2022-01-07 22:09:52 -05:00
|
|
|
|
// Copyright 2018-2022 the Deno authors. All rights reserved. MIT license.
|
2021-06-27 13:27:36 -04:00
|
|
|
|
|
|
|
|
|
use deno_core::url;
|
|
|
|
|
use std::process::Command;
|
|
|
|
|
use test_util as util;
|
2022-04-01 11:15:37 -04:00
|
|
|
|
use test_util::TempDir;
|
2021-06-27 13:27:36 -04:00
|
|
|
|
|
|
|
|
|
itest!(stdout_write_all {
|
|
|
|
|
args: "run --quiet stdout_write_all.ts",
|
|
|
|
|
output: "stdout_write_all.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(_001_hello {
|
|
|
|
|
args: "run --reload 001_hello.js",
|
|
|
|
|
output: "001_hello.js.out",
|
2022-04-10 19:12:51 -04:00
|
|
|
|
envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())],
|
2021-06-27 13:27:36 -04:00
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(_002_hello {
|
|
|
|
|
args: "run --quiet --reload 002_hello.ts",
|
|
|
|
|
output: "002_hello.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(_003_relative_import {
|
|
|
|
|
args: "run --quiet --reload 003_relative_import.ts",
|
|
|
|
|
output: "003_relative_import.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(_004_set_timeout {
|
|
|
|
|
args: "run --quiet --reload 004_set_timeout.ts",
|
|
|
|
|
output: "004_set_timeout.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(_005_more_imports {
|
|
|
|
|
args: "run --quiet --reload 005_more_imports.ts",
|
|
|
|
|
output: "005_more_imports.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(_006_url_imports {
|
|
|
|
|
args: "run --quiet --reload 006_url_imports.ts",
|
|
|
|
|
output: "006_url_imports.ts.out",
|
|
|
|
|
http_server: true,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(_012_async {
|
|
|
|
|
args: "run --quiet --reload 012_async.ts",
|
|
|
|
|
output: "012_async.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(_013_dynamic_import {
|
|
|
|
|
args: "run --quiet --reload --allow-read 013_dynamic_import.ts",
|
|
|
|
|
output: "013_dynamic_import.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(_014_duplicate_import {
|
|
|
|
|
args: "run --quiet --reload --allow-read 014_duplicate_import.ts ",
|
|
|
|
|
output: "014_duplicate_import.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(_015_duplicate_parallel_import {
|
|
|
|
|
args: "run --quiet --reload --allow-read 015_duplicate_parallel_import.js",
|
|
|
|
|
output: "015_duplicate_parallel_import.js.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(_016_double_await {
|
|
|
|
|
args: "run --quiet --allow-read --reload 016_double_await.ts",
|
|
|
|
|
output: "016_double_await.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(_017_import_redirect {
|
|
|
|
|
args: "run --quiet --reload 017_import_redirect.ts",
|
|
|
|
|
output: "017_import_redirect.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(_017_import_redirect_nocheck {
|
|
|
|
|
args: "run --quiet --reload --no-check 017_import_redirect.ts",
|
|
|
|
|
output: "017_import_redirect.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(_017_import_redirect_info {
|
|
|
|
|
args: "info --quiet --reload 017_import_redirect.ts",
|
|
|
|
|
output: "017_import_redirect_info.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(_018_async_catch {
|
|
|
|
|
args: "run --quiet --reload 018_async_catch.ts",
|
|
|
|
|
output: "018_async_catch.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(_019_media_types {
|
|
|
|
|
args: "run --reload 019_media_types.ts",
|
|
|
|
|
output: "019_media_types.ts.out",
|
|
|
|
|
http_server: true,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(_020_json_modules {
|
|
|
|
|
args: "run --reload 020_json_modules.ts",
|
|
|
|
|
output: "020_json_modules.ts.out",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(_021_mjs_modules {
|
|
|
|
|
args: "run --quiet --reload 021_mjs_modules.ts",
|
|
|
|
|
output: "021_mjs_modules.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(_023_no_ext {
|
2022-04-10 19:12:51 -04:00
|
|
|
|
args: "run --reload --check 023_no_ext",
|
2021-06-27 13:27:36 -04:00
|
|
|
|
output: "023_no_ext.out",
|
2022-04-10 19:12:51 -04:00
|
|
|
|
envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())],
|
2021-06-27 13:27:36 -04:00
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
// TODO(lucacasonato): remove --unstable when permissions goes stable
|
|
|
|
|
itest!(_025_hrtime {
|
|
|
|
|
args: "run --quiet --allow-hrtime --unstable --reload 025_hrtime.ts",
|
|
|
|
|
output: "025_hrtime.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(_025_reload_js_type_error {
|
|
|
|
|
args: "run --quiet --reload 025_reload_js_type_error.js",
|
|
|
|
|
output: "025_reload_js_type_error.js.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(_026_redirect_javascript {
|
|
|
|
|
args: "run --quiet --reload 026_redirect_javascript.js",
|
|
|
|
|
output: "026_redirect_javascript.js.out",
|
|
|
|
|
http_server: true,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(_027_redirect_typescript {
|
|
|
|
|
args: "run --quiet --reload 027_redirect_typescript.ts",
|
|
|
|
|
output: "027_redirect_typescript.ts.out",
|
|
|
|
|
http_server: true,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(_028_args {
|
|
|
|
|
args: "run --quiet --reload 028_args.ts --arg1 val1 --arg2=val2 -- arg3 arg4",
|
|
|
|
|
output: "028_args.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(_033_import_map {
|
|
|
|
|
args:
|
|
|
|
|
"run --quiet --reload --import-map=import_maps/import_map.json import_maps/test.ts",
|
|
|
|
|
output: "033_import_map.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(_033_import_map_remote {
|
|
|
|
|
args:
|
2021-08-11 10:20:47 -04:00
|
|
|
|
"run --quiet --reload --import-map=http://127.0.0.1:4545/import_maps/import_map_remote.json --unstable import_maps/test_remote.ts",
|
2021-06-27 13:27:36 -04:00
|
|
|
|
output: "033_import_map_remote.out",
|
|
|
|
|
http_server: true,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(_034_onload {
|
|
|
|
|
args: "run --quiet --reload 034_onload/main.ts",
|
|
|
|
|
output: "034_onload.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(_035_cached_only_flag {
|
2022-04-10 19:12:51 -04:00
|
|
|
|
args: "run --reload --check --cached-only http://127.0.0.1:4545/019_media_types.ts",
|
2021-06-27 13:27:36 -04:00
|
|
|
|
output: "035_cached_only_flag.out",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
http_server: true,
|
2022-04-10 19:12:51 -04:00
|
|
|
|
envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())],
|
2021-06-27 13:27:36 -04:00
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(_038_checkjs {
|
|
|
|
|
// checking if JS file is run through TS compiler
|
2021-12-22 08:25:06 -05:00
|
|
|
|
args: "run --reload --config checkjs.tsconfig.json 038_checkjs.js",
|
2021-06-27 13:27:36 -04:00
|
|
|
|
exit_code: 1,
|
|
|
|
|
output: "038_checkjs.js.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(_042_dyn_import_evalcontext {
|
|
|
|
|
args: "run --quiet --allow-read --reload 042_dyn_import_evalcontext.ts",
|
|
|
|
|
output: "042_dyn_import_evalcontext.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(_044_bad_resource {
|
|
|
|
|
args: "run --quiet --reload --allow-read 044_bad_resource.ts",
|
|
|
|
|
output: "044_bad_resource.ts.out",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
});
|
|
|
|
|
|
2022-05-18 16:00:11 -04:00
|
|
|
|
// TODO(bartlomieju): remove --unstable once Deno.spawn is stabilized
|
2021-06-27 13:27:36 -04:00
|
|
|
|
itest!(_045_proxy {
|
2022-05-18 16:00:11 -04:00
|
|
|
|
args: "run -L debug --unstable --allow-net --allow-env --allow-run --allow-read --reload --quiet 045_proxy_test.ts",
|
2021-06-27 13:27:36 -04:00
|
|
|
|
output: "045_proxy_test.ts.out",
|
|
|
|
|
http_server: true,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(_046_tsx {
|
|
|
|
|
args: "run --quiet --reload 046_jsx_test.tsx",
|
|
|
|
|
output: "046_jsx_test.tsx.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(_047_jsx {
|
|
|
|
|
args: "run --quiet --reload 047_jsx_test.jsx",
|
|
|
|
|
output: "047_jsx_test.jsx.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(_048_media_types_jsx {
|
|
|
|
|
args: "run --reload 048_media_types_jsx.ts",
|
|
|
|
|
output: "048_media_types_jsx.ts.out",
|
|
|
|
|
http_server: true,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(_052_no_remote_flag {
|
2022-04-10 19:12:51 -04:00
|
|
|
|
args:
|
|
|
|
|
"run --reload --check --no-remote http://127.0.0.1:4545/019_media_types.ts",
|
2021-06-27 13:27:36 -04:00
|
|
|
|
output: "052_no_remote_flag.out",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
http_server: true,
|
2022-04-10 19:12:51 -04:00
|
|
|
|
envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())],
|
2021-06-27 13:27:36 -04:00
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(_056_make_temp_file_write_perm {
|
|
|
|
|
args:
|
|
|
|
|
"run --quiet --allow-read --allow-write=./subdir/ 056_make_temp_file_write_perm.ts",
|
|
|
|
|
output: "056_make_temp_file_write_perm.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(_058_tasks_microtasks_close {
|
|
|
|
|
args: "run --quiet 058_tasks_microtasks_close.ts",
|
|
|
|
|
output: "058_tasks_microtasks_close.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(_059_fs_relative_path_perm {
|
|
|
|
|
args: "run 059_fs_relative_path_perm.ts",
|
|
|
|
|
output: "059_fs_relative_path_perm.ts.out",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(_070_location {
|
|
|
|
|
args: "run --location https://foo/bar?baz#bat 070_location.ts",
|
|
|
|
|
output: "070_location.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(_071_location_unset {
|
|
|
|
|
args: "run 071_location_unset.ts",
|
|
|
|
|
output: "071_location_unset.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(_072_location_relative_fetch {
|
2021-10-26 20:10:27 -04:00
|
|
|
|
args: "run --location http://127.0.0.1:4545/ --allow-net 072_location_relative_fetch.ts",
|
|
|
|
|
output: "072_location_relative_fetch.ts.out",
|
|
|
|
|
http_server: true,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
// tests the serialization of webstorage (both localStorage and sessionStorage)
|
|
|
|
|
itest!(webstorage_serialization {
|
|
|
|
|
args: "run webstorage/serialization.ts",
|
|
|
|
|
output: "webstorage/serialization.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
// tests to ensure that when `--location` is set, all code shares the same
|
|
|
|
|
// localStorage cache based on the origin of the location URL.
|
|
|
|
|
#[test]
|
|
|
|
|
fn webstorage_location_shares_origin() {
|
|
|
|
|
let deno_dir = util::new_deno_dir();
|
|
|
|
|
|
2022-04-01 11:15:37 -04:00
|
|
|
|
let mut deno_cmd = util::deno_cmd_with_deno_dir(&deno_dir);
|
2021-10-26 20:10:27 -04:00
|
|
|
|
let output = deno_cmd
|
|
|
|
|
.current_dir(util::testdata_path())
|
|
|
|
|
.arg("run")
|
|
|
|
|
.arg("--location")
|
|
|
|
|
.arg("https://example.com/a.ts")
|
|
|
|
|
.arg("webstorage/fixture.ts")
|
|
|
|
|
.stdout(std::process::Stdio::piped())
|
|
|
|
|
.spawn()
|
|
|
|
|
.unwrap()
|
|
|
|
|
.wait_with_output()
|
|
|
|
|
.unwrap();
|
|
|
|
|
assert!(output.status.success());
|
|
|
|
|
assert_eq!(output.stdout, b"Storage { length: 0 }\n");
|
|
|
|
|
|
2022-04-01 11:15:37 -04:00
|
|
|
|
let mut deno_cmd = util::deno_cmd_with_deno_dir(&deno_dir);
|
2021-10-26 20:10:27 -04:00
|
|
|
|
let output = deno_cmd
|
|
|
|
|
.current_dir(util::testdata_path())
|
|
|
|
|
.arg("run")
|
|
|
|
|
.arg("--location")
|
|
|
|
|
.arg("https://example.com/b.ts")
|
|
|
|
|
.arg("webstorage/logger.ts")
|
|
|
|
|
.stdout(std::process::Stdio::piped())
|
|
|
|
|
.spawn()
|
|
|
|
|
.unwrap()
|
|
|
|
|
.wait_with_output()
|
|
|
|
|
.unwrap();
|
|
|
|
|
assert!(output.status.success());
|
|
|
|
|
assert_eq!(output.stdout, b"Storage { length: 1, hello: \"deno\" }\n");
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// test to ensure that when a --config file is set, but no --location, that
|
|
|
|
|
// storage persists against unique configuration files.
|
|
|
|
|
#[test]
|
|
|
|
|
fn webstorage_config_file() {
|
|
|
|
|
let deno_dir = util::new_deno_dir();
|
|
|
|
|
|
2022-04-01 11:15:37 -04:00
|
|
|
|
let mut deno_cmd = util::deno_cmd_with_deno_dir(&deno_dir);
|
2021-10-26 20:10:27 -04:00
|
|
|
|
let output = deno_cmd
|
|
|
|
|
.current_dir(util::testdata_path())
|
|
|
|
|
.arg("run")
|
|
|
|
|
.arg("--config")
|
|
|
|
|
.arg("webstorage/config_a.jsonc")
|
|
|
|
|
.arg("webstorage/fixture.ts")
|
|
|
|
|
.stdout(std::process::Stdio::piped())
|
|
|
|
|
.spawn()
|
|
|
|
|
.unwrap()
|
|
|
|
|
.wait_with_output()
|
|
|
|
|
.unwrap();
|
|
|
|
|
assert!(output.status.success());
|
|
|
|
|
assert_eq!(output.stdout, b"Storage { length: 0 }\n");
|
|
|
|
|
|
2022-04-01 11:15:37 -04:00
|
|
|
|
let mut deno_cmd = util::deno_cmd_with_deno_dir(&deno_dir);
|
2021-10-26 20:10:27 -04:00
|
|
|
|
let output = deno_cmd
|
|
|
|
|
.current_dir(util::testdata_path())
|
|
|
|
|
.arg("run")
|
|
|
|
|
.arg("--config")
|
|
|
|
|
.arg("webstorage/config_b.jsonc")
|
|
|
|
|
.arg("webstorage/logger.ts")
|
|
|
|
|
.stdout(std::process::Stdio::piped())
|
|
|
|
|
.spawn()
|
|
|
|
|
.unwrap()
|
|
|
|
|
.wait_with_output()
|
|
|
|
|
.unwrap();
|
|
|
|
|
assert!(output.status.success());
|
|
|
|
|
assert_eq!(output.stdout, b"Storage { length: 0 }\n");
|
|
|
|
|
|
2022-04-01 11:15:37 -04:00
|
|
|
|
let mut deno_cmd = util::deno_cmd_with_deno_dir(&deno_dir);
|
2021-10-26 20:10:27 -04:00
|
|
|
|
let output = deno_cmd
|
|
|
|
|
.current_dir(util::testdata_path())
|
|
|
|
|
.arg("run")
|
|
|
|
|
.arg("--config")
|
|
|
|
|
.arg("webstorage/config_a.jsonc")
|
|
|
|
|
.arg("webstorage/logger.ts")
|
|
|
|
|
.stdout(std::process::Stdio::piped())
|
|
|
|
|
.spawn()
|
|
|
|
|
.unwrap()
|
|
|
|
|
.wait_with_output()
|
|
|
|
|
.unwrap();
|
|
|
|
|
assert!(output.status.success());
|
|
|
|
|
assert_eq!(output.stdout, b"Storage { length: 1, hello: \"deno\" }\n");
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// tests to ensure `--config` does not effect persisted storage when a
|
|
|
|
|
// `--location` is provided.
|
|
|
|
|
#[test]
|
|
|
|
|
fn webstorage_location_precedes_config() {
|
|
|
|
|
let deno_dir = util::new_deno_dir();
|
|
|
|
|
|
2022-04-01 11:15:37 -04:00
|
|
|
|
let mut deno_cmd = util::deno_cmd_with_deno_dir(&deno_dir);
|
2021-10-26 20:10:27 -04:00
|
|
|
|
let output = deno_cmd
|
|
|
|
|
.current_dir(util::testdata_path())
|
|
|
|
|
.arg("run")
|
|
|
|
|
.arg("--location")
|
|
|
|
|
.arg("https://example.com/a.ts")
|
|
|
|
|
.arg("--config")
|
|
|
|
|
.arg("webstorage/config_a.jsonc")
|
|
|
|
|
.arg("webstorage/fixture.ts")
|
|
|
|
|
.stdout(std::process::Stdio::piped())
|
|
|
|
|
.spawn()
|
|
|
|
|
.unwrap()
|
|
|
|
|
.wait_with_output()
|
|
|
|
|
.unwrap();
|
|
|
|
|
assert!(output.status.success());
|
|
|
|
|
assert_eq!(output.stdout, b"Storage { length: 0 }\n");
|
|
|
|
|
|
2022-04-01 11:15:37 -04:00
|
|
|
|
let mut deno_cmd = util::deno_cmd_with_deno_dir(&deno_dir);
|
2021-10-26 20:10:27 -04:00
|
|
|
|
let output = deno_cmd
|
|
|
|
|
.current_dir(util::testdata_path())
|
|
|
|
|
.arg("run")
|
|
|
|
|
.arg("--location")
|
|
|
|
|
.arg("https://example.com/b.ts")
|
|
|
|
|
.arg("--config")
|
|
|
|
|
.arg("webstorage/config_b.jsonc")
|
|
|
|
|
.arg("webstorage/logger.ts")
|
|
|
|
|
.stdout(std::process::Stdio::piped())
|
|
|
|
|
.spawn()
|
|
|
|
|
.unwrap()
|
|
|
|
|
.wait_with_output()
|
|
|
|
|
.unwrap();
|
|
|
|
|
assert!(output.status.success());
|
|
|
|
|
assert_eq!(output.stdout, b"Storage { length: 1, hello: \"deno\" }\n");
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// test to ensure that when there isn't a configuration or location, that the
|
|
|
|
|
// main module is used to determine how to persist storage data.
