1
0
Fork 0
mirror of https://github.com/denoland/deno.git synced 2024-11-25 15:29:32 -05:00
denoland-deno/cli/ops.rs

2021 lines
53 KiB
Rust
Raw Normal View History

2019-01-01 19:58:40 -05:00
// Copyright 2018-2019 the Deno authors. All rights reserved. MIT license.
2019-02-08 22:13:04 -05:00
use atty;
use crate::ansi;
use crate::cli::Buf;
use crate::cli::Cli;
2019-01-14 01:30:38 -05:00
use crate::errors;
use crate::errors::{permission_denied, DenoError, DenoResult, ErrorKind};
2019-01-14 01:30:38 -05:00
use crate::fs as deno_fs;
use crate::http_util;
use crate::isolate_state::IsolateState;
use crate::js_errors::apply_source_map;
use crate::js_errors::JSErrorColor;
2019-01-14 01:30:38 -05:00
use crate::msg;
use crate::msg_util;
use crate::repl;
use crate::resolve_addr::resolve_addr;
use crate::resources;
use crate::resources::table_entries;
use crate::resources::Resource;
use crate::tokio_util;
use crate::tokio_write;
2019-01-14 01:30:38 -05:00
use crate::version;
use deno_core::deno_buf;
use deno_core::JSError;
use deno_core::Op;
use flatbuffers::FlatBufferBuilder;
use futures;
use futures::Async;
2018-09-22 04:42:07 -04:00
use futures::Poll;
use futures::Sink;
use futures::Stream;
use hyper;
use hyper::rt::Future;
use remove_dir_all::remove_dir_all;
use std;
2018-11-29 22:03:00 -05:00
use std::convert::From;
use std::fs;
use std::net::Shutdown;
2018-08-09 13:24:30 -04:00
use std::path::Path;
2018-09-22 04:42:07 -04:00
use std::path::PathBuf;
use std::process::Command;
use std::sync::Arc;
2019-02-02 01:27:42 -05:00
use std::time::{Duration, Instant, SystemTime, UNIX_EPOCH};
use tokio;
use tokio::net::TcpListener;
use tokio::net::TcpStream;
use tokio_process::CommandExt;
2018-09-22 04:42:07 -04:00
use tokio_threadpool;
2019-02-08 22:13:04 -05:00
#[cfg(unix)]
use std::os::unix::fs::PermissionsExt;
#[cfg(unix)]
use std::os::unix::process::ExitStatusExt;
type OpResult = DenoResult<Buf>;
pub type OpWithError = dyn Future<Item = Buf, Error = DenoError> + Send;
// TODO Ideally we wouldn't have to box the OpWithError being returned.
// The box is just to make it easier to get a prototype refactor working.
2018-10-03 20:48:02 -04:00
type OpCreator =
fn(cli: &Cli, base: &msg::Base<'_>, data: deno_buf) -> Box<OpWithError>;
#[inline]
fn empty_buf() -> Buf {
Box::new([])
}
2018-10-03 20:51:20 -04:00
/// Processes raw messages from JavaScript.
/// This functions invoked every time libdeno.send() is called.
/// control corresponds to the first argument of libdeno.send().
/// data corresponds to the second argument of libdeno.send().
pub fn dispatch(
cli: &Cli,
control: &[u8],
zero_copy: deno_buf,
) -> (bool, Box<Op>) {
let bytes_sent_control = control.len();
let bytes_sent_zero_copy = zero_copy.len();
let base = msg::get_root_as_base(&control);
let is_sync = base.sync();
let inner_type = base.inner_type();
let cmd_id = base.cmd_id();
2018-10-02 20:47:40 -04:00
let op: Box<OpWithError> = {
2018-10-02 20:47:40 -04:00
// Handle regular ops.
let op_creator: OpCreator = match inner_type {
2018-10-17 20:41:21 -04:00
msg::Any::Accept => op_accept,
msg::Any::Chdir => op_chdir,
msg::Any::Chmod => op_chmod,
2018-10-17 20:41:21 -04:00
msg::Any::Close => op_close,
msg::Any::CopyFile => op_copy_file,
msg::Any::Cwd => op_cwd,
msg::Any::Dial => op_dial,
2018-10-03 20:48:02 -04:00
msg::Any::Environ => op_env,
2018-10-17 20:41:21 -04:00
msg::Any::Exit => op_exit,
2018-10-30 15:02:18 -04:00
msg::Any::Fetch => op_fetch,
2019-03-11 23:25:18 -04:00
msg::Any::FetchModuleMetaData => op_fetch_module_meta_data,
msg::Any::FormatError => op_format_error,
msg::Any::GlobalTimer => op_global_timer,
msg::Any::GlobalTimerStop => op_global_timer_stop,
2019-03-11 23:25:18 -04:00
msg::Any::IsTTY => op_is_tty,
2018-10-17 20:41:21 -04:00
msg::Any::Listen => op_listen,
2018-10-03 20:48:02 -04:00
msg::Any::MakeTempDir => op_make_temp_dir,
2018-10-17 20:41:21 -04:00
msg::Any::Metrics => op_metrics,
2018-10-03 20:48:02 -04:00
msg::Any::Mkdir => op_mkdir,
2019-03-11 23:25:18 -04:00
msg::Any::Now => op_now,
2018-10-03 20:48:02 -04:00
msg::Any::Open => op_open,
2019-03-11 23:25:18 -04:00
msg::Any::PermissionRevoke => op_revoke_permission,
msg::Any::Permissions => op_permissions,
msg::Any::Read => op_read,
2018-10-17 20:41:21 -04:00
msg::Any::ReadDir => op_read_dir,
msg::Any::ReadFile => op_read_file,
msg::Any::Readlink => op_read_link,
2018-10-03 20:48:02 -04:00
msg::Any::Remove => op_remove,
msg::Any::Rename => op_rename,
msg::Any::ReplReadline => op_repl_readline,
msg::Any::ReplStart => op_repl_start,
2018-10-30 15:58:55 -04:00
msg::Any::Resources => op_resources,
msg::Any::Run => op_run,
msg::Any::RunStatus => op_run_status,
2019-03-11 23:25:18 -04:00
msg::Any::Seek => op_seek,
2018-10-03 20:48:02 -04:00
msg::Any::SetEnv => op_set_env,
2018-10-17 20:41:21 -04:00
msg::Any::Shutdown => op_shutdown,
msg::Any::Start => op_start,
2018-10-03 20:48:02 -04:00
msg::Any::Stat => op_stat,
2018-10-17 20:41:21 -04:00
msg::Any::Symlink => op_symlink,
2018-10-03 20:48:02 -04:00
msg::Any::Truncate => op_truncate,
msg::Any::WorkerGetMessage => op_worker_get_message,
msg::Any::WorkerPostMessage => op_worker_post_message,
2018-10-17 20:41:21 -04:00
msg::Any::Write => op_write,
msg::Any::WriteFile => op_write_file,
2018-10-02 20:47:40 -04:00
_ => panic!(format!(
"Unhandled message {}",
msg::enum_name_any(inner_type)
2018-10-02 20:47:40 -04:00
)),
};
op_creator(&cli, &base, zero_copy)
};
cli
.state
.metrics_op_dispatched(bytes_sent_control, bytes_sent_zero_copy);
let state = cli.state.clone();
2018-10-15 16:46:42 -04:00
let boxed_op = Box::new(
op.or_else(move |err: DenoError| -> Result<Buf, ()> {
debug!("op err {}", err);
// No matter whether we got an Err or Ok, we want a serialized message to
// send back. So transform the DenoError into a deno_buf.
let builder = &mut FlatBufferBuilder::new();
let errmsg_offset = builder.create_string(&format!("{}", err));
Ok(serialize_response(
cmd_id,
builder,
msg::BaseArgs {
error: Some(errmsg_offset),
error_kind: err.kind(),
..Default::default()
},
))
}).and_then(move |buf: Buf| -> Result<Buf, ()> {
// Handle empty responses. For sync responses we just want
// to send null. For async we want to send a small message
// with the cmd_id.
