mirror of
https://github.com/denoland/deno.git
synced 2024-12-25 00:29:09 -05:00
Allow high precision performance.now() (#1977)
This commit is contained in:
parent
f7fdb90fd5
commit
734cf781c6
14 changed files with 119 additions and 34 deletions
24
cli/flags.rs
24
cli/flags.rs
|
@ -19,6 +19,7 @@ pub struct DenoFlags {
|
||||||
pub allow_net: bool,
|
pub allow_net: bool,
|
||||||
pub allow_env: bool,
|
pub allow_env: bool,
|
||||||
pub allow_run: bool,
|
pub allow_run: bool,
|
||||||
|
pub allow_high_precision: bool,
|
||||||
pub no_prompts: bool,
|
pub no_prompts: bool,
|
||||||
pub types: bool,
|
pub types: bool,
|
||||||
pub prefetch: bool,
|
pub prefetch: bool,
|
||||||
|
@ -54,6 +55,9 @@ impl<'a> From<ArgMatches<'a>> for DenoFlags {
|
||||||
if matches.is_present("allow-run") {
|
if matches.is_present("allow-run") {
|
||||||
flags.allow_run = true;
|
flags.allow_run = true;
|
||||||
}
|
}
|
||||||
|
if matches.is_present("allow-high-precision") {
|
||||||
|
flags.allow_high_precision = true;
|
||||||
|
}
|
||||||
if matches.is_present("allow-all") {
|
if matches.is_present("allow-all") {
|
||||||
flags.allow_read = true;
|
flags.allow_read = true;
|
||||||
flags.allow_env = true;
|
flags.allow_env = true;
|
||||||
|
@ -61,6 +65,7 @@ impl<'a> From<ArgMatches<'a>> for DenoFlags {
|
||||||
flags.allow_run = true;
|
flags.allow_run = true;
|
||||||
flags.allow_read = true;
|
flags.allow_read = true;
|
||||||
flags.allow_write = true;
|
flags.allow_write = true;
|
||||||
|
flags.allow_high_precision = true;
|
||||||
}
|
}
|
||||||
if matches.is_present("no-prompt") {
|
if matches.is_present("no-prompt") {
|
||||||
flags.no_prompts = true;
|
flags.no_prompts = true;
|
||||||
|
@ -124,6 +129,10 @@ pub fn set_flags(
|
||||||
Arg::with_name("allow-run")
|
Arg::with_name("allow-run")
|
||||||
.long("allow-run")
|
.long("allow-run")
|
||||||
.help("Allow running subprocesses"),
|
.help("Allow running subprocesses"),
|
||||||
|
).arg(
|
||||||
|
Arg::with_name("allow-high-precision")
|
||||||
|
.long("allow-high-precision")
|
||||||
|
.help("Allow high precision time measurement"),
|
||||||
).arg(
|
).arg(
|
||||||
Arg::with_name("allow-all")
|
Arg::with_name("allow-all")
|
||||||
.short("A")
|
.short("A")
|
||||||
|
@ -338,6 +347,7 @@ fn test_set_flags_7() {
|
||||||
allow_run: true,
|
allow_run: true,
|
||||||
allow_read: true,
|
allow_read: true,
|
||||||
allow_write: true,
|
allow_write: true,
|
||||||
|
allow_high_precision: true,
|
||||||
..DenoFlags::default()
|
..DenoFlags::default()
|
||||||
}
|
}
|
||||||
)
|
)
|
||||||
|
@ -356,3 +366,17 @@ fn test_set_flags_8() {
|
||||||
}
|
}
|
||||||
)
|
)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn test_set_flags_9() {
|
||||||
|
let (flags, rest) =
|
||||||
|
set_flags(svec!["deno", "--allow-high-precision", "script.ts"]).unwrap();
|
||||||
|
assert_eq!(rest, svec!["deno", "script.ts"]);
|
||||||
|
assert_eq!(
|
||||||
|
flags,
|
||||||
|
DenoFlags {
|
