2020-01-02 15:13:47 -05:00
// Copyright 2018-2020 the Deno authors. All rights reserved. MIT license.
2020-09-05 20:34:02 -04:00
2019-11-04 10:38:52 -05:00
use crate ::deno_dir ;
use crate ::file_fetcher ::SourceFileFetcher ;
use crate ::flags ;
2020-02-19 08:17:13 -05:00
use crate ::http_cache ;
2020-05-29 10:32:15 -04:00
use crate ::import_map ::ImportMap ;
2020-09-25 04:24:51 -04:00
use crate ::inspector ::InspectorServer ;
2019-11-04 10:38:52 -05:00
use crate ::lockfile ::Lockfile ;
2020-09-15 10:33:14 -04:00
use crate ::media_type ::MediaType ;
2020-10-22 20:50:15 -04:00
use crate ::module_graph2 ::CheckOptions ;
2020-10-07 01:24:15 -04:00
use crate ::module_graph2 ::GraphBuilder2 ;
use crate ::module_graph2 ::TranspileOptions ;
2020-10-22 20:50:15 -04:00
use crate ::module_graph2 ::TypeLib ;
2020-05-04 14:10:59 -04:00
use crate ::permissions ::Permissions ;
2020-10-22 20:50:15 -04:00
use crate ::source_maps ::SourceMapGetter ;
2020-09-24 18:31:17 -04:00
use crate ::specifier_handler ::FetchHandler ;
2020-05-08 10:18:00 -04:00
use crate ::tsc ::CompiledModule ;
use crate ::tsc ::TargetLib ;
use crate ::tsc ::TsCompiler ;
2020-10-22 20:50:15 -04:00
use deno_core ::error ::generic_error ;
2020-09-14 12:48:57 -04:00
use deno_core ::error ::AnyError ;
2020-10-22 20:50:15 -04:00
use deno_core ::url ::Url ;
2020-01-05 11:56:18 -05:00
use deno_core ::ModuleSpecifier ;
2020-09-24 18:31:17 -04:00
use std ::cell ::RefCell ;
2019-11-04 10:38:52 -05:00
use std ::env ;
2020-09-24 18:31:17 -04:00
use std ::rc ::Rc ;
2019-11-04 10:38:52 -05:00
use std ::sync ::Arc ;
use std ::sync ::Mutex ;
2020-09-19 19:17:35 -04:00
pub fn exit_unstable ( api_name : & str ) {
eprintln! (
" Unstable API '{}'. The --unstable flag must be provided. " ,
api_name
) ;
std ::process ::exit ( 70 ) ;
}
2019-11-04 10:38:52 -05:00
/// This structure represents state of single "deno" program.
///
/// It is shared by all created workers (thus V8 isolates).
2020-10-13 07:35:35 -04:00
pub struct ProgramState {
2019-11-04 10:38:52 -05:00
/// Flags parsed from `argv` contents.
2020-02-26 05:52:15 -05:00
pub flags : flags ::Flags ,
2019-11-04 10:38:52 -05:00
/// Permissions parsed from `flags`.
2020-05-04 14:10:59 -04:00
pub permissions : Permissions ,
2019-11-04 10:38:52 -05:00
pub dir : deno_dir ::DenoDir ,
pub file_fetcher : SourceFileFetcher ,
pub ts_compiler : TsCompiler ,
2020-10-23 17:01:54 -04:00
pub lockfile : Option < Arc < Mutex < Lockfile > > > ,
2020-05-29 10:32:15 -04:00
pub maybe_import_map : Option < ImportMap > ,
2020-09-25 04:24:51 -04:00
pub maybe_inspector_server : Option < Arc < InspectorServer > > ,
2019-11-04 10:38:52 -05:00
}
2020-10-13 07:35:35 -04:00
impl ProgramState {
2020-09-14 12:48:57 -04:00
pub fn new ( flags : flags ::Flags ) -> Result < Arc < Self > , AnyError > {
2019-11-04 10:38:52 -05:00
let custom_root = env ::var ( " DENO_DIR " ) . map ( String ::into ) . ok ( ) ;
let dir = deno_dir ::DenoDir ::new ( custom_root ) ? ;
2020-02-19 08:17:13 -05:00
let deps_cache_location = dir . root . join ( " deps " ) ;
2020-05-07 08:32:57 -04:00
