2023-01-12 20:59:13 -05:00
// Copyright 2018-2023 the Deno authors. All rights reserved. MIT license.
use deno_core ::url ;
use deno_runtime ::deno_fetch ::reqwest ;
use std ::io ::Read ;
use std ::io ::Write ;
use std ::process ::Command ;
use std ::process ::Stdio ;
use test_util as util ;
use test_util ::TempDir ;
use tokio ::task ::LocalSet ;
use trust_dns_client ::serialize ::txt ::Lexer ;
use trust_dns_client ::serialize ::txt ::Parser ;
use util ::assert_contains ;
2023-01-24 15:14:49 -05:00
use util ::env_vars_for_npm_tests_no_sync_download ;
2023-01-12 20:59:13 -05:00
itest! ( stdout_write_all {
args : " run --quiet run/stdout_write_all.ts " ,
output : " run/stdout_write_all.out " ,
} ) ;
itest! ( stdin_read_all {
args : " run --quiet run/stdin_read_all.ts " ,
output : " run/stdin_read_all.out " ,
input : Some ( " 01234567890123456789012345678901234567890123456789 " ) ,
} ) ;
itest! ( stdout_write_sync_async {
args : " run --quiet run/stdout_write_sync_async.ts " ,
output : " run/stdout_write_sync_async.out " ,
} ) ;
itest! ( _001_hello {
args : " run --reload run/001_hello.js " ,
output : " run/001_hello.js.out " ,
} ) ;
itest! ( _002_hello {
args : " run --quiet --reload run/002_hello.ts " ,
output : " run/002_hello.ts.out " ,
} ) ;
itest! ( _003_relative_import {
args : " run --quiet --reload run/003_relative_import.ts " ,
output : " run/003_relative_import.ts.out " ,
} ) ;
itest! ( _004_set_timeout {
args : " run --quiet --reload run/004_set_timeout.ts " ,
output : " run/004_set_timeout.ts.out " ,
} ) ;
itest! ( _005_more_imports {
args : " run --quiet --reload run/005_more_imports.ts " ,
output : " run/005_more_imports.ts.out " ,
} ) ;
itest! ( _006_url_imports {
args : " run --quiet --reload run/006_url_imports.ts " ,
output : " run/006_url_imports.ts.out " ,
http_server : true ,
} ) ;
itest! ( _012_async {
args : " run --quiet --reload run/012_async.ts " ,
output : " run/012_async.ts.out " ,
} ) ;
itest! ( _013_dynamic_import {
args : " run --quiet --reload --allow-read run/013_dynamic_import.ts " ,
output : " run/013_dynamic_import.ts.out " ,
} ) ;
itest! ( _014_duplicate_import {
args : " run --quiet --reload --allow-read run/014_duplicate_import.ts " ,
output : " run/014_duplicate_import.ts.out " ,
} ) ;
itest! ( _015_duplicate_parallel_import {
args :
" run --quiet --reload --allow-read run/015_duplicate_parallel_import.js " ,
output : " run/015_duplicate_parallel_import.js.out " ,
} ) ;
itest! ( _016_double_await {
args : " run --quiet --allow-read --reload run/016_double_await.ts " ,
output : " run/016_double_await.ts.out " ,
} ) ;
itest! ( _017_import_redirect {
args : " run --quiet --reload run/017_import_redirect.ts " ,
output : " run/017_import_redirect.ts.out " ,
} ) ;
itest! ( _017_import_redirect_nocheck {
args : " run --quiet --reload --no-check run/017_import_redirect.ts " ,
output : " run/017_import_redirect.ts.out " ,
} ) ;
itest! ( _017_import_redirect_info {
args : " info --quiet --reload run/017_import_redirect.ts " ,
output : " run/017_import_redirect_info.out " ,
} ) ;
itest! ( _018_async_catch {
args : " run --quiet --reload run/018_async_catch.ts " ,
output : " run/018_async_catch.ts.out " ,
} ) ;
itest! ( _019_media_types {
args : " run --reload run/019_media_types.ts " ,
output : " run/019_media_types.ts.out " ,
http_server : true ,
} ) ;
itest! ( _020_json_modules {
args : " run --reload run/020_json_modules.ts " ,
output : " run/020_json_modules.ts.out " ,
exit_code : 1 ,
} ) ;
itest! ( _021_mjs_modules {
args : " run --quiet --reload run/021_mjs_modules.ts " ,
output : " run/021_mjs_modules.ts.out " ,
} ) ;
itest! ( _023_no_ext {
args : " run --reload --check run/023_no_ext " ,
output : " run/023_no_ext.out " ,
} ) ;
// TODO(lucacasonato): remove --unstable when permissions goes stable
itest! ( _025_hrtime {
args : " run --quiet --allow-hrtime --unstable --reload run/025_hrtime.ts " ,
output : " run/025_hrtime.ts.out " ,
} ) ;
itest! ( _025_reload_js_type_error {
args : " run --quiet --reload run/025_reload_js_type_error.js " ,
output : " run/025_reload_js_type_error.js.out " ,
} ) ;
itest! ( _026_redirect_javascript {
args : " run --quiet --reload run/026_redirect_javascript.js " ,
output : " run/026_redirect_javascript.js.out " ,
http_server : true ,
} ) ;
itest! ( _027_redirect_typescript {
args : " run --quiet --reload run/027_redirect_typescript.ts " ,
output : " run/027_redirect_typescript.ts.out " ,
http_server : true ,
} ) ;
itest! ( _028_args {
args :
" run --quiet --reload run/028_args.ts --arg1 val1 --arg2=val2 -- arg3 arg4 " ,
output : " run/028_args.ts.out " ,
} ) ;
itest! ( _033_import_map {
args :
" run --quiet --reload --import-map=import_maps/import_map.json import_maps/test.ts " ,
output : " run/033_import_map.out " ,
} ) ;
2023-01-25 15:13:40 -05:00
itest! ( _033_import_map_in_config_file {
args : " run --reload --config=import_maps/config.json import_maps/test.ts " ,
output : " run/033_import_map_in_config_file.out " ,
} ) ;
itest! ( _033_import_map_in_flag_has_precedence {
args : " run --quiet --reload --import-map=import_maps/import_map_invalid.json --config=import_maps/config.json import_maps/test.ts " ,
output : " run/033_import_map_in_flag_has_precedence.out " ,
exit_code : 1 ,
} ) ;
2023-01-12 20:59:13 -05:00
itest! ( _033_import_map_remote {
args :
" run --quiet --reload --import-map=http://127.0.0.1:4545/import_maps/import_map_remote.json --unstable import_maps/test_remote.ts " ,
output : " run/033_import_map_remote.out " ,
http_server : true ,
} ) ;
2023-01-25 16:51:04 -05:00
itest! ( _033_import_map_data_uri {
args :
" run --quiet --reload --import-map=data:application/json;charset=utf-8;base64,ewogICJpbXBvcnRzIjogewogICAgInRlc3Rfc2VydmVyLyI6ICJodHRwOi8vbG9jYWxob3N0OjQ1NDUvIgogIH0KfQ== run/import_maps/test_data.ts " ,
output : " run/import_maps/test_data.ts.out " ,
http_server : true ,
} ) ;
2023-01-12 20:59:13 -05:00
itest! ( onload {
args : " run --quiet --reload run/onload/main.ts " ,
output : " run/onload/main.out " ,
} ) ;
itest! ( _035_cached_only_flag {
args : " run --reload --check --cached-only http://127.0.0.1:4545/run/019_media_types.ts " ,
output : " run/035_cached_only_flag.out " ,
exit_code : 1 ,
http_server : true ,
} ) ;
itest! ( _038_checkjs {
// checking if JS file is run through TS compiler
args :
" run --reload --config run/checkjs.tsconfig.json --check run/038_checkjs.js " ,
exit_code : 1 ,
output : " run/038_checkjs.js.out " ,
} ) ;
itest! ( _042_dyn_import_evalcontext {
args : " run --quiet --allow-read --reload run/042_dyn_import_evalcontext.ts " ,
output : " run/042_dyn_import_evalcontext.ts.out " ,
} ) ;
itest! ( _044_bad_resource {
args : " run --quiet --reload --allow-read run/044_bad_resource.ts " ,
output : " run/044_bad_resource.ts.out " ,
exit_code : 1 ,
} ) ;
2023-01-25 12:28:08 -05:00
// TODO(bartlomieju): remove --unstable once Deno.Command is stabilized
2023-01-12 20:59:13 -05:00
itest! ( _045_proxy {
args : " run -L debug --unstable --allow-net --allow-env --allow-run --allow-read --reload --quiet run/045_proxy_test.ts " ,
output : " run/045_proxy_test.ts.out " ,
http_server : true ,
} ) ;
itest! ( _046_tsx {
args : " run --quiet --reload run/046_jsx_test.tsx " ,
output : " run/046_jsx_test.tsx.out " ,
} ) ;
itest! ( _047_jsx {
args : " run --quiet --reload run/047_jsx_test.jsx " ,
output : " run/047_jsx_test.jsx.out " ,
} ) ;
itest! ( _048_media_types_jsx {
args : " run --reload run/048_media_types_jsx.ts " ,
output : " run/048_media_types_jsx.ts.out " ,
http_server : true ,
} ) ;
itest! ( _052_no_remote_flag {
args :
" run --reload --check --no-remote http://127.0.0.1:4545/run/019_media_types.ts " ,
output : " run/052_no_remote_flag.out " ,
exit_code : 1 ,
http_server : true ,
} ) ;
itest! ( _056_make_temp_file_write_perm {
args :
" run --quiet --allow-read --allow-write=./subdir/ run/056_make_temp_file_write_perm.ts " ,
output : " run/056_make_temp_file_write_perm.out " ,
} ) ;
itest! ( _058_tasks_microtasks_close {
args : " run --quiet run/058_tasks_microtasks_close.ts " ,
output : " run/058_tasks_microtasks_close.ts.out " ,
} ) ;
itest! ( _059_fs_relative_path_perm {
args : " run run/059_fs_relative_path_perm.ts " ,
output : " run/059_fs_relative_path_perm.ts.out " ,
exit_code : 1 ,
} ) ;
itest! ( _070_location {
args : " run --location https://foo/bar?baz#bat run/070_location.ts " ,
output : " run/070_location.ts.out " ,
} ) ;
itest! ( _071_location_unset {
args : " run run/071_location_unset.ts " ,
output : " run/071_location_unset.ts.out " ,
} ) ;
itest! ( _072_location_relative_fetch {
args : " run --location http://127.0.0.1:4545/ --allow-net run/072_location_relative_fetch.ts " ,
output : " run/072_location_relative_fetch.ts.out " ,
http_server : true ,
} ) ;
// tests the beforeunload event
itest! ( beforeunload_event {
args : " run run/before_unload.js " ,
output : " run/before_unload.js.out " ,
} ) ;
// tests the serialization of webstorage (both localStorage and sessionStorage)
itest! ( webstorage_serialization {
args : " run run/webstorage/serialization.ts " ,
output : " run/webstorage/serialization.ts.out " ,
} ) ;
// tests to ensure that when `--location` is set, all code shares the same
// localStorage cache based on the origin of the location URL.
#[ test ]
fn webstorage_location_shares_origin ( ) {
let deno_dir = util ::new_deno_dir ( ) ;
let mut deno_cmd = util ::deno_cmd_with_deno_dir ( & deno_dir ) ;
let output = deno_cmd
. current_dir ( util ::testdata_path ( ) )
. arg ( " run " )
. arg ( " --location " )
. arg ( " https://example.com/a.ts " )
. arg ( " run/webstorage/fixture.ts " )
. stdout ( Stdio ::piped ( ) )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
assert! ( output . status . success ( ) ) ;
assert_eq! ( output . stdout , b " Storage { length: 0 } \n " ) ;
let mut deno_cmd = util ::deno_cmd_with_deno_dir ( & deno_dir ) ;
let output = deno_cmd
. current_dir ( util ::testdata_path ( ) )
. arg ( " run " )
. arg ( " --location " )
. arg ( " https://example.com/b.ts " )
. arg ( " run/webstorage/logger.ts " )
. stdout ( Stdio ::piped ( ) )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
assert! ( output . status . success ( ) ) ;
assert_eq! ( output . stdout , b " Storage { length: 1, hello: \" deno \" } \n " ) ;
}
// test to ensure that when a --config file is set, but no --location, that
// storage persists against unique configuration files.
#[ test ]
fn webstorage_config_file ( ) {
let deno_dir = util ::new_deno_dir ( ) ;
let mut deno_cmd = util ::deno_cmd_with_deno_dir ( & deno_dir ) ;
let output = deno_cmd
. current_dir ( util ::testdata_path ( ) )
. arg ( " run " )
. arg ( " --config " )
. arg ( " run/webstorage/config_a.jsonc " )
. arg ( " run/webstorage/fixture.ts " )
. stdout ( Stdio ::piped ( ) )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
assert! ( output . status . success ( ) ) ;
assert_eq! ( output . stdout , b " Storage { length: 0 } \n " ) ;
let mut deno_cmd = util ::deno_cmd_with_deno_dir ( & deno_dir ) ;
let output = deno_cmd
. current_dir ( util ::testdata_path ( ) )
. arg ( " run " )
. arg ( " --config " )
. arg ( " run/webstorage/config_b.jsonc " )
. arg ( " run/webstorage/logger.ts " )
. stdout ( Stdio ::piped ( ) )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
assert! ( output . status . success ( ) ) ;
assert_eq! ( output . stdout , b " Storage { length: 0 } \n " ) ;
let mut deno_cmd = util ::deno_cmd_with_deno_dir ( & deno_dir ) ;
let output = deno_cmd
. current_dir ( util ::testdata_path ( ) )
. arg ( " run " )
. arg ( " --config " )
. arg ( " run/webstorage/config_a.jsonc " )
. arg ( " run/webstorage/logger.ts " )
. stdout ( Stdio ::piped ( ) )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
assert! ( output . status . success ( ) ) ;
assert_eq! ( output . stdout , b " Storage { length: 1, hello: \" deno \" } \n " ) ;
}
// tests to ensure `--config` does not effect persisted storage when a
// `--location` is provided.
#[ test ]
fn webstorage_location_precedes_config ( ) {
let deno_dir = util ::new_deno_dir ( ) ;
let mut deno_cmd = util ::deno_cmd_with_deno_dir ( & deno_dir ) ;
let output = deno_cmd
. current_dir ( util ::testdata_path ( ) )
. arg ( " run " )
. arg ( " --location " )
. arg ( " https://example.com/a.ts " )
. arg ( " --config " )
. arg ( " run/webstorage/config_a.jsonc " )
. arg ( " run/webstorage/fixture.ts " )
. stdout ( Stdio ::piped ( ) )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
assert! ( output . status . success ( ) ) ;
assert_eq! ( output . stdout , b " Storage { length: 0 } \n " ) ;
let mut deno_cmd = util ::deno_cmd_with_deno_dir ( & deno_dir ) ;
let output = deno_cmd
. current_dir ( util ::testdata_path ( ) )
. arg ( " run " )
. arg ( " --location " )
. arg ( " https://example.com/b.ts " )
. arg ( " --config " )
. arg ( " run/webstorage/config_b.jsonc " )
. arg ( " run/webstorage/logger.ts " )
. stdout ( Stdio ::piped ( ) )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
assert! ( output . status . success ( ) ) ;
assert_eq! ( output . stdout , b " Storage { length: 1, hello: \" deno \" } \n " ) ;
}
// test to ensure that when there isn't a configuration or location, that the
// main module is used to determine how to persist storage data.
#[ test ]
fn webstorage_main_module ( ) {
let deno_dir = util ::new_deno_dir ( ) ;
let mut deno_cmd = util ::deno_cmd_with_deno_dir ( & deno_dir ) ;
let output = deno_cmd
. current_dir ( util ::testdata_path ( ) )
. arg ( " run " )
. arg ( " run/webstorage/fixture.ts " )
. stdout ( Stdio ::piped ( ) )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
assert! ( output . status . success ( ) ) ;
assert_eq! ( output . stdout , b " Storage { length: 0 } \n " ) ;
let mut deno_cmd = util ::deno_cmd_with_deno_dir ( & deno_dir ) ;
let output = deno_cmd
. current_dir ( util ::testdata_path ( ) )
. arg ( " run " )
. arg ( " run/webstorage/logger.ts " )
. stdout ( Stdio ::piped ( ) )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
assert! ( output . status . success ( ) ) ;
assert_eq! ( output . stdout , b " Storage { length: 0 } \n " ) ;
let mut deno_cmd = util ::deno_cmd_with_deno_dir ( & deno_dir ) ;
let output = deno_cmd
. current_dir ( util ::testdata_path ( ) )
. arg ( " run " )
. arg ( " run/webstorage/fixture.ts " )
. stdout ( Stdio ::piped ( ) )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
assert! ( output . status . success ( ) ) ;
assert_eq! ( output . stdout , b " Storage { length: 1, hello: \" deno \" } \n " ) ;
}
itest! ( _075_import_local_query_hash {
args : " run run/075_import_local_query_hash.ts " ,
output : " run/075_import_local_query_hash.ts.out " ,
} ) ;
itest! ( _077_fetch_empty {
args : " run -A run/077_fetch_empty.ts " ,
output : " run/077_fetch_empty.ts.out " ,
exit_code : 1 ,
} ) ;
itest! ( _078_unload_on_exit {
args : " run run/078_unload_on_exit.ts " ,
output : " run/078_unload_on_exit.ts.out " ,
exit_code : 1 ,
} ) ;
itest! ( _079_location_authentication {
args :
" run --location https://foo:bar@baz/qux run/079_location_authentication.ts " ,
output : " run/079_location_authentication.ts.out " ,
} ) ;
itest! ( _081_location_relative_fetch_redirect {
args : " run --location http://127.0.0.1:4546/ --allow-net run/081_location_relative_fetch_redirect.ts " ,
output : " run/081_location_relative_fetch_redirect.ts.out " ,
http_server : true ,
} ) ;
itest! ( _082_prepare_stack_trace_throw {
args : " run run/082_prepare_stack_trace_throw.js " ,
output : " run/082_prepare_stack_trace_throw.js.out " ,
exit_code : 1 ,
} ) ;
#[ test ]
fn _083_legacy_external_source_map ( ) {
let _g = util ::http_server ( ) ;
let deno_dir = TempDir ::new ( ) ;
let module_url = url ::Url ::parse (
" http://localhost:4545/run/083_legacy_external_source_map.ts " ,
)
. unwrap ( ) ;
// Write a faulty old external source map.
