2021-01-11 12:13:41 -05:00
|
|
|
// Copyright 2018-2021 the Deno authors. All rights reserved. MIT license.
|
2020-11-26 09:17:45 -05:00
|
|
|
use crate::colors;
|
|
|
|
use crate::inspector::DenoInspector;
|
2020-12-11 12:49:26 -05:00
|
|
|
use crate::inspector::InspectorServer;
|
2020-11-26 09:17:45 -05:00
|
|
|
use crate::js;
|
2021-04-28 12:41:50 -04:00
|
|
|
use crate::metrics;
|
2020-11-26 09:17:45 -05:00
|
|
|
use crate::ops;
|
|
|
|
use crate::permissions::Permissions;
|
2020-12-06 22:30:40 -05:00
|
|
|
use crate::tokio_util::create_basic_runtime;
|
2020-11-26 09:17:45 -05:00
|
|
|
use deno_core::error::AnyError;
|
2021-04-21 11:52:00 -04:00
|
|
|
use deno_core::error::Context as ErrorContext;
|
2020-11-26 09:17:45 -05:00
|
|
|
use deno_core::futures::channel::mpsc;
|
|
|
|
use deno_core::futures::future::poll_fn;
|
|
|
|
use deno_core::futures::future::FutureExt;
|
|
|
|
use deno_core::futures::stream::StreamExt;
|
|
|
|
use deno_core::futures::task::AtomicWaker;
|
2020-12-11 12:49:26 -05:00
|
|
|
use deno_core::serde_json;
|
|
|
|
use deno_core::serde_json::json;
|
2020-11-26 09:17:45 -05:00
|
|
|
use deno_core::url::Url;
|
|
|
|
use deno_core::v8;
|
2021-04-28 12:41:50 -04:00
|
|
|
use deno_core::Extension;
|
2020-12-13 13:45:53 -05:00
|
|
|
use deno_core::GetErrorClassFn;
|
2020-12-11 12:49:26 -05:00
|
|
|
use deno_core::JsErrorCreateFn;
|
2020-11-26 09:17:45 -05:00
|
|
|
use deno_core::JsRuntime;
|
2020-12-11 12:49:26 -05:00
|
|
|
use deno_core::ModuleLoader;
|
2020-11-26 09:17:45 -05:00
|
|
|
use deno_core::ModuleSpecifier;
|
|
|
|
use deno_core::RuntimeOptions;
|
2021-04-07 09:22:14 -04:00
|
|
|
use deno_file::BlobUrlStore;
|
2021-03-26 12:34:25 -04:00
|
|
|
use log::debug;
|
2020-11-26 09:17:45 -05:00
|
|
|
use std::env;
|
2020-12-11 12:49:26 -05:00
|
|
|
use std::rc::Rc;
|
2020-11-26 09:17:45 -05:00
|
|
|
use std::sync::atomic::AtomicBool;
|
|
|
|
use std::sync::atomic::Ordering;
|
|
|
|
use std::sync::Arc;
|
|
|
|
use std::task::Context;
|
|
|
|
use std::task::Poll;
|
|
|
|
use tokio::sync::Mutex as AsyncMutex;
|
|
|
|
|
|
|
|
/// Events that are sent to host from child
|
|
|
|
/// worker.
|
|
|
|
pub enum WorkerEvent {
|
|
|
|
Message(Box<[u8]>),
|
|
|
|
Error(AnyError),
|
|
|
|
TerminalError(AnyError),
|
|
|
|
}
|
|
|
|
|
|
|
|
pub struct WorkerChannelsInternal {
|
|
|
|
pub sender: mpsc::Sender<WorkerEvent>,
|
|
|
|
pub receiver: mpsc::Receiver<Box<[u8]>>,
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Wrapper for `WorkerHandle` that adds functionality
|
|
|
|
/// for terminating workers.
|
|
|
|
///
|
|
|
|
/// This struct is used by host as well as worker itself.
|
|
|
|
///
|
|
|
|
/// Host uses it to communicate with worker and terminate it,
|
|
|
|
/// while worker uses it only to finish execution on `self.close()`.
|
|
|
|
#[derive(Clone)]
|
|
|
|
pub struct WebWorkerHandle {
|
|
|
|
pub sender: mpsc::Sender<Box<[u8]>>,
|
|
|
|
pub receiver: Arc<AsyncMutex<mpsc::Receiver<WorkerEvent>>>,
|
|
|
|
terminate_tx: mpsc::Sender<()>,
|
|
|
|
terminated: Arc<AtomicBool>,
|
|
|
|
isolate_handle: v8::IsolateHandle,
|
|
|
|
}
|
|
|
|
|
|
|
|
impl WebWorkerHandle {
|
|
|
|
/// Post message to worker as a host.