let buf = if is_sync || buf.len() > 0 {
buf
} else {
let builder = &mut FlatBufferBuilder::new();
serialize_response(
cmd_id,
builder,
msg::BaseArgs {
..Default::default()
},
)
};
state.metrics_op_completed(buf.len());
Ok(buf)
}).map_err(|err| panic!("unexpected error {:?}", err)),
2018-10-15 16:46:42 -04:00
);
debug!(
"msg_from_js {} sync {}",
msg::enum_name_any(inner_type),
base.sync()
);
(base.sync(), boxed_op)
}
2019-02-02 01:27:42 -05:00
fn op_now(
_cli: &Cli,
2019-02-02 01:27:42 -05:00
base: &msg::Base<'_>,
data: deno_buf,
) -> Box<OpWithError> {
2019-02-02 01:27:42 -05:00
assert_eq!(data.len(), 0);
let start = SystemTime::now();
let since_the_epoch = start.duration_since(UNIX_EPOCH).unwrap();
2019-02-08 11:14:33 -05:00
let time = since_the_epoch.as_secs() * 1000
+ u64::from(since_the_epoch.subsec_millis());
2019-02-02 01:27:42 -05:00
let builder = &mut FlatBufferBuilder::new();
2019-02-08 11:14:33 -05:00
let inner = msg::NowRes::create(builder, &msg::NowResArgs { time });
2019-02-02 01:27:42 -05:00
ok_future(serialize_response(
base.cmd_id(),
builder,
msg::BaseArgs {
inner: Some(inner.as_union_value()),
inner_type: msg::Any::NowRes,
..Default::default()
},
))
}
2019-02-02 22:05:30 -05:00
fn op_is_tty(
_cli: &Cli,
2019-02-02 22:05:30 -05:00
base: &msg::Base<'_>,
_data: deno_buf,
) -> Box<OpWithError> {
2019-02-02 22:05:30 -05:00
let builder = &mut FlatBufferBuilder::new();
let inner = msg::IsTTYRes::create(
builder,
&msg::IsTTYResArgs {
stdin: atty::is(atty::Stream::Stdin),
stdout: atty::is(atty::Stream::Stdout),
stderr: atty::is(atty::Stream::Stderr),
},
);
ok_future(serialize_response(
base.cmd_id(),
builder,
msg::BaseArgs {
inner: Some(inner.as_union_value()),
inner_type: msg::Any::IsTTYRes,
..Default::default()
},
))
}
2018-10-03 20:48:02 -04:00
fn op_exit(
_cli: &Cli,
2019-01-14 01:30:38 -05:00
base: &msg::Base<'_>,
_data: deno_buf,
) -> Box<OpWithError> {
let inner = base.inner_as_exit().unwrap();
std::process::exit(inner.code())
2018-09-02 02:33:24 -04:00
}
2018-10-03 20:48:02 -04:00
fn op_start(
cli: &Cli,
2019-01-14 01:30:38 -05:00
base: &msg::Base<'_>,
data: deno_buf,
) -> Box<OpWithError> {
assert_eq!(data.len(), 0);
let mut builder = FlatBufferBuilder::new();
let argv = cli
.state
.argv
.iter()
.map(|s| s.as_str())
.collect::<Vec<_>>();
let argv_off = builder.create_vector_of_strings(argv.as_slice());
let cwd_path = std::env::current_dir().unwrap();
let cwd_off =
builder.create_string(deno_fs::normalize_path(cwd_path.as_ref()).as_ref());
2019-02-15 11:22:02 -05:00
let exec_path =
builder.create_string(std::env::current_exe().unwrap().to_str().unwrap());
let v8_version = version::v8();
let v8_version_off = builder.create_string(v8_version);
let deno_version = version::DENO;
let deno_version_off = builder.create_string(deno_version);
let main_module = cli.state.main_module().map(|m| builder.create_string(&m));
2019-02-12 21:14:02 -05:00
let inner = msg::StartRes::create(
&mut builder,
&msg::StartResArgs {
cwd: Some(cwd_off),
2019-01-06 14:16:42 -05:00
pid: std::process::id(),
argv: Some(argv_off),
2019-02-12 21:14:02 -05:00
main_module,
debug_flag: cli.state.flags.log_debug,
types_flag: cli.state.flags.types,
version_flag: cli.state.flags.version,
v8_version: Some(v8_version_off),
deno_version: Some(deno_version_off),
2019-02-08 22:13:04 -05:00
no_color: !ansi::use_color(),
2019-02-15 11:22:02 -05:00
exec_path: Some(exec_path),
..Default::default()
},
);
2018-09-09 19:48:10 -04:00
ok_future(serialize_response(
base.cmd_id(),
&mut builder,
msg::BaseArgs {
inner_type: msg::Any::StartRes,
inner: Some(inner.as_union_value()),
..Default::default()
},
))
}
fn op_format_error(
cli: &Cli,
base: &msg::Base<'_>,
data: deno_buf,
) -> Box<OpWithError> {
assert_eq!(data.len(), 0);
let inner = base.inner_as_format_error().unwrap();
let orig_error = String::from(inner.error().unwrap());
let js_error = JSError::from_v8_exception(&orig_error).unwrap();
let js_error_mapped = apply_source_map(&js_error, &cli.state.dir);
let js_error_string = JSErrorColor(&js_error_mapped).to_string();
let mut builder = FlatBufferBuilder::new();
let new_error = builder.create_string(&js_error_string);
let inner = msg::FormatErrorRes::create(
&mut builder,
&msg::FormatErrorResArgs {
error: Some(new_error),
..Default::default()
},
);
ok_future(serialize_response(
base.cmd_id(),
&mut builder,
msg::BaseArgs {
inner_type: msg::Any::FormatErrorRes,
inner: Some(inner.as_union_value()),
..Default::default()
},
))
}
2018-09-09 19:48:10 -04:00
fn serialize_response(
cmd_id: u32,
2019-01-14 01:30:38 -05:00
builder: &mut FlatBufferBuilder<'_>,
mut args: msg::BaseArgs<'_>,
) -> Buf {
args.cmd_id = cmd_id;
let base = msg::Base::create(builder, &args);
msg::finish_base_buffer(builder, base);
2018-09-02 01:58:23 -04:00
let data = builder.finished_data();
2018-09-09 19:48:10 -04:00
// println!("serialize_response {:x?}", data);
data.into()
}
#[inline]
pub fn ok_future(buf: Buf) -> Box<OpWithError> {
Box::new(futures::future::ok(buf))
}
// Shout out to Earl Sweatshirt.
#[inline]
pub fn odd_future(err: DenoError) -> Box<OpWithError> {
Box::new(futures::future::err(err))
}
2018-10-06 23:06:20 -04:00
// https://github.com/denoland/deno/blob/golang/os.go#L100-L154
2019-02-18 10:42:15 -05:00
fn op_fetch_module_meta_data(
cli: &Cli,
2019-01-14 01:30:38 -05:00
base: &msg::Base<'_>,
data: deno_buf,
) -> Box<OpWithError> {
assert_eq!(data.len(), 0);
2019-02-18 10:42:15 -05:00
let inner = base.inner_as_fetch_module_meta_data().unwrap();
let cmd_id = base.cmd_id();
let specifier = inner.specifier().unwrap();
let referrer = inner.referrer().unwrap();
// Check for allow read since this operation could be used to read from the file system.
if !cli.permissions.allows_read() {
debug!("No read permission for fetch_module_meta_data");
return odd_future(permission_denied());
}
// Check for allow write since this operation could be used to write to the file system.
if !cli.permissions.allows_write() {
debug!("No network permission for fetch_module_meta_data");
return odd_future(permission_denied());
}
// Check for allow net since this operation could be used to make https/http requests.
