2019-06-19 22:07:01 -04:00
|
|
|
// Copyright 2018-2019 the Deno authors. All rights reserved. MIT license.
|
2019-06-25 16:14:36 -04:00
|
|
|
use crate::deno_dir;
|
2019-06-19 22:07:01 -04:00
|
|
|
use crate::diagnostics;
|
|
|
|
use crate::fmt_errors::JSErrorColor;
|
|
|
|
use crate::import_map;
|
|
|
|
pub use crate::msg::ErrorKind;
|
|
|
|
use crate::resolve_addr::ResolveAddrError;
|
|
|
|
use crate::source_maps::apply_source_map;
|
|
|
|
use crate::source_maps::SourceMapGetter;
|
|
|
|
use deno::JSError;
|
2019-06-30 13:45:59 -04:00
|
|
|
use deno::ModuleResolutionError;
|
2019-06-19 22:07:01 -04:00
|
|
|
use hyper;
|
|
|
|
#[cfg(unix)]
|
|
|
|
use nix::{errno::Errno, Error as UnixError};
|
|
|
|
use std;
|
|
|
|
use std::fmt;
|
|
|
|
use std::io;
|
|
|
|
use std::str;
|
|
|
|
use url;
|
|
|
|
|
|
|
|
pub type DenoResult<T> = std::result::Result<T, DenoError>;
|
|
|
|
|
|
|
|
#[derive(Debug)]
|
|
|
|
pub struct DenoError {
|
|
|
|
repr: Repr,
|
|
|
|
}
|
|
|
|
|
|
|
|
#[derive(Debug)]
|
|
|
|
enum Repr {
|
|
|
|
Simple(ErrorKind, String),
|
|
|
|
IoErr(io::Error),
|
|
|
|
UrlErr(url::ParseError),
|
|
|
|
HyperErr(hyper::Error),
|
|
|
|
ImportMapErr(import_map::ImportMapError),
|
2019-06-30 13:45:59 -04:00
|
|
|
ModuleResolutionErr(ModuleResolutionError),
|
2019-06-19 22:07:01 -04:00
|
|
|
Diagnostic(diagnostics::Diagnostic),
|
|
|
|
JSError(JSError),
|
2019-06-25 16:14:36 -04:00
|
|
|
DenoDirErr(deno_dir::DenoDirError),
|
2019-06-19 22:07:01 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
/// Create a new simple DenoError.
|
|
|
|
pub fn new(kind: ErrorKind, msg: String) -> DenoError {
|
|
|
|
DenoError {
|
|
|
|
repr: Repr::Simple(kind, msg),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl DenoError {
|
2019-06-30 13:45:59 -04:00
|
|
|
fn url_error_kind(err: url::ParseError) -> ErrorKind {
|
|
|
|
use url::ParseError::*;
|
|
|
|
match err {
|
|
|
|
EmptyHost => ErrorKind::EmptyHost,
|
|
|
|
IdnaError => ErrorKind::IdnaError,
|
|
|
|
InvalidPort => ErrorKind::InvalidPort,
|
|
|
|
InvalidIpv4Address => ErrorKind::InvalidIpv4Address,
|
|
|
|
InvalidIpv6Address => ErrorKind::InvalidIpv6Address,
|
|
|
|
InvalidDomainCharacter => ErrorKind::InvalidDomainCharacter,
|
|
|
|
RelativeUrlWithoutBase => ErrorKind::RelativeUrlWithoutBase,
|
|
|
|
RelativeUrlWithCannotBeABaseBase => {
|
|
|
|
ErrorKind::RelativeUrlWithCannotBeABaseBase
|
|
|
|
}
|
|
|
|
SetHostOnCannotBeABaseUrl => ErrorKind::SetHostOnCannotBeABaseUrl,
|
|
|
|
Overflow => ErrorKind::Overflow,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-06-19 22:07:01 -04:00
|
|
|
pub fn kind(&self) -> ErrorKind {
|
|
|
|
match self.repr {
|
|
|
|