|
|
|
|
pub fn post_message(&self, buf: Box<[u8]>) -> Result<(), AnyError> {
|
|
|
|
let mut sender = self.sender.clone();
|
2021-04-19 10:57:02 -04:00
|
|
|
// If the channel is closed,
|
|
|
|
// the worker must have terminated but the termination message has not yet been recieved.
|
|
|
|
//
|
|
|
|
// Therefore just treat it as if the worker has terminated and return.
|
|
|
|
if sender.is_closed() {
|
|
|
|
self.terminated.store(true, Ordering::SeqCst);
|
|
|
|
return Ok(());
|
|
|
|
}
|
2020-11-26 09:17:45 -05:00
|
|
|
sender.try_send(buf)?;
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Get the event with lock.
|
|
|
|
/// Return error if more than one listener tries to get event
|
|
|
|
pub async fn get_event(&self) -> Result<Option<WorkerEvent>, AnyError> {
|
|
|
|
let mut receiver = self.receiver.try_lock()?;
|
|
|
|
Ok(receiver.next().await)
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn terminate(&self) {
|
|
|
|
// This function can be called multiple times by whomever holds
|
|
|
|
// the handle. However only a single "termination" should occur so
|
|
|
|
// we need a guard here.
|
2020-12-06 22:30:40 -05:00
|
|
|
let already_terminated = self.terminated.swap(true, Ordering::SeqCst);
|
2020-11-26 09:17:45 -05:00
|
|
|
|
|
|
|
if !already_terminated {
|
|
|
|
self.isolate_handle.terminate_execution();
|
|
|
|
let mut sender = self.terminate_tx.clone();
|
|
|
|
// This call should be infallible hence the `expect`.
|
|
|
|
// This might change in the future.
|
|
|
|
sender.try_send(()).expect("Failed to terminate");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
fn create_channels(
|
|
|
|
isolate_handle: v8::IsolateHandle,
|
|
|
|
terminate_tx: mpsc::Sender<()>,
|
|
|
|
) -> (WorkerChannelsInternal, WebWorkerHandle) {
|
|
|
|
let (in_tx, in_rx) = mpsc::channel::<Box<[u8]>>(1);
|
|
|
|
let (out_tx, out_rx) = mpsc::channel::<WorkerEvent>(1);
|
|
|
|
let internal_channels = WorkerChannelsInternal {
|
|
|
|
sender: out_tx,
|
|
|
|
receiver: in_rx,
|
|
|
|
};
|
|
|
|
let external_channels = WebWorkerHandle {
|
|
|
|
sender: in_tx,
|
|
|
|
receiver: Arc::new(AsyncMutex::new(out_rx)),
|
|
|
|
terminated: Arc::new(AtomicBool::new(false)),
|
|
|
|
terminate_tx,
|
|
|
|
isolate_handle,
|
|
|
|
};
|
|
|
|
(internal_channels, external_channels)
|
|
|
|
}
|
|
|
|
|
|
|
|
/// This struct is an implementation of `Worker` Web API
|
|
|
|
///
|
|
|
|
/// Each `WebWorker` is either a child of `MainWorker` or other
|
|
|
|
/// `WebWorker`.
|
|
|
|
pub struct WebWorker {
|
2020-12-11 12:49:26 -05:00
|
|
|
id: u32,
|
2020-11-26 09:17:45 -05:00
|
|
|
inspector: Option<Box<DenoInspector>>,
|
|
|
|
// Following fields are pub because they are accessed
|
|
|
|
// when creating a new WebWorker instance.
|
|
|
|
pub(crate) internal_channels: WorkerChannelsInternal,
|
2020-12-13 13:45:53 -05:00
|
|
|
pub js_runtime: JsRuntime,
|
|
|
|
pub name: String,
|
2020-11-26 09:17:45 -05:00
|
|
|
waker: AtomicWaker,
|
|
|
|
event_loop_idle: bool,
|
|
|
|
terminate_rx: mpsc::Receiver<()>,
|
|
|
|
handle: WebWorkerHandle,
|
2020-12-11 12:49:26 -05:00
|
|
|
pub use_deno_namespace: bool,
|
2021-01-07 13:06:08 -05:00
|
|
|
pub main_module: ModuleSpecifier,
|
2020-12-11 12:49:26 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
pub struct WebWorkerOptions {
|
2020-12-11 18:36:18 -05:00
|
|
|
/// Sets `Deno.args` in JS runtime.
