// Copyright 2018-2024 the Deno authors. All rights reserved. MIT license. use std::sync::atomic::AtomicUsize; use std::sync::atomic::Ordering; use deno_core::error::generic_error; use deno_core::error::type_error; use deno_core::error::AnyError; use deno_core::op2; use deno_core::v8; use deno_core::ModuleSpecifier; use deno_core::OpState; use deno_runtime::deno_permissions::ChildPermissionsArg; use deno_runtime::deno_permissions::PermissionsContainer; use deno_runtime::deno_web::StartTime; use tokio::sync::mpsc::UnboundedSender; use uuid::Uuid; use crate::tools::bench::BenchDescription; use crate::tools::bench::BenchEvent; #[derive(Default)] pub(crate) struct BenchContainer( pub Vec<(BenchDescription, v8::Global)>, ); deno_core::extension!(deno_bench, ops = [ op_pledge_test_permissions, op_restore_test_permissions, op_register_bench, op_bench_get_origin, op_dispatch_bench_event, op_bench_now, ], options = { sender: UnboundedSender, }, state = |state, options| { state.put(options.sender); state.put(BenchContainer::default()); }, ); #[op2] #[string] fn op_bench_get_origin(state: &mut OpState) -> String { state.borrow::().to_string() } #[derive(Clone)] struct PermissionsHolder(Uuid, PermissionsContainer); #[op2(stack_trace)] #[serde] pub fn op_pledge_test_permissions( state: &mut OpState, #[serde] args: ChildPermissionsArg, ) -> Result { let token = Uuid::new_v4(); let parent_permissions = state.borrow_mut::(); let worker_permissions = parent_permissions.create_child_permissions(args)?; let parent_permissions = parent_permissions.clone(); if state.try_take::().is_some() { panic!("pledge test permissions called before restoring previous pledge"); } state.put::(PermissionsHolder(token, parent_permissions)); // NOTE: This call overrides current permission set for the worker state.put::(worker_permissions); Ok(token) } #[op2] pub fn op_restore_test_permissions( state: &mut OpState, #[serde] token: Uuid, ) -> Result<(), AnyError> { if let Some(permissions_holder) = state.try_take::() { if token != permissions_holder.0 { panic!("restore test permissions token does not match the stored token"); } let permissions = permissions_holder.1; state.put::(permissions); Ok(()) } else { Err(generic_error("no permissions to restore")) } } static NEXT_ID: AtomicUsize = AtomicUsize::new(0); #[allow(clippy::too_many_arguments)] #[op2] fn op_register_bench( state: &mut OpState, #[global] function: v8::Global, #[string] name: String, baseline: bool, #[string] group: Option, ignore: bool, only: bool, warmup: bool, #[buffer] ret_buf: &mut [u8], ) -> Result<(), AnyError> { if ret_buf.len() != 4 { return Err(type_error(format!( "Invalid ret_buf length: {}", ret_buf.len() ))); } let id = NEXT_ID.fetch_add(1, Ordering::SeqCst); let origin = state.borrow::().to_string(); let description = BenchDescription { id, name, origin: origin.clone(), baseline, group, ignore, only, warmup, }; state .borrow_mut::() .0 .push((description.clone(), function)); let sender = state.borrow::>().clone(); sender.send(BenchEvent::Register(description)).ok(); ret_buf.copy_from_slice(&(id as u32).to_le_bytes()); Ok(()) } #[op2] fn op_dispatch_bench_event(state: &mut OpState, #[serde] event: BenchEvent) { assert!( matches!(event, BenchEvent::Output(_)), "Only output events are expected from JS." ); let sender = state.borrow::>().clone(); sender.send(event).ok(); } #[op2(fast)] #[number] fn op_bench_now(state: &mut OpState) -> Result { let ns = state.borrow::().elapsed().as_nanos(); let ns_u64 = u64::try_from(ns)?; Ok(ns_u64) }