2023-01-02 16:00:42 -05:00
// Copyright 2018-2023 the Deno authors. All rights reserved. MIT license.
2020-09-05 20:34:02 -04:00
2019-09-02 17:07:11 -04:00
use std ::env ;
use std ::path ::PathBuf ;
2022-11-21 08:36:26 -05:00
use deno_core ::snapshot_util ::* ;
2023-02-08 16:40:18 -05:00
use deno_core ::ExtensionFileSource ;
2023-06-13 18:36:16 -04:00
use deno_core ::ExtensionFileSourceCode ;
2022-11-21 08:36:26 -05:00
use deno_runtime ::* ;
mod ts {
use super ::* ;
use deno_core ::error ::custom_error ;
use deno_core ::error ::AnyError ;
2023-09-12 07:14:45 -04:00
use deno_core ::op2 ;
2022-11-21 08:36:26 -05:00
use deno_core ::OpState ;
2023-01-24 09:05:54 -05:00
use deno_runtime ::deno_node ::SUPPORTED_BUILTIN_NODE_MODULES ;
2022-11-21 08:36:26 -05:00
use serde ::Deserialize ;
2023-09-11 20:55:57 -04:00
use serde ::Serialize ;
2022-11-21 08:36:26 -05:00
use std ::collections ::HashMap ;
use std ::path ::Path ;
use std ::path ::PathBuf ;
#[ derive(Debug, Deserialize) ]
struct LoadArgs {
/// The fully qualified specifier that should be loaded.
specifier : String ,
2022-07-04 18:12:41 -04:00
}
2023-09-11 20:55:57 -04:00
#[ derive(Debug, Serialize) ]
#[ serde(rename_all = " camelCase " ) ]
struct BuildInfoResponse {
build_specifier : String ,
libs : Vec < String > ,
node_built_in_module_names : Vec < String > ,
}
2023-03-17 14:22:15 -04:00
2023-09-12 07:14:45 -04:00
#[ op2 ]
#[ serde ]
fn op_build_info ( state : & mut OpState ) -> BuildInfoResponse {
2023-09-11 20:55:57 -04:00
let build_specifier = " asset:///bootstrap.ts " . to_string ( ) ;
let build_libs = state
. borrow ::< Vec < & str > > ( )
. iter ( )
. map ( | s | s . to_string ( ) )
. collect ( ) ;
let node_built_in_module_names = SUPPORTED_BUILTIN_NODE_MODULES
. iter ( )
. map ( | s | s . to_string ( ) )
. collect ( ) ;
BuildInfoResponse {
build_specifier ,
libs : build_libs ,
node_built_in_module_names ,
}
2023-03-17 14:22:15 -04:00
}
2023-09-12 07:14:45 -04:00
#[ op2(fast) ]
2023-03-17 14:22:15 -04:00
fn op_is_node_file ( ) -> bool {
false
}
2023-09-11 20:55:57 -04:00
#[ derive(Debug, Deserialize, Serialize) ]
#[ serde(rename_all = " camelCase " ) ]
struct ScriptVersionArgs {
specifier : String ,
}
2023-09-12 07:14:45 -04:00
#[ op2 ]
#[ string ]
2023-03-17 14:22:15 -04:00
fn op_script_version (
_state : & mut OpState ,
2023-09-12 07:14:45 -04:00
#[ serde ] _args : ScriptVersionArgs ,
2023-03-17 14:22:15 -04:00
) -> Result < Option < String > , AnyError > {
Ok ( Some ( " 1 " . to_string ( ) ) )
}
2023-09-11 20:55:57 -04:00
#[ derive(Debug, Serialize) ]
#[ serde(rename_all = " camelCase " ) ]
struct LoadResponse {
data : String ,
version : String ,
script_kind : i32 ,
}
2023-09-12 07:14:45 -04:00
#[ op2 ]
#[ serde ]
2023-03-17 14:22:15 -04:00
// using the same op that is used in `tsc.rs` for loading modules and reading
// files, but a slightly different implementation at build time.
