2022-01-07 22:09:52 -05:00
|
|
|
// Copyright 2018-2022 the Deno authors. All rights reserved. MIT license.
|
2020-11-26 09:17:45 -05:00
|
|
|
use crate::colors;
|
2021-05-26 15:07:12 -04:00
|
|
|
use crate::inspector_server::InspectorServer;
|
2020-11-26 09:17:45 -05:00
|
|
|
use crate::js;
|
|
|
|
use crate::ops;
|
|
|
|
use crate::permissions::Permissions;
|
2021-10-21 07:05:43 -04:00
|
|
|
use crate::tokio_util::run_basic;
|
2021-10-05 16:41:14 -04:00
|
|
|
use crate::BootstrapOptions;
|
2021-05-22 12:08:24 -04:00
|
|
|
use deno_broadcast_channel::InMemoryBroadcastChannel;
|
2020-11-26 09:17:45 -05:00
|
|
|
use deno_core::error::AnyError;
|
2021-06-22 10:30:16 -04:00
|
|
|
use deno_core::error::JsError;
|
2020-11-26 09:17:45 -05:00
|
|
|
use deno_core::futures::channel::mpsc;
|
|
|
|
use deno_core::futures::future::poll_fn;
|
|
|
|
use deno_core::futures::stream::StreamExt;
|
2021-11-29 07:37:44 -05:00
|
|
|
use deno_core::futures::task::AtomicWaker;
|
2021-06-21 19:45:41 -04:00
|
|
|
use deno_core::located_script_name;
|
2021-05-11 15:09:09 -04:00
|
|
|
use deno_core::serde::Deserialize;
|
|
|
|
use deno_core::serde::Serialize;
|
2020-12-11 12:49:26 -05:00
|
|
|
use deno_core::serde_json::json;
|
2020-11-26 09:17:45 -05:00
|
|
|
use deno_core::v8;
|
2021-06-22 10:30:16 -04:00
|
|
|
use deno_core::CancelHandle;
|
2021-09-29 04:47:24 -04:00
|
|
|
use deno_core::CompiledWasmModuleStore;
|
2021-04-28 12:41:50 -04:00
|
|
|
use deno_core::Extension;
|
2020-12-13 13:45:53 -05:00
|
|
|
use deno_core::GetErrorClassFn;
|
2020-12-11 12:49:26 -05:00
|
|
|
use deno_core::JsErrorCreateFn;
|
2020-11-26 09:17:45 -05:00
|
|
|
use deno_core::JsRuntime;
|
2021-05-11 15:09:09 -04:00
|
|
|
use deno_core::ModuleId;
|
2020-12-11 12:49:26 -05:00
|
|
|
use deno_core::ModuleLoader;
|
2020-11-26 09:17:45 -05:00
|
|
|
use deno_core::ModuleSpecifier;
|
|
|
|
use deno_core::RuntimeOptions;
|
2021-07-06 13:42:52 -04:00
|
|
|
use deno_core::SharedArrayBufferStore;
|
2021-08-07 08:49:38 -04:00
|
|
|
use deno_tls::rustls::RootCertStore;
|
2021-06-22 10:30:16 -04:00
|
|
|
use deno_web::create_entangled_message_port;
|
2021-07-05 09:34:37 -04:00
|
|
|
use deno_web::BlobStore;
|
2021-06-22 10:30:16 -04:00
|
|
|
use deno_web::MessagePort;
|
2021-03-26 12:34:25 -04:00
|
|
|
use log::debug;
|
2021-05-11 15:09:09 -04:00
|
|
|
use std::cell::RefCell;
|
|
|
|
use std::fmt;
|
2020-12-11 12:49:26 -05:00
|
|
|
use std::rc::Rc;
|
2020-11-26 09:17:45 -05:00
|
|
|
use std::sync::atomic::AtomicBool;
|
2021-12-11 09:56:45 -05:00
|
|
|
use std::sync::atomic::AtomicI32;
|
2020-11-26 09:17:45 -05:00
|
|
|
use std::sync::atomic::Ordering;
|
|
|
|
use std::sync::Arc;
|
|
|
|
use std::task::Context;
|
|
|
|
use std::task::Poll;
|
|
|
|
|
2021-08-16 08:29:54 -04:00
|
|
|
#[derive(Debug, Copy, Clone, PartialEq, Eq, Serialize, Deserialize)]
|
|
|
|
#[serde(rename_all = "lowercase")]
|
|
|
|
pub enum WebWorkerType {
|
|
|
|
Classic,
|
|
|
|
Module,
|
|
|
|
}
|
|
|
|
|
2021-05-11 15:09:09 -04:00
|
|
|
#[derive(
|
|
|
|
Debug, Default, Copy, Clone, PartialEq, Eq, Hash, Serialize, Deserialize,
|
|
|
|
)]
|
|
|
|
pub struct WorkerId(u32);
|
|
|
|
impl fmt::Display for WorkerId {
|
|
|
|
fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
|
|
|
|
write!(f, "worker-{}", self.0)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
impl WorkerId {
|
|
|
|
pub fn next(&self) -> Option<WorkerId> {
|
|
|
|
self.0.checked_add(1).map(WorkerId)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-11-26 09:17:45 -05:00
|
|
|
/// Events that are sent to host from child
|
|
|
|
/// worker.
