2022-09-22 11:17:02 -04:00
|
|
|
// Copyright 2018-2022 the Deno authors. All rights reserved. MIT license.
|
|
|
|
|
2022-10-21 11:20:18 -04:00
|
|
|
use std::collections::HashSet;
|
2022-09-22 11:17:02 -04:00
|
|
|
use std::io::ErrorKind;
|
2022-09-13 11:59:01 -04:00
|
|
|
use std::path::Path;
|
|
|
|
use std::path::PathBuf;
|
|
|
|
|
|
|
|
use deno_ast::ModuleSpecifier;
|
|
|
|
use deno_core::error::AnyError;
|
|
|
|
use deno_core::futures;
|
|
|
|
use deno_core::futures::future::BoxFuture;
|
|
|
|
use deno_core::url::Url;
|
|
|
|
|
2022-10-25 12:20:07 -04:00
|
|
|
use crate::lockfile::Lockfile;
|
2022-10-17 12:27:31 -04:00
|
|
|
use crate::npm::cache::should_sync_download;
|
2022-09-28 13:04:16 -04:00
|
|
|
use crate::npm::resolution::NpmResolutionSnapshot;
|
2022-09-13 11:59:01 -04:00
|
|
|
use crate::npm::NpmCache;
|
|
|
|
use crate::npm::NpmPackageReq;
|
|
|
|
use crate::npm::NpmResolutionPackage;
|
|
|
|
|
|
|
|
pub trait InnerNpmPackageResolver: Send + Sync {
|
2022-09-22 11:17:02 -04:00
|
|
|
fn resolve_package_folder_from_deno_module(
|
2022-09-13 11:59:01 -04:00
|
|
|
&self,
|
|
|
|
pkg_req: &NpmPackageReq,
|
2022-09-22 11:17:02 -04:00
|
|
|
) -> Result<PathBuf, AnyError>;
|
2022-09-13 11:59:01 -04:00
|
|
|
|
2022-09-22 11:17:02 -04:00
|
|
|
fn resolve_package_folder_from_package(
|
2022-09-13 11:59:01 -04:00
|
|
|
&self,
|
|
|
|
name: &str,
|
|
|
|
referrer: &ModuleSpecifier,
|
2022-10-21 11:20:18 -04:00
|
|
|
conditions: &[&str],
|
2022-09-22 11:17:02 -04:00
|
|
|
) -> Result<PathBuf, AnyError>;
|
2022-09-13 11:59:01 -04:00
|
|
|
|
2022-09-22 11:17:02 -04:00
|
|
|
fn resolve_package_folder_from_specifier(
|
2022-09-13 11:59:01 -04:00
|
|
|
&self,
|
|
|
|
specifier: &ModuleSpecifier,
|
2022-09-22 11:17:02 -04:00
|
|
|
) -> Result<PathBuf, AnyError>;
|
2022-09-13 11:59:01 -04:00
|
|
|
|
|
|
|
fn has_packages(&self) -> bool;
|
|
|
|
|
|
|
|
fn add_package_reqs(
|
|
|
|
&self,
|
|
|
|
packages: Vec<NpmPackageReq>,
|
|
|
|
) -> BoxFuture<'static, Result<(), AnyError>>;
|
|
|
|
|
2022-10-21 11:20:18 -04:00
|
|
|
fn set_package_reqs(
|
|
|
|
&self,
|
|
|
|
packages: HashSet<NpmPackageReq>,
|
|
|
|
) -> BoxFuture<'static, Result<(), AnyError>>;
|
|
|
|
|
2022-09-13 11:59:01 -04:00
|
|
|
fn ensure_read_permission(&self, path: &Path) -> Result<(), AnyError>;
|
2022-09-28 13:04:16 -04:00
|
|
|
|
|
|
|
fn snapshot(&self) -> NpmResolutionSnapshot;
|
2022-10-25 12:20:07 -04:00
|
|
|
|
|
|
|
fn lock(&self, lockfile: &mut Lockfile) -> Result<(), AnyError>;
|
2022-09-13 11:59:01 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
/// Caches all the packages in parallel.
|
|
|
|
pub async fn cache_packages(
|
|
|
|
mut packages: Vec<NpmResolutionPackage>,
|
|
|
|
cache: &NpmCache,
|
|
|
|
registry_url: &Url,
|
|
|
|
) -> Result<(), AnyError> {
|
2022-09-23 17:35:48 -04:00
|
|
|
let sync_download = should_sync_download();
|
|
|
|
if sync_download {
|
|
|
|
// we're running the tests not with --quiet
|
|
|
|
// and we want the output to be deterministic
|
2022-09-13 11:59:01 -04:00
|
|
|
packages.sort_by(|a, b| a.id.cmp(&b.id));
|
2022-09-23 17:35:48 -04:00
|
|
|
}
|
|
|
|
let mut handles = Vec::with_capacity(packages.len());
|
|
|
|
for package in packages {
|
|
|
|
let cache = cache.clone();
|
|
|
|
let registry_url = registry_url.clone();
|
|
|
|
let handle = tokio::task::spawn(async move {
|
2022-09-13 11:59:01 -04:00
|
|
|
cache
|
2022-09-23 17:35:48 -04:00
|
|
|
.ensure_package(&package.id, &package.dist, ®istry_url)
|
2022-09-13 11:59:01 -04:00
|
|
|
.await
|
|
|
|
});
|
2022-09-23 17:35:48 -04:00
|
|
|
if sync_download {
|
|
|
|
handle.await??;
|
|
|
|
} else {
|
|
|
|
handles.push(handle);
|
2022-09-13 11:59:01 -04:00
|
|
|
}
|
|
|
|
}
|
2022-09-23 17:35:48 -04:00
|
|
|
let results = futures::future::join_all(handles).await;
|
|
|
|
for result in results {
|
|
|
|
// surface the first error
|
|
|
|
result??;
|
|
|
|
}
|
2022-09-13 11:59:01 -04:00
|
|
|
Ok(())
|
|
|
|
}
|
2022-09-22 11:17:02 -04:00
|
|
|
|
|
|
|
pub fn ensure_registry_read_permission(
|
|
|
|
registry_path: &Path,
|
|
|
|
path: &Path,
|
|
|
|
) -> Result<(), AnyError> {
|
|
|
|
// allow reading if it's in the node_modules
|
|
|
|
if path.starts_with(®istry_path)
|
|
|
|
&& path
|
|
|
|
.components()
|
|
|
|
.all(|c| !matches!(c, std::path::Component::ParentDir))
|
|
|
|
{
|
|
|
|
// todo(dsherret): cache this?
|
|
|
|
if let Ok(registry_path) = std::fs::canonicalize(registry_path) {
|
|
|
|
match std::fs::canonicalize(path) {
|
|
|
|
Ok(path) if path.starts_with(registry_path) => {
|
|
|
|
return Ok(());
|
|
|
|
}
|
|
|
|
Err(e) if e.kind() == ErrorKind::NotFound => {
|
|
|
|
return Ok(());
|
|
|
|
}
|
|
|
|
_ => {} // ignore
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
Err(deno_core::error::custom_error(
|
|
|
|
"PermissionDenied",
|
|
|
|
format!("Reading {} is not allowed", path.display()),
|
|
|
|
))
|
|
|
|
}
|