2023-09-11 20:55:57 -04:00
fn op_load (
state : & mut OpState ,
2023-09-12 07:14:45 -04:00
#[ serde ] args : LoadArgs ,
2023-09-11 20:55:57 -04:00
) -> Result < LoadResponse , AnyError > {
2023-03-17 14:22:15 -04:00
let op_crate_libs = state . borrow ::< HashMap < & str , PathBuf > > ( ) ;
let path_dts = state . borrow ::< PathBuf > ( ) ;
2023-04-12 21:08:01 -04:00
let re_asset = lazy_regex ::regex! ( r "asset:/{3}lib\.(\S+)\.d\.ts" ) ;
2023-03-17 14:22:15 -04:00
let build_specifier = " asset:///bootstrap.ts " ;
// we need a basic file to send to tsc to warm it up.
if args . specifier = = build_specifier {
2023-09-11 20:55:57 -04:00
Ok ( LoadResponse {
data : r #" Deno.writeTextFile( " hello . txt " , " hello deno ! " ); " #. to_string ( ) ,
version : " 1 " . to_string ( ) ,
2023-03-17 14:22:15 -04:00
// this corresponds to `ts.ScriptKind.TypeScript`
2023-09-11 20:55:57 -04:00
script_kind : 3 ,
} )
2023-03-17 14:22:15 -04:00
// specifiers come across as `asset:///lib.{lib_name}.d.ts` and we need to
// parse out just the name so we can lookup the asset.
} else if let Some ( caps ) = re_asset . captures ( & args . specifier ) {
if let Some ( lib ) = caps . get ( 1 ) . map ( | m | m . as_str ( ) ) {
// if it comes from an op crate, we were supplied with the path to the
// file.
let path = if let Some ( op_crate_lib ) = op_crate_libs . get ( lib ) {
PathBuf ::from ( op_crate_lib ) . canonicalize ( ) ?
// otherwise we will generate the path ourself
} else {
path_dts . join ( format! ( " lib. {lib} .d.ts " ) )
} ;
let data = std ::fs ::read_to_string ( path ) ? ;
2023-09-11 20:55:57 -04:00
Ok ( LoadResponse {
data ,
version : " 1 " . to_string ( ) ,
2023-03-17 14:22:15 -04:00
// this corresponds to `ts.ScriptKind.TypeScript`
2023-09-11 20:55:57 -04:00
script_kind : 3 ,
} )
2023-03-17 14:22:15 -04:00
} else {
Err ( custom_error (
" InvalidSpecifier " ,
format! ( " An invalid specifier was requested: {} " , args . specifier ) ,
) )
}
} else {
Err ( custom_error (
" InvalidSpecifier " ,
format! ( " An invalid specifier was requested: {} " , args . specifier ) ,
) )
}
}
deno_core ::extension! ( deno_tsc ,
ops = [ op_build_info , op_is_node_file , op_load , op_script_version ] ,
js = [
dir " tsc " ,
" 00_typescript.js " ,
" 99_main_compiler.js " ,
] ,
2023-03-17 18:15:27 -04:00
options = {
2023-03-17 14:22:15 -04:00
op_crate_libs : HashMap < & 'static str , PathBuf > ,
build_libs : Vec < & 'static str > ,
path_dts : PathBuf ,
} ,
2023-03-17 18:15:27 -04:00
state = | state , options | {
state . put ( options . op_crate_libs ) ;
state . put ( options . build_libs ) ;
state . put ( options . path_dts ) ;
2023-03-17 14:22:15 -04:00
} ,
) ;
2023-02-08 16:40:18 -05:00
pub fn create_compiler_snapshot ( snapshot_path : PathBuf , cwd : & Path ) {
2022-11-21 08:36:26 -05:00
// libs that are being provided by op crates.