let faulty_map_path = deno_dir . path ( ) . join ( " gen/http/localhost_PORT4545/9576bd5febd0587c5c4d88d57cb3ac8ebf2600c529142abe3baa9a751d20c334.js.map " ) ;
std ::fs ::create_dir_all ( faulty_map_path . parent ( ) . unwrap ( ) ) . unwrap ( ) ;
std ::fs ::write ( faulty_map_path , " { \" version \" :3, \" file \" : \" \" , \" sourceRoot \" : \" \" , \" sources \" :[ \" http://localhost:4545/083_legacy_external_source_map.ts \" ], \" names \" :[], \" mappings \" : \" ;AAAA,MAAM,IAAI,KAAK,CAAC,KAAK,CAAC,CAAC \" } " ) . unwrap ( ) ;
let output = Command ::new ( util ::deno_exe_path ( ) )
. env ( " DENO_DIR " , deno_dir . path ( ) )
. current_dir ( util ::testdata_path ( ) )
. arg ( " run " )
. arg ( module_url . to_string ( ) )
. output ( )
. unwrap ( ) ;
// Before https://github.com/denoland/deno/issues/6965 was fixed, the faulty
// old external source map would cause a panic while formatting the error
// and the exit code would be 101. The external source map should be ignored
// in favor of the inline one.
assert_eq! ( output . status . code ( ) , Some ( 1 ) ) ;
let out = std ::str ::from_utf8 ( & output . stdout ) . unwrap ( ) ;
assert_eq! ( out , " " ) ;
}
itest! ( dynamic_import_async_error {
args : " run --allow-read run/dynamic_import_async_error/main.ts " ,
output : " run/dynamic_import_async_error/main.out " ,
} ) ;
itest! ( dynamic_import_already_rejected {
args : " run --allow-read run/dynamic_import_already_rejected/main.ts " ,
output : " run/dynamic_import_already_rejected/main.out " ,
} ) ;
itest! ( no_check_imports_not_used_as_values {
args : " run --config run/no_check_imports_not_used_as_values/preserve_imports.tsconfig.json --no-check run/no_check_imports_not_used_as_values/main.ts " ,
output : " run/no_check_imports_not_used_as_values/main.out " ,
} ) ;
itest! ( _088_dynamic_import_already_evaluating {
args : " run --allow-read run/088_dynamic_import_already_evaluating.ts " ,
output : " run/088_dynamic_import_already_evaluating.ts.out " ,
} ) ;
2023-01-25 12:28:08 -05:00
// TODO(bartlomieju): remove --unstable once Deno.Command is stabilized
2023-01-12 20:59:13 -05:00
itest! ( _089_run_allow_list {
args : " run --unstable --allow-run=curl run/089_run_allow_list.ts " ,
output : " run/089_run_allow_list.ts.out " ,
} ) ;
#[ test ]
fn _090_run_permissions_request ( ) {
let args = " run --quiet run/090_run_permissions_request.ts " ;
use util ::PtyData ::* ;
util ::test_pty2 ( args , vec! [
Output ( " ⚠️ ️ Deno requests run access to \" ls \" . Run again with --allow-run to bypass this prompt. \r \n Allow? [y/n (y = yes allow, n = no deny)] " ) ,
Input ( " y \n " ) ,
Output ( " ⚠️ ️ Deno requests run access to \" cat \" . Run again with --allow-run to bypass this prompt. \r \n Allow? [y/n (y = yes allow, n = no deny)] " ) ,
Input ( " n \n " ) ,
Output ( " granted \r \n " ) ,
Output ( " prompt \r \n " ) ,
Output ( " denied \r \n " ) ,
] ) ;
}
2023-01-24 18:42:44 -05:00
#[ test ]
fn _090_run_permissions_request_sync ( ) {
let args = " run --quiet run/090_run_permissions_request_sync.ts " ;
use util ::PtyData ::* ;
util ::test_pty2 ( args , vec! [
Output ( " ⚠️ ️ Deno requests run access to \" ls \" . Run again with --allow-run to bypass this prompt. \r \n Allow? [y/n (y = yes allow, n = no deny)] " ) ,
Input ( " y \n " ) ,
Output ( " ⚠️ ️ Deno requests run access to \" cat \" . Run again with --allow-run to bypass this prompt. \r \n Allow? [y/n (y = yes allow, n = no deny)] " ) ,
Input ( " n \n " ) ,
Output ( " granted \r \n " ) ,
Output ( " prompt \r \n " ) ,
Output ( " denied \r \n " ) ,
] ) ;
}
2023-02-22 17:02:10 -05:00
#[ test ]
fn permissions_prompt_allow_all ( ) {
let args = " run --quiet run/permissions_prompt_allow_all.ts " ;
use util ::PtyData ::* ;
util ::test_pty2 ( args , vec! [
// "run" permissions
Output ( " ┌ ⚠️ Deno requests run access to \" FOO \" . \r \n ├ Requested by `Deno.permissions.query()` API \r \n ├ Run again with --allow-run to bypass this prompt. \r \n └ Allow? [y/n/A] (y = yes, allow; n = no, deny; A = allow all run permissions) > " ) ,
Input ( " a \n " ) ,
Output ( " ✅ Granted all run access. \r \n " ) ,
// "read" permissions
Output ( " ┌ ⚠️ Deno requests read access to \" FOO \" . \r \n ├ Requested by `Deno.permissions.query()` API \r \n ├ Run again with --allow-read to bypass this prompt. \r \n └ Allow? [y/n/A] (y = yes, allow; n = no, deny; A = allow all read permissions) > " ) ,
Input ( " a \n " ) ,
Output ( " ✅ Granted all read access. \r \n " ) ,
// "write" permissions
Output ( " ┌ ⚠️ Deno requests write access to \" FOO \" . \r \n ├ Requested by `Deno.permissions.query()` API \r \n ├ Run again with --allow-write to bypass this prompt. \r \n └ Allow? [y/n/A] (y = yes, allow; n = no, deny; A = allow all write permissions) > " ) ,
Input ( " a \n " ) ,
Output ( " ✅ Granted all write access. \r \n " ) ,
// "net" permissions
Output ( " ┌ ⚠️ Deno requests net access to \" FOO \" . \r \n ├ Requested by `Deno.permissions.query()` API \r \n ├ Run again with --allow-net to bypass this prompt. \r \n └ Allow? [y/n/A] (y = yes, allow; n = no, deny; A = allow all net permissions) > " ) ,
Input ( " a \n " ) ,
Output ( " ✅ Granted all net access. \r \n " ) ,
// "env" permissions
Output ( " ┌ ⚠️ Deno requests env access to \" FOO \" . \r \n ├ Requested by `Deno.permissions.query()` API \r \n ├ Run again with --allow-env to bypass this prompt. \r \n └ Allow? [y/n/A] (y = yes, allow; n = no, deny; A = allow all env permissions) > " ) ,
Input ( " a \n " ) ,
Output ( " ✅ Granted all env access. \r \n " ) ,
// "sys" permissions
Output ( " ┌ ⚠️ Deno requests sys access to \" loadavg \" . \r \n ├ Requested by `Deno.permissions.query()` API \r \n ├ Run again with --allow-sys to bypass this prompt. \r \n └ Allow? [y/n/A] (y = yes, allow; n = no, deny; A = allow all sys permissions) > " ) ,
Input ( " a \n " ) ,
Output ( " ✅ Granted all sys access. \r \n " ) ,
// "ffi" permissions
Output ( " ┌ ⚠️ Deno requests ffi access to \" FOO \" . \r \n ├ Requested by `Deno.permissions.query()` API \r \n ├ Run again with --allow-ffi to bypass this prompt. \r \n └ Allow? [y/n/A] (y = yes, allow; n = no, deny; A = allow all ffi permissions) > " ) ,
Input ( " a \n " ) ,
Output ( " ✅ Granted all ffi access. \r \n " )
] ) ;
}
#[ test ]
fn permissions_prompt_allow_all_2 ( ) {
let args = " run --quiet run/permissions_prompt_allow_all_2.ts " ;
use util ::PtyData ::* ;
util ::test_pty2 ( args , vec! [
// "env" permissions
Output ( " ┌ ⚠️ Deno requests env access to \" FOO \" . \r \n ├ Run again with --allow-env to bypass this prompt. \r \n └ Allow? [y/n/A] (y = yes, allow; n = no, deny; A = allow all env permissions) > " ) ,
Input ( " d \n " ) ,
Output ( " ✅ Granted all env access. \r \n " ) ,
// "sys" permissions
Output ( " ┌ ⚠️ Deno requests sys access to \" FOO \" . \r \n ├ Run again with --allow-sys to bypass this prompt. \r \n └ Allow? [y/n/A] (y = yes, allow; n = no, deny; A = allow all sys permissions) > " ) ,
Input ( " d \n " ) ,
Output ( " ✅ Granted all sys access. \r \n " ) ,
// "read" permissions
Output ( " ┌ ⚠️ Deno requests read access to \" FOO \" . \r \n ├ Run again with --allow-read to bypass this prompt. \r \n └ Allow? [y/n/A] (y = yes, allow; n = no, deny; A = allow all read permissions) > " ) ,
Input ( " d \n " ) ,
Output ( " ✅ Granted all read access. \r \n " ) ,
] ) ;
}
2023-01-12 20:59:13 -05:00
itest! ( _091_use_define_for_class_fields {
args : " run --check run/091_use_define_for_class_fields.ts " ,
output : " run/091_use_define_for_class_fields.ts.out " ,
exit_code : 1 ,
} ) ;
itest! ( _092_import_map_unmapped_bare_specifier {
args : " run --import-map import_maps/import_map.json run/092_import_map_unmapped_bare_specifier.ts " ,
output : " run/092_import_map_unmapped_bare_specifier.ts.out " ,
exit_code : 1 ,
} ) ;
itest! ( js_import_detect {
args : " run --quiet --reload run/js_import_detect.ts " ,
output : " run/js_import_detect.ts.out " ,
exit_code : 0 ,
} ) ;
itest! ( blob_gc_finalization {
args : " run run/blob_gc_finalization.js " ,
output : " run/blob_gc_finalization.js.out " ,
exit_code : 0 ,
} ) ;
itest! ( fetch_response_finalization {
args :
" run --v8-flags=--expose-gc --allow-net run/fetch_response_finalization.js " ,
output : " run/fetch_response_finalization.js.out " ,
http_server : true ,
exit_code : 0 ,
} ) ;
itest! ( import_type {
args : " run --reload run/import_type.ts " ,
output : " run/import_type.ts.out " ,
} ) ;
itest! ( import_type_no_check {
args : " run --reload --no-check run/import_type.ts " ,
output : " run/import_type.ts.out " ,
} ) ;
itest! ( private_field_presence {
args : " run --reload run/private_field_presence.ts " ,
output : " run/private_field_presence.ts.out " ,
} ) ;
itest! ( private_field_presence_no_check {
args : " run --reload --no-check run/private_field_presence.ts " ,
output : " run/private_field_presence.ts.out " ,
} ) ;
2023-01-25 12:28:08 -05:00
// TODO(bartlomieju): remove --unstable once Deno.Command is stabilized
2023-01-12 20:59:13 -05:00
itest! ( lock_write_fetch {
args :
" run --quiet --allow-read --allow-write --allow-env --allow-run --unstable run/lock_write_fetch/main.ts " ,
output : " run/lock_write_fetch/main.out " ,
http_server : true ,
exit_code : 0 ,
} ) ;
itest! ( lock_check_ok {
args :
" run --lock=run/lock_check_ok.json http://127.0.0.1:4545/run/003_relative_import.ts " ,
output : " run/003_relative_import.ts.out " ,
http_server : true ,
} ) ;
itest! ( lock_check_ok2 {
args : " run --lock=run/lock_check_ok2.json run/019_media_types.ts " ,
output : " run/019_media_types.ts.out " ,
http_server : true ,
} ) ;
itest! ( lock_dynamic_imports {
args : " run --lock=run/lock_dynamic_imports.json --allow-read --allow-net http://127.0.0.1:4545/run/013_dynamic_import.ts " ,
output : " run/lock_dynamic_imports.out " ,
exit_code : 10 ,
http_server : true ,
} ) ;
itest! ( lock_check_err {
args : " run --lock=run/lock_check_err.json http://127.0.0.1:4545/run/003_relative_import.ts " ,
output : " run/lock_check_err.out " ,
exit_code : 10 ,
http_server : true ,
} ) ;
itest! ( lock_check_err2 {
args : " run --lock=run/lock_check_err2.json run/019_media_types.ts " ,
output : " run/lock_check_err2.out " ,
exit_code : 10 ,
http_server : true ,
} ) ;
itest! ( config_file_lock_path {
args : " run --config=run/config_file_lock_path.json run/019_media_types.ts " ,
output : " run/config_file_lock_path.out " ,
exit_code : 10 ,
http_server : true ,
} ) ;
itest! ( lock_flag_overrides_config_file_lock_path {
args : " run --lock=run/lock_check_ok2.json --config=run/config_file_lock_path.json run/019_media_types.ts " ,
output : " run/019_media_types.ts.out " ,
http_server : true ,
} ) ;
itest! ( lock_v2_check_ok {
args :
" run --lock=run/lock_v2_check_ok.json http://127.0.0.1:4545/run/003_relative_import.ts " ,
output : " run/003_relative_import.ts.out " ,
http_server : true ,
} ) ;
itest! ( lock_v2_check_ok2 {
args : " run --lock=run/lock_v2_check_ok2.json run/019_media_types.ts " ,
output : " run/019_media_types.ts.out " ,
http_server : true ,
} ) ;
itest! ( lock_v2_dynamic_imports {
args : " run --lock=run/lock_v2_dynamic_imports.json --allow-read --allow-net http://127.0.0.1:4545/run/013_dynamic_import.ts " ,
output : " run/lock_v2_dynamic_imports.out " ,
exit_code : 10 ,
http_server : true ,
} ) ;
itest! ( lock_v2_check_err {
args : " run --lock=run/lock_v2_check_err.json http://127.0.0.1:4545/run/003_relative_import.ts " ,
output : " run/lock_v2_check_err.out " ,
exit_code : 10 ,
http_server : true ,
} ) ;
itest! ( lock_v2_check_err2 {
args : " run --lock=run/lock_v2_check_err2.json run/019_media_types.ts " ,
output : " run/lock_v2_check_err2.out " ,
exit_code : 10 ,
http_server : true ,
} ) ;
itest! ( lock_only_http_and_https {
args : " run --lock=run/lock_only_http_and_https/deno.lock run/lock_only_http_and_https/main.ts " ,
output : " run/lock_only_http_and_https/main.out " ,
http_server : true ,
} ) ;
itest! ( mts_dmts_mjs {
args : " run subdir/import.mts " ,
output : " run/mts_dmts_mjs.out " ,
} ) ;
itest! ( mts_dmts_mjs_no_check {
args : " run --no-check subdir/import.mts " ,
output : " run/mts_dmts_mjs.out " ,
} ) ;
itest! ( async_error {
exit_code : 1 ,
args : " run --reload run/async_error.ts " ,
output : " run/async_error.ts.out " ,
} ) ;
itest! ( config {
args :
" run --reload --config run/config/tsconfig.json --check run/config/main.ts " ,
output : " run/config/main.out " ,
} ) ;
itest! ( config_types {
args :
" run --reload --quiet --config run/config_types/tsconfig.json run/config_types/main.ts " ,
output : " run/config_types/main.out " ,
} ) ;
itest! ( config_types_remote {
http_server : true ,
args : " run --reload --quiet --config run/config_types/remote.tsconfig.json run/config_types/main.ts " ,
output : " run/config_types/main.out " ,
} ) ;
itest! ( empty_typescript {
args : " run --reload --check run/empty.ts " ,
output_str : Some ( " Check file:[WILDCARD]/run/empty.ts \n " ) ,
} ) ;
itest! ( error_001 {
args : " run --reload run/error_001.ts " ,
exit_code : 1 ,
output : " run/error_001.ts.out " ,
} ) ;
itest! ( error_002 {
args : " run --reload run/error_002.ts " ,
exit_code : 1 ,
output : " run/error_002.ts.out " ,
} ) ;
itest! ( error_003_typescript {
args : " run --reload --check run/error_003_typescript.ts " ,
exit_code : 1 ,
output : " run/error_003_typescript.ts.out " ,
} ) ;
// Supposing that we've already attempted to run error_003_typescript.ts
// we want to make sure that JS wasn't emitted. Running again without reload flag
// should result in the same output.
