2023-01-02 16:00:42 -05:00
// Copyright 2018-2023 the Deno authors. All rights reserved. MIT license.
2020-09-05 20:34:02 -04:00
2019-09-02 17:07:11 -04:00
use std ::env ;
use std ::path ::PathBuf ;
2022-11-21 08:36:26 -05:00
use deno_core ::snapshot_util ::* ;
2023-01-04 07:20:36 -05:00
use deno_core ::Extension ;
2023-02-08 16:40:18 -05:00
use deno_core ::ExtensionFileSource ;
2023-02-19 19:11:56 -05:00
use deno_core ::ExtensionFileSourceCode ;
2022-11-21 08:36:26 -05:00
use deno_runtime ::deno_cache ::SqliteBackedCache ;
2023-03-22 00:13:24 -04:00
use deno_runtime ::deno_kv ::sqlite ::SqliteDbHandler ;
2023-01-07 11:25:34 -05:00
use deno_runtime ::permissions ::PermissionsContainer ;
2022-11-21 08:36:26 -05:00
use deno_runtime ::* ;
mod ts {
use super ::* ;
use deno_core ::error ::custom_error ;
use deno_core ::error ::AnyError ;
use deno_core ::op ;
use deno_core ::OpState ;
2023-01-24 09:05:54 -05:00
use deno_runtime ::deno_node ::SUPPORTED_BUILTIN_NODE_MODULES ;
2022-11-21 08:36:26 -05:00
use regex ::Regex ;
use serde ::Deserialize ;
use serde_json ::json ;
use serde_json ::Value ;
use std ::collections ::HashMap ;
use std ::path ::Path ;
use std ::path ::PathBuf ;
#[ derive(Debug, Deserialize) ]
struct LoadArgs {
/// The fully qualified specifier that should be loaded.
specifier : String ,
2022-07-04 18:12:41 -04:00
}
2023-03-17 14:22:15 -04:00
#[ op ]
fn op_build_info ( state : & mut OpState ) -> Value {
let build_specifier = " asset:///bootstrap.ts " ;
let node_built_in_module_names = SUPPORTED_BUILTIN_NODE_MODULES
. iter ( )
. map ( | s | s . name )
. collect ::< Vec < & str > > ( ) ;
let build_libs = state . borrow ::< Vec < & str > > ( ) ;
json! ( {
" buildSpecifier " : build_specifier ,
" libs " : build_libs ,
" nodeBuiltInModuleNames " : node_built_in_module_names ,
} )
}
#[ op ]
fn op_is_node_file ( ) -> bool {
false
}
#[ op ]
fn op_script_version (
_state : & mut OpState ,
_args : Value ,
) -> Result < Option < String > , AnyError > {
Ok ( Some ( " 1 " . to_string ( ) ) )
}
#[ op ]
// using the same op that is used in `tsc.rs` for loading modules and reading
// files, but a slightly different implementation at build time.
fn op_load ( state : & mut OpState , args : LoadArgs ) -> Result < Value , AnyError > {
let op_crate_libs = state . borrow ::< HashMap < & str , PathBuf > > ( ) ;
let path_dts = state . borrow ::< PathBuf > ( ) ;
let re_asset =
Regex ::new ( r "asset:/{3}lib\.(\S+)\.d\.ts" ) . expect ( " bad regex " ) ;
let build_specifier = " asset:///bootstrap.ts " ;
// we need a basic file to send to tsc to warm it up.
if args . specifier = = build_specifier {
Ok ( json! ( {
" data " : r #" Deno.writeTextFile( " hello . txt " , " hello deno ! " ); " #,
" version " : " 1 " ,
// this corresponds to `ts.ScriptKind.TypeScript`
" scriptKind " : 3
} ) )
// specifiers come across as `asset:///lib.{lib_name}.d.ts` and we need to
// parse out just the name so we can lookup the asset.
} else if let Some ( caps ) = re_asset . captures ( & args . specifier ) {
if let Some ( lib ) = caps . get ( 1 ) . map ( | m | m . as_str ( ) ) {
// if it comes from an op crate, we were supplied with the path to the
// file.
let path = if let Some ( op_crate_lib ) = op_crate_libs . get ( lib ) {
PathBuf ::from ( op_crate_lib ) . canonicalize ( ) ?