||||||
|
allow_high_precision: true,
|
||||||
|
..DenoFlags::default()
|
||||||
|
}
|
||||||
|
)
|
||||||
|
}
|
||||||
|
|
|
@ -17,6 +17,7 @@ use std::env;
|
||||||
use std::sync::atomic::{AtomicUsize, Ordering};
|
use std::sync::atomic::{AtomicUsize, Ordering};
|
||||||
use std::sync::Arc;
|
use std::sync::Arc;
|
||||||
use std::sync::Mutex;
|
use std::sync::Mutex;
|
||||||
|
use std::time::Instant;
|
||||||
|
|
||||||
pub type WorkerSender = async_mpsc::Sender<Buf>;
|
pub type WorkerSender = async_mpsc::Sender<Buf>;
|
||||||
pub type WorkerReceiver = async_mpsc::Receiver<Buf>;
|
pub type WorkerReceiver = async_mpsc::Receiver<Buf>;
|
||||||
|
@ -51,6 +52,7 @@ pub struct IsolateState {
|
||||||
pub global_timer: Mutex<GlobalTimer>,
|
pub global_timer: Mutex<GlobalTimer>,
|
||||||
pub workers: Mutex<UserWorkerTable>,
|
pub workers: Mutex<UserWorkerTable>,
|
||||||
pub is_worker: bool,
|
pub is_worker: bool,
|
||||||
|
pub start_time: Instant,
|
||||||
}
|
}
|
||||||
|
|
||||||
impl IsolateState {
|
impl IsolateState {
|
||||||
|
@ -73,6 +75,7 @@ impl IsolateState {
|
||||||
global_timer: Mutex::new(GlobalTimer::new()),
|
global_timer: Mutex::new(GlobalTimer::new()),
|
||||||
workers: Mutex::new(UserWorkerTable::new()),
|
workers: Mutex::new(UserWorkerTable::new()),
|
||||||
is_worker,
|
is_worker,
|
||||||
|
start_time: Instant::now(),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -281,6 +281,7 @@ table PermissionsRes {
|
||||||
write: bool;
|
write: bool;
|
||||||
net: bool;
|
net: bool;
|
||||||
env: bool;
|
env: bool;
|
||||||
|
high_precision: bool;
|
||||||
}
|
}
|
||||||
|
|
||||||
// Note this represents The WHOLE header of an http message, not just the key
|
// Note this represents The WHOLE header of an http message, not just the key
|
||||||
|
@ -527,7 +528,8 @@ table RunStatusRes {
|
||||||
table Now {}
|
table Now {}
|
||||||
|
|
||||||
table NowRes {
|
table NowRes {
|
||||||
time: uint64;
|
seconds: uint64;
|
||||||
|
subsec_nanos: uint32;
|
||||||
}
|
}
|
||||||
|
|
||||||
table IsTTY {}
|
table IsTTY {}
|
||||||
|
|
32
cli/ops.rs
32
cli/ops.rs
|
@ -41,7 +41,7 @@ use std::path::Path;
|
||||||
use std::path::PathBuf;
|
use std::path::PathBuf;
|
||||||
use std::process::Command;
|
use std::process::Command;
|
||||||
use std::sync::Arc;
|
use std::sync::Arc;
|
||||||
use std::time::{Duration, Instant, SystemTime, UNIX_EPOCH};
|
use std::time::{Duration, Instant, UNIX_EPOCH};
|
||||||
use tokio;
|
use tokio;
|
||||||
use tokio::net::TcpListener;
|
use tokio::net::TcpListener;
|
||||||
use tokio::net::TcpStream;
|
use tokio::net::TcpStream;
|
||||||
|
@ -212,19 +212,35 @@ pub fn op_selector_std(inner_type: msg::Any) -> Option<OpCreator> {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Returns a milliseconds and nanoseconds subsec
|
||||||
|
// since the start time of the deno runtime.
|
||||||
|
// If the High precision flag is not set, the
|
||||||
|
// nanoseconds are rounded on 2ms.