if !cli.permissions.allows_net() {
debug!("No network permission for fetch_module_meta_data");
return odd_future(permission_denied());
}
assert_eq!(
cli.state.dir.root.join("gen"),
cli.state.dir.gen,
"Sanity check"
);
Box::new(futures::future::result(|| -> OpResult {
let builder = &mut FlatBufferBuilder::new();
let out = cli.state.dir.fetch_module_meta_data(specifier, referrer)?;
2019-02-18 10:42:15 -05:00
let data_off = builder.create_vector(out.source_code.as_slice());
let msg_args = msg::FetchModuleMetaDataResArgs {
module_name: Some(builder.create_string(&out.module_name)),
filename: Some(builder.create_string(&out.filename)),
2018-10-21 22:14:27 -04:00
media_type: out.media_type,
2019-02-18 10:42:15 -05:00
data: Some(data_off),
};
2019-02-18 10:42:15 -05:00
let inner = msg::FetchModuleMetaDataRes::create(builder, &msg_args);
2018-09-09 19:48:10 -04:00
Ok(serialize_response(
cmd_id,
builder,
msg::BaseArgs {
inner: Some(inner.as_union_value()),
2019-02-18 10:42:15 -05:00
inner_type: msg::Any::FetchModuleMetaDataRes,
..Default::default()
},
))
}()))
}
2018-10-13 16:03:27 -04:00
fn op_chdir(
_cli: &Cli,
2019-01-14 01:30:38 -05:00
base: &msg::Base<'_>,
data: deno_buf,
) -> Box<OpWithError> {
2018-10-13 16:03:27 -04:00
assert_eq!(data.len(), 0);
let inner = base.inner_as_chdir().unwrap();
let directory = inner.directory().unwrap();
Box::new(futures::future::result(|| -> OpResult {
std::env::set_current_dir(&directory)?;
2018-10-13 16:03:27 -04:00
Ok(empty_buf())
}()))
}
fn op_global_timer_stop(
cli: &Cli,
2019-01-14 01:30:38 -05:00
base: &msg::Base<'_>,
data: deno_buf,
) -> Box<OpWithError> {
assert!(base.sync());
assert_eq!(data.len(), 0);
let mut t = cli.state.global_timer.lock().unwrap();
t.cancel();
ok_future(empty_buf())
}
fn op_global_timer(
cli: &Cli,
base: &msg::Base<'_>,
data: deno_buf,
) -> Box<OpWithError> {
assert!(!base.sync());
assert_eq!(data.len(), 0);
let cmd_id = base.cmd_id();
let inner = base.inner_as_global_timer().unwrap();
let val = inner.timeout();
assert!(val >= 0);
let mut t = cli.state.global_timer.lock().unwrap();
let deadline = Instant::now() + Duration::from_millis(val as u64);
let f = t.new_timeout(deadline);
Box::new(f.then(move |_| {
let builder = &mut FlatBufferBuilder::new();
let inner =
msg::GlobalTimerRes::create(builder, &msg::GlobalTimerResArgs {});
Ok(serialize_response(
cmd_id,
builder,
msg::BaseArgs {
inner: Some(inner.as_union_value()),
inner_type: msg::Any::GlobalTimerRes,
..Default::default()
},
))
}))
}
2018-10-03 20:48:02 -04:00
fn op_set_env(
cli: &Cli,
2019-01-14 01:30:38 -05:00
base: &msg::Base<'_>,
data: deno_buf,
) -> Box<OpWithError> {
assert_eq!(data.len(), 0);
let inner = base.inner_as_set_env().unwrap();
let key = inner.key().unwrap();
let value = inner.value().unwrap();
if let Err(e) = cli.check_env() {
return odd_future(e);
}
std::env::set_var(key, value);
ok_future(empty_buf())
}
fn op_env(cli: &Cli, base: &msg::Base<'_>, data: deno_buf) -> Box<OpWithError> {
assert_eq!(data.len(), 0);
let cmd_id = base.cmd_id();
if let Err(e) = cli.check_env() {
return odd_future(e);
}
let builder = &mut FlatBufferBuilder::new();
2018-09-02 01:59:16 -04:00
let vars: Vec<_> = std::env::vars()
2018-11-02 20:09:10 -04:00
.map(|(key, value)| msg_util::serialize_key_value(builder, &key, &value))
.collect();
2018-09-02 01:58:23 -04:00
let tables = builder.create_vector(&vars);
let inner = msg::EnvironRes::create(
builder,
&msg::EnvironResArgs { map: Some(tables) },
);
2018-09-09 19:48:10 -04:00
ok_future(serialize_response(
cmd_id,
builder,
msg::BaseArgs {
inner: Some(inner.as_union_value()),
inner_type: msg::Any::EnvironRes,
..Default::default()
},
))
}
fn op_permissions(
cli: &Cli,
base: &msg::Base<'_>,
data: deno_buf,
) -> Box<OpWithError> {
assert_eq!(data.len(), 0);
let cmd_id = base.cmd_id();
let builder = &mut FlatBufferBuilder::new();
let inner = msg::PermissionsRes::create(
builder,
&msg::PermissionsResArgs {
run: cli.permissions.allows_run(),
read: cli.permissions.allows_read(),
write: cli.permissions.allows_write(),
net: cli.permissions.allows_net(),
env: cli.permissions.allows_env(),
},
);
ok_future(serialize_response(
cmd_id,
builder,
msg::BaseArgs {
inner: Some(inner.as_union_value()),
inner_type: msg::Any::PermissionsRes,
..Default::default()
},
))
}
fn op_revoke_permission(
cli: &Cli,
base: &msg::Base<'_>,
data: deno_buf,
) -> Box<OpWithError> {
assert_eq!(data.len(), 0);
let inner = base.inner_as_permission_revoke().unwrap();
let permission = inner.permission().unwrap();
let result = match permission {
"run" => cli.permissions.revoke_run(),
"read" => cli.permissions.revoke_read(),
"write" => cli.permissions.revoke_write(),
"net" => cli.permissions.revoke_net(),
"env" => cli.permissions.revoke_env(),
_ => Ok(()),
};
if let Err(e) = result {
return odd_future(e);
}
ok_future(empty_buf())
}
2018-10-30 15:02:18 -04:00
fn op_fetch(
cli: &Cli,
2019-01-14 01:30:38 -05:00
base: &msg::Base<'_>,
data: deno_buf,
) -> Box<OpWithError> {
2018-10-30 15:02:18 -04:00
let inner = base.inner_as_fetch().unwrap();
let cmd_id = base.cmd_id();
let header = inner.header().unwrap();
assert!(header.is_request());
let url = header.url().unwrap();
2018-11-30 03:30:49 -05:00
let body = if data.is_empty() {
hyper::Body::empty()
} else {
hyper::Body::from(Vec::from(&*data))
};
let maybe_req = msg_util::deserialize_request(header, body);
if let Err(e) = maybe_req {
return odd_future(e);
}
let req = maybe_req.unwrap();
if let Err(e) = cli.check_net(url) {
return odd_future(e);
}
let client = http_util::get_client();
debug!("Before fetch {}", url);
let future =
client
.request(req)
.map_err(DenoError::from)
.and_then(move |res| {
let builder = &mut FlatBufferBuilder::new();
let header_off = msg_util::serialize_http_response(builder, &res);
let body = res.into_body();
let body_resource = resources::add_hyper_body(body);
let inner = msg::FetchRes::create(
builder,
&msg::FetchResArgs {
header: Some(header_off),
body_rid: body_resource.rid,
},
);
2018-09-12 15:16:42 -04:00
Ok(serialize_response(
cmd_id,
builder,
msg::BaseArgs {
inner: Some(inner.as_union_value()),
inner_type: msg::Any::FetchRes,
..Default::default()
},
))
});
Box::new(future)
}
2018-09-22 04:42:07 -04:00
// This is just type conversion. Implement From trait?
// See https://github.com/tokio-rs/tokio/blob/ffd73a64e7ec497622b7f939e38017afe7124dc4/tokio-fs/src/lib.rs#L76-L85
fn convert_blocking<F>(f: F) -> Poll<Buf, DenoError>
where
F: FnOnce() -> DenoResult<Buf>,
{
use futures::Async::*;
match tokio_threadpool::blocking(f) {
Ok(Ready(Ok(v))) => Ok(v.into()),
Ok(Ready(Err(err))) => Err(err),
Ok(NotReady) => Ok(NotReady),
Err(err) => panic!("blocking error {}", err),
2018-09-22 04:42:07 -04:00
}
}
fn blocking<F>(is_sync: bool, f: F) -> Box<OpWithError>
where
F: 'static + Send + FnOnce() -> DenoResult<Buf>,
{
if is_sync {
Box::new(futures::future::result(f()))
} else {
Box::new(tokio_util::poll_fn(move || convert_blocking(f)))
}
2018-09-22 04:42:07 -04:00
}
2018-10-03 20:48:02 -04:00
fn op_make_temp_dir(
cli: &Cli,
2019-01-14 01:30:38 -05:00
base: &msg::Base<'_>,
data: deno_buf,
) -> Box<OpWithError> {
assert_eq!(data.len(), 0);
let base = Box::new(*base);
let inner = base.inner_as_make_temp_dir().unwrap();
let cmd_id = base.cmd_id();
// FIXME
if let Err(e) = cli.check_write("make_temp") {
return odd_future(e);
2018-08-23 18:36:45 -04:00
}
2018-09-22 04:42:07 -04:00
let dir = inner.dir().map(PathBuf::from);
let prefix = inner.prefix().map(String::from);
let suffix = inner.suffix().map(String::from);
2018-09-22 04:42:07 -04:00
blocking(base.sync(), move || -> OpResult {
// TODO(piscisaureus): use byte vector for paths, not a string.
2018-10-06 23:06:20 -04:00
// See https://github.com/denoland/deno/issues/627.
// We can't assume that paths are always valid utf8 strings.