// https://github.com/denoland/deno/issues/2436
itest! ( error_003_typescript2 {
args : " run --check run/error_003_typescript.ts " ,
exit_code : 1 ,
output : " run/error_003_typescript.ts.out " ,
} ) ;
itest! ( error_004_missing_module {
args : " run --reload run/error_004_missing_module.ts " ,
exit_code : 1 ,
output : " run/error_004_missing_module.ts.out " ,
} ) ;
itest! ( error_005_missing_dynamic_import {
args :
" run --reload --allow-read --quiet run/error_005_missing_dynamic_import.ts " ,
exit_code : 1 ,
output : " run/error_005_missing_dynamic_import.ts.out " ,
} ) ;
itest! ( error_006_import_ext_failure {
args : " run --reload run/error_006_import_ext_failure.ts " ,
exit_code : 1 ,
output : " run/error_006_import_ext_failure.ts.out " ,
} ) ;
itest! ( error_007_any {
args : " run --reload run/error_007_any.ts " ,
exit_code : 1 ,
output : " run/error_007_any.ts.out " ,
} ) ;
itest! ( error_008_checkjs {
args : " run --reload run/error_008_checkjs.js " ,
exit_code : 1 ,
output : " run/error_008_checkjs.js.out " ,
} ) ;
itest! ( error_009_extensions_error {
args : " run run/error_009_extensions_error.js " ,
output : " run/error_009_extensions_error.js.out " ,
exit_code : 1 ,
} ) ;
itest! ( error_011_bad_module_specifier {
args : " run --reload run/error_011_bad_module_specifier.ts " ,
exit_code : 1 ,
output : " run/error_011_bad_module_specifier.ts.out " ,
} ) ;
itest! ( error_012_bad_dynamic_import_specifier {
args : " run --reload --check run/error_012_bad_dynamic_import_specifier.ts " ,
exit_code : 1 ,
output : " run/error_012_bad_dynamic_import_specifier.ts.out " ,
} ) ;
itest! ( error_013_missing_script {
args : " run --reload missing_file_name " ,
exit_code : 1 ,
output : " run/error_013_missing_script.out " ,
} ) ;
itest! ( error_014_catch_dynamic_import_error {
args :
" run --reload --allow-read run/error_014_catch_dynamic_import_error.js " ,
output : " run/error_014_catch_dynamic_import_error.js.out " ,
} ) ;
itest! ( error_015_dynamic_import_permissions {
args : " run --reload --quiet run/error_015_dynamic_import_permissions.js " ,
output : " run/error_015_dynamic_import_permissions.out " ,
exit_code : 1 ,
http_server : true ,
} ) ;
// We have an allow-net flag but not allow-read, it should still result in error.
itest! ( error_016_dynamic_import_permissions2 {
args : " run --reload --allow-net run/error_016_dynamic_import_permissions2.js " ,
output : " run/error_016_dynamic_import_permissions2.out " ,
exit_code : 1 ,
http_server : true ,
} ) ;
itest! ( error_017_hide_long_source_ts {
args : " run --reload --check run/error_017_hide_long_source_ts.ts " ,
output : " run/error_017_hide_long_source_ts.ts.out " ,
exit_code : 1 ,
} ) ;
itest! ( error_018_hide_long_source_js {
args : " run run/error_018_hide_long_source_js.js " ,
output : " run/error_018_hide_long_source_js.js.out " ,
exit_code : 1 ,
} ) ;
itest! ( error_019_stack_function {
args : " run run/error_019_stack_function.ts " ,
output : " run/error_019_stack_function.ts.out " ,
exit_code : 1 ,
} ) ;
itest! ( error_020_stack_constructor {
args : " run run/error_020_stack_constructor.ts " ,
output : " run/error_020_stack_constructor.ts.out " ,
exit_code : 1 ,
} ) ;
itest! ( error_021_stack_method {
args : " run run/error_021_stack_method.ts " ,
output : " run/error_021_stack_method.ts.out " ,
exit_code : 1 ,
} ) ;
itest! ( error_022_stack_custom_error {
args : " run run/error_022_stack_custom_error.ts " ,
output : " run/error_022_stack_custom_error.ts.out " ,
exit_code : 1 ,
} ) ;
itest! ( error_023_stack_async {
args : " run run/error_023_stack_async.ts " ,
output : " run/error_023_stack_async.ts.out " ,
exit_code : 1 ,
} ) ;
itest! ( error_024_stack_promise_all {
args : " run run/error_024_stack_promise_all.ts " ,
output : " run/error_024_stack_promise_all.ts.out " ,
exit_code : 1 ,
} ) ;
itest! ( error_025_tab_indent {
args : " run run/error_025_tab_indent " ,
output : " run/error_025_tab_indent.out " ,
exit_code : 1 ,
} ) ;
itest! ( error_026_remote_import_error {
args : " run run/error_026_remote_import_error.ts " ,
output : " run/error_026_remote_import_error.ts.out " ,
exit_code : 1 ,
http_server : true ,
} ) ;
itest! ( error_for_await {
args : " run --reload --check run/error_for_await.ts " ,
output : " run/error_for_await.ts.out " ,
exit_code : 1 ,
} ) ;
itest! ( error_missing_module_named_import {
args : " run --reload run/error_missing_module_named_import.ts " ,
output : " run/error_missing_module_named_import.ts.out " ,
exit_code : 1 ,
} ) ;
itest! ( error_no_check {
args : " run --reload --no-check run/error_no_check.ts " ,
output : " run/error_no_check.ts.out " ,
exit_code : 1 ,
} ) ;
itest! ( error_syntax {
args : " run --reload run/error_syntax.js " ,
exit_code : 1 ,
output : " run/error_syntax.js.out " ,
} ) ;
itest! ( error_syntax_empty_trailing_line {
args : " run --reload run/error_syntax_empty_trailing_line.mjs " ,
exit_code : 1 ,
output : " run/error_syntax_empty_trailing_line.mjs.out " ,
} ) ;
itest! ( error_type_definitions {
args : " run --reload --check run/error_type_definitions.ts " ,
exit_code : 1 ,
output : " run/error_type_definitions.ts.out " ,
} ) ;
itest! ( error_local_static_import_from_remote_ts {
args : " run --reload http://localhost:4545/run/error_local_static_import_from_remote.ts " ,
exit_code : 1 ,
http_server : true ,
output : " run/error_local_static_import_from_remote.ts.out " ,
} ) ;
itest! ( error_local_static_import_from_remote_js {
args : " run --reload http://localhost:4545/run/error_local_static_import_from_remote.js " ,
exit_code : 1 ,
http_server : true ,
output : " run/error_local_static_import_from_remote.js.out " ,
} ) ;
itest! ( exit_error42 {
exit_code : 42 ,
args : " run --quiet --reload run/exit_error42.ts " ,
output : " run/exit_error42.ts.out " ,
} ) ;
itest! ( set_exit_code_0 {
args : " run --no-check --unstable run/set_exit_code_0.ts " ,
output_str : Some ( " " ) ,
exit_code : 0 ,
} ) ;
itest! ( set_exit_code_1 {
args : " run --no-check --unstable run/set_exit_code_1.ts " ,
output_str : Some ( " " ) ,
exit_code : 42 ,
} ) ;
itest! ( set_exit_code_2 {
args : " run --no-check --unstable run/set_exit_code_2.ts " ,
output_str : Some ( " " ) ,
exit_code : 42 ,
} ) ;
itest! ( op_exit_op_set_exit_code_in_worker {
args : " run --no-check --unstable --allow-read run/op_exit_op_set_exit_code_in_worker.ts " ,
exit_code : 21 ,
output_str : Some ( " " ) ,
} ) ;
itest! ( deno_exit_tampering {
args : " run --no-check --unstable run/deno_exit_tampering.ts " ,
output_str : Some ( " " ) ,
exit_code : 42 ,
} ) ;
itest! ( heapstats {
args : " run --quiet --unstable --v8-flags=--expose-gc run/heapstats.js " ,
output : " run/heapstats.js.out " ,
} ) ;
itest! ( finalization_registry {
args :
" run --quiet --unstable --v8-flags=--expose-gc run/finalization_registry.js " ,
output : " run/finalization_registry.js.out " ,
} ) ;
itest! ( https_import {
args : " run --quiet --reload --cert tls/RootCA.pem run/https_import.ts " ,
output : " run/https_import.ts.out " ,
http_server : true ,
} ) ;
itest! ( if_main {
args : " run --quiet --reload run/if_main.ts " ,
output : " run/if_main.ts.out " ,
} ) ;
itest! ( import_meta {
args : " run --quiet --reload --import-map=run/import_meta/importmap.json run/import_meta/main.ts " ,
output : " run/import_meta/main.out " ,
} ) ;
itest! ( main_module {
args : " run --quiet --allow-read --reload run/main_module/main.ts " ,
output : " run/main_module/main.out " ,
} ) ;
itest! ( no_check {
args : " run --quiet --reload --no-check run/006_url_imports.ts " ,
output : " run/006_url_imports.ts.out " ,
http_server : true ,
} ) ;
itest! ( no_check_decorators {
args : " run --quiet --reload --no-check run/no_check_decorators.ts " ,
output : " run/no_check_decorators.ts.out " ,
} ) ;
itest! ( check_remote {
args : " run --quiet --reload --check=all run/no_check_remote.ts " ,
output : " run/no_check_remote.ts.disabled.out " ,
exit_code : 1 ,
http_server : true ,
} ) ;
itest! ( no_check_remote {
args : " run --quiet --reload --no-check=remote run/no_check_remote.ts " ,
output : " run/no_check_remote.ts.enabled.out " ,
http_server : true ,
} ) ;
itest! ( runtime_decorators {
args : " run --quiet --reload --no-check run/runtime_decorators.ts " ,
output : " run/runtime_decorators.ts.out " ,
} ) ;
itest! ( seed_random {
args : " run --seed=100 run/seed_random.js " ,
output : " run/seed_random.js.out " ,
} ) ;
itest! ( type_definitions {
args : " run --reload run/type_definitions.ts " ,
output : " run/type_definitions.ts.out " ,
} ) ;
itest! ( type_definitions_for_export {
args : " run --reload --check run/type_definitions_for_export.ts " ,
output : " run/type_definitions_for_export.ts.out " ,
exit_code : 1 ,
} ) ;
itest! ( type_directives_01 {
args : " run --reload --check=all -L debug run/type_directives_01.ts " ,
output : " run/type_directives_01.ts.out " ,
http_server : true ,
} ) ;
itest! ( type_directives_02 {
args : " run --reload --check=all -L debug run/type_directives_02.ts " ,
output : " run/type_directives_02.ts.out " ,
} ) ;
itest! ( type_directives_js_main {
args : " run --reload -L debug run/type_directives_js_main.js " ,
output : " run/type_directives_js_main.js.out " ,
exit_code : 0 ,
} ) ;
itest! ( type_directives_redirect {
args : " run --reload --check run/type_directives_redirect.ts " ,
output : " run/type_directives_redirect.ts.out " ,
http_server : true ,
} ) ;
itest! ( type_headers_deno_types {
args : " run --reload --check run/type_headers_deno_types.ts " ,
output : " run/type_headers_deno_types.ts.out " ,
http_server : true ,
} ) ;
itest! ( ts_type_imports {
args : " run --reload --check run/ts_type_imports.ts " ,
output : " run/ts_type_imports.ts.out " ,
exit_code : 1 ,
} ) ;
itest! ( ts_decorators {
args : " run --reload --check run/ts_decorators.ts " ,
output : " run/ts_decorators.ts.out " ,
} ) ;
itest! ( ts_type_only_import {
args : " run --reload --check run/ts_type_only_import.ts " ,
output : " run/ts_type_only_import.ts.out " ,
} ) ;
itest! ( swc_syntax_error {
args : " run --reload --check run/swc_syntax_error.ts " ,
output : " run/swc_syntax_error.ts.out " ,
exit_code : 1 ,
} ) ;
itest! ( unbuffered_stderr {
args : " run --reload run/unbuffered_stderr.ts " ,
output : " run/unbuffered_stderr.ts.out " ,
} ) ;
itest! ( unbuffered_stdout {
args : " run --quiet --reload run/unbuffered_stdout.ts " ,
output : " run/unbuffered_stdout.ts.out " ,
} ) ;
itest! ( v8_flags_run {
args : " run --v8-flags=--expose-gc run/v8_flags.js " ,
output : " run/v8_flags.js.out " ,
} ) ;
2023-01-24 23:03:03 -05:00
itest! ( v8_flags_env_run {
envs : vec ! [ ( " DENO_V8_FLAGS " . to_string ( ) , " --expose-gc " . to_string ( ) ) ] ,
args : " run run/v8_flags.js " ,
output : " run/v8_flags.js.out " ,
} ) ;
2023-01-12 20:59:13 -05:00
itest! ( v8_flags_unrecognized {
args : " repl --v8-flags=--foo,bar,--trace-gc,-baz " ,
output : " run/v8_flags_unrecognized.out " ,
exit_code : 1 ,
} ) ;
itest! ( v8_help {
args : " repl --v8-flags=--help " ,
output : " run/v8_help.out " ,
} ) ;
itest! ( unsupported_dynamic_import_scheme {
args : " eval import('xxx:') " ,
output : " run/unsupported_dynamic_import_scheme.out " ,
exit_code : 1 ,
} ) ;
itest! ( wasm {
args : " run --quiet run/wasm.ts " ,
output : " run/wasm.ts.out " ,
} ) ;
itest! ( wasm_shared {
args : " run --quiet run/wasm_shared.ts " ,
output : " run/wasm_shared.out " ,
} ) ;
itest! ( wasm_async {
args : " run run/wasm_async.js " ,
output : " run/wasm_async.out " ,
} ) ;
itest! ( wasm_unreachable {
args : " run --allow-read run/wasm_unreachable.js " ,
output : " run/wasm_unreachable.out " ,
exit_code : 1 ,
} ) ;
itest! ( wasm_url {
args : " run --quiet --allow-net=localhost:4545 run/wasm_url.js " ,
output : " run/wasm_url.out " ,
exit_code : 1 ,
http_server : true ,
} ) ;
itest! ( weakref {
args : " run --quiet --reload run/weakref.ts " ,
output : " run/weakref.ts.out " ,
} ) ;
itest! ( top_level_await_order {
args : " run --allow-read run/top_level_await/order.js " ,
output : " run/top_level_await/order.out " ,
} ) ;
itest! ( top_level_await_loop {
args : " run --allow-read run/top_level_await/loop.js " ,
output : " run/top_level_await/loop.out " ,
} ) ;
itest! ( top_level_await_circular {
args : " run --allow-read run/top_level_await/circular.js " ,
output : " run/top_level_await/circular.out " ,
exit_code : 1 ,
} ) ;
// Regression test for https://github.com/denoland/deno/issues/11238.
itest! ( top_level_await_nested {
args : " run --allow-read run/top_level_await/nested/main.js " ,
output : " run/top_level_await/nested.out " ,
} ) ;
itest! ( top_level_await_unresolved {
args : " run run/top_level_await/unresolved.js " ,
output : " run/top_level_await/unresolved.out " ,
exit_code : 1 ,
} ) ;
itest! ( top_level_await {
args : " run --allow-read run/top_level_await/top_level_await.js " ,
output : " run/top_level_await/top_level_await.out " ,
} ) ;
itest! ( top_level_await_ts {
args : " run --quiet --allow-read run/top_level_await/top_level_await.ts " ,
output : " run/top_level_await/top_level_await.out " ,
} ) ;
itest! ( top_level_for_await {
args : " run --quiet run/top_level_await/top_level_for_await.js " ,
output : " run/top_level_await/top_level_for_await.out " ,
} ) ;
itest! ( top_level_for_await_ts {
args : " run --quiet run/top_level_await/top_level_for_await.ts " ,
output : " run/top_level_await/top_level_for_await.out " ,
} ) ;
itest! ( unstable_disabled {
args : " run --reload --check run/unstable.ts " ,
exit_code : 1 ,
output : " run/unstable_disabled.out " ,
} ) ;
itest! ( unstable_enabled {
args : " run --quiet --reload --unstable run/unstable.ts " ,
output : " run/unstable_enabled.out " ,
} ) ;
itest! ( unstable_disabled_js {
args : " run --reload run/unstable.js " ,
output : " run/unstable_disabled_js.out " ,
} ) ;
itest! ( unstable_enabled_js {
args : " run --quiet --reload --unstable run/unstable.ts " ,
output : " run/unstable_enabled_js.out " ,
} ) ;
itest! ( unstable_worker {
args : " run --reload --unstable --quiet --allow-read run/unstable_worker.ts " ,
output : " run/unstable_worker.ts.out " ,
} ) ;
itest! ( import_compression {
args : " run --quiet --reload --allow-net run/import_compression/main.ts " ,
output : " run/import_compression/main.out " ,
http_server : true ,
} ) ;
itest! ( disallow_http_from_https_js {
args : " run --quiet --reload --cert tls/RootCA.pem https://localhost:5545/run/disallow_http_from_https.js " ,
output : " run/disallow_http_from_https_js.out " ,
http_server : true ,
exit_code : 1 ,
} ) ;
itest! ( disallow_http_from_https_ts {
args : " run --quiet --reload --cert tls/RootCA.pem https://localhost:5545/run/disallow_http_from_https.ts " ,
output : " run/disallow_http_from_https_ts.out " ,
http_server : true ,
exit_code : 1 ,
} ) ;
itest! ( dynamic_import_conditional {
args : " run --quiet --reload run/dynamic_import_conditional.js " ,
output : " run/dynamic_import_conditional.js.out " ,
} ) ;
itest! ( tsx_imports {
args : " run --reload --check run/tsx_imports/tsx_imports.ts " ,
output : " run/tsx_imports/tsx_imports.ts.out " ,
} ) ;
itest! ( fix_dynamic_import_errors {
args : " run --reload run/fix_dynamic_import_errors.js " ,
output : " run/fix_dynamic_import_errors.js.out " ,
} ) ;
itest! ( fix_emittable_skipped {
args : " run --reload run/fix_emittable_skipped.js " ,
output : " run/fix_emittable_skipped.ts.out " ,
} ) ;
itest! ( fix_js_import_js {
args : " run --quiet --reload run/fix_js_import_js.ts " ,
output : " run/fix_js_import_js.ts.out " ,
} ) ;
itest! ( fix_js_imports {
args : " run --quiet --reload run/fix_js_imports.ts " ,
output : " run/fix_js_imports.ts.out " ,
} ) ;
itest! ( fix_tsc_file_exists {
args : " run --quiet --reload tsc/test.js " ,
output : " run/fix_tsc_file_exists.out " ,
} ) ;
itest! ( fix_worker_dispatchevent {
args : " run --quiet --reload run/fix_worker_dispatchevent.ts " ,
output : " run/fix_worker_dispatchevent.ts.out " ,
} ) ;
itest! ( es_private_fields {
args : " run --quiet --reload run/es_private_fields.js " ,
output : " run/es_private_fields.js.out " ,
} ) ;
itest! ( cjs_imports {
args : " run --quiet --reload run/cjs_imports/main.ts " ,
output : " run/cjs_imports/main.out " ,
} ) ;
itest! ( ts_import_from_js {
args : " run --quiet --reload run/ts_import_from_js/main.js " ,
output : " run/ts_import_from_js/main.out " ,
http_server : true ,
} ) ;
itest! ( jsx_import_from_ts {
args : " run --quiet --reload run/jsx_import_from_ts.ts " ,
output : " run/jsx_import_from_ts.ts.out " ,
} ) ;
itest! ( jsx_import_source_pragma {
args : " run --reload run/jsx_import_source_pragma.tsx " ,
output : " run/jsx_import_source.out " ,
http_server : true ,
} ) ;
itest! ( jsx_import_source_pragma_with_config {
args :
" run --reload --config jsx/deno-jsx.jsonc --no-lock run/jsx_import_source_pragma.tsx " ,
output : " run/jsx_import_source.out " ,
http_server : true ,
} ) ;
itest! ( jsx_import_source_pragma_with_dev_config {
args :
" run --reload --config jsx/deno-jsxdev.jsonc --no-lock run/jsx_import_source_pragma.tsx " ,
output : " run/jsx_import_source_dev.out " ,
http_server : true ,
} ) ;
itest! ( jsx_import_source_no_pragma {
args :
" run --reload --config jsx/deno-jsx.jsonc --no-lock run/jsx_import_source_no_pragma.tsx " ,
output : " run/jsx_import_source.out " ,
http_server : true ,
} ) ;
itest! ( jsx_import_source_no_pragma_dev {
args : " run --reload --config jsx/deno-jsxdev.jsonc --no-lock run/jsx_import_source_no_pragma.tsx " ,
output : " run/jsx_import_source_dev.out " ,
http_server : true ,
} ) ;
itest! ( jsx_import_source_pragma_import_map {
args : " run --reload --import-map jsx/import-map.json run/jsx_import_source_pragma_import_map.tsx " ,
output : " run/jsx_import_source_import_map.out " ,
http_server : true ,
} ) ;
itest! ( jsx_import_source_pragma_import_map_dev {
args : " run --reload --import-map jsx/import-map.json --config jsx/deno-jsxdev-import-map.jsonc run/jsx_import_source_pragma_import_map.tsx " ,
output : " run/jsx_import_source_import_map_dev.out " ,
http_server : true ,
} ) ;
itest! ( jsx_import_source_import_map {
args : " run --reload --import-map jsx/import-map.json --no-lock --config jsx/deno-jsx-import-map.jsonc run/jsx_import_source_no_pragma.tsx " ,
output : " run/jsx_import_source_import_map.out " ,
http_server : true ,
} ) ;
itest! ( jsx_import_source_import_map_dev {
args : " run --reload --import-map jsx/import-map.json --no-lock --config jsx/deno-jsxdev-import-map.jsonc run/jsx_import_source_no_pragma.tsx " ,
output : " run/jsx_import_source_import_map_dev.out " ,
http_server : true ,
} ) ;
itest! ( jsx_import_source_import_map_scoped {
args : " run --reload --import-map jsx/import-map-scoped.json --no-lock --config jsx/deno-jsx-import-map.jsonc subdir/jsx_import_source_no_pragma.tsx " ,
output : " run/jsx_import_source_import_map.out " ,
http_server : true ,
} ) ;
itest! ( jsx_import_source_import_map_scoped_dev {
args : " run --reload --import-map jsx/import-map-scoped.json --no-lock --config jsx/deno-jsxdev-import-map.jsonc subdir/jsx_import_source_no_pragma.tsx " ,
output : " run/jsx_import_source_import_map_dev.out " ,
http_server : true ,
} ) ;
itest! ( jsx_import_source_pragma_no_check {
args : " run --reload --no-check run/jsx_import_source_pragma.tsx " ,
output : " run/jsx_import_source.out " ,
http_server : true ,
} ) ;
itest! ( jsx_import_source_pragma_with_config_no_check {
args : " run --reload --config jsx/deno-jsx.jsonc --no-lock --no-check run/jsx_import_source_pragma.tsx " ,
output : " run/jsx_import_source.out " ,
http_server : true ,
} ) ;
itest! ( jsx_import_source_no_pragma_no_check {
args :
" run --reload --config jsx/deno-jsx.jsonc --no-lock --no-check run/jsx_import_source_no_pragma.tsx " ,
output : " run/jsx_import_source.out " ,
http_server : true ,
} ) ;
itest! ( jsx_import_source_pragma_import_map_no_check {
args : " run --reload --import-map jsx/import-map.json --no-check run/jsx_import_source_pragma_import_map.tsx " ,
output : " run/jsx_import_source_import_map.out " ,
http_server : true ,
} ) ;
itest! ( jsx_import_source_import_map_no_check {
args : " run --reload --import-map jsx/import-map.json --no-lock --config jsx/deno-jsx-import-map.jsonc --no-check run/jsx_import_source_no_pragma.tsx " ,
output : " run/jsx_import_source_import_map.out " ,
http_server : true ,
} ) ;
itest! ( jsx_import_source_error {
args : " run --config jsx/deno-jsx-error.jsonc --check run/jsx_import_source_no_pragma.tsx " ,
output : " run/jsx_import_source_error.out " ,
exit_code : 1 ,
} ) ;
// TODO(#11128): Flaky. Re-enable later.
