0
0
Fork 0
mirror of https://github.com/denoland/deno.git synced 2024-10-29 08:58:01 -04:00
denoland-deno/src/flags.rs

287 lines
7.7 KiB
Rust
Raw Normal View History

2019-01-01 19:58:40 -05:00
// Copyright 2018-2019 the Deno authors. All rights reserved. MIT license.
use deno_core::v8_set_flags;
2018-11-15 12:56:17 -05:00
use getopts;
use getopts::Options;
// Creates vector of strings, Vec<String>
#[cfg(test)]
macro_rules! svec {
($($x:expr),*) => (vec![$($x.to_string()),*]);
}
#[cfg_attr(feature = "cargo-clippy", allow(stutter))]
#[derive(Clone, Debug, PartialEq, Default)]
pub struct DenoFlags {
pub help: bool,
pub log_debug: bool,
pub version: bool,
pub reload: bool,
2018-09-24 15:33:50 -04:00
pub recompile: bool,
pub allow_read: bool,
pub allow_write: bool,
pub allow_net: bool,
pub allow_env: bool,
pub allow_run: bool,
pub types: bool,
pub prefetch: bool,
pub info: bool,
2019-02-01 18:29:00 -05:00
pub fmt: bool,
}
pub fn get_usage(opts: &Options) -> String {
format!(
"Usage: deno script.ts {}
Environment variables:
2019-02-27 00:14:10 -05:00
DENO_DIR Set deno's base directory
NO_COLOR Set to disable color",
opts.usage("")
)
}
2018-11-15 12:56:17 -05:00
/// Checks provided arguments for known options and sets appropriate Deno flags
/// for them. Unknown options are returned for further use.
/// Note:
///
/// 1. This assumes that privileged flags do not accept parameters deno --foo bar.
/// This assumption is currently valid. But if it were to change in the future,
/// this parsing technique would need to be modified. I think we want to keep the
/// privileged flags minimal - so having this restriction is maybe a good thing.
///
/// 2. Misspelled flags will be forwarded to user code - e.g. --allow-ne would
/// not cause an error. I also think this is ok because missing any of the
/// privileged flags is not destructive. Userland flag parsing would catch these
/// errors.
fn set_recognized_flags(
opts: &Options,
flags: &mut DenoFlags,
args: Vec<String>,
) -> Result<Vec<String>, getopts::Fail> {
let mut rest = Vec::<String>::new();
// getopts doesn't allow parsing unknown options so we check them
// one-by-one and handle unrecognized ones manually
// better solution welcome!
for arg in args {
let fake_args = vec![arg];
match opts.parse(&fake_args) {
Err(getopts::Fail::UnrecognizedOption(_)) => {
rest.extend(fake_args);
}
Err(e) => {
return Err(e);
}
Ok(matches) => {
if matches.opt_present("help") {
flags.help = true;
}
if matches.opt_present("log-debug") {
flags.log_debug = true;
}
if matches.opt_present("version") {
flags.version = true;
}
if matches.opt_present("reload") {
flags.reload = true;
}
if matches.opt_present("recompile") {
flags.recompile = true;
}
if matches.opt_present("allow-read") {
flags.allow_read = true;
}
2018-11-15 12:56:17 -05:00
if matches.opt_present("allow-write") {
flags.allow_write = true;
}
if matches.opt_present("allow-net") {
flags.allow_net = true;
}
if matches.opt_present("allow-env") {
flags.allow_env = true;
}
if matches.opt_present("allow-run") {
flags.allow_run = true;
}
2019-01-09 11:59:54 -05:00
if matches.opt_present("allow-all") {
flags.allow_read = true;
2019-01-09 11:59:54 -05:00
flags.allow_env = true;
flags.allow_net = true;
flags.allow_run = true;
flags.allow_read = true;
2019-01-09 11:59:54 -05:00
flags.allow_write = true;
}
2018-11-15 12:56:17 -05:00
if matches.opt_present("types") {
flags.types = true;
}
if matches.opt_present("prefetch") {
flags.prefetch = true;
}
if matches.opt_present("info") {
flags.info = true;
}
2019-02-01 18:29:00 -05:00
if matches.opt_present("fmt") {
flags.fmt = true;
}
2018-11-15 12:56:17 -05:00
2018-11-30 03:30:49 -05:00
if !matches.free.is_empty() {
2018-11-15 12:56:17 -05:00
rest.extend(matches.free);
}
}
}
}
Ok(rest)
}
#[cfg_attr(feature = "cargo-clippy", allow(stutter))]
pub fn set_flags(
args: Vec<String>,
) -> Result<(DenoFlags, Vec<String>, String), String> {
2018-11-15 12:56:17 -05:00