|
||||||
fn op_now(
|
fn op_now(
|
||||||
_sc: &IsolateStateContainer,
|
sc: &IsolateStateContainer,
|
||||||
base: &msg::Base<'_>,
|
base: &msg::Base<'_>,
|
||||||
data: deno_buf,
|
data: deno_buf,
|
||||||
) -> Box<OpWithError> {
|
) -> Box<OpWithError> {
|
||||||
assert_eq!(data.len(), 0);
|
assert_eq!(data.len(), 0);
|
||||||
let start = SystemTime::now();
|
let seconds = sc.state().start_time.elapsed().as_secs();
|
||||||
let since_the_epoch = start.duration_since(UNIX_EPOCH).unwrap();
|
let mut subsec_nanos = sc.state().start_time.elapsed().subsec_nanos();
|
||||||
let time = since_the_epoch.as_secs() * 1000
|
let reduced_time_precision = 2000000; // 2ms in nanoseconds
|
||||||
+ u64::from(since_the_epoch.subsec_millis());
|
|
||||||
|
// If the permission is not enabled
|
||||||
|
// Round the nano result on 2 milliseconds
|
||||||
|
// see: https://developer.mozilla.org/en-US/docs/Web/API/DOMHighResTimeStamp#Reduced_time_precision
|
||||||
|
if !sc.state().permissions.allows_high_precision() {
|
||||||
|
subsec_nanos -= subsec_nanos % reduced_time_precision
|
||||||
|
}
|
||||||
|
|
||||||
let builder = &mut FlatBufferBuilder::new();
|
let builder = &mut FlatBufferBuilder::new();
|
||||||
let inner = msg::NowRes::create(builder, &msg::NowResArgs { time });
|
let inner = msg::NowRes::create(
|
||||||
|
builder,
|
||||||
|
&msg::NowResArgs {
|
||||||
|
seconds,
|
||||||
|
subsec_nanos,
|
||||||
|
},
|
||||||
|
);
|
||||||
ok_future(serialize_response(
|
ok_future(serialize_response(
|
||||||
base.cmd_id(),
|
base.cmd_id(),
|
||||||
builder,
|
builder,
|
||||||
|
@ -555,6 +571,7 @@ fn op_permissions(
|
||||||
write: sc.state().permissions.allows_write(),
|
write: sc.state().permissions.allows_write(),
|
||||||
net: sc.state().permissions.allows_net(),
|
net: sc.state().permissions.allows_net(),
|
||||||
env: sc.state().permissions.allows_env(),
|
env: sc.state().permissions.allows_env(),
|
||||||
|
high_precision: sc.state().permissions.allows_high_precision(),
|
||||||
},
|
},
|
||||||
);
|
);
|
||||||
ok_future(serialize_response(
|
ok_future(serialize_response(
|
||||||
|
@ -582,6 +599,7 @@ fn op_revoke_permission(
|
||||||
"write" => sc.state().permissions.revoke_write(),
|
"write" => sc.state().permissions.revoke_write(),
|
||||||
"net" => sc.state().permissions.revoke_net(),
|
"net" => sc.state().permissions.revoke_net(),
|
||||||
"env" => sc.state().permissions.revoke_env(),
|
"env" => sc.state().permissions.revoke_env(),
|
||||||
|
"highPrecision" => sc.state().permissions.revoke_high_precision(),
|
||||||
_ => Ok(()),
|
_ => Ok(()),
|
||||||
};
|
};
|
||||||
if let Err(e) = result {
|
if let Err(e) = result {
|
||||||
|
|
|
@ -131,6 +131,7 @@ pub struct DenoPermissions {
|
||||||
pub allow_net: PermissionAccessor,
|
pub allow_net: PermissionAccessor,
|
||||||
pub allow_env: PermissionAccessor,
|
pub allow_env: PermissionAccessor,
|
||||||
pub allow_run: PermissionAccessor,
|
pub allow_run: PermissionAccessor,
|
||||||
|
pub allow_high_precision: PermissionAccessor,
|
||||||
pub no_prompts: AtomicBool,
|