// itest!(single_compile_with_reload {
// args: "run --relcert/oad --allow-read run/single_compile_with_reload.ts",
// output: "run/single_compile_with_reload.ts.out",
// });
itest! ( proto_exploit {
args : " run run/proto_exploit.js " ,
output : " run/proto_exploit.js.out " ,
} ) ;
itest! ( reference_types {
args : " run --reload --quiet run/reference_types.ts " ,
output : " run/reference_types.ts.out " ,
} ) ;
itest! ( references_types_remote {
http_server : true ,
args : " run --reload --quiet run/reference_types_remote.ts " ,
output : " run/reference_types_remote.ts.out " ,
} ) ;
itest! ( reference_types_error {
args :
" run --config run/checkjs.tsconfig.json --check run/reference_types_error.js " ,
output : " run/reference_types_error.js.out " ,
exit_code : 1 ,
} ) ;
itest! ( reference_types_error_no_check {
args : " run --no-check run/reference_types_error.js " ,
output_str : Some ( " " ) ,
} ) ;
itest! ( import_data_url_error_stack {
args : " run --quiet --reload run/import_data_url_error_stack.ts " ,
output : " run/import_data_url_error_stack.ts.out " ,
exit_code : 1 ,
} ) ;
itest! ( import_data_url_import_relative {
args : " run --quiet --reload run/import_data_url_import_relative.ts " ,
output : " run/import_data_url_import_relative.ts.out " ,
exit_code : 1 ,
} ) ;
itest! ( import_data_url_import_map {
args : " run --quiet --reload --import-map import_maps/import_map.json run/import_data_url.ts " ,
output : " run/import_data_url.ts.out " ,
} ) ;
itest! ( import_data_url_imports {
args : " run --quiet --reload run/import_data_url_imports.ts " ,
output : " run/import_data_url_imports.ts.out " ,
http_server : true ,
} ) ;
itest! ( import_data_url_jsx {
args : " run --quiet --reload run/import_data_url_jsx.ts " ,
output : " run/import_data_url_jsx.ts.out " ,
} ) ;
itest! ( import_data_url {
args : " run --quiet --reload run/import_data_url.ts " ,
output : " run/import_data_url.ts.out " ,
} ) ;
itest! ( import_dynamic_data_url {
args : " run --quiet --reload run/import_dynamic_data_url.ts " ,
output : " run/import_dynamic_data_url.ts.out " ,
} ) ;
itest! ( import_blob_url_error_stack {
args : " run --quiet --reload run/import_blob_url_error_stack.ts " ,
output : " run/import_blob_url_error_stack.ts.out " ,
exit_code : 1 ,
} ) ;
itest! ( import_blob_url_import_relative {
args : " run --quiet --reload run/import_blob_url_import_relative.ts " ,
output : " run/import_blob_url_import_relative.ts.out " ,
exit_code : 1 ,
} ) ;
itest! ( import_blob_url_imports {
args :
" run --quiet --reload --allow-net=localhost:4545 run/import_blob_url_imports.ts " ,
output : " run/import_blob_url_imports.ts.out " ,
http_server : true ,
} ) ;
itest! ( import_blob_url_jsx {
args : " run --quiet --reload run/import_blob_url_jsx.ts " ,
output : " run/import_blob_url_jsx.ts.out " ,
} ) ;
itest! ( import_blob_url {
args : " run --quiet --reload run/import_blob_url.ts " ,
output : " run/import_blob_url.ts.out " ,
} ) ;
itest! ( import_file_with_colon {
args : " run --quiet --reload run/import_file_with_colon.ts " ,
output : " run/import_file_with_colon.ts.out " ,
http_server : true ,
} ) ;
itest! ( import_extensionless {
args : " run --quiet --reload run/import_extensionless.ts " ,
output : " run/import_extensionless.ts.out " ,
http_server : true ,
} ) ;
itest! ( classic_workers_event_loop {
args :
" run --enable-testing-features-do-not-use run/classic_workers_event_loop.js " ,
output : " run/classic_workers_event_loop.js.out " ,
} ) ;
// FIXME(bartlomieju): disabled, because this test is very flaky on CI
// itest!(local_sources_not_cached_in_memory {
// args: "run --allow-read --allow-write run/no_mem_cache.js",
// output: "run/no_mem_cache.js.out",
// });
// This test checks that inline source map data is used. It uses a hand crafted
// source map that maps to a file that exists, but is not loaded into the module
// graph (inline_js_source_map_2.ts) (because there are no direct dependencies).
// Source line is not remapped because no inline source contents are included in
// the sourcemap and the file is not present in the dependency graph.
itest! ( inline_js_source_map_2 {
args : " run --quiet run/inline_js_source_map_2.js " ,
output : " run/inline_js_source_map_2.js.out " ,
exit_code : 1 ,
} ) ;
// This test checks that inline source map data is used. It uses a hand crafted
// source map that maps to a file that exists, but is not loaded into the module
// graph (inline_js_source_map_2.ts) (because there are no direct dependencies).
// Source line remapped using th inline source contents that are included in the
// inline source map.
itest! ( inline_js_source_map_2_with_inline_contents {
args : " run --quiet run/inline_js_source_map_2_with_inline_contents.js " ,
output : " run/inline_js_source_map_2_with_inline_contents.js.out " ,
exit_code : 1 ,
} ) ;
// This test checks that inline source map data is used. It uses a hand crafted
// source map that maps to a file that exists, and is loaded into the module
// graph because of a direct import statement (inline_js_source_map.ts). The
// source map was generated from an earlier version of this file, where the throw
// was not commented out. The source line is remapped using source contents that
// from the module graph.
itest! ( inline_js_source_map_with_contents_from_graph {
args : " run --quiet run/inline_js_source_map_with_contents_from_graph.js " ,
output : " run/inline_js_source_map_with_contents_from_graph.js.out " ,
exit_code : 1 ,
http_server : true ,
} ) ;
// This test ensures that a descriptive error is shown when we're unable to load
// the import map. Even though this tests only the `run` subcommand, we can be sure
// that the error message is similar for other subcommands as they all use
// `program_state.maybe_import_map` to access the import map underneath.
itest! ( error_import_map_unable_to_load {
args : " run --import-map=import_maps/does_not_exist.json import_maps/test.ts " ,
output : " run/error_import_map_unable_to_load.out " ,
exit_code : 1 ,
} ) ;
// Test that setting `self` in the main thread to some other value doesn't break
// the world.
itest! ( replace_self {
args : " run run/replace_self.js " ,
output : " run/replace_self.js.out " ,
} ) ;
itest! ( worker_event_handler_test {
args : " run --quiet --reload --allow-read run/worker_event_handler_test.js " ,
output : " run/worker_event_handler_test.js.out " ,
} ) ;
itest! ( worker_close_race {
args : " run --quiet --reload --allow-read run/worker_close_race.js " ,
output : " run/worker_close_race.js.out " ,
} ) ;
itest! ( worker_drop_handle_race {
args : " run --quiet --reload --allow-read run/worker_drop_handle_race.js " ,
output : " run/worker_drop_handle_race.js.out " ,
exit_code : 1 ,
} ) ;
itest! ( worker_drop_handle_race_terminate {
args : " run --unstable run/worker_drop_handle_race_terminate.js " ,
output : " run/worker_drop_handle_race_terminate.js.out " ,
} ) ;
itest! ( worker_close_nested {
args : " run --quiet --reload --allow-read run/worker_close_nested.js " ,
output : " run/worker_close_nested.js.out " ,
} ) ;
itest! ( worker_message_before_close {
args : " run --quiet --reload --allow-read run/worker_message_before_close.js " ,
output : " run/worker_message_before_close.js.out " ,
} ) ;
itest! ( worker_close_in_wasm_reactions {
args :
" run --quiet --reload --allow-read run/worker_close_in_wasm_reactions.js " ,
output : " run/worker_close_in_wasm_reactions.js.out " ,
} ) ;
itest! ( shebang_tsc {
args : " run --quiet --check run/shebang.ts " ,
output : " run/shebang.ts.out " ,
} ) ;
itest! ( shebang_swc {
args : " run --quiet run/shebang.ts " ,
output : " run/shebang.ts.out " ,
} ) ;
itest! ( shebang_with_json_imports_tsc {
args : " run --quiet import_assertions/json_with_shebang.ts " ,
output : " import_assertions/json_with_shebang.ts.out " ,
exit_code : 1 ,
} ) ;
itest! ( shebang_with_json_imports_swc {
args : " run --quiet --no-check import_assertions/json_with_shebang.ts " ,
output : " import_assertions/json_with_shebang.ts.out " ,
exit_code : 1 ,
} ) ;
#[ test ]
fn no_validate_asm ( ) {
let output = util ::deno_cmd ( )
. current_dir ( util ::testdata_path ( ) )
. arg ( " run " )
. arg ( " run/no_validate_asm.js " )
. stderr ( Stdio ::piped ( ) )
. stdout ( Stdio ::piped ( ) )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
assert! ( output . status . success ( ) ) ;
assert! ( output . stderr . is_empty ( ) ) ;
assert! ( output . stdout . is_empty ( ) ) ;
}
#[ test ]
fn exec_path ( ) {
let output = util ::deno_cmd ( )
. current_dir ( util ::testdata_path ( ) )
. arg ( " run " )
. arg ( " --allow-read " )
. arg ( " run/exec_path.ts " )
. stdout ( Stdio ::piped ( ) )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
assert! ( output . status . success ( ) ) ;
let stdout_str = std ::str ::from_utf8 ( & output . stdout ) . unwrap ( ) . trim ( ) ;
let actual = std ::fs ::canonicalize ( std ::path ::Path ::new ( stdout_str ) ) . unwrap ( ) ;
let expected = std ::fs ::canonicalize ( util ::deno_exe_path ( ) ) . unwrap ( ) ;
assert_eq! ( expected , actual ) ;
}
#[ cfg(windows) ]
// Clippy suggests to remove the `NoStd` prefix from all variants. I disagree.
#[ allow(clippy::enum_variant_names) ]
enum WinProcConstraints {
NoStdIn ,
NoStdOut ,
NoStdErr ,
}
#[ cfg(windows) ]
fn run_deno_script_constrained (
script_path : std ::path ::PathBuf ,
constraints : WinProcConstraints ,
) -> Result < ( ) , i64 > {
let file_path = " assets/DenoWinRunner.ps1 " ;
let constraints = match constraints {
WinProcConstraints ::NoStdIn = > " 1 " ,
WinProcConstraints ::NoStdOut = > " 2 " ,
WinProcConstraints ::NoStdErr = > " 4 " ,
} ;
let deno_exe_path = util ::deno_exe_path ( )
. into_os_string ( )
. into_string ( )
. unwrap ( ) ;
let deno_script_path = script_path . into_os_string ( ) . into_string ( ) . unwrap ( ) ;
let args = vec! [ & deno_exe_path [ .. ] , & deno_script_path [ .. ] , constraints ] ;
util ::run_powershell_script_file ( file_path , args )
}
#[ cfg(windows) ]
#[ test ]
fn should_not_panic_on_no_stdin ( ) {
let output = run_deno_script_constrained (
util ::testdata_path ( ) . join ( " echo.ts " ) ,
WinProcConstraints ::NoStdIn ,
) ;
output . unwrap ( ) ;
}
#[ cfg(windows) ]
#[ test ]
fn should_not_panic_on_no_stdout ( ) {
let output = run_deno_script_constrained (
util ::testdata_path ( ) . join ( " echo.ts " ) ,
WinProcConstraints ::NoStdOut ,
) ;
output . unwrap ( ) ;
}
#[ cfg(windows) ]
#[ test ]
fn should_not_panic_on_no_stderr ( ) {
let output = run_deno_script_constrained (
util ::testdata_path ( ) . join ( " echo.ts " ) ,
WinProcConstraints ::NoStdErr ,
) ;
output . unwrap ( ) ;
}
#[ cfg(not(windows)) ]
#[ test ]
fn should_not_panic_on_undefined_home_environment_variable ( ) {
let output = util ::deno_cmd ( )
. current_dir ( util ::testdata_path ( ) )
. arg ( " run " )
. arg ( " echo.ts " )
. env_remove ( " HOME " )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
assert! ( output . status . success ( ) ) ;
}
#[ test ]
fn should_not_panic_on_undefined_deno_dir_environment_variable ( ) {
let output = util ::deno_cmd ( )
. current_dir ( util ::testdata_path ( ) )
. arg ( " run " )
. arg ( " echo.ts " )
. env_remove ( " DENO_DIR " )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
assert! ( output . status . success ( ) ) ;
}
#[ cfg(not(windows)) ]
#[ test ]
fn should_not_panic_on_undefined_deno_dir_and_home_environment_variables ( ) {
let output = util ::deno_cmd ( )
. current_dir ( util ::testdata_path ( ) )
. arg ( " run " )
. arg ( " echo.ts " )
. env_remove ( " DENO_DIR " )
. env_remove ( " HOME " )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
assert! ( output . status . success ( ) ) ;
}
#[ test ]
fn rust_log ( ) {
// Without RUST_LOG the stderr is empty.
let output = util ::deno_cmd ( )
. current_dir ( util ::testdata_path ( ) )
. arg ( " run " )
. arg ( " run/001_hello.js " )
. stderr ( Stdio ::piped ( ) )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
assert! ( output . status . success ( ) ) ;
assert! ( output . stderr . is_empty ( ) ) ;
// With RUST_LOG the stderr is not empty.
