2022-01-07 22:09:52 -05:00
|
|
|
// Copyright 2018-2022 the Deno authors. All rights reserved. MIT license.
|
2020-09-05 20:34:02 -04:00
|
|
|
|
2021-02-15 21:50:27 -05:00
|
|
|
use crate::auth_tokens::AuthTokens;
|
2020-02-18 10:08:18 -05:00
|
|
|
use crate::colors;
|
2020-02-19 08:17:13 -05:00
|
|
|
use crate::http_cache::HttpCache;
|
2020-11-05 19:38:21 -05:00
|
|
|
use crate::http_util::fetch_once;
|
2021-12-09 06:16:17 -05:00
|
|
|
use crate::http_util::CacheSemantics;
|
2021-02-15 21:50:27 -05:00
|
|
|
use crate::http_util::FetchOnceArgs;
|
2019-04-25 13:29:21 -04:00
|
|
|
use crate::http_util::FetchOnceResult;
|
2020-08-03 17:39:48 -04:00
|
|
|
use crate::text_encoding;
|
2021-01-07 21:08:51 -05:00
|
|
|
use crate::version::get_user_agent;
|
2021-12-09 06:16:17 -05:00
|
|
|
|
2021-04-23 14:43:13 -04:00
|
|
|
use data_url::DataUrl;
|
2021-09-07 10:39:32 -04:00
|
|
|
use deno_ast::MediaType;
|
2022-01-23 19:27:52 -05:00
|
|
|
use deno_core::anyhow::anyhow;
|
2020-09-14 12:48:57 -04:00
|
|
|
use deno_core::error::custom_error;
|
|
|
|
use deno_core::error::generic_error;
|
|
|
|
use deno_core::error::uri_error;
|
|
|
|
use deno_core::error::AnyError;
|
2020-09-21 12:36:37 -04:00
|
|
|
use deno_core::futures;
|
|
|
|
use deno_core::futures::future::FutureExt;
|
2021-07-06 23:48:01 -04:00
|
|
|
use deno_core::parking_lot::Mutex;
|
2020-01-05 11:56:18 -05:00
|
|
|
use deno_core::ModuleSpecifier;
|
2021-12-01 11:13:11 -05:00
|
|
|
use deno_runtime::deno_fetch::create_http_client;
|
2020-12-13 13:45:53 -05:00
|
|
|
use deno_runtime::deno_fetch::reqwest;
|
2022-01-23 19:27:52 -05:00
|
|
|
use deno_runtime::deno_tls::rustls;
|
2021-12-01 11:13:11 -05:00
|
|
|
use deno_runtime::deno_tls::rustls::RootCertStore;
|
2022-01-23 19:27:52 -05:00
|
|
|
use deno_runtime::deno_tls::rustls_native_certs::load_native_certs;
|
|
|
|
use deno_runtime::deno_tls::rustls_pemfile;
|
|
|
|
use deno_runtime::deno_tls::webpki_roots;
|
2021-07-05 09:34:37 -04:00
|
|
|
use deno_runtime::deno_web::BlobStore;
|
2021-03-26 12:34:25 -04:00
|
|
|
use deno_runtime::permissions::Permissions;
|
|
|
|
use log::debug;
|
2021-04-07 09:22:14 -04:00
|
|
|
use std::borrow::Borrow;
|
2019-07-31 07:58:41 -04:00
|
|
|
use std::collections::HashMap;
|
2021-02-15 21:50:27 -05:00
|
|
|
use std::env;
|
2019-07-31 07:58:41 -04:00
|
|
|
use std::fs;
|
2019-11-16 19:17:47 -05:00
|
|
|
use std::future::Future;
|
2022-01-23 19:27:52 -05:00
|
|
|
use std::io::BufReader;
|
2020-02-19 08:17:13 -05:00
|
|
|
use std::io::Read;
|
2019-07-31 07:58:41 -04:00
|
|
|
use std::path::PathBuf;
|
2019-11-16 19:17:47 -05:00
|
|
|
use std::pin::Pin;
|
2019-07-31 07:58:41 -04:00
|
|
|
use std::sync::Arc;
|
2021-12-09 06:16:17 -05:00
|
|
|
use std::time::SystemTime;
|
2019-07-31 07:58:41 -04:00
|
|
|
|
2021-04-07 09:22:14 -04:00
|
|
|
pub const SUPPORTED_SCHEMES: [&str; 5] =
|
|
|
|
["data", "blob", "file", "http", "https"];
|
2020-11-05 19:38:21 -05:00
|
|
|
|
|
|
|
/// A structure representing a source file.
|
|
|
|
#[derive(Debug, Clone, Eq, PartialEq)]
|
|
|
|
pub struct File {
|
|
|
|
/// The path to the local version of the source file. For local files this
|
|
|
|
/// will be the direct path to that file. For remote files, it will be the
|
|
|
|
/// path to the file in the HTTP cache.
|
|
|
|
pub local: PathBuf,
|
|
|
|
/// For remote files, if there was an `X-TypeScript-Type` header, the parsed
|
|
|
|
/// out value of that header.
|
|
|
|
pub maybe_types: Option<String>,
|
|
|
|
/// The resolved media type for the file.
|
2020-09-15 10:33:14 -04:00
|
|
|
pub media_type: MediaType,
|
2020-11-05 19:38:21 -05:00
|
|
|
/// The source of the file as a string.
|
2022-05-20 16:40:55 -04:00
|
|
|
pub source: Arc<str>,
|
2020-11-05 19:38:21 -05:00
|
|
|
/// The _final_ specifier for the file. The requested specifier and the final
|
|
|
|
/// specifier maybe different for remote files that have been redirected.
|
|
|
|
pub specifier: ModuleSpecifier,
|
2021-09-02 11:38:19 -04:00
|
|
|
|
|
|
|
pub maybe_headers: Option<HashMap<String, String>>,
|
2019-07-31 07:58:41 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
/// Simple struct implementing in-process caching to prevent multiple
|
|
|
|
/// fs reads/net fetches for same file.
|
2021-04-08 21:27:27 -04:00
|
|
|
#[derive(Debug, Clone, Default)]
|
2020-11-05 19:38:21 -05:00
|
|
|
struct FileCache(Arc<Mutex<HashMap<ModuleSpecifier, File>>>);
|
2019-07-31 07:58:41 -04:00
|
|
|
|
2020-11-05 19:38:21 -05:00
|
|
|
impl FileCache {
|
|
|
|
pub fn get(&self, specifier: &ModuleSpecifier) -> Option<File> {
|
2021-07-06 23:48:01 -04:00
|
|
|
let cache = self.0.lock();
|
2020-11-12 17:17:31 -05:00
|
|
|
cache.get(specifier).cloned()
|
2019-07-31 07:58:41 -04:00
|
|
|
}
|
|
|
|
|
2020-11-05 19:38:21 -05:00
|
|
|
pub fn insert(&self, specifier: ModuleSpecifier, file: File) -> Option<File> {
|
2021-07-06 23:48:01 -04:00
|
|
|
let mut cache = self.0.lock();
|
2020-11-05 19:38:21 -05:00
|
|
|
cache.insert(specifier, file)
|
2019-07-31 07:58:41 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-11-05 19:38:21 -05:00
|
|
|
/// Indicates how cached source files should be handled.
|
|
|
|
#[derive(Debug, Clone, Eq, PartialEq)]
|
|
|
|
pub enum CacheSetting {
|
|
|
|
/// Only the cached files should be used. Any files not in the cache will
|
|
|
|
/// error. This is the equivalent of `--cached-only` in the CLI.
|
|
|
|
Only,
|
|
|
|
/// No cached source files should be used, and all files should be reloaded.
|
|
|
|
/// This is the equivalent of `--reload` in the CLI.
|
|
|
|
ReloadAll,
|
|
|
|
/// Only some cached resources should be used. This is the equivalent of
|
|
|
|
/// `--reload=https://deno.land/std` or
|
|
|
|
/// `--reload=https://deno.land/std,https://deno.land/x/example`.
|
|
|
|
ReloadSome(Vec<String>),
|
2021-12-09 06:16:17 -05:00
|
|
|
/// The usability of a cached value is determined by analyzing the cached
|
|
|
|
/// headers and other metadata associated with a cached response, reloading
|
|
|
|
/// any cached "non-fresh" cached responses.
|
|
|
|
RespectHeaders,
|
2020-11-05 19:38:21 -05:00
|
|
|
/// The cached source files should be used for local modules. This is the
|
|
|
|
/// default behavior of the CLI.
|
|
|
|
Use,
|
2019-07-31 07:58:41 -04:00
|
|
|
}
|
|
|
|
|
2020-11-05 19:38:21 -05:00
|
|
|
impl CacheSetting {
|
|
|
|
/// Returns if the cache should be used for a given specifier.
|
2021-12-09 06:16:17 -05:00
|
|
|
pub fn should_use(
|
|
|
|
&self,
|
|
|
|
specifier: &ModuleSpecifier,
|
|
|
|
http_cache: &HttpCache,
|
|
|
|
) -> bool {
|
2020-11-05 19:38:21 -05:00
|
|
|
match self {
|
|
|
|
CacheSetting::ReloadAll => false,
|
|
|
|
CacheSetting::Use | CacheSetting::Only => true,
|
2021-12-09 06:16:17 -05:00
|
|
|
CacheSetting::RespectHeaders => {
|
|
|
|
if let Ok((_, headers, cache_time)) = http_cache.get(specifier) {
|
|
|
|
let cache_semantics =
|
|
|
|
CacheSemantics::new(headers, cache_time, SystemTime::now());
|
|
|
|
cache_semantics.should_use()
|
|
|
|
} else {
|
|
|
|
false
|
|
|
|
}
|
|
|
|
}
|
2020-11-05 19:38:21 -05:00
|
|
|
CacheSetting::ReloadSome(list) => {
|
2021-02-17 13:47:18 -05:00
|
|
|
let mut url = specifier.clone();
|
2020-11-05 19:38:21 -05:00
|
|
|
url.set_fragment(None);
|
|
|
|
if list.contains(&url.as_str().to_string()) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
url.set_query(None);
|
|
|
|
let mut path = PathBuf::from(url.as_str());
|
|
|
|
loop {
|
|
|
|
if list.contains(&path.to_str().unwrap().to_string()) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
if !path.pop() {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
true
|
|
|
|
}
|
2019-07-31 07:58:41 -04:00
|
|
|
}
|
|
|
|
}
|
2020-11-05 19:38:21 -05:00
|
|
|
}
|
2019-07-31 07:58:41 -04:00
|
|
|
|
2020-11-05 19:38:21 -05:00
|
|
|
/// Fetch a source file from the local file system.
|
|
|
|
fn fetch_local(specifier: &ModuleSpecifier) -> Result<File, AnyError> {
|
2021-02-17 13:47:18 -05:00
|
|
|
let local = specifier.to_file_path().map_err(|_| {
|
2020-11-05 19:38:21 -05:00
|
|
|
uri_error(format!("Invalid file path.\n Specifier: {}", specifier))
|
|
|
|
})?;
|
|
|
|
let bytes = fs::read(local.clone())?;
|
|
|
|
let charset = text_encoding::detect_charset(&bytes).to_string();
|
2022-01-16 10:48:32 -05:00
|
|
|
let source = get_source_from_bytes(bytes, Some(charset))?;
|
2020-11-05 19:38:21 -05:00
|
|
|
let media_type = MediaType::from(specifier);
|
|
|
|
|
|
|
|
Ok(File {
|
|
|
|
local,
|
|
|
|
maybe_types: None,
|
|
|
|
media_type,
|
2022-05-20 16:40:55 -04:00
|
|
|
source: source.into(),
|
2020-11-05 19:38:21 -05:00
|
|
|
specifier: specifier.clone(),
|
2021-09-02 11:38:19 -04:00
|
|
|
maybe_headers: None,
|
2020-11-05 19:38:21 -05:00
|
|
|
})
|
|
|
|
}
|
2019-11-22 12:46:57 -05:00
|
|
|
|
2022-01-23 19:27:52 -05:00
|
|
|
/// Create and populate a root cert store based on the passed options and
|
|
|
|
/// environment.
|
2022-03-23 09:54:22 -04:00
|
|
|
pub fn get_root_cert_store(
|
2022-01-23 19:27:52 -05:00
|
|
|
maybe_root_path: Option<PathBuf>,
|
|
|
|
maybe_ca_stores: Option<Vec<String>>,
|
|
|
|
maybe_ca_file: Option<String>,
|
|
|
|
) -> Result<RootCertStore, AnyError> {
|
|
|
|
let mut root_cert_store = RootCertStore::empty();
|
|
|
|
let ca_stores: Vec<String> = maybe_ca_stores
|
|
|
|
.or_else(|| {
|
|
|
|
let env_ca_store = env::var("DENO_TLS_CA_STORE").ok()?;
|
|
|
|
Some(
|
|
|
|
env_ca_store
|
|
|
|
.split(',')
|
|
|
|
.map(|s| s.trim().to_string())
|
|
|
|
.filter(|s| !s.is_empty())
|
|
|
|
.collect(),
|
|
|
|
)
|
|
|
|
})
|
|
|
|
.unwrap_or_else(|| vec!["mozilla".to_string()]);
|
|
|
|
|
|
|
|
for store in ca_stores.iter() {
|
|
|
|
match store.as_str() {
|
|
|
|
"mozilla" => {
|
|
|
|
root_cert_store.add_server_trust_anchors(
|
|
|
|
webpki_roots::TLS_SERVER_ROOTS.0.iter().map(|ta| {
|
|
|
|
rustls::OwnedTrustAnchor::from_subject_spki_name_constraints(
|
|
|
|
ta.subject,
|
|
|
|
ta.spki,
|
|
|
|
ta.name_constraints,
|
|
|
|
)
|
|
|
|
}),
|
|
|
|
);
|
|
|
|
}
|
|
|
|
"system" => {
|
|
|
|
let roots = load_native_certs().expect("could not load platform certs");
|
|
|
|
for root in roots {
|
|
|
|
root_cert_store
|
|
|
|
.add(&rustls::Certificate(root.0))
|
|
|
|
.expect("Failed to add platform cert to root cert store");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
_ => {
|
|
|
|
return Err(anyhow!("Unknown certificate store \"{}\" specified (allowed: \"system,mozilla\")", store));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
let ca_file = maybe_ca_file.or_else(|| env::var("DENO_CERT").ok());
|
|
|
|
if let Some(ca_file) = ca_file {
|
|
|
|
let ca_file = if let Some(root) = &maybe_root_path {
|
|
|
|
root.join(&ca_file)
|
|
|
|
} else {
|
|
|
|
PathBuf::from(ca_file)
|
|
|
|
};
|
|
|
|
let certfile = fs::File::open(&ca_file)?;
|
|
|
|
let mut reader = BufReader::new(certfile);
|
|
|
|
|
|
|
|
match rustls_pemfile::certs(&mut reader) {
|
|
|
|
Ok(certs) => {
|
|
|
|
root_cert_store.add_parsable_certificates(&certs);
|
|
|
|
}
|
|
|
|
Err(e) => {
|
|
|
|
return Err(anyhow!(
|
|
|
|
"Unable to add pem file to certificate store: {}",
|
|
|
|
e
|
|
|
|
));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
Ok(root_cert_store)
|
|
|
|
}
|
|
|
|
|
2021-09-13 00:19:23 -04:00
|
|
|
/// Returns the decoded body and content-type of a provided
|
|
|
|
/// data URL.
