2021-01-11 12:13:41 -05:00
|
|
|
// Copyright 2018-2021 the Deno authors. All rights reserved. MIT license.
|
2021-01-07 21:08:51 -05:00
|
|
|
|
2021-01-18 21:40:22 -05:00
|
|
|
use crate::deno_dir::DenoDir;
|
2021-01-07 21:08:51 -05:00
|
|
|
use crate::flags::DenoSubcommand;
|
|
|
|
use crate::flags::Flags;
|
|
|
|
use deno_core::error::bail;
|
|
|
|
use deno_core::error::AnyError;
|
|
|
|
use deno_core::serde_json;
|
2021-01-18 21:40:22 -05:00
|
|
|
use deno_runtime::deno_fetch::reqwest::Client;
|
|
|
|
use std::env;
|
2021-01-07 21:08:51 -05:00
|
|
|
use std::fs::read;
|
|
|
|
use std::fs::File;
|
|
|
|
use std::io::Read;
|
|
|
|
use std::io::Seek;
|
|
|
|
use std::io::SeekFrom;
|
|
|
|
use std::io::Write;
|
2021-01-18 21:40:22 -05:00
|
|
|
use std::path::Path;
|
2021-01-07 21:08:51 -05:00
|
|
|
use std::path::PathBuf;
|
|
|
|
|
|
|
|
use crate::standalone::Metadata;
|
|
|
|
use crate::standalone::MAGIC_TRAILER;
|
|
|
|
|
2021-01-18 21:40:22 -05:00
|
|
|
pub async fn get_base_binary(
|
|
|
|
deno_dir: &DenoDir,
|
|
|
|
target: Option<String>,
|
|
|
|
) -> Result<Vec<u8>, AnyError> {
|
2021-04-26 13:28:38 -04:00
|
|
|
if target.is_none() {
|
2021-01-18 21:40:22 -05:00
|
|
|
let path = std::env::current_exe()?;
|
|
|
|
return Ok(tokio::fs::read(path).await?);
|
|
|
|
}
|
|
|
|
|
|
|
|
let target = target.unwrap_or_else(|| env!("TARGET").to_string());
|
2021-04-26 13:28:38 -04:00
|
|
|
let binary_name = format!("deno-{}.zip", target);
|
2021-01-18 21:40:22 -05:00
|
|
|
|
|
|
|
let binary_path_suffix = if crate::version::is_canary() {
|
|
|
|
format!("canary/{}/{}", crate::version::GIT_COMMIT_HASH, binary_name)
|
|
|
|
} else {
|
|
|
|
format!("release/v{}/{}", env!("CARGO_PKG_VERSION"), binary_name)
|
|
|
|
};
|
|
|
|
|
|
|
|
let download_directory = deno_dir.root.join("dl");
|
|
|
|
let binary_path = download_directory.join(&binary_path_suffix);
|
|
|
|
|
|
|
|
if !binary_path.exists() {
|
|
|
|
download_base_binary(&download_directory, &binary_path_suffix).await?;
|
|
|
|
}
|
|
|
|
|
|
|
|
let archive_data = tokio::fs::read(binary_path).await?;
|
2021-07-07 14:59:39 -04:00
|
|
|
let base_binary_path =
|
|
|
|
crate::tools::upgrade::unpack(archive_data, target.contains("windows"))?;
|
2021-01-18 21:40:22 -05:00
|
|
|
let base_binary = tokio::fs::read(base_binary_path).await?;
|
|
|
|
Ok(base_binary)
|
|
|
|
}
|
|
|
|
|
|
|
|
async fn download_base_binary(
|
|
|
|
output_directory: &Path,
|
|
|
|
binary_path_suffix: &str,
|
|
|
|
) -> Result<(), AnyError> {
|
|
|
|
let download_url = format!("https://dl.deno.land/{}", binary_path_suffix);
|
|
|
|
|
|
|
|
let client_builder = Client::builder();
|
|
|
|
let client = client_builder.build()?;
|
|
|
|
|
|
|
|
println!("Checking {}", &download_url);
|
|
|
|
|
|
|
|
let res = client.get(&download_url).send().await?;
|
|
|
|
|
|
|
|
let binary_content = if res.status().is_success() {
|
|
|
|
println!("Download has been found");
|
|
|
|
res.bytes().await?.to_vec()
|
|
|
|
} else {
|
|
|
|
println!("Download could not be found, aborting");
|
|
|
|
std::process::exit(1)
|
|
|
|
};
|
|
|
|
|
|
|
|
std::fs::create_dir_all(&output_directory)?;
|
|
|
|
let output_path = output_directory.join(binary_path_suffix);
|
|
|
|
std::fs::create_dir_all(&output_path.parent().unwrap())?;
|
|
|
|
tokio::fs::write(output_path, binary_content).await?;
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
2021-01-07 21:08:51 -05:00
|
|
|
/// This functions creates a standalone deno binary by appending a bundle
|
|
|
|
/// and magic trailer to the currently executing binary.