// TODO: all flags passed after "--" are swallowed by v8_set_flags
// eg. deno --allow-net ./test.ts -- --title foobar
// args === ["deno", "--allow-net" "./test.ts"]
2018-09-22 01:03:24 -04:00
let args = v8_set_flags(args);
let mut opts = Options::new();
// TODO(kevinkassimo): v8_set_flags intercepts '-help' with single '-'
// Resolve that and then uncomment line below (enabling Go style -long-flag)
// opts.long_only(true);
2019-02-27 00:14:10 -05:00
opts.optflag("", "allow-read", "Allow file system read access");
opts.optflag("", "allow-write", "Allow file system write access");
opts.optflag("", "allow-net", "Allow network access");
opts.optflag("", "allow-env", "Allow environment access");
opts.optflag("", "allow-run", "Allow running subprocesses");
opts.optflag("A", "allow-all", "Allow all permissions");
opts.optflag("", "recompile", "Force recompilation of TypeScript code");
opts.optflag("h", "help", "Print this message");
opts.optflag("D", "log-debug", "Log debug output");
opts.optflag("v", "version", "Print the version");
opts.optflag("r", "reload", "Reload cached remote resources");
opts.optflag("", "v8-options", "Print V8 command line options");
opts.optflag("", "types", "Print runtime TypeScript declarations");
opts.optflag("", "prefetch", "Prefetch the dependencies");
opts.optflag("", "info", "Show source file related info");
2019-02-27 00:14:10 -05:00
opts.optflag("", "fmt", "Format code");
let mut flags = DenoFlags::default();
2018-11-15 12:56:17 -05:00
let rest =
set_recognized_flags(&opts, &mut flags, args).map_err(|e| e.to_string())?;
Ok((flags, rest, get_usage(&opts)))
}
#[test]
fn test_set_flags_1() {
let (flags, rest, _) = set_flags(svec!["deno", "--version"]).unwrap();
assert_eq!(rest, svec!["deno"]);
2018-09-02 01:59:16 -04:00
assert_eq!(
flags,
DenoFlags {
version: true,
..DenoFlags::default()
}
);
}
#[test]
fn test_set_flags_2() {
let (flags, rest, _) =
set_flags(svec!["deno", "-r", "-D", "script.ts"]).unwrap();
assert_eq!(rest, svec!["deno", "script.ts"]);
2018-09-02 01:59:16 -04:00
assert_eq!(
flags,
DenoFlags {
log_debug: true,
reload: true,
..DenoFlags::default()
}
);
}
#[test]
fn test_set_flags_3() {
let (flags, rest, _) =
2018-10-26 14:14:50 -04:00
set_flags(svec!["deno", "-r", "script.ts", "--allow-write"]).unwrap();
assert_eq!(rest, svec!["deno", "script.ts"]);
2018-09-02 01:59:16 -04:00
assert_eq!(
flags,
DenoFlags {
reload: true,
allow_write: true,
..DenoFlags::default()
}
);
}
2018-08-24 15:26:40 -04:00
#[test]
fn test_set_flags_4() {
let (flags, rest, _) =
set_flags(svec!["deno", "-Dr", "script.ts", "--allow-write"]).unwrap();
2018-08-24 15:26:40 -04:00
assert_eq!(rest, svec!["deno", "script.ts"]);
assert_eq!(
flags,
DenoFlags {
log_debug: true,
reload: true,
allow_write: true,
..DenoFlags::default()
}
);
}
2018-10-11 17:23:22 -04:00
#[test]
fn test_set_flags_5() {
let (flags, rest, _) = set_flags(svec!["deno", "--types"]).unwrap();
2018-10-11 17:23:22 -04:00
assert_eq!(rest, svec!["deno"]);
assert_eq!(
flags,
DenoFlags {
types: true,
2018-10-11 17:23:22 -04:00
..DenoFlags::default()
}
)
}
#[test]
2018-11-15 12:56:17 -05:00
fn test_set_flags_6() {
let (flags, rest, _) =
set_flags(svec!["deno", "gist.ts", "--title", "X", "--allow-net"]).unwrap();
assert_eq!(rest, svec!["deno", "gist.ts", "--title", "X"]);
assert_eq!(
flags,
DenoFlags {
allow_net: true,
..DenoFlags::default()
}
)
}
2019-01-09 11:59:54 -05:00
#[test]
fn test_set_flags_7() {
let (flags, rest, _) =
set_flags(svec!["deno", "gist.ts", "--allow-all"]).unwrap();
assert_eq!(rest, svec!["deno", "gist.ts"]);
assert_eq!(
flags,
DenoFlags {
allow_net: true,
allow_env: true,
allow_run: true,
allow_read: true,
2019-01-09 11:59:54 -05:00
allow_write: true,
..DenoFlags::default()
}
)
}
#[test]
fn test_set_flags_8() {
let (flags, rest, _) =
set_flags(svec!["deno", "gist.ts", "--allow-read"]).unwrap();
assert_eq!(rest, svec!["deno", "gist.ts"]);
assert_eq!(
flags,
DenoFlags {
allow_read: true,
..DenoFlags::default()
}
)
}