let mut op_crate_libs = HashMap ::new ( ) ;
op_crate_libs . insert ( " deno.cache " , deno_cache ::get_declaration ( ) ) ;
op_crate_libs . insert ( " deno.console " , deno_console ::get_declaration ( ) ) ;
op_crate_libs . insert ( " deno.url " , deno_url ::get_declaration ( ) ) ;
op_crate_libs . insert ( " deno.web " , deno_web ::get_declaration ( ) ) ;
op_crate_libs . insert ( " deno.fetch " , deno_fetch ::get_declaration ( ) ) ;
op_crate_libs . insert ( " deno.websocket " , deno_websocket ::get_declaration ( ) ) ;
op_crate_libs . insert ( " deno.webstorage " , deno_webstorage ::get_declaration ( ) ) ;
op_crate_libs . insert ( " deno.crypto " , deno_crypto ::get_declaration ( ) ) ;
op_crate_libs . insert (
" deno.broadcast_channel " ,
deno_broadcast_channel ::get_declaration ( ) ,
2022-07-04 18:12:41 -04:00
) ;
2022-11-21 08:36:26 -05:00
op_crate_libs . insert ( " deno.net " , deno_net ::get_declaration ( ) ) ;
2022-07-04 18:12:41 -04:00
2022-11-21 08:36:26 -05:00
// ensure we invalidate the build properly.
for ( _ , path ) in op_crate_libs . iter ( ) {
println! ( " cargo:rerun-if-changed= {} " , path . display ( ) ) ;
}
2022-07-04 18:12:41 -04:00
2022-11-21 08:36:26 -05:00
// libs that should be loaded into the isolate before snapshotting.
let libs = vec! [
// Deno custom type libraries
" deno.window " ,
" deno.worker " ,
" deno.shared_globals " ,
" deno.ns " ,
" deno.unstable " ,
// Deno built-in type libraries
2023-03-21 11:46:40 -04:00
" decorators " ,
" decorators.legacy " ,
2022-11-21 08:36:26 -05:00
" es5 " ,
" es2015.collection " ,
" es2015.core " ,
" es2015 " ,
" es2015.generator " ,
" es2015.iterable " ,
" es2015.promise " ,
" es2015.proxy " ,
" es2015.reflect " ,
" es2015.symbol " ,
" es2015.symbol.wellknown " ,
" es2016.array.include " ,
" es2016 " ,
" es2017 " ,
2023-09-09 15:03:21 -04:00
" es2017.date " ,
2022-11-21 08:36:26 -05:00
" es2017.intl " ,
" es2017.object " ,
" es2017.sharedmemory " ,
" es2017.string " ,
" es2017.typedarrays " ,
" es2018.asyncgenerator " ,
" es2018.asynciterable " ,
" es2018 " ,
" es2018.intl " ,
" es2018.promise " ,
" es2018.regexp " ,
" es2019.array " ,
" es2019 " ,
2023-01-14 09:36:19 -05:00
" es2019.intl " ,
2022-11-21 08:36:26 -05:00
" es2019.object " ,
" es2019.string " ,
" es2019.symbol " ,
" es2020.bigint " ,
" es2020 " ,
" es2020.date " ,
" es2020.intl " ,
" es2020.number " ,
" es2020.promise " ,
" es2020.sharedmemory " ,
" es2020.string " ,
" es2020.symbol.wellknown " ,
" es2021 " ,
" es2021.intl " ,
" es2021.promise " ,
" es2021.string " ,
" es2021.weakref " ,
" es2022 " ,
" es2022.array " ,
" es2022.error " ,
" es2022.intl " ,
" es2022.object " ,
2023-03-21 11:46:40 -04:00
" es2022.regexp " ,
2023-01-14 09:36:19 -05:00
" es2022.sharedmemory " ,
2022-11-21 08:36:26 -05:00
" es2022.string " ,
2023-03-21 11:46:40 -04:00
" es2023 " ,
" es2023.array " ,
2023-09-09 15:03:21 -04:00
" es2023.collection " ,
2022-11-21 08:36:26 -05:00
" esnext " ,
" esnext.array " ,
2023-09-09 15:03:21 -04:00
" esnext.decorators " ,
" esnext.disposable " ,
2022-11-21 08:36:26 -05:00
" esnext.intl " ,
2023-11-01 19:18:41 -04:00
" esnext.object " ,
2022-11-21 08:36:26 -05:00
] ;
2022-11-25 18:29:48 -05:00
let path_dts = cwd . join ( " tsc/dts " ) ;
2022-11-21 08:36:26 -05:00
// ensure we invalidate the build properly.
for name in libs . iter ( ) {
println! (
" cargo:rerun-if-changed={} " ,
2023-01-27 10:43:16 -05:00
path_dts . join ( format! ( " lib. {name} .d.ts " ) ) . display ( )
2022-11-21 08:36:26 -05:00
) ;
}
2022-07-04 18:12:41 -04:00
2022-11-21 08:36:26 -05:00
// create a copy of the vector that includes any op crate libs to be passed
// to the JavaScript compiler to build into the snapshot
let mut build_libs = libs . clone ( ) ;
for ( op_lib , _ ) in op_crate_libs . iter ( ) {
build_libs . push ( op_lib . to_owned ( ) ) ;
}
2022-07-04 18:12:41 -04:00
2023-01-14 09:36:19 -05:00
// used in the tests to verify that after snapshotting it has the same number
// of lib files loaded and hasn't included any ones lazily loaded from Rust
std ::fs ::write (
PathBuf ::from ( env ::var_os ( " OUT_DIR " ) . unwrap ( ) )
. join ( " lib_file_names.json " ) ,
serde_json ::to_string ( & build_libs ) . unwrap ( ) ,
)
. unwrap ( ) ;
2023-06-13 18:36:16 -04:00
let output = create_snapshot ( CreateSnapshotOptions {
2022-11-21 08:36:26 -05:00
cargo_manifest_dir : env ! ( " CARGO_MANIFEST_DIR " ) ,
snapshot_path ,
startup_snapshot : None ,
2023-06-26 07:54:10 -04:00
extensions : vec ! [ deno_tsc ::init_ops_and_esm (
op_crate_libs ,
build_libs ,
path_dts ,
) ] ,
2023-03-21 15:11:22 -04:00
// NOTE(bartlomieju): Compressing the TSC snapshot in debug build took
// ~45s on M1 MacBook Pro; without compression it took ~1s.
// Thus we're not not using compressed snapshot, trading off
// a lot of build time for some startup time in debug build.
#[ cfg(debug_assertions) ]
2023-02-13 20:46:32 -05:00
compression_cb : None ,
2023-03-21 15:11:22 -04:00
#[ cfg(not(debug_assertions)) ]
compression_cb : Some ( Box ::new ( | vec , snapshot_slice | {
eprintln! ( " Compressing TSC snapshot... " ) ;
vec . extend_from_slice (
& zstd ::bulk ::compress ( snapshot_slice , 22 )
. expect ( " snapshot compression failed " ) ,
) ;
} ) ) ,
2023-07-23 09:42:41 -04:00
with_runtime_cb : None ,
2023-11-06 20:03:48 -05:00
skip_op_registration : false ,
2022-11-21 08:36:26 -05:00
} ) ;
2023-06-13 18:36:16 -04:00
for path in output . files_loaded_during_snapshot {
println! ( " cargo:rerun-if-changed= {} " , path . display ( ) ) ;
}
2022-07-04 18:12:41 -04:00
}
2022-11-21 08:36:26 -05:00
pub ( crate ) fn version ( ) -> String {
2022-12-07 12:59:59 -05:00
let file_text = std ::fs ::read_to_string ( " tsc/00_typescript.js " ) . unwrap ( ) ;
2023-03-21 11:46:40 -04:00
let version_text = " version = \" " ;
2022-12-07 12:59:59 -05:00
for line in file_text . lines ( ) {
2023-03-21 11:46:40 -04:00
if let Some ( index ) = line . find ( version_text ) {
2022-12-07 12:59:59 -05:00
let remaining_line = & line [ index + version_text . len ( ) .. ] ;
2023-03-21 11:46:40 -04:00
return remaining_line [ .. remaining_line . find ( '"' ) . unwrap ( ) ] . to_string ( ) ;
2022-12-07 12:59:59 -05:00
}
}
panic! ( " Could not find ts version. " )
2022-11-21 08:36:26 -05:00
}
2022-07-04 18:12:41 -04:00
}
2023-08-05 19:47:15 -04:00
// Duplicated in `ops/mod.rs`. Keep in sync!
