2020-01-02 15:13:47 -05:00
|
|
|
// Copyright 2018-2020 the Deno authors. All rights reserved. MIT license.
|
2019-09-16 21:05:14 -04:00
|
|
|
#[macro_use]
|
2019-09-19 14:48:05 -04:00
|
|
|
extern crate lazy_static;
|
2020-02-26 01:01:24 -05:00
|
|
|
#[cfg(unix)]
|
|
|
|
extern crate nix;
|
|
|
|
#[cfg(unix)]
|
|
|
|
extern crate pty;
|
2019-09-19 14:48:05 -04:00
|
|
|
extern crate tempfile;
|
2019-10-29 17:52:57 -04:00
|
|
|
|
2020-03-08 12:10:45 -04:00
|
|
|
// TODO re-enable. This hangs on macOS
|
|
|
|
// https://github.com/denoland/deno/issues/4262
|
2020-02-26 01:01:24 -05:00
|
|
|
#[cfg(unix)]
|
|
|
|
#[test]
|
2020-03-08 12:10:45 -04:00
|
|
|
#[ignore]
|
2020-02-26 01:01:24 -05:00
|
|
|
pub fn test_raw_tty() {
|
|
|
|
use pty::fork::*;
|
|
|
|
use std::io::{Read, Write};
|
|
|
|
|
|
|
|
let fork = Fork::from_ptmx().unwrap();
|
|
|
|
|
|
|
|
if let Ok(mut master) = fork.is_parent() {
|
|
|
|
let mut obytes: [u8; 100] = [0; 100];
|
|
|
|
let mut nread = master.read(&mut obytes).unwrap();
|
|
|
|
assert_eq!(String::from_utf8_lossy(&obytes[0..nread]), "S");
|
|
|
|
master.write_all(b"a").unwrap();
|
|
|
|
nread = master.read(&mut obytes).unwrap();
|
|
|
|
assert_eq!(String::from_utf8_lossy(&obytes[0..nread]), "A");
|
|
|
|
master.write_all(b"b").unwrap();
|
|
|
|
nread = master.read(&mut obytes).unwrap();
|
|
|
|
assert_eq!(String::from_utf8_lossy(&obytes[0..nread]), "B");
|
|
|
|
master.write_all(b"c").unwrap();
|
|
|
|
nread = master.read(&mut obytes).unwrap();
|
|
|
|
assert_eq!(String::from_utf8_lossy(&obytes[0..nread]), "C");
|
|
|
|
} else {
|
|
|
|
use deno::test_util::*;
|
|
|
|
use nix::sys::termios;
|
|
|
|
use std::os::unix::io::AsRawFd;
|
|
|
|
use std::process::*;
|
|
|
|
use tempfile::TempDir;
|
|
|
|
|
|
|
|
// Turn off echo such that parent is reading works properly.
|
|
|
|
let stdin_fd = std::io::stdin().as_raw_fd();
|
|
|
|
let mut t = termios::tcgetattr(stdin_fd).unwrap();
|
|
|
|
t.local_flags.remove(termios::LocalFlags::ECHO);
|
|
|
|
termios::tcsetattr(stdin_fd, termios::SetArg::TCSANOW, &t).unwrap();
|
|
|
|
|
|
|
|
let deno_dir = TempDir::new().expect("tempdir fail");
|
|
|
|
let mut child = Command::new(deno_exe_path())
|
|
|
|
.env("DENO_DIR", deno_dir.path())
|
|
|
|
.current_dir(util::root_path())
|
|
|
|
.arg("run")
|
|
|
|
.arg("cli/tests/raw_mode.ts")
|
|
|
|
.stdin(Stdio::inherit())
|
|
|
|
.stdout(Stdio::inherit())
|
|
|
|
.stderr(Stdio::null())
|
|
|
|
.spawn()
|
|
|
|
.expect("Failed to spawn script");
|
|
|
|
child.wait().unwrap();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-10-29 17:52:57 -04:00
|
|
|
#[test]
|
|
|
|
fn test_pattern_match() {
|
|
|
|
assert!(util::pattern_match("foo[BAR]baz", "foobarbaz", "[BAR]"));
|
|
|
|
assert!(!util::pattern_match("foo[BAR]baz", "foobazbar", "[BAR]"));
|
|
|
|
}
|
2019-09-16 21:05:14 -04:00
|
|
|
|
2019-09-19 14:48:05 -04:00
|
|
|
#[test]
|
|
|
|
fn benchmark_test() {
|
2019-10-29 17:52:57 -04:00
|
|
|
util::run_python_script("tools/benchmark_test.py")
|
2019-09-19 14:48:05 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn deno_dir_test() {
|
2019-10-29 17:52:57 -04:00
|
|
|
let g = util::http_server();
|
|
|
|
util::run_python_script("tools/deno_dir_test.py");
|
2019-09-19 14:48:05 -04:00
|
|
|
drop(g);
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn fetch_test() {
|
2020-02-19 08:17:13 -05:00
|
|
|
use deno::http_cache::url_to_filename;
|
2020-02-04 17:42:07 -05:00
|
|
|
pub use deno::test_util::*;
|
|
|
|
use std::process::Command;
|
|
|
|
use tempfile::TempDir;
|
2020-02-19 08:17:13 -05:00
|
|
|
use url::Url;
|
2020-02-04 17:42:07 -05:00
|
|
|
|
2019-10-29 17:52:57 -04:00
|
|
|
let g = util::http_server();
|
2020-02-04 17:42:07 -05:00
|
|
|
|
|
|
|
let deno_dir = TempDir::new().expect("tempdir fail");
|
2020-02-19 08:17:13 -05:00
|
|
|
let module_url =
|
|
|
|
Url::parse("http://localhost:4545/cli/tests/006_url_imports.ts").unwrap();
|
2020-02-04 17:42:07 -05:00
|
|
|
|
|
|
|
let output = Command::new(deno_exe_path())
|
|
|
|
.env("DENO_DIR", deno_dir.path())
|
|
|
|
.current_dir(util::root_path())
|
|
|
|
.arg("fetch")
|
2020-02-19 08:17:13 -05:00
|
|
|
.arg(module_url.to_string())
|
2020-02-04 17:42:07 -05:00
|
|
|
.output()
|
|
|
|
.expect("Failed to spawn script");
|
|
|
|
|
2020-02-27 15:39:41 -05:00
|
|
|
assert!(output.status.success());
|
2020-02-04 17:42:07 -05:00
|
|
|
let out = std::str::from_utf8(&output.stdout).unwrap();
|
|
|
|
assert_eq!(out, "");
|
|
|
|
|
|
|
|
let expected_path = deno_dir
|
|
|
|
.path()
|
2020-02-19 08:17:13 -05:00
|
|
|
.join("deps")
|
|
|
|
.join(url_to_filename(&module_url));
|
2020-02-04 17:42:07 -05:00
|
|
|
assert_eq!(expected_path.exists(), true);
|
|
|
|
|
2019-09-19 14:48:05 -04:00
|
|
|
drop(g);
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn fmt_test() {
|
2020-01-29 21:16:48 -05:00
|
|
|
use tempfile::TempDir;
|
|
|
|
let t = TempDir::new().expect("tempdir fail");
|
|
|
|
let fixed = util::root_path().join("cli/tests/badly_formatted_fixed.js");
|
|
|
|
let badly_formatted_original =
|
|
|
|
util::root_path().join("cli/tests/badly_formatted.js");
|
|
|
|
let badly_formatted = t.path().join("badly_formatted.js");
|
|
|
|
let badly_formatted_str = badly_formatted.to_str().unwrap();
|
|
|
|
std::fs::copy(&badly_formatted_original, &badly_formatted)
|
|
|
|
.expect("Failed to copy file");
|
|
|
|
let status = util::deno_cmd()
|
|
|
|
.current_dir(util::root_path())
|
|
|
|
.arg("fmt")
|
|
|
|
.arg("--check")
|
|
|
|
.arg(badly_formatted_str)
|
|
|
|
.spawn()
|
|
|
|
.expect("Failed to spawn script")
|
|
|
|
.wait()
|
|
|
|
.expect("Failed to wait for child process");
|
2020-02-27 15:39:41 -05:00
|
|
|
assert!(!status.success());
|
2020-01-29 21:16:48 -05:00
|
|
|
let status = util::deno_cmd()
|
|
|
|
.current_dir(util::root_path())
|
|
|
|
.arg("fmt")
|
|
|
|
.arg(badly_formatted_str)
|
|
|
|
.spawn()
|
|
|
|
.expect("Failed to spawn script")
|
|
|
|
.wait()
|
|
|
|
.expect("Failed to wait for child process");
|
2020-02-27 15:39:41 -05:00
|
|
|
assert!(status.success());
|
2020-01-29 21:16:48 -05:00
|
|
|
let expected = std::fs::read_to_string(fixed).unwrap();
|
|
|
|
let actual = std::fs::read_to_string(badly_formatted).unwrap();
|
|
|
|
assert_eq!(expected, actual);
|
2019-09-19 14:48:05 -04:00
|
|
|
}
|
|
|
|
|
2020-02-27 15:39:41 -05:00
|
|
|
#[test]
|
|
|
|
fn fmt_stdin_error() {
|
|
|
|
use std::io::Write;
|
|
|
|
let mut deno = util::deno_cmd()
|
|
|
|
.current_dir(util::root_path())
|
|
|
|
.arg("fmt")
|
|
|
|
.arg("-")
|
|
|
|
.stdin(std::process::Stdio::piped())
|
|
|
|
.stdout(std::process::Stdio::piped())
|
|
|
|
.stderr(std::process::Stdio::piped())
|
|
|
|
.spawn()
|
|
|
|
.unwrap();
|
|
|
|
let stdin = deno.stdin.as_mut().unwrap();
|
|
|
|
let invalid_js = b"import { example }";
|
|
|
|
stdin.write_all(invalid_js).unwrap();
|
|
|
|
let output = deno.wait_with_output().unwrap();
|
|
|
|
// Error message might change. Just check stdout empty, stderr not.
|
|
|
|
assert!(output.stdout.is_empty());
|
|
|
|
assert!(!output.stderr.is_empty());
|
|
|
|
assert!(!output.status.success());
|
|
|
|
}
|
|
|
|
|
2020-01-31 11:34:50 -05:00
|
|
|
#[test]
|
|
|
|
fn installer_test_local_module_run() {
|
2020-02-26 05:52:15 -05:00
|
|
|
use deno::flags::Flags;
|
2020-01-31 11:34:50 -05:00
|
|
|
use deno::installer;
|
|
|
|
use std::env;
|
|
|
|
use std::path::PathBuf;
|
|
|
|
use std::process::Command;
|
|
|
|
use tempfile::TempDir;
|
|
|
|
|
|
|
|
let temp_dir = TempDir::new().expect("tempdir fail");
|
|
|
|
let local_module = env::current_dir().unwrap().join("tests/echo.ts");
|
|
|
|
let local_module_str = local_module.to_string_lossy();
|
|
|
|
installer::install(
|
2020-02-26 05:52:15 -05:00
|
|
|
Flags::default(),
|
2020-02-11 04:29:36 -05:00
|
|
|
Some(temp_dir.path().to_path_buf()),
|
2020-01-31 11:34:50 -05:00
|
|
|
"echo_test",
|
|
|
|
&local_module_str,
|
|
|
|
vec!["hello".to_string()],
|
2020-02-08 03:49:55 -05:00
|
|
|
false,
|
2020-01-31 11:34:50 -05:00
|
|
|
)
|
|
|
|
.expect("Failed to install");
|
|
|
|
let mut file_path = temp_dir.path().join("echo_test");
|
|
|
|
if cfg!(windows) {
|
2020-03-04 03:40:56 -05:00
|
|
|
file_path = file_path.with_extension("cmd");
|
2020-01-31 11:34:50 -05:00
|
|
|
}
|
|
|
|
assert!(file_path.exists());
|
|
|
|
let path_var_name = if cfg!(windows) { "Path" } else { "PATH" };
|
|
|
|
let paths_var = env::var_os(path_var_name).expect("PATH not set");
|
|
|
|
let mut paths: Vec<PathBuf> = env::split_paths(&paths_var).collect();
|
|
|
|
paths.push(temp_dir.path().to_owned());
|
|
|
|
paths.push(util::target_dir());
|
|
|
|
let path_var_value = env::join_paths(paths).expect("Can't create PATH");
|
|
|
|
// NOTE: using file_path here instead of exec_name, because tests
|
|
|
|
// shouldn't mess with user's PATH env variable
|
|
|
|
let output = Command::new(file_path)
|
|
|
|
.current_dir(temp_dir.path())
|
|
|
|
.arg("foo")
|
|
|
|
.env(path_var_name, path_var_value)
|
|
|
|
.output()
|
|
|
|
.expect("failed to spawn script");
|
|
|
|
|
2020-02-03 18:08:44 -05:00
|
|
|
let stdout_str = std::str::from_utf8(&output.stdout).unwrap().trim();
|
|
|
|
let stderr_str = std::str::from_utf8(&output.stderr).unwrap().trim();
|
|
|
|
println!("Got stdout: {:?}", stdout_str);
|
|
|
|
println!("Got stderr: {:?}", stderr_str);
|
2020-02-07 03:31:19 -05:00
|
|
|
assert!(stdout_str.ends_with("hello, foo"));
|
2020-01-31 11:34:50 -05:00
|
|
|
drop(temp_dir);
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn installer_test_remote_module_run() {
|
2020-02-26 05:52:15 -05:00
|
|
|
use deno::flags::Flags;
|
2020-01-31 11:34:50 -05:00
|
|
|
use deno::installer;
|
|
|
|
use std::env;
|
|
|
|
use std::path::PathBuf;
|
|
|
|
use std::process::Command;
|
|
|
|
use tempfile::TempDir;
|
|
|
|
|
|
|
|
let g = util::http_server();
|
|
|
|
let temp_dir = TempDir::new().expect("tempdir fail");
|
|
|
|
installer::install(
|
2020-02-26 05:52:15 -05:00
|
|
|
Flags::default(),
|
2020-02-11 04:29:36 -05:00
|
|
|
Some(temp_dir.path().to_path_buf()),
|
2020-01-31 11:34:50 -05:00
|
|
|
"echo_test",
|
2020-02-02 16:55:22 -05:00
|
|
|
"http://localhost:4545/cli/tests/echo.ts",
|
2020-01-31 11:34:50 -05:00
|
|
|
vec!["hello".to_string()],
|
2020-02-08 03:49:55 -05:00
|
|
|
false,
|
2020-01-31 11:34:50 -05:00
|
|
|
)
|
|
|
|
.expect("Failed to install");
|
|
|
|
let mut file_path = temp_dir.path().join("echo_test");
|
|
|
|
if cfg!(windows) {
|
2020-03-04 03:40:56 -05:00
|
|
|
file_path = file_path.with_extension("cmd");
|
2020-01-31 11:34:50 -05:00
|
|
|
}
|
|
|
|
assert!(file_path.exists());
|
|
|
|
let path_var_name = if cfg!(windows) { "Path" } else { "PATH" };
|
|
|
|
let paths_var = env::var_os(path_var_name).expect("PATH not set");
|
|
|
|
let mut paths: Vec<PathBuf> = env::split_paths(&paths_var).collect();
|
|
|
|
paths.push(temp_dir.path().to_owned());
|
|
|
|
paths.push(util::target_dir());
|
|
|
|
let path_var_value = env::join_paths(paths).expect("Can't create PATH");
|
|
|
|
// NOTE: using file_path here instead of exec_name, because tests
|
|
|
|
// shouldn't mess with user's PATH env variable
|
|
|
|
let output = Command::new(file_path)
|
|
|
|
.current_dir(temp_dir.path())
|
|
|
|
.arg("foo")
|
|
|
|
.env(path_var_name, path_var_value)
|
|
|
|
.output()
|
|
|
|
.expect("failed to spawn script");
|
2020-02-07 03:31:19 -05:00
|
|
|
assert!(std::str::from_utf8(&output.stdout)
|
|
|
|
.unwrap()
|
|
|
|
.trim()
|
|
|
|
.ends_with("hello, foo"));
|
2020-01-31 11:34:50 -05:00
|
|
|
drop(temp_dir);
|
|
|
|
drop(g)
|
|
|
|
}
|
|
|
|
|
2019-09-19 14:48:05 -04:00
|
|
|
#[test]
|
|
|
|
fn js_unit_tests() {
|
2019-10-29 17:52:57 -04:00
|
|
|
let g = util::http_server();
|
|
|
|
let mut deno = util::deno_cmd()
|
|
|
|
.current_dir(util::root_path())
|
2019-09-19 14:48:05 -04:00
|
|
|
.arg("run")
|
|
|
|
.arg("--reload")
|
|
|
|
.arg("--allow-run")
|
|
|
|
.arg("--allow-env")
|
2019-10-04 20:28:51 -04:00
|
|
|
.arg("cli/js/unit_test_runner.ts")
|
2019-09-19 14:48:05 -04:00
|
|
|
.spawn()
|
|
|
|
.expect("failed to spawn script");
|
|
|
|
let status = deno.wait().expect("failed to wait for the child process");
|
|
|
|
assert_eq!(Some(0), status.code());
|
|
|
|
assert!(status.success());
|
|
|
|
drop(g);
|
|
|
|
}
|
|
|
|
|
2019-11-20 11:02:08 -05:00
|
|
|
#[test]
|
|
|
|
fn bundle_exports() {
|
|
|
|
use tempfile::TempDir;
|
|
|
|
|
|
|
|
// First we have to generate a bundle of some module that has exports.