let http_cache = http_cache ::HttpCache ::new ( & deps_cache_location ) ;
2020-08-18 12:30:13 -04:00
let ca_file = flags . ca_file . clone ( ) . or_else ( | | env ::var ( " DENO_CERT " ) . ok ( ) ) ;
2019-11-04 10:38:52 -05:00
let file_fetcher = SourceFileFetcher ::new (
2020-02-19 08:17:13 -05:00
http_cache ,
2019-11-04 10:38:52 -05:00
! flags . reload ,
2020-06-13 13:09:39 -04:00
flags . cache_blocklist . clone ( ) ,
2019-12-03 17:48:53 -05:00
flags . no_remote ,
flags . cached_only ,
2020-08-18 12:30:13 -04:00
ca_file . as_deref ( ) ,
2019-11-04 10:38:52 -05:00
) ? ;
let ts_compiler = TsCompiler ::new (
file_fetcher . clone ( ) ,
2020-06-30 07:10:51 -04:00
flags . clone ( ) ,
2019-11-04 10:38:52 -05:00
dir . gen_cache . clone ( ) ,
) ? ;
let lockfile = if let Some ( filename ) = & flags . lock {
2020-09-24 18:31:17 -04:00
let lockfile = Lockfile ::new ( filename . clone ( ) , flags . lock_write ) ? ;
2020-10-23 17:01:54 -04:00
Some ( Arc ::new ( Mutex ::new ( lockfile ) ) )
2019-11-04 10:38:52 -05:00
} else {
None
} ;
2020-05-29 10:32:15 -04:00
let maybe_import_map : Option < ImportMap > =
match flags . import_map_path . as_ref ( ) {
None = > None ,
Some ( file_path ) = > {
if ! flags . unstable {
2020-10-20 08:30:59 -04:00
exit_unstable ( " --import-map " )
2020-05-29 10:32:15 -04:00
}
Some ( ImportMap ::load ( file_path ) ? )
}
} ;
2020-09-25 04:24:51 -04:00
let maybe_inspect_host = flags . inspect . or ( flags . inspect_brk ) ;
let maybe_inspector_server = match maybe_inspect_host {
Some ( host ) = > Some ( Arc ::new ( InspectorServer ::new ( host ) ) ) ,
None = > None ,
} ;
2020-10-13 07:35:35 -04:00
let program_state = ProgramState {
2019-11-04 10:38:52 -05:00
dir ,
2020-05-04 14:10:59 -04:00
permissions : Permissions ::from_flags ( & flags ) ,
2019-11-04 10:38:52 -05:00
flags ,
file_fetcher ,
ts_compiler ,
lockfile ,
2020-05-29 10:32:15 -04:00
maybe_import_map ,
2020-09-25 04:24:51 -04:00
maybe_inspector_server ,
2019-11-04 10:38:52 -05:00
} ;
2020-10-13 07:35:35 -04:00
Ok ( Arc ::new ( program_state ) )
2019-11-04 10:38:52 -05:00
}
2020-05-29 10:32:15 -04:00
/// This function is called when new module load is
2020-09-06 15:44:29 -04:00
/// initialized by the JsRuntime. Its resposibility is to collect
2020-05-29 10:32:15 -04:00
/// all dependencies and if it is required then also perform TS typecheck
/// and traspilation.
pub async fn prepare_module_load (
2020-08-18 12:30:13 -04:00
self : & Arc < Self > ,
2020-10-22 20:50:15 -04:00
specifier : ModuleSpecifier ,
2020-01-29 12:54:23 -05:00
target_lib : TargetLib ,
2020-10-26 15:56:00 -04:00
runtime_permissions : Permissions ,
2020-10-22 20:50:15 -04:00
is_dynamic : bool ,
2020-05-29 10:32:15 -04:00
maybe_import_map : Option < ImportMap > ,
2020-09-14 12:48:57 -04:00
) -> Result < ( ) , AnyError > {
2020-10-22 20:50:15 -04:00
let specifier = specifier . clone ( ) ;
2020-10-26 15:56:00 -04:00
// Workers are subject to the current runtime permissions. We do the
// permission check here early to avoid "wasting" time building a module
// graph for a module that cannot be loaded.
