2023-01-02 16:00:42 -05:00
|
|
|
// Copyright 2018-2023 the Deno authors. All rights reserved. MIT license.
|
2021-01-07 21:08:51 -05:00
|
|
|
|
2023-01-17 19:18:24 -05:00
|
|
|
use crate::args::CaData;
|
2022-06-27 16:54:09 -04:00
|
|
|
use crate::args::Flags;
|
2020-11-30 14:35:12 -05:00
|
|
|
use crate::colors;
|
2021-09-13 00:19:23 -04:00
|
|
|
use crate::file_fetcher::get_source_from_data_url;
|
2021-06-07 08:02:53 -04:00
|
|
|
use crate::ops;
|
2021-09-24 11:10:42 -04:00
|
|
|
use crate::proc_state::ProcState;
|
2023-01-24 23:03:03 -05:00
|
|
|
use crate::util::v8::construct_v8_flags;
|
2020-12-11 18:36:18 -05:00
|
|
|
use crate::version;
|
2023-02-15 11:30:54 -05:00
|
|
|
use crate::CliGraphResolver;
|
2021-11-16 09:02:28 -05:00
|
|
|
use deno_core::anyhow::Context;
|
2020-11-30 14:35:12 -05:00
|
|
|
use deno_core::error::type_error;
|
|
|
|
use deno_core::error::AnyError;
|
2023-01-04 18:54:54 -05:00
|
|
|
use deno_core::futures::io::AllowStdIo;
|
2023-03-19 18:32:54 -04:00
|
|
|
use deno_core::futures::task::LocalFutureObj;
|
2023-01-04 18:54:54 -05:00
|
|
|
use deno_core::futures::AsyncReadExt;
|
|
|
|
use deno_core::futures::AsyncSeekExt;
|
2020-11-30 14:35:12 -05:00
|
|
|
use deno_core::futures::FutureExt;
|
2021-06-21 19:45:41 -04:00
|
|
|
use deno_core::located_script_name;
|
2021-01-04 18:15:52 -05:00
|
|
|
use deno_core::serde::Deserialize;
|
|
|
|
use deno_core::serde::Serialize;
|
|
|
|
use deno_core::serde_json;
|
2021-01-07 21:08:51 -05:00
|
|
|
use deno_core::url::Url;
|
2021-01-04 18:15:52 -05:00
|
|
|
use deno_core::v8_set_flags;
|
2020-11-30 14:35:12 -05:00
|
|
|
use deno_core::ModuleLoader;
|
|
|
|
use deno_core::ModuleSpecifier;
|
2023-01-10 08:35:44 -05:00
|
|
|
use deno_core::ResolutionKind;
|
2022-02-24 08:28:00 -05:00
|
|
|
use deno_graph::source::Resolver;
|
2022-09-02 16:53:23 -04:00
|
|
|
use deno_runtime::fmt_errors::format_js_error;
|
2023-03-19 18:32:54 -04:00
|
|
|
use deno_runtime::ops::worker_host::CreateWebWorkerCb;
|
|
|
|
use deno_runtime::ops::worker_host::WorkerEventCb;
|
2020-12-13 13:45:53 -05:00
|
|
|
use deno_runtime::permissions::Permissions;
|
2023-01-07 11:25:34 -05:00
|
|
|
use deno_runtime::permissions::PermissionsContainer;
|
2021-01-07 21:08:51 -05:00
|
|
|
use deno_runtime::permissions::PermissionsOptions;
|
2023-03-19 18:32:54 -04:00
|
|
|
use deno_runtime::web_worker::WebWorker;
|
|
|
|
use deno_runtime::web_worker::WebWorkerOptions;
|
2020-12-13 13:45:53 -05:00
|
|
|
use deno_runtime::worker::MainWorker;
|
|
|
|
use deno_runtime::worker::WorkerOptions;
|
2021-10-05 16:41:14 -04:00
|
|
|
use deno_runtime::BootstrapOptions;
|
2022-02-24 08:28:00 -05:00
|
|
|
use import_map::parse_from_json;
|
2021-01-07 21:08:51 -05:00
|
|
|
use log::Level;
|
2020-11-30 14:35:12 -05:00