|
|
|
|
|
#[test]
|
|
|
|
|
fn webstorage_main_module() {
|
|
|
|
|
let deno_dir = util::new_deno_dir();
|
|
|
|
|
|
2022-04-01 11:15:37 -04:00
|
|
|
|
let mut deno_cmd = util::deno_cmd_with_deno_dir(&deno_dir);
|
2021-10-26 20:10:27 -04:00
|
|
|
|
let output = deno_cmd
|
|
|
|
|
.current_dir(util::testdata_path())
|
|
|
|
|
.arg("run")
|
|
|
|
|
.arg("webstorage/fixture.ts")
|
|
|
|
|
.stdout(std::process::Stdio::piped())
|
|
|
|
|
.spawn()
|
|
|
|
|
.unwrap()
|
|
|
|
|
.wait_with_output()
|
|
|
|
|
.unwrap();
|
|
|
|
|
assert!(output.status.success());
|
|
|
|
|
assert_eq!(output.stdout, b"Storage { length: 0 }\n");
|
|
|
|
|
|
2022-04-01 11:15:37 -04:00
|
|
|
|
let mut deno_cmd = util::deno_cmd_with_deno_dir(&deno_dir);
|
2021-10-26 20:10:27 -04:00
|
|
|
|
let output = deno_cmd
|
|
|
|
|
.current_dir(util::testdata_path())
|
|
|
|
|
.arg("run")
|
|
|
|
|
.arg("webstorage/logger.ts")
|
|
|
|
|
.stdout(std::process::Stdio::piped())
|
|
|
|
|
.spawn()
|
|
|
|
|
.unwrap()
|
|
|
|
|
.wait_with_output()
|
|
|
|
|
.unwrap();
|
|
|
|
|
assert!(output.status.success());
|
|
|
|
|
assert_eq!(output.stdout, b"Storage { length: 0 }\n");
|
|
|
|
|
|
2022-04-01 11:15:37 -04:00
|
|
|
|
let mut deno_cmd = util::deno_cmd_with_deno_dir(&deno_dir);
|
2021-10-26 20:10:27 -04:00
|
|
|
|
let output = deno_cmd
|
|
|
|
|
.current_dir(util::testdata_path())
|
|
|
|
|
.arg("run")
|
|
|
|
|
.arg("webstorage/fixture.ts")
|
|
|
|
|
.stdout(std::process::Stdio::piped())
|
|
|
|
|
.spawn()
|
|
|
|
|
.unwrap()
|
|
|
|
|
.wait_with_output()
|
|
|
|
|
.unwrap();
|
|
|
|
|
assert!(output.status.success());
|
|
|
|
|
assert_eq!(output.stdout, b"Storage { length: 1, hello: \"deno\" }\n");
|
|
|
|
|
}
|
2021-06-27 13:27:36 -04:00
|
|
|
|
|
|
|
|
|
itest!(_075_import_local_query_hash {
|
|
|
|
|
args: "run 075_import_local_query_hash.ts",
|
|
|
|
|
output: "075_import_local_query_hash.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(_077_fetch_empty {
|
|
|
|
|
args: "run -A 077_fetch_empty.ts",
|
|
|
|
|
output: "077_fetch_empty.ts.out",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(_078_unload_on_exit {
|
|
|
|
|
args: "run 078_unload_on_exit.ts",
|
|
|
|
|
output: "078_unload_on_exit.ts.out",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(_079_location_authentication {
|
|
|
|
|
args: "run --location https://foo:bar@baz/qux 079_location_authentication.ts",
|
|
|
|
|
output: "079_location_authentication.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(_081_location_relative_fetch_redirect {
|
|
|
|
|
args: "run --location http://127.0.0.1:4546/ --allow-net 081_location_relative_fetch_redirect.ts",
|
|
|
|
|
output: "081_location_relative_fetch_redirect.ts.out",
|
|
|
|
|
http_server: true,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(_082_prepare_stack_trace_throw {
|
|
|
|
|
args: "run 082_prepare_stack_trace_throw.js",
|
|
|
|
|
output: "082_prepare_stack_trace_throw.js.out",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
|
fn _083_legacy_external_source_map() {
|
|
|
|
|
let _g = util::http_server();
|
2022-04-01 11:15:37 -04:00
|
|
|
|
let deno_dir = TempDir::new();
|
2021-08-11 10:20:47 -04:00
|
|
|
|
let module_url =
|
|
|
|
|
url::Url::parse("http://localhost:4545/083_legacy_external_source_map.ts")
|
|
|
|
|
.unwrap();
|
2021-06-27 13:27:36 -04:00
|
|
|
|
// Write a faulty old external source map.
|
|
|
|
|
let faulty_map_path = deno_dir.path().join("gen/http/localhost_PORT4545/9576bd5febd0587c5c4d88d57cb3ac8ebf2600c529142abe3baa9a751d20c334.js.map");
|
2022-03-22 15:10:00 -04:00
|
|
|
|
std::fs::create_dir_all(faulty_map_path.parent().unwrap()).unwrap();
|
|
|
|
|
std::fs::write(faulty_map_path, "{\"version\":3,\"file\":\"\",\"sourceRoot\":\"\",\"sources\":[\"http://localhost:4545/083_legacy_external_source_map.ts\"],\"names\":[],\"mappings\":\";AAAA,MAAM,IAAI,KAAK,CAAC,KAAK,CAAC,CAAC\"}").unwrap();
|
2021-06-27 13:27:36 -04:00
|
|
|
|
let output = Command::new(util::deno_exe_path())
|
|
|
|
|
.env("DENO_DIR", deno_dir.path())
|
2021-08-11 10:20:47 -04:00
|
|
|
|
.current_dir(util::testdata_path())
|
2021-06-27 13:27:36 -04:00
|
|
|
|
.arg("run")
|
|
|
|
|
.arg(module_url.to_string())
|
|
|
|
|
.output()
|
2022-03-22 15:10:00 -04:00
|
|
|
|
.unwrap();
|
2021-06-27 13:27:36 -04:00
|
|
|
|
// Before https://github.com/denoland/deno/issues/6965 was fixed, the faulty
|
|
|
|
|
// old external source map would cause a panic while formatting the error
|
|
|
|
|
// and the exit code would be 101. The external source map should be ignored
|
|
|
|
|
// in favor of the inline one.
|
|
|
|
|
assert_eq!(output.status.code(), Some(1));
|
|
|
|
|
let out = std::str::from_utf8(&output.stdout).unwrap();
|
|
|
|
|
assert_eq!(out, "");
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
itest!(_085_dynamic_import_async_error {
|
|
|
|
|
args: "run --allow-read 085_dynamic_import_async_error.ts",
|
|
|
|
|
output: "085_dynamic_import_async_error.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(_086_dynamic_import_already_rejected {
|
|
|
|
|
args: "run --allow-read 086_dynamic_import_already_rejected.ts",
|
|
|
|
|
output: "086_dynamic_import_already_rejected.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(_087_no_check_imports_not_used_as_values {
|
|
|
|
|
args: "run --config preserve_imports.tsconfig.json --no-check 087_no_check_imports_not_used_as_values.ts",
|
|
|
|
|
output: "087_no_check_imports_not_used_as_values.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(_088_dynamic_import_already_evaluating {
|
|
|
|
|
args: "run --allow-read 088_dynamic_import_already_evaluating.ts",
|
|
|
|
|
output: "088_dynamic_import_already_evaluating.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
2022-05-18 16:00:11 -04:00
|
|
|
|
// TODO(bartlomieju): remove --unstable once Deno.spawn is stabilized
|
2021-06-27 13:27:36 -04:00
|
|
|
|
itest!(_089_run_allow_list {
|
2022-05-18 16:00:11 -04:00
|
|
|
|
args: "run --unstable --allow-run=curl 089_run_allow_list.ts",
|
2021-06-27 13:27:36 -04:00
|
|
|
|
output: "089_run_allow_list.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
|
fn _090_run_permissions_request() {
|
2021-09-09 08:38:47 -04:00
|
|
|
|
let args = "run --quiet 090_run_permissions_request.ts";
|
|
|
|
|
use util::PtyData::*;
|
|
|
|
|
util::test_pty2(args, vec![
|
2022-02-16 18:14:46 -05:00
|
|
|
|
Output("⚠️ ️Deno requests run access to \"ls\". Run again with --allow-run to bypass this prompt.\r\n Allow? [y/n (y = yes allow, n = no deny)]"),
|
2021-09-09 08:38:47 -04:00
|
|
|
|
Input("y\n"),
|
2022-02-16 18:14:46 -05:00
|
|
|
|
Output("⚠️ ️Deno requests run access to \"cat\". Run again with --allow-run to bypass this prompt.\r\n Allow? [y/n (y = yes allow, n = no deny)]"),
|
2021-09-09 08:38:47 -04:00
|
|
|
|
Input("n\n"),
|
|
|
|
|
Output("granted\r\n"),
|
|
|
|
|
Output("prompt\r\n"),
|
|
|
|
|
Output("denied\r\n"),
|
|
|
|
|
]);
|
2021-06-27 13:27:36 -04:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
itest!(_091_use_define_for_class_fields {
|
|
|
|
|
args: "run 091_use_define_for_class_fields.ts",
|
|
|
|
|
output: "091_use_define_for_class_fields.ts.out",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(_092_import_map_unmapped_bare_specifier {
|
|
|
|
|
args: "run --import-map import_maps/import_map.json 092_import_map_unmapped_bare_specifier.ts",
|
|
|
|
|
output: "092_import_map_unmapped_bare_specifier.ts.out",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(js_import_detect {
|
|
|
|
|
args: "run --quiet --reload js_import_detect.ts",
|
|
|
|
|
output: "js_import_detect.ts.out",
|
|
|
|
|
exit_code: 0,
|
|
|
|
|
});
|
|
|
|
|
|
2021-07-05 09:34:37 -04:00
|
|
|
|
itest!(blob_gc_finalization {
|
|
|
|
|
args: "run blob_gc_finalization.js",
|
|
|
|
|
output: "blob_gc_finalization.js.out",
|
|
|
|
|
exit_code: 0,
|
2022-04-10 19:12:51 -04:00
|
|
|
|
envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())],
|
2021-07-05 09:34:37 -04:00
|
|
|
|
});
|
|
|
|
|
|
2021-07-20 15:06:24 -04:00
|
|
|
|
itest!(fetch_response_finalization {
|
|
|
|
|
args: "run --v8-flags=--expose-gc --allow-net fetch_response_finalization.js",
|
|
|
|
|
output: "fetch_response_finalization.js.out",
|
|
|
|
|
http_server: true,
|
|
|
|
|
exit_code: 0,
|
2022-04-10 19:12:51 -04:00
|
|
|
|
envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())],
|
2021-07-20 15:06:24 -04:00
|
|
|
|
});
|
|
|
|
|
|
2021-12-09 17:12:21 -05:00
|
|
|
|
itest!(import_type {
|
|
|
|
|
args: "run --reload import_type.ts",
|
|
|
|
|
output: "import_type.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(import_type_no_check {
|
|
|
|
|
args: "run --reload --no-check import_type.ts",
|
|
|
|
|
output: "import_type.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(private_field_presence {
|
|
|
|
|
args: "run --reload private_field_presence.ts",
|
|
|
|
|
output: "private_field_presence.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(private_field_presence_no_check {
|
|
|
|
|
args: "run --reload --no-check private_field_presence.ts",
|
|
|
|
|
output: "private_field_presence.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
2021-06-27 13:27:36 -04:00
|
|
|
|
itest!(lock_write_requires_lock {
|
|
|
|
|
args: "run --lock-write some_file.ts",
|
|
|
|
|
output: "lock_write_requires_lock.out",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
});
|
|
|
|
|
|
2022-05-18 16:00:11 -04:00
|
|
|
|
// TODO(bartlomieju): remove --unstable once Deno.spawn is stabilized
|
2021-06-27 13:27:36 -04:00
|
|
|
|
itest!(lock_write_fetch {
|
|
|
|
|
args:
|
2022-05-18 16:00:11 -04:00
|
|
|
|
"run --quiet --allow-read --allow-write --allow-env --allow-run --unstable lock_write_fetch.ts",
|
2021-06-27 13:27:36 -04:00
|
|
|
|
output: "lock_write_fetch.ts.out",
|
|
|
|
|
http_server: true,
|
|
|
|
|
exit_code: 0,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(lock_check_ok {
|
2021-08-11 10:20:47 -04:00
|
|
|
|
args:
|
|
|
|
|
"run --lock=lock_check_ok.json http://127.0.0.1:4545/003_relative_import.ts",
|
|
|
|
|
output: "003_relative_import.ts.out",
|
|
|
|
|
http_server: true,
|
|
|
|
|
});
|
2021-06-27 13:27:36 -04:00
|
|
|
|
|
|
|
|
|
itest!(lock_check_ok2 {
|
|
|
|
|
args: "run --lock=lock_check_ok2.json 019_media_types.ts",
|
|
|
|
|
output: "019_media_types.ts.out",
|
|
|
|
|
http_server: true,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(lock_dynamic_imports {
|
2021-08-11 10:20:47 -04:00
|
|
|
|
args: "run --lock=lock_dynamic_imports.json --allow-read --allow-net http://127.0.0.1:4545/013_dynamic_import.ts",
|
2021-06-27 13:27:36 -04:00
|
|
|
|
output: "lock_dynamic_imports.out",
|
|
|
|
|
exit_code: 10,
|
|
|
|
|
http_server: true,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(lock_check_err {
|
2021-08-11 10:20:47 -04:00
|
|
|
|
args: "run --lock=lock_check_err.json http://127.0.0.1:4545/003_relative_import.ts",
|
2021-06-27 13:27:36 -04:00
|
|
|
|
output: "lock_check_err.out",
|
|
|
|
|
exit_code: 10,
|
|
|
|
|
http_server: true,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(lock_check_err2 {
|
|
|
|
|
args: "run --lock=lock_check_err2.json 019_media_types.ts",
|
|
|
|
|
output: "lock_check_err2.out",
|
|
|
|
|
exit_code: 10,
|
|
|
|
|
http_server: true,
|
|
|
|
|
});
|
|
|
|
|
|
2021-12-09 17:12:21 -05:00
|
|
|
|
itest!(mts_dmts_mjs {
|
|
|
|
|
args: "run subdir/import.mts",
|
|
|
|
|
output: "mts_dmts_mjs.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(mts_dmts_mjs_no_check {
|
|
|
|
|
args: "run --no-check subdir/import.mts",
|
|
|
|
|
output: "mts_dmts_mjs.out",
|
|
|
|
|
});
|
|
|
|
|
|
2021-06-27 13:27:36 -04:00
|
|
|
|
itest!(async_error {
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
args: "run --reload async_error.ts",
|
|
|
|
|
output: "async_error.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(config {
|
|
|
|
|
args: "run --reload --config config.tsconfig.json config.ts",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
output: "config.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(config_types {
|
|
|
|
|
args:
|
|
|
|
|
"run --reload --quiet --config config_types.tsconfig.json config_types.ts",
|
|
|
|
|
output: "config_types.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(config_types_remote {
|
|
|
|
|
http_server: true,
|
|
|
|
|
args: "run --reload --quiet --config config_types_remote.tsconfig.json config_types.ts",
|
|
|
|
|
output: "config_types.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(empty_typescript {
|
2022-04-10 19:12:51 -04:00
|
|
|
|
args: "run --reload --check subdir/empty.ts",
|
2021-08-11 10:20:47 -04:00
|
|
|
|
output_str: Some("Check file:[WILDCARD]/subdir/empty.ts\n"),
|
2022-04-10 19:12:51 -04:00
|
|
|
|
envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())],
|
2021-06-27 13:27:36 -04:00
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(error_001 {
|
|
|
|
|
args: "run --reload error_001.ts",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
output: "error_001.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(error_002 {
|
|
|
|
|
args: "run --reload error_002.ts",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
output: "error_002.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(error_003_typescript {
|
|
|
|
|
args: "run --reload error_003_typescript.ts",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
output: "error_003_typescript.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
// Supposing that we've already attempted to run error_003_typescript.ts
|
|
|
|
|
// we want to make sure that JS wasn't emitted. Running again without reload flag
|
|
|
|
|
// should result in the same output.