|
2020-12-11 12:49:26 -05:00
|
|
|
pub args: Vec<String>,
|
|
|
|
pub debug_flag: bool,
|
|
|
|
pub unstable: bool,
|
2021-01-04 18:15:52 -05:00
|
|
|
pub ca_data: Option<Vec<u8>>,
|
2020-12-11 18:36:18 -05:00
|
|
|
pub user_agent: String,
|
2020-12-11 12:49:26 -05:00
|
|
|
pub seed: Option<u64>,
|
|
|
|
pub module_loader: Rc<dyn ModuleLoader>,
|
|
|
|
pub create_web_worker_cb: Arc<ops::worker_host::CreateWebWorkerCb>,
|
|
|
|
pub js_error_create_fn: Option<Rc<JsErrorCreateFn>>,
|
|
|
|
pub use_deno_namespace: bool,
|
|
|
|
pub attach_inspector: bool,
|
|
|
|
pub maybe_inspector_server: Option<Arc<InspectorServer>>,
|
|
|
|
pub apply_source_maps: bool,
|
2020-12-11 18:36:18 -05:00
|
|
|
/// Sets `Deno.version.deno` in JS runtime.
|
|
|
|
pub runtime_version: String,
|
|
|
|
/// Sets `Deno.version.typescript` in JS runtime.
|
|
|
|
pub ts_version: String,
|
|
|
|
/// Sets `Deno.noColor` in JS runtime.
|
|
|
|
pub no_color: bool,
|
2020-12-13 13:45:53 -05:00
|
|
|
pub get_error_class_fn: Option<GetErrorClassFn>,
|
2021-04-07 09:22:14 -04:00
|
|
|
pub blob_url_store: BlobUrlStore,
|
2020-11-26 09:17:45 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
impl WebWorker {
|
2020-12-11 12:49:26 -05:00
|
|
|
pub fn from_options(
|
2020-11-26 09:17:45 -05:00
|
|
|
name: String,
|
|
|
|
permissions: Permissions,
|
|
|
|
main_module: ModuleSpecifier,
|
2020-12-06 22:30:40 -05:00
|
|
|
worker_id: u32,
|
2020-12-11 12:49:26 -05:00
|
|
|
options: &WebWorkerOptions,
|
2020-11-26 09:17:45 -05:00
|
|
|
) -> Self {
|
2021-05-02 19:22:57 -04:00
|
|
|
// Permissions: many ops depend on this
|
|
|
|
let unstable = options.unstable;
|
|
|
|
let perm_ext = Extension::builder()
|
|
|
|
.state(move |state| {
|
|
|
|
state.put::<Permissions>(permissions.clone());
|
|
|
|
state.put(ops::UnstableChecker { unstable });
|
|
|
|
Ok(())
|
|
|
|
})
|
|
|
|
.build();
|
|
|
|
|
|
|
|
let mut extensions: Vec<Extension> = vec![
|
2021-04-28 12:41:50 -04:00
|
|
|
// Web APIs
|
|
|
|
deno_webidl::init(),
|
|
|
|
deno_console::init(),
|
|
|
|
deno_url::init(),
|
|
|
|
deno_web::init(),
|
|
|
|
deno_file::init(
|
|
|
|
options.blob_url_store.clone(),
|
|
|
|
Some(main_module.clone()),
|
|
|
|
),
|
|
|
|
deno_fetch::init::<Permissions>(
|
|
|
|
options.user_agent.clone(),
|
|
|
|
options.ca_data.clone(),
|
|
|
|
),
|
|
|
|
deno_websocket::init::<Permissions>(
|
|
|
|
options.user_agent.clone(),
|
|
|
|
options.ca_data.clone(),
|
|
|
|
),
|
|
|
|
deno_crypto::init(options.seed),
|
|
|
|
deno_webgpu::init(options.unstable),
|
|
|
|
deno_timers::init::<Permissions>(),
|
|
|
|
// Metrics
|
|
|
|
metrics::init(),
|
2021-05-02 19:22:57 -04:00
|
|
|
// Permissions ext (worker specific state)
|
|
|
|
perm_ext,
|
|
|
|
];
|
|
|
|
|
|
|
|
// Runtime ops that are always initialized for WebWorkers
|
|
|
|
let runtime_exts = vec![
|
|
|
|
ops::web_worker::init(),
|
|
|
|
ops::runtime::init(main_module.clone()),
|
|
|
|
ops::worker_host::init(false, options.create_web_worker_cb.clone()),
|
|
|
|
ops::io::init(),
|
2021-04-28 12:41:50 -04:00
|
|
|
];
|
|
|
|
|
2021-05-02 19:22:57 -04:00
|
|
|
// Extensions providing Deno.* features
|
|
|
|
let deno_ns_exts = if options.use_deno_namespace {
|
|
|
|
vec![
|
|
|
|
ops::fs_events::init(),
|
|
|
|
ops::fs::init(),
|
|
|
|
ops::net::init(),
|
|
|
|
ops::os::init(),
|
|
|
|
ops::http::init(),
|
|
|
|
ops::permissions::init(),
|
|
|
|
ops::plugin::init(),
|
|
|
|
ops::process::init(),
|
|
|
|
ops::signal::init(),
|
|
|
|
ops::tls::init(),
|
|
|
|
ops::tty::init(),
|
|
|
|
ops::io::init_stdio(),
|
|
|
|
]
|
|
|
|