|
|
|
use std::env::current_exe;
|
|
|
|
use std::io::SeekFrom;
|
|
|
|
use std::pin::Pin;
|
|
|
|
use std::rc::Rc;
|
2020-12-11 12:49:26 -05:00
|
|
|
use std::sync::Arc;
|
2020-11-30 14:35:12 -05:00
|
|
|
|
2021-01-04 18:15:52 -05:00
|
|
|
#[derive(Deserialize, Serialize)]
|
2021-01-07 21:08:51 -05:00
|
|
|
pub struct Metadata {
|
|
|
|
pub argv: Vec<String>,
|
|
|
|
pub unstable: bool,
|
|
|
|
pub seed: Option<u64>,
|
|
|
|
pub permissions: PermissionsOptions,
|
|
|
|
pub location: Option<Url>,
|
|
|
|
pub v8_flags: Vec<String>,
|
|
|
|
pub log_level: Option<Level>,
|
2021-08-07 08:49:38 -04:00
|
|
|
pub ca_stores: Option<Vec<String>>,
|
2021-01-07 21:08:51 -05:00
|
|
|
pub ca_data: Option<Vec<u8>>,
|
2021-08-10 07:19:45 -04:00
|
|
|
pub unsafely_ignore_certificate_errors: Option<Vec<String>>,
|
2022-02-24 08:28:00 -05:00
|
|
|
pub maybe_import_map: Option<(Url, String)>,
|
2022-02-15 07:33:46 -05:00
|
|
|
pub entrypoint: ModuleSpecifier,
|
2021-01-04 18:15:52 -05:00
|
|
|
}
|
|
|
|
|
2021-01-07 21:08:51 -05:00
|
|
|
pub const MAGIC_TRAILER: &[u8; 8] = b"d3n0l4nd";
|
2020-11-30 14:35:12 -05:00
|
|
|
|
|
|
|
/// This function will try to run this binary as a standalone binary
|
2021-01-24 08:25:18 -05:00
|
|
|
/// produced by `deno compile`. It determines if this is a standalone
|
2023-03-09 21:13:53 -05:00
|
|
|
/// binary by checking for the magic trailer string `d3n0l4nd` at EOF-24.
|
2021-01-04 18:15:52 -05:00
|
|
|
/// The magic trailer is followed by:
|
|
|
|
/// - a u64 pointer to the JS bundle embedded in the binary
|
|
|
|
/// - a u64 pointer to JSON metadata (serialized flags) embedded in the binary
|
|
|
|
/// These are dereferenced, and the bundle is executed under the configuration
|
|
|
|
/// specified by the metadata. If no magic trailer is present, this function
|
2021-01-25 01:14:25 -05:00
|
|
|
/// exits with `Ok(None)`.
|
2022-02-15 07:33:46 -05:00
|
|
|
pub async fn extract_standalone(
|
2021-01-07 21:08:51 -05:00
|
|
|
args: Vec<String>,
|
2022-02-15 07:33:46 -05:00
|
|
|
) -> Result<Option<(Metadata, eszip::EszipV2)>, AnyError> {
|
2020-11-30 14:35:12 -05:00
|
|
|
let current_exe_path = current_exe()?;
|
|
|
|
|
2023-01-04 18:54:54 -05:00
|
|
|
let file = std::fs::File::open(current_exe_path)?;
|
2022-02-15 07:33:46 -05:00
|
|
|
|
2023-01-04 18:54:54 -05:00
|
|
|
let mut bufreader =
|
|
|
|
deno_core::futures::io::BufReader::new(AllowStdIo::new(file));
|
2022-02-15 07:33:46 -05:00
|
|
|
|
|
|
|
let trailer_pos = bufreader.seek(SeekFrom::End(-24)).await?;
|
2021-01-04 18:15:52 -05:00
|
|
|
let mut trailer = [0; 24];
|
2022-02-15 07:33:46 -05:00
|
|
|
bufreader.read_exact(&mut trailer).await?;
|
2021-01-04 18:15:52 -05:00
|
|
|
let (magic_trailer, rest) = trailer.split_at(8);
|
2021-01-07 21:08:51 -05:00
