2020-01-02 15:13:47 -05:00
// Copyright 2018-2020 the Deno authors. All rights reserved. MIT license.
2019-09-16 21:05:14 -04:00
#[ macro_use ]
2019-09-19 14:48:05 -04:00
extern crate lazy_static ;
2020-02-26 01:01:24 -05:00
#[ cfg(unix) ]
extern crate nix ;
#[ cfg(unix) ]
extern crate pty ;
2019-09-19 14:48:05 -04:00
extern crate tempfile ;
2019-10-29 17:52:57 -04:00
2020-04-03 13:40:11 -04:00
use futures ::prelude ::* ;
use std ::io ::BufRead ;
2020-03-19 17:20:46 -04:00
use std ::process ::Command ;
use tempfile ::TempDir ;
2020-05-11 14:49:19 -04:00
#[ test ]
fn std_tests ( ) {
let dir = TempDir ::new ( ) . expect ( " tempdir fail " ) ;
2020-05-11 17:33:36 -04:00
let std_path = util ::root_path ( ) . join ( " std " ) ;
let status = util ::deno_cmd ( )
. env ( " DENO_DIR " , dir . path ( ) )
. current_dir ( std_path ) // TODO(ry) change this to root_path
2020-05-11 14:49:19 -04:00
. arg ( " test " )
. arg ( " --unstable " )
. arg ( " --seed=86 " ) // Some tests rely on specific random numbers.
. arg ( " -A " )
// .arg("-Ldebug")
. spawn ( )
2020-05-11 17:33:36 -04:00
. unwrap ( )
. wait ( )
. unwrap ( ) ;
2020-05-11 14:49:19 -04:00
assert! ( status . success ( ) ) ;
}
2020-05-09 12:43:24 -04:00
#[ test ]
fn x_deno_warning ( ) {
let g = util ::http_server ( ) ;
let output = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " run " )
. arg ( " --reload " )
. arg ( " http://127.0.0.1:4545/cli/tests/x_deno_warning.js " )
. stdout ( std ::process ::Stdio ::piped ( ) )
. stderr ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
assert! ( output . status . success ( ) ) ;
let stdout_str = std ::str ::from_utf8 ( & output . stdout ) . unwrap ( ) . trim ( ) ;
let stderr_str = std ::str ::from_utf8 ( & output . stderr ) . unwrap ( ) . trim ( ) ;
assert_eq! ( " testing x-deno-warning header " , stdout_str ) ;
2020-05-11 17:33:36 -04:00
assert! ( util ::strip_ansi_codes ( stderr_str ) . contains ( " Warning foobar " ) ) ;
2020-05-09 12:43:24 -04:00
drop ( g ) ;
}
2020-05-06 16:34:48 -04:00
#[ test ]
fn no_color ( ) {
let output = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " run " )
. arg ( " cli/tests/no_color.js " )
. env ( " NO_COLOR " , " 1 " )
. stdout ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
assert! ( output . status . success ( ) ) ;
let stdout_str = std ::str ::from_utf8 ( & output . stdout ) . unwrap ( ) . trim ( ) ;
assert_eq! ( " noColor true " , stdout_str ) ;
let output = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " run " )
. arg ( " cli/tests/no_color.js " )
. stdout ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
assert! ( output . status . success ( ) ) ;
let stdout_str = std ::str ::from_utf8 ( & output . stdout ) . unwrap ( ) . trim ( ) ;
2020-05-19 14:19:26 -04:00
assert_eq! ( " noColor false " , util ::strip_ansi_codes ( stdout_str ) ) ;
2020-05-06 16:34:48 -04:00
}
2020-03-08 12:10:45 -04:00
// TODO re-enable. This hangs on macOS
// https://github.com/denoland/deno/issues/4262
2020-02-26 01:01:24 -05:00
#[ cfg(unix) ]
#[ test ]
2020-03-08 12:10:45 -04:00
#[ ignore ]
2020-02-26 01:01:24 -05:00
pub fn test_raw_tty ( ) {
use pty ::fork ::* ;
use std ::io ::{ Read , Write } ;
let fork = Fork ::from_ptmx ( ) . unwrap ( ) ;
if let Ok ( mut master ) = fork . is_parent ( ) {
let mut obytes : [ u8 ; 100 ] = [ 0 ; 100 ] ;
let mut nread = master . read ( & mut obytes ) . unwrap ( ) ;
assert_eq! ( String ::from_utf8_lossy ( & obytes [ 0 .. nread ] ) , " S " ) ;
master . write_all ( b " a " ) . unwrap ( ) ;
nread = master . read ( & mut obytes ) . unwrap ( ) ;
assert_eq! ( String ::from_utf8_lossy ( & obytes [ 0 .. nread ] ) , " A " ) ;
master . write_all ( b " b " ) . unwrap ( ) ;
nread = master . read ( & mut obytes ) . unwrap ( ) ;
assert_eq! ( String ::from_utf8_lossy ( & obytes [ 0 .. nread ] ) , " B " ) ;
master . write_all ( b " c " ) . unwrap ( ) ;
nread = master . read ( & mut obytes ) . unwrap ( ) ;
assert_eq! ( String ::from_utf8_lossy ( & obytes [ 0 .. nread ] ) , " C " ) ;
} else {
use nix ::sys ::termios ;
use std ::os ::unix ::io ::AsRawFd ;
use std ::process ::* ;
// Turn off echo such that parent is reading works properly.
let stdin_fd = std ::io ::stdin ( ) . as_raw_fd ( ) ;
let mut t = termios ::tcgetattr ( stdin_fd ) . unwrap ( ) ;
t . local_flags . remove ( termios ::LocalFlags ::ECHO ) ;
termios ::tcsetattr ( stdin_fd , termios ::SetArg ::TCSANOW , & t ) . unwrap ( ) ;
let deno_dir = TempDir ::new ( ) . expect ( " tempdir fail " ) ;
2020-05-11 17:33:36 -04:00
let mut child = Command ::new ( util ::deno_exe_path ( ) )
2020-02-26 01:01:24 -05:00
. env ( " DENO_DIR " , deno_dir . path ( ) )
. current_dir ( util ::root_path ( ) )
. arg ( " run " )
. arg ( " cli/tests/raw_mode.ts " )
. stdin ( Stdio ::inherit ( ) )
. stdout ( Stdio ::inherit ( ) )
. stderr ( Stdio ::null ( ) )
. spawn ( )
. expect ( " Failed to spawn script " ) ;
child . wait ( ) . unwrap ( ) ;
}
}
2019-10-29 17:52:57 -04:00
#[ test ]
fn test_pattern_match ( ) {
assert! ( util ::pattern_match ( " foo[BAR]baz " , " foobarbaz " , " [BAR] " ) ) ;
assert! ( ! util ::pattern_match ( " foo[BAR]baz " , " foobazbar " , " [BAR] " ) ) ;
}
2019-09-16 21:05:14 -04:00
2019-09-19 14:48:05 -04:00
#[ test ]
fn benchmark_test ( ) {
2019-10-29 17:52:57 -04:00
util ::run_python_script ( " tools/benchmark_test.py " )
2019-09-19 14:48:05 -04:00
}
#[ test ]
fn deno_dir_test ( ) {
2020-05-15 10:22:28 -04:00
use std ::fs ::remove_dir_all ;
2019-10-29 17:52:57 -04:00
let g = util ::http_server ( ) ;
2020-05-15 10:22:28 -04:00
let deno_dir = TempDir ::new ( ) . expect ( " tempdir fail " ) ;
remove_dir_all ( deno_dir . path ( ) ) . unwrap ( ) ;
// Run deno with no env flag
let status = util ::deno_cmd ( )
. env_remove ( " DENO_DIR " )
. current_dir ( util ::root_path ( ) )
. arg ( " run " )
. arg ( " http://localhost:4545/cli/tests/subdir/print_hello.ts " )
. spawn ( )
. expect ( " Failed to spawn script " )
. wait ( )
. expect ( " Failed to wait for child process " ) ;
assert! ( status . success ( ) ) ;
assert! ( ! deno_dir . path ( ) . exists ( ) ) ;
// Run deno with DENO_DIR env flag
let status = util ::deno_cmd ( )
. env ( " DENO_DIR " , deno_dir . path ( ) )
. current_dir ( util ::root_path ( ) )
. arg ( " run " )
. arg ( " http://localhost:4545/cli/tests/subdir/print_hello.ts " )
. spawn ( )
. expect ( " Failed to spawn script " )
. wait ( )
. expect ( " Failed to wait for child process " ) ;
assert! ( status . success ( ) ) ;
assert! ( deno_dir . path ( ) . is_dir ( ) ) ;
assert! ( deno_dir . path ( ) . join ( " deps " ) . is_dir ( ) ) ;
assert! ( deno_dir . path ( ) . join ( " gen " ) . is_dir ( ) ) ;
remove_dir_all ( deno_dir . path ( ) ) . unwrap ( ) ;
drop ( deno_dir ) ;
2019-09-19 14:48:05 -04:00
drop ( g ) ;
}
#[ test ]
2020-05-11 14:49:19 -04:00
fn cache_test ( ) {
2019-10-29 17:52:57 -04:00
let g = util ::http_server ( ) ;
2020-02-04 17:42:07 -05:00
let deno_dir = TempDir ::new ( ) . expect ( " tempdir fail " ) ;
2020-02-19 08:17:13 -05:00
let module_url =
2020-05-11 14:49:19 -04:00
url ::Url ::parse ( " http://localhost:4545/cli/tests/006_url_imports.ts " )
. unwrap ( ) ;
let output = Command ::new ( util ::deno_exe_path ( ) )
2020-02-04 17:42:07 -05:00
. env ( " DENO_DIR " , deno_dir . path ( ) )
. current_dir ( util ::root_path ( ) )
2020-04-07 11:24:47 -04:00
. arg ( " cache " )
2020-02-19 08:17:13 -05:00
. arg ( module_url . to_string ( ) )
2020-02-04 17:42:07 -05:00
. output ( )
. expect ( " Failed to spawn script " ) ;
2020-02-27 15:39:41 -05:00
assert! ( output . status . success ( ) ) ;
2020-02-04 17:42:07 -05:00
let out = std ::str ::from_utf8 ( & output . stdout ) . unwrap ( ) ;
assert_eq! ( out , " " ) ;
2020-05-11 14:49:19 -04:00
// TODO(ry) Is there some way to check that the file was actually cached in
// DENO_DIR?
2019-09-19 14:48:05 -04:00
drop ( g ) ;
}
#[ test ]
fn fmt_test ( ) {
2020-01-29 21:16:48 -05:00
let t = TempDir ::new ( ) . expect ( " tempdir fail " ) ;
let fixed = util ::root_path ( ) . join ( " cli/tests/badly_formatted_fixed.js " ) ;
let badly_formatted_original =
util ::root_path ( ) . join ( " cli/tests/badly_formatted.js " ) ;
let badly_formatted = t . path ( ) . join ( " badly_formatted.js " ) ;
let badly_formatted_str = badly_formatted . to_str ( ) . unwrap ( ) ;
std ::fs ::copy ( & badly_formatted_original , & badly_formatted )
. expect ( " Failed to copy file " ) ;
let status = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " fmt " )
. arg ( " --check " )
. arg ( badly_formatted_str )
. spawn ( )
. expect ( " Failed to spawn script " )
. wait ( )
. expect ( " Failed to wait for child process " ) ;
2020-02-27 15:39:41 -05:00
assert! ( ! status . success ( ) ) ;
2020-01-29 21:16:48 -05:00
let status = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " fmt " )
. arg ( badly_formatted_str )
. spawn ( )
. expect ( " Failed to spawn script " )
. wait ( )
. expect ( " Failed to wait for child process " ) ;
2020-02-27 15:39:41 -05:00
assert! ( status . success ( ) ) ;
2020-01-29 21:16:48 -05:00
let expected = std ::fs ::read_to_string ( fixed ) . unwrap ( ) ;
let actual = std ::fs ::read_to_string ( badly_formatted ) . unwrap ( ) ;
assert_eq! ( expected , actual ) ;
2019-09-19 14:48:05 -04:00
}
2020-02-27 15:39:41 -05:00
#[ test ]
fn fmt_stdin_error ( ) {
use std ::io ::Write ;
let mut deno = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " fmt " )
. arg ( " - " )
. stdin ( std ::process ::Stdio ::piped ( ) )
. stdout ( std ::process ::Stdio ::piped ( ) )
. stderr ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( ) ;
let stdin = deno . stdin . as_mut ( ) . unwrap ( ) ;
let invalid_js = b " import { example } " ;
stdin . write_all ( invalid_js ) . unwrap ( ) ;
let output = deno . wait_with_output ( ) . unwrap ( ) ;
// Error message might change. Just check stdout empty, stderr not.
assert! ( output . stdout . is_empty ( ) ) ;
assert! ( ! output . stderr . is_empty ( ) ) ;
assert! ( ! output . status . success ( ) ) ;
}
2020-03-23 11:37:24 -04:00
// Warning: this test requires internet access.
#[ test ]
fn upgrade_in_tmpdir ( ) {
let temp_dir = TempDir ::new ( ) . unwrap ( ) ;
let exe_path = if cfg! ( windows ) {
temp_dir . path ( ) . join ( " deno " )
} else {
temp_dir . path ( ) . join ( " deno.exe " )
} ;
let _ = std ::fs ::copy ( util ::deno_exe_path ( ) , & exe_path ) . unwrap ( ) ;
assert! ( exe_path . exists ( ) ) ;
let _mtime1 = std ::fs ::metadata ( & exe_path ) . unwrap ( ) . modified ( ) . unwrap ( ) ;
let status = Command ::new ( & exe_path )
. arg ( " upgrade " )
. arg ( " --force " )
. spawn ( )
. unwrap ( )
. wait ( )
. unwrap ( ) ;
assert! ( status . success ( ) ) ;
let _mtime2 = std ::fs ::metadata ( & exe_path ) . unwrap ( ) . modified ( ) . unwrap ( ) ;
// TODO(ry) assert!(mtime1 < mtime2);
}
2020-05-09 06:31:15 -04:00
// Warning: this test requires internet access.
