -04:00
. spawn ( )
2021-02-01 13:09:25 -05:00
. expect ( " failed to spawn script " ) ;
2021-04-27 07:14:01 -04:00
2021-02-01 13:09:25 -05:00
let status = deno . wait ( ) . expect ( " failed to wait for the child process " ) ;
assert_eq! ( Some ( 0 ) , status . code ( ) ) ;
assert! ( status . success ( ) ) ;
2020-05-21 10:35:36 -04:00
}
2021-02-01 13:09:25 -05:00
mod integration {
use super ::* ;
2020-06-11 10:58:09 -04:00
2021-02-01 13:09:25 -05:00
macro_rules ! itest (
( $name :ident { $( $key :ident : $value :expr , ) * } ) = > {
#[ test ]
fn $name ( ) {
( util ::CheckOutputIntegrationTest {
$(
$key : $value ,
) *
.. Default ::default ( )
} ) . run ( )
}
}
) ;
2020-06-11 10:58:09 -04:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn help_flag ( ) {
let status = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " --help " )
. spawn ( )
. unwrap ( )
. wait ( )
. unwrap ( ) ;
assert! ( status . success ( ) ) ;
}
2020-05-06 16:34:48 -04:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn version_short_flag ( ) {
let status = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " -V " )
. spawn ( )
. unwrap ( )
. wait ( )
. unwrap ( ) ;
assert! ( status . success ( ) ) ;
}
2020-05-06 16:34:48 -04:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn version_long_flag ( ) {
let status = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " --version " )
. spawn ( )
. unwrap ( )
. wait ( )
. unwrap ( ) ;
assert! ( status . success ( ) ) ;
2020-02-26 01:01:24 -05:00
}
2021-02-01 13:09:25 -05:00
#[ test ]
fn x_deno_warning ( ) {
let _g = util ::http_server ( ) ;
let output = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
2020-11-30 11:08:03 -05:00
. arg ( " run " )
2021-02-01 13:09:25 -05:00
. arg ( " --reload " )
. arg ( " http://127.0.0.1:4545/cli/tests/x_deno_warning.js " )
. stdout ( std ::process ::Stdio ::piped ( ) )
. stderr ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
assert! ( output . status . success ( ) ) ;
let stdout_str = std ::str ::from_utf8 ( & output . stdout ) . unwrap ( ) . trim ( ) ;
let stderr_str = std ::str ::from_utf8 ( & output . stderr ) . unwrap ( ) . trim ( ) ;
assert_eq! ( " testing x-deno-warning header " , stdout_str ) ;
assert! ( util ::strip_ansi_codes ( stderr_str ) . contains ( " Warning foobar " ) ) ;
2020-11-30 11:08:03 -05:00
}
2021-02-01 13:09:25 -05:00
#[ test ]
fn eval_p ( ) {
let output = util ::deno_cmd ( )
. arg ( " eval " )
. arg ( " -p " )
. arg ( " 1+2 " )
. stdout ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
assert! ( output . status . success ( ) ) ;
let stdout_str = util ::strip_ansi_codes (
std ::str ::from_utf8 ( & output . stdout ) . unwrap ( ) . trim ( ) ,
) ;
assert_eq! ( " 3 " , stdout_str ) ;
2020-06-08 13:24:27 -04:00
}
2021-02-01 13:09:25 -05:00
#[ test ]
fn run_from_stdin ( ) {
let mut deno = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " run " )
. arg ( " - " )
. stdout ( std ::process ::Stdio ::piped ( ) )
. stdin ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( ) ;
deno
. stdin
. as_mut ( )
. unwrap ( )
. write_all ( b " console.log( \" Hello World \" ); " )
. unwrap ( ) ;
let output = deno . wait_with_output ( ) . unwrap ( ) ;
assert! ( output . status . success ( ) ) ;
2020-05-15 10:22:28 -04:00
2021-02-01 13:09:25 -05:00
let deno_out = std ::str ::from_utf8 ( & output . stdout ) . unwrap ( ) . trim ( ) ;
assert_eq! ( " Hello World " , deno_out ) ;
2020-05-15 10:22:28 -04:00
2021-02-01 13:09:25 -05:00
let mut deno = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " run " )
. arg ( " - " )
. stdout ( std ::process ::Stdio ::piped ( ) )
. stdin ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( ) ;
deno
. stdin
. as_mut ( )
. unwrap ( )
. write_all ( b " console.log( \" Bye cached code \" ); " )
. unwrap ( ) ;
let output = deno . wait_with_output ( ) . unwrap ( ) ;
assert! ( output . status . success ( ) ) ;
2020-05-15 10:22:28 -04:00
2021-02-01 13:09:25 -05:00
let deno_out = std ::str ::from_utf8 ( & output . stdout ) . unwrap ( ) . trim ( ) ;
assert_eq! ( " Bye cached code " , deno_out ) ;
}
2019-09-19 14:48:05 -04:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn no_color ( ) {
let output = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " run " )
. arg ( " cli/tests/no_color.js " )
. env ( " NO_COLOR " , " 1 " )
. stdout ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
2020-05-11 14:49:19 -04:00
. unwrap ( ) ;
2021-02-01 13:09:25 -05:00
assert! ( output . status . success ( ) ) ;
let stdout_str = std ::str ::from_utf8 ( & output . stdout ) . unwrap ( ) . trim ( ) ;
assert_eq! ( " noColor true " , stdout_str ) ;
2019-09-19 14:48:05 -04:00
2021-02-01 13:09:25 -05:00
let output = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " run " )
. arg ( " cli/tests/no_color.js " )
. stdout ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
assert! ( output . status . success ( ) ) ;
let stdout_str = std ::str ::from_utf8 ( & output . stdout ) . unwrap ( ) . trim ( ) ;
assert_eq! ( " noColor false " , util ::strip_ansi_codes ( stdout_str ) ) ;
2020-09-30 07:46:42 -04:00
}
2021-02-15 21:50:27 -05:00
#[ test ]
fn auth_tokens ( ) {
let _g = util ::http_server ( ) ;
let output = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " run " )
. arg ( " http://127.0.0.1:4551/cli/tests/001_hello.js " )
. stdout ( std ::process ::Stdio ::piped ( ) )
. stderr ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
assert! ( ! output . status . success ( ) ) ;
let stdout_str = std ::str ::from_utf8 ( & output . stdout ) . unwrap ( ) . trim ( ) ;
assert! ( stdout_str . is_empty ( ) ) ;
let stderr_str = std ::str ::from_utf8 ( & output . stderr ) . unwrap ( ) . trim ( ) ;
eprintln! ( " {} " , stderr_str ) ;
assert! ( stderr_str . contains ( " Import 'http://127.0.0.1:4551/cli/tests/001_hello.js' failed: 404 Not Found " ) ) ;
let output = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " run " )
. arg ( " http://127.0.0.1:4551/cli/tests/001_hello.js " )
. env ( " DENO_AUTH_TOKENS " , " abcdef123456789@127.0.0.1:4551 " )
. stdout ( std ::process ::Stdio ::piped ( ) )
. stderr ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
assert! ( output . status . success ( ) ) ;
let stdout_str = std ::str ::from_utf8 ( & output . stdout ) . unwrap ( ) . trim ( ) ;
assert_eq! ( util ::strip_ansi_codes ( stdout_str ) , " Hello World " ) ;
}
2021-02-01 13:09:25 -05:00
#[ cfg(unix) ]
#[ test ]
pub fn test_raw_tty ( ) {
use std ::io ::{ Read , Write } ;
use util ::pty ::fork ::* ;
let deno_exe = util ::deno_exe_path ( ) ;
let root_path = util ::root_path ( ) ;
let fork = Fork ::from_ptmx ( ) . unwrap ( ) ;
if let Ok ( mut master ) = fork . is_parent ( ) {
let mut obytes : [ u8 ; 100 ] = [ 0 ; 100 ] ;
let mut nread = master . read ( & mut obytes ) . unwrap ( ) ;
assert_eq! ( String ::from_utf8_lossy ( & obytes [ 0 .. nread ] ) , " S " ) ;
master . write_all ( b " a " ) . unwrap ( ) ;
nread = master . read ( & mut obytes ) . unwrap ( ) ;
assert_eq! ( String ::from_utf8_lossy ( & obytes [ 0 .. nread ] ) , " A " ) ;
master . write_all ( b " b " ) . unwrap ( ) ;
nread = master . read ( & mut obytes ) . unwrap ( ) ;
assert_eq! ( String ::from_utf8_lossy ( & obytes [ 0 .. nread ] ) , " B " ) ;
master . write_all ( b " c " ) . unwrap ( ) ;
nread = master . read ( & mut obytes ) . unwrap ( ) ;
assert_eq! ( String ::from_utf8_lossy ( & obytes [ 0 .. nread ] ) , " C " ) ;
fork . wait ( ) . unwrap ( ) ;
} else {
use nix ::sys ::termios ;
use std ::os ::unix ::io ::AsRawFd ;
// Turn off echo such that parent is reading works properly.
let stdin_fd = std ::io ::stdin ( ) . as_raw_fd ( ) ;
let mut t = termios ::tcgetattr ( stdin_fd ) . unwrap ( ) ;
t . local_flags . remove ( termios ::LocalFlags ::ECHO ) ;
termios ::tcsetattr ( stdin_fd , termios ::SetArg ::TCSANOW , & t ) . unwrap ( ) ;
std ::env ::set_current_dir ( root_path ) . unwrap ( ) ;
let err = exec ::Command ::new ( deno_exe )
. arg ( " run " )
. arg ( " --unstable " )
. arg ( " --quiet " )
. arg ( " --no-check " )
. arg ( " cli/tests/raw_mode.ts " )
. exec ( ) ;
println! ( " err {} " , err ) ;
unreachable! ( )
}
2020-09-30 07:46:42 -04:00
}
2019-09-19 14:48:05 -04:00
2021-02-01 13:09:25 -05:00
#[ cfg(unix) ]
#[ test ]
pub fn test_raw_tty_cbreak ( ) {
use std ::io ::{ Read , Write } ;
use util ::pty ::fork ::* ;
let deno_exe = util ::deno_exe_path ( ) ;
let root_path = util ::root_path ( ) ;
let fork = Fork ::from_ptmx ( ) . unwrap ( ) ;
if let Ok ( mut master ) = fork . is_parent ( ) {
let mut obytes : [ u8 ; 100 ] = [ 0 ; 100 ] ;
let mut nread = master . read ( & mut obytes ) . unwrap ( ) ;
assert_eq! ( String ::from_utf8_lossy ( & obytes [ 0 .. nread ] ) , " S " ) ;
master . write_all ( & [ 3 ] ) . unwrap ( ) ; // send SIGINT
master . flush ( ) . unwrap ( ) ;
nread = master . read ( & mut obytes ) . unwrap ( ) ;
assert_eq! ( String ::from_utf8_lossy ( & obytes [ 0 .. nread ] ) , " A " ) ;
fork . wait ( ) . unwrap ( ) ;
} else {
// Keep echo enabled such that 'C^' would be printed in non-raw mode.
std ::env ::set_current_dir ( root_path ) . unwrap ( ) ;
let err = exec ::Command ::new ( deno_exe )
. arg ( " run " )
. arg ( " --unstable " )
. arg ( " --quiet " )
. arg ( " --no-check " )
. arg ( " cli/tests/raw_mode_cbreak.ts " )
. exec ( ) ;
println! ( " err {} " , err ) ;
unreachable! ( )
2020-11-26 14:12:26 -05:00
}
}
2021-02-01 13:09:25 -05:00
#[ test ]
fn deno_dir_test ( ) {
use std ::fs ::remove_dir_all ;
let _g = util ::http_server ( ) ;
let deno_dir = TempDir ::new ( ) . expect ( " tempdir fail " ) ;
remove_dir_all ( deno_dir . path ( ) ) . unwrap ( ) ;
2020-11-22 15:45:44 -05:00
2021-02-01 13:09:25 -05:00
// Run deno with no env flag
let status = util ::deno_cmd ( )
. env_remove ( " DENO_DIR " )
. current_dir ( util ::root_path ( ) )
. arg ( " run " )
. arg ( " http://localhost:4545/cli/tests/subdir/print_hello.ts " )
. spawn ( )
. expect ( " Failed to spawn script " )
. wait ( )
. expect ( " Failed to wait for child process " ) ;
assert! ( status . success ( ) ) ;
assert! ( ! deno_dir . path ( ) . exists ( ) ) ;
2020-11-22 15:45:44 -05:00
2021-02-01 13:09:25 -05:00
// Run deno with DENO_DIR env flag
let status = util ::deno_cmd ( )
. env ( " DENO_DIR " , deno_dir . path ( ) )
. current_dir ( util ::root_path ( ) )
. arg ( " run " )
. arg ( " http://localhost:4545/cli/tests/subdir/print_hello.ts " )
. spawn ( )
. expect ( " Failed to spawn script " )
. wait ( )
. expect ( " Failed to wait for child process " ) ;
assert! ( status . success ( ) ) ;
assert! ( deno_dir . path ( ) . is_dir ( ) ) ;
assert! ( deno_dir . path ( ) . join ( " deps " ) . is_dir ( ) ) ;
assert! ( deno_dir . path ( ) . join ( " gen " ) . is_dir ( ) ) ;
2020-11-22 15:45:44 -05:00
2021-02-01 13:09:25 -05:00
remove_dir_all ( deno_dir . path ( ) ) . unwrap ( ) ;
}
2020-11-22 15:45:44 -05:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn cache_test ( ) {
let _g = util ::http_server ( ) ;
let deno_dir = TempDir ::new ( ) . expect ( " tempdir fail " ) ;
let module_url =
url ::Url ::parse ( " http://localhost:4545/cli/tests/006_url_imports.ts " )
. unwrap ( ) ;
let output = Command ::new ( util ::deno_exe_path ( ) )
. env ( " DENO_DIR " , deno_dir . path ( ) )
. current_dir ( util ::root_path ( ) )
. arg ( " cache " )
2021-02-12 00:54:46 -05:00
. arg ( " -L " )
. arg ( " debug " )
2021-02-01 13:09:25 -05:00
. arg ( module_url . to_string ( ) )
. output ( )
. expect ( " Failed to spawn script " ) ;
assert! ( output . status . success ( ) ) ;
2021-02-12 00:54:46 -05:00
let out = std ::str ::from_utf8 ( & output . stderr ) . unwrap ( ) ;
// Check if file and dependencies are written successfully
assert! ( out . contains ( " host.writeFile( \" deno://subdir/print_hello.js \" ) " ) ) ;
assert! ( out . contains ( " host.writeFile( \" deno://subdir/mod2.js \" ) " ) ) ;
assert! ( out . contains ( " host.writeFile( \" deno://006_url_imports.js \" ) " ) ) ;
let prg = util ::deno_exe_path ( ) ;
let output = Command ::new ( & prg )
. env ( " DENO_DIR " , deno_dir . path ( ) )
. env ( " HTTP_PROXY " , " http://nil " )
. env ( " NO_COLOR " , " 1 " )
. current_dir ( util ::root_path ( ) )
. arg ( " run " )
. arg ( module_url . to_string ( ) )
. output ( )
. expect ( " Failed to spawn script " ) ;
let str_output = std ::str ::from_utf8 ( & output . stdout ) . unwrap ( ) ;
let module_output_path =
util ::root_path ( ) . join ( " cli/tests/006_url_imports.ts.out " ) ;
let mut module_output = String ::new ( ) ;
let mut module_output_file = fs ::File ::open ( module_output_path ) . unwrap ( ) ;
module_output_file
. read_to_string ( & mut module_output )
. unwrap ( ) ;
assert_eq! ( module_output , str_output ) ;
2021-02-01 13:09:25 -05:00
}
2020-11-22 15:45:44 -05:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn cache_invalidation_test ( ) {
let deno_dir = TempDir ::new ( ) . expect ( " tempdir fail " ) ;
let fixture_path = deno_dir . path ( ) . join ( " fixture.ts " ) ;
{
let mut file = std ::fs ::File ::create ( fixture_path . clone ( ) )
. expect ( " could not create fixture " ) ;
file
. write_all ( b " console.log( \" 42 \" ); " )
. expect ( " could not write fixture " ) ;
}
let output = Command ::new ( util ::deno_exe_path ( ) )
. env ( " DENO_DIR " , deno_dir . path ( ) )
. current_dir ( util ::root_path ( ) )
. arg ( " run " )
. arg ( fixture_path . to_str ( ) . unwrap ( ) )
. output ( )
. expect ( " Failed to spawn script " ) ;
assert! ( output . status . success ( ) ) ;
let actual = std ::str ::from_utf8 ( & output . stdout ) . unwrap ( ) ;
assert_eq! ( actual , " 42 \n " ) ;
{
let mut file = std ::fs ::File ::create ( fixture_path . clone ( ) )
. expect ( " could not create fixture " ) ;
file
. write_all ( b " console.log( \" 43 \" ); " )
. expect ( " could not write fixture " ) ;
}
let output = Command ::new ( util ::deno_exe_path ( ) )
. env ( " DENO_DIR " , deno_dir . path ( ) )
. current_dir ( util ::root_path ( ) )
. arg ( " run " )
. arg ( fixture_path . to_str ( ) . unwrap ( ) )
. output ( )
. expect ( " Failed to spawn script " ) ;
assert! ( output . status . success ( ) ) ;
let actual = std ::str ::from_utf8 ( & output . stdout ) . unwrap ( ) ;
assert_eq! ( actual , " 43 \n " ) ;
}
2020-11-22 15:45:44 -05:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn cache_invalidation_test_no_check ( ) {
let deno_dir = TempDir ::new ( ) . expect ( " tempdir fail " ) ;
let fixture_path = deno_dir . path ( ) . join ( " fixture.ts " ) ;
{
let mut file = std ::fs ::File ::create ( fixture_path . clone ( ) )
. expect ( " could not create fixture " ) ;
file
. write_all ( b " console.log( \" 42 \" ); " )
. expect ( " could not write fixture " ) ;
}
let output = Command ::new ( util ::deno_exe_path ( ) )
. env ( " DENO_DIR " , deno_dir . path ( ) )
. current_dir ( util ::root_path ( ) )
. arg ( " run " )
. arg ( " --no-check " )
. arg ( fixture_path . to_str ( ) . unwrap ( ) )
. output ( )
. expect ( " Failed to spawn script " ) ;
assert! ( output . status . success ( ) ) ;
let actual = std ::str ::from_utf8 ( & output . stdout ) . unwrap ( ) ;
assert_eq! ( actual , " 42 \n " ) ;
{
let mut file = std ::fs ::File ::create ( fixture_path . clone ( ) )
. expect ( " could not create fixture " ) ;
file
. write_all ( b " console.log( \" 43 \" ); " )
. expect ( " could not write fixture " ) ;
}
let output = Command ::new ( util ::deno_exe_path ( ) )
. env ( " DENO_DIR " , deno_dir . path ( ) )
. current_dir ( util ::root_path ( ) )
. arg ( " run " )
. arg ( " --no-check " )
. arg ( fixture_path . to_str ( ) . unwrap ( ) )
. output ( )
. expect ( " Failed to spawn script " ) ;
assert! ( output . status . success ( ) ) ;
let actual = std ::str ::from_utf8 ( & output . stdout ) . unwrap ( ) ;
assert_eq! ( actual , " 43 \n " ) ;
}
2020-11-28 09:18:13 -05:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn fmt_test ( ) {
let t = TempDir ::new ( ) . expect ( " tempdir fail " ) ;
let fixed_js = util ::root_path ( ) . join ( " cli/tests/badly_formatted_fixed.js " ) ;
let badly_formatted_original_js =
util ::root_path ( ) . join ( " cli/tests/badly_formatted.mjs " ) ;
let badly_formatted_js = t . path ( ) . join ( " badly_formatted.js " ) ;
let badly_formatted_js_str = badly_formatted_js . to_str ( ) . unwrap ( ) ;
std ::fs ::copy ( & badly_formatted_original_js , & badly_formatted_js )
. expect ( " Failed to copy file " ) ;
2021-02-18 11:31:32 -05:00
let fixed_md = util ::root_path ( ) . join ( " cli/tests/badly_formatted_fixed.md " ) ;
let badly_formatted_original_md =
util ::root_path ( ) . join ( " cli/tests/badly_formatted.md " ) ;
let badly_formatted_md = t . path ( ) . join ( " badly_formatted.md " ) ;
let badly_formatted_md_str = badly_formatted_md . to_str ( ) . unwrap ( ) ;
2021-02-01 13:09:25 -05:00
std ::fs ::copy ( & badly_formatted_original_md , & badly_formatted_md )
. expect ( " Failed to copy file " ) ;
2021-02-18 11:31:32 -05:00
let fixed_json =
util ::root_path ( ) . join ( " cli/tests/badly_formatted_fixed.json " ) ;
let badly_formatted_original_json =
util ::root_path ( ) . join ( " cli/tests/badly_formatted.json " ) ;
let badly_formatted_json = t . path ( ) . join ( " badly_formatted.json " ) ;
let badly_formatted_json_str = badly_formatted_json . to_str ( ) . unwrap ( ) ;
std ::fs ::copy ( & badly_formatted_original_json , & badly_formatted_json )
. expect ( " Failed to copy file " ) ;
2021-02-01 13:09:25 -05:00
// First, check formatting by ignoring the badly formatted file.
let status = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " fmt " )
. arg ( format! (
2021-02-18 11:31:32 -05:00
" --ignore={},{},{} " ,
badly_formatted_js_str ,
badly_formatted_md_str ,
badly_formatted_json_str
2021-02-01 13:09:25 -05:00
) )
. arg ( " --check " )
. arg ( badly_formatted_js_str )
. arg ( badly_formatted_md_str )
2021-02-18 11:31:32 -05:00
. arg ( badly_formatted_json_str )
2021-02-01 13:09:25 -05:00
. spawn ( )
. expect ( " Failed to spawn script " )
. wait ( )
. expect ( " Failed to wait for child process " ) ;
2021-02-19 07:18:16 -05:00
// No target files found
assert! ( ! status . success ( ) ) ;
2021-02-01 13:09:25 -05:00
// Check without ignore.
let status = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " fmt " )
. arg ( " --check " )
. arg ( badly_formatted_js_str )
. arg ( badly_formatted_md_str )
2021-02-18 11:31:32 -05:00
. arg ( badly_formatted_json_str )
2021-02-01 13:09:25 -05:00
. spawn ( )
. expect ( " Failed to spawn script " )
. wait ( )
. expect ( " Failed to wait for child process " ) ;
assert! ( ! status . success ( ) ) ;
2021-02-19 07:18:16 -05:00
2021-02-01 13:09:25 -05:00
// Format the source file.
let status = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " fmt " )
. arg ( badly_formatted_js_str )
. arg ( badly_formatted_md_str )
2021-02-18 11:31:32 -05:00
. arg ( badly_formatted_json_str )
2021-02-01 13:09:25 -05:00
. spawn ( )
. expect ( " Failed to spawn script " )
. wait ( )
. expect ( " Failed to wait for child process " ) ;
assert! ( status . success ( ) ) ;
let expected_js = std ::fs ::read_to_string ( fixed_js ) . unwrap ( ) ;
let expected_md = std ::fs ::read_to_string ( fixed_md ) . unwrap ( ) ;
2021-02-18 11:31:32 -05:00
let expected_json = std ::fs ::read_to_string ( fixed_json ) . unwrap ( ) ;
2021-02-01 13:09:25 -05:00
let actual_js = std ::fs ::read_to_string ( badly_formatted_js ) . unwrap ( ) ;
let actual_md = std ::fs ::read_to_string ( badly_formatted_md ) . unwrap ( ) ;
2021-02-18 11:31:32 -05:00
let actual_json = std ::fs ::read_to_string ( badly_formatted_json ) . unwrap ( ) ;
2021-02-01 13:09:25 -05:00
assert_eq! ( expected_js , actual_js ) ;
assert_eq! ( expected_md , actual_md ) ;
2021-02-18 11:31:32 -05:00
assert_eq! ( expected_json , actual_json ) ;
2021-02-01 13:09:25 -05:00
}
2020-11-22 15:45:44 -05:00
2021-02-01 13:09:25 -05:00
mod file_watcher {
use super ::* ;
// Helper function to skip watcher output that contains "Restarting"
// phrase.
fn skip_restarting_line (
mut stderr_lines : impl Iterator < Item = String > ,
) -> String {
loop {
let msg = stderr_lines . next ( ) . unwrap ( ) ;
if ! msg . contains ( " Restarting " ) {
return msg ;
}
}
}
2020-02-27 15:39:41 -05:00
2021-02-01 13:09:25 -05:00
/// Helper function to skip watcher output that doesn't contain
/// "{job_name} finished" phrase.
fn wait_for_process_finished (
job_name : & str ,
stderr_lines : & mut impl Iterator < Item = String > ,
) {
let phrase = format! ( " {} finished " , job_name ) ;
loop {
let msg = stderr_lines . next ( ) . unwrap ( ) ;
if msg . contains ( & phrase ) {
break ;
}
}
}
2020-03-23 11:37:24 -04:00
2021-05-10 02:06:13 -04:00
/// Helper function to skip watcher output that doesn't contain
/// "{job_name} failed" phrase.
fn wait_for_process_failed (
job_name : & str ,
stderr_lines : & mut impl Iterator < Item = String > ,
) {
let phrase = format! ( " {} failed " , job_name ) ;
loop {
let msg = stderr_lines . next ( ) . unwrap ( ) ;
if msg . contains ( & phrase ) {
break ;
}
}
}
2021-02-01 13:09:25 -05:00
#[ test ]
fn fmt_watch_test ( ) {
let t = TempDir ::new ( ) . expect ( " tempdir fail " ) ;
let fixed = util ::root_path ( ) . join ( " cli/tests/badly_formatted_fixed.js " ) ;
let badly_formatted_original =
util ::root_path ( ) . join ( " cli/tests/badly_formatted.mjs " ) ;
let badly_formatted = t . path ( ) . join ( " badly_formatted.js " ) ;
std ::fs ::copy ( & badly_formatted_original , & badly_formatted )
. expect ( " Failed to copy file " ) ;
let mut child = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " fmt " )
. arg ( & badly_formatted )
. arg ( " --watch " )
. arg ( " --unstable " )
. stdout ( std ::process ::Stdio ::piped ( ) )
. stderr ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. expect ( " Failed to spawn script " ) ;
let stderr = child . stderr . as_mut ( ) . unwrap ( ) ;
let stderr_lines =
std ::io ::BufReader ::new ( stderr ) . lines ( ) . map ( | r | r . unwrap ( ) ) ;
// TODO(lucacasonato): remove this timeout. It seems to be needed on Linux.
std ::thread ::sleep ( std ::time ::Duration ::from_secs ( 1 ) ) ;
assert! ( skip_restarting_line ( stderr_lines ) . contains ( " badly_formatted.js " ) ) ;
let expected = std ::fs ::read_to_string ( fixed . clone ( ) ) . unwrap ( ) ;
let actual = std ::fs ::read_to_string ( badly_formatted . clone ( ) ) . unwrap ( ) ;
assert_eq! ( expected , actual ) ;
// Change content of the file again to be badly formatted
std ::fs ::copy ( & badly_formatted_original , & badly_formatted )
. expect ( " Failed to copy file " ) ;
std ::thread ::sleep ( std ::time ::Duration ::from_secs ( 1 ) ) ;
// Check if file has been automatically formatted by watcher
let expected = std ::fs ::read_to_string ( fixed ) . unwrap ( ) ;
let actual = std ::fs ::read_to_string ( badly_formatted ) . unwrap ( ) ;
assert_eq! ( expected , actual ) ;
// the watcher process is still alive
assert! ( child . try_wait ( ) . unwrap ( ) . is_none ( ) ) ;
child . kill ( ) . unwrap ( ) ;
drop ( t ) ;
}
2020-06-29 09:13:07 -04:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn bundle_js_watch ( ) {
use std ::path ::PathBuf ;
// Test strategy extends this of test bundle_js by adding watcher
let t = TempDir ::new ( ) . expect ( " tempdir fail " ) ;
let file_to_watch = t . path ( ) . join ( " file_to_watch.js " ) ;
std ::fs ::write ( & file_to_watch , " console.log('Hello world'); " )
. expect ( " error writing file " ) ;
assert! ( file_to_watch . is_file ( ) ) ;
let t = TempDir ::new ( ) . expect ( " tempdir fail " ) ;
let bundle = t . path ( ) . join ( " mod6.bundle.js " ) ;
let mut deno = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " bundle " )
. arg ( & file_to_watch )
. arg ( & bundle )
. arg ( " --watch " )
. arg ( " --unstable " )
2021-05-10 02:06:13 -04:00
. env ( " NO_COLOR " , " 1 " )
2021-02-01 13:09:25 -05:00
. stdout ( std ::process ::Stdio ::piped ( ) )
. stderr ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. expect ( " failed to spawn script " ) ;
let stderr = deno . stderr . as_mut ( ) . unwrap ( ) ;
let mut stderr_lines =
std ::io ::BufReader ::new ( stderr ) . lines ( ) . map ( | r | r . unwrap ( ) ) ;
std ::thread ::sleep ( std ::time ::Duration ::from_secs ( 1 ) ) ;
assert! ( stderr_lines . next ( ) . unwrap ( ) . contains ( " file_to_watch.js " ) ) ;
assert! ( stderr_lines . next ( ) . unwrap ( ) . contains ( " mod6.bundle.js " ) ) ;
let file = PathBuf ::from ( & bundle ) ;
assert! ( file . is_file ( ) ) ;
wait_for_process_finished ( " Bundle " , & mut stderr_lines ) ;
std ::fs ::write ( & file_to_watch , " console.log('Hello world2'); " )
. expect ( " error writing file " ) ;
std ::thread ::sleep ( std ::time ::Duration ::from_secs ( 1 ) ) ;
assert! ( stderr_lines
. next ( )
. unwrap ( )
. contains ( " File change detected! " ) ) ;
assert! ( stderr_lines . next ( ) . unwrap ( ) . contains ( " file_to_watch.js " ) ) ;
assert! ( stderr_lines . next ( ) . unwrap ( ) . contains ( " mod6.bundle.js " ) ) ;
let file = PathBuf ::from ( & bundle ) ;
assert! ( file . is_file ( ) ) ;
wait_for_process_finished ( " Bundle " , & mut stderr_lines ) ;
// Confirm that the watcher keeps on working even if the file is updated and has invalid syntax
std ::fs ::write ( & file_to_watch , " syntax error ^^ " )
. expect ( " error writing file " ) ;
std ::thread ::sleep ( std ::time ::Duration ::from_secs ( 1 ) ) ;
assert! ( stderr_lines
. next ( )
. unwrap ( )
. contains ( " File change detected! " ) ) ;
2021-05-10 02:06:13 -04:00
assert! ( stderr_lines . next ( ) . unwrap ( ) . contains ( " error: " ) ) ;
wait_for_process_failed ( " Bundle " , & mut stderr_lines ) ;
2021-02-01 13:09:25 -05:00
// the watcher process is still alive
assert! ( deno . try_wait ( ) . unwrap ( ) . is_none ( ) ) ;
deno . kill ( ) . unwrap ( ) ;
drop ( t ) ;
}
2020-05-09 06:31:15 -04:00
2021-02-01 13:09:25 -05:00
/// Confirm that the watcher continues to work even if module resolution fails at the *first* attempt
#[ test ]
fn bundle_watch_not_exit ( ) {
let t = TempDir ::new ( ) . expect ( " tempdir fail " ) ;
let file_to_watch = t . path ( ) . join ( " file_to_watch.js " ) ;
std ::fs ::write ( & file_to_watch , " syntax error ^^ " )
. expect ( " error writing file " ) ;
let target_file = t . path ( ) . join ( " target.js " ) ;
let mut deno = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " bundle " )
. arg ( & file_to_watch )
. arg ( & target_file )
. arg ( " --watch " )
. arg ( " --unstable " )
. env ( " NO_COLOR " , " 1 " )
. stdout ( std ::process ::Stdio ::piped ( ) )
. stderr ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. expect ( " failed to spawn script " ) ;
let stderr = deno . stderr . as_mut ( ) . unwrap ( ) ;
let mut stderr_lines =
std ::io ::BufReader ::new ( stderr ) . lines ( ) . map ( | r | r . unwrap ( ) ) ;
std ::thread ::sleep ( std ::time ::Duration ::from_secs ( 1 ) ) ;
assert! ( stderr_lines . next ( ) . unwrap ( ) . contains ( " error: " ) ) ;
2021-05-10 02:06:13 -04:00
assert! ( stderr_lines . next ( ) . unwrap ( ) . contains ( " Bundle failed " ) ) ;
2021-02-01 13:09:25 -05:00
// the target file hasn't been created yet
assert! ( ! target_file . is_file ( ) ) ;
// Make sure the watcher actually restarts and works fine with the proper syntax
std ::fs ::write ( & file_to_watch , " console.log(42); " )
. expect ( " error writing file " ) ;
std ::thread ::sleep ( std ::time ::Duration ::from_secs ( 1 ) ) ;
assert! ( stderr_lines
. next ( )
. unwrap ( )
. contains ( " File change detected! " ) ) ;
assert! ( stderr_lines . next ( ) . unwrap ( ) . contains ( " file_to_watch.js " ) ) ;
assert! ( stderr_lines . next ( ) . unwrap ( ) . contains ( " target.js " ) ) ;
wait_for_process_finished ( " Bundle " , & mut stderr_lines ) ;
// bundled file is created
assert! ( target_file . is_file ( ) ) ;
// the watcher process is still alive
assert! ( deno . try_wait ( ) . unwrap ( ) . is_none ( ) ) ;
drop ( t ) ;
}
2020-11-29 14:00:35 -05:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn run_watch ( ) {
let t = TempDir ::new ( ) . expect ( " tempdir fail " ) ;
let file_to_watch = t . path ( ) . join ( " file_to_watch.js " ) ;
std ::fs ::write ( & file_to_watch , " console.log('Hello world'); " )
. expect ( " error writing file " ) ;
let mut child = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " run " )
. arg ( " --watch " )
. arg ( " --unstable " )
. arg ( & file_to_watch )
. env ( " NO_COLOR " , " 1 " )
. stdout ( std ::process ::Stdio ::piped ( ) )
. stderr ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. expect ( " failed to spawn script " ) ;
let stdout = child . stdout . as_mut ( ) . unwrap ( ) ;
let mut stdout_lines =
std ::io ::BufReader ::new ( stdout ) . lines ( ) . map ( | r | r . unwrap ( ) ) ;
let stderr = child . stderr . as_mut ( ) . unwrap ( ) ;
let mut stderr_lines =
std ::io ::BufReader ::new ( stderr ) . lines ( ) . map ( | r | r . unwrap ( ) ) ;
assert! ( stdout_lines . next ( ) . unwrap ( ) . contains ( " Hello world " ) ) ;
wait_for_process_finished ( " Process " , & mut stderr_lines ) ;
// TODO(lucacasonato): remove this timeout. It seems to be needed on Linux.