2023-03-17 14:22:15 -04:00
deno_core ::extension! (
cli ,
2023-08-05 19:47:15 -04:00
deps = [ runtime ] ,
2023-05-09 06:37:13 -04:00
esm_entry_point = " ext:cli/99_main.js " ,
2023-03-17 14:22:15 -04:00
esm = [
dir " js " ,
2023-05-09 06:37:13 -04:00
" 99_main.js "
2023-03-17 14:22:15 -04:00
] ,
2023-07-31 14:19:15 -04:00
customizer = | ext : & mut deno_core ::Extension | {
ext . esm_files . to_mut ( ) . push ( ExtensionFileSource {
2023-03-18 16:09:13 -04:00
specifier : " ext:cli/runtime/js/99_main.js " ,
2023-06-26 07:54:10 -04:00
code : ExtensionFileSourceCode ::LoadedFromFsDuringSnapshot (
2023-07-31 14:19:15 -04:00
deno_runtime ::js ::PATH_FOR_99_MAIN_JS ,
2023-06-13 18:36:16 -04:00
) ,
2023-07-31 14:19:15 -04:00
} ) ;
2023-03-17 14:22:15 -04:00
}
) ;
2023-08-05 19:47:15 -04:00
#[ cfg(not(feature = " __runtime_js_sources " )) ]
2023-06-13 18:36:16 -04:00
#[ must_use = " The files listed by create_cli_snapshot should be printed as 'cargo:rerun-if-changed' lines " ]
fn create_cli_snapshot ( snapshot_path : PathBuf ) -> CreateSnapshotOutput {
2023-08-05 19:47:15 -04:00
use deno_core ::Extension ;
use deno_runtime ::deno_cache ::SqliteBackedCache ;
2023-11-01 14:57:55 -04:00
use deno_runtime ::deno_cron ::local ::LocalCronHandler ;
2023-08-05 19:47:15 -04:00
use deno_runtime ::deno_http ::DefaultHttpPropertyExtractor ;
use deno_runtime ::deno_kv ::sqlite ::SqliteDbHandler ;
2023-11-15 07:25:55 -05:00
use deno_runtime ::ops ::bootstrap ::SnapshotOptions ;
2023-08-05 19:47:15 -04:00
use deno_runtime ::permissions ::PermissionsContainer ;
use std ::sync ::Arc ;
2023-11-15 14:24:13 -05:00
// NOTE(bartlomieju): keep in sync with `cli/version.rs`.
// Ideally we could deduplicate that code.
2023-11-15 07:25:55 -05:00
fn deno_version ( ) -> String {
if env ::var ( " DENO_CANARY " ) . is_ok ( ) {
2023-11-27 10:32:12 -05:00
format! ( " {} + {} " , env! ( " CARGO_PKG_VERSION " ) , & git_commit_hash ( ) [ .. 7 ] )
2023-11-15 07:25:55 -05:00
} else {
env! ( " CARGO_PKG_VERSION " ) . to_string ( )
}
}
2023-03-16 13:36:53 -04:00
// NOTE(bartlomieju): ordering is important here, keep it in sync with
// `runtime/worker.rs`, `runtime/web_worker.rs` and `runtime/build.rs`!
2023-05-05 12:44:24 -04:00
let fs = Arc ::new ( deno_fs ::RealFs ) ;
2023-03-17 14:22:15 -04:00
let extensions : Vec < Extension > = vec! [
2023-06-26 07:54:10 -04:00
deno_webidl ::deno_webidl ::init_ops ( ) ,
deno_console ::deno_console ::init_ops ( ) ,
deno_url ::deno_url ::init_ops ( ) ,
deno_web ::deno_web ::init_ops ::< PermissionsContainer > (
2023-07-01 18:52:30 -04:00
Default ::default ( ) ,
2022-11-21 08:36:26 -05:00
Default ::default ( ) ,
) ,
2023-06-26 07:54:10 -04:00
deno_fetch ::deno_fetch ::init_ops ::< PermissionsContainer > ( Default ::default ( ) ) ,
deno_cache ::deno_cache ::init_ops ::< SqliteBackedCache > ( None ) ,
deno_websocket ::deno_websocket ::init_ops ::< PermissionsContainer > (
2023-03-17 14:22:15 -04:00
" " . to_owned ( ) ,
None ,
None ,
) ,
2023-06-26 07:54:10 -04:00
deno_webstorage ::deno_webstorage ::init_ops ( None ) ,
deno_crypto ::deno_crypto ::init_ops ( None ) ,
deno_broadcast_channel ::deno_broadcast_channel ::init_ops (
2022-11-21 08:36:26 -05:00
deno_broadcast_channel ::InMemoryBroadcastChannel ::default ( ) ,
) ,
2023-10-04 15:42:17 -04:00
deno_ffi ::deno_ffi ::init_ops ::< PermissionsContainer > ( ) ,
deno_net ::deno_net ::init_ops ::< PermissionsContainer > ( None , None ) ,
2023-06-26 07:54:10 -04:00
deno_tls ::deno_tls ::init_ops ( ) ,
2023-10-04 15:42:17 -04:00
deno_kv ::deno_kv ::init_ops ( SqliteDbHandler ::< PermissionsContainer > ::new (
2023-10-31 07:13:57 -04:00
None , None ,
2023-10-04 15:42:17 -04:00
) ) ,
2023-11-01 14:57:55 -04:00
deno_cron ::deno_cron ::init_ops ( LocalCronHandler ::new ( ) ) ,
2023-06-26 07:54:10 -04:00
deno_napi ::deno_napi ::init_ops ::< PermissionsContainer > ( ) ,
deno_http ::deno_http ::init_ops ::< DefaultHttpPropertyExtractor > ( ) ,
deno_io ::deno_io ::init_ops ( Default ::default ( ) ) ,
2023-10-04 15:42:17 -04:00
deno_fs ::deno_fs ::init_ops ::< PermissionsContainer > ( fs . clone ( ) ) ,
2023-06-26 07:54:10 -04:00
deno_node ::deno_node ::init_ops ::< PermissionsContainer > ( None , fs ) ,
2023-08-05 19:47:15 -04:00
deno_runtime ::runtime ::init_ops ( ) ,
2023-11-11 12:01:48 -05:00
deno_runtime ::ops ::runtime ::deno_runtime ::init_ops (
" deno:runtime " . parse ( ) . unwrap ( ) ,
) ,
deno_runtime ::ops ::worker_host ::deno_worker_host ::init_ops (
Arc ::new ( | _ | unreachable! ( " not used in snapshot. " ) ) ,
None ,
) ,
deno_runtime ::ops ::fs_events ::deno_fs_events ::init_ops ( ) ,
deno_runtime ::ops ::os ::deno_os ::init_ops ( Default ::default ( ) ) ,
deno_runtime ::ops ::permissions ::deno_permissions ::init_ops ( ) ,
deno_runtime ::ops ::process ::deno_process ::init_ops ( ) ,
deno_runtime ::ops ::signal ::deno_signal ::init_ops ( ) ,
deno_runtime ::ops ::tty ::deno_tty ::init_ops ( ) ,
deno_runtime ::ops ::http ::deno_http_runtime ::init_ops ( ) ,
2023-11-15 07:25:55 -05:00
deno_runtime ::ops ::bootstrap ::deno_bootstrap ::init_ops ( Some (
SnapshotOptions {
deno_version : deno_version ( ) ,
ts_version : ts ::version ( ) ,
v8_version : deno_core ::v8_version ( ) ,
target : std ::env ::var ( " TARGET " ) . unwrap ( ) ,
} ,
) ) ,
2023-06-26 07:54:10 -04:00
cli ::init_ops_and_esm ( ) , // NOTE: This needs to be init_ops_and_esm!
2022-11-21 08:36:26 -05:00
] ;
create_snapshot ( CreateSnapshotOptions {
cargo_manifest_dir : env ! ( " CARGO_MANIFEST_DIR " ) ,
snapshot_path ,
2023-08-05 19:47:15 -04:00
startup_snapshot : deno_runtime ::js ::deno_isolate_init ( ) ,
2022-11-21 08:36:26 -05:00
extensions ,
2023-03-16 23:19:46 -04:00
compression_cb : None ,
2023-07-23 09:42:41 -04:00
with_runtime_cb : None ,
2023-11-06 20:03:48 -05:00
skip_op_registration : false ,
2022-11-21 08:36:26 -05:00
} )
2022-07-04 18:12:41 -04:00
}
fn git_commit_hash ( ) -> String {
if let Ok ( output ) = std ::process ::Command ::new ( " git " )
. arg ( " rev-list " )
. arg ( " -1 " )
. arg ( " HEAD " )
. output ( )
{
if output . status . success ( ) {
std ::str ::from_utf8 ( & output . stdout [ .. 40 ] )
. unwrap ( )
. to_string ( )
} else {
// When not in git repository
// (e.g. when the user install by `cargo install deno`)
" UNKNOWN " . to_string ( )
}
} else {
// When there is no git command for some reason
" UNKNOWN " . to_string ( )
}
}
2020-07-19 13:49:44 -04:00
fn main ( ) {
2020-12-14 09:15:16 -05:00
// Skip building from docs.rs.