#[ test ]
fn upgrade_with_version_in_tmpdir ( ) {
let temp_dir = TempDir ::new ( ) . unwrap ( ) ;
let exe_path = if cfg! ( windows ) {
temp_dir . path ( ) . join ( " deno " )
} else {
temp_dir . path ( ) . join ( " deno.exe " )
} ;
let _ = std ::fs ::copy ( util ::deno_exe_path ( ) , & exe_path ) . unwrap ( ) ;
assert! ( exe_path . exists ( ) ) ;
let _mtime1 = std ::fs ::metadata ( & exe_path ) . unwrap ( ) . modified ( ) . unwrap ( ) ;
let status = Command ::new ( & exe_path )
. arg ( " upgrade " )
. arg ( " --force " )
. arg ( " --version " )
. arg ( " 0.42.0 " )
. spawn ( )
. unwrap ( )
. wait ( )
. unwrap ( ) ;
assert! ( status . success ( ) ) ;
let upgraded_deno_version = String ::from_utf8 (
Command ::new ( & exe_path ) . arg ( " -V " ) . output ( ) . unwrap ( ) . stdout ,
)
. unwrap ( ) ;
assert! ( upgraded_deno_version . contains ( " 0.42.0 " ) ) ;
let _mtime2 = std ::fs ::metadata ( & exe_path ) . unwrap ( ) . modified ( ) . unwrap ( ) ;
// TODO(ry) assert!(mtime1 < mtime2);
}
2020-01-31 11:34:50 -05:00
#[ test ]
fn installer_test_local_module_run ( ) {
let temp_dir = TempDir ::new ( ) . expect ( " tempdir fail " ) ;
2020-04-16 18:15:42 -04:00
let bin_dir = temp_dir . path ( ) . join ( " bin " ) ;
std ::fs ::create_dir ( & bin_dir ) . unwrap ( ) ;
2020-05-11 17:33:36 -04:00
let status = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " install " )
. arg ( " --name " )
. arg ( " echo_test " )
. arg ( " --root " )
. arg ( temp_dir . path ( ) )
. arg ( util ::tests_path ( ) . join ( " echo.ts " ) )
. arg ( " hello " )
. spawn ( )
. unwrap ( )
. wait ( )
. unwrap ( ) ;
assert! ( status . success ( ) ) ;
2020-04-16 18:15:42 -04:00
let mut file_path = bin_dir . join ( " echo_test " ) ;
2020-01-31 11:34:50 -05:00
if cfg! ( windows ) {
2020-03-04 03:40:56 -05:00
file_path = file_path . with_extension ( " cmd " ) ;
2020-01-31 11:34:50 -05:00
}
assert! ( file_path . exists ( ) ) ;
// NOTE: using file_path here instead of exec_name, because tests
// shouldn't mess with user's PATH env variable
let output = Command ::new ( file_path )
. current_dir ( temp_dir . path ( ) )
. arg ( " foo " )
2020-03-19 17:20:46 -04:00
. env ( " PATH " , util ::target_dir ( ) )
2020-01-31 11:34:50 -05:00
. output ( )
. expect ( " failed to spawn script " ) ;
2020-02-03 18:08:44 -05:00
let stdout_str = std ::str ::from_utf8 ( & output . stdout ) . unwrap ( ) . trim ( ) ;
2020-02-07 03:31:19 -05:00
assert! ( stdout_str . ends_with ( " hello, foo " ) ) ;
2020-01-31 11:34:50 -05:00
}
#[ test ]
fn installer_test_remote_module_run ( ) {
let g = util ::http_server ( ) ;
let temp_dir = TempDir ::new ( ) . expect ( " tempdir fail " ) ;
2020-04-16 18:15:42 -04:00
let bin_dir = temp_dir . path ( ) . join ( " bin " ) ;
std ::fs ::create_dir ( & bin_dir ) . unwrap ( ) ;
2020-05-11 17:33:36 -04:00
let status = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " install " )
. arg ( " --name " )
. arg ( " echo_test " )
. arg ( " --root " )
. arg ( temp_dir . path ( ) )
. arg ( " http://localhost:4545/cli/tests/echo.ts " )
. arg ( " hello " )
. spawn ( )
. unwrap ( )
. wait ( )
. unwrap ( ) ;
assert! ( status . success ( ) ) ;
2020-04-16 18:15:42 -04:00
let mut file_path = bin_dir . join ( " echo_test " ) ;
2020-01-31 11:34:50 -05:00
if cfg! ( windows ) {
2020-03-04 03:40:56 -05:00
file_path = file_path . with_extension ( " cmd " ) ;
2020-01-31 11:34:50 -05:00
}
assert! ( file_path . exists ( ) ) ;
let output = Command ::new ( file_path )
. current_dir ( temp_dir . path ( ) )
. arg ( " foo " )
2020-03-19 17:20:46 -04:00
. env ( " PATH " , util ::target_dir ( ) )
2020-01-31 11:34:50 -05:00
. output ( )
. expect ( " failed to spawn script " ) ;
2020-02-07 03:31:19 -05:00
assert! ( std ::str ::from_utf8 ( & output . stdout )
. unwrap ( )
. trim ( )
. ends_with ( " hello, foo " ) ) ;
2020-01-31 11:34:50 -05:00
drop ( g )
}
2019-09-19 14:48:05 -04:00
#[ test ]
fn js_unit_tests ( ) {
2019-10-29 17:52:57 -04:00
let g = util ::http_server ( ) ;
let mut deno = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
2019-09-19 14:48:05 -04:00
. arg ( " run " )
2020-04-30 11:23:40 -04:00
. arg ( " --unstable " )
2019-09-19 14:48:05 -04:00
. arg ( " --reload " )
2020-03-13 10:57:32 -04:00
. arg ( " -A " )
2020-05-20 17:52:51 -04:00
. arg ( " cli/tests/unit/unit_test_runner.ts " )
2020-03-14 06:53:20 -04:00
. arg ( " --master " )
2020-03-17 17:35:38 -04:00
. arg ( " --verbose " )
2020-05-19 14:19:26 -04:00
. env ( " NO_COLOR " , " 1 " )
2019-09-19 14:48:05 -04:00
. spawn ( )
. expect ( " failed to spawn script " ) ;
let status = deno . wait ( ) . expect ( " failed to wait for the child process " ) ;
2020-03-14 06:53:20 -04:00
drop ( g ) ;
2019-09-19 14:48:05 -04:00
assert_eq! ( Some ( 0 ) , status . code ( ) ) ;
assert! ( status . success ( ) ) ;
}
2019-11-20 11:02:08 -05:00
#[ test ]
fn bundle_exports ( ) {
// First we have to generate a bundle of some module that has exports.
let mod1 = util ::root_path ( ) . join ( " cli/tests/subdir/mod1.ts " ) ;
assert! ( mod1 . is_file ( ) ) ;
let t = TempDir ::new ( ) . expect ( " tempdir fail " ) ;
let bundle = t . path ( ) . join ( " mod1.bundle.js " ) ;
let mut deno = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " bundle " )
. arg ( mod1 )
. arg ( & bundle )
. spawn ( )
. expect ( " failed to spawn script " ) ;
let status = deno . wait ( ) . expect ( " failed to wait for the child process " ) ;
assert! ( status . success ( ) ) ;
assert! ( bundle . is_file ( ) ) ;
// Now we try to use that bundle from another module.
let test = t . path ( ) . join ( " test.js " ) ;
std ::fs ::write (
& test ,
"
import { printHello3 } from \ " ./mod1.bundle.js \" ;
printHello3 ( ) ; " ,
)
. expect ( " error writing file " ) ;
let output = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " run " )
. arg ( & test )
. output ( )
. expect ( " failed to spawn script " ) ;
// check the output of the test.ts program.
2020-02-07 03:31:19 -05:00
assert! ( std ::str ::from_utf8 ( & output . stdout )
. unwrap ( )
. trim ( )
. ends_with ( " Hello " ) ) ;
2019-11-20 11:02:08 -05:00
assert_eq! ( output . stderr , b " " ) ;
}
2020-02-12 16:41:51 -05:00
#[ test ]
fn bundle_circular ( ) {
// First we have to generate a bundle of some module that has exports.
let circular1 = util ::root_path ( ) . join ( " cli/tests/subdir/circular1.ts " ) ;
assert! ( circular1 . is_file ( ) ) ;
let t = TempDir ::new ( ) . expect ( " tempdir fail " ) ;
let bundle = t . path ( ) . join ( " circular1.bundle.js " ) ;
let mut deno = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " bundle " )
. arg ( circular1 )
. arg ( & bundle )
. spawn ( )
. expect ( " failed to spawn script " ) ;
let status = deno . wait ( ) . expect ( " failed to wait for the child process " ) ;
assert! ( status . success ( ) ) ;
assert! ( bundle . is_file ( ) ) ;
let output = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " run " )
. arg ( & bundle )
. output ( )
. expect ( " failed to spawn script " ) ;
// check the output of the the bundle program.
assert! ( std ::str ::from_utf8 ( & output . stdout )
. unwrap ( )
. trim ( )
. ends_with ( " f1 \n f2 " ) ) ;
assert_eq! ( output . stderr , b " " ) ;
}
2020-02-19 22:35:21 -05:00
#[ test ]
fn bundle_single_module ( ) {
// First we have to generate a bundle of some module that has exports.
let single_module =
util ::root_path ( ) . join ( " cli/tests/subdir/single_module.ts " ) ;
assert! ( single_module . is_file ( ) ) ;
let t = TempDir ::new ( ) . expect ( " tempdir fail " ) ;
let bundle = t . path ( ) . join ( " single_module.bundle.js " ) ;
let mut deno = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " bundle " )
. arg ( single_module )
. arg ( & bundle )
. spawn ( )
. expect ( " failed to spawn script " ) ;
let status = deno . wait ( ) . expect ( " failed to wait for the child process " ) ;
assert! ( status . success ( ) ) ;
assert! ( bundle . is_file ( ) ) ;
let output = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " run " )
. arg ( " --reload " )
. arg ( & bundle )
. output ( )
. expect ( " failed to spawn script " ) ;
// check the output of the the bundle program.
assert! ( std ::str ::from_utf8 ( & output . stdout )
. unwrap ( )
. trim ( )
. ends_with ( " Hello world! " ) ) ;
assert_eq! ( output . stderr , b " " ) ;
}
2020-02-25 15:33:19 -05:00
#[ test ]
fn bundle_tla ( ) {
// First we have to generate a bundle of some module that has exports.
let tla_import = util ::root_path ( ) . join ( " cli/tests/subdir/tla.ts " ) ;
assert! ( tla_import . is_file ( ) ) ;
let t = tempfile ::TempDir ::new ( ) . expect ( " tempdir fail " ) ;
let bundle = t . path ( ) . join ( " tla.bundle.js " ) ;
let mut deno = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " bundle " )
. arg ( tla_import )
. arg ( & bundle )
. spawn ( )
. expect ( " failed to spawn script " ) ;
let status = deno . wait ( ) . expect ( " failed to wait for the child process " ) ;
assert! ( status . success ( ) ) ;
assert! ( bundle . is_file ( ) ) ;
// Now we try to use that bundle from another module.
let test = t . path ( ) . join ( " test.js " ) ;
std ::fs ::write (
& test ,
"
import { foo } from \ " ./tla.bundle.js \" ;
console . log ( foo ) ; " ,
)
. expect ( " error writing file " ) ;
let output = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " run " )
. arg ( & test )
. output ( )
. expect ( " failed to spawn script " ) ;
// check the output of the test.ts program.
assert! ( std ::str ::from_utf8 ( & output . stdout )
. unwrap ( )
. trim ( )
. ends_with ( " Hello " ) ) ;
assert_eq! ( output . stderr , b " " ) ;
}
2020-03-02 16:18:27 -05:00
#[ test ]
fn bundle_js ( ) {
// First we have to generate a bundle of some module that has exports.
let mod6 = util ::root_path ( ) . join ( " cli/tests/subdir/mod6.js " ) ;
assert! ( mod6 . is_file ( ) ) ;
let t = TempDir ::new ( ) . expect ( " tempdir fail " ) ;
let bundle = t . path ( ) . join ( " mod6.bundle.js " ) ;
let mut deno = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " bundle " )
. arg ( mod6 )
. arg ( & bundle )
. spawn ( )
. expect ( " failed to spawn script " ) ;
let status = deno . wait ( ) . expect ( " failed to wait for the child process " ) ;
assert! ( status . success ( ) ) ;
assert! ( bundle . is_file ( ) ) ;
let output = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " run " )
. arg ( & bundle )
. output ( )
. expect ( " failed to spawn script " ) ;
// check that nothing went to stderr
assert_eq! ( output . stderr , b " " ) ;
}
2020-04-01 23:14:30 -04:00
#[ test ]
fn bundle_dynamic_import ( ) {
let dynamic_import =
util ::root_path ( ) . join ( " cli/tests/subdir/subdir2/dynamic_import.ts " ) ;
assert! ( dynamic_import . is_file ( ) ) ;
let t = TempDir ::new ( ) . expect ( " tempdir fail " ) ;
let bundle = t . path ( ) . join ( " dynamic_import.bundle.js " ) ;
let mut deno = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " bundle " )
. arg ( dynamic_import )
. arg ( & bundle )
. spawn ( )
. expect ( " failed to spawn script " ) ;
let status = deno . wait ( ) . expect ( " failed to wait for the child process " ) ;
assert! ( status . success ( ) ) ;
assert! ( bundle . is_file ( ) ) ;
let output = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " run " )
. arg ( & bundle )
. output ( )
. expect ( " failed to spawn script " ) ;
// check the output of the test.ts program.
assert! ( std ::str ::from_utf8 ( & output . stdout )
. unwrap ( )
. trim ( )
. ends_with ( " Hello " ) ) ;
assert_eq! ( output . stderr , b " " ) ;
}
2020-04-07 06:32:09 -04:00
#[ test ]
fn bundle_import_map ( ) {
let import = util ::root_path ( ) . join ( " cli/tests/bundle_im.ts " ) ;
let import_map_path = util ::root_path ( ) . join ( " cli/tests/bundle_im.json " ) ;
assert! ( import . is_file ( ) ) ;
let t = TempDir ::new ( ) . expect ( " tempdir fail " ) ;
let bundle = t . path ( ) . join ( " import_map.bundle.js " ) ;
let mut deno = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " bundle " )
. arg ( " --importmap " )
. arg ( import_map_path )
2020-04-27 19:12:38 -04:00
. arg ( " --unstable " )
2020-04-07 06:32:09 -04:00
. arg ( import )
. arg ( & bundle )
. spawn ( )
. expect ( " failed to spawn script " ) ;
let status = deno . wait ( ) . expect ( " failed to wait for the child process " ) ;
assert! ( status . success ( ) ) ;
assert! ( bundle . is_file ( ) ) ;
// Now we try to use that bundle from another module.
let test = t . path ( ) . join ( " test.js " ) ;
std ::fs ::write (
& test ,
"
import { printHello3 } from \ " ./import_map.bundle.js \" ;
printHello3 ( ) ; " ,
)
. expect ( " error writing file " ) ;
let output = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " run " )
. arg ( & test )
. output ( )
. expect ( " failed to spawn script " ) ;
// check the output of the test.ts program.