Repr::Simple(kind, ref _msg) => kind,
|
|
|
|
// Repr::Simple(kind) => kind,
|
|
|
|
Repr::IoErr(ref err) => {
|
|
|
|
use std::io::ErrorKind::*;
|
|
|
|
match err.kind() {
|
|
|
|
NotFound => ErrorKind::NotFound,
|
|
|
|
PermissionDenied => ErrorKind::PermissionDenied,
|
|
|
|
ConnectionRefused => ErrorKind::ConnectionRefused,
|
|
|
|
ConnectionReset => ErrorKind::ConnectionReset,
|
|
|
|
ConnectionAborted => ErrorKind::ConnectionAborted,
|
|
|
|
NotConnected => ErrorKind::NotConnected,
|
|
|
|
AddrInUse => ErrorKind::AddrInUse,
|
|
|
|
AddrNotAvailable => ErrorKind::AddrNotAvailable,
|
|
|
|
BrokenPipe => ErrorKind::BrokenPipe,
|
|
|
|
AlreadyExists => ErrorKind::AlreadyExists,
|
|
|
|
WouldBlock => ErrorKind::WouldBlock,
|
|
|
|
InvalidInput => ErrorKind::InvalidInput,
|
|
|
|
InvalidData => ErrorKind::InvalidData,
|
|
|
|
TimedOut => ErrorKind::TimedOut,
|
|
|
|
Interrupted => ErrorKind::Interrupted,
|
|
|
|
WriteZero => ErrorKind::WriteZero,
|
|
|
|
Other => ErrorKind::Other,
|
|
|
|
UnexpectedEof => ErrorKind::UnexpectedEof,
|
|
|
|
_ => unreachable!(),
|
|
|
|
}
|
|
|
|
}
|
2019-06-30 13:45:59 -04:00
|
|
|
Repr::UrlErr(err) => Self::url_error_kind(err),
|
2019-06-19 22:07:01 -04:00
|
|
|
Repr::HyperErr(ref err) => {
|
|
|
|
// For some reason hyper::errors::Kind is private.
|
|
|
|
if err.is_parse() {
|
|
|
|
ErrorKind::HttpParse
|
|
|
|
} else if err.is_user() {
|
|
|
|
ErrorKind::HttpUser
|
|
|
|
} else if err.is_canceled() {
|
|
|
|
ErrorKind::HttpCanceled
|
|
|
|
} else if err.is_closed() {
|
|
|
|
ErrorKind::HttpClosed
|
|
|
|
} else {
|
|
|
|
ErrorKind::HttpOther
|
|
|
|
}
|
|
|
|
}
|
|
|
|
Repr::ImportMapErr(ref _err) => ErrorKind::ImportMapError,
|
2019-06-30 13:45:59 -04:00
|
|
|
Repr::ModuleResolutionErr(err) => {
|
|
|
|
use ModuleResolutionError::*;
|
|
|
|
match err {
|
|
|
|
InvalidUrl(err) | InvalidBaseUrl(err) => Self::url_error_kind(err),
|
core: clearly define when module lookup is path-based vs URL-based
The rules are now as follows:
* In `import` statements, as mandated by the WHATWG specification,
the import specifier is always treated as a URL.
If it is a relative URL, it must start with either / or ./ or ../
* A script name passed to deno as a command line argument may be either
an absolute URL or a local path.
- If the name starts with a valid URI scheme followed by a colon, e.g.
'http:', 'https:', 'file:', 'foo+bar:', it always interpreted as a
URL (even if Deno doesn't support the indicated protocol).
- Otherwise, the script name is interpreted as a local path. The local
path may be relative, and operating system semantics determine how
it is resolved. Prefixing a relative path with ./ is not required.