std ::thread ::sleep ( std ::time ::Duration ::from_secs ( 1 ) ) ;
// Change content of the file
std ::fs ::write ( & file_to_watch , " console.log('Hello world2'); " )
. expect ( " error writing file " ) ;
// Events from the file watcher is "debounced", so we need to wait for the next execution to start
std ::thread ::sleep ( std ::time ::Duration ::from_secs ( 1 ) ) ;
assert! ( stderr_lines . next ( ) . unwrap ( ) . contains ( " Restarting " ) ) ;
assert! ( stdout_lines . next ( ) . unwrap ( ) . contains ( " Hello world2 " ) ) ;
wait_for_process_finished ( " Process " , & mut stderr_lines ) ;
// Add dependency
let another_file = t . path ( ) . join ( " another_file.js " ) ;
std ::fs ::write ( & another_file , " export const foo = 0; " )
. expect ( " error writing file " ) ;
std ::fs ::write (
& file_to_watch ,
" import { foo } from './another_file.js'; console.log(foo); " ,
)
. expect ( " error writing file " ) ;
std ::thread ::sleep ( std ::time ::Duration ::from_secs ( 1 ) ) ;
assert! ( stderr_lines . next ( ) . unwrap ( ) . contains ( " Restarting " ) ) ;
assert! ( stdout_lines . next ( ) . unwrap ( ) . contains ( '0' ) ) ;
wait_for_process_finished ( " Process " , & mut stderr_lines ) ;
// Confirm that restarting occurs when a new file is updated
std ::fs ::write ( & another_file , " export const foo = 42; " )
. expect ( " error writing file " ) ;
std ::thread ::sleep ( std ::time ::Duration ::from_secs ( 1 ) ) ;
assert! ( stderr_lines . next ( ) . unwrap ( ) . contains ( " Restarting " ) ) ;
assert! ( stdout_lines . next ( ) . unwrap ( ) . contains ( " 42 " ) ) ;
wait_for_process_finished ( " Process " , & mut stderr_lines ) ;
// Confirm that the watcher keeps on working even if the file is updated and has invalid syntax
std ::fs ::write ( & file_to_watch , " syntax error ^^ " )
. expect ( " error writing file " ) ;
std ::thread ::sleep ( std ::time ::Duration ::from_secs ( 1 ) ) ;
assert! ( stderr_lines . next ( ) . unwrap ( ) . contains ( " Restarting " ) ) ;
assert! ( stderr_lines . next ( ) . unwrap ( ) . contains ( " error: " ) ) ;
2021-05-10 02:06:13 -04:00
wait_for_process_failed ( " Process " , & mut stderr_lines ) ;
2021-02-01 13:09:25 -05:00
// Then restore the file
std ::fs ::write (
& file_to_watch ,
" import { foo } from './another_file.js'; console.log(foo); " ,
)
. expect ( " error writing file " ) ;
std ::thread ::sleep ( std ::time ::Duration ::from_secs ( 1 ) ) ;
assert! ( stderr_lines . next ( ) . unwrap ( ) . contains ( " Restarting " ) ) ;
assert! ( stdout_lines . next ( ) . unwrap ( ) . contains ( " 42 " ) ) ;
wait_for_process_finished ( " Process " , & mut stderr_lines ) ;
// Update the content of the imported file with invalid syntax
std ::fs ::write ( & another_file , " syntax error ^^ " )
. expect ( " error writing file " ) ;
std ::thread ::sleep ( std ::time ::Duration ::from_secs ( 1 ) ) ;
assert! ( stderr_lines . next ( ) . unwrap ( ) . contains ( " Restarting " ) ) ;
assert! ( stderr_lines . next ( ) . unwrap ( ) . contains ( " error: " ) ) ;
2021-05-10 02:06:13 -04:00
wait_for_process_failed ( " Process " , & mut stderr_lines ) ;
2021-02-01 13:09:25 -05:00
// Modify the imported file and make sure that restarting occurs
std ::fs ::write ( & another_file , " export const foo = 'modified!'; " )
. expect ( " error writing file " ) ;
std ::thread ::sleep ( std ::time ::Duration ::from_secs ( 1 ) ) ;
assert! ( stderr_lines . next ( ) . unwrap ( ) . contains ( " Restarting " ) ) ;
assert! ( stdout_lines . next ( ) . unwrap ( ) . contains ( " modified! " ) ) ;
wait_for_process_finished ( " Process " , & mut stderr_lines ) ;
// the watcher process is still alive
assert! ( child . try_wait ( ) . unwrap ( ) . is_none ( ) ) ;
child . kill ( ) . unwrap ( ) ;
drop ( t ) ;
}
2020-07-06 18:21:26 -04:00
2021-02-01 13:09:25 -05:00
/// Confirm that the watcher continues to work even if module resolution fails at the *first* attempt
#[ test ]
fn run_watch_not_exit ( ) {
let t = TempDir ::new ( ) . expect ( " tempdir fail " ) ;
let file_to_watch = t . path ( ) . join ( " file_to_watch.js " ) ;
std ::fs ::write ( & file_to_watch , " syntax error ^^ " )
. expect ( " error writing file " ) ;
let mut child = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " run " )
. arg ( " --watch " )
. arg ( " --unstable " )
. arg ( & file_to_watch )
. env ( " NO_COLOR " , " 1 " )
. stdout ( std ::process ::Stdio ::piped ( ) )
. stderr ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. expect ( " failed to spawn script " ) ;
let stdout = child . stdout . as_mut ( ) . unwrap ( ) ;
let mut stdout_lines =
std ::io ::BufReader ::new ( stdout ) . lines ( ) . map ( | r | r . unwrap ( ) ) ;
let stderr = child . stderr . as_mut ( ) . unwrap ( ) ;
let mut stderr_lines =
std ::io ::BufReader ::new ( stderr ) . lines ( ) . map ( | r | r . unwrap ( ) ) ;
std ::thread ::sleep ( std ::time ::Duration ::from_secs ( 1 ) ) ;
assert! ( stderr_lines . next ( ) . unwrap ( ) . contains ( " error: " ) ) ;
2021-05-10 02:06:13 -04:00
assert! ( stderr_lines . next ( ) . unwrap ( ) . contains ( " Process failed " ) ) ;
2021-02-01 13:09:25 -05:00
// Make sure the watcher actually restarts and works fine with the proper syntax
std ::fs ::write ( & file_to_watch , " console.log(42); " )
. expect ( " error writing file " ) ;
std ::thread ::sleep ( std ::time ::Duration ::from_secs ( 1 ) ) ;
assert! ( stderr_lines . next ( ) . unwrap ( ) . contains ( " Restarting " ) ) ;
assert! ( stdout_lines . next ( ) . unwrap ( ) . contains ( " 42 " ) ) ;
wait_for_process_finished ( " Process " , & mut stderr_lines ) ;
// the watcher process is still alive
assert! ( child . try_wait ( ) . unwrap ( ) . is_none ( ) ) ;
drop ( t ) ;
}
#[ test ]
fn run_watch_with_import_map_and_relative_paths ( ) {
fn create_relative_tmp_file (
directory : & TempDir ,
filename : & 'static str ,
filecontent : & 'static str ,
) -> std ::path ::PathBuf {
let absolute_path = directory . path ( ) . join ( filename ) ;
std ::fs ::write ( & absolute_path , filecontent )
. expect ( " error writing file " ) ;
let relative_path = absolute_path
. strip_prefix ( util ::root_path ( ) )
. expect ( " unable to create relative temporary file " )
. to_owned ( ) ;
assert! ( relative_path . is_relative ( ) ) ;
relative_path
}
let temp_directory =
TempDir ::new_in ( util ::root_path ( ) ) . expect ( " tempdir fail " ) ;
let file_to_watch = create_relative_tmp_file (
& temp_directory ,
" file_to_watch.js " ,
" console.log('Hello world'); " ,
) ;
let import_map_path = create_relative_tmp_file (
& temp_directory ,
" import_map.json " ,
" { \" imports \" : {}} " ,
) ;
let mut child = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " run " )
. arg ( " --unstable " )
. arg ( " --watch " )
. arg ( " --import-map " )
. arg ( & import_map_path )
. arg ( & file_to_watch )
. env ( " NO_COLOR " , " 1 " )
. stdout ( std ::process ::Stdio ::piped ( ) )
. stderr ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. expect ( " failed to spawn script " ) ;
let stdout = child . stdout . as_mut ( ) . unwrap ( ) ;
let mut stdout_lines =
std ::io ::BufReader ::new ( stdout ) . lines ( ) . map ( | r | r . unwrap ( ) ) ;
let stderr = child . stderr . as_mut ( ) . unwrap ( ) ;
let mut stderr_lines =
std ::io ::BufReader ::new ( stderr ) . lines ( ) . map ( | r | r . unwrap ( ) ) ;
assert! ( stderr_lines . next ( ) . unwrap ( ) . contains ( " Process finished " ) ) ;
assert! ( stdout_lines . next ( ) . unwrap ( ) . contains ( " Hello world " ) ) ;
child . kill ( ) . unwrap ( ) ;
drop ( file_to_watch ) ;
drop ( import_map_path ) ;
temp_directory . close ( ) . unwrap ( ) ;
}
2021-05-10 02:06:13 -04:00
2021-05-11 16:09:44 -04:00
// TODO(bartlomieju): flaky (https://github.com/denoland/deno/issues/10552)
#[ ignore ]
2021-05-10 02:06:13 -04:00
#[ test ]
fn test_watch ( ) {
macro_rules ! assert_contains {
( $string :expr , $( $test :expr ) , + ) = > {
let string = $string ; // This might be a function call or something
if ! ( $( string . contains ( $test ) ) | | + ) {
panic! ( " {:?} does not contain any of {:?} " , string , [ $( $test ) , + ] ) ;
}
}
}
let t = TempDir ::new ( ) . expect ( " tempdir fail " ) ;
let mut child = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " test " )
. arg ( " --watch " )
. arg ( " --unstable " )
. arg ( " --no-check " )
. arg ( & t . path ( ) )
. env ( " NO_COLOR " , " 1 " )
. stdout ( std ::process ::Stdio ::piped ( ) )
. stderr ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. expect ( " failed to spawn script " ) ;
let stdout = child . stdout . as_mut ( ) . unwrap ( ) ;
let mut stdout_lines =
std ::io ::BufReader ::new ( stdout ) . lines ( ) . map ( | r | r . unwrap ( ) ) ;
let stderr = child . stderr . as_mut ( ) . unwrap ( ) ;
let mut stderr_lines =
std ::io ::BufReader ::new ( stderr ) . lines ( ) . map ( | r | r . unwrap ( ) ) ;
assert_contains! (
stdout_lines . next ( ) . unwrap ( ) ,
" No matching test modules found "
) ;
wait_for_process_finished ( " Test " , & mut stderr_lines ) ;
let foo_file = t . path ( ) . join ( " foo.js " ) ;
let bar_file = t . path ( ) . join ( " bar.js " ) ;
let foo_test = t . path ( ) . join ( " foo_test.js " ) ;
let bar_test = t . path ( ) . join ( " bar_test.js " ) ;
std ::fs ::write ( & foo_file , " export default function foo() { 1 + 1 } " )
. expect ( " error writing file " ) ;
std ::fs ::write ( & bar_file , " export default function bar() { 2 + 2 } " )
. expect ( " error writing file " ) ;
std ::fs ::write (
& foo_test ,
" import foo from './foo.js'; Deno.test('foo', foo); " ,
)
. expect ( " error writing file " ) ;
std ::fs ::write (
& bar_test ,
" import bar from './bar.js'; Deno.test('bar', bar); " ,
)
. expect ( " error writing file " ) ;
assert_contains! ( stdout_lines . next ( ) . unwrap ( ) , " running 1 test " ) ;
assert_contains! ( stdout_lines . next ( ) . unwrap ( ) , " foo " , " bar " ) ;
assert_contains! ( stdout_lines . next ( ) . unwrap ( ) , " running 1 test " ) ;
assert_contains! ( stdout_lines . next ( ) . unwrap ( ) , " foo " , " bar " ) ;
stdout_lines . next ( ) ;
stdout_lines . next ( ) ;
stdout_lines . next ( ) ;
wait_for_process_finished ( " Test " , & mut stderr_lines ) ;
// Change content of the file
std ::fs ::write (
& foo_test ,
" import foo from './foo.js'; Deno.test('foobar', foo); " ,
)
. expect ( " error writing file " ) ;
assert_contains! ( stderr_lines . next ( ) . unwrap ( ) , " Restarting " ) ;
assert_contains! ( stdout_lines . next ( ) . unwrap ( ) , " running 1 test " ) ;
assert_contains! ( stdout_lines . next ( ) . unwrap ( ) , " foobar " ) ;
stdout_lines . next ( ) ;
stdout_lines . next ( ) ;
stdout_lines . next ( ) ;
wait_for_process_finished ( " Test " , & mut stderr_lines ) ;
// Add test
let another_test = t . path ( ) . join ( " new_test.js " ) ;
std ::fs ::write ( & another_test , " Deno.test('another one', () => 3 + 3) " )
. expect ( " error writing file " ) ;
assert_contains! ( stderr_lines . next ( ) . unwrap ( ) , " Restarting " ) ;
assert_contains! ( stdout_lines . next ( ) . unwrap ( ) , " running 1 test " ) ;
assert_contains! ( stdout_lines . next ( ) . unwrap ( ) , " another one " ) ;
stdout_lines . next ( ) ;
stdout_lines . next ( ) ;
stdout_lines . next ( ) ;
wait_for_process_finished ( " Test " , & mut stderr_lines ) ;
// Confirm that restarting occurs when a new file is updated
std ::fs ::write ( & another_test , " Deno.test('another one', () => 3 + 3); Deno.test('another another one', () => 4 + 4) " )
. expect ( " error writing file " ) ;
assert_contains! ( stderr_lines . next ( ) . unwrap ( ) , " Restarting " ) ;
assert_contains! ( stdout_lines . next ( ) . unwrap ( ) , " running 2 tests " ) ;
assert_contains! ( stdout_lines . next ( ) . unwrap ( ) , " another one " ) ;
assert_contains! ( stdout_lines . next ( ) . unwrap ( ) , " another another one " ) ;
stdout_lines . next ( ) ;
stdout_lines . next ( ) ;
stdout_lines . next ( ) ;
wait_for_process_finished ( " Test " , & mut stderr_lines ) ;
// Confirm that the watcher keeps on working even if the file is updated and has invalid syntax
std ::fs ::write ( & another_test , " syntax error ^^ " )
. expect ( " error writing file " ) ;
assert_contains! ( stderr_lines . next ( ) . unwrap ( ) , " Restarting " ) ;
assert_contains! ( stderr_lines . next ( ) . unwrap ( ) , " error: " ) ;
assert_contains! ( stderr_lines . next ( ) . unwrap ( ) , " Test failed " ) ;
// Then restore the file
std ::fs ::write ( & another_test , " Deno.test('another one', () => 3 + 3) " )
. expect ( " error writing file " ) ;
assert_contains! ( stderr_lines . next ( ) . unwrap ( ) , " Restarting " ) ;
assert_contains! ( stdout_lines . next ( ) . unwrap ( ) , " running 1 test " ) ;
assert_contains! ( stdout_lines . next ( ) . unwrap ( ) , " another one " ) ;
stdout_lines . next ( ) ;
stdout_lines . next ( ) ;
stdout_lines . next ( ) ;
wait_for_process_finished ( " Test " , & mut stderr_lines ) ;
// Confirm that the watcher keeps on working even if the file is updated and the test fails
// This also confirms that it restarts when dependencies change
std ::fs ::write (
& foo_file ,
" export default function foo() { throw new Error('Whoops!'); } " ,
)
. expect ( " error writing file " ) ;
assert_contains! ( stderr_lines . next ( ) . unwrap ( ) , " Restarting " ) ;
assert_contains! ( stdout_lines . next ( ) . unwrap ( ) , " running 1 test " ) ;
assert_contains! ( stdout_lines . next ( ) . unwrap ( ) , " FAILED " ) ;
while ! stdout_lines . next ( ) . unwrap ( ) . contains ( " test result " ) { }
stdout_lines . next ( ) ;
wait_for_process_finished ( " Test " , & mut stderr_lines ) ;
// Then restore the file
std ::fs ::write ( & foo_file , " export default function foo() { 1 + 1 } " )
. expect ( " error writing file " ) ;
assert_contains! ( stderr_lines . next ( ) . unwrap ( ) , " Restarting " ) ;
assert_contains! ( stdout_lines . next ( ) . unwrap ( ) , " running 1 test " ) ;
assert_contains! ( stdout_lines . next ( ) . unwrap ( ) , " foo " ) ;
stdout_lines . next ( ) ;
stdout_lines . next ( ) ;
stdout_lines . next ( ) ;
wait_for_process_finished ( " Test " , & mut stderr_lines ) ;
// Test that circular dependencies work fine
std ::fs ::write (
& foo_file ,
" import './bar.js'; export default function foo() { 1 + 1 } " ,
)
. expect ( " error writing file " ) ;
std ::fs ::write (
& bar_file ,
" import './foo.js'; export default function bar() { 2 + 2 } " ,
)
. expect ( " error writing file " ) ;
// the watcher process is still alive
assert! ( child . try_wait ( ) . unwrap ( ) . is_none ( ) ) ;
child . kill ( ) . unwrap ( ) ;
drop ( t ) ;
}
2021-02-01 13:09:25 -05:00
}
#[ test ]
fn fmt_stdin_error ( ) {
use std ::io ::Write ;
let mut deno = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " fmt " )
. arg ( " - " )
. stdin ( std ::process ::Stdio ::piped ( ) )
. stdout ( std ::process ::Stdio ::piped ( ) )
. stderr ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( ) ;
let stdin = deno . stdin . as_mut ( ) . unwrap ( ) ;
let invalid_js = b " import { example } " ;
stdin . write_all ( invalid_js ) . unwrap ( ) ;
let output = deno . wait_with_output ( ) . unwrap ( ) ;
// Error message might change. Just check stdout empty, stderr not.
assert! ( output . stdout . is_empty ( ) ) ;
assert! ( ! output . stderr . is_empty ( ) ) ;
assert! ( ! output . status . success ( ) ) ;
}
// Warning: this test requires internet access.
// TODO(#7412): reenable. test is flaky
#[ test ]
#[ ignore ]
fn upgrade_in_tmpdir ( ) {
let temp_dir = TempDir ::new ( ) . unwrap ( ) ;
let exe_path = temp_dir . path ( ) . join ( " deno " ) ;
let _ = std ::fs ::copy ( util ::deno_exe_path ( ) , & exe_path ) . unwrap ( ) ;
assert! ( exe_path . exists ( ) ) ;
let _mtime1 = std ::fs ::metadata ( & exe_path ) . unwrap ( ) . modified ( ) . unwrap ( ) ;
let status = Command ::new ( & exe_path )
. arg ( " upgrade " )
. arg ( " --force " )
. spawn ( )
2020-07-06 18:21:26 -04:00
. unwrap ( )
2021-02-01 13:09:25 -05:00
. wait ( )
. unwrap ( ) ;
assert! ( status . success ( ) ) ;
let _mtime2 = std ::fs ::metadata ( & exe_path ) . unwrap ( ) . modified ( ) . unwrap ( ) ;
// TODO(ry) assert!(mtime1 < mtime2);
}
2020-07-06 18:21:26 -04:00
2021-02-01 13:09:25 -05:00
// Warning: this test requires internet access.
// TODO(#7412): reenable. test is flaky
#[ test ]
#[ ignore ]
fn upgrade_with_space_in_path ( ) {
let temp_dir = tempfile ::Builder ::new ( )
. prefix ( " directory with spaces " )
. tempdir ( )
. unwrap ( ) ;
let exe_path = temp_dir . path ( ) . join ( " deno " ) ;
let _ = std ::fs ::copy ( util ::deno_exe_path ( ) , & exe_path ) . unwrap ( ) ;
assert! ( exe_path . exists ( ) ) ;
let status = Command ::new ( & exe_path )
. arg ( " upgrade " )
. arg ( " --force " )
. env ( " TMP " , temp_dir . path ( ) )
. spawn ( )
. unwrap ( )
. wait ( )
. unwrap ( ) ;
assert! ( status . success ( ) ) ;
}
// Warning: this test requires internet access.
// TODO(#7412): reenable. test is flaky
#[ test ]
#[ ignore ]
fn upgrade_with_version_in_tmpdir ( ) {
let temp_dir = TempDir ::new ( ) . unwrap ( ) ;
let exe_path = temp_dir . path ( ) . join ( " deno " ) ;
let _ = std ::fs ::copy ( util ::deno_exe_path ( ) , & exe_path ) . unwrap ( ) ;
assert! ( exe_path . exists ( ) ) ;
let _mtime1 = std ::fs ::metadata ( & exe_path ) . unwrap ( ) . modified ( ) . unwrap ( ) ;
let status = Command ::new ( & exe_path )
. arg ( " upgrade " )
. arg ( " --force " )
. arg ( " --version " )
. arg ( " 0.42.0 " )
. spawn ( )
. unwrap ( )
. wait ( )
. unwrap ( ) ;
assert! ( status . success ( ) ) ;
let upgraded_deno_version = String ::from_utf8 (
Command ::new ( & exe_path ) . arg ( " -V " ) . output ( ) . unwrap ( ) . stdout ,
)
2020-05-11 17:33:36 -04:00
. unwrap ( ) ;
2021-02-01 13:09:25 -05:00
assert! ( upgraded_deno_version . contains ( " 0.42.0 " ) ) ;
let _mtime2 = std ::fs ::metadata ( & exe_path ) . unwrap ( ) . modified ( ) . unwrap ( ) ;
// TODO(ry) assert!(mtime1 < mtime2);
2020-01-31 11:34:50 -05:00
}
2021-02-01 13:09:25 -05:00
// Warning: this test requires internet access.
// TODO(#7412): reenable. test is flaky
#[ test ]
#[ ignore ]
fn upgrade_with_canary_in_tmpdir ( ) {
let temp_dir = TempDir ::new ( ) . unwrap ( ) ;
let exe_path = temp_dir . path ( ) . join ( " deno " ) ;
let _ = std ::fs ::copy ( util ::deno_exe_path ( ) , & exe_path ) . unwrap ( ) ;
assert! ( exe_path . exists ( ) ) ;
let _mtime1 = std ::fs ::metadata ( & exe_path ) . unwrap ( ) . modified ( ) . unwrap ( ) ;
let status = Command ::new ( & exe_path )
. arg ( " upgrade " )
. arg ( " --canary " )
. arg ( " --version " )
. arg ( " e6685f0f01b8a11a5eaff020f5babcfde76b3038 " )
. spawn ( )
. unwrap ( )
. wait ( )
. unwrap ( ) ;
assert! ( status . success ( ) ) ;
let upgraded_deno_version = String ::from_utf8 (
Command ::new ( & exe_path ) . arg ( " -V " ) . output ( ) . unwrap ( ) . stdout ,
)
2020-05-11 17:33:36 -04:00
. unwrap ( ) ;
2021-02-01 13:09:25 -05:00
assert! ( upgraded_deno_version . contains ( " e6685f0 " ) ) ;
let _mtime2 = std ::fs ::metadata ( & exe_path ) . unwrap ( ) . modified ( ) . unwrap ( ) ;
// TODO(ry) assert!(mtime1 < mtime2);
2020-01-31 11:34:50 -05:00
}
2021-02-01 13:09:25 -05:00
// Warning: this test requires internet access.
// TODO(#7412): reenable. test is flaky
#[ test ]
#[ ignore ]
fn upgrade_with_out_in_tmpdir ( ) {
let temp_dir = TempDir ::new ( ) . unwrap ( ) ;
let exe_path = temp_dir . path ( ) . join ( " deno " ) ;
let new_exe_path = temp_dir . path ( ) . join ( " foo " ) ;
let _ = std ::fs ::copy ( util ::deno_exe_path ( ) , & exe_path ) . unwrap ( ) ;
assert! ( exe_path . exists ( ) ) ;
let mtime1 = std ::fs ::metadata ( & exe_path ) . unwrap ( ) . modified ( ) . unwrap ( ) ;
let status = Command ::new ( & exe_path )
. arg ( " upgrade " )
. arg ( " --version " )
. arg ( " 1.0.2 " )
. arg ( " --output " )
. arg ( & new_exe_path . to_str ( ) . unwrap ( ) )
. spawn ( )
. unwrap ( )
. wait ( )
. unwrap ( ) ;
assert! ( status . success ( ) ) ;
assert! ( new_exe_path . exists ( ) ) ;
let mtime2 = std ::fs ::metadata ( & exe_path ) . unwrap ( ) . modified ( ) . unwrap ( ) ;
assert_eq! ( mtime1 , mtime2 ) ; // Original exe_path was not changed.
let v = String ::from_utf8 (
Command ::new ( & new_exe_path )
. arg ( " -V " )
. output ( )
. unwrap ( )
. stdout ,
)
. unwrap ( ) ;
assert! ( v . contains ( " 1.0.2 " ) ) ;
}
2019-09-19 14:48:05 -04:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn installer_test_local_module_run ( ) {
let temp_dir = TempDir ::new ( ) . expect ( " tempdir fail " ) ;
let bin_dir = temp_dir . path ( ) . join ( " bin " ) ;
std ::fs ::create_dir ( & bin_dir ) . unwrap ( ) ;
let status = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " install " )
. arg ( " --name " )
. arg ( " echo_test " )
. arg ( " --root " )
. arg ( temp_dir . path ( ) )
. arg ( util ::tests_path ( ) . join ( " echo.ts " ) )
. arg ( " hello " )
. spawn ( )
. unwrap ( )
. wait ( )
. unwrap ( ) ;
assert! ( status . success ( ) ) ;
let mut file_path = bin_dir . join ( " echo_test " ) ;
if cfg! ( windows ) {
file_path = file_path . with_extension ( " cmd " ) ;
}
assert! ( file_path . exists ( ) ) ;
// NOTE: using file_path here instead of exec_name, because tests
// shouldn't mess with user's PATH env variable
let output = Command ::new ( file_path )
. current_dir ( temp_dir . path ( ) )
. arg ( " foo " )
. env ( " PATH " , util ::target_dir ( ) )
. output ( )
. expect ( " failed to spawn script " ) ;
let stdout_str = std ::str ::from_utf8 ( & output . stdout ) . unwrap ( ) . trim ( ) ;
assert! ( stdout_str . ends_with ( " hello, foo " ) ) ;
}
2020-05-29 10:32:15 -04:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn installer_test_remote_module_run ( ) {
let _g = util ::http_server ( ) ;
let temp_dir = TempDir ::new ( ) . expect ( " tempdir fail " ) ;
let bin_dir = temp_dir . path ( ) . join ( " bin " ) ;
std ::fs ::create_dir ( & bin_dir ) . unwrap ( ) ;
let status = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " install " )
. arg ( " --name " )
. arg ( " echo_test " )
. arg ( " --root " )
. arg ( temp_dir . path ( ) )
. arg ( " http://localhost:4545/cli/tests/echo.ts " )
. arg ( " hello " )
. spawn ( )
. unwrap ( )
. wait ( )
. unwrap ( ) ;
assert! ( status . success ( ) ) ;
let mut file_path = bin_dir . join ( " echo_test " ) ;
if cfg! ( windows ) {
file_path = file_path . with_extension ( " cmd " ) ;
}
assert! ( file_path . exists ( ) ) ;
let output = Command ::new ( file_path )
. current_dir ( temp_dir . path ( ) )
. arg ( " foo " )
. env ( " PATH " , util ::target_dir ( ) )
. output ( )
. expect ( " failed to spawn script " ) ;
assert! ( std ::str ::from_utf8 ( & output . stdout )
. unwrap ( )
. trim ( )
. ends_with ( " hello, foo " ) ) ;
}
#[ test ]
fn ts_dependency_recompilation ( ) {
let t = TempDir ::new ( ) . expect ( " tempdir fail " ) ;
let ats = t . path ( ) . join ( " a.ts " ) ;
std ::fs ::write (
& ats ,
"
2020-05-29 10:32:15 -04:00
import { foo } from \ " ./b.ts \" ;
function print ( str : string ) : void {
console . log ( str ) ;
}
2020-06-09 08:12:47 -04:00
2020-05-29 10:32:15 -04:00
print ( foo ) ; " ,
2021-02-01 13:09:25 -05:00
)
. unwrap ( ) ;
2020-05-29 10:32:15 -04:00
2021-02-01 13:09:25 -05:00
let bts = t . path ( ) . join ( " b.ts " ) ;
std ::fs ::write (
& bts ,
"
2020-05-29 10:32:15 -04:00
export const foo = \ " foo \" ; " ,
2021-02-01 13:09:25 -05:00
)
. unwrap ( ) ;
2020-05-29 10:32:15 -04:00
2021-02-01 13:09:25 -05:00
let output = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. env ( " NO_COLOR " , " 1 " )
. arg ( " run " )
. arg ( & ats )
. output ( )
. expect ( " failed to spawn script " ) ;
2020-05-29 10:32:15 -04:00
2021-02-01 13:09:25 -05:00
let stdout_output = std ::str ::from_utf8 ( & output . stdout ) . unwrap ( ) . trim ( ) ;
let stderr_output = std ::str ::from_utf8 ( & output . stderr ) . unwrap ( ) . trim ( ) ;
2020-05-29 10:32:15 -04:00
2021-02-01 13:09:25 -05:00
assert! ( stdout_output . ends_with ( " foo " ) ) ;
assert! ( stderr_output . starts_with ( " Check " ) ) ;
2020-05-29 10:32:15 -04:00
2021-02-01 13:09:25 -05:00
// Overwrite contents of b.ts and run again
std ::fs ::write (
& bts ,
"
2020-05-29 10:32:15 -04:00
export const foo = 5 ; " ,
2021-02-01 13:09:25 -05:00
)
. expect ( " error writing file " ) ;
2020-05-29 10:32:15 -04:00
2021-02-01 13:09:25 -05:00
let output = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. env ( " NO_COLOR " , " 1 " )
. arg ( " run " )
. arg ( & ats )
. output ( )
. expect ( " failed to spawn script " ) ;
2020-05-29 10:32:15 -04:00
2021-02-01 13:09:25 -05:00
let stdout_output = std ::str ::from_utf8 ( & output . stdout ) . unwrap ( ) . trim ( ) ;
let stderr_output = std ::str ::from_utf8 ( & output . stderr ) . unwrap ( ) . trim ( ) ;
2020-05-29 10:32:15 -04:00
2021-02-01 13:09:25 -05:00
// error: TS2345 [ERROR]: Argument of type '5' is not assignable to parameter of type 'string'.