2018-09-22 04:42:07 -04:00
let path = deno_fs::make_temp_dir(
// Converting Option<String> to Option<&str>
dir.as_ref().map(|x| &**x),
prefix.as_ref().map(|x| &**x),
suffix.as_ref().map(|x| &**x),
)?;
let builder = &mut FlatBufferBuilder::new();
let path_off = builder.create_string(path.to_str().unwrap());
let inner = msg::MakeTempDirRes::create(
builder,
&msg::MakeTempDirResArgs {
path: Some(path_off),
},
);
2018-09-09 19:48:10 -04:00
Ok(serialize_response(
cmd_id,
builder,
msg::BaseArgs {
inner: Some(inner.as_union_value()),
inner_type: msg::Any::MakeTempDirRes,
..Default::default()
},
))
2018-09-22 04:42:07 -04:00
})
2018-08-23 18:36:45 -04:00
}
2018-10-03 20:48:02 -04:00
fn op_mkdir(
cli: &Cli,
2019-01-14 01:30:38 -05:00
base: &msg::Base<'_>,
data: deno_buf,
) -> Box<OpWithError> {
assert_eq!(data.len(), 0);
let inner = base.inner_as_mkdir().unwrap();
let path = String::from(inner.path().unwrap());
let recursive = inner.recursive();
let mode = inner.mode();
if let Err(e) = cli.check_write(&path) {
return odd_future(e);
}
blocking(base.sync(), move || {
2018-10-03 20:48:02 -04:00
debug!("op_mkdir {}", path);
deno_fs::mkdir(Path::new(&path), mode, recursive)?;
Ok(empty_buf())
2018-09-22 04:42:07 -04:00
})
2018-08-26 02:26:30 -04:00
}
fn op_chmod(
cli: &Cli,
2019-01-14 01:30:38 -05:00
base: &msg::Base<'_>,
data: deno_buf,
) -> Box<OpWithError> {
assert_eq!(data.len(), 0);
let inner = base.inner_as_chmod().unwrap();
let _mode = inner.mode();
let path = String::from(inner.path().unwrap());
if let Err(e) = cli.check_write(&path) {
return odd_future(e);
}
blocking(base.sync(), move || {
debug!("op_chmod {}", &path);
let path = PathBuf::from(&path);
// Still check file/dir exists on windows
let _metadata = fs::metadata(&path)?;
// Only work in unix
#[cfg(any(unix))]
{
// We need to use underscore to compile in Windows.
2019-02-08 11:14:33 -05:00
#[cfg_attr(
feature = "cargo-clippy",
allow(clippy::used_underscore_binding)
)]
let mut permissions = _metadata.permissions();
2019-02-08 11:14:33 -05:00
#[cfg_attr(
feature = "cargo-clippy",
allow(clippy::used_underscore_binding)
)]
permissions.set_mode(_mode);
fs::set_permissions(&path, permissions)?;
}
Ok(empty_buf())
})
}
2018-10-03 20:48:02 -04:00
fn op_open(
cli: &Cli,
2019-01-14 01:30:38 -05:00
base: &msg::Base<'_>,
data: deno_buf,
) -> Box<OpWithError> {
assert_eq!(data.len(), 0);
let cmd_id = base.cmd_id();
let inner = base.inner_as_open().unwrap();
2018-12-13 16:20:37 -05:00
let filename_str = inner.filename().unwrap();
let filename = PathBuf::from(&filename_str);
2018-12-12 12:05:58 -05:00
let mode = inner.mode().unwrap();
2018-12-12 12:05:58 -05:00
let mut open_options = tokio::fs::OpenOptions::new();
match mode {
"r" => {
open_options.read(true);
}
"r+" => {
open_options.read(true).write(true);
}
"w" => {
open_options.create(true).write(true).truncate(true);
}
"w+" => {
open_options
.read(true)
.create(true)
.write(true)
.truncate(true);
}
"a" => {
open_options.create(true).append(true);
}
"a+" => {
open_options.read(true).create(true).append(true);
}
"x" => {
open_options.create_new(true).write(true);
}
"x+" => {
open_options.create_new(true).read(true).write(true);
}
&_ => {
panic!("Unknown file open mode.");
}
}
match mode {
"r" => {
if let Err(e) = cli.check_read(&filename_str) {
return odd_future(e);
}
}
"w" | "a" | "x" => {
if let Err(e) = cli.check_write(&filename_str) {
return odd_future(e);
}
}
&_ => {
if let Err(e) = cli.check_read(&filename_str) {
return odd_future(e);
}
if let Err(e) = cli.check_write(&filename_str) {
return odd_future(e);
}
}
}
2018-12-12 12:05:58 -05:00
let op = open_options
.open(filename)
.map_err(DenoError::from)
.and_then(move |fs_file| -> OpResult {
let resource = resources::add_fs_file(fs_file);
let builder = &mut FlatBufferBuilder::new();
let inner =
msg::OpenRes::create(builder, &msg::OpenResArgs { rid: resource.rid });
Ok(serialize_response(
cmd_id,
builder,
msg::BaseArgs {
inner: Some(inner.as_union_value()),
inner_type: msg::Any::OpenRes,
..Default::default()
},
))
});
Box::new(op)
}
2018-10-03 20:48:02 -04:00
fn op_close(
_cli: &Cli,
2019-01-14 01:30:38 -05:00
base: &msg::Base<'_>,
data: deno_buf,
) -> Box<OpWithError> {
assert_eq!(data.len(), 0);
2018-10-03 21:41:59 -04:00
let inner = base.inner_as_close().unwrap();
let rid = inner.rid();
match resources::lookup(rid) {
None => odd_future(errors::bad_resource()),
Some(resource) => {
resource.close();
ok_future(empty_buf())
}
}
}
fn op_shutdown(
_cli: &Cli,
2019-01-14 01:30:38 -05:00
base: &msg::Base<'_>,
data: deno_buf,
) -> Box<OpWithError> {
assert_eq!(data.len(), 0);
let inner = base.inner_as_shutdown().unwrap();
let rid = inner.rid();
let how = inner.how();
match resources::lookup(rid) {
2018-10-10 11:15:47 -04:00
None => odd_future(errors::bad_resource()),
Some(mut resource) => {
let shutdown_mode = match how {
0 => Shutdown::Read,
1 => Shutdown::Write,
_ => unimplemented!(),
};
blocking(base.sync(), move || {
// Use UFCS for disambiguation
Resource::shutdown(&mut resource, shutdown_mode)?;
Ok(empty_buf())
})
}
}
}
2018-10-03 20:48:02 -04:00
fn op_read(
_cli: &Cli,
2019-01-14 01:30:38 -05:00
base: &msg::Base<'_>,
data: deno_buf,
) -> Box<OpWithError> {
let cmd_id = base.cmd_id();
let inner = base.inner_as_read().unwrap();
let rid = inner.rid();
match resources::lookup(rid) {
None => odd_future(errors::bad_resource()),
Some(resource) => {
let op = tokio::io::read(resource, data)
.map_err(DenoError::from)
.and_then(move |(_resource, _buf, nread)| {
let builder = &mut FlatBufferBuilder::new();
let inner = msg::ReadRes::create(
builder,
&msg::ReadResArgs {
nread: nread as u32,
eof: nread == 0,
},
);
Ok(serialize_response(
cmd_id,
builder,
msg::BaseArgs {
inner: Some(inner.as_union_value()),
inner_type: msg::Any::ReadRes,
..Default::default()
},
))
});
Box::new(op)
}
}
}
2018-10-03 20:48:02 -04:00
fn op_write(
_cli: &Cli,
2019-01-14 01:30:38 -05:00
base: &msg::Base<'_>,
data: deno_buf,
) -> Box<OpWithError> {
let cmd_id = base.cmd_id();
let inner = base.inner_as_write().unwrap();
let rid = inner.rid();
match resources::lookup(rid) {
None => odd_future(errors::bad_resource()),
Some(resource) => {
let op = tokio_write::write(resource, data)
.map_err(DenoError::from)
.and_then(move |(_resource, _buf, nwritten)| {
let builder = &mut FlatBufferBuilder::new();
let inner = msg::WriteRes::create(
builder,
&msg::WriteResArgs {
nbyte: nwritten as u32,
},
);
Ok(serialize_response(
cmd_id,
builder,
msg::BaseArgs {
inner: Some(inner.as_union_value()),
inner_type: msg::Any::WriteRes,
..Default::default()
},
))
});
Box::new(op)
}
}
}
fn op_seek(
_cli: &Cli,
base: &msg::Base<'_>,
data: deno_buf,
) -> Box<OpWithError> {
assert_eq!(data.len(), 0);
let _cmd_id = base.cmd_id();
let inner = base.inner_as_seek().unwrap();
let rid = inner.rid();
let offset = inner.offset();
let whence = inner.whence();
match resources::lookup(rid) {
None => odd_future(errors::bad_resource()),
Some(resource) => {
let op = resources::seek(resource, offset, whence)
.and_then(move |_| Ok(empty_buf()));
Box::new(op)
}
}
}
2018-10-03 20:48:02 -04:00
fn op_remove(
cli: &Cli,
2019-01-14 01:30:38 -05:00
base: &msg::Base<'_>,
data: deno_buf,
) -> Box<OpWithError> {
assert_eq!(data.len(), 0);
let inner = base.inner_as_remove().unwrap();
let path_ = inner.path().unwrap();
let path = PathBuf::from(path_);
let recursive = inner.recursive();
if let Err(e) = cli.check_write(path.to_str().unwrap()) {
return odd_future(e);
}
blocking(base.sync(), move || {
2018-10-03 20:48:02 -04:00
debug!("op_remove {}", path.display());
2018-09-22 04:42:07 -04:00
let metadata = fs::metadata(&path)?;
if metadata.is_file() {
2018-09-22 04:42:07 -04:00
fs::remove_file(&path)?;
} else if recursive {
remove_dir_all(&path)?;
} else {
fs::remove_dir(&path)?;
}
Ok(empty_buf())
2018-09-22 04:42:07 -04:00
})
}
2018-10-06 23:06:20 -04:00
// Prototype https://github.com/denoland/deno/blob/golang/os.go#L171-L184
2018-10-03 20:48:02 -04:00
fn op_read_file(
cli: &Cli,
2019-01-14 01:30:38 -05:00
base: &msg::Base<'_>,
data: deno_buf,
) -> Box<OpWithError> {
assert_eq!(data.len(), 0);
let inner = base.inner_as_read_file().unwrap();
let cmd_id = base.cmd_id();
let filename_ = inner.filename().unwrap();
let filename = PathBuf::from(filename_);
2018-10-03 20:48:02 -04:00
debug!("op_read_file {}", filename.display());
if let Err(e) = cli.check_read(&filename_) {
return odd_future(e);
}
blocking(base.sync(), move || {
2018-09-22 04:42:07 -04:00
let vec = fs::read(&filename)?;
// Build the response message. memcpy data into inner.