|
|
|
|
let mod1 = util::root_path().join("cli/tests/subdir/mod1.ts");
|
|
|
|
assert!(mod1.is_file());
|
|
|
|
let t = TempDir::new().expect("tempdir fail");
|
|
|
|
let bundle = t.path().join("mod1.bundle.js");
|
|
|
|
let mut deno = util::deno_cmd()
|
|
|
|
.current_dir(util::root_path())
|
|
|
|
.arg("bundle")
|
|
|
|
.arg(mod1)
|
|
|
|
.arg(&bundle)
|
|
|
|
.spawn()
|
|
|
|
.expect("failed to spawn script");
|
|
|
|
let status = deno.wait().expect("failed to wait for the child process");
|
|
|
|
assert!(status.success());
|
|
|
|
assert!(bundle.is_file());
|
|
|
|
|
|
|
|
// Now we try to use that bundle from another module.
|
|
|
|
let test = t.path().join("test.js");
|
|
|
|
std::fs::write(
|
|
|
|
&test,
|
|
|
|
"
|
|
|
|
import { printHello3 } from \"./mod1.bundle.js\";
|
|
|
|
printHello3(); ",
|
|
|
|
)
|
|
|
|
.expect("error writing file");
|
|
|
|
|
|
|
|
let output = util::deno_cmd()
|
|
|
|
.current_dir(util::root_path())
|
|
|
|
.arg("run")
|
|
|
|
.arg(&test)
|
|
|
|
.output()
|
|
|
|
.expect("failed to spawn script");
|
|
|
|
// check the output of the test.ts program.
|
2020-02-07 03:31:19 -05:00
|
|
|
assert!(std::str::from_utf8(&output.stdout)
|
|
|
|
.unwrap()
|
|
|
|
.trim()
|
|
|
|
.ends_with("Hello"));
|
2019-11-20 11:02:08 -05:00
|
|
|
assert_eq!(output.stderr, b"");
|
|
|
|
}
|
|
|
|
|
2020-02-12 16:41:51 -05:00
|
|
|
#[test]
|
|
|
|
fn bundle_circular() {
|
|
|
|
use tempfile::TempDir;
|
|
|
|
|
|
|
|
// First we have to generate a bundle of some module that has exports.
|
|
|
|
let circular1 = util::root_path().join("cli/tests/subdir/circular1.ts");
|
|
|
|
assert!(circular1.is_file());
|
|
|
|
let t = TempDir::new().expect("tempdir fail");
|
|
|
|
let bundle = t.path().join("circular1.bundle.js");
|
|
|
|
let mut deno = util::deno_cmd()
|
|
|
|
.current_dir(util::root_path())
|
|
|
|
.arg("bundle")
|
|
|
|
.arg(circular1)
|
|
|
|
.arg(&bundle)
|
|
|
|
.spawn()
|
|
|
|
.expect("failed to spawn script");
|
|
|
|
let status = deno.wait().expect("failed to wait for the child process");
|
|
|
|
assert!(status.success());
|
|
|
|
assert!(bundle.is_file());
|
|
|
|
|
|
|
|
let output = util::deno_cmd()
|
|
|
|
.current_dir(util::root_path())
|
|
|
|
.arg("run")
|
|
|
|
.arg(&bundle)
|
|
|
|
.output()
|
|
|
|
.expect("failed to spawn script");
|
|
|
|
// check the output of the the bundle program.
|
|
|
|
assert!(std::str::from_utf8(&output.stdout)
|
|
|
|
.unwrap()
|
|
|
|
.trim()
|
|
|
|
.ends_with("f1\nf2"));
|
|
|
|
assert_eq!(output.stderr, b"");
|
|
|
|
}
|
|
|
|
|
2020-02-19 22:35:21 -05:00
|
|
|
#[test]
|
|
|
|
fn bundle_single_module() {
|
|
|
|
use tempfile::TempDir;
|
|
|
|
|
|
|
|
// First we have to generate a bundle of some module that has exports.
|
|
|
|
let single_module =
|
|
|
|
util::root_path().join("cli/tests/subdir/single_module.ts");
|
|
|
|
assert!(single_module.is_file());
|
|
|
|
let t = TempDir::new().expect("tempdir fail");
|
|
|
|
let bundle = t.path().join("single_module.bundle.js");
|
|
|
|
let mut deno = util::deno_cmd()
|
|
|
|
.current_dir(util::root_path())
|
|
|
|
.arg("bundle")
|
|
|
|
.arg(single_module)
|
|
|
|
.arg(&bundle)
|
|
|
|
.spawn()
|
|
|
|
.expect("failed to spawn script");
|
|
|
|
let status = deno.wait().expect("failed to wait for the child process");
|
|
|
|
assert!(status.success());
|
|
|
|
assert!(bundle.is_file());
|
|
|
|
|
|
|
|
let output = util::deno_cmd()
|
|
|
|
.current_dir(util::root_path())
|
|
|
|
.arg("run")
|
|
|
|
.arg("--reload")
|
|
|
|
.arg(&bundle)
|
|
|
|
.output()
|
|
|
|
.expect("failed to spawn script");
|
|
|
|
// check the output of the the bundle program.
|
|
|
|
assert!(std::str::from_utf8(&output.stdout)
|
|
|
|
.unwrap()
|
|
|
|
.trim()
|
|
|
|
.ends_with("Hello world!"));
|
|
|
|
assert_eq!(output.stderr, b"");
|
|
|
|
}
|
|
|
|
|
2020-02-25 15:33:19 -05:00
|
|
|
#[test]
|
|
|
|
fn bundle_tla() {
|
|
|
|
// First we have to generate a bundle of some module that has exports.
|
|
|
|
let tla_import = util::root_path().join("cli/tests/subdir/tla.ts");
|
|
|
|
assert!(tla_import.is_file());
|
|
|
|
let t = tempfile::TempDir::new().expect("tempdir fail");
|
|
|
|
let bundle = t.path().join("tla.bundle.js");
|
|
|
|
let mut deno = util::deno_cmd()
|
|
|
|
.current_dir(util::root_path())
|
|
|
|
.arg("bundle")
|
|
|
|
.arg(tla_import)
|
|
|
|
.arg(&bundle)
|
|
|
|
.spawn()
|
|
|
|
.expect("failed to spawn script");
|
|
|
|
let status = deno.wait().expect("failed to wait for the child process");
|
|
|
|
assert!(status.success());
|
|
|
|
assert!(bundle.is_file());
|
|
|
|
|
|
|
|
// Now we try to use that bundle from another module.
|
|
|
|
let test = t.path().join("test.js");
|
|
|
|
std::fs::write(
|
|
|
|
&test,
|
|
|
|
"
|
|
|
|
import { foo } from \"./tla.bundle.js\";
|
|
|
|
console.log(foo); ",
|
|
|
|
)
|
|
|
|
.expect("error writing file");
|
|
|
|
|
|
|
|
let output = util::deno_cmd()
|
|
|
|
.current_dir(util::root_path())
|
|
|
|
.arg("run")
|
|
|
|
.arg(&test)
|
|
|
|
.output()
|
|
|
|
.expect("failed to spawn script");
|
|
|
|
// check the output of the test.ts program.
|
|
|
|
assert!(std::str::from_utf8(&output.stdout)
|
|
|
|
.unwrap()
|
|
|
|
.trim()
|
|
|
|
.ends_with("Hello"));
|
|
|
|
assert_eq!(output.stderr, b"");
|
|
|
|
}
|
|
|
|
|
2020-03-02 16:18:27 -05:00
|
|
|
#[test]
|
|
|
|
fn bundle_js() {
|
|
|
|
use tempfile::TempDir;
|
|
|
|
|
|
|
|
// First we have to generate a bundle of some module that has exports.