if target_lib = = TargetLib ::Worker {
runtime_permissions . check_specifier ( & specifier ) ? ;
}
2020-10-22 20:50:15 -04:00
let handler =
2020-10-26 15:56:00 -04:00
Rc ::new ( RefCell ::new ( FetchHandler ::new ( self , runtime_permissions ) ? ) ) ;
2020-10-23 17:01:54 -04:00
let mut builder =
GraphBuilder2 ::new ( handler , maybe_import_map , self . lockfile . clone ( ) ) ;
2020-10-22 20:50:15 -04:00
builder . add ( & specifier , is_dynamic ) . await ? ;
2020-10-23 17:01:54 -04:00
let mut graph = builder . get_graph ( ) ;
2020-10-22 20:50:15 -04:00
let debug = self . flags . log_level = = Some ( log ::Level ::Debug ) ;
let maybe_config_path = self . flags . config_path . clone ( ) ;
2020-05-29 10:32:15 -04:00
2020-09-24 18:31:17 -04:00
if self . flags . no_check {
let ( stats , maybe_ignored_options ) =
graph . transpile ( TranspileOptions {
2020-10-22 20:50:15 -04:00
debug ,
maybe_config_path ,
reload : self . flags . reload ,
2020-09-24 18:31:17 -04:00
} ) ? ;
2020-10-22 20:50:15 -04:00
debug! ( " {} " , stats ) ;
2020-09-24 18:31:17 -04:00
if let Some ( ignored_options ) = maybe_ignored_options {
2020-09-29 03:16:12 -04:00
eprintln! ( " {} " , ignored_options ) ;
2020-09-24 18:31:17 -04:00
}
} else {
2020-10-22 20:50:15 -04:00
let lib = match target_lib {
TargetLib ::Main = > {
if self . flags . unstable {
TypeLib ::UnstableDenoWindow
} else {
TypeLib ::DenoWindow
2020-09-24 18:31:17 -04:00
}
2020-07-02 11:54:51 -04:00
}
2020-10-22 20:50:15 -04:00
TargetLib ::Worker = > {
if self . flags . unstable {
TypeLib ::UnstableDenoWorker
} else {
TypeLib ::DenoWorker
}
}
} ;
let ( stats , diagnostics , maybe_ignored_options ) =
graph . check ( CheckOptions {
debug ,
emit : true ,
lib ,
maybe_config_path ,
reload : self . flags . reload ,
} ) ? ;
2020-09-24 18:31:17 -04:00
2020-10-22 20:50:15 -04:00
debug! ( " {} " , stats ) ;
if let Some ( ignored_options ) = maybe_ignored_options {
eprintln! ( " {} " , ignored_options ) ;
2020-07-08 05:26:39 -04:00
}
2020-10-27 20:52:20 -04:00
if ! diagnostics . is_empty ( ) {
2020-10-22 20:50:15 -04:00
return Err ( generic_error ( diagnostics . to_string ( ) ) ) ;
}
} ;
2020-05-29 10:32:15 -04:00
2020-07-02 11:54:51 -04:00
if let Some ( ref lockfile ) = self . lockfile {
let g = lockfile . lock ( ) . unwrap ( ) ;
g . write ( ) ? ;
}
2020-05-29 10:32:15 -04:00
Ok ( ( ) )
}
2020-10-22 20:50:15 -04:00
pub fn fetch_compiled_module (
2020-05-29 10:32:15 -04:00
& self ,
module_specifier : ModuleSpecifier ,
2020-10-22 20:50:15 -04:00
maybe_referrer : Option < ModuleSpecifier > ,
2020-09-14 12:48:57 -04:00
) -> Result < CompiledModule , AnyError > {
2020-02-03 18:08:44 -05:00
let out = self
2019-11-04 10:38:52 -05:00
. file_fetcher
2020-05-29 10:32:15 -04:00
. fetch_cached_source_file ( & module_specifier , Permissions ::allow_all ( ) )
. expect ( " Cached source file doesn't exist " ) ;
2020-02-06 21:24:51 -05:00
2020-10-22 20:50:15 -04:00
let url = out . url . clone ( ) ;
let compiled_module = if let Some ( ( code , _ ) ) = self . get_emit ( & url ) {
CompiledModule {
code : String ::from_utf8 ( code ) . unwrap ( ) ,
name : out . url . to_string ( ) ,
}
// We expect a compiled source for any non-JavaScript files, except for
// local files that have an unknown media type and no referrer (root modules
// that do not have an extension.)
} else if out . media_type ! = MediaType ::JavaScript
& & ! ( out . media_type = = MediaType ::Unknown
& & maybe_referrer . is_none ( )
& & url . scheme ( ) = = " file " )
{
let message = if let Some ( referrer ) = maybe_referrer {
format! ( " Compiled module not found \" {} \" \n From: {} \n If the source module contains only types, use `import type` and `export type` to import it instead. " , module_specifier , referrer )
} else {
format! ( " Compiled module not found \" {} \" \n If the source module contains only types, use `import type` and `export type` to import it instead. " , module_specifier )
} ;
info! ( " {}: {} " , crate ::colors ::yellow ( " warning " ) , message ) ;
CompiledModule {
code : " " . to_string ( ) ,
name : out . url . to_string ( ) ,
2020-07-17 09:50:17 -04:00
}
2020-05-29 10:32:15 -04:00
} else {
CompiledModule {
2020-10-07 07:43:44 -04:00
code : out . source_code ,
2020-05-08 10:18:00 -04:00
name : out . url . to_string ( ) ,
2020-05-29 10:32:15 -04:00
}
} ;
2020-02-03 18:08:44 -05:00
Ok ( compiled_module )
2019-11-04 10:38:52 -05:00
}
2020-10-22 20:50:15 -04:00
// TODO(@kitsonk) this should be a straight forward API on file_fetcher or
// whatever future refactors do...