|
|
|
|
pub fn get_source_from_data_url(
|
|
|
|
specifier: &ModuleSpecifier,
|
|
|
|
) -> Result<(String, String), AnyError> {
|
|
|
|
let data_url = DataUrl::process(specifier.as_str())
|
|
|
|
.map_err(|e| uri_error(format!("{:?}", e)))?;
|
|
|
|
let mime = data_url.mime_type();
|
|
|
|
let charset = mime.get_parameter("charset").map(|v| v.to_string());
|
|
|
|
let (bytes, _) = data_url
|
|
|
|
.decode_to_vec()
|
|
|
|
.map_err(|e| uri_error(format!("{:?}", e)))?;
|
2022-01-16 10:48:32 -05:00
|
|
|
Ok((get_source_from_bytes(bytes, charset)?, format!("{}", mime)))
|
2021-09-13 00:19:23 -04:00
|
|
|
}
|
|
|
|
|
2020-11-05 19:38:21 -05:00
|
|
|
/// Given a vector of bytes and optionally a charset, decode the bytes to a
|
|
|
|
/// string.
|
2020-12-07 05:46:39 -05:00
|
|
|
pub fn get_source_from_bytes(
|
2020-11-05 19:38:21 -05:00
|
|
|
bytes: Vec<u8>,
|
|
|
|
maybe_charset: Option<String>,
|
|
|
|
) -> Result<String, AnyError> {
|
|
|
|
let source = if let Some(charset) = maybe_charset {
|
|
|
|
text_encoding::convert_to_utf8(&bytes, &charset)?.to_string()
|
|
|
|
} else {
|
|
|
|
String::from_utf8(bytes)?
|
|
|
|
};
|
2019-11-22 12:46:57 -05:00
|
|
|
|
2020-11-05 19:38:21 -05:00
|
|
|
Ok(source)
|
|
|
|
}
|
2020-04-15 23:14:28 -04:00
|
|
|
|
2020-11-05 19:38:21 -05:00
|
|
|
/// Return a validated scheme for a given module specifier.
|
|
|
|
fn get_validated_scheme(
|
|
|
|
specifier: &ModuleSpecifier,
|
|
|
|
) -> Result<String, AnyError> {
|
2021-02-17 13:47:18 -05:00
|
|
|
let scheme = specifier.scheme();
|
2020-11-05 19:38:21 -05:00
|
|
|
if !SUPPORTED_SCHEMES.contains(&scheme) {
|
|
|
|
Err(generic_error(format!(
|
|
|
|
"Unsupported scheme \"{}\" for module \"{}\". Supported schemes: {:#?}",
|
|
|
|
scheme, specifier, SUPPORTED_SCHEMES
|
|
|
|
)))
|
|
|
|
} else {
|
|
|
|
Ok(scheme.to_string())
|
2019-07-31 07:58:41 -04:00
|
|
|
}
|
2020-11-05 19:38:21 -05:00
|
|
|
}
|
2019-07-31 07:58:41 -04:00
|
|
|
|
2020-11-05 19:38:21 -05:00
|
|
|
/// Resolve a media type and optionally the charset from a module specifier and
|
|
|
|
/// the value of a content type header.
|
2020-12-07 05:46:39 -05:00
|
|
|
pub fn map_content_type(
|
2020-11-05 19:38:21 -05:00
|
|
|
specifier: &ModuleSpecifier,
|
|
|
|
maybe_content_type: Option<String>,
|
|
|
|
) -> (MediaType, Option<String>) {
|
|
|
|
if let Some(content_type) = maybe_content_type {
|
|
|
|
let mut content_types = content_type.split(';');
|
|
|
|
let content_type = content_types.next().unwrap();
|
2021-06-02 06:29:58 -04:00
|
|
|
let media_type = MediaType::from_content_type(specifier, content_type);
|
2020-11-05 19:38:21 -05:00
|
|
|
let charset = content_types
|
|
|
|
.map(str::trim)
|
|
|
|
.find_map(|s| s.strip_prefix("charset="))
|
|
|
|
.map(String::from);
|
2020-02-28 09:17:56 -05:00
|
|
|
|
2020-11-05 19:38:21 -05:00
|
|
|
(media_type, charset)
|
|
|
|
} else {
|
|
|
|
(MediaType::from(specifier), None)
|
|
|
|
}
|
|
|
|
}
|
2019-07-31 07:58:41 -04:00
|
|
|
|
2020-11-05 19:38:21 -05:00
|
|
|
/// A structure for resolving, fetching and caching source files.
|
2021-04-08 21:27:27 -04:00
|
|
|
#[derive(Debug, Clone)]
|
2020-11-05 19:38:21 -05:00
|
|
|
pub struct FileFetcher {
|
2021-02-15 21:50:27 -05:00
|
|
|
auth_tokens: AuthTokens,
|
2020-11-05 19:38:21 -05:00
|
|
|
allow_remote: bool,
|
|
|
|
cache: FileCache,
|
|
|
|
cache_setting: CacheSetting,
|
2022-03-23 09:54:22 -04:00
|
|
|
pub http_cache: HttpCache,
|
2020-11-05 19:38:21 -05:00
|
|
|
http_client: reqwest::Client,
|
2021-07-05 09:34:37 -04:00
|
|
|
blob_store: BlobStore,
|
2021-12-15 13:23:43 -05:00
|
|
|
download_log_level: log::Level,
|
2020-11-05 19:38:21 -05:00
|
|
|
}
|
2019-12-03 17:48:53 -05:00
|
|
|
|
2020-11-05 19:38:21 -05:00
|
|
|
impl FileFetcher {
|
|
|
|
pub fn new(
|
|
|
|
http_cache: HttpCache,
|
|
|
|
cache_setting: CacheSetting,
|
|
|
|
allow_remote: bool,
|
2021-08-07 08:49:38 -04:00
|
|
|
root_cert_store: Option<RootCertStore>,
|
2021-07-05 09:34:37 -04:00
|
|
|
blob_store: BlobStore,
|
2021-08-10 07:19:45 -04:00
|
|
|
unsafely_ignore_certificate_errors: Option<Vec<String>>,
|
2020-11-05 19:38:21 -05:00
|
|
|
) -> Result<Self, AnyError> {
|
|
|
|
Ok(Self {
|
2021-11-15 19:59:19 -05:00
|
|
|
auth_tokens: AuthTokens::new(env::var("DENO_AUTH_TOKENS").ok()),
|
2020-11-05 19:38:21 -05:00
|
|
|
allow_remote,
|
2021-02-15 21:50:27 -05:00
|
|
|
cache: Default::default(),
|
2020-11-05 19:38:21 -05:00
|
|
|
cache_setting,
|
|
|
|
http_cache,
|
2021-08-07 08:49:38 -04:00
|
|
|
http_client: create_http_client(
|
|
|
|
get_user_agent(),
|
|
|
|
root_cert_store,
|
2021-09-30 03:26:15 -04:00
|
|
|
vec![],
|
2021-08-07 08:49:38 -04:00
|
|
|
None,
|
2021-08-10 07:19:45 -04:00
|
|
|
unsafely_ignore_certificate_errors,
|
2021-08-25 08:25:12 -04:00
|
|
|
None,
|
2021-08-07 08:49:38 -04:00
|
|
|
)?,
|
2021-07-05 09:34:37 -04:00
|
|
|
blob_store,
|
2021-12-15 13:23:43 -05:00
|
|
|
download_log_level: log::Level::Info,
|
2020-11-05 19:38:21 -05:00
|
|
|
})
|
2019-07-31 07:58:41 -04:00
|
|
|
}
|
|
|
|
|
2021-12-15 13:23:43 -05:00
|
|
|
/// Sets the log level to use when outputting the download message.
|
|
|
|
pub fn set_download_log_level(&mut self, level: log::Level) {
|
|
|
|
self.download_log_level = level;
|
|
|
|
}
|
|
|
|
|
2020-11-05 19:38:21 -05:00
|
|
|
/// Creates a `File` structure for a remote file.
|
|
|
|
fn build_remote_file(
|
2020-05-11 07:13:27 -04:00
|
|
|
&self,
|
2020-11-05 19:38:21 -05:00
|
|
|
specifier: &ModuleSpecifier,
|
|
|
|
bytes: Vec<u8>,
|
|
|
|
headers: &HashMap<String, String>,
|
|
|
|
) -> Result<File, AnyError> {
|
2021-02-17 13:47:18 -05:00
|
|
|
let local =
|
|
|
|
self
|
|
|
|
.http_cache
|
|
|
|
.get_cache_filename(specifier)
|
|
|
|
.ok_or_else(|| {
|
|
|
|
generic_error("Cannot convert specifier to cached filename.")
|
|
|
|
})?;
|
2020-11-05 19:38:21 -05:00
|
|
|
let maybe_content_type = headers.get("content-type").cloned();
|
|
|
|
let (media_type, maybe_charset) =
|
|
|
|
map_content_type(specifier, maybe_content_type);
|
2022-01-16 10:48:32 -05:00
|
|
|
let source = get_source_from_bytes(bytes, maybe_charset)?;
|
2021-05-12 19:07:22 -04:00
|
|
|
let maybe_types = match media_type {
|
2021-11-01 16:22:27 -04:00
|
|
|
MediaType::JavaScript
|
|
|
|
| MediaType::Cjs
|
|
|
|
| MediaType::Mjs
|
|
|
|
| MediaType::Jsx => headers.get("x-typescript-types").cloned(),
|
2021-05-12 19:07:22 -04:00
|
|
|
_ => None,
|
|
|
|
};
|
2020-11-05 19:38:21 -05:00
|
|
|
|
|
|
|
Ok(File {
|
|
|
|
local,
|
|
|
|
maybe_types,
|
2019-07-31 07:58:41 -04:00
|
|
|
media_type,
|
2022-05-20 16:40:55 -04:00
|
|
|
source: source.into(),
|
2020-11-05 19:38:21 -05:00
|
|
|
specifier: specifier.clone(),
|
2021-09-02 11:38:19 -04:00
|
|
|
maybe_headers: Some(headers.clone()),
|
2019-07-31 07:58:41 -04:00
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Fetch cached remote file.
|
|
|
|
///
|
|
|
|
/// This is a recursive operation if source file has redirections.
|
2022-03-23 09:54:22 -04:00
|
|
|
pub fn fetch_cached(
|
2020-01-04 05:20:52 -05:00
|
|
|
&self,
|
2020-11-05 19:38:21 -05:00
|
|
|
specifier: &ModuleSpecifier,
|
2020-06-15 17:46:48 -04:00
|
|
|
redirect_limit: i64,
|
2020-11-05 19:38:21 -05:00
|
|
|
) -> Result<Option<File>, AnyError> {
|
|
|
|
debug!("FileFetcher::fetch_cached - specifier: {}", specifier);
|
2020-06-15 17:46:48 -04:00
|
|
|
if redirect_limit < 0 {
|
2020-11-05 19:38:21 -05:00
|
|
|
return Err(custom_error("Http", "Too many redirects."));
|
2020-06-15 17:46:48 -04:00
|
|
|
}
|
|
|
|
|
2021-12-09 06:16:17 -05:00
|
|
|
let (mut source_file, headers, _) = match self.http_cache.get(specifier) {
|
2021-02-17 13:47:18 -05:00
|
|
|
Err(err) => {
|
|
|
|
if let Some(err) = err.downcast_ref::<std::io::Error>() {
|
|
|
|
if err.kind() == std::io::ErrorKind::NotFound {
|
|
|
|
return Ok(None);
|
2020-02-19 08:17:13 -05:00
|
|
|
}
|
2019-07-31 07:58:41 -04:00
|
|
|
}
|
2021-02-17 13:47:18 -05:00
|
|
|
return Err(err);
|
|
|
|
}
|
|
|
|
Ok(cache) => cache,
|
|
|
|
};
|
2020-11-05 19:38:21 -05:00
|
|
|
if let Some(redirect_to) = headers.get("location") {
|
|
|
|
let redirect =
|
2021-02-17 13:47:18 -05:00
|
|
|
deno_core::resolve_import(redirect_to, specifier.as_str())?;
|
2020-11-05 19:38:21 -05:00
|
|
|
return self.fetch_cached(&redirect, redirect_limit - 1);
|
2020-02-19 08:17:13 -05:00
|
|
|
}
|
2020-11-05 19:38:21 -05:00
|
|
|
let mut bytes = Vec::new();
|
|
|
|
source_file.read_to_end(&mut bytes)?;
|
|
|
|
let file = self.build_remote_file(specifier, bytes, &headers)?;
|
2020-02-19 08:17:13 -05:00
|
|
|
|
2020-11-05 19:38:21 -05:00
|
|
|
Ok(Some(file))
|
2019-07-31 07:58:41 -04:00
|
|
|
}
|
|
|
|
|
2021-01-05 21:22:38 -05:00
|
|
|
/// Convert a data URL into a file, resulting in an error if the URL is
|
|
|
|
/// invalid.
|
|
|
|
fn fetch_data_url(
|
|
|
|
&self,
|
|
|
|
specifier: &ModuleSpecifier,
|
|
|
|
) -> Result<File, AnyError> {
|
|
|
|
debug!("FileFetcher::fetch_data_url() - specifier: {}", specifier);
|
|
|
|
match self.fetch_cached(specifier, 0) {
|
|
|
|
Ok(Some(file)) => return Ok(file),
|
|
|
|
Ok(None) => {}
|
|
|
|
Err(err) => return Err(err),
|
|
|
|
}
|
|
|
|
|
|
|
|
if self.cache_setting == CacheSetting::Only {
|
|
|
|
return Err(custom_error(
|
2021-12-22 08:25:06 -05:00
|
|
|
"NotCached",
|
2021-01-05 21:22:38 -05:00
|
|
|
format!(
|
|
|
|
"Specifier not found in cache: \"{}\", --cached-only is specified.",
|
|
|
|
specifier
|
|
|
|
),
|
|
|
|
));
|
|
|
|
}
|
|
|
|
|
2021-09-13 00:19:23 -04:00
|
|
|
let (source, content_type) = get_source_from_data_url(specifier)?;
|
2021-04-23 14:43:13 -04:00
|
|
|
let (media_type, _) =
|
|
|
|
map_content_type(specifier, Some(content_type.clone()));
|
|
|
|
|
2021-02-17 13:47:18 -05:00
|
|
|
let local =
|
|
|
|
self
|
|
|
|
.http_cache
|
|
|
|
.get_cache_filename(specifier)
|
|
|
|
.ok_or_else(|| {
|
|
|
|
generic_error("Cannot convert specifier to cached filename.")