|
|
|
|
let mod6 = util::root_path().join("cli/tests/subdir/mod6.js");
|
|
|
|
assert!(mod6.is_file());
|
|
|
|
let t = TempDir::new().expect("tempdir fail");
|
|
|
|
let bundle = t.path().join("mod6.bundle.js");
|
|
|
|
let mut deno = util::deno_cmd()
|
|
|
|
.current_dir(util::root_path())
|
|
|
|
.arg("bundle")
|
|
|
|
.arg(mod6)
|
|
|
|
.arg(&bundle)
|
|
|
|
.spawn()
|
|
|
|
.expect("failed to spawn script");
|
|
|
|
let status = deno.wait().expect("failed to wait for the child process");
|
|
|
|
assert!(status.success());
|
|
|
|
assert!(bundle.is_file());
|
|
|
|
|
|
|
|
let output = util::deno_cmd()
|
|
|
|
.current_dir(util::root_path())
|
|
|
|
.arg("run")
|
|
|
|
.arg(&bundle)
|
|
|
|
.output()
|
|
|
|
.expect("failed to spawn script");
|
|
|
|
// check that nothing went to stderr
|
|
|
|
assert_eq!(output.stderr, b"");
|
|
|
|
}
|
|
|
|
|
2019-09-19 14:48:05 -04:00
|
|
|
#[test]
|
2020-02-24 17:49:40 -05:00
|
|
|
fn repl_test_console_log() {
|
2020-03-07 05:27:16 -05:00
|
|
|
let (out, err) = util::run_and_collect_output(
|
|
|
|
true,
|
2020-02-25 15:36:35 -05:00
|
|
|
"repl",
|
|
|
|
Some(vec!["console.log('hello')", "'world'"]),
|
|
|
|
None,
|
2020-03-01 19:51:54 -05:00
|
|
|
false,
|
2020-02-25 15:36:35 -05:00
|
|
|
);
|
2020-02-24 17:49:40 -05:00
|
|
|
assert_eq!(out, "hello\nundefined\nworld\n");
|
|
|
|
assert!(err.is_empty());
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn repl_test_eof() {
|
2020-03-07 05:27:16 -05:00
|
|
|
let (out, err) = util::run_and_collect_output(
|
|
|
|
true,
|
|
|
|
"repl",
|
|
|
|
Some(vec!["1 + 2"]),
|
|
|
|
None,
|
|
|
|
false,
|
|
|
|
);
|
2020-02-24 17:49:40 -05:00
|
|
|
assert_eq!(out, "3\n");
|
|
|
|
assert!(err.is_empty());
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn repl_test_exit_command() {
|
2020-03-07 05:27:16 -05:00
|
|
|
let (out, err) = util::run_and_collect_output(
|
|
|
|
true,
|
2020-03-01 19:51:54 -05:00
|
|
|
"repl",
|
|
|
|
Some(vec!["exit", "'ignored'"]),
|
|
|
|
None,
|
|
|
|
false,
|
|
|
|
);
|
2020-02-24 17:49:40 -05:00
|
|
|
assert!(out.is_empty());
|
|
|
|
assert!(err.is_empty());
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn repl_test_help_command() {
|
2020-03-07 05:27:16 -05:00
|
|
|
let (out, err) =
|
|
|
|
util::run_and_collect_output(true, "repl", Some(vec!["help"]), None, false);
|
2020-02-24 17:49:40 -05:00
|
|
|
assert_eq!(
|
|
|
|
out,
|
|
|
|
vec![
|
|
|
|
"_ Get last evaluation result",
|
|
|
|
"_error Get last thrown error",
|
|
|
|
"exit Exit the REPL",
|
|
|
|
"help Print this help message",
|
|
|
|
"",
|
|
|
|
]
|
|
|
|
.join("\n")
|
|
|
|
);
|
|
|
|
assert!(err.is_empty());
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn repl_test_function() {
|
2020-03-07 05:27:16 -05:00
|
|
|
let (out, err) = util::run_and_collect_output(
|
|
|
|
true,
|
2020-02-25 15:36:35 -05:00
|
|
|
"repl",
|
|
|
|
Some(vec!["Deno.writeFileSync"]),
|
|
|
|
None,
|
2020-03-01 19:51:54 -05:00
|
|
|
false,
|
2020-02-25 15:36:35 -05:00
|
|
|
);
|
2020-02-24 17:49:40 -05:00
|
|
|
assert_eq!(out, "[Function: writeFileSync]\n");
|
|
|
|
assert!(err.is_empty());
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn repl_test_multiline() {
|
2020-03-07 05:27:16 -05:00
|
|
|
let (out, err) = util::run_and_collect_output(
|
|
|
|
true,
|
2020-03-01 19:51:54 -05:00
|
|
|
"repl",
|
|
|
|
Some(vec!["(\n1 + 2\n)"]),
|
|
|
|
None,
|
|
|
|
false,
|
|
|
|
);
|
2020-02-24 17:49:40 -05:00
|
|
|
assert_eq!(out, "3\n");
|
|
|
|
assert!(err.is_empty());
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn repl_test_eval_unterminated() {
|
2020-03-07 05:27:16 -05:00
|
|
|
let (out, err) = util::run_and_collect_output(
|
|
|
|
true,
|
|
|
|
"repl",
|
|
|
|
Some(vec!["eval('{')"]),
|
|
|
|
None,
|
|
|
|
false,
|
|
|
|
);
|
2020-02-24 17:49:40 -05:00
|
|
|
assert!(out.is_empty());
|
|
|
|
assert!(err.contains("Unexpected end of input"));
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn repl_test_reference_error() {
|
2020-03-07 05:27:16 -05:00
|
|
|
let (out, err) = util::run_and_collect_output(
|
|
|
|
true,
|
2020-03-01 19:51:54 -05:00
|
|
|
"repl",
|
|
|
|
Some(vec!["not_a_variable"]),
|
|
|
|
None,
|
|
|
|
false,
|
|
|
|
);
|
2020-02-24 17:49:40 -05:00
|
|
|
assert!(out.is_empty());
|
|
|
|
assert!(err.contains("not_a_variable is not defined"));
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn repl_test_syntax_error() {
|
2020-03-07 05:27:16 -05:00
|
|
|
let (out, err) = util::run_and_collect_output(
|
|
|
|
true,
|
2020-03-01 19:51:54 -05:00
|
|
|
"repl",
|
|
|
|
Some(vec!["syntax error"]),
|
|
|
|
None,
|
|
|
|
false,
|
|
|
|
);
|
2020-02-24 17:49:40 -05:00
|
|
|
assert!(out.is_empty());
|
|
|
|
assert!(err.contains("Unexpected identifier"));
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn repl_test_type_error() {
|
2020-03-07 05:27:16 -05:00
|
|
|
let (out, err) = util::run_and_collect_output(
|
|
|
|
true,
|
|
|
|
"repl",
|
|
|
|
Some(vec!["console()"]),
|
|
|
|
None,
|
|
|
|
false,
|
|
|
|
);
|
2020-02-24 17:49:40 -05:00
|
|
|
assert!(out.is_empty());
|
|
|
|
assert!(err.contains("console is not a function"));
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn repl_test_variable() {
|
2020-03-07 05:27:16 -05:00
|
|
|
let (out, err) = util::run_and_collect_output(
|
|
|
|
true,
|
2020-03-01 19:51:54 -05:00
|
|
|
"repl",
|
|
|
|
Some(vec!["var a = 123;", "a"]),
|
|
|
|
None,
|
|
|
|
false,
|
|
|
|
);
|
2020-02-24 17:49:40 -05:00
|
|
|
assert_eq!(out, "undefined\n123\n");
|
|
|
|
assert!(err.is_empty());
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn repl_test_lexical_scoped_variable() {
|
2020-03-07 05:27:16 -05:00
|
|
|
let (out, err) = util::run_and_collect_output(
|
|
|
|
true,
|
2020-03-01 19:51:54 -05:00
|
|
|
"repl",
|
|
|
|
Some(vec!["let a = 123;", "a"]),
|
|
|
|
None,
|
|
|
|
false,
|
|
|
|
);
|
2020-02-24 17:49:40 -05:00
|
|
|
assert_eq!(out, "undefined\n123\n");
|
|
|
|
assert!(err.is_empty());
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn repl_test_missing_deno_dir() {
|
|
|
|
use std::fs::{read_dir, remove_dir_all};
|
|
|
|
const DENO_DIR: &str = "nonexistent";
|
2020-02-25 15:36:35 -05:00
|
|
|
let test_deno_dir =
|
|
|
|
util::root_path().join("cli").join("tests").join(DENO_DIR);
|
2020-03-07 05:27:16 -05:00
|
|
|
let (out, err) = util::run_and_collect_output(
|
|
|
|
true,
|
2020-02-25 15:36:35 -05:00
|
|
|
"repl",
|
|
|
|
Some(vec!["1"]),
|
2020-02-24 17:49:40 -05:00
|
|
|
Some(vec![("DENO_DIR".to_owned(), DENO_DIR.to_owned())]),
|
2020-03-01 19:51:54 -05:00
|
|
|
false,
|
2020-02-24 17:49:40 -05:00
|
|
|
);
|
2020-02-25 15:36:35 -05:00
|
|
|
assert!(read_dir(&test_deno_dir).is_ok());
|
|
|
|
remove_dir_all(&test_deno_dir).unwrap();
|
2020-02-24 17:49:40 -05:00
|
|
|
assert_eq!(out, "1\n");
|
|
|
|
assert!(err.is_empty());
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn repl_test_save_last_eval() {
|
2020-03-07 05:27:16 -05:00
|
|
|
let (out, err) = util::run_and_collect_output(
|
|
|
|
true,
|
|
|
|
"repl",
|
|
|
|
Some(vec!["1", "_"]),
|
|
|
|
None,
|
|
|
|
false,
|
|
|
|
);
|
2020-02-24 17:49:40 -05:00
|
|
|
assert_eq!(out, "1\n1\n");
|
|
|
|
assert!(err.is_empty());
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn repl_test_save_last_thrown() {
|
2020-03-07 05:27:16 -05:00
|
|
|
let (out, err) = util::run_and_collect_output(
|
|
|
|
true,
|
2020-03-01 19:51:54 -05:00
|
|
|
"repl",
|
|
|
|
Some(vec!["throw 1", "_error"]),
|
|
|
|
None,
|
|
|
|
false,
|
|
|
|
);
|
2020-02-24 17:49:40 -05:00
|
|
|
assert_eq!(out, "1\n");
|
|
|
|
assert_eq!(err, "Thrown: 1\n");
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn repl_test_assign_underscore() {
|
2020-03-07 05:27:16 -05:00
|
|
|
let (out, err) = util::run_and_collect_output(
|
|
|
|
true,
|
2020-03-01 19:51:54 -05:00
|
|
|
"repl",
|
|
|
|
Some(vec!["_ = 1", "2", "_"]),
|
|
|
|
None,
|
|
|
|
false,
|
|
|
|
);
|
2020-02-24 17:49:40 -05:00
|
|
|
assert_eq!(
|
|
|
|
out,
|
|
|
|
"Last evaluation result is no longer saved to _.\n1\n2\n1\n"
|
|
|
|
);
|
|
|
|
assert!(err.is_empty());
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn repl_test_assign_underscore_error() {
|
2020-03-07 05:27:16 -05:00
|
|
|
let (out, err) = util::run_and_collect_output(
|
|
|
|
true,
|
2020-02-25 15:36:35 -05:00
|
|
|
"repl",
|
|
|
|
Some(vec!["_error = 1", "throw 2", "_error"]),
|
|
|
|
None,
|
2020-03-01 19:51:54 -05:00
|
|
|
false,
|
2020-02-25 15:36:35 -05:00
|
|
|
);
|
2020-02-24 17:49:40 -05:00
|
|
|
assert_eq!(
|
|
|
|
out,
|
|
|
|
"Last thrown error is no longer saved to _error.\n1\n1\n"
|
|
|
|
);
|
|
|
|
assert_eq!(err, "Thrown: 2\n");
|
2019-09-19 14:48:05 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn target_test() {
|
2019-10-29 17:52:57 -04:00
|
|
|
util::run_python_script("tools/target_test.py")
|
2019-09-19 14:48:05 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn util_test() {
|
2019-10-29 17:52:57 -04:00
|
|
|
util::run_python_script("tools/util_test.py")
|
2019-09-19 14:48:05 -04:00
|
|
|
}
|
2019-09-10 11:09:54 -04:00
|
|
|
|
|
|
|
macro_rules! itest(
|
|
|
|
($name:ident {$( $key:ident: $value:expr,)*}) => {
|
|
|
|
#[test]
|
|
|
|
fn $name() {
|
2019-10-29 17:52:57 -04:00
|
|
|
(util::CheckOutputIntegrationTest {
|
2019-09-10 11:09:54 -04:00
|
|
|
$(
|
|
|
|
$key: $value,
|
|
|
|
)*
|
|
|
|
.. Default::default()
|
|
|
|
}).run()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
);
|
|
|
|
|
2020-03-03 16:02:35 -05:00
|
|
|
// Unfortunately #[ignore] doesn't work with itest!