let output = util ::deno_cmd ( )
. current_dir ( util ::testdata_path ( ) )
. arg ( " run " )
. arg ( " run/001_hello.js " )
. env ( " RUST_LOG " , " debug " )
. stderr ( Stdio ::piped ( ) )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
assert! ( output . status . success ( ) ) ;
assert! ( ! output . stderr . is_empty ( ) ) ;
}
#[ test ]
fn dont_cache_on_check_fail ( ) {
let deno_dir = util ::new_deno_dir ( ) ;
let mut deno_cmd = util ::deno_cmd_with_deno_dir ( & deno_dir ) ;
let output = deno_cmd
. current_dir ( util ::testdata_path ( ) )
. arg ( " run " )
. arg ( " --check=all " )
. arg ( " --reload " )
. arg ( " run/error_003_typescript.ts " )
. stderr ( Stdio ::piped ( ) )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
assert! ( ! output . status . success ( ) ) ;
assert! ( ! output . stderr . is_empty ( ) ) ;
let mut deno_cmd = util ::deno_cmd_with_deno_dir ( & deno_dir ) ;
let output = deno_cmd
. current_dir ( util ::testdata_path ( ) )
. arg ( " run " )
. arg ( " --check=all " )
. arg ( " run/error_003_typescript.ts " )
. stderr ( Stdio ::piped ( ) )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
assert! ( ! output . status . success ( ) ) ;
assert! ( ! output . stderr . is_empty ( ) ) ;
}
mod permissions {
use test_util as util ;
2023-01-25 12:28:08 -05:00
// TODO(bartlomieju): remove --unstable once Deno.Command is stabilized
2023-01-12 20:59:13 -05:00
#[ test ]
fn with_allow ( ) {
for permission in & util ::PERMISSION_VARIANTS {
let status = util ::deno_cmd ( )
. current_dir ( & util ::testdata_path ( ) )
. arg ( " run " )
. arg ( " --unstable " )
2023-01-27 10:43:16 -05:00
. arg ( format! ( " --allow- {permission} " ) )
2023-01-12 20:59:13 -05:00
. arg ( " run/permission_test.ts " )
2023-01-27 10:43:16 -05:00
. arg ( format! ( " {permission} Required " ) )
2023-01-12 20:59:13 -05:00
. spawn ( )
. unwrap ( )
. wait ( )
. unwrap ( ) ;
assert! ( status . success ( ) ) ;
}
}
2023-01-25 12:28:08 -05:00
// TODO(bartlomieju): remove --unstable once Deno.Command is stabilized
2023-01-12 20:59:13 -05:00
#[ test ]
fn without_allow ( ) {
for permission in & util ::PERMISSION_VARIANTS {
let ( _ , err ) = util ::run_and_collect_output (
false ,
2023-01-27 10:43:16 -05:00
& format! ( " run --unstable run/permission_test.ts {permission} Required " ) ,
2023-01-12 20:59:13 -05:00
None ,
None ,
false ,
) ;
assert! ( err . contains ( util ::PERMISSION_DENIED_PATTERN ) ) ;
}
}
#[ test ]
fn rw_inside_project_dir ( ) {
const PERMISSION_VARIANTS : [ & str ; 2 ] = [ " read " , " write " ] ;
for permission in & PERMISSION_VARIANTS {
let status = util ::deno_cmd ( )
. current_dir ( & util ::testdata_path ( ) )
. arg ( " run " )
. arg ( format! (
" --allow-{0}={1} " ,
permission ,
util ::testdata_path ( )
. into_os_string ( )
. into_string ( )
. unwrap ( )
) )
. arg ( " run/complex_permissions_test.ts " )
. arg ( permission )
. arg ( " run/complex_permissions_test.ts " )
. spawn ( )
. unwrap ( )
. wait ( )
. unwrap ( ) ;
assert! ( status . success ( ) ) ;
}
}
#[ test ]
fn rw_outside_test_dir ( ) {
const PERMISSION_VARIANTS : [ & str ; 2 ] = [ " read " , " write " ] ;
for permission in & PERMISSION_VARIANTS {
let ( _ , err ) = util ::run_and_collect_output (
false ,
& format! (
" run --allow-{0}={1} run/complex_permissions_test.ts {0} {2} " ,
permission ,
util ::testdata_path ( )
. into_os_string ( )
. into_string ( )
. unwrap ( ) ,
util ::root_path ( )
. join ( " Cargo.toml " )
. into_os_string ( )
. into_string ( )
. unwrap ( ) ,
) ,
None ,
None ,
false ,
) ;
assert! ( err . contains ( util ::PERMISSION_DENIED_PATTERN ) ) ;
}
}
#[ test ]
fn rw_inside_test_dir ( ) {
const PERMISSION_VARIANTS : [ & str ; 2 ] = [ " read " , " write " ] ;
for permission in & PERMISSION_VARIANTS {
let status = util ::deno_cmd ( )
. current_dir ( & util ::testdata_path ( ) )
. arg ( " run " )
. arg ( format! (
" --allow-{0}={1} " ,
permission ,
util ::testdata_path ( )
. into_os_string ( )
. into_string ( )
. unwrap ( )
) )
. arg ( " run/complex_permissions_test.ts " )
. arg ( permission )
. arg ( " run/complex_permissions_test.ts " )
. spawn ( )
. unwrap ( )
. wait ( )
. unwrap ( ) ;
assert! ( status . success ( ) ) ;
}
}
#[ test ]
fn rw_outside_test_and_js_dir ( ) {
const PERMISSION_VARIANTS : [ & str ; 2 ] = [ " read " , " write " ] ;
let test_dir = util ::testdata_path ( )
. into_os_string ( )
. into_string ( )
. unwrap ( ) ;
let js_dir = util ::root_path ( )
. join ( " js " )
. into_os_string ( )
. into_string ( )
. unwrap ( ) ;
for permission in & PERMISSION_VARIANTS {
let ( _ , err ) = util ::run_and_collect_output (
false ,
& format! (
" run --allow-{0}={1},{2} run/complex_permissions_test.ts {0} {3} " ,
permission ,
test_dir ,
js_dir ,
util ::root_path ( )
. join ( " Cargo.toml " )
. into_os_string ( )
. into_string ( )
. unwrap ( ) ,
) ,
None ,
None ,
false ,
) ;
assert! ( err . contains ( util ::PERMISSION_DENIED_PATTERN ) ) ;
}
}
#[ test ]
fn rw_inside_test_and_js_dir ( ) {
const PERMISSION_VARIANTS : [ & str ; 2 ] = [ " read " , " write " ] ;
let test_dir = util ::testdata_path ( )
. into_os_string ( )
. into_string ( )
. unwrap ( ) ;
let js_dir = util ::root_path ( )
. join ( " js " )
. into_os_string ( )
. into_string ( )
. unwrap ( ) ;
for permission in & PERMISSION_VARIANTS {
let status = util ::deno_cmd ( )
. current_dir ( & util ::testdata_path ( ) )
. arg ( " run " )
2023-01-27 10:43:16 -05:00
. arg ( format! ( " --allow- {permission} = {test_dir} , {js_dir} " ) )
2023-01-12 20:59:13 -05:00
. arg ( " run/complex_permissions_test.ts " )
. arg ( permission )
. arg ( " run/complex_permissions_test.ts " )
. spawn ( )
. unwrap ( )
. wait ( )
. unwrap ( ) ;
assert! ( status . success ( ) ) ;
}
}
#[ test ]
fn rw_relative ( ) {
const PERMISSION_VARIANTS : [ & str ; 2 ] = [ " read " , " write " ] ;
for permission in & PERMISSION_VARIANTS {
let status = util ::deno_cmd ( )
. current_dir ( & util ::testdata_path ( ) )
. arg ( " run " )
2023-01-27 10:43:16 -05:00
. arg ( format! ( " --allow- {permission} =. " ) )
2023-01-12 20:59:13 -05:00
. arg ( " run/complex_permissions_test.ts " )
. arg ( permission )
. arg ( " run/complex_permissions_test.ts " )
. spawn ( )
. unwrap ( )
. wait ( )
. unwrap ( ) ;
assert! ( status . success ( ) ) ;
}
}
#[ test ]
fn rw_no_prefix ( ) {
const PERMISSION_VARIANTS : [ & str ; 2 ] = [ " read " , " write " ] ;
for permission in & PERMISSION_VARIANTS {
let status = util ::deno_cmd ( )
. current_dir ( & util ::testdata_path ( ) )
. arg ( " run " )
2023-01-27 10:43:16 -05:00
. arg ( format! ( " --allow- {permission} =tls/../ " ) )
2023-01-12 20:59:13 -05:00
. arg ( " run/complex_permissions_test.ts " )
. arg ( permission )
. arg ( " run/complex_permissions_test.ts " )
. spawn ( )
. unwrap ( )
. wait ( )
. unwrap ( ) ;
assert! ( status . success ( ) ) ;
}
}
#[ test ]
fn net_fetch_allow_localhost_4545 ( ) {
let ( _ , err ) = util ::run_and_collect_output (
true ,
" run --allow-net=localhost:4545 run/complex_permissions_test.ts netFetch http://localhost:4545/ " ,
None ,
None ,
true ,
) ;
assert! ( ! err . contains ( util ::PERMISSION_DENIED_PATTERN ) ) ;
}
#[ test ]
fn net_fetch_allow_deno_land ( ) {
let ( _ , err ) = util ::run_and_collect_output (
false ,
" run --allow-net=deno.land run/complex_permissions_test.ts netFetch http://localhost:4545/ " ,
None ,
None ,
true ,
) ;
assert! ( err . contains ( util ::PERMISSION_DENIED_PATTERN ) ) ;
}
#[ test ]
fn net_fetch_localhost_4545_fail ( ) {
let ( _ , err ) = util ::run_and_collect_output (
false ,
" run --allow-net=localhost:4545 run/complex_permissions_test.ts netFetch http://localhost:4546/ " ,
None ,
None ,
true ,
) ;
assert! ( err . contains ( util ::PERMISSION_DENIED_PATTERN ) ) ;
}
#[ test ]
fn net_fetch_localhost ( ) {
let ( _ , err ) = util ::run_and_collect_output (
true ,
" run --allow-net=localhost run/complex_permissions_test.ts netFetch http://localhost:4545/ http://localhost:4546/ http://localhost:4547/ " ,
None ,
None ,
true ,
) ;
assert! ( ! err . contains ( util ::PERMISSION_DENIED_PATTERN ) ) ;
}
#[ test ]
fn net_connect_allow_localhost_ip_4555 ( ) {
let ( _ , err ) = util ::run_and_collect_output (
true ,
" run --allow-net=127.0.0.1:4545 run/complex_permissions_test.ts netConnect 127.0.0.1:4545 " ,
None ,
None ,
true ,
) ;
assert! ( ! err . contains ( util ::PERMISSION_DENIED_PATTERN ) ) ;
}
#[ test ]
fn net_connect_allow_deno_land ( ) {
let ( _ , err ) = util ::run_and_collect_output (
false ,
" run --allow-net=deno.land run/complex_permissions_test.ts netConnect 127.0.0.1:4546 " ,
None ,
None ,
true ,
) ;
assert! ( err . contains ( util ::PERMISSION_DENIED_PATTERN ) ) ;
}
#[ test ]
fn net_connect_allow_localhost_ip_4545_fail ( ) {
let ( _ , err ) = util ::run_and_collect_output (
false ,
" run --allow-net=127.0.0.1:4545 run/complex_permissions_test.ts netConnect 127.0.0.1:4546 " ,
None ,
None ,
true ,
) ;
assert! ( err . contains ( util ::PERMISSION_DENIED_PATTERN ) ) ;
}
#[ test ]
fn net_connect_allow_localhost_ip ( ) {
let ( _ , err ) = util ::run_and_collect_output (
true ,
" run --allow-net=127.0.0.1 run/complex_permissions_test.ts netConnect 127.0.0.1:4545 127.0.0.1:4546 127.0.0.1:4547 " ,
None ,
None ,
true ,
) ;
assert! ( ! err . contains ( util ::PERMISSION_DENIED_PATTERN ) ) ;
}
#[ test ]
fn net_listen_allow_localhost_4555 ( ) {
let ( _ , err ) = util ::run_and_collect_output (
true ,
" run --allow-net=localhost:4558 run/complex_permissions_test.ts netListen localhost:4558 " ,
None ,
None ,
false ,
) ;
assert! ( ! err . contains ( util ::PERMISSION_DENIED_PATTERN ) ) ;
}
#[ test ]
fn net_listen_allow_deno_land ( ) {
let ( _ , err ) = util ::run_and_collect_output (
false ,
" run --allow-net=deno.land run/complex_permissions_test.ts netListen localhost:4545 " ,
None ,
None ,
false ,
) ;
assert! ( err . contains ( util ::PERMISSION_DENIED_PATTERN ) ) ;
}
#[ test ]
fn net_listen_allow_localhost_4555_fail ( ) {
let ( _ , err ) = util ::run_and_collect_output (
false ,
" run --allow-net=localhost:4555 run/complex_permissions_test.ts netListen localhost:4556 " ,
None ,
None ,
false ,
) ;
assert! ( err . contains ( util ::PERMISSION_DENIED_PATTERN ) ) ;
}
#[ test ]
fn net_listen_allow_localhost ( ) {
// Port 4600 is chosen to not colide with those used by
// target/debug/test_server
let ( _ , err ) = util ::run_and_collect_output (
true ,
" run --allow-net=localhost run/complex_permissions_test.ts netListen localhost:4600 " ,
None ,
None ,
false ,
) ;
assert! ( ! err . contains ( util ::PERMISSION_DENIED_PATTERN ) ) ;
}
#[ test ]
fn _061_permissions_request ( ) {
let args = " run --quiet run/061_permissions_request.ts " ;
use util ::PtyData ::* ;
util ::test_pty2 ( args , vec! [
Output ( " ⚠️ ️ Deno requests read access to \" foo \" . Run again with --allow-read to bypass this prompt. \r \n Allow? [y/n (y = yes allow, n = no deny)] " ) ,
Input ( " y \n " ) ,
Output ( " ⚠️ ️ Deno requests read access to \" bar \" . Run again with --allow-read to bypass this prompt. \r \n Allow? [y/n (y = yes allow, n = no deny)] " ) ,
Input ( " n \n " ) ,
Output ( " granted \r \n " ) ,
Output ( " prompt \r \n " ) ,
Output ( " denied \r \n " ) ,
] ) ;
}
2023-01-24 18:42:44 -05:00
#[ test ]
fn _061_permissions_request_sync ( ) {
let args = " run --quiet run/061_permissions_request_sync.ts " ;
use util ::PtyData ::* ;
util ::test_pty2 ( args , vec! [
Output ( " ⚠️ ️ Deno requests read access to \" foo \" . Run again with --allow-read to bypass this prompt. \r \n Allow? [y/n (y = yes allow, n = no deny)] " ) ,
Input ( " y \n " ) ,
Output ( " ⚠️ ️ Deno requests read access to \" bar \" . Run again with --allow-read to bypass this prompt. \r \n Allow? [y/n (y = yes allow, n = no deny)] " ) ,
Input ( " n \n " ) ,
Output ( " granted \r \n " ) ,
Output ( " prompt \r \n " ) ,
Output ( " denied \r \n " ) ,
] ) ;
}
2023-01-12 20:59:13 -05:00
#[ test ]
fn _062_permissions_request_global ( ) {
let args = " run --quiet run/062_permissions_request_global.ts " ;
use util ::PtyData ::* ;
util ::test_pty2 ( args , vec! [
Output ( " ⚠️ ️ Deno requests read access. Run again with --allow-read to bypass this prompt. \r \n Allow? [y/n (y = yes allow, n = no deny)] " ) ,
Input ( " y \n " ) ,
Output ( " PermissionStatus { state: \" granted \" , onchange: null } \r \n " ) ,
Output ( " PermissionStatus { state: \" granted \" , onchange: null } \r \n " ) ,
Output ( " PermissionStatus { state: \" granted \" , onchange: null } \r \n " ) ,
] ) ;
}
2023-01-24 18:42:44 -05:00
#[ test ]
fn _062_permissions_request_global_sync ( ) {
let args = " run --quiet run/062_permissions_request_global_sync.ts " ;
use util ::PtyData ::* ;
util ::test_pty2 ( args , vec! [
Output ( " ⚠️ ️ Deno requests read access. Run again with --allow-read to bypass this prompt. \r \n Allow? [y/n (y = yes allow, n = no deny)] " ) ,
Input ( " y \n " ) ,
Output ( " PermissionStatus { state: \" granted \" , onchange: null } \r \n " ) ,
Output ( " PermissionStatus { state: \" granted \" , onchange: null } \r \n " ) ,
Output ( " PermissionStatus { state: \" granted \" , onchange: null } \r \n " ) ,
] ) ;
}
2023-01-12 20:59:13 -05:00
itest! ( _063_permissions_revoke {
args : " run --allow-read=foo,bar run/063_permissions_revoke.ts " ,
output : " run/063_permissions_revoke.ts.out " ,
} ) ;
2023-01-24 18:42:44 -05:00
itest! ( _063_permissions_revoke_sync {
args : " run --allow-read=foo,bar run/063_permissions_revoke_sync.ts " ,
output : " run/063_permissions_revoke.ts.out " ,
} ) ;
2023-01-12 20:59:13 -05:00
itest! ( _064_permissions_revoke_global {
args : " run --allow-read=foo,bar run/064_permissions_revoke_global.ts " ,
output : " run/064_permissions_revoke_global.ts.out " ,
} ) ;
2023-01-24 18:42:44 -05:00
itest! ( _064_permissions_revoke_global_sync {
args : " run --allow-read=foo,bar run/064_permissions_revoke_global_sync.ts " ,
output : " run/064_permissions_revoke_global.ts.out " ,
} ) ;
2023-01-12 20:59:13 -05:00
#[ test ]
fn _066_prompt ( ) {
let args = " run --quiet --unstable run/066_prompt.ts " ;
use util ::PtyData ::* ;
util ::test_pty2 (
args ,
vec! [
Output ( " What is your name? [Jane Doe] " ) ,
Input ( " John Doe \n " ) ,
Output ( " Your name is John Doe. \r \n " ) ,
Output ( " What is your name? [Jane Doe] " ) ,
Input ( " \n " ) ,
Output ( " Your name is Jane Doe. \r \n " ) ,
Output ( " Prompt " ) ,
Input ( " foo \n " ) ,
Output ( " Your input is foo. \r \n " ) ,
Output ( " Question 0 [y/N] " ) ,
Input ( " Y \n " ) ,
Output ( " Your answer is true \r \n " ) ,
Output ( " Question 1 [y/N] " ) ,
Input ( " N \n " ) ,
Output ( " Your answer is false \r \n " ) ,
Output ( " Question 2 [y/N] " ) ,
Input ( " yes \n " ) ,
Output ( " Your answer is false \r \n " ) ,
Output ( " Confirm [y/N] " ) ,
Input ( " \n " ) ,
Output ( " Your answer is false \r \n " ) ,
Output ( " What is Windows EOL? " ) ,
Input ( " windows \n " ) ,
Output ( " Your answer is \" windows \" \r \n " ) ,
Output ( " Hi [Enter] " ) ,
Input ( " \n " ) ,
Output ( " Alert [Enter] " ) ,
Input ( " \n " ) ,
Output ( " The end of test \r \n " ) ,
Output ( " What is EOF? " ) ,
Input ( " \n " ) ,
Output ( " Your answer is null \r \n " ) ,
] ,
) ;
}
itest! ( dynamic_import_permissions_remote_remote {
args : " run --quiet --reload --allow-net=localhost:4545 dynamic_import/permissions_remote_remote.ts " ,
output : " dynamic_import/permissions_remote_remote.ts.out " ,
http_server : true ,
exit_code : 1 ,
} ) ;
itest! ( dynamic_import_permissions_data_remote {
args : " run --quiet --reload --allow-net=localhost:4545 dynamic_import/permissions_data_remote.ts " ,
output : " dynamic_import/permissions_data_remote.ts.out " ,
http_server : true ,
exit_code : 1 ,
} ) ;
itest! ( dynamic_import_permissions_blob_remote {
args : " run --quiet --reload --allow-net=localhost:4545 dynamic_import/permissions_blob_remote.ts " ,
output : " dynamic_import/permissions_blob_remote.ts.out " ,
http_server : true ,
exit_code : 1 ,
} ) ;
itest! ( dynamic_import_permissions_data_local {
args : " run --quiet --reload --allow-net=localhost:4545 dynamic_import/permissions_data_local.ts " ,
output : " dynamic_import/permissions_data_local.ts.out " ,
http_server : true ,
exit_code : 1 ,
} ) ;
itest! ( dynamic_import_permissions_blob_local {
args : " run --quiet --reload --allow-net=localhost:4545 dynamic_import/permissions_blob_local.ts " ,
output : " dynamic_import/permissions_blob_local.ts.out " ,
http_server : true ,
exit_code : 1 ,
} ) ;
}
itest! ( tls_starttls {
args : " run --quiet --reload --allow-net --allow-read --unstable --cert tls/RootCA.pem run/tls_starttls.js " ,
output : " run/tls.out " ,
} ) ;
itest! ( tls_connecttls {
args : " run --quiet --reload --allow-net --allow-read --cert tls/RootCA.pem run/tls_connecttls.js " ,
output : " run/tls.out " ,
} ) ;
itest! ( byte_order_mark {
args : " run --no-check run/byte_order_mark.ts " ,
output : " run/byte_order_mark.out " ,
} ) ;
#[ test ]
fn issue9750 ( ) {
use util ::PtyData ::* ;
util ::test_pty2 (
" run --prompt run/issue9750.js " ,
vec! [
Output ( " Enter 'yy': \r \n " ) ,
Input ( " yy \n " ) ,
Output ( " ⚠️ ️ Deno requests env access. Run again with --allow-env to bypass this prompt. \r \n Allow? [y/n (y = yes allow, n = no deny)] " ) ,
Input ( " n \n " ) ,
Output ( " ⚠️ ️ Deno requests env access to \" SECRET \" . Run again with --allow-env to bypass this prompt. \r \n Allow? [y/n (y = yes allow, n = no deny)] " ) ,
Input ( " n \n " ) ,
Output ( " error: Uncaught (in promise) PermissionDenied: Requires env access to \" SECRET \" , run again with the --allow-env flag \r \n " ) ,
] ,
) ;
}
// Regression test for https://github.com/denoland/deno/issues/11451.
