// Copyright 2018-2022 the Deno authors. All rights reserved. MIT license. use std::collections::HashSet; use std::io::ErrorKind; use std::path::Path; use std::path::PathBuf; use deno_ast::ModuleSpecifier; use deno_core::error::AnyError; use deno_core::futures; use deno_core::futures::future::BoxFuture; use deno_core::url::Url; use crate::lockfile::Lockfile; use crate::npm::cache::should_sync_download; use crate::npm::resolution::NpmResolutionSnapshot; use crate::npm::NpmCache; use crate::npm::NpmPackageId; use crate::npm::NpmPackageReq; use crate::npm::NpmResolutionPackage; pub trait InnerNpmPackageResolver: Send + Sync { fn resolve_package_folder_from_deno_module( &self, pkg_req: &NpmPackageReq, ) -> Result; fn resolve_package_folder_from_package( &self, name: &str, referrer: &ModuleSpecifier, conditions: &[&str], ) -> Result; fn resolve_package_folder_from_specifier( &self, specifier: &ModuleSpecifier, ) -> Result; fn package_size(&self, package_id: &NpmPackageId) -> Result; fn has_packages(&self) -> bool; fn add_package_reqs( &self, packages: Vec, ) -> BoxFuture<'static, Result<(), AnyError>>; fn set_package_reqs( &self, packages: HashSet, ) -> BoxFuture<'static, Result<(), AnyError>>; fn ensure_read_permission(&self, path: &Path) -> Result<(), AnyError>; fn snapshot(&self) -> NpmResolutionSnapshot; fn lock(&self, lockfile: &mut Lockfile) -> Result<(), AnyError>; } /// Caches all the packages in parallel. pub async fn cache_packages( mut packages: Vec, cache: &NpmCache, registry_url: &Url, ) -> Result<(), AnyError> { let sync_download = should_sync_download(); if sync_download { // we're running the tests not with --quiet // and we want the output to be deterministic packages.sort_by(|a, b| a.id.cmp(&b.id)); } let mut handles = Vec::with_capacity(packages.len()); for package in packages { assert_eq!(package.copy_index, 0); // the caller should not provide any of these let cache = cache.clone(); let registry_url = registry_url.clone(); let handle = tokio::task::spawn(async move { cache .ensure_package( (package.id.name.as_str(), &package.id.version), &package.dist, ®istry_url, ) .await }); if sync_download { handle.await??; } else { handles.push(handle); } } let results = futures::future::join_all(handles).await; for result in results { // surface the first error result??; } Ok(()) } pub fn ensure_registry_read_permission( registry_path: &Path, path: &Path, ) -> Result<(), AnyError> { // allow reading if it's in the node_modules if path.starts_with(®istry_path) && path .components() .all(|c| !matches!(c, std::path::Component::ParentDir)) { // todo(dsherret): cache this? if let Ok(registry_path) = std::fs::canonicalize(registry_path) { match std::fs::canonicalize(path) { Ok(path) if path.starts_with(registry_path) => { return Ok(()); } Err(e) if e.kind() == ErrorKind::NotFound => { return Ok(()); } _ => {} // ignore } } } Err(deno_core::error::custom_error( "PermissionDenied", format!("Reading {} is not allowed", path.display()), )) }