|
|
|
|
macro_rules! itest_ignore(
|
|
|
|
($name:ident {$( $key:ident: $value:expr,)*}) => {
|
|
|
|
#[ignore]
|
|
|
|
#[test]
|
|
|
|
fn $name() {
|
|
|
|
(util::CheckOutputIntegrationTest {
|
|
|
|
$(
|
|
|
|
$key: $value,
|
|
|
|
)*
|
|
|
|
.. Default::default()
|
|
|
|
}).run()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
);
|
|
|
|
|
2019-09-10 11:09:54 -04:00
|
|
|
itest!(_001_hello {
|
|
|
|
args: "run --reload 001_hello.js",
|
2019-09-19 14:48:05 -04:00
|
|
|
output: "001_hello.js.out",
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
|
|
|
|
|
|
|
itest!(_002_hello {
|
|
|
|
args: "run --reload 002_hello.ts",
|
2019-09-19 14:48:05 -04:00
|
|
|
output: "002_hello.ts.out",
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
|
|
|
|
|
|
|
itest!(_003_relative_import {
|
|
|
|
args: "run --reload 003_relative_import.ts",
|
2019-09-19 14:48:05 -04:00
|
|
|
output: "003_relative_import.ts.out",
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
|
|
|
|
|
|
|
itest!(_004_set_timeout {
|
|
|
|
args: "run --reload 004_set_timeout.ts",
|
2019-09-19 14:48:05 -04:00
|
|
|
output: "004_set_timeout.ts.out",
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
|
|
|
|
|
|
|
itest!(_005_more_imports {
|
|
|
|
args: "run --reload 005_more_imports.ts",
|
2019-09-19 14:48:05 -04:00
|
|
|
output: "005_more_imports.ts.out",
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
|
|
|
|
|
|
|
itest!(_006_url_imports {
|
|
|
|
args: "run --reload 006_url_imports.ts",
|
2019-09-19 14:48:05 -04:00
|
|
|
output: "006_url_imports.ts.out",
|
|
|
|
http_server: true,
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
|
|
|
|
|
|
|
itest!(_012_async {
|
|
|
|
args: "run --reload 012_async.ts",
|
2019-09-19 14:48:05 -04:00
|
|
|
output: "012_async.ts.out",
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
|
|
|
|
|
|
|
itest!(_013_dynamic_import {
|
2019-11-26 11:06:32 -05:00
|
|
|
args: "run --reload --allow-read 013_dynamic_import.ts",
|
2019-09-19 14:48:05 -04:00
|
|
|
output: "013_dynamic_import.ts.out",
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
|
|
|
|
|
|
|
itest!(_014_duplicate_import {
|
2019-11-26 11:06:32 -05:00
|
|
|
args: "run --reload --allow-read 014_duplicate_import.ts ",
|
2019-09-19 14:48:05 -04:00
|
|
|
output: "014_duplicate_import.ts.out",
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
|
|
|
|
|
|
|
itest!(_015_duplicate_parallel_import {
|
2019-11-26 11:06:32 -05:00
|
|
|
args: "run --reload --allow-read 015_duplicate_parallel_import.js",
|
2019-09-19 14:48:05 -04:00
|
|
|
output: "015_duplicate_parallel_import.js.out",
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
|
|
|
|
|
|
|
itest!(_016_double_await {
|
|
|
|
args: "run --allow-read --reload 016_double_await.ts",
|
2019-09-19 14:48:05 -04:00
|
|
|
output: "016_double_await.ts.out",
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
|
|
|
|
|
|
|
itest!(_017_import_redirect {
|
|
|
|
args: "run --reload 017_import_redirect.ts",
|
2019-09-19 14:48:05 -04:00
|
|
|
output: "017_import_redirect.ts.out",
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
|
|
|
|
|
|
|
itest!(_018_async_catch {
|
|
|
|
args: "run --reload 018_async_catch.ts",
|
2019-09-19 14:48:05 -04:00
|
|
|
output: "018_async_catch.ts.out",
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
|
|
|
|
2020-03-03 16:02:35 -05:00
|
|
|
// TODO(ry) Re-enable flaky test https://github.com/denoland/deno/issues/4049
|
|
|
|
itest_ignore!(_019_media_types {
|
2019-09-10 11:09:54 -04:00
|
|
|
args: "run --reload 019_media_types.ts",
|
2019-09-19 14:48:05 -04:00
|
|
|
output: "019_media_types.ts.out",
|
|
|
|
http_server: true,
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
|
|
|
|
|
|
|
itest!(_020_json_modules {
|
|
|
|
args: "run --reload 020_json_modules.ts",
|
2019-09-19 14:48:05 -04:00
|
|
|
output: "020_json_modules.ts.out",
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
|
|
|
|
|
|
|
itest!(_021_mjs_modules {
|
|
|
|
args: "run --reload 021_mjs_modules.ts",
|
2019-09-19 14:48:05 -04:00
|
|
|
output: "021_mjs_modules.ts.out",
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
|
|
|
|
2020-03-03 16:02:35 -05:00
|
|
|
// TODO(ry) Re-enable flaky test https://github.com/denoland/deno/issues/4049
|
|
|
|
itest_ignore!(_022_info_flag_script {
|
2019-09-19 14:48:05 -04:00
|
|
|
args: "info http://127.0.0.1:4545/cli/tests/019_media_types.ts",
|
|
|
|
output: "022_info_flag_script.out",
|
|
|
|
http_server: true,
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
|
|
|
|
|
|
|
itest!(_023_no_ext_with_headers {
|
|
|
|
args: "run --reload 023_no_ext_with_headers",
|
2019-09-19 14:48:05 -04:00
|
|
|
output: "023_no_ext_with_headers.out",
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
|
|
|
|
|
|
|
// FIXME(bartlomieju): this test should use remote file
|
2020-03-03 16:02:35 -05:00
|
|
|
itest_ignore!(_024_import_no_ext_with_headers {
|
|
|
|
args: "run --reload 024_import_no_ext_with_headers.ts",
|
|
|
|
output: "024_import_no_ext_with_headers.ts.out",
|
|
|
|
});
|
2019-09-10 11:09:54 -04:00
|
|
|
|
|
|
|
itest!(_025_hrtime {
|
|
|
|
args: "run --allow-hrtime --reload 025_hrtime.ts",
|
2019-09-19 14:48:05 -04:00
|
|
|
output: "025_hrtime.ts.out",
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
|
|
|
|
|
|
|
itest!(_025_reload_js_type_error {
|
|
|
|
args: "run --reload 025_reload_js_type_error.js",
|
2019-09-19 14:48:05 -04:00
|
|
|
output: "025_reload_js_type_error.js.out",
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
|
|
|
|
|
|
|
itest!(_026_redirect_javascript {
|
|
|
|
args: "run --reload 026_redirect_javascript.js",
|
2019-09-19 14:48:05 -04:00
|
|
|
output: "026_redirect_javascript.js.out",
|
|
|
|
http_server: true,
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
|
|
|
|
2020-03-03 12:22:53 -05:00
|
|
|
itest!(workers {
|
|
|
|
args: "run --reload --allow-net workers_test.ts",
|
|
|
|
http_server: true,
|
|
|
|
output: "workers_test.out",
|
2020-02-05 17:16:07 -05:00
|
|
|
});
|
|
|
|
|
2019-09-10 11:09:54 -04:00
|
|
|
itest!(_027_redirect_typescript {
|
|
|
|
args: "run --reload 027_redirect_typescript.ts",
|
2019-09-19 14:48:05 -04:00
|
|
|
output: "027_redirect_typescript.ts.out",
|
|
|
|
http_server: true,
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
|
|
|
|
|
|
|
itest!(_028_args {
|
2020-01-15 19:21:35 -05:00
|
|
|
args: "run --reload 028_args.ts --arg1 val1 --arg2=val2 -- arg3 arg4",
|
2019-09-19 14:48:05 -04:00
|
|
|
output: "028_args.ts.out",
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
|
|
|
|
|
|
|
itest!(_029_eval {
|
|
|
|
args: "eval console.log(\"hello\")",
|
2019-09-19 14:48:05 -04:00
|
|
|
output: "029_eval.out",
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
|
|
|
|
2020-02-28 09:17:56 -05:00
|
|
|
// Ugly parentheses due to whitespace delimiting problem.
|
|
|
|
itest!(_030_eval_ts {
|
|
|
|
args: "eval -T console.log((123)as(number))", // 'as' is a TS keyword only
|
|
|
|
output: "030_eval_ts.out",
|
|
|
|
});
|
|
|
|
|
2019-09-10 11:09:54 -04:00
|
|
|
itest!(_033_import_map {
|
|
|
|
args:
|
|
|
|
"run --reload --importmap=importmaps/import_map.json importmaps/test.ts",
|
2019-09-19 14:48:05 -04:00
|
|
|
output: "033_import_map.out",
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
|
|
|
|
|
|
|
itest!(_034_onload {
|
|
|
|
args: "run --reload 034_onload/main.ts",
|
2019-09-19 14:48:05 -04:00
|
|
|
output: "034_onload.out",
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
|
|
|
|
2020-03-03 16:02:35 -05:00
|
|
|
// TODO(ry) Re-enable flaky test https://github.com/denoland/deno/issues/4049
|
|
|
|
itest_ignore!(_035_cached_only_flag {
|
2019-09-19 14:48:05 -04:00
|
|
|
args:
|
2019-12-03 17:48:53 -05:00
|
|
|
"--reload --cached-only http://127.0.0.1:4545/cli/tests/019_media_types.ts",
|
|
|
|
output: "035_cached_only_flag.out",
|
2019-09-10 11:09:54 -04:00
|
|
|
exit_code: 1,
|
|
|
|
check_stderr: true,
|
2019-09-19 14:48:05 -04:00
|
|
|
http_server: true,
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
|
|
|
|
|
|
|
itest!(_036_import_map_fetch {
|
|
|
|
args:
|
|
|
|
"fetch --reload --importmap=importmaps/import_map.json importmaps/test.ts",
|
2019-09-19 14:48:05 -04:00
|
|
|
output: "036_import_map_fetch.out",
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
|
|
|
|
2020-01-31 16:07:37 -05:00
|
|
|
itest!(_037_fetch_multiple {
|
|
|
|
args: "fetch --reload fetch/test.ts fetch/other.ts",
|
|
|
|
check_stderr: true,
|
|
|
|
http_server: true,
|
|
|
|
output: "037_fetch_multiple.out",
|
|
|
|
});
|
|
|
|
|
2019-09-10 11:09:54 -04:00
|
|
|
itest!(_038_checkjs {
|
|
|
|
// checking if JS file is run through TS compiler
|
|
|
|
args: "run --reload --config 038_checkjs.tsconfig.json 038_checkjs.js",
|
|
|
|
check_stderr: true,
|
|
|
|
exit_code: 1,
|
2019-09-19 14:48:05 -04:00
|
|
|
output: "038_checkjs.js.out",
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
|
|
|
|
2020-03-03 16:02:35 -05:00
|
|
|
// TODO(bartlomieju): re-enable
|
|
|
|
itest_ignore!(_039_worker_deno_ns {
|
2019-09-10 11:09:54 -04:00
|
|
|
args: "run --reload 039_worker_deno_ns.ts",
|
2019-09-19 14:48:05 -04:00
|
|
|
output: "039_worker_deno_ns.ts.out",
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
|
|
|
|
2020-03-03 16:02:35 -05:00
|
|
|
itest_ignore!(_040_worker_blob {
|
2019-09-10 11:09:54 -04:00
|
|
|
args: "run --reload 040_worker_blob.ts",
|
2019-09-19 14:48:05 -04:00
|
|
|
output: "040_worker_blob.ts.out",
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
|
|
|
|
|
|
|
itest!(_041_dyn_import_eval {
|
|
|
|
args: "eval import('./subdir/mod4.js').then(console.log)",
|
2019-09-19 14:48:05 -04:00
|
|
|
output: "041_dyn_import_eval.out",
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
|
|
|
|
|
|
|
itest!(_041_info_flag {
|
|
|
|
args: "info",
|
2019-09-19 14:48:05 -04:00
|
|
|
output: "041_info_flag.out",
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
|
|
|
|
|
|
|
itest!(_042_dyn_import_evalcontext {
|
|
|
|
args: "run --allow-read --reload 042_dyn_import_evalcontext.ts",
|
2019-09-19 14:48:05 -04:00
|
|
|
output: "042_dyn_import_evalcontext.ts.out",
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
|
|
|
|
2019-09-24 10:46:57 -04:00
|
|
|
itest!(_044_bad_resource {
|
|
|
|
args: "run --reload --allow-read 044_bad_resource.ts",
|
|
|
|
output: "044_bad_resource.ts.out",
|
|
|
|
check_stderr: true,
|
|
|
|
exit_code: 1,
|
|
|
|
});
|
|
|
|
|
2020-03-03 16:02:35 -05:00
|
|
|
itest_ignore!(_045_proxy {
|
2019-09-24 18:52:01 -04:00
|
|
|
args: "run --allow-net --allow-env --allow-run --reload 045_proxy_test.ts",
|
|
|
|
output: "045_proxy_test.ts.out",
|
2019-10-22 09:52:41 -04:00
|
|
|
http_server: true,
|
2019-09-24 18:52:01 -04:00
|
|
|
});
|
|
|
|
|
2019-10-02 10:46:36 -04:00
|
|
|
itest!(_046_tsx {
|
|
|
|
args: "run --reload 046_jsx_test.tsx",
|
|
|
|
output: "046_jsx_test.tsx.out",
|
|
|
|
});
|
|
|
|
|
|
|
|
itest!(_047_jsx {
|
|
|
|
args: "run --reload 047_jsx_test.jsx",
|
|
|
|
output: "047_jsx_test.jsx.out",
|
|
|
|
});
|
|
|
|
|
2020-03-03 16:02:35 -05:00
|
|
|
// TODO(ry) Re-enable flaky test https://github.com/denoland/deno/issues/4049
|
|
|
|
itest_ignore!(_048_media_types_jsx {
|
2019-10-16 13:35:04 -04:00
|
|
|
args: "run --reload 048_media_types_jsx.ts",
|
|
|
|
output: "048_media_types_jsx.ts.out",
|
|
|
|
http_server: true,
|
|
|
|
});
|
|
|
|
|
2020-03-03 16:02:35 -05:00
|
|
|
// TODO(ry) Re-enable flaky test https://github.com/denoland/deno/issues/4049
|
|
|
|
itest_ignore!(_049_info_flag_script_jsx {
|
2019-10-16 13:35:04 -04:00
|
|
|
args: "info http://127.0.0.1:4545/cli/tests/048_media_types_jsx.ts",
|
|
|
|
output: "049_info_flag_script_jsx.out",
|
|
|
|
http_server: true,
|
|
|
|
});
|
|
|
|
|
2019-10-26 21:04:34 -04:00
|
|
|
itest!(_050_more_jsons {
|
|
|
|
args: "run --reload 050_more_jsons.ts",
|
|
|
|
output: "050_more_jsons.ts.out",
|
|
|
|
});
|
|
|
|
|
2019-11-14 08:31:39 -05:00
|
|
|
itest!(_051_wasm_import {
|
|
|
|
args: "run --reload --allow-net --allow-read 051_wasm_import.ts",
|
|
|
|
output: "051_wasm_import.ts.out",
|
|
|
|
http_server: true,
|
|
|
|
});
|
|
|
|
|
2020-03-03 16:02:35 -05:00
|
|
|
// TODO(ry) Re-enable flaky test https://github.com/denoland/deno/issues/4049
|
|
|
|
itest_ignore!(_052_no_remote_flag {
|
2019-12-03 17:48:53 -05:00
|
|
|
args:
|
|
|
|
"--reload --no-remote http://127.0.0.1:4545/cli/tests/019_media_types.ts",
|
|
|
|
output: "052_no_remote_flag.out",
|
|
|
|
exit_code: 1,
|
|
|
|
check_stderr: true,
|
|
|
|
http_server: true,
|
|
|
|
});
|
|
|
|
|
2020-01-25 12:53:16 -05:00
|
|
|
itest!(_054_info_local_imports {
|
|
|
|
args: "info 005_more_imports.ts",
|
|
|
|