itest! ( dom_exception_formatting {
args : " run run/dom_exception_formatting.ts " ,
output : " run/dom_exception_formatting.ts.out " ,
exit_code : 1 ,
} ) ;
itest! ( long_data_url_formatting {
args : " run run/long_data_url_formatting.ts " ,
output : " run/long_data_url_formatting.ts.out " ,
exit_code : 1 ,
} ) ;
itest! ( eval_context_throw_dom_exception {
args : " run run/eval_context_throw_dom_exception.js " ,
output : " run/eval_context_throw_dom_exception.js.out " ,
} ) ;
#[ test ]
#[ cfg(unix) ]
fn navigator_language_unix ( ) {
let ( res , _ ) = util ::run_and_collect_output (
true ,
" run navigator_language.ts " ,
None ,
Some ( vec! [ ( " LC_ALL " . to_owned ( ) , " pl_PL " . to_owned ( ) ) ] ) ,
false ,
) ;
assert_eq! ( res , " pl-PL \n " )
}
#[ test ]
fn navigator_language ( ) {
let ( res , _ ) = util ::run_and_collect_output (
true ,
" run navigator_language.ts " ,
None ,
None ,
false ,
) ;
assert! ( ! res . is_empty ( ) )
}
#[ test ]
#[ cfg(unix) ]
fn navigator_languages_unix ( ) {
let ( res , _ ) = util ::run_and_collect_output (
true ,
" run navigator_languages.ts " ,
None ,
Some ( vec! [
( " LC_ALL " . to_owned ( ) , " pl_PL " . to_owned ( ) ) ,
( " NO_COLOR " . to_owned ( ) , " 1 " . to_owned ( ) ) ,
] ) ,
false ,
) ;
assert_eq! ( res , " [ \" pl-PL \" ] \n " )
}
#[ test ]
fn navigator_languages ( ) {
let ( res , _ ) = util ::run_and_collect_output (
true ,
" run navigator_languages.ts " ,
None ,
None ,
false ,
) ;
assert! ( ! res . is_empty ( ) )
}
/// Regression test for https://github.com/denoland/deno/issues/12740.
#[ test ]
fn issue12740 ( ) {
let mod_dir = TempDir ::new ( ) ;
let mod1_path = mod_dir . path ( ) . join ( " mod1.ts " ) ;
let mod2_path = mod_dir . path ( ) . join ( " mod2.ts " ) ;
let mut deno_cmd = util ::deno_cmd ( ) ;
std ::fs ::write ( & mod1_path , " " ) . unwrap ( ) ;
let status = deno_cmd
. current_dir ( util ::testdata_path ( ) )
. arg ( " run " )
. arg ( & mod1_path )
. stderr ( Stdio ::null ( ) )
. stdout ( Stdio ::null ( ) )
. spawn ( )
. unwrap ( )
. wait ( )
. unwrap ( ) ;
assert! ( status . success ( ) ) ;
std ::fs ::write ( & mod1_path , " export { foo } from \" ./mod2.ts \" ; " ) . unwrap ( ) ;
std ::fs ::write ( mod2_path , " ( " ) . unwrap ( ) ;
let status = deno_cmd
. current_dir ( util ::testdata_path ( ) )
. arg ( " run " )
. arg ( & mod1_path )
. stderr ( Stdio ::null ( ) )
. stdout ( Stdio ::null ( ) )
. spawn ( )
. unwrap ( )
. wait ( )
. unwrap ( ) ;
assert! ( ! status . success ( ) ) ;
}
/// Regression test for https://github.com/denoland/deno/issues/12807.
#[ test ]
fn issue12807 ( ) {
let mod_dir = TempDir ::new ( ) ;
let mod1_path = mod_dir . path ( ) . join ( " mod1.ts " ) ;
let mod2_path = mod_dir . path ( ) . join ( " mod2.ts " ) ;
let mut deno_cmd = util ::deno_cmd ( ) ;
// With a fresh `DENO_DIR`, run a module with a dependency and a type error.
std ::fs ::write ( & mod1_path , " import './mod2.ts'; Deno.exit('0'); " ) . unwrap ( ) ;
std ::fs ::write ( mod2_path , " console.log('Hello, world!'); " ) . unwrap ( ) ;
let status = deno_cmd
. current_dir ( util ::testdata_path ( ) )
. arg ( " run " )
. arg ( " --check " )
. arg ( & mod1_path )
. stderr ( Stdio ::null ( ) )
. stdout ( Stdio ::null ( ) )
. spawn ( )
. unwrap ( )
. wait ( )
. unwrap ( ) ;
assert! ( ! status . success ( ) ) ;
// Fix the type error and run again.
std ::fs ::write ( & mod1_path , " import './mod2.ts'; Deno.exit(0); " ) . unwrap ( ) ;
let status = deno_cmd
. current_dir ( util ::testdata_path ( ) )
. arg ( " run " )
. arg ( " --check " )
. arg ( & mod1_path )
. stderr ( Stdio ::null ( ) )
. stdout ( Stdio ::null ( ) )
. spawn ( )
. unwrap ( )
. wait ( )
. unwrap ( ) ;
assert! ( status . success ( ) ) ;
}
itest! ( issue_13562 {
args : " run run/issue13562.ts " ,
output : " run/issue13562.ts.out " ,
} ) ;
itest! ( import_assertions_static_import {
args : " run --allow-read import_assertions/static_import.ts " ,
output : " import_assertions/static_import.out " ,
} ) ;
itest! ( import_assertions_static_export {
args : " run --allow-read import_assertions/static_export.ts " ,
output : " import_assertions/static_export.out " ,
} ) ;
itest! ( import_assertions_static_error {
args : " run --allow-read import_assertions/static_error.ts " ,
output : " import_assertions/static_error.out " ,
exit_code : 1 ,
} ) ;
itest! ( import_assertions_dynamic_import {
args : " run --allow-read import_assertions/dynamic_import.ts " ,
output : " import_assertions/dynamic_import.out " ,
} ) ;
itest! ( import_assertions_dynamic_error {
args : " run --allow-read import_assertions/dynamic_error.ts " ,
output : " import_assertions/dynamic_error.out " ,
exit_code : 1 ,
} ) ;
itest! ( import_assertions_type_check {
args : " run --allow-read --check import_assertions/type_check.ts " ,
output : " import_assertions/type_check.out " ,
exit_code : 1 ,
} ) ;
itest! ( delete_window {
args : " run run/delete_window.js " ,
output_str : Some ( " true \n " ) ,
} ) ;
itest! ( colors_without_global_this {
args : " run run/colors_without_globalThis.js " ,
output_str : Some ( " true \n " ) ,
} ) ;
itest! ( config_auto_discovered_for_local_script {
args : " run --quiet run/with_config/frontend_work.ts " ,
output_str : Some ( " ok \n " ) ,
} ) ;
2023-01-24 09:41:22 -05:00
itest! ( config_auto_discovered_for_local_script_log {
args : " run -L debug run/with_config/frontend_work.ts " ,
output : " run/with_config/auto_discovery_log.out " ,
} ) ;
2023-01-12 20:59:13 -05:00
itest! ( no_config_auto_discovery_for_local_script {
args : " run --quiet --no-config --check run/with_config/frontend_work.ts " ,
output : " run/with_config/no_auto_discovery.out " ,
exit_code : 1 ,
} ) ;
itest! ( config_not_auto_discovered_for_remote_script {
args : " run --quiet http://127.0.0.1:4545/run/with_config/server_side_work.ts " ,
output_str : Some ( " ok \n " ) ,
http_server : true ,
} ) ;
2023-02-20 13:14:06 -05:00
itest! ( package_json_auto_discovered_for_local_script_log {
2023-02-22 17:21:05 -05:00
args : " run -L debug -A no_deno_json/main.ts " ,
2023-02-20 13:14:06 -05:00
output : " run/with_package_json/no_deno_json/main.out " ,
2023-02-22 22:45:35 -05:00
cwd : Some ( " run/with_package_json/ " ) ,
2023-02-22 20:16:16 -05:00
// prevent creating a node_modules dir in the code directory
copy_temp_dir : Some ( " run/with_package_json/ " ) ,
2023-02-20 13:14:06 -05:00
envs : env_vars_for_npm_tests_no_sync_download ( ) ,
http_server : true ,
} ) ;
// In this case we shouldn't discover `package.json` file, because it's in a
// directory that is above the directory containing `deno.json` file.
itest! (
package_json_auto_discovered_for_local_script_log_with_stop {
args : " run -L debug with_stop/some/nested/dir/main.ts " ,
output : " run/with_package_json/with_stop/main.out " ,
2023-02-22 22:45:35 -05:00
cwd : Some ( " run/with_package_json/ " ) ,
2023-02-22 20:16:16 -05:00
copy_temp_dir : Some ( " run/with_package_json/ " ) ,
2023-02-20 13:14:06 -05:00
envs : env_vars_for_npm_tests_no_sync_download ( ) ,
http_server : true ,
2023-02-22 17:21:05 -05:00
exit_code : 1 ,
2023-02-20 13:14:06 -05:00
}
) ;
2023-02-22 20:16:16 -05:00
itest! (
package_json_auto_discovered_node_modules_relative_package_json {
args : " run -A main.js " ,
output : " run/with_package_json/no_deno_json/sub_dir/main.out " ,
2023-02-22 22:45:35 -05:00
cwd : Some ( " run/with_package_json/no_deno_json/sub_dir " ) ,
2023-02-22 20:16:16 -05:00
copy_temp_dir : Some ( " run/with_package_json/ " ) ,
envs : env_vars_for_npm_tests_no_sync_download ( ) ,
http_server : true ,
}
) ;
2023-02-20 13:14:06 -05:00
itest! ( package_json_auto_discovered_for_npm_binary {
args : " run -L debug -A npm:@denotest/bin/cli-esm this is a test " ,
output : " run/with_package_json/npm_binary/main.out " ,
2023-02-22 22:45:35 -05:00
cwd : Some ( " run/with_package_json/npm_binary/ " ) ,
2023-02-22 20:16:16 -05:00
copy_temp_dir : Some ( " run/with_package_json/ " ) ,
2023-02-20 13:14:06 -05:00
envs : env_vars_for_npm_tests_no_sync_download ( ) ,
http_server : true ,
} ) ;
2023-01-12 20:59:13 -05:00
itest! ( wasm_streaming_panic_test {
args : " run run/wasm_streaming_panic_test.js " ,
output : " run/wasm_streaming_panic_test.js.out " ,
exit_code : 1 ,
} ) ;
// Regression test for https://github.com/denoland/deno/issues/13897.
itest! ( fetch_async_error_stack {
args : " run --quiet -A run/fetch_async_error_stack.ts " ,
output : " run/fetch_async_error_stack.ts.out " ,
exit_code : 1 ,
} ) ;
itest! ( unstable_ffi_1 {
args : " run run/ffi/unstable_ffi_1.js " ,
output : " run/ffi/unstable_ffi_1.js.out " ,
exit_code : 70 ,
} ) ;
itest! ( unstable_ffi_2 {
args : " run run/ffi/unstable_ffi_2.js " ,
output : " run/ffi/unstable_ffi_2.js.out " ,
exit_code : 70 ,
} ) ;
itest! ( unstable_ffi_3 {
args : " run run/ffi/unstable_ffi_3.js " ,
output : " run/ffi/unstable_ffi_3.js.out " ,
exit_code : 70 ,
} ) ;
itest! ( unstable_ffi_4 {
args : " run run/ffi/unstable_ffi_4.js " ,
output : " run/ffi/unstable_ffi_4.js.out " ,
exit_code : 70 ,
} ) ;
itest! ( unstable_ffi_5 {
args : " run run/ffi/unstable_ffi_5.js " ,
output : " run/ffi/unstable_ffi_5.js.out " ,
exit_code : 70 ,
} ) ;
itest! ( unstable_ffi_6 {
args : " run run/ffi/unstable_ffi_6.js " ,
output : " run/ffi/unstable_ffi_6.js.out " ,
exit_code : 70 ,
} ) ;
itest! ( unstable_ffi_7 {
args : " run run/ffi/unstable_ffi_7.js " ,
output : " run/ffi/unstable_ffi_7.js.out " ,
exit_code : 70 ,
} ) ;
itest! ( unstable_ffi_8 {
args : " run run/ffi/unstable_ffi_8.js " ,
output : " run/ffi/unstable_ffi_8.js.out " ,
exit_code : 70 ,
} ) ;
itest! ( unstable_ffi_9 {
args : " run run/ffi/unstable_ffi_9.js " ,
output : " run/ffi/unstable_ffi_9.js.out " ,
exit_code : 70 ,
} ) ;
itest! ( unstable_ffi_10 {
args : " run run/ffi/unstable_ffi_10.js " ,
output : " run/ffi/unstable_ffi_10.js.out " ,
exit_code : 70 ,
} ) ;
itest! ( unstable_ffi_11 {
args : " run run/ffi/unstable_ffi_11.js " ,
output : " run/ffi/unstable_ffi_11.js.out " ,
exit_code : 70 ,
} ) ;
itest! ( unstable_ffi_12 {
args : " run run/ffi/unstable_ffi_12.js " ,
output : " run/ffi/unstable_ffi_12.js.out " ,
exit_code : 70 ,
} ) ;
itest! ( unstable_ffi_13 {
args : " run run/ffi/unstable_ffi_13.js " ,
output : " run/ffi/unstable_ffi_13.js.out " ,
exit_code : 70 ,
} ) ;
itest! ( unstable_ffi_14 {
args : " run run/ffi/unstable_ffi_14.js " ,
output : " run/ffi/unstable_ffi_14.js.out " ,
exit_code : 70 ,
} ) ;
itest! ( unstable_ffi_15 {
args : " run run/ffi/unstable_ffi_15.js " ,
output : " run/ffi/unstable_ffi_15.js.out " ,
exit_code : 70 ,
} ) ;
2023-02-22 12:32:38 -05:00
itest! ( unstable_ffi_16 {
args : " run run/ffi/unstable_ffi_16.js " ,
output : " run/ffi/unstable_ffi_16.js.out " ,
exit_code : 70 ,
} ) ;
itest! ( unstable_ffi_17 {
args : " run run/ffi/unstable_ffi_17.js " ,
output : " run/ffi/unstable_ffi_17.js.out " ,
exit_code : 70 ,
} ) ;
itest! ( unstable_ffi_18 {
args : " run run/ffi/unstable_ffi_18.js " ,
output : " run/ffi/unstable_ffi_18.js.out " ,
exit_code : 70 ,
} ) ;
itest! ( unstable_ffi_19 {
args : " run run/ffi/unstable_ffi_19.js " ,
output : " run/ffi/unstable_ffi_19.js.out " ,
exit_code : 70 ,
} ) ;
2023-01-12 20:59:13 -05:00
itest! ( future_check2 {
args : " run --check run/future_check.ts " ,
output : " run/future_check2.out " ,
} ) ;
itest! ( event_listener_error {
args : " run --quiet run/event_listener_error.ts " ,
output : " run/event_listener_error.ts.out " ,
exit_code : 1 ,
} ) ;
itest! ( event_listener_error_handled {
args : " run --quiet run/event_listener_error_handled.ts " ,
output : " run/event_listener_error_handled.ts.out " ,
} ) ;
// https://github.com/denoland/deno/pull/14159#issuecomment-1092285446
itest! ( event_listener_error_immediate_exit {
args : " run --quiet run/event_listener_error_immediate_exit.ts " ,
output : " run/event_listener_error_immediate_exit.ts.out " ,
exit_code : 1 ,
} ) ;
// https://github.com/denoland/deno/pull/14159#issuecomment-1092285446
itest! ( event_listener_error_immediate_exit_worker {
args :
" run --quiet --unstable -A run/event_listener_error_immediate_exit_worker.ts " ,
output : " run/event_listener_error_immediate_exit_worker.ts.out " ,
exit_code : 1 ,
} ) ;
itest! ( set_timeout_error {
args : " run --quiet run/set_timeout_error.ts " ,
output : " run/set_timeout_error.ts.out " ,
exit_code : 1 ,
} ) ;
itest! ( set_timeout_error_handled {
args : " run --quiet run/set_timeout_error_handled.ts " ,
output : " run/set_timeout_error_handled.ts.out " ,
} ) ;
itest! ( aggregate_error {
args : " run --quiet run/aggregate_error.ts " ,
output : " run/aggregate_error.out " ,
exit_code : 1 ,
} ) ;
itest! ( complex_error {
args : " run --quiet run/complex_error.ts " ,
output : " run/complex_error.ts.out " ,
exit_code : 1 ,
} ) ;
// Regression test for https://github.com/denoland/deno/issues/16340.
itest! ( error_with_errors_prop {
args : " run --quiet run/error_with_errors_prop.js " ,
output : " run/error_with_errors_prop.js.out " ,
exit_code : 1 ,
} ) ;
// Regression test for https://github.com/denoland/deno/issues/12143.