} else {
|
|
|
|
vec![]
|
|
|
|
};
|
|
|
|
|
|
|
|
// Append exts
|
|
|
|
extensions.extend(runtime_exts);
|
|
|
|
extensions.extend(deno_ns_exts); // May be empty
|
|
|
|
|
2020-11-26 09:17:45 -05:00
|
|
|
let mut js_runtime = JsRuntime::new(RuntimeOptions {
|
2020-12-11 12:49:26 -05:00
|
|
|
module_loader: Some(options.module_loader.clone()),
|
2020-11-26 09:17:45 -05:00
|
|
|
startup_snapshot: Some(js::deno_isolate_init()),
|
2020-12-11 12:49:26 -05:00
|
|
|
js_error_create_fn: options.js_error_create_fn.clone(),
|
2020-12-13 13:45:53 -05:00
|
|
|
get_error_class_fn: options.get_error_class_fn,
|
2021-04-28 12:41:50 -04:00
|
|
|
extensions,
|
2020-11-26 09:17:45 -05:00
|
|
|
..Default::default()
|
|
|
|
});
|
|
|
|
|
2020-12-11 12:49:26 -05:00
|
|
|
let inspector = if options.attach_inspector {
|
|
|
|
Some(DenoInspector::new(
|
|
|
|
&mut js_runtime,
|
|
|
|
options.maybe_inspector_server.clone(),
|
|
|
|
))
|
|
|
|
} else {
|
|
|
|
None
|
|
|
|
};
|
2020-11-26 09:17:45 -05:00
|
|
|
|
|
|
|
let (terminate_tx, terminate_rx) = mpsc::channel::<()>(1);
|
|
|
|
let isolate_handle = js_runtime.v8_isolate().thread_safe_handle();
|
|
|
|
let (internal_channels, handle) =
|
|
|
|
create_channels(isolate_handle, terminate_tx);
|
|
|
|
|
|
|
|
let mut worker = Self {
|
2020-12-11 12:49:26 -05:00
|
|
|
id: worker_id,
|
2020-11-26 09:17:45 -05:00
|
|
|
inspector,
|
|
|
|
internal_channels,
|
|
|
|
js_runtime,
|
2020-12-11 12:49:26 -05:00
|
|
|
name,
|
2020-11-26 09:17:45 -05:00
|
|
|
waker: AtomicWaker::new(),
|
|
|
|
event_loop_idle: false,
|
|
|
|
terminate_rx,
|
|
|
|
handle,
|
2020-12-11 12:49:26 -05:00
|
|
|
use_deno_namespace: options.use_deno_namespace,
|
2021-05-02 19:22:57 -04:00
|
|
|
main_module,
|
2020-11-26 09:17:45 -05:00
|
|
|
};
|
|
|
|
|
2021-05-02 19:22:57 -04:00
|
|
|
// Setup worker-dependant OpState and return worker
|
2020-11-26 09:17:45 -05:00
|
|
|
{
|
|
|
|
let handle = worker.thread_safe_handle();
|
|
|
|
let sender = worker.internal_channels.sender.clone();
|
|
|
|
let js_runtime = &mut worker.js_runtime;
|
2021-05-02 19:22:57 -04:00
|
|
|
let op_state = js_runtime.op_state();
|
|
|
|
let mut op_state = op_state.borrow_mut();
|
2020-12-06 22:30:40 -05:00
|
|
|
|
2021-05-02 19:22:57 -04:00
|
|
|
// Required by runtime::ops::worker_host/web_worker
|
|
|
|
op_state.put(handle);
|
|
|
|
op_state.put(sender);
|
2020-12-11 12:49:26 -05:00
|
|
|
|
|
|
|
worker
|
2020-11-26 09:17:45 -05:00
|
|
|
}
|
2020-12-11 12:49:26 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
pub fn bootstrap(&mut self, options: &WebWorkerOptions) {
|
|
|
|
let runtime_options = json!({
|
|
|
|
"args": options.args,
|
|
|
|
"applySourceMaps": options.apply_source_maps,
|
|
|
|
"debugFlag": options.debug_flag,
|
2020-12-11 18:36:18 -05:00
|
|
|
"denoVersion": options.runtime_version,
|
|
|
|
"noColor": options.no_color,
|
2020-12-11 12:49:26 -05:00
|
|
|
"pid": std::process::id(),
|
|
|
|
"ppid": ops::runtime::ppid(),
|
|
|
|
"target": env!("TARGET"),
|
2020-12-11 18:36:18 -05:00
|
|
|
"tsVersion": options.ts_version,
|
2020-12-11 12:49:26 -05:00
|
|
|
"unstableFlag": options.unstable,
|
|
|
|
"v8Version": deno_core::v8_version(),
|
2021-01-07 13:06:08 -05:00
|
|
|
"location": self.main_module,
|
2020-12-11 12:49:26 -05:00
|
|
|
});
|
|
|
|
|
|
|
|
let runtime_options_str =
|
|
|
|
serde_json::to_string_pretty(&runtime_options).unwrap();
|
2020-11-26 09:17:45 -05:00
|
|
|
|
2020-12-06 22:30:40 -05:00
|
|
|
// Instead of using name for log we use `worker-${id}` because
|
|
|
|
// WebWorkers can have empty string as name.