// otherwise we will generate the path ourself
} else {
path_dts . join ( format! ( " lib. {lib} .d.ts " ) )
} ;
let data = std ::fs ::read_to_string ( path ) ? ;
Ok ( json! ( {
" data " : data ,
" version " : " 1 " ,
// this corresponds to `ts.ScriptKind.TypeScript`
" scriptKind " : 3
} ) )
} else {
Err ( custom_error (
" InvalidSpecifier " ,
format! ( " An invalid specifier was requested: {} " , args . specifier ) ,
) )
}
} else {
Err ( custom_error (
" InvalidSpecifier " ,
format! ( " An invalid specifier was requested: {} " , args . specifier ) ,
) )
}
}
deno_core ::extension! ( deno_tsc ,
ops = [ op_build_info , op_is_node_file , op_load , op_script_version ] ,
js = [
dir " tsc " ,
" 00_typescript.js " ,
" 99_main_compiler.js " ,
] ,
2023-03-17 18:15:27 -04:00
options = {
2023-03-17 14:22:15 -04:00
op_crate_libs : HashMap < & 'static str , PathBuf > ,
build_libs : Vec < & 'static str > ,
path_dts : PathBuf ,
} ,
2023-03-17 18:15:27 -04:00
state = | state , options | {
state . put ( options . op_crate_libs ) ;
state . put ( options . build_libs ) ;
state . put ( options . path_dts ) ;
2023-03-17 14:22:15 -04:00
} ,
) ;
2023-02-08 16:40:18 -05:00
pub fn create_compiler_snapshot ( snapshot_path : PathBuf , cwd : & Path ) {
2022-11-21 08:36:26 -05:00
// libs that are being provided by op crates.
let mut op_crate_libs = HashMap ::new ( ) ;
op_crate_libs . insert ( " deno.cache " , deno_cache ::get_declaration ( ) ) ;
op_crate_libs . insert ( " deno.console " , deno_console ::get_declaration ( ) ) ;
op_crate_libs . insert ( " deno.url " , deno_url ::get_declaration ( ) ) ;
op_crate_libs . insert ( " deno.web " , deno_web ::get_declaration ( ) ) ;
op_crate_libs . insert ( " deno.fetch " , deno_fetch ::get_declaration ( ) ) ;
op_crate_libs . insert ( " deno.websocket " , deno_websocket ::get_declaration ( ) ) ;
op_crate_libs . insert ( " deno.webstorage " , deno_webstorage ::get_declaration ( ) ) ;
op_crate_libs . insert ( " deno.crypto " , deno_crypto ::get_declaration ( ) ) ;
op_crate_libs . insert (
" deno.broadcast_channel " ,
deno_broadcast_channel ::get_declaration ( ) ,
2022-07-04 18:12:41 -04:00
) ;
2022-11-21 08:36:26 -05:00
op_crate_libs . insert ( " deno.net " , deno_net ::get_declaration ( ) ) ;
2022-07-04 18:12:41 -04:00
2022-11-21 08:36:26 -05:00
// ensure we invalidate the build properly.
for ( _ , path ) in op_crate_libs . iter ( ) {
println! ( " cargo:rerun-if-changed= {} " , path . display ( ) ) ;
}
2022-07-04 18:12:41 -04:00
2022-11-21 08:36:26 -05:00
// libs that should be loaded into the isolate before snapshotting.
let libs = vec! [
// Deno custom type libraries
" deno.window " ,
" deno.worker " ,
" deno.shared_globals " ,
" deno.ns " ,
" deno.unstable " ,
// Deno built-in type libraries
2023-03-21 11:46:40 -04:00
" decorators " ,
" decorators.legacy " ,
2022-11-21 08:36:26 -05:00
" es5 " ,
" es2015.collection " ,
" es2015.core " ,
" es2015 " ,
" es2015.generator " ,
" es2015.iterable " ,
" es2015.promise " ,
" es2015.proxy " ,
" es2015.reflect " ,
" es2015.symbol " ,
" es2015.symbol.wellknown " ,
" es2016.array.include " ,
" es2016 " ,
" es2017 " ,
" es2017.intl " ,
" es2017.object " ,
" es2017.sharedmemory " ,
" es2017.string " ,
" es2017.typedarrays " ,
" es2018.asyncgenerator " ,
" es2018.asynciterable " ,
" es2018 " ,
" es2018.intl " ,
" es2018.promise " ,
" es2018.regexp " ,
" es2019.array " ,
" es2019 " ,
2023-01-14 09:36:19 -05:00
" es2019.intl " ,
2022-11-21 08:36:26 -05:00
" es2019.object " ,
" es2019.string " ,
" es2019.symbol " ,
" es2020.bigint " ,
" es2020 " ,
" es2020.date " ,
" es2020.intl " ,
" es2020.number " ,
" es2020.promise " ,
" es2020.sharedmemory " ,
" es2020.string " ,
" es2020.symbol.wellknown " ,
" es2021 " ,
" es2021.intl " ,
" es2021.promise " ,
" es2021.string " ,
" es2021.weakref " ,
" es2022 " ,
" es2022.array " ,
" es2022.error " ,
" es2022.intl " ,
" es2022.object " ,
2023-03-21 11:46:40 -04:00
" es2022.regexp " ,
2023-01-14 09:36:19 -05:00
" es2022.sharedmemory " ,
2022-11-21 08:36:26 -05:00
" es2022.string " ,
2023-03-21 11:46:40 -04:00
" es2023 " ,
" es2023.array " ,
2022-11-21 08:36:26 -05:00
" esnext " ,
" esnext.array " ,
" esnext.intl " ,
] ;
2022-11-25 18:29:48 -05:00
let path_dts = cwd . join ( " tsc/dts " ) ;
2022-11-21 08:36:26 -05:00
// ensure we invalidate the build properly.