|
|
|
if magic_trailer != MAGIC_TRAILER {
|
|
|
|
return Ok(None);
|
2020-11-30 14:35:12 -05:00
|
|
|
}
|
2021-01-07 21:08:51 -05:00
|
|
|
|
2022-02-15 07:33:46 -05:00
|
|
|
let (eszip_archive_pos, rest) = rest.split_at(8);
|
2021-01-07 21:08:51 -05:00
|
|
|
let metadata_pos = rest;
|
2022-02-15 07:33:46 -05:00
|
|
|
let eszip_archive_pos = u64_from_bytes(eszip_archive_pos)?;
|
2021-01-07 21:08:51 -05:00
|
|
|
let metadata_pos = u64_from_bytes(metadata_pos)?;
|
|
|
|
let metadata_len = trailer_pos - metadata_pos;
|
|
|
|
|
2022-02-15 07:33:46 -05:00
|
|
|
bufreader.seek(SeekFrom::Start(eszip_archive_pos)).await?;
|
|
|
|
|
|
|
|
let (eszip, loader) = eszip::EszipV2::parse(bufreader)
|
|
|
|
.await
|
|
|
|
.context("Failed to parse eszip header")?;
|
|
|
|
|
|
|
|
let mut bufreader = loader.await.context("Failed to parse eszip archive")?;
|
|
|
|
|
|
|
|
bufreader.seek(SeekFrom::Start(metadata_pos)).await?;
|
|
|
|
|
|
|
|
let mut metadata = String::new();
|
|
|
|
|
|
|
|
bufreader
|
|
|
|
.take(metadata_len)
|
|
|
|
.read_to_string(&mut metadata)
|
|
|
|
.await
|
|
|
|
.context("Failed to read metadata from the current executable")?;
|
2021-01-07 21:08:51 -05:00
|
|
|
|
|
|
|
let mut metadata: Metadata = serde_json::from_str(&metadata).unwrap();
|
|
|
|
metadata.argv.append(&mut args[1..].to_vec());
|
2022-02-15 07:33:46 -05:00
|
|
|
|
|
|
|
Ok(Some((metadata, eszip)))
|
2020-11-30 14:35:12 -05:00
|
|
|
}
|
|
|
|
|
2021-01-04 18:15:52 -05:00
|
|
|
fn u64_from_bytes(arr: &[u8]) -> Result<u64, AnyError> {
|
|
|
|
let fixed_arr: &[u8; 8] = arr
|
|
|
|
.try_into()
|
|
|
|
.context("Failed to convert the buffer into a fixed-size array")?;
|
|
|
|
Ok(u64::from_be_bytes(*fixed_arr))
|
|
|
|
}
|
|
|
|
|
2023-03-19 18:32:54 -04:00
|
|
|
#[derive(Clone)]
|
2022-02-24 08:28:00 -05:00
|
|
|
struct EmbeddedModuleLoader {
|
2023-03-19 18:32:54 -04:00
|
|
|
eszip: Arc<eszip::EszipV2>,
|
|
|
|
maybe_import_map_resolver: Option<Arc<CliGraphResolver>>,
|
2022-02-24 08:28:00 -05:00
|
|
|
}
|
2020-11-30 14:35:12 -05:00
|
|
|
|
|
|
|
impl ModuleLoader for EmbeddedModuleLoader {
|
|
|
|
fn resolve(
|
|
|
|
&self,
|
|
|
|
specifier: &str,
|
2022-02-24 08:28:00 -05:00
|
|
|
referrer: &str,
|
2023-01-10 08:35:44 -05:00
|
|
|
_kind: ResolutionKind,
|
2020-11-30 14:35:12 -05:00
|
|
|
) -> Result<ModuleSpecifier, AnyError> {
|
2022-03-31 04:41:30 -04:00
|
|
|
// Try to follow redirects when resolving.
|
|
|
|
let referrer = match self.eszip.get_module(referrer) {
|
|
|
|
Some(eszip::Module { ref specifier, .. }) => {
|
2023-03-14 13:18:01 -04:00
|
|
|
ModuleSpecifier::parse(specifier)?
|
|
|
|
}
|
|
|
|
None => {
|
|
|
|
let cwd = std::env::current_dir().context("Unable to get CWD")?;
|
|
|
|
deno_core::resolve_url_or_path(referrer, &cwd)?