assert! ( stderr_output . contains ( " TS2345 " ) ) ;
assert! ( ! output . status . success ( ) ) ;
assert! ( stdout_output . is_empty ( ) ) ;
}
2020-05-29 10:32:15 -04:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn ts_no_recheck_on_redirect ( ) {
let deno_dir = util ::new_deno_dir ( ) ;
let e = util ::deno_exe_path ( ) ;
let redirect_ts =
util ::root_path ( ) . join ( " cli/tests/017_import_redirect.ts " ) ;
assert! ( redirect_ts . is_file ( ) ) ;
let mut cmd = Command ::new ( e . clone ( ) ) ;
cmd . env ( " DENO_DIR " , deno_dir . path ( ) ) ;
let mut initial = cmd
. current_dir ( util ::root_path ( ) )
. arg ( " run " )
. arg ( redirect_ts . clone ( ) )
. spawn ( )
. expect ( " failed to span script " ) ;
let status_initial =
initial . wait ( ) . expect ( " failed to wait for child process " ) ;
assert! ( status_initial . success ( ) ) ;
let mut cmd = Command ::new ( e ) ;
cmd . env ( " DENO_DIR " , deno_dir . path ( ) ) ;
let output = cmd
. current_dir ( util ::root_path ( ) )
. arg ( " run " )
. arg ( redirect_ts )
. output ( )
. expect ( " failed to spawn script " ) ;
2021-01-27 06:25:33 -05:00
2021-02-01 13:09:25 -05:00
assert! ( std ::str ::from_utf8 ( & output . stderr ) . unwrap ( ) . is_empty ( ) ) ;
}
2021-01-27 06:25:33 -05:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn ts_reload ( ) {
let hello_ts = util ::root_path ( ) . join ( " cli/tests/002_hello.ts " ) ;
assert! ( hello_ts . is_file ( ) ) ;
2021-02-24 09:18:35 -05:00
let deno_dir = TempDir ::new ( ) . expect ( " tempdir fail " ) ;
let mut initial = util ::deno_cmd_with_deno_dir ( deno_dir . path ( ) )
2021-02-01 13:09:25 -05:00
. current_dir ( util ::root_path ( ) )
. arg ( " cache " )
2021-02-24 09:18:35 -05:00
. arg ( & hello_ts )
2021-02-01 13:09:25 -05:00
. spawn ( )
. expect ( " failed to spawn script " ) ;
let status_initial =
initial . wait ( ) . expect ( " failed to wait for child process " ) ;
assert! ( status_initial . success ( ) ) ;
2020-06-26 08:23:25 -04:00
2021-02-24 09:18:35 -05:00
let output = util ::deno_cmd_with_deno_dir ( deno_dir . path ( ) )
2021-02-01 13:09:25 -05:00
. current_dir ( util ::root_path ( ) )
. arg ( " cache " )
. arg ( " --reload " )
. arg ( " -L " )
. arg ( " debug " )
2021-02-24 09:18:35 -05:00
. arg ( & hello_ts )
2021-02-01 13:09:25 -05:00
. output ( )
. expect ( " failed to spawn script " ) ;
2021-02-24 09:18:35 -05:00
2021-02-01 13:09:25 -05:00
// check the output of the the bundle program.
2021-02-24 09:18:35 -05:00
let output_path = hello_ts . canonicalize ( ) . unwrap ( ) ;
2021-02-01 13:09:25 -05:00
assert! ( std ::str ::from_utf8 ( & output . stderr )
. unwrap ( )
. trim ( )
2021-02-24 09:18:35 -05:00
. contains ( & format! (
" host.getSourceFile( \" {} \" , Latest) " ,
url ::Url ::from_file_path ( & output_path ) . unwrap ( ) . as_str ( )
) ) ) ;
2021-02-01 13:09:25 -05:00
}
2020-06-26 08:23:25 -04:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn bundle_exports ( ) {
// First we have to generate a bundle of some module that has exports.
let mod1 = util ::root_path ( ) . join ( " cli/tests/subdir/mod1.ts " ) ;
assert! ( mod1 . is_file ( ) ) ;
let t = TempDir ::new ( ) . expect ( " tempdir fail " ) ;
let bundle = t . path ( ) . join ( " mod1.bundle.js " ) ;
let mut deno = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " bundle " )
. arg ( mod1 )
. arg ( & bundle )
. spawn ( )
. expect ( " failed to spawn script " ) ;
let status = deno . wait ( ) . expect ( " failed to wait for the child process " ) ;
assert! ( status . success ( ) ) ;
assert! ( bundle . is_file ( ) ) ;
2019-11-20 11:02:08 -05:00
2021-02-01 13:09:25 -05:00
// Now we try to use that bundle from another module.
let test = t . path ( ) . join ( " test.js " ) ;
std ::fs ::write (
& test ,
"
2019-11-20 11:02:08 -05:00
import { printHello3 } from \ " ./mod1.bundle.js \" ;
printHello3 ( ) ; " ,
2021-02-01 13:09:25 -05:00
)
. expect ( " error writing file " ) ;
2019-11-20 11:02:08 -05:00
2021-02-01 13:09:25 -05:00
let output = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " run " )
. arg ( & test )
. output ( )
. expect ( " failed to spawn script " ) ;
// check the output of the test.ts program.
assert! ( std ::str ::from_utf8 ( & output . stdout )
. unwrap ( )
. trim ( )
. ends_with ( " Hello " ) ) ;
assert_eq! ( output . stderr , b " " ) ;
}
2019-11-20 11:02:08 -05:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn bundle_exports_no_check ( ) {
// First we have to generate a bundle of some module that has exports.
let mod1 = util ::root_path ( ) . join ( " cli/tests/subdir/mod1.ts " ) ;
assert! ( mod1 . is_file ( ) ) ;
let t = TempDir ::new ( ) . expect ( " tempdir fail " ) ;
let bundle = t . path ( ) . join ( " mod1.bundle.js " ) ;
let mut deno = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " bundle " )
. arg ( " --no-check " )
. arg ( mod1 )
. arg ( & bundle )
. spawn ( )
. expect ( " failed to spawn script " ) ;
let status = deno . wait ( ) . expect ( " failed to wait for the child process " ) ;
assert! ( status . success ( ) ) ;
assert! ( bundle . is_file ( ) ) ;
2020-10-19 23:10:42 -04:00
2021-02-01 13:09:25 -05:00
// Now we try to use that bundle from another module.
let test = t . path ( ) . join ( " test.js " ) ;
std ::fs ::write (
& test ,
"
2020-10-19 23:10:42 -04:00
import { printHello3 } from \ " ./mod1.bundle.js \" ;
printHello3 ( ) ; " ,
2021-02-01 13:09:25 -05:00
)
. expect ( " error writing file " ) ;
2020-10-19 23:10:42 -04:00
2021-02-01 13:09:25 -05:00
let output = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " run " )
. arg ( & test )
. output ( )
. expect ( " failed to spawn script " ) ;
// check the output of the test.ts program.
assert! ( std ::str ::from_utf8 ( & output . stdout )
. unwrap ( )
. trim ( )
. ends_with ( " Hello " ) ) ;
assert_eq! ( output . stderr , b " " ) ;
}
2020-10-19 23:10:42 -04:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn bundle_circular ( ) {
// First we have to generate a bundle of some module that has exports.
let circular1 = util ::root_path ( ) . join ( " cli/tests/subdir/circular1.ts " ) ;
assert! ( circular1 . is_file ( ) ) ;
let t = TempDir ::new ( ) . expect ( " tempdir fail " ) ;
let bundle = t . path ( ) . join ( " circular1.bundle.js " ) ;
let mut deno = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " bundle " )
. arg ( circular1 )
. arg ( & bundle )
. spawn ( )
. expect ( " failed to spawn script " ) ;
let status = deno . wait ( ) . expect ( " failed to wait for the child process " ) ;
assert! ( status . success ( ) ) ;
assert! ( bundle . is_file ( ) ) ;
2020-02-12 16:41:51 -05:00
2021-02-01 13:09:25 -05:00
let output = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " run " )
. arg ( & bundle )
. output ( )
. expect ( " failed to spawn script " ) ;
// check the output of the the bundle program.
assert! ( std ::str ::from_utf8 ( & output . stdout )
. unwrap ( )
. trim ( )
2021-03-02 07:39:56 -05:00
. ends_with ( " f2 \n f1 " ) ) ;
2021-02-01 13:09:25 -05:00
assert_eq! ( output . stderr , b " " ) ;
}
2020-02-12 16:41:51 -05:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn bundle_single_module ( ) {
// First we have to generate a bundle of some module that has exports.
let single_module =
util ::root_path ( ) . join ( " cli/tests/subdir/single_module.ts " ) ;
assert! ( single_module . is_file ( ) ) ;
let t = TempDir ::new ( ) . expect ( " tempdir fail " ) ;
let bundle = t . path ( ) . join ( " single_module.bundle.js " ) ;
let mut deno = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " bundle " )
. arg ( single_module )
. arg ( & bundle )
. spawn ( )
. expect ( " failed to spawn script " ) ;
let status = deno . wait ( ) . expect ( " failed to wait for the child process " ) ;
assert! ( status . success ( ) ) ;
assert! ( bundle . is_file ( ) ) ;
2020-02-19 22:35:21 -05:00
2021-02-01 13:09:25 -05:00
let output = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " run " )
. arg ( & bundle )
. output ( )
. expect ( " failed to spawn script " ) ;
// check the output of the the bundle program.
assert! ( std ::str ::from_utf8 ( & output . stdout )
. unwrap ( )
. trim ( )
. ends_with ( " Hello world! " ) ) ;
assert_eq! ( output . stderr , b " " ) ;
}
2020-02-19 22:35:21 -05:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn bundle_tla ( ) {
// First we have to generate a bundle of some module that has exports.
let tla_import = util ::root_path ( ) . join ( " cli/tests/subdir/tla.ts " ) ;
assert! ( tla_import . is_file ( ) ) ;
let t = tempfile ::TempDir ::new ( ) . expect ( " tempdir fail " ) ;
let bundle = t . path ( ) . join ( " tla.bundle.js " ) ;
let mut deno = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " bundle " )
. arg ( tla_import )
. arg ( & bundle )
. spawn ( )
. expect ( " failed to spawn script " ) ;
let status = deno . wait ( ) . expect ( " failed to wait for the child process " ) ;
assert! ( status . success ( ) ) ;
assert! ( bundle . is_file ( ) ) ;
2020-02-25 15:33:19 -05:00
2021-02-01 13:09:25 -05:00
// Now we try to use that bundle from another module.
let test = t . path ( ) . join ( " test.js " ) ;
std ::fs ::write (
& test ,
"
2020-02-25 15:33:19 -05:00
import { foo } from \ " ./tla.bundle.js \" ;
console . log ( foo ) ; " ,
2021-02-01 13:09:25 -05:00
)
. expect ( " error writing file " ) ;
2020-02-25 15:33:19 -05:00
2021-02-01 13:09:25 -05:00
let output = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " run " )
. arg ( & test )
. output ( )
. expect ( " failed to spawn script " ) ;
// check the output of the test.ts program.
assert! ( std ::str ::from_utf8 ( & output . stdout )
. unwrap ( )
. trim ( )
. ends_with ( " Hello " ) ) ;
assert_eq! ( output . stderr , b " " ) ;
}
2020-02-25 15:33:19 -05:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn bundle_js ( ) {
// First we have to generate a bundle of some module that has exports.
let mod6 = util ::root_path ( ) . join ( " cli/tests/subdir/mod6.js " ) ;
assert! ( mod6 . is_file ( ) ) ;
let t = TempDir ::new ( ) . expect ( " tempdir fail " ) ;
let bundle = t . path ( ) . join ( " mod6.bundle.js " ) ;
let mut deno = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " bundle " )
. arg ( mod6 )
. arg ( & bundle )
. spawn ( )
. expect ( " failed to spawn script " ) ;
let status = deno . wait ( ) . expect ( " failed to wait for the child process " ) ;
assert! ( status . success ( ) ) ;
assert! ( bundle . is_file ( ) ) ;
2020-03-02 16:18:27 -05:00
2021-02-01 13:09:25 -05:00
let output = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " run " )
. arg ( & bundle )
. output ( )
. expect ( " failed to spawn script " ) ;
// check that nothing went to stderr
assert_eq! ( output . stderr , b " " ) ;
}
2020-03-02 16:18:27 -05:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn bundle_dynamic_import ( ) {
let _g = util ::http_server ( ) ;
let dynamic_import =
util ::root_path ( ) . join ( " cli/tests/bundle_dynamic_import.ts " ) ;
assert! ( dynamic_import . is_file ( ) ) ;
let t = TempDir ::new ( ) . expect ( " tempdir fail " ) ;
let bundle = t . path ( ) . join ( " bundle_dynamic_import.bundle.js " ) ;
let mut deno = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " bundle " )
. arg ( dynamic_import )
. arg ( & bundle )
. spawn ( )
. expect ( " failed to spawn script " ) ;
let status = deno . wait ( ) . expect ( " failed to wait for the child process " ) ;
assert! ( status . success ( ) ) ;
assert! ( bundle . is_file ( ) ) ;
2020-04-01 23:14:30 -04:00
2021-02-01 13:09:25 -05:00
let output = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " run " )
. arg ( " --allow-net " )
. arg ( " --quiet " )
. arg ( & bundle )
. output ( )
. expect ( " failed to spawn script " ) ;
// check the output of the test.ts program.
assert! ( std ::str ::from_utf8 ( & output . stdout )
. unwrap ( )
. trim ( )
. ends_with ( " Hello " ) ) ;
assert_eq! ( output . stderr , b " " ) ;
}
2020-04-01 23:14:30 -04:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn bundle_import_map ( ) {
let import = util ::root_path ( ) . join ( " cli/tests/bundle_im.ts " ) ;
let import_map_path = util ::root_path ( ) . join ( " cli/tests/bundle_im.json " ) ;
assert! ( import . is_file ( ) ) ;
let t = TempDir ::new ( ) . expect ( " tempdir fail " ) ;
let bundle = t . path ( ) . join ( " import_map.bundle.js " ) ;
let mut deno = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " bundle " )
. arg ( " --import-map " )
. arg ( import_map_path )
. arg ( import )
. arg ( & bundle )
. spawn ( )
. expect ( " failed to spawn script " ) ;
let status = deno . wait ( ) . expect ( " failed to wait for the child process " ) ;
assert! ( status . success ( ) ) ;
assert! ( bundle . is_file ( ) ) ;
2020-10-19 23:10:42 -04:00
2021-02-01 13:09:25 -05:00
// Now we try to use that bundle from another module.
let test = t . path ( ) . join ( " test.js " ) ;
std ::fs ::write (
& test ,
"
2020-10-19 23:10:42 -04:00
import { printHello3 } from \ " ./import_map.bundle.js \" ;
printHello3 ( ) ; " ,
2021-02-01 13:09:25 -05:00
)
. expect ( " error writing file " ) ;
2020-10-19 23:10:42 -04:00
2021-02-01 13:09:25 -05:00
let output = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " run " )
. arg ( & test )
. output ( )
. expect ( " failed to spawn script " ) ;
// check the output of the test.ts program.
assert! ( std ::str ::from_utf8 ( & output . stdout )
. unwrap ( )
. trim ( )
. ends_with ( " Hello " ) ) ;
assert_eq! ( output . stderr , b " " ) ;
}
2020-10-19 23:10:42 -04:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn bundle_import_map_no_check ( ) {
let import = util ::root_path ( ) . join ( " cli/tests/bundle_im.ts " ) ;
let import_map_path = util ::root_path ( ) . join ( " cli/tests/bundle_im.json " ) ;
assert! ( import . is_file ( ) ) ;
let t = TempDir ::new ( ) . expect ( " tempdir fail " ) ;
let bundle = t . path ( ) . join ( " import_map.bundle.js " ) ;
let mut deno = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " bundle " )
. arg ( " --no-check " )
. arg ( " --import-map " )
. arg ( import_map_path )
. arg ( import )
. arg ( & bundle )
. spawn ( )
. expect ( " failed to spawn script " ) ;
let status = deno . wait ( ) . expect ( " failed to wait for the child process " ) ;
assert! ( status . success ( ) ) ;
assert! ( bundle . is_file ( ) ) ;
2020-04-07 06:32:09 -04:00
2021-02-01 13:09:25 -05:00
// Now we try to use that bundle from another module.
let test = t . path ( ) . join ( " test.js " ) ;
std ::fs ::write (
& test ,
"
2020-04-07 06:32:09 -04:00
import { printHello3 } from \ " ./import_map.bundle.js \" ;
printHello3 ( ) ; " ,
2021-02-01 13:09:25 -05:00
)
2020-11-22 15:45:44 -05:00
. expect ( " error writing file " ) ;
2021-02-01 13:09:25 -05:00
let output = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " run " )
. arg ( & test )
. output ( )
. expect ( " failed to spawn script " ) ;
// check the output of the test.ts program.
assert! ( std ::str ::from_utf8 ( & output . stdout )
. unwrap ( )
. trim ( )
. ends_with ( " Hello " ) ) ;
assert_eq! ( output . stderr , b " " ) ;
}
2020-11-22 15:45:44 -05:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn info_with_compiled_source ( ) {
let _g = util ::http_server ( ) ;
let module_path = " http://127.0.0.1:4545/cli/tests/048_media_types_jsx.ts " ;
let t = TempDir ::new ( ) . expect ( " tempdir fail " ) ;
let mut deno = util ::deno_cmd ( )
. env ( " DENO_DIR " , t . path ( ) )
. current_dir ( util ::root_path ( ) )
. arg ( " cache " )
. arg ( & module_path )
. spawn ( )
. expect ( " failed to spawn script " ) ;
let status = deno . wait ( ) . expect ( " failed to wait for the child process " ) ;
assert! ( status . success ( ) ) ;
2020-11-22 15:45:44 -05:00
2021-02-01 13:09:25 -05:00
let output = util ::deno_cmd ( )
. env ( " DENO_DIR " , t . path ( ) )
. env ( " NO_COLOR " , " 1 " )
. current_dir ( util ::root_path ( ) )
. arg ( " info " )
. arg ( & module_path )
. output ( )
. expect ( " failed to spawn script " ) ;
2020-11-22 15:45:44 -05:00
2021-02-01 13:09:25 -05:00
let str_output = std ::str ::from_utf8 ( & output . stdout ) . unwrap ( ) . trim ( ) ;
eprintln! ( " {} " , str_output ) ;
// check the output of the test.ts program.
2021-03-01 06:49:58 -05:00
assert! ( str_output . contains ( " emit: " ) ) ;
2021-02-01 13:09:25 -05:00
assert_eq! ( output . stderr , b " " ) ;
}
2020-11-22 15:45:44 -05:00
2021-02-01 13:09:25 -05:00
mod repl {
use super ::* ;
2020-11-22 15:45:44 -05:00
2021-02-01 13:09:25 -05:00
#[ cfg(unix) ]
#[ test ]
fn pty_multiline ( ) {
use std ::io ::Read ;
use util ::pty ::fork ::* ;
let deno_exe = util ::deno_exe_path ( ) ;
let fork = Fork ::from_ptmx ( ) . unwrap ( ) ;
if let Ok ( mut master ) = fork . is_parent ( ) {
master . write_all ( b " ( \n 1 + 2 \n ) \n " ) . unwrap ( ) ;
master . write_all ( b " { \n foo: \" foo \" \n } \n " ) . unwrap ( ) ;
master . write_all ( b " ` \n foo \n ` \n " ) . unwrap ( ) ;
master . write_all ( b " ` \n \\ ` \n ` \n " ) . unwrap ( ) ;
master . write_all ( b " '{' \n " ) . unwrap ( ) ;
master . write_all ( b " '(' \n " ) . unwrap ( ) ;
master . write_all ( b " '[' \n " ) . unwrap ( ) ;
master . write_all ( b " /{/' \n " ) . unwrap ( ) ;
master . write_all ( b " /(/' \n " ) . unwrap ( ) ;
master . write_all ( b " /[/' \n " ) . unwrap ( ) ;
master . write_all ( b " console.log( \" {test1} abc {test2} def {{test3}} \" .match(/{([^{].+?)}/)); \n " ) . unwrap ( ) ;
master . write_all ( b " close(); \n " ) . unwrap ( ) ;
let mut output = String ::new ( ) ;
master . read_to_string ( & mut output ) . unwrap ( ) ;
assert! ( output . contains ( '3' ) ) ;
assert! ( output . contains ( " { foo: \" foo \" } " ) ) ;
assert! ( output . contains ( " \" \\ nfoo \\ n \" " ) ) ;
assert! ( output . contains ( " \" \\ n` \\ n \" " ) ) ;
assert! ( output . contains ( " \" { \" " ) ) ;
assert! ( output . contains ( " \" ( \" " ) ) ;
assert! ( output . contains ( " \" [ \" " ) ) ;
assert! ( output . contains ( " /{/ " ) ) ;
assert! ( output . contains ( " /(/ " ) ) ;
assert! ( output . contains ( " /{/ " ) ) ;
assert! ( output . contains ( " [ \" {test1} \" , \" test1 \" ] " ) ) ;
fork . wait ( ) . unwrap ( ) ;
} else {
std ::env ::set_var ( " NO_COLOR " , " 1 " ) ;
let err = exec ::Command ::new ( deno_exe ) . arg ( " repl " ) . exec ( ) ;
println! ( " err {} " , err ) ;
unreachable! ( )
}
}
2020-11-22 15:45:44 -05:00
2021-02-01 13:09:25 -05:00
#[ cfg(unix) ]
#[ test ]
fn pty_unpaired_braces ( ) {
use std ::io ::Read ;
use util ::pty ::fork ::* ;
let deno_exe = util ::deno_exe_path ( ) ;
let fork = Fork ::from_ptmx ( ) . unwrap ( ) ;
if let Ok ( mut master ) = fork . is_parent ( ) {
master . write_all ( b " ) \n " ) . unwrap ( ) ;
master . write_all ( b " ] \n " ) . unwrap ( ) ;
master . write_all ( b " } \n " ) . unwrap ( ) ;
master . write_all ( b " close(); \n " ) . unwrap ( ) ;
let mut output = String ::new ( ) ;
master . read_to_string ( & mut output ) . unwrap ( ) ;
assert! ( output . contains ( " Unexpected token ')' " ) ) ;
assert! ( output . contains ( " Unexpected token ']' " ) ) ;
assert! ( output . contains ( " Unexpected token '}' " ) ) ;
fork . wait ( ) . unwrap ( ) ;
} else {
std ::env ::set_var ( " NO_COLOR " , " 1 " ) ;
let err = exec ::Command ::new ( deno_exe ) . arg ( " repl " ) . exec ( ) ;
println! ( " err {} " , err ) ;
unreachable! ( )
}
}
2020-11-28 09:18:13 -05:00
2021-02-01 13:09:25 -05:00
#[ cfg(unix) ]
#[ test ]
fn pty_bad_input ( ) {
use std ::io ::Read ;
use util ::pty ::fork ::* ;
let deno_exe = util ::deno_exe_path ( ) ;
let fork = Fork ::from_ptmx ( ) . unwrap ( ) ;
if let Ok ( mut master ) = fork . is_parent ( ) {
master . write_all ( b " ' \\ u{1f3b5}'[0] \n " ) . unwrap ( ) ;
master . write_all ( b " close(); \n " ) . unwrap ( ) ;
let mut output = String ::new ( ) ;
master . read_to_string ( & mut output ) . unwrap ( ) ;
assert! ( output . contains ( " Unterminated string literal " ) ) ;
fork . wait ( ) . unwrap ( ) ;
} else {
std ::env ::set_var ( " NO_COLOR " , " 1 " ) ;
let err = exec ::Command ::new ( deno_exe ) . arg ( " repl " ) . exec ( ) ;
println! ( " err {} " , err ) ;
unreachable! ( )
}
}
2020-11-28 09:18:13 -05:00
2021-02-05 06:09:52 -05:00
#[ cfg(unix) ]
#[ test ]
fn pty_complete_symbol ( ) {
use std ::io ::Read ;
use util ::pty ::fork ::* ;
let deno_exe = util ::deno_exe_path ( ) ;
let fork = Fork ::from_ptmx ( ) . unwrap ( ) ;
if let Ok ( mut master ) = fork . is_parent ( ) {
2021-02-21 10:58:31 -05:00
master . write_all ( b " Symbol.it \t \n " ) . unwrap ( ) ;
2021-02-05 06:09:52 -05:00
master . write_all ( b " close(); \n " ) . unwrap ( ) ;
let mut output = String ::new ( ) ;
master . read_to_string ( & mut output ) . unwrap ( ) ;
2021-02-21 10:58:31 -05:00
assert! ( output . contains ( " Symbol(Symbol.iterator) " ) ) ;
fork . wait ( ) . unwrap ( ) ;
} else {
std ::env ::set_var ( " NO_COLOR " , " 1 " ) ;
let err = exec ::Command ::new ( deno_exe ) . arg ( " repl " ) . exec ( ) ;
println! ( " err {} " , err ) ;
unreachable! ( )
}
}
#[ cfg(unix) ]
#[ test ]
fn pty_ignore_symbols ( ) {
use std ::io ::Read ;
use util ::pty ::fork ::* ;
let deno_exe = util ::deno_exe_path ( ) ;
let fork = Fork ::from_ptmx ( ) . unwrap ( ) ;
if let Ok ( mut master ) = fork . is_parent ( ) {
master . write_all ( b " Array.Symbol \t \n " ) . unwrap ( ) ;
master . write_all ( b " close(); \n " ) . unwrap ( ) ;
let mut output = String ::new ( ) ;
master . read_to_string ( & mut output ) . unwrap ( ) ;
assert! ( output . contains ( " undefined " ) ) ;
assert! ( ! output
. contains ( " Uncaught TypeError: Array.Symbol is not a function " ) ) ;
2021-02-05 06:09:52 -05:00
fork . wait ( ) . unwrap ( ) ;
} else {
std ::env ::set_var ( " NO_COLOR " , " 1 " ) ;
let err = exec ::Command ::new ( deno_exe ) . arg ( " repl " ) . exec ( ) ;
println! ( " err {} " , err ) ;
unreachable! ( )
}
}
2021-02-01 13:09:25 -05:00
#[ test ]
fn console_log ( ) {
let ( out , err ) = util ::run_and_collect_output (
true ,
" repl " ,
Some ( vec! [ " console.log('hello') " , " 'world' " ] ) ,
Some ( vec! [ ( " NO_COLOR " . to_owned ( ) , " 1 " . to_owned ( ) ) ] ) ,
false ,
) ;
assert! ( out . ends_with ( " hello \n undefined \n \" world \" \n " ) ) ;
assert! ( err . is_empty ( ) ) ;
}
2020-11-22 15:45:44 -05:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn object_literal ( ) {
let ( out , err ) = util ::run_and_collect_output (
true ,
" repl " ,
Some ( vec! [ " {} " , " { foo: 'bar' } " ] ) ,
Some ( vec! [ ( " NO_COLOR " . to_owned ( ) , " 1 " . to_owned ( ) ) ] ) ,
false ,
) ;
assert! ( out . ends_with ( " {} \n { foo: \" bar \" } \n " ) ) ;
assert! ( err . is_empty ( ) ) ;
}
2020-11-22 15:45:44 -05:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn block_expression ( ) {
let ( out , err ) = util ::run_and_collect_output (
true ,
" repl " ,
Some ( vec! [ " {}; " , " { \" \" } " ] ) ,
Some ( vec! [ ( " NO_COLOR " . to_owned ( ) , " 1 " . to_owned ( ) ) ] ) ,
false ,
) ;
assert! ( out . ends_with ( " undefined \n \" \" \n " ) ) ;
assert! ( err . is_empty ( ) ) ;
}
2020-09-07 09:59:47 -04:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn await_resolve ( ) {
let ( out , err ) = util ::run_and_collect_output (
true ,
" repl " ,
Some ( vec! [ " await Promise.resolve('done') " ] ) ,
Some ( vec! [ ( " NO_COLOR " . to_owned ( ) , " 1 " . to_owned ( ) ) ] ) ,
false ,
) ;
assert! ( out . ends_with ( " \" done \" \n " ) ) ;
assert! ( err . is_empty ( ) ) ;
}
2020-09-07 09:59:47 -04:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn await_timeout ( ) {
let ( out , err ) = util ::run_and_collect_output (
true ,
" repl " ,
Some ( vec! [ " await new Promise((r) => setTimeout(r, 0, 'done')) " ] ) ,
Some ( vec! [ ( " NO_COLOR " . to_owned ( ) , " 1 " . to_owned ( ) ) ] ) ,
false ,
) ;
assert! ( out . ends_with ( " \" done \" \n " ) ) ;
assert! ( err . is_empty ( ) ) ;
}
2020-09-07 09:59:47 -04:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn let_redeclaration ( ) {
let ( out , err ) = util ::run_and_collect_output (
true ,
" repl " ,
Some ( vec! [ " let foo = 0; " , " foo " , " let foo = 1; " , " foo " ] ) ,
Some ( vec! [ ( " NO_COLOR " . to_owned ( ) , " 1 " . to_owned ( ) ) ] ) ,
false ,
) ;
assert! ( out . ends_with ( " undefined \n 0 \n undefined \n 1 \n " ) ) ;
assert! ( err . is_empty ( ) ) ;
}
2020-09-07 09:59:47 -04:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn repl_cwd ( ) {
let ( _out , err ) = util ::run_and_collect_output (
true ,
" repl " ,
Some ( vec! [ " Deno.cwd() " ] ) ,