// TODO(ry) zero-copy.
let builder = &mut FlatBufferBuilder::new();
let data_off = builder.create_vector(vec.as_slice());
let inner = msg::ReadFileRes::create(
builder,
&msg::ReadFileResArgs {
data: Some(data_off),
},
);
2018-09-09 19:48:10 -04:00
Ok(serialize_response(
cmd_id,
builder,
msg::BaseArgs {
inner: Some(inner.as_union_value()),
inner_type: msg::Any::ReadFileRes,
..Default::default()
},
))
2018-09-22 04:42:07 -04:00
})
2018-08-09 13:24:30 -04:00
}
2018-10-03 20:48:02 -04:00
fn op_copy_file(
cli: &Cli,
2019-01-14 01:30:38 -05:00
base: &msg::Base<'_>,
data: deno_buf,
) -> Box<OpWithError> {
2018-09-30 18:06:41 -04:00
assert_eq!(data.len(), 0);
let inner = base.inner_as_copy_file().unwrap();
let from_ = inner.from().unwrap();
let from = PathBuf::from(from_);
let to_ = inner.to().unwrap();
let to = PathBuf::from(to_);
2018-09-30 18:06:41 -04:00
if let Err(e) = cli.check_read(&from_) {
return odd_future(e);
}
if let Err(e) = cli.check_write(&to_) {
return odd_future(e);
2018-09-30 18:06:41 -04:00
}
2018-10-03 20:48:02 -04:00
debug!("op_copy_file {} {}", from.display(), to.display());
blocking(base.sync(), move || {
// On *nix, Rust deem non-existent path as invalid input
// See https://github.com/rust-lang/rust/issues/54800
// Once the issue is reolved, we should remove this workaround.
if cfg!(unix) && !from.is_file() {
return Err(errors::new(
ErrorKind::NotFound,
"File not found".to_string(),
));
}
2018-09-30 18:06:41 -04:00
fs::copy(&from, &to)?;
Ok(empty_buf())
})
}
2018-08-29 09:22:25 -04:00
macro_rules! to_seconds {
($time:expr) => {{
// Unwrap is safe here as if the file is before the unix epoch
// something is very wrong.
2018-08-30 13:54:56 -04:00
$time
.and_then(|t| Ok(t.duration_since(UNIX_EPOCH).unwrap().as_secs()))
.unwrap_or(0)
}};
2018-08-29 09:22:25 -04:00
}
#[cfg(any(unix))]
fn get_mode(perm: &fs::Permissions) -> u32 {
perm.mode()
}
#[cfg(not(any(unix)))]
fn get_mode(_perm: &fs::Permissions) -> u32 {
0
}
2018-10-13 16:03:27 -04:00
fn op_cwd(
_cli: &Cli,
2019-01-14 01:30:38 -05:00
base: &msg::Base<'_>,
data: deno_buf,
) -> Box<OpWithError> {
2018-10-13 16:03:27 -04:00
assert_eq!(data.len(), 0);
let cmd_id = base.cmd_id();
Box::new(futures::future::result(|| -> OpResult {
let path = std::env::current_dir()?;
let builder = &mut FlatBufferBuilder::new();
let cwd =
builder.create_string(&path.into_os_string().into_string().unwrap());
let inner =
msg::CwdRes::create(builder, &msg::CwdResArgs { cwd: Some(cwd) });
2018-10-13 16:03:27 -04:00
Ok(serialize_response(
cmd_id,
builder,
msg::BaseArgs {
inner: Some(inner.as_union_value()),
inner_type: msg::Any::CwdRes,
..Default::default()
},
))
}()))
}
2018-10-03 20:48:02 -04:00
fn op_stat(
cli: &Cli,
2019-01-14 01:30:38 -05:00
base: &msg::Base<'_>,
data: deno_buf,
) -> Box<OpWithError> {
assert_eq!(data.len(), 0);
let inner = base.inner_as_stat().unwrap();
let cmd_id = base.cmd_id();
let filename_ = inner.filename().unwrap();
let filename = PathBuf::from(filename_);
let lstat = inner.lstat();
2018-09-02 02:33:24 -04:00
if let Err(e) = cli.check_read(&filename_) {
return odd_future(e);
}
blocking(base.sync(), move || {
let builder = &mut FlatBufferBuilder::new();
2018-10-03 20:48:02 -04:00
debug!("op_stat {} {}", filename.display(), lstat);
let metadata = if lstat {
2018-09-22 04:42:07 -04:00
fs::symlink_metadata(&filename)?
} else {
2018-09-22 04:42:07 -04:00
fs::metadata(&filename)?
};
let inner = msg::StatRes::create(
builder,
2018-09-11 15:38:53 -04:00
&msg::StatResArgs {
is_file: metadata.is_file(),
is_symlink: metadata.file_type().is_symlink(),
len: metadata.len(),
modified: to_seconds!(metadata.modified()),
accessed: to_seconds!(metadata.accessed()),
created: to_seconds!(metadata.created()),
mode: get_mode(&metadata.permissions()),
has_mode: cfg!(target_family = "unix"),
..Default::default()
},
);
2018-08-29 09:22:25 -04:00
2018-09-09 19:48:10 -04:00
Ok(serialize_response(
cmd_id,
builder,
msg::BaseArgs {
inner: Some(inner.as_union_value()),
inner_type: msg::Any::StatRes,
..Default::default()
},
))
2018-09-22 04:42:07 -04:00
})
2018-08-29 09:22:25 -04:00
}
2018-10-03 20:48:02 -04:00
fn op_read_dir(
cli: &Cli,
2019-01-14 01:30:38 -05:00
base: &msg::Base<'_>,
data: deno_buf,
) -> Box<OpWithError> {
2018-10-03 17:56:56 -04:00
assert_eq!(data.len(), 0);
let inner = base.inner_as_read_dir().unwrap();
2018-10-03 17:56:56 -04:00
let cmd_id = base.cmd_id();
let path = String::from(inner.path().unwrap());
2018-10-03 17:56:56 -04:00
if let Err(e) = cli.check_read(&path) {
return odd_future(e);
}
blocking(base.sync(), move || -> OpResult {
2018-10-03 20:48:02 -04:00
debug!("op_read_dir {}", path);
2018-10-03 17:56:56 -04:00
let builder = &mut FlatBufferBuilder::new();
let entries: Vec<_> = fs::read_dir(Path::new(&path))?