fn get_emit ( & self , url : & Url ) -> Option < ( Vec < u8 > , Option < Vec < u8 > > ) > {
match url . scheme ( ) {
// we should only be looking for emits for schemes that denote external
// modules, which the disk_cache supports
" wasm " | " file " | " http " | " https " = > ( ) ,
_ = > {
return None ;
}
}
let emit_path = self
. dir
. gen_cache
. get_cache_filename_with_extension ( & url , " js " ) ;
let emit_map_path = self
. dir
. gen_cache
. get_cache_filename_with_extension ( & url , " js.map " ) ;
if let Ok ( code ) = self . dir . gen_cache . get ( & emit_path ) {
let maybe_map = if let Ok ( map ) = self . dir . gen_cache . get ( & emit_map_path ) {
Some ( map )
} else {
None
} ;
Some ( ( code , maybe_map ) )
} else {
None
}
}
2020-09-19 19:17:35 -04:00
/// Quits the process if the --unstable flag was not provided.
///
/// This is intentionally a non-recoverable check so that people cannot probe
/// for unstable APIs from stable programs.
pub fn check_unstable ( & self , api_name : & str ) {
if ! self . flags . unstable {
exit_unstable ( api_name ) ;
}
}
2019-11-04 10:38:52 -05:00
#[ cfg(test) ]
2020-06-30 07:10:51 -04:00
pub fn mock (
argv : Vec < String > ,
maybe_flags : Option < flags ::Flags > ,
2020-10-13 07:35:35 -04:00
) -> Arc < ProgramState > {
ProgramState ::new ( flags ::Flags {
2020-08-18 12:30:13 -04:00
argv ,
.. maybe_flags . unwrap_or_default ( )
} )
. unwrap ( )
2019-11-04 10:38:52 -05:00
}
}
2020-10-22 20:50:15 -04:00
// TODO(@kitsonk) this is only temporary, but should be refactored to somewhere
// else, like a refactored file_fetcher.
impl SourceMapGetter for ProgramState {
fn get_source_map ( & self , file_name : & str ) -> Option < Vec < u8 > > {
if let Ok ( specifier ) = ModuleSpecifier ::resolve_url ( file_name ) {
if let Some ( ( code , maybe_map ) ) = self . get_emit ( & specifier . as_url ( ) ) {
if maybe_map . is_some ( ) {
maybe_map
} else {
let code = String ::from_utf8 ( code ) . unwrap ( ) ;
let lines : Vec < & str > = code . split ( '\n' ) . collect ( ) ;
if let Some ( last_line ) = lines . last ( ) {
if last_line
. starts_with ( " //# sourceMappingURL=data:application/json;base64, " )
{
let input = last_line . trim_start_matches (
" //# sourceMappingURL=data:application/json;base64, " ,
) ;
let decoded_map = base64 ::decode ( input )
. expect ( " Unable to decode source map from emitted file. " ) ;
Some ( decoded_map )
} else {
None
}
} else {
None
}
}
} else {
None
}
2020-06-15 11:53:05 -04:00
} else {
2020-10-22 20:50:15 -04:00
None
2020-06-10 10:02:41 -04:00
}
2020-10-22 20:50:15 -04:00
}
2020-06-01 15:01:51 -04:00
2020-10-22 20:50:15 -04:00
fn get_source_line (
& self ,
file_name : & str ,
line_number : usize ,
) -> Option < String > {
if let Ok ( specifier ) = ModuleSpecifier ::resolve_url ( file_name ) {
self
. file_fetcher
. fetch_cached_source_file ( & specifier , Permissions ::allow_all ( ) )
. map ( | out | {
// Do NOT use .lines(): it skips the terminating empty line.
// (due to internally using .split_terminator() instead of .split())
let lines : Vec < & str > = out . source_code . split ( '\n' ) . collect ( ) ;
assert! ( lines . len ( ) > line_number ) ;
lines [ line_number ] . to_string ( )
} )
} else {
None
}
}
2020-06-01 15:01:51 -04:00
}
2019-11-04 10:38:52 -05:00
#[ test ]
fn thread_safe ( ) {
fn f < S : Send + Sync > ( _ : S ) { }
2020-10-13 07:35:35 -04:00
f ( ProgramState ::mock ( vec! [ ] , None ) ) ;
2019-11-04 10:38:52 -05:00
}