|
2021-06-22 10:30:16 -04:00
|
|
|
pub enum WorkerControlEvent {
|
2020-11-26 09:17:45 -05:00
|
|
|
Error(AnyError),
|
|
|
|
TerminalError(AnyError),
|
2021-05-11 15:09:09 -04:00
|
|
|
Close,
|
2020-11-26 09:17:45 -05:00
|
|
|
}
|
|
|
|
|
2021-06-22 10:30:16 -04:00
|
|
|
use deno_core::serde::Serializer;
|
|
|
|
|
|
|
|
impl Serialize for WorkerControlEvent {
|
|
|
|
fn serialize<S>(&self, serializer: S) -> Result<S::Ok, S::Error>
|
|
|
|
where
|
|
|
|
S: Serializer,
|
|
|
|
{
|
|
|
|
let type_id = match &self {
|
|
|
|
WorkerControlEvent::TerminalError(_) => 1_i32,
|
|
|
|
WorkerControlEvent::Error(_) => 2_i32,
|
|
|
|
WorkerControlEvent::Close => 3_i32,
|
|
|
|
};
|
|
|
|
|
|
|
|
match self {
|
|
|
|
WorkerControlEvent::TerminalError(error)
|
|
|
|
| WorkerControlEvent::Error(error) => {
|
|
|
|
let value = match error.downcast_ref::<JsError>() {
|
|
|
|
Some(js_error) => json!({
|
|
|
|
"message": js_error.message,
|
|
|
|
"fileName": js_error.script_resource_name,
|
|
|
|
"lineNumber": js_error.line_number,
|
|
|
|
"columnNumber": js_error.start_column,
|
|
|
|
}),
|
|
|
|
None => json!({
|
|
|
|
"message": error.to_string(),
|
|
|
|
}),
|
|
|
|
};
|
|
|
|
|
|
|
|
Serialize::serialize(&(type_id, value), serializer)
|
|
|
|
}
|
|
|
|
_ => Serialize::serialize(&(type_id, ()), serializer),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-05-11 15:09:09 -04:00
|
|
|
// Channels used for communication with worker's parent
|
|
|
|
#[derive(Clone)]
|
|
|
|
pub struct WebWorkerInternalHandle {
|
2021-06-22 10:30:16 -04:00
|
|
|
sender: mpsc::Sender<WorkerControlEvent>,
|
|
|
|
pub port: Rc<MessagePort>,
|
|
|
|
pub cancel: Rc<CancelHandle>,
|
2021-11-29 07:37:44 -05:00
|
|
|
termination_signal: Arc<AtomicBool>,
|
|
|
|
has_terminated: Arc<AtomicBool>,
|
|
|
|
terminate_waker: Arc<AtomicWaker>,
|
2021-05-11 15:09:09 -04:00
|
|
|
isolate_handle: v8::IsolateHandle,
|
2021-08-16 08:29:54 -04:00
|
|
|
pub worker_type: WebWorkerType,
|
2021-05-11 15:09:09 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
impl WebWorkerInternalHandle {
|
|
|
|
/// Post WorkerEvent to parent as a worker
|
2021-06-22 10:30:16 -04:00
|
|
|
pub fn post_event(&self, event: WorkerControlEvent) -> Result<(), AnyError> {
|
2021-05-11 15:09:09 -04:00
|
|
|
let mut sender = self.sender.clone();
|
|
|
|
// If the channel is closed,
|
|
|
|
// the worker must have terminated but the termination message has not yet been received.
|
|
|
|
//
|
|
|
|
// Therefore just treat it as if the worker has terminated and return.
|
|
|
|
if sender.is_closed() {
|
2021-11-29 07:37:44 -05:00
|
|
|
self.has_terminated.store(true, Ordering::SeqCst);
|
2021-05-11 15:09:09 -04:00
|
|
|
return Ok(());
|
|
|
|
}
|
|
|
|
sender.try_send(event)?;
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Check if this worker is terminated or being terminated
|
|
|
|
pub fn is_terminated(&self) -> bool {
|
2021-11-29 07:37:44 -05:00
|
|
|
self.has_terminated.load(Ordering::SeqCst)
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Check if this worker must terminate (because the termination signal is
|
|
|
|
/// set), and terminates it if so. Returns whether the worker is terminated or
|
|
|
|
/// being terminated, as with [`Self::is_terminated()`].
|
|
|
|
pub fn terminate_if_needed(&mut self) -> bool {
|
|
|
|
let has_terminated = self.is_terminated();
|
|
|
|
|
|
|
|
if !has_terminated && self.termination_signal.load(Ordering::SeqCst) {
|
|
|
|
self.terminate();
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
has_terminated
|
2021-05-11 15:09:09 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
/// Terminate the worker
|
|
|
|
/// This function will set terminated to true, terminate the isolate and close the message channel
|
|
|
|
pub fn terminate(&mut self) {
|
2021-06-22 10:30:16 -04:00
|
|
|
self.cancel.cancel();
|
|
|
|
|
2021-05-11 15:09:09 -04:00
|
|
|
// This function can be called multiple times by whomever holds
|
|
|
|
// the handle. However only a single "termination" should occur so
|
|
|
|
// we need a guard here.
|
2021-11-29 07:37:44 -05:00
|
|
|
let already_terminated = self.has_terminated.swap(true, Ordering::SeqCst);
|
2021-05-11 15:09:09 -04:00
|
|
|
|
|
|
|
if !already_terminated {
|
|
|
|
// Stop javascript execution
|
|
|
|
self.isolate_handle.terminate_execution();
|
|
|
|
}
|
|
|
|
|
|
|
|
// Wake parent by closing the channel
|
|
|
|
self.sender.close_channel();
|
|
|
|
}
|
2020-11-26 09:17:45 -05:00
|
|
|
}
|
|
|
|
|
2021-06-22 10:30:16 -04:00
|
|
|
pub struct SendableWebWorkerHandle {
|
|
|
|
port: MessagePort,
|
|
|
|
receiver: mpsc::Receiver<WorkerControlEvent>,
|
2021-11-29 07:37:44 -05:00
|
|
|
termination_signal: Arc<AtomicBool>,
|
|
|
|
has_terminated: Arc<AtomicBool>,
|
|
|
|
terminate_waker: Arc<AtomicWaker>,
|
2020-11-26 09:17:45 -05:00
|
|
|
isolate_handle: v8::IsolateHandle,
|
|
|
|
}
|
|
|
|
|
2021-06-22 10:30:16 -04:00
|
|
|
impl From<SendableWebWorkerHandle> for WebWorkerHandle {
|
|
|
|
fn from(handle: SendableWebWorkerHandle) -> Self {
|
|
|
|
WebWorkerHandle {
|
|
|
|
receiver: Rc::new(RefCell::new(handle.receiver)),
|
|
|
|
port: Rc::new(handle.port),
|
2021-11-29 07:37:44 -05:00
|
|
|
termination_signal: handle.termination_signal,
|
|
|
|
has_terminated: handle.has_terminated,
|
|
|
|
terminate_waker: handle.terminate_waker,
|
2021-06-22 10:30:16 -04:00
|
|
|
isolate_handle: handle.isolate_handle,
|
2021-04-19 10:57:02 -04:00
|
|
|
}
|
2020-11-26 09:17:45 -05:00
|
|
|
}
|
2021-06-22 10:30:16 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
/// This is the handle to the web worker that the parent thread uses to
|
|
|
|
/// communicate with the worker. It is created from a `SendableWebWorkerHandle`
|
|
|
|
/// which is sent to the parent thread from the worker thread where it is
|
2021-08-20 16:14:48 -04:00
|
|
|
/// created. The reason for this separation is that the handle first needs to be
|
2021-06-22 10:30:16 -04:00
|
|
|
/// `Send` when transferring between threads, and then must be `Clone` when it
|
|
|
|
/// has arrived on the parent thread. It can not be both at once without large
|
|
|
|
/// amounts of Arc<Mutex> and other fun stuff.
|
|
|
|
#[derive(Clone)]
|
|
|
|
pub struct WebWorkerHandle {
|
|
|
|
pub port: Rc<MessagePort>,
|
|
|
|
receiver: Rc<RefCell<mpsc::Receiver<WorkerControlEvent>>>,
|
2021-11-29 07:37:44 -05:00
|
|
|
termination_signal: Arc<AtomicBool>,
|
|
|
|
has_terminated: Arc<AtomicBool>,
|
|
|
|
terminate_waker: Arc<AtomicWaker>,
|
2021-06-22 10:30:16 -04:00
|
|
|
isolate_handle: v8::IsolateHandle,
|
|
|
|
}
|
2020-11-26 09:17:45 -05:00
|
|
|
|
2021-06-22 10:30:16 -04:00
|
|
|
impl WebWorkerHandle {
|
2021-05-11 15:09:09 -04:00
|
|
|
/// Get the WorkerEvent with lock
|
2020-11-26 09:17:45 -05:00
|
|
|
/// Return error if more than one listener tries to get event
|
2021-06-22 10:30:16 -04:00
|
|
|
pub async fn get_control_event(
|
|
|
|
&self,
|
|
|
|
) -> Result<Option<WorkerControlEvent>, AnyError> {
|
2021-11-03 09:27:36 -04:00
|
|
|
#![allow(clippy::await_holding_refcell_ref)] // TODO(ry) remove!
|
2021-06-22 10:30:16 -04:00
|
|
|
let mut receiver = self.receiver.borrow_mut();
|
2020-11-26 09:17:45 -05:00
|
|
|
Ok(receiver.next().await)
|
|
|
|
}
|
|
|
|
|
2021-05-11 15:09:09 -04:00
|
|
|
/// Terminate the worker
|
2021-11-29 07:37:44 -05:00
|
|
|
/// This function will set the termination signal, close the message channel,
|
|
|
|
/// and schedule to terminate the isolate after two seconds.
|
2021-06-22 10:30:16 -04:00
|
|
|
pub fn terminate(self) {
|
2021-11-29 07:37:44 -05:00
|
|
|
use std::thread::{sleep, spawn};
|
|
|
|
use std::time::Duration;
|
2020-11-26 09:17:45 -05:00
|
|
|
|
2021-11-29 07:37:44 -05:00
|
|
|
let schedule_termination =
|
|
|
|
!self.termination_signal.swap(true, Ordering::SeqCst);
|
2021-05-11 15:09:09 -04:00
|
|
|
|
2021-06-22 10:30:16 -04:00
|
|
|
self.port.disentangle();
|
2021-11-29 07:37:44 -05:00
|
|
|
|
|
|
|
if schedule_termination && !self.has_terminated.load(Ordering::SeqCst) {
|
|
|
|
// Wake up the worker's event loop so it can terminate.
|
|
|
|
self.terminate_waker.wake();
|
|
|
|
|
|
|
|
let has_terminated = self.has_terminated.clone();
|
|
|
|
|
|
|
|
// Schedule to terminate the isolate's execution.
|
|
|
|
spawn(move || {
|
|
|
|
sleep(Duration::from_secs(2));
|
|
|
|
|
|
|
|
// A worker's isolate can only be terminated once, so we need a guard
|
|
|
|
// here.
|
|
|
|
let already_terminated = has_terminated.swap(true, Ordering::SeqCst);
|
|
|
|
|
|
|
|
if !already_terminated {
|
|
|
|
// Stop javascript execution
|
|
|
|
self.isolate_handle.terminate_execution();
|
|
|
|
}
|
|
|
|
});
|
|
|
|
}
|
2020-11-26 09:17:45 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-05-11 15:09:09 -04:00
|
|
|
fn create_handles(
|
2020-11-26 09:17:45 -05:00
|
|
|
isolate_handle: v8::IsolateHandle,
|
2021-08-16 08:29:54 -04:00
|
|
|
worker_type: WebWorkerType,
|
2021-06-22 10:30:16 -04:00
|
|
|
) -> (WebWorkerInternalHandle, SendableWebWorkerHandle) {
|
|
|
|
let (parent_port, worker_port) = create_entangled_message_port();
|
|
|
|
let (ctrl_tx, ctrl_rx) = mpsc::channel::<WorkerControlEvent>(1);
|
2021-11-29 07:37:44 -05:00
|
|
|
let termination_signal = Arc::new(AtomicBool::new(false));
|
|
|
|
let has_terminated = Arc::new(AtomicBool::new(false));
|
|
|
|
let terminate_waker = Arc::new(AtomicWaker::new());
|
2021-05-11 15:09:09 -04:00
|
|
|
let internal_handle = WebWorkerInternalHandle {
|
2021-06-22 10:30:16 -04:00
|
|
|
sender: ctrl_tx,
|
|
|
|
port: Rc::new(parent_port),
|
2021-11-29 07:37:44 -05:00
|
|
|
termination_signal: termination_signal.clone(),
|
|
|
|
has_terminated: has_terminated.clone(),
|
|
|
|
terminate_waker: terminate_waker.clone(),
|
2021-05-11 15:09:09 -04:00
|
|
|
isolate_handle: isolate_handle.clone(),
|
2021-06-22 10:30:16 -04:00
|
|
|
cancel: CancelHandle::new_rc(),
|
2021-08-16 08:29:54 -04:00
|
|
|
worker_type,
|
2020-11-26 09:17:45 -05:00
|
|
|
};
|
2021-06-22 10:30:16 -04:00
|
|
|
let external_handle = SendableWebWorkerHandle {
|
|
|
|
receiver: ctrl_rx,
|
|
|
|
port: worker_port,
|
2021-11-29 07:37:44 -05:00
|
|
|
termination_signal,
|
|
|
|
has_terminated,
|
|
|
|
terminate_waker,
|
2020-11-26 09:17:45 -05:00
|
|
|
isolate_handle,
|
|
|
|
};
|
2021-05-11 15:09:09 -04:00
|
|
|
(internal_handle, external_handle)
|
2020-11-26 09:17:45 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
/// This struct is an implementation of `Worker` Web API
|
|
|
|
///
|
|
|
|
/// Each `WebWorker` is either a child of `MainWorker` or other
|
|
|
|
/// `WebWorker`.
|
|
|
|
pub struct WebWorker {
|
2021-05-11 15:09:09 -04:00
|
|
|
id: WorkerId,
|
2020-12-13 13:45:53 -05:00
|
|
|
pub js_runtime: JsRuntime,
|
|
|
|
pub name: String,
|
2021-05-11 15:09:09 -04:00
|
|
|
internal_handle: WebWorkerInternalHandle,
|
2020-12-11 12:49:26 -05:00
|
|
|
pub use_deno_namespace: bool,
|
2021-08-16 08:29:54 -04:00
|
|
|
pub worker_type: WebWorkerType,
|
2021-01-07 13:06:08 -05:00
|
|
|
pub main_module: ModuleSpecifier,
|
2022-02-11 07:41:56 -05:00
|
|
|
poll_for_messages_fn: Option<v8::Global<v8::Value>>,
|
2020-12-11 12:49:26 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
pub struct WebWorkerOptions {
|
2021-10-05 16:41:14 -04:00
|
|
|
pub bootstrap: BootstrapOptions,
|
2021-10-08 11:03:49 -04:00
|
|
|
pub extensions: Vec<Extension>,
|
2021-08-10 07:19:45 -04:00
|
|
|
pub unsafely_ignore_certificate_errors: Option<Vec<String>>,
|
2021-08-07 08:49:38 -04:00
|
|
|
pub root_cert_store: Option<RootCertStore>,
|
2020-12-11 18:36:18 -05:00
|
|
|
pub user_agent: String,
|
2020-12-11 12:49:26 -05:00
|
|
|
pub seed: Option<u64>,
|
|
|
|
pub module_loader: Rc<dyn ModuleLoader>,
|
|
|
|
pub create_web_worker_cb: Arc<ops::worker_host::CreateWebWorkerCb>,
|
2022-02-11 07:41:56 -05:00
|
|
|
pub preload_module_cb: Arc<ops::worker_host::PreloadModuleCb>,
|
2020-12-11 12:49:26 -05:00
|
|
|
pub js_error_create_fn: Option<Rc<JsErrorCreateFn>>,
|
|
|
|
pub use_deno_namespace: bool,
|
2021-08-16 08:29:54 -04:00
|
|
|
pub worker_type: WebWorkerType,
|
2020-12-11 12:49:26 -05:00
|
|
|
pub maybe_inspector_server: Option<Arc<InspectorServer>>,
|
2020-12-13 13:45:53 -05:00
|
|
|
pub get_error_class_fn: Option<GetErrorClassFn>,
|
2021-07-05 09:34:37 -04:00
|
|
|
pub blob_store: BlobStore,
|
2021-05-22 12:08:24 -04:00
|
|
|
pub broadcast_channel: InMemoryBroadcastChannel,
|
2021-07-06 13:42:52 -04:00
|
|
|
pub shared_array_buffer_store: Option<SharedArrayBufferStore>,
|
2021-09-29 04:47:24 -04:00
|
|
|
pub compiled_wasm_module_store: Option<CompiledWasmModuleStore>,
|
2021-12-11 09:56:45 -05:00
|
|
|
pub maybe_exit_code: Option<Arc<AtomicI32>>,
|
2020-11-26 09:17:45 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
impl WebWorker {
|
2021-10-05 16:41:14 -04:00
|
|
|
pub fn bootstrap_from_options(
|
|
|
|
name: String,
|
|
|
|
permissions: Permissions,
|
|
|
|
main_module: ModuleSpecifier,
|
|
|
|
worker_id: WorkerId,
|
|
|
|
options: WebWorkerOptions,
|
|
|
|
) -> (Self, SendableWebWorkerHandle) {
|
|
|
|
let bootstrap_options = options.bootstrap.clone();
|
|
|
|
let (mut worker, handle) =
|
|
|
|
Self::from_options(name, permissions, main_module, worker_id, options);
|
|
|
|
worker.bootstrap(&bootstrap_options);
|
|
|
|
(worker, handle)
|
|
|
|
}
|
|
|
|
|
2020-12-11 12:49:26 -05:00
|
|
|
pub fn from_options(
|
2020-11-26 09:17:45 -05:00
|
|
|
name: String,
|
|
|
|
permissions: Permissions,
|
|
|
|
main_module: ModuleSpecifier,
|
2021-05-11 15:09:09 -04:00
|
|
|
worker_id: WorkerId,
|
2021-10-08 11:03:49 -04:00
|
|
|
mut options: WebWorkerOptions,
|
2021-06-22 10:30:16 -04:00
|
|
|
) -> (Self, SendableWebWorkerHandle) {
|
2021-05-02 19:22:57 -04:00
|
|
|
// Permissions: many ops depend on this
|
2021-10-05 16:41:14 -04:00
|
|
|
let unstable = options.bootstrap.unstable;
|
|
|
|
let enable_testing_features = options.bootstrap.enable_testing_features;
|
2021-05-02 19:22:57 -04:00
|
|
|
let perm_ext = Extension::builder()
|
|
|
|
.state(move |state| {
|
|
|
|
state.put::<Permissions>(permissions.clone());
|
|
|
|
state.put(ops::UnstableChecker { unstable });
|
2021-08-16 08:29:54 -04:00
|
|
|
state.put(ops::TestingFeaturesEnabled(enable_testing_features));
|
2021-05-02 19:22:57 -04:00
|
|
|
Ok(())
|
|
|
|
})
|
|
|
|
.build();
|
|
|
|
|
|
|
|
let mut extensions: Vec<Extension> = vec![
|
2021-04-28 12:41:50 -04:00
|
|
|
// Web APIs
|
|
|
|
deno_webidl::init(),
|
|
|
|
deno_console::init(),
|
|
|
|
deno_url::init(),
|
2022-02-15 06:17:30 -05:00
|
|
|
deno_web::init::<Permissions>(
|
|
|
|
options.blob_store.clone(),
|
|
|
|
Some(main_module.clone()),
|
|
|
|
),
|
2021-11-28 13:07:03 -05:00
|
|
|
deno_fetch::init::<Permissions>(deno_fetch::Options {
|
|
|
|
user_agent: options.user_agent.clone(),
|
|
|
|
root_cert_store: options.root_cert_store.clone(),
|
|
|
|
unsafely_ignore_certificate_errors: options
|
|
|
|
.unsafely_ignore_certificate_errors
|
|
|
|
.clone(),
|
2021-12-03 08:25:16 -05:00
|
|
|
file_fetch_handler: Rc::new(deno_fetch::FsFetchHandler),
|
2021-11-28 13:07:03 -05:00
|
|
|
..Default::default()
|
|
|
|
}),
|
2021-04-28 12:41:50 -04:00
|
|
|
deno_websocket::init::<Permissions>(
|
|
|
|
options.user_agent.clone(),
|
2021-08-07 08:49:38 -04:00
|
|
|
options.root_cert_store.clone(),
|
2021-08-10 07:19:45 -04:00
|
|
|
options.unsafely_ignore_certificate_errors.clone(),
|
2021-04-28 12:41:50 -04:00
|
|
|
),
|
2022-03-22 11:39:58 -04:00
|
|
|
deno_webstorage::init(None).disable(),
|
2021-10-05 16:41:14 -04:00
|
|
|
deno_broadcast_channel::init(options.broadcast_channel.clone(), unstable),
|
2021-04-28 12:41:50 -04:00
|
|
|
deno_crypto::init(options.seed),
|
2021-10-05 16:41:14 -04:00
|
|
|
deno_webgpu::init(unstable),
|
2021-08-06 17:28:10 -04:00
|
|
|
// ffi
|
2021-10-05 16:41:14 -04:00
|
|
|
deno_ffi::init::<Permissions>(unstable),
|
2022-03-22 11:39:58 -04:00
|
|
|
// Runtime ops that are always initialized for WebWorkers
|
2021-05-02 19:22:57 -04:00
|
|
|
ops::web_worker::init(),
|
|
|
|
ops::runtime::init(main_module.clone()),
|
2022-02-11 07:41:56 -05:00
|
|
|
ops::worker_host::init(
|
|
|
|
options.create_web_worker_cb.clone(),
|
|
|
|
options.preload_module_cb.clone(),
|
|
|
|
),
|
2022-03-22 11:39:58 -04:00
|
|
|
// Extensions providing Deno.* features
|
|
|
|
ops::fs_events::init().enabled(options.use_deno_namespace),
|
|
|
|
ops::fs::init().enabled(options.use_deno_namespace),
|
2021-05-02 19:22:57 -04:00
|
|
|
ops::io::init(),
|
2022-03-22 11:39:58 -04:00
|
|
|
ops::io::init_stdio().enabled(options.use_deno_namespace),
|
|
|
|
deno_tls::init().enabled(options.use_deno_namespace),
|
|
|
|
deno_net::init::<Permissions>(
|
|
|
|
options.root_cert_store.clone(),
|
|
|
|
unstable,
|
|
|
|
options.unsafely_ignore_certificate_errors.clone(),
|
|
|
|
)
|
|
|
|
.enabled(options.use_deno_namespace),
|
|
|
|
ops::os::init(Some(
|
|
|
|
options
|
|
|
|
.maybe_exit_code
|
|
|
|
.expect("Worker has access to OS ops but exit code was not passed."),
|
|
|
|
))
|
|
|
|
.enabled(options.use_deno_namespace),
|
|
|
|
ops::permissions::init().enabled(options.use_deno_namespace),
|
|
|
|
ops::process::init().enabled(options.use_deno_namespace),
|
|
|
|
ops::signal::init().enabled(options.use_deno_namespace),
|
|
|
|
ops::tty::init().enabled(options.use_deno_namespace),
|
|
|
|
deno_http::init().enabled(options.use_deno_namespace),
|
|
|
|
ops::http::init().enabled(options.use_deno_namespace),
|
|
|
|
// Permissions ext (worker specific state)
|
|
|
|
perm_ext,
|
2021-04-28 12:41:50 -04:00
|
|
|
];
|
|
|
|
|
2021-05-02 19:22:57 -04:00
|
|
|
// Append exts
|
2021-10-08 11:03:49 -04:00
|
|
|
extensions.extend(std::mem::take(&mut options.extensions));
|
2021-05-02 19:22:57 -04:00
|
|
|
|
2020-11-26 09:17:45 -05:00
|
|
|
let mut js_runtime = JsRuntime::new(RuntimeOptions {
|
2020-12-11 12:49:26 -05:00
|
|
|
module_loader: Some(options.module_loader.clone()),
|
2020-11-26 09:17:45 -05:00
|
|
|
startup_snapshot: Some(js::deno_isolate_init()),
|
2020-12-11 12:49:26 -05:00
|
|
|
js_error_create_fn: options.js_error_create_fn.clone(),
|
2020-12-13 13:45:53 -05:00
|
|
|
get_error_class_fn: options.get_error_class_fn,
|
2021-07-06 13:42:52 -04:00
|
|
|
shared_array_buffer_store: options.shared_array_buffer_store.clone(),
|
2021-09-29 04:47:24 -04:00
|
|
|
compiled_wasm_module_store: options.compiled_wasm_module_store.clone(),
|
2021-04-28 12:41:50 -04:00
|
|
|
extensions,
|
2020-11-26 09:17:45 -05:00
|
|
|
..Default::default()
|
|
|
|
});
|
|
|
|
|
2021-06-21 13:37:51 -04:00
|
|
|
if let Some(server) = options.maybe_inspector_server.clone() {
|
2021-12-17 12:43:25 -05:00
|
|
|
server.register_inspector(
|
|
|
|
main_module.to_string(),
|
|
|
|
&mut js_runtime,
|
|
|
|
false,
|
|
|
|
);
|
2021-05-26 15:07:12 -04:00
|
|
|
}
|
2020-11-26 09:17:45 -05:00
|
|
|
|
2021-05-11 15:09:09 -04:00
|
|
|
let (internal_handle, external_handle) = {
|
|
|
|
let handle = js_runtime.v8_isolate().thread_safe_handle();
|
2021-08-16 08:29:54 -04:00
|
|
|
let (internal_handle, external_handle) =
|
|
|
|
create_handles(handle, options.worker_type);
|
2021-05-11 15:09:09 -04:00
|
|
|
let op_state = js_runtime.op_state();
|
|
|
|
let mut op_state = op_state.borrow_mut();
|
|
|
|
op_state.put(internal_handle.clone());
|
|
|
|
(internal_handle, external_handle)
|
|
|
|
};
|
2020-11-26 09:17:45 -05:00
|
|
|
|
2021-06-22 10:30:16 -04:00
|
|
|
(
|
|
|
|
Self {
|
|
|
|
id: worker_id,
|
|
|
|
js_runtime,
|
|
|
|
name,
|
|
|
|
internal_handle,
|
|
|
|
use_deno_namespace: options.use_deno_namespace,
|
2021-08-16 08:29:54 -04:00
|
|
|
worker_type: options.worker_type,
|
2021-06-22 10:30:16 -04:00
|
|
|
main_module,
|
2022-02-11 07:41:56 -05:00
|
|
|
poll_for_messages_fn: None,
|
2021-06-22 10:30:16 -04:00
|
|
|
},
|
2021-05-11 15:09:09 -04:00
|
|
|
external_handle,
|
2021-06-22 10:30:16 -04:00
|
|
|
)
|
2020-12-11 12:49:26 -05:00
|
|
|
}
|
|
|
|
|
2021-10-05 16:41:14 -04:00
|
|
|
pub fn bootstrap(&mut self, options: &BootstrapOptions) {
|
2020-12-06 22:30:40 -05:00
|
|
|
// Instead of using name for log we use `worker-${id}` because
|
|
|
|
// WebWorkers can have empty string as name.
|
|
|
|
let script = format!(
|
2021-05-11 15:09:09 -04:00
|
|
|
"bootstrap.workerRuntime({}, \"{}\", {}, \"{}\")",
|
2021-10-05 16:41:14 -04:00
|
|
|
options.as_json(),
|
|
|
|
self.name,
|
|
|
|
self.use_deno_namespace,
|
|
|
|
self.id
|
2020-12-06 22:30:40 -05:00
|
|
|
);
|
2020-12-11 12:49:26 -05:00
|
|
|
self
|
2021-06-21 19:45:41 -04:00
|
|
|
.execute_script(&located_script_name!(), &script)
|
2020-12-06 22:30:40 -05:00
|
|
|
.expect("Failed to execute worker bootstrap script");
|
2022-02-11 07:41:56 -05:00
|
|
|
// Save a reference to function that will start polling for messages
|
|
|
|
// from a worker host; it will be called after the user code is loaded.
|
|
|
|
let script = r#"
|
|
|
|
const pollForMessages = globalThis.pollForMessages;
|
|
|
|
delete globalThis.pollForMessages;
|
|
|
|
pollForMessages
|
|
|
|
"#;
|
|
|
|
let poll_for_messages_fn = self
|
|
|
|
.js_runtime
|
|
|
|
.execute_script(&located_script_name!(), script)
|
|
|
|
.expect("Failed to execute worker bootstrap script");
|
|
|
|
self.poll_for_messages_fn = Some(poll_for_messages_fn);
|
2020-11-26 09:17:45 -05:00
|
|
|
}
|
|
|
|
|
2021-06-21 19:45:41 -04:00
|
|
|
/// See [JsRuntime::execute_script](deno_core::JsRuntime::execute_script)
|
|
|
|
pub fn execute_script(
|
|
|
|
&mut self,
|
|
|
|
name: &str,
|
|
|
|
source_code: &str,
|
|
|
|
) -> Result<(), AnyError> {
|
2021-07-08 12:56:53 -04:00
|
|
|
self.js_runtime.execute_script(name, source_code)?;
|
|
|
|
Ok(())
|
2020-11-26 09:17:45 -05:00
|
|
|
}
|
|
|
|
|
2021-09-17 21:44:53 -04:00
|
|
|
/// Loads and instantiates specified JavaScript module
|
|
|
|
/// as "main" or "side" module.
|
2021-05-11 15:09:09 -04:00
|
|
|
pub async fn preload_module(
|
|
|
|
&mut self,
|
|
|
|
module_specifier: &ModuleSpecifier,
|
2021-09-17 21:44:53 -04:00
|
|
|
main: bool,
|
2021-05-11 15:09:09 -04:00
|
|
|
) -> Result<ModuleId, AnyError> {
|
2021-09-17 21:44:53 -04:00
|
|
|
if main {
|
|
|
|
self
|
|
|
|
.js_runtime
|
|
|
|
.load_main_module(module_specifier, None)
|
|
|
|
.await
|
|
|
|
} else {
|
|
|
|
self
|
|
|
|
.js_runtime
|
|
|
|
.load_side_module(module_specifier, None)
|
|
|
|
.await
|
|
|
|
}
|
2021-05-11 15:09:09 -04:00
|
|
|
}
|
|
|
|
|
2020-11-26 09:17:45 -05:00
|
|
|
/// Loads, instantiates and executes specified JavaScript module.
|
2022-02-11 07:41:56 -05:00
|
|
|
///
|
|
|
|
/// This method assumes that worker can't be terminated when executing
|
|
|
|
/// side module code.
|
|
|
|
pub async fn execute_side_module(
|
2020-11-26 09:17:45 -05:00
|
|
|
&mut self,
|
|
|
|
module_specifier: &ModuleSpecifier,
|
|
|
|
) -> Result<(), AnyError> {
|
2022-02-11 07:41:56 -05:00
|
|
|
let id = self.preload_module(module_specifier, false).await?;
|
|
|
|
let mut receiver = self.js_runtime.mod_evaluate(id);
|
|
|
|
tokio::select! {
|
|
|
|
maybe_result = &mut receiver => {
|
|
|
|
debug!("received module evaluate {:#?}", maybe_result);
|
|
|
|
maybe_result.expect("Module evaluation result not provided.")
|
|
|
|
}
|
|
|
|
|
|
|
|
event_loop_result = self.js_runtime.run_event_loop(false) => {
|
|
|
|
event_loop_result?;
|
|
|
|
let maybe_result = receiver.await;
|
|
|
|
maybe_result.expect("Module evaluation result not provided.")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Loads, instantiates and executes specified JavaScript module.
|
|
|
|
///
|
|
|
|
/// This module will have "import.meta.main" equal to true.
|
|
|
|
pub async fn execute_main_module(
|
|
|
|
&mut self,
|
|
|
|
id: ModuleId,
|
|
|
|
) -> Result<(), AnyError> {
|
2021-03-04 07:19:47 -05:00
|
|
|
let mut receiver = self.js_runtime.mod_evaluate(id);
|
|
|
|
tokio::select! {
|
2021-07-30 07:36:43 -04:00
|
|
|
maybe_result = &mut receiver => {
|
2021-03-04 07:19:47 -05:00
|
|
|
debug!("received worker module evaluate {:#?}", maybe_result);
|
|
|
|
// If `None` is returned it means that runtime was destroyed before
|
|
|
|
// evaluation was complete. This can happen in Web Worker when `self.close()`
|
|
|
|
// is called at top level.
|
2021-06-17 15:56:30 -04:00
|
|
|
maybe_result.unwrap_or(Ok(()))
|
2021-03-04 07:19:47 -05:00
|
|
|
}
|
|
|
|
|
2021-05-26 15:07:12 -04:00
|
|
|
event_loop_result = self.run_event_loop(false) => {
|
2021-05-11 15:09:09 -04:00
|
|
|
if self.internal_handle.is_terminated() {
|
|
|
|
return Ok(());
|
2021-03-04 07:19:47 -05:00
|
|
|
}
|
|
|
|
event_loop_result?;
|
2021-07-30 07:36:43 -04:00
|
|
|
let maybe_result = receiver.await;
|
2021-06-17 15:56:30 -04:00
|
|
|
maybe_result.unwrap_or(Ok(()))
|
2021-03-04 07:19:47 -05:00
|
|
|
}
|
|
|
|
}
|
2020-11-26 09:17:45 -05:00
|
|
|
}
|
|
|
|
|
2021-09-24 18:35:35 -04:00
|
|
|
fn poll_event_loop(
|
2020-11-26 09:17:45 -05:00
|
|
|
&mut self,
|
|
|
|
cx: &mut Context,
|
2021-05-26 15:07:12 -04:00
|
|
|
wait_for_inspector: bool,
|
2020-11-26 09:17:45 -05:00
|
|
|
) -> Poll<Result<(), AnyError>> {
|
2021-05-11 15:09:09 -04:00
|
|
|
// If awakened because we are terminating, just return Ok
|
2021-11-29 07:37:44 -05:00
|
|
|
if self.internal_handle.terminate_if_needed() {
|
2020-11-26 09:17:45 -05:00
|
|
|
return Poll::Ready(Ok(()));
|
|
|
|
}
|
|
|
|
|
2021-11-29 07:37:44 -05:00
|
|
|
self.internal_handle.terminate_waker.register(cx.waker());
|
|
|
|
|
2021-05-26 15:07:12 -04:00
|
|
|
match self.js_runtime.poll_event_loop(cx, wait_for_inspector) {
|
2021-05-11 15:09:09 -04:00
|
|
|
Poll::Ready(r) => {
|
|
|
|
// If js ended because we are terminating, just return Ok
|
2021-11-29 07:37:44 -05:00
|
|
|
if self.internal_handle.terminate_if_needed() {
|
2020-12-06 22:30:40 -05:00
|
|
|
return Poll::Ready(Ok(()));
|
2020-11-26 09:17:45 -05:00
|
|
|
}
|
2020-12-06 22:30:40 -05:00
|
|
|
|
|
|
|
if let Err(e) = r {
|
2021-10-01 05:30:55 -04:00
|
|
|
return Poll::Ready(Err(e));
|
2020-11-26 09:17:45 -05:00
|
|
|
}
|
2020-12-06 22:30:40 -05:00
|
|
|
|
2021-05-11 15:09:09 -04:00
|
|
|
panic!(
|
|
|
|
"coding error: either js is polling or the worker is terminated"
|
|
|
|
);
|
2020-11-26 09:17:45 -05:00
|
|
|
}
|
2021-05-11 15:09:09 -04:00
|
|
|
Poll::Pending => Poll::Pending,
|
2020-11-26 09:17:45 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-05-26 15:07:12 -04:00
|
|
|
pub async fn run_event_loop(
|
|
|
|
&mut self,
|
|
|
|
wait_for_inspector: bool,
|
|
|
|
) -> Result<(), AnyError> {
|
|
|
|
poll_fn(|cx| self.poll_event_loop(cx, wait_for_inspector)).await
|
2020-11-26 09:17:45 -05:00
|
|
|
}
|
2022-02-11 07:41:56 -05:00
|
|
|
|
|
|
|
// Starts polling for messages from worker host from JavaScript.