.map(|entry| {
let entry = entry.unwrap();
let metadata = entry.metadata().unwrap();
let file_type = metadata.file_type();
let name = builder.create_string(entry.file_name().to_str().unwrap());
let path = builder.create_string(entry.path().to_str().unwrap());
msg::StatRes::create(
builder,
&msg::StatResArgs {
is_file: file_type.is_file(),
is_symlink: file_type.is_symlink(),
len: metadata.len(),
modified: to_seconds!(metadata.modified()),
accessed: to_seconds!(metadata.accessed()),
created: to_seconds!(metadata.created()),
name: Some(name),
path: Some(path),
2018-12-12 02:31:18 -05:00
mode: get_mode(&metadata.permissions()),
has_mode: cfg!(target_family = "unix"),
2018-10-03 17:56:56 -04:00
},
)
2018-10-15 16:46:42 -04:00
}).collect();
2018-10-03 17:56:56 -04:00
let entries = builder.create_vector(&entries);
let inner = msg::ReadDirRes::create(
2018-10-03 17:56:56 -04:00
builder,
&msg::ReadDirResArgs {
entries: Some(entries),
},
);
Ok(serialize_response(
cmd_id,
builder,
msg::BaseArgs {
inner: Some(inner.as_union_value()),
inner_type: msg::Any::ReadDirRes,
2018-10-03 17:56:56 -04:00
..Default::default()
},
))
})
}
2018-10-03 20:48:02 -04:00
fn op_write_file(
cli: &Cli,
2019-01-14 01:30:38 -05:00
base: &msg::Base<'_>,
data: deno_buf,
) -> Box<OpWithError> {
let inner = base.inner_as_write_file().unwrap();
let filename = String::from(inner.filename().unwrap());
let update_perm = inner.update_perm();
let perm = inner.perm();
let is_create = inner.is_create();
let is_append = inner.is_append();
2018-09-22 04:42:07 -04:00
if let Err(e) = cli.check_write(&filename) {
return odd_future(e);
}
blocking(base.sync(), move || -> OpResult {
2018-10-03 20:48:02 -04:00
debug!("op_write_file {} {}", filename, data.len());
deno_fs::write_file_2(
Path::new(&filename),
data,
update_perm,
perm,
is_create,
is_append,
)?;
Ok(empty_buf())
2018-09-22 04:42:07 -04:00
})
}
2018-10-03 20:48:02 -04:00
fn op_rename(
cli: &Cli,
2019-01-14 01:30:38 -05:00
base: &msg::Base<'_>,
data: deno_buf,
) -> Box<OpWithError> {
assert_eq!(data.len(), 0);
let inner = base.inner_as_rename().unwrap();
let oldpath = PathBuf::from(inner.oldpath().unwrap());
let newpath_ = inner.newpath().unwrap();
let newpath = PathBuf::from(newpath_);
if let Err(e) = cli.check_write(&newpath_) {
return odd_future(e);
}
blocking(base.sync(), move || -> OpResult {
2018-10-03 20:48:02 -04:00
debug!("op_rename {} {}", oldpath.display(), newpath.display());
2018-09-22 04:42:07 -04:00
fs::rename(&oldpath, &newpath)?;
Ok(empty_buf())
2018-09-22 04:42:07 -04:00
})
2018-09-03 20:22:30 -04:00
}
2018-09-19 00:38:24 -04:00
2018-10-03 20:48:02 -04:00
fn op_symlink(
cli: &Cli,
2019-01-14 01:30:38 -05:00
base: &msg::Base<'_>,
data: deno_buf,
) -> Box<OpWithError> {
assert_eq!(data.len(), 0);
let inner = base.inner_as_symlink().unwrap();
let oldname = PathBuf::from(inner.oldname().unwrap());
let newname_ = inner.newname().unwrap();
let newname = PathBuf::from(newname_);
if let Err(e) = cli.check_write(&newname_) {
return odd_future(e);
2018-09-19 00:38:24 -04:00
}
// TODO Use type for Windows.
if cfg!(windows) {
return odd_future(errors::new(
ErrorKind::Other,
2018-10-05 21:35:29 -04:00
"Not implemented".to_string(),
));
2018-09-19 00:38:24 -04:00
}
blocking(base.sync(), move || -> OpResult {
2018-10-03 20:48:02 -04:00
debug!("op_symlink {} {}", oldname.display(), newname.display());
2018-09-22 04:42:07 -04:00
#[cfg(any(unix))]
std::os::unix::fs::symlink(&oldname, &newname)?;
Ok(empty_buf())
})
2018-09-19 00:38:24 -04:00
}
2018-09-25 00:20:49 -04:00
2018-10-03 20:48:02 -04:00
fn op_read_link(
cli: &Cli,
2019-01-14 01:30:38 -05:00
base: &msg::Base<'_>,
data: deno_buf,
) -> Box<OpWithError> {
assert_eq!(data.len(), 0);
let inner = base.inner_as_readlink().unwrap();
2018-09-25 00:20:49 -04:00
let cmd_id = base.cmd_id();
let name_ = inner.name().unwrap();
let name = PathBuf::from(name_);
if let Err(e) = cli.check_read(&name_) {
return odd_future(e);
}
2018-09-22 04:42:07 -04:00
blocking(base.sync(), move || -> OpResult {
2018-10-03 20:48:02 -04:00
debug!("op_read_link {}", name.display());
2018-09-22 04:42:07 -04:00
let path = fs::read_link(&name)?;
2018-09-25 00:20:49 -04:00
let builder = &mut FlatBufferBuilder::new();
let path_off = builder.create_string(path.to_str().unwrap());
let inner = msg::ReadlinkRes::create(
2018-09-25 00:20:49 -04:00
builder,
&msg::ReadlinkResArgs {
path: Some(path_off),
},
);
Ok(serialize_response(
cmd_id,
builder,
msg::BaseArgs {
inner: Some(inner.as_union_value()),
inner_type: msg::Any::ReadlinkRes,
2018-09-25 00:20:49 -04:00
..Default::default()
},
))
2018-09-22 04:42:07 -04:00
})
2018-09-25 00:20:49 -04:00
}
2018-09-30 15:06:20 -04:00
fn op_repl_start(
cli: &Cli,
2019-01-14 01:30:38 -05:00
base: &msg::Base<'_>,
data: deno_buf,
) -> Box<OpWithError> {
assert_eq!(data.len(), 0);
let inner = base.inner_as_repl_start().unwrap();
let cmd_id = base.cmd_id();
let history_file = String::from(inner.history_file().unwrap());
debug!("op_repl_start {}", history_file);
let history_path = repl::history_path(&cli.state.dir, &history_file);
let repl = repl::Repl::new(history_path);
let resource = resources::add_repl(repl);
let builder = &mut FlatBufferBuilder::new();
let inner = msg::ReplStartRes::create(
builder,
&msg::ReplStartResArgs { rid: resource.rid },
);
ok_future(serialize_response(
cmd_id,
builder,
msg::BaseArgs {
inner: Some(inner.as_union_value()),
inner_type: msg::Any::ReplStartRes,
..Default::default()
},
))
}
fn op_repl_readline(
_cli: &Cli,
2019-01-14 01:30:38 -05:00
base: &msg::Base<'_>,
data: deno_buf,
) -> Box<OpWithError> {
assert_eq!(data.len(), 0);
let inner = base.inner_as_repl_readline().unwrap();
let cmd_id = base.cmd_id();
let rid = inner.rid();
let prompt = inner.prompt().unwrap().to_owned();
debug!("op_repl_readline {} {}", rid, prompt);
blocking(base.sync(), move || -> OpResult {
let repl = resources::get_repl(rid)?;
let line = repl.lock().unwrap().readline(&prompt)?;
let builder = &mut FlatBufferBuilder::new();
let line_off = builder.create_string(&line);
let inner = msg::ReplReadlineRes::create(
builder,
&msg::ReplReadlineResArgs {
line: Some(line_off),
},
);
Ok(serialize_response(
cmd_id,
builder,
msg::BaseArgs {
inner: Some(inner.as_union_value()),
inner_type: msg::Any::ReplReadlineRes,
..Default::default()
},
))
})
}
2018-10-03 20:48:02 -04:00
fn op_truncate(
cli: &Cli,
2019-01-14 01:30:38 -05:00
base: &msg::Base<'_>,
data: deno_buf,
) -> Box<OpWithError> {
2018-09-30 15:06:20 -04:00
assert_eq!(data.len(), 0);
let inner = base.inner_as_truncate().unwrap();
let filename = String::from(inner.name().unwrap());
let len = inner.len();
if let Err(e) = cli.check_write(&filename) {
return odd_future(e);
}
blocking(base.sync(), move || {
2018-10-03 20:48:02 -04:00
debug!("op_truncate {} {}", filename, len);
2018-09-30 15:06:20 -04:00
let f = fs::OpenOptions::new().write(true).open(&filename)?;
f.set_len(u64::from(len))?;
2018-09-30 15:06:20 -04:00
Ok(empty_buf())
})
}
2018-10-03 20:48:02 -04:00
fn op_listen(
cli: &Cli,
2019-01-14 01:30:38 -05:00
base: &msg::Base<'_>,
data: deno_buf,
) -> Box<OpWithError> {
assert_eq!(data.len(), 0);
if let Err(e) = cli.check_net("listen") {
return odd_future(e);
}
let cmd_id = base.cmd_id();
2018-10-03 21:41:59 -04:00
let inner = base.inner_as_listen().unwrap();
let network = inner.network().unwrap();
assert_eq!(network, "tcp");
2018-10-03 21:41:59 -04:00
let address = inner.address().unwrap();
Box::new(futures::future::result((move || {
let addr = resolve_addr(address).wait()?;
let listener = TcpListener::bind(&addr)?;
let resource = resources::add_tcp_listener(listener);
let builder = &mut FlatBufferBuilder::new();
2018-10-03 21:41:59 -04:00
let inner = msg::ListenRes::create(
builder,
&msg::ListenResArgs { rid: resource.rid },
);
Ok(serialize_response(
cmd_id,
builder,
msg::BaseArgs {
2018-10-03 21:41:59 -04:00
inner: Some(inner.as_union_value()),
inner_type: msg::Any::ListenRes,
..Default::default()
},
))
})()))
}
fn new_conn(cmd_id: u32, tcp_stream: TcpStream) -> OpResult {
let tcp_stream_resource = resources::add_tcp_stream(tcp_stream);
// TODO forward socket_addr to client.