|
|
|
|
})?;
|
2021-01-05 21:22:38 -05:00
|
|
|
let mut headers = HashMap::new();
|
|
|
|
headers.insert("content-type".to_string(), content_type);
|
2021-10-10 17:26:22 -04:00
|
|
|
self
|
|
|
|
.http_cache
|
|
|
|
.set(specifier, headers.clone(), source.as_bytes())?;
|
2021-01-05 21:22:38 -05:00
|
|
|
|
|
|
|
Ok(File {
|
|
|
|
local,
|
|
|
|
maybe_types: None,
|
|
|
|
media_type,
|
2022-05-20 16:40:55 -04:00
|
|
|
source: source.into(),
|
2021-01-05 21:22:38 -05:00
|
|
|
specifier: specifier.clone(),
|
2021-10-10 17:26:22 -04:00
|
|
|
maybe_headers: Some(headers),
|
2021-01-05 21:22:38 -05:00
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2021-04-07 09:22:14 -04:00
|
|
|
/// Get a blob URL.
|
2021-07-05 09:34:37 -04:00
|
|
|
async fn fetch_blob_url(
|
2021-04-07 09:22:14 -04:00
|
|
|
&self,
|
|
|
|
specifier: &ModuleSpecifier,
|
|
|
|
) -> Result<File, AnyError> {
|
|
|
|
debug!("FileFetcher::fetch_blob_url() - specifier: {}", specifier);
|
|
|
|
match self.fetch_cached(specifier, 0) {
|
|
|
|
Ok(Some(file)) => return Ok(file),
|
|
|
|
Ok(None) => {}
|
|
|
|
Err(err) => return Err(err),
|
|
|
|
}
|
|
|
|
|
|
|
|
if self.cache_setting == CacheSetting::Only {
|
|
|
|
return Err(custom_error(
|
2021-12-22 08:25:06 -05:00
|
|
|
"NotCached",
|
2021-04-07 09:22:14 -04:00
|
|
|
format!(
|
|
|
|
"Specifier not found in cache: \"{}\", --cached-only is specified.",
|
|
|
|
specifier
|
|
|
|
),
|
|
|
|
));
|
|
|
|
}
|
|
|
|
|
2021-07-05 09:34:37 -04:00
|
|
|
let blob = {
|
|
|
|
let blob_store = self.blob_store.borrow();
|
|
|
|
blob_store
|
|
|
|
.get_object_url(specifier.clone())?
|
|
|
|
.ok_or_else(|| {
|
|
|
|
custom_error(
|
|
|
|
"NotFound",
|
|
|
|
format!("Blob URL not found: \"{}\".", specifier),
|
|
|
|
)
|
|
|
|
})?
|
|
|
|
};
|
2021-04-07 09:22:14 -04:00
|
|
|
|
2021-07-05 09:34:37 -04:00
|
|
|
let content_type = blob.media_type.clone();
|
|
|
|
let bytes = blob.read_all().await?;
|
2021-04-07 09:22:14 -04:00
|
|
|
|
|
|
|
let (media_type, maybe_charset) =
|
|
|
|
map_content_type(specifier, Some(content_type.clone()));
|
2022-01-16 10:48:32 -05:00
|
|
|
let source = get_source_from_bytes(bytes, maybe_charset)?;
|
2021-04-07 09:22:14 -04:00
|
|
|
|
|
|
|
let local =
|
|
|
|
self
|
|
|
|
.http_cache
|
|
|
|
.get_cache_filename(specifier)
|
|
|
|
.ok_or_else(|| {
|
|
|
|
generic_error("Cannot convert specifier to cached filename.")
|
|
|
|
})?;
|
|
|
|
let mut headers = HashMap::new();
|
|
|
|
headers.insert("content-type".to_string(), content_type);
|
2021-10-10 17:26:22 -04:00
|
|
|
self
|
|
|
|
.http_cache
|
|
|
|
.set(specifier, headers.clone(), source.as_bytes())?;
|
2021-04-07 09:22:14 -04:00
|
|
|
|
|
|
|
Ok(File {
|
|
|
|
local,
|
|
|
|
maybe_types: None,
|
|
|
|
media_type,
|
2022-05-20 16:40:55 -04:00
|
|
|
source: source.into(),
|
2021-04-07 09:22:14 -04:00
|
|
|
specifier: specifier.clone(),
|
2021-10-10 17:26:22 -04:00
|
|
|
maybe_headers: Some(headers),
|
2021-04-07 09:22:14 -04:00
|
|
|
})
|
|
|
|
}
|
2021-12-20 21:40:22 -05:00
|
|
|
|
2020-11-05 19:38:21 -05:00
|
|
|
/// Asynchronously fetch remote source file specified by the URL following
|
|
|
|
/// redirects.
|
2020-02-19 17:51:10 -05:00
|
|
|
///
|
2020-11-05 19:38:21 -05:00
|
|
|
/// **Note** this is a recursive method so it can't be "async", but needs to
|
|
|
|
/// return a `Pin<Box<..>>`.
|
|
|
|
fn fetch_remote(
|
2020-01-04 05:20:52 -05:00
|
|
|
&self,
|
2020-11-05 19:38:21 -05:00
|
|
|
specifier: &ModuleSpecifier,
|
2021-04-11 22:15:43 -04:00
|
|
|
permissions: &mut Permissions,
|
2020-11-05 19:38:21 -05:00
|
|
|
redirect_limit: i64,
|
2021-12-20 21:40:22 -05:00
|
|
|
maybe_accept: Option<String>,
|
2020-12-29 23:17:17 -05:00
|
|
|
) -> Pin<Box<dyn Future<Output = Result<File, AnyError>> + Send>> {
|
2020-11-05 19:38:21 -05:00
|
|
|
debug!("FileFetcher::fetch_remote() - specifier: {}", specifier);
|
2019-07-31 07:58:41 -04:00
|
|
|
if redirect_limit < 0 {
|
2020-11-05 19:38:21 -05:00
|
|
|
return futures::future::err(custom_error("Http", "Too many redirects."))
|
2020-12-29 23:17:17 -05:00
|
|
|
.boxed();
|
2019-07-31 07:58:41 -04:00
|
|
|
}
|
|
|
|
|
2020-11-05 19:38:21 -05:00
|
|
|
if let Err(err) = permissions.check_specifier(specifier) {
|
2020-12-29 23:17:17 -05:00
|
|
|
return futures::future::err(err).boxed();
|
2020-05-11 07:13:27 -04:00
|
|
|
}
|
|
|
|
|
2021-12-09 06:16:17 -05:00
|
|
|
if self.cache_setting.should_use(specifier, &self.http_cache) {
|
2020-11-05 19:38:21 -05:00
|
|
|
match self.fetch_cached(specifier, redirect_limit) {
|
|
|
|
Ok(Some(file)) => {
|
2020-12-29 23:17:17 -05:00
|
|
|
return futures::future::ok(file).boxed();
|
2019-07-31 07:58:41 -04:00
|
|
|
}
|
2020-11-05 19:38:21 -05:00
|
|
|
Ok(None) => {}
|
2019-07-31 07:58:41 -04:00
|
|
|
Err(err) => {
|
2020-12-29 23:17:17 -05:00
|
|
|
return futures::future::err(err).boxed();
|
2019-07-31 07:58:41 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-11-05 19:38:21 -05:00
|
|
|
if self.cache_setting == CacheSetting::Only {
|
|
|
|
return futures::future::err(custom_error(
|
2021-12-22 08:25:06 -05:00
|
|
|
"NotCached",
|
2020-11-05 19:38:21 -05:00
|
|
|
format!(
|
|
|
|
"Specifier not found in cache: \"{}\", --cached-only is specified.",
|
|
|
|
specifier
|
|
|
|
),
|
|
|
|
))
|
2020-12-29 23:17:17 -05:00
|
|
|
.boxed();
|
2019-07-31 07:58:41 -04:00
|
|
|
}
|
|
|
|
|
2021-12-15 13:23:43 -05:00
|
|
|
log::log!(
|
|
|
|
self.download_log_level,
|
|
|
|
"{} {}",
|
|
|
|
colors::green("Download"),
|
|
|
|
specifier
|
|
|
|
);
|
2020-03-10 08:26:17 -04:00
|
|
|
|
2021-02-17 13:47:18 -05:00
|
|
|
let maybe_etag = match self.http_cache.get(specifier) {
|
2021-12-09 06:16:17 -05:00
|
|
|
Ok((_, headers, _)) => headers.get("etag").cloned(),
|
2020-11-05 19:38:21 -05:00
|
|
|
_ => None,
|
2020-02-19 08:17:13 -05:00
|
|
|
};
|
2021-07-30 09:03:41 -04:00
|
|
|
let maybe_auth_token = self.auth_tokens.get(specifier);
|
2020-11-05 19:38:21 -05:00
|
|
|
let specifier = specifier.clone();
|
2021-04-11 22:15:43 -04:00
|
|
|
let mut permissions = permissions.clone();
|
2021-02-15 21:50:27 -05:00
|
|
|
let client = self.http_client.clone();
|
|
|
|
let file_fetcher = self.clone();
|
2020-11-05 19:38:21 -05:00
|
|
|
// A single pass of fetch either yields code or yields a redirect.
|
|
|
|
async move {
|
2021-02-15 21:50:27 -05:00
|
|
|
match fetch_once(FetchOnceArgs {
|
|
|
|
client,
|
2021-02-17 13:47:18 -05:00
|
|
|
url: specifier.clone(),
|
2021-12-20 21:40:22 -05:00
|
|
|
maybe_accept: maybe_accept.clone(),
|
2021-02-15 21:50:27 -05:00
|
|
|
maybe_etag,
|
|
|
|
maybe_auth_token,
|
|
|
|
})
|
|
|
|
.await?
|
|
|
|
{
|
2020-01-11 05:11:05 -05:00
|
|
|
FetchOnceResult::NotModified => {
|
2020-11-05 19:38:21 -05:00
|
|
|
let file = file_fetcher.fetch_cached(&specifier, 10)?.unwrap();
|
|
|
|
Ok(file)
|
2020-01-11 05:11:05 -05:00
|
|
|
}
|
2020-11-05 19:38:21 -05:00
|
|
|
FetchOnceResult::Redirect(redirect_url, headers) => {
|
2021-02-17 13:47:18 -05:00
|
|
|
file_fetcher.http_cache.set(&specifier, headers, &[])?;
|
2020-11-05 19:38:21 -05:00
|
|
|
file_fetcher
|
2021-12-20 21:40:22 -05:00
|
|
|
.fetch_remote(
|
|
|
|
&redirect_url,
|
|
|
|
&mut permissions,
|
|
|
|
redirect_limit - 1,
|
|
|
|
maybe_accept,
|
|
|
|
)
|
2020-01-04 05:20:52 -05:00
|
|
|
.await
|
2019-07-31 07:58:41 -04:00
|
|
|
}
|
2020-11-05 19:38:21 -05:00
|
|
|
FetchOnceResult::Code(bytes, headers) => {
|
2021-02-17 13:47:18 -05:00
|
|
|
file_fetcher
|
|
|
|
.http_cache
|
|
|
|
.set(&specifier, headers.clone(), &bytes)?;
|
2020-11-05 19:38:21 -05:00
|
|
|
let file =
|
|
|
|
file_fetcher.build_remote_file(&specifier, bytes, &headers)?;
|
|
|
|
Ok(file)
|
2019-07-31 07:58:41 -04:00
|
|
|
}
|
2019-04-25 13:29:21 -04:00
|
|
|
}
|
2020-11-05 19:38:21 -05:00
|
|
|
}
|
2020-12-29 23:17:17 -05:00
|
|
|
.boxed()
|
2019-07-31 07:58:41 -04:00
|
|
|
}
|
|
|
|
|
2020-11-05 19:38:21 -05:00
|
|
|
/// Fetch a source file and asynchronously return it.
|
|
|
|
pub async fn fetch(
|
|
|
|
&self,
|
|
|
|
specifier: &ModuleSpecifier,
|
2021-04-11 22:15:43 -04:00
|
|
|
permissions: &mut Permissions,
|
2020-11-05 19:38:21 -05:00
|
|
|
) -> Result<File, AnyError> {
|
|
|
|
debug!("FileFetcher::fetch() - specifier: {}", specifier);
|
2021-12-20 21:40:22 -05:00
|
|
|
self.fetch_with_accept(specifier, permissions, None).await
|
|
|
|
}
|
|
|
|
|
|
|
|
pub async fn fetch_with_accept(
|
|
|
|
&self,
|
|
|
|
specifier: &ModuleSpecifier,
|
|
|
|
permissions: &mut Permissions,
|
|
|
|
maybe_accept: Option<&str>,
|
|
|
|
) -> Result<File, AnyError> {
|
2020-11-05 19:38:21 -05:00
|
|
|
let scheme = get_validated_scheme(specifier)?;
|
|
|
|
permissions.check_specifier(specifier)?;
|
|
|
|
if let Some(file) = self.cache.get(specifier) {
|
|
|
|
Ok(file)
|
2021-01-05 21:22:38 -05:00
|
|
|
} else if scheme == "file" {
|
|
|
|
// we do not in memory cache files, as this would prevent files on the
|
|
|
|
// disk changing effecting things like workers and dynamic imports.
|
|
|
|
fetch_local(specifier)
|
|
|
|
} else if scheme == "data" {
|
|
|
|
let result = self.fetch_data_url(specifier);
|
|
|
|
if let Ok(file) = &result {
|
|
|
|
self.cache.insert(specifier.clone(), file.clone());
|
|
|
|
}
|
|
|
|
result
|
2021-04-07 09:22:14 -04:00
|
|
|
} else if scheme == "blob" {
|
2021-07-05 09:34:37 -04:00
|
|
|
let result = self.fetch_blob_url(specifier).await;
|
2021-04-07 09:22:14 -04:00
|
|
|
if let Ok(file) = &result {
|
|
|
|
self.cache.insert(specifier.clone(), file.clone());
|
|
|
|
}
|
|
|
|
result
|
2021-01-05 21:22:38 -05:00
|
|
|
} else if !self.allow_remote {
|
|
|
|
Err(custom_error(
|
|
|
|
"NoRemote",
|
|
|
|
format!("A remote specifier was requested: \"{}\", but --no-remote is specified.", specifier),
|
|
|
|
))
|
2020-11-05 19:38:21 -05:00
|
|
|
} else {
|
2021-12-20 21:40:22 -05:00
|
|
|
let result = self
|
|
|
|
.fetch_remote(
|
|
|
|
specifier,
|
|
|
|
permissions,
|
|
|
|
10,
|
|
|
|
maybe_accept.map(String::from),
|
|
|
|
)
|
|
|
|
.await;
|
2021-01-05 21:22:38 -05:00
|
|
|
if let Ok(file) = &result {
|
|
|
|
self.cache.insert(specifier.clone(), file.clone());
|
2020-11-05 19:38:21 -05:00
|
|
|
}
|
2021-01-05 21:22:38 -05:00
|
|
|
result
|
2019-07-31 07:58:41 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-10-10 17:26:22 -04:00
|
|
|
pub fn get_local_path(&self, specifier: &ModuleSpecifier) -> Option<PathBuf> {
|
2022-01-31 17:33:57 -05:00
|
|
|
// TODO(@kitsonk) fix when deno_graph does not query cache for synthetic
|
|
|
|
// modules
|
|
|
|
if specifier.scheme() == "flags" {
|
|
|
|
None
|
|
|
|
} else if specifier.scheme() == "file" {
|
2021-10-10 17:26:22 -04:00
|
|
|
specifier.to_file_path().ok()
|
|
|
|
} else {
|
|
|
|
self.http_cache.get_cache_filename(specifier)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-11-05 19:38:21 -05:00
|
|
|
/// Get the location of the current HTTP cache associated with the fetcher.