output: "054_info_local_imports.out",
|
|
|
|
exit_code: 0,
|
|
|
|
});
|
|
|
|
|
2020-02-25 09:23:23 -05:00
|
|
|
itest!(_055_import_wasm_via_network {
|
|
|
|
args: "run --reload http://127.0.0.1:4545/cli/tests/055_import_wasm_via_network.ts",
|
|
|
|
output: "055_import_wasm_via_network.ts.out",
|
|
|
|
http_server: true,
|
|
|
|
});
|
|
|
|
|
|
|
|
itest!(_056_make_temp_file_write_perm {
|
|
|
|
args: "run --allow-write=./subdir/ 056_make_temp_file_write_perm.ts",
|
|
|
|
output: "056_make_temp_file_write_perm.out",
|
|
|
|
});
|
|
|
|
|
2020-02-28 09:47:54 -05:00
|
|
|
itest!(_057_revoke_permissions {
|
|
|
|
args: "test -A 057_revoke_permissions.ts",
|
|
|
|
output: "057_revoke_permissions.out",
|
|
|
|
});
|
|
|
|
|
2020-02-16 05:11:44 -05:00
|
|
|
itest!(js_import_detect {
|
|
|
|
args: "run --reload js_import_detect.ts",
|
|
|
|
output: "js_import_detect.ts.out",
|
|
|
|
exit_code: 0,
|
|
|
|
});
|
|
|
|
|
2020-01-26 13:43:59 -05:00
|
|
|
itest!(lock_write_fetch {
|
|
|
|
args:
|
|
|
|
"run --allow-read --allow-write --allow-env --allow-run lock_write_fetch.ts",
|
|
|
|
output: "lock_write_fetch.ts.out",
|
|
|
|
exit_code: 0,
|
|
|
|
});
|
|
|
|
|
2019-11-03 10:39:27 -05:00
|
|
|
itest!(lock_check_ok {
|
|
|
|
args: "run --lock=lock_check_ok.json http://127.0.0.1:4545/cli/tests/003_relative_import.ts",
|
|
|
|
output: "003_relative_import.ts.out",
|
|
|
|
http_server: true,
|
|
|
|
});
|
|
|
|
|
2020-03-03 16:02:35 -05:00
|
|
|
// TODO(ry) Re-enable flaky test https://github.com/denoland/deno/issues/4049
|
|
|
|
itest_ignore!(lock_check_ok2 {
|
2019-11-03 10:39:27 -05:00
|
|
|
args: "run 019_media_types.ts --lock=lock_check_ok2.json",
|
|
|
|
output: "019_media_types.ts.out",
|
|
|
|
http_server: true,
|
|
|
|
});
|
|
|
|
|
|
|
|
itest!(lock_check_err {
|
|
|
|
args: "run --lock=lock_check_err.json http://127.0.0.1:4545/cli/tests/003_relative_import.ts",
|
|
|
|
output: "lock_check_err.out",
|
|
|
|
check_stderr: true,
|
|
|
|
exit_code: 10,
|
|
|
|
http_server: true,
|
|
|
|
});
|
|
|
|
|
2020-03-03 16:02:35 -05:00
|
|
|
// TODO(ry) Re-enable flaky test https://github.com/denoland/deno/issues/4049
|
|
|
|
itest_ignore!(lock_check_err2 {
|
2019-11-26 11:06:32 -05:00
|
|
|
args: "run --lock=lock_check_err2.json 019_media_types.ts",
|
2019-11-03 10:39:27 -05:00
|
|
|
output: "lock_check_err2.out",
|
|
|
|
check_stderr: true,
|
|
|
|
exit_code: 10,
|
|
|
|
http_server: true,
|
|
|
|
});
|
|
|
|
|
2019-09-10 11:09:54 -04:00
|
|
|
itest!(async_error {
|
|
|
|
exit_code: 1,
|
|
|
|
args: "run --reload async_error.ts",
|
|
|
|
check_stderr: true,
|
2019-09-19 14:48:05 -04:00
|
|
|
output: "async_error.ts.out",
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
|
|
|
|
2019-11-13 10:35:56 -05:00
|
|
|
itest!(bundle {
|
|
|
|
args: "bundle subdir/mod1.ts",
|
|
|
|
output: "bundle.test.out",
|
|
|
|
});
|
|
|
|
|
2020-02-09 05:19:05 -05:00
|
|
|
itest!(fmt_stdin {
|
|
|
|
args: "fmt -",
|
|
|
|
input: Some("const a = 1\n"),
|
|
|
|
output_str: Some("const a = 1;\n"),
|
|
|
|
});
|
|
|
|
|
|
|
|
itest!(fmt_stdin_check_formatted {
|
|
|
|
args: "fmt --check -",
|
|
|
|
input: Some("const a = 1;\n"),
|
|
|
|
output_str: Some(""),
|
|
|
|
});
|
|
|
|
|
|
|
|
itest!(fmt_stdin_check_not_formatted {
|
|
|
|
args: "fmt --check -",
|
|
|
|
input: Some("const a = 1\n"),
|
|
|
|
output_str: Some("Not formatted stdin\n"),
|
|
|
|
});
|
|
|
|
|
2019-09-10 11:09:54 -04:00
|
|
|
itest!(circular1 {
|
|
|
|
args: "run --reload circular1.js",
|
2019-09-19 14:48:05 -04:00
|
|
|
output: "circular1.js.out",
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
|
|
|
|
|
|
|
itest!(config {
|
|
|
|
args: "run --reload --config config.tsconfig.json config.ts",
|
|
|
|
check_stderr: true,
|
|
|
|
exit_code: 1,
|
2019-09-19 14:48:05 -04:00
|
|
|
output: "config.ts.out",
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
|
|
|
|
|
|
|
itest!(error_001 {
|
|
|
|
args: "run --reload error_001.ts",
|
|
|
|
check_stderr: true,
|
|
|
|
exit_code: 1,
|
2019-09-19 14:48:05 -04:00
|
|
|
output: "error_001.ts.out",
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
|
|
|
|
|
|
|
itest!(error_002 {
|
|
|
|
args: "run --reload error_002.ts",
|
|
|
|
check_stderr: true,
|
|
|
|
exit_code: 1,
|
2019-09-19 14:48:05 -04:00
|
|
|
output: "error_002.ts.out",
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
|
|
|
|
|
|
|
itest!(error_003_typescript {
|
|
|
|
args: "run --reload error_003_typescript.ts",
|
|
|
|
check_stderr: true,
|
|
|
|
exit_code: 1,
|
2019-09-19 14:48:05 -04:00
|
|
|
output: "error_003_typescript.ts.out",
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
|
|
|
|
|
|
|
// Supposing that we've already attempted to run error_003_typescript.ts
|
|
|
|
// we want to make sure that JS wasn't emitted. Running again without reload flag
|
|
|
|
// should result in the same output.
|
|
|
|
// https://github.com/denoland/deno/issues/2436
|
|
|
|
itest!(error_003_typescript2 {
|
|
|
|
args: "run error_003_typescript.ts",
|
|
|
|
check_stderr: true,
|
|
|
|
exit_code: 1,
|
2019-09-19 14:48:05 -04:00
|
|
|
output: "error_003_typescript.ts.out",
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
|
|
|
|
|
|
|
itest!(error_004_missing_module {
|
|
|
|
args: "run --reload error_004_missing_module.ts",
|
|
|
|
check_stderr: true,
|
|
|
|
exit_code: 1,
|
2019-09-19 14:48:05 -04:00
|
|
|
output: "error_004_missing_module.ts.out",
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
|
|
|
|
|
|
|
itest!(error_005_missing_dynamic_import {
|
|
|
|
args: "run --reload error_005_missing_dynamic_import.ts",
|
|
|
|
check_stderr: true,
|
|
|
|
exit_code: 1,
|
2019-09-19 14:48:05 -04:00
|
|
|
output: "error_005_missing_dynamic_import.ts.out",
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
|
|
|
|
|
|
|
itest!(error_006_import_ext_failure {
|
|
|
|
args: "run --reload error_006_import_ext_failure.ts",
|
|
|
|
check_stderr: true,
|
|
|
|
exit_code: 1,
|
2019-09-19 14:48:05 -04:00
|
|
|
output: "error_006_import_ext_failure.ts.out",
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
|
|
|
|
|
|
|
itest!(error_007_any {
|
|
|
|
args: "run --reload error_007_any.ts",
|
|
|
|
check_stderr: true,
|
|
|
|
exit_code: 1,
|
2019-09-19 14:48:05 -04:00
|
|
|
output: "error_007_any.ts.out",
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
|
|
|
|
|
|
|
itest!(error_008_checkjs {
|
|
|
|
args: "run --reload error_008_checkjs.js",
|
|
|
|
check_stderr: true,
|
|
|
|
exit_code: 1,
|
2019-09-19 14:48:05 -04:00
|
|
|
output: "error_008_checkjs.js.out",
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
|
|
|
|
|
|
|
itest!(error_011_bad_module_specifier {
|
|
|
|
args: "run --reload error_011_bad_module_specifier.ts",
|
|
|
|
check_stderr: true,
|
|
|
|
exit_code: 1,
|
2019-09-19 14:48:05 -04:00
|
|
|
output: "error_011_bad_module_specifier.ts.out",
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
|
|
|
|
|
|
|
itest!(error_012_bad_dynamic_import_specifier {
|
|
|
|
args: "run --reload error_012_bad_dynamic_import_specifier.ts",
|
|
|
|
check_stderr: true,
|
|
|
|
exit_code: 1,
|
2019-09-19 14:48:05 -04:00
|
|
|
output: "error_012_bad_dynamic_import_specifier.ts.out",
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
|
|
|
|
|
|
|
itest!(error_013_missing_script {
|
|
|
|
args: "run --reload missing_file_name",
|
|
|
|
check_stderr: true,
|
|
|
|
exit_code: 1,
|
2019-09-19 14:48:05 -04:00
|
|
|
output: "error_013_missing_script.out",
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
|
|
|
|
|
|
|
itest!(error_014_catch_dynamic_import_error {
|
2019-11-26 11:06:32 -05:00
|
|
|
args: "run --reload --allow-read error_014_catch_dynamic_import_error.js",
|
2019-09-19 14:48:05 -04:00
|
|
|
output: "error_014_catch_dynamic_import_error.js.out",
|
2019-09-24 18:37:04 -04:00
|
|
|
exit_code: 1,
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
|
|
|
|
|
|
|
itest!(error_015_dynamic_import_permissions {
|
2019-10-22 19:35:43 -04:00
|
|
|
args: "--reload error_015_dynamic_import_permissions.js",
|
2019-09-19 14:48:05 -04:00
|
|
|
output: "error_015_dynamic_import_permissions.out",
|
2019-09-10 11:09:54 -04:00
|
|
|
check_stderr: true,
|
|
|
|
exit_code: 1,
|
2019-09-19 14:48:05 -04:00
|
|
|
http_server: true,
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
|
|
|
|
|
|
|
// We have an allow-net flag but not allow-read, it should still result in error.
|
|
|
|
itest!(error_016_dynamic_import_permissions2 {
|
2019-10-22 19:35:43 -04:00
|
|
|
args: "--reload --allow-net error_016_dynamic_import_permissions2.js",
|
2019-09-19 14:48:05 -04:00
|
|
|
output: "error_016_dynamic_import_permissions2.out",
|
2019-09-10 11:09:54 -04:00
|
|
|
check_stderr: true,
|
|
|
|
exit_code: 1,
|
2019-09-19 14:48:05 -04:00
|
|
|
http_server: true,
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
|
|
|
|
|
|
|
itest!(error_stack {
|
|
|
|
args: "run --reload error_stack.ts",
|
|
|
|
check_stderr: true,
|
|
|
|
exit_code: 1,
|
2019-09-19 14:48:05 -04:00
|
|
|
output: "error_stack.ts.out",
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
|
|
|
|
|
|
|
itest!(error_syntax {
|
|
|
|
args: "run --reload error_syntax.js",
|
|
|
|
check_stderr: true,
|
|
|
|
exit_code: 1,
|
2019-09-19 14:48:05 -04:00
|
|
|
output: "error_syntax.js.out",
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
|
|
|
|
|
|
|
itest!(error_type_definitions {
|
|
|
|
args: "run --reload error_type_definitions.ts",
|
|
|
|
check_stderr: true,
|
|
|
|
exit_code: 1,
|
2019-09-19 14:48:05 -04:00
|
|
|
output: "error_type_definitions.ts.out",
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
|
|
|
|
2020-03-03 16:02:35 -05:00
|
|
|
// TODO(bartlomieju) Re-enable
|
|
|
|
itest_ignore!(error_worker_dynamic {
|
2019-09-25 10:46:58 -04:00
|
|
|
args: "run --reload error_worker_dynamic.ts",
|
|
|
|
check_stderr: true,
|
|
|
|
exit_code: 1,
|
|
|
|
output: "error_worker_dynamic.ts.out",
|
|
|
|
});
|
|
|
|
|
2019-09-10 11:09:54 -04:00
|
|
|
itest!(exit_error42 {
|
|
|
|
exit_code: 42,
|
|
|
|
args: "run --reload exit_error42.ts",
|
2019-09-19 14:48:05 -04:00
|
|
|
output: "exit_error42.ts.out",
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
|
|
|
|
|
|
|
itest!(https_import {
|
|
|
|
args: "run --reload https_import.ts",
|
2019-09-19 14:48:05 -04:00
|
|
|
output: "https_import.ts.out",
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
|
|
|
|
|
|
|
itest!(if_main {
|
|
|
|
args: "run --reload if_main.ts",
|
2019-09-19 14:48:05 -04:00
|
|
|
output: "if_main.ts.out",
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
|
|
|
|
|
|
|
itest!(import_meta {
|
|
|
|
args: "run --reload import_meta.ts",
|
2019-09-19 14:48:05 -04:00
|
|
|
output: "import_meta.ts.out",
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
|
|
|
|
2020-02-19 00:34:11 -05:00
|
|
|
itest!(lib_ref {
|
|
|
|
args: "run --reload lib_ref.ts",
|
|
|
|
output: "lib_ref.ts.out",
|
|
|
|
});
|
|
|
|
|
|
|
|
itest!(lib_runtime_api {
|
|
|
|
args: "run --reload lib_runtime_api.ts",
|
|
|
|
output: "lib_runtime_api.ts.out",
|
|
|
|
});
|
|
|
|
|
2019-09-10 11:09:54 -04:00
|
|
|
itest!(seed_random {
|
|
|
|
args: "run --seed=100 seed_random.js",
|
2019-09-19 14:48:05 -04:00
|
|
|
output: "seed_random.js.out",
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
|
|
|
|
|
|
|
itest!(type_definitions {
|
|
|
|
args: "run --reload type_definitions.ts",
|
2019-09-19 14:48:05 -04:00
|
|
|
output: "type_definitions.ts.out",
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
|
|
|
|
2020-01-26 13:59:41 -05:00
|
|
|
itest!(type_directives_01 {
|
|
|
|
args: "run --reload -L debug type_directives_01.ts",
|
|
|
|
output: "type_directives_01.ts.out",
|
|
|
|
http_server: true,
|
|
|
|
});
|
|
|
|
|
|
|
|
itest!(type_directives_02 {
|
|
|
|
args: "run --reload -L debug type_directives_02.ts",
|
|
|
|
output: "type_directives_02.ts.out",
|
|
|
|
});
|
|
|
|
|
2019-09-10 11:09:54 -04:00
|
|
|
itest!(types {
|
|
|
|
args: "types",
|
2019-09-19 14:48:05 -04:00
|
|
|
output: "types.out",
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
|
|
|
|
|
|
|
itest!(unbuffered_stderr {
|
|
|
|
args: "run --reload unbuffered_stderr.ts",
|
|
|
|
check_stderr: true,
|
2019-09-19 14:48:05 -04:00
|
|
|
output: "unbuffered_stderr.ts.out",
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
|
|
|
|
|
|
|
itest!(unbuffered_stdout {
|
|
|
|
args: "run --reload unbuffered_stdout.ts",
|
2019-09-19 14:48:05 -04:00
|
|
|
output: "unbuffered_stdout.ts.out",
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
|
|
|
|
2020-01-26 09:49:34 -05:00
|
|
|
// Cannot write the expression to evaluate as "console.log(typeof gc)"
|
|
|
|
// because itest! splits args on whitespace.