|
|
|
|
|
// https://github.com/denoland/deno/issues/2436
|
|
|
|
|
itest!(error_003_typescript2 {
|
|
|
|
|
args: "run error_003_typescript.ts",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
output: "error_003_typescript.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(error_004_missing_module {
|
|
|
|
|
args: "run --reload error_004_missing_module.ts",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
output: "error_004_missing_module.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(error_005_missing_dynamic_import {
|
|
|
|
|
args: "run --reload --allow-read --quiet error_005_missing_dynamic_import.ts",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
output: "error_005_missing_dynamic_import.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(error_006_import_ext_failure {
|
|
|
|
|
args: "run --reload error_006_import_ext_failure.ts",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
output: "error_006_import_ext_failure.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(error_007_any {
|
|
|
|
|
args: "run --reload error_007_any.ts",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
output: "error_007_any.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(error_008_checkjs {
|
|
|
|
|
args: "run --reload error_008_checkjs.js",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
output: "error_008_checkjs.js.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(error_009_extensions_error {
|
|
|
|
|
args: "run error_009_extensions_error.js",
|
|
|
|
|
output: "error_009_extensions_error.js.out",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(error_011_bad_module_specifier {
|
|
|
|
|
args: "run --reload error_011_bad_module_specifier.ts",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
output: "error_011_bad_module_specifier.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(error_012_bad_dynamic_import_specifier {
|
2022-04-10 19:12:51 -04:00
|
|
|
|
args: "run --reload --check error_012_bad_dynamic_import_specifier.ts",
|
2021-06-27 13:27:36 -04:00
|
|
|
|
exit_code: 1,
|
|
|
|
|
output: "error_012_bad_dynamic_import_specifier.ts.out",
|
2022-04-10 19:12:51 -04:00
|
|
|
|
envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())],
|
2021-06-27 13:27:36 -04:00
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(error_013_missing_script {
|
|
|
|
|
args: "run --reload missing_file_name",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
output: "error_013_missing_script.out",
|
2022-04-10 19:12:51 -04:00
|
|
|
|
envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())],
|
2021-06-27 13:27:36 -04:00
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(error_014_catch_dynamic_import_error {
|
|
|
|
|
args: "run --reload --allow-read error_014_catch_dynamic_import_error.js",
|
|
|
|
|
output: "error_014_catch_dynamic_import_error.js.out",
|
2022-04-10 19:12:51 -04:00
|
|
|
|
envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())],
|
2021-06-27 13:27:36 -04:00
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(error_015_dynamic_import_permissions {
|
|
|
|
|
args: "run --reload --quiet error_015_dynamic_import_permissions.js",
|
|
|
|
|
output: "error_015_dynamic_import_permissions.out",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
http_server: true,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
// We have an allow-net flag but not allow-read, it should still result in error.
|
|
|
|
|
itest!(error_016_dynamic_import_permissions2 {
|
|
|
|
|
args: "run --reload --allow-net error_016_dynamic_import_permissions2.js",
|
|
|
|
|
output: "error_016_dynamic_import_permissions2.out",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
http_server: true,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(error_017_hide_long_source_ts {
|
|
|
|
|
args: "run --reload error_017_hide_long_source_ts.ts",
|
|
|
|
|
output: "error_017_hide_long_source_ts.ts.out",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(error_018_hide_long_source_js {
|
|
|
|
|
args: "run error_018_hide_long_source_js.js",
|
|
|
|
|
output: "error_018_hide_long_source_js.js.out",
|
|
|
|
|
exit_code: 1,
|
2022-04-10 19:12:51 -04:00
|
|
|
|
envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())],
|
2021-06-27 13:27:36 -04:00
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(error_019_stack_function {
|
|
|
|
|
args: "run error_019_stack_function.ts",
|
|
|
|
|
output: "error_019_stack_function.ts.out",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(error_020_stack_constructor {
|
|
|
|
|
args: "run error_020_stack_constructor.ts",
|
|
|
|
|
output: "error_020_stack_constructor.ts.out",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(error_021_stack_method {
|
|
|
|
|
args: "run error_021_stack_method.ts",
|
|
|
|
|
output: "error_021_stack_method.ts.out",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(error_022_stack_custom_error {
|
|
|
|
|
args: "run error_022_stack_custom_error.ts",
|
|
|
|
|
output: "error_022_stack_custom_error.ts.out",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(error_023_stack_async {
|
|
|
|
|
args: "run error_023_stack_async.ts",
|
|
|
|
|
output: "error_023_stack_async.ts.out",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(error_024_stack_promise_all {
|
|
|
|
|
args: "run error_024_stack_promise_all.ts",
|
|
|
|
|
output: "error_024_stack_promise_all.ts.out",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(error_025_tab_indent {
|
|
|
|
|
args: "run error_025_tab_indent",
|
|
|
|
|
output: "error_025_tab_indent.out",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(error_026_remote_import_error {
|
|
|
|
|
args: "run error_026_remote_import_error.ts",
|
|
|
|
|
output: "error_026_remote_import_error.ts.out",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
http_server: true,
|
|
|
|
|
});
|
|
|
|
|
|
2021-09-17 02:54:52 -04:00
|
|
|
|
itest!(error_for_await {
|
|
|
|
|
args: "run --reload error_for_await.ts",
|
|
|
|
|
output: "error_for_await.ts.out",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
});
|
|
|
|
|
|
2021-06-27 13:27:36 -04:00
|
|
|
|
itest!(error_missing_module_named_import {
|
|
|
|
|
args: "run --reload error_missing_module_named_import.ts",
|
|
|
|
|
output: "error_missing_module_named_import.ts.out",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(error_no_check {
|
|
|
|
|
args: "run --reload --no-check error_no_check.ts",
|
|
|
|
|
output: "error_no_check.ts.out",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(error_syntax {
|
|
|
|
|
args: "run --reload error_syntax.js",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
output: "error_syntax.js.out",
|
2022-04-10 19:12:51 -04:00
|
|
|
|
envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())],
|
2021-06-27 13:27:36 -04:00
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(error_syntax_empty_trailing_line {
|
|
|
|
|
args: "run --reload error_syntax_empty_trailing_line.mjs",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
output: "error_syntax_empty_trailing_line.mjs.out",
|
2022-04-10 19:12:51 -04:00
|
|
|
|
envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())],
|
2021-06-27 13:27:36 -04:00
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(error_type_definitions {
|
|
|
|
|
args: "run --reload error_type_definitions.ts",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
output: "error_type_definitions.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(error_local_static_import_from_remote_ts {
|
2021-08-11 10:20:47 -04:00
|
|
|
|
args: "run --reload http://localhost:4545/error_local_static_import_from_remote.ts",
|
2021-06-27 13:27:36 -04:00
|
|
|
|
exit_code: 1,
|
|
|
|
|
http_server: true,
|
|
|
|
|
output: "error_local_static_import_from_remote.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(error_local_static_import_from_remote_js {
|
2021-08-11 10:20:47 -04:00
|
|
|
|
args: "run --reload http://localhost:4545/error_local_static_import_from_remote.js",
|
2021-06-27 13:27:36 -04:00
|
|
|
|
exit_code: 1,
|
|
|
|
|
http_server: true,
|
|
|
|
|
output: "error_local_static_import_from_remote.js.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(exit_error42 {
|
|
|
|
|
exit_code: 42,
|
|
|
|
|
args: "run --quiet --reload exit_error42.ts",
|
|
|
|
|
output: "exit_error42.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
2021-11-27 18:45:38 -05:00
|
|
|
|
itest!(set_exit_code_0 {
|
|
|
|
|
args: "run --no-check --unstable set_exit_code_0.ts",
|
|
|
|
|
output: "empty.out",
|
|
|
|
|
exit_code: 0,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(set_exit_code_1 {
|
|
|
|
|
args: "run --no-check --unstable set_exit_code_1.ts",
|
|
|
|
|
output: "empty.out",
|
|
|
|
|
exit_code: 42,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(set_exit_code_2 {
|
|
|
|
|
args: "run --no-check --unstable set_exit_code_2.ts",
|
|
|
|
|
output: "empty.out",
|
|
|
|
|
exit_code: 42,
|
|
|
|
|
});
|
|
|
|
|
|
2021-12-11 09:56:45 -05:00
|
|
|
|
itest!(set_exit_code_in_worker {
|
|
|
|
|
args: "run --no-check --unstable --allow-read set_exit_code_in_worker.ts",
|
|
|
|
|
output: "empty.out",
|
|
|
|
|
exit_code: 42,
|
|
|
|
|
});
|
|
|
|
|
|
2022-05-19 22:57:05 -04:00
|
|
|
|
itest!(deno_exit_tampering {
|
|
|
|
|
args: "run --no-check --unstable deno_exit_tampering.ts",
|
|
|
|
|
output: "empty.out",
|
|
|
|
|
exit_code: 42,
|
|
|
|
|
});
|
|
|
|
|
|
2021-06-27 13:27:36 -04:00
|
|
|
|
itest!(heapstats {
|
|
|
|
|
args: "run --quiet --unstable --v8-flags=--expose-gc heapstats.js",
|
|
|
|
|
output: "heapstats.js.out",
|
|
|
|
|
});
|
|
|
|
|
|
2021-07-02 04:46:37 -04:00
|
|
|
|
itest!(finalization_registry {
|
|
|
|
|
args:
|
|
|
|
|
"run --quiet --unstable --v8-flags=--expose-gc finalization_registry.js",
|
|
|
|
|
output: "finalization_registry.js.out",
|
|
|
|
|
});
|
|
|
|
|
|
2021-06-27 13:27:36 -04:00
|
|
|
|
itest!(https_import {
|
|
|
|
|
args: "run --quiet --reload --cert tls/RootCA.pem https_import.ts",
|
|
|
|
|
output: "https_import.ts.out",
|
|
|
|
|
http_server: true,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(if_main {
|
|
|
|
|
args: "run --quiet --reload if_main.ts",
|
|
|
|
|
output: "if_main.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(import_meta {
|
|
|
|
|
args: "run --quiet --reload import_meta.ts",
|
|
|
|
|
output: "import_meta.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(main_module {
|
|
|
|
|
args: "run --quiet --allow-read --reload main_module.ts",
|
|
|
|
|
output: "main_module.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(no_check {
|
|
|
|
|
args: "run --quiet --reload --no-check 006_url_imports.ts",
|
|
|
|
|
output: "006_url_imports.ts.out",
|
|
|
|
|
http_server: true,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(no_check_decorators {
|
|
|
|
|
args: "run --quiet --reload --no-check no_check_decorators.ts",
|
|
|
|
|
output: "no_check_decorators.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
2021-11-29 17:23:30 -05:00
|
|
|
|
itest!(check_remote {
|
2022-05-17 17:53:42 -04:00
|
|
|
|
args: "run --quiet --reload --check=all no_check_remote.ts",
|
2021-11-29 17:23:30 -05:00
|
|
|
|
output: "no_check_remote.ts.disabled.out",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
http_server: true,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(no_check_remote {
|
|
|
|
|
args: "run --quiet --reload --no-check=remote no_check_remote.ts",
|
|
|
|
|
output: "no_check_remote.ts.enabled.out",
|
|
|
|
|
http_server: true,
|
|
|
|
|
});
|
|
|
|
|
|
2021-06-27 13:27:36 -04:00
|
|
|
|
itest!(runtime_decorators {
|
|
|
|
|
args: "run --quiet --reload --no-check runtime_decorators.ts",
|
|
|
|
|
output: "runtime_decorators.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(seed_random {
|
|
|
|
|
args: "run --seed=100 seed_random.js",
|
|
|
|
|
output: "seed_random.js.out",
|
2022-04-10 19:12:51 -04:00
|
|
|
|
envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())],
|
2021-06-27 13:27:36 -04:00
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(type_definitions {
|
|
|
|
|
args: "run --reload type_definitions.ts",
|
|
|
|
|
output: "type_definitions.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(type_definitions_for_export {
|
2022-04-10 19:12:51 -04:00
|
|
|
|
args: "run --reload --check type_definitions_for_export.ts",
|
2021-06-27 13:27:36 -04:00
|
|
|
|
output: "type_definitions_for_export.ts.out",
|
|
|
|
|
exit_code: 1,
|
2022-04-10 19:12:51 -04:00
|
|
|
|
envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())],
|
2021-06-27 13:27:36 -04:00
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(type_directives_01 {
|
|
|
|
|
args: "run --reload -L debug type_directives_01.ts",
|
|
|
|
|
output: "type_directives_01.ts.out",
|
|
|
|
|
http_server: true,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(type_directives_02 {
|
|
|
|
|
args: "run --reload -L debug type_directives_02.ts",
|
|
|
|
|
output: "type_directives_02.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(type_directives_js_main {
|
|
|
|
|
args: "run --reload -L debug type_directives_js_main.js",
|
|
|
|
|
output: "type_directives_js_main.js.out",
|
|
|
|
|
exit_code: 0,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(type_directives_redirect {
|
2022-04-10 19:12:51 -04:00
|
|
|
|
args: "run --reload --check type_directives_redirect.ts",
|
2021-06-27 13:27:36 -04:00
|
|
|
|
output: "type_directives_redirect.ts.out",
|
|
|
|
|
http_server: true,
|
2022-04-10 19:12:51 -04:00
|
|
|
|
envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())],
|
2021-06-27 13:27:36 -04:00
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(type_headers_deno_types {
|
2022-04-10 19:12:51 -04:00
|
|
|
|
args: "run --reload --check type_headers_deno_types.ts",
|
2021-06-27 13:27:36 -04:00
|
|
|
|
output: "type_headers_deno_types.ts.out",
|
|
|
|
|
http_server: true,
|
2022-04-10 19:12:51 -04:00
|
|
|
|
envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())],
|
2021-06-27 13:27:36 -04:00
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(ts_type_imports {
|
2022-04-10 19:12:51 -04:00
|
|
|
|
args: "run --reload --check ts_type_imports.ts",
|
2021-06-27 13:27:36 -04:00
|
|
|
|
output: "ts_type_imports.ts.out",
|
|
|
|
|
exit_code: 1,
|
2022-04-10 19:12:51 -04:00
|
|
|
|
envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())],
|
2021-06-27 13:27:36 -04:00
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(ts_decorators {
|
2022-04-10 19:12:51 -04:00
|
|
|
|
args: "run --reload -c tsconfig.decorators.json --check ts_decorators.ts",
|
2021-06-27 13:27:36 -04:00
|
|
|
|
output: "ts_decorators.ts.out",
|
2022-04-10 19:12:51 -04:00
|
|
|
|
envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())],
|
2021-06-27 13:27:36 -04:00
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(ts_type_only_import {
|
2022-04-10 19:12:51 -04:00
|
|
|
|
args: "run --reload --check ts_type_only_import.ts",
|
2021-06-27 13:27:36 -04:00
|
|
|
|
output: "ts_type_only_import.ts.out",
|
2022-04-10 19:12:51 -04:00
|
|
|
|
envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())],
|
2021-06-27 13:27:36 -04:00
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(swc_syntax_error {
|
2022-04-10 19:12:51 -04:00
|
|
|
|
args: "run --reload --check swc_syntax_error.ts",
|
2021-06-27 13:27:36 -04:00
|
|
|
|
output: "swc_syntax_error.ts.out",
|
|
|
|
|
exit_code: 1,
|
2022-04-10 19:12:51 -04:00
|
|
|
|
envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())],
|
2021-06-27 13:27:36 -04:00
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(unbuffered_stderr {
|
|
|
|
|
args: "run --reload unbuffered_stderr.ts",
|
|
|
|
|
output: "unbuffered_stderr.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(unbuffered_stdout {
|
|
|
|
|
args: "run --quiet --reload unbuffered_stdout.ts",
|
|
|
|
|
output: "unbuffered_stdout.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(v8_flags_run {
|
|
|
|
|
args: "run --v8-flags=--expose-gc v8_flags.js",
|
|
|
|
|
output: "v8_flags.js.out",
|
2022-04-10 19:12:51 -04:00
|
|
|
|
envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())],
|
2021-06-27 13:27:36 -04:00
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(v8_flags_unrecognized {
|
|
|
|
|
args: "repl --v8-flags=--foo,bar,--trace-gc,-baz",
|
|
|
|
|
output: "v8_flags_unrecognized.out",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(v8_help {
|
|
|
|
|
args: "repl --v8-flags=--help",
|
|
|
|
|
output: "v8_help.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(unsupported_dynamic_import_scheme {
|
|
|
|
|
args: "eval import('xxx:')",
|
|
|
|
|
output: "unsupported_dynamic_import_scheme.out",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(wasm {
|
|
|
|
|
args: "run --quiet wasm.ts",
|
|
|
|
|
output: "wasm.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(wasm_shared {
|
|
|
|
|
args: "run --quiet wasm_shared.ts",
|
|
|
|
|
output: "wasm_shared.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(wasm_async {
|
|
|
|
|
args: "run wasm_async.js",
|
|
|
|
|
output: "wasm_async.out",
|
2022-04-10 19:12:51 -04:00
|
|
|
|
envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())],
|
2021-06-27 13:27:36 -04:00
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(wasm_unreachable {
|
2021-10-10 10:03:23 -04:00
|
|
|
|
args: "run --allow-read wasm_unreachable.js",
|
2021-06-27 13:27:36 -04:00
|
|
|
|
output: "wasm_unreachable.out",
|
|
|
|
|
exit_code: 1,
|
2022-04-10 19:12:51 -04:00
|
|
|
|
envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())],
|
2021-06-27 13:27:36 -04:00
|
|
|
|
});
|
|
|
|
|
|
2021-10-10 10:03:23 -04:00
|
|
|
|
itest!(wasm_url {
|
|
|
|
|
args: "run --quiet --allow-net=localhost:4545 wasm_url.js",
|
|
|
|
|
output: "wasm_url.out",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
http_server: true,
|
|
|
|
|
});
|
|
|
|
|
|
2021-06-27 13:27:36 -04:00
|
|
|
|
itest!(weakref {
|
|
|
|
|
args: "run --quiet --reload weakref.ts",
|
|
|
|
|
output: "weakref.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(top_level_await_order {
|
|
|
|
|
args: "run --allow-read top_level_await_order.js",
|
|
|
|
|
output: "top_level_await_order.out",
|
2022-04-10 19:12:51 -04:00
|
|
|
|
envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())],
|
2021-06-27 13:27:36 -04:00
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(top_level_await_loop {
|
|
|
|
|
args: "run --allow-read top_level_await_loop.js",
|
|
|
|
|
output: "top_level_await_loop.out",
|
2022-04-10 19:12:51 -04:00
|
|
|
|
envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())],
|
2021-06-27 13:27:36 -04:00
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(top_level_await_circular {
|
|
|
|
|
args: "run --allow-read top_level_await_circular.js",
|
|
|
|
|
output: "top_level_await_circular.out",
|
|
|
|
|
exit_code: 1,
|
2022-04-10 19:12:51 -04:00
|
|
|
|
envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())],
|
2021-06-27 13:27:36 -04:00
|
|
|
|
});
|
|
|
|
|
|
2021-07-05 12:59:49 -04:00
|
|
|
|
// Regression test for https://github.com/denoland/deno/issues/11238.