if env ::var_os ( " DOCS_RS " ) . is_some ( ) {
2020-07-19 13:49:44 -04:00
return ;
}
2022-03-16 09:47:15 -04:00
// Host snapshots won't work when cross compiling.
let target = env ::var ( " TARGET " ) . unwrap ( ) ;
let host = env ::var ( " HOST " ) . unwrap ( ) ;
2023-09-17 12:06:51 -04:00
let skip_cross_check =
env ::var ( " DENO_SKIP_CROSS_BUILD_CHECK " ) . map_or ( false , | v | v = = " 1 " ) ;
if ! skip_cross_check & & target ! = host {
2022-03-16 09:47:15 -04:00
panic! ( " Cross compiling with snapshot is not supported. " ) ;
}
2022-10-05 10:06:44 -04:00
2022-11-25 18:49:02 -05:00
let symbols_path = std ::path ::Path ::new ( " napi " ) . join (
2022-10-18 07:20:11 -04:00
format! ( " generated_symbol_exports_list_ {} .def " , env ::consts ::OS ) . as_str ( ) ,
2022-10-15 11:21:04 -04:00
)
. canonicalize ( )
. expect (
" Missing symbols list! Generate using tools/napi/generate_symbols_lists.js " ,
) ;
2022-10-05 10:06:44 -04:00
#[ cfg(target_os = " windows " ) ]
println! (
" cargo:rustc-link-arg-bin=deno=/DEF:{} " ,
2022-10-15 11:21:04 -04:00
symbols_path . display ( )
) ;
#[ cfg(target_os = " macos " ) ]
println! (
" cargo:rustc-link-arg-bin=deno=-Wl,-exported_symbols_list,{} " ,
symbols_path . display ( )
2022-10-05 10:06:44 -04:00
) ;
2022-10-15 11:21:04 -04:00
#[ cfg(target_os = " linux " ) ]
2022-10-06 11:50:00 -04:00
{
fix(build) assume a custom compiler will support --export-dynamic-symbol-list linker flag. (#16387)
This PR fixes a regression that caused deno binaries produced by the CI
release workflows to be larger than expected.
**The problem:** The build script will determine whether the linker
supports the `--export-dynamic-symbol-list` flag by looking at the glibc
version installed on the system. Ubuntu 20.04 ships with glibc 2.31,
which does not support this flag. Upon investigation, I discovered that
the CI pipeline does not use the gcc compiler provided by the
`build-essential` package, and instead uses *clang-14*, which does
support the new flag.
**The solution:** Whenever a custom C Compiler is configured, the build
script now assumes the compiler supports the
`--export-dynamic-symbol-list` flag. This is not always going to be the
case (you could use clang-8, for example), but it puts the onus on the
user making the override to ensure the compiler has support.
This will return deno builds for Linux to their previous size of ~100MB,
and also allow builds under older glibc/gcc versions to succeed. If a
user is compiling deno with a custom compiler that does not support this
new flag, however, their build will fail. I expect this is a rare
scenario, however, and suggest we cross that bridge if and when we come
to it.
2022-10-22 17:41:11 -04:00
// If a custom compiler is set, the glibc version is not reliable.
// Here, we assume that if a custom compiler is used, that it will be modern enough to support a dynamic symbol list.