|
|
|
|
pub fn get_http_cache_location(&self) -> PathBuf {
|
|
|
|
self.http_cache.location.clone()
|
2019-07-31 07:58:41 -04:00
|
|
|
}
|
|
|
|
|
2020-11-15 21:19:31 -05:00
|
|
|
/// A synchronous way to retrieve a source file, where if the file has already
|
|
|
|
/// been cached in memory it will be returned, otherwise for local files will
|
|
|
|
/// be read from disk.
|
|
|
|
pub fn get_source(&self, specifier: &ModuleSpecifier) -> Option<File> {
|
|
|
|
let maybe_file = self.cache.get(specifier);
|
|
|
|
if maybe_file.is_none() {
|
2021-02-17 13:47:18 -05:00
|
|
|
let is_local = specifier.scheme() == "file";
|
2020-11-15 21:19:31 -05:00
|
|
|
if is_local {
|
|
|
|
if let Ok(file) = fetch_local(specifier) {
|
|
|
|
return Some(file);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
None
|
|
|
|
} else {
|
|
|
|
maybe_file
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-11-05 19:38:21 -05:00
|
|
|
/// Insert a temporary module into the in memory cache for the file fetcher.
|
|
|
|
pub fn insert_cached(&self, file: File) -> Option<File> {
|
|
|
|
self.cache.insert(file.specifier.clone(), file)
|
2019-10-17 10:29:06 -04:00
|
|
|
}
|
2019-07-31 07:58:41 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
#[cfg(test)]
|
|
|
|
mod tests {
|
|
|
|
use super::*;
|
2020-11-05 19:38:21 -05:00
|
|
|
use deno_core::error::get_custom_error_class;
|
2021-02-17 13:47:18 -05:00
|
|
|
use deno_core::resolve_url;
|
|
|
|
use deno_core::resolve_url_or_path;
|
2021-06-10 09:26:10 -04:00
|
|
|
use deno_runtime::deno_web::Blob;
|
2021-07-05 09:34:37 -04:00
|
|
|
use deno_runtime::deno_web::InMemoryBlobPart;
|
2022-04-01 11:15:37 -04:00
|
|
|
use test_util::TempDir;
|
2019-07-31 07:58:41 -04:00
|
|
|
|
2020-11-05 19:38:21 -05:00
|
|
|
fn setup(
|
|
|
|
cache_setting: CacheSetting,
|
2022-04-01 11:15:37 -04:00
|
|
|
maybe_temp_dir: Option<TempDir>,
|
|
|
|
) -> (FileFetcher, TempDir) {
|
2021-04-07 09:22:14 -04:00
|
|
|
let (file_fetcher, temp_dir, _) =
|
2021-07-05 09:34:37 -04:00
|
|
|
setup_with_blob_store(cache_setting, maybe_temp_dir);
|
2021-04-07 09:22:14 -04:00
|
|
|
(file_fetcher, temp_dir)
|
|
|
|
}
|
|
|
|
|
2021-07-05 09:34:37 -04:00
|
|
|
fn setup_with_blob_store(
|
2021-04-07 09:22:14 -04:00
|
|
|
cache_setting: CacheSetting,
|
2022-04-01 11:15:37 -04:00
|
|
|
maybe_temp_dir: Option<TempDir>,
|
|
|
|
) -> (FileFetcher, TempDir, BlobStore) {
|
|
|
|
let temp_dir = maybe_temp_dir.unwrap_or_default();
|
2020-11-05 19:38:21 -05:00
|
|
|
let location = temp_dir.path().join("deps");
|
2021-07-05 09:34:37 -04:00
|
|
|
let blob_store = BlobStore::default();
|
2021-04-07 09:22:14 -04:00
|
|
|
let file_fetcher = FileFetcher::new(
|
|
|
|
HttpCache::new(&location),
|
|
|
|
cache_setting,
|
|
|
|
true,
|
|
|
|
None,
|
2021-07-05 09:34:37 -04:00
|
|
|
blob_store.clone(),
|
2021-08-09 10:53:21 -04:00
|
|
|
None,
|
2021-04-07 09:22:14 -04:00
|
|
|
)
|
2021-11-15 19:59:19 -05:00
|
|
|
.unwrap();
|
2021-07-05 09:34:37 -04:00
|
|
|
(file_fetcher, temp_dir, blob_store)
|
2019-07-31 07:58:41 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
macro_rules! file_url {
|
|
|
|
($path:expr) => {
|
|
|
|
if cfg!(target_os = "windows") {
|
|
|
|
concat!("file:///C:", $path)
|
|
|
|
} else {
|
|
|
|
concat!("file://", $path)
|
|
|
|
}
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2020-11-05 19:38:21 -05:00
|
|
|
async fn test_fetch(specifier: &ModuleSpecifier) -> (File, FileFetcher) {
|
|
|
|
let (file_fetcher, _) = setup(CacheSetting::ReloadAll, None);
|
|
|
|
let result = file_fetcher
|
2021-04-11 22:15:43 -04:00
|
|
|
.fetch(specifier, &mut Permissions::allow_all())
|
2020-11-05 19:38:21 -05:00
|
|
|
.await;
|
|
|
|
assert!(result.is_ok());
|
|
|
|
(result.unwrap(), file_fetcher)
|
|
|
|
}
|
2019-10-17 10:29:06 -04:00
|
|
|
|
2020-11-05 19:38:21 -05:00
|
|
|
async fn test_fetch_remote(
|
|
|
|
specifier: &ModuleSpecifier,
|
|
|
|
) -> (File, HashMap<String, String>) {
|
|
|
|
let _http_server_guard = test_util::http_server();
|
|
|
|
let (file_fetcher, _) = setup(CacheSetting::ReloadAll, None);
|
|
|
|
let result: Result<File, AnyError> = file_fetcher
|
2021-12-20 21:40:22 -05:00
|
|
|
.fetch_remote(specifier, &mut Permissions::allow_all(), 1, None)
|
2020-11-05 19:38:21 -05:00
|
|
|
.await;
|
|
|
|
assert!(result.is_ok());
|
2021-12-09 06:16:17 -05:00
|
|
|
let (_, headers, _) = file_fetcher.http_cache.get(specifier).unwrap();
|
2020-11-05 19:38:21 -05:00
|
|
|
(result.unwrap(), headers)
|
|
|
|
}
|
2019-10-17 10:29:06 -04:00
|
|
|
|
2020-11-05 19:38:21 -05:00
|
|
|
async fn test_fetch_remote_encoded(
|
|
|
|
fixture: &str,
|
|
|
|
charset: &str,
|
|
|
|
expected: &str,
|
|
|
|
) {
|
2021-08-11 10:20:47 -04:00
|
|
|
let url_str = format!("http://127.0.0.1:4545/encoding/{}", fixture);
|
2021-02-17 13:47:18 -05:00
|
|
|
let specifier = resolve_url(&url_str).unwrap();
|
2020-11-05 19:38:21 -05:00
|
|
|
let (file, headers) = test_fetch_remote(&specifier).await;
|
2022-05-20 16:40:55 -04:00
|
|
|
assert_eq!(&*file.source, expected);
|
2020-11-05 19:38:21 -05:00
|
|
|
assert_eq!(file.media_type, MediaType::TypeScript);
|
|
|
|
assert_eq!(
|
|
|
|
headers.get("content-type").unwrap(),
|
|
|
|
&format!("application/typescript;charset={}", charset)
|
|
|
|
);
|
|
|
|
}
|
2019-10-17 10:29:06 -04:00
|
|
|
|
2020-11-05 19:38:21 -05:00
|
|
|
async fn test_fetch_local_encoded(charset: &str, expected: String) {
|
2021-08-11 10:20:47 -04:00
|
|
|
let p = test_util::testdata_path().join(format!("encoding/{}.ts", charset));
|
2021-02-17 13:47:18 -05:00
|
|
|
let specifier = resolve_url_or_path(p.to_str().unwrap()).unwrap();
|
2020-11-05 19:38:21 -05:00
|
|
|
let (file, _) = test_fetch(&specifier).await;
|
2022-05-20 16:40:55 -04:00
|
|
|
assert_eq!(&*file.source, expected);
|
2020-11-05 19:38:21 -05:00
|
|
|
}
|
2019-10-17 10:29:06 -04:00
|
|
|
|
2020-11-05 19:38:21 -05:00
|
|
|
#[test]
|
|
|
|
fn test_get_validated_scheme() {
|
|
|
|
let fixtures = vec![
|
|
|
|
("https://deno.land/x/mod.ts", true, "https"),
|
|
|
|
("http://deno.land/x/mod.ts", true, "http"),
|
|
|
|
("file:///a/b/c.ts", true, "file"),
|
|
|
|
("file:///C:/a/b/c.ts", true, "file"),
|
2021-01-05 21:22:38 -05:00
|
|
|
("data:,some%20text", true, "data"),
|
2020-11-05 19:38:21 -05:00
|
|
|
("ftp://a/b/c.ts", false, ""),
|
|
|
|
("mailto:dino@deno.land", false, ""),
|
|
|
|
];
|
2019-10-17 10:29:06 -04:00
|
|
|
|
2020-11-05 19:38:21 -05:00
|
|
|
for (specifier, is_ok, expected) in fixtures {
|
2021-02-17 13:47:18 -05:00
|
|
|
let specifier = resolve_url_or_path(specifier).unwrap();
|
2020-11-05 19:38:21 -05:00
|
|
|
let actual = get_validated_scheme(&specifier);
|
|
|
|
assert_eq!(actual.is_ok(), is_ok);
|
|
|
|
if is_ok {
|
|
|
|
assert_eq!(actual.unwrap(), expected);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2019-10-17 10:29:06 -04:00
|
|
|
|
2019-08-12 21:52:03 -04:00
|
|
|
#[test]
|
2020-11-05 19:38:21 -05:00
|
|
|
fn test_map_content_type() {
|
|
|
|
let fixtures = vec![
|
|
|
|
// Extension only
|
|
|
|
(file_url!("/foo/bar.ts"), None, MediaType::TypeScript, None),
|
2021-03-25 14:17:37 -04:00
|
|
|
(file_url!("/foo/bar.tsx"), None, MediaType::Tsx, None),
|
2021-11-01 16:22:27 -04:00
|
|
|
(file_url!("/foo/bar.d.cts"), None, MediaType::Dcts, None),
|
|
|
|
(file_url!("/foo/bar.d.mts"), None, MediaType::Dmts, None),
|
2020-11-05 19:38:21 -05:00
|
|
|
(file_url!("/foo/bar.d.ts"), None, MediaType::Dts, None),
|
|
|
|
(file_url!("/foo/bar.js"), None, MediaType::JavaScript, None),
|
2021-03-25 14:17:37 -04:00
|
|
|
(file_url!("/foo/bar.jsx"), None, MediaType::Jsx, None),
|
2020-11-05 19:38:21 -05:00
|
|
|
(file_url!("/foo/bar.json"), None, MediaType::Json, None),
|
|
|
|
(file_url!("/foo/bar.wasm"), None, MediaType::Wasm, None),
|
2021-11-01 16:22:27 -04:00
|
|
|
(file_url!("/foo/bar.cjs"), None, MediaType::Cjs, None),
|
|
|
|
(file_url!("/foo/bar.mjs"), None, MediaType::Mjs, None),
|
|
|
|
(file_url!("/foo/bar.cts"), None, MediaType::Cts, None),
|
|
|
|
(file_url!("/foo/bar.mts"), None, MediaType::Mts, None),
|
2020-11-05 19:38:21 -05:00
|
|
|
(file_url!("/foo/bar"), None, MediaType::Unknown, None),
|
|
|
|
// Media type no extension
|
|
|
|
(
|
|
|
|
"https://deno.land/x/mod",
|
|
|
|
Some("application/typescript".to_string()),
|
|
|
|
MediaType::TypeScript,
|
|
|
|
None,
|
|
|
|
),
|
|
|
|
(
|
|
|
|
"https://deno.land/x/mod",
|
|
|
|
Some("text/typescript".to_string()),
|
|
|
|
MediaType::TypeScript,
|
|
|
|
None,
|
|
|
|
),
|
|
|
|
(
|
|
|
|
"https://deno.land/x/mod",
|
|
|
|
Some("video/vnd.dlna.mpeg-tts".to_string()),
|
|
|
|
MediaType::TypeScript,
|
|
|
|
None,
|
|
|
|
),
|
|
|
|
(
|
|
|
|
"https://deno.land/x/mod",
|
|
|
|
Some("video/mp2t".to_string()),
|
|
|
|
MediaType::TypeScript,
|
|
|
|
None,
|
|
|
|
),
|
|
|
|
(
|
|
|
|
"https://deno.land/x/mod",
|
|
|
|
Some("application/x-typescript".to_string()),
|
|
|
|
MediaType::TypeScript,
|
|
|
|
None,
|
|
|
|
),
|
|
|
|
(
|
|
|
|
"https://deno.land/x/mod",
|
|
|
|
Some("application/javascript".to_string()),
|
|
|
|
MediaType::JavaScript,
|
|
|
|
None,
|
|
|
|
),
|
|
|
|
(
|
|
|
|
"https://deno.land/x/mod",
|
|
|
|
Some("text/javascript".to_string()),
|
|
|
|
MediaType::JavaScript,
|
|
|
|
None,
|
|
|
|
),
|
|
|
|
(
|
|
|
|
"https://deno.land/x/mod",
|
|
|
|
Some("application/ecmascript".to_string()),
|
|
|
|
MediaType::JavaScript,
|
|
|
|
None,
|
|
|
|
),
|
|
|
|
(
|
|
|
|
"https://deno.land/x/mod",
|
|
|
|
Some("text/ecmascript".to_string()),
|
|
|
|
MediaType::JavaScript,
|
|
|
|
None,
|
|
|
|
),
|
|
|
|
(
|
|
|
|
"https://deno.land/x/mod",
|
|
|
|
Some("application/x-javascript".to_string()),
|
|
|
|
MediaType::JavaScript,
|
|
|
|
None,
|
|
|
|
),
|
|
|
|
(
|
|
|
|
"https://deno.land/x/mod",
|
|
|
|
Some("application/node".to_string()),
|
|
|
|
MediaType::JavaScript,
|
|
|
|
None,
|
|
|
|
),
|
2021-01-05 21:22:38 -05:00
|
|
|
(
|
|
|
|
"https://deno.land/x/mod",
|
|
|
|
Some("text/jsx".to_string()),
|
2021-03-25 14:17:37 -04:00
|
|
|
MediaType::Jsx,
|
2021-01-05 21:22:38 -05:00
|
|
|
None,
|
|
|
|
),
|
|
|
|
(
|
|
|
|
"https://deno.land/x/mod",
|
|
|
|
Some("text/tsx".to_string()),
|
2021-03-25 14:17:37 -04:00
|
|
|
MediaType::Tsx,
|
2021-01-05 21:22:38 -05:00
|
|
|
None,
|
|
|
|
),
|
2020-11-05 19:38:21 -05:00
|
|
|
(
|
|
|
|
"https://deno.land/x/mod",
|
|
|
|
Some("text/json".to_string()),
|
|
|
|
MediaType::Json,
|
|
|
|
None,
|
|
|
|
),
|
|
|
|
(
|
|
|
|
"https://deno.land/x/mod",
|
|
|
|
Some("text/json; charset=utf-8".to_string()),
|
|
|
|
MediaType::Json,
|
|
|
|
Some("utf-8".to_string()),
|
|
|
|
),
|
|
|
|
// Extension with media type
|
|
|
|
(
|
|
|
|
"https://deno.land/x/mod.ts",
|
|
|
|
Some("text/plain".to_string()),
|
|
|
|
MediaType::TypeScript,
|
|
|
|
None,
|
|
|
|
),
|
|
|
|
(
|
|
|
|
"https://deno.land/x/mod.ts",
|
|
|
|
Some("foo/bar".to_string()),
|
|
|
|
MediaType::Unknown,
|
|
|
|
None,
|
|
|
|
),
|
|
|
|
(
|
|
|
|
"https://deno.land/x/mod.tsx",
|
|
|
|
Some("application/typescript".to_string()),
|
2021-03-25 14:17:37 -04:00
|
|
|
MediaType::Tsx,
|
2020-11-05 19:38:21 -05:00
|
|
|
None,
|
|
|
|
),
|
|
|
|
(
|
|
|
|
"https://deno.land/x/mod.tsx",
|
|
|
|
Some("application/javascript".to_string()),
|
2021-03-25 14:17:37 -04:00
|
|
|
MediaType::Tsx,
|
2020-11-05 19:38:21 -05:00
|
|
|
None,
|
|
|
|
),
|
|
|
|
(
|
|
|
|
"https://deno.land/x/mod.jsx",
|
|
|
|
Some("application/javascript".to_string()),
|
2021-03-25 14:17:37 -04:00
|
|
|
MediaType::Jsx,
|
2020-11-05 19:38:21 -05:00
|
|
|
None,
|
|
|
|
),
|
|
|
|
(
|
|
|
|
"https://deno.land/x/mod.jsx",
|
|
|
|
Some("application/x-typescript".to_string()),
|
2021-03-25 14:17:37 -04:00
|
|
|
MediaType::Jsx,
|
2020-11-05 19:38:21 -05:00
|
|
|
None,
|
|
|
|
),
|
|
|
|
(
|
|
|
|
"https://deno.land/x/mod.d.ts",
|
|
|
|
Some("application/javascript".to_string()),
|
2021-11-01 16:22:27 -04:00
|
|
|
MediaType::Dts,
|
2020-11-05 19:38:21 -05:00
|
|
|
None,
|
|
|
|
),
|
|
|
|
(
|
|
|
|
"https://deno.land/x/mod.d.ts",
|
|
|
|
Some("text/plain".to_string()),
|
|
|
|
MediaType::Dts,
|
|
|
|
None,
|
|
|
|
),
|
|
|
|
(
|
|
|
|
"https://deno.land/x/mod.d.ts",
|
|
|
|
Some("application/x-typescript".to_string()),
|
|
|
|
MediaType::Dts,
|
|
|
|
None,
|
|
|
|
),
|
|
|
|
];
|
|
|
|
|
|
|
|
for (specifier, maybe_content_type, media_type, maybe_charset) in fixtures {
|
2021-02-17 13:47:18 -05:00
|
|
|
let specifier = resolve_url_or_path(specifier).unwrap();
|
2020-11-05 19:38:21 -05:00
|
|
|
assert_eq!(
|
|
|
|
map_content_type(&specifier, maybe_content_type),
|
|
|
|
(media_type, maybe_charset)
|
|
|
|
);
|
2019-08-12 21:52:03 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-02-03 08:53:50 -05:00
|
|
|
#[tokio::test]
|
2020-11-05 19:38:21 -05:00
|
|
|
async fn test_insert_cached() {
|
|
|
|
let (file_fetcher, temp_dir) = setup(CacheSetting::Use, None);
|
|
|
|
let local = temp_dir.path().join("a.ts");
|
|
|
|
let specifier =
|
2021-02-17 13:47:18 -05:00
|
|
|
resolve_url_or_path(local.as_os_str().to_str().unwrap()).unwrap();
|
2020-11-05 19:38:21 -05:00
|
|
|
let file = File {
|
|
|
|
local,
|
|
|
|
maybe_types: None,
|
|
|
|
media_type: MediaType::TypeScript,
|
2022-05-20 16:40:55 -04:00
|
|
|
source: "some source code".into(),
|
2020-11-05 19:38:21 -05:00
|
|
|
specifier: specifier.clone(),
|
2021-09-02 11:38:19 -04:00
|
|
|
maybe_headers: None,
|
2020-11-05 19:38:21 -05:00
|
|
|
};
|
|
|
|
file_fetcher.insert_cached(file.clone());
|
|
|
|
|
|
|
|
let result = file_fetcher
|
2021-04-11 22:15:43 -04:00
|
|
|
.fetch(&specifier, &mut Permissions::allow_all())
|
2020-02-03 08:53:50 -05:00
|
|
|
.await;
|
|
|
|
assert!(result.is_ok());
|
2020-11-05 19:38:21 -05:00
|
|
|
let result_file = result.unwrap();
|
|
|
|
assert_eq!(result_file, file);
|
|
|
|
}
|
|
|
|
|
|
|
|
#[tokio::test]
|
2020-11-15 21:19:31 -05:00
|
|
|
async fn test_get_source() {
|
2020-11-05 19:38:21 -05:00
|
|
|
let _http_server_guard = test_util::http_server();
|
|
|
|
let (file_fetcher, _) = setup(CacheSetting::Use, None);
|
2021-08-11 10:20:47 -04:00
|
|
|
let specifier =
|
|
|
|
resolve_url("http://localhost:4548/subdir/redirects/redirect1.js")
|
|
|
|
.unwrap();
|
2020-11-05 19:38:21 -05:00
|
|
|
|
|
|
|
let result = file_fetcher
|
2021-04-11 22:15:43 -04:00
|
|
|
.fetch(&specifier, &mut Permissions::allow_all())
|
2020-11-05 19:38:21 -05:00
|
|
|
.await;
|
|
|
|
assert!(result.is_ok());
|
|
|
|
|
2020-11-15 21:19:31 -05:00
|
|
|
let maybe_file = file_fetcher.get_source(&specifier);
|
2020-11-05 19:38:21 -05:00
|
|
|
assert!(maybe_file.is_some());
|
|
|
|
let file = maybe_file.unwrap();
|
2022-05-20 16:40:55 -04:00
|
|
|
assert_eq!(&*file.source, "export const redirect = 1;\n");
|
2020-11-05 19:38:21 -05:00
|
|
|
assert_eq!(
|
|
|
|
file.specifier,
|
2021-08-11 10:20:47 -04:00
|
|
|
resolve_url("http://localhost:4545/subdir/redirects/redirect1.js")
|
|
|
|
.unwrap()
|
2020-11-05 19:38:21 -05:00
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_get_http_cache_location() {
|
|
|
|
let (file_fetcher, temp_dir) = setup(CacheSetting::Use, None);
|
|
|
|
let expected = temp_dir.path().join("deps");
|
|
|
|
let actual = file_fetcher.get_http_cache_location();
|
|
|
|
assert_eq!(actual, expected);
|
|
|
|
}
|
|
|
|
|
2021-01-05 21:22:38 -05:00
|
|
|
#[tokio::test]
|
|
|
|
async fn test_fetch_data_url() {
|
|
|
|
let (file_fetcher, _) = setup(CacheSetting::Use, None);
|
2021-02-17 13:47:18 -05:00
|
|
|
let specifier = resolve_url("data:application/typescript;base64,ZXhwb3J0IGNvbnN0IGEgPSAiYSI7CgpleHBvcnQgZW51bSBBIHsKICBBLAogIEIsCiAgQywKfQo=").unwrap();
|
2021-01-05 21:22:38 -05:00
|
|
|
|
|
|
|
let result = file_fetcher
|
2021-04-11 22:15:43 -04:00
|
|
|
.fetch(&specifier, &mut Permissions::allow_all())
|
2021-01-05 21:22:38 -05:00
|
|
|
.await;
|
|
|
|
assert!(result.is_ok());
|
|
|
|
let file = result.unwrap();
|
|
|
|
assert_eq!(
|
2022-05-20 16:40:55 -04:00
|
|
|
&*file.source,
|
2021-01-05 21:22:38 -05:00
|
|
|
"export const a = \"a\";\n\nexport enum A {\n A,\n B,\n C,\n}\n"
|
|
|
|
);
|
|
|
|
assert_eq!(file.media_type, MediaType::TypeScript);
|
|
|
|
assert_eq!(file.maybe_types, None);
|
|
|
|
assert_eq!(file.specifier, specifier);
|
|
|
|
}
|
|
|
|
|
2021-04-07 09:22:14 -04:00
|
|
|
#[tokio::test]
|
|
|
|
async fn test_fetch_blob_url() {
|
2021-07-05 09:34:37 -04:00
|
|
|
let (file_fetcher, _, blob_store) =
|
|
|
|
setup_with_blob_store(CacheSetting::Use, None);
|
|
|
|
|
|
|
|
let bytes =
|
|
|
|
"export const a = \"a\";\n\nexport enum A {\n A,\n B,\n C,\n}\n"
|
|
|
|
.as_bytes()
|
|
|
|
.to_vec();
|
2021-04-07 09:22:14 -04:00
|
|
|
|
2021-07-05 09:34:37 -04:00
|
|
|
let specifier = blob_store.insert_object_url(
|
2021-04-07 09:22:14 -04:00
|
|
|
Blob {
|
|
|
|
media_type: "application/typescript".to_string(),
|
2021-08-14 04:27:27 -04:00
|
|
|
parts: vec![Arc::new(InMemoryBlobPart::from(bytes))],
|
2021-04-07 09:22:14 -04:00
|
|
|
},
|
|
|
|
None,
|
|
|
|
);
|
|
|
|
|
|
|
|
let result = file_fetcher
|
2021-04-11 22:15:43 -04:00
|
|
|
.fetch(&specifier, &mut Permissions::allow_all())
|
2021-04-07 09:22:14 -04:00
|
|
|
.await;
|
|
|
|
assert!(result.is_ok());
|
|
|
|
let file = result.unwrap();
|
|
|
|
assert_eq!(
|
2022-05-20 16:40:55 -04:00
|
|
|
&*file.source,
|
2021-04-07 09:22:14 -04:00
|
|
|
"export const a = \"a\";\n\nexport enum A {\n A,\n B,\n C,\n}\n"
|
|
|
|
);
|
|
|
|
assert_eq!(file.media_type, MediaType::TypeScript);
|
|
|
|
assert_eq!(file.maybe_types, None);
|
|
|
|
assert_eq!(file.specifier, specifier);
|
|
|
|
}
|
|
|
|
|
2020-11-05 19:38:21 -05:00
|
|
|
#[tokio::test]
|
|
|
|
async fn test_fetch_complex() {
|
|
|
|
let _http_server_guard = test_util::http_server();
|
|
|
|
let (file_fetcher, temp_dir) = setup(CacheSetting::Use, None);
|
|
|
|
let (file_fetcher_01, _) = setup(CacheSetting::Use, Some(temp_dir.clone()));
|
|
|
|
let (file_fetcher_02, _) = setup(CacheSetting::Use, Some(temp_dir.clone()));
|
2021-02-17 13:47:18 -05:00
|
|
|
let specifier =
|
2021-08-11 10:20:47 -04:00
|
|
|
resolve_url_or_path("http://localhost:4545/subdir/mod2.ts").unwrap();
|
2020-11-05 19:38:21 -05:00
|
|
|
|
|
|
|
let result = file_fetcher
|
2021-04-11 22:15:43 -04:00
|
|
|
.fetch(&specifier, &mut Permissions::allow_all())
|
2020-11-05 19:38:21 -05:00
|
|
|
.await;
|
|
|
|
assert!(result.is_ok());
|
|
|
|
let file = result.unwrap();
|
|
|
|
assert_eq!(
|
2022-05-20 16:40:55 -04:00
|
|
|
&*file.source,
|
2020-10-07 07:43:44 -04:00
|
|
|
"export { printHello } from \"./print_hello.ts\";\n"
|
2020-02-03 08:53:50 -05:00
|
|
|
);
|
2020-11-05 19:38:21 -05:00
|
|
|
assert_eq!(file.media_type, MediaType::TypeScript);
|
2020-02-28 13:15:31 -05:00
|
|
|
|
2020-11-05 19:38:21 -05:00
|
|
|
let cache_filename = file_fetcher
|
|
|
|
.http_cache
|
2021-02-17 13:47:18 -05:00
|
|
|
.get_cache_filename(&specifier)
|
2021-02-15 04:32:06 -05:00
|
|
|
.unwrap();
|
2020-02-28 13:15:31 -05:00
|
|
|
let mut metadata =
|
|
|
|
crate::http_cache::Metadata::read(&cache_filename).unwrap();
|
|
|
|
metadata.headers = HashMap::new();
|
|
|
|
metadata
|
|
|
|
.headers
|
2020-09-16 07:34:16 -04:00
|
|
|
.insert("content-type".to_string(), "text/javascript".to_string());
|
2020-02-28 13:15:31 -05:00
|
|
|
metadata.write(&cache_filename).unwrap();
|
|
|
|
|
2020-11-05 19:38:21 -05:00
|
|
|
let result = file_fetcher_01
|
2021-04-11 22:15:43 -04:00
|
|
|
.fetch(&specifier, &mut Permissions::allow_all())
|
2020-02-03 08:53:50 -05:00
|
|
|
.await;
|
2020-11-05 19:38:21 -05:00
|
|
|
assert!(result.is_ok());
|
|
|
|
let file = result.unwrap();
|
2020-02-03 08:53:50 -05:00
|
|
|
assert_eq!(
|
2022-05-20 16:40:55 -04:00
|
|
|
&*file.source,
|
2020-10-07 07:43:44 -04:00
|
|
|
"export { printHello } from \"./print_hello.ts\";\n"
|
2020-02-03 08:53:50 -05:00
|
|
|
);
|
2020-11-05 19:38:21 -05:00
|
|
|
// This validates that when using the cached value, because we modified
|
|
|
|
// the value above.