2019-07-08 03:55:24 -04:00
|
|
|
InvalidPath => ErrorKind::InvalidPath,
|
|
|
|
ImportPrefixMissing => ErrorKind::ImportPrefixMissing,
|
2019-06-30 13:45:59 -04:00
|
|
|
}
|
|
|
|
}
|
2019-06-19 22:07:01 -04:00
|
|
|
Repr::Diagnostic(ref _err) => ErrorKind::Diagnostic,
|
|
|
|
Repr::JSError(ref _err) => ErrorKind::JSError,
|
2019-06-25 16:14:36 -04:00
|
|
|
Repr::DenoDirErr(ref _err) => ErrorKind::DenoDirError,
|
2019-06-19 22:07:01 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn apply_source_map<G: SourceMapGetter>(self, getter: &G) -> Self {
|
|
|
|
if let Repr::JSError(js_error) = self.repr {
|
|
|
|
return DenoError {
|
|
|
|
repr: Repr::JSError(apply_source_map(&js_error, getter)),
|
|
|
|
};
|
|
|
|
} else {
|
|
|
|
panic!("attempt to apply source map an unremappable error")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl fmt::Display for DenoError {
|
|
|
|
fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
|
|
|
|
match self.repr {
|
|
|
|
Repr::Simple(_kind, ref err_str) => f.pad(err_str),
|
|
|
|
Repr::IoErr(ref err) => err.fmt(f),
|
|
|
|
Repr::UrlErr(ref err) => err.fmt(f),
|
|
|
|
Repr::HyperErr(ref err) => err.fmt(f),
|
|
|
|
Repr::ImportMapErr(ref err) => f.pad(&err.msg),
|
2019-06-30 13:45:59 -04:00
|
|
|
Repr::ModuleResolutionErr(ref err) => err.fmt(f),
|
2019-06-19 22:07:01 -04:00
|
|
|
Repr::Diagnostic(ref err) => err.fmt(f),
|
|
|
|
Repr::JSError(ref err) => JSErrorColor(err).fmt(f),
|
2019-06-25 16:14:36 -04:00
|
|
|
Repr::DenoDirErr(ref err) => err.fmt(f),
|
2019-06-19 22:07:01 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl std::error::Error for DenoError {
|
|
|
|
fn description(&self) -> &str {
|
|
|
|
match self.repr {
|
|
|
|
Repr::Simple(_kind, ref msg) => msg.as_str(),
|
|
|
|
Repr::IoErr(ref err) => err.description(),
|
|
|
|
Repr::UrlErr(ref err) => err.description(),
|
|
|
|
Repr::HyperErr(ref err) => err.description(),
|
|
|
|
Repr::ImportMapErr(ref err) => &err.msg,
|
2019-06-30 13:45:59 -04:00
|
|
|
Repr::ModuleResolutionErr(ref err) => err.description(),
|
2019-06-19 22:07:01 -04:00
|
|
|
Repr::Diagnostic(ref err) => &err.items[0].message,
|
|
|
|
Repr::JSError(ref err) => &err.description(),
|
2019-06-25 16:14:36 -04:00
|
|
|
Repr::DenoDirErr(ref err) => err.description(),
|
2019-06-19 22:07:01 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
fn cause(&self) -> Option<&dyn std::error::Error> {
|
|
|
|
match self.repr {
|
|
|
|
Repr::Simple(_kind, ref _msg) => None,
|
|
|
|
Repr::IoErr(ref err) => Some(err),
|
|
|
|
Repr::UrlErr(ref err) => Some(err),
|
|
|
|
Repr::HyperErr(ref err) => Some(err),
|
|
|
|
Repr::ImportMapErr(ref _err) => None,
|
2019-06-30 13:45:59 -04:00
|
|
|
Repr::ModuleResolutionErr(ref err) => err.source(),
|
2019-06-19 22:07:01 -04:00
|
|
|
Repr::Diagnostic(ref _err) => None,
|
|
|
|
Repr::JSError(ref err) => Some(err),
|
2019-06-25 16:14:36 -04:00
|
|
|
Repr::DenoDirErr(ref err) => Some(err),
|
2019-06-19 22:07:01 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl From<io::Error> for DenoError {
|
|
|
|
#[inline]
|
|
|
|
fn from(err: io::Error) -> Self {
|
|