|
|
|
|
itest!(eval_v8_flags {
|
|
|
|
args: "eval --v8-flags=--expose-gc console.log(typeof(gc))",
|
|
|
|
output: "v8_flags.js.out",
|
|
|
|
});
|
|
|
|
|
|
|
|
itest!(run_v8_flags {
|
2019-09-10 11:09:54 -04:00
|
|
|
args: "run --v8-flags=--expose-gc v8_flags.js",
|
2019-09-19 14:48:05 -04:00
|
|
|
output: "v8_flags.js.out",
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
|
|
|
|
2020-01-26 09:49:34 -05:00
|
|
|
itest!(run_v8_help {
|
2020-02-04 14:24:33 -05:00
|
|
|
args: "--v8-flags=--help",
|
2019-09-19 14:48:05 -04:00
|
|
|
output: "v8_help.out",
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
|
|
|
|
|
|
|
itest!(wasm {
|
|
|
|
args: "run wasm.ts",
|
2019-09-19 14:48:05 -04:00
|
|
|
output: "wasm.ts.out",
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
|
|
|
|
|
|
|
itest!(wasm_async {
|
|
|
|
args: "wasm_async.js",
|
2019-09-19 14:48:05 -04:00
|
|
|
output: "wasm_async.out",
|
2019-09-10 11:09:54 -04:00
|
|
|
});
|
2019-09-24 18:37:04 -04:00
|
|
|
|
|
|
|
itest!(top_level_await {
|
|
|
|
args: "--allow-read top_level_await.js",
|
|
|
|
output: "top_level_await.out",
|
|
|
|
});
|
2019-09-30 12:38:23 -04:00
|
|
|
|
|
|
|
itest!(top_level_await_ts {
|
|
|
|
args: "--allow-read top_level_await.ts",
|
|
|
|
output: "top_level_await.out",
|
|
|
|
});
|
2019-10-27 09:04:42 -04:00
|
|
|
|
|
|
|
itest!(top_level_for_await {
|
|
|
|
args: "top_level_for_await.js",
|
|
|
|
output: "top_level_for_await.out",
|
|
|
|
});
|
|
|
|
|
|
|
|
itest!(top_level_for_await_ts {
|
|
|
|
args: "top_level_for_await.ts",
|
|
|
|
output: "top_level_for_await.out",
|
|
|
|
});
|
2019-10-29 17:52:57 -04:00
|
|
|
|
2020-01-11 05:11:05 -05:00
|
|
|
itest!(_053_import_compression {
|
|
|
|
args: "run --reload --allow-net 053_import_compression/main.ts",
|
|
|
|
output: "053_import_compression.out",
|
|
|
|
http_server: true,
|
|
|
|
});
|
|
|
|
|
2020-02-17 11:59:51 -05:00
|
|
|
itest!(cafile_url_imports {
|
|
|
|
args: "run --reload --cert tls/RootCA.pem cafile_url_imports.ts",
|
|
|
|
output: "cafile_url_imports.ts.out",
|
|
|
|
http_server: true,
|
|
|
|
});
|
|
|
|
|
|
|
|
itest!(cafile_ts_fetch {
|
|
|
|
args: "run --reload --allow-net --cert tls/RootCA.pem cafile_ts_fetch.ts",
|
|
|
|
output: "cafile_ts_fetch.ts.out",
|
|
|
|
http_server: true,
|
|
|
|
});
|
|
|
|
|
|
|
|
itest!(cafile_eval {
|
|
|
|
args: "eval --cert tls/RootCA.pem fetch('https://localhost:5545/cli/tests/cafile_ts_fetch.ts.out').then(r=>r.text()).then(t=>console.log(t.trimEnd()))",
|
|
|
|
output: "cafile_ts_fetch.ts.out",
|
|
|
|
http_server: true,
|
|
|
|
});
|
|
|
|
|
|
|
|
itest!(cafile_info {
|
|
|
|
args:
|
|
|
|
"info --cert tls/RootCA.pem https://localhost:5545/cli/tests/cafile_info.ts",
|
|
|
|
output: "cafile_info.ts.out",
|
|
|
|
http_server: true,
|
|
|
|
});
|
|
|
|
|
2020-02-25 03:32:43 -05:00
|
|
|
itest!(fix_js_import_js {
|
|
|
|
args: "run --reload fix_js_import_js.ts",
|
|
|
|
output: "fix_js_import_js.ts.out",
|
|
|
|
});
|
|
|
|
|
2020-02-19 22:58:05 -05:00
|
|
|
itest!(fix_js_imports {
|
|
|
|
args: "run --reload fix_js_imports.ts",
|
|
|
|
output: "fix_js_imports.ts.out",
|
|
|
|
});
|
|
|
|
|
2020-02-17 11:59:51 -05:00
|
|
|
#[test]
|
|
|
|
fn cafile_fetch() {
|
2020-02-19 08:17:13 -05:00
|
|
|
use deno::http_cache::url_to_filename;
|
2020-02-17 11:59:51 -05:00
|
|
|
pub use deno::test_util::*;
|
|
|
|
use std::process::Command;
|
|
|
|
use tempfile::TempDir;
|
2020-02-19 08:17:13 -05:00
|
|
|
use url::Url;
|
2020-02-17 11:59:51 -05:00
|
|
|
|
|
|
|
let g = util::http_server();
|
|
|
|
|
|
|
|
let deno_dir = TempDir::new().expect("tempdir fail");
|
2020-02-19 08:17:13 -05:00
|
|
|
let module_url =
|
|
|
|
Url::parse("http://localhost:4545/cli/tests/cafile_url_imports.ts")
|
|
|
|
.unwrap();
|
2020-02-17 11:59:51 -05:00
|
|
|
let cafile = util::root_path().join("cli/tests/tls/RootCA.pem");
|
|
|
|
let output = Command::new(deno_exe_path())
|
|
|
|
.env("DENO_DIR", deno_dir.path())
|
|
|
|
.current_dir(util::root_path())
|
|
|
|
.arg("fetch")
|
|
|
|
.arg("--cert")
|
|
|
|
.arg(cafile)
|
2020-02-19 08:17:13 -05:00
|
|
|
.arg(module_url.to_string())
|
2020-02-17 11:59:51 -05:00
|
|
|
.output()
|
|
|
|
.expect("Failed to spawn script");
|
|
|
|
|
|
|
|
let code = output.status.code();
|
|
|
|
let out = std::str::from_utf8(&output.stdout).unwrap();
|
|
|
|
|
|
|
|
assert_eq!(Some(0), code);
|
|
|
|
assert_eq!(out, "");
|
|
|
|
|
|
|
|
let expected_path = deno_dir
|
|
|
|
.path()
|
2020-02-19 08:17:13 -05:00
|
|
|
.join("deps")
|
|
|
|
.join(url_to_filename(&module_url));
|
2020-02-17 11:59:51 -05:00
|
|
|
assert_eq!(expected_path.exists(), true);
|
|
|
|
|
|
|
|
drop(g);
|
|
|
|
}
|
|
|
|
|
2020-03-03 16:02:35 -05:00
|
|
|
// TODO(ry) Re-enable this broken test.
|
2020-02-17 11:59:51 -05:00
|
|
|
#[test]
|
2020-03-03 16:02:35 -05:00
|
|
|
#[ignore]
|
2020-02-17 11:59:51 -05:00
|
|
|
fn cafile_install_remote_module() {
|
|
|
|
pub use deno::test_util::*;
|
|
|
|
use std::env;
|
|
|
|
use std::path::PathBuf;
|
|
|
|
use std::process::Command;
|
|
|
|
use tempfile::TempDir;
|
|
|
|
|
|
|
|
let g = util::http_server();
|
|
|
|
let temp_dir = TempDir::new().expect("tempdir fail");
|
|
|
|
let deno_dir = TempDir::new().expect("tempdir fail");
|
|
|
|
let cafile = util::root_path().join("cli/tests/tls/RootCA.pem");
|
|
|
|
|
|
|
|
let install_output = Command::new(deno_exe_path())
|
|
|
|
.env("DENO_DIR", deno_dir.path())
|
|
|
|
.current_dir(util::root_path())
|
|
|
|
.arg("install")
|
|
|
|
.arg("--cert")
|
|
|
|
.arg(cafile)
|
|
|
|
.arg("--dir")
|
|
|
|
.arg(temp_dir.path())
|
|
|
|
.arg("echo_test")
|
|
|
|
.arg("https://localhost:5545/cli/tests/echo.ts")
|
|
|
|
.output()
|
|
|
|
.expect("Failed to spawn script");
|
|
|
|
|
|
|
|
let code = install_output.status.code();
|
|
|
|
assert_eq!(Some(0), code);
|
|
|
|
|
|
|
|
let mut file_path = temp_dir.path().join("echo_test");
|
|
|
|
if cfg!(windows) {
|
|
|
|
file_path = file_path.with_extension(".cmd");
|
|
|
|
}
|
|
|
|
assert!(file_path.exists());
|
|
|
|
|
|
|
|
let path_var_name = if cfg!(windows) { "Path" } else { "PATH" };
|
|
|
|
let paths_var = env::var_os(path_var_name).expect("PATH not set");
|
|
|
|
let mut paths: Vec<PathBuf> = env::split_paths(&paths_var).collect();
|
|
|
|
paths.push(temp_dir.path().to_owned());
|
|
|
|
paths.push(util::target_dir());
|
|
|
|
let path_var_value = env::join_paths(paths).expect("Can't create PATH");
|
|
|
|
|
|
|
|
let output = Command::new(file_path)
|
|
|
|
.current_dir(temp_dir.path())
|
|
|
|
.arg("foo")
|
|
|
|
.env(path_var_name, path_var_value)
|
|
|
|
.output()
|
|
|
|
.expect("failed to spawn script");
|
|
|
|
assert!(std::str::from_utf8(&output.stdout)
|
|
|
|
.unwrap()
|
|
|
|
.trim()
|
|
|
|
.ends_with("foo"));
|
|
|
|
|
|
|
|
drop(deno_dir);
|
|
|
|
drop(temp_dir);
|
|
|
|
drop(g)
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn cafile_bundle_remote_exports() {
|
|
|
|
use tempfile::TempDir;
|
|
|
|
|
|
|
|
let g = util::http_server();
|
|
|
|
|
|
|
|
// First we have to generate a bundle of some remote module that has exports.
|
|
|
|
let mod1 = "https://localhost:5545/cli/tests/subdir/mod1.ts";
|
|
|
|
let cafile = util::root_path().join("cli/tests/tls/RootCA.pem");
|
|
|
|
let t = TempDir::new().expect("tempdir fail");
|
|
|
|
let bundle = t.path().join("mod1.bundle.js");
|
|
|
|
let mut deno = util::deno_cmd()
|
|
|
|
.current_dir(util::root_path())
|
|
|
|
.arg("bundle")
|
|
|
|
.arg("--cert")
|
|
|
|
.arg(cafile)
|
|
|
|
.arg(mod1)
|
|
|
|
.arg(&bundle)
|
|
|
|
.spawn()
|
|
|
|
.expect("failed to spawn script");
|
|
|
|
let status = deno.wait().expect("failed to wait for the child process");
|
|
|
|
assert!(status.success());
|
|
|
|
assert!(bundle.is_file());
|
|
|
|
|
|
|
|
// Now we try to use that bundle from another module.
|
|
|
|
let test = t.path().join("test.js");
|
|
|
|
std::fs::write(
|
|
|
|
&test,
|
|
|
|
"
|
|
|
|
import { printHello3 } from \"./mod1.bundle.js\";
|
|
|
|
printHello3(); ",
|
|
|
|
)
|
|
|
|
.expect("error writing file");
|
|
|
|
|
|
|
|
let output = util::deno_cmd()
|
|
|
|
.current_dir(util::root_path())
|
|
|
|
.arg("run")
|
|
|
|
.arg(&test)
|
|
|
|
.output()
|
|
|
|
.expect("failed to spawn script");
|
|
|
|
// check the output of the test.ts program.