|
|
|
|
assert_eq!(file.media_type, MediaType::JavaScript);
|
2020-02-19 08:17:13 -05:00
|
|
|
|
2021-12-09 06:16:17 -05:00
|
|
|
let (_, headers, _) = file_fetcher_02.http_cache.get(&specifier).unwrap();
|
2020-09-16 07:34:16 -04:00
|
|
|
assert_eq!(headers.get("content-type").unwrap(), "text/javascript");
|
2020-02-28 13:15:31 -05:00
|
|
|
metadata.headers = HashMap::new();
|
|
|
|
metadata
|
|
|
|
.headers
|
2020-09-16 07:34:16 -04:00
|
|
|
.insert("content-type".to_string(), "application/json".to_string());
|
2020-02-28 13:15:31 -05:00
|
|
|
metadata.write(&cache_filename).unwrap();
|
|
|
|
|
2020-11-05 19:38:21 -05:00
|
|
|
let result = file_fetcher_02
|
2021-04-11 22:15:43 -04:00
|
|
|
.fetch(&specifier, &mut Permissions::allow_all())
|
2020-02-03 08:53:50 -05:00
|
|
|
.await;
|
2020-11-05 19:38:21 -05:00
|
|
|
assert!(result.is_ok());
|
|
|
|
let file = result.unwrap();
|
2020-02-03 08:53:50 -05:00
|
|
|
assert_eq!(
|
2022-05-20 16:40:55 -04:00
|
|
|
&*file.source,
|
2020-10-07 07:43:44 -04:00
|
|
|
"export { printHello } from \"./print_hello.ts\";\n"
|
2020-02-03 08:53:50 -05:00
|
|
|
);
|
2020-11-05 19:38:21 -05:00
|
|
|
assert_eq!(file.media_type, MediaType::Json);
|
|
|
|
|
|
|
|
// This creates a totally new instance, simulating another Deno process
|
|
|
|
// invocation and indicates to "cache bust".
|
|
|
|
let location = temp_dir.path().join("deps");
|
|
|
|
let file_fetcher = FileFetcher::new(
|
|
|
|
HttpCache::new(&location),
|
|
|
|
CacheSetting::ReloadAll,
|
|
|
|
true,
|
|
|
|
None,
|
2021-07-05 09:34:37 -04:00
|
|
|
BlobStore::default(),
|
2021-08-09 10:53:21 -04:00
|
|
|
None,
|
2020-11-05 19:38:21 -05:00
|
|
|
)
|
2021-11-15 19:59:19 -05:00
|
|
|
.unwrap();
|
2020-11-05 19:38:21 -05:00
|
|
|
let result = file_fetcher
|
2021-04-11 22:15:43 -04:00
|
|
|
.fetch(&specifier, &mut Permissions::allow_all())
|
2020-02-03 08:53:50 -05:00
|
|
|
.await;
|
|
|
|
assert!(result.is_ok());
|
2020-11-05 19:38:21 -05:00
|
|
|
let file = result.unwrap();
|
2020-02-19 08:17:13 -05:00
|
|
|
assert_eq!(
|
2022-05-20 16:40:55 -04:00
|
|
|
&*file.source,
|
2020-11-05 19:38:21 -05:00
|
|
|
"export { printHello } from \"./print_hello.ts\";\n"
|
2020-02-19 08:17:13 -05:00
|
|
|
);
|
2020-11-05 19:38:21 -05:00
|
|
|
assert_eq!(file.media_type, MediaType::TypeScript);
|
2019-07-31 07:58:41 -04:00
|
|
|
}
|
|
|
|
|
2020-02-03 08:53:50 -05:00
|
|
|
#[tokio::test]
|
2020-11-05 19:38:21 -05:00
|
|
|
async fn test_fetch_uses_cache() {
|
2020-08-10 17:31:05 -04:00
|
|
|
let _http_server_guard = test_util::http_server();
|
2022-04-01 11:15:37 -04:00
|
|
|
let temp_dir = TempDir::new();
|
2021-11-15 19:59:19 -05:00
|
|
|
let location = temp_dir.path().join("deps");
|
2020-11-05 19:38:21 -05:00
|
|
|
let file_fetcher_01 = FileFetcher::new(
|
|
|
|
HttpCache::new(&location),
|
|
|
|
CacheSetting::Use,
|
|
|
|
true,
|
|
|
|
None,
|
2021-07-05 09:34:37 -04:00
|
|
|
BlobStore::default(),
|
2021-08-09 10:53:21 -04:00
|
|
|
None,
|
2020-11-05 19:38:21 -05:00
|
|
|
)
|
2021-11-15 19:59:19 -05:00
|
|
|
.unwrap();
|
2021-02-17 13:47:18 -05:00
|
|
|
let specifier =
|
2021-08-11 10:20:47 -04:00
|
|
|
resolve_url("http://localhost:4545/subdir/mismatch_ext.ts").unwrap();
|
2020-11-05 19:38:21 -05:00
|
|
|
let cache_filename = file_fetcher_01
|
|
|
|
.http_cache
|
2021-02-17 13:47:18 -05:00
|
|
|
.get_cache_filename(&specifier)
|
2021-02-15 04:32:06 -05:00
|
|
|
.unwrap();
|
2019-07-31 07:58:41 -04:00
|
|
|
|
2020-11-05 19:38:21 -05:00
|
|
|
let result = file_fetcher_01
|
2021-04-11 22:15:43 -04:00
|
|
|
.fetch(&specifier, &mut Permissions::allow_all())
|
2020-05-11 07:13:27 -04:00
|
|
|
.await;
|
2020-11-05 19:38:21 -05:00
|
|
|
assert!(result.is_ok());
|
2019-11-22 12:46:57 -05:00
|
|
|
|
2020-11-05 19:38:21 -05:00
|
|
|
let metadata_filename =
|
2020-02-28 13:15:31 -05:00
|
|
|
crate::http_cache::Metadata::filename(&cache_filename);
|
2021-11-15 19:59:19 -05:00
|
|
|
let metadata_file = fs::File::open(metadata_filename).unwrap();
|
2020-11-05 19:38:21 -05:00
|
|
|
let metadata_file_metadata = metadata_file.metadata().unwrap();
|
|
|
|
let metadata_file_modified_01 = metadata_file_metadata.modified().unwrap();
|
|
|
|
|
|
|
|
let file_fetcher_02 = FileFetcher::new(
|
|
|
|
HttpCache::new(&location),
|
|
|
|
CacheSetting::Use,
|
|
|
|
true,
|
|
|
|
None,
|
2021-07-05 09:34:37 -04:00
|
|
|
BlobStore::default(),
|
2021-08-09 10:53:21 -04:00
|
|
|
None,
|
2020-11-05 19:38:21 -05:00
|
|
|
)
|
2021-11-15 19:59:19 -05:00
|
|
|
.unwrap();
|
2020-11-05 19:38:21 -05:00
|
|
|
let result = file_fetcher_02
|
2021-04-11 22:15:43 -04:00
|
|
|
.fetch(&specifier, &mut Permissions::allow_all())
|
2020-05-11 07:13:27 -04:00
|
|
|
.await;
|
2019-11-22 12:46:57 -05:00
|
|
|
assert!(result.is_ok());
|
|
|
|
|
2020-11-05 19:38:21 -05:00
|
|
|
let metadata_filename =
|
|
|
|
crate::http_cache::Metadata::filename(&cache_filename);
|
2021-11-15 19:59:19 -05:00
|
|
|
let metadata_file = fs::File::open(metadata_filename).unwrap();
|
2020-11-05 19:38:21 -05:00
|
|
|
let metadata_file_metadata = metadata_file.metadata().unwrap();
|
|
|
|
let metadata_file_modified_02 = metadata_file_metadata.modified().unwrap();
|
|
|
|
|
|
|
|
assert_eq!(metadata_file_modified_01, metadata_file_modified_02);
|
2019-07-31 07:58:41 -04:00
|
|
|
}
|
|
|
|
|
2020-02-03 08:53:50 -05:00
|
|
|
#[tokio::test]
|
2020-11-05 19:38:21 -05:00
|
|
|
async fn test_fetch_redirected() {
|
2020-08-10 17:31:05 -04:00
|
|
|
let _http_server_guard = test_util::http_server();
|
2020-11-05 19:38:21 -05:00
|
|
|
let (file_fetcher, _) = setup(CacheSetting::Use, None);
|
2021-08-11 10:20:47 -04:00
|
|
|
let specifier =
|
|
|
|
resolve_url("http://localhost:4546/subdir/redirects/redirect1.js")
|
|
|
|
.unwrap();
|
2020-11-05 19:38:21 -05:00
|
|
|
let cached_filename = file_fetcher
|
|
|
|
.http_cache
|
2021-02-17 13:47:18 -05:00
|
|
|
.get_cache_filename(&specifier)
|
2021-02-15 04:32:06 -05:00
|
|
|
.unwrap();
|
2021-08-11 10:20:47 -04:00
|
|
|
let redirected_specifier =
|
|
|
|
resolve_url("http://localhost:4545/subdir/redirects/redirect1.js")
|
|
|
|
.unwrap();
|
2020-11-05 19:38:21 -05:00
|
|
|
let redirected_cached_filename = file_fetcher
|
|
|
|
.http_cache
|
2021-02-17 13:47:18 -05:00
|
|
|
.get_cache_filename(&redirected_specifier)
|
2021-02-15 04:32:06 -05:00
|
|
|
.unwrap();
|
2020-11-05 19:38:21 -05:00
|
|
|
|
|
|
|
let result = file_fetcher
|
2021-04-11 22:15:43 -04:00
|
|
|
.fetch(&specifier, &mut Permissions::allow_all())
|
2020-02-03 08:53:50 -05:00
|
|
|
.await;
|
|
|
|
assert!(result.is_ok());
|
2020-11-05 19:38:21 -05:00
|
|
|
let file = result.unwrap();
|
|
|
|
assert_eq!(file.specifier, redirected_specifier);
|
|
|
|
|
|
|
|
assert_eq!(
|
|
|
|
fs::read_to_string(cached_filename).unwrap(),
|
|
|
|
"",
|
|
|
|
"redirected files should have empty cached contents"
|
|
|
|
);
|
2021-12-09 06:16:17 -05:00
|
|
|
let (_, headers, _) = file_fetcher.http_cache.get(&specifier).unwrap();
|
2020-02-03 08:53:50 -05:00
|
|
|
assert_eq!(
|
2020-09-16 07:34:16 -04:00
|
|
|
headers.get("location").unwrap(),
|
2021-08-11 10:20:47 -04:00
|
|
|
"http://localhost:4545/subdir/redirects/redirect1.js"
|
2020-02-03 08:53:50 -05:00
|
|
|
);
|
2020-11-05 19:38:21 -05:00
|
|
|
|
2020-02-03 08:53:50 -05:00
|
|
|
assert_eq!(
|
2020-11-05 19:38:21 -05:00
|
|
|
fs::read_to_string(redirected_cached_filename).unwrap(),
|
2020-02-03 08:53:50 -05:00
|
|
|
"export const redirect = 1;\n"
|
|
|
|
);
|
2021-12-09 06:16:17 -05:00
|
|
|
let (_, headers, _) =
|
2021-11-15 19:59:19 -05:00
|
|
|
file_fetcher.http_cache.get(&redirected_specifier).unwrap();
|
2020-02-19 08:17:13 -05:00
|
|
|
assert!(headers.get("location").is_none());
|
2019-07-31 07:58:41 -04:00
|
|
|
}
|
|
|
|
|
2020-02-03 08:53:50 -05:00
|
|
|
#[tokio::test]
|
2020-11-05 19:38:21 -05:00
|
|
|
async fn test_fetch_multiple_redirects() {
|
2020-08-10 17:31:05 -04:00
|
|
|
let _http_server_guard = test_util::http_server();
|
2020-11-05 19:38:21 -05:00
|
|
|
let (file_fetcher, _) = setup(CacheSetting::Use, None);
|
2021-08-11 10:20:47 -04:00
|
|
|
let specifier =
|
|
|
|
resolve_url("http://localhost:4548/subdir/redirects/redirect1.js")
|
|
|
|
.unwrap();
|
2020-11-05 19:38:21 -05:00
|
|
|
let cached_filename = file_fetcher
|
|
|
|
.http_cache
|
2021-02-17 13:47:18 -05:00
|
|
|
.get_cache_filename(&specifier)
|
2021-02-15 04:32:06 -05:00
|
|
|
.unwrap();
|
2021-08-11 10:20:47 -04:00
|
|
|
let redirected_01_specifier =
|
|
|
|
resolve_url("http://localhost:4546/subdir/redirects/redirect1.js")
|
|
|
|
.unwrap();
|
2020-11-05 19:38:21 -05:00
|
|
|
let redirected_01_cached_filename = file_fetcher
|
|
|
|
.http_cache
|
2021-02-17 13:47:18 -05:00
|
|
|
.get_cache_filename(&redirected_01_specifier)
|
2021-02-15 04:32:06 -05:00
|
|
|
.unwrap();
|
2021-08-11 10:20:47 -04:00
|
|
|
let redirected_02_specifier =
|
|
|
|
resolve_url("http://localhost:4545/subdir/redirects/redirect1.js")
|
|
|
|
.unwrap();
|
2020-11-05 19:38:21 -05:00
|
|
|
let redirected_02_cached_filename = file_fetcher
|
|
|
|
.http_cache
|
2021-02-17 13:47:18 -05:00
|
|
|
.get_cache_filename(&redirected_02_specifier)
|
2021-02-15 04:32:06 -05:00
|
|
|
.unwrap();
|
2020-11-05 19:38:21 -05:00
|
|
|
|
|
|
|
let result = file_fetcher
|
2021-04-11 22:15:43 -04:00
|
|
|
.fetch(&specifier, &mut Permissions::allow_all())
|
2020-02-03 08:53:50 -05:00
|
|
|
.await;
|
|
|
|
assert!(result.is_ok());
|
2020-11-05 19:38:21 -05:00
|
|
|
let file = result.unwrap();
|
|
|
|
assert_eq!(file.specifier, redirected_02_specifier);
|
2020-02-03 08:53:50 -05:00
|
|
|
|
2020-11-05 19:38:21 -05:00
|
|
|
assert_eq!(
|
|
|
|
fs::read_to_string(cached_filename).unwrap(),
|
|
|
|
"",
|
|
|
|
"redirected files should have empty cached contents"
|
|
|
|
);
|
2021-12-09 06:16:17 -05:00
|
|
|
let (_, headers, _) = file_fetcher.http_cache.get(&specifier).unwrap();
|
2020-11-05 19:38:21 -05:00
