2019-08-14 11:03:02 -04:00
|
|
|
// Copyright 2018-2019 the Deno authors. All rights reserved. MIT license.
|
2019-08-26 08:50:21 -04:00
|
|
|
use super::dispatch_json::{Deserialize, JsonOp, Value};
|
2019-08-14 11:03:02 -04:00
|
|
|
use crate::state::ThreadSafeState;
|
|
|
|
use crate::tokio_util;
|
|
|
|
use deno::*;
|
2019-08-26 08:50:21 -04:00
|
|
|
|
|
|
|
#[derive(Deserialize)]
|
|
|
|
#[serde(rename_all = "camelCase")]
|
|
|
|
struct CacheArgs {
|
|
|
|
module_id: String,
|
|
|
|
contents: String,
|
|
|
|
extension: String,
|
|
|
|
}
|
2019-08-14 11:03:02 -04:00
|
|
|
|
|
|
|
pub fn op_cache(
|
|
|
|
state: &ThreadSafeState,
|
2019-08-26 08:50:21 -04:00
|
|
|
args: Value,
|
|
|
|
_zero_copy: Option<PinnedBuf>,
|
|
|
|
) -> Result<JsonOp, ErrBox> {
|
|
|
|
let args: CacheArgs = serde_json::from_value(args)?;
|
2019-08-14 11:03:02 -04:00
|
|
|
|
2019-08-26 08:50:21 -04:00
|
|
|
let module_specifier = ModuleSpecifier::resolve_url(&args.module_id)
|
2019-08-14 11:03:02 -04:00
|
|
|
.expect("Should be valid module specifier");
|
|
|
|
|
|
|
|
state.ts_compiler.cache_compiler_output(
|
|
|
|
&module_specifier,
|
2019-08-26 08:50:21 -04:00
|
|
|
&args.extension,
|
|
|
|
&args.contents,
|
2019-08-14 11:03:02 -04:00
|
|
|
)?;
|
|
|
|
|
2019-08-26 08:50:21 -04:00
|
|
|
Ok(JsonOp::Sync(json!({})))
|
|
|
|
}
|
|
|
|
|
|
|
|
#[derive(Deserialize)]
|
2019-09-14 12:05:00 -04:00
|
|
|
struct FetchSourceFilesArgs {
|
|
|
|
specifiers: Vec<String>,
|
2019-08-26 08:50:21 -04:00
|
|
|
referrer: String,
|
2019-08-14 11:03:02 -04:00
|
|
|
}
|
|
|
|
|
2019-09-14 12:05:00 -04:00
|
|
|
pub fn op_fetch_source_files(
|
2019-08-14 11:03:02 -04:00
|
|
|
state: &ThreadSafeState,
|
2019-08-26 08:50:21 -04:00
|
|
|
args: Value,
|
|
|
|
_zero_copy: Option<PinnedBuf>,
|
|
|
|
) -> Result<JsonOp, ErrBox> {
|
2019-09-14 12:05:00 -04:00
|
|
|
let args: FetchSourceFilesArgs = serde_json::from_value(args)?;
|
2019-08-14 11:03:02 -04:00
|
|
|
|
|
|
|
// TODO(ry) Maybe a security hole. Only the compiler worker should have access
|
|
|
|
// to this. Need a test to demonstrate the hole.
|
|
|
|
let is_dyn_import = false;
|
|
|
|
|
2019-09-14 12:05:00 -04:00
|
|
|
let mut futures = vec![];
|
|
|
|
for specifier in &args.specifiers {
|
|
|
|
let resolved_specifier =
|
|
|
|
state.resolve(specifier, &args.referrer, false, is_dyn_import)?;
|
|
|
|
let fut = state
|
|
|
|
.file_fetcher
|
|
|
|
.fetch_source_file_async(&resolved_specifier);
|
|
|
|
futures.push(fut);
|
|
|
|
}
|
2019-08-14 11:03:02 -04:00
|
|
|
|
|
|
|
// WARNING: Here we use tokio_util::block_on() which starts a new Tokio
|
2019-09-14 12:05:00 -04:00
|
|
|
// runtime for executing the future. This is so we don't inadvertently run
|
2019-08-14 11:03:02 -04:00
|
|
|
// out of threads in the main runtime.
|
2019-09-14 12:05:00 -04:00
|
|
|
let files = tokio_util::block_on(futures::future::join_all(futures))?;
|
|
|
|
let res: Vec<serde_json::value::Value> = files
|
|
|
|
.into_iter()
|
|
|
|
.map(|file| {
|
|
|
|
json!({
|
|
|
|
"moduleName": file.url.to_string(),
|
|
|
|
"filename": file.filename.to_str().unwrap(),
|
|
|
|
"mediaType": file.media_type as i32,
|
|
|
|
"sourceCode": String::from_utf8(file.source_code).unwrap(),
|
|
|
|
})
|
|
|
|
})
|
|
|
|
.collect();
|
|
|
|
|
|
|
|
Ok(JsonOp::Sync(json!(res)))
|
2019-08-14 11:03:02 -04:00
|
|
|
}
|
2019-08-30 11:11:33 -04:00
|
|
|
|
|
|
|
#[derive(Deserialize)]
|
|
|
|
struct FetchAssetArgs {
|
|
|
|
name: String,
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn op_fetch_asset(
|
|
|
|
_state: &ThreadSafeState,
|
|
|
|
args: Value,
|
|
|
|
_zero_copy: Option<PinnedBuf>,
|
|
|
|
) -> Result<JsonOp, ErrBox> {
|
|
|
|
let args: FetchAssetArgs = serde_json::from_value(args)?;
|
2019-09-15 18:36:27 -04:00
|
|
|
if let Some(source_code) = deno_cli_snapshots::get_asset(&args.name) {
|
2019-08-30 11:11:33 -04:00
|
|
|
Ok(JsonOp::Sync(json!(source_code)))
|
|
|
|
} else {
|
|
|
|
panic!("op_fetch_asset bad asset {}", args.name)
|
|
|
|
}
|
|
|
|
}
|