assert! ( std ::str ::from_utf8 ( & output . stdout )
. unwrap ( )
. trim ( )
. ends_with ( " Hello " ) ) ;
assert_eq! ( output . stderr , b " " ) ;
}
2019-09-19 14:48:05 -04:00
#[ test ]
2020-02-24 17:49:40 -05:00
fn repl_test_console_log ( ) {
2020-03-07 05:27:16 -05:00
let ( out , err ) = util ::run_and_collect_output (
true ,
2020-02-25 15:36:35 -05:00
" repl " ,
Some ( vec! [ " console.log('hello') " , " 'world' " ] ) ,
2020-05-19 14:19:26 -04:00
Some ( vec! [ ( " NO_COLOR " . to_owned ( ) , " 1 " . to_owned ( ) ) ] ) ,
2020-03-01 19:51:54 -05:00
false ,
2020-02-25 15:36:35 -05:00
) ;
2020-05-08 18:58:51 -04:00
assert! ( out . ends_with ( " hello \n undefined \n world \n " ) ) ;
2020-02-24 17:49:40 -05:00
assert! ( err . is_empty ( ) ) ;
}
#[ test ]
fn repl_test_eof ( ) {
2020-03-07 05:27:16 -05:00
let ( out , err ) = util ::run_and_collect_output (
true ,
" repl " ,
Some ( vec! [ " 1 + 2 " ] ) ,
2020-05-19 14:19:26 -04:00
Some ( vec! [ ( " NO_COLOR " . to_owned ( ) , " 1 " . to_owned ( ) ) ] ) ,
2020-03-07 05:27:16 -05:00
false ,
) ;
2020-05-08 18:58:51 -04:00
assert! ( out . ends_with ( " 3 \n " ) ) ;
2020-02-24 17:49:40 -05:00
assert! ( err . is_empty ( ) ) ;
}
2020-05-08 18:58:51 -04:00
const REPL_MSG : & str = " exit using ctrl+d or close() \n " ;
2020-02-24 17:49:40 -05:00
#[ test ]
2020-05-08 18:58:51 -04:00
fn repl_test_close_command ( ) {
2020-05-19 13:33:11 -04:00
let ( out , err ) = util ::run_and_collect_output (
2020-03-07 05:27:16 -05:00
true ,
2020-03-01 19:51:54 -05:00
" repl " ,
2020-05-08 18:58:51 -04:00
Some ( vec! [ " close() " , " 'ignored' " ] ) ,
2020-03-01 19:51:54 -05:00
None ,
false ,
) ;
2020-05-19 13:33:11 -04:00
assert! ( ! out . contains ( " ignored " ) ) ;
2020-02-24 17:49:40 -05:00
assert! ( err . is_empty ( ) ) ;
}
#[ test ]
fn repl_test_function ( ) {
2020-03-07 05:27:16 -05:00
let ( out , err ) = util ::run_and_collect_output (
true ,
2020-02-25 15:36:35 -05:00
" repl " ,
Some ( vec! [ " Deno.writeFileSync " ] ) ,
2020-05-19 14:19:26 -04:00
Some ( vec! [ ( " NO_COLOR " . to_owned ( ) , " 1 " . to_owned ( ) ) ] ) ,
2020-03-01 19:51:54 -05:00
false ,
2020-02-25 15:36:35 -05:00
) ;
2020-05-08 18:58:51 -04:00
assert! ( out . ends_with ( " [Function: writeFileSync] \n " ) ) ;
2020-02-24 17:49:40 -05:00
assert! ( err . is_empty ( ) ) ;
}
#[ test ]
fn repl_test_multiline ( ) {
2020-03-07 05:27:16 -05:00
let ( out , err ) = util ::run_and_collect_output (
true ,
2020-03-01 19:51:54 -05:00
" repl " ,
Some ( vec! [ " ( \n 1 + 2 \n ) " ] ) ,
2020-05-19 14:19:26 -04:00
Some ( vec! [ ( " NO_COLOR " . to_owned ( ) , " 1 " . to_owned ( ) ) ] ) ,
2020-03-01 19:51:54 -05:00
false ,
) ;
2020-05-08 18:58:51 -04:00
assert! ( out . ends_with ( " 3 \n " ) ) ;
2020-02-24 17:49:40 -05:00
assert! ( err . is_empty ( ) ) ;
}
#[ test ]
fn repl_test_eval_unterminated ( ) {
2020-03-07 05:27:16 -05:00
let ( out , err ) = util ::run_and_collect_output (
true ,
" repl " ,
Some ( vec! [ " eval('{') " ] ) ,
None ,
false ,
) ;
2020-05-08 18:58:51 -04:00
assert! ( out . ends_with ( REPL_MSG ) ) ;
2020-02-24 17:49:40 -05:00
assert! ( err . contains ( " Unexpected end of input " ) ) ;
}
#[ test ]
fn repl_test_reference_error ( ) {
2020-03-07 05:27:16 -05:00
let ( out , err ) = util ::run_and_collect_output (
true ,
2020-03-01 19:51:54 -05:00
" repl " ,
Some ( vec! [ " not_a_variable " ] ) ,
None ,
false ,
) ;
2020-05-08 18:58:51 -04:00
assert! ( out . ends_with ( REPL_MSG ) ) ;
2020-02-24 17:49:40 -05:00
assert! ( err . contains ( " not_a_variable is not defined " ) ) ;
}
#[ test ]
fn repl_test_syntax_error ( ) {
2020-03-07 05:27:16 -05:00
let ( out , err ) = util ::run_and_collect_output (
true ,
2020-03-01 19:51:54 -05:00
" repl " ,
Some ( vec! [ " syntax error " ] ) ,
None ,
false ,
) ;
2020-05-08 18:58:51 -04:00
assert! ( out . ends_with ( REPL_MSG ) ) ;
2020-02-24 17:49:40 -05:00
assert! ( err . contains ( " Unexpected identifier " ) ) ;
}
#[ test ]
fn repl_test_type_error ( ) {
2020-03-07 05:27:16 -05:00
let ( out , err ) = util ::run_and_collect_output (
true ,
" repl " ,
Some ( vec! [ " console() " ] ) ,
None ,
false ,
) ;
2020-05-08 18:58:51 -04:00
assert! ( out . ends_with ( REPL_MSG ) ) ;
2020-02-24 17:49:40 -05:00
assert! ( err . contains ( " console is not a function " ) ) ;
}
#[ test ]
fn repl_test_variable ( ) {
2020-03-07 05:27:16 -05:00
let ( out , err ) = util ::run_and_collect_output (
true ,
2020-03-01 19:51:54 -05:00
" repl " ,
Some ( vec! [ " var a = 123; " , " a " ] ) ,
2020-05-19 14:19:26 -04:00
Some ( vec! [ ( " NO_COLOR " . to_owned ( ) , " 1 " . to_owned ( ) ) ] ) ,
2020-03-01 19:51:54 -05:00
false ,
) ;
2020-05-08 18:58:51 -04:00
assert! ( out . ends_with ( " undefined \n 123 \n " ) ) ;
2020-02-24 17:49:40 -05:00
assert! ( err . is_empty ( ) ) ;
}
#[ test ]
fn repl_test_lexical_scoped_variable ( ) {
2020-03-07 05:27:16 -05:00
let ( out , err ) = util ::run_and_collect_output (
true ,
2020-03-01 19:51:54 -05:00
" repl " ,
Some ( vec! [ " let a = 123; " , " a " ] ) ,
2020-05-19 14:19:26 -04:00
Some ( vec! [ ( " NO_COLOR " . to_owned ( ) , " 1 " . to_owned ( ) ) ] ) ,
2020-03-01 19:51:54 -05:00
false ,
) ;
2020-05-08 18:58:51 -04:00
assert! ( out . ends_with ( " undefined \n 123 \n " ) ) ;
2020-02-24 17:49:40 -05:00
assert! ( err . is_empty ( ) ) ;
}
#[ test ]
fn repl_test_missing_deno_dir ( ) {
use std ::fs ::{ read_dir , remove_dir_all } ;
const DENO_DIR : & str = " nonexistent " ;
2020-02-25 15:36:35 -05:00
let test_deno_dir =
util ::root_path ( ) . join ( " cli " ) . join ( " tests " ) . join ( DENO_DIR ) ;
2020-03-07 05:27:16 -05:00
let ( out , err ) = util ::run_and_collect_output (
true ,
2020-02-25 15:36:35 -05:00
" repl " ,
Some ( vec! [ " 1 " ] ) ,
2020-05-19 14:19:26 -04:00
Some ( vec! [
( " DENO_DIR " . to_owned ( ) , DENO_DIR . to_owned ( ) ) ,
( " NO_COLOR " . to_owned ( ) , " 1 " . to_owned ( ) ) ,
] ) ,
2020-03-01 19:51:54 -05:00
false ,
2020-02-24 17:49:40 -05:00
) ;
2020-02-25 15:36:35 -05:00
assert! ( read_dir ( & test_deno_dir ) . is_ok ( ) ) ;
remove_dir_all ( & test_deno_dir ) . unwrap ( ) ;
2020-05-08 18:58:51 -04:00
assert! ( out . ends_with ( " 1 \n " ) ) ;
2020-02-24 17:49:40 -05:00
assert! ( err . is_empty ( ) ) ;
}
#[ test ]
fn repl_test_save_last_eval ( ) {
2020-03-07 05:27:16 -05:00
let ( out , err ) = util ::run_and_collect_output (
true ,
" repl " ,
Some ( vec! [ " 1 " , " _ " ] ) ,
2020-05-19 14:19:26 -04:00
Some ( vec! [ ( " NO_COLOR " . to_owned ( ) , " 1 " . to_owned ( ) ) ] ) ,
2020-03-07 05:27:16 -05:00
false ,
) ;
2020-05-08 18:58:51 -04:00
assert! ( out . ends_with ( " 1 \n 1 \n " ) ) ;
2020-02-24 17:49:40 -05:00
assert! ( err . is_empty ( ) ) ;
}
#[ test ]
fn repl_test_save_last_thrown ( ) {
2020-03-07 05:27:16 -05:00
let ( out , err ) = util ::run_and_collect_output (
true ,
2020-03-01 19:51:54 -05:00
" repl " ,
Some ( vec! [ " throw 1 " , " _error " ] ) ,
2020-05-19 14:19:26 -04:00
Some ( vec! [ ( " NO_COLOR " . to_owned ( ) , " 1 " . to_owned ( ) ) ] ) ,
2020-03-01 19:51:54 -05:00
false ,
) ;
2020-05-08 18:58:51 -04:00
assert! ( out . ends_with ( " 1 \n " ) ) ;
2020-02-24 17:49:40 -05:00
assert_eq! ( err , " Thrown: 1 \n " ) ;
}
#[ test ]
fn repl_test_assign_underscore ( ) {
2020-03-07 05:27:16 -05:00
let ( out , err ) = util ::run_and_collect_output (
true ,
2020-03-01 19:51:54 -05:00
" repl " ,
Some ( vec! [ " _ = 1 " , " 2 " , " _ " ] ) ,
2020-05-19 14:19:26 -04:00
Some ( vec! [ ( " NO_COLOR " . to_owned ( ) , " 1 " . to_owned ( ) ) ] ) ,
2020-03-01 19:51:54 -05:00
false ,
) ;
2020-05-08 18:58:51 -04:00
assert! (
out . ends_with ( " Last evaluation result is no longer saved to _. \n 1 \n 2 \n 1 \n " )
2020-02-24 17:49:40 -05:00
) ;
assert! ( err . is_empty ( ) ) ;
}
#[ test ]
fn repl_test_assign_underscore_error ( ) {
2020-03-07 05:27:16 -05:00
let ( out , err ) = util ::run_and_collect_output (
true ,
2020-02-25 15:36:35 -05:00
" repl " ,
Some ( vec! [ " _error = 1 " , " throw 2 " , " _error " ] ) ,
2020-05-19 14:19:26 -04:00
Some ( vec! [ ( " NO_COLOR " . to_owned ( ) , " 1 " . to_owned ( ) ) ] ) ,
2020-03-01 19:51:54 -05:00
false ,
2020-02-25 15:36:35 -05:00
) ;
2020-05-08 18:58:51 -04:00
assert! (
out . ends_with ( " Last thrown error is no longer saved to _error. \n 1 \n 1 \n " )
2020-02-24 17:49:40 -05:00
) ;
assert_eq! ( err , " Thrown: 2 \n " ) ;
2019-09-19 14:48:05 -04:00
}
#[ test ]
fn util_test ( ) {
2019-10-29 17:52:57 -04:00
util ::run_python_script ( " tools/util_test.py " )
2019-09-19 14:48:05 -04:00
}
2019-09-10 11:09:54 -04:00
macro_rules ! itest (
( $name :ident { $( $key :ident : $value :expr , ) * } ) = > {
#[ test ]
fn $name ( ) {
2019-10-29 17:52:57 -04:00
( util ::CheckOutputIntegrationTest {
2019-09-10 11:09:54 -04:00
$(
$key : $value ,
) *
.. Default ::default ( )
} ) . run ( )
}
}
) ;
2020-03-03 16:02:35 -05:00
// Unfortunately #[ignore] doesn't work with itest!
macro_rules ! itest_ignore (
( $name :ident { $( $key :ident : $value :expr , ) * } ) = > {
#[ ignore ]
#[ test ]
fn $name ( ) {
( util ::CheckOutputIntegrationTest {
$(
$key : $value ,
) *
.. Default ::default ( )
} ) . run ( )
}
}
) ;
2019-09-10 11:09:54 -04:00
itest! ( _001_hello {
args : " run --reload 001_hello.js " ,
2019-09-19 14:48:05 -04:00
output : " 001_hello.js.out " ,
2019-09-10 11:09:54 -04:00
} ) ;
itest! ( _002_hello {
2020-05-17 11:42:39 -04:00
args : " run --quiet --reload 002_hello.ts " ,
2019-09-19 14:48:05 -04:00
output : " 002_hello.ts.out " ,
2019-09-10 11:09:54 -04:00
} ) ;
itest! ( _003_relative_import {
2020-05-17 11:42:39 -04:00
args : " run --quiet --reload 003_relative_import.ts " ,
2019-09-19 14:48:05 -04:00
output : " 003_relative_import.ts.out " ,
2019-09-10 11:09:54 -04:00
} ) ;
itest! ( _004_set_timeout {
2020-05-17 11:42:39 -04:00
args : " run --quiet --reload 004_set_timeout.ts " ,
2019-09-19 14:48:05 -04:00
output : " 004_set_timeout.ts.out " ,
2019-09-10 11:09:54 -04:00
} ) ;
itest! ( _005_more_imports {
2020-05-17 11:42:39 -04:00
args : " run --quiet --reload 005_more_imports.ts " ,
2019-09-19 14:48:05 -04:00
output : " 005_more_imports.ts.out " ,
2019-09-10 11:09:54 -04:00
} ) ;
itest! ( _006_url_imports {
2020-05-17 11:42:39 -04:00
args : " run --quiet --reload 006_url_imports.ts " ,
2019-09-19 14:48:05 -04:00
output : " 006_url_imports.ts.out " ,
http_server : true ,
2019-09-10 11:09:54 -04:00
} ) ;
itest! ( _012_async {
2020-05-17 11:42:39 -04:00
args : " run --quiet --reload 012_async.ts " ,
2019-09-19 14:48:05 -04:00
output : " 012_async.ts.out " ,
2019-09-10 11:09:54 -04:00
} ) ;
itest! ( _013_dynamic_import {
2020-05-17 11:42:39 -04:00
args : " run --quiet --reload --allow-read 013_dynamic_import.ts " ,
2019-09-19 14:48:05 -04:00
output : " 013_dynamic_import.ts.out " ,
2019-09-10 11:09:54 -04:00
} ) ;
itest! ( _014_duplicate_import {
2020-05-17 11:42:39 -04:00
args : " run --quiet --reload --allow-read 014_duplicate_import.ts " ,
2019-09-19 14:48:05 -04:00
output : " 014_duplicate_import.ts.out " ,
2019-09-10 11:09:54 -04:00
} ) ;
itest! ( _015_duplicate_parallel_import {
2020-05-17 11:42:39 -04:00
args : " run --quiet --reload --allow-read 015_duplicate_parallel_import.js " ,
2019-09-19 14:48:05 -04:00
output : " 015_duplicate_parallel_import.js.out " ,
2019-09-10 11:09:54 -04:00
} ) ;
itest! ( _016_double_await {
2020-05-17 11:42:39 -04:00
args : " run --quiet --allow-read --reload 016_double_await.ts " ,
2019-09-19 14:48:05 -04:00
output : " 016_double_await.ts.out " ,
2019-09-10 11:09:54 -04:00
} ) ;
itest! ( _017_import_redirect {
2020-05-17 11:42:39 -04:00
args : " run --quiet --reload 017_import_redirect.ts " ,
2019-09-19 14:48:05 -04:00
output : " 017_import_redirect.ts.out " ,
2019-09-10 11:09:54 -04:00
} ) ;
itest! ( _018_async_catch {
2020-05-17 11:42:39 -04:00
args : " run --quiet --reload 018_async_catch.ts " ,
2019-09-19 14:48:05 -04:00
output : " 018_async_catch.ts.out " ,
2019-09-10 11:09:54 -04:00
} ) ;
2020-03-03 16:02:35 -05:00
// TODO(ry) Re-enable flaky test https://github.com/denoland/deno/issues/4049
itest_ignore! ( _019_media_types {
2019-09-10 11:09:54 -04:00
args : " run --reload 019_media_types.ts " ,
2019-09-19 14:48:05 -04:00
output : " 019_media_types.ts.out " ,
http_server : true ,
2019-09-10 11:09:54 -04:00
} ) ;
itest! ( _020_json_modules {
args : " run --reload 020_json_modules.ts " ,
2019-09-19 14:48:05 -04:00
output : " 020_json_modules.ts.out " ,
2020-05-01 18:32:05 -04:00
exit_code : 1 ,
2019-09-10 11:09:54 -04:00
} ) ;
itest! ( _021_mjs_modules {
2020-05-17 11:42:39 -04:00
args : " run --quiet --reload 021_mjs_modules.ts " ,
2019-09-19 14:48:05 -04:00
output : " 021_mjs_modules.ts.out " ,
2019-09-10 11:09:54 -04:00
} ) ;
2020-03-03 16:02:35 -05:00
// TODO(ry) Re-enable flaky test https://github.com/denoland/deno/issues/4049
itest_ignore! ( _022_info_flag_script {
2019-09-19 14:48:05 -04:00
args : " info http://127.0.0.1:4545/cli/tests/019_media_types.ts " ,
output : " 022_info_flag_script.out " ,
http_server : true ,
2019-09-10 11:09:54 -04:00
} ) ;
itest! ( _023_no_ext_with_headers {
args : " run --reload 023_no_ext_with_headers " ,
2019-09-19 14:48:05 -04:00
output : " 023_no_ext_with_headers.out " ,
2019-09-10 11:09:54 -04:00
} ) ;
// FIXME(bartlomieju): this test should use remote file
2020-03-03 16:02:35 -05:00
itest_ignore! ( _024_import_no_ext_with_headers {
args : " run --reload 024_import_no_ext_with_headers.ts " ,
output : " 024_import_no_ext_with_headers.ts.out " ,
} ) ;
2019-09-10 11:09:54 -04:00
2020-04-30 11:23:40 -04:00
// TODO(lucacasonato): remove --unstable when permissions goes stable
2019-09-10 11:09:54 -04:00
itest! ( _025_hrtime {
2020-05-17 11:42:39 -04:00
args : " run --quiet --allow-hrtime --unstable --reload 025_hrtime.ts " ,
2019-09-19 14:48:05 -04:00
output : " 025_hrtime.ts.out " ,
2019-09-10 11:09:54 -04:00
} ) ;
itest! ( _025_reload_js_type_error {
2020-05-17 11:42:39 -04:00
args : " run --quiet --reload 025_reload_js_type_error.js " ,
2019-09-19 14:48:05 -04:00
output : " 025_reload_js_type_error.js.out " ,
2019-09-10 11:09:54 -04:00
} ) ;
itest! ( _026_redirect_javascript {
2020-05-17 11:42:39 -04:00
args : " run --quiet --reload 026_redirect_javascript.js " ,
2019-09-19 14:48:05 -04:00
output : " 026_redirect_javascript.js.out " ,
http_server : true ,
2019-09-10 11:09:54 -04:00
} ) ;
2020-03-19 09:26:47 -04:00
itest! ( deno_test_fail_fast {
args : " test --failfast test_runner_test.ts " ,
exit_code : 1 ,
output : " deno_test_fail_fast.out " ,
} ) ;
itest! ( deno_test {
args : " test test_runner_test.ts " ,
exit_code : 1 ,
output : " deno_test.out " ,
} ) ;
2020-05-04 10:40:18 -04:00
#[ test ]
fn workers ( ) {
let g = util ::http_server ( ) ;
let status = util ::deno_cmd ( )
. current_dir ( util ::tests_path ( ) )
. arg ( " test " )
. arg ( " --reload " )
. arg ( " --allow-net " )
2020-05-11 07:13:27 -04:00
. arg ( " --allow-read " )
2020-05-07 15:15:59 -04:00
. arg ( " --unstable " )
2020-05-04 10:40:18 -04:00
. arg ( " workers_test.ts " )
. spawn ( )
. unwrap ( )
. wait ( )
. unwrap ( ) ;
assert! ( status . success ( ) ) ;
drop ( g ) ;
}
2020-02-05 17:16:07 -05:00
2020-05-04 10:40:18 -04:00
#[ test ]
fn compiler_api ( ) {
let status = util ::deno_cmd ( )
. current_dir ( util ::tests_path ( ) )
. arg ( " test " )
. arg ( " --unstable " )
. arg ( " --reload " )
2020-05-11 07:13:27 -04:00
. arg ( " --allow-read " )
2020-05-04 10:40:18 -04:00
. arg ( " compiler_api_test.ts " )
. spawn ( )
. unwrap ( )
. wait ( )
. unwrap ( ) ;
assert! ( status . success ( ) ) ;
}
2020-03-11 16:54:53 -04:00
2019-09-10 11:09:54 -04:00
itest! ( _027_redirect_typescript {
2020-05-17 11:42:39 -04:00
args : " run --quiet --reload 027_redirect_typescript.ts " ,
2019-09-19 14:48:05 -04:00
output : " 027_redirect_typescript.ts.out " ,
http_server : true ,
2019-09-10 11:09:54 -04:00
} ) ;
itest! ( _028_args {
2020-05-17 11:42:39 -04:00
args : " run --quiet --reload 028_args.ts --arg1 val1 --arg2=val2 -- arg3 arg4 " ,
2019-09-19 14:48:05 -04:00
output : " 028_args.ts.out " ,
2019-09-10 11:09:54 -04:00
} ) ;
itest! ( _029_eval {
args : " eval console.log( \" hello \" ) " ,
2019-09-19 14:48:05 -04:00
output : " 029_eval.out " ,
2019-09-10 11:09:54 -04:00
} ) ;
2020-02-28 09:17:56 -05:00
// Ugly parentheses due to whitespace delimiting problem.