|
2022-03-31 04:41:30 -04:00
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2023-03-15 17:46:36 -04:00
|
|
|
self
|
|
|
|
.maybe_import_map_resolver
|
|
|
|
.as_ref()
|
|
|
|
.map(|r| r.resolve(specifier, &referrer))
|
|
|
|
.unwrap_or_else(|| {
|
2022-02-24 08:28:00 -05:00
|
|
|
deno_core::resolve_import(specifier, referrer.as_str())
|
|
|
|
.map_err(|err| err.into())
|
2023-03-15 17:46:36 -04:00
|
|
|
})
|
2020-11-30 14:35:12 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
fn load(
|
|
|
|
&self,
|
|
|
|
module_specifier: &ModuleSpecifier,
|
|
|
|
_maybe_referrer: Option<ModuleSpecifier>,
|
|
|
|
_is_dynamic: bool,
|
|
|
|
) -> Pin<Box<deno_core::ModuleSourceFuture>> {
|
2023-01-05 14:29:50 -05:00
|
|
|
let is_data_uri = get_source_from_data_url(module_specifier).ok();
|
2022-02-15 07:33:46 -05:00
|
|
|
let module = self
|
2022-02-24 08:28:00 -05:00
|
|
|
.eszip
|
2022-02-15 07:33:46 -05:00
|
|
|
.get_module(module_specifier.as_str())
|
|
|
|
.ok_or_else(|| type_error("Module not found"));
|
|
|
|
|
2023-01-05 14:29:50 -05:00
|
|
|
let module_specifier = module_specifier.clone();
|
2020-11-30 14:35:12 -05:00
|
|
|
async move {
|
2022-05-05 07:16:25 -04:00
|
|
|
if let Some((source, _)) = is_data_uri {
|
2022-02-15 07:33:46 -05:00
|
|
|
return Ok(deno_core::ModuleSource {
|
2023-03-21 18:33:12 -04:00
|
|
|
code: source.into(),
|
2022-02-15 07:33:46 -05:00
|
|
|
module_type: deno_core::ModuleType::JavaScript,
|
|
|
|
module_url_specified: module_specifier.to_string(),
|
|
|
|
module_url_found: module_specifier.to_string(),
|
|
|
|
});
|
2020-11-30 14:35:12 -05:00
|
|
|
}
|
2021-06-05 10:24:17 -04:00
|
|
|
|
2022-02-15 07:33:46 -05:00
|
|
|
let module = module?;
|
|
|
|
let code = module.source().await;
|
|
|
|
let code = std::str::from_utf8(&code)
|
|
|
|
.map_err(|_| type_error("Module source is not utf-8"))?
|
|
|
|
.to_owned();
|
|
|
|
|
2020-11-30 14:35:12 -05:00
|
|
|
Ok(deno_core::ModuleSource {
|
2023-03-21 18:33:12 -04:00
|
|
|
code: code.into(),
|
2022-02-15 07:33:46 -05:00
|
|
|
module_type: match module.kind {
|
|
|
|
eszip::ModuleKind::JavaScript => deno_core::ModuleType::JavaScript,
|
|
|
|
eszip::ModuleKind::Json => deno_core::ModuleType::Json,
|
|
|
|
},
|
2020-11-30 14:35:12 -05:00
|
|
|
module_url_specified: module_specifier.to_string(),
|
|
|
|
module_url_found: module_specifier.to_string(),
|
|
|
|
})
|
|
|
|
}
|
|
|
|
.boxed_local()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-06-07 08:02:53 -04:00
|
|
|
fn metadata_to_flags(metadata: &Metadata) -> Flags {
|
|
|
|
let permissions = metadata.permissions.clone();
|
|
|
|
Flags {
|
|
|
|
argv: metadata.argv.clone(),
|
|
|
|
unstable: metadata.unstable,
|
|
|
|
seed: metadata.seed,
|
|
|
|
location: metadata.location.clone(),
|
|
|
|
allow_env: permissions.allow_env,
|
|
|
|
allow_hrtime: permissions.allow_hrtime,
|
|
|
|
allow_net: permissions.allow_net,
|
2021-08-06 17:28:10 -04:00
|
|
|
allow_ffi: permissions.allow_ffi,
|
2021-06-07 08:02:53 -04:00
|
|
|