pub no_prompts: AtomicBool,
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -142,6 +143,9 @@ impl DenoPermissions {
|
||||||
allow_env: PermissionAccessor::from(flags.allow_env),
|
allow_env: PermissionAccessor::from(flags.allow_env),
|
||||||
allow_net: PermissionAccessor::from(flags.allow_net),
|
allow_net: PermissionAccessor::from(flags.allow_net),
|
||||||
allow_run: PermissionAccessor::from(flags.allow_run),
|
allow_run: PermissionAccessor::from(flags.allow_run),
|
||||||
|
allow_high_precision: PermissionAccessor::from(
|
||||||
|
flags.allow_high_precision,
|
||||||
|
),
|
||||||
no_prompts: AtomicBool::new(flags.no_prompts),
|
no_prompts: AtomicBool::new(flags.no_prompts),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -263,6 +267,10 @@ impl DenoPermissions {
|
||||||
self.allow_env.is_allow()
|
self.allow_env.is_allow()
|
||||||
}
|
}
|
||||||
|
|
||||||
|
pub fn allows_high_precision(&self) -> bool {
|
||||||
|
return self.allow_high_precision.is_allow();
|
||||||
|
}
|
||||||
|
|
||||||
pub fn revoke_run(&self) -> DenoResult<()> {
|
pub fn revoke_run(&self) -> DenoResult<()> {
|
||||||
self.allow_run.revoke();
|
self.allow_run.revoke();
|
||||||
Ok(())
|
Ok(())
|
||||||
|
@ -287,6 +295,10 @@ impl DenoPermissions {
|
||||||
self.allow_env.revoke();
|
self.allow_env.revoke();
|
||||||
Ok(())
|
Ok(())
|
||||||
}
|
}
|
||||||
|
pub fn revoke_high_precision(&self) -> DenoResult<()> {
|
||||||
|
self.allow_high_precision.revoke();
|
||||||
|
return Ok(());
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Quad-state value for representing user input on permission prompt
|
/// Quad-state value for representing user input on permission prompt
|
||||||
|
|
|
@ -5,13 +5,9 @@ import * as flatbuffers from "./flatbuffers";
|
||||||
import { assert } from "./util";
|
import { assert } from "./util";
|
||||||
|
|
||||||
export class Performance {
|
export class Performance {
|
||||||
timeOrigin = 0;
|
/** Returns a current time from Deno's start.
|
||||||
|
* In milliseconds. Flag --allow-high-precision give
|
||||||
constructor() {
|
* a precise measure.
|
||||||
this.timeOrigin = new Date().getTime();
|
|
||||||
}
|
|
||||||
|
|
||||||
/** Returns a current time from Deno's start
|
|
||||||
*
|
*
|
||||||
* const t = performance.now();
|
* const t = performance.now();
|
||||||
* console.log(`${t} ms since start!`);
|
* console.log(`${t} ms since start!`);
|
||||||
|
@ -23,6 +19,6 @@ export class Performance {
|
||||||
assert(msg.Any.NowRes === baseRes.innerType());
|
assert(msg.Any.NowRes === baseRes.innerType());
|
||||||
const res = new msg.NowRes();
|
const res = new msg.NowRes();
|
||||||
assert(baseRes.inner(res) != null);
|
assert(baseRes.inner(res) != null);
|
||||||
return res.time().toFloat64() - this.timeOrigin;
|
return res.seconds().toFloat64() * 1e3 + res.subsecNanos() / 1e6;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,7 +1,7 @@
|
||||||
// Copyright 2018-2019 the Deno authors. All rights reserved. MIT license.
|
// Copyright 2018-2019 the Deno authors. All rights reserved. MIT license.