|
|
|
|
let script = format!(
|
2020-12-11 12:49:26 -05:00
|
|
|
"bootstrap.workerRuntime({}, \"{}\", {}, \"worker-{}\")",
|
|
|
|
runtime_options_str, self.name, options.use_deno_namespace, self.id
|
2020-12-06 22:30:40 -05:00
|
|
|
);
|
2020-12-11 12:49:26 -05:00
|
|
|
self
|
2020-12-06 22:30:40 -05:00
|
|
|
.execute(&script)
|
|
|
|
.expect("Failed to execute worker bootstrap script");
|
2020-11-26 09:17:45 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
/// Same as execute2() but the filename defaults to "$CWD/__anonymous__".
|
|
|
|
pub fn execute(&mut self, js_source: &str) -> Result<(), AnyError> {
|
2021-04-21 11:52:00 -04:00
|
|
|
let path = env::current_dir()
|
|
|
|
.context("Failed to get current working directory")?
|
|
|
|
.join("__anonymous__");
|
2020-11-26 09:17:45 -05:00
|
|
|
let url = Url::from_file_path(path).unwrap();
|
|
|
|
self.js_runtime.execute(url.as_str(), js_source)
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Loads, instantiates and executes specified JavaScript module.
|
|
|
|
pub async fn execute_module(
|
|
|
|
&mut self,
|
|
|
|
module_specifier: &ModuleSpecifier,
|
|
|
|
) -> Result<(), AnyError> {
|
|
|
|
let id = self.js_runtime.load_module(module_specifier, None).await?;
|
2021-03-04 07:19:47 -05:00
|
|
|
|
|
|
|
let mut receiver = self.js_runtime.mod_evaluate(id);
|
|
|
|
tokio::select! {
|
|
|
|
maybe_result = receiver.next() => {
|
|
|
|
debug!("received worker module evaluate {:#?}", maybe_result);
|
|
|
|
// If `None` is returned it means that runtime was destroyed before
|
|
|
|
// evaluation was complete. This can happen in Web Worker when `self.close()`
|
|
|
|
// is called at top level.
|
|
|
|
let result = maybe_result.unwrap_or(Ok(()));
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
|
|
|
event_loop_result = self.run_event_loop() => {
|
|
|
|
if self.has_been_terminated() {
|
|
|
|
return Ok(());
|
|
|
|
}
|
|
|
|
event_loop_result?;
|
|
|
|
let maybe_result = receiver.next().await;
|
|
|
|
let result = maybe_result.unwrap_or(Ok(()));
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
}
|
2020-11-26 09:17:45 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
/// Returns a way to communicate with the Worker from other threads.
|
|
|
|
pub fn thread_safe_handle(&self) -> WebWorkerHandle {
|
|
|
|
self.handle.clone()
|
|
|
|
}
|
|
|
|
|
2020-12-06 22:30:40 -05:00
|
|
|
pub fn has_been_terminated(&self) -> bool {
|
|
|
|
self.handle.terminated.load(Ordering::SeqCst)
|
|
|
|
}
|
|
|
|
|
2020-11-26 09:17:45 -05:00
|
|
|
pub fn poll_event_loop(
|
|
|
|
&mut self,
|
|
|
|
cx: &mut Context,
|
|
|
|
) -> Poll<Result<(), AnyError>> {
|
2020-12-06 22:30:40 -05:00
|
|
|
if self.has_been_terminated() {
|
2020-11-26 09:17:45 -05:00
|
|
|
return Poll::Ready(Ok(()));
|
|
|
|
}
|
|
|
|
|
|
|
|
if !self.event_loop_idle {
|
|
|
|
let poll_result = {
|
|
|
|
// We always poll the inspector if it exists.