allow_read: permissions.allow_read,
|
|
|
|
allow_run: permissions.allow_run,
|
|
|
|
allow_write: permissions.allow_write,
|
|
|
|
v8_flags: metadata.v8_flags.clone(),
|
|
|
|
log_level: metadata.log_level,
|
2021-08-07 08:49:38 -04:00
|
|
|
ca_stores: metadata.ca_stores.clone(),
|
2023-01-17 19:18:24 -05:00
|
|
|
ca_data: metadata.ca_data.clone().map(CaData::Bytes),
|
2021-06-07 08:02:53 -04:00
|
|
|
..Default::default()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-03-19 18:32:54 -04:00
|
|
|
fn web_worker_callback() -> Arc<WorkerEventCb> {
|
|
|
|
Arc::new(|worker| {
|
|
|
|
let fut = async move { Ok(worker) };
|
|
|
|
LocalFutureObj::new(Box::new(fut))
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
fn create_web_worker_callback(
|
|
|
|
ps: &ProcState,
|
|
|
|
module_loader: &Rc<EmbeddedModuleLoader>,
|
|
|
|
) -> Arc<CreateWebWorkerCb> {
|
|
|
|
let ps = ps.clone();
|
|
|
|
let module_loader = module_loader.as_ref().clone();
|
|
|
|
Arc::new(move |args| {
|
|
|
|
let module_loader = Rc::new(module_loader.clone());
|
|
|
|
|
|
|
|
let create_web_worker_cb = create_web_worker_callback(&ps, &module_loader);
|
|
|
|
let web_worker_cb = web_worker_callback();
|
|
|
|
|
|
|
|
let options = WebWorkerOptions {
|
|
|
|
bootstrap: BootstrapOptions {
|
|
|
|
args: ps.options.argv().clone(),
|
|
|
|
cpu_count: std::thread::available_parallelism()
|
|
|
|
.map(|p| p.get())
|
|
|
|
.unwrap_or(1),
|
|
|
|
debug_flag: ps.options.log_level().map_or(false, |l| l == Level::Debug),
|
|
|
|
enable_testing_features: false,
|
|
|
|
locale: deno_core::v8::icu::get_language_tag(),
|
|
|
|
location: Some(args.main_module.clone()),
|
|
|
|
no_color: !colors::use_color(),
|
|
|
|
is_tty: colors::is_tty(),
|
|
|
|
runtime_version: version::deno(),
|
|
|
|
ts_version: version::TYPESCRIPT.to_string(),
|
|
|
|
unstable: ps.options.unstable(),
|
|
|
|
user_agent: version::get_user_agent(),
|
|
|
|
inspect: ps.options.is_inspecting(),
|
|
|
|
},
|
|
|
|
extensions: ops::cli_exts(ps.clone()),
|
|
|
|
startup_snapshot: Some(crate::js::deno_isolate_init()),
|
|
|
|
unsafely_ignore_certificate_errors: ps
|
|
|
|
.options
|
|
|
|
.unsafely_ignore_certificate_errors()
|
|
|
|
.clone(),
|
|
|
|
root_cert_store: Some(ps.root_cert_store.clone()),
|
|
|
|
seed: ps.options.seed(),
|
|
|
|
module_loader,
|
|
|
|
npm_resolver: None, // not currently supported
|
|
|
|
create_web_worker_cb,
|
|
|
|
preload_module_cb: web_worker_cb.clone(),
|
|
|
|
pre_execute_module_cb: web_worker_cb,
|
|
|
|
format_js_error_fn: Some(Arc::new(format_js_error)),
|
|
|
|
source_map_getter: None,
|
|
|
|
worker_type: args.worker_type,
|
|
|
|
maybe_inspector_server: None,
|
|
|
|
get_error_class_fn: Some(&get_error_class_name),
|
|
|
|
blob_store: ps.blob_store.clone(),
|
|
|
|
broadcast_channel: ps.broadcast_channel.clone(),
|
|
|
|
shared_array_buffer_store: Some(ps.shared_array_buffer_store.clone()),
|
|
|
|
compiled_wasm_module_store: Some(ps.compiled_wasm_module_store.clone()),
|
|
|
|
cache_storage_dir: None,
|
|