|
|
Self {
|
|
|
|
repr: Repr::IoErr(err),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl From<url::ParseError> for DenoError {
|
|
|
|
#[inline]
|
|
|
|
fn from(err: url::ParseError) -> Self {
|
|
|
|
Self {
|
|
|
|
repr: Repr::UrlErr(err),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl From<hyper::Error> for DenoError {
|
|
|
|
#[inline]
|
|
|
|
fn from(err: hyper::Error) -> Self {
|
|
|
|
Self {
|
|
|
|
repr: Repr::HyperErr(err),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl From<ResolveAddrError> for DenoError {
|
|
|
|
fn from(e: ResolveAddrError) -> Self {
|
|
|
|
match e {
|
|
|
|
ResolveAddrError::Syntax => Self {
|
|
|
|
repr: Repr::Simple(
|
|
|
|
ErrorKind::InvalidInput,
|
|
|
|
"invalid address syntax".to_string(),
|
|
|
|
),
|
|
|
|
},
|
|
|
|
ResolveAddrError::Resolution(io_err) => Self {
|
|
|
|
repr: Repr::IoErr(io_err),
|
|
|
|
},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#[cfg(unix)]
|
|
|
|
impl From<UnixError> for DenoError {
|
|
|
|
fn from(e: UnixError) -> Self {
|
|
|
|
match e {
|
|
|
|
UnixError::Sys(Errno::EPERM) => Self {
|
|
|
|
repr: Repr::Simple(
|
|
|
|
ErrorKind::PermissionDenied,
|
|
|
|
Errno::EPERM.desc().to_owned(),
|
|
|
|
),
|
|
|
|
},
|
|
|
|
UnixError::Sys(Errno::EINVAL) => Self {
|
|
|
|
repr: Repr::Simple(
|
|
|
|
ErrorKind::InvalidInput,
|
|
|
|
Errno::EINVAL.desc().to_owned(),
|
|
|
|
),
|
|
|
|
},
|
|
|
|
UnixError::Sys(Errno::ENOENT) => Self {
|
|
|
|
repr: Repr::Simple(
|
|
|
|
ErrorKind::NotFound,
|
|
|
|
Errno::ENOENT.desc().to_owned(),
|
|
|
|
),
|
|
|
|
},
|
|
|
|
UnixError::Sys(err) => Self {
|
|
|
|
repr: Repr::Simple(ErrorKind::UnixError, err.desc().to_owned()),
|
|
|
|
},
|
|
|
|
_ => Self {
|
|
|
|
repr: Repr::Simple(ErrorKind::Other, format!("{}", e)),
|
|
|
|
},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl From<import_map::ImportMapError> for DenoError {
|
|
|
|
fn from(err: import_map::ImportMapError) -> Self {
|
|
|
|
Self {
|
|
|
|
repr: Repr::ImportMapErr(err),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-06-25 16:14:36 -04:00
|
|
|
impl From<deno_dir::DenoDirError> for DenoError {
|
|
|
|
fn from(err: deno_dir::DenoDirError) -> Self {
|
|
|
|
Self {
|
|
|
|
repr: Repr::DenoDirErr(err),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-06-30 13:45:59 -04:00
|
|
|
impl From<ModuleResolutionError> for DenoError {
|
|
|
|
fn from(err: ModuleResolutionError) -> Self {
|
|
|
|
Self {
|
|
|
|
repr: Repr::ModuleResolutionErr(err),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-06-19 22:07:01 -04:00
|
|
|
impl From<diagnostics::Diagnostic> for DenoError {
|
|
|
|
fn from(diagnostic: diagnostics::Diagnostic) -> Self {
|
|
|
|
Self {
|
|
|
|
repr: Repr::Diagnostic(diagnostic),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl From<JSError> for DenoError {
|
|
|
|
fn from(err: JSError) -> Self {
|
|
|
|
Self {
|
|
|
|
repr: Repr::JSError(err),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn bad_resource() -> DenoError {
|
|
|
|
new(ErrorKind::BadResource, String::from("bad resource id"))
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn permission_denied() -> DenoError {
|
|
|
|
new(
|
|
|
|
ErrorKind::PermissionDenied,
|
|
|
|
String::from("permission denied"),
|
|
|
|
)
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn op_not_implemented() -> DenoError {
|
|
|
|
new(
|
|
|
|
ErrorKind::OpNotAvailable,
|
|
|
|
String::from("op not implemented"),
|
|
|
|
)
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn worker_init_failed() -> DenoError {
|
|
|
|
// TODO(afinch7) pass worker error data through here
|
|
|
|
new(
|
|
|
|
ErrorKind::WorkerInitFailed,
|
|
|
|
String::from("worker init failed"),
|
|
|
|
)
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn no_buffer_specified() -> DenoError {
|
|
|
|
new(ErrorKind::InvalidInput, String::from("no buffer specified"))
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn no_async_support() -> DenoError {
|
|
|
|
new(
|
|
|
|
ErrorKind::NoAsyncSupport,
|
|
|
|
String::from("op doesn't support async calls"),
|
|
|
|
)
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn no_sync_support() -> DenoError {
|
|
|
|
new(
|
|
|
|
ErrorKind::NoSyncSupport,
|
|
|
|
String::from("op doesn't support sync calls"),
|
|
|
|
)
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn err_check<R>(r: Result<R, DenoError>) {
|
|
|
|
if let Err(e) = r {
|
|
|
|
panic!(e.to_string());
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#[cfg(test)]
|
|
|
|
mod tests {
|
|
|
|
use super::*;
|
|
|
|
use crate::ansi::strip_ansi_codes;
|
2019-06-25 16:14:36 -04:00
|
|
|
use crate::deno_dir::DenoDirError;
|
|
|
|
use crate::deno_dir::DenoDirErrorKind;
|
2019-06-19 22:07:01 -04:00
|
|
|
use crate::diagnostics::Diagnostic;
|
|
|
|
use crate::diagnostics::DiagnosticCategory;
|
|
|
|
use crate::diagnostics::DiagnosticItem;
|
|
|
|
use crate::import_map::ImportMapError;
|
|
|
|
use deno::StackFrame;
|
|
|
|
|
|
|
|
fn js_error() -> JSError {
|
|
|
|
JSError {
|
|
|
|
message: "Error: foo bar".to_string(),
|
|
|
|
source_line: None,
|
|
|
|
script_resource_name: None,
|
|
|
|
line_number: None,
|
|
|
|
start_position: None,
|
|
|
|
end_position: None,
|
|
|
|
error_level: None,
|
|
|
|
start_column: None,
|
|
|
|
end_column: None,
|
|
|
|
frames: vec![
|
|
|
|
StackFrame {
|
|
|
|
line: 4,
|
|
|
|
column: 16,
|
|
|
|
script_name: "foo_bar.ts".to_string(),
|
|
|
|
function_name: "foo".to_string(),
|
|
|
|
is_eval: false,
|
|
|
|
is_constructor: false,
|
|
|
|
is_wasm: false,
|
|
|
|
},
|
|
|
|
StackFrame {
|
|
|
|
line: 5,
|
|
|
|
column: 20,
|
|
|
|
script_name: "bar_baz.ts".to_string(),
|
|
|
|
function_name: "qat".to_string(),
|
|
|
|
is_eval: false,
|
|
|
|
is_constructor: false,
|
|
|
|
is_wasm: false,
|
|
|
|
},
|
|
|
|
StackFrame {
|
|
|
|
line: 1,
|
|
|
|
column: 1,
|
|
|
|
script_name: "deno_main.js".to_string(),
|
|
|
|
function_name: "".to_string(),
|
|
|
|
is_eval: false,
|
|
|
|
is_constructor: false,
|
|
|
|
is_wasm: false,
|
|
|
|
},
|
|
|
|
],
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
fn diagnostic() -> Diagnostic {
|
|
|
|
Diagnostic {
|
|
|
|
items: vec![
|
|
|
|
DiagnosticItem {
|
|
|
|
message: "Example 1".to_string(),