|
|
|
|
let _ = self.inspector.as_mut().map(|i| i.poll_unpin(cx));
|
|
|
|
self.waker.register(cx.waker());
|
|
|
|
self.js_runtime.poll_event_loop(cx)
|
|
|
|
};
|
|
|
|
|
2020-12-06 22:30:40 -05:00
|
|
|
if let Poll::Ready(r) = poll_result {
|
|
|
|
if self.has_been_terminated() {
|
|
|
|
return Poll::Ready(Ok(()));
|
2020-11-26 09:17:45 -05:00
|
|
|
}
|
2020-12-06 22:30:40 -05:00
|
|
|
|
|
|
|
if let Err(e) = r {
|
|
|
|
print_worker_error(e.to_string(), &self.name);
|
|
|
|
let mut sender = self.internal_channels.sender.clone();
|
|
|
|
sender
|
|
|
|
.try_send(WorkerEvent::Error(e))
|
|
|
|
.expect("Failed to post message to host");
|
|
|
|
}
|
|
|
|
self.event_loop_idle = true;
|
2020-11-26 09:17:45 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if let Poll::Ready(r) = self.terminate_rx.poll_next_unpin(cx) {
|
|
|
|
// terminate_rx should never be closed
|
|
|
|
assert!(r.is_some());
|
|
|
|
return Poll::Ready(Ok(()));
|
|
|
|
}
|
|
|
|
|
2020-12-06 22:30:40 -05:00
|
|
|
let maybe_msg_poll_result =
|
|
|
|
self.internal_channels.receiver.poll_next_unpin(cx);
|
2020-11-26 09:17:45 -05:00
|
|
|
|
2020-12-06 22:30:40 -05:00
|
|
|
if let Poll::Ready(maybe_msg) = maybe_msg_poll_result {
|
|
|
|
let msg =
|
|
|
|
maybe_msg.expect("Received `None` instead of message in worker");
|
|
|
|
let msg = String::from_utf8(msg.to_vec()).unwrap();
|
|
|
|
let script = format!("workerMessageRecvCallback({})", msg);
|
2020-11-26 09:17:45 -05:00
|
|
|
|
2021-03-04 07:19:47 -05:00
|
|
|
// TODO(bartlomieju): set proper script name like "deno:runtime/web_worker.js"
|
|
|
|
// so it's dimmed in stack trace instead of using "__anonymous__"
|
2020-12-06 22:30:40 -05:00
|
|
|
if let Err(e) = self.execute(&script) {
|
|
|
|
// If execution was terminated during message callback then
|
|
|
|
// just ignore it
|
|
|
|
if self.has_been_terminated() {
|
|
|
|
return Poll::Ready(Ok(()));
|
2020-11-26 09:17:45 -05:00
|
|
|
}
|
2020-12-06 22:30:40 -05:00
|
|
|
|
|
|
|
// Otherwise forward error to host
|
|
|
|
let mut sender = self.internal_channels.sender.clone();
|
|
|
|
sender
|
|
|
|
.try_send(WorkerEvent::Error(e))
|
|
|
|
.expect("Failed to post message to host");
|
2020-11-26 09:17:45 -05:00
|
|
|
}
|
2020-12-06 22:30:40 -05:00
|
|
|
|
|
|
|
// Let event loop be polled again
|
|
|
|
self.event_loop_idle = false;
|
|
|
|
self.waker.wake();
|
2020-11-26 09:17:45 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
Poll::Pending
|
|
|
|
}
|
|
|
|
|
|
|
|
pub async fn run_event_loop(&mut self) -> Result<(), AnyError> {
|
|
|
|
poll_fn(|cx| self.poll_event_loop(cx)).await
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl Drop for WebWorker {
|
|
|
|
fn drop(&mut self) {
|
|
|
|
// The Isolate object must outlive the Inspector object, but this is
|
|
|
|
// currently not enforced by the type system.
|
|
|
|
self.inspector.take();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-12-06 22:30:40 -05:00
|
|
|
fn print_worker_error(error_str: String, name: &str) {
|
|
|
|
eprintln!(
|
|
|
|
"{}: Uncaught (in worker \"{}\") {}",
|
|
|
|
colors::red_bold("error"),
|
|
|
|
name,
|
|
|
|
error_str.trim_start_matches("Uncaught "),
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
/// This function should be called from a thread dedicated to this worker.