|
||||||
import { test, assert } from "./test_util.ts";
|
import { testPerm, assert } from "./test_util.ts";
|
||||||
|
|
||||||
test(function now() {
|
testPerm({ highPrecision: false }, function now() {
|
||||||
const start = performance.now();
|
const start = performance.now();
|
||||||
setTimeout(() => {
|
setTimeout(() => {
|
||||||
const end = performance.now();
|
const end = performance.now();
|
||||||
|
|
|
@ -11,7 +11,7 @@ export interface Permissions {
|
||||||
net: boolean;
|
net: boolean;
|
||||||
env: boolean;
|
env: boolean;
|
||||||
run: boolean;
|
run: boolean;
|
||||||
|
highPrecision: boolean;
|
||||||
// NOTE: Keep in sync with src/permissions.rs
|
// NOTE: Keep in sync with src/permissions.rs
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -29,7 +29,8 @@ function createPermissions(inner: msg.PermissionsRes): Permissions {
|
||||||
write: inner.write(),
|
write: inner.write(),
|
||||||
net: inner.net(),
|
net: inner.net(),
|
||||||
env: inner.env(),
|
env: inner.env(),
|
||||||
run: inner.run()
|
run: inner.run(),
|
||||||
|
highPrecision: inner.highPrecision()
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -6,7 +6,8 @@ const knownPermissions: Deno.Permission[] = [
|
||||||
"read",
|
"read",
|
||||||
"write",
|
"write",
|
||||||
"net",
|
"net",
|
||||||
"env"
|
"env",
|
||||||
|
"highPrecision"
|
||||||
];
|
];
|
||||||
|
|
||||||
for (let grant of knownPermissions) {
|
for (let grant of knownPermissions) {
|
||||||
|
|
|
@ -26,6 +26,7 @@ interface DenoPermissions {
|
||||||
net?: boolean;
|
net?: boolean;
|
||||||
env?: boolean;
|
env?: boolean;
|
||||||
run?: boolean;
|
run?: boolean;
|
||||||
|
highPrecision?: boolean;
|
||||||
}
|
}
|
||||||
|
|
||||||
function permToString(perms: DenoPermissions): string {
|
function permToString(perms: DenoPermissions): string {
|
||||||
|
@ -34,11 +35,12 @@ function permToString(perms: DenoPermissions): string {
|
||||||
const n = perms.net ? 1 : 0;
|
const n = perms.net ? 1 : 0;
|
||||||
const e = perms.env ? 1 : 0;
|
const e = perms.env ? 1 : 0;
|
||||||
const u = perms.run ? 1 : 0;
|
const u = perms.run ? 1 : 0;
|
||||||
return `permR${r}W${w}N${n}E${e}U${u}`;
|
const h = perms.highPrecision ? 1 : 0;
|
||||||
|
return `permR${r}W${w}N${n}E${e}U${u}H${h}`;
|
||||||
}
|
}
|
||||||
|
|
||||||
function permFromString(s: string): DenoPermissions {
|
function permFromString(s: string): DenoPermissions {
|
||||||
const re = /^permR([01])W([01])N([01])E([01])U([01])$/;
|
const re = /^permR([01])W([01])N([01])E([01])U([01])H([01])$/;
|
||||||
const found = s.match(re);
|
const found = s.match(re);
|
||||||
if (!found) {
|
if (!found) {
|
||||||
throw Error("Not a permission string");
|
throw Error("Not a permission string");
|
||||||
|
@ -48,7 +50,8 @@ function permFromString(s: string): DenoPermissions {
|
||||||
write: Boolean(Number(found[2])),
|
write: Boolean(Number(found[2])),
|
||||||
net: Boolean(Number(found[3])),
|
net: Boolean(Number(found[3])),
|
||||||
env: Boolean(Number(found[4])),
|
env: Boolean(Number(found[4])),
|
||||||
run: Boolean(Number(found[5]))
|
run: Boolean(Number(found[5])),
|
||||||
|
highPrecision: Boolean(Number(found[6]))
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -62,7 +65,14 @@ export function testPerm(
|
||||||
|
|
||||||
export function test(fn: testing.TestFunction): void {
|
export function test(fn: testing.TestFunction): void {
|
||||||
testPerm(
|
testPerm(
|
||||||
{ read: false, write: false, net: false, env: false, run: false },