for name in libs . iter ( ) {
println! (
" cargo:rerun-if-changed={} " ,
2023-01-27 10:43:16 -05:00
path_dts . join ( format! ( " lib. {name} .d.ts " ) ) . display ( )
2022-11-21 08:36:26 -05:00
) ;
}
2022-12-14 13:00:51 -05:00
println! (
" cargo:rerun-if-changed={} " ,
cwd . join ( " tsc " ) . join ( " 00_typescript.js " ) . display ( )
) ;
println! (
" cargo:rerun-if-changed={} " ,
cwd . join ( " tsc " ) . join ( " 99_main_compiler.js " ) . display ( )
) ;
2022-12-05 16:17:49 -05:00
println! (
" cargo:rerun-if-changed={} " ,
cwd . join ( " js " ) . join ( " 40_testing.js " ) . display ( )
) ;
2022-07-04 18:12:41 -04:00
2022-11-21 08:36:26 -05:00
// create a copy of the vector that includes any op crate libs to be passed
// to the JavaScript compiler to build into the snapshot
let mut build_libs = libs . clone ( ) ;
for ( op_lib , _ ) in op_crate_libs . iter ( ) {
build_libs . push ( op_lib . to_owned ( ) ) ;
}
2022-07-04 18:12:41 -04:00
2023-01-14 09:36:19 -05:00
// used in the tests to verify that after snapshotting it has the same number
// of lib files loaded and hasn't included any ones lazily loaded from Rust
std ::fs ::write (
PathBuf ::from ( env ::var_os ( " OUT_DIR " ) . unwrap ( ) )
. join ( " lib_file_names.json " ) ,
serde_json ::to_string ( & build_libs ) . unwrap ( ) ,
)
. unwrap ( ) ;
2022-11-21 08:36:26 -05:00
create_snapshot ( CreateSnapshotOptions {
cargo_manifest_dir : env ! ( " CARGO_MANIFEST_DIR " ) ,
snapshot_path ,
startup_snapshot : None ,
2023-03-17 14:22:15 -04:00
extensions : vec ! [ deno_tsc ::init_ops_and_esm (
op_crate_libs ,
build_libs ,
path_dts ,
) ] ,
2023-03-21 15:11:22 -04:00
// NOTE(bartlomieju): Compressing the TSC snapshot in debug build took
// ~45s on M1 MacBook Pro; without compression it took ~1s.
// Thus we're not not using compressed snapshot, trading off
// a lot of build time for some startup time in debug build.