itest! ( _030_eval_ts {
2020-05-17 11:42:39 -04:00
args : " eval --quiet -T console.log((123)as(number)) " , // 'as' is a TS keyword only
2020-02-28 09:17:56 -05:00
output : " 030_eval_ts.out " ,
} ) ;
2019-09-10 11:09:54 -04:00
itest! ( _033_import_map {
args :
2020-05-17 11:42:39 -04:00
" run --quiet --reload --importmap=importmaps/import_map.json --unstable importmaps/test.ts " ,
2019-09-19 14:48:05 -04:00
output : " 033_import_map.out " ,
2019-09-10 11:09:54 -04:00
} ) ;
2020-04-27 19:12:38 -04:00
itest! ( import_map_no_unstable {
args :
2020-05-17 11:42:39 -04:00
" run --quiet --reload --importmap=importmaps/import_map.json importmaps/test.ts " ,
2020-04-27 19:12:38 -04:00
output : " import_map_no_unstable.out " ,
exit_code : 70 ,
} ) ;
2019-09-10 11:09:54 -04:00
itest! ( _034_onload {
2020-05-17 11:42:39 -04:00
args : " run --quiet --reload 034_onload/main.ts " ,
2019-09-19 14:48:05 -04:00
output : " 034_onload.out " ,
2019-09-10 11:09:54 -04:00
} ) ;
2020-03-03 16:02:35 -05:00
// TODO(ry) Re-enable flaky test https://github.com/denoland/deno/issues/4049
itest_ignore! ( _035_cached_only_flag {
2019-09-19 14:48:05 -04:00
args :
2019-12-03 17:48:53 -05:00
" --reload --cached-only http://127.0.0.1:4545/cli/tests/019_media_types.ts " ,
output : " 035_cached_only_flag.out " ,
2019-09-10 11:09:54 -04:00
exit_code : 1 ,
2019-09-19 14:48:05 -04:00
http_server : true ,
2019-09-10 11:09:54 -04:00
} ) ;
itest! ( _036_import_map_fetch {
args :
2020-05-17 11:42:39 -04:00
" cache --quiet --reload --importmap=importmaps/import_map.json --unstable importmaps/test.ts " ,
2019-09-19 14:48:05 -04:00
output : " 036_import_map_fetch.out " ,
2019-09-10 11:09:54 -04:00
} ) ;
2020-01-31 16:07:37 -05:00
itest! ( _037_fetch_multiple {
2020-04-07 11:24:47 -04:00
args : " cache --reload fetch/test.ts fetch/other.ts " ,
2020-01-31 16:07:37 -05:00
http_server : true ,
output : " 037_fetch_multiple.out " ,
} ) ;
2019-09-10 11:09:54 -04:00
itest! ( _038_checkjs {
// checking if JS file is run through TS compiler
args : " run --reload --config 038_checkjs.tsconfig.json 038_checkjs.js " ,
exit_code : 1 ,
2019-09-19 14:48:05 -04:00
output : " 038_checkjs.js.out " ,
2019-09-10 11:09:54 -04:00
} ) ;
itest! ( _041_dyn_import_eval {
args : " eval import('./subdir/mod4.js').then(console.log) " ,
2019-09-19 14:48:05 -04:00
output : " 041_dyn_import_eval.out " ,
2019-09-10 11:09:54 -04:00
} ) ;
itest! ( _041_info_flag {
args : " info " ,
2019-09-19 14:48:05 -04:00
output : " 041_info_flag.out " ,
2019-09-10 11:09:54 -04:00
} ) ;
itest! ( _042_dyn_import_evalcontext {
2020-05-17 11:42:39 -04:00
args : " run --quiet --allow-read --reload 042_dyn_import_evalcontext.ts " ,
2019-09-19 14:48:05 -04:00
output : " 042_dyn_import_evalcontext.ts.out " ,
2019-09-10 11:09:54 -04:00
} ) ;
2019-09-24 10:46:57 -04:00
itest! ( _044_bad_resource {
2020-05-17 11:42:39 -04:00
args : " run --quiet --reload --allow-read 044_bad_resource.ts " ,
2019-09-24 10:46:57 -04:00
output : " 044_bad_resource.ts.out " ,
exit_code : 1 ,
} ) ;
2020-03-03 16:02:35 -05:00
itest_ignore! ( _045_proxy {
2019-09-24 18:52:01 -04:00
args : " run --allow-net --allow-env --allow-run --reload 045_proxy_test.ts " ,
output : " 045_proxy_test.ts.out " ,
2019-10-22 09:52:41 -04:00
http_server : true ,
2019-09-24 18:52:01 -04:00
} ) ;
2019-10-02 10:46:36 -04:00
itest! ( _046_tsx {
2020-05-17 11:42:39 -04:00
args : " run --quiet --reload 046_jsx_test.tsx " ,
2019-10-02 10:46:36 -04:00
output : " 046_jsx_test.tsx.out " ,
} ) ;
itest! ( _047_jsx {
2020-05-17 11:42:39 -04:00
args : " run --quiet --reload 047_jsx_test.jsx " ,
2019-10-02 10:46:36 -04:00
output : " 047_jsx_test.jsx.out " ,
} ) ;
2020-03-03 16:02:35 -05:00
// TODO(ry) Re-enable flaky test https://github.com/denoland/deno/issues/4049
itest_ignore! ( _048_media_types_jsx {
2019-10-16 13:35:04 -04:00
args : " run --reload 048_media_types_jsx.ts " ,
output : " 048_media_types_jsx.ts.out " ,
http_server : true ,
} ) ;
2020-03-03 16:02:35 -05:00
// TODO(ry) Re-enable flaky test https://github.com/denoland/deno/issues/4049
itest_ignore! ( _049_info_flag_script_jsx {
2019-10-16 13:35:04 -04:00
args : " info http://127.0.0.1:4545/cli/tests/048_media_types_jsx.ts " ,
output : " 049_info_flag_script_jsx.out " ,
http_server : true ,
} ) ;
2020-03-03 16:02:35 -05:00
// TODO(ry) Re-enable flaky test https://github.com/denoland/deno/issues/4049
itest_ignore! ( _052_no_remote_flag {
2019-12-03 17:48:53 -05:00
args :
" --reload --no-remote http://127.0.0.1:4545/cli/tests/019_media_types.ts " ,
output : " 052_no_remote_flag.out " ,
exit_code : 1 ,
http_server : true ,
} ) ;
2020-01-25 12:53:16 -05:00
itest! ( _054_info_local_imports {
2020-05-17 11:42:39 -04:00
args : " info --quiet 005_more_imports.ts " ,
2020-01-25 12:53:16 -05:00
output : " 054_info_local_imports.out " ,
exit_code : 0 ,
} ) ;
2020-02-25 09:23:23 -05:00
itest! ( _056_make_temp_file_write_perm {
2020-04-30 11:23:40 -04:00
args :
2020-05-17 11:42:39 -04:00
" run --quiet --allow-read --allow-write=./subdir/ 056_make_temp_file_write_perm.ts " ,
2020-02-25 09:23:23 -05:00
output : " 056_make_temp_file_write_perm.out " ,
} ) ;
2020-04-30 11:23:40 -04:00
// TODO(lucacasonato): remove --unstable when permissions goes stable
2020-02-28 09:47:54 -05:00
itest! ( _057_revoke_permissions {
2020-04-30 11:23:40 -04:00
args : " test -A --unstable 057_revoke_permissions.ts " ,
2020-02-28 09:47:54 -05:00
output : " 057_revoke_permissions.out " ,
} ) ;
2020-03-24 23:56:40 -04:00
itest! ( _058_tasks_microtasks_close {
2020-05-17 11:42:39 -04:00
args : " run --quiet 058_tasks_microtasks_close.ts " ,
2020-03-24 23:56:40 -04:00
output : " 058_tasks_microtasks_close.ts.out " ,
} ) ;
2020-02-16 05:11:44 -05:00
itest! ( js_import_detect {
2020-05-17 11:42:39 -04:00
args : " run --quiet --reload js_import_detect.ts " ,
2020-02-16 05:11:44 -05:00
output : " js_import_detect.ts.out " ,
exit_code : 0 ,
} ) ;
2020-01-26 13:43:59 -05:00
itest! ( lock_write_fetch {
args :
2020-05-17 11:42:39 -04:00
" run --quiet --allow-read --allow-write --allow-env --allow-run lock_write_fetch.ts " ,
2020-01-26 13:43:59 -05:00
output : " lock_write_fetch.ts.out " ,
exit_code : 0 ,
} ) ;
2019-11-03 10:39:27 -05:00
itest! ( lock_check_ok {
args : " run --lock=lock_check_ok.json http://127.0.0.1:4545/cli/tests/003_relative_import.ts " ,
output : " 003_relative_import.ts.out " ,
http_server : true ,
} ) ;
2020-03-03 16:02:35 -05:00
// TODO(ry) Re-enable flaky test https://github.com/denoland/deno/issues/4049
itest_ignore! ( lock_check_ok2 {
2019-11-03 10:39:27 -05:00
args : " run 019_media_types.ts --lock=lock_check_ok2.json " ,
output : " 019_media_types.ts.out " ,
http_server : true ,
} ) ;
itest! ( lock_check_err {
args : " run --lock=lock_check_err.json http://127.0.0.1:4545/cli/tests/003_relative_import.ts " ,
output : " lock_check_err.out " ,
exit_code : 10 ,
http_server : true ,
} ) ;
2020-03-03 16:02:35 -05:00
// TODO(ry) Re-enable flaky test https://github.com/denoland/deno/issues/4049
itest_ignore! ( lock_check_err2 {
2019-11-26 11:06:32 -05:00
args : " run --lock=lock_check_err2.json 019_media_types.ts " ,
2019-11-03 10:39:27 -05:00
output : " lock_check_err2.out " ,
exit_code : 10 ,
http_server : true ,
} ) ;
2019-09-10 11:09:54 -04:00
itest! ( async_error {
exit_code : 1 ,
args : " run --reload async_error.ts " ,
2019-09-19 14:48:05 -04:00
output : " async_error.ts.out " ,
2019-09-10 11:09:54 -04:00
} ) ;
2019-11-13 10:35:56 -05:00
itest! ( bundle {
args : " bundle subdir/mod1.ts " ,
output : " bundle.test.out " ,
} ) ;
2020-02-09 05:19:05 -05:00
itest! ( fmt_stdin {
args : " fmt - " ,
input : Some ( " const a = 1 \n " ) ,
output_str : Some ( " const a = 1; \n " ) ,
} ) ;
itest! ( fmt_stdin_check_formatted {
args : " fmt --check - " ,
input : Some ( " const a = 1; \n " ) ,
output_str : Some ( " " ) ,
} ) ;
itest! ( fmt_stdin_check_not_formatted {
args : " fmt --check - " ,
input : Some ( " const a = 1 \n " ) ,
output_str : Some ( " Not formatted stdin \n " ) ,
} ) ;
2019-09-10 11:09:54 -04:00
itest! ( circular1 {
args : " run --reload circular1.js " ,
2019-09-19 14:48:05 -04:00
output : " circular1.js.out " ,
2019-09-10 11:09:54 -04:00
} ) ;
itest! ( config {
args : " run --reload --config config.tsconfig.json config.ts " ,
exit_code : 1 ,
2019-09-19 14:48:05 -04:00
output : " config.ts.out " ,
2019-09-10 11:09:54 -04:00
} ) ;
itest! ( error_001 {
args : " run --reload error_001.ts " ,
exit_code : 1 ,
2019-09-19 14:48:05 -04:00
output : " error_001.ts.out " ,
2019-09-10 11:09:54 -04:00
} ) ;
itest! ( error_002 {
args : " run --reload error_002.ts " ,
exit_code : 1 ,
2019-09-19 14:48:05 -04:00
output : " error_002.ts.out " ,
2019-09-10 11:09:54 -04:00
} ) ;
itest! ( error_003_typescript {
args : " run --reload error_003_typescript.ts " ,
exit_code : 1 ,
2019-09-19 14:48:05 -04:00
output : " error_003_typescript.ts.out " ,
2019-09-10 11:09:54 -04:00
} ) ;
// Supposing that we've already attempted to run error_003_typescript.ts
// we want to make sure that JS wasn't emitted. Running again without reload flag
// should result in the same output.
// https://github.com/denoland/deno/issues/2436
itest! ( error_003_typescript2 {
args : " run error_003_typescript.ts " ,
exit_code : 1 ,
2019-09-19 14:48:05 -04:00
output : " error_003_typescript.ts.out " ,
2019-09-10 11:09:54 -04:00
} ) ;
itest! ( error_004_missing_module {
args : " run --reload error_004_missing_module.ts " ,
exit_code : 1 ,
2019-09-19 14:48:05 -04:00
output : " error_004_missing_module.ts.out " ,
2019-09-10 11:09:54 -04:00
} ) ;
itest! ( error_005_missing_dynamic_import {
2020-05-18 06:59:29 -04:00
args : " run --reload --allow-read error_005_missing_dynamic_import.ts " ,
2019-09-10 11:09:54 -04:00
exit_code : 1 ,
2019-09-19 14:48:05 -04:00
output : " error_005_missing_dynamic_import.ts.out " ,
2019-09-10 11:09:54 -04:00
} ) ;
itest! ( error_006_import_ext_failure {
args : " run --reload error_006_import_ext_failure.ts " ,
exit_code : 1 ,
2019-09-19 14:48:05 -04:00
output : " error_006_import_ext_failure.ts.out " ,
2019-09-10 11:09:54 -04:00
} ) ;
itest! ( error_007_any {
args : " run --reload error_007_any.ts " ,
exit_code : 1 ,
2019-09-19 14:48:05 -04:00
output : " error_007_any.ts.out " ,
2019-09-10 11:09:54 -04:00
} ) ;
itest! ( error_008_checkjs {
args : " run --reload error_008_checkjs.js " ,
exit_code : 1 ,
2019-09-19 14:48:05 -04:00
output : " error_008_checkjs.js.out " ,
2019-09-10 11:09:54 -04:00
} ) ;
itest! ( error_011_bad_module_specifier {
args : " run --reload error_011_bad_module_specifier.ts " ,
exit_code : 1 ,
2019-09-19 14:48:05 -04:00
output : " error_011_bad_module_specifier.ts.out " ,
2019-09-10 11:09:54 -04:00
} ) ;
itest! ( error_012_bad_dynamic_import_specifier {
args : " run --reload error_012_bad_dynamic_import_specifier.ts " ,
exit_code : 1 ,
2019-09-19 14:48:05 -04:00
output : " error_012_bad_dynamic_import_specifier.ts.out " ,
2019-09-10 11:09:54 -04:00
} ) ;
itest! ( error_013_missing_script {
args : " run --reload missing_file_name " ,
exit_code : 1 ,
2019-09-19 14:48:05 -04:00
output : " error_013_missing_script.out " ,
2019-09-10 11:09:54 -04:00
} ) ;
itest! ( error_014_catch_dynamic_import_error {
2019-11-26 11:06:32 -05:00
args : " run --reload --allow-read error_014_catch_dynamic_import_error.js " ,
2019-09-19 14:48:05 -04:00
output : " error_014_catch_dynamic_import_error.js.out " ,
2019-09-10 11:09:54 -04:00
} ) ;
itest! ( error_015_dynamic_import_permissions {
2020-05-04 07:03:30 -04:00
args : " run --reload error_015_dynamic_import_permissions.js " ,
2019-09-19 14:48:05 -04:00
output : " error_015_dynamic_import_permissions.out " ,
2019-09-10 11:09:54 -04:00
exit_code : 1 ,
2019-09-19 14:48:05 -04:00
http_server : true ,
2019-09-10 11:09:54 -04:00
} ) ;
// We have an allow-net flag but not allow-read, it should still result in error.
itest! ( error_016_dynamic_import_permissions2 {
2020-05-04 07:03:30 -04:00
args : " run --reload --allow-net error_016_dynamic_import_permissions2.js " ,
2019-09-19 14:48:05 -04:00
output : " error_016_dynamic_import_permissions2.out " ,
2019-09-10 11:09:54 -04:00
exit_code : 1 ,
2019-09-19 14:48:05 -04:00
http_server : true ,
2019-09-10 11:09:54 -04:00
} ) ;
2020-03-24 23:53:48 -04:00
itest! ( error_017_hide_long_source_ts {
2020-05-04 07:03:30 -04:00
args : " run --reload error_017_hide_long_source_ts.ts " ,
2020-03-24 23:53:48 -04:00
output : " error_017_hide_long_source_ts.ts.out " ,
exit_code : 1 ,
} ) ;
itest! ( error_018_hide_long_source_js {
2020-05-04 07:03:30 -04:00
args : " run error_018_hide_long_source_js.js " ,
2020-03-24 23:53:48 -04:00
output : " error_018_hide_long_source_js.js.out " ,
exit_code : 1 ,
} ) ;
2020-04-11 02:08:11 -04:00
itest! ( error_019_stack_function {
2020-05-04 07:03:30 -04:00
args : " run error_019_stack_function.ts " ,
2020-04-11 02:08:11 -04:00
output : " error_019_stack_function.ts.out " ,
exit_code : 1 ,
} ) ;
itest! ( error_020_stack_constructor {
2020-05-04 07:03:30 -04:00
args : " run error_020_stack_constructor.ts " ,
2020-04-11 02:08:11 -04:00
output : " error_020_stack_constructor.ts.out " ,
exit_code : 1 ,
} ) ;
itest! ( error_021_stack_method {
2020-05-04 07:03:30 -04:00
args : " run error_021_stack_method.ts " ,
2020-04-11 02:08:11 -04:00
output : " error_021_stack_method.ts.out " ,
exit_code : 1 ,
} ) ;
itest! ( error_022_stack_custom_error {
2020-05-04 07:03:30 -04:00
args : " run error_022_stack_custom_error.ts " ,
2020-04-11 02:08:11 -04:00
output : " error_022_stack_custom_error.ts.out " ,
exit_code : 1 ,
} ) ;
itest! ( error_023_stack_async {
2020-05-04 07:03:30 -04:00
args : " run error_023_stack_async.ts " ,
2020-04-11 02:08:11 -04:00
output : " error_023_stack_async.ts.out " ,
2019-09-10 11:09:54 -04:00
exit_code : 1 ,
} ) ;
2020-04-13 10:54:16 -04:00
itest! ( error_024_stack_promise_all {
2020-05-04 07:03:30 -04:00
args : " run error_024_stack_promise_all.ts " ,
2020-04-13 10:54:16 -04:00
output : " error_024_stack_promise_all.ts.out " ,
exit_code : 1 ,
} ) ;
2020-05-01 13:03:54 -04:00
itest! ( error_025_tab_indent {
2020-05-04 07:03:30 -04:00
args : " run error_025_tab_indent " ,
2020-05-01 13:03:54 -04:00
output : " error_025_tab_indent.out " ,
exit_code : 1 ,
} ) ;
2019-09-10 11:09:54 -04:00
itest! ( error_syntax {
args : " run --reload error_syntax.js " ,
exit_code : 1 ,
2019-09-19 14:48:05 -04:00
output : " error_syntax.js.out " ,
2019-09-10 11:09:54 -04:00
} ) ;
2020-03-24 23:55:54 -04:00
itest! ( error_syntax_empty_trailing_line {
args : " run --reload error_syntax_empty_trailing_line.mjs " ,
exit_code : 1 ,
output : " error_syntax_empty_trailing_line.mjs.out " ,
} ) ;
2019-09-10 11:09:54 -04:00
itest! ( error_type_definitions {
args : " run --reload error_type_definitions.ts " ,
exit_code : 1 ,
2019-09-19 14:48:05 -04:00
output : " error_type_definitions.ts.out " ,
2019-09-10 11:09:54 -04:00
} ) ;
2020-05-02 09:51:08 -04:00
itest! ( error_local_static_import_from_remote_ts {
args : " run --reload http://localhost:4545/cli/tests/error_local_static_import_from_remote.ts " ,
exit_code : 1 ,
http_server : true ,
output : " error_local_static_import_from_remote.ts.out " ,
} ) ;
itest! ( error_local_static_import_from_remote_js {
args : " run --reload http://localhost:4545/cli/tests/error_local_static_import_from_remote.js " ,
exit_code : 1 ,
http_server : true ,
output : " error_local_static_import_from_remote.js.out " ,
} ) ;
2019-09-10 11:09:54 -04:00
itest! ( exit_error42 {
exit_code : 42 ,
2020-05-17 11:42:39 -04:00
args : " run --quiet --reload exit_error42.ts " ,
2019-09-19 14:48:05 -04:00
output : " exit_error42.ts.out " ,
2019-09-10 11:09:54 -04:00
} ) ;
itest! ( https_import {
2020-05-17 11:42:39 -04:00
args : " run --quiet --reload https_import.ts " ,
2019-09-19 14:48:05 -04:00
output : " https_import.ts.out " ,
2019-09-10 11:09:54 -04:00
} ) ;
itest! ( if_main {
2020-05-17 11:42:39 -04:00
args : " run --quiet --reload if_main.ts " ,
2019-09-19 14:48:05 -04:00
output : " if_main.ts.out " ,
2019-09-10 11:09:54 -04:00
} ) ;
itest! ( import_meta {
2020-05-17 11:42:39 -04:00
args : " run --quiet --reload import_meta.ts " ,
2019-09-19 14:48:05 -04:00
output : " import_meta.ts.out " ,
2019-09-10 11:09:54 -04:00
} ) ;
2020-02-19 00:34:11 -05:00
itest! ( lib_ref {
2020-05-17 11:42:39 -04:00
args : " run --quiet --unstable --reload lib_ref.ts " ,
2020-02-19 00:34:11 -05:00
output : " lib_ref.ts.out " ,
} ) ;
itest! ( lib_runtime_api {
2020-05-17 11:42:39 -04:00
args : " run --quiet --unstable --reload lib_runtime_api.ts " ,
2020-02-19 00:34:11 -05:00
output : " lib_runtime_api.ts.out " ,
} ) ;
2019-09-10 11:09:54 -04:00
itest! ( seed_random {
args : " run --seed=100 seed_random.js " ,
2020-05-19 14:19:26 -04:00
2019-09-19 14:48:05 -04:00
output : " seed_random.js.out " ,
2019-09-10 11:09:54 -04:00
} ) ;
itest! ( type_definitions {
args : " run --reload type_definitions.ts " ,
2019-09-19 14:48:05 -04:00
output : " type_definitions.ts.out " ,
2019-09-10 11:09:54 -04:00
} ) ;
2020-01-26 13:59:41 -05:00
itest! ( type_directives_01 {
args : " run --reload -L debug type_directives_01.ts " ,
output : " type_directives_01.ts.out " ,
http_server : true ,
} ) ;
itest! ( type_directives_02 {
args : " run --reload -L debug type_directives_02.ts " ,
output : " type_directives_02.ts.out " ,
} ) ;
2020-04-06 16:52:25 -04:00
itest! ( type_directives_js_main {
args : " run --reload -L debug type_directives_js_main.js " ,
output : " type_directives_js_main.js.out " ,
exit_code : 0 ,
} ) ;
2020-05-22 10:01:00 -04:00
itest! ( type_directives_redirect {
args : " run --reload type_directives_redirect.ts " ,
output : " type_directives_redirect.ts.out " ,
http_server : true ,
} ) ;
2020-05-22 13:05:18 -04:00
itest! ( ts_type_imports {
args : " run --reload ts_type_imports.ts " ,
output : " ts_type_imports.ts.out " ,
exit_code : 1 ,
2020-05-22 13:23:35 -04:00
} ) ;
itest! ( ts_decorators {
args : " run --reload -c tsconfig.decorators.json ts_decorators.ts " ,
output : " ts_decorators.ts.out " ,
} ) ;
itest! ( swc_syntax_error {
args : " run --reload swc_syntax_error.ts " ,
output : " swc_syntax_error.ts.out " ,
exit_code : 1 ,
2020-05-22 13:05:18 -04:00
} ) ;
2019-09-10 11:09:54 -04:00
itest! ( types {
args : " types " ,
2019-09-19 14:48:05 -04:00
output : " types.out " ,
2019-09-10 11:09:54 -04:00
} ) ;
itest! ( unbuffered_stderr {
args : " run --reload unbuffered_stderr.ts " ,
2019-09-19 14:48:05 -04:00
output : " unbuffered_stderr.ts.out " ,
2019-09-10 11:09:54 -04:00
} ) ;
itest! ( unbuffered_stdout {
2020-05-17 11:42:39 -04:00
args : " run --quiet --reload unbuffered_stdout.ts " ,
2019-09-19 14:48:05 -04:00
output : " unbuffered_stdout.ts.out " ,
2019-09-10 11:09:54 -04:00
} ) ;
2020-01-26 09:49:34 -05:00
// Cannot write the expression to evaluate as "console.log(typeof gc)"
// because itest! splits args on whitespace.
itest! ( eval_v8_flags {
args : " eval --v8-flags=--expose-gc console.log(typeof(gc)) " ,
output : " v8_flags.js.out " ,
} ) ;
itest! ( run_v8_flags {
2019-09-10 11:09:54 -04:00
args : " run --v8-flags=--expose-gc v8_flags.js " ,
2019-09-19 14:48:05 -04:00
output : " v8_flags.js.out " ,
2019-09-10 11:09:54 -04:00
} ) ;
2020-01-26 09:49:34 -05:00
itest! ( run_v8_help {
2020-05-04 07:03:30 -04:00
args : " repl --v8-flags=--help " ,
2019-09-19 14:48:05 -04:00
output : " v8_help.out " ,
2019-09-10 11:09:54 -04:00
} ) ;
2020-05-07 09:57:10 -04:00
itest! ( unsupported_dynamic_import_scheme {
args : " eval import('xxx:') " ,
output : " unsupported_dynamic_import_scheme.out " ,
exit_code : 1 ,
} ) ;
2019-09-10 11:09:54 -04:00
itest! ( wasm {
2020-05-17 11:42:39 -04:00
args : " run --quiet wasm.ts " ,
2019-09-19 14:48:05 -04:00
output : " wasm.ts.out " ,
2019-09-10 11:09:54 -04:00
} ) ;
itest! ( wasm_async {
2020-05-04 07:03:30 -04:00
args : " run wasm_async.js " ,
2019-09-19 14:48:05 -04:00
output : " wasm_async.out " ,
2019-09-10 11:09:54 -04:00
} ) ;
2019-09-24 18:37:04 -04:00
itest! ( top_level_await {
2020-05-04 07:03:30 -04:00
args : " run --allow-read top_level_await.js " ,
2019-09-24 18:37:04 -04:00
output : " top_level_await.out " ,
} ) ;
2019-09-30 12:38:23 -04:00
itest! ( top_level_await_ts {
2020-05-17 11:42:39 -04:00
args : " run --quiet --allow-read top_level_await.ts " ,
2019-09-30 12:38:23 -04:00
output : " top_level_await.out " ,
} ) ;
2019-10-27 09:04:42 -04:00
itest! ( top_level_for_await {
2020-05-17 11:42:39 -04:00
args : " run --quiet top_level_for_await.js " ,
2019-10-27 09:04:42 -04:00
output : " top_level_for_await.out " ,
} ) ;
itest! ( top_level_for_await_ts {
2020-05-17 11:42:39 -04:00
args : " run --quiet top_level_for_await.ts " ,
2019-10-27 09:04:42 -04:00
output : " top_level_for_await.out " ,
} ) ;
2019-10-29 17:52:57 -04:00
2020-04-30 11:23:40 -04:00
itest! ( unstable_disabled {
args : " run --reload unstable.ts " ,
exit_code : 1 ,
output : " unstable_disabled.out " ,
} ) ;
itest! ( unstable_enabled {
2020-05-17 11:42:39 -04:00
args : " run --quiet --reload --unstable unstable.ts " ,
2020-04-30 11:23:40 -04:00
output : " unstable_enabled.out " ,
} ) ;
itest! ( unstable_disabled_js {
args : " run --reload unstable.js " ,
output : " unstable_disabled_js.out " ,
} ) ;
itest! ( unstable_enabled_js {
2020-05-17 11:42:39 -04:00
args : " run --quiet --reload --unstable unstable.ts " ,
2020-04-30 11:23:40 -04:00
output : " unstable_enabled_js.out " ,
2020-04-25 09:31:54 -04:00
} ) ;
2020-01-11 05:11:05 -05:00
itest! ( _053_import_compression {
2020-05-17 11:42:39 -04:00
args : " run --quiet --reload --allow-net 053_import_compression/main.ts " ,
2020-01-11 05:11:05 -05:00
output : " 053_import_compression.out " ,
http_server : true ,
} ) ;
2020-02-17 11:59:51 -05:00
itest! ( cafile_url_imports {
2020-05-17 11:42:39 -04:00
args : " run --quiet --reload --cert tls/RootCA.pem cafile_url_imports.ts " ,
2020-02-17 11:59:51 -05:00
output : " cafile_url_imports.ts.out " ,
http_server : true ,
} ) ;
itest! ( cafile_ts_fetch {
2020-05-17 11:42:39 -04:00
args :
" run --quiet --reload --allow-net --cert tls/RootCA.pem cafile_ts_fetch.ts " ,
2020-02-17 11:59:51 -05:00
output : " cafile_ts_fetch.ts.out " ,
http_server : true ,
} ) ;
itest! ( cafile_eval {
args : " eval --cert tls/RootCA.pem fetch('https://localhost:5545/cli/tests/cafile_ts_fetch.ts.out').then(r=>r.text()).then(t=>console.log(t.trimEnd())) " ,
output : " cafile_ts_fetch.ts.out " ,
http_server : true ,
} ) ;
2020-03-28 17:51:30 -04:00
itest_ignore! ( cafile_info {
2020-02-17 11:59:51 -05:00
args :
" info --cert tls/RootCA.pem https://localhost:5545/cli/tests/cafile_info.ts " ,
output : " cafile_info.ts.out " ,
http_server : true ,
} ) ;
2020-05-21 07:06:12 -04:00
itest! ( disallow_http_from_https_js {
args : " run --quiet --reload --cert tls/RootCA.pem https://localhost:5545/cli/tests/disallow_http_from_https.js " ,
output : " disallow_http_from_https_js.out " ,
http_server : true ,
exit_code : 1 ,
} ) ;
itest! ( disallow_http_from_https_ts {
args : " run --quiet --reload --cert tls/RootCA.pem https://localhost:5545/cli/tests/disallow_http_from_https.ts " ,
output : " disallow_http_from_https_ts.out " ,
http_server : true ,
exit_code : 1 ,
} ) ;
2020-02-25 03:32:43 -05:00
itest! ( fix_js_import_js {
2020-05-17 11:42:39 -04:00
args : " run --quiet --reload fix_js_import_js.ts " ,
2020-02-25 03:32:43 -05:00
output : " fix_js_import_js.ts.out " ,
} ) ;
2020-02-19 22:58:05 -05:00
itest! ( fix_js_imports {
2020-05-17 11:42:39 -04:00
args : " run --quiet --reload fix_js_imports.ts " ,
2020-02-19 22:58:05 -05:00
output : " fix_js_imports.ts.out " ,
} ) ;
2020-03-15 06:34:22 -04:00
itest! ( proto_exploit {
args : " run proto_exploit.js " ,
output : " proto_exploit.js.out " ,
} ) ;
2020-02-17 11:59:51 -05:00
#[ test ]
fn cafile_fetch ( ) {
2020-02-19 08:17:13 -05:00
use url ::Url ;
2020-02-17 11:59:51 -05:00
let g = util ::http_server ( ) ;
let deno_dir = TempDir ::new ( ) . expect ( " tempdir fail " ) ;
2020-02-19 08:17:13 -05:00
let module_url =
Url ::parse ( " http://localhost:4545/cli/tests/cafile_url_imports.ts " )
. unwrap ( ) ;
2020-02-17 11:59:51 -05:00
let cafile = util ::root_path ( ) . join ( " cli/tests/tls/RootCA.pem " ) ;
2020-05-11 14:49:19 -04:00
let output = Command ::new ( util ::deno_exe_path ( ) )
2020-02-17 11:59:51 -05:00
. env ( " DENO_DIR " , deno_dir . path ( ) )
. current_dir ( util ::root_path ( ) )
2020-04-07 11:24:47 -04:00
. arg ( " cache " )
2020-02-17 11:59:51 -05:00
. arg ( " --cert " )
. arg ( cafile )
2020-02-19 08:17:13 -05:00
. arg ( module_url . to_string ( ) )
2020-02-17 11:59:51 -05:00
. output ( )
. expect ( " Failed to spawn script " ) ;
2020-05-11 14:49:19 -04:00
assert! ( output . status . success ( ) ) ;
2020-02-17 11:59:51 -05:00
let out = std ::str ::from_utf8 ( & output . stdout ) . unwrap ( ) ;
assert_eq! ( out , " " ) ;
drop ( g ) ;
}
#[ test ]
fn cafile_install_remote_module ( ) {
let g = util ::http_server ( ) ;
let temp_dir = TempDir ::new ( ) . expect ( " tempdir fail " ) ;
2020-04-16 18:15:42 -04:00
let bin_dir = temp_dir . path ( ) . join ( " bin " ) ;
std ::fs ::create_dir ( & bin_dir ) . unwrap ( ) ;
2020-02-17 11:59:51 -05:00
let deno_dir = TempDir ::new ( ) . expect ( " tempdir fail " ) ;
let cafile = util ::root_path ( ) . join ( " cli/tests/tls/RootCA.pem " ) ;
2020-05-11 17:33:36 -04:00
let install_output = Command ::new ( util ::deno_exe_path ( ) )
2020-02-17 11:59:51 -05:00
. env ( " DENO_DIR " , deno_dir . path ( ) )
. current_dir ( util ::root_path ( ) )
. arg ( " install " )
. arg ( " --cert " )
. arg ( cafile )
2020-04-16 18:15:42 -04:00
. arg ( " --root " )
2020-02-17 11:59:51 -05:00
. arg ( temp_dir . path ( ) )
2020-05-01 15:33:11 -04:00
. arg ( " -n " )
2020-02-17 11:59:51 -05:00
. arg ( " echo_test " )
. arg ( " https://localhost:5545/cli/tests/echo.ts " )
. output ( )
. expect ( " Failed to spawn script " ) ;
2020-03-19 12:46:56 -04:00
assert! ( install_output . status . success ( ) ) ;
2020-02-17 11:59:51 -05:00
2020-04-16 18:15:42 -04:00
let mut echo_test_path = bin_dir . join ( " echo_test " ) ;
2020-02-17 11:59:51 -05:00
if cfg! ( windows ) {
2020-03-19 12:46:56 -04:00
echo_test_path = echo_test_path . with_extension ( " cmd " ) ;
2020-02-17 11:59:51 -05:00
}
2020-03-19 12:46:56 -04:00
assert! ( echo_test_path . exists ( ) ) ;
2020-02-17 11:59:51 -05:00
2020-03-19 12:46:56 -04:00
let output = Command ::new ( echo_test_path )
2020-02-17 11:59:51 -05:00
. current_dir ( temp_dir . path ( ) )
. arg ( " foo " )
2020-03-19 12:46:56 -04:00
. env ( " PATH " , util ::target_dir ( ) )
2020-02-17 11:59:51 -05:00
. output ( )
. expect ( " failed to spawn script " ) ;
2020-03-19 12:46:56 -04:00
let stdout = std ::str ::from_utf8 ( & output . stdout ) . unwrap ( ) . trim ( ) ;
assert! ( stdout . ends_with ( " foo " ) ) ;
2020-02-17 11:59:51 -05:00
drop ( deno_dir ) ;
drop ( temp_dir ) ;
drop ( g )
}
#[ test ]
fn cafile_bundle_remote_exports ( ) {
let g = util ::http_server ( ) ;
// First we have to generate a bundle of some remote module that has exports.