|
|
|
|
|
itest!(top_level_await_nested {
|
|
|
|
|
args: "run --allow-read top_level_await_nested/main.js",
|
|
|
|
|
output: "top_level_await_nested.out",
|
2022-04-10 19:12:51 -04:00
|
|
|
|
envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())],
|
2021-07-05 12:59:49 -04:00
|
|
|
|
});
|
|
|
|
|
|
2021-06-27 13:27:36 -04:00
|
|
|
|
itest!(top_level_await_unresolved {
|
|
|
|
|
args: "run top_level_await_unresolved.js",
|
|
|
|
|
output: "top_level_await_unresolved.out",
|
|
|
|
|
exit_code: 1,
|
2022-04-10 19:12:51 -04:00
|
|
|
|
envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())],
|
2021-06-27 13:27:36 -04:00
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(top_level_await {
|
|
|
|
|
args: "run --allow-read top_level_await.js",
|
|
|
|
|
output: "top_level_await.out",
|
2022-04-10 19:12:51 -04:00
|
|
|
|
envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())],
|
2021-06-27 13:27:36 -04:00
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(top_level_await_ts {
|
|
|
|
|
args: "run --quiet --allow-read top_level_await.ts",
|
|
|
|
|
output: "top_level_await.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(top_level_for_await {
|
|
|
|
|
args: "run --quiet top_level_for_await.js",
|
|
|
|
|
output: "top_level_for_await.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(top_level_for_await_ts {
|
|
|
|
|
args: "run --quiet top_level_for_await.ts",
|
|
|
|
|
output: "top_level_for_await.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(unstable_disabled {
|
|
|
|
|
args: "run --reload unstable.ts",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
output: "unstable_disabled.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(unstable_enabled {
|
|
|
|
|
args: "run --quiet --reload --unstable unstable.ts",
|
|
|
|
|
output: "unstable_enabled.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(unstable_disabled_js {
|
|
|
|
|
args: "run --reload unstable.js",
|
|
|
|
|
output: "unstable_disabled_js.out",
|
2022-04-10 19:12:51 -04:00
|
|
|
|
envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())],
|
2021-06-27 13:27:36 -04:00
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(unstable_enabled_js {
|
|
|
|
|
args: "run --quiet --reload --unstable unstable.ts",
|
|
|
|
|
output: "unstable_enabled_js.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(unstable_worker {
|
|
|
|
|
args: "run --reload --unstable --quiet --allow-read unstable_worker.ts",
|
|
|
|
|
output: "unstable_worker.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(_053_import_compression {
|
|
|
|
|
args: "run --quiet --reload --allow-net 053_import_compression/main.ts",
|
|
|
|
|
output: "053_import_compression.out",
|
|
|
|
|
http_server: true,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(disallow_http_from_https_js {
|
2021-08-11 10:20:47 -04:00
|
|
|
|
args: "run --quiet --reload --cert tls/RootCA.pem https://localhost:5545/disallow_http_from_https.js",
|
2021-06-27 13:27:36 -04:00
|
|
|
|
output: "disallow_http_from_https_js.out",
|
|
|
|
|
http_server: true,
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(disallow_http_from_https_ts {
|
2021-08-11 10:20:47 -04:00
|
|
|
|
args: "run --quiet --reload --cert tls/RootCA.pem https://localhost:5545/disallow_http_from_https.ts",
|
2021-06-27 13:27:36 -04:00
|
|
|
|
output: "disallow_http_from_https_ts.out",
|
|
|
|
|
http_server: true,
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(dynamic_import_conditional {
|
|
|
|
|
args: "run --quiet --reload dynamic_import_conditional.js",
|
|
|
|
|
output: "dynamic_import_conditional.js.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(tsx_imports {
|
2022-04-10 19:12:51 -04:00
|
|
|
|
args: "run --reload --check tsx_imports.ts",
|
2021-06-27 13:27:36 -04:00
|
|
|
|
output: "tsx_imports.ts.out",
|
2022-04-10 19:12:51 -04:00
|
|
|
|
envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())],
|
2021-06-27 13:27:36 -04:00
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(fix_dynamic_import_errors {
|
|
|
|
|
args: "run --reload fix_dynamic_import_errors.js",
|
|
|
|
|
output: "fix_dynamic_import_errors.js.out",
|
2022-04-10 19:12:51 -04:00
|
|
|
|
envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())],
|
2021-06-27 13:27:36 -04:00
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(fix_emittable_skipped {
|
|
|
|
|
args: "run --reload fix_emittable_skipped.js",
|
|
|
|
|
output: "fix_emittable_skipped.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(fix_exotic_specifiers {
|
|
|
|
|
args: "run --quiet --reload fix_exotic_specifiers.ts",
|
|
|
|
|
output: "fix_exotic_specifiers.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(fix_js_import_js {
|
|
|
|
|
args: "run --quiet --reload fix_js_import_js.ts",
|
|
|
|
|
output: "fix_js_import_js.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(fix_js_imports {
|
|
|
|
|
args: "run --quiet --reload fix_js_imports.ts",
|
|
|
|
|
output: "fix_js_imports.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(fix_tsc_file_exists {
|
|
|
|
|
args: "run --quiet --reload tsc/test.js",
|
|
|
|
|
output: "fix_tsc_file_exists.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(fix_worker_dispatchevent {
|
|
|
|
|
args: "run --quiet --reload fix_worker_dispatchevent.ts",
|
|
|
|
|
output: "fix_worker_dispatchevent.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(es_private_fields {
|
|
|
|
|
args: "run --quiet --reload es_private_fields.js",
|
|
|
|
|
output: "es_private_fields.js.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(cjs_imports {
|
|
|
|
|
args: "run --quiet --reload cjs_imports.ts",
|
|
|
|
|
output: "cjs_imports.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(ts_import_from_js {
|
|
|
|
|
args: "run --quiet --reload ts_import_from_js.js",
|
|
|
|
|
output: "ts_import_from_js.js.out",
|
|
|
|
|
http_server: true,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(jsx_import_from_ts {
|
|
|
|
|
args: "run --quiet --reload jsx_import_from_ts.ts",
|
|
|
|
|
output: "jsx_import_from_ts.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
2021-11-08 20:26:39 -05:00
|
|
|
|
itest!(jsx_import_source_pragma {
|
|
|
|
|
args: "run --reload jsx_import_source_pragma.tsx",
|
|
|
|
|
output: "jsx_import_source.out",
|
|
|
|
|
http_server: true,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(jsx_import_source_pragma_with_config {
|
|
|
|
|
args: "run --reload --config jsx/deno-jsx.jsonc jsx_import_source_pragma.tsx",
|
|
|
|
|
output: "jsx_import_source.out",
|
|
|
|
|
http_server: true,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(jsx_import_source_pragma_with_dev_config {
|
|
|
|
|
args:
|
|
|
|
|
"run --reload --config jsx/deno-jsxdev.jsonc jsx_import_source_pragma.tsx",
|
|
|
|
|
output: "jsx_import_source_dev.out",
|
|
|
|
|
http_server: true,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(jsx_import_source_no_pragma {
|
|
|
|
|
args:
|
|
|
|
|
"run --reload --config jsx/deno-jsx.jsonc jsx_import_source_no_pragma.tsx",
|
|
|
|
|
output: "jsx_import_source.out",
|
|
|
|
|
http_server: true,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(jsx_import_source_no_pragma_dev {
|
|
|
|
|
args: "run --reload --config jsx/deno-jsxdev.jsonc jsx_import_source_no_pragma.tsx",
|
|
|
|
|
output: "jsx_import_source_dev.out",
|
|
|
|
|
http_server: true,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(jsx_import_source_pragma_import_map {
|
|
|
|
|
args: "run --reload --import-map jsx/import-map.json jsx_import_source_pragma_import_map.tsx",
|
|
|
|
|
output: "jsx_import_source_import_map.out",
|
|
|
|
|
http_server: true,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(jsx_import_source_pragma_import_map_dev {
|
|
|
|
|
args: "run --reload --import-map jsx/import-map.json --config jsx/deno-jsxdev-import-map.jsonc jsx_import_source_pragma_import_map.tsx",
|
|
|
|
|
output: "jsx_import_source_import_map_dev.out",
|
|
|
|
|
http_server: true,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(jsx_import_source_import_map {
|
|
|
|
|
args: "run --reload --import-map jsx/import-map.json --config jsx/deno-jsx-import-map.jsonc jsx_import_source_no_pragma.tsx",
|
|
|
|
|
output: "jsx_import_source_import_map.out",
|
|
|
|
|
http_server: true,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(jsx_import_source_import_map_dev {
|
|
|
|
|
args: "run --reload --import-map jsx/import-map.json --config jsx/deno-jsxdev-import-map.jsonc jsx_import_source_no_pragma.tsx",
|
|
|
|
|
output: "jsx_import_source_import_map_dev.out",
|
|
|
|
|
http_server: true,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(jsx_import_source_pragma_no_check {
|
|
|
|
|
args: "run --reload --no-check jsx_import_source_pragma.tsx",
|
|
|
|
|
output: "jsx_import_source.out",
|
|
|
|
|
http_server: true,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(jsx_import_source_pragma_with_config_no_check {
|
|
|
|
|
args: "run --reload --config jsx/deno-jsx.jsonc --no-check jsx_import_source_pragma.tsx",
|
|
|
|
|
output: "jsx_import_source.out",
|
|
|
|
|
http_server: true,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
// itest!(jsx_import_source_pragma_with_dev_config_no_check {
|
|
|
|
|
// args:
|
|
|
|
|
// "run --reload --config jsx/deno-jsxdev.jsonc --no-check jsx_import_source_pragma.tsx",
|
|
|
|
|
// output: "jsx_import_source_dev.out",
|
|
|
|
|
// http_server: true,
|
|
|
|
|
// });
|
|
|
|
|
|
|
|
|
|
itest!(jsx_import_source_no_pragma_no_check {
|
|
|
|
|
args:
|
|
|
|
|
"run --reload --config jsx/deno-jsx.jsonc --no-check jsx_import_source_no_pragma.tsx",
|
|
|
|
|
output: "jsx_import_source.out",
|
|
|
|
|
http_server: true,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
// itest!(jsx_import_source_no_pragma_dev_no_check {
|
|
|
|
|
// args: "run --reload --config jsx/deno-jsxdev.jsonc --no-check jsx_import_source_no_pragma.tsx",
|
|
|
|
|
// output: "jsx_import_source_dev.out",
|
|
|
|
|
// http_server: true,
|
|
|
|
|
// });
|
|
|
|
|
|
|
|
|
|
itest!(jsx_import_source_pragma_import_map_no_check {
|
|
|
|
|
args: "run --reload --import-map jsx/import-map.json --no-check jsx_import_source_pragma_import_map.tsx",
|
|
|
|
|
output: "jsx_import_source_import_map.out",
|
|
|
|
|
http_server: true,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
// itest!(jsx_import_source_pragma_import_map_dev_no_check {
|
|
|
|
|
// args: "run --reload --import-map jsx/import-map.json --config jsx/deno-jsxdev-import-map.jsonc --no-check jsx_import_source_pragma_import_map.tsx",
|
|
|
|
|
// output: "jsx_import_source_import_map_dev.out",
|
|
|
|
|
// http_server: true,
|
|
|
|
|
// });
|
|
|
|
|
|
|
|
|
|
itest!(jsx_import_source_import_map_no_check {
|
|
|
|
|
args: "run --reload --import-map jsx/import-map.json --config jsx/deno-jsx-import-map.jsonc --no-check jsx_import_source_no_pragma.tsx",
|
|
|
|
|
output: "jsx_import_source_import_map.out",
|
|
|
|
|
http_server: true,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
// itest!(jsx_import_source_import_map_dev_no_check {
|
|
|
|
|
// args: "run --reload --import-map jsx/import-map.json --config jsx/deno-jsxdev-import-map.jsonc --no-check jsx_import_source_no_pragma.tsx",
|
|
|
|
|
// output: "jsx_import_source_import_map_dev.out",
|
|
|
|
|
// http_server: true,
|
|
|
|
|
// });
|
|
|
|
|
|
2021-07-07 13:52:42 -04:00
|
|
|
|
// TODO(#11128): Flaky. Re-enable later.
|
|
|
|
|
// itest!(single_compile_with_reload {
|
|
|
|
|
// args: "run --reload --allow-read single_compile_with_reload.ts",
|
|
|
|
|
// output: "single_compile_with_reload.ts.out",
|
|
|
|
|
// });
|
2021-06-27 13:27:36 -04:00
|
|
|
|
|
|
|
|
|
itest!(proto_exploit {
|
|
|
|
|
args: "run proto_exploit.js",
|
|
|
|
|
output: "proto_exploit.js.out",
|
2022-04-10 19:12:51 -04:00
|
|
|
|
envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())],
|
2021-06-27 13:27:36 -04:00
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(reference_types {
|
|
|
|
|
args: "run --reload --quiet reference_types.ts",
|
|
|
|
|
output: "reference_types.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(references_types_remote {
|
|
|
|
|
http_server: true,
|
|
|
|
|
args: "run --reload --quiet reference_types_remote.ts",
|
|
|
|
|
output: "reference_types_remote.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(import_data_url_error_stack {
|
|
|
|
|
args: "run --quiet --reload import_data_url_error_stack.ts",
|
|
|
|
|
output: "import_data_url_error_stack.ts.out",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(import_data_url_import_relative {
|
|
|
|
|
args: "run --quiet --reload import_data_url_import_relative.ts",
|
|
|
|
|
output: "import_data_url_import_relative.ts.out",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(import_data_url_import_map {
|
|
|
|
|
args: "run --quiet --reload --import-map import_maps/import_map.json import_data_url.ts",
|
|
|
|
|
output: "import_data_url.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(import_data_url_imports {
|
|
|
|
|
args: "run --quiet --reload import_data_url_imports.ts",
|
|
|
|
|
output: "import_data_url_imports.ts.out",
|
|
|
|
|
http_server: true,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(import_data_url_jsx {
|
|
|
|
|
args: "run --quiet --reload import_data_url_jsx.ts",
|
|
|
|
|
output: "import_data_url_jsx.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(import_data_url {
|
|
|
|
|
args: "run --quiet --reload import_data_url.ts",
|
|
|
|
|
output: "import_data_url.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(import_dynamic_data_url {
|
|
|
|
|
args: "run --quiet --reload import_dynamic_data_url.ts",
|
|
|
|
|
output: "import_dynamic_data_url.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(import_blob_url_error_stack {
|
|
|
|
|
args: "run --quiet --reload import_blob_url_error_stack.ts",
|
|
|
|
|
output: "import_blob_url_error_stack.ts.out",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(import_blob_url_import_relative {
|
|
|
|
|
args: "run --quiet --reload import_blob_url_import_relative.ts",
|
|
|
|
|
output: "import_blob_url_import_relative.ts.out",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(import_blob_url_imports {
|
|
|
|
|
args:
|
|
|
|
|
"run --quiet --reload --allow-net=localhost:4545 import_blob_url_imports.ts",
|
|
|
|
|
output: "import_blob_url_imports.ts.out",
|
|
|
|
|
http_server: true,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(import_blob_url_jsx {
|
|
|
|
|
args: "run --quiet --reload import_blob_url_jsx.ts",
|
|
|
|
|
output: "import_blob_url_jsx.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(import_blob_url {
|
|
|
|
|
args: "run --quiet --reload import_blob_url.ts",
|
|
|
|
|
output: "import_blob_url.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(import_file_with_colon {
|
|
|
|
|
args: "run --quiet --reload import_file_with_colon.ts",
|
|
|
|
|
output: "import_file_with_colon.ts.out",
|
|
|
|
|
http_server: true,
|
|
|
|
|
});
|
2021-08-18 09:19:22 -04:00
|
|
|
|
|
2022-01-31 04:32:49 -05:00
|
|
|
|
itest!(import_extensionless {
|
|
|
|
|
args: "run --quiet --reload import_extensionless.ts",
|
|
|
|
|
output: "import_extensionless.ts.out",
|
|
|
|
|
http_server: true,
|
|
|
|
|
});
|
|
|
|
|
|
2021-08-18 09:19:22 -04:00
|
|
|
|
itest!(classic_workers_event_loop {
|
|
|
|
|
args:
|
|
|
|
|
"run --enable-testing-features-do-not-use classic_workers_event_loop.js",
|
|
|
|
|
output: "classic_workers_event_loop.js.out",
|
2022-04-10 19:12:51 -04:00
|
|
|
|
envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())],
|
2021-08-18 09:19:22 -04:00
|
|
|
|
});
|
|
|
|
|
|
2021-06-27 13:27:36 -04:00
|
|
|
|
// FIXME(bartlomieju): disabled, because this test is very flaky on CI
|
|
|
|
|
// itest!(local_sources_not_cached_in_memory {
|
|
|
|
|
// args: "run --allow-read --allow-write no_mem_cache.js",
|
|
|
|
|
// output: "no_mem_cache.js.out",
|
|
|
|
|
// });
|
|
|
|
|
|
|
|
|
|
// This test checks that inline source map data is used. It uses a hand crafted
|
|
|
|
|
// source map that maps to a file that exists, but is not loaded into the module
|
|
|
|
|
// graph (inline_js_source_map_2.ts) (because there are no direct dependencies).
|
|
|
|
|
// Source line is not remapped because no inline source contents are included in
|
|
|
|
|
// the sourcemap and the file is not present in the dependency graph.
|
|
|
|
|
itest!(inline_js_source_map_2 {
|
|
|
|
|
args: "run --quiet inline_js_source_map_2.js",
|
|
|
|
|
output: "inline_js_source_map_2.js.out",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
// This test checks that inline source map data is used. It uses a hand crafted
|
|
|
|
|
// source map that maps to a file that exists, but is not loaded into the module
|
|
|
|
|
// graph (inline_js_source_map_2.ts) (because there are no direct dependencies).
|
|
|
|
|
// Source line remapped using th inline source contents that are included in the
|
|
|
|
|
// inline source map.
|
|
|
|
|
itest!(inline_js_source_map_2_with_inline_contents {
|
|
|
|
|
args: "run --quiet inline_js_source_map_2_with_inline_contents.js",
|
|
|
|
|
output: "inline_js_source_map_2_with_inline_contents.js.out",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
// This test checks that inline source map data is used. It uses a hand crafted
|
|
|
|
|
// source map that maps to a file that exists, and is loaded into the module
|
|
|
|
|
// graph because of a direct import statement (inline_js_source_map.ts). The
|
|
|
|
|
// source map was generated from an earlier version of this file, where the throw
|
|
|
|
|
// was not commented out. The source line is remapped using source contents that
|
|
|
|
|
// from the module graph.
|
|
|
|
|
itest!(inline_js_source_map_with_contents_from_graph {
|
|
|
|
|
args: "run --quiet inline_js_source_map_with_contents_from_graph.js",
|
|
|
|
|
output: "inline_js_source_map_with_contents_from_graph.js.out",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
http_server: true,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
// This test ensures that a descriptive error is shown when we're unable to load
|
|
|
|
|
// the import map. Even though this tests only the `run` subcommand, we can be sure
|
|
|
|
|
// that the error message is similar for other subcommands as they all use
|
|
|
|
|
// `program_state.maybe_import_map` to access the import map underneath.
|
|
|
|
|
itest!(error_import_map_unable_to_load {
|
|
|
|
|
args: "run --import-map=import_maps/does_not_exist.json import_maps/test.ts",
|
|
|
|
|
output: "error_import_map_unable_to_load.out",
|
|
|
|
|
exit_code: 1,
|
2022-04-10 19:12:51 -04:00
|
|
|
|
envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())],
|
2021-06-27 13:27:36 -04:00
|
|
|
|
});
|
|
|
|
|
|
2021-10-11 12:50:18 -04:00
|
|
|
|
// Test that setting `self` in the main thread to some other value doesn't break
|
|
|
|
|
// the world.
|
|
|
|
|
itest!(replace_self {
|
|
|
|
|
args: "run replace_self.js",
|
|
|
|
|
output: "replace_self.js.out",
|
2022-04-10 19:12:51 -04:00
|
|
|
|
envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())],
|
2021-10-11 12:50:18 -04:00
|
|
|
|
});
|
|
|
|
|
|
2021-07-10 17:32:10 -04:00
|
|
|
|
itest!(worker_event_handler_test {
|
|
|
|
|
args: "run --quiet --reload --allow-read worker_event_handler_test.js",
|
|
|
|
|
output: "worker_event_handler_test.js.out",
|
2021-07-16 18:51:06 -04:00
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(worker_close_race {
|
|
|
|
|
args: "run --quiet --reload --allow-read worker_close_race.js",
|
|
|
|
|
output: "worker_close_race.js.out",
|
2021-07-10 17:32:10 -04:00
|
|
|
|
});
|
|
|
|
|
|
2021-09-22 12:02:15 -04:00
|
|
|
|
itest!(worker_drop_handle_race {
|
|
|
|
|
args: "run --quiet --reload --allow-read worker_drop_handle_race.js",
|
|
|
|
|
output: "worker_drop_handle_race.js.out",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
});
|
|
|
|
|
|
fix(workers): Make `worker.terminate()` not block the current thread (#13941)
Calling `worker.terminate()` used to kill the worker's isolate and
then block until the worker's thread finished. This blocks the calling
thread if the worker's event loop was blocked in a sync op (as with
`Deno.sleepSync`), which wasn't realized at the time, but since the
worker's isolate was killed at that moment, it would not block the
calling thread if the worker was in a JS endless loop.
However, in #12831, in order to work around a V8 bug, worker
termination was changed to first set a signal to let the worker event
loop know that termination has been requested, and only kill the
isolate if the event loop has not finished after 2 seconds. However,
this change kept the blocking, which meant that JS endless loops in
the worker now blocked the parent for 2 seconds.
As it turns out, after #12831 it is fine to signal termination and
even kill the worker's isolate without waiting for the thread to
finish, so this change does that. However, that might leave the async
ops that receive messages and control data from the worker pending
after `worker.terminate()`, which leads to odd results from the op
sanitizer. Therefore, we set up a `CancelHandler` to cancel those ops
when the worker is terminated.
2022-04-27 12:22:47 -04:00
|
|
|
|
itest!(worker_drop_handle_race_terminate {
|
|
|
|
|
args: "run --unstable worker_drop_handle_race_terminate.js",
|
|
|
|
|
output: "worker_drop_handle_race_terminate.js.out",
|
|
|
|
|
});
|
|
|
|
|
|
2021-09-24 22:26:57 -04:00
|
|
|
|
itest!(worker_close_nested {
|
|
|
|
|
args: "run --quiet --reload --allow-read worker_close_nested.js",
|
|
|
|
|
output: "worker_close_nested.js.out",
|
|
|
|
|
});
|
|
|
|
|
|
Don't drop messages from workers that have already been closed (#11913)
When `worker.terminate()` is called, the spec requires that the
corresponding port message queue is emptied, so no messages can be
received after the call, even if they were sent from the worker before
it was terminated.
The spec doesn't require this of `self.close()`, and since Deno uses
different channels to send messages and to notify that the worker was
closed, messages might still arrive after the worker is known to be
closed, which are currently being dropped. This change fixes that.
The fix involves two parts: one on the JS side and one on the Rust side.
The JS side was using the `#terminated` flag to keep track of whether
the worker is known to be closed, without distinguishing whether further
messages should be dropped or not. This PR changes that flag to an
enum `#state`, which can be one of `"RUNNING"`, `"CLOSED"` or
`"TERMINATED"`.
The Rust side was removing the `WorkerThread` struct from the workers
table when a close control was received, regardless of whether there
were any messages left to read, which made any subsequent calls to
`op_host_recv_message` to return `Ok(None)`, as if there were no more
mesasges. This change instead waits for both a close control and for
the message channel's sender to be closed before the worker thread is
removed from the table.
2021-09-06 05:05:02 -04:00
|
|
|
|
itest!(worker_message_before_close {
|
|
|
|
|
args: "run --quiet --reload --allow-read worker_message_before_close.js",
|
|
|
|
|
output: "worker_message_before_close.js.out",
|
|
|
|
|
});
|
|
|
|
|
|
2021-09-30 13:52:58 -04:00
|
|
|
|
itest!(worker_close_in_wasm_reactions {
|
|
|
|
|
args: "run --quiet --reload --allow-read worker_close_in_wasm_reactions.js",
|
|
|
|
|
output: "worker_close_in_wasm_reactions.js.out",
|
|
|
|
|
});
|
|
|
|
|
|
2021-12-16 05:45:41 -05:00
|
|
|
|
itest!(reference_types_error {
|
2022-04-10 19:12:51 -04:00
|
|
|
|
args: "run --config checkjs.tsconfig.json --check reference_types_error.js",
|
2021-12-16 05:45:41 -05:00
|
|
|
|
output: "reference_types_error.js.out",
|
|
|
|
|
exit_code: 1,
|
2022-04-10 19:12:51 -04:00
|
|
|
|
envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())],
|
2021-12-16 05:45:41 -05:00
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(reference_types_error_no_check {
|
|
|
|
|
args: "run --no-check reference_types_error.js",
|
|
|
|
|
output_str: Some(""),
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(jsx_import_source_error {
|
2022-04-10 19:12:51 -04:00
|
|
|
|
args: "run --config jsx/deno-jsx-error.jsonc --check jsx_import_source_no_pragma.tsx",
|
2021-12-16 05:45:41 -05:00
|
|
|
|
output: "jsx_import_source_error.out",
|
|
|
|
|
exit_code: 1,
|
2022-04-10 19:12:51 -04:00
|
|
|
|
envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())],
|
2021-12-16 05:45:41 -05:00
|
|
|
|
});
|
|
|
|
|
|
2022-01-16 10:48:32 -05:00
|
|
|
|
itest!(shebang_tsc {
|
|
|
|
|
args: "run --quiet shebang.ts",
|
|
|
|
|
output: "shebang.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(shebang_swc {
|
|
|
|
|
args: "run --quiet --no-check shebang.ts",
|
|
|
|
|
output: "shebang.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(shebang_with_json_imports_tsc {
|
|
|
|
|
args: "run --quiet import_assertions/json_with_shebang.ts",
|
|
|
|
|
output: "import_assertions/json_with_shebang.ts.out",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(shebang_with_json_imports_swc {
|
|
|
|
|
args: "run --quiet --no-check import_assertions/json_with_shebang.ts",
|
|
|
|
|
output: "import_assertions/json_with_shebang.ts.out",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
});
|
|
|
|
|
|
2021-06-27 13:27:36 -04:00
|
|
|
|
#[test]
|
|
|
|
|
fn no_validate_asm() {
|
|
|
|
|
let output = util::deno_cmd()
|
2021-08-11 10:20:47 -04:00
|
|
|
|
.current_dir(util::testdata_path())
|
2022-04-10 19:12:51 -04:00
|
|
|
|
.env("DENO_FUTURE_CHECK", "1")
|
2021-06-27 13:27:36 -04:00
|
|
|
|
.arg("run")
|
2021-08-11 10:20:47 -04:00
|
|
|
|
.arg("no_validate_asm.js")
|
2021-06-27 13:27:36 -04:00
|
|
|
|
.stderr(std::process::Stdio::piped())
|
|
|
|
|
.stdout(std::process::Stdio::piped())
|
|
|
|
|
.spawn()
|
|
|
|
|
.unwrap()
|
|
|
|
|
.wait_with_output()
|
|
|
|
|
.unwrap();
|
|
|
|
|
assert!(output.status.success());
|
|
|
|
|
assert!(output.stderr.is_empty());
|
|
|
|
|
assert!(output.stdout.is_empty());
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
|
fn exec_path() {
|
|
|
|
|
let output = util::deno_cmd()
|
2021-08-11 10:20:47 -04:00
|
|
|
|
.current_dir(util::testdata_path())
|
2021-06-27 13:27:36 -04:00
|
|
|
|
.arg("run")
|
|
|
|
|
.arg("--allow-read")
|
2021-08-11 10:20:47 -04:00
|
|
|
|
.arg("exec_path.ts")
|
2021-06-27 13:27:36 -04:00
|
|
|
|
.stdout(std::process::Stdio::piped())
|
|
|
|
|
.spawn()
|
|
|
|
|
.unwrap()
|
|
|
|
|
.wait_with_output()
|
|
|
|
|
.unwrap();
|
|
|
|
|
assert!(output.status.success());
|
|
|
|
|
let stdout_str = std::str::from_utf8(&output.stdout).unwrap().trim();
|
|
|
|
|
let actual =
|
|
|
|
|
std::fs::canonicalize(&std::path::Path::new(stdout_str)).unwrap();
|
|
|
|
|
let expected = std::fs::canonicalize(util::deno_exe_path()).unwrap();
|
|
|
|
|
assert_eq!(expected, actual);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#[cfg(windows)]
|
|
|
|
|
// Clippy suggests to remove the `NoStd` prefix from all variants. I disagree.
|
|
|
|
|
#[allow(clippy::enum_variant_names)]
|
|
|
|
|
enum WinProcConstraints {
|
|
|
|
|
NoStdIn,
|
|
|
|
|
NoStdOut,
|
|
|
|
|
NoStdErr,
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#[cfg(windows)]
|
|
|
|
|
fn run_deno_script_constrained(
|
|
|
|
|
script_path: std::path::PathBuf,
|
|
|
|
|
constraints: WinProcConstraints,
|
|
|
|
|
) -> Result<(), i64> {
|
2021-08-11 10:20:47 -04:00
|
|
|
|
let file_path = "DenoWinRunner.ps1";
|
2021-06-27 13:27:36 -04:00
|
|
|
|
let constraints = match constraints {
|
|
|
|
|
WinProcConstraints::NoStdIn => "1",
|
|
|
|
|
WinProcConstraints::NoStdOut => "2",
|
|
|
|
|
WinProcConstraints::NoStdErr => "4",
|
|
|
|
|
};
|
|
|
|
|
let deno_exe_path = util::deno_exe_path()
|
|
|
|
|
.into_os_string()
|
|
|
|
|
.into_string()
|
|
|
|
|
.unwrap();
|
|
|
|
|
|
|
|
|
|
let deno_script_path = script_path.into_os_string().into_string().unwrap();
|
|
|
|
|
|
|
|
|
|
let args = vec![&deno_exe_path[..], &deno_script_path[..], constraints];
|
|
|
|
|
util::run_powershell_script_file(file_path, args)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#[cfg(windows)]
|
|
|
|
|
#[test]
|
|
|
|
|
fn should_not_panic_on_no_stdin() {
|
|
|
|
|
let output = run_deno_script_constrained(
|
2021-08-11 10:20:47 -04:00
|
|
|
|
util::testdata_path().join("echo.ts"),
|
2021-06-27 13:27:36 -04:00
|
|
|
|
WinProcConstraints::NoStdIn,
|
|
|
|
|
);
|
|
|
|
|
output.unwrap();
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#[cfg(windows)]
|
|
|
|
|
#[test]
|
|
|
|
|
fn should_not_panic_on_no_stdout() {
|
|
|
|
|
let output = run_deno_script_constrained(
|
2021-08-11 10:20:47 -04:00
|
|
|
|
util::testdata_path().join("echo.ts"),
|
2021-06-27 13:27:36 -04:00
|
|
|
|
WinProcConstraints::NoStdOut,
|
|
|
|
|
);
|
|
|
|
|
output.unwrap();
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#[cfg(windows)]
|
|
|
|
|
#[test]
|
|
|
|
|
fn should_not_panic_on_no_stderr() {
|
|
|
|
|
let output = run_deno_script_constrained(
|
2021-08-11 10:20:47 -04:00
|
|
|
|
util::testdata_path().join("echo.ts"),
|
2021-06-27 13:27:36 -04:00
|
|
|
|
WinProcConstraints::NoStdErr,
|
|
|
|
|
);
|
|
|
|
|
output.unwrap();
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#[cfg(not(windows))]
|
|
|
|
|
#[test]
|
|
|
|
|
fn should_not_panic_on_undefined_home_environment_variable() {
|
|
|
|
|
let output = util::deno_cmd()
|
2021-08-11 10:20:47 -04:00
|
|
|
|
.current_dir(util::testdata_path())
|
2021-06-27 13:27:36 -04:00
|
|
|
|
.arg("run")
|
2021-08-11 10:20:47 -04:00
|
|
|
|
.arg("echo.ts")
|
2021-06-27 13:27:36 -04:00
|
|
|
|
.env_remove("HOME")
|
|
|
|
|
.spawn()
|
|
|
|
|
.unwrap()
|
|
|
|
|
.wait_with_output()
|
|
|
|
|
.unwrap();
|
|
|
|
|
assert!(output.status.success());
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
|
fn should_not_panic_on_undefined_deno_dir_environment_variable() {
|
|
|
|
|
let output = util::deno_cmd()
|
2021-08-11 10:20:47 -04:00
|
|
|
|
.current_dir(util::testdata_path())
|
2021-06-27 13:27:36 -04:00
|
|
|
|
.arg("run")
|
2021-08-11 10:20:47 -04:00
|
|
|
|
.arg("echo.ts")
|
2021-06-27 13:27:36 -04:00
|
|
|
|
.env_remove("DENO_DIR")
|
|
|
|
|
.spawn()
|
|
|
|
|
.unwrap()
|
|
|
|
|
.wait_with_output()
|
|
|
|
|
.unwrap();
|
|
|
|
|
assert!(output.status.success());
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#[cfg(not(windows))]
|
|
|
|
|
#[test]
|
|
|
|
|
fn should_not_panic_on_undefined_deno_dir_and_home_environment_variables() {
|
|
|
|
|
let output = util::deno_cmd()
|
2021-08-11 10:20:47 -04:00
|
|
|
|
.current_dir(util::testdata_path())
|
2021-06-27 13:27:36 -04:00
|
|
|
|
.arg("run")
|
2021-08-11 10:20:47 -04:00
|
|
|
|
.arg("echo.ts")
|
2021-06-27 13:27:36 -04:00
|
|
|
|
.env_remove("DENO_DIR")
|
|
|
|
|
.env_remove("HOME")
|
|
|
|
|
.spawn()
|
|
|
|
|
.unwrap()
|
|
|
|
|
.wait_with_output()
|
|
|
|
|
.unwrap();
|
|
|
|
|
assert!(output.status.success());
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
|
fn rust_log() {
|
|
|
|
|
// Without RUST_LOG the stderr is empty.