#[ cfg(debug_assertions) ]
2023-02-13 20:46:32 -05:00
compression_cb : None ,
2023-03-21 15:11:22 -04:00
#[ cfg(not(debug_assertions)) ]
compression_cb : Some ( Box ::new ( | vec , snapshot_slice | {
eprintln! ( " Compressing TSC snapshot... " ) ;
vec . extend_from_slice (
& zstd ::bulk ::compress ( snapshot_slice , 22 )
. expect ( " snapshot compression failed " ) ,
) ;
} ) ) ,
2023-02-08 16:40:18 -05:00
snapshot_module_load_cb : None ,
2022-11-21 08:36:26 -05:00
} ) ;
2022-07-04 18:12:41 -04:00
}
2022-11-21 08:36:26 -05:00
pub ( crate ) fn version ( ) -> String {
2022-12-07 12:59:59 -05:00
let file_text = std ::fs ::read_to_string ( " tsc/00_typescript.js " ) . unwrap ( ) ;
2023-03-21 11:46:40 -04:00
let version_text = " version = \" " ;
2022-12-07 12:59:59 -05:00
for line in file_text . lines ( ) {
2023-03-21 11:46:40 -04:00
if let Some ( index ) = line . find ( version_text ) {
2022-12-07 12:59:59 -05:00
let remaining_line = & line [ index + version_text . len ( ) .. ] ;
2023-03-21 11:46:40 -04:00
return remaining_line [ .. remaining_line . find ( '"' ) . unwrap ( ) ] . to_string ( ) ;
2022-12-07 12:59:59 -05:00
}
}
panic! ( " Could not find ts version. " )
2022-11-21 08:36:26 -05:00
}
2022-07-04 18:12:41 -04:00
}
2023-03-17 14:22:15 -04:00
// FIXME(bartlomieju): information about which extensions were
// already snapshotted is not preserved in the snapshot. This should be
// fixed, so we can reliably depend on that information.
// deps = [runtime]
deno_core ::extension! (
cli ,
esm = [
dir " js " ,
" 40_testing.js "
] ,
2023-03-18 18:30:04 -04:00
customizer = | ext : & mut deno_core ::ExtensionBuilder | {
2023-03-17 14:22:15 -04:00
ext . esm ( vec! [ ExtensionFileSource {
2023-03-18 16:09:13 -04:00
specifier : " ext:cli/runtime/js/99_main.js " ,
2023-03-17 14:22:15 -04:00
code : ExtensionFileSourceCode ::LoadedFromFsDuringSnapshot (
std ::path ::PathBuf ::from ( deno_runtime ::js ::PATH_FOR_99_MAIN_JS ) ,
) ,
} ] ) ;
}
) ;
2023-02-08 16:40:18 -05:00
fn create_cli_snapshot ( snapshot_path : PathBuf ) {
2023-03-16 13:36:53 -04:00
// NOTE(bartlomieju): ordering is important here, keep it in sync with
// `runtime/worker.rs`, `runtime/web_worker.rs` and `runtime/build.rs`!
2023-03-17 14:22:15 -04:00
let extensions : Vec < Extension > = vec! [
deno_webidl ::deno_webidl ::init_ops ( ) ,
deno_console ::deno_console ::init_ops ( ) ,
deno_url ::deno_url ::init_ops ( ) ,
deno_web ::deno_web ::init_ops ::< PermissionsContainer > (
2022-11-21 08:36:26 -05:00
deno_web ::BlobStore ::default ( ) ,
Default ::default ( ) ,
) ,
2023-03-17 14:22:15 -04:00
deno_fetch ::deno_fetch ::init_ops ::< PermissionsContainer > ( Default ::default ( ) ) ,
deno_cache ::deno_cache ::init_ops ::< SqliteBackedCache > ( None ) ,
deno_websocket ::deno_websocket ::init_ops ::< PermissionsContainer > (
" " . to_owned ( ) ,
None ,
None ,
) ,
deno_webstorage ::deno_webstorage ::init_ops ( None ) ,
deno_crypto ::deno_crypto ::init_ops ( None ) ,
deno_broadcast_channel ::deno_broadcast_channel ::init_ops (
2022-11-21 08:36:26 -05:00
deno_broadcast_channel ::InMemoryBroadcastChannel ::default ( ) ,
false , // No --unstable.
) ,
2023-03-17 14:22:15 -04:00
deno_ffi ::deno_ffi ::init_ops ::< PermissionsContainer > ( false ) ,
deno_net ::deno_net ::init_ops ::< PermissionsContainer > (
2022-11-21 08:36:26 -05:00
None , false , // No --unstable.
None ,
) ,
2023-03-17 14:22:15 -04:00
deno_tls ::deno_tls ::init_ops ( ) ,
2023-03-22 00:13:24 -04:00
deno_kv ::deno_kv ::init_ops (
SqliteDbHandler ::< PermissionsContainer > ::new ( None ) ,
false , // No --unstable.
) ,
2023-03-17 14:22:15 -04:00
deno_napi ::deno_napi ::init_ops ::< PermissionsContainer > ( ) ,
deno_http ::deno_http ::init_ops ( ) ,
2023-03-17 18:15:27 -04:00
deno_io ::deno_io ::init_ops ( Default ::default ( ) ) ,
2023-03-17 14:22:15 -04:00
deno_fs ::deno_fs ::init_ops ::< PermissionsContainer > ( false ) ,
deno_flash ::deno_flash ::init_ops ::< PermissionsContainer > ( false ) , // No --unstable
2023-03-28 17:52:08 -04:00
deno_node ::deno_node ::init_ops ::< deno_runtime ::RuntimeNodeEnv > ( None ) ,
2023-03-17 14:22:15 -04:00
cli ::init_ops_and_esm ( ) , // NOTE: This needs to be init_ops_and_esm!