let mod1 = " https://localhost:5545/cli/tests/subdir/mod1.ts " ;
let cafile = util ::root_path ( ) . join ( " cli/tests/tls/RootCA.pem " ) ;
let t = TempDir ::new ( ) . expect ( " tempdir fail " ) ;
let bundle = t . path ( ) . join ( " mod1.bundle.js " ) ;
let mut deno = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " bundle " )
. arg ( " --cert " )
. arg ( cafile )
. arg ( mod1 )
. arg ( & bundle )
. spawn ( )
. expect ( " failed to spawn script " ) ;
let status = deno . wait ( ) . expect ( " failed to wait for the child process " ) ;
assert! ( status . success ( ) ) ;
assert! ( bundle . is_file ( ) ) ;
// Now we try to use that bundle from another module.
let test = t . path ( ) . join ( " test.js " ) ;
std ::fs ::write (
& test ,
"
import { printHello3 } from \ " ./mod1.bundle.js \" ;
printHello3 ( ) ; " ,
)
. expect ( " error writing file " ) ;
let output = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " run " )
. arg ( & test )
. output ( )
. expect ( " failed to spawn script " ) ;
// check the output of the test.ts program.
assert! ( std ::str ::from_utf8 ( & output . stdout )
. unwrap ( )
. trim ( )
. ends_with ( " Hello " ) ) ;
assert_eq! ( output . stderr , b " " ) ;
drop ( g )
}
2020-02-25 15:36:35 -05:00
#[ test ]
fn test_permissions_with_allow ( ) {
for permission in & util ::PERMISSION_VARIANTS {
2020-03-07 05:27:16 -05:00
let ( _ , err ) = util ::run_and_collect_output (
true ,
2020-02-25 15:36:35 -05:00
& format! ( " run --allow- {0} permission_test.ts {0} Required " , permission ) ,
None ,
None ,
2020-03-01 19:51:54 -05:00
false ,
2020-02-25 15:36:35 -05:00
) ;
assert! ( ! err . contains ( util ::PERMISSION_DENIED_PATTERN ) ) ;
}
}
#[ test ]
fn test_permissions_without_allow ( ) {
for permission in & util ::PERMISSION_VARIANTS {
2020-03-07 05:27:16 -05:00
let ( _ , err ) = util ::run_and_collect_output (
false ,
2020-02-25 15:36:35 -05:00
& format! ( " run permission_test.ts {0} Required " , permission ) ,
None ,
None ,
2020-03-01 19:51:54 -05:00
false ,
2020-02-25 15:36:35 -05:00
) ;
assert! ( err . contains ( util ::PERMISSION_DENIED_PATTERN ) ) ;
}
}
2020-03-01 19:51:54 -05:00
#[ test ]
fn test_permissions_rw_inside_project_dir ( ) {
const PERMISSION_VARIANTS : [ & str ; 2 ] = [ " read " , " write " ] ;
for permission in & PERMISSION_VARIANTS {
2020-03-07 05:27:16 -05:00
let ( _ , err ) = util ::run_and_collect_output (
true ,
2020-03-01 19:51:54 -05:00
& format! (
" run --allow-{0}={1} complex_permissions_test.ts {0} {2} {2} " ,
permission ,
util ::root_path ( ) . into_os_string ( ) . into_string ( ) . unwrap ( ) ,
" complex_permissions_test.ts "
) ,
None ,
None ,
false ,
) ;
assert! ( ! err . contains ( util ::PERMISSION_DENIED_PATTERN ) ) ;
}
}
#[ test ]
fn test_permissions_rw_outside_test_dir ( ) {
const PERMISSION_VARIANTS : [ & str ; 2 ] = [ " read " , " write " ] ;
for permission in & PERMISSION_VARIANTS {
2020-03-07 05:27:16 -05:00
let ( _ , err ) = util ::run_and_collect_output (
false ,
2020-03-01 19:51:54 -05:00
& format! (
" run --allow-{0}={1} complex_permissions_test.ts {0} {2} " ,
permission ,
util ::root_path ( )
. join ( " cli " )
. join ( " tests " )
. into_os_string ( )
. into_string ( )
. unwrap ( ) ,
util ::root_path ( )
. join ( " Cargo.toml " )
. into_os_string ( )
. into_string ( )
. unwrap ( ) ,
) ,
None ,
None ,
false ,
) ;
assert! ( err . contains ( util ::PERMISSION_DENIED_PATTERN ) ) ;
}
}
#[ test ]
fn test_permissions_rw_inside_test_dir ( ) {
const PERMISSION_VARIANTS : [ & str ; 2 ] = [ " read " , " write " ] ;
for permission in & PERMISSION_VARIANTS {
2020-03-07 05:27:16 -05:00
let ( _ , err ) = util ::run_and_collect_output (
true ,
2020-03-01 19:51:54 -05:00
& format! (
" run --allow-{0}={1} complex_permissions_test.ts {0} {2} " ,
permission ,
util ::root_path ( )
. join ( " cli " )
. join ( " tests " )
. into_os_string ( )
. into_string ( )
. unwrap ( ) ,
" complex_permissions_test.ts "
) ,
None ,
None ,
false ,
) ;
assert! ( ! err . contains ( util ::PERMISSION_DENIED_PATTERN ) ) ;
}
}
#[ test ]
fn test_permissions_rw_outside_test_and_js_dir ( ) {
const PERMISSION_VARIANTS : [ & str ; 2 ] = [ " read " , " write " ] ;
let test_dir = util ::root_path ( )
. join ( " cli " )
. join ( " tests " )
. into_os_string ( )
. into_string ( )
. unwrap ( ) ;
let js_dir = util ::root_path ( )
. join ( " js " )
. into_os_string ( )
. into_string ( )
. unwrap ( ) ;
for permission in & PERMISSION_VARIANTS {
2020-03-07 05:27:16 -05:00
let ( _ , err ) = util ::run_and_collect_output (
false ,
2020-03-01 19:51:54 -05:00
& format! (
" run --allow-{0}={1},{2} complex_permissions_test.ts {0} {3} " ,
permission ,
test_dir ,
js_dir ,
util ::root_path ( )
. join ( " Cargo.toml " )
. into_os_string ( )
. into_string ( )
. unwrap ( ) ,
) ,
None ,
None ,
false ,
) ;
assert! ( err . contains ( util ::PERMISSION_DENIED_PATTERN ) ) ;
}
}
#[ test ]
fn test_permissions_rw_inside_test_and_js_dir ( ) {
const PERMISSION_VARIANTS : [ & str ; 2 ] = [ " read " , " write " ] ;
let test_dir = util ::root_path ( )
. join ( " cli " )
. join ( " tests " )
. into_os_string ( )
. into_string ( )
. unwrap ( ) ;
let js_dir = util ::root_path ( )
. join ( " js " )
. into_os_string ( )
. into_string ( )
. unwrap ( ) ;
for permission in & PERMISSION_VARIANTS {
2020-03-07 05:27:16 -05:00
let ( _ , err ) = util ::run_and_collect_output (
true ,
2020-03-01 19:51:54 -05:00
& format! (
" run --allow-{0}={1},{2} complex_permissions_test.ts {0} {3} " ,
permission , test_dir , js_dir , " complex_permissions_test.ts "
) ,
None ,
None ,
false ,
) ;
assert! ( ! err . contains ( util ::PERMISSION_DENIED_PATTERN ) ) ;
}
}
#[ test ]
fn test_permissions_rw_relative ( ) {
const PERMISSION_VARIANTS : [ & str ; 2 ] = [ " read " , " write " ] ;
for permission in & PERMISSION_VARIANTS {
2020-03-07 05:27:16 -05:00
let ( _ , err ) = util ::run_and_collect_output (
true ,
2020-03-01 19:51:54 -05:00
& format! (
" run --allow-{0}=. complex_permissions_test.ts {0} complex_permissions_test.ts " ,
permission
) ,
None ,
None ,
false ,
) ;
assert! ( ! err . contains ( util ::PERMISSION_DENIED_PATTERN ) ) ;
}
}
#[ test ]
fn test_permissions_rw_no_prefix ( ) {
const PERMISSION_VARIANTS : [ & str ; 2 ] = [ " read " , " write " ] ;
for permission in & PERMISSION_VARIANTS {
2020-03-07 05:27:16 -05:00
let ( _ , err ) = util ::run_and_collect_output (
true ,
2020-03-01 19:51:54 -05:00
& format! (
" run --allow-{0}=tls/../ complex_permissions_test.ts {0} complex_permissions_test.ts " ,
permission
) ,
None ,
None ,
false ,
) ;
assert! ( ! err . contains ( util ::PERMISSION_DENIED_PATTERN ) ) ;
}
}
#[ test ]
fn test_permissions_net_fetch_allow_localhost_4545 ( ) {
2020-03-07 05:27:16 -05:00
let ( _ , err ) = util ::run_and_collect_output (
true ,
2020-03-01 19:51:54 -05:00
" run --allow-net=localhost:4545 complex_permissions_test.ts netFetch http://localhost:4545/ " ,
None ,
2020-03-11 18:19:24 -04:00
None ,
true ,
2020-03-01 19:51:54 -05:00
) ;
assert! ( ! err . contains ( util ::PERMISSION_DENIED_PATTERN ) ) ;
}
#[ test ]
fn test_permissions_net_fetch_allow_deno_land ( ) {
2020-03-07 05:27:16 -05:00
let ( _ , err ) = util ::run_and_collect_output (
false ,
2020-03-01 19:51:54 -05:00
" run --allow-net=deno.land complex_permissions_test.ts netFetch http://localhost:4545/ " ,
None ,
None ,
true ,
) ;
assert! ( err . contains ( util ::PERMISSION_DENIED_PATTERN ) ) ;
}
#[ test ]
fn test_permissions_net_fetch_localhost_4545_fail ( ) {
2020-03-07 05:27:16 -05:00
let ( _ , err ) = util ::run_and_collect_output (
false ,
2020-03-01 19:51:54 -05:00
" run --allow-net=localhost:4545 complex_permissions_test.ts netFetch http://localhost:4546/ " ,
None ,
None ,
true ,
) ;
assert! ( err . contains ( util ::PERMISSION_DENIED_PATTERN ) ) ;
}
#[ test ]
fn test_permissions_net_fetch_localhost ( ) {
2020-03-07 05:27:16 -05:00
let ( _ , err ) = util ::run_and_collect_output (
true ,
2020-03-01 19:51:54 -05:00
" run --allow-net=localhost complex_permissions_test.ts netFetch http://localhost:4545/ http://localhost:4546/ http://localhost:4547/ " ,
None ,
None ,
true ,
) ;
assert! ( ! err . contains ( util ::PERMISSION_DENIED_PATTERN ) ) ;
}
#[ test ]
fn test_permissions_net_connect_allow_localhost_ip_4555 ( ) {
2020-03-07 05:27:16 -05:00
let ( _ , err ) = util ::run_and_collect_output (
true ,
2020-03-01 19:51:54 -05:00
" run --allow-net=127.0.0.1:4545 complex_permissions_test.ts netConnect 127.0.0.1:4545 " ,
None ,
None ,
true ,
) ;
assert! ( ! err . contains ( util ::PERMISSION_DENIED_PATTERN ) ) ;
}
#[ test ]
fn test_permissions_net_connect_allow_deno_land ( ) {
2020-03-07 05:27:16 -05:00
let ( _ , err ) = util ::run_and_collect_output (
false ,
2020-03-01 19:51:54 -05:00
" run --allow-net=deno.land complex_permissions_test.ts netConnect 127.0.0.1:4546 " ,
None ,
None ,
true ,
) ;
assert! ( err . contains ( util ::PERMISSION_DENIED_PATTERN ) ) ;
}
#[ test ]
fn test_permissions_net_connect_allow_localhost_ip_4545_fail ( ) {
2020-03-07 05:27:16 -05:00
let ( _ , err ) = util ::run_and_collect_output (
false ,
2020-03-01 19:51:54 -05:00
" run --allow-net=127.0.0.1:4545 complex_permissions_test.ts netConnect 127.0.0.1:4546 " ,
None ,
None ,
true ,
) ;
assert! ( err . contains ( util ::PERMISSION_DENIED_PATTERN ) ) ;
}
#[ test ]
fn test_permissions_net_connect_allow_localhost_ip ( ) {
2020-03-07 05:27:16 -05:00
let ( _ , err ) = util ::run_and_collect_output (
true ,
2020-03-01 19:51:54 -05:00
" run --allow-net=127.0.0.1 complex_permissions_test.ts netConnect 127.0.0.1:4545 127.0.0.1:4546 127.0.0.1:4547 " ,
None ,
None ,
true ,
) ;
assert! ( ! err . contains ( util ::PERMISSION_DENIED_PATTERN ) ) ;
}
#[ test ]
fn test_permissions_net_listen_allow_localhost_4555 ( ) {
2020-03-07 05:27:16 -05:00
let ( _ , err ) = util ::run_and_collect_output (
true ,
2020-03-01 19:51:54 -05:00
" run --allow-net=localhost:4558 complex_permissions_test.ts netListen localhost:4558 " ,
None ,
None ,
false ,
) ;
assert! ( ! err . contains ( util ::PERMISSION_DENIED_PATTERN ) ) ;
}
#[ test ]
fn test_permissions_net_listen_allow_deno_land ( ) {
2020-03-07 05:27:16 -05:00
let ( _ , err ) = util ::run_and_collect_output (
false ,
2020-03-01 19:51:54 -05:00
" run --allow-net=deno.land complex_permissions_test.ts netListen localhost:4545 " ,
None ,
None ,
false ,
) ;
assert! ( err . contains ( util ::PERMISSION_DENIED_PATTERN ) ) ;
}
#[ test ]
fn test_permissions_net_listen_allow_localhost_4555_fail ( ) {
2020-03-07 05:27:16 -05:00
let ( _ , err ) = util ::run_and_collect_output (
false ,
2020-03-01 19:51:54 -05:00
" run --allow-net=localhost:4555 complex_permissions_test.ts netListen localhost:4556 " ,
None ,
None ,
false ,
) ;
assert! ( err . contains ( util ::PERMISSION_DENIED_PATTERN ) ) ;
}
#[ test ]
fn test_permissions_net_listen_allow_localhost ( ) {
2020-03-06 11:40:18 -05:00
// Port 4600 is chosen to not colide with those used by tools/http_server.py
2020-03-07 05:27:16 -05:00
let ( _ , err ) = util ::run_and_collect_output (
true ,
2020-03-06 11:40:18 -05:00
" run --allow-net=localhost complex_permissions_test.ts netListen localhost:4600 " ,
2020-03-01 19:51:54 -05:00
None ,
None ,
2020-03-11 18:19:24 -04:00
false ,
2020-03-01 19:51:54 -05:00
) ;
assert! ( ! err . contains ( util ::PERMISSION_DENIED_PATTERN ) ) ;
}
2020-03-27 16:09:51 -04:00
fn extract_ws_url_from_stderr (
stderr : & mut std ::process ::ChildStderr ,
) -> url ::Url {
let mut stderr = std ::io ::BufReader ::new ( stderr ) ;
let mut stderr_first_line = String ::from ( " " ) ;
let _ = stderr . read_line ( & mut stderr_first_line ) . unwrap ( ) ;
assert! ( stderr_first_line . starts_with ( " Debugger listening on " ) ) ;
let v : Vec < _ > = stderr_first_line . match_indices ( " ws: " ) . collect ( ) ;
assert_eq! ( v . len ( ) , 1 ) ;
let ws_url_index = v [ 0 ] . 0 ;
let ws_url = & stderr_first_line [ ws_url_index .. ] ;
url ::Url ::parse ( ws_url ) . unwrap ( )
}
#[ tokio::test ]
async fn inspector_connect ( ) {
2020-05-04 23:39:42 -04:00
let script = util ::tests_path ( ) . join ( " inspector1.js " ) ;
2020-03-27 16:09:51 -04:00
let mut child = util ::deno_cmd ( )
. arg ( " run " )
// Warning: each inspector test should be on its own port to avoid
// conflicting with another inspector test.