|
|
|
|
// TODO(bartlomieju): check if order of actions is aligned to Worker spec
|
|
|
|
pub fn run_web_worker(
|
|
|
|
mut worker: WebWorker,
|
|
|
|
specifier: ModuleSpecifier,
|
|
|
|
maybe_source_code: Option<String>,
|
|
|
|
) -> Result<(), AnyError> {
|
|
|
|
let name = worker.name.to_string();
|
|
|
|
|
2021-01-12 02:50:02 -05:00
|
|
|
let rt = create_basic_runtime();
|
2020-12-06 22:30:40 -05:00
|
|
|
|
|
|
|
// TODO(bartlomieju): run following block using "select!"
|
|
|
|
// with terminate
|
|
|
|
|
|
|
|
// Execute provided source code immediately
|
|
|
|
let result = if let Some(source_code) = maybe_source_code {
|
|
|
|
worker.execute(&source_code)
|
|
|
|
} else {
|
|
|
|
// TODO(bartlomieju): add "type": "classic", ie. ability to load
|
|
|
|
// script instead of module
|
|
|
|
let load_future = worker.execute_module(&specifier).boxed_local();
|
|
|
|
|
|
|
|
rt.block_on(load_future)
|
|
|
|
};
|
|
|
|
|
|
|
|
let mut sender = worker.internal_channels.sender.clone();
|
|
|
|
|
|
|
|
// If sender is closed it means that worker has already been closed from
|
|
|
|
// within using "globalThis.close()"
|
|
|
|
if sender.is_closed() {
|
|
|
|
return Ok(());
|
|
|
|
}
|
|
|
|
|
|
|
|
if let Err(e) = result {
|
|
|
|
print_worker_error(e.to_string(), &name);
|
|
|
|
sender
|
|
|
|
.try_send(WorkerEvent::TerminalError(e))
|
|
|
|
.expect("Failed to post message to host");
|
|
|
|
|
|
|
|
// Failure to execute script is a terminal error, bye, bye.
|
|
|
|
return Ok(());
|
|
|
|
}
|
|
|
|
|
|
|
|
let result = rt.block_on(worker.run_event_loop());
|
|
|
|
debug!("Worker thread shuts down {}", &name);
|
|
|
|
result
|
|
|
|
}
|
|
|
|
|
2020-11-26 09:17:45 -05:00
|
|
|
#[cfg(test)]
|
|
|
|
mod tests {
|
|
|
|
use super::*;
|
|
|
|
use crate::tokio_util;
|
|
|
|
use deno_core::serde_json::json;
|
|
|
|
|
|
|
|
fn create_test_web_worker() -> WebWorker {
|
2021-02-17 13:47:18 -05:00
|
|
|
let main_module = deno_core::resolve_url_or_path("./hello.js").unwrap();
|
2020-12-11 12:49:26 -05:00
|
|
|
let module_loader = Rc::new(deno_core::NoopModuleLoader);
|
|
|
|
let create_web_worker_cb = Arc::new(|_| unreachable!());
|
|
|
|
|
|
|
|
let options = WebWorkerOptions {
|
|
|
|
args: vec![],
|
|
|
|
apply_source_maps: false,
|
|
|
|
debug_flag: false,
|
|
|
|
unstable: false,
|
2021-01-04 18:15:52 -05:00
|
|
|
ca_data: None,
|
2020-12-11 18:36:18 -05:00
|
|
|
user_agent: "x".to_string(),
|
2020-12-11 12:49:26 -05:00
|
|
|
seed: None,
|
|
|
|
module_loader,
|
|
|
|
create_web_worker_cb,
|
|
|
|
js_error_create_fn: None,
|
|
|
|
use_deno_namespace: false,
|
|
|
|
attach_inspector: false,
|
|
|
|
maybe_inspector_server: None,
|
2020-12-11 18:36:18 -05:00
|
|
|
runtime_version: "x".to_string(),
|
|
|
|
ts_version: "x".to_string(),
|
|
|
|
no_color: true,
|
2020-12-13 13:45:53 -05:00
|
|
|
get_error_class_fn: None,
|
2021-04-07 09:22:14 -04:00
|
|
|
blob_url_store: BlobUrlStore::default(),
|
2020-12-11 12:49:26 -05:00
|
|
|
};
|
|
|
|
|
|
|
|
let mut worker = WebWorker::from_options(
|
2020-11-26 09:17:45 -05:00
|
|
|
"TEST".to_string(),
|
|
|
|
Permissions::allow_all(),
|
|
|
|
main_module,
|
2020-12-06 22:30:40 -05:00