|
|
|
|
|
let output = util::deno_cmd()
|
2021-08-11 10:20:47 -04:00
|
|
|
|
.current_dir(util::testdata_path())
|
2022-04-10 19:12:51 -04:00
|
|
|
|
.env("DENO_FUTURE_CHECK", "1")
|
2021-06-27 13:27:36 -04:00
|
|
|
|
.arg("run")
|
2021-08-11 10:20:47 -04:00
|
|
|
|
.arg("001_hello.js")
|
2021-06-27 13:27:36 -04:00
|
|
|
|
.stderr(std::process::Stdio::piped())
|
|
|
|
|
.spawn()
|
|
|
|
|
.unwrap()
|
|
|
|
|
.wait_with_output()
|
|
|
|
|
.unwrap();
|
|
|
|
|
assert!(output.status.success());
|
|
|
|
|
assert!(output.stderr.is_empty());
|
|
|
|
|
|
|
|
|
|
// With RUST_LOG the stderr is not empty.
|
|
|
|
|
let output = util::deno_cmd()
|
2021-08-11 10:20:47 -04:00
|
|
|
|
.current_dir(util::testdata_path())
|
2022-04-10 19:12:51 -04:00
|
|
|
|
.env("DENO_FUTURE_CHECK", "1")
|
2021-06-27 13:27:36 -04:00
|
|
|
|
.arg("run")
|
2021-08-11 10:20:47 -04:00
|
|
|
|
.arg("001_hello.js")
|
2021-06-27 13:27:36 -04:00
|
|
|
|
.env("RUST_LOG", "debug")
|
|
|
|
|
.stderr(std::process::Stdio::piped())
|
|
|
|
|
.spawn()
|
|
|
|
|
.unwrap()
|
|
|
|
|
.wait_with_output()
|
|
|
|
|
.unwrap();
|
|
|
|
|
assert!(output.status.success());
|
|
|
|
|
assert!(!output.stderr.is_empty());
|
|
|
|
|
}
|
|
|
|
|
|
2021-10-25 19:34:16 -04:00
|
|
|
|
#[test]
|
|
|
|
|
fn dont_cache_on_check_fail() {
|
|
|
|
|
let deno_dir = util::new_deno_dir();
|
|
|
|
|
|
2022-04-01 11:15:37 -04:00
|
|
|
|
let mut deno_cmd = util::deno_cmd_with_deno_dir(&deno_dir);
|
2021-10-25 19:34:16 -04:00
|
|
|
|
let output = deno_cmd
|
|
|
|
|
.current_dir(util::testdata_path())
|
|
|
|
|
.arg("run")
|
|
|
|
|
.arg("--reload")
|
|
|
|
|
.arg("error_003_typescript.ts")
|
|
|
|
|
.stderr(std::process::Stdio::piped())
|
|
|
|
|
.spawn()
|
|
|
|
|
.unwrap()
|
|
|
|
|
.wait_with_output()
|
|
|
|
|
.unwrap();
|
|
|
|
|
assert!(!output.status.success());
|
|
|
|
|
assert!(!output.stderr.is_empty());
|
|
|
|
|
|
2022-04-01 11:15:37 -04:00
|
|
|
|
let mut deno_cmd = util::deno_cmd_with_deno_dir(&deno_dir);
|
2021-10-25 19:34:16 -04:00
|
|
|
|
let output = deno_cmd
|
|
|
|
|
.current_dir(util::testdata_path())
|
|
|
|
|
.arg("run")
|
|
|
|
|
.arg("error_003_typescript.ts")
|
|
|
|
|
.stderr(std::process::Stdio::piped())
|
|
|
|
|
.spawn()
|
|
|
|
|
.unwrap()
|
|
|
|
|
.wait_with_output()
|
|
|
|
|
.unwrap();
|
|
|
|
|
assert!(!output.status.success());
|
|
|
|
|
assert!(!output.stderr.is_empty());
|
|
|
|
|
}
|
|
|
|
|
|
2021-06-27 13:27:36 -04:00
|
|
|
|
mod permissions {
|
|
|
|
|
use test_util as util;
|
|
|
|
|
|
2022-05-18 16:00:11 -04:00
|
|
|
|
// TODO(bartlomieju): remove --unstable once Deno.spawn is stabilized
|
2021-06-27 13:27:36 -04:00
|
|
|
|
#[test]
|
|
|
|
|
fn with_allow() {
|
|
|
|
|
for permission in &util::PERMISSION_VARIANTS {
|
|
|
|
|
let status = util::deno_cmd()
|
2021-08-11 10:20:47 -04:00
|
|
|
|
.current_dir(&util::testdata_path())
|
2021-06-27 13:27:36 -04:00
|
|
|
|
.arg("run")
|
2022-05-18 16:00:11 -04:00
|
|
|
|
.arg("--unstable")
|
2021-06-27 13:27:36 -04:00
|
|
|
|
.arg(format!("--allow-{0}", permission))
|
|
|
|
|
.arg("permission_test.ts")
|
|
|
|
|
.arg(format!("{0}Required", permission))
|
|
|
|
|
.spawn()
|
|
|
|
|
.unwrap()
|
|
|
|
|
.wait()
|
|
|
|
|
.unwrap();
|
|
|
|
|
assert!(status.success());
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2022-05-18 16:00:11 -04:00
|
|
|
|
// TODO(bartlomieju): remove --unstable once Deno.spawn is stabilized
|
2021-06-27 13:27:36 -04:00
|
|
|
|
#[test]
|
|
|
|
|
fn without_allow() {
|
|
|
|
|
for permission in &util::PERMISSION_VARIANTS {
|
|
|
|
|
let (_, err) = util::run_and_collect_output(
|
|
|
|
|
false,
|
2022-05-18 16:00:11 -04:00
|
|
|
|
&format!("run --unstable permission_test.ts {0}Required", permission),
|
2021-06-27 13:27:36 -04:00
|
|
|
|
None,
|
|
|
|
|
None,
|
|
|
|
|
false,
|
|
|
|
|
);
|
|
|
|
|
assert!(err.contains(util::PERMISSION_DENIED_PATTERN));
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
|
fn rw_inside_project_dir() {
|
|
|
|
|
const PERMISSION_VARIANTS: [&str; 2] = ["read", "write"];
|
|
|
|
|
for permission in &PERMISSION_VARIANTS {
|
|
|
|
|
let status = util::deno_cmd()
|
2021-08-11 10:20:47 -04:00
|
|
|
|
.current_dir(&util::testdata_path())
|
2021-06-27 13:27:36 -04:00
|
|
|
|
.arg("run")
|
|
|
|
|
.arg(format!(
|
|
|
|
|
"--allow-{0}={1}",
|
|
|
|
|
permission,
|
2021-08-11 10:20:47 -04:00
|
|
|
|
util::testdata_path()
|
|
|
|
|
.into_os_string()
|
|
|
|
|
.into_string()
|
|
|
|
|
.unwrap()
|
2021-06-27 13:27:36 -04:00
|
|
|
|
))
|
|
|
|
|
.arg("complex_permissions_test.ts")
|
|
|
|
|
.arg(permission)
|
|
|
|
|
.arg("complex_permissions_test.ts")
|
|
|
|
|
.spawn()
|
|
|
|
|
.unwrap()
|
|
|
|
|
.wait()
|
|
|
|
|
.unwrap();
|
|
|
|
|
assert!(status.success());
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
|
fn rw_outside_test_dir() {
|
|
|
|
|
const PERMISSION_VARIANTS: [&str; 2] = ["read", "write"];
|
|
|
|
|
for permission in &PERMISSION_VARIANTS {
|
|
|
|
|
let (_, err) = util::run_and_collect_output(
|
|
|
|
|
false,
|
|
|
|
|
&format!(
|
|
|
|
|
"run --allow-{0}={1} complex_permissions_test.ts {0} {2}",
|
|
|
|
|
permission,
|
2021-08-11 10:20:47 -04:00
|
|
|
|
util::testdata_path()
|
2021-06-27 13:27:36 -04:00
|
|
|
|
.into_os_string()
|
|
|
|
|
.into_string()
|
|
|
|
|
.unwrap(),
|
|
|
|
|
util::root_path()
|
|
|
|
|
.join("Cargo.toml")
|
|
|
|
|
.into_os_string()
|
|
|
|
|
.into_string()
|
|
|
|
|
.unwrap(),
|
|
|
|
|
),
|
|
|
|
|
None,
|
|
|
|
|
None,
|
|
|
|
|
false,
|
|
|
|
|
);
|
|
|
|
|
assert!(err.contains(util::PERMISSION_DENIED_PATTERN));
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
|
fn rw_inside_test_dir() {
|
|
|
|
|
const PERMISSION_VARIANTS: [&str; 2] = ["read", "write"];
|
|
|
|
|
for permission in &PERMISSION_VARIANTS {
|
|
|
|
|
let status = util::deno_cmd()
|
2021-08-11 10:20:47 -04:00
|
|
|
|
.current_dir(&util::testdata_path())
|
2021-06-27 13:27:36 -04:00
|
|
|
|
.arg("run")
|
|
|
|
|
.arg(format!(
|
|
|
|
|
"--allow-{0}={1}",
|
|
|
|
|
permission,
|
2021-08-11 10:20:47 -04:00
|
|
|
|
util::testdata_path()
|
2021-06-27 13:27:36 -04:00
|
|
|
|
.into_os_string()
|
|
|
|
|
.into_string()
|
|
|
|
|
.unwrap()
|
|
|
|
|
))
|
|
|
|
|
.arg("complex_permissions_test.ts")
|
|
|
|
|
.arg(permission)
|
|
|
|
|
.arg("complex_permissions_test.ts")
|
|
|
|
|
.spawn()
|
|
|
|
|
.unwrap()
|
|
|
|
|
.wait()
|
|
|
|
|
.unwrap();
|
|
|
|
|
assert!(status.success());
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
|
fn rw_outside_test_and_js_dir() {
|
|
|
|
|
const PERMISSION_VARIANTS: [&str; 2] = ["read", "write"];
|
2021-08-11 10:20:47 -04:00
|
|
|
|
let test_dir = util::testdata_path()
|
2021-06-27 13:27:36 -04:00
|
|
|
|
.into_os_string()
|
|
|
|
|
.into_string()
|
|
|
|
|
.unwrap();
|
|
|
|
|
let js_dir = util::root_path()
|
|
|
|
|
.join("js")
|
|
|
|
|
.into_os_string()
|
|
|
|
|
.into_string()
|
|
|
|
|
.unwrap();
|
|
|
|
|
for permission in &PERMISSION_VARIANTS {
|
|
|
|
|
let (_, err) = util::run_and_collect_output(
|
|
|
|
|
false,
|
|
|
|
|
&format!(
|
|
|
|
|
"run --allow-{0}={1},{2} complex_permissions_test.ts {0} {3}",
|
|
|
|
|
permission,
|
|
|
|
|
test_dir,
|
|
|
|
|
js_dir,
|
|
|
|
|
util::root_path()
|
|
|
|
|
.join("Cargo.toml")
|
|
|
|
|
.into_os_string()
|
|
|
|
|
.into_string()
|
|
|
|
|
.unwrap(),
|
|
|
|
|
),
|
|
|
|
|
None,
|
|
|
|
|
None,
|
|
|
|
|
false,
|
|
|
|
|
);
|
|
|
|
|
assert!(err.contains(util::PERMISSION_DENIED_PATTERN));
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
|
fn rw_inside_test_and_js_dir() {
|
|
|
|
|
const PERMISSION_VARIANTS: [&str; 2] = ["read", "write"];
|
2021-08-11 10:20:47 -04:00
|
|
|
|
let test_dir = util::testdata_path()
|
2021-06-27 13:27:36 -04:00
|
|
|
|
.into_os_string()
|
|
|
|
|
.into_string()
|
|
|
|
|
.unwrap();
|
|
|
|
|
let js_dir = util::root_path()
|
|
|
|
|
.join("js")
|
|
|
|
|
.into_os_string()
|
|
|
|
|
.into_string()
|
|
|
|
|
.unwrap();
|
|
|
|
|
for permission in &PERMISSION_VARIANTS {
|
|
|
|
|
let status = util::deno_cmd()
|
2021-08-11 10:20:47 -04:00
|
|
|
|
.current_dir(&util::testdata_path())
|
2021-06-27 13:27:36 -04:00
|
|
|
|
.arg("run")
|
|
|
|
|
.arg(format!("--allow-{0}={1},{2}", permission, test_dir, js_dir))
|
|
|
|
|
.arg("complex_permissions_test.ts")
|
|
|
|
|
.arg(permission)
|
|
|
|
|
.arg("complex_permissions_test.ts")
|
|
|
|
|
.spawn()
|
|
|
|
|
.unwrap()
|
|
|
|
|
.wait()
|
|
|
|
|
.unwrap();
|
|
|
|
|
assert!(status.success());
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
|
fn rw_relative() {
|
|
|
|
|
const PERMISSION_VARIANTS: [&str; 2] = ["read", "write"];
|
|
|
|
|
for permission in &PERMISSION_VARIANTS {
|
|
|
|
|
let status = util::deno_cmd()
|
2021-08-11 10:20:47 -04:00
|
|
|
|
.current_dir(&util::testdata_path())
|
2021-06-27 13:27:36 -04:00
|
|
|
|
.arg("run")
|
|
|
|
|
.arg(format!("--allow-{0}=.", permission))
|
|
|
|
|
.arg("complex_permissions_test.ts")
|
|
|
|
|
.arg(permission)
|
|
|
|
|
.arg("complex_permissions_test.ts")
|
|
|
|
|
.spawn()
|
|
|
|
|
.unwrap()
|
|
|
|
|
.wait()
|
|
|
|
|
.unwrap();
|
|
|
|
|
assert!(status.success());
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
|
fn rw_no_prefix() {
|
|
|
|
|
const PERMISSION_VARIANTS: [&str; 2] = ["read", "write"];
|
|
|
|
|
for permission in &PERMISSION_VARIANTS {
|
|
|
|
|
let status = util::deno_cmd()
|
2021-08-11 10:20:47 -04:00
|
|
|
|
.current_dir(&util::testdata_path())
|
2021-06-27 13:27:36 -04:00
|
|
|
|
.arg("run")
|
|
|
|
|
.arg(format!("--allow-{0}=tls/../", permission))
|
|
|
|
|
.arg("complex_permissions_test.ts")
|
|
|
|
|
.arg(permission)
|
|
|
|
|
.arg("complex_permissions_test.ts")
|
|
|
|
|
.spawn()
|
|
|
|
|
.unwrap()
|
|
|
|
|
.wait()
|
|
|
|
|
.unwrap();
|
|
|
|
|
assert!(status.success());
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
|
fn net_fetch_allow_localhost_4545() {
|
|
|
|
|
let (_, err) = util::run_and_collect_output(
|
|
|
|
|
true,
|
|
|
|
|
"run --allow-net=localhost:4545 complex_permissions_test.ts netFetch http://localhost:4545/",
|
|
|
|
|
None,
|
|
|
|
|
None,
|
|
|
|
|
true,
|
|
|
|
|
);
|
|
|
|
|
assert!(!err.contains(util::PERMISSION_DENIED_PATTERN));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
|
fn net_fetch_allow_deno_land() {
|
|
|
|
|
let (_, err) = util::run_and_collect_output(
|
|
|
|
|
false,
|
|
|
|
|
"run --allow-net=deno.land complex_permissions_test.ts netFetch http://localhost:4545/",
|
|
|
|
|
None,
|
|
|
|
|
None,
|
|
|
|
|
true,
|
|
|
|
|
);
|
|
|
|
|
assert!(err.contains(util::PERMISSION_DENIED_PATTERN));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
|
fn net_fetch_localhost_4545_fail() {
|
|
|
|
|
let (_, err) = util::run_and_collect_output(
|
|
|
|
|
false,
|
|
|
|
|
"run --allow-net=localhost:4545 complex_permissions_test.ts netFetch http://localhost:4546/",
|
|
|
|
|
None,
|
|
|
|
|
None,
|
|
|
|
|
true,
|
|
|
|
|
);
|
|
|
|
|
assert!(err.contains(util::PERMISSION_DENIED_PATTERN));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
|
fn net_fetch_localhost() {
|
|
|
|
|
let (_, err) = util::run_and_collect_output(
|
|
|
|
|
true,
|
|
|
|
|
"run --allow-net=localhost complex_permissions_test.ts netFetch http://localhost:4545/ http://localhost:4546/ http://localhost:4547/",
|
|
|
|
|
None,
|
|
|
|
|
None,
|
|
|
|
|
true,
|
|
|
|
|
);
|
|
|
|
|
assert!(!err.contains(util::PERMISSION_DENIED_PATTERN));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
|
fn net_connect_allow_localhost_ip_4555() {
|
|
|
|
|
let (_, err) = util::run_and_collect_output(
|
|
|
|
|
true,
|
|
|
|
|
"run --allow-net=127.0.0.1:4545 complex_permissions_test.ts netConnect 127.0.0.1:4545",
|
|
|
|
|
None,
|
|
|
|
|
None,
|
|
|
|
|
true,
|
|
|
|
|
);
|
|
|
|
|
assert!(!err.contains(util::PERMISSION_DENIED_PATTERN));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
|
fn net_connect_allow_deno_land() {
|
|
|
|
|
let (_, err) = util::run_and_collect_output(
|
|
|
|
|
false,
|
|
|
|
|
"run --allow-net=deno.land complex_permissions_test.ts netConnect 127.0.0.1:4546",