|
2021-01-18 21:40:22 -05:00
|
|
|
pub fn create_standalone_binary(
|
|
|
|
mut original_bin: Vec<u8>,
|
2021-01-07 21:08:51 -05:00
|
|
|
source_code: String,
|
|
|
|
flags: Flags,
|
2021-01-18 21:40:22 -05:00
|
|
|
) -> Result<Vec<u8>, AnyError> {
|
2021-01-07 21:08:51 -05:00
|
|
|
let mut source_code = source_code.as_bytes().to_vec();
|
|
|
|
let ca_data = match &flags.ca_file {
|
|
|
|
Some(ca_file) => Some(read(ca_file)?),
|
|
|
|
None => None,
|
|
|
|
};
|
|
|
|
let metadata = Metadata {
|
|
|
|
argv: flags.argv.clone(),
|
|
|
|
unstable: flags.unstable,
|
|
|
|
seed: flags.seed,
|
|
|
|
location: flags.location.clone(),
|
|
|
|
permissions: flags.clone().into(),
|
|
|
|
v8_flags: flags.v8_flags.clone(),
|
2021-08-10 07:19:45 -04:00
|
|
|
unsafely_ignore_certificate_errors: flags
|
|
|
|
.unsafely_ignore_certificate_errors
|
2021-08-09 10:53:21 -04:00
|
|
|
.clone(),
|
2021-01-07 21:08:51 -05:00
|
|
|
log_level: flags.log_level,
|
2021-08-07 08:49:38 -04:00
|
|
|
ca_stores: flags.ca_stores,
|
2021-01-07 21:08:51 -05:00
|
|
|
ca_data,
|
|
|
|
};
|
|
|
|
let mut metadata = serde_json::to_string(&metadata)?.as_bytes().to_vec();
|
|
|
|
|
|
|
|
let bundle_pos = original_bin.len();
|
|
|
|
let metadata_pos = bundle_pos + source_code.len();
|
|
|
|
let mut trailer = MAGIC_TRAILER.to_vec();
|
|
|
|
trailer.write_all(&bundle_pos.to_be_bytes())?;
|
|
|
|
trailer.write_all(&metadata_pos.to_be_bytes())?;
|
|
|
|
|
|
|
|
let mut final_bin =
|
|
|
|
Vec::with_capacity(original_bin.len() + source_code.len() + trailer.len());
|
|
|
|
final_bin.append(&mut original_bin);
|
|
|
|
final_bin.append(&mut source_code);
|
|
|
|
final_bin.append(&mut metadata);
|
|
|
|
final_bin.append(&mut trailer);
|
|
|
|
|
2021-01-18 21:40:22 -05:00
|
|
|
Ok(final_bin)
|
|
|
|
}
|
|
|
|
|
|
|
|
/// This function writes out a final binary to specified path. If output path
|
|
|
|
/// is not already standalone binary it will return error instead.
|
|
|
|
pub async fn write_standalone_binary(
|
|
|
|
output: PathBuf,
|
2021-03-07 08:20:01 -05:00
|
|
|
target: Option<String>,
|
2021-01-18 21:40:22 -05:00
|
|
|
final_bin: Vec<u8>,
|
|
|
|
) -> Result<(), AnyError> {
|
2021-03-07 08:20:01 -05:00
|
|
|
let output = match target {
|
|
|
|
Some(target) => {
|
|
|
|
if target.contains("windows") {
|
|
|
|
PathBuf::from(output.display().to_string() + ".exe")
|
|
|
|
} else {
|
|
|
|
output
|
|
|
|
}
|
|
|
|
}
|
|
|
|
None => {
|
|
|
|
if cfg!(windows) && output.extension().unwrap_or_default() != "exe" {
|
|
|
|
PathBuf::from(output.display().to_string() + ".exe")
|
|
|
|
} else {
|
|
|
|
output
|
|
|
|
}
|
|
|
|
}
|
|
|
|
};
|
2021-01-07 21:08:51 -05:00
|
|
|
|
|
|
|
if output.exists() {
|
|
|
|
// If the output is a directory, throw error
|
|
|
|
if output.is_dir() {
|
|
|
|
bail!("Could not compile: {:?} is a directory.", &output);
|
|
|
|
}
|
|
|
|
|
|
|
|
// Make sure we don't overwrite any file not created by Deno compiler.
|
|
|
|
// Check for magic trailer in last 24 bytes.
|
|
|
|
let mut has_trailer = false;
|
|
|
|
let mut output_file = File::open(&output)?;
|
|
|
|
// This seek may fail because the file is too small to possibly be
|
|
|
|
// `deno compile` output.
