2020-01-28 03:12:25 +01:00
|
|
|
// Copyright 2018-2020 the Deno authors. All rights reserved. MIT license.
|
2020-09-06 02:34:02 +02:00
|
|
|
|
2020-01-28 03:12:25 +01:00
|
|
|
use crate::colors;
|
2020-09-18 20:39:47 +02:00
|
|
|
use crate::metrics::Metrics;
|
2020-09-20 01:17:35 +02:00
|
|
|
use crate::permissions::Permissions;
|
2020-01-28 03:12:25 +01:00
|
|
|
use crate::version;
|
2020-09-14 18:48:57 +02:00
|
|
|
use deno_core::error::AnyError;
|
2020-09-21 18:36:37 +02:00
|
|
|
use deno_core::serde_json;
|
|
|
|
use deno_core::serde_json::json;
|
|
|
|
use deno_core::serde_json::Value;
|
2020-06-11 13:00:29 +10:00
|
|
|
use deno_core::ModuleSpecifier;
|
2020-09-10 09:57:45 -04:00
|
|
|
use deno_core::OpState;
|
2020-04-23 05:51:07 -04:00
|
|
|
use deno_core::ZeroCopyBuf;
|
2020-01-28 03:12:25 +01:00
|
|
|
use std::env;
|
|
|
|
|
2020-12-01 23:33:44 +01:00
|
|
|
type ApplySourceMaps = bool;
|
|
|
|
|
|
|
|
pub fn init(
|
|
|
|
rt: &mut deno_core::JsRuntime,
|
|
|
|
main_module: ModuleSpecifier,
|
|
|
|
apply_source_maps: bool,
|
|
|
|
) {
|
2020-09-28 12:14:11 +02:00
|
|
|
{
|
|
|
|
let op_state = rt.op_state();
|
|
|
|
let mut state = op_state.borrow_mut();
|
|
|
|
state.put::<ModuleSpecifier>(main_module);
|
2020-12-01 23:33:44 +01:00
|
|
|
state.put::<ApplySourceMaps>(apply_source_maps);
|
2020-09-28 12:14:11 +02:00
|
|
|
}
|
2020-09-10 09:57:45 -04:00
|
|
|
super::reg_json_sync(rt, "op_start", op_start);
|
|
|
|
super::reg_json_sync(rt, "op_main_module", op_main_module);
|
|
|
|
super::reg_json_sync(rt, "op_metrics", op_metrics);
|
2020-01-28 03:12:25 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
fn op_start(
|
2020-09-10 09:57:45 -04:00
|
|
|
state: &mut OpState,
|
2020-01-28 03:12:25 +01:00
|
|
|
_args: Value,
|
2020-06-01 20:20:47 +02:00
|
|
|
_zero_copy: &mut [ZeroCopyBuf],
|
2020-09-14 18:48:57 +02:00
|
|
|
) -> Result<Value, AnyError> {
|
2020-12-01 23:33:44 +01:00
|
|
|
let apply_source_maps = *state.borrow::<ApplySourceMaps>();
|
2020-10-13 13:35:35 +02:00
|
|
|
let gs = &super::program_state(state);
|
2020-02-04 20:24:33 +01:00
|
|
|
|
2020-08-28 17:08:24 +02:00
|
|
|
Ok(json!({
|
2020-02-04 20:24:33 +01:00
|
|
|
"args": gs.flags.argv.clone(),
|
2020-12-01 23:33:44 +01:00
|
|
|
"applySourceMaps": apply_source_maps,
|
2020-01-28 03:12:25 +01:00
|
|
|
"debugFlag": gs.flags.log_level.map_or(false, |l| l == log::Level::Debug),
|
2020-11-25 11:30:14 +01:00
|
|
|
"denoVersion": version::deno(),
|
2020-01-28 03:12:25 +01:00
|
|
|
"noColor": !colors::use_color(),
|
2020-04-30 17:23:40 +02:00
|
|
|
"pid": std::process::id(),
|
2020-07-08 23:35:45 +09:00
|
|
|
"ppid": ppid(),
|
2020-04-28 12:35:23 -04:00
|
|
|
"target": env!("TARGET"),
|
2020-04-30 17:23:40 +02:00
|
|
|
"tsVersion": version::TYPESCRIPT,
|
|
|
|
"unstableFlag": gs.flags.unstable,
|
|
|
|
"v8Version": version::v8(),
|
|
|
|
"versionFlag": gs.flags.version,
|
2020-08-28 17:08:24 +02:00
|
|
|
}))
|
2020-01-28 03:12:25 +01:00
|
|
|
}
|
2020-02-11 10:04:59 +01:00
|
|
|
|
2020-06-11 13:00:29 +10:00
|
|
|
fn op_main_module(
|
2020-09-10 09:57:45 -04:00
|
|
|
state: &mut OpState,
|
2020-06-11 13:00:29 +10:00
|
|
|
_args: Value,
|
|
|
|
_zero_copy: &mut [ZeroCopyBuf],
|
2020-09-14 18:48:57 +02:00
|
|
|
) -> Result<Value, AnyError> {
|
2020-09-20 01:17:35 +02:00
|
|
|
let main = state.borrow::<ModuleSpecifier>().to_string();
|
2020-06-11 13:00:29 +10:00
|
|
|
let main_url = ModuleSpecifier::resolve_url_or_path(&main)?;
|
|
|
|
if main_url.as_url().scheme() == "file" {
|
|
|
|
let main_path = std::env::current_dir().unwrap().join(main_url.to_string());
|
2020-09-20 01:17:35 +02:00
|
|
|
state
|
|
|
|
.borrow::<Permissions>()