2023-07-23 19:19:24 -04:00
if env ::var ( " CC " ) . is_err ( )
& & glibc_version ::get_version ( )
. map ( | ver | ver . major < = 2 & & ver . minor < 35 )
. unwrap_or ( false )
{
2022-10-15 11:21:04 -04:00
println! ( " cargo:warning=Compiling with all symbols exported, this will result in a larger binary. Please use glibc 2.35 or later for an optimised build. " ) ;
println! ( " cargo:rustc-link-arg-bin=deno=-rdynamic " ) ;
} else {
2022-10-06 11:50:00 -04:00
println! (
2022-10-15 11:21:04 -04:00
" cargo:rustc-link-arg-bin=deno=-Wl,--export-dynamic-symbol-list={} " ,
symbols_path . display ( )
2022-10-06 11:50:00 -04:00
) ;
}
}
2022-10-05 10:06:44 -04:00
2022-07-04 18:12:41 -04:00
// To debug snapshot issues uncomment:
// op_fetch_asset::trace_serializer();
2020-07-19 13:49:44 -04:00
2021-07-20 13:52:09 -04:00
if let Ok ( c ) = env ::var ( " DENO_CANARY " ) {
2023-01-27 10:43:16 -05:00
println! ( " cargo:rustc-env=DENO_CANARY= {c} " ) ;
2021-07-20 13:52:09 -04:00
}
println! ( " cargo:rerun-if-env-changed=DENO_CANARY " ) ;
2022-03-16 20:25:44 -04:00
2020-11-02 12:40:33 -05:00
println! ( " cargo:rustc-env=GIT_COMMIT_HASH= {} " , git_commit_hash ( ) ) ;
2021-07-20 13:52:09 -04:00
println! ( " cargo:rerun-if-env-changed=GIT_COMMIT_HASH " ) ;
2023-03-23 18:27:58 -04:00
println! (
" cargo:rustc-env=GIT_COMMIT_HASH_SHORT={} " ,
& git_commit_hash ( ) [ .. 7 ]
) ;
2021-07-20 13:52:09 -04:00
2023-03-21 11:46:40 -04:00
let ts_version = ts ::version ( ) ;
2023-09-09 15:03:21 -04:00
debug_assert_eq! ( ts_version , " 5.2.2 " ) ; // bump this assertion when it changes
2023-03-21 11:46:40 -04:00
println! ( " cargo:rustc-env=TS_VERSION= {} " , ts_version ) ;
2021-07-20 13:52:09 -04:00
println! ( " cargo:rerun-if-env-changed=TS_VERSION " ) ;
2022-07-04 18:12:41 -04:00
println! ( " cargo:rustc-env=TARGET= {} " , env ::var ( " TARGET " ) . unwrap ( ) ) ;
println! ( " cargo:rustc-env=PROFILE= {} " , env ::var ( " PROFILE " ) . unwrap ( ) ) ;
let c = PathBuf ::from ( env ::var_os ( " CARGO_MANIFEST_DIR " ) . unwrap ( ) ) ;
let o = PathBuf ::from ( env ::var_os ( " OUT_DIR " ) . unwrap ( ) ) ;
let compiler_snapshot_path = o . join ( " COMPILER_SNAPSHOT.bin " ) ;
2023-02-08 16:40:18 -05:00
ts ::create_compiler_snapshot ( compiler_snapshot_path , & c ) ;
2022-07-04 18:12:41 -04:00
2023-08-05 19:47:15 -04:00
#[ cfg(not(feature = " __runtime_js_sources " )) ]
{
let cli_snapshot_path = o . join ( " CLI_SNAPSHOT.bin " ) ;
let output = create_cli_snapshot ( cli_snapshot_path ) ;
for path in output . files_loaded_during_snapshot {
println! ( " cargo:rerun-if-changed= {} " , path . display ( ) )
}
2023-06-13 18:36:16 -04:00
}
2022-07-04 18:12:41 -04:00
2020-07-22 13:19:37 -04:00
#[ cfg(target_os = " windows " ) ]
{
let mut res = winres ::WindowsResource ::new ( ) ;
res . set_icon ( " deno.ico " ) ;
res . set_language ( winapi ::um ::winnt ::MAKELANGID (
winapi ::um ::winnt ::LANG_ENGLISH ,
winapi ::um ::winnt ::SUBLANG_ENGLISH_US ,
) ) ;
res . compile ( ) . unwrap ( ) ;
}
2020-07-22 12:03:46 -04:00
}