|
|
|
|
if output_file.seek(SeekFrom::End(-24)).is_ok() {
|
|
|
|
let mut trailer = [0; 24];
|
|
|
|
output_file.read_exact(&mut trailer)?;
|
|
|
|
let (magic_trailer, _) = trailer.split_at(8);
|
|
|
|
has_trailer = magic_trailer == MAGIC_TRAILER;
|
|
|
|
}
|
|
|
|
if !has_trailer {
|
|
|
|
bail!("Could not compile: cannot overwrite {:?}.", &output);
|
|
|
|
}
|
2021-04-23 06:33:45 -04:00
|
|
|
|
|
|
|
// Remove file if it was indeed a deno compiled binary, to avoid corruption
|
|
|
|
// (see https://github.com/denoland/deno/issues/10310)
|
|
|
|
std::fs::remove_file(&output)?;
|
2021-01-07 21:08:51 -05:00
|
|
|
}
|
|
|
|
tokio::fs::write(&output, final_bin).await?;
|
|
|
|
#[cfg(unix)]
|
|
|
|
{
|
|
|
|
use std::os::unix::fs::PermissionsExt;
|
|
|
|
let perms = std::fs::Permissions::from_mode(0o777);
|
|
|
|
tokio::fs::set_permissions(output, perms).await?;
|
|
|
|
}
|
|
|
|
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Transform the flags passed to `deno compile` to flags that would be used at
|
|
|
|
/// runtime, as if `deno run` were used.
|
|
|
|
/// - Flags that affect module resolution, loading, type checking, etc. aren't
|
|
|
|
/// applicable at runtime so are set to their defaults like `false`.
|
|
|
|
/// - Other flags are inherited.
|
|
|
|
pub fn compile_to_runtime_flags(
|
|
|
|
flags: Flags,
|
|
|
|
baked_args: Vec<String>,
|
|
|
|
) -> Result<Flags, AnyError> {
|
|
|
|
// IMPORTANT: Don't abbreviate any of this to `..flags` or
|
|
|
|
// `..Default::default()`. That forces us to explicitly consider how any
|
|
|
|
// change to `Flags` should be reflected here.
|
|
|
|
Ok(Flags {
|
|
|
|
argv: baked_args,
|
|
|
|
subcommand: DenoSubcommand::Run {
|
|
|
|
script: "placeholder".to_string(),
|
|
|
|
},
|
|
|
|
allow_env: flags.allow_env,
|
|
|
|
allow_hrtime: flags.allow_hrtime,
|
|
|
|
allow_net: flags.allow_net,
|
2021-08-06 17:28:10 -04:00
|
|
|
allow_ffi: flags.allow_ffi,
|
2021-01-07 21:08:51 -05:00
|
|
|
allow_read: flags.allow_read,
|
|
|
|
allow_run: flags.allow_run,
|
|
|
|
allow_write: flags.allow_write,
|
2021-08-07 08:49:38 -04:00
|
|
|
ca_stores: flags.ca_stores,
|
2021-01-07 21:08:51 -05:00
|
|
|
ca_file: flags.ca_file,
|
2021-07-23 10:31:16 -04:00
|
|
|
cache_blocklist: vec![],
|
2021-07-27 17:25:09 -04:00
|
|
|
cache_path: None,
|
2021-01-07 21:08:51 -05:00
|
|
|
cached_only: false,
|
|
|
|
config_path: None,
|
|
|
|
coverage_dir: flags.coverage_dir,
|
2021-07-23 10:31:16 -04:00
|
|
|
enable_testing_features: false,
|
2021-01-07 21:08:51 -05:00
|
|
|
ignore: vec![],
|
|
|
|
import_map_path: None,
|
|
|
|
inspect_brk: None,
|
2021-07-23 10:31:16 -04:00
|
|
|
inspect: None,
|
2021-01-07 21:08:51 -05:00
|
|
|
location: flags.location,
|
|
|
|
lock_write: false,
|
2021-07-23 10:31:16 -04:00
|
|
|
lock: None,
|
2021-01-07 21:08:51 -05:00
|
|
|
log_level: flags.log_level,
|
|
|
|
no_check: false,
|
2021-08-10 07:19:45 -04:00
|
|
|
unsafely_ignore_certificate_errors: flags
|
|
|
|
.unsafely_ignore_certificate_errors,
|
2021-01-07 21:08:51 -05:00
|
|
|
no_remote: false,
|
2021-07-23 10:31:16 -04:00
|
|
|
prompt: flags.prompt,
|
2021-01-07 21:08:51 -05:00
|
|
|
reload: false,
|
|
|
|
repl: false,
|
|
|
|
seed: flags.seed,
|
|
|
|
unstable: flags.unstable,
|
|
|
|
v8_flags: flags.v8_flags,
|
|
|
|
version: false,
|
|
|
|
watch: false,
|
|
|
|
})
|
|
|
|
}
|