|
|
|
|
.check_read_blind(&main_path, "main_module")?;
|
2020-06-11 13:00:29 +10:00
|
|
|
}
|
2020-08-28 17:08:24 +02:00
|
|
|
Ok(json!(&main))
|
2020-06-11 13:00:29 +10:00
|
|
|
}
|
|
|
|
|
2020-02-11 10:04:59 +01:00
|
|
|
fn op_metrics(
|
2020-09-10 09:57:45 -04:00
|
|
|
state: &mut OpState,
|
2020-02-11 10:04:59 +01:00
|
|
|
_args: Value,
|
2020-06-01 20:20:47 +02:00
|
|
|
_zero_copy: &mut [ZeroCopyBuf],
|
2020-09-14 18:48:57 +02:00
|
|
|
) -> Result<Value, AnyError> {
|
2020-09-18 20:39:47 +02:00
|
|
|
let m = state.borrow::<Metrics>();
|
2020-02-11 10:04:59 +01:00
|
|
|
|
2020-08-28 17:08:24 +02:00
|
|
|
Ok(json!({
|
2020-02-11 17:23:40 +01:00
|
|
|
"opsDispatched": m.ops_dispatched,
|
2020-03-02 19:13:36 +01:00
|
|
|
"opsDispatchedSync": m.ops_dispatched_sync,
|
|
|
|
"opsDispatchedAsync": m.ops_dispatched_async,
|
|
|
|
"opsDispatchedAsyncUnref": m.ops_dispatched_async_unref,
|
2020-02-11 17:23:40 +01:00
|
|
|
"opsCompleted": m.ops_completed,
|
2020-03-02 19:13:36 +01:00
|
|
|
"opsCompletedSync": m.ops_completed_sync,
|
|
|
|
"opsCompletedAsync": m.ops_completed_async,
|
|
|
|
"opsCompletedAsyncUnref": m.ops_completed_async_unref,
|
2020-02-11 17:23:40 +01:00
|
|
|
"bytesSentControl": m.bytes_sent_control,
|
|
|
|
"bytesSentData": m.bytes_sent_data,
|
|
|
|
"bytesReceived": m.bytes_received
|
2020-08-28 17:08:24 +02:00
|
|
|
}))
|
2020-02-11 10:04:59 +01:00
|
|
|
}
|
2020-07-08 23:35:45 +09:00
|
|
|
|
|
|
|
fn ppid() -> Value {
|
|
|
|
#[cfg(windows)]
|
|
|
|
{
|
|
|
|
// Adopted from rustup:
|
|
|
|
// https://github.com/rust-lang/rustup/blob/1.21.1/src/cli/self_update.rs#L1036
|
|
|
|
// Copyright Diggory Blake, the Mozilla Corporation, and rustup contributors.
|
|
|
|
// Licensed under either of
|
|
|
|
// - Apache License, Version 2.0
|
|
|
|
// - MIT license
|
|
|
|
use std::mem;
|
|
|
|
use winapi::shared::minwindef::DWORD;
|
|
|
|
use winapi::um::handleapi::{CloseHandle, INVALID_HANDLE_VALUE};
|
|
|
|
use winapi::um::processthreadsapi::GetCurrentProcessId;
|
|
|
|
use winapi::um::tlhelp32::{
|
|
|
|
CreateToolhelp32Snapshot, Process32First, Process32Next, PROCESSENTRY32,
|
|
|
|
TH32CS_SNAPPROCESS,
|
|
|
|
};
|
|
|
|
unsafe {
|
|
|
|
// Take a snapshot of system processes, one of which is ours
|
|
|
|
// and contains our parent's pid
|
|
|
|
let snapshot = CreateToolhelp32Snapshot(TH32CS_SNAPPROCESS, 0);
|
|
|
|
if snapshot == INVALID_HANDLE_VALUE {
|
|
|
|
return serde_json::to_value(-1).unwrap();
|
|
|
|
}
|
|
|
|
|
|
|
|
let mut entry: PROCESSENTRY32 = mem::zeroed();
|
|
|
|
entry.dwSize = mem::size_of::<PROCESSENTRY32>() as DWORD;
|
|
|
|
|
|
|
|
// Iterate over system processes looking for ours
|
|
|
|
let success = Process32First(snapshot, &mut entry);
|
|
|
|
if success == 0 {
|
|
|
|
CloseHandle(snapshot);
|
|
|
|
return serde_json::to_value(-1).unwrap();
|
|
|
|
}
|
|
|
|
|
|
|
|
let this_pid = GetCurrentProcessId();
|
|
|
|
while entry.th32ProcessID != this_pid {
|
|
|
|
let success = Process32Next(snapshot, &mut entry);
|
|
|
|
if success == 0 {
|
|
|
|
CloseHandle(snapshot);
|
|
|
|
return serde_json::to_value(-1).unwrap();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
CloseHandle(snapshot);
|
|
|
|
|
|
|
|
// FIXME: Using the process ID exposes a race condition
|
|
|
|
// wherein the parent process already exited and the OS
|
|
|
|
// reassigned its ID.
|
|
|
|
let parent_id = entry.th32ParentProcessID;
|
|
|
|
serde_json::to_value(parent_id).unwrap()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#[cfg(not(windows))]
|
|
|
|
{
|
|
|
|
use std::os::unix::process::parent_id;
|
|
|
|
serde_json::to_value(parent_id()).unwrap()
|
|
|
|
}
|
|
|
|
}
|