Some ( vec! [ ( " NO_COLOR " . to_owned ( ) , " 1 " . to_owned ( ) ) ] ) ,
false ,
) ;
assert! ( err . is_empty ( ) ) ;
2020-11-27 14:22:09 -05:00
}
2021-02-01 13:09:25 -05:00
#[ test ]
fn eof ( ) {
let ( out , err ) = util ::run_and_collect_output (
true ,
" repl " ,
Some ( vec! [ " 1 + 2 " ] ) ,
Some ( vec! [ ( " NO_COLOR " . to_owned ( ) , " 1 " . to_owned ( ) ) ] ) ,
false ,
) ;
assert! ( out . ends_with ( " 3 \n " ) ) ;
assert! ( err . is_empty ( ) ) ;
}
2020-09-11 12:19:49 -04:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn strict ( ) {
let ( out , err ) = util ::run_and_collect_output (
true ,
" repl " ,
Some ( vec! [
" let a = {}; " ,
" Object.preventExtensions(a); " ,
" a.c = 1; " ,
] ) ,
None ,
false ,
) ;
assert! ( out . contains (
" Uncaught TypeError: Cannot add property c, object is not extensible "
) ) ;
assert! ( err . is_empty ( ) ) ;
}
2020-09-11 12:19:49 -04:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn close_command ( ) {
let ( out , err ) = util ::run_and_collect_output (
true ,
" repl " ,
Some ( vec! [ " close() " , " 'ignored' " ] ) ,
None ,
false ,
) ;
assert! ( ! out . contains ( " ignored " ) ) ;
assert! ( err . is_empty ( ) ) ;
}
2020-09-11 12:19:49 -04:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn function ( ) {
let ( out , err ) = util ::run_and_collect_output (
true ,
" repl " ,
Some ( vec! [ " Deno.writeFileSync " ] ) ,
Some ( vec! [ ( " NO_COLOR " . to_owned ( ) , " 1 " . to_owned ( ) ) ] ) ,
false ,
) ;
assert! ( out . ends_with ( " [Function: writeFileSync] \n " ) ) ;
assert! ( err . is_empty ( ) ) ;
}
2020-09-11 12:19:49 -04:00
2021-02-01 13:09:25 -05:00
#[ test ]
#[ ignore ]
fn multiline ( ) {
let ( out , err ) = util ::run_and_collect_output (
true ,
" repl " ,
Some ( vec! [ " ( \n 1 + 2 \n ) " ] ) ,
Some ( vec! [ ( " NO_COLOR " . to_owned ( ) , " 1 " . to_owned ( ) ) ] ) ,
false ,
) ;
assert! ( out . ends_with ( " 3 \n " ) ) ;
assert! ( err . is_empty ( ) ) ;
}
2020-09-11 12:19:49 -04:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn import ( ) {
let ( out , _ ) = util ::run_and_collect_output (
true ,
" repl " ,
Some ( vec! [ " import('./subdir/auto_print_hello.ts') " ] ) ,
Some ( vec! [ ( " NO_COLOR " . to_owned ( ) , " 1 " . to_owned ( ) ) ] ) ,
false ,
) ;
assert! ( out . contains ( " hello! \n " ) ) ;
}
2020-10-28 07:41:18 -04:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn eval_unterminated ( ) {
let ( out , err ) = util ::run_and_collect_output (
true ,
" repl " ,
Some ( vec! [ " eval('{') " ] ) ,
None ,
false ,
) ;
assert! ( out . contains ( " Unexpected end of input " ) ) ;
assert! ( err . is_empty ( ) ) ;
}
2020-11-22 15:45:44 -05:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn unpaired_braces ( ) {
for right_brace in & [ " ) " , " ] " , " } " ] {
let ( out , err ) = util ::run_and_collect_output (
true ,
" repl " ,
Some ( vec! [ right_brace ] ) ,
None ,
false ,
) ;
assert! ( out . contains ( " Unexpected token " ) ) ;
assert! ( err . is_empty ( ) ) ;
}
}
2020-11-22 15:45:44 -05:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn reference_error ( ) {
let ( out , err ) = util ::run_and_collect_output (
true ,
" repl " ,
Some ( vec! [ " not_a_variable " ] ) ,
None ,
false ,
) ;
assert! ( out . contains ( " not_a_variable is not defined " ) ) ;
assert! ( err . is_empty ( ) ) ;
}
2021-01-12 02:53:58 -05:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn syntax_error ( ) {
let ( out , err ) = util ::run_and_collect_output (
true ,
" repl " ,
Some ( vec! [ " syntax error " ] ) ,
None ,
false ,
) ;
assert! ( out . contains ( " Unexpected identifier " ) ) ;
assert! ( err . is_empty ( ) ) ;
}
2020-09-11 12:19:49 -04:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn type_error ( ) {
let ( out , err ) = util ::run_and_collect_output (
true ,
" repl " ,
Some ( vec! [ " console() " ] ) ,
None ,
false ,
) ;
assert! ( out . contains ( " console is not a function " ) ) ;
assert! ( err . is_empty ( ) ) ;
}
2020-09-11 12:19:49 -04:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn variable ( ) {
let ( out , err ) = util ::run_and_collect_output (
true ,
" repl " ,
Some ( vec! [ " var a = 123; " , " a " ] ) ,
Some ( vec! [ ( " NO_COLOR " . to_owned ( ) , " 1 " . to_owned ( ) ) ] ) ,
false ,
) ;
assert! ( out . ends_with ( " undefined \n 123 \n " ) ) ;
assert! ( err . is_empty ( ) ) ;
}
2020-11-22 15:45:44 -05:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn lexical_scoped_variable ( ) {
let ( out , err ) = util ::run_and_collect_output (
true ,
" repl " ,
Some ( vec! [ " let a = 123; " , " a " ] ) ,
Some ( vec! [ ( " NO_COLOR " . to_owned ( ) , " 1 " . to_owned ( ) ) ] ) ,
false ,
) ;
assert! ( out . ends_with ( " undefined \n 123 \n " ) ) ;
assert! ( err . is_empty ( ) ) ;
}
2020-11-22 15:45:44 -05:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn missing_deno_dir ( ) {
use std ::fs ::{ read_dir , remove_dir_all } ;
const DENO_DIR : & str = " nonexistent " ;
let test_deno_dir =
util ::root_path ( ) . join ( " cli " ) . join ( " tests " ) . join ( DENO_DIR ) ;
let ( out , err ) = util ::run_and_collect_output (
true ,
" repl " ,
Some ( vec! [ " 1 " ] ) ,
Some ( vec! [
( " DENO_DIR " . to_owned ( ) , DENO_DIR . to_owned ( ) ) ,
( " NO_COLOR " . to_owned ( ) , " 1 " . to_owned ( ) ) ,
] ) ,
false ,
) ;
assert! ( read_dir ( & test_deno_dir ) . is_ok ( ) ) ;
remove_dir_all ( & test_deno_dir ) . unwrap ( ) ;
assert! ( out . ends_with ( " 1 \n " ) ) ;
assert! ( err . is_empty ( ) ) ;
}
2020-11-22 15:45:44 -05:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn save_last_eval ( ) {
let ( out , err ) = util ::run_and_collect_output (
true ,
" repl " ,
Some ( vec! [ " 1 " , " _ " ] ) ,
Some ( vec! [ ( " NO_COLOR " . to_owned ( ) , " 1 " . to_owned ( ) ) ] ) ,
false ,
) ;
assert! ( out . ends_with ( " 1 \n 1 \n " ) ) ;
assert! ( err . is_empty ( ) ) ;
}
2020-11-28 09:18:13 -05:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn save_last_thrown ( ) {
let ( out , err ) = util ::run_and_collect_output (
true ,
" repl " ,
Some ( vec! [ " throw 1 " , " _error " ] ) ,
Some ( vec! [ ( " NO_COLOR " . to_owned ( ) , " 1 " . to_owned ( ) ) ] ) ,
false ,
) ;
assert! ( out . ends_with ( " Uncaught 1 \n 1 \n " ) ) ;
assert! ( err . is_empty ( ) ) ;
}
2020-11-28 09:18:13 -05:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn assign_underscore ( ) {
let ( out , err ) = util ::run_and_collect_output (
true ,
" repl " ,
Some ( vec! [ " _ = 1 " , " 2 " , " _ " ] ) ,
Some ( vec! [ ( " NO_COLOR " . to_owned ( ) , " 1 " . to_owned ( ) ) ] ) ,
false ,
) ;
assert! ( out . ends_with (
" Last evaluation result is no longer saved to _. \n 1 \n 2 \n 1 \n "
) ) ;
assert! ( err . is_empty ( ) ) ;
}
2020-11-22 15:45:44 -05:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn assign_underscore_error ( ) {
let ( out , err ) = util ::run_and_collect_output (
true ,
" repl " ,
Some ( vec! [ " _error = 1 " , " throw 2 " , " _error " ] ) ,
Some ( vec! [ ( " NO_COLOR " . to_owned ( ) , " 1 " . to_owned ( ) ) ] ) ,
false ,
) ;
println! ( " {} " , out ) ;
assert! ( out . ends_with (
" Last thrown error is no longer saved to _error. \n 1 \n Uncaught 2 \n 1 \n "
) ) ;
assert! ( err . is_empty ( ) ) ;
}
}
2020-11-22 15:45:44 -05:00
2021-02-01 13:09:25 -05:00
itest! ( stdout_write_all {
args : " run --quiet stdout_write_all.ts " ,
output : " stdout_write_all.out " ,
} ) ;
itest! ( _001_hello {
args : " run --reload 001_hello.js " ,
output : " 001_hello.js.out " ,
} ) ;
itest! ( _002_hello {
args : " run --quiet --reload 002_hello.ts " ,
output : " 002_hello.ts.out " ,
} ) ;
itest! ( _003_relative_import {
args : " run --quiet --reload 003_relative_import.ts " ,
output : " 003_relative_import.ts.out " ,
} ) ;
itest! ( _004_set_timeout {
args : " run --quiet --reload 004_set_timeout.ts " ,
output : " 004_set_timeout.ts.out " ,
} ) ;
itest! ( _005_more_imports {
args : " run --quiet --reload 005_more_imports.ts " ,
output : " 005_more_imports.ts.out " ,
} ) ;
itest! ( _006_url_imports {
args : " run --quiet --reload 006_url_imports.ts " ,
output : " 006_url_imports.ts.out " ,
http_server : true ,
} ) ;
itest! ( _012_async {
args : " run --quiet --reload 012_async.ts " ,
output : " 012_async.ts.out " ,
} ) ;
itest! ( _013_dynamic_import {
args : " run --quiet --reload --allow-read 013_dynamic_import.ts " ,
output : " 013_dynamic_import.ts.out " ,
} ) ;
itest! ( _014_duplicate_import {
args : " run --quiet --reload --allow-read 014_duplicate_import.ts " ,
output : " 014_duplicate_import.ts.out " ,
} ) ;
itest! ( _015_duplicate_parallel_import {
args : " run --quiet --reload --allow-read 015_duplicate_parallel_import.js " ,
output : " 015_duplicate_parallel_import.js.out " ,
} ) ;
itest! ( _016_double_await {
args : " run --quiet --allow-read --reload 016_double_await.ts " ,
output : " 016_double_await.ts.out " ,
} ) ;
itest! ( _017_import_redirect {
args : " run --quiet --reload 017_import_redirect.ts " ,
output : " 017_import_redirect.ts.out " ,
} ) ;
itest! ( _017_import_redirect_nocheck {
args : " run --quiet --reload --no-check 017_import_redirect.ts " ,
output : " 017_import_redirect.ts.out " ,
} ) ;
itest! ( _017_import_redirect_info {
args : " info --quiet --reload 017_import_redirect.ts " ,
output : " 017_import_redirect_info.out " ,
} ) ;
itest! ( _018_async_catch {
args : " run --quiet --reload 018_async_catch.ts " ,
output : " 018_async_catch.ts.out " ,
} ) ;
itest! ( _019_media_types {
args : " run --reload 019_media_types.ts " ,
output : " 019_media_types.ts.out " ,
http_server : true ,
} ) ;
itest! ( _020_json_modules {
args : " run --reload 020_json_modules.ts " ,
output : " 020_json_modules.ts.out " ,
exit_code : 1 ,
} ) ;
itest! ( _021_mjs_modules {
args : " run --quiet --reload 021_mjs_modules.ts " ,
output : " 021_mjs_modules.ts.out " ,
} ) ;
itest! ( _022_info_flag_script {
args : " info http://127.0.0.1:4545/cli/tests/019_media_types.ts " ,
output : " 022_info_flag_script.out " ,
http_server : true ,
} ) ;
itest! ( _023_no_ext {
args : " run --reload 023_no_ext " ,
output : " 023_no_ext.out " ,
} ) ;
// TODO(lucacasonato): remove --unstable when permissions goes stable
itest! ( _025_hrtime {
args : " run --quiet --allow-hrtime --unstable --reload 025_hrtime.ts " ,
output : " 025_hrtime.ts.out " ,
} ) ;
itest! ( _025_reload_js_type_error {
args : " run --quiet --reload 025_reload_js_type_error.js " ,
output : " 025_reload_js_type_error.js.out " ,
} ) ;
itest! ( _026_redirect_javascript {
args : " run --quiet --reload 026_redirect_javascript.js " ,
output : " 026_redirect_javascript.js.out " ,
http_server : true ,
} ) ;
2021-03-01 07:02:51 -05:00
mod test {
use super ::* ;
2021-02-01 13:09:25 -05:00
2021-03-01 07:02:51 -05:00
#[ test ]
fn no_color ( ) {
let ( out , _ ) = util ::run_and_collect_output (
false ,
" test test/deno_test_no_color.ts " ,
None ,
Some ( vec! [ ( " NO_COLOR " . to_owned ( ) , " true " . to_owned ( ) ) ] ) ,
false ,
) ;
// ANSI escape codes should be stripped.
assert! ( out . contains ( " test success ... ok " ) ) ;
assert! ( out . contains ( " test fail ... FAILED " ) ) ;
assert! ( out . contains ( " test ignored ... ignored " ) ) ;
assert! ( out . contains ( " test result: FAILED. 1 passed; 1 failed; 1 ignored; 0 measured; 0 filtered out " ) ) ;
}
2021-02-21 11:21:25 -05:00
2021-03-01 07:02:51 -05:00
itest! ( all {
args : " test test/test_runner_test.ts " ,
exit_code : 1 ,
output : " test/deno_test.out " ,
} ) ;
2021-05-10 19:54:39 -04:00
itest! ( doc {
args : " test --doc --allow-all test/doc.ts " ,
exit_code : 1 ,
output : " test/doc.out " ,
} ) ;
2021-04-25 17:38:59 -04:00
itest! ( allow_all {
args : " test --unstable --allow-all test/allow_all.ts " ,
exit_code : 0 ,
output : " test/allow_all.out " ,
} ) ;
itest! ( allow_none {
args : " test --unstable test/allow_none.ts " ,
exit_code : 1 ,
output : " test/allow_none.out " ,
} ) ;
2021-03-01 07:02:51 -05:00
itest! ( fail_fast {
args : " test --fail-fast test/test_runner_test.ts " ,
exit_code : 1 ,
output : " test/deno_test_fail_fast.out " ,
} ) ;
itest! ( only {
args : " test test/deno_test_only.ts " ,
exit_code : 1 ,
output : " test/deno_test_only.ts.out " ,
} ) ;
itest! ( no_check {
args : " test --no-check test/test_runner_test.ts " ,
exit_code : 1 ,
output : " test/deno_test.out " ,
} ) ;
itest! ( finally_cleartimeout {
args : " test test/test_finally_cleartimeout.ts " ,
exit_code : 1 ,
output : " test/test_finally_cleartimeout.out " ,
} ) ;
itest! ( unresolved_promise {
args : " test test/test_unresolved_promise.js " ,
exit_code : 1 ,
output : " test/deno_test_unresolved_promise.out " ,
} ) ;
2021-04-28 14:17:04 -04:00
itest! ( unhandled_rejection {
args : " test test/unhandled_rejection.ts " ,
exit_code : 1 ,
output : " test/unhandled_rejection.out " ,
} ) ;
2021-03-01 07:02:51 -05:00
itest! ( exit_sanitizer {
args : " test test/exit_sanitizer_test.ts " ,
output : " test/exit_sanitizer_test.out " ,
exit_code : 1 ,
} ) ;
2021-04-28 14:17:04 -04:00
itest! ( quiet {
args : " test --quiet test/quiet_test.ts " ,
exit_code : 0 ,
output : " test/quiet_test.out " ,
} ) ;
2021-03-01 07:02:51 -05:00
}
2021-02-01 13:09:25 -05:00
#[ test ]
fn timeout_clear ( ) {
// https://github.com/denoland/deno/issues/7599
use std ::time ::Duration ;
use std ::time ::Instant ;
let source_code = r #"
const handle = setTimeout ( ( ) = > {
console . log ( " timeout finish " ) ;
} , 10000 ) ;
clearTimeout ( handle ) ;
console . log ( " finish " ) ;
" #;
let mut p = util ::deno_cmd ( )
. current_dir ( util ::tests_path ( ) )
. arg ( " run " )
. arg ( " - " )
. stdin ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( ) ;
let stdin = p . stdin . as_mut ( ) . unwrap ( ) ;
stdin . write_all ( source_code . as_bytes ( ) ) . unwrap ( ) ;
let start = Instant ::now ( ) ;
let status = p . wait ( ) . unwrap ( ) ;
let end = Instant ::now ( ) ;
assert! ( status . success ( ) ) ;
// check that program did not run for 10 seconds
// for timeout to clear
assert! ( end - start < Duration ::new ( 10 , 0 ) ) ;
2020-10-28 06:03:17 -04:00
}
2021-02-01 13:09:25 -05:00
#[ test ]
fn workers ( ) {
let _g = util ::http_server ( ) ;
let status = util ::deno_cmd ( )
. current_dir ( util ::tests_path ( ) )
. arg ( " test " )
. arg ( " --reload " )
. arg ( " --location " )
. arg ( " http://127.0.0.1:4545/cli/tests/ " )
. arg ( " --allow-net " )
. arg ( " --allow-read " )
. arg ( " --unstable " )
2021-02-15 08:48:47 -05:00
. arg ( " workers/test.ts " )
2021-02-01 13:09:25 -05:00
. spawn ( )
. unwrap ( )
. wait ( )
. unwrap ( ) ;
assert! ( status . success ( ) ) ;
2020-12-14 11:37:08 -05:00
}
2021-02-15 08:48:47 -05:00
itest! ( worker_error {
args : " run -A workers/worker_error.ts " ,
output : " workers/worker_error.ts.out " ,
exit_code : 1 ,
} ) ;
itest! ( worker_nested_error {
args : " run -A workers/worker_nested_error.ts " ,
output : " workers/worker_nested_error.ts.out " ,
exit_code : 1 ,
} ) ;
2021-04-19 10:57:02 -04:00
itest! ( nonexistent_worker {
args : " run --allow-read workers/nonexistent_worker.ts " ,
output : " workers/nonexistent_worker.out " ,
exit_code : 1 ,
} ) ;
2021-02-01 13:09:25 -05:00
#[ test ]
fn compiler_api ( ) {
let status = util ::deno_cmd ( )
. current_dir ( util ::tests_path ( ) )
. arg ( " test " )
. arg ( " --unstable " )
. arg ( " --reload " )
. arg ( " --allow-read " )
. arg ( " compiler_api_test.ts " )
. spawn ( )
. unwrap ( )
. wait ( )
. unwrap ( ) ;
assert! ( status . success ( ) ) ;
2020-10-19 17:53:39 -04:00
}
2021-02-01 13:09:25 -05:00
itest! ( _027_redirect_typescript {
args : " run --quiet --reload 027_redirect_typescript.ts " ,
output : " 027_redirect_typescript.ts.out " ,
http_server : true ,
} ) ;
itest! ( _028_args {
args :
" run --quiet --reload 028_args.ts --arg1 val1 --arg2=val2 -- arg3 arg4 " ,
output : " 028_args.ts.out " ,
} ) ;
itest! ( _029_eval {
args : " eval console.log( \" hello \" ) " ,
output : " 029_eval.out " ,
} ) ;
// Ugly parentheses due to whitespace delimiting problem.
itest! ( _030_eval_ts {
2021-02-21 11:58:32 -05:00
args : " eval --quiet --ext=ts console.log((123)as(number)) " , // 'as' is a TS keyword only
2021-02-01 13:09:25 -05:00
output : " 030_eval_ts.out " ,
} ) ;
itest! ( _031_info_ts_error {
args : " info 031_info_ts_error.ts " ,
output : " 031_info_ts_error.out " ,
} ) ;
itest! ( _033_import_map {
args :
2021-03-01 06:41:22 -05:00
" run --quiet --reload --import-map=import_maps/import_map.json import_maps/test.ts " ,
2021-02-01 13:09:25 -05:00
output : " 033_import_map.out " ,
} ) ;
2021-02-17 08:32:57 -05:00
itest! ( _033_import_map_remote {
args :
" run --quiet --reload --import-map=http://127.0.0.1:4545/cli/tests/import_maps/import_map_remote.json --unstable import_maps/test_remote.ts " ,
output : " 033_import_map_remote.out " ,
http_server : true ,
} ) ;
2021-02-01 13:09:25 -05:00
itest! ( _034_onload {
args : " run --quiet --reload 034_onload/main.ts " ,
output : " 034_onload.out " ,
} ) ;
itest! ( _035_cached_only_flag {
args :
" run --reload --cached-only http://127.0.0.1:4545/cli/tests/019_media_types.ts " ,
output : " 035_cached_only_flag.out " ,
exit_code : 1 ,
http_server : true ,
} ) ;
itest! ( _036_import_map_fetch {
args :
2021-03-01 06:41:22 -05:00
" cache --quiet --reload --import-map=import_maps/import_map.json import_maps/test.ts " ,
2021-02-01 13:09:25 -05:00
output : " 036_import_map_fetch.out " ,
} ) ;
itest! ( _037_fetch_multiple {
args : " cache --reload fetch/test.ts fetch/other.ts " ,
http_server : true ,
output : " 037_fetch_multiple.out " ,
} ) ;
itest! ( _038_checkjs {
// checking if JS file is run through TS compiler
args : " run --reload --config 038_checkjs.tsconfig.json 038_checkjs.js " ,
exit_code : 1 ,
output : " 038_checkjs.js.out " ,
} ) ;
itest! ( _041_dyn_import_eval {
args : " eval import('./subdir/mod4.js').then(console.log) " ,
output : " 041_dyn_import_eval.out " ,
} ) ;
itest! ( _041_info_flag {
args : " info " ,
output : " 041_info_flag.out " ,
} ) ;
itest! ( info_json {
args : " info --json --unstable " ,
output : " info_json.out " ,
} ) ;
itest! ( _042_dyn_import_evalcontext {
args : " run --quiet --allow-read --reload 042_dyn_import_evalcontext.ts " ,
output : " 042_dyn_import_evalcontext.ts.out " ,
} ) ;
itest! ( _044_bad_resource {
args : " run --quiet --reload --allow-read 044_bad_resource.ts " ,
output : " 044_bad_resource.ts.out " ,
exit_code : 1 ,
} ) ;
itest! ( _045_proxy {
args : " run -L debug --allow-net --allow-env --allow-run --allow-read --reload --quiet 045_proxy_test.ts " ,
output : " 045_proxy_test.ts.out " ,
http_server : true ,
} ) ;
itest! ( _046_tsx {
args : " run --quiet --reload 046_jsx_test.tsx " ,
output : " 046_jsx_test.tsx.out " ,
} ) ;
itest! ( _047_jsx {
args : " run --quiet --reload 047_jsx_test.jsx " ,
output : " 047_jsx_test.jsx.out " ,
} ) ;
itest! ( _048_media_types_jsx {
args : " run --reload 048_media_types_jsx.ts " ,
output : " 048_media_types_jsx.ts.out " ,
http_server : true ,
} ) ;
itest! ( _049_info_flag_script_jsx {
args : " info http://127.0.0.1:4545/cli/tests/048_media_types_jsx.ts " ,
output : " 049_info_flag_script_jsx.out " ,
http_server : true ,
} ) ;
itest! ( _052_no_remote_flag {
args :
" run --reload --no-remote http://127.0.0.1:4545/cli/tests/019_media_types.ts " ,
output : " 052_no_remote_flag.out " ,
exit_code : 1 ,
http_server : true ,
} ) ;
itest! ( _054_info_local_imports {
args : " info --quiet 005_more_imports.ts " ,
output : " 054_info_local_imports.out " ,
exit_code : 0 ,
} ) ;
itest! ( _055_info_file_json {
args : " info --quiet --json --unstable 005_more_imports.ts " ,
output : " 055_info_file_json.out " ,
exit_code : 0 ,
} ) ;
itest! ( _056_make_temp_file_write_perm {
args :
" run --quiet --allow-read --allow-write=./subdir/ 056_make_temp_file_write_perm.ts " ,
output : " 056_make_temp_file_write_perm.out " ,
} ) ;
itest! ( _058_tasks_microtasks_close {
args : " run --quiet 058_tasks_microtasks_close.ts " ,
output : " 058_tasks_microtasks_close.ts.out " ,
} ) ;
itest! ( _059_fs_relative_path_perm {
args : " run 059_fs_relative_path_perm.ts " ,
output : " 059_fs_relative_path_perm.ts.out " ,
exit_code : 1 ,
} ) ;
itest! ( _060_deno_doc_displays_all_overloads_in_details_view {
args : " doc 060_deno_doc_displays_all_overloads_in_details_view.ts NS.test " ,
output : " 060_deno_doc_displays_all_overloads_in_details_view.ts.out " ,
} ) ;
#[ cfg(unix) ]
#[ test ]
fn _061_permissions_request ( ) {
2021-02-24 22:33:09 -05:00
let args = " run 061_permissions_request.ts " ;
2021-02-01 13:09:25 -05:00
let output = " 061_permissions_request.ts.out " ;
2021-05-10 07:11:34 -04:00
let input = b " y \n n \n " ;
2021-02-01 13:09:25 -05:00
util ::test_pty ( args , output , input ) ;
}
2020-10-19 17:53:39 -04:00
2021-02-01 13:09:25 -05:00
#[ cfg(unix) ]
#[ test ]
fn _062_permissions_request_global ( ) {
2021-02-24 22:33:09 -05:00
let args = " run 062_permissions_request_global.ts " ;
2021-02-01 13:09:25 -05:00
let output = " 062_permissions_request_global.ts.out " ;
2021-05-10 07:11:34 -04:00
let input = b " y \n " ;
2020-10-19 17:53:39 -04:00
2021-02-01 13:09:25 -05:00
util ::test_pty ( args , output , input ) ;
}
2020-10-19 17:53:39 -04:00
2021-02-01 13:09:25 -05:00
itest! ( _063_permissions_revoke {
2021-02-24 22:33:09 -05:00
args : " run --allow-read=foo,bar 063_permissions_revoke.ts " ,
2021-02-01 13:09:25 -05:00
output : " 063_permissions_revoke.ts.out " ,
} ) ;
itest! ( _064_permissions_revoke_global {
2021-02-24 22:33:09 -05:00
args : " run --allow-read=foo,bar 064_permissions_revoke_global.ts " ,
2021-02-01 13:09:25 -05:00
output : " 064_permissions_revoke_global.ts.out " ,
} ) ;
itest! ( _065_import_map_info {
args :
2021-03-01 06:41:22 -05:00
" info --quiet --import-map=import_maps/import_map.json import_maps/test.ts " ,
2021-02-01 13:09:25 -05:00
output : " 065_import_map_info.out " ,
} ) ;
#[ cfg(unix) ]
#[ test ]
fn _066_prompt ( ) {
let args = " run --unstable 066_prompt.ts " ;
let output = " 066_prompt.ts.out " ;
// These are answers to prompt, confirm, and alert calls.
let input = b " John Doe \n \n foo \n Y \n N \n yes \n \n windows \r \n \n \n " ;
util ::test_pty ( args , output , input ) ;
}
2020-10-19 17:53:39 -04:00
2021-02-01 13:09:25 -05:00
itest! ( _067_test_no_run_type_error {
args : " test --unstable --no-run test_type_error " ,
output : " 067_test_no_run_type_error.out " ,
exit_code : 1 ,
} ) ;
itest! ( _070_location {
args : " run --location https://foo/bar?baz#bat 070_location.ts " ,
output : " 070_location.ts.out " ,
} ) ;
itest! ( _071_location_unset {
args : " run 071_location_unset.ts " ,
output : " 071_location_unset.ts.out " ,
exit_code : 1 ,
} ) ;
itest! ( _072_location_relative_fetch {
args : " run --location http://127.0.0.1:4545/cli/tests/ --allow-net 072_location_relative_fetch.ts " ,
output : " 072_location_relative_fetch.ts.out " ,
http_server : true ,
} ) ;
itest! ( _075_import_local_query_hash {
args : " run 075_import_local_query_hash.ts " ,
output : " 075_import_local_query_hash.ts.out " ,
} ) ;
itest! ( _076_info_json_deps_order {
args : " info --unstable --json 076_info_json_deps_order.ts " ,
output : " 076_info_json_deps_order.out " ,
} ) ;
itest! ( _077_fetch_empty {
args : " run -A 077_fetch_empty.ts " ,
output : " 077_fetch_empty.ts.out " ,
exit_code : 1 ,
} ) ;
itest! ( _078_unload_on_exit {
args : " run 078_unload_on_exit.ts " ,
output : " 078_unload_on_exit.ts.out " ,
exit_code : 1 ,
} ) ;
itest! ( _079_location_authentication {
args :
" run --location https://foo:bar@baz/qux 079_location_authentication.ts " ,
output : " 079_location_authentication.ts.out " ,
} ) ;
itest! ( _080_deno_emit_permissions {
args : " run --unstable 080_deno_emit_permissions.ts " ,
output : " 080_deno_emit_permissions.ts.out " ,
exit_code : 1 ,
} ) ;
itest! ( _081_location_relative_fetch_redirect {
args : " run --location http://127.0.0.1:4546/ --allow-net 081_location_relative_fetch_redirect.ts " ,
output : " 081_location_relative_fetch_redirect.ts.out " ,
http_server : true ,
} ) ;
itest! ( _082_prepare_stack_trace_throw {
args : " run 082_prepare_stack_trace_throw.js " ,
output : " 082_prepare_stack_trace_throw.js.out " ,
exit_code : 1 ,
} ) ;
2021-02-07 18:14:05 -05:00
#[ test ]
fn _083_legacy_external_source_map ( ) {
let _g = util ::http_server ( ) ;
let deno_dir = TempDir ::new ( ) . expect ( " tempdir fail " ) ;
let module_url = url ::Url ::parse (
" http://localhost:4545/cli/tests/083_legacy_external_source_map.ts " ,
)
. unwrap ( ) ;
// Write a faulty old external source map.