|
|
|
|
assert!(std::str::from_utf8(&output.stdout)
|
|
|
|
.unwrap()
|
|
|
|
.trim()
|
|
|
|
.ends_with("Hello"));
|
|
|
|
assert_eq!(output.stderr, b"");
|
|
|
|
|
|
|
|
drop(g)
|
|
|
|
}
|
|
|
|
|
2020-02-25 15:36:35 -05:00
|
|
|
#[test]
|
|
|
|
fn test_permissions_with_allow() {
|
|
|
|
for permission in &util::PERMISSION_VARIANTS {
|
2020-03-07 05:27:16 -05:00
|
|
|
let (_, err) = util::run_and_collect_output(
|
|
|
|
true,
|
2020-02-25 15:36:35 -05:00
|
|
|
&format!("run --allow-{0} permission_test.ts {0}Required", permission),
|
|
|
|
None,
|
|
|
|
None,
|
2020-03-01 19:51:54 -05:00
|
|
|
false,
|
2020-02-25 15:36:35 -05:00
|
|
|
);
|
|
|
|
assert!(!err.contains(util::PERMISSION_DENIED_PATTERN));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_permissions_without_allow() {
|
|
|
|
for permission in &util::PERMISSION_VARIANTS {
|
2020-03-07 05:27:16 -05:00
|
|
|
let (_, err) = util::run_and_collect_output(
|
|
|
|
false,
|
2020-02-25 15:36:35 -05:00
|
|
|
&format!("run permission_test.ts {0}Required", permission),
|
|
|
|
None,
|
|
|
|
None,
|
2020-03-01 19:51:54 -05:00
|
|
|
false,
|
2020-02-25 15:36:35 -05:00
|
|
|
);
|
|
|
|
assert!(err.contains(util::PERMISSION_DENIED_PATTERN));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-03-01 19:51:54 -05:00
|
|
|
#[test]
|
|
|
|
fn test_permissions_rw_inside_project_dir() {
|
|
|
|
const PERMISSION_VARIANTS: [&str; 2] = ["read", "write"];
|
|
|
|
for permission in &PERMISSION_VARIANTS {
|
2020-03-07 05:27:16 -05:00
|
|
|
let (_, err) = util::run_and_collect_output(
|
|
|
|
true,
|
2020-03-01 19:51:54 -05:00
|
|
|
&format!(
|
|
|
|
"run --allow-{0}={1} complex_permissions_test.ts {0} {2} {2}",
|
|
|
|
permission,
|
|
|
|
util::root_path().into_os_string().into_string().unwrap(),
|
|
|
|
"complex_permissions_test.ts"
|
|
|
|
),
|
|
|
|
None,
|
|
|
|
None,
|
|
|
|
false,
|
|
|
|
);
|
|
|
|
assert!(!err.contains(util::PERMISSION_DENIED_PATTERN));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_permissions_rw_outside_test_dir() {
|
|
|
|
const PERMISSION_VARIANTS: [&str; 2] = ["read", "write"];
|
|
|
|
for permission in &PERMISSION_VARIANTS {
|
2020-03-07 05:27:16 -05:00
|
|
|
let (_, err) = util::run_and_collect_output(
|
|
|
|
false,
|
2020-03-01 19:51:54 -05:00
|
|
|
&format!(
|
|
|
|
"run --allow-{0}={1} complex_permissions_test.ts {0} {2}",
|
|
|
|
permission,
|
|
|
|
util::root_path()
|
|
|
|
.join("cli")
|
|
|
|
.join("tests")
|
|
|
|
.into_os_string()
|
|
|
|
.into_string()
|
|
|
|
.unwrap(),
|
|
|
|
util::root_path()
|
|
|
|
.join("Cargo.toml")
|
|
|
|
.into_os_string()
|
|
|
|
.into_string()
|
|
|
|
.unwrap(),
|
|
|
|
),
|
|
|
|
None,
|
|
|
|
None,
|
|
|
|
false,
|
|
|
|
);
|
|
|
|
assert!(err.contains(util::PERMISSION_DENIED_PATTERN));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_permissions_rw_inside_test_dir() {
|
|
|
|
const PERMISSION_VARIANTS: [&str; 2] = ["read", "write"];
|
|
|
|
for permission in &PERMISSION_VARIANTS {
|
2020-03-07 05:27:16 -05:00
|
|
|
let (_, err) = util::run_and_collect_output(
|
|
|
|
true,
|
2020-03-01 19:51:54 -05:00
|
|
|
&format!(
|
|
|
|
"run --allow-{0}={1} complex_permissions_test.ts {0} {2}",
|
|
|
|
permission,
|
|
|
|
util::root_path()
|
|
|
|
.join("cli")
|
|
|
|
.join("tests")
|
|
|
|
.into_os_string()
|
|
|
|
.into_string()
|
|
|
|
.unwrap(),
|
|
|
|
"complex_permissions_test.ts"
|
|
|
|
),
|
|
|
|
None,
|
|
|
|
None,
|
|
|
|
false,
|
|
|
|
);
|
|
|
|
assert!(!err.contains(util::PERMISSION_DENIED_PATTERN));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_permissions_rw_outside_test_and_js_dir() {
|
|
|
|
const PERMISSION_VARIANTS: [&str; 2] = ["read", "write"];
|
|
|
|
let test_dir = util::root_path()
|
|
|
|
.join("cli")
|
|
|
|
.join("tests")
|
|
|
|
.into_os_string()
|
|
|
|
.into_string()
|
|
|
|
.unwrap();
|
|
|
|
let js_dir = util::root_path()
|
|
|
|
.join("js")
|
|
|
|
.into_os_string()
|
|
|
|
.into_string()
|
|
|
|
.unwrap();
|
|
|
|
for permission in &PERMISSION_VARIANTS {
|
2020-03-07 05:27:16 -05:00
|
|
|
let (_, err) = util::run_and_collect_output(
|
|
|
|
false,
|
2020-03-01 19:51:54 -05:00
|
|
|
&format!(
|
|
|
|
"run --allow-{0}={1},{2} complex_permissions_test.ts {0} {3}",
|
|
|
|
permission,
|
|
|
|
test_dir,
|
|
|
|
js_dir,
|
|
|
|
util::root_path()
|
|
|
|
.join("Cargo.toml")
|
|
|
|
.into_os_string()
|
|
|
|
.into_string()
|
|
|
|
.unwrap(),
|
|
|
|
),
|
|
|
|
None,
|
|
|
|
None,
|
|
|
|
false,
|
|
|
|
);
|
|
|
|
assert!(err.contains(util::PERMISSION_DENIED_PATTERN));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_permissions_rw_inside_test_and_js_dir() {
|
|
|
|
const PERMISSION_VARIANTS: [&str; 2] = ["read", "write"];
|
|
|
|
let test_dir = util::root_path()
|
|
|
|
.join("cli")
|
|
|
|
.join("tests")
|
|
|
|
.into_os_string()
|
|
|
|
.into_string()
|
|
|
|
.unwrap();
|
|
|
|
let js_dir = util::root_path()
|
|
|
|
.join("js")
|
|
|
|
.into_os_string()
|
|
|
|
.into_string()
|
|
|
|
.unwrap();
|
|
|
|
for permission in &PERMISSION_VARIANTS {
|
2020-03-07 05:27:16 -05:00
|
|
|
let (_, err) = util::run_and_collect_output(
|
|
|
|
true,
|
2020-03-01 19:51:54 -05:00
|
|
|
&format!(
|
|
|
|
"run --allow-{0}={1},{2} complex_permissions_test.ts {0} {3}",
|
|
|
|
permission, test_dir, js_dir, "complex_permissions_test.ts"
|
|
|
|
),
|
|
|
|
None,
|
|
|
|
None,
|
|
|
|
false,
|
|
|
|
);
|
|
|
|
assert!(!err.contains(util::PERMISSION_DENIED_PATTERN));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_permissions_rw_relative() {
|
|
|
|
const PERMISSION_VARIANTS: [&str; 2] = ["read", "write"];
|
|
|
|
for permission in &PERMISSION_VARIANTS {
|
2020-03-07 05:27:16 -05:00
|
|
|
let (_, err) = util::run_and_collect_output(
|
|
|
|
true,
|
2020-03-01 19:51:54 -05:00
|
|
|
&format!(
|
|
|
|
"run --allow-{0}=. complex_permissions_test.ts {0} complex_permissions_test.ts",
|
|
|
|
permission
|
|
|
|
),
|
|
|
|
None,
|
|
|
|
None,
|
|
|
|
false,
|
|
|
|
);
|
|
|
|
assert!(!err.contains(util::PERMISSION_DENIED_PATTERN));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_permissions_rw_no_prefix() {
|
|
|
|
const PERMISSION_VARIANTS: [&str; 2] = ["read", "write"];
|
|
|
|
for permission in &PERMISSION_VARIANTS {
|
2020-03-07 05:27:16 -05:00
|
|
|
let (_, err) = util::run_and_collect_output(
|
|
|
|
true,
|
2020-03-01 19:51:54 -05:00
|
|
|
&format!(
|
|
|
|
"run --allow-{0}=tls/../ complex_permissions_test.ts {0} complex_permissions_test.ts",
|
|
|
|
permission
|
|
|
|
),
|
|
|
|
None,
|
|
|
|
None,
|
|
|
|
false,
|
|
|
|
);
|
|
|
|
assert!(!err.contains(util::PERMISSION_DENIED_PATTERN));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_permissions_net_fetch_allow_localhost_4545() {
|
2020-03-07 05:27:16 -05:00
|
|
|
let (_, err) = util::run_and_collect_output(
|
|
|
|
true,
|
2020-03-01 19:51:54 -05:00
|
|
|
"run --allow-net=localhost:4545 complex_permissions_test.ts netFetch http://localhost:4545/",
|
|
|
|
None,
|
|
|
|
None,true,
|
|
|
|
);
|
|
|
|
assert!(!err.contains(util::PERMISSION_DENIED_PATTERN));
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_permissions_net_fetch_allow_deno_land() {
|
2020-03-07 05:27:16 -05:00
|
|
|
let (_, err) = util::run_and_collect_output(
|
|
|
|
false,
|
2020-03-01 19:51:54 -05:00
|
|
|
"run --allow-net=deno.land complex_permissions_test.ts netFetch http://localhost:4545/",
|
|
|
|
None,
|
|
|
|
None,
|
|
|
|
true,
|
|
|
|
);
|
|
|
|
assert!(err.contains(util::PERMISSION_DENIED_PATTERN));
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_permissions_net_fetch_localhost_4545_fail() {
|
2020-03-07 05:27:16 -05:00
|
|
|
let (_, err) = util::run_and_collect_output(
|
|
|
|
false,
|
2020-03-01 19:51:54 -05:00
|
|
|
"run --allow-net=localhost:4545 complex_permissions_test.ts netFetch http://localhost:4546/",
|
|
|
|
None,
|
|
|
|
None,
|
|
|
|
true,
|
|
|
|
);
|
|
|
|
assert!(err.contains(util::PERMISSION_DENIED_PATTERN));
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_permissions_net_fetch_localhost() {
|
2020-03-07 05:27:16 -05:00
|
|
|
let (_, err) = util::run_and_collect_output(
|
|
|
|
true,
|
2020-03-01 19:51:54 -05:00
|
|
|
"run --allow-net=localhost complex_permissions_test.ts netFetch http://localhost:4545/ http://localhost:4546/ http://localhost:4547/",
|
|
|
|
None,
|
|
|
|
None,
|
|
|
|
true,
|
|
|
|
);
|
|
|
|
assert!(!err.contains(util::PERMISSION_DENIED_PATTERN));
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_permissions_net_connect_allow_localhost_ip_4555() {
|
2020-03-07 05:27:16 -05:00
|
|
|
let (_, err) = util::run_and_collect_output(
|
|
|
|
true,
|
2020-03-01 19:51:54 -05:00
|
|
|
"run --allow-net=127.0.0.1:4545 complex_permissions_test.ts netConnect 127.0.0.1:4545",
|
|
|
|
None,
|
|
|
|
None,
|
|
|
|
true,
|
|
|
|
);
|
|
|
|
assert!(!err.contains(util::PERMISSION_DENIED_PATTERN));
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_permissions_net_connect_allow_deno_land() {
|
2020-03-07 05:27:16 -05:00
|
|
|
let (_, err) = util::run_and_collect_output(
|
|
|
|
false,
|
2020-03-01 19:51:54 -05:00
|
|
|
"run --allow-net=deno.land complex_permissions_test.ts netConnect 127.0.0.1:4546",
|
|
|
|
None,
|
|
|
|
None,
|
|
|
|
true,
|
|
|
|
);
|
|
|
|
assert!(err.contains(util::PERMISSION_DENIED_PATTERN));
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_permissions_net_connect_allow_localhost_ip_4545_fail() {
|
2020-03-07 05:27:16 -05:00
|
|
|
let (_, err) = util::run_and_collect_output(
|
|
|
|
false,
|
2020-03-01 19:51:54 -05:00
|
|
|
"run --allow-net=127.0.0.1:4545 complex_permissions_test.ts netConnect 127.0.0.1:4546",
|
|
|
|
None,
|
|
|
|
None,
|
|
|
|
true,
|
|
|
|
);
|
|
|
|
assert!(err.contains(util::PERMISSION_DENIED_PATTERN));
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_permissions_net_connect_allow_localhost_ip() {
|
2020-03-07 05:27:16 -05:00
|
|
|
let (_, err) = util::run_and_collect_output(
|
|
|
|
true,
|
2020-03-01 19:51:54 -05:00
|
|
|
"run --allow-net=127.0.0.1 complex_permissions_test.ts netConnect 127.0.0.1:4545 127.0.0.1:4546 127.0.0.1:4547",
|
|
|
|
None,
|
|
|
|
None,
|
|
|
|
true,
|
|
|
|
);
|
|
|
|
assert!(!err.contains(util::PERMISSION_DENIED_PATTERN));
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_permissions_net_listen_allow_localhost_4555() {
|
2020-03-07 05:27:16 -05:00
|
|
|
let (_, err) = util::run_and_collect_output(
|
|
|
|
true,
|
2020-03-01 19:51:54 -05:00
|
|
|
"run --allow-net=localhost:4558 complex_permissions_test.ts netListen localhost:4558",
|
|
|
|
None,
|
|
|
|
None,
|
|
|
|
false,
|
|
|
|
);
|
|
|
|
assert!(!err.contains(util::PERMISSION_DENIED_PATTERN));
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_permissions_net_listen_allow_deno_land() {
|
2020-03-07 05:27:16 -05:00
|
|
|
let (_, err) = util::run_and_collect_output(
|
|
|
|
false,
|
2020-03-01 19:51:54 -05:00
|
|
|