let builder = &mut FlatBufferBuilder::new();
2018-10-03 21:41:59 -04:00
let inner = msg::NewConn::create(
builder,
&msg::NewConnArgs {
rid: tcp_stream_resource.rid,
..Default::default()
},
);
Ok(serialize_response(
cmd_id,
builder,
msg::BaseArgs {
2018-10-03 21:41:59 -04:00
inner: Some(inner.as_union_value()),
inner_type: msg::Any::NewConn,
..Default::default()
},
))
}
2018-10-03 20:48:02 -04:00
fn op_accept(
cli: &Cli,
2019-01-14 01:30:38 -05:00
base: &msg::Base<'_>,
data: deno_buf,
) -> Box<OpWithError> {
assert_eq!(data.len(), 0);
if let Err(e) = cli.check_net("accept") {
return odd_future(e);
}
let cmd_id = base.cmd_id();
2018-10-03 21:41:59 -04:00
let inner = base.inner_as_accept().unwrap();
let server_rid = inner.rid();
match resources::lookup(server_rid) {
None => odd_future(errors::bad_resource()),
Some(server_resource) => {
let op = tokio_util::accept(server_resource)
.map_err(DenoError::from)
.and_then(move |(tcp_stream, _socket_addr)| {
new_conn(cmd_id, tcp_stream)
});
Box::new(op)
}
}
}
2018-10-03 20:48:02 -04:00
fn op_dial(
cli: &Cli,
2019-01-14 01:30:38 -05:00
base: &msg::Base<'_>,
data: deno_buf,
) -> Box<OpWithError> {
assert_eq!(data.len(), 0);
if let Err(e) = cli.check_net("dial") {
return odd_future(e);
}
let cmd_id = base.cmd_id();
2018-10-03 21:41:59 -04:00
let inner = base.inner_as_dial().unwrap();
let network = inner.network().unwrap();
assert_eq!(network, "tcp"); // TODO Support others.
2018-10-03 21:41:59 -04:00
let address = inner.address().unwrap();
let op =
resolve_addr(address)
.map_err(DenoError::from)
.and_then(move |addr| {
TcpStream::connect(&addr)
.map_err(DenoError::from)
.and_then(move |tcp_stream| new_conn(cmd_id, tcp_stream))
});
Box::new(op)
}
2018-10-05 13:21:15 -04:00
fn op_metrics(
cli: &Cli,
2019-01-14 01:30:38 -05:00
base: &msg::Base<'_>,
data: deno_buf,
) -> Box<OpWithError> {
2018-10-05 13:21:15 -04:00
assert_eq!(data.len(), 0);
let cmd_id = base.cmd_id();
let builder = &mut FlatBufferBuilder::new();
let inner = msg::MetricsRes::create(
builder,
&msg::MetricsResArgs::from(&cli.state.metrics),
2018-10-05 13:21:15 -04:00
);
ok_future(serialize_response(
cmd_id,
builder,
msg::BaseArgs {
inner: Some(inner.as_union_value()),
inner_type: msg::Any::MetricsRes,
..Default::default()
},
))
}
2018-10-30 15:58:55 -04:00
fn op_resources(
_cli: &Cli,
2019-01-14 01:30:38 -05:00
base: &msg::Base<'_>,
data: deno_buf,
) -> Box<OpWithError> {
2018-10-30 15:58:55 -04:00
assert_eq!(data.len(), 0);
let cmd_id = base.cmd_id();
let builder = &mut FlatBufferBuilder::new();
let serialized_resources = table_entries();
let res: Vec<_> = serialized_resources
.iter()
.map(|(key, value)| {
let repr = builder.create_string(value);
msg::Resource::create(
builder,
&msg::ResourceArgs {
rid: *key,
2018-10-30 15:58:55 -04:00
repr: Some(repr),
},
)
}).collect();
let resources = builder.create_vector(&res);
let inner = msg::ResourcesRes::create(
builder,
&msg::ResourcesResArgs {
resources: Some(resources),
},
);
ok_future(serialize_response(
cmd_id,
builder,
msg::BaseArgs {
inner: Some(inner.as_union_value()),
inner_type: msg::Any::ResourcesRes,
..Default::default()
},
))
}
fn subprocess_stdio_map(v: msg::ProcessStdio) -> std::process::Stdio {
match v {
msg::ProcessStdio::Inherit => std::process::Stdio::inherit(),
msg::ProcessStdio::Piped => std::process::Stdio::piped(),
msg::ProcessStdio::Null => std::process::Stdio::null(),
}
}
fn op_run(cli: &Cli, base: &msg::Base<'_>, data: deno_buf) -> Box<OpWithError> {
assert!(base.sync());
let cmd_id = base.cmd_id();
if let Err(e) = cli.check_run() {
return odd_future(e);
}
assert_eq!(data.len(), 0);
let inner = base.inner_as_run().unwrap();
let args = inner.args().unwrap();
2019-02-15 10:37:04 -05:00
let env = inner.env().unwrap();
let cwd = inner.cwd();
2018-11-30 03:30:49 -05:00
let mut c = Command::new(args.get(0));
(1..args.len()).for_each(|i| {
let arg = args.get(i);
2018-11-30 03:30:49 -05:00
c.arg(arg);
});
2018-11-30 03:30:49 -05:00
cwd.map(|d| c.current_dir(d));
2019-02-15 10:37:04 -05:00
(0..env.len()).for_each(|i| {
let entry = env.get(i);
c.env(entry.key().unwrap(), entry.value().unwrap());
});
2018-11-30 03:30:49 -05:00
c.stdin(subprocess_stdio_map(inner.stdin()));
c.stdout(subprocess_stdio_map(inner.stdout()));
c.stderr(subprocess_stdio_map(inner.stderr()));
// Spawn the command.