|
|
|
|
|
None,
|
|
|
|
|
None,
|
|
|
|
|
true,
|
|
|
|
|
);
|
|
|
|
|
assert!(err.contains(util::PERMISSION_DENIED_PATTERN));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
|
fn net_connect_allow_localhost_ip_4545_fail() {
|
|
|
|
|
let (_, err) = util::run_and_collect_output(
|
|
|
|
|
false,
|
|
|
|
|
"run --allow-net=127.0.0.1:4545 complex_permissions_test.ts netConnect 127.0.0.1:4546",
|
|
|
|
|
None,
|
|
|
|
|
None,
|
|
|
|
|
true,
|
|
|
|
|
);
|
|
|
|
|
assert!(err.contains(util::PERMISSION_DENIED_PATTERN));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
|
fn net_connect_allow_localhost_ip() {
|
|
|
|
|
let (_, err) = util::run_and_collect_output(
|
|
|
|
|
true,
|
|
|
|
|
"run --allow-net=127.0.0.1 complex_permissions_test.ts netConnect 127.0.0.1:4545 127.0.0.1:4546 127.0.0.1:4547",
|
|
|
|
|
None,
|
|
|
|
|
None,
|
|
|
|
|
true,
|
|
|
|
|
);
|
|
|
|
|
assert!(!err.contains(util::PERMISSION_DENIED_PATTERN));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
|
fn net_listen_allow_localhost_4555() {
|
|
|
|
|
let (_, err) = util::run_and_collect_output(
|
|
|
|
|
true,
|
|
|
|
|
"run --allow-net=localhost:4558 complex_permissions_test.ts netListen localhost:4558",
|
|
|
|
|
None,
|
|
|
|
|
None,
|
|
|
|
|
false,
|
|
|
|
|
);
|
|
|
|
|
assert!(!err.contains(util::PERMISSION_DENIED_PATTERN));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
|
fn net_listen_allow_deno_land() {
|
|
|
|
|
let (_, err) = util::run_and_collect_output(
|
|
|
|
|
false,
|
|
|
|
|
"run --allow-net=deno.land complex_permissions_test.ts netListen localhost:4545",
|
|
|
|
|
None,
|
|
|
|
|
None,
|
|
|
|
|
false,
|
|
|
|
|
);
|
|
|
|
|
assert!(err.contains(util::PERMISSION_DENIED_PATTERN));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
|
fn net_listen_allow_localhost_4555_fail() {
|
|
|
|
|
let (_, err) = util::run_and_collect_output(
|
|
|
|
|
false,
|
|
|
|
|
"run --allow-net=localhost:4555 complex_permissions_test.ts netListen localhost:4556",
|
|
|
|
|
None,
|
|
|
|
|
None,
|
|
|
|
|
false,
|
|
|
|
|
);
|
|
|
|
|
assert!(err.contains(util::PERMISSION_DENIED_PATTERN));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
|
fn net_listen_allow_localhost() {
|
|
|
|
|
// Port 4600 is chosen to not colide with those used by
|
|
|
|
|
// target/debug/test_server
|
|
|
|
|
let (_, err) = util::run_and_collect_output(
|
|
|
|
|
true,
|
|
|
|
|
"run --allow-net=localhost complex_permissions_test.ts netListen localhost:4600",
|
|
|
|
|
None,
|
|
|
|
|
None,
|
|
|
|
|
false,
|
|
|
|
|
);
|
|
|
|
|
assert!(!err.contains(util::PERMISSION_DENIED_PATTERN));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
|
fn _061_permissions_request() {
|
2021-09-09 08:38:47 -04:00
|
|
|
|
let args = "run --quiet 061_permissions_request.ts";
|
|
|
|
|
use util::PtyData::*;
|
|
|
|
|
util::test_pty2(args, vec![
|
2022-02-16 18:14:46 -05:00
|
|
|
|
Output("⚠️ ️Deno requests read access to \"foo\". Run again with --allow-read to bypass this prompt.\r\n Allow? [y/n (y = yes allow, n = no deny)] "),
|
2021-09-09 08:38:47 -04:00
|
|
|
|
Input("y\n"),
|
2022-02-16 18:14:46 -05:00
|
|
|
|
Output("⚠️ ️Deno requests read access to \"bar\". Run again with --allow-read to bypass this prompt.\r\n Allow? [y/n (y = yes allow, n = no deny)]"),
|
2021-09-09 08:38:47 -04:00
|
|
|
|
Input("n\n"),
|
|
|
|
|
Output("granted\r\n"),
|
|
|
|
|
Output("prompt\r\n"),
|
|
|
|
|
Output("denied\r\n"),
|
|
|
|
|
]);
|
2021-06-27 13:27:36 -04:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
|
fn _062_permissions_request_global() {
|
2021-09-09 08:38:47 -04:00
|
|
|
|
let args = "run --quiet 062_permissions_request_global.ts";
|
|
|
|
|
use util::PtyData::*;
|
|
|
|
|
util::test_pty2(args, vec![
|
2022-02-16 18:14:46 -05:00
|
|
|
|
Output("⚠️ ️Deno requests read access. Run again with --allow-read to bypass this prompt.\r\n Allow? [y/n (y = yes allow, n = no deny)] "),
|
2021-09-09 08:38:47 -04:00
|
|
|
|
Input("y\n"),
|
|
|
|
|
Output("PermissionStatus { state: \"granted\", onchange: null }\r\n"),
|
|
|
|
|
Output("PermissionStatus { state: \"granted\", onchange: null }\r\n"),
|
|
|
|
|
Output("PermissionStatus { state: \"granted\", onchange: null }\r\n"),
|
|
|
|
|
]);
|
2021-06-27 13:27:36 -04:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
itest!(_063_permissions_revoke {
|
|
|
|
|
args: "run --allow-read=foo,bar 063_permissions_revoke.ts",
|
|
|
|
|
output: "063_permissions_revoke.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(_064_permissions_revoke_global {
|
|
|
|
|
args: "run --allow-read=foo,bar 064_permissions_revoke_global.ts",
|
|
|
|
|
output: "064_permissions_revoke_global.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
|
fn _066_prompt() {
|
2021-09-09 08:38:47 -04:00
|
|
|
|
let args = "run --quiet --unstable 066_prompt.ts";
|
|
|
|
|
use util::PtyData::*;
|
|
|
|
|
util::test_pty2(
|
|
|
|
|
args,
|
|
|
|
|
vec![
|
|
|
|
|
Output("What is your name? [Jane Doe] "),
|
|
|
|
|
Input("John Doe\n"),
|
|
|
|
|
Output("Your name is John Doe.\r\n"),
|
|
|
|
|
Output("What is your name? [Jane Doe] "),
|
|
|
|
|
Input("\n"),
|
|
|
|
|
Output("Your name is Jane Doe.\r\n"),
|
|
|
|
|
Output("Prompt "),
|
|
|
|
|
Input("foo\n"),
|
|
|
|
|
Output("Your input is foo.\r\n"),
|
|
|
|
|
Output("Question 0 [y/N] "),
|
|
|
|
|
Input("Y\n"),
|
|
|
|
|
Output("Your answer is true\r\n"),
|
|
|
|
|
Output("Question 1 [y/N] "),
|
|
|
|
|
Input("N\n"),
|
|
|
|
|
Output("Your answer is false\r\n"),
|
|
|
|
|
Output("Question 2 [y/N] "),
|
|
|
|
|
Input("yes\n"),
|
|
|
|
|
Output("Your answer is false\r\n"),
|
|
|
|
|
Output("Confirm [y/N] "),
|
|
|
|
|
Input("\n"),
|
|
|
|
|
Output("Your answer is false\r\n"),
|
|
|
|
|
Output("What is Windows EOL? "),
|
|
|
|
|
Input("windows\n"),
|
|
|
|
|
Output("Your answer is \"windows\"\r\n"),
|
|
|
|
|
Output("Hi [Enter] "),
|
|
|
|
|
Input("\n"),
|
|
|
|
|
Output("Alert [Enter] "),
|
|
|
|
|
Input("\n"),
|
|
|
|
|
Output("The end of test\r\n"),
|
|
|
|
|
Output("What is EOF? "),
|
|
|
|
|
Input("\n"),
|
|
|
|
|
Output("Your answer is null\r\n"),
|
|
|
|
|
],
|
|
|
|
|
);
|
2021-06-27 13:27:36 -04:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
itest!(dynamic_import_permissions_remote_remote {
|
|
|
|
|
args: "run --quiet --reload --allow-net=localhost:4545 dynamic_import/permissions_remote_remote.ts",
|
|
|
|
|
output: "dynamic_import/permissions_remote_remote.ts.out",
|
|
|
|
|
http_server: true,
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(dynamic_import_permissions_data_remote {
|
|
|
|
|
args: "run --quiet --reload --allow-net=localhost:4545 dynamic_import/permissions_data_remote.ts",
|
|
|
|
|
output: "dynamic_import/permissions_data_remote.ts.out",
|
|
|
|
|
http_server: true,
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(dynamic_import_permissions_blob_remote {
|
|
|
|
|
args: "run --quiet --reload --allow-net=localhost:4545 dynamic_import/permissions_blob_remote.ts",
|
|
|
|
|
output: "dynamic_import/permissions_blob_remote.ts.out",
|
|
|
|
|
http_server: true,
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(dynamic_import_permissions_data_local {
|
|
|
|
|
args: "run --quiet --reload --allow-net=localhost:4545 dynamic_import/permissions_data_local.ts",
|
|
|
|
|
output: "dynamic_import/permissions_data_local.ts.out",
|
|
|
|
|
http_server: true,
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(dynamic_import_permissions_blob_local {
|
|
|
|
|
args: "run --quiet --reload --allow-net=localhost:4545 dynamic_import/permissions_blob_local.ts",
|
|
|
|
|
output: "dynamic_import/permissions_blob_local.ts.out",
|
|
|
|
|
http_server: true,
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
});
|
|
|
|
|
}
|
2021-07-22 06:28:46 -04:00
|
|
|
|
|
|
|
|
|
itest!(tls_starttls {
|
|
|
|
|
args: "run --quiet --reload --allow-net --allow-read --unstable --cert tls/RootCA.pem tls_starttls.js",
|
|
|
|
|
output: "tls.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(tls_connecttls {
|
|
|
|
|
args: "run --quiet --reload --allow-net --allow-read --cert tls/RootCA.pem tls_connecttls.js",
|
|
|
|
|
output: "tls.out",
|
|
|
|
|
});
|
2021-08-16 03:28:29 -04:00
|
|
|
|
|
|
|
|
|
itest!(byte_order_mark {
|
|
|
|
|
args: "run --no-check byte_order_mark.ts",
|
|
|
|
|
output: "byte_order_mark.out",
|
|
|
|
|
});
|
2021-09-06 16:59:20 -04:00
|
|
|
|
|
2021-09-09 08:38:47 -04:00
|
|
|
|
#[test]
|
|
|
|
|
fn issue9750() {
|
|
|
|
|
use util::PtyData::*;
|
|
|
|
|
util::test_pty2(
|
|
|
|
|
"run --prompt issue9750.js",
|
|
|
|
|
vec![
|
|
|
|
|
Output("Enter 'yy':\r\n"),
|
|
|
|
|
Input("yy\n"),
|
2022-02-16 18:14:46 -05:00
|
|
|
|
Output("⚠️ ️Deno requests env access. Run again with --allow-env to bypass this prompt.\r\n Allow? [y/n (y = yes allow, n = no deny)]"),
|
2021-09-09 08:38:47 -04:00
|
|
|
|
Input("n\n"),
|
2022-03-21 09:30:43 -04:00
|
|
|
|
Output("⚠️ ️Deno requests env access to \"SECRET\". Run again with --allow-env to bypass this prompt.\r\n Allow? [y/n (y = yes allow, n = no deny)]"),
|
2021-09-09 08:38:47 -04:00
|
|
|
|
Input("n\n"),
|
|
|
|
|
Output("error: Uncaught (in promise) PermissionDenied: Requires env access to \"SECRET\", run again with the --allow-env flag\r\n"),
|
|
|
|
|
],
|
|
|
|
|
);
|
|
|
|
|
}
|
|
|
|
|
|
2021-09-06 16:59:20 -04:00
|
|
|
|
// Regression test for https://github.com/denoland/deno/issues/11451.
|
|
|
|
|
itest!(dom_exception_formatting {
|
|
|
|
|
args: "run dom_exception_formatting.ts",
|
|
|
|
|
output: "dom_exception_formatting.ts.out",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
});
|
2021-09-18 09:40:04 -04:00
|
|
|
|
|
|
|
|
|
itest!(long_data_url_formatting {
|
|
|
|
|
args: "run long_data_url_formatting.ts",
|
|
|
|
|
output: "long_data_url_formatting.ts.out",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
});
|
2021-10-18 12:05:36 -04:00
|
|
|
|
|
|
|
|
|
itest!(eval_context_throw_with_conflicting_source {
|
|
|
|
|
args: "run eval_context_throw_with_conflicting_source.ts",
|
|
|
|
|
output: "eval_context_throw_with_conflicting_source.ts.out",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
});
|
2021-10-19 12:26:45 -04:00
|
|
|
|
|
|
|
|
|
itest!(eval_context_throw_dom_exception {
|
|
|
|
|
args: "run eval_context_throw_dom_exception.js",
|
|
|
|
|
output: "eval_context_throw_dom_exception.js.out",
|
2022-04-10 19:12:51 -04:00
|
|
|
|
envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())],
|
2021-10-19 12:26:45 -04:00
|
|
|
|
});
|
2021-11-03 09:27:36 -04:00
|
|
|
|
|
2021-11-15 18:25:52 -05:00
|
|
|
|
/// Regression test for https://github.com/denoland/deno/issues/12740.
|
|
|
|
|
#[test]
|
|
|
|
|
fn issue12740() {
|
2022-04-01 11:15:37 -04:00
|
|
|
|
let mod_dir = TempDir::new();
|
2021-11-15 18:25:52 -05:00
|
|
|
|
let mod1_path = mod_dir.path().join("mod1.ts");
|
|
|
|
|
let mod2_path = mod_dir.path().join("mod2.ts");
|
|
|
|
|
let mut deno_cmd = util::deno_cmd();
|
|
|
|
|
std::fs::write(&mod1_path, "").unwrap();
|
|
|
|
|
let status = deno_cmd
|
|
|
|
|
.current_dir(util::testdata_path())
|
|
|
|
|
.arg("run")
|
|
|
|
|
.arg(&mod1_path)
|
|
|
|
|
.stderr(std::process::Stdio::null())
|
|
|
|
|
.stdout(std::process::Stdio::null())
|
|
|
|
|
.spawn()
|
|
|
|
|
.unwrap()
|
|
|
|
|
.wait()
|
|
|
|
|
.unwrap();
|
|
|
|
|
assert!(status.success());
|
|
|
|
|
std::fs::write(&mod1_path, "export { foo } from \"./mod2.ts\";").unwrap();
|
|
|
|
|
std::fs::write(&mod2_path, "(").unwrap();
|
|
|
|
|
let status = deno_cmd
|
|
|
|
|
.current_dir(util::testdata_path())
|
|
|
|
|
.arg("run")
|
|
|
|
|
.arg(&mod1_path)
|
|
|
|
|
.stderr(std::process::Stdio::null())
|
|
|
|
|
.stdout(std::process::Stdio::null())
|
|
|
|
|
.spawn()
|
|
|
|
|
.unwrap()
|
|
|
|
|
.wait()
|
|
|
|
|
.unwrap();
|
|
|
|
|
assert!(!status.success());
|
|
|
|
|
}
|
2021-11-23 16:20:30 -05:00
|
|
|
|
|
|
|
|
|
/// Regression test for https://github.com/denoland/deno/issues/12807.