|
|
|
assert_eq!(
|
|
|
|
headers.get("location").unwrap(),
|
2021-08-11 10:20:47 -04:00
|
|
|
"http://localhost:4546/subdir/redirects/redirect1.js"
|
2020-11-05 19:38:21 -05:00
|
|
|
);
|
2020-02-19 08:17:13 -05:00
|
|
|
|
2020-11-05 19:38:21 -05:00
|
|
|
assert_eq!(
|
|
|
|
fs::read_to_string(redirected_01_cached_filename).unwrap(),
|
|
|
|
"",
|
|
|
|
"redirected files should have empty cached contents"
|
|
|
|
);
|
2021-12-09 06:16:17 -05:00
|
|
|
let (_, headers, _) = file_fetcher
|
2020-11-05 19:38:21 -05:00
|
|
|
.http_cache
|
2021-02-17 13:47:18 -05:00
|
|
|
.get(&redirected_01_specifier)
|
2021-11-15 19:59:19 -05:00
|
|
|
.unwrap();
|
2020-11-05 19:38:21 -05:00
|
|
|
assert_eq!(
|
|
|
|
headers.get("location").unwrap(),
|
2021-08-11 10:20:47 -04:00
|
|
|
"http://localhost:4545/subdir/redirects/redirect1.js"
|
2020-11-05 19:38:21 -05:00
|
|
|
);
|
2020-02-03 08:53:50 -05:00
|
|
|
|
|
|
|
assert_eq!(
|
2020-11-05 19:38:21 -05:00
|
|
|
fs::read_to_string(redirected_02_cached_filename).unwrap(),
|
2020-02-03 08:53:50 -05:00
|
|
|
"export const redirect = 1;\n"
|
|
|
|
);
|
2021-12-09 06:16:17 -05:00
|
|
|
let (_, headers, _) = file_fetcher
|
2020-11-05 19:38:21 -05:00
|
|
|
.http_cache
|
2021-02-17 13:47:18 -05:00
|
|
|
.get(&redirected_02_specifier)
|
2021-11-15 19:59:19 -05:00
|
|
|
.unwrap();
|
2020-02-19 08:17:13 -05:00
|
|
|
assert!(headers.get("location").is_none());
|
2019-07-31 07:58:41 -04:00
|
|
|
}
|
|
|
|
|
2020-02-03 08:53:50 -05:00
|
|
|
#[tokio::test]
|
2020-11-05 19:38:21 -05:00
|
|
|
async fn test_fetch_uses_cache_with_redirects() {
|
2020-08-10 17:31:05 -04:00
|
|
|
let _http_server_guard = test_util::http_server();
|
2022-04-01 11:15:37 -04:00
|
|
|
let temp_dir = TempDir::new();
|
2021-11-15 19:59:19 -05:00
|
|
|
let location = temp_dir.path().join("deps");
|
2020-11-05 19:38:21 -05:00
|
|
|
let file_fetcher_01 = FileFetcher::new(
|
|
|
|
HttpCache::new(&location),
|
|
|
|
CacheSetting::Use,
|
|
|
|
true,
|
|
|
|
None,
|
2021-07-05 09:34:37 -04:00
|
|
|
BlobStore::default(),
|
2021-08-09 10:53:21 -04:00
|
|
|
None,
|
2020-11-05 19:38:21 -05:00
|
|
|
)
|
2021-11-15 19:59:19 -05:00
|
|
|
.unwrap();
|
2021-02-17 13:47:18 -05:00
|
|
|
let specifier =
|
2021-08-11 10:20:47 -04:00
|
|
|
resolve_url("http://localhost:4548/subdir/mismatch_ext.ts").unwrap();
|
2021-02-17 13:47:18 -05:00
|
|
|
let redirected_specifier =
|
2021-08-11 10:20:47 -04:00
|
|
|
resolve_url("http://localhost:4546/subdir/mismatch_ext.ts").unwrap();
|
2020-11-05 19:38:21 -05:00
|
|
|
let redirected_cache_filename = file_fetcher_01
|
|
|
|
.http_cache
|
2021-02-17 13:47:18 -05:00
|
|
|
.get_cache_filename(&redirected_specifier)
|
2021-02-15 04:32:06 -05:00
|
|
|
.unwrap();
|
2019-07-31 07:58:41 -04:00
|
|
|
|
2020-11-05 19:38:21 -05:00
|
|
|
let result = file_fetcher_01
|
2021-04-11 22:15:43 -04:00
|
|
|
.fetch(&specifier, &mut Permissions::allow_all())
|
2020-02-03 08:53:50 -05:00
|
|
|
.await;
|
|
|
|
assert!(result.is_ok());
|
2020-11-05 19:38:21 -05:00
|
|
|
|
|
|
|
let metadata_filename =
|
|
|
|
crate::http_cache::Metadata::filename(&redirected_cache_filename);
|
2021-11-15 19:59:19 -05:00
|
|
|
let metadata_file = fs::File::open(metadata_filename).unwrap();
|
2020-11-05 19:38:21 -05:00
|
|
|
let metadata_file_metadata = metadata_file.metadata().unwrap();
|
|
|
|
let metadata_file_modified_01 = metadata_file_metadata.modified().unwrap();
|
|
|
|
|
|
|
|
let file_fetcher_02 = FileFetcher::new(
|
|
|
|
HttpCache::new(&location),
|
|
|
|
CacheSetting::Use,
|
|
|
|
true,
|
|
|
|
None,
|
2021-07-05 09:34:37 -04:00
|
|
|
BlobStore::default(),
|
2021-08-09 10:53:21 -04:00
|
|
|
None,
|
2020-11-05 19:38:21 -05:00
|
|
|
)
|
2021-11-15 19:59:19 -05:00
|
|
|
.unwrap();
|
2020-11-05 19:38:21 -05:00
|
|
|
let result = file_fetcher_02
|
2021-04-11 22:15:43 -04:00
|
|
|
.fetch(&redirected_specifier, &mut Permissions::allow_all())
|
2020-02-03 08:53:50 -05:00
|
|
|
.await;
|
|
|
|
assert!(result.is_ok());
|
|
|
|
|
2020-11-05 19:38:21 -05:00
|
|
|
let metadata_filename =
|
|
|
|
crate::http_cache::Metadata::filename(&redirected_cache_filename);
|
2021-11-15 19:59:19 -05:00
|
|
|
let metadata_file = fs::File::open(metadata_filename).unwrap();
|
2020-11-05 19:38:21 -05:00
|
|
|
let metadata_file_metadata = metadata_file.metadata().unwrap();
|
|
|
|
let metadata_file_modified_02 = metadata_file_metadata.modified().unwrap();
|
|
|
|
|
|
|
|
assert_eq!(metadata_file_modified_01, metadata_file_modified_02);
|
2019-07-31 07:58:41 -04:00
|
|
|
}
|
|
|
|
|
2020-02-03 08:53:50 -05:00
|
|
|
#[tokio::test]
|
2020-11-05 19:38:21 -05:00
|
|
|
async fn test_fetcher_limits_redirects() {
|
2020-08-10 17:31:05 -04:00
|
|
|
let _http_server_guard = test_util::http_server();
|
2020-11-05 19:38:21 -05:00
|
|
|
let (file_fetcher, _) = setup(CacheSetting::Use, None);
|
2021-08-11 10:20:47 -04:00
|
|
|
let specifier =
|
|
|
|
resolve_url("http://localhost:4548/subdir/redirects/redirect1.js")
|
|
|
|
.unwrap();
|
2019-10-06 15:03:30 -04:00
|
|
|
|
2020-11-05 19:38:21 -05:00
|
|
|
let result = file_fetcher
|
2021-12-20 21:40:22 -05:00
|
|
|
.fetch_remote(&specifier, &mut Permissions::allow_all(), 2, None)
|
2020-02-03 08:53:50 -05:00
|
|
|
.await;
|
|
|
|
assert!(result.is_ok());
|
|
|
|
|
2020-11-05 19:38:21 -05:00
|
|
|
let result = file_fetcher
|
2021-12-20 21:40:22 -05:00
|
|
|
.fetch_remote(&specifier, &mut Permissions::allow_all(), 1, None)
|
2020-02-03 08:53:50 -05:00
|
|
|
.await;
|
|
|
|
assert!(result.is_err());
|
2020-06-15 17:46:48 -04:00
|
|
|
|
2020-11-05 19:38:21 -05:00
|
|
|
let result = file_fetcher.fetch_cached(&specifier, 2);
|
2020-06-15 17:46:48 -04:00
|
|
|
assert!(result.is_ok());
|
|
|
|
|
2020-11-05 19:38:21 -05:00
|
|
|
let result = file_fetcher.fetch_cached(&specifier, 1);
|
2020-06-15 17:46:48 -04:00
|
|
|
assert!(result.is_err());
|
2019-07-31 07:58:41 -04:00
|
|
|
}
|
|
|
|
|
2020-02-28 09:04:18 -05:00
|
|
|
#[tokio::test]
|
2020-11-05 19:38:21 -05:00
|
|
|
async fn test_fetch_same_host_redirect() {
|
2020-08-10 17:31:05 -04:00
|
|
|
let _http_server_guard = test_util::http_server();
|
2020-11-05 19:38:21 -05:00
|
|
|
let (file_fetcher, _) = setup(CacheSetting::Use, None);
|
2021-02-17 13:47:18 -05:00
|
|
|
let specifier = resolve_url(
|
2021-08-11 10:20:47 -04:00
|
|
|
"http://localhost:4550/REDIRECT/subdir/redirects/redirect1.js",
|
2020-02-28 09:04:18 -05:00
|
|
|
)
|
|
|
|
.unwrap();
|
2020-11-05 19:38:21 -05:00
|
|
|
let cached_filename = file_fetcher
|
|
|
|
.http_cache
|
2021-02-17 13:47:18 -05:00
|
|
|
.get_cache_filename(&specifier)
|
2021-02-15 04:32:06 -05:00
|
|
|
.unwrap();
|
2021-08-11 10:20:47 -04:00
|
|
|
let redirected_specifier =
|
|
|
|
resolve_url("http://localhost:4550/subdir/redirects/redirect1.js")
|
|
|
|
.unwrap();
|
2020-11-05 19:38:21 -05:00
|
|
|
let redirected_cached_filename = file_fetcher
|
|
|
|
.http_cache
|
2021-02-17 13:47:18 -05:00
|
|
|
.get_cache_filename(&redirected_specifier)
|
2021-02-15 04:32:06 -05:00
|
|
|
.unwrap();
|
2020-11-05 19:38:21 -05:00
|
|
|
|
|
|
|
let result = file_fetcher
|
2021-04-11 22:15:43 -04:00
|
|
|
.fetch(&specifier, &mut Permissions::allow_all())
|
2020-02-28 09:04:18 -05:00
|
|
|
.await;
|
|
|
|
assert!(result.is_ok());
|
2020-11-05 19:38:21 -05:00
|
|
|
let file = result.unwrap();
|
|
|
|
assert_eq!(file.specifier, redirected_specifier);
|
|
|
|
|
|
|
|
assert_eq!(
|
|
|
|
fs::read_to_string(cached_filename).unwrap(),
|
|
|
|
"",
|
|
|
|
"redirected files should have empty cached contents"
|
|
|
|
);
|
2021-12-09 06:16:17 -05:00
|
|
|
let (_, headers, _) = file_fetcher.http_cache.get(&specifier).unwrap();
|
2020-02-28 09:04:18 -05:00
|
|
|
assert_eq!(
|
2020-09-16 07:34:16 -04:00
|
|
|
headers.get("location").unwrap(),
|
2021-08-11 10:20:47 -04:00
|
|
|
"/subdir/redirects/redirect1.js"
|
2020-02-28 09:04:18 -05:00
|
|
|
);
|
2020-11-05 19:38:21 -05:00
|
|
|
|
2020-02-28 09:04:18 -05:00
|
|
|
assert_eq!(
|
2020-11-05 19:38:21 -05:00
|
|
|
fs::read_to_string(redirected_cached_filename).unwrap(),
|
2020-02-28 09:04:18 -05:00
|
|
|
"export const redirect = 1;\n"
|
|
|
|
);
|
2021-12-09 06:16:17 -05:00
|
|
|
let (_, headers, _) =
|
2021-11-15 19:59:19 -05:00
|
|
|
file_fetcher.http_cache.get(&redirected_specifier).unwrap();
|
2020-02-28 09:04:18 -05:00
|
|
|
assert!(headers.get("location").is_none());
|
|
|
|
}
|
|
|
|
|
2020-02-03 08:53:50 -05:00
|
|
|
#[tokio::test]
|
2020-11-05 19:38:21 -05:00
|
|
|
async fn test_fetch_no_remote() {
|
2020-08-10 17:31:05 -04:00
|
|
|
let _http_server_guard = test_util::http_server();
|
2022-04-01 11:15:37 -04:00
|
|
|
let temp_dir = TempDir::new();
|
2020-11-05 19:38:21 -05:00
|
|
|
let location = temp_dir.path().join("deps");
|
|
|
|
let file_fetcher = FileFetcher::new(
|
|
|
|
HttpCache::new(&location),
|
|
|
|
CacheSetting::Use,
|
|
|
|
false,
|
|
|
|
None,
|
2021-07-05 09:34:37 -04:00
|
|
|
BlobStore::default(),
|
2021-08-09 10:53:21 -04:00
|
|
|
None,
|
2020-11-05 19:38:21 -05:00
|
|
|
)
|
2021-11-15 19:59:19 -05:00
|
|
|
.unwrap();
|
2021-08-11 10:20:47 -04:00
|
|
|
let specifier = resolve_url("http://localhost:4545/002_hello.ts").unwrap();
|
2019-12-03 17:48:53 -05:00
|
|
|
|
2020-11-05 19:38:21 -05:00
|
|
|
let result = file_fetcher
|
2021-04-11 22:15:43 -04:00
|
|
|
.fetch(&specifier, &mut Permissions::allow_all())
|
2020-02-03 08:53:50 -05:00
|
|
|
.await;
|
|
|
|
assert!(result.is_err());
|
2020-11-05 19:38:21 -05:00
|
|
|
let err = result.unwrap_err();
|
|
|
|
assert_eq!(get_custom_error_class(&err), Some("NoRemote"));
|
2021-08-11 10:20:47 -04:00
|
|
|
assert_eq!(err.to_string(), "A remote specifier was requested: \"http://localhost:4545/002_hello.ts\", but --no-remote is specified.");
|
2019-07-31 07:58:41 -04:00
|
|
|
}
|
|
|
|
|
2020-02-03 08:53:50 -05:00
|
|
|
#[tokio::test]
|
2020-11-05 19:38:21 -05:00
|
|
|
async fn test_fetch_cache_only() {