|
|
|
|
fn start_polling_for_messages(&mut self) {
|
|
|
|
let poll_for_messages_fn = self.poll_for_messages_fn.take().unwrap();
|
|
|
|
let scope = &mut self.js_runtime.handle_scope();
|
|
|
|
let poll_for_messages =
|
|
|
|
v8::Local::<v8::Value>::new(scope, poll_for_messages_fn);
|
|
|
|
let fn_ = v8::Local::<v8::Function>::try_from(poll_for_messages).unwrap();
|
|
|
|
let undefined = v8::undefined(scope);
|
|
|
|
fn_.call(scope, undefined.into(), &[]).unwrap();
|
|
|
|
}
|
2020-11-26 09:17:45 -05:00
|
|
|
}
|
|
|
|
|
2020-12-06 22:30:40 -05:00
|
|
|
fn print_worker_error(error_str: String, name: &str) {
|
|
|
|
eprintln!(
|
|
|
|
"{}: Uncaught (in worker \"{}\") {}",
|
|
|
|
colors::red_bold("error"),
|
|
|
|
name,
|
|
|
|
error_str.trim_start_matches("Uncaught "),
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
/// This function should be called from a thread dedicated to this worker.
|
|
|
|
// TODO(bartlomieju): check if order of actions is aligned to Worker spec
|
|
|
|
pub fn run_web_worker(
|
2022-02-11 07:41:56 -05:00
|
|
|
worker: WebWorker,
|
2020-12-06 22:30:40 -05:00
|
|
|
specifier: ModuleSpecifier,
|
|
|
|
maybe_source_code: Option<String>,
|
2022-02-11 07:41:56 -05:00
|
|
|
preload_module_cb: Arc<ops::worker_host::PreloadModuleCb>,
|
2020-12-06 22:30:40 -05:00
|
|
|
) -> Result<(), AnyError> {
|
|
|
|
let name = worker.name.to_string();
|
|
|
|
|
|
|
|
// TODO(bartlomieju): run following block using "select!"
|
|
|
|
// with terminate
|
|
|
|
|
2021-08-18 09:19:22 -04:00
|
|
|
let fut = async move {
|
2022-02-11 07:41:56 -05:00
|
|
|
let internal_handle = worker.internal_handle.clone();
|
|
|
|
let result = (preload_module_cb)(worker).await;
|
|
|
|
|
|
|
|
let mut worker = match result {
|
|
|
|
Ok(worker) => worker,
|
|
|
|
Err(e) => {
|
|
|
|
print_worker_error(e.to_string(), &name);
|
|
|
|
internal_handle
|
|
|
|
.post_event(WorkerControlEvent::TerminalError(e))
|
|
|
|
.expect("Failed to post message to host");
|
|
|
|
|
|
|
|
// Failure to execute script is a terminal error, bye, bye.
|
|
|
|
return Ok(());
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2021-08-18 09:19:22 -04:00
|
|
|
// Execute provided source code immediately
|
|
|
|
let result = if let Some(source_code) = maybe_source_code {
|
2022-02-11 07:41:56 -05:00
|
|
|
let r = worker.execute_script(&located_script_name!(), &source_code);
|
|
|
|
worker.start_polling_for_messages();
|
|
|
|
r
|
2021-08-18 09:19:22 -04:00
|
|
|
} else {
|
|
|
|
// TODO(bartlomieju): add "type": "classic", ie. ability to load
|
|
|
|
// script instead of module
|
2022-02-11 07:41:56 -05:00
|
|
|
match worker.preload_module(&specifier, true).await {
|
|
|
|
Ok(id) => {
|
|
|
|
worker.start_polling_for_messages();
|
|
|
|
worker.execute_main_module(id).await
|
|
|
|
}
|
|
|
|
Err(e) => Err(e),
|
|
|
|
}
|
2021-08-18 09:19:22 -04:00
|
|
|
};
|
2020-12-06 22:30:40 -05:00
|
|
|
|
2021-08-18 09:19:22 -04:00
|
|
|
// If sender is closed it means that worker has already been closed from
|
|
|
|
// within using "globalThis.close()"
|
|
|
|
if internal_handle.is_terminated() {
|
|
|
|
return Ok(());
|
|
|
|
}
|
2020-12-06 22:30:40 -05:00
|
|
|
|
2021-10-01 05:30:55 -04:00
|
|
|
let result = if result.is_ok() {
|
|
|
|
worker.run_event_loop(true).await
|
|
|
|
} else {
|
|
|
|
result
|
|
|
|
};
|
|
|
|
|
2021-08-18 09:19:22 -04:00
|
|
|
if let Err(e) = result {
|
|
|
|
print_worker_error(e.to_string(), &name);
|
|
|
|
internal_handle
|
|
|
|
.post_event(WorkerControlEvent::TerminalError(e))
|
|
|
|
.expect("Failed to post message to host");
|
2020-12-06 22:30:40 -05:00
|
|
|
|
2021-08-18 09:19:22 -04:00
|
|
|
// Failure to execute script is a terminal error, bye, bye.
|
|
|
|
return Ok(());
|
|
|
|
}
|
2020-12-06 22:30:40 -05:00
|
|
|
|
2021-08-18 09:19:22 -04:00
|
|
|
debug!("Worker thread shuts down {}", &name);
|
|
|
|
result
|
|
|
|
};
|
2021-10-21 07:05:43 -04:00
|
|
|
run_basic(fut)
|
2020-12-06 22:30:40 -05:00
|
|
|
}
|