2022-11-21 08:36:26 -05:00
] ;
create_snapshot ( CreateSnapshotOptions {
cargo_manifest_dir : env ! ( " CARGO_MANIFEST_DIR " ) ,
snapshot_path ,
startup_snapshot : Some ( deno_runtime ::js ::deno_isolate_init ( ) ) ,
extensions ,
2023-03-16 23:19:46 -04:00
compression_cb : None ,
2023-02-08 16:40:18 -05:00
snapshot_module_load_cb : None ,
2022-11-21 08:36:26 -05:00
} )
2022-07-04 18:12:41 -04:00
}
fn git_commit_hash ( ) -> String {
if let Ok ( output ) = std ::process ::Command ::new ( " git " )
. arg ( " rev-list " )
. arg ( " -1 " )
. arg ( " HEAD " )
. output ( )
{
if output . status . success ( ) {
std ::str ::from_utf8 ( & output . stdout [ .. 40 ] )
. unwrap ( )
. to_string ( )
} else {
// When not in git repository
// (e.g. when the user install by `cargo install deno`)
" UNKNOWN " . to_string ( )
}
} else {
// When there is no git command for some reason
" UNKNOWN " . to_string ( )
}
}
2020-07-19 13:49:44 -04:00
fn main ( ) {
2020-12-14 09:15:16 -05:00
// Skip building from docs.rs.
if env ::var_os ( " DOCS_RS " ) . is_some ( ) {
2020-07-19 13:49:44 -04:00
return ;
}
2022-03-16 09:47:15 -04:00
// Host snapshots won't work when cross compiling.
let target = env ::var ( " TARGET " ) . unwrap ( ) ;
let host = env ::var ( " HOST " ) . unwrap ( ) ;
if target ! = host {
panic! ( " Cross compiling with snapshot is not supported. " ) ;
}
2022-10-05 10:06:44 -04:00
2022-11-25 18:49:02 -05:00
let symbols_path = std ::path ::Path ::new ( " napi " ) . join (
2022-10-18 07:20:11 -04:00
format! ( " generated_symbol_exports_list_ {} .def " , env ::consts ::OS ) . as_str ( ) ,
2022-10-15 11:21:04 -04:00
)
. canonicalize ( )
. expect (
" Missing symbols list! Generate using tools/napi/generate_symbols_lists.js " ,
) ;
2022-10-05 10:06:44 -04:00
#[ cfg(target_os = " windows " ) ]
println! (
" cargo:rustc-link-arg-bin=deno=/DEF:{} " ,
2022-10-15 11:21:04 -04:00
symbols_path . display ( )
) ;
#[ cfg(target_os = " macos " ) ]
println! (
" cargo:rustc-link-arg-bin=deno=-Wl,-exported_symbols_list,{} " ,
symbols_path . display ( )
2022-10-05 10:06:44 -04:00
) ;
2022-10-15 11:21:04 -04:00
#[ cfg(target_os = " linux " ) ]
2022-10-06 11:50:00 -04:00
{
2022-10-15 11:21:04 -04:00
let ver = glibc_version ::get_version ( ) . unwrap ( ) ;
fix(build) assume a custom compiler will support --export-dynamic-symbol-list linker flag. (#16387)
This PR fixes a regression that caused deno binaries produced by the CI
release workflows to be larger than expected.
**The problem:** The build script will determine whether the linker
supports the `--export-dynamic-symbol-list` flag by looking at the glibc
version installed on the system. Ubuntu 20.04 ships with glibc 2.31,
which does not support this flag. Upon investigation, I discovered that
the CI pipeline does not use the gcc compiler provided by the
`build-essential` package, and instead uses *clang-14*, which does
support the new flag.
**The solution:** Whenever a custom C Compiler is configured, the build
script now assumes the compiler supports the
`--export-dynamic-symbol-list` flag. This is not always going to be the
case (you could use clang-8, for example), but it puts the onus on the
user making the override to ensure the compiler has support.