2020-04-03 13:40:11 -04:00
. arg ( " --inspect=127.0.0.1:9228 " )
2020-03-27 16:09:51 -04:00
. arg ( script )
. stderr ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( ) ;
let ws_url = extract_ws_url_from_stderr ( child . stderr . as_mut ( ) . unwrap ( ) ) ;
println! ( " ws_url {} " , ws_url ) ;
// We use tokio_tungstenite as a websocket client because warp (which is
// a dependency of Deno) uses it.
let ( _socket , response ) = tokio_tungstenite ::connect_async ( ws_url )
. await
. expect ( " Can't connect " ) ;
assert_eq! ( " 101 Switching Protocols " , response . status ( ) . to_string ( ) ) ;
child . kill ( ) . unwrap ( ) ;
2020-05-04 23:39:42 -04:00
child . wait ( ) . unwrap ( ) ;
2020-03-27 16:09:51 -04:00
}
2020-04-03 13:40:11 -04:00
enum TestStep {
StdOut ( & 'static str ) ,
WsRecv ( & 'static str ) ,
WsSend ( & 'static str ) ,
}
#[ tokio::test ]
async fn inspector_break_on_first_line ( ) {
2020-05-04 23:39:42 -04:00
let script = util ::tests_path ( ) . join ( " inspector2.js " ) ;
2020-04-03 13:40:11 -04:00
let mut child = util ::deno_cmd ( )
. arg ( " run " )
// Warning: each inspector test should be on its own port to avoid
// conflicting with another inspector test.
. arg ( " --inspect-brk=127.0.0.1:9229 " )
. arg ( script )
. stdout ( std ::process ::Stdio ::piped ( ) )
. stderr ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( ) ;
let stderr = child . stderr . as_mut ( ) . unwrap ( ) ;
let ws_url = extract_ws_url_from_stderr ( stderr ) ;
let ( socket , response ) = tokio_tungstenite ::connect_async ( ws_url )
. await
. expect ( " Can't connect " ) ;
assert_eq! ( response . status ( ) , 101 ) ; // Switching protocols.
2020-05-05 21:50:55 -04:00
let ( mut socket_tx , socket_rx ) = socket . split ( ) ;
let mut socket_rx =
socket_rx . map ( | msg | msg . unwrap ( ) . to_string ( ) ) . filter ( | msg | {
let pass = ! msg . starts_with ( r # "{"method":"Debugger.scriptParsed","# ) ;
futures ::future ::ready ( pass )
} ) ;
2020-04-03 13:40:11 -04:00
let stdout = child . stdout . as_mut ( ) . unwrap ( ) ;
2020-05-05 21:50:55 -04:00
let mut stdout_lines =
std ::io ::BufReader ::new ( stdout ) . lines ( ) . map ( | r | r . unwrap ( ) ) ;
2020-04-03 13:40:11 -04:00
use TestStep ::* ;
let test_steps = vec! [
WsSend ( r # "{"id":1,"method":"Runtime.enable"}"# ) ,
WsSend ( r # "{"id":2,"method":"Debugger.enable"}"# ) ,
WsRecv (
r # "{"method":"Runtime.executionContextCreated","params":{"context":{"id":1,"# ,
) ,
WsRecv ( r # "{"id":1,"result":{}}"# ) ,
WsRecv ( r # "{"id":2,"result":{"debuggerId":"# ) ,
WsSend ( r # "{"id":3,"method":"Runtime.runIfWaitingForDebugger"}"# ) ,
WsRecv ( r # "{"id":3,"result":{}}"# ) ,
WsRecv ( r # "{"method":"Debugger.paused","# ) ,
WsSend (
2020-05-04 23:39:42 -04:00
r # "{"id":4,"method":"Runtime.evaluate","params":{"expression":"Deno.core.print(\"hello from the inspector\\n\")","contextId":1,"includeCommandLineAPI":true,"silent":false,"returnByValue":true}}"# ,
2020-04-03 13:40:11 -04:00
) ,
2020-05-04 23:39:42 -04:00
WsRecv ( r # "{"id":4,"result":{"result":{"type":"undefined"}}}"# ) ,
2020-04-03 13:40:11 -04:00
StdOut ( " hello from the inspector " ) ,
2020-05-04 23:39:42 -04:00
WsSend ( r # "{"id":5,"method":"Debugger.resume"}"# ) ,
WsRecv ( r # "{"id":5,"result":{}}"# ) ,
2020-04-03 13:40:11 -04:00
StdOut ( " hello from the script " ) ,
] ;
for step in test_steps {
match step {
2020-05-05 21:50:55 -04:00
StdOut ( s ) = > assert_eq! ( & stdout_lines . next ( ) . unwrap ( ) , s ) ,
WsRecv ( s ) = > assert! ( socket_rx . next ( ) . await . unwrap ( ) . starts_with ( s ) ) ,
2020-04-03 13:40:11 -04:00
WsSend ( s ) = > socket_tx . send ( s . into ( ) ) . await . unwrap ( ) ,
}
}
child . kill ( ) . unwrap ( ) ;
2020-05-04 23:39:42 -04:00
child . wait ( ) . unwrap ( ) ;
2020-04-03 13:40:11 -04:00
}
2020-03-27 16:09:51 -04:00
#[ tokio::test ]
async fn inspector_pause ( ) {
2020-05-04 23:39:42 -04:00
let script = util ::tests_path ( ) . join ( " inspector1.js " ) ;
2020-03-27 16:09:51 -04:00
let mut child = util ::deno_cmd ( )
. arg ( " run " )
// Warning: each inspector test should be on its own port to avoid
// conflicting with another inspector test.
. arg ( " --inspect=127.0.0.1:9230 " )
. arg ( script )
. stderr ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( ) ;
let ws_url = extract_ws_url_from_stderr ( child . stderr . as_mut ( ) . unwrap ( ) ) ;
// We use tokio_tungstenite as a websocket client because warp (which is
// a dependency of Deno) uses it.
let ( mut socket , _ ) = tokio_tungstenite ::connect_async ( ws_url )
. await
. expect ( " Can't connect " ) ;
/// Returns the next websocket message as a string ignoring
/// Debugger.scriptParsed messages.
async fn ws_read_msg (
socket : & mut tokio_tungstenite ::WebSocketStream < tokio ::net ::TcpStream > ,
) -> String {
use futures ::stream ::StreamExt ;
while let Some ( msg ) = socket . next ( ) . await {
let msg = msg . unwrap ( ) . to_string ( ) ;
assert! ( ! msg . contains ( " error " ) ) ;
if ! msg . contains ( " Debugger.scriptParsed " ) {
return msg ;
}
}
unreachable! ( )
}
socket
. send ( r # "{"id":6,"method":"Debugger.enable"}"# . into ( ) )
. await
. unwrap ( ) ;
let msg = ws_read_msg ( & mut socket ) . await ;
println! ( " response msg 1 {} " , msg ) ;
assert! ( msg . starts_with ( r # "{"id":6,"result":{"debuggerId":"# ) ) ;
socket
. send ( r # "{"id":31,"method":"Debugger.pause"}"# . into ( ) )
. await
. unwrap ( ) ;
let msg = ws_read_msg ( & mut socket ) . await ;
println! ( " response msg 2 {} " , msg ) ;
assert_eq! ( msg , r # "{"id":31,"result":{}}"# ) ;
child . kill ( ) . unwrap ( ) ;
}
2020-03-28 17:42:29 -04:00
#[ tokio::test ]
async fn inspector_port_collision ( ) {
2020-05-04 23:39:42 -04:00
let script = util ::tests_path ( ) . join ( " inspector1.js " ) ;
2020-03-28 17:42:29 -04:00
let mut child1 = util ::deno_cmd ( )
. arg ( " run " )
. arg ( " --inspect=127.0.0.1:9231 " )
. arg ( script . clone ( ) )
. stderr ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( ) ;
let ws_url_1 = extract_ws_url_from_stderr ( child1 . stderr . as_mut ( ) . unwrap ( ) ) ;
println! ( " ws_url {} " , ws_url_1 ) ;
let mut child2 = util ::deno_cmd ( )
. arg ( " run " )
. arg ( " --inspect=127.0.0.1:9231 " )
. arg ( script )
. stderr ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( ) ;
use std ::io ::Read ;
let mut stderr_str_2 = String ::new ( ) ;
child2
. stderr
. as_mut ( )
. unwrap ( )
. read_to_string ( & mut stderr_str_2 )
. unwrap ( ) ;
assert! ( stderr_str_2 . contains ( " Cannot start inspector server " ) ) ;
2020-05-04 23:39:42 -04:00
2020-03-28 17:42:29 -04:00
child1 . kill ( ) . unwrap ( ) ;
2020-05-04 23:39:42 -04:00
child1 . wait ( ) . unwrap ( ) ;
child2 . wait ( ) . unwrap ( ) ;
}
#[ tokio::test ]
async fn inspector_does_not_hang ( ) {
let script = util ::tests_path ( ) . join ( " inspector3.js " ) ;
let mut child = util ::deno_cmd ( )
. arg ( " run " )
// Warning: each inspector test should be on its own port to avoid
// conflicting with another inspector test.
. arg ( " --inspect-brk=127.0.0.1:9232 " )
2020-05-19 14:19:26 -04:00
. env ( " NO_COLOR " , " 1 " )
2020-05-04 23:39:42 -04:00
. arg ( script )
. stdout ( std ::process ::Stdio ::piped ( ) )
. stderr ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( ) ;
let stderr = child . stderr . as_mut ( ) . unwrap ( ) ;
let ws_url = extract_ws_url_from_stderr ( stderr ) ;
let ( socket , response ) = tokio_tungstenite ::connect_async ( ws_url )
. await
. expect ( " Can't connect " ) ;
assert_eq! ( response . status ( ) , 101 ) ; // Switching protocols.
let ( mut socket_tx , socket_rx ) = socket . split ( ) ;
let mut socket_rx =
socket_rx . map ( | msg | msg . unwrap ( ) . to_string ( ) ) . filter ( | msg | {
let pass = ! msg . starts_with ( r # "{"method":"Debugger.scriptParsed","# ) ;
futures ::future ::ready ( pass )
} ) ;
let stdout = child . stdout . as_mut ( ) . unwrap ( ) ;
let mut stdout_lines =
std ::io ::BufReader ::new ( stdout ) . lines ( ) . map ( | r | r . unwrap ( ) ) ;
use TestStep ::* ;
let test_steps = vec! [
WsSend ( r # "{"id":1,"method":"Runtime.enable"}"# ) ,
WsSend ( r # "{"id":2,"method":"Debugger.enable"}"# ) ,
WsRecv (
r # "{"method":"Runtime.executionContextCreated","params":{"context":{"id":1,"# ,
) ,
WsRecv ( r # "{"id":1,"result":{}}"# ) ,
WsRecv ( r # "{"id":2,"result":{"debuggerId":"# ) ,
WsSend ( r # "{"id":3,"method":"Runtime.runIfWaitingForDebugger"}"# ) ,
WsRecv ( r # "{"id":3,"result":{}}"# ) ,
WsRecv ( r # "{"method":"Debugger.paused","# ) ,
WsSend ( r # "{"id":4,"method":"Debugger.resume"}"# ) ,
WsRecv ( r # "{"id":4,"result":{}}"# ) ,
WsRecv ( r # "{"method":"Debugger.resumed","params":{}}"# ) ,
] ;
for step in test_steps {
match step {
WsRecv ( s ) = > assert! ( socket_rx . next ( ) . await . unwrap ( ) . starts_with ( s ) ) ,
WsSend ( s ) = > socket_tx . send ( s . into ( ) ) . await . unwrap ( ) ,
_ = > unreachable! ( ) ,
}
}
for i in 0 .. 128 u32 {
let request_id = i + 10 ;
// Expect the number {i} on stdout.
let s = format! ( " {} " , i ) ;
assert_eq! ( stdout_lines . next ( ) . unwrap ( ) , s ) ;
// Expect hitting the `debugger` statement.
let s = r # "{"method":"Debugger.paused","# ;
assert! ( socket_rx . next ( ) . await . unwrap ( ) . starts_with ( s ) ) ;
// Send the 'Debugger.resume' request.
let s = format! ( r # "{{"id":{},"method":"Debugger.resume"}}"# , request_id ) ;
socket_tx . send ( s . into ( ) ) . await . unwrap ( ) ;
// Expect confirmation of the 'Debugger.resume' request.
let s = format! ( r # "{{"id":{},"result":{{}}}}"# , request_id ) ;
assert_eq! ( socket_rx . next ( ) . await . unwrap ( ) , s ) ;
let s = r # "{"method":"Debugger.resumed","params":{}}"# ;
assert_eq! ( socket_rx . next ( ) . await . unwrap ( ) , s ) ;
}
// Check that we can gracefully close the websocket connection.
socket_tx . close ( ) . await . unwrap ( ) ;
socket_rx . for_each ( | _ | async { } ) . await ;
assert_eq! ( & stdout_lines . next ( ) . unwrap ( ) , " done " ) ;
assert! ( child . wait ( ) . unwrap ( ) . success ( ) ) ;
2020-03-28 17:42:29 -04:00
}
2020-05-21 14:34:25 -04:00
#[ tokio::test ]
async fn inspector_without_brk_runs_code ( ) {
let script = util ::tests_path ( ) . join ( " inspector4.js " ) ;
let mut child = util ::deno_cmd ( )
. arg ( " run " )
// Warning: each inspector test should be on its own port to avoid
// conflicting with another inspector test.