|
|
stdio: Default::default(),
|
|
|
|
};
|
|
|
|
|
|
|
|
WebWorker::bootstrap_from_options(
|
|
|
|
args.name,
|
|
|
|
args.permissions,
|
|
|
|
args.main_module,
|
|
|
|
args.worker_id,
|
|
|
|
options,
|
|
|
|
)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2021-01-07 21:08:51 -05:00
|
|
|
pub async fn run(
|
2022-02-15 07:33:46 -05:00
|
|
|
eszip: eszip::EszipV2,
|
2021-01-07 21:08:51 -05:00
|
|
|
metadata: Metadata,
|
|
|
|
) -> Result<(), AnyError> {
|
2021-06-07 08:02:53 -04:00
|
|
|
let flags = metadata_to_flags(&metadata);
|
2022-02-15 07:33:46 -05:00
|
|
|
let main_module = &metadata.entrypoint;
|
2022-06-28 16:45:55 -04:00
|
|
|
let ps = ProcState::build(flags).await?;
|
2023-01-07 11:25:34 -05:00
|
|
|
let permissions = PermissionsContainer::new(Permissions::from_options(
|
|
|
|
&metadata.permissions,
|
|
|
|
)?);
|
2022-02-24 08:28:00 -05:00
|
|
|
let module_loader = Rc::new(EmbeddedModuleLoader {
|
2023-03-19 18:32:54 -04:00
|
|
|
eszip: Arc::new(eszip),
|
2022-02-24 08:28:00 -05:00
|
|
|
maybe_import_map_resolver: metadata.maybe_import_map.map(
|
|
|
|
|(base, source)| {
|
2023-03-19 18:32:54 -04:00
|
|
|
Arc::new(CliGraphResolver::new(
|
2023-02-15 11:30:54 -05:00
|
|
|
None,
|
|
|
|
Some(Arc::new(
|
|
|
|
parse_from_json(&base, &source).unwrap().import_map,
|
|
|
|
)),
|
2023-02-22 14:15:25 -05:00
|
|
|
false,
|
2023-03-12 23:32:59 -04:00
|
|
|
ps.npm_api.clone(),
|
|
|
|
ps.npm_resolution.clone(),
|
2023-02-24 19:35:43 -05:00
|
|
|
ps.package_json_deps_installer.clone(),
|
2023-03-19 18:32:54 -04:00
|
|
|
))
|
2022-02-24 08:28:00 -05:00
|
|
|
},
|
|
|
|
),
|
|
|
|
});
|
2023-03-19 18:32:54 -04:00
|
|
|
let create_web_worker_cb = create_web_worker_callback(&ps, &module_loader);
|
|
|
|
let web_worker_cb = web_worker_callback();
|
2020-12-11 12:49:26 -05:00
|
|
|
|
2023-01-24 23:03:03 -05:00
|
|
|
v8_set_flags(construct_v8_flags(&metadata.v8_flags, vec![]));
|
2021-01-07 21:08:51 -05:00
|
|
|
|
2020-12-11 12:49:26 -05:00
|
|
|
let options = WorkerOptions {
|
2021-10-05 16:41:14 -04:00
|
|
|
bootstrap: BootstrapOptions {
|
|
|
|
args: metadata.argv,
|
2022-02-24 20:03:12 -05:00
|
|
|
cpu_count: std::thread::available_parallelism()
|
|
|
|
.map(|p| p.get())
|
|
|
|
.unwrap_or(1),
|
2023-03-15 17:46:36 -04:00
|
|
|
debug_flag: metadata
|
|
|
|
.log_level
|
|
|
|
.map(|l| l == Level::Debug)
|
|
|
|
.unwrap_or(false),
|
2021-10-05 16:41:14 -04:00
|
|
|
enable_testing_features: false,
|
2022-10-18 09:33:35 -04:00
|
|
|
locale: deno_core::v8::icu::get_language_tag(),
|
2021-10-05 16:41:14 -04:00
|
|
|
location: metadata.location,
|
|
|
|
no_color: !colors::use_color(),
|
2022-02-28 22:37:50 -05:00
|
|
|
is_tty: colors::is_tty(),
|
2021-10-05 16:41:14 -04:00
|
|
|
runtime_version: version::deno(),
|
|
|
|
ts_version: version::TYPESCRIPT.to_string(),
|
|
|
|
unstable: metadata.unstable,
|
2022-05-14 06:00:02 -04:00
|
|
|
user_agent: version::get_user_agent(),
|
2022-09-17 06:04:43 -04:00
|
|
|
inspect: ps.options.is_inspecting(),
|