let faulty_map_path = deno_dir . path ( ) . join ( " gen/http/localhost_PORT4545/9576bd5febd0587c5c4d88d57cb3ac8ebf2600c529142abe3baa9a751d20c334.js.map " ) ;
std ::fs ::create_dir_all ( faulty_map_path . parent ( ) . unwrap ( ) )
. expect ( " Failed to create faulty source map dir. " ) ;
std ::fs ::write ( faulty_map_path , " { \" version \" :3, \" file \" : \" \" , \" sourceRoot \" : \" \" , \" sources \" :[ \" http://localhost:4545/cli/tests/083_legacy_external_source_map.ts \" ], \" names \" :[], \" mappings \" : \" ;AAAA,MAAM,IAAI,KAAK,CAAC,KAAK,CAAC,CAAC \" } " ) . expect ( " Failed to write faulty source map. " ) ;
let output = Command ::new ( util ::deno_exe_path ( ) )
. env ( " DENO_DIR " , deno_dir . path ( ) )
. current_dir ( util ::root_path ( ) )
. arg ( " run " )
. arg ( module_url . to_string ( ) )
. output ( )
. expect ( " Failed to spawn script " ) ;
// Before https://github.com/denoland/deno/issues/6965 was fixed, the faulty
// old external source map would cause a panic while formatting the error
// and the exit code would be 101. The external source map should be ignored
// in favor of the inline one.
assert_eq! ( output . status . code ( ) , Some ( 1 ) ) ;
let out = std ::str ::from_utf8 ( & output . stdout ) . unwrap ( ) ;
assert_eq! ( out , " " ) ;
}
2021-02-09 10:31:46 -05:00
itest! ( _084_worker_custom_inspect {
args : " run --allow-read 084_worker_custom_inspect.ts " ,
output : " 084_worker_custom_inspect.ts.out " ,
} ) ;
2021-02-18 17:36:02 -05:00
itest! ( _085_dynamic_import_async_error {
args : " run --allow-read 085_dynamic_import_async_error.ts " ,
output : " 085_dynamic_import_async_error.ts.out " ,
} ) ;
2021-02-20 16:50:13 -05:00
itest! ( _086_dynamic_import_already_rejected {
args : " run --allow-read 086_dynamic_import_already_rejected.ts " ,
output : " 086_dynamic_import_already_rejected.ts.out " ,
} ) ;
2021-03-07 15:40:11 -05:00
itest! ( _087_no_check_imports_not_used_as_values {
args : " run --config preserve_imports.tsconfig.json --no-check 087_no_check_imports_not_used_as_values.ts " ,
output : " 087_no_check_imports_not_used_as_values.ts.out " ,
} ) ;
2021-04-04 07:26:00 -04:00
itest! ( _088_dynamic_import_already_evaluating {
args : " run --allow-read 088_dynamic_import_already_evaluating.ts " ,
output : " 088_dynamic_import_already_evaluating.ts.out " ,
} ) ;
2021-04-09 18:12:00 -04:00
itest! ( _089_run_allow_list {
args : " run --allow-run=cat 089_run_allow_list.ts " ,
output : " 089_run_allow_list.ts.out " ,
} ) ;
#[ cfg(unix) ]
#[ test ]
fn _090_run_permissions_request ( ) {
let args = " run 090_run_permissions_request.ts " ;
let output = " 090_run_permissions_request.ts.out " ;
2021-05-10 07:11:34 -04:00
let input = b " y \n n \n " ;
2021-04-09 18:12:00 -04:00
util ::test_pty ( args , output , input ) ;
}
2021-04-10 17:56:40 -04:00
itest! ( _091_use_define_for_class_fields {
args : " run 091_use_define_for_class_fields.ts " ,
output : " 091_use_define_for_class_fields.ts.out " ,
exit_code : 1 ,
} ) ;
2021-05-17 03:44:38 -04:00
itest! ( dynamic_import_permissions_remote_remote {
args : " run --quiet --reload --allow-net=localhost:4545 dynamic_import/permissions_remote_remote.ts " ,
output : " dynamic_import/permissions_remote_remote.ts.out " ,
http_server : true ,
exit_code : 1 ,
} ) ;
itest! ( dynamic_import_permissions_data_remote {
args : " run --quiet --reload --allow-net=localhost:4545 dynamic_import/permissions_data_remote.ts " ,
output : " dynamic_import/permissions_data_remote.ts.out " ,
http_server : true ,
exit_code : 1 ,
} ) ;
itest! ( dynamic_import_permissions_blob_remote {
args : " run --quiet --reload --allow-net=localhost:4545 dynamic_import/permissions_blob_remote.ts " ,
output : " dynamic_import/permissions_blob_remote.ts.out " ,
http_server : true ,
exit_code : 1 ,
} ) ;
itest! ( dynamic_import_permissions_data_local {
args : " run --quiet --reload --allow-net=localhost:4545 dynamic_import/permissions_data_local.ts " ,
output : " dynamic_import/permissions_data_local.ts.out " ,
http_server : true ,
exit_code : 1 ,
} ) ;
itest! ( dynamic_import_permissions_blob_local {
args : " run --quiet --reload --allow-net=localhost:4545 dynamic_import/permissions_blob_local.ts " ,
output : " dynamic_import/permissions_blob_local.ts.out " ,
http_server : true ,
exit_code : 1 ,
} ) ;
2021-02-01 13:09:25 -05:00
itest! ( js_import_detect {
args : " run --quiet --reload js_import_detect.ts " ,
output : " js_import_detect.ts.out " ,
exit_code : 0 ,
} ) ;
itest! ( lock_write_requires_lock {
args : " run --lock-write some_file.ts " ,
output : " lock_write_requires_lock.out " ,
exit_code : 1 ,
} ) ;
itest! ( lock_write_fetch {
args :
" run --quiet --allow-read --allow-write --allow-env --allow-run lock_write_fetch.ts " ,
output : " lock_write_fetch.ts.out " ,
http_server : true ,
exit_code : 0 ,
} ) ;
itest! ( lock_check_ok {
args : " run --lock=lock_check_ok.json http://127.0.0.1:4545/cli/tests/003_relative_import.ts " ,
output : " 003_relative_import.ts.out " ,
http_server : true ,
} ) ;
itest! ( lock_check_ok2 {
args : " run --lock=lock_check_ok2.json 019_media_types.ts " ,
output : " 019_media_types.ts.out " ,
http_server : true ,
} ) ;
itest! ( lock_dynamic_imports {
args : " run --lock=lock_dynamic_imports.json --allow-read --allow-net http://127.0.0.1:4545/cli/tests/013_dynamic_import.ts " ,
output : " lock_dynamic_imports.out " ,
exit_code : 10 ,
http_server : true ,
} ) ;
itest! ( lock_check_err {
args : " run --lock=lock_check_err.json http://127.0.0.1:4545/cli/tests/003_relative_import.ts " ,
output : " lock_check_err.out " ,
exit_code : 10 ,
http_server : true ,
} ) ;
itest! ( lock_check_err2 {
args : " run --lock=lock_check_err2.json 019_media_types.ts " ,
output : " lock_check_err2.out " ,
exit_code : 10 ,
http_server : true ,
} ) ;
itest! ( lock_check_err_with_bundle {
args : " bundle --lock=lock_check_err_with_bundle.json http://127.0.0.1:4545/cli/tests/subdir/mod1.ts " ,
output : " lock_check_err_with_bundle.out " ,
exit_code : 10 ,
http_server : true ,
} ) ;
itest! ( async_error {
exit_code : 1 ,
args : " run --reload async_error.ts " ,
output : " async_error.ts.out " ,
} ) ;
itest! ( bundle {
args : " bundle subdir/mod1.ts " ,
output : " bundle.test.out " ,
} ) ;
2021-02-05 06:01:48 -05:00
itest! ( bundle_jsx {
args : " bundle jsx_import_from_ts.ts " ,
output : " bundle_jsx.out " ,
} ) ;
2021-02-01 13:09:25 -05:00
itest! ( fmt_check_tests_dir {
2021-02-18 11:31:32 -05:00
args : " fmt --check ./ --ignore=.test_coverage " ,
2021-02-01 13:09:25 -05:00
output : " fmt/expected_fmt_check_tests_dir.out " ,
exit_code : 1 ,
} ) ;
itest! ( fmt_quiet_check_fmt_dir {
args : " fmt --check --quiet fmt/ " ,
output_str : Some ( " " ) ,
exit_code : 0 ,
} ) ;
itest! ( fmt_check_formatted_files {
2021-02-18 11:31:32 -05:00
args : " fmt --check fmt/formatted1.js fmt/formatted2.ts fmt/formatted3.md fmt/formatted4.jsonc " ,
2021-02-01 13:09:25 -05:00
output : " fmt/expected_fmt_check_formatted_files.out " ,
exit_code : 0 ,
} ) ;
itest! ( fmt_check_ignore {
args : " fmt --check --ignore=fmt/formatted1.js fmt/ " ,
output : " fmt/expected_fmt_check_ignore.out " ,
exit_code : 0 ,
} ) ;
itest! ( fmt_stdin {
args : " fmt - " ,
input : Some ( " const a = 1 \n " ) ,
output_str : Some ( " const a = 1; \n " ) ,
} ) ;
itest! ( fmt_stdin_markdown {
args : " fmt --ext=md - " ,
input : Some ( " # Hello Markdown \n ```ts \n console.log( \" text \" ) \n ``` \n " ) ,
output_str : Some (
" # Hello Markdown \n \n ```ts \n console.log( \" text \" ); \n ``` \n "
) ,
} ) ;
2021-02-18 11:31:32 -05:00
itest! ( fmt_stdin_json {
args : " fmt --ext=json - " ,
input : Some ( " { \" key \" : \" value \" } " ) ,
output_str : Some ( " { \" key \" : \" value \" } \n " ) ,
} ) ;
2021-02-01 13:09:25 -05:00
itest! ( fmt_stdin_check_formatted {
args : " fmt --check - " ,
input : Some ( " const a = 1; \n " ) ,
output_str : Some ( " " ) ,
} ) ;
itest! ( fmt_stdin_check_not_formatted {
args : " fmt --check - " ,
input : Some ( " const a = 1 \n " ) ,
output_str : Some ( " Not formatted stdin \n " ) ,
} ) ;
itest! ( config {
args : " run --reload --config config.tsconfig.json config.ts " ,
exit_code : 1 ,
output : " config.ts.out " ,
} ) ;
itest! ( emtpy_typescript {
args : " run --reload subdir/empty.ts " ,
output_str : Some ( " Check file:[WILDCARD]tests/subdir/empty.ts \n " ) ,
} ) ;
itest! ( error_001 {
args : " run --reload error_001.ts " ,
exit_code : 1 ,
output : " error_001.ts.out " ,
} ) ;
itest! ( error_002 {
args : " run --reload error_002.ts " ,
exit_code : 1 ,
output : " error_002.ts.out " ,
} ) ;
itest! ( error_003_typescript {
args : " run --reload error_003_typescript.ts " ,
exit_code : 1 ,
output : " error_003_typescript.ts.out " ,
} ) ;
// Supposing that we've already attempted to run error_003_typescript.ts
// we want to make sure that JS wasn't emitted. Running again without reload flag
// should result in the same output.
// https://github.com/denoland/deno/issues/2436
itest! ( error_003_typescript2 {
args : " run error_003_typescript.ts " ,
exit_code : 1 ,
output : " error_003_typescript.ts.out " ,
} ) ;
itest! ( error_004_missing_module {
args : " run --reload error_004_missing_module.ts " ,
exit_code : 1 ,
output : " error_004_missing_module.ts.out " ,
} ) ;
itest! ( error_005_missing_dynamic_import {
args :
" run --reload --allow-read --quiet error_005_missing_dynamic_import.ts " ,
exit_code : 1 ,
output : " error_005_missing_dynamic_import.ts.out " ,
} ) ;
itest! ( error_006_import_ext_failure {
args : " run --reload error_006_import_ext_failure.ts " ,
exit_code : 1 ,
output : " error_006_import_ext_failure.ts.out " ,
} ) ;
itest! ( error_007_any {
args : " run --reload error_007_any.ts " ,
exit_code : 1 ,
output : " error_007_any.ts.out " ,
} ) ;
itest! ( error_008_checkjs {
args : " run --reload error_008_checkjs.js " ,
exit_code : 1 ,
output : " error_008_checkjs.js.out " ,
} ) ;
2021-04-30 15:51:48 -04:00
itest! ( error_009_extensions_error {
args : " run error_009_extensions_error.js " ,
output : " error_009_extensions_error.js.out " ,
2021-02-01 13:09:25 -05:00
exit_code : 1 ,
} ) ;
itest! ( error_011_bad_module_specifier {
args : " run --reload error_011_bad_module_specifier.ts " ,
exit_code : 1 ,
output : " error_011_bad_module_specifier.ts.out " ,
} ) ;
itest! ( error_012_bad_dynamic_import_specifier {
args : " run --reload error_012_bad_dynamic_import_specifier.ts " ,
exit_code : 1 ,
output : " error_012_bad_dynamic_import_specifier.ts.out " ,
} ) ;
itest! ( error_013_missing_script {
args : " run --reload missing_file_name " ,
exit_code : 1 ,
output : " error_013_missing_script.out " ,
} ) ;
itest! ( error_014_catch_dynamic_import_error {
args : " run --reload --allow-read error_014_catch_dynamic_import_error.js " ,
output : " error_014_catch_dynamic_import_error.js.out " ,
} ) ;
itest! ( error_015_dynamic_import_permissions {
args : " run --reload --quiet error_015_dynamic_import_permissions.js " ,
output : " error_015_dynamic_import_permissions.out " ,
exit_code : 1 ,
http_server : true ,
} ) ;
// We have an allow-net flag but not allow-read, it should still result in error.
itest! ( error_016_dynamic_import_permissions2 {
args : " run --reload --allow-net error_016_dynamic_import_permissions2.js " ,
output : " error_016_dynamic_import_permissions2.out " ,
exit_code : 1 ,
http_server : true ,
} ) ;
itest! ( error_017_hide_long_source_ts {
args : " run --reload error_017_hide_long_source_ts.ts " ,
output : " error_017_hide_long_source_ts.ts.out " ,
exit_code : 1 ,
} ) ;
itest! ( error_018_hide_long_source_js {
args : " run error_018_hide_long_source_js.js " ,
output : " error_018_hide_long_source_js.js.out " ,
exit_code : 1 ,
} ) ;
itest! ( error_019_stack_function {
args : " run error_019_stack_function.ts " ,
output : " error_019_stack_function.ts.out " ,
exit_code : 1 ,
} ) ;
itest! ( error_020_stack_constructor {
args : " run error_020_stack_constructor.ts " ,
output : " error_020_stack_constructor.ts.out " ,
exit_code : 1 ,
} ) ;
itest! ( error_021_stack_method {
args : " run error_021_stack_method.ts " ,
output : " error_021_stack_method.ts.out " ,
exit_code : 1 ,
} ) ;
itest! ( error_022_stack_custom_error {
args : " run error_022_stack_custom_error.ts " ,
output : " error_022_stack_custom_error.ts.out " ,
exit_code : 1 ,
} ) ;
itest! ( error_023_stack_async {
args : " run error_023_stack_async.ts " ,
output : " error_023_stack_async.ts.out " ,
exit_code : 1 ,
} ) ;
itest! ( error_024_stack_promise_all {
args : " run error_024_stack_promise_all.ts " ,
output : " error_024_stack_promise_all.ts.out " ,
exit_code : 1 ,
} ) ;
itest! ( error_025_tab_indent {
args : " run error_025_tab_indent " ,
output : " error_025_tab_indent.out " ,
exit_code : 1 ,
} ) ;
2021-02-14 01:38:41 -05:00
itest! ( error_026_remote_import_error {
args : " run error_026_remote_import_error.ts " ,
output : " error_026_remote_import_error.ts.out " ,
exit_code : 1 ,
http_server : true ,
} ) ;
2021-03-18 20:02:29 -04:00
itest! ( error_027_bare_import_error {
args : " bundle error_027_bare_import_error.ts " ,
output : " error_027_bare_import_error.ts.out " ,
exit_code : 1 ,
} ) ;
2021-02-01 13:09:25 -05:00
itest! ( error_missing_module_named_import {
args : " run --reload error_missing_module_named_import.ts " ,
output : " error_missing_module_named_import.ts.out " ,
exit_code : 1 ,
} ) ;
itest! ( error_no_check {
args : " run --reload --no-check error_no_check.ts " ,
output : " error_no_check.ts.out " ,
exit_code : 1 ,
} ) ;
itest! ( error_syntax {
args : " run --reload error_syntax.js " ,
exit_code : 1 ,
output : " error_syntax.js.out " ,
} ) ;
itest! ( error_syntax_empty_trailing_line {
args : " run --reload error_syntax_empty_trailing_line.mjs " ,
exit_code : 1 ,
output : " error_syntax_empty_trailing_line.mjs.out " ,
} ) ;
itest! ( error_type_definitions {
args : " run --reload error_type_definitions.ts " ,
exit_code : 1 ,
output : " error_type_definitions.ts.out " ,
} ) ;
itest! ( error_local_static_import_from_remote_ts {
args : " run --reload http://localhost:4545/cli/tests/error_local_static_import_from_remote.ts " ,
exit_code : 1 ,
http_server : true ,
output : " error_local_static_import_from_remote.ts.out " ,
} ) ;
itest! ( error_local_static_import_from_remote_js {
args : " run --reload http://localhost:4545/cli/tests/error_local_static_import_from_remote.js " ,
exit_code : 1 ,
http_server : true ,
output : " error_local_static_import_from_remote.js.out " ,
} ) ;
itest! ( error_worker_permissions_local {
args : " run --reload error_worker_permissions_local.ts " ,
output : " error_worker_permissions_local.ts.out " ,
exit_code : 1 ,
} ) ;
itest! ( error_worker_permissions_remote {
args : " run --reload error_worker_permissions_remote.ts " ,
http_server : true ,
output : " error_worker_permissions_remote.ts.out " ,
exit_code : 1 ,
} ) ;
2021-05-17 03:44:38 -04:00
itest! ( worker_permissions_remote_remote {
args : " run --quiet --reload --allow-net=localhost:4545 workers/permissions_remote_remote.ts " ,
output : " workers/permissions_remote_remote.ts.out " ,
http_server : true ,
exit_code : 1 ,
} ) ;
itest! ( worker_permissions_dynamic_remote {
args : " run --quiet --reload --allow-net --unstable workers/permissions_dynamic_remote.ts " ,
output : " workers/permissions_dynamic_remote.ts.out " ,
http_server : true ,
exit_code : 1 ,
} ) ;
itest! ( worker_permissions_data_remote {
args : " run --quiet --reload --allow-net=localhost:4545 workers/permissions_data_remote.ts " ,
output : " workers/permissions_data_remote.ts.out " ,
http_server : true ,
exit_code : 1 ,
} ) ;
itest! ( worker_permissions_blob_remote {
args : " run --quiet --reload --allow-net=localhost:4545 workers/permissions_blob_remote.ts " ,
output : " workers/permissions_blob_remote.ts.out " ,
http_server : true ,
exit_code : 1 ,
} ) ;
itest! ( worker_permissions_data_local {
args : " run --quiet --reload --allow-net=localhost:4545 workers/permissions_data_local.ts " ,
output : " workers/permissions_data_local.ts.out " ,
http_server : true ,
exit_code : 1 ,
} ) ;
itest! ( worker_permissions_blob_local {
args : " run --quiet --reload --allow-net=localhost:4545 workers/permissions_blob_local.ts " ,
output : " workers/permissions_blob_local.ts.out " ,
http_server : true ,
exit_code : 1 ,
} ) ;
2021-02-01 13:09:25 -05:00
itest! ( exit_error42 {
exit_code : 42 ,
args : " run --quiet --reload exit_error42.ts " ,
output : " exit_error42.ts.out " ,
} ) ;
2021-03-23 10:33:06 -04:00
itest! ( heapstats {
2021-04-12 04:47:44 -04:00
args : " run --quiet --unstable --v8-flags=--expose-gc heapstats.js " ,
2021-03-23 10:33:06 -04:00
output : " heapstats.js.out " ,
} ) ;
2021-02-01 13:09:25 -05:00
itest! ( https_import {
args : " run --quiet --reload --cert tls/RootCA.pem https_import.ts " ,
output : " https_import.ts.out " ,
http_server : true ,
} ) ;
itest! ( if_main {
args : " run --quiet --reload if_main.ts " ,
output : " if_main.ts.out " ,
} ) ;
itest! ( import_meta {
args : " run --quiet --reload import_meta.ts " ,
output : " import_meta.ts.out " ,
} ) ;
itest! ( main_module {
args : " run --quiet --allow-read --reload main_module.ts " ,
output : " main_module.ts.out " ,
} ) ;
itest! ( no_check {
args : " run --quiet --reload --no-check 006_url_imports.ts " ,
output : " 006_url_imports.ts.out " ,
http_server : true ,
} ) ;
itest! ( no_check_decorators {
args : " run --quiet --reload --no-check no_check_decorators.ts " ,
output : " no_check_decorators.ts.out " ,
} ) ;
itest! ( runtime_decorators {
args : " run --quiet --reload --no-check runtime_decorators.ts " ,
output : " runtime_decorators.ts.out " ,
} ) ;
2021-03-25 07:09:03 -04:00
itest! ( lib_dom_asynciterable {
args : " run --quiet --unstable --reload lib_dom_asynciterable.ts " ,
output : " lib_dom_asynciterable.ts.out " ,
} ) ;
2021-02-01 13:09:25 -05:00
itest! ( lib_ref {
args : " run --quiet --unstable --reload lib_ref.ts " ,
output : " lib_ref.ts.out " ,
} ) ;
itest! ( lib_runtime_api {
args : " run --quiet --unstable --reload lib_runtime_api.ts " ,
output : " lib_runtime_api.ts.out " ,
} ) ;
itest! ( seed_random {
args : " run --seed=100 seed_random.js " ,
output : " seed_random.js.out " ,
} ) ;
itest! ( type_definitions {
args : " run --reload type_definitions.ts " ,
output : " type_definitions.ts.out " ,
} ) ;
itest! ( type_definitions_for_export {
args : " run --reload type_definitions_for_export.ts " ,
output : " type_definitions_for_export.ts.out " ,
exit_code : 1 ,
} ) ;
itest! ( type_directives_01 {
args : " run --reload -L debug type_directives_01.ts " ,
output : " type_directives_01.ts.out " ,
http_server : true ,
} ) ;
itest! ( type_directives_02 {
args : " run --reload -L debug type_directives_02.ts " ,
output : " type_directives_02.ts.out " ,
} ) ;
itest! ( type_directives_js_main {
args : " run --reload -L debug type_directives_js_main.js " ,
output : " type_directives_js_main.js.out " ,
exit_code : 0 ,
} ) ;
itest! ( type_directives_redirect {
args : " run --reload type_directives_redirect.ts " ,
output : " type_directives_redirect.ts.out " ,
http_server : true ,
} ) ;
itest! ( type_headers_deno_types {
args : " run --reload type_headers_deno_types.ts " ,
output : " type_headers_deno_types.ts.out " ,
http_server : true ,
} ) ;
itest! ( ts_type_imports {
args : " run --reload ts_type_imports.ts " ,
output : " ts_type_imports.ts.out " ,
exit_code : 1 ,
} ) ;
itest! ( ts_decorators {
args : " run --reload -c tsconfig.decorators.json ts_decorators.ts " ,
output : " ts_decorators.ts.out " ,
} ) ;
itest! ( ts_decorators_bundle {
args : " bundle ts_decorators_bundle.ts " ,
output : " ts_decorators_bundle.out " ,
} ) ;
itest! ( ts_type_only_import {
args : " run --reload ts_type_only_import.ts " ,
output : " ts_type_only_import.ts.out " ,
} ) ;
itest! ( swc_syntax_error {
args : " run --reload swc_syntax_error.ts " ,
output : " swc_syntax_error.ts.out " ,
exit_code : 1 ,
} ) ;
itest! ( types {
args : " types " ,
output : " types.out " ,
} ) ;
itest! ( unbuffered_stderr {
args : " run --reload unbuffered_stderr.ts " ,
output : " unbuffered_stderr.ts.out " ,
} ) ;
itest! ( unbuffered_stdout {
args : " run --quiet --reload unbuffered_stdout.ts " ,
output : " unbuffered_stdout.ts.out " ,
} ) ;
// Cannot write the expression to evaluate as "console.log(typeof gc)"
// because itest! splits args on whitespace.
itest! ( v8_flags_eval {
args : " eval --v8-flags=--expose-gc console.log(typeof(gc)) " ,
output : " v8_flags.js.out " ,
} ) ;
itest! ( v8_flags_run {
args : " run --v8-flags=--expose-gc v8_flags.js " ,
output : " v8_flags.js.out " ,
} ) ;
itest! ( v8_flags_unrecognized {
args : " repl --v8-flags=--foo,bar,--trace-gc,-baz " ,
output : " v8_flags_unrecognized.out " ,
exit_code : 1 ,
} ) ;
itest! ( v8_help {
args : " repl --v8-flags=--help " ,
output : " v8_help.out " ,
} ) ;
itest! ( unsupported_dynamic_import_scheme {
args : " eval import('xxx:') " ,
output : " unsupported_dynamic_import_scheme.out " ,
exit_code : 1 ,
} ) ;
itest! ( wasm {
args : " run --quiet wasm.ts " ,
output : " wasm.ts.out " ,
} ) ;
2021-04-26 11:54:07 -04:00
itest! ( wasm_shared {
args : " run --quiet wasm_shared.ts " ,
output : " wasm_shared.out " ,
} ) ;
2021-02-01 13:09:25 -05:00
itest! ( wasm_async {
args : " run wasm_async.js " ,
output : " wasm_async.out " ,
} ) ;
itest! ( wasm_unreachable {
args : " run wasm_unreachable.js " ,
output : " wasm_unreachable.out " ,
exit_code : 1 ,
} ) ;
itest! ( weakref {
args : " run --quiet --reload weakref.ts " ,
output : " weakref.ts.out " ,
} ) ;
itest! ( top_level_await_order {
args : " run --allow-read top_level_await_order.js " ,
output : " top_level_await_order.out " ,
} ) ;
itest! ( top_level_await_loop {
args : " run --allow-read top_level_await_loop.js " ,
output : " top_level_await_loop.out " ,
} ) ;
itest! ( top_level_await_circular {
args : " run --allow-read top_level_await_circular.js " ,
output : " top_level_await_circular.out " ,
exit_code : 1 ,
} ) ;
itest! ( top_level_await_unresolved {
args : " run top_level_await_unresolved.js " ,
output : " top_level_await_unresolved.out " ,
exit_code : 1 ,
} ) ;
itest! ( top_level_await {
args : " run --allow-read top_level_await.js " ,
output : " top_level_await.out " ,
} ) ;
itest! ( top_level_await_ts {
args : " run --quiet --allow-read top_level_await.ts " ,
output : " top_level_await.out " ,
} ) ;
itest! ( top_level_for_await {
args : " run --quiet top_level_for_await.js " ,
output : " top_level_for_await.out " ,
} ) ;
itest! ( top_level_for_await_ts {
args : " run --quiet top_level_for_await.ts " ,
output : " top_level_for_await.out " ,
} ) ;
itest! ( unstable_disabled {
args : " run --reload unstable.ts " ,
exit_code : 1 ,
output : " unstable_disabled.out " ,
} ) ;
itest! ( unstable_enabled {
args : " run --quiet --reload --unstable unstable.ts " ,
output : " unstable_enabled.out " ,
} ) ;
itest! ( unstable_disabled_js {
args : " run --reload unstable.js " ,
output : " unstable_disabled_js.out " ,
} ) ;
itest! ( unstable_enabled_js {
args : " run --quiet --reload --unstable unstable.ts " ,
output : " unstable_enabled_js.out " ,
} ) ;
itest! ( unstable_disabled_ts2551 {
args : " run --reload unstable_ts2551.ts " ,
exit_code : 1 ,
output : " unstable_disabled_ts2551.out " ,
} ) ;
itest! ( unstable_worker {
args : " run --reload --unstable --quiet --allow-read unstable_worker.ts " ,
output : " unstable_worker.ts.out " ,
} ) ;
itest! ( _053_import_compression {
args : " run --quiet --reload --allow-net 053_import_compression/main.ts " ,
output : " 053_import_compression.out " ,
http_server : true ,
} ) ;
itest! ( cache_extensionless {
args : " cache --reload http://localhost:4545/cli/tests/subdir/no_js_ext " ,
output : " cache_extensionless.out " ,
http_server : true ,
} ) ;
itest! ( cache_random_extension {
args :
" cache --reload http://localhost:4545/cli/tests/subdir/no_js_ext@1.0.0 " ,
output : " cache_random_extension.out " ,
http_server : true ,
} ) ;
// TODO(lucacasonato): reenable these tests once we figure out what is wrong with cafile tests
// itest!(cafile_url_imports {
// args: "run --quiet --reload --cert tls/RootCA.pem cafile_url_imports.ts",
// output: "cafile_url_imports.ts.out",
// http_server: true,
// });
// itest!(cafile_ts_fetch {
// args:
// "run --quiet --reload --allow-net --cert tls/RootCA.pem cafile_ts_fetch.ts",
// output: "cafile_ts_fetch.ts.out",
// http_server: true,
// });
// itest!(cafile_eval {
// args: "eval --cert tls/RootCA.pem fetch('https://localhost:5545/cli/tests/cafile_ts_fetch.ts.out').then(r=>r.text()).then(t=>console.log(t.trimEnd()))",
// output: "cafile_ts_fetch.ts.out",
// http_server: true,
// });
// itest!(cafile_info {
// args:
// "info --quiet --cert tls/RootCA.pem https://localhost:5545/cli/tests/cafile_info.ts",
// output: "cafile_info.ts.out",
// http_server: true,
// });
itest! ( disallow_http_from_https_js {
args : " run --quiet --reload --cert tls/RootCA.pem https://localhost:5545/cli/tests/disallow_http_from_https.js " ,
output : " disallow_http_from_https_js.out " ,
http_server : true ,
exit_code : 1 ,
} ) ;
itest! ( disallow_http_from_https_ts {
args : " run --quiet --reload --cert tls/RootCA.pem https://localhost:5545/cli/tests/disallow_http_from_https.ts " ,
output : " disallow_http_from_https_ts.out " ,
http_server : true ,
exit_code : 1 ,
} ) ;
itest! ( dynamic_import_conditional {
args : " run --quiet --reload dynamic_import_conditional.js " ,
output : " dynamic_import_conditional.js.out " ,
} ) ;
itest! ( tsx_imports {
args : " run --reload tsx_imports.ts " ,
output : " tsx_imports.ts.out " ,
} ) ;
itest! ( fix_dynamic_import_errors {
args : " run --reload fix_dynamic_import_errors.js " ,
output : " fix_dynamic_import_errors.js.out " ,
} ) ;
itest! ( fix_emittable_skipped {
args : " run --reload fix_emittable_skipped.js " ,
output : " fix_emittable_skipped.ts.out " ,
} ) ;
itest! ( fix_exotic_specifiers {
args : " run --quiet --reload fix_exotic_specifiers.ts " ,
output : " fix_exotic_specifiers.ts.out " ,
} ) ;
itest! ( fix_js_import_js {
args : " run --quiet --reload fix_js_import_js.ts " ,
output : " fix_js_import_js.ts.out " ,
} ) ;
itest! ( fix_js_imports {
args : " run --quiet --reload fix_js_imports.ts " ,
output : " fix_js_imports.ts.out " ,
} ) ;
itest! ( fix_tsc_file_exists {
args : " run --quiet --reload tsc/test.js " ,
output : " fix_tsc_file_exists.out " ,
} ) ;
itest! ( es_private_fields {
args : " run --quiet --reload es_private_fields.js " ,
output : " es_private_fields.js.out " ,
} ) ;
itest! ( cjs_imports {
args : " run --quiet --reload cjs_imports.ts " ,
output : " cjs_imports.ts.out " ,
} ) ;
itest! ( ts_import_from_js {
args : " run --quiet --reload ts_import_from_js.js " ,
output : " ts_import_from_js.js.out " ,
http_server : true ,
} ) ;
itest! ( jsx_import_from_ts {
args : " run --quiet --reload jsx_import_from_ts.ts " ,
output : " jsx_import_from_ts.ts.out " ,
} ) ;
itest! ( single_compile_with_reload {
args : " run --reload --allow-read single_compile_with_reload.ts " ,
output : " single_compile_with_reload.ts.out " ,
} ) ;
itest! ( performance_stats {
args : " cache --reload --log-level debug 002_hello.ts " ,
output : " performance_stats.out " ,
} ) ;
itest! ( proto_exploit {
args : " run proto_exploit.js " ,
output : " proto_exploit.js.out " ,
} ) ;
itest! ( redirect_cache {
http_server : true ,
args :
" cache --reload http://localhost:4548/cli/tests/subdir/redirects/a.ts " ,
output : " redirect_cache.out " ,
} ) ;
2021-02-25 10:24:05 -05:00
itest! ( deno_doc_types_header_direct {
args : " doc --reload http://127.0.0.1:4545/xTypeScriptTypes.js " ,
output : " doc/types_header.out " ,
http_server : true ,
2021-02-01 13:09:25 -05:00
} ) ;
itest! ( import_data_url_error_stack {
args : " run --quiet --reload import_data_url_error_stack.ts " ,
output : " import_data_url_error_stack.ts.out " ,
exit_code : 1 ,
} ) ;
itest! ( import_data_url_import_relative {
args : " run --quiet --reload import_data_url_import_relative.ts " ,
output : " import_data_url_import_relative.ts.out " ,
exit_code : 1 ,
} ) ;
2021-02-08 23:05:37 -05:00
itest! ( import_data_url_import_map {
2021-03-01 06:41:22 -05:00
args : " run --quiet --reload --import-map import_maps/import_map.json import_data_url.ts " ,
2021-02-08 23:05:37 -05:00
output : " import_data_url.ts.out " ,
} ) ;
2021-02-01 13:09:25 -05:00
itest! ( import_data_url_imports {
args : " run --quiet --reload import_data_url_imports.ts " ,
output : " import_data_url_imports.ts.out " ,
http_server : true ,
} ) ;
itest! ( import_data_url_jsx {
args : " run --quiet --reload import_data_url_jsx.ts " ,
output : " import_data_url_jsx.ts.out " ,
} ) ;
itest! ( import_data_url {
args : " run --quiet --reload import_data_url.ts " ,
output : " import_data_url.ts.out " ,
} ) ;
itest! ( import_dynamic_data_url {
args : " run --quiet --reload import_dynamic_data_url.ts " ,
output : " import_dynamic_data_url.ts.out " ,
} ) ;
2021-04-07 09:22:14 -04:00
itest! ( import_blob_url_error_stack {
args : " run --quiet --reload import_blob_url_error_stack.ts " ,
output : " import_blob_url_error_stack.ts.out " ,
exit_code : 1 ,
} ) ;
itest! ( import_blob_url_import_relative {
args : " run --quiet --reload import_blob_url_import_relative.ts " ,
output : " import_blob_url_import_relative.ts.out " ,
exit_code : 1 ,
} ) ;
itest! ( import_blob_url_imports {
2021-05-17 03:44:38 -04:00
args : " run --quiet --reload --allow-net=localhost:4545 import_blob_url_imports.ts " ,
2021-04-07 09:22:14 -04:00
output : " import_blob_url_imports.ts.out " ,
http_server : true ,
} ) ;
itest! ( import_blob_url_jsx {
args : " run --quiet --reload import_blob_url_jsx.ts " ,
output : " import_blob_url_jsx.ts.out " ,
} ) ;
itest! ( import_blob_url {
args : " run --quiet --reload import_blob_url.ts " ,
output : " import_blob_url.ts.out " ,
} ) ;
2021-02-01 13:09:25 -05:00
itest! ( import_file_with_colon {
args : " run --quiet --reload import_file_with_colon.ts " ,
output : " import_file_with_colon.ts.out " ,
http_server : true ,
} ) ;
itest! ( info_missing_module {
args : " info error_009_missing_js_module.js " ,
output : " info_missing_module.out " ,
} ) ;
itest! ( info_recursive_modules {
args : " info --quiet info_recursive_imports_test.ts " ,
output : " info_recursive_imports_test.out " ,
exit_code : 0 ,
} ) ;
itest! ( info_type_import {
args : " info info_type_import.ts " ,
output : " info_type_import.out " ,
} ) ;
itest! ( ignore_require {
args : " cache --reload --no-check ignore_require.js " ,
output_str : Some ( " " ) ,
exit_code : 0 ,
} ) ;
2021-02-22 05:46:17 -05:00
// FIXME(bartlomieju): disabled, because this test is very flaky on CI
// itest!(local_sources_not_cached_in_memory {
// args: "run --allow-read --allow-write no_mem_cache.js",
// output: "no_mem_cache.js.out",
// });
2021-02-01 13:09:25 -05:00
// This test checks that inline source map data is used. It uses a hand crafted
// source map that maps to a file that exists, but is not loaded into the module
// graph (inline_js_source_map_2.ts) (because there are no direct dependencies).