This will return deno builds for Linux to their previous size of ~100MB,
and also allow builds under older glibc/gcc versions to succeed. If a
user is compiling deno with a custom compiler that does not support this
new flag, however, their build will fail. I expect this is a rare
scenario, however, and suggest we cross that bridge if and when we come
to it.
2022-10-22 17:41:11 -04:00
// If a custom compiler is set, the glibc version is not reliable.
// Here, we assume that if a custom compiler is used, that it will be modern enough to support a dynamic symbol list.
if env ::var ( " CC " ) . is_err ( ) & & ver . major < = 2 & & ver . minor < 35 {
2022-10-15 11:21:04 -04:00
println! ( " cargo:warning=Compiling with all symbols exported, this will result in a larger binary. Please use glibc 2.35 or later for an optimised build. " ) ;
println! ( " cargo:rustc-link-arg-bin=deno=-rdynamic " ) ;
} else {
2022-10-06 11:50:00 -04:00
println! (
2022-10-15 11:21:04 -04:00
" cargo:rustc-link-arg-bin=deno=-Wl,--export-dynamic-symbol-list={} " ,
symbols_path . display ( )
2022-10-06 11:50:00 -04:00
) ;
}
}
2022-10-05 10:06:44 -04:00
2022-07-04 18:12:41 -04:00
// To debug snapshot issues uncomment:
// op_fetch_asset::trace_serializer();
2020-07-19 13:49:44 -04:00
2021-07-20 13:52:09 -04:00
if let Ok ( c ) = env ::var ( " DENO_CANARY " ) {
2023-01-27 10:43:16 -05:00
println! ( " cargo:rustc-env=DENO_CANARY= {c} " ) ;
2021-07-20 13:52:09 -04:00
}
println! ( " cargo:rerun-if-env-changed=DENO_CANARY " ) ;
2022-03-16 20:25:44 -04:00
2020-11-02 12:40:33 -05:00
println! ( " cargo:rustc-env=GIT_COMMIT_HASH= {} " , git_commit_hash ( ) ) ;
2021-07-20 13:52:09 -04:00
println! ( " cargo:rerun-if-env-changed=GIT_COMMIT_HASH " ) ;
2023-03-23 18:27:58 -04:00
println! (
" cargo:rustc-env=GIT_COMMIT_HASH_SHORT={} " ,
& git_commit_hash ( ) [ .. 7 ]
) ;
2021-07-20 13:52:09 -04:00
2023-03-21 11:46:40 -04:00
let ts_version = ts ::version ( ) ;
2023-03-31 13:09:04 -04:00
debug_assert_eq! ( ts_version , " 5.0.3 " ) ; // bump this assertion when it changes
2023-03-21 11:46:40 -04:00
println! ( " cargo:rustc-env=TS_VERSION= {} " , ts_version ) ;
2021-07-20 13:52:09 -04:00
println! ( " cargo:rerun-if-env-changed=TS_VERSION " ) ;
2022-07-04 18:12:41 -04:00
println! ( " cargo:rustc-env=TARGET= {} " , env ::var ( " TARGET " ) . unwrap ( ) ) ;
println! ( " cargo:rustc-env=PROFILE= {} " , env ::var ( " PROFILE " ) . unwrap ( ) ) ;
let c = PathBuf ::from ( env ::var_os ( " CARGO_MANIFEST_DIR " ) . unwrap ( ) ) ;
let o = PathBuf ::from ( env ::var_os ( " OUT_DIR " ) . unwrap ( ) ) ;
let compiler_snapshot_path = o . join ( " COMPILER_SNAPSHOT.bin " ) ;
2023-02-08 16:40:18 -05:00
ts ::create_compiler_snapshot ( compiler_snapshot_path , & c ) ;
2022-07-04 18:12:41 -04:00
2022-11-21 08:36:26 -05:00
let cli_snapshot_path = o . join ( " CLI_SNAPSHOT.bin " ) ;
2023-02-08 16:40:18 -05:00
create_cli_snapshot ( cli_snapshot_path ) ;
2022-07-04 18:12:41 -04:00
2020-07-22 13:19:37 -04:00
#[ cfg(target_os = " windows " ) ]
{
let mut res = winres ::WindowsResource ::new ( ) ;
res . set_icon ( " deno.ico " ) ;
res . set_language ( winapi ::um ::winnt ::MAKELANGID (
winapi ::um ::winnt ::LANG_ENGLISH ,
winapi ::um ::winnt ::SUBLANG_ENGLISH_US ,
) ) ;
res . compile ( ) . unwrap ( ) ;
}
2020-07-22 12:03:46 -04:00
}