"run --allow-net=deno.land complex_permissions_test.ts netListen localhost:4545",
|
|
|
|
None,
|
|
|
|
None,
|
|
|
|
false,
|
|
|
|
);
|
|
|
|
assert!(err.contains(util::PERMISSION_DENIED_PATTERN));
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_permissions_net_listen_allow_localhost_4555_fail() {
|
2020-03-07 05:27:16 -05:00
|
|
|
let (_, err) = util::run_and_collect_output(
|
|
|
|
false,
|
2020-03-01 19:51:54 -05:00
|
|
|
"run --allow-net=localhost:4555 complex_permissions_test.ts netListen localhost:4556",
|
|
|
|
None,
|
|
|
|
None,
|
|
|
|
false,
|
|
|
|
);
|
|
|
|
assert!(err.contains(util::PERMISSION_DENIED_PATTERN));
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_permissions_net_listen_allow_localhost() {
|
2020-03-06 11:40:18 -05:00
|
|
|
// Port 4600 is chosen to not colide with those used by tools/http_server.py
|
2020-03-07 05:27:16 -05:00
|
|
|
let (_, err) = util::run_and_collect_output(
|
|
|
|
true,
|
2020-03-06 11:40:18 -05:00
|
|
|
"run --allow-net=localhost complex_permissions_test.ts netListen localhost:4600",
|
2020-03-01 19:51:54 -05:00
|
|
|
None,
|
|
|
|
None,
|
|
|
|
false,
|
|
|
|
);
|
|
|
|
assert!(!err.contains(util::PERMISSION_DENIED_PATTERN));
|
|
|
|
}
|
|
|
|
|
2019-10-29 17:52:57 -04:00
|
|
|
mod util {
|
2020-01-05 11:56:18 -05:00
|
|
|
use deno::colors::strip_ansi_codes;
|
|
|
|
pub use deno::test_util::*;
|
2019-10-29 17:52:57 -04:00
|
|
|
use os_pipe::pipe;
|
|
|
|
use std::io::Read;
|
|
|
|
use std::io::Write;
|
|
|
|
use std::process::Command;
|
2020-02-24 17:49:40 -05:00
|
|
|
use std::process::Output;
|
2019-10-29 17:52:57 -04:00
|
|
|
use std::process::Stdio;
|
|
|
|
use tempfile::TempDir;
|
|
|
|
|
2020-02-25 15:36:35 -05:00
|
|
|
pub const PERMISSION_VARIANTS: [&str; 5] =
|
|
|
|
["read", "write", "env", "net", "run"];
|
|
|
|
pub const PERMISSION_DENIED_PATTERN: &str = "PermissionDenied";
|
|
|
|
|
2019-10-29 17:52:57 -04:00
|
|
|
lazy_static! {
|
|
|
|
static ref DENO_DIR: TempDir = { TempDir::new().expect("tempdir fail") };
|
|
|
|
}
|
|
|
|
|
2020-02-25 15:36:35 -05:00
|
|
|
pub fn run_and_collect_output(
|
2020-03-07 05:27:16 -05:00
|
|
|
expect_success: bool,
|
2020-02-25 15:36:35 -05:00
|
|
|
args: &str,
|
|
|
|
input: Option<Vec<&str>>,
|
2020-02-24 17:49:40 -05:00
|
|
|
envs: Option<Vec<(String, String)>>,
|
2020-03-01 19:51:54 -05:00
|
|
|
need_http_server: bool,
|
2020-03-07 05:27:16 -05:00
|
|
|
) -> (String, String) {
|
2020-02-25 15:36:35 -05:00
|
|
|
let root = root_path();
|
|
|
|
let tests_dir = root.join("cli").join("tests");
|
2020-02-24 17:49:40 -05:00
|
|
|
let mut deno_process_builder = deno_cmd();
|
2020-02-25 15:36:35 -05:00
|
|
|
deno_process_builder.args(args.split_whitespace());
|
2020-02-24 17:49:40 -05:00
|
|
|
deno_process_builder
|
2020-02-25 15:36:35 -05:00
|
|
|
.current_dir(&tests_dir)
|
2020-02-24 17:49:40 -05:00
|
|
|
.stdin(Stdio::piped())
|
|
|
|
.stdout(Stdio::piped())
|
|
|
|
.stderr(Stdio::piped());
|
|
|
|
if let Some(envs) = envs {
|
|
|
|
deno_process_builder.envs(envs);
|
|
|
|
}
|
2020-03-01 19:51:54 -05:00
|
|
|
let http_guard = if need_http_server {
|
|
|
|
Some(http_server())
|
|
|
|
} else {
|
|
|
|
None
|
|
|
|
};
|
2020-02-24 17:49:40 -05:00
|
|
|
let mut deno = deno_process_builder
|
|
|
|
.spawn()
|
|
|
|
.expect("failed to spawn script");
|
2020-02-25 15:36:35 -05:00
|
|
|
if let Some(lines) = input {
|
2020-02-24 17:49:40 -05:00
|
|
|
let stdin = deno.stdin.as_mut().expect("failed to get stdin");
|
|
|
|
stdin
|
|
|
|
.write_all(lines.join("\n").as_bytes())
|
|
|
|
.expect("failed to write to stdin");
|
|
|
|
}
|
|
|
|
let Output {
|
|
|
|
stdout,
|
|
|
|
stderr,
|
|
|
|
status,
|
|
|
|
} = deno.wait_with_output().expect("failed to wait on child");
|
2020-03-01 19:51:54 -05:00
|
|
|
drop(http_guard);
|
2020-03-07 05:27:16 -05:00
|
|
|
let stdout = String::from_utf8(stdout).unwrap();
|
|
|
|
let stderr = String::from_utf8(stderr).unwrap();
|
|
|
|
if expect_success != status.success() {
|
|
|
|
eprintln!("stdout: <<<{}>>>", stdout);
|
|
|
|
eprintln!("stderr: <<<{}>>>", stderr);
|
|
|
|
panic!("Unexpected exit code: {:?}", status.code());
|
|
|
|
}
|
|
|
|
(stdout, stderr)
|
2020-02-24 17:49:40 -05:00
|
|
|
}
|
|
|
|
|
2019-10-29 17:52:57 -04:00
|
|
|
pub fn deno_cmd() -> Command {
|
|
|
|
let mut c = Command::new(deno_exe_path());
|
|
|
|
c.env("DENO_DIR", DENO_DIR.path());
|
|
|
|
c
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn run_python_script(script: &str) {
|
|
|
|
let output = Command::new("python")
|
|
|
|
.env("DENO_DIR", DENO_DIR.path())
|
|
|
|
.current_dir(root_path())
|
|
|
|
.arg(script)
|
|
|
|
.arg(format!("--executable={}", deno_exe_path().display()))
|
|
|
|
.env("DENO_BUILD_PATH", target_dir())
|
|
|
|
.output()
|
|
|
|
.expect("failed to spawn script");
|
|
|
|
if !output.status.success() {
|
|
|
|
let stdout = String::from_utf8(output.stdout).unwrap();
|
|
|
|
let stderr = String::from_utf8(output.stderr).unwrap();
|
|
|
|
panic!(
|
|
|
|
"{} executed with failing error code\n{}{}",
|
|
|
|
script, stdout, stderr
|
|
|
|
);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#[derive(Debug, Default)]
|
|
|
|
pub struct CheckOutputIntegrationTest {
|
|
|
|
pub args: &'static str,
|
|
|
|
pub output: &'static str,
|
|
|
|
pub input: Option<&'static str>,
|
2020-02-09 05:19:05 -05:00
|
|
|
pub output_str: Option<&'static str>,
|
2019-10-29 17:52:57 -04:00
|
|
|
pub exit_code: i32,
|
|
|
|
pub check_stderr: bool,
|
|
|
|
pub http_server: bool,
|
|
|
|
}
|
|
|
|
|
|
|
|
impl CheckOutputIntegrationTest {
|
|
|
|
pub fn run(&self) {
|
|
|
|
let args = self.args.split_whitespace();
|
|
|
|
let root = root_path();
|
|
|
|
let deno_exe = deno_exe_path();
|
|
|
|
println!("root path {}", root.display());
|
|
|
|
println!("deno_exe path {}", deno_exe.display());
|
|
|
|
|
|
|
|
let http_server_guard = if self.http_server {
|
|
|
|
Some(http_server())
|
|
|
|
} else {
|
|
|
|
None
|
|
|
|
};
|
|
|
|
|
|
|
|
let (mut reader, writer) = pipe().unwrap();
|
|
|
|
let tests_dir = root.join("cli").join("tests");
|
|
|
|
let mut command = deno_cmd();
|
|
|
|
command.args(args);
|
|
|
|
command.current_dir(&tests_dir);
|
|
|
|
command.stdin(Stdio::piped());
|
|
|
|
command.stderr(Stdio::null());
|
|
|
|
|
|
|
|
if self.check_stderr {
|
|
|
|
let writer_clone = writer.try_clone().unwrap();
|
|
|
|
command.stderr(writer_clone);
|
|
|
|
}
|
|
|
|
|
|
|
|
command.stdout(writer);
|
|
|
|
|
|
|
|
let mut process = command.spawn().expect("failed to execute process");
|
|
|
|
|
|
|
|
if let Some(input) = self.input {
|
|
|
|
let mut p_stdin = process.stdin.take().unwrap();
|
|
|
|
write!(p_stdin, "{}", input).unwrap();
|
|
|
|
}
|
|
|
|
|
|
|
|
// Very important when using pipes: This parent process is still
|
|
|
|
// holding its copies of the write ends, and we have to close them
|
|
|
|
// before we read, otherwise the read end will never report EOF. The
|
|
|
|
// Command object owns the writers now, and dropping it closes them.
|
|
|
|
drop(command);
|
|
|
|
|
|
|
|
let mut actual = String::new();
|
|
|
|
reader.read_to_string(&mut actual).unwrap();
|
|
|
|
|
|
|
|
let status = process.wait().expect("failed to finish process");
|
|
|
|
let exit_code = status.code().unwrap();
|
|
|
|
|
|
|
|
drop(http_server_guard);
|
|
|
|
|
|
|
|
actual = strip_ansi_codes(&actual).to_string();
|
|
|
|
|
|
|
|
if self.exit_code != exit_code {
|
|
|
|
println!("OUTPUT\n{}\nOUTPUT", actual);
|
|
|
|
panic!(
|
|
|
|
"bad exit code, expected: {:?}, actual: {:?}",
|
|
|
|
self.exit_code, exit_code
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
2020-02-09 05:19:05 -05:00
|
|
|
let expected = if let Some(s) = self.output_str {
|
|
|
|
s.to_owned()
|
|
|
|
} else {
|
|
|
|
let output_path = tests_dir.join(self.output);
|
|
|
|
println!("output path {}", output_path.display());
|
|
|
|
std::fs::read_to_string(output_path).expect("cannot read output")
|
|
|
|
};
|
2019-10-29 17:52:57 -04:00
|
|
|
|
|
|
|
if !wildcard_match(&expected, &actual) {
|
|
|
|
println!("OUTPUT\n{}\nOUTPUT", actual);
|
|
|
|
println!("EXPECTED\n{}\nEXPECTED", expected);
|
|
|
|
panic!("pattern match failed");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
fn wildcard_match(pattern: &str, s: &str) -> bool {
|
|
|
|
pattern_match(pattern, s, "[WILDCARD]")
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn pattern_match(pattern: &str, s: &str, wildcard: &str) -> bool {
|
|
|
|
// Normalize line endings
|
|
|
|
let s = s.replace("\r\n", "\n");
|
|
|
|
let pattern = pattern.replace("\r\n", "\n");
|
|
|
|
|
|
|
|
if pattern == wildcard {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
let parts = pattern.split(wildcard).collect::<Vec<&str>>();
|
|
|
|
if parts.len() == 1 {
|
|
|
|
return pattern == s;
|
|
|
|
}
|
|
|
|
|
|
|
|
if !s.starts_with(parts[0]) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
let mut t = s.split_at(parts[0].len());
|
|
|
|
|
|
|
|
for (i, part) in parts.iter().enumerate() {
|
|
|
|
if i == 0 {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
dbg!(part, i);
|
|
|
|
if i == parts.len() - 1 && (*part == "" || *part == "\n") {
|
|
|
|
dbg!("exit 1 true", i);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
if let Some(found) = t.1.find(*part) {
|
|
|
|
dbg!("found ", found);
|
|
|
|
t = t.1.split_at(found + part.len());
|
|
|
|
} else {
|
|
|
|
dbg!("exit false ", i);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
dbg!("end ", t.1.len());
|
|
|
|
t.1.is_empty()
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_wildcard_match() {
|
|
|
|
let fixtures = vec![
|
|
|
|
("foobarbaz", "foobarbaz", true),
|
|
|
|
("[WILDCARD]", "foobarbaz", true),
|
|
|
|
("foobar", "foobarbaz", false),
|
|
|
|
("foo[WILDCARD]baz", "foobarbaz", true),
|
|
|
|
("foo[WILDCARD]baz", "foobazbar", false),
|
|
|
|
("foo[WILDCARD]baz[WILDCARD]qux", "foobarbazqatqux", true),
|
|
|
|
("foo[WILDCARD]", "foobar", true),
|
|
|
|
("foo[WILDCARD]baz[WILDCARD]", "foobarbazqat", true),
|
|
|
|
// check with different line endings
|
|
|
|
("foo[WILDCARD]\nbaz[WILDCARD]\n", "foobar\nbazqat\n", true),
|
|
|
|
(
|
|
|
|
"foo[WILDCARD]\nbaz[WILDCARD]\n",
|
|
|
|
"foobar\r\nbazqat\r\n",
|
|
|
|
true,
|
|
|
|
),
|
|
|
|
(
|
|
|
|
"foo[WILDCARD]\r\nbaz[WILDCARD]\n",
|
|
|
|
"foobar\nbazqat\r\n",
|
|
|
|
true,
|
|
|
|
),
|
|
|
|
(
|
|
|
|
"foo[WILDCARD]\r\nbaz[WILDCARD]\r\n",
|
|
|
|
"foobar\nbazqat\n",
|
|
|
|
true,
|
|
|
|
),
|
|
|
|
(
|
|
|
|
"foo[WILDCARD]\r\nbaz[WILDCARD]\r\n",
|
|
|
|
"foobar\r\nbazqat\r\n",
|
|
|
|
true,
|
|
|
|
),
|
|
|
|
];
|
|
|
|
|
|
|
|
// Iterate through the fixture lists, testing each one
|
|
|
|
for (pattern, string, expected) in fixtures {
|
|
|
|
let actual = wildcard_match(pattern, string);
|
|
|
|
dbg!(pattern, string, expected);
|
|
|
|
assert_eq!(actual, expected);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|