2021-10-05 16:41:14 -04:00
|
|
|
},
|
2023-03-19 18:32:54 -04:00
|
|
|
extensions: ops::cli_exts(ps.clone()),
|
2022-11-21 08:36:26 -05:00
|
|
|
startup_snapshot: Some(crate::js::deno_isolate_init()),
|
2021-08-10 07:19:45 -04:00
|
|
|
unsafely_ignore_certificate_errors: metadata
|
|
|
|
.unsafely_ignore_certificate_errors,
|
2023-03-19 18:32:54 -04:00
|
|
|
root_cert_store: Some(ps.root_cert_store.clone()),
|
2021-01-07 21:08:51 -05:00
|
|
|
seed: metadata.seed,
|
2022-04-15 10:08:09 -04:00
|
|
|
source_map_getter: None,
|
2022-04-26 19:06:10 -04:00
|
|
|
format_js_error_fn: Some(Arc::new(format_js_error)),
|
2020-12-11 12:49:26 -05:00
|
|
|
create_web_worker_cb,
|
2022-08-16 21:00:35 -04:00
|
|
|
web_worker_preload_module_cb: web_worker_cb.clone(),
|
|
|
|
web_worker_pre_execute_module_cb: web_worker_cb,
|
2020-12-11 12:49:26 -05:00
|
|
|
maybe_inspector_server: None,
|
|
|
|
should_break_on_first_statement: false,
|
2022-12-12 09:33:30 -05:00
|
|
|
should_wait_for_inspector_session: false,
|
2020-11-30 14:35:12 -05:00
|
|
|
module_loader,
|
2022-08-20 11:31:33 -04:00
|
|
|
npm_resolver: None, // not currently supported
|
2021-01-07 21:08:51 -05:00
|
|
|
get_error_class_fn: Some(&get_error_class_name),
|
2022-09-28 08:11:12 -04:00
|
|
|
cache_storage_dir: None,
|
2021-05-27 01:23:12 -04:00
|
|
|
origin_storage_dir: None,
|
2023-03-19 18:32:54 -04:00
|
|
|
blob_store: ps.blob_store.clone(),
|
|
|
|
broadcast_channel: ps.broadcast_channel.clone(),
|
|
|
|
shared_array_buffer_store: Some(ps.shared_array_buffer_store.clone()),
|
|
|
|
compiled_wasm_module_store: Some(ps.compiled_wasm_module_store.clone()),
|
2022-04-26 19:00:04 -04:00
|
|
|
stdio: Default::default(),
|
2020-12-11 12:49:26 -05:00
|
|
|
};
|
2021-10-05 16:41:14 -04:00
|
|
|
let mut worker = MainWorker::bootstrap_from_options(
|
|
|
|
main_module.clone(),
|
|
|
|
permissions,
|
|
|
|
options,
|
|
|
|
);
|
2022-02-15 07:33:46 -05:00
|
|
|
worker.execute_main_module(main_module).await?;
|
2023-03-21 18:33:12 -04:00
|
|
|
worker.dispatch_load_event(located_script_name!())?;
|
2022-06-28 10:49:30 -04:00
|
|
|
|
|
|
|
loop {
|
|
|
|
worker.run_event_loop(false).await?;
|
2023-03-21 18:33:12 -04:00
|
|
|
if !worker.dispatch_beforeunload_event(located_script_name!())? {
|
2022-06-28 10:49:30 -04:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-03-21 18:33:12 -04:00
|
|
|
worker.dispatch_unload_event(located_script_name!())?;
|
2021-01-07 21:08:51 -05:00
|
|
|
std::process::exit(0);
|
2020-11-30 14:35:12 -05:00
|
|
|
}
|
2021-01-04 18:15:52 -05:00
|
|
|
|
2021-01-07 21:08:51 -05:00
|
|
|
fn get_error_class_name(e: &AnyError) -> &'static str {
|
|
|
|
deno_runtime::errors::get_error_class_name(e).unwrap_or_else(|| {
|
2021-01-08 19:57:37 -05:00
|
|
|
panic!(
|
|
|
|
"Error '{}' contains boxed error of unsupported type:{}",
|
|
|
|
e,
|
2023-01-27 10:43:16 -05:00
|
|
|
e.chain().map(|e| format!("\n {e:?}")).collect::<String>()
|
2021-01-08 19:57:37 -05:00
|
|
|
);
|
2021-01-04 18:15:52 -05:00
|
|
|
})
|
|
|
|
}
|