// Source line is not remapped because no inline source contents are included in
// the sourcemap and the file is not present in the dependency graph.
itest! ( inline_js_source_map_2 {
args : " run --quiet inline_js_source_map_2.js " ,
output : " inline_js_source_map_2.js.out " ,
exit_code : 1 ,
} ) ;
// This test checks that inline source map data is used. It uses a hand crafted
// source map that maps to a file that exists, but is not loaded into the module
// graph (inline_js_source_map_2.ts) (because there are no direct dependencies).
// Source line remapped using th inline source contents that are included in the
// inline source map.
itest! ( inline_js_source_map_2_with_inline_contents {
args : " run --quiet inline_js_source_map_2_with_inline_contents.js " ,
output : " inline_js_source_map_2_with_inline_contents.js.out " ,
exit_code : 1 ,
} ) ;
// This test checks that inline source map data is used. It uses a hand crafted
// source map that maps to a file that exists, and is loaded into the module
// graph because of a direct import statement (inline_js_source_map.ts). The
// source map was generated from an earlier version of this file, where the throw
// was not commented out. The source line is remapped using source contents that
// from the module graph.
itest! ( inline_js_source_map_with_contents_from_graph {
args : " run --quiet inline_js_source_map_with_contents_from_graph.js " ,
output : " inline_js_source_map_with_contents_from_graph.js.out " ,
exit_code : 1 ,
http_server : true ,
} ) ;
2021-05-04 08:27:20 -04:00
// This test ensures that a descriptive error is shown when we're unable to load
// the import map. Even though this tests only the `run` subcommand, we can be sure
// that the error message is similar for other subcommands as they all use
// `program_state.maybe_import_map` to access the import map underneath.
itest! ( error_import_map_unable_to_load {
args :
" run --import-map=import_maps/does_not_exist.json import_maps/test.ts " ,
output : " error_import_map_unable_to_load.out " ,
exit_code : 1 ,
} ) ;
2021-02-01 13:09:25 -05:00
#[ test ]
fn no_validate_asm ( ) {
let output = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " run " )
. arg ( " cli/tests/no_validate_asm.js " )
. stderr ( std ::process ::Stdio ::piped ( ) )
. stdout ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
assert! ( output . status . success ( ) ) ;
assert! ( output . stderr . is_empty ( ) ) ;
assert! ( output . stdout . is_empty ( ) ) ;
}
2020-02-24 17:49:40 -05:00
2021-02-01 13:09:25 -05:00
#[ test ]
#[ ignore ]
fn cafile_env_fetch ( ) {
use deno_core ::url ::Url ;
let _g = util ::http_server ( ) ;
let deno_dir = TempDir ::new ( ) . expect ( " tempdir fail " ) ;
let module_url =
Url ::parse ( " https://localhost:5545/cli/tests/cafile_url_imports.ts " )
. unwrap ( ) ;
let cafile = util ::root_path ( ) . join ( " cli/tests/tls/RootCA.pem " ) ;
let output = Command ::new ( util ::deno_exe_path ( ) )
. env ( " DENO_DIR " , deno_dir . path ( ) )
. env ( " DENO_CERT " , cafile )
. current_dir ( util ::root_path ( ) )
. arg ( " cache " )
. arg ( module_url . to_string ( ) )
. output ( )
. expect ( " Failed to spawn script " ) ;
assert! ( output . status . success ( ) ) ;
}
2020-09-21 16:09:53 -04:00
2021-02-01 13:09:25 -05:00
#[ test ]
#[ ignore ]
fn cafile_fetch ( ) {
use deno_core ::url ::Url ;
let _g = util ::http_server ( ) ;
let deno_dir = TempDir ::new ( ) . expect ( " tempdir fail " ) ;
let module_url =
Url ::parse ( " http://localhost:4545/cli/tests/cafile_url_imports.ts " )
. unwrap ( ) ;
let cafile = util ::root_path ( ) . join ( " cli/tests/tls/RootCA.pem " ) ;
let output = Command ::new ( util ::deno_exe_path ( ) )
. env ( " DENO_DIR " , deno_dir . path ( ) )
. current_dir ( util ::root_path ( ) )
. arg ( " cache " )
. arg ( " --cert " )
. arg ( cafile )
. arg ( module_url . to_string ( ) )
. output ( )
. expect ( " Failed to spawn script " ) ;
assert! ( output . status . success ( ) ) ;
let out = std ::str ::from_utf8 ( & output . stdout ) . unwrap ( ) ;
assert_eq! ( out , " " ) ;
}
2020-09-21 16:09:53 -04:00
2021-02-01 13:09:25 -05:00
#[ test ]
#[ ignore ]
fn cafile_install_remote_module ( ) {
let _g = util ::http_server ( ) ;
let temp_dir = TempDir ::new ( ) . expect ( " tempdir fail " ) ;
let bin_dir = temp_dir . path ( ) . join ( " bin " ) ;
std ::fs ::create_dir ( & bin_dir ) . unwrap ( ) ;
let deno_dir = TempDir ::new ( ) . expect ( " tempdir fail " ) ;
let cafile = util ::root_path ( ) . join ( " cli/tests/tls/RootCA.pem " ) ;
let install_output = Command ::new ( util ::deno_exe_path ( ) )
. env ( " DENO_DIR " , deno_dir . path ( ) )
. current_dir ( util ::root_path ( ) )
. arg ( " install " )
. arg ( " --cert " )
. arg ( cafile )
. arg ( " --root " )
. arg ( temp_dir . path ( ) )
. arg ( " -n " )
. arg ( " echo_test " )
. arg ( " https://localhost:5545/cli/tests/echo.ts " )
. output ( )
. expect ( " Failed to spawn script " ) ;
println! ( " {} " , std ::str ::from_utf8 ( & install_output . stdout ) . unwrap ( ) ) ;
eprintln! ( " {} " , std ::str ::from_utf8 ( & install_output . stderr ) . unwrap ( ) ) ;
assert! ( install_output . status . success ( ) ) ;
let mut echo_test_path = bin_dir . join ( " echo_test " ) ;
if cfg! ( windows ) {
echo_test_path = echo_test_path . with_extension ( " cmd " ) ;
}
assert! ( echo_test_path . exists ( ) ) ;
2020-10-02 07:17:47 -04:00
2021-02-01 13:09:25 -05:00
let output = Command ::new ( echo_test_path )
. current_dir ( temp_dir . path ( ) )
. arg ( " foo " )
. env ( " PATH " , util ::target_dir ( ) )
. output ( )
. expect ( " failed to spawn script " ) ;
let stdout = std ::str ::from_utf8 ( & output . stdout ) . unwrap ( ) . trim ( ) ;
assert! ( stdout . ends_with ( " foo " ) ) ;
}
2020-10-02 07:17:47 -04:00
2021-02-01 13:09:25 -05:00
#[ test ]
#[ ignore ]
fn cafile_bundle_remote_exports ( ) {
let _g = util ::http_server ( ) ;
// First we have to generate a bundle of some remote module that has exports.
let mod1 = " https://localhost:5545/cli/tests/subdir/mod1.ts " ;
let cafile = util ::root_path ( ) . join ( " cli/tests/tls/RootCA.pem " ) ;
let t = TempDir ::new ( ) . expect ( " tempdir fail " ) ;
let bundle = t . path ( ) . join ( " mod1.bundle.js " ) ;
let mut deno = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " bundle " )
. arg ( " --cert " )
. arg ( cafile )
. arg ( mod1 )
. arg ( & bundle )
. spawn ( )
. expect ( " failed to spawn script " ) ;
let status = deno . wait ( ) . expect ( " failed to wait for the child process " ) ;
assert! ( status . success ( ) ) ;
assert! ( bundle . is_file ( ) ) ;
2020-10-02 07:17:47 -04:00
2021-02-01 13:09:25 -05:00
// Now we try to use that bundle from another module.
let test = t . path ( ) . join ( " test.js " ) ;
std ::fs ::write (
& test ,
"
import { printHello3 } from \ " ./mod1.bundle.js \" ;
printHello3 ( ) ; " ,
)
. expect ( " error writing file " ) ;
2020-06-02 16:37:52 -04:00
2021-02-01 13:09:25 -05:00
let output = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " run " )
. arg ( & test )
. output ( )
. expect ( " failed to spawn script " ) ;
// check the output of the test.ts program.
assert! ( std ::str ::from_utf8 ( & output . stdout )
. unwrap ( )
. trim ( )
. ends_with ( " Hello " ) ) ;
assert_eq! ( output . stderr , b " " ) ;
}
2020-02-24 17:49:40 -05:00
2021-02-25 10:24:05 -05:00
mod doc {
use super ::* ;
itest! ( deno_doc_builtin {
args : " doc " ,
output : " deno_doc_builtin.out " ,
} ) ;
itest! ( deno_doc {
args : " doc deno_doc.ts " ,
output : " deno_doc.out " ,
} ) ;
itest! ( deno_doc_import_map {
args :
" doc --unstable --import-map=doc/import_map.json doc/use_import_map.js " ,
output : " doc/use_import_map.out " ,
} ) ;
itest! ( deno_doc_types_hint {
args : " doc doc/types_hint.ts " ,
output : " doc/types_hint.out " ,
} ) ;
itest! ( deno_doc_types_ref {
args : " doc doc/types_ref.js " ,
output : " doc/types_ref.out " ,
} ) ;
itest! ( deno_doc_types_header {
args : " doc --reload doc/types_header.ts " ,
output : " doc/types_header.out " ,
http_server : true ,
} ) ;
}
2021-03-04 07:40:38 -05:00
mod lint {
use super ::* ;
#[ test ]
fn ignore_unexplicit_files ( ) {
let output = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. env ( " NO_COLOR " , " 1 " )
. arg ( " lint " )
. arg ( " --unstable " )
. arg ( " --ignore=./ " )
. stderr ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
assert! ( ! output . status . success ( ) ) ;
assert_eq! (
String ::from_utf8_lossy ( & output . stderr ) ,
" error: No target files found. \n "
) ;
}
itest! ( all {
args : " lint --unstable lint/file1.js lint/file2.ts lint/ignored_file.ts " ,
output : " lint/expected.out " ,
exit_code : 1 ,
} ) ;
itest! ( quiet {
args : " lint --unstable --quiet lint/file1.js " ,
output : " lint/expected_quiet.out " ,
exit_code : 1 ,
} ) ;
itest! ( json {
args :
" lint --unstable --json lint/file1.js lint/file2.ts lint/ignored_file.ts lint/malformed.js " ,
output : " lint/expected_json.out " ,
exit_code : 1 ,
} ) ;
itest! ( ignore {
args : " lint --unstable --ignore=lint/file1.js,lint/malformed.js lint/ " ,
output : " lint/expected_ignore.out " ,
exit_code : 1 ,
} ) ;
itest! ( glob {
args : " lint --unstable --ignore=lint/malformed.js lint/ " ,
output : " lint/expected_glob.out " ,
exit_code : 1 ,
} ) ;
itest! ( stdin {
args : " lint --unstable - " ,
2021-04-09 17:35:29 -04:00
input : Some ( " let _a: any; " ) ,
2021-03-04 07:40:38 -05:00
output : " lint/expected_from_stdin.out " ,
exit_code : 1 ,
} ) ;
itest! ( stdin_json {
args : " lint --unstable --json - " ,
2021-04-09 17:35:29 -04:00
input : Some ( " let _a: any; " ) ,
2021-03-04 07:40:38 -05:00
output : " lint/expected_from_stdin_json.out " ,
exit_code : 1 ,
} ) ;
itest! ( rules {
args : " lint --unstable --rules " ,
output : " lint/expected_rules.out " ,
exit_code : 0 ,
} ) ;
// Make sure that the rules are printed if quiet option is enabled.
itest! ( rules_quiet {
args : " lint --unstable --rules -q " ,
output : " lint/expected_rules.out " ,
exit_code : 0 ,
} ) ;
}
2021-02-24 09:27:51 -05:00
mod coverage {
use super ::* ;
#[ test ]
fn branch ( ) {
let tempdir = TempDir ::new ( ) . expect ( " tempdir fail " ) ;
let status = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " test " )
. arg ( " --quiet " )
. arg ( " --unstable " )
. arg ( format! ( " --coverage= {} " , tempdir . path ( ) . to_str ( ) . unwrap ( ) ) )
. arg ( " cli/tests/coverage/branch_test.ts " )
. stdout ( std ::process ::Stdio ::piped ( ) )
. stderr ( std ::process ::Stdio ::inherit ( ) )
. status ( )
. expect ( " failed to spawn test runner " ) ;
assert! ( status . success ( ) ) ;
let output = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " coverage " )
. arg ( " --quiet " )
. arg ( " --unstable " )
. arg ( format! ( " {} / " , tempdir . path ( ) . to_str ( ) . unwrap ( ) ) )
. stdout ( std ::process ::Stdio ::piped ( ) )
. stderr ( std ::process ::Stdio ::inherit ( ) )
. output ( )
. expect ( " failed to spawn coverage reporter " ) ;
let actual =
util ::strip_ansi_codes ( std ::str ::from_utf8 ( & output . stdout ) . unwrap ( ) )
. to_string ( ) ;
let expected = fs ::read_to_string (
util ::root_path ( ) . join ( " cli/tests/coverage/expected_branch.out " ) ,
)
. unwrap ( ) ;
if ! util ::wildcard_match ( & expected , & actual ) {
println! ( " OUTPUT \n {} \n OUTPUT " , actual ) ;
println! ( " EXPECTED \n {} \n EXPECTED " , expected ) ;
panic! ( " pattern match failed " ) ;
}
assert! ( output . status . success ( ) ) ;
let output = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " coverage " )
. arg ( " --quiet " )
. arg ( " --unstable " )
. arg ( " --lcov " )
. arg ( format! ( " {} / " , tempdir . path ( ) . to_str ( ) . unwrap ( ) ) )
. stdout ( std ::process ::Stdio ::piped ( ) )
. stderr ( std ::process ::Stdio ::inherit ( ) )
. output ( )
. expect ( " failed to spawn coverage reporter " ) ;
let actual =
util ::strip_ansi_codes ( std ::str ::from_utf8 ( & output . stdout ) . unwrap ( ) )
. to_string ( ) ;
let expected = fs ::read_to_string (
util ::root_path ( ) . join ( " cli/tests/coverage/expected_branch.lcov " ) ,
)
. unwrap ( ) ;
if ! util ::wildcard_match ( & expected , & actual ) {
println! ( " OUTPUT \n {} \n OUTPUT " , actual ) ;
println! ( " EXPECTED \n {} \n EXPECTED " , expected ) ;
panic! ( " pattern match failed " ) ;
}
assert! ( output . status . success ( ) ) ;
}
#[ test ]
fn complex ( ) {
let tempdir = TempDir ::new ( ) . expect ( " tempdir fail " ) ;
let status = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " test " )
. arg ( " --quiet " )
. arg ( " --unstable " )
. arg ( format! ( " --coverage= {} " , tempdir . path ( ) . to_str ( ) . unwrap ( ) ) )
. arg ( " cli/tests/coverage/complex_test.ts " )
. stdout ( std ::process ::Stdio ::piped ( ) )
. stderr ( std ::process ::Stdio ::inherit ( ) )
. status ( )
. expect ( " failed to spawn test runner " ) ;
assert! ( status . success ( ) ) ;
let output = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " coverage " )
. arg ( " --quiet " )
. arg ( " --unstable " )
. arg ( format! ( " {} / " , tempdir . path ( ) . to_str ( ) . unwrap ( ) ) )
. stdout ( std ::process ::Stdio ::piped ( ) )
. stderr ( std ::process ::Stdio ::inherit ( ) )
. output ( )
. expect ( " failed to spawn coverage reporter " ) ;
let actual =
util ::strip_ansi_codes ( std ::str ::from_utf8 ( & output . stdout ) . unwrap ( ) )
. to_string ( ) ;
let expected = fs ::read_to_string (
util ::root_path ( ) . join ( " cli/tests/coverage/expected_complex.out " ) ,
)
. unwrap ( ) ;
if ! util ::wildcard_match ( & expected , & actual ) {
println! ( " OUTPUT \n {} \n OUTPUT " , actual ) ;
println! ( " EXPECTED \n {} \n EXPECTED " , expected ) ;
panic! ( " pattern match failed " ) ;
}
assert! ( output . status . success ( ) ) ;
let output = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " coverage " )
. arg ( " --quiet " )
. arg ( " --unstable " )
. arg ( " --lcov " )
. arg ( format! ( " {} / " , tempdir . path ( ) . to_str ( ) . unwrap ( ) ) )
. stdout ( std ::process ::Stdio ::piped ( ) )
. stderr ( std ::process ::Stdio ::inherit ( ) )
. output ( )
. expect ( " failed to spawn coverage reporter " ) ;
let actual =
util ::strip_ansi_codes ( std ::str ::from_utf8 ( & output . stdout ) . unwrap ( ) )
. to_string ( ) ;
let expected = fs ::read_to_string (
util ::root_path ( ) . join ( " cli/tests/coverage/expected_complex.lcov " ) ,
)
. unwrap ( ) ;
if ! util ::wildcard_match ( & expected , & actual ) {
println! ( " OUTPUT \n {} \n OUTPUT " , actual ) ;
println! ( " EXPECTED \n {} \n EXPECTED " , expected ) ;
panic! ( " pattern match failed " ) ;
}
assert! ( output . status . success ( ) ) ;
}
}
2021-02-01 13:09:25 -05:00
mod permissions {
use super ::* ;
2020-05-29 06:24:06 -04:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn with_allow ( ) {
for permission in & util ::PERMISSION_VARIANTS {
let status = util ::deno_cmd ( )
. current_dir ( & util ::tests_path ( ) )
. arg ( " run " )
. arg ( format! ( " --allow- {0} " , permission ) )
. arg ( " permission_test.ts " )
. arg ( format! ( " {0} Required " , permission ) )
. spawn ( )
. unwrap ( )
. wait ( )
. unwrap ( ) ;
assert! ( status . success ( ) ) ;
}
}
2020-05-19 13:33:11 -04:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn without_allow ( ) {
for permission in & util ::PERMISSION_VARIANTS {
let ( _ , err ) = util ::run_and_collect_output (
false ,
& format! ( " run permission_test.ts {0} Required " , permission ) ,
None ,
None ,
false ,
) ;
assert! ( err . contains ( util ::PERMISSION_DENIED_PATTERN ) ) ;
}
}
2020-02-24 17:49:40 -05:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn rw_inside_project_dir ( ) {
const PERMISSION_VARIANTS : [ & str ; 2 ] = [ " read " , " write " ] ;
for permission in & PERMISSION_VARIANTS {
let status = util ::deno_cmd ( )
. current_dir ( & util ::tests_path ( ) )
. arg ( " run " )
. arg ( format! (
" --allow-{0}={1} " ,
permission ,
util ::root_path ( ) . into_os_string ( ) . into_string ( ) . unwrap ( )
) )
. arg ( " complex_permissions_test.ts " )
. arg ( permission )
. arg ( " complex_permissions_test.ts " )
. spawn ( )
. unwrap ( )
. wait ( )
. unwrap ( ) ;
assert! ( status . success ( ) ) ;
}
}
2020-02-24 17:49:40 -05:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn rw_outside_test_dir ( ) {
const PERMISSION_VARIANTS : [ & str ; 2 ] = [ " read " , " write " ] ;
for permission in & PERMISSION_VARIANTS {
let ( _ , err ) = util ::run_and_collect_output (
false ,
& format! (
" run --allow-{0}={1} complex_permissions_test.ts {0} {2} " ,
permission ,
util ::root_path ( )
. join ( " cli " )
. join ( " tests " )
. into_os_string ( )
. into_string ( )
. unwrap ( ) ,
util ::root_path ( )
. join ( " Cargo.toml " )
. into_os_string ( )
. into_string ( )
. unwrap ( ) ,
) ,
None ,
None ,
false ,
) ;
assert! ( err . contains ( util ::PERMISSION_DENIED_PATTERN ) ) ;
}
}
2020-02-24 17:49:40 -05:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn rw_inside_test_dir ( ) {
const PERMISSION_VARIANTS : [ & str ; 2 ] = [ " read " , " write " ] ;
for permission in & PERMISSION_VARIANTS {
let status = util ::deno_cmd ( )
. current_dir ( & util ::tests_path ( ) )
. arg ( " run " )
. arg ( format! (
" --allow-{0}={1} " ,
permission ,
util ::root_path ( )
. join ( " cli " )
. join ( " tests " )
. into_os_string ( )
. into_string ( )
. unwrap ( )
) )
. arg ( " complex_permissions_test.ts " )
. arg ( permission )
. arg ( " complex_permissions_test.ts " )
. spawn ( )
. unwrap ( )
. wait ( )
. unwrap ( ) ;
assert! ( status . success ( ) ) ;
}
}
2020-10-02 07:13:23 -04:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn rw_outside_test_and_js_dir ( ) {
const PERMISSION_VARIANTS : [ & str ; 2 ] = [ " read " , " write " ] ;
let test_dir = util ::root_path ( )
. join ( " cli " )
. join ( " tests " )
. into_os_string ( )
. into_string ( )
. unwrap ( ) ;
let js_dir = util ::root_path ( )
. join ( " js " )
. into_os_string ( )
. into_string ( )
. unwrap ( ) ;
for permission in & PERMISSION_VARIANTS {
let ( _ , err ) = util ::run_and_collect_output (
false ,
& format! (
" run --allow-{0}={1},{2} complex_permissions_test.ts {0} {3} " ,
permission ,
test_dir ,
js_dir ,
util ::root_path ( )
. join ( " Cargo.toml " )
. into_os_string ( )
. into_string ( )
. unwrap ( ) ,
) ,
None ,
None ,
false ,
) ;
assert! ( err . contains ( util ::PERMISSION_DENIED_PATTERN ) ) ;
}
}
2020-02-24 17:49:40 -05:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn rw_inside_test_and_js_dir ( ) {
const PERMISSION_VARIANTS : [ & str ; 2 ] = [ " read " , " write " ] ;
let test_dir = util ::root_path ( )
. join ( " cli " )
. join ( " tests " )
. into_os_string ( )
. into_string ( )
. unwrap ( ) ;
let js_dir = util ::root_path ( )
. join ( " js " )
. into_os_string ( )
. into_string ( )
. unwrap ( ) ;
for permission in & PERMISSION_VARIANTS {
let status = util ::deno_cmd ( )
. current_dir ( & util ::tests_path ( ) )
. arg ( " run " )
. arg ( format! ( " --allow- {0} = {1} , {2} " , permission , test_dir , js_dir ) )
. arg ( " complex_permissions_test.ts " )
. arg ( permission )
. arg ( " complex_permissions_test.ts " )
. spawn ( )
. unwrap ( )
. wait ( )
. unwrap ( ) ;
assert! ( status . success ( ) ) ;
}
}
2020-10-28 06:03:17 -04:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn rw_relative ( ) {
const PERMISSION_VARIANTS : [ & str ; 2 ] = [ " read " , " write " ] ;
for permission in & PERMISSION_VARIANTS {
let status = util ::deno_cmd ( )
. current_dir ( & util ::tests_path ( ) )
. arg ( " run " )
. arg ( format! ( " --allow- {0} =. " , permission ) )
. arg ( " complex_permissions_test.ts " )
. arg ( permission )
. arg ( " complex_permissions_test.ts " )
. spawn ( )
. unwrap ( )
. wait ( )
. unwrap ( ) ;
assert! ( status . success ( ) ) ;
}
}
2020-02-24 17:49:40 -05:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn rw_no_prefix ( ) {
const PERMISSION_VARIANTS : [ & str ; 2 ] = [ " read " , " write " ] ;
for permission in & PERMISSION_VARIANTS {
let status = util ::deno_cmd ( )
. current_dir ( & util ::tests_path ( ) )
. arg ( " run " )
. arg ( format! ( " --allow- {0} =tls/../ " , permission ) )
. arg ( " complex_permissions_test.ts " )
. arg ( permission )
. arg ( " complex_permissions_test.ts " )
. spawn ( )
. unwrap ( )
. wait ( )
. unwrap ( ) ;
assert! ( status . success ( ) ) ;
}
}
#[ test ]
fn net_fetch_allow_localhost_4545 ( ) {
let ( _ , err ) = util ::run_and_collect_output (
2020-03-07 05:27:16 -05:00
true ,
2021-02-01 13:09:25 -05:00
" run --allow-net=localhost:4545 complex_permissions_test.ts netFetch http://localhost:4545/ " ,
None ,
None ,
true ,
) ;
assert! ( ! err . contains ( util ::PERMISSION_DENIED_PATTERN ) ) ;
}
2020-02-24 17:49:40 -05:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn net_fetch_allow_deno_land ( ) {
let ( _ , err ) = util ::run_and_collect_output (
2020-03-07 05:27:16 -05:00
false ,
2021-02-01 13:09:25 -05:00
" run --allow-net=deno.land complex_permissions_test.ts netFetch http://localhost:4545/ " ,
None ,
None ,
true ,
) ;
assert! ( err . contains ( util ::PERMISSION_DENIED_PATTERN ) ) ;
}
2020-02-24 17:49:40 -05:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn net_fetch_localhost_4545_fail ( ) {
let ( _ , err ) = util ::run_and_collect_output (
2020-03-01 19:51:54 -05:00
false ,
2021-02-01 13:09:25 -05:00
" run --allow-net=localhost:4545 complex_permissions_test.ts netFetch http://localhost:4546/ " ,
None ,
None ,
true ,
) ;
assert! ( err . contains ( util ::PERMISSION_DENIED_PATTERN ) ) ;
}
2020-02-24 17:49:40 -05:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn net_fetch_localhost ( ) {
let ( _ , err ) = util ::run_and_collect_output (
2020-03-07 05:27:16 -05:00
true ,
2021-02-01 13:09:25 -05:00
" run --allow-net=localhost complex_permissions_test.ts netFetch http://localhost:4545/ http://localhost:4546/ http://localhost:4547/ " ,
None ,
None ,
true ,
) ;
assert! ( ! err . contains ( util ::PERMISSION_DENIED_PATTERN ) ) ;
}
2020-02-24 17:49:40 -05:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn net_connect_allow_localhost_ip_4555 ( ) {
let ( _ , err ) = util ::run_and_collect_output (
2020-03-07 05:27:16 -05:00
true ,
2021-02-01 13:09:25 -05:00
" run --allow-net=127.0.0.1:4545 complex_permissions_test.ts netConnect 127.0.0.1:4545 " ,
None ,
None ,
true ,
) ;
assert! ( ! err . contains ( util ::PERMISSION_DENIED_PATTERN ) ) ;
}
2020-02-24 17:49:40 -05:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn net_connect_allow_deno_land ( ) {
let ( _ , err ) = util ::run_and_collect_output (
2020-03-07 05:27:16 -05:00
false ,
2021-02-01 13:09:25 -05:00
" run --allow-net=deno.land complex_permissions_test.ts netConnect 127.0.0.1:4546 " ,
None ,
None ,
true ,
) ;
assert! ( err . contains ( util ::PERMISSION_DENIED_PATTERN ) ) ;
}
2020-02-24 17:49:40 -05:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn net_connect_allow_localhost_ip_4545_fail ( ) {
let ( _ , err ) = util ::run_and_collect_output (
2020-03-01 19:51:54 -05:00
false ,
2021-02-01 13:09:25 -05:00
" run --allow-net=127.0.0.1:4545 complex_permissions_test.ts netConnect 127.0.0.1:4546 " ,
None ,
None ,
true ,
) ;
assert! ( err . contains ( util ::PERMISSION_DENIED_PATTERN ) ) ;
}
2020-02-24 17:49:40 -05:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn net_connect_allow_localhost_ip ( ) {
let ( _ , err ) = util ::run_and_collect_output (
2020-03-07 05:27:16 -05:00
true ,
2021-02-01 13:09:25 -05:00
" run --allow-net=127.0.0.1 complex_permissions_test.ts netConnect 127.0.0.1:4545 127.0.0.1:4546 127.0.0.1:4547 " ,
None ,
None ,
true ,
) ;
assert! ( ! err . contains ( util ::PERMISSION_DENIED_PATTERN ) ) ;
}
2020-02-24 17:49:40 -05:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn net_listen_allow_localhost_4555 ( ) {
let ( _ , err ) = util ::run_and_collect_output (
2020-03-07 05:27:16 -05:00
true ,
2021-02-01 13:09:25 -05:00
" run --allow-net=localhost:4558 complex_permissions_test.ts netListen localhost:4558 " ,
None ,
None ,
false ,
) ;
assert! ( ! err . contains ( util ::PERMISSION_DENIED_PATTERN ) ) ;
}
2019-09-19 14:48:05 -04:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn net_listen_allow_deno_land ( ) {
let ( _ , err ) = util ::run_and_collect_output (
2020-06-19 06:10:31 -04:00
false ,
2021-02-01 13:09:25 -05:00
" run --allow-net=deno.land complex_permissions_test.ts netListen localhost:4545 " ,
None ,
None ,
false ,
) ;
assert! ( err . contains ( util ::PERMISSION_DENIED_PATTERN ) ) ;
}
2020-06-19 06:10:31 -04:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn net_listen_allow_localhost_4555_fail ( ) {
let ( _ , err ) = util ::run_and_collect_output (
false ,
" run --allow-net=localhost:4555 complex_permissions_test.ts netListen localhost:4556 " ,
None ,
None ,
false ,
) ;
assert! ( err . contains ( util ::PERMISSION_DENIED_PATTERN ) ) ;
}
2020-10-14 09:19:13 -04:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn net_listen_allow_localhost ( ) {
// Port 4600 is chosen to not colide with those used by
// target/debug/test_server
let ( _ , err ) = util ::run_and_collect_output (
true ,
" run --allow-net=localhost complex_permissions_test.ts netListen localhost:4600 " ,
None ,
None ,
false ,
) ;
assert! ( ! err . contains ( util ::PERMISSION_DENIED_PATTERN ) ) ;
}
}
2020-09-22 13:33:29 -04:00
2021-02-01 13:09:25 -05:00
mod inspector {
use super ::* ;
2020-09-22 13:33:29 -04:00
2021-02-01 13:09:25 -05:00
fn inspect_flag_with_unique_port ( flag_prefix : & str ) -> String {
use std ::sync ::atomic ::{ AtomicU16 , Ordering } ;
static PORT : AtomicU16 = AtomicU16 ::new ( 9229 ) ;
let port = PORT . fetch_add ( 1 , Ordering ::Relaxed ) ;
format! ( " {} =127.0.0.1: {} " , flag_prefix , port )
}
2020-09-22 13:33:29 -04:00
2021-02-01 13:09:25 -05:00
fn extract_ws_url_from_stderr (
stderr_lines : & mut impl std ::iter ::Iterator < Item = String > ,
) -> url ::Url {
let stderr_first_line = stderr_lines . next ( ) . unwrap ( ) ;
assert! ( stderr_first_line . starts_with ( " Debugger listening on " ) ) ;
let v : Vec < _ > = stderr_first_line . match_indices ( " ws: " ) . collect ( ) ;
assert_eq! ( v . len ( ) , 1 ) ;
let ws_url_index = v [ 0 ] . 0 ;
let ws_url = & stderr_first_line [ ws_url_index .. ] ;
url ::Url ::parse ( ws_url ) . unwrap ( )
}
2020-09-22 13:33:29 -04:00
2021-02-01 13:09:25 -05:00
#[ tokio::test ]
async fn inspector_connect ( ) {
let script = util ::tests_path ( ) . join ( " inspector1.js " ) ;
let mut child = util ::deno_cmd ( )
. arg ( " run " )
. arg ( inspect_flag_with_unique_port ( " --inspect " ) )
. arg ( script )
. stderr ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( ) ;
2020-02-05 17:16:07 -05:00
2021-02-01 13:09:25 -05:00
let stderr = child . stderr . as_mut ( ) . unwrap ( ) ;
let mut stderr_lines =
std ::io ::BufReader ::new ( stderr ) . lines ( ) . map ( | r | r . unwrap ( ) ) ;
let ws_url = extract_ws_url_from_stderr ( & mut stderr_lines ) ;
// We use tokio_tungstenite as a websocket client because warp (which is
// a dependency of Deno) uses it.