|
|
|
|
message_chain: None,
|
|
|
|
code: 2322,
|
|
|
|
category: DiagnosticCategory::Error,
|
|
|
|
start_position: Some(267),
|
|
|
|
end_position: Some(273),
|
|
|
|
source_line: Some(" values: o => [".to_string()),
|
|
|
|
line_number: Some(18),
|
|
|
|
script_resource_name: Some(
|
|
|
|
"deno/tests/complex_diagnostics.ts".to_string(),
|
|
|
|
),
|
|
|
|
start_column: Some(2),
|
|
|
|
end_column: Some(8),
|
|
|
|
related_information: None,
|
|
|
|
},
|
|
|
|
DiagnosticItem {
|
|
|
|
message: "Example 2".to_string(),
|
|
|
|
message_chain: None,
|
|
|
|
code: 2000,
|
|
|
|
category: DiagnosticCategory::Error,
|
|
|
|
start_position: Some(2),
|
|
|
|
end_position: Some(2),
|
|
|
|
source_line: Some(" values: undefined,".to_string()),
|
|
|
|
line_number: Some(128),
|
|
|
|
script_resource_name: Some("/foo/bar.ts".to_string()),
|
|
|
|
start_column: Some(2),
|
|
|
|
end_column: Some(8),
|
|
|
|
related_information: None,
|
|
|
|
},
|
|
|
|
],
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
struct MockSourceMapGetter {}
|
|
|
|
|
|
|
|
impl SourceMapGetter for MockSourceMapGetter {
|
|
|
|
fn get_source_map(&self, _script_name: &str) -> Option<Vec<u8>> {
|
|
|
|
Some(vec![])
|
|
|
|
}
|
|
|
|
|
|
|
|
fn get_source_line(
|
|
|
|
&self,
|
|
|
|
_script_name: &str,
|
|
|
|
_line: usize,
|
|
|
|
) -> Option<String> {
|
|
|
|
None
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
fn io_error() -> io::Error {
|
|
|
|
io::Error::from(io::ErrorKind::NotFound)
|
|
|
|
}
|
|
|
|
|
|
|
|
fn url_error() -> url::ParseError {
|
|
|
|
url::ParseError::EmptyHost
|
|
|
|
}
|
|
|
|
|
|
|
|
fn import_map_error() -> ImportMapError {
|
|
|
|
ImportMapError {
|
|
|
|
msg: "an import map error".to_string(),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-06-25 16:14:36 -04:00
|
|
|
fn deno_dir_error() -> DenoDirError {
|
|
|
|
DenoDirError::new(
|
|
|
|
"a deno dir error".to_string(),
|
|
|
|
DenoDirErrorKind::UnsupportedFetchScheme,
|
|
|
|
)
|
|
|
|
}
|
|
|
|
|
2019-06-19 22:07:01 -04:00
|
|
|
#[test]
|
|
|
|
fn test_simple_error() {
|
|
|
|
let err = new(ErrorKind::NoError, "foo".to_string());
|
|
|
|
assert_eq!(err.kind(), ErrorKind::NoError);
|
|
|
|
assert_eq!(err.to_string(), "foo");
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_io_error() {
|
|
|
|
let err = DenoError::from(io_error());
|
|
|
|
assert_eq!(err.kind(), ErrorKind::NotFound);
|
|
|
|
assert_eq!(err.to_string(), "entity not found");
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_url_error() {
|
|
|
|
let err = DenoError::from(url_error());
|
|
|
|
assert_eq!(err.kind(), ErrorKind::EmptyHost);
|
|
|
|
assert_eq!(err.to_string(), "empty host");
|
|
|
|
}
|
|
|
|
|
|
|
|
// TODO find a way to easily test tokio errors and unix errors
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_diagnostic() {
|
|
|
|
let err = DenoError::from(diagnostic());
|
|
|
|
assert_eq!(err.kind(), ErrorKind::Diagnostic);
|
|
|
|
assert_eq!(strip_ansi_codes(&err.to_string()), "error TS2322: Example 1\n\n► deno/tests/complex_diagnostics.ts:19:3\n\n19 values: o => [\n ~~~~~~\n\nerror TS2000: Example 2\n\n► /foo/bar.ts:129:3\n\n129 values: undefined,\n ~~~~~~\n\n\nFound 2 errors.\n");