itest! ( js_root_with_ts_check {
args : " run --quiet --check run/js_root_with_ts_check.js " ,
output : " run/js_root_with_ts_check.js.out " ,
exit_code : 1 ,
} ) ;
#[ test ]
fn check_local_then_remote ( ) {
let _http_guard = util ::http_server ( ) ;
let deno_dir = util ::new_deno_dir ( ) ;
let output = util ::deno_cmd_with_deno_dir ( & deno_dir )
. current_dir ( util ::testdata_path ( ) )
. arg ( " run " )
. arg ( " --check " )
. arg ( " run/remote_type_error/main.ts " )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
assert! ( output . status . success ( ) ) ;
let output = util ::deno_cmd_with_deno_dir ( & deno_dir )
. current_dir ( util ::testdata_path ( ) )
. arg ( " run " )
. arg ( " --check=all " )
. arg ( " run/remote_type_error/main.ts " )
. env ( " NO_COLOR " , " 1 " )
. stderr ( Stdio ::piped ( ) )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
assert! ( ! output . status . success ( ) ) ;
let stderr = std ::str ::from_utf8 ( & output . stderr ) . unwrap ( ) ;
assert_contains! ( stderr , " Type 'string' is not assignable to type 'number'. " ) ;
}
// Regression test for https://github.com/denoland/deno/issues/15163
itest! ( check_js_points_to_ts {
args : " run --quiet --check --config run/checkjs.tsconfig.json run/check_js_points_to_ts/test.js " ,
output : " run/check_js_points_to_ts/test.js.out " ,
exit_code : 1 ,
} ) ;
itest! ( no_prompt_flag {
args : " run --quiet --unstable --no-prompt run/no_prompt.ts " ,
output_str : Some ( " " ) ,
} ) ;
#[ test ]
fn deno_no_prompt_environment_variable ( ) {
let output = util ::deno_cmd ( )
. current_dir ( util ::testdata_path ( ) )
. arg ( " run " )
. arg ( " --unstable " )
. arg ( " run/no_prompt.ts " )
. env ( " DENO_NO_PROMPT " , " 1 " )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
assert! ( output . status . success ( ) ) ;
}
itest! ( report_error {
args : " run --quiet run/report_error.ts " ,
output : " run/report_error.ts.out " ,
exit_code : 1 ,
} ) ;
itest! ( report_error_handled {
args : " run --quiet run/report_error_handled.ts " ,
output : " run/report_error_handled.ts.out " ,
} ) ;
// Regression test for https://github.com/denoland/deno/issues/15513.
itest! ( report_error_end_of_program {
args : " run --quiet run/report_error_end_of_program.ts " ,
output : " run/report_error_end_of_program.ts.out " ,
exit_code : 1 ,
} ) ;
itest! ( queue_microtask_error {
args : " run --quiet run/queue_microtask_error.ts " ,
output : " run/queue_microtask_error.ts.out " ,
exit_code : 1 ,
} ) ;
itest! ( queue_microtask_error_handled {
args : " run --quiet run/queue_microtask_error_handled.ts " ,
output : " run/queue_microtask_error_handled.ts.out " ,
} ) ;
itest! ( spawn_stdout_inherit {
args : " run --quiet --unstable -A run/spawn_stdout_inherit.ts " ,
output : " run/spawn_stdout_inherit.ts.out " ,
} ) ;
itest! ( error_name_non_string {
args : " run --quiet run/error_name_non_string.js " ,
output : " run/error_name_non_string.js.out " ,
exit_code : 1 ,
} ) ;
itest! ( custom_inspect_url {
args : " run run/custom_inspect_url.js " ,
output : " run/custom_inspect_url.js.out " ,
} ) ;
itest! ( config_json_import {
args : " run --quiet -c jsx/deno-jsx.json run/config_json_import.ts " ,
output : " run/config_json_import.ts.out " ,
http_server : true ,
} ) ;
#[ test ]
fn running_declaration_files ( ) {
let temp_dir = TempDir ::new ( ) ;
let files = vec! [ " file.d.ts " , " file.d.cts " , " file.d.mts " ] ;
for file in files {
temp_dir . write ( file , " " ) ;
let mut deno_cmd = util ::deno_cmd_with_deno_dir ( & temp_dir ) ;
let output = deno_cmd
. current_dir ( temp_dir . path ( ) )
. args ( [ " run " , file ] )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
assert! ( output . status . success ( ) ) ;
}
}
itest! ( test_and_bench_are_noops_in_run {
args : " run run/test_and_bench_in_run.js " ,
output_str : Some ( " " ) ,
} ) ;
itest! ( followup_dyn_import_resolved {
args : " run --unstable --allow-read run/followup_dyn_import_resolves/main.ts " ,
output : " run/followup_dyn_import_resolves/main.ts.out " ,
} ) ;
itest! ( unhandled_rejection {
args : " run --check run/unhandled_rejection.ts " ,
output : " run/unhandled_rejection.ts.out " ,
} ) ;
itest! ( unhandled_rejection_sync_error {
args : " run --check run/unhandled_rejection_sync_error.ts " ,
output : " run/unhandled_rejection_sync_error.ts.out " ,
} ) ;
// Regression test for https://github.com/denoland/deno/issues/15661
itest! ( unhandled_rejection_dynamic_import {
args : " run --allow-read run/unhandled_rejection_dynamic_import/main.ts " ,
output : " run/unhandled_rejection_dynamic_import/main.ts.out " ,
exit_code : 1 ,
} ) ;
// Regression test for https://github.com/denoland/deno/issues/16909
itest! ( unhandled_rejection_dynamic_import2 {
args : " run --allow-read run/unhandled_rejection_dynamic_import2/main.ts " ,
output : " run/unhandled_rejection_dynamic_import2/main.ts.out " ,
} ) ;
itest! ( nested_error {
args : " run run/nested_error.ts " ,
output : " run/nested_error.ts.out " ,
exit_code : 1 ,
} ) ;
itest! ( node_env_var_allowlist {
args : " run --unstable --no-prompt run/node_env_var_allowlist.ts " ,
output : " run/node_env_var_allowlist.ts.out " ,
exit_code : 1 ,
} ) ;
#[ test ]
fn cache_test ( ) {
let _g = util ::http_server ( ) ;
let deno_dir = TempDir ::new ( ) ;
let module_url =
url ::Url ::parse ( " http://localhost:4545/run/006_url_imports.ts " ) . unwrap ( ) ;
let output = Command ::new ( util ::deno_exe_path ( ) )
. env ( " DENO_DIR " , deno_dir . path ( ) )
. current_dir ( util ::testdata_path ( ) )
. arg ( " cache " )
. arg ( " --check=all " )
. arg ( " -L " )
. arg ( " debug " )
. arg ( module_url . to_string ( ) )
. output ( )
. expect ( " Failed to spawn script " ) ;
assert! ( output . status . success ( ) ) ;
let prg = util ::deno_exe_path ( ) ;
let output = Command ::new ( prg )
. env ( " DENO_DIR " , deno_dir . path ( ) )
. env ( " HTTP_PROXY " , " http://nil " )
. env ( " NO_COLOR " , " 1 " )
. current_dir ( util ::testdata_path ( ) )
. arg ( " run " )
. arg ( module_url . to_string ( ) )
. output ( )
. expect ( " Failed to spawn script " ) ;
let str_output = std ::str ::from_utf8 ( & output . stdout ) . unwrap ( ) ;
let module_output_path =
util ::testdata_path ( ) . join ( " run/006_url_imports.ts.out " ) ;
let mut module_output = String ::new ( ) ;
let mut module_output_file = std ::fs ::File ::open ( module_output_path ) . unwrap ( ) ;
module_output_file
. read_to_string ( & mut module_output )
. unwrap ( ) ;
assert_eq! ( module_output , str_output ) ;
}
#[ test ]
fn cache_invalidation_test ( ) {
let deno_dir = TempDir ::new ( ) ;
let fixture_path = deno_dir . path ( ) . join ( " fixture.ts " ) ;
{
let mut file = std ::fs ::File ::create ( fixture_path . clone ( ) )
. expect ( " could not create fixture " ) ;
file
. write_all ( b " console.log( \" 42 \" ); " )
. expect ( " could not write fixture " ) ;
}
let output = Command ::new ( util ::deno_exe_path ( ) )
. env ( " DENO_DIR " , deno_dir . path ( ) )
. current_dir ( util ::testdata_path ( ) )
. arg ( " run " )
. arg ( fixture_path . to_str ( ) . unwrap ( ) )
. output ( )
. expect ( " Failed to spawn script " ) ;
assert! ( output . status . success ( ) ) ;
let actual = std ::str ::from_utf8 ( & output . stdout ) . unwrap ( ) ;
assert_eq! ( actual , " 42 \n " ) ;
{
let mut file = std ::fs ::File ::create ( fixture_path . clone ( ) )
. expect ( " could not create fixture " ) ;
file
. write_all ( b " console.log( \" 43 \" ); " )
. expect ( " could not write fixture " ) ;
}
let output = Command ::new ( util ::deno_exe_path ( ) )
. env ( " DENO_DIR " , deno_dir . path ( ) )
. current_dir ( util ::testdata_path ( ) )
. arg ( " run " )
. arg ( fixture_path . to_str ( ) . unwrap ( ) )
. output ( )
. expect ( " Failed to spawn script " ) ;
assert! ( output . status . success ( ) ) ;
let actual = std ::str ::from_utf8 ( & output . stdout ) . unwrap ( ) ;
assert_eq! ( actual , " 43 \n " ) ;
}
#[ test ]
fn cache_invalidation_test_no_check ( ) {
let deno_dir = TempDir ::new ( ) ;
let fixture_path = deno_dir . path ( ) . join ( " fixture.ts " ) ;
{
let mut file = std ::fs ::File ::create ( fixture_path . clone ( ) )
. expect ( " could not create fixture " ) ;
file
. write_all ( b " console.log( \" 42 \" ); " )
. expect ( " could not write fixture " ) ;
}
let output = Command ::new ( util ::deno_exe_path ( ) )
. env ( " DENO_DIR " , deno_dir . path ( ) )
. current_dir ( util ::testdata_path ( ) )
. arg ( " run " )
. arg ( " --no-check " )
. arg ( fixture_path . to_str ( ) . unwrap ( ) )
. output ( )
. expect ( " Failed to spawn script " ) ;
assert! ( output . status . success ( ) ) ;
let actual = std ::str ::from_utf8 ( & output . stdout ) . unwrap ( ) ;
assert_eq! ( actual , " 42 \n " ) ;
{
let mut file = std ::fs ::File ::create ( fixture_path . clone ( ) )
. expect ( " could not create fixture " ) ;
file
. write_all ( b " console.log( \" 43 \" ); " )
. expect ( " could not write fixture " ) ;
}
let output = Command ::new ( util ::deno_exe_path ( ) )
. env ( " DENO_DIR " , deno_dir . path ( ) )
. current_dir ( util ::testdata_path ( ) )
. arg ( " run " )
. arg ( " --no-check " )
. arg ( fixture_path . to_str ( ) . unwrap ( ) )
. output ( )
. expect ( " Failed to spawn script " ) ;
assert! ( output . status . success ( ) ) ;
let actual = std ::str ::from_utf8 ( & output . stdout ) . unwrap ( ) ;
assert_eq! ( actual , " 43 \n " ) ;
}
#[ test ]
fn ts_dependency_recompilation ( ) {
let t = TempDir ::new ( ) ;
let ats = t . path ( ) . join ( " a.ts " ) ;
std ::fs ::write (
& ats ,
"
import { foo } from \ " ./b.ts \" ;
function print ( str : string ) : void {
console . log ( str ) ;
}
print ( foo ) ; " ,
)
. unwrap ( ) ;
let bts = t . path ( ) . join ( " b.ts " ) ;
std ::fs ::write (
& bts ,
"
export const foo = \ " foo \" ; " ,
)
. unwrap ( ) ;
let output = util ::deno_cmd ( )
. current_dir ( util ::testdata_path ( ) )
. env ( " NO_COLOR " , " 1 " )
. arg ( " run " )
. arg ( " --check " )
. arg ( & ats )
. output ( )
. expect ( " failed to spawn script " ) ;
let stdout_output = std ::str ::from_utf8 ( & output . stdout ) . unwrap ( ) . trim ( ) ;
let stderr_output = std ::str ::from_utf8 ( & output . stderr ) . unwrap ( ) . trim ( ) ;
assert! ( stdout_output . ends_with ( " foo " ) ) ;
assert! ( stderr_output . starts_with ( " Check " ) ) ;
// Overwrite contents of b.ts and run again
std ::fs ::write (
& bts ,
"
export const foo = 5 ; " ,
)
. expect ( " error writing file " ) ;
let output = util ::deno_cmd ( )
. current_dir ( util ::testdata_path ( ) )
. env ( " NO_COLOR " , " 1 " )
. arg ( " run " )
. arg ( " --check " )
. arg ( & ats )
. output ( )
. expect ( " failed to spawn script " ) ;
let stdout_output = std ::str ::from_utf8 ( & output . stdout ) . unwrap ( ) . trim ( ) ;
let stderr_output = std ::str ::from_utf8 ( & output . stderr ) . unwrap ( ) . trim ( ) ;
// error: TS2345 [ERROR]: Argument of type '5' is not assignable to parameter of type 'string'.
assert! ( stderr_output . contains ( " TS2345 " ) ) ;
assert! ( ! output . status . success ( ) ) ;
assert! ( stdout_output . is_empty ( ) ) ;
}
#[ test ]
fn basic_auth_tokens ( ) {
let _g = util ::http_server ( ) ;
let output = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " run " )
. arg ( " http://127.0.0.1:4554/run/001_hello.js " )
. stdout ( std ::process ::Stdio ::piped ( ) )
. stderr ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
assert! ( ! output . status . success ( ) ) ;
let stdout_str = std ::str ::from_utf8 ( & output . stdout ) . unwrap ( ) . trim ( ) ;
assert! ( stdout_str . is_empty ( ) ) ;
let stderr_str = std ::str ::from_utf8 ( & output . stderr ) . unwrap ( ) . trim ( ) ;
2023-01-27 10:43:16 -05:00
eprintln! ( " {stderr_str} " ) ;
2023-01-12 20:59:13 -05:00
assert! ( stderr_str
. contains ( " Module not found \" http://127.0.0.1:4554/run/001_hello.js \" . " ) ) ;
let output = util ::deno_cmd ( )
. current_dir ( util ::root_path ( ) )
. arg ( " run " )
. arg ( " http://127.0.0.1:4554/run/001_hello.js " )
. env ( " DENO_AUTH_TOKENS " , " testuser123:testpassabc@127.0.0.1:4554 " )
. stdout ( std ::process ::Stdio ::piped ( ) )
. stderr ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
let stderr_str = std ::str ::from_utf8 ( & output . stderr ) . unwrap ( ) . trim ( ) ;
2023-01-27 10:43:16 -05:00
eprintln! ( " {stderr_str} " ) ;
2023-01-12 20:59:13 -05:00
assert! ( output . status . success ( ) ) ;
let stdout_str = std ::str ::from_utf8 ( & output . stdout ) . unwrap ( ) . trim ( ) ;
assert_eq! ( util ::strip_ansi_codes ( stdout_str ) , " Hello World " ) ;
}
#[ tokio::test(flavor = " multi_thread " , worker_threads = 2) ]
async fn test_resolve_dns ( ) {
use std ::net ::SocketAddr ;
use std ::str ::FromStr ;
use std ::sync ::Arc ;
use std ::time ::Duration ;
use tokio ::net ::TcpListener ;
use tokio ::net ::UdpSocket ;
use tokio ::sync ::oneshot ;
use trust_dns_server ::authority ::Catalog ;
use trust_dns_server ::authority ::ZoneType ;
use trust_dns_server ::proto ::rr ::Name ;
use trust_dns_server ::store ::in_memory ::InMemoryAuthority ;
use trust_dns_server ::ServerFuture ;
const DNS_PORT : u16 = 4553 ;
// Setup DNS server for testing
async fn run_dns_server ( tx : oneshot ::Sender < ( ) > ) {
let zone_file = std ::fs ::read_to_string (
util ::testdata_path ( ) . join ( " run/resolve_dns.zone.in " ) ,
)
. unwrap ( ) ;
let lexer = Lexer ::new ( & zone_file ) ;
let records = Parser ::new ( ) . parse (
lexer ,
Some ( Name ::from_str ( " example.com " ) . unwrap ( ) ) ,
None ,
) ;
if records . is_err ( ) {
panic! ( " failed to parse: {:?} " , records . err ( ) )
}
let ( origin , records ) = records . unwrap ( ) ;
let authority = Box ::new ( Arc ::new (
InMemoryAuthority ::new ( origin , records , ZoneType ::Primary , false )
. unwrap ( ) ,
) ) ;
let mut catalog : Catalog = Catalog ::new ( ) ;
catalog . upsert ( Name ::root ( ) . into ( ) , authority ) ;
let mut server_fut = ServerFuture ::new ( catalog ) ;
let socket_addr = SocketAddr ::from ( ( [ 127 , 0 , 0 , 1 ] , DNS_PORT ) ) ;
let tcp_listener = TcpListener ::bind ( socket_addr ) . await . unwrap ( ) ;
let udp_socket = UdpSocket ::bind ( socket_addr ) . await . unwrap ( ) ;
server_fut . register_socket ( udp_socket ) ;
server_fut . register_listener ( tcp_listener , Duration ::from_secs ( 2 ) ) ;
// Notifies that the DNS server is ready
tx . send ( ( ) ) . unwrap ( ) ;
server_fut . block_until_done ( ) . await . unwrap ( ) ;
}
let ( ready_tx , ready_rx ) = oneshot ::channel ( ) ;
let dns_server_fut = run_dns_server ( ready_tx ) ;
let handle = tokio ::spawn ( dns_server_fut ) ;
// Waits for the DNS server to be ready
ready_rx . await . unwrap ( ) ;
// Pass: `--allow-net`
{
let output = util ::deno_cmd ( )
. current_dir ( util ::testdata_path ( ) )
. env ( " NO_COLOR " , " 1 " )
. arg ( " run " )
. arg ( " --check " )
. arg ( " --allow-net " )
. arg ( " run/resolve_dns.ts " )
. stdout ( std ::process ::Stdio ::piped ( ) )
. stderr ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
let err = String ::from_utf8_lossy ( & output . stderr ) ;
let out = String ::from_utf8_lossy ( & output . stdout ) ;
2023-01-27 10:43:16 -05:00
println! ( " {err} " ) ;
2023-01-12 20:59:13 -05:00
assert! ( output . status . success ( ) ) ;
assert! ( err . starts_with ( " Check file " ) ) ;
let expected = std ::fs ::read_to_string (
util ::testdata_path ( ) . join ( " run/resolve_dns.ts.out " ) ,
)
. unwrap ( ) ;
assert_eq! ( expected , out ) ;
}
// Pass: `--allow-net=127.0.0.1:4553`
{
let output = util ::deno_cmd ( )
. current_dir ( util ::testdata_path ( ) )
. env ( " NO_COLOR " , " 1 " )
. arg ( " run " )
. arg ( " --check " )
. arg ( " --allow-net=127.0.0.1:4553 " )
. arg ( " run/resolve_dns.ts " )
. stdout ( std ::process ::Stdio ::piped ( ) )
. stderr ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
let err = String ::from_utf8_lossy ( & output . stderr ) ;
let out = String ::from_utf8_lossy ( & output . stdout ) ;
2023-02-15 11:30:54 -05:00
if ! output . status . success ( ) {
eprintln! ( " stderr: {err} " ) ;
}
2023-01-12 20:59:13 -05:00
assert! ( output . status . success ( ) ) ;
assert! ( err . starts_with ( " Check file " ) ) ;
let expected = std ::fs ::read_to_string (
util ::testdata_path ( ) . join ( " run/resolve_dns.ts.out " ) ,
)
. unwrap ( ) ;
assert_eq! ( expected , out ) ;
}
// Permission error: `--allow-net=deno.land`
{
let output = util ::deno_cmd ( )
. current_dir ( util ::testdata_path ( ) )
. env ( " NO_COLOR " , " 1 " )
. arg ( " run " )
. arg ( " --check " )
. arg ( " --allow-net=deno.land " )
. arg ( " run/resolve_dns.ts " )
. stdout ( std ::process ::Stdio ::piped ( ) )
. stderr ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
let err = String ::from_utf8_lossy ( & output . stderr ) ;
let out = String ::from_utf8_lossy ( & output . stdout ) ;
assert! ( ! output . status . success ( ) ) ;
assert! ( err . starts_with ( " Check file " ) ) ;
assert! ( err . contains ( r # "error: Uncaught PermissionDenied: Requires net access to "127.0.0.1:4553""# ) ) ;
assert! ( out . is_empty ( ) ) ;
}
// Permission error: no permission specified
{
let output = util ::deno_cmd ( )
. current_dir ( util ::testdata_path ( ) )
. env ( " NO_COLOR " , " 1 " )
. arg ( " run " )
. arg ( " --check " )
. arg ( " run/resolve_dns.ts " )
. stdout ( std ::process ::Stdio ::piped ( ) )
. stderr ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
let err = String ::from_utf8_lossy ( & output . stderr ) ;
let out = String ::from_utf8_lossy ( & output . stdout ) ;
assert! ( ! output . status . success ( ) ) ;
assert! ( err . starts_with ( " Check file " ) ) ;
assert! ( err . contains ( r # "error: Uncaught PermissionDenied: Requires net access to "127.0.0.1:4553""# ) ) ;
assert! ( out . is_empty ( ) ) ;
}
handle . abort ( ) ;
}
#[ tokio::test ]
async fn http2_request_url ( ) {
// TLS streams require the presence of an ambient local task set to gracefully
// close dropped connections in the background.