let ( _socket , response ) = tokio_tungstenite ::connect_async ( ws_url )
. await
. expect ( " Can't connect " ) ;
assert_eq! ( " 101 Switching Protocols " , response . status ( ) . to_string ( ) ) ;
child . kill ( ) . unwrap ( ) ;
child . wait ( ) . unwrap ( ) ;
}
2020-03-11 16:54:53 -04:00
2021-02-01 13:09:25 -05:00
enum TestStep {
StdOut ( & 'static str ) ,
StdErr ( & 'static str ) ,
WsRecv ( & 'static str ) ,
WsSend ( & 'static str ) ,
}
2020-08-18 16:29:32 -04:00
2021-02-01 13:09:25 -05:00
#[ tokio::test ]
async fn inspector_break_on_first_line ( ) {
let script = util ::tests_path ( ) . join ( " inspector2.js " ) ;
let mut child = util ::deno_cmd ( )
. arg ( " run " )
. arg ( inspect_flag_with_unique_port ( " --inspect-brk " ) )
. arg ( script )
. stdout ( std ::process ::Stdio ::piped ( ) )
. stderr ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( ) ;
2020-08-18 16:29:32 -04:00
2021-02-01 13:09:25 -05:00
let stderr = child . stderr . as_mut ( ) . unwrap ( ) ;
let mut stderr_lines =
std ::io ::BufReader ::new ( stderr ) . lines ( ) . map ( | r | r . unwrap ( ) ) ;
let ws_url = extract_ws_url_from_stderr ( & mut stderr_lines ) ;
let ( socket , response ) = tokio_tungstenite ::connect_async ( ws_url )
. await
. expect ( " Can't connect " ) ;
assert_eq! ( response . status ( ) , 101 ) ; // Switching protocols.
let ( mut socket_tx , socket_rx ) = socket . split ( ) ;
let mut socket_rx =
socket_rx . map ( | msg | msg . unwrap ( ) . to_string ( ) ) . filter ( | msg | {
let pass = ! msg . starts_with ( r # "{"method":"Debugger.scriptParsed","# ) ;
futures ::future ::ready ( pass )
} ) ;
let stdout = child . stdout . as_mut ( ) . unwrap ( ) ;
let mut stdout_lines =
std ::io ::BufReader ::new ( stdout ) . lines ( ) . map ( | r | r . unwrap ( ) ) ;
use TestStep ::* ;
let test_steps = vec! [
WsSend ( r # "{"id":1,"method":"Runtime.enable"}"# ) ,
WsSend ( r # "{"id":2,"method":"Debugger.enable"}"# ) ,
WsRecv (
r # "{"method":"Runtime.executionContextCreated","params":{"context":{"id":1,"# ,
) ,
WsRecv ( r # "{"id":1,"result":{}}"# ) ,
WsRecv ( r # "{"id":2,"result":{"debuggerId":"# ) ,
WsSend ( r # "{"id":3,"method":"Runtime.runIfWaitingForDebugger"}"# ) ,
WsRecv ( r # "{"id":3,"result":{}}"# ) ,
WsRecv ( r # "{"method":"Debugger.paused","# ) ,
WsSend (
r # "{"id":4,"method":"Runtime.evaluate","params":{"expression":"Deno.core.print(\"hello from the inspector\\n\")","contextId":1,"includeCommandLineAPI":true,"silent":false,"returnByValue":true}}"# ,
) ,
WsRecv ( r # "{"id":4,"result":{"result":{"type":"undefined"}}}"# ) ,
StdOut ( " hello from the inspector " ) ,
WsSend ( r # "{"id":5,"method":"Debugger.resume"}"# ) ,
WsRecv ( r # "{"id":5,"result":{}}"# ) ,
StdOut ( " hello from the script " ) ,
] ;
for step in test_steps {
match step {
StdOut ( s ) = > assert_eq! ( & stdout_lines . next ( ) . unwrap ( ) , s ) ,
WsRecv ( s ) = > assert! ( socket_rx . next ( ) . await . unwrap ( ) . starts_with ( s ) ) ,
WsSend ( s ) = > socket_tx . send ( s . into ( ) ) . await . unwrap ( ) ,
_ = > unreachable! ( ) ,
}
}
2020-08-18 16:29:32 -04:00
2021-02-01 13:09:25 -05:00
child . kill ( ) . unwrap ( ) ;
child . wait ( ) . unwrap ( ) ;
}
2020-08-18 16:29:32 -04:00
2021-02-01 13:09:25 -05:00
#[ tokio::test ]
async fn inspector_pause ( ) {
let script = util ::tests_path ( ) . join ( " inspector1.js " ) ;
let mut child = util ::deno_cmd ( )
. arg ( " run " )
. arg ( inspect_flag_with_unique_port ( " --inspect " ) )
. arg ( script )
. stderr ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( ) ;
2020-08-18 16:29:32 -04:00
2021-02-01 13:09:25 -05:00
let stderr = child . stderr . as_mut ( ) . unwrap ( ) ;
let mut stderr_lines =
std ::io ::BufReader ::new ( stderr ) . lines ( ) . map ( | r | r . unwrap ( ) ) ;
let ws_url = extract_ws_url_from_stderr ( & mut stderr_lines ) ;
// We use tokio_tungstenite as a websocket client because warp (which is
// a dependency of Deno) uses it.
let ( mut socket , _ ) = tokio_tungstenite ::connect_async ( ws_url )
. await
. expect ( " Can't connect " ) ;
/// Returns the next websocket message as a string ignoring
/// Debugger.scriptParsed messages.
async fn ws_read_msg (
2021-04-08 12:46:14 -04:00
socket : & mut tokio_tungstenite ::WebSocketStream <
tokio_tungstenite ::MaybeTlsStream < tokio ::net ::TcpStream > ,
> ,
2021-02-01 13:09:25 -05:00
) -> String {
use deno_core ::futures ::stream ::StreamExt ;
while let Some ( msg ) = socket . next ( ) . await {
let msg = msg . unwrap ( ) . to_string ( ) ;
// FIXME(bartlomieju): fails because there's a file loaded
// called 150_errors.js
// assert!(!msg.contains("error"));
if ! msg . contains ( " Debugger.scriptParsed " ) {
return msg ;
}
}
unreachable! ( )
}
2020-08-18 16:29:32 -04:00
2021-02-01 13:09:25 -05:00
socket
. send ( r # "{"id":6,"method":"Debugger.enable"}"# . into ( ) )
. await
. unwrap ( ) ;
2020-09-21 09:07:19 -04:00
2021-02-01 13:09:25 -05:00
let msg = ws_read_msg ( & mut socket ) . await ;
println! ( " response msg 1 {} " , msg ) ;
assert! ( msg . starts_with ( r # "{"id":6,"result":{"debuggerId":"# ) ) ;
2020-10-13 09:31:59 -04:00
2021-02-01 13:09:25 -05:00
socket
. send ( r # "{"id":31,"method":"Debugger.pause"}"# . into ( ) )
. await
. unwrap ( ) ;
2020-10-13 09:31:59 -04:00
2021-02-01 13:09:25 -05:00
let msg = ws_read_msg ( & mut socket ) . await ;
println! ( " response msg 2 {} " , msg ) ;
assert_eq! ( msg , r # "{"id":31,"result":{}}"# ) ;
2021-01-05 18:10:36 -05:00
2021-02-01 13:09:25 -05:00
child . kill ( ) . unwrap ( ) ;
}
2021-01-07 10:50:57 -05:00
2021-02-01 13:09:25 -05:00
#[ tokio::test ]
async fn inspector_port_collision ( ) {
// Skip this test on WSL, which allows multiple processes to listen on the
// same port, rather than making `bind()` fail with `EADDRINUSE`.
if cfg! ( target_os = " linux " )
& & std ::env ::var_os ( " WSL_DISTRO_NAME " ) . is_some ( )
{
return ;
}
2020-07-12 19:18:27 -04:00
2021-02-01 13:09:25 -05:00
let script = util ::tests_path ( ) . join ( " inspector1.js " ) ;
let inspect_flag = inspect_flag_with_unique_port ( " --inspect " ) ;
2020-02-17 11:59:51 -05:00
2021-02-01 13:09:25 -05:00
let mut child1 = util ::deno_cmd ( )
. arg ( " run " )
. arg ( & inspect_flag )
. arg ( script . clone ( ) )
. stderr ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( ) ;
2020-02-17 11:59:51 -05:00
2021-02-01 13:09:25 -05:00
let stderr_1 = child1 . stderr . as_mut ( ) . unwrap ( ) ;
let mut stderr_1_lines = std ::io ::BufReader ::new ( stderr_1 )
. lines ( )
. map ( | r | r . unwrap ( ) ) ;
let _ = extract_ws_url_from_stderr ( & mut stderr_1_lines ) ;
let mut child2 = util ::deno_cmd ( )
. arg ( " run " )
. arg ( & inspect_flag )
. arg ( script )
. stderr ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( ) ;
2020-02-17 11:59:51 -05:00
2021-02-01 13:09:25 -05:00
let stderr_2 = child2 . stderr . as_mut ( ) . unwrap ( ) ;
let stderr_2_error_message = std ::io ::BufReader ::new ( stderr_2 )
. lines ( )
. map ( | r | r . unwrap ( ) )
. inspect ( | line | assert! ( ! line . contains ( " Debugger listening " ) ) )
. find ( | line | line . contains ( " Cannot start inspector server " ) ) ;
assert! ( stderr_2_error_message . is_some ( ) ) ;
child1 . kill ( ) . unwrap ( ) ;
child1 . wait ( ) . unwrap ( ) ;
child2 . wait ( ) . unwrap ( ) ;
}
2020-02-17 11:59:51 -05:00
2021-02-01 13:09:25 -05:00
#[ tokio::test ]
async fn inspector_does_not_hang ( ) {
let script = util ::tests_path ( ) . join ( " inspector3.js " ) ;
let mut child = util ::deno_cmd ( )
. arg ( " run " )
. arg ( inspect_flag_with_unique_port ( " --inspect-brk " ) )
. env ( " NO_COLOR " , " 1 " )
. arg ( script )
. stdout ( std ::process ::Stdio ::piped ( ) )
. stderr ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( ) ;
2020-02-17 11:59:51 -05:00
2021-02-01 13:09:25 -05:00
let stderr = child . stderr . as_mut ( ) . unwrap ( ) ;
let mut stderr_lines =
std ::io ::BufReader ::new ( stderr ) . lines ( ) . map ( | r | r . unwrap ( ) ) ;
let ws_url = extract_ws_url_from_stderr ( & mut stderr_lines ) ;
let ( socket , response ) = tokio_tungstenite ::connect_async ( ws_url )
. await
. expect ( " Can't connect " ) ;
assert_eq! ( response . status ( ) , 101 ) ; // Switching protocols.
let ( mut socket_tx , socket_rx ) = socket . split ( ) ;
let mut socket_rx =
socket_rx . map ( | msg | msg . unwrap ( ) . to_string ( ) ) . filter ( | msg | {
let pass = ! msg . starts_with ( r # "{"method":"Debugger.scriptParsed","# ) ;
futures ::future ::ready ( pass )
} ) ;
let stdout = child . stdout . as_mut ( ) . unwrap ( ) ;
let mut stdout_lines =
std ::io ::BufReader ::new ( stdout ) . lines ( ) . map ( | r | r . unwrap ( ) ) ;
use TestStep ::* ;
let test_steps = vec! [
WsSend ( r # "{"id":1,"method":"Runtime.enable"}"# ) ,
WsSend ( r # "{"id":2,"method":"Debugger.enable"}"# ) ,
WsRecv (
r # "{"method":"Runtime.executionContextCreated","params":{"context":{"id":1,"# ,
) ,
WsRecv ( r # "{"id":1,"result":{}}"# ) ,
WsRecv ( r # "{"id":2,"result":{"debuggerId":"# ) ,
WsSend ( r # "{"id":3,"method":"Runtime.runIfWaitingForDebugger"}"# ) ,
WsRecv ( r # "{"id":3,"result":{}}"# ) ,
WsRecv ( r # "{"method":"Debugger.paused","# ) ,
WsSend ( r # "{"id":4,"method":"Debugger.resume"}"# ) ,
WsRecv ( r # "{"id":4,"result":{}}"# ) ,
WsRecv ( r # "{"method":"Debugger.resumed","params":{}}"# ) ,
] ;
for step in test_steps {
match step {
WsRecv ( s ) = > assert! ( socket_rx . next ( ) . await . unwrap ( ) . starts_with ( s ) ) ,
WsSend ( s ) = > socket_tx . send ( s . into ( ) ) . await . unwrap ( ) ,
_ = > unreachable! ( ) ,
}
}
2020-02-17 11:59:51 -05:00
2021-02-01 13:09:25 -05:00
for i in 0 .. 128 u32 {
let request_id = i + 10 ;
// Expect the number {i} on stdout.
let s = i . to_string ( ) ;
assert_eq! ( stdout_lines . next ( ) . unwrap ( ) , s ) ;
// Expect hitting the `debugger` statement.
let s = r # "{"method":"Debugger.paused","# ;
assert! ( socket_rx . next ( ) . await . unwrap ( ) . starts_with ( s ) ) ;
// Send the 'Debugger.resume' request.
let s =
format! ( r # "{{"id":{},"method":"Debugger.resume"}}"# , request_id ) ;
socket_tx . send ( s . into ( ) ) . await . unwrap ( ) ;
// Expect confirmation of the 'Debugger.resume' request.
let s = format! ( r # "{{"id":{},"result":{{}}}}"# , request_id ) ;
assert_eq! ( socket_rx . next ( ) . await . unwrap ( ) , s ) ;
let s = r # "{"method":"Debugger.resumed","params":{}}"# ;
assert_eq! ( socket_rx . next ( ) . await . unwrap ( ) , s ) ;
}
2020-02-17 11:59:51 -05:00
2021-02-01 13:09:25 -05:00
// Check that we can gracefully close the websocket connection.
socket_tx . close ( ) . await . unwrap ( ) ;
socket_rx . for_each ( | _ | async { } ) . await ;
2020-02-25 15:36:35 -05:00
2021-02-01 13:09:25 -05:00
assert_eq! ( & stdout_lines . next ( ) . unwrap ( ) , " done " ) ;
assert! ( child . wait ( ) . unwrap ( ) . success ( ) ) ;
}
2020-02-25 15:36:35 -05:00
2021-02-01 13:09:25 -05:00
#[ tokio::test ]
async fn inspector_without_brk_runs_code ( ) {
let script = util ::tests_path ( ) . join ( " inspector4.js " ) ;
let mut child = util ::deno_cmd ( )
. arg ( " run " )
. arg ( inspect_flag_with_unique_port ( " --inspect " ) )
. arg ( script )
. stdout ( std ::process ::Stdio ::piped ( ) )
. stderr ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( ) ;
2020-03-01 19:51:54 -05:00
2021-02-01 13:09:25 -05:00
let stderr = child . stderr . as_mut ( ) . unwrap ( ) ;
let mut stderr_lines =
std ::io ::BufReader ::new ( stderr ) . lines ( ) . map ( | r | r . unwrap ( ) ) ;
let _ = extract_ws_url_from_stderr ( & mut stderr_lines ) ;
// Check that inspector actually runs code without waiting for inspector
// connection.
let stdout = child . stdout . as_mut ( ) . unwrap ( ) ;
let mut stdout_lines =
std ::io ::BufReader ::new ( stdout ) . lines ( ) . map ( | r | r . unwrap ( ) ) ;
let stdout_first_line = stdout_lines . next ( ) . unwrap ( ) ;
assert_eq! ( stdout_first_line , " hello " ) ;
child . kill ( ) . unwrap ( ) ;
child . wait ( ) . unwrap ( ) ;
}
2021-01-05 06:07:27 -05:00
2021-02-01 13:09:25 -05:00
#[ tokio::test ]
async fn inspector_runtime_evaluate_does_not_crash ( ) {
let mut child = util ::deno_cmd ( )
. arg ( " repl " )
. arg ( inspect_flag_with_unique_port ( " --inspect " ) )
. stdin ( std ::process ::Stdio ::piped ( ) )
. stdout ( std ::process ::Stdio ::piped ( ) )
. stderr ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( ) ;
2021-01-07 21:08:51 -05:00
2021-02-01 13:09:25 -05:00
let stderr = child . stderr . as_mut ( ) . unwrap ( ) ;
let mut stderr_lines = std ::io ::BufReader ::new ( stderr )
. lines ( )
. map ( | r | r . unwrap ( ) )
. filter ( | s | s . as_str ( ) ! = " Debugger session started. " ) ;
let ws_url = extract_ws_url_from_stderr ( & mut stderr_lines ) ;
let ( socket , response ) = tokio_tungstenite ::connect_async ( ws_url )
. await
. expect ( " Can't connect " ) ;
assert_eq! ( response . status ( ) , 101 ) ; // Switching protocols.
let ( mut socket_tx , socket_rx ) = socket . split ( ) ;
let mut socket_rx =
socket_rx . map ( | msg | msg . unwrap ( ) . to_string ( ) ) . filter ( | msg | {
let pass = ! msg . starts_with ( r # "{"method":"Debugger.scriptParsed","# ) ;
futures ::future ::ready ( pass )
} ) ;
let stdin = child . stdin . take ( ) . unwrap ( ) ;
let stdout = child . stdout . as_mut ( ) . unwrap ( ) ;
let mut stdout_lines = std ::io ::BufReader ::new ( stdout )
. lines ( )
. map ( | r | r . unwrap ( ) )
. filter ( | s | ! s . starts_with ( " Deno " ) ) ;
use TestStep ::* ;
let test_steps = vec! [
WsSend ( r # "{"id":1,"method":"Runtime.enable"}"# ) ,
WsSend ( r # "{"id":2,"method":"Debugger.enable"}"# ) ,
WsRecv (
r # "{"method":"Runtime.executionContextCreated","params":{"context":{"id":1,"# ,
) ,
WsRecv ( r # "{"id":1,"result":{}}"# ) ,
WsRecv ( r # "{"id":2,"result":{"debuggerId":"# ) ,
WsSend ( r # "{"id":3,"method":"Runtime.runIfWaitingForDebugger"}"# ) ,
WsRecv ( r # "{"id":3,"result":{}}"# ) ,
StdOut ( " exit using ctrl+d or close() " ) ,
WsSend (
r # "{"id":4,"method":"Runtime.compileScript","params":{"expression":"Deno.cwd()","sourceURL":"","persistScript":false,"executionContextId":1}}"# ,
) ,
WsRecv ( r # "{"id":4,"result":{}}"# ) ,
WsSend (
r # "{"id":5,"method":"Runtime.evaluate","params":{"expression":"Deno.cwd()","objectGroup":"console","includeCommandLineAPI":true,"silent":false,"contextId":1,"returnByValue":true,"generatePreview":true,"userGesture":true,"awaitPromise":false,"replMode":true}}"# ,
) ,
WsRecv ( r # "{"id":5,"result":{"result":{"type":"string","value":""# ) ,
WsSend (
r # "{"id":6,"method":"Runtime.evaluate","params":{"expression":"console.error('done');","objectGroup":"console","includeCommandLineAPI":true,"silent":false,"contextId":1,"returnByValue":true,"generatePreview":true,"userGesture":true,"awaitPromise":false,"replMode":true}}"# ,
) ,
WsRecv ( r # "{"id":6,"result":{"result":{"type":"undefined"}}}"# ) ,
StdErr ( " done " ) ,
] ;
for step in test_steps {
match step {
StdOut ( s ) = > assert_eq! ( & stdout_lines . next ( ) . unwrap ( ) , s ) ,
StdErr ( s ) = > assert_eq! ( & stderr_lines . next ( ) . unwrap ( ) , s ) ,
WsRecv ( s ) = > assert! ( socket_rx . next ( ) . await . unwrap ( ) . starts_with ( s ) ) ,
WsSend ( s ) = > socket_tx . send ( s . into ( ) ) . await . unwrap ( ) ,
}
}
2021-01-19 09:39:04 -05:00
2021-02-01 13:09:25 -05:00
drop ( stdin ) ;
child . wait ( ) . unwrap ( ) ;
}
2021-01-19 09:39:04 -05:00
2021-02-01 13:09:25 -05:00
#[ tokio::test ]
async fn inspector_json ( ) {
let script = util ::tests_path ( ) . join ( " inspector1.js " ) ;
let mut child = util ::deno_cmd ( )
. arg ( " run " )
. arg ( inspect_flag_with_unique_port ( " --inspect " ) )
. arg ( script )
. stderr ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( ) ;
2021-01-19 09:39:04 -05:00
2021-02-01 13:09:25 -05:00
let stderr = child . stderr . as_mut ( ) . unwrap ( ) ;
let mut stderr_lines =
std ::io ::BufReader ::new ( stderr ) . lines ( ) . map ( | r | r . unwrap ( ) ) ;
let ws_url = extract_ws_url_from_stderr ( & mut stderr_lines ) ;
let mut url = ws_url . clone ( ) ;
let _ = url . set_scheme ( " http " ) ;
url . set_path ( " /json " ) ;
let resp = reqwest ::get ( url ) . await . unwrap ( ) ;
assert_eq! ( resp . status ( ) , reqwest ::StatusCode ::OK ) ;
let endpoint_list : Vec < deno_core ::serde_json ::Value > =
serde_json ::from_str ( & resp . text ( ) . await . unwrap ( ) ) . unwrap ( ) ;
let matching_endpoint = endpoint_list
. iter ( )
. find ( | e | e [ " webSocketDebuggerUrl " ] = = ws_url . as_str ( ) ) ;
assert! ( matching_endpoint . is_some ( ) ) ;
child . kill ( ) . unwrap ( ) ;
}
2021-01-19 09:39:04 -05:00
2021-02-01 13:09:25 -05:00
#[ tokio::test ]
async fn inspector_json_list ( ) {
let script = util ::tests_path ( ) . join ( " inspector1.js " ) ;
let mut child = util ::deno_cmd ( )
. arg ( " run " )
. arg ( inspect_flag_with_unique_port ( " --inspect " ) )
. arg ( script )
. stderr ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( ) ;
2021-01-19 09:39:04 -05:00
2021-02-01 13:09:25 -05:00
let stderr = child . stderr . as_mut ( ) . unwrap ( ) ;
let mut stderr_lines =
std ::io ::BufReader ::new ( stderr ) . lines ( ) . map ( | r | r . unwrap ( ) ) ;
let ws_url = extract_ws_url_from_stderr ( & mut stderr_lines ) ;
let mut url = ws_url . clone ( ) ;
let _ = url . set_scheme ( " http " ) ;
url . set_path ( " /json/list " ) ;
let resp = reqwest ::get ( url ) . await . unwrap ( ) ;
assert_eq! ( resp . status ( ) , reqwest ::StatusCode ::OK ) ;
let endpoint_list : Vec < deno_core ::serde_json ::Value > =
serde_json ::from_str ( & resp . text ( ) . await . unwrap ( ) ) . unwrap ( ) ;
let matching_endpoint = endpoint_list
. iter ( )
. find ( | e | e [ " webSocketDebuggerUrl " ] = = ws_url . as_str ( ) ) ;
assert! ( matching_endpoint . is_some ( ) ) ;
child . kill ( ) . unwrap ( ) ;
}
}
2021-01-19 09:39:04 -05:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn websocket ( ) {
let _g = util ::http_server ( ) ;
let script = util ::tests_path ( ) . join ( " websocket_test.ts " ) ;
let root_ca = util ::tests_path ( ) . join ( " tls/RootCA.pem " ) ;
let status = util ::deno_cmd ( )
. arg ( " test " )
. arg ( " --unstable " )
. arg ( " --allow-net " )
. arg ( " --cert " )
. arg ( root_ca )
. arg ( script )
. spawn ( )
. unwrap ( )
. wait ( )
. unwrap ( ) ;
2021-01-19 09:39:04 -05:00
2021-02-01 13:09:25 -05:00
assert! ( status . success ( ) ) ;
}
2021-01-19 09:39:04 -05:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn exec_path ( ) {
let output = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " run " )
. arg ( " --allow-read " )
. arg ( " cli/tests/exec_path.ts " )
. stdout ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
assert! ( output . status . success ( ) ) ;
let stdout_str = std ::str ::from_utf8 ( & output . stdout ) . unwrap ( ) . trim ( ) ;
let actual =
std ::fs ::canonicalize ( & std ::path ::Path ::new ( stdout_str ) ) . unwrap ( ) ;
let expected = std ::fs ::canonicalize ( util ::deno_exe_path ( ) ) . unwrap ( ) ;
assert_eq! ( expected , actual ) ;
}
2021-01-19 09:39:04 -05:00
2021-02-01 13:09:25 -05:00
#[ cfg(not(windows)) ]
#[ test ]
fn set_raw_should_not_panic_on_no_tty ( ) {
let output = util ::deno_cmd ( )
. arg ( " eval " )
. arg ( " --unstable " )
. arg ( " Deno.setRaw(Deno.stdin.rid, true) " )
// stdin set to piped so it certainly does not refer to TTY
. stdin ( std ::process ::Stdio ::piped ( ) )
// stderr is piped so we can capture output.
. stderr ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
assert! ( ! output . status . success ( ) ) ;
let stderr = std ::str ::from_utf8 ( & output . stderr ) . unwrap ( ) . trim ( ) ;
assert! ( stderr . contains ( " BadResource " ) ) ;
}
2021-04-21 11:52:00 -04:00
#[ cfg(not(windows)) ]
#[ test ]
fn should_not_panic_on_not_found_cwd ( ) {
let output = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " run " )
. arg ( " --allow-write " )
. arg ( " --allow-read " )
. arg ( " cli/tests/dont_panic_not_found_cwd.ts " )
. stderr ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
assert! ( ! output . status . success ( ) ) ;
let stderr = std ::str ::from_utf8 ( & output . stderr ) . unwrap ( ) . trim ( ) ;
assert! ( stderr . contains ( " Failed to get current working directory " ) ) ;
}
2021-02-01 13:09:25 -05:00
#[ cfg(windows) ]
// Clippy suggests to remove the `NoStd` prefix from all variants. I disagree.