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_js_error() {
|
|
|
|
let err = DenoError::from(js_error());
|
|
|
|
assert_eq!(err.kind(), ErrorKind::JSError);
|
|
|
|
assert_eq!(strip_ansi_codes(&err.to_string()), "error: Error: foo bar\n at foo (foo_bar.ts:5:17)\n at qat (bar_baz.ts:6:21)\n at deno_main.js:2:2");
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_import_map_error() {
|
|
|
|
let err = DenoError::from(import_map_error());
|
|
|
|
assert_eq!(err.kind(), ErrorKind::ImportMapError);
|
|
|
|
assert_eq!(err.to_string(), "an import map error");
|
|
|
|
}
|
|
|
|
|
2019-06-25 16:14:36 -04:00
|
|
|
#[test]
|
|
|
|
fn test_deno_dir_error() {
|
|
|
|
let err = DenoError::from(deno_dir_error());
|
|
|
|
assert_eq!(err.kind(), ErrorKind::DenoDirError);
|
|
|
|
assert_eq!(err.to_string(), "a deno dir error\n");
|
|
|
|
}
|
|
|
|
|
2019-06-19 22:07:01 -04:00
|
|
|
#[test]
|
|
|
|
fn test_bad_resource() {
|
|
|
|
let err = bad_resource();
|
|
|
|
assert_eq!(err.kind(), ErrorKind::BadResource);
|
|
|
|
assert_eq!(err.to_string(), "bad resource id");
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_permission_denied() {
|
|
|
|
let err = permission_denied();
|
|
|
|
assert_eq!(err.kind(), ErrorKind::PermissionDenied);
|
|
|
|
assert_eq!(err.to_string(), "permission denied");
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_op_not_implemented() {
|
|
|
|
let err = op_not_implemented();
|
|
|
|
assert_eq!(err.kind(), ErrorKind::OpNotAvailable);
|
|
|
|
assert_eq!(err.to_string(), "op not implemented");
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_worker_init_failed() {
|
|
|
|
let err = worker_init_failed();
|
|
|
|
assert_eq!(err.kind(), ErrorKind::WorkerInitFailed);
|
|
|
|
assert_eq!(err.to_string(), "worker init failed");
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_no_buffer_specified() {
|
|
|
|
let err = no_buffer_specified();
|
|
|
|
assert_eq!(err.kind(), ErrorKind::InvalidInput);
|
|
|
|
assert_eq!(err.to_string(), "no buffer specified");
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_no_async_support() {
|
|
|
|
let err = no_async_support();
|
|
|
|
assert_eq!(err.kind(), ErrorKind::NoAsyncSupport);
|
|
|
|
assert_eq!(err.to_string(), "op doesn't support async calls");
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_no_sync_support() {
|
|
|
|
let err = no_sync_support();
|
|
|
|
assert_eq!(err.kind(), ErrorKind::NoSyncSupport);
|
|
|
|
assert_eq!(err.to_string(), "op doesn't support sync calls");
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
#[should_panic]
|
|
|
|
fn test_apply_source_map_invalid() {
|
|
|
|
let getter = MockSourceMapGetter {};
|
|
|
|
let err = new(ErrorKind::NotFound, "not found".to_string());
|
|
|
|
err.apply_source_map(&getter);
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
#[should_panic]
|
|
|
|
fn test_err_check() {
|
|
|
|
err_check(
|
|
|
|
Err(new(ErrorKind::NotFound, "foo".to_string())) as Result<(), DenoError>
|
|
|
|
);
|
|
|
|
}
|
|
|
|
}
|