LocalSet ::new ( )
. run_until ( async {
let mut child = util ::deno_cmd ( )
. current_dir ( util ::testdata_path ( ) )
. arg ( " run " )
. arg ( " --unstable " )
. arg ( " --quiet " )
. arg ( " --allow-net " )
. arg ( " --allow-read " )
. arg ( " ./run/http2_request_url.ts " )
. arg ( " 4506 " )
. stdout ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( ) ;
let stdout = child . stdout . as_mut ( ) . unwrap ( ) ;
let mut buffer = [ 0 ; 5 ] ;
let read = stdout . read ( & mut buffer ) . unwrap ( ) ;
assert_eq! ( read , 5 ) ;
let msg = std ::str ::from_utf8 ( & buffer ) . unwrap ( ) ;
assert_eq! ( msg , " READY " ) ;
let cert = reqwest ::Certificate ::from_pem ( include_bytes! (
" ../testdata/tls/RootCA.crt "
) )
. unwrap ( ) ;
let client = reqwest ::Client ::builder ( )
. add_root_certificate ( cert )
. http2_prior_knowledge ( )
. build ( )
. unwrap ( ) ;
let res = client . get ( " http://127.0.0.1:4506 " ) . send ( ) . await . unwrap ( ) ;
assert_eq! ( 200 , res . status ( ) ) ;
let body = res . text ( ) . await . unwrap ( ) ;
assert_eq! ( body , " http://127.0.0.1:4506/ " ) ;
child . kill ( ) . unwrap ( ) ;
child . wait ( ) . unwrap ( ) ;
} )
. await ;
}
#[ cfg(not(windows)) ]
#[ test ]
fn set_raw_should_not_panic_on_no_tty ( ) {
let output = util ::deno_cmd ( )
. arg ( " eval " )
. arg ( " Deno.stdin.setRaw(true) " )
// stdin set to piped so it certainly does not refer to TTY
. stdin ( std ::process ::Stdio ::piped ( ) )
// stderr is piped so we can capture output.
. stderr ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
assert! ( ! output . status . success ( ) ) ;
let stderr = std ::str ::from_utf8 ( & output . stderr ) . unwrap ( ) . trim ( ) ;
assert! ( stderr . contains ( " BadResource " ) ) ;
}
#[ test ]
fn timeout_clear ( ) {
// https://github.com/denoland/deno/issues/7599
use std ::time ::Duration ;
use std ::time ::Instant ;
let source_code = r #"
const handle = setTimeout ( ( ) = > {
console . log ( " timeout finish " ) ;
} , 10000 ) ;
clearTimeout ( handle ) ;
console . log ( " finish " ) ;
" #;
let mut p = util ::deno_cmd ( )
. current_dir ( util ::testdata_path ( ) )
. arg ( " run " )
. arg ( " - " )
. stdin ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( ) ;
let stdin = p . stdin . as_mut ( ) . unwrap ( ) ;
stdin . write_all ( source_code . as_bytes ( ) ) . unwrap ( ) ;
let start = Instant ::now ( ) ;
let status = p . wait ( ) . unwrap ( ) ;
let end = Instant ::now ( ) ;
assert! ( status . success ( ) ) ;
// check that program did not run for 10 seconds
// for timeout to clear
assert! ( end - start < Duration ::new ( 10 , 0 ) ) ;
}
#[ test ]
fn broken_stdout ( ) {
let ( reader , writer ) = os_pipe ::pipe ( ) . unwrap ( ) ;
// drop the reader to create a broken pipe
drop ( reader ) ;
let output = util ::deno_cmd ( )
. current_dir ( util ::testdata_path ( ) )
. arg ( " eval " )
. arg ( " console.log(3.14) " )
. stdout ( writer )
. stderr ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( )
. wait_with_output ( )
. unwrap ( ) ;
assert! ( ! output . status . success ( ) ) ;
let stderr = std ::str ::from_utf8 ( output . stderr . as_ref ( ) ) . unwrap ( ) . trim ( ) ;
assert! ( stderr . contains ( " Uncaught BrokenPipe " ) ) ;
assert! ( ! stderr . contains ( " panic " ) ) ;
}
itest! ( error_cause {
args : " run run/error_cause.ts " ,
output : " run/error_cause.ts.out " ,
exit_code : 1 ,
} ) ;
itest! ( error_cause_recursive_aggregate {
args : " run error_cause_recursive_aggregate.ts " ,
output : " error_cause_recursive_aggregate.ts.out " ,
exit_code : 1 ,
} ) ;
itest! ( error_cause_recursive_tail {
args : " run error_cause_recursive_tail.ts " ,
output : " error_cause_recursive_tail.ts.out " ,
exit_code : 1 ,
} ) ;
itest! ( error_cause_recursive {
args : " run run/error_cause_recursive.ts " ,
output : " run/error_cause_recursive.ts.out " ,
exit_code : 1 ,
} ) ;
#[ test ]
fn websocket ( ) {
let _g = util ::http_server ( ) ;
let script = util ::testdata_path ( ) . join ( " run/websocket_test.ts " ) ;
let root_ca = util ::testdata_path ( ) . join ( " tls/RootCA.pem " ) ;
let status = util ::deno_cmd ( )
. arg ( " test " )
. arg ( " --unstable " )
. arg ( " --allow-net " )
. arg ( " --cert " )
. arg ( root_ca )
. arg ( script )
. spawn ( )
. unwrap ( )
. wait ( )
. unwrap ( ) ;
assert! ( status . success ( ) ) ;
}
#[ ignore ]
#[ test ]
fn websocketstream ( ) {
let _g = util ::http_server ( ) ;
let script = util ::testdata_path ( ) . join ( " run/websocketstream_test.ts " ) ;
let root_ca = util ::testdata_path ( ) . join ( " tls/RootCA.pem " ) ;
let status = util ::deno_cmd ( )
. arg ( " test " )
. arg ( " --unstable " )
. arg ( " --allow-net " )
. arg ( " --cert " )
. arg ( root_ca )
. arg ( script )
. spawn ( )
. unwrap ( )
. wait ( )
. unwrap ( ) ;
assert! ( status . success ( ) ) ;
}
#[ test ]
fn websocketstream_ping ( ) {
use deno_runtime ::deno_websocket ::tokio_tungstenite ::tungstenite ;
let _g = util ::http_server ( ) ;
let script = util ::testdata_path ( ) . join ( " run/websocketstream_ping_test.ts " ) ;
let root_ca = util ::testdata_path ( ) . join ( " tls/RootCA.pem " ) ;
let mut child = util ::deno_cmd ( )
. arg ( " test " )
. arg ( " --unstable " )
. arg ( " --allow-net " )
. arg ( " --cert " )
. arg ( root_ca )
. arg ( script )
. stdout ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( ) ;
let server = std ::net ::TcpListener ::bind ( " 127.0.0.1:4513 " ) . unwrap ( ) ;
let ( stream , _ ) = server . accept ( ) . unwrap ( ) ;
let mut socket = tungstenite ::accept ( stream ) . unwrap ( ) ;
socket
. write_message ( tungstenite ::Message ::Text ( String ::from ( " A " ) ) )
. unwrap ( ) ;
socket
. write_message ( tungstenite ::Message ::Ping ( vec! [ ] ) )
. unwrap ( ) ;
socket
. write_message ( tungstenite ::Message ::Text ( String ::from ( " B " ) ) )
. unwrap ( ) ;
let message = socket . read_message ( ) . unwrap ( ) ;
assert_eq! ( message , tungstenite ::Message ::Pong ( vec! [ ] ) ) ;
socket
. write_message ( tungstenite ::Message ::Text ( String ::from ( " C " ) ) )
. unwrap ( ) ;
socket . close ( None ) . unwrap ( ) ;
assert! ( child . wait ( ) . unwrap ( ) . success ( ) ) ;
}
#[ test ]
fn websocket_server_multi_field_connection_header ( ) {
let script = util ::testdata_path ( )
. join ( " run/websocket_server_multi_field_connection_header_test.ts " ) ;
let root_ca = util ::testdata_path ( ) . join ( " tls/RootCA.pem " ) ;
let mut child = util ::deno_cmd ( )
. arg ( " run " )
. arg ( " --unstable " )
. arg ( " --allow-net " )
. arg ( " --cert " )
. arg ( root_ca )
. arg ( script )
. stdout ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( ) ;
let stdout = child . stdout . as_mut ( ) . unwrap ( ) ;
let mut buffer = [ 0 ; 5 ] ;
let read = stdout . read ( & mut buffer ) . unwrap ( ) ;
assert_eq! ( read , 5 ) ;
let msg = std ::str ::from_utf8 ( & buffer ) . unwrap ( ) ;
assert_eq! ( msg , " READY " ) ;
let req = http ::request ::Builder ::new ( )
. header ( http ::header ::CONNECTION , " keep-alive, Upgrade " )
. uri ( " ws://localhost:4319 " )
. body ( ( ) )
. unwrap ( ) ;
let ( mut socket , _ ) =
deno_runtime ::deno_websocket ::tokio_tungstenite ::tungstenite ::connect ( req )
. unwrap ( ) ;
let message = socket . read_message ( ) . unwrap ( ) ;
assert_eq! ( message , deno_runtime ::deno_websocket ::tokio_tungstenite ::tungstenite ::Message ::Close ( None ) ) ;
socket . close ( None ) . unwrap ( ) ;
assert! ( child . wait ( ) . unwrap ( ) . success ( ) ) ;
}
// TODO(bartlomieju): this should use `deno run`, not `deno test`; but the
// test hangs then. https://github.com/denoland/deno/issues/14283
#[ test ]
#[ ignore ]
fn websocket_server_idletimeout ( ) {
let script =
util ::testdata_path ( ) . join ( " run/websocket_server_idletimeout.ts " ) ;
let root_ca = util ::testdata_path ( ) . join ( " tls/RootCA.pem " ) ;
let mut child = util ::deno_cmd ( )
. arg ( " test " )
. arg ( " --unstable " )
. arg ( " --allow-net " )
. arg ( " --cert " )
. arg ( root_ca )
. arg ( script )
. stdout ( std ::process ::Stdio ::piped ( ) )
. spawn ( )
. unwrap ( ) ;
let stdout = child . stdout . as_mut ( ) . unwrap ( ) ;
let mut buffer = [ 0 ; 5 ] ;
let read = stdout . read ( & mut buffer ) . unwrap ( ) ;
assert_eq! ( read , 5 ) ;
let msg = std ::str ::from_utf8 ( & buffer ) . unwrap ( ) ;
assert_eq! ( msg , " READY " ) ;
let req = http ::request ::Builder ::new ( )
. uri ( " ws://localhost:4509 " )
. body ( ( ) )
. unwrap ( ) ;
let ( _ws , _request ) =
deno_runtime ::deno_websocket ::tokio_tungstenite ::tungstenite ::connect ( req )
. unwrap ( ) ;
assert! ( child . wait ( ) . unwrap ( ) . success ( ) ) ;
}
itest! ( auto_discover_lockfile {
args : " run run/auto_discover_lockfile/main.ts " ,
output : " run/auto_discover_lockfile/main.out " ,
http_server : true ,
exit_code : 10 ,
} ) ;
itest! ( no_lock_flag {
args : " run --no-lock run/no_lock_flag/main.ts " ,
output : " run/no_lock_flag/main.out " ,
http_server : true ,
exit_code : 0 ,
} ) ;
itest! ( config_file_lock_false {
args : " run --config=run/config_file_lock_boolean/false.json run/config_file_lock_boolean/main.ts " ,
output : " run/config_file_lock_boolean/false.main.out " ,
http_server : true ,
exit_code : 0 ,
} ) ;
itest! ( config_file_lock_true {
args : " run --config=run/config_file_lock_boolean/true.json run/config_file_lock_boolean/main.ts " ,
output : " run/config_file_lock_boolean/true.main.out " ,
http_server : true ,
exit_code : 10 ,
} ) ;
2023-01-13 09:19:20 -05:00
// TODO(bartlomieju): this test is flaky on CI, reenable it after debugging
// // Check https://github.com/denoland/deno_std/issues/2882
// itest!(flash_shutdown {
// args: "run --unstable --allow-net run/flash_shutdown/main.ts",
// exit_code: 0,
// });
2023-01-12 20:59:13 -05:00
itest! ( permission_args {
args : " run run/001_hello.js --allow-net " ,
output : " run/permission_args.out " ,
envs : vec ! [ ( " NO_COLOR " . to_string ( ) , " 1 " . to_string ( ) ) ] ,
} ) ;
itest! ( permission_args_quiet {
args : " run --quiet run/001_hello.js --allow-net " ,
output : " run/001_hello.js.out " ,
} ) ;
// Regression test for https://github.com/denoland/deno/issues/16772
2023-02-09 22:00:23 -05:00
#[ ignore ]
2023-01-12 20:59:13 -05:00
#[ test ]
fn file_fetcher_preserves_permissions ( ) {
let _guard = util ::http_server ( ) ;
util ::with_pty ( & [ " repl " ] , | mut console | {
console . write_text (
" const a = import('http://127.0.0.1:4545/run/019_media_types.ts'); " ,
) ;
console . write_text ( " y " ) ;
console . write_line ( " " ) ;
console . write_line ( " close(); " ) ;
let output = console . read_all_output ( ) ;
assert_contains! ( output , " success " ) ;
assert_contains! ( output , " true " ) ;
} ) ;
}
2023-01-13 10:05:07 -05:00
2023-02-09 22:00:23 -05:00
#[ ignore ]
2023-01-13 10:05:07 -05:00
#[ test ]
fn stdio_streams_are_locked_in_permission_prompt ( ) {
let _guard = util ::http_server ( ) ;
util ::with_pty ( & [
" repl " ,
" --allow-read=run/stdio_streams_are_locked_in_permission_prompt/worker.js,run/stdio_streams_are_locked_in_permission_prompt/text.txt "
] , | mut console | {
console . write_line (
r #" new Worker(`${Deno.cwd()}/run/stdio_streams_are_locked_in_permissions_prompt/worker.js`, { type: " module " });
await Deno . writeTextFile ( " ./run/stdio_streams_are_locked_in_permissions_prompt/text.txt " , " some code " ) ; " #,
) ;
console . write_line ( " y " ) ;
console . write_line ( " close(); " ) ;
let output = console . read_all_output ( ) ;
let expected_output = r # "\x1b[1;1H\x1b[0JAre you sure you want to continue?"# ;
assert_eq! ( output , expected_output ) ;
} ) ;
}
2023-01-24 09:05:54 -05:00
2023-01-24 15:14:49 -05:00
itest! ( node_builtin_modules_ts {
2023-02-15 13:44:52 -05:00
args : " run --quiet --allow-read run/node_builtin_modules/mod.ts hello there " ,
2023-01-24 09:05:54 -05:00
output : " run/node_builtin_modules/mod.ts.out " ,
2023-01-24 15:14:49 -05:00
envs : env_vars_for_npm_tests_no_sync_download ( ) ,
2023-01-24 09:05:54 -05:00
exit_code : 0 ,
} ) ;
2023-01-24 15:14:49 -05:00
itest! ( node_builtin_modules_js {
2023-02-15 13:44:52 -05:00
args : " run --quiet --allow-read run/node_builtin_modules/mod.js hello there " ,
2023-01-24 09:05:54 -05:00
output : " run/node_builtin_modules/mod.js.out " ,
2023-01-24 15:14:49 -05:00
envs : env_vars_for_npm_tests_no_sync_download ( ) ,
2023-01-24 09:05:54 -05:00
exit_code : 0 ,
} ) ;
2023-01-24 15:14:49 -05:00
itest! ( node_prefix_missing {
args : " run --quiet run/node_prefix_missing/main.ts " ,
output : " run/node_prefix_missing/main.ts.out " ,
envs : env_vars_for_npm_tests_no_sync_download ( ) ,
exit_code : 1 ,
} ) ;
2023-02-07 14:22:46 -05:00
itest! ( internal_import {
args : " run run/internal_import.ts " ,
output : " run/internal_import.ts.out " ,
exit_code : 1 ,
} ) ;
itest! ( internal_dynamic_import {
args : " run run/internal_dynamic_import.ts " ,
output : " run/internal_dynamic_import.ts.out " ,
exit_code : 1 ,
} ) ;