|
|
|
1,
|
2020-12-11 12:49:26 -05:00
|
|
|
&options,
|
|
|
|
);
|
|
|
|
worker.bootstrap(&options);
|
|
|
|
worker
|
2020-11-26 09:17:45 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
#[tokio::test]
|
|
|
|
async fn test_worker_messages() {
|
|
|
|
let (handle_sender, handle_receiver) =
|
|
|
|
std::sync::mpsc::sync_channel::<WebWorkerHandle>(1);
|
|
|
|
|
|
|
|
let join_handle = std::thread::spawn(move || {
|
|
|
|
let mut worker = create_test_web_worker();
|
|
|
|
let source = r#"
|
|
|
|
onmessage = function(e) {
|
|
|
|
console.log("msg from main script", e.data);
|
|
|
|
if (e.data == "exit") {
|
|
|
|
return close();
|
|
|
|
} else {
|
|
|
|
console.assert(e.data === "hi");
|
|
|
|
}
|
|
|
|
postMessage([1, 2, 3]);
|
|
|
|
console.log("after postMessage");
|
|
|
|
}
|
|
|
|
"#;
|
|
|
|
worker.execute(source).unwrap();
|
|
|
|
let handle = worker.thread_safe_handle();
|
|
|
|
handle_sender.send(handle).unwrap();
|
|
|
|
let r = tokio_util::run_basic(worker.run_event_loop());
|
|
|
|
assert!(r.is_ok())
|
|
|
|
});
|
|
|
|
|
|
|
|
let mut handle = handle_receiver.recv().unwrap();
|
|
|
|
|
|
|
|
let msg = json!("hi").to_string().into_boxed_str().into_boxed_bytes();
|
|
|
|
let r = handle.post_message(msg.clone());
|
|
|
|
assert!(r.is_ok());
|
|
|
|
|
|
|
|
let maybe_msg = handle.get_event().await.unwrap();
|
|
|
|
assert!(maybe_msg.is_some());
|
|
|
|
|
|
|
|
let r = handle.post_message(msg.clone());
|
|
|
|
assert!(r.is_ok());
|
|
|
|
|
|
|
|
let maybe_msg = handle.get_event().await.unwrap();
|
|
|
|
assert!(maybe_msg.is_some());
|
|
|
|
match maybe_msg {
|
|
|
|
Some(WorkerEvent::Message(buf)) => {
|
|
|
|
assert_eq!(*buf, *b"[1,2,3]");
|
|
|
|
}
|
|
|
|
_ => unreachable!(),
|
|
|
|
}
|
|
|
|
|
|
|
|
let msg = json!("exit")
|
|
|
|
.to_string()
|
|
|
|
.into_boxed_str()
|
|
|
|
.into_boxed_bytes();
|
|
|
|
let r = handle.post_message(msg);
|
|
|
|
assert!(r.is_ok());
|
|
|
|
let event = handle.get_event().await.unwrap();
|
|
|
|
assert!(event.is_none());
|
|
|
|
handle.sender.close_channel();
|
|
|
|
join_handle.join().expect("Failed to join worker thread");
|
|
|
|
}
|
|
|
|
|
|
|
|
#[tokio::test]
|
|
|
|
async fn removed_from_resource_table_on_close() {
|
|
|
|
let (handle_sender, handle_receiver) =
|
|
|
|
std::sync::mpsc::sync_channel::<WebWorkerHandle>(1);
|
|
|
|
|
|
|
|
let join_handle = std::thread::spawn(move || {
|
|
|
|
let mut worker = create_test_web_worker();
|
|
|
|
worker.execute("onmessage = () => { close(); }").unwrap();
|
|
|
|
let handle = worker.thread_safe_handle();
|
|
|
|
handle_sender.send(handle).unwrap();
|
|
|
|
let r = tokio_util::run_basic(worker.run_event_loop());
|
|
|
|
assert!(r.is_ok())
|
|
|
|
});
|
|
|
|
|
|
|
|
let mut handle = handle_receiver.recv().unwrap();
|
|
|
|
|
|
|
|
let msg = json!("hi").to_string().into_boxed_str().into_boxed_bytes();
|
|
|
|
let r = handle.post_message(msg.clone());
|
|
|
|
assert!(r.is_ok());
|
|
|
|
let event = handle.get_event().await.unwrap();
|
|
|
|
assert!(event.is_none());
|
|
|
|
handle.sender.close_channel();
|
|
|
|
|
|
|
|
join_handle.join().expect("Failed to join worker thread");
|
|
|
|
}
|
|
|
|
}
|