|
|
|
|
|
#[test]
|
|
|
|
|
fn issue12807() {
|
2022-04-01 11:15:37 -04:00
|
|
|
|
let mod_dir = TempDir::new();
|
2021-11-23 16:20:30 -05:00
|
|
|
|
let mod1_path = mod_dir.path().join("mod1.ts");
|
|
|
|
|
let mod2_path = mod_dir.path().join("mod2.ts");
|
|
|
|
|
let mut deno_cmd = util::deno_cmd();
|
|
|
|
|
// With a fresh `DENO_DIR`, run a module with a dependency and a type error.
|
|
|
|
|
std::fs::write(&mod1_path, "import './mod2.ts'; Deno.exit('0');").unwrap();
|
|
|
|
|
std::fs::write(&mod2_path, "console.log('Hello, world!');").unwrap();
|
|
|
|
|
let status = deno_cmd
|
|
|
|
|
.current_dir(util::testdata_path())
|
|
|
|
|
.arg("run")
|
|
|
|
|
.arg(&mod1_path)
|
|
|
|
|
.stderr(std::process::Stdio::null())
|
|
|
|
|
.stdout(std::process::Stdio::null())
|
|
|
|
|
.spawn()
|
|
|
|
|
.unwrap()
|
|
|
|
|
.wait()
|
|
|
|
|
.unwrap();
|
|
|
|
|
assert!(!status.success());
|
|
|
|
|
// Fix the type error and run again.
|
|
|
|
|
std::fs::write(&mod1_path, "import './mod2.ts'; Deno.exit(0);").unwrap();
|
|
|
|
|
let status = deno_cmd
|
|
|
|
|
.current_dir(util::testdata_path())
|
|
|
|
|
.arg("run")
|
|
|
|
|
.arg(&mod1_path)
|
|
|
|
|
.stderr(std::process::Stdio::null())
|
|
|
|
|
.stdout(std::process::Stdio::null())
|
|
|
|
|
.spawn()
|
|
|
|
|
.unwrap()
|
|
|
|
|
.wait()
|
|
|
|
|
.unwrap();
|
|
|
|
|
assert!(status.success());
|
|
|
|
|
}
|
2021-12-15 13:22:36 -05:00
|
|
|
|
|
2022-02-02 14:48:54 -05:00
|
|
|
|
itest!(issue_13562 {
|
|
|
|
|
args: "run issue13562.ts",
|
|
|
|
|
output: "issue13562.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
2021-12-15 13:22:36 -05:00
|
|
|
|
itest!(import_assertions_static_import {
|
|
|
|
|
args: "run --allow-read import_assertions/static_import.ts",
|
|
|
|
|
output: "import_assertions/static_import.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(import_assertions_static_export {
|
|
|
|
|
args: "run --allow-read import_assertions/static_export.ts",
|
|
|
|
|
output: "import_assertions/static_export.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(import_assertions_static_error {
|
|
|
|
|
args: "run --allow-read import_assertions/static_error.ts",
|
|
|
|
|
output: "import_assertions/static_error.out",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(import_assertions_dynamic_import {
|
|
|
|
|
args: "run --allow-read import_assertions/dynamic_import.ts",
|
|
|
|
|
output: "import_assertions/dynamic_import.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(import_assertions_dynamic_error {
|
|
|
|
|
args: "run --allow-read import_assertions/dynamic_error.ts",
|
|
|
|
|
output: "import_assertions/dynamic_error.out",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(import_assertions_type_check {
|
|
|
|
|
args: "run --allow-read import_assertions/type_check.ts",
|
|
|
|
|
output: "import_assertions/type_check.out",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
});
|
2022-01-17 17:23:49 -05:00
|
|
|
|
|
2022-01-17 18:13:14 -05:00
|
|
|
|
itest!(delete_window {
|
|
|
|
|
args: "run delete_window.js",
|
|
|
|
|
output_str: Some("true\n"),
|
2022-04-10 19:12:51 -04:00
|
|
|
|
envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())],
|
2022-01-17 18:13:14 -05:00
|
|
|
|
});
|
|
|
|
|
|
2022-01-17 17:23:49 -05:00
|
|
|
|
itest!(colors_without_global_this {
|
|
|
|
|
args: "run colors_without_globalThis.js",
|
|
|
|
|
output_str: Some("true\n"),
|
2022-04-10 19:12:51 -04:00
|
|
|
|
envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())],
|
2022-01-17 17:23:49 -05:00
|
|
|
|
});
|
2022-02-25 00:39:18 -05:00
|
|
|
|
|
|
|
|
|
itest!(config_auto_discovered_for_local_script {
|
|
|
|
|
args: "run --quiet run/with_config/frontend_work.ts",
|
|
|
|
|
output_str: Some("ok\n"),
|
|
|
|
|
});
|
|
|
|
|
|
2022-05-13 11:40:50 -04:00
|
|
|
|
itest!(no_config_auto_discovery_for_local_script {
|
|
|
|
|
args: "run --quiet --no-config run/with_config/frontend_work.ts",
|
|
|
|
|
output: "run/with_config/no_auto_discovery.out",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
});
|
|
|
|
|
|
2022-02-25 00:39:18 -05:00
|
|
|
|
itest!(config_not_auto_discovered_for_remote_script {
|
|
|
|
|
args: "run --quiet http://127.0.0.1:4545/run/with_config/server_side_work.ts",
|
|
|
|
|
output_str: Some("ok\n"),
|
|
|
|
|
http_server: true,
|
|
|
|
|
});
|
2022-03-22 06:33:29 -04:00
|
|
|
|
|
|
|
|
|
itest!(wasm_streaming_panic_test {
|
|
|
|
|
args: "run wasm_streaming_panic_test.js",
|
|
|
|
|
output: "wasm_streaming_panic_test.js.out",
|
|
|
|
|
exit_code: 1,
|
2022-04-10 19:12:51 -04:00
|
|
|
|
envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())],
|
2022-03-22 06:33:29 -04:00
|
|
|
|
});
|
2022-03-22 13:08:33 -04:00
|
|
|
|
|
|
|
|
|
// Regression test for https://github.com/denoland/deno/issues/13897.
|
|
|
|
|
itest!(fetch_async_error_stack {
|
|
|
|
|
args: "run --quiet -A fetch_async_error_stack.ts",
|
|
|
|
|
output: "fetch_async_error_stack.ts.out",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
});
|
2022-03-25 07:29:54 -04:00
|
|
|
|
|
|
|
|
|
itest!(unstable_ffi_1 {
|
|
|
|
|
args: "run unstable_ffi_1.js",
|
|
|
|
|
output: "unstable_ffi_1.js.out",
|
|
|
|
|
exit_code: 70,
|
2022-04-10 19:12:51 -04:00
|
|
|
|
envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())],
|
2022-03-25 07:29:54 -04:00
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(unstable_ffi_2 {
|
|
|
|
|
args: "run unstable_ffi_2.js",
|
|
|
|
|
output: "unstable_ffi_2.js.out",
|
|
|
|
|
exit_code: 70,
|
2022-04-10 19:12:51 -04:00
|
|
|
|
envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())],
|
2022-03-25 07:29:54 -04:00
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(unstable_ffi_3 {
|
|
|
|
|
args: "run unstable_ffi_3.js",
|
|
|
|
|
output: "unstable_ffi_3.js.out",
|
|
|
|
|
exit_code: 70,
|
2022-04-10 19:12:51 -04:00
|
|
|
|
envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())],
|
2022-03-25 07:29:54 -04:00
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(unstable_ffi_4 {
|
|
|
|
|
args: "run unstable_ffi_4.js",
|
|
|
|
|
output: "unstable_ffi_4.js.out",
|
|
|
|
|
exit_code: 70,
|
2022-04-10 19:12:51 -04:00
|
|
|
|
envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())],
|
2022-03-25 07:29:54 -04:00
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(unstable_ffi_5 {
|
|
|
|
|
args: "run unstable_ffi_5.js",
|
|
|
|
|
output: "unstable_ffi_5.js.out",
|
|
|
|
|
exit_code: 70,
|
2022-04-10 19:12:51 -04:00
|
|
|
|
envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())],
|
2022-03-25 07:29:54 -04:00
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(unstable_ffi_6 {
|
|
|
|
|
args: "run unstable_ffi_6.js",
|
|
|
|
|
output: "unstable_ffi_6.js.out",
|
|
|
|
|
exit_code: 70,
|
2022-04-10 19:12:51 -04:00
|
|
|
|
envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())],
|
2022-03-25 07:29:54 -04:00
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(unstable_ffi_7 {
|
|
|
|
|
args: "run unstable_ffi_7.js",
|
|
|
|
|
output: "unstable_ffi_7.js.out",
|
|
|
|
|
exit_code: 70,
|
2022-04-10 19:12:51 -04:00
|
|
|
|
envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())],
|
2022-03-25 07:29:54 -04:00
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(unstable_ffi_8 {
|
|
|
|
|
args: "run unstable_ffi_8.js",
|
|
|
|
|
output: "unstable_ffi_8.js.out",
|
|
|
|
|
exit_code: 70,
|
2022-04-10 19:12:51 -04:00
|
|
|
|
envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())],
|
2022-03-25 07:29:54 -04:00
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(unstable_ffi_9 {
|
|
|
|
|
args: "run unstable_ffi_9.js",
|
|
|
|
|
output: "unstable_ffi_9.js.out",
|
|
|
|
|
exit_code: 70,
|
2022-04-10 19:12:51 -04:00
|
|
|
|
envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())],
|
2022-03-25 07:29:54 -04:00
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(unstable_ffi_10 {
|
|
|
|
|
args: "run unstable_ffi_10.js",
|
|
|
|
|
output: "unstable_ffi_10.js.out",
|
|
|
|
|
exit_code: 70,
|
2022-04-10 19:12:51 -04:00
|
|
|
|
envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())],
|
2022-03-25 07:29:54 -04:00
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(unstable_ffi_11 {
|
|
|
|
|
args: "run unstable_ffi_11.js",
|
|
|
|
|
output: "unstable_ffi_11.js.out",
|
|
|
|
|
exit_code: 70,
|
2022-04-10 19:12:51 -04:00
|
|
|
|
envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())],
|
2022-03-25 07:29:54 -04:00
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(unstable_ffi_12 {
|
|
|
|
|
args: "run unstable_ffi_12.js",
|
|
|
|
|
output: "unstable_ffi_12.js.out",
|
|
|
|
|
exit_code: 70,
|
2022-04-10 19:12:51 -04:00
|
|
|
|
envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())],
|
2022-03-25 07:29:54 -04:00
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(unstable_ffi_13 {
|
|
|
|
|
args: "run unstable_ffi_13.js",
|
|
|
|
|
output: "unstable_ffi_13.js.out",
|
|
|
|
|
exit_code: 70,
|
2022-04-10 19:12:51 -04:00
|
|
|
|
envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())],
|
2022-03-25 07:29:54 -04:00
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(unstable_ffi_14 {
|
|
|
|
|
args: "run unstable_ffi_14.js",
|
|
|
|
|
output: "unstable_ffi_14.js.out",
|
|
|
|
|
exit_code: 70,
|
2022-04-10 19:12:51 -04:00
|
|
|
|
envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())],
|
2022-03-25 07:29:54 -04:00
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(unstable_ffi_15 {
|
|
|
|
|
args: "run unstable_ffi_15.js",
|
|
|
|
|
output: "unstable_ffi_15.js.out",
|
|
|
|
|
exit_code: 70,
|
2022-04-10 19:12:51 -04:00
|
|
|
|
envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())],
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(future_check1 {
|
|
|
|
|
args: "run future_check.ts",
|
|
|
|
|
output: "future_check1.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(future_check2 {
|
|
|
|
|
args: "run --check future_check.ts",
|
|
|
|
|
output: "future_check2.out",
|
|
|
|
|
envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())],
|
2022-03-25 07:29:54 -04:00
|
|
|
|
});
|
2022-04-13 05:50:57 -04:00
|
|
|
|
|
|
|
|
|
itest!(event_listener_error {
|
|
|
|
|
args: "run --quiet event_listener_error.ts",
|
|
|
|
|
output: "event_listener_error.ts.out",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(event_listener_error_handled {
|
|
|
|
|
args: "run --quiet event_listener_error_handled.ts",
|
|
|
|
|
output: "event_listener_error_handled.ts.out",
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
// https://github.com/denoland/deno/pull/14159#issuecomment-1092285446
|
|
|
|
|
itest!(event_listener_error_immediate_exit {
|
|
|
|
|
args: "run --quiet event_listener_error_immediate_exit.ts",
|
|
|
|
|
output: "event_listener_error_immediate_exit.ts.out",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
});
|
|
|
|
|
|
2022-05-10 05:26:57 -04:00
|
|
|
|
// https://github.com/denoland/deno/pull/14159#issuecomment-1092285446
|
|
|
|
|
itest!(event_listener_error_immediate_exit_worker {
|
|
|
|
|
args:
|
|
|
|
|
"run --quiet --unstable -A event_listener_error_immediate_exit_worker.ts",
|
|
|
|
|
output: "event_listener_error_immediate_exit_worker.ts.out",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
});
|
|
|
|
|
|
2022-04-13 05:50:57 -04:00
|
|
|
|
itest!(set_timeout_error {
|
|
|
|
|
args: "run --quiet set_timeout_error.ts",
|
|
|
|
|
output: "set_timeout_error.ts.out",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(set_timeout_error_handled {
|
|
|
|
|
args: "run --quiet set_timeout_error_handled.ts",
|
|
|
|
|
output: "set_timeout_error_handled.ts.out",
|
|
|
|
|
});
|
2022-04-16 10:12:26 -04:00
|
|
|
|
|
|
|
|
|
itest!(aggregate_error {
|
|
|
|
|
args: "run --quiet aggregate_error.ts",
|
|
|
|
|
output: "aggregate_error.out",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(complex_error {
|
|
|
|
|
args: "run --quiet complex_error.ts",
|
|
|
|
|
output: "complex_error.ts.out",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
});
|
2022-04-18 10:52:26 -04:00
|
|
|
|
|
|
|
|
|
// Regression test for https://github.com/denoland/deno/issues/12143.
|
|
|
|
|
itest!(js_root_with_ts_check {
|
|
|
|
|
args: "run --quiet js_root_with_ts_check.js",
|
|
|
|
|
output: "js_root_with_ts_check.js.out",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
});
|
2022-04-18 15:08:30 -04:00
|
|
|
|
|
|
|
|
|
itest!(no_prompt_flag {
|
|
|
|
|
args: "run --quiet --unstable --no-prompt no_prompt.ts",
|
|
|
|
|
output_str: Some(""),
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
|
fn deno_no_prompt_environment_variable() {
|
|
|
|
|
let output = util::deno_cmd()
|
|
|
|
|
.current_dir(util::testdata_path())
|
|
|
|
|
.arg("run")
|
|
|
|
|
.arg("--unstable")
|
|
|
|
|
.arg("no_prompt.ts")
|
|
|
|
|
.env("DENO_NO_PROMPT", "1")
|
|
|
|
|
.spawn()
|
|
|
|
|
.unwrap()
|
|
|
|
|
.wait_with_output()
|
|
|
|
|
.unwrap();
|
|
|
|
|
assert!(output.status.success());
|
|
|
|
|
}
|
2022-04-19 04:59:51 -04:00
|
|
|
|
|
|
|
|
|
itest!(report_error {
|
|
|
|
|
args: "run --quiet report_error.ts",
|
|
|
|
|
output: "report_error.ts.out",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
itest!(report_error_handled {
|
|
|
|
|
args: "run --quiet report_error_handled.ts",
|
|
|
|
|
output: "report_error_handled.ts.out",
|
|
|
|
|
});
|
2022-04-24 11:21:22 -04:00
|
|
|
|
|
|
|
|
|
itest!(spawn_stdout_inherit {
|
|
|
|
|
args: "run --quiet --unstable -A spawn_stdout_inherit.ts",
|
|
|
|
|
output: "spawn_stdout_inherit.ts.out",
|
|
|
|
|
});
|
2022-05-08 17:03:00 -04:00
|
|
|
|
|
|
|
|
|
itest!(error_name_non_string {
|
|
|
|
|
args: "run --quiet error_name_non_string.js",
|
|
|
|
|
output: "error_name_non_string.js.out",
|
|
|
|
|
exit_code: 1,
|
|
|
|
|
});
|