. arg ( " --inspect=127.0.0.1:9233 " )
. arg ( script )
. stdout ( std ::process ::Stdio ::piped ( ) )
. stderr ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( ) ;
extract_ws_url_from_stderr ( child . stderr . as_mut ( ) . unwrap ( ) ) ;
// Check that inspector actually runs code without waiting for inspector
// connection
let mut stdout = std ::io ::BufReader ::new ( child . stdout . as_mut ( ) . unwrap ( ) ) ;
let mut stdout_first_line = String ::from ( " " ) ;
let _ = stdout . read_line ( & mut stdout_first_line ) . unwrap ( ) ;
assert_eq! ( stdout_first_line , " hello \n " ) ;
child . kill ( ) . unwrap ( ) ;
}
2020-05-06 15:51:33 -04:00
#[ test ]
fn exec_path ( ) {
let output = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " run " )
. arg ( " --allow-read " )
. arg ( " cli/tests/exec_path.ts " )
. stdout ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
assert! ( output . status . success ( ) ) ;
let stdout_str = std ::str ::from_utf8 ( & output . stdout ) . unwrap ( ) . trim ( ) ;
let actual =
std ::fs ::canonicalize ( & std ::path ::Path ::new ( stdout_str ) ) . unwrap ( ) ;
2020-05-11 17:33:36 -04:00
let expected = std ::fs ::canonicalize ( util ::deno_exe_path ( ) ) . unwrap ( ) ;
2020-05-06 15:51:33 -04:00
assert_eq! ( expected , actual ) ;
}
2019-10-29 17:52:57 -04:00
mod util {
use os_pipe ::pipe ;
2020-05-11 17:33:36 -04:00
use regex ::Regex ;
2019-10-29 17:52:57 -04:00
use std ::io ::Read ;
use std ::io ::Write ;
2020-05-11 17:33:36 -04:00
use std ::path ::PathBuf ;
use std ::process ::Child ;
2019-10-29 17:52:57 -04:00
use std ::process ::Command ;
2020-02-24 17:49:40 -05:00
use std ::process ::Output ;
2019-10-29 17:52:57 -04:00
use std ::process ::Stdio ;
2020-05-11 17:33:36 -04:00
use std ::sync ::Mutex ;
use std ::sync ::MutexGuard ;
2019-10-29 17:52:57 -04:00
use tempfile ::TempDir ;
2020-02-25 15:36:35 -05:00
pub const PERMISSION_VARIANTS : [ & str ; 5 ] =
[ " read " , " write " , " env " , " net " , " run " ] ;
pub const PERMISSION_DENIED_PATTERN : & str = " PermissionDenied " ;
2019-10-29 17:52:57 -04:00
lazy_static! {
static ref DENO_DIR : TempDir = { TempDir ::new ( ) . expect ( " tempdir fail " ) } ;
2020-05-11 17:33:36 -04:00
// STRIP_ANSI_RE and strip_ansi_codes are lifted from the "console" crate.
// Copyright 2017 Armin Ronacher <armin.ronacher@active-4.com>. MIT License.
static ref STRIP_ANSI_RE : Regex = Regex ::new (
r "[\x1b\x9b][\[()#;?]*(?:[0-9]{1,4}(?:;[0-9]{0,4})*)?[0-9A-PRZcf-nqry=><]"
) . unwrap ( ) ;
static ref GUARD : Mutex < ( ) > = Mutex ::new ( ( ) ) ;
}
pub fn root_path ( ) -> PathBuf {
PathBuf ::from ( concat! ( env! ( " CARGO_MANIFEST_DIR " ) , " /.. " ) )
}
pub fn tests_path ( ) -> PathBuf {
root_path ( ) . join ( " cli " ) . join ( " tests " )
}
pub fn target_dir ( ) -> PathBuf {
let current_exe = std ::env ::current_exe ( ) . unwrap ( ) ;
let target_dir = current_exe . parent ( ) . unwrap ( ) . parent ( ) . unwrap ( ) ;
println! ( " target_dir {} " , target_dir . display ( ) ) ;
target_dir . into ( )
}
pub fn deno_exe_path ( ) -> PathBuf {
// Something like /Users/rld/src/deno/target/debug/deps/deno
let mut p = target_dir ( ) . join ( " deno " ) ;
if cfg! ( windows ) {
p . set_extension ( " exe " ) ;
}
p
}
pub struct HttpServerGuard < ' a > {
#[ allow(dead_code) ]
g : MutexGuard < ' a , ( ) > ,
child : Child ,
}
impl < ' a > Drop for HttpServerGuard < ' a > {
fn drop ( & mut self ) {
match self . child . try_wait ( ) {
Ok ( None ) = > {
self . child . kill ( ) . expect ( " failed to kill http_server.py " ) ;
}
Ok ( Some ( status ) ) = > {
panic! ( " http_server.py exited unexpectedly {} " , status )
}
Err ( e ) = > panic! ( " http_server.py err {} " , e ) ,
}
}
}
/// Starts tools/http_server.py when the returned guard is dropped, the server
/// will be killed.
pub fn http_server < ' a > ( ) -> HttpServerGuard < ' a > {
// TODO(bartlomieju) Allow tests to use the http server in parallel.
let g = GUARD . lock ( ) . unwrap ( ) ;
println! ( " tools/http_server.py starting... " ) ;
let mut child = Command ::new ( " python " )
. current_dir ( root_path ( ) )
. args ( & [ " -u " , " tools/http_server.py " ] )
. stdout ( Stdio ::piped ( ) )
. spawn ( )
. expect ( " failed to execute child " ) ;
let stdout = child . stdout . as_mut ( ) . unwrap ( ) ;
use std ::io ::{ BufRead , BufReader } ;
let lines = BufReader ::new ( stdout ) . lines ( ) ;
// Wait for "ready" on stdout. See tools/http_server.py
for maybe_line in lines {
if let Ok ( line ) = maybe_line {
if line . starts_with ( " ready " ) {
break ;
}
} else {
panic! ( maybe_line . unwrap_err ( ) ) ;
}
}
HttpServerGuard { child , g }
}
/// Helper function to strip ansi codes.
pub fn strip_ansi_codes ( s : & str ) -> std ::borrow ::Cow < str > {
STRIP_ANSI_RE . replace_all ( s , " " )
2019-10-29 17:52:57 -04:00
}
2020-02-25 15:36:35 -05:00
pub fn run_and_collect_output (
2020-03-07 05:27:16 -05:00
expect_success : bool ,
2020-02-25 15:36:35 -05:00
args : & str ,
input : Option < Vec < & str > > ,
2020-02-24 17:49:40 -05:00
envs : Option < Vec < ( String , String ) > > ,
2020-03-01 19:51:54 -05:00
need_http_server : bool ,
2020-03-07 05:27:16 -05:00
) -> ( String , String ) {
2020-02-24 17:49:40 -05:00
let mut deno_process_builder = deno_cmd ( ) ;
deno_process_builder
2020-05-08 18:58:51 -04:00
. args ( args . split_whitespace ( ) )
2020-05-11 17:33:36 -04:00
. current_dir ( & tests_path ( ) )
2020-02-24 17:49:40 -05:00
. stdin ( Stdio ::piped ( ) )
. stdout ( Stdio ::piped ( ) )
. stderr ( Stdio ::piped ( ) ) ;
if let Some ( envs ) = envs {
deno_process_builder . envs ( envs ) ;
}
2020-03-01 19:51:54 -05:00
let http_guard = if need_http_server {
Some ( http_server ( ) )
} else {
None
} ;
2020-02-24 17:49:40 -05:00
let mut deno = deno_process_builder
. spawn ( )
. expect ( " failed to spawn script " ) ;
2020-02-25 15:36:35 -05:00
if let Some ( lines ) = input {
2020-02-24 17:49:40 -05:00
let stdin = deno . stdin . as_mut ( ) . expect ( " failed to get stdin " ) ;
stdin
. write_all ( lines . join ( " \n " ) . as_bytes ( ) )
. expect ( " failed to write to stdin " ) ;
}
let Output {
stdout ,
stderr ,
status ,
} = deno . wait_with_output ( ) . expect ( " failed to wait on child " ) ;
2020-03-01 19:51:54 -05:00
drop ( http_guard ) ;
2020-03-07 05:27:16 -05:00
let stdout = String ::from_utf8 ( stdout ) . unwrap ( ) ;
let stderr = String ::from_utf8 ( stderr ) . unwrap ( ) ;
if expect_success ! = status . success ( ) {
eprintln! ( " stdout: <<< {} >>> " , stdout ) ;
eprintln! ( " stderr: <<< {} >>> " , stderr ) ;
panic! ( " Unexpected exit code: {:?} " , status . code ( ) ) ;
}
( stdout , stderr )
2020-02-24 17:49:40 -05:00
}
2019-10-29 17:52:57 -04:00
pub fn deno_cmd ( ) -> Command {
2020-05-11 17:33:36 -04:00
let e = deno_exe_path ( ) ;
assert! ( e . exists ( ) ) ;
let mut c = Command ::new ( e ) ;
2019-10-29 17:52:57 -04:00
c . env ( " DENO_DIR " , DENO_DIR . path ( ) ) ;
c
}
pub fn run_python_script ( script : & str ) {
let output = Command ::new ( " python " )
. env ( " DENO_DIR " , DENO_DIR . path ( ) )
. current_dir ( root_path ( ) )
. arg ( script )
2020-03-20 21:48:34 -04:00
. arg ( format! ( " --build-dir= {} " , target_dir ( ) . display ( ) ) )
2019-10-29 17:52:57 -04:00
. arg ( format! ( " --executable= {} " , deno_exe_path ( ) . display ( ) ) )
. output ( )
. expect ( " failed to spawn script " ) ;
if ! output . status . success ( ) {
let stdout = String ::from_utf8 ( output . stdout ) . unwrap ( ) ;
let stderr = String ::from_utf8 ( output . stderr ) . unwrap ( ) ;
panic! (
" {} executed with failing error code \n {}{} " ,
script , stdout , stderr
) ;
}
}
#[ derive(Debug, Default) ]
pub struct CheckOutputIntegrationTest {
pub args : & 'static str ,
pub output : & 'static str ,
pub input : Option < & 'static str > ,
2020-02-09 05:19:05 -05:00
pub output_str : Option < & 'static str > ,
2019-10-29 17:52:57 -04:00
pub exit_code : i32 ,
pub http_server : bool ,
}
impl CheckOutputIntegrationTest {
pub fn run ( & self ) {
let args = self . args . split_whitespace ( ) ;
let root = root_path ( ) ;
let deno_exe = deno_exe_path ( ) ;
println! ( " root path {} " , root . display ( ) ) ;
println! ( " deno_exe path {} " , deno_exe . display ( ) ) ;
let http_server_guard = if self . http_server {
Some ( http_server ( ) )
} else {
None
} ;
let ( mut reader , writer ) = pipe ( ) . unwrap ( ) ;
let tests_dir = root . join ( " cli " ) . join ( " tests " ) ;
let mut command = deno_cmd ( ) ;
command . args ( args ) ;
command . current_dir ( & tests_dir ) ;
command . stdin ( Stdio ::piped ( ) ) ;
2020-05-17 11:42:39 -04:00
let writer_clone = writer . try_clone ( ) . unwrap ( ) ;
command . stderr ( writer_clone ) ;
2019-10-29 17:52:57 -04:00
command . stdout ( writer ) ;
let mut process = command . spawn ( ) . expect ( " failed to execute process " ) ;
if let Some ( input ) = self . input {
let mut p_stdin = process . stdin . take ( ) . unwrap ( ) ;
write! ( p_stdin , " {} " , input ) . unwrap ( ) ;
}
// Very important when using pipes: This parent process is still
// holding its copies of the write ends, and we have to close them
// before we read, otherwise the read end will never report EOF. The
// Command object owns the writers now, and dropping it closes them.
drop ( command ) ;
let mut actual = String ::new ( ) ;
reader . read_to_string ( & mut actual ) . unwrap ( ) ;
let status = process . wait ( ) . expect ( " failed to finish process " ) ;
let exit_code = status . code ( ) . unwrap ( ) ;
drop ( http_server_guard ) ;
actual = strip_ansi_codes ( & actual ) . to_string ( ) ;
if self . exit_code ! = exit_code {
println! ( " OUTPUT \n {} \n OUTPUT " , actual ) ;
panic! (
" bad exit code, expected: {:?}, actual: {:?} " ,
self . exit_code , exit_code
) ;
}
2020-02-09 05:19:05 -05:00
let expected = if let Some ( s ) = self . output_str {
s . to_owned ( )
} else {
let output_path = tests_dir . join ( self . output ) ;
println! ( " output path {} " , output_path . display ( ) ) ;
std ::fs ::read_to_string ( output_path ) . expect ( " cannot read output " )
} ;
2019-10-29 17:52:57 -04:00
if ! wildcard_match ( & expected , & actual ) {
println! ( " OUTPUT \n {} \n OUTPUT " , actual ) ;
println! ( " EXPECTED \n {} \n EXPECTED " , expected ) ;
panic! ( " pattern match failed " ) ;
}
}
}
fn wildcard_match ( pattern : & str , s : & str ) -> bool {
pattern_match ( pattern , s , " [WILDCARD] " )
}
pub fn pattern_match ( pattern : & str , s : & str , wildcard : & str ) -> bool {
// Normalize line endings
let s = s . replace ( " \r \n " , " \n " ) ;
let pattern = pattern . replace ( " \r \n " , " \n " ) ;
if pattern = = wildcard {
return true ;
}
let parts = pattern . split ( wildcard ) . collect ::< Vec < & str > > ( ) ;
if parts . len ( ) = = 1 {
return pattern = = s ;
}
if ! s . starts_with ( parts [ 0 ] ) {
return false ;
}
let mut t = s . split_at ( parts [ 0 ] . len ( ) ) ;
for ( i , part ) in parts . iter ( ) . enumerate ( ) {
if i = = 0 {
continue ;
}
dbg! ( part , i ) ;
if i = = parts . len ( ) - 1 & & ( * part = = " " | | * part = = " \n " ) {
dbg! ( " exit 1 true " , i ) ;
return true ;
}
if let Some ( found ) = t . 1. find ( * part ) {
dbg! ( " found " , found ) ;
t = t . 1. split_at ( found + part . len ( ) ) ;
} else {
dbg! ( " exit false " , i ) ;
return false ;
}
}
dbg! ( " end " , t . 1. len ( ) ) ;
t . 1. is_empty ( )
}
#[ test ]
fn test_wildcard_match ( ) {
let fixtures = vec! [
( " foobarbaz " , " foobarbaz " , true ) ,
( " [WILDCARD] " , " foobarbaz " , true ) ,
( " foobar " , " foobarbaz " , false ) ,
( " foo[WILDCARD]baz " , " foobarbaz " , true ) ,
( " foo[WILDCARD]baz " , " foobazbar " , false ) ,
( " foo[WILDCARD]baz[WILDCARD]qux " , " foobarbazqatqux " , true ) ,
( " foo[WILDCARD] " , " foobar " , true ) ,
( " foo[WILDCARD]baz[WILDCARD] " , " foobarbazqat " , true ) ,
// check with different line endings
( " foo[WILDCARD] \n baz[WILDCARD] \n " , " foobar \n bazqat \n " , true ) ,
(
" foo[WILDCARD] \n baz[WILDCARD] \n " ,
" foobar \r \n bazqat \r \n " ,
true ,
) ,
(
" foo[WILDCARD] \r \n baz[WILDCARD] \n " ,
" foobar \n bazqat \r \n " ,
true ,
) ,
(
" foo[WILDCARD] \r \n baz[WILDCARD] \r \n " ,
" foobar \n bazqat \n " ,
true ,
) ,
(
" foo[WILDCARD] \r \n baz[WILDCARD] \r \n " ,
" foobar \r \n bazqat \r \n " ,
true ,
) ,
] ;
// Iterate through the fixture lists, testing each one
for ( pattern , string , expected ) in fixtures {
let actual = wildcard_match ( pattern , string ) ;
dbg! ( pattern , string , expected ) ;
assert_eq! ( actual , expected ) ;
}
}
}