2018-11-30 03:30:49 -05:00
let child = match c.spawn_async() {
Ok(v) => v,
Err(err) => {
return odd_future(err.into());
}
};
let pid = child.id();
let resources = resources::add_child(child);
let mut res_args = msg::RunResArgs {
rid: resources.child_rid,
pid,
..Default::default()
};
if let Some(stdin_rid) = resources.stdin_rid {
res_args.stdin_rid = stdin_rid;
}
if let Some(stdout_rid) = resources.stdout_rid {
res_args.stdout_rid = stdout_rid;
}
if let Some(stderr_rid) = resources.stderr_rid {
res_args.stderr_rid = stderr_rid;
}
let builder = &mut FlatBufferBuilder::new();
let inner = msg::RunRes::create(builder, &res_args);
ok_future(serialize_response(
cmd_id,
builder,
msg::BaseArgs {
inner: Some(inner.as_union_value()),
inner_type: msg::Any::RunRes,
..Default::default()
},
))
}
fn op_run_status(
cli: &Cli,
2019-01-14 01:30:38 -05:00
base: &msg::Base<'_>,
data: deno_buf,
) -> Box<OpWithError> {
assert_eq!(data.len(), 0);
let cmd_id = base.cmd_id();
let inner = base.inner_as_run_status().unwrap();
let rid = inner.rid();
if let Err(e) = cli.check_run() {
return odd_future(e);
}
let future = match resources::child_status(rid) {
Err(e) => {
return odd_future(e);
}
Ok(f) => f,
};
let future = future.and_then(move |run_status| {
let code = run_status.code();
#[cfg(unix)]
let signal = run_status.signal();
#[cfg(not(unix))]
let signal = None;
code
.or(signal)
.expect("Should have either an exit code or a signal.");
let got_signal = signal.is_some();
let builder = &mut FlatBufferBuilder::new();
let inner = msg::RunStatusRes::create(
builder,
&msg::RunStatusResArgs {
got_signal,
exit_code: code.unwrap_or(-1),
exit_signal: signal.unwrap_or(-1),
},
);
Ok(serialize_response(
cmd_id,
builder,
msg::BaseArgs {
inner: Some(inner.as_union_value()),
inner_type: msg::Any::RunStatusRes,
..Default::default()
},
))
});
Box::new(future)
}
struct GetMessageFuture {
pub state: Arc<IsolateState>,
}
impl Future for GetMessageFuture {
type Item = Option<Buf>;
type Error = ();
fn poll(&mut self) -> Result<Async<Self::Item>, Self::Error> {
assert!(self.state.worker_channels.is_some());
match self.state.worker_channels {
None => panic!("expected worker_channels"),
Some(ref wc) => {
let mut wc = wc.lock().unwrap();
wc.1.poll()
}
}
}
}
fn op_worker_get_message(
cli: &Cli,
2019-01-14 01:30:38 -05:00
base: &msg::Base<'_>,
data: deno_buf,
) -> Box<OpWithError> {
assert_eq!(data.len(), 0);
let cmd_id = base.cmd_id();
let op = GetMessageFuture {
state: cli.state.clone(),
};
let op = op.map_err(move |_| -> DenoError { unimplemented!() });
let op = op.and_then(move |maybe_buf| -> DenoResult<Buf> {
debug!("op_worker_get_message");
let builder = &mut FlatBufferBuilder::new();
let data = maybe_buf.as_ref().map(|buf| builder.create_vector(buf));
let inner = msg::WorkerGetMessageRes::create(
builder,
&msg::WorkerGetMessageResArgs { data },
);
Ok(serialize_response(
cmd_id,
builder,
msg::BaseArgs {
inner: Some(inner.as_union_value()),
inner_type: msg::Any::WorkerGetMessageRes,
..Default::default()
},
))
});
Box::new(op)
}
fn op_worker_post_message(
cli: &Cli,
2019-01-14 01:30:38 -05:00
base: &msg::Base<'_>,
data: deno_buf,
) -> Box<OpWithError> {
let cmd_id = base.cmd_id();
let d = Vec::from(data.as_ref()).into_boxed_slice();
assert!(cli.state.worker_channels.is_some());
let tx = match cli.state.worker_channels {
None => panic!("expected worker_channels"),
Some(ref wc) => {
2019-01-14 01:30:38 -05:00
let wc = wc.lock().unwrap();
wc.0.clone()
}
};
let op = tx.send(d);
let op = op.map_err(|e| errors::new(ErrorKind::Other, e.to_string()));
let op = op.and_then(move |_| -> DenoResult<Buf> {
let builder = &mut FlatBufferBuilder::new();
Ok(serialize_response(
cmd_id,
builder,
msg::BaseArgs {
..Default::default()
},
))
});
Box::new(op)
}
#[cfg(test)]
mod tests {
use super::*;
use crate::cli::Cli;
use crate::isolate_state::IsolateState;
use crate::permissions::{DenoPermissions, PermissionAccessor};
#[test]
fn fetch_module_meta_fails_without_read() {
let state = Arc::new(IsolateState::mock());
let permissions = DenoPermissions {
allow_write: PermissionAccessor::from(true),
allow_env: PermissionAccessor::from(true),
allow_net: PermissionAccessor::from(true),
allow_run: PermissionAccessor::from(true),
..Default::default()
};
let cli = Cli::new(None, state, permissions);
let builder = &mut FlatBufferBuilder::new();
let fetch_msg_args = msg::FetchModuleMetaDataArgs {
specifier: Some(builder.create_string("./somefile")),
referrer: Some(builder.create_string(".")),
};
let inner = msg::FetchModuleMetaData::create(builder, &fetch_msg_args);
let base_args = msg::BaseArgs {
inner: Some(inner.as_union_value()),
inner_type: msg::Any::FetchModuleMetaData,
..Default::default()
};
let base = msg::Base::create(builder, &base_args);
msg::finish_base_buffer(builder, base);
let data = builder.finished_data();
let final_msg = msg::get_root_as_base(&data);
let fetch_result =
op_fetch_module_meta_data(&cli, &final_msg, deno_buf::empty()).wait();
match fetch_result {
Ok(_) => assert!(true),
Err(e) => assert_eq!(e.to_string(), permission_denied().to_string()),
}
}
#[test]
fn fetch_module_meta_fails_without_write() {
let state = Arc::new(IsolateState::mock());
let permissions = DenoPermissions {
allow_read: PermissionAccessor::from(true),
allow_env: PermissionAccessor::from(true),
allow_net: PermissionAccessor::from(true),
allow_run: PermissionAccessor::from(true),
..Default::default()
};
let cli = Cli::new(None, state, permissions);
let builder = &mut FlatBufferBuilder::new();
let fetch_msg_args = msg::FetchModuleMetaDataArgs {
specifier: Some(builder.create_string("./somefile")),
referrer: Some(builder.create_string(".")),
};
let inner = msg::FetchModuleMetaData::create(builder, &fetch_msg_args);
let base_args = msg::BaseArgs {
inner: Some(inner.as_union_value()),
inner_type: msg::Any::FetchModuleMetaData,
..Default::default()
};
let base = msg::Base::create(builder, &base_args);
msg::finish_base_buffer(builder, base);
let data = builder.finished_data();
let final_msg = msg::get_root_as_base(&data);
let fetch_result =
op_fetch_module_meta_data(&cli, &final_msg, deno_buf::empty()).wait();
match fetch_result {
Ok(_) => assert!(true),
Err(e) => assert_eq!(e.to_string(), permission_denied().to_string()),
}
}
#[test]
fn fetch_module_meta_fails_without_net() {
let state = Arc::new(IsolateState::mock());
let permissions = DenoPermissions {
allow_read: PermissionAccessor::from(true),
allow_write: PermissionAccessor::from(true),
allow_env: PermissionAccessor::from(true),
allow_run: PermissionAccessor::from(true),
..Default::default()
};
let cli = Cli::new(None, state, permissions);
let builder = &mut FlatBufferBuilder::new();
let fetch_msg_args = msg::FetchModuleMetaDataArgs {
specifier: Some(builder.create_string("./somefile")),
referrer: Some(builder.create_string(".")),
};
let inner = msg::FetchModuleMetaData::create(builder, &fetch_msg_args);
let base_args = msg::BaseArgs {
inner: Some(inner.as_union_value()),
inner_type: msg::Any::FetchModuleMetaData,
..Default::default()
};
let base = msg::Base::create(builder, &base_args);
msg::finish_base_buffer(builder, base);
let data = builder.finished_data();
let final_msg = msg::get_root_as_base(&data);
let fetch_result =
op_fetch_module_meta_data(&cli, &final_msg, deno_buf::empty()).wait();
match fetch_result {
Ok(_) => assert!(true),
Err(e) => assert_eq!(e.to_string(), permission_denied().to_string()),
}
}
#[test]
fn fetch_module_meta_not_permission_denied_with_permissions() {
let state = Arc::new(IsolateState::mock());
let permissions = DenoPermissions {
allow_read: PermissionAccessor::from(true),
allow_write: PermissionAccessor::from(true),
allow_net: PermissionAccessor::from(true),
..Default::default()
};
let cli = Cli::new(None, state, permissions);
let builder = &mut FlatBufferBuilder::new();
let fetch_msg_args = msg::FetchModuleMetaDataArgs {
specifier: Some(builder.create_string("./somefile")),
referrer: Some(builder.create_string(".")),
};
let inner = msg::FetchModuleMetaData::create(builder, &fetch_msg_args);
let base_args = msg::BaseArgs {
inner: Some(inner.as_union_value()),
inner_type: msg::Any::FetchModuleMetaData,
..Default::default()
};
let base = msg::Base::create(builder, &base_args);
msg::finish_base_buffer(builder, base);
let data = builder.finished_data();
let final_msg = msg::get_root_as_base(&data);
let fetch_result =
op_fetch_module_meta_data(&cli, &final_msg, deno_buf::empty()).wait();
match fetch_result {
Ok(_) => assert!(true),
Err(e) => assert!(e.to_string() != permission_denied().to_string()),
}
}
}