#[ allow(clippy::enum_variant_names) ]
enum WinProcConstraints {
NoStdIn ,
NoStdOut ,
NoStdErr ,
}
#[ cfg(windows) ]
fn run_deno_script_constrained (
script_path : std ::path ::PathBuf ,
constraints : WinProcConstraints ,
) -> Result < ( ) , i64 > {
let file_path = " cli/tests/DenoWinRunner.ps1 " ;
let constraints = match constraints {
WinProcConstraints ::NoStdIn = > " 1 " ,
WinProcConstraints ::NoStdOut = > " 2 " ,
WinProcConstraints ::NoStdErr = > " 4 " ,
2021-01-19 09:39:04 -05:00
} ;
2021-02-01 13:09:25 -05:00
let deno_exe_path = util ::deno_exe_path ( )
. into_os_string ( )
. into_string ( )
. unwrap ( ) ;
let deno_script_path = script_path . into_os_string ( ) . into_string ( ) . unwrap ( ) ;
let args = vec! [ & deno_exe_path [ .. ] , & deno_script_path [ .. ] , constraints ] ;
util ::run_powershell_script_file ( file_path , args )
}
#[ cfg(windows) ]
#[ test ]
fn should_not_panic_on_no_stdin ( ) {
let output = run_deno_script_constrained (
util ::tests_path ( ) . join ( " echo.ts " ) ,
WinProcConstraints ::NoStdIn ,
) ;
output . unwrap ( ) ;
}
2021-01-19 09:39:04 -05:00
2021-02-01 13:09:25 -05:00
#[ cfg(windows) ]
#[ test ]
fn should_not_panic_on_no_stdout ( ) {
let output = run_deno_script_constrained (
util ::tests_path ( ) . join ( " echo.ts " ) ,
WinProcConstraints ::NoStdOut ,
) ;
output . unwrap ( ) ;
}
2021-01-19 09:39:04 -05:00
2021-02-01 13:09:25 -05:00
#[ cfg(windows) ]
#[ test ]
fn should_not_panic_on_no_stderr ( ) {
let output = run_deno_script_constrained (
util ::tests_path ( ) . join ( " echo.ts " ) ,
WinProcConstraints ::NoStdErr ,
) ;
output . unwrap ( ) ;
}
2021-01-19 09:39:04 -05:00
2021-02-01 13:09:25 -05:00
#[ cfg(not(windows)) ]
#[ test ]
fn should_not_panic_on_undefined_home_environment_variable ( ) {
let output = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " run " )
. arg ( " cli/tests/echo.ts " )
. env_remove ( " HOME " )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
assert! ( output . status . success ( ) ) ;
2021-01-19 09:39:04 -05:00
}
2021-02-01 13:09:25 -05:00
#[ test ]
fn should_not_panic_on_undefined_deno_dir_environment_variable ( ) {
let output = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " run " )
. arg ( " cli/tests/echo.ts " )
. env_remove ( " DENO_DIR " )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
assert! ( output . status . success ( ) ) ;
}
2021-01-19 09:39:04 -05:00
2021-02-01 13:09:25 -05:00
#[ cfg(not(windows)) ]
#[ test ]
fn should_not_panic_on_undefined_deno_dir_and_home_environment_variables ( ) {
let output = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " run " )
. arg ( " cli/tests/echo.ts " )
. env_remove ( " DENO_DIR " )
. env_remove ( " HOME " )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
assert! ( output . status . success ( ) ) ;
}
2021-01-19 09:39:04 -05:00
2021-02-01 13:09:25 -05:00
#[ test ]
fn rust_log ( ) {
// Without RUST_LOG the stderr is empty.
2021-01-19 09:39:04 -05:00
let output = util ::deno_cmd ( )
2021-02-01 13:09:25 -05:00
. current_dir ( util ::root_path ( ) )
2021-01-19 09:39:04 -05:00
. arg ( " run " )
2021-02-01 13:09:25 -05:00
. arg ( " cli/tests/001_hello.js " )
. stderr ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
assert! ( output . status . success ( ) ) ;
assert! ( output . stderr . is_empty ( ) ) ;
// With RUST_LOG the stderr is not empty.
let output = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " run " )
. arg ( " cli/tests/001_hello.js " )
. env ( " RUST_LOG " , " debug " )
. stderr ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
assert! ( output . status . success ( ) ) ;
assert! ( ! output . stderr . is_empty ( ) ) ;
}
#[ test ]
fn fmt_ignore_unexplicit_files ( ) {
let output = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
2021-02-19 07:18:16 -05:00
. env ( " NO_COLOR " , " 1 " )
2021-02-01 13:09:25 -05:00
. arg ( " fmt " )
. arg ( " --check " )
. arg ( " --ignore=./ " )
. stderr ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
2021-02-19 07:18:16 -05:00
assert! ( ! output . status . success ( ) ) ;
assert_eq! (
String ::from_utf8_lossy ( & output . stderr ) ,
" error: No target files found. \n "
) ;
2021-01-19 09:39:04 -05:00
}
2021-02-01 13:09:25 -05:00
#[ test ]
fn compile ( ) {
let dir = TempDir ::new ( ) . expect ( " tempdir fail " ) ;
let exe = if cfg! ( windows ) {
dir . path ( ) . join ( " welcome.exe " )
} else {
dir . path ( ) . join ( " welcome " )
} ;
2021-01-19 09:39:04 -05:00
let output = util ::deno_cmd ( )
2021-02-01 13:09:25 -05:00
. current_dir ( util ::root_path ( ) )
. arg ( " compile " )
2021-01-19 09:39:04 -05:00
. arg ( " --unstable " )
2021-02-01 13:09:25 -05:00
. arg ( " --output " )
. arg ( & exe )
2021-02-02 06:05:46 -05:00
. arg ( " ./test_util/std/examples/welcome.ts " )
2021-02-01 13:09:25 -05:00
. stdout ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
assert! ( output . status . success ( ) ) ;
let output = Command ::new ( exe )
2021-01-19 09:39:04 -05:00
. stdout ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
assert! ( output . status . success ( ) ) ;
2021-02-01 13:09:25 -05:00
assert_eq! ( output . stdout , " Welcome to Deno! \n " . as_bytes ( ) ) ;
}
2021-01-19 09:39:04 -05:00
2021-05-11 20:06:07 -04:00
#[ ignore ]
2021-03-07 08:20:01 -05:00
#[ test ]
#[ cfg(windows) ]
// https://github.com/denoland/deno/issues/9667
fn compile_windows_ext ( ) {
let dir = TempDir ::new ( ) . expect ( " tempdir fail " ) ;
let exe = dir . path ( ) . join ( " welcome_9667 " ) ;
let output = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " compile " )
. arg ( " --unstable " )
. arg ( " --output " )
. arg ( & exe )
. arg ( " --target " )
. arg ( " x86_64-unknown-linux-gnu " )
. arg ( " ./test_util/std/examples/welcome.ts " )
2021-05-05 04:42:45 -04:00
// TODO(kt3k): Prints command output to the test log for debugging purpose.
// Uncomment this line when this test become stable.
//.stdout(std::process::Stdio::piped())
2021-03-07 08:20:01 -05:00
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
assert! ( output . status . success ( ) ) ;
2021-04-26 10:10:57 -04:00
assert! ( std ::path ::Path ::new ( & exe ) . exists ( ) ) ;
2021-03-07 08:20:01 -05:00
}
2021-02-01 13:09:25 -05:00
#[ test ]
fn standalone_args ( ) {
let dir = TempDir ::new ( ) . expect ( " tempdir fail " ) ;
let exe = if cfg! ( windows ) {
dir . path ( ) . join ( " args.exe " )
} else {
dir . path ( ) . join ( " args " )
} ;
let output = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " compile " )
. arg ( " --unstable " )
. arg ( " --output " )
. arg ( & exe )
. arg ( " ./cli/tests/028_args.ts " )
. arg ( " a " )
. arg ( " b " )
. stdout ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
assert! ( output . status . success ( ) ) ;
let output = Command ::new ( exe )
. arg ( " foo " )
. arg ( " --bar " )
. arg ( " --unstable " )
. stdout ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
assert! ( output . status . success ( ) ) ;
assert_eq! ( output . stdout , b " a \n b \n foo \n --bar \n --unstable \n " ) ;
2021-01-19 09:39:04 -05:00
}
2021-02-01 13:09:25 -05:00
#[ test ]
fn standalone_error ( ) {
let dir = TempDir ::new ( ) . expect ( " tempdir fail " ) ;
let exe = if cfg! ( windows ) {
dir . path ( ) . join ( " error.exe " )
} else {
dir . path ( ) . join ( " error " )
} ;
2021-01-19 09:39:04 -05:00
let output = util ::deno_cmd ( )
2021-02-01 13:09:25 -05:00
. current_dir ( util ::root_path ( ) )
. arg ( " compile " )
. arg ( " --unstable " )
. arg ( " --output " )
. arg ( & exe )
. arg ( " ./cli/tests/standalone_error.ts " )
. stdout ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
assert! ( output . status . success ( ) ) ;
let output = Command ::new ( exe )
2021-01-19 09:39:04 -05:00
. env ( " NO_COLOR " , " 1 " )
2021-02-01 13:09:25 -05:00
. stdout ( std ::process ::Stdio ::piped ( ) )
. stderr ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
assert! ( ! output . status . success ( ) ) ;
assert_eq! ( output . stdout , b " " ) ;
let expected_stderr = " error: Error: boom! \n at boom (file://$deno$/bundle.js:2:11) \n at foo (file://$deno$/bundle.js:5:5) \n at file://$deno$/bundle.js:7:1 \n " ;
let stderr = String ::from_utf8 ( output . stderr ) . unwrap ( ) ;
assert_eq! ( stderr , expected_stderr ) ;
}
#[ test ]
fn standalone_no_module_load ( ) {
let dir = TempDir ::new ( ) . expect ( " tempdir fail " ) ;
let exe = if cfg! ( windows ) {
dir . path ( ) . join ( " hello.exe " )
} else {
dir . path ( ) . join ( " hello " )
} ;
let output = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " compile " )
2021-01-19 09:39:04 -05:00
. arg ( " --unstable " )
2021-02-01 13:09:25 -05:00
. arg ( " --output " )
. arg ( & exe )
. arg ( " ./cli/tests/standalone_import.ts " )
. stdout ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
assert! ( output . status . success ( ) ) ;
let output = Command ::new ( exe )
2021-01-19 09:39:04 -05:00
. stdout ( std ::process ::Stdio ::piped ( ) )
. stderr ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
assert! ( ! output . status . success ( ) ) ;
2021-02-01 13:09:25 -05:00
assert_eq! ( output . stdout , b " start \n " ) ;
let stderr_str = String ::from_utf8 ( output . stderr ) . unwrap ( ) ;
assert! ( util ::strip_ansi_codes ( & stderr_str )
. contains ( " Self-contained binaries don't support module loading " ) ) ;
2021-01-19 09:39:04 -05:00
}
2021-02-01 13:09:25 -05:00
#[ test ]
fn compile_with_directory_exists_error ( ) {
let dir = TempDir ::new ( ) . expect ( " tempdir fail " ) ;
let exe = if cfg! ( windows ) {
dir . path ( ) . join ( " args.exe " )
} else {
dir . path ( ) . join ( " args " )
} ;
std ::fs ::create_dir ( & exe ) . expect ( " cannot create directory " ) ;
2021-01-19 09:39:04 -05:00
let output = util ::deno_cmd ( )
2021-02-01 13:09:25 -05:00
. current_dir ( util ::root_path ( ) )
. arg ( " compile " )
. arg ( " --unstable " )
. arg ( " --output " )
. arg ( & exe )
. arg ( " ./cli/tests/028_args.ts " )
. stderr ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
assert! ( ! output . status . success ( ) ) ;
let expected_stderr =
format! ( " Could not compile: {:?} is a directory. \n " , & exe ) ;
let stderr = String ::from_utf8 ( output . stderr ) . unwrap ( ) ;
assert! ( stderr . contains ( & expected_stderr ) ) ;
}
#[ test ]
fn compile_with_conflict_file_exists_error ( ) {
let dir = TempDir ::new ( ) . expect ( " tempdir fail " ) ;
let exe = if cfg! ( windows ) {
dir . path ( ) . join ( " args.exe " )
} else {
dir . path ( ) . join ( " args " )
} ;
std ::fs ::write ( & exe , b " SHOULD NOT BE OVERWRITTEN " )
. expect ( " cannot create file " ) ;
let output = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " compile " )
. arg ( " --unstable " )
. arg ( " --output " )
. arg ( & exe )
. arg ( " ./cli/tests/028_args.ts " )
. stderr ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
assert! ( ! output . status . success ( ) ) ;
let expected_stderr =
format! ( " Could not compile: cannot overwrite {:?} . \n " , & exe ) ;
let stderr = String ::from_utf8 ( output . stderr ) . unwrap ( ) ;
dbg! ( & stderr ) ;
assert! ( stderr . contains ( & expected_stderr ) ) ;
assert! ( std ::fs ::read ( & exe )
. expect ( " cannot read file " )
. eq ( b " SHOULD NOT BE OVERWRITTEN " ) ) ;
}
#[ test ]
fn compile_and_overwrite_file ( ) {
let dir = TempDir ::new ( ) . expect ( " tempdir fail " ) ;
let exe = if cfg! ( windows ) {
dir . path ( ) . join ( " args.exe " )
} else {
dir . path ( ) . join ( " args " )
} ;
let output = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " compile " )
. arg ( " --unstable " )
. arg ( " --output " )
. arg ( & exe )
. arg ( " ./cli/tests/028_args.ts " )
. stderr ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
assert! ( output . status . success ( ) ) ;
assert! ( & exe . exists ( ) ) ;
let recompile_output = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " compile " )
. arg ( " --unstable " )
. arg ( " --output " )
. arg ( & exe )
. arg ( " ./cli/tests/028_args.ts " )
. stderr ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
assert! ( recompile_output . status . success ( ) ) ;
}
#[ test ]
fn standalone_runtime_flags ( ) {
let dir = TempDir ::new ( ) . expect ( " tempdir fail " ) ;
let exe = if cfg! ( windows ) {
dir . path ( ) . join ( " flags.exe " )
} else {
dir . path ( ) . join ( " flags " )
} ;
let output = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " compile " )
2021-01-19 09:39:04 -05:00
. arg ( " --unstable " )
2021-02-01 13:09:25 -05:00
. arg ( " --allow-read " )
. arg ( " --seed " )
. arg ( " 1 " )
. arg ( " --output " )
. arg ( & exe )
. arg ( " ./cli/tests/standalone_runtime_flags.ts " )
. stdout ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
assert! ( output . status . success ( ) ) ;
let output = Command ::new ( exe )
2021-01-19 09:39:04 -05:00
. stdout ( std ::process ::Stdio ::piped ( ) )
. stderr ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
assert! ( ! output . status . success ( ) ) ;
2021-02-01 13:09:25 -05:00
let stdout_str = String ::from_utf8 ( output . stdout ) . unwrap ( ) ;
assert_eq! ( util ::strip_ansi_codes ( & stdout_str ) , " 0.147205063401058 \n " ) ;
let stderr_str = String ::from_utf8 ( output . stderr ) . unwrap ( ) ;
assert! ( util ::strip_ansi_codes ( & stderr_str )
2021-03-17 17:45:12 -04:00
. contains ( " PermissionDenied: Requires write access " ) ) ;
2021-02-01 13:09:25 -05:00
}
#[ tokio::test(flavor = " multi_thread " , worker_threads = 2) ]
async fn test_resolve_dns ( ) {
use std ::collections ::BTreeMap ;
use std ::net ::Ipv4Addr ;
use std ::net ::Ipv6Addr ;
use std ::net ::SocketAddr ;
use std ::str ::FromStr ;
use std ::sync ::Arc ;
use std ::sync ::RwLock ;
use std ::time ::Duration ;
use tokio ::net ::TcpListener ;
use tokio ::net ::UdpSocket ;
use tokio ::sync ::oneshot ;
use trust_dns_client ::rr ::LowerName ;
use trust_dns_client ::rr ::RecordType ;
use trust_dns_client ::rr ::RrKey ;
use trust_dns_server ::authority ::Catalog ;
use trust_dns_server ::authority ::ZoneType ;
use trust_dns_server ::proto ::rr ::rdata ::mx ::MX ;
use trust_dns_server ::proto ::rr ::rdata ::soa ::SOA ;
use trust_dns_server ::proto ::rr ::rdata ::srv ::SRV ;
use trust_dns_server ::proto ::rr ::rdata ::txt ::TXT ;
use trust_dns_server ::proto ::rr ::record_data ::RData ;
use trust_dns_server ::proto ::rr ::resource ::Record ;
use trust_dns_server ::proto ::rr ::Name ;
use trust_dns_server ::proto ::rr ::RecordSet ;
use trust_dns_server ::store ::in_memory ::InMemoryAuthority ;
use trust_dns_server ::ServerFuture ;
const DNS_PORT : u16 = 4553 ;
// Setup DNS server for testing
async fn run_dns_server ( tx : oneshot ::Sender < ( ) > ) {
let catalog = {
let records = {
let mut map = BTreeMap ::new ( ) ;
let lookup_name = " www.example.com " . parse ::< Name > ( ) . unwrap ( ) ;
let lookup_name_lower = LowerName ::new ( & lookup_name ) ;
// Inserts SOA record
let soa = SOA ::new (
Name ::from_str ( " net " ) . unwrap ( ) ,
Name ::from_str ( " example " ) . unwrap ( ) ,
0 ,
i32 ::MAX ,
i32 ::MAX ,
i32 ::MAX ,
0 ,
) ;
let rdata = RData ::SOA ( soa ) ;
let record = Record ::from_rdata ( Name ::new ( ) , u32 ::MAX , rdata ) ;
let record_set = RecordSet ::from ( record ) ;
map . insert (
RrKey ::new ( Name ::root ( ) . into ( ) , RecordType ::SOA ) ,
record_set ,
) ;
// Inserts A record
let rdata = RData ::A ( Ipv4Addr ::new ( 1 , 2 , 3 , 4 ) ) ;
let record = Record ::from_rdata ( lookup_name . clone ( ) , u32 ::MAX , rdata ) ;
let record_set = RecordSet ::from ( record ) ;
map . insert (
RrKey ::new ( lookup_name_lower . clone ( ) , RecordType ::A ) ,
record_set ,
) ;
// Inserts AAAA record
let rdata = RData ::AAAA ( Ipv6Addr ::new ( 1 , 2 , 3 , 4 , 5 , 6 , 7 , 8 ) ) ;
let record = Record ::from_rdata ( lookup_name . clone ( ) , u32 ::MAX , rdata ) ;
let record_set = RecordSet ::from ( record ) ;
map . insert (
RrKey ::new ( lookup_name_lower . clone ( ) , RecordType ::AAAA ) ,
record_set ,
) ;
// Inserts ANAME record
let rdata = RData ::ANAME ( Name ::from_str ( " aname.com " ) . unwrap ( ) ) ;
let record = Record ::from_rdata ( lookup_name . clone ( ) , u32 ::MAX , rdata ) ;
let record_set = RecordSet ::from ( record ) ;
map . insert (
RrKey ::new ( lookup_name_lower . clone ( ) , RecordType ::ANAME ) ,
record_set ,
) ;
// Inserts CNAME record
let rdata = RData ::CNAME ( Name ::from_str ( " cname.com " ) . unwrap ( ) ) ;
let record =
Record ::from_rdata ( Name ::from_str ( " foo " ) . unwrap ( ) , u32 ::MAX , rdata ) ;
let record_set = RecordSet ::from ( record ) ;
map . insert (
RrKey ::new ( lookup_name_lower . clone ( ) , RecordType ::CNAME ) ,
record_set ,
) ;
// Inserts MX record
let rdata = RData ::MX ( MX ::new ( 0 , Name ::from_str ( " mx.com " ) . unwrap ( ) ) ) ;
let record = Record ::from_rdata ( lookup_name . clone ( ) , u32 ::MAX , rdata ) ;
let record_set = RecordSet ::from ( record ) ;
map . insert (
RrKey ::new ( lookup_name_lower . clone ( ) , RecordType ::MX ) ,
record_set ,
) ;
// Inserts PTR record
let rdata = RData ::PTR ( Name ::from_str ( " ptr.com " ) . unwrap ( ) ) ;
let record = Record ::from_rdata (
Name ::from_str ( " 5.6.7.8 " ) . unwrap ( ) ,
u32 ::MAX ,
rdata ,
) ;
let record_set = RecordSet ::from ( record ) ;
map . insert (
RrKey ::new ( " 5.6.7.8 " . parse ( ) . unwrap ( ) , RecordType ::PTR ) ,
record_set ,
) ;
// Inserts SRV record
let rdata = RData ::SRV ( SRV ::new (
0 ,
100 ,
1234 ,
Name ::from_str ( " srv.com " ) . unwrap ( ) ,
) ) ;
let record = Record ::from_rdata (
Name ::from_str ( " _Service._TCP.example.com " ) . unwrap ( ) ,
u32 ::MAX ,
rdata ,
) ;
let record_set = RecordSet ::from ( record ) ;
map . insert (
RrKey ::new ( lookup_name_lower . clone ( ) , RecordType ::SRV ) ,
record_set ,
) ;
// Inserts TXT record
let rdata =
RData ::TXT ( TXT ::new ( vec! [ " foo " . to_string ( ) , " bar " . to_string ( ) ] ) ) ;
let record = Record ::from_rdata ( lookup_name , u32 ::MAX , rdata ) ;
let record_set = RecordSet ::from ( record ) ;
map
. insert ( RrKey ::new ( lookup_name_lower , RecordType ::TXT ) , record_set ) ;
map
} ;
let authority = Box ::new ( Arc ::new ( RwLock ::new (
InMemoryAuthority ::new (
Name ::from_str ( " com " ) . unwrap ( ) ,
records ,
ZoneType ::Primary ,
false ,
)
. unwrap ( ) ,
) ) ) ;
let mut c = Catalog ::new ( ) ;
c . upsert ( Name ::root ( ) . into ( ) , authority ) ;
c
} ;
let mut server_fut = ServerFuture ::new ( catalog ) ;
let socket_addr = SocketAddr ::from ( ( [ 127 , 0 , 0 , 1 ] , DNS_PORT ) ) ;
let tcp_listener = TcpListener ::bind ( socket_addr ) . await . unwrap ( ) ;
let udp_socket = UdpSocket ::bind ( socket_addr ) . await . unwrap ( ) ;
server_fut . register_socket ( udp_socket ) ;
server_fut . register_listener ( tcp_listener , Duration ::from_secs ( 2 ) ) ;
// Notifies that the DNS server is ready
tx . send ( ( ) ) . unwrap ( ) ;
server_fut . block_until_done ( ) . await . unwrap ( ) ;
}
let ( ready_tx , ready_rx ) = oneshot ::channel ( ) ;
let dns_server_fut = run_dns_server ( ready_tx ) ;
let handle = tokio ::spawn ( dns_server_fut ) ;
// Waits for the DNS server to be ready
ready_rx . await . unwrap ( ) ;
// Pass: `--allow-net`
{
let output = util ::deno_cmd ( )
. current_dir ( util ::tests_path ( ) )
. env ( " NO_COLOR " , " 1 " )
. arg ( " run " )
. arg ( " --allow-net " )
. arg ( " --unstable " )
. arg ( " resolve_dns.ts " )
. stdout ( std ::process ::Stdio ::piped ( ) )
. stderr ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
let err = String ::from_utf8_lossy ( & output . stderr ) ;
let out = String ::from_utf8_lossy ( & output . stdout ) ;
assert! ( output . status . success ( ) ) ;
assert! ( err . starts_with ( " Check file " ) ) ;
let expected =
std ::fs ::read_to_string ( util ::tests_path ( ) . join ( " resolve_dns.ts.out " ) )
. unwrap ( ) ;
assert_eq! ( expected , out ) ;
}
// Pass: `--allow-net=127.0.0.1:4553`
{
let output = util ::deno_cmd ( )
. current_dir ( util ::tests_path ( ) )
. env ( " NO_COLOR " , " 1 " )
. arg ( " run " )
. arg ( " --allow-net=127.0.0.1:4553 " )
. arg ( " --unstable " )
. arg ( " resolve_dns.ts " )
. stdout ( std ::process ::Stdio ::piped ( ) )
. stderr ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
let err = String ::from_utf8_lossy ( & output . stderr ) ;
let out = String ::from_utf8_lossy ( & output . stdout ) ;
assert! ( output . status . success ( ) ) ;
assert! ( err . starts_with ( " Check file " ) ) ;
let expected =
std ::fs ::read_to_string ( util ::tests_path ( ) . join ( " resolve_dns.ts.out " ) )
. unwrap ( ) ;
assert_eq! ( expected , out ) ;
}
// Permission error: `--allow-net=deno.land`
{
let output = util ::deno_cmd ( )
. current_dir ( util ::tests_path ( ) )
. env ( " NO_COLOR " , " 1 " )
. arg ( " run " )
. arg ( " --allow-net=deno.land " )
. arg ( " --unstable " )
. arg ( " resolve_dns.ts " )
. stdout ( std ::process ::Stdio ::piped ( ) )
. stderr ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
let err = String ::from_utf8_lossy ( & output . stderr ) ;
let out = String ::from_utf8_lossy ( & output . stdout ) ;
assert! ( ! output . status . success ( ) ) ;
assert! ( err . starts_with ( " Check file " ) ) ;
2021-03-17 17:45:12 -04:00
assert! ( err . contains ( r # "error: Uncaught (in promise) PermissionDenied: Requires net access to "127.0.0.1:4553""# ) ) ;
2021-02-01 13:09:25 -05:00
assert! ( out . is_empty ( ) ) ;
}
// Permission error: no permission specified
{
let output = util ::deno_cmd ( )
. current_dir ( util ::tests_path ( ) )
. env ( " NO_COLOR " , " 1 " )
. arg ( " run " )
. arg ( " --unstable " )
. arg ( " resolve_dns.ts " )
. stdout ( std ::process ::Stdio ::piped ( ) )
. stderr ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
let err = String ::from_utf8_lossy ( & output . stderr ) ;
let out = String ::from_utf8_lossy ( & output . stdout ) ;
assert! ( ! output . status . success ( ) ) ;
assert! ( err . starts_with ( " Check file " ) ) ;
2021-03-17 17:45:12 -04:00
assert! ( err . contains ( r # "error: Uncaught (in promise) PermissionDenied: Requires net access to "127.0.0.1:4553""# ) ) ;
2021-02-01 13:09:25 -05:00
assert! ( out . is_empty ( ) ) ;
}
handle . abort ( ) ;
}
2021-01-19 09:39:04 -05:00
}
2021-04-10 16:04:44 -04:00
#[ tokio::test ]
async fn listen_tls_alpn ( ) {
2021-05-10 19:49:57 -04:00
// TLS streams require the presence of an ambient local task set to gracefully
// close dropped connections in the background.
LocalSet ::new ( )
. run_until ( async {
let mut child = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " run " )
. arg ( " --unstable " )
. arg ( " --quiet " )
. arg ( " --allow-net " )
. arg ( " --allow-read " )
. arg ( " ./cli/tests/listen_tls_alpn.ts " )
. arg ( " 4504 " )
. stdout ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( ) ;
let stdout = child . stdout . as_mut ( ) . unwrap ( ) ;
let mut buffer = [ 0 ; 5 ] ;
let read = stdout . read ( & mut buffer ) . unwrap ( ) ;
assert_eq! ( read , 5 ) ;
let msg = std ::str ::from_utf8 ( & buffer ) . unwrap ( ) ;
assert_eq! ( msg , " READY " ) ;
let mut cfg = rustls ::ClientConfig ::new ( ) ;
let reader =
& mut BufReader ::new ( Cursor ::new ( include_bytes! ( " ./tls/RootCA.crt " ) ) ) ;
cfg . root_store . add_pem_file ( reader ) . unwrap ( ) ;
cfg . alpn_protocols . push ( " foobar " . as_bytes ( ) . to_vec ( ) ) ;
let cfg = Arc ::new ( cfg ) ;
let hostname =
webpki ::DNSNameRef ::try_from_ascii_str ( " localhost " ) . unwrap ( ) ;
let tcp_stream = tokio ::net ::TcpStream ::connect ( " localhost:4504 " )
. await
. unwrap ( ) ;
let mut tls_stream =
TlsStream ::new_client_side ( tcp_stream , & cfg , hostname ) ;
tls_stream . handshake ( ) . await . unwrap ( ) ;
let ( _ , session ) = tls_stream . get_ref ( ) ;
2021-04-10 16:04:44 -04:00
2021-05-10 19:49:57 -04:00
let alpn = session . get_alpn_protocol ( ) . unwrap ( ) ;
assert_eq! ( std ::str ::from_utf8 ( alpn ) . unwrap ( ) , " foobar " ) ;
2021-04-10 16:04:44 -04:00
2021-05-10 19:49:57 -04:00
child . kill ( ) . unwrap ( ) ;
child . wait ( ) . unwrap ( ) ;
} )
. await ;
2021-04-10 16:04:44 -04:00
}
#[ tokio::test ]
async fn listen_tls_alpn_fail ( ) {
2021-05-10 19:49:57 -04:00
// TLS streams require the presence of an ambient local task set to gracefully
// close dropped connections in the background.
LocalSet ::new ( )
. run_until ( async {
let mut child = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " run " )
. arg ( " --unstable " )
. arg ( " --quiet " )
. arg ( " --allow-net " )
. arg ( " --allow-read " )
. arg ( " ./cli/tests/listen_tls_alpn.ts " )
. arg ( " 4505 " )
. stdout ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( ) ;
let stdout = child . stdout . as_mut ( ) . unwrap ( ) ;
let mut buffer = [ 0 ; 5 ] ;
let read = stdout . read ( & mut buffer ) . unwrap ( ) ;
assert_eq! ( read , 5 ) ;
let msg = std ::str ::from_utf8 ( & buffer ) . unwrap ( ) ;
assert_eq! ( msg , " READY " ) ;
let mut cfg = rustls ::ClientConfig ::new ( ) ;
let reader =
& mut BufReader ::new ( Cursor ::new ( include_bytes! ( " ./tls/RootCA.crt " ) ) ) ;
cfg . root_store . add_pem_file ( reader ) . unwrap ( ) ;
cfg . alpn_protocols . push ( " boofar " . as_bytes ( ) . to_vec ( ) ) ;
let cfg = Arc ::new ( cfg ) ;
let hostname =
webpki ::DNSNameRef ::try_from_ascii_str ( " localhost " ) . unwrap ( ) ;
let tcp_stream = tokio ::net ::TcpStream ::connect ( " localhost:4505 " )
. await
. unwrap ( ) ;
let mut tls_stream =
TlsStream ::new_client_side ( tcp_stream , & cfg , hostname ) ;
tls_stream . handshake ( ) . await . unwrap ( ) ;
let ( _ , session ) = tls_stream . get_ref ( ) ;
2021-04-10 16:04:44 -04:00
2021-05-10 19:49:57 -04:00
assert! ( session . get_alpn_protocol ( ) . is_none ( ) ) ;
2021-04-10 16:04:44 -04:00
2021-05-10 19:49:57 -04:00
child . kill ( ) . unwrap ( ) ;
child . wait ( ) . unwrap ( ) ;
} )
. await ;
2021-04-10 16:04:44 -04:00
}