|
2020-08-10 17:31:05 -04:00
|
|
|
let _http_server_guard = test_util::http_server();
|
2022-04-01 11:15:37 -04:00
|
|
|
let temp_dir = TempDir::new();
|
2021-11-15 19:59:19 -05:00
|
|
|
let location = temp_dir.path().join("deps");
|
2020-11-05 19:38:21 -05:00
|
|
|
let file_fetcher_01 = FileFetcher::new(
|
|
|
|
HttpCache::new(&location),
|
|
|
|
CacheSetting::Only,
|
|
|
|
true,
|
|
|
|
None,
|
2021-07-05 09:34:37 -04:00
|
|
|
BlobStore::default(),
|
2021-08-09 10:53:21 -04:00
|
|
|
None,
|
2020-11-05 19:38:21 -05:00
|
|
|
)
|
2021-11-15 19:59:19 -05:00
|
|
|
.unwrap();
|
2020-11-05 19:38:21 -05:00
|
|
|
let file_fetcher_02 = FileFetcher::new(
|
|
|
|
HttpCache::new(&location),
|
|
|
|
CacheSetting::Use,
|
|
|
|
true,
|
|
|
|
None,
|
2021-07-05 09:34:37 -04:00
|
|
|
BlobStore::default(),
|
2021-08-09 10:53:21 -04:00
|
|
|
None,
|
2020-11-05 19:38:21 -05:00
|
|
|
)
|
2021-11-15 19:59:19 -05:00
|
|
|
.unwrap();
|
2021-08-11 10:20:47 -04:00
|
|
|
let specifier = resolve_url("http://localhost:4545/002_hello.ts").unwrap();
|
2019-07-31 07:58:41 -04:00
|
|
|
|
2020-11-05 19:38:21 -05:00
|
|
|
let result = file_fetcher_01
|
2021-04-11 22:15:43 -04:00
|
|
|
.fetch(&specifier, &mut Permissions::allow_all())
|
2020-02-03 08:53:50 -05:00
|
|
|
.await;
|
2020-11-05 19:38:21 -05:00
|
|
|
assert!(result.is_err());
|
|
|
|
let err = result.unwrap_err();
|
2021-12-22 08:25:06 -05:00
|
|
|
assert_eq!(get_custom_error_class(&err), Some("NotCached"));
|
2021-08-11 10:20:47 -04:00
|
|
|
assert_eq!(err.to_string(), "Specifier not found in cache: \"http://localhost:4545/002_hello.ts\", --cached-only is specified.");
|
2020-06-24 14:12:04 -04:00
|
|
|
|
2020-11-05 19:38:21 -05:00
|
|
|
let result = file_fetcher_02
|
2021-04-11 22:15:43 -04:00
|
|
|
.fetch(&specifier, &mut Permissions::allow_all())
|
2020-02-03 08:53:50 -05:00
|
|
|
.await;
|
|
|
|
assert!(result.is_ok());
|
2020-02-19 08:17:13 -05:00
|
|
|
|
2020-11-05 19:38:21 -05:00
|
|
|
let result = file_fetcher_01
|
2021-04-11 22:15:43 -04:00
|
|
|
.fetch(&specifier, &mut Permissions::allow_all())
|
2020-02-03 08:53:50 -05:00
|
|
|
.await;
|
|
|
|
assert!(result.is_ok());
|
2020-08-03 17:39:48 -04:00
|
|
|
}
|
|
|
|
|
2020-11-15 21:19:31 -05:00
|
|
|
#[tokio::test]
|
|
|
|
async fn test_fetch_local_bypasses_file_cache() {
|
|
|
|
let (file_fetcher, temp_dir) = setup(CacheSetting::Use, None);
|
|
|
|
let fixture_path = temp_dir.path().join("mod.ts");
|
|
|
|
let specifier =
|
2021-02-17 13:47:18 -05:00
|
|
|
resolve_url_or_path(&fixture_path.to_string_lossy()).unwrap();
|
2021-11-15 19:59:19 -05:00
|
|
|
fs::write(fixture_path.clone(), r#"console.log("hello deno");"#).unwrap();
|
2020-11-15 21:19:31 -05:00
|
|
|
let result = file_fetcher
|
2021-04-11 22:15:43 -04:00
|
|
|
.fetch(&specifier, &mut Permissions::allow_all())
|
2020-11-15 21:19:31 -05:00
|
|
|
.await;
|
|
|
|
assert!(result.is_ok());
|
|
|
|
let file = result.unwrap();
|
2022-05-20 16:40:55 -04:00
|
|
|
assert_eq!(&*file.source, r#"console.log("hello deno");"#);
|
2020-11-15 21:19:31 -05:00
|
|
|
|
2021-11-15 19:59:19 -05:00
|
|
|
fs::write(fixture_path, r#"console.log("goodbye deno");"#).unwrap();
|
2020-11-15 21:19:31 -05:00
|
|
|
let result = file_fetcher
|
2021-04-11 22:15:43 -04:00
|
|
|
.fetch(&specifier, &mut Permissions::allow_all())
|
2020-11-15 21:19:31 -05:00
|
|
|
.await;
|
|
|
|
assert!(result.is_ok());
|
|
|
|
let file = result.unwrap();
|
2022-05-20 16:40:55 -04:00
|
|
|
assert_eq!(&*file.source, r#"console.log("goodbye deno");"#);
|
2020-11-15 21:19:31 -05:00
|
|
|
}
|
|
|
|
|
2021-12-09 06:16:17 -05:00
|
|
|
#[tokio::test]
|
|
|
|
async fn test_respect_cache_revalidates() {
|
|
|
|
let _g = test_util::http_server();
|
2022-04-01 11:15:37 -04:00
|
|
|
let temp_dir = TempDir::new();
|
2021-12-09 06:16:17 -05:00
|
|
|
let (file_fetcher, _) =
|
|
|
|
setup(CacheSetting::RespectHeaders, Some(temp_dir.clone()));
|
|
|
|
let specifier =
|
|
|
|
ModuleSpecifier::parse("http://localhost:4545/dynamic").unwrap();
|
|
|
|
let result = file_fetcher
|
|
|
|
.fetch(&specifier, &mut Permissions::allow_all())
|
|
|
|
.await;
|
|
|
|
assert!(result.is_ok());
|
|
|
|
let file = result.unwrap();
|
2022-05-20 16:40:55 -04:00
|
|
|
let first = file.source;
|
2021-12-09 06:16:17 -05:00
|
|
|
|
|
|
|
let (file_fetcher, _) =
|
|
|
|
setup(CacheSetting::RespectHeaders, Some(temp_dir.clone()));
|
|
|
|
let result = file_fetcher
|
|
|
|
.fetch(&specifier, &mut Permissions::allow_all())
|
|
|
|
.await;
|
|
|
|
assert!(result.is_ok());
|
|
|
|
let file = result.unwrap();
|
2022-05-20 16:40:55 -04:00
|
|
|
let second = file.source;
|
2021-12-09 06:16:17 -05:00
|
|
|
|
|
|
|
assert_ne!(first, second);
|
|
|
|
}
|
|
|
|
|
|
|
|
#[tokio::test]
|
|
|
|
async fn test_respect_cache_still_fresh() {
|
|
|
|
let _g = test_util::http_server();
|
2022-04-01 11:15:37 -04:00
|
|
|
let temp_dir = TempDir::new();
|
2021-12-09 06:16:17 -05:00
|
|
|
let (file_fetcher, _) =
|
|
|
|
setup(CacheSetting::RespectHeaders, Some(temp_dir.clone()));
|
|
|
|
let specifier =
|
|
|
|
ModuleSpecifier::parse("http://localhost:4545/dynamic_cache").unwrap();
|
|
|
|
let result = file_fetcher
|
|
|
|
.fetch(&specifier, &mut Permissions::allow_all())
|
|
|
|
.await;
|
|
|
|
assert!(result.is_ok());
|
|
|
|
let file = result.unwrap();
|
2022-05-20 16:40:55 -04:00
|
|
|
let first = file.source;
|
2021-12-09 06:16:17 -05:00
|
|
|
|
|
|
|
let (file_fetcher, _) =
|
|
|
|
setup(CacheSetting::RespectHeaders, Some(temp_dir.clone()));
|
|
|
|
let result = file_fetcher
|
|
|
|
.fetch(&specifier, &mut Permissions::allow_all())
|
|
|
|
.await;
|
|
|
|
assert!(result.is_ok());
|
|
|
|
let file = result.unwrap();
|
2022-05-20 16:40:55 -04:00
|
|
|
let second = file.source;
|
2021-12-09 06:16:17 -05:00
|
|
|
|
|
|
|
assert_eq!(first, second);
|
|
|
|
}
|
|
|
|
|
2020-08-03 17:39:48 -04:00
|
|
|
#[tokio::test]
|
2020-11-05 19:38:21 -05:00
|
|
|
async fn test_fetch_local_utf_16be() {
|
|
|
|
let expected = String::from_utf8(
|
|
|
|
b"\xEF\xBB\xBFconsole.log(\"Hello World\");\x0A".to_vec(),
|
2020-08-03 17:39:48 -04:00
|
|
|
)
|
2020-11-05 19:38:21 -05:00
|
|
|
.unwrap();
|
|
|
|
test_fetch_local_encoded("utf-16be", expected).await;
|
2020-08-03 17:39:48 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
#[tokio::test]
|
2020-11-05 19:38:21 -05:00
|
|
|
async fn test_fetch_local_utf_16le() {
|
|
|
|
let expected = String::from_utf8(
|
|
|
|
b"\xEF\xBB\xBFconsole.log(\"Hello World\");\x0A".to_vec(),
|
2020-08-03 17:39:48 -04:00
|
|
|
)
|
2020-11-05 19:38:21 -05:00
|
|
|
.unwrap();
|
|
|
|
test_fetch_local_encoded("utf-16le", expected).await;
|
2020-08-03 17:39:48 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
#[tokio::test]
|
2020-11-05 19:38:21 -05:00
|
|
|
async fn test_fetch_local_utf8_with_bom() {
|
|
|
|
let expected = String::from_utf8(
|
|
|
|
b"\xEF\xBB\xBFconsole.log(\"Hello World\");\x0A".to_vec(),
|
2020-08-03 17:39:48 -04:00
|
|
|
)
|
2020-11-05 19:38:21 -05:00
|
|
|
.unwrap();
|
|
|
|
test_fetch_local_encoded("utf-8", expected).await;
|
2020-01-11 05:11:05 -05:00
|
|
|
}
|
2020-01-26 13:59:41 -05:00
|
|
|
|
2020-02-03 08:53:50 -05:00
|
|
|
#[tokio::test]
|
2021-05-12 19:07:22 -04:00
|
|
|
async fn test_fetch_remote_javascript_with_types() {
|
2021-02-17 13:47:18 -05:00
|
|
|
let specifier =
|
|
|
|
resolve_url_or_path("http://127.0.0.1:4545/xTypeScriptTypes.js").unwrap();
|
2020-11-05 19:38:21 -05:00
|
|
|
let (file, _) = test_fetch_remote(&specifier).await;
|
2020-02-03 08:53:50 -05:00
|
|
|
assert_eq!(
|
2020-11-05 19:38:21 -05:00
|
|
|
file.maybe_types,
|
2020-06-19 06:27:15 -04:00
|
|
|
Some("./xTypeScriptTypes.d.ts".to_string())
|
2020-02-03 08:53:50 -05:00
|
|
|
);
|
2020-01-26 13:59:41 -05:00
|
|
|
}
|
2020-08-03 17:39:48 -04:00
|
|
|
|
2021-05-12 19:07:22 -04:00
|
|
|
#[tokio::test]
|
|
|
|
async fn test_fetch_remote_jsx_with_types() {
|
|
|
|
let specifier =
|
|
|
|
resolve_url_or_path("http://127.0.0.1:4545/xTypeScriptTypes.jsx")
|
|
|
|
.unwrap();
|
|
|
|
let (file, _) = test_fetch_remote(&specifier).await;
|
|
|
|
assert_eq!(file.media_type, MediaType::Jsx,);
|
|
|
|
assert_eq!(
|
|
|
|
file.maybe_types,
|
|
|
|
Some("./xTypeScriptTypes.d.ts".to_string())
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
#[tokio::test]
|
|
|
|
async fn test_fetch_remote_typescript_with_types() {
|
|
|
|
let specifier =
|
|
|
|
resolve_url_or_path("http://127.0.0.1:4545/xTypeScriptTypes.ts").unwrap();
|
|
|
|
let (file, _) = test_fetch_remote(&specifier).await;
|
|
|
|
assert_eq!(file.maybe_types, None);
|
|
|
|
}
|
|
|
|
|
2020-08-03 17:39:48 -04:00
|
|
|
#[tokio::test]
|
2020-11-05 19:38:21 -05:00
|
|
|
async fn test_fetch_remote_utf16_le() {
|
|
|
|
let expected =
|
2020-08-03 17:39:48 -04:00
|
|
|
std::str::from_utf8(b"\xEF\xBB\xBFconsole.log(\"Hello World\");\x0A")
|
|
|
|
.unwrap();
|
2020-11-05 19:38:21 -05:00
|
|
|
test_fetch_remote_encoded("utf-16le.ts", "utf-16le", expected).await;
|
2020-08-03 17:39:48 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
#[tokio::test]
|
2020-11-05 19:38:21 -05:00
|
|
|
async fn test_fetch_remote_utf16_be() {
|
|
|
|
let expected =
|
2020-08-03 17:39:48 -04:00
|
|
|
std::str::from_utf8(b"\xEF\xBB\xBFconsole.log(\"Hello World\");\x0A")
|
|
|
|
.unwrap();
|
2020-11-05 19:38:21 -05:00
|
|
|
test_fetch_remote_encoded("utf-16be.ts", "utf-16be", expected).await;
|
2020-08-03 17:39:48 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
#[tokio::test]
|
2020-11-05 19:38:21 -05:00
|
|
|
async fn test_fetch_remote_window_1255() {
|
|
|
|
let expected = "console.log(\"\u{5E9}\u{5DC}\u{5D5}\u{5DD} \
|
2020-08-03 17:39:48 -04:00
|
|
|
\u{5E2}\u{5D5}\u{5DC}\u{5DD}\");\u{A}";
|
2020-11-05 19:38:21 -05:00
|
|
|
test_fetch_remote_encoded("windows-1255", "windows-1255", expected).await;
|
2020-08-03 17:39:48 -04:00
|
|
|
}
|
2019-07-31 07:58:41 -04:00
|
|
|
}
|