|
{
|
||||||
|
read: false,
|
||||||
|
write: false,
|
||||||
|
net: false,
|
||||||
|
env: false,
|
||||||
|
run: false,
|
||||||
|
highPrecision: false
|
||||||
|
},
|
||||||
fn
|
fn
|
||||||
);
|
);
|
||||||
}
|
}
|
||||||
|
@ -73,8 +83,17 @@ test(function permSerialization() {
|
||||||
for (const env of [true, false]) {
|
for (const env of [true, false]) {
|
||||||
for (const run of [true, false]) {
|
for (const run of [true, false]) {
|
||||||
for (const read of [true, false]) {
|
for (const read of [true, false]) {
|
||||||
const perms: DenoPermissions = { write, net, env, run, read };
|
for (const highPrecision of [true, false]) {
|
||||||
assertEquals(perms, permFromString(permToString(perms)));
|
const perms: DenoPermissions = {
|
||||||
|
write,
|
||||||
|
net,
|
||||||
|
env,
|
||||||
|
run,
|
||||||
|
read,
|
||||||
|
highPrecision
|
||||||
|
};
|
||||||
|
assertEquals(perms, permFromString(permToString(perms)));
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
2
tests/025_high_precision.test
Normal file
2
tests/025_high_precision.test
Normal file
|
@ -0,0 +1,2 @@
|
||||||
|
args: --allow-high-precision --reload tests/025_high_precision.ts
|
||||||
|
output: tests/025_high_precision.ts.out
|
3
tests/025_high_precision.ts
Normal file
3
tests/025_high_precision.ts
Normal file
|
@ -0,0 +1,3 @@
|
||||||
|
console.log(performance.now() % 2 !== 0);
|
||||||
|
Deno.revokePermission("highPrecision");
|
||||||
|
console.log(performance.now() % 2 === 0);
|
2
tests/025_high_precision.ts.out
Normal file
2
tests/025_high_precision.ts.out
Normal file
|
@ -0,0 +1,2 @@
|
||||||
|
true
|
||||||
|
true
|
|
@ -45,14 +45,16 @@ def run_unit_test(deno_exe, permStr, flags=None):
|
||||||
# tests by the special string. permW0N0 means allow-write but not allow-net.
|
# tests by the special string. permW0N0 means allow-write but not allow-net.
|
||||||
# See js/test_util.ts for more details.
|
# See js/test_util.ts for more details.
|
||||||
def unit_tests(deno_exe):
|
def unit_tests(deno_exe):
|
||||||
run_unit_test(deno_exe, "permR0W0N0E0U0", ["--reload"])
|
run_unit_test(deno_exe, "permR0W0N0E0U0H0", ["--reload"])
|
||||||
run_unit_test(deno_exe, "permR1W0N0E0U0", ["--allow-read"])
|
run_unit_test(deno_exe, "permR1W0N0E0U0H0", ["--allow-read"])
|
||||||
run_unit_test(deno_exe, "permR0W1N0E0U0", ["--allow-write"])
|
run_unit_test(deno_exe, "permR0W1N0E0U0H0", ["--allow-write"])
|
||||||
run_unit_test(deno_exe, "permR1W1N0E0U0",
|
run_unit_test(deno_exe, "permR1W1N0E0U0H0",
|
||||||
["--allow-read", "--allow-write"])
|
["--allow-read", "--allow-write"])
|
||||||
run_unit_test(deno_exe, "permR0W0N0E1U0", ["--allow-env"])
|
run_unit_test(deno_exe, "permR0W0N0E1U0H0", ["--allow-env"])
|
||||||
run_unit_test(deno_exe, "permR0W0N0E0U1", ["--allow-run"])
|
run_unit_test(deno_exe, "permR0W0N0E0U0H1", ["--allow-high-precision"])
|
||||||
run_unit_test(deno_exe, "permR0W1N0E0U1", ["--allow-run", "--allow-write"])
|
run_unit_test(deno_exe, "permR0W0N0E0U1H0", ["--allow-run"])
|
||||||
|
run_unit_test(deno_exe, "permR0W1N0E0U1H0",
|
||||||
|
["--allow-run", "--allow-write"])
|
||||||
# TODO We might accidentally miss some. We should be smarter about which we
|
# TODO We might accidentally miss some. We should be smarter about which we
|
||||||
# run. Maybe we can use the "filtered out" number to check this.
|
# run. Maybe we can use the "filtered out" number to check this.
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue