// Copyright 2018-2023 the Deno authors. All rights reserved. MIT license. use std::cell::RefCell; use std::collections::HashMap; use std::ffi::OsStr; use std::io::Read; use std::io::Write; use std::path::Path; use std::path::PathBuf; use std::process::Command; use std::process::Stdio; use std::rc::Rc; use os_pipe::pipe; use crate::assertions::assert_wildcard_match; use crate::deno_exe_path; use crate::env_vars_for_jsr_tests; use crate::env_vars_for_npm_tests; use crate::fs::PathRef; use crate::http_server; use crate::lsp::LspClientBuilder; use crate::npm_registry_unset_url; use crate::pty::Pty; use crate::strip_ansi_codes; use crate::testdata_path; use crate::HttpServerGuard; use crate::TempDir; #[derive(Default)] pub struct TestContextBuilder { use_http_server: bool, use_temp_cwd: bool, use_symlinked_temp_dir: bool, /// Copies the files at the specified directory in the "testdata" directory /// to the temp folder and runs the test from there. This is useful when /// the test creates files in the testdata directory (ex. a node_modules folder) copy_temp_dir: Option, temp_dir_path: Option, cwd: Option, envs: HashMap, deno_exe: Option, } impl TestContextBuilder { pub fn new() -> Self { Self::default() } pub fn for_npm() -> Self { Self::new().use_http_server().add_npm_env_vars() } pub fn for_jsr() -> Self { Self::new().use_http_server().add_jsr_env_vars() } pub fn temp_dir_path(mut self, path: impl AsRef) -> Self { self.temp_dir_path = Some(path.as_ref().to_path_buf()); self } pub fn use_http_server(mut self) -> Self { self.use_http_server = true; self } pub fn use_temp_cwd(mut self) -> Self { self.use_temp_cwd = true; self } /// Causes the temp directory to be symlinked to a target directory /// which is useful for debugging issues that only show up on the CI. /// /// Note: This method is not actually deprecated, it's just the CI /// does this by default so there's no need to check in any code that /// uses this into the repo. This is just for debugging purposes. #[deprecated] pub fn use_symlinked_temp_dir(mut self) -> Self { self.use_symlinked_temp_dir = true; self } /// Copies the files at the specified directory in the "testdata" directory /// to the temp folder and runs the test from there. This is useful when /// the test creates files in the testdata directory (ex. a node_modules folder) pub fn use_copy_temp_dir(mut self, dir: impl AsRef) -> Self { self.copy_temp_dir = Some(dir.as_ref().to_string()); self } pub fn cwd(mut self, cwd: impl AsRef) -> Self { self.cwd = Some(cwd.as_ref().to_string()); self } pub fn env(mut self, key: impl AsRef, value: impl AsRef) -> Self { self .envs .insert(key.as_ref().to_string(), value.as_ref().to_string()); self } pub fn add_npm_env_vars(mut self) -> Self { for (key, value) in env_vars_for_npm_tests() { self = self.env(key, value); } self } pub fn add_jsr_env_vars(mut self) -> Self { for (key, value) in env_vars_for_jsr_tests() { self = self.env(key, value); } self } pub fn build(&self) -> TestContext { let temp_dir_path = self .temp_dir_path .clone() .unwrap_or_else(std::env::temp_dir); let deno_dir = TempDir::new_in(&temp_dir_path); let temp_dir = TempDir::new_in(&temp_dir_path); let temp_dir = if self.use_symlinked_temp_dir { TempDir::new_symlinked(temp_dir) } else { temp_dir }; let testdata_dir = testdata_path(); if let Some(temp_copy_dir) = &self.copy_temp_dir { let test_data_path = testdata_dir.join(temp_copy_dir); let temp_copy_dir = temp_dir.path().join(temp_copy_dir); temp_copy_dir.create_dir_all(); test_data_path.copy_to_recursive(&temp_copy_dir); } let deno_exe = self.deno_exe.clone().unwrap_or_else(deno_exe_path); println!("deno_exe path {}", deno_exe); let http_server_guard = if self.use_http_server { Some(Rc::new(http_server())) } else { None }; TestContext { cwd: self.cwd.clone(), deno_exe, envs: self.envs.clone(), use_temp_cwd: self.use_temp_cwd || self.copy_temp_dir.is_some(), _http_server_guard: http_server_guard, deno_dir, temp_dir, testdata_dir, } } } #[derive(Clone)] pub struct TestContext { deno_exe: PathRef, envs: HashMap, use_temp_cwd: bool, cwd: Option, _http_server_guard: Option>, deno_dir: TempDir, temp_dir: TempDir, testdata_dir: PathRef, } impl Default for TestContext { fn default() -> Self { TestContextBuilder::default().build() } } impl TestContext { pub fn with_http_server() -> Self { TestContextBuilder::default().use_http_server().build() } pub fn testdata_path(&self) -> &PathRef { &self.testdata_dir } pub fn deno_dir(&self) -> &TempDir { &self.deno_dir } pub fn temp_dir(&self) -> &TempDir { &self.temp_dir } pub fn new_command(&self) -> TestCommandBuilder { TestCommandBuilder { command_name: self.deno_exe.to_string(), args: Default::default(), args_vec: Default::default(), stdin: Default::default(), envs: Default::default(), env_clear: Default::default(), cwd: Default::default(), split_output: false, context: self.clone(), } } pub fn new_lsp_command(&self) -> LspClientBuilder { let mut builder = LspClientBuilder::new(); builder.deno_exe(&self.deno_exe).set_test_context(self); builder } } pub struct TestCommandBuilder { command_name: String, args: String, args_vec: Vec, stdin: Option, envs: HashMap, env_clear: bool, cwd: Option, split_output: bool, context: TestContext, } impl TestCommandBuilder { pub fn command_name(mut self, name: impl AsRef) -> Self { self.command_name = name.as_ref().to_string_lossy().to_string(); self } pub fn args(mut self, text: impl AsRef) -> Self { self.args = text.as_ref().to_string(); self } pub fn args_vec, I: IntoIterator>( mut self, args: I, ) -> Self { self.args_vec = args.into_iter().map(|a| a.as_ref().to_string()).collect(); self } pub fn stdin(mut self, text: impl AsRef) -> Self { self.stdin = Some(text.as_ref().to_string()); self } /// Splits the output into stdout and stderr rather than having them combined. pub fn split_output(mut self) -> Self { // Note: it was previously attempted to capture stdout & stderr separately // then forward the output to a combined pipe, but this was found to be // too racy compared to providing the same combined pipe to both. self.split_output = true; self } pub fn env( mut self, key: impl AsRef, value: impl AsRef, ) -> Self { self.envs.insert( key.as_ref().to_string_lossy().to_string(), value.as_ref().to_string_lossy().to_string(), ); self } pub fn envs>( self, envs: impl IntoIterator, ) -> Self { let mut this = self; for (k, v) in envs { this = this.env(k, v); } this } pub fn env_clear(mut self) -> Self { self.env_clear = true; self } pub fn cwd(mut self, cwd: impl AsRef) -> Self { self.cwd = Some(cwd.as_ref().to_string_lossy().to_string()); self } fn build_cwd(&self) -> PathRef { let root_dir = if self.context.use_temp_cwd { self.context.temp_dir.path().to_owned() } else { self.context.testdata_dir.clone() }; let specified_cwd = self.cwd.as_ref().or(self.context.cwd.as_ref()); match specified_cwd { Some(cwd) => root_dir.join(cwd), None => root_dir, } } fn build_command_path(&self) -> PathRef { let command_name = &self.command_name; if command_name == "deno" { deno_exe_path() } else { PathRef::new(PathBuf::from(command_name)) } } fn build_args(&self) -> Vec { if self.args_vec.is_empty() { std::borrow::Cow::Owned( self .args .split_whitespace() .map(|s| s.to_string()) .collect::>(), ) } else { assert!( self.args.is_empty(), "Do not provide args when providing args_vec." ); std::borrow::Cow::Borrowed(&self.args_vec) } .iter() .map(|arg| { arg.replace( "$TESTDATA", &self.context.testdata_dir.as_path().to_string_lossy(), ) }) .collect::>() } fn build_envs(&self) -> HashMap { let mut envs = self.context.envs.clone(); for (key, value) in &self.envs { envs.insert(key.to_string(), value.to_string()); } envs } pub fn with_pty(&self, mut action: impl FnMut(Pty)) { if !Pty::is_supported() { return; } let args = self.build_args(); let args = args.iter().map(|s| s.as_str()).collect::>(); let mut envs = self.build_envs(); if !envs.contains_key("NO_COLOR") { // set this by default for pty tests envs.insert("NO_COLOR".to_string(), "1".to_string()); } // note(dsherret): for some reason I need to inject the current // environment here for the pty tests or else I get dns errors if !self.env_clear { for (key, value) in std::env::vars() { envs.entry(key).or_insert(value); } } action(Pty::new( self.build_command_path().as_path(), &args, self.build_cwd().as_path(), Some(envs), )) } #[track_caller] pub fn run(&self) -> TestCommandOutput { fn read_pipe_to_string(mut pipe: os_pipe::PipeReader) -> String { let mut output = String::new(); pipe.read_to_string(&mut output).unwrap(); output } fn sanitize_output(text: String, args: &[String]) -> String { let mut text = strip_ansi_codes(&text).to_string(); // deno test's output capturing flushes with a zero-width space in order to // synchronize the output pipes. Occasionally this zero width space // might end up in the output so strip it from the output comparison here. if args.first().map(|s| s.as_str()) == Some("test") { text = text.replace('\u{200B}', ""); } text } let cwd = self.build_cwd(); let args = self.build_args(); let mut command = Command::new(self.build_command_path()); println!("command {} {}", self.command_name, args.join(" ")); println!("command cwd {}", cwd); command.args(args.iter()); if self.env_clear { command.env_clear(); } command.env("DENO_DIR", self.context.deno_dir.path()); let envs = self.build_envs(); if !envs.contains_key("NPM_CONFIG_REGISTRY") { command.env("NPM_CONFIG_REGISTRY", npm_registry_unset_url()); } command.envs(self.build_envs()); command.current_dir(cwd); command.stdin(Stdio::piped()); let (combined_reader, std_out_err_handle) = if self.split_output { let (stdout_reader, stdout_writer) = pipe().unwrap(); let (stderr_reader, stderr_writer) = pipe().unwrap(); command.stdout(stdout_writer); command.stderr(stderr_writer); ( None, Some(( std::thread::spawn(move || read_pipe_to_string(stdout_reader)), std::thread::spawn(move || read_pipe_to_string(stderr_reader)), )), ) } else { let (combined_reader, combined_writer) = pipe().unwrap(); command.stdout(combined_writer.try_clone().unwrap()); command.stderr(combined_writer); (Some(combined_reader), None) }; let mut process = command.spawn().expect("Failed spawning command"); if let Some(input) = &self.stdin { let mut p_stdin = process.stdin.take().unwrap(); write!(p_stdin, "{input}").unwrap(); } // This parent process is still holding its copies of the write ends, // and we have to close them before we read, otherwise the read end // will never report EOF. The Command object owns the writers now, // and dropping it closes them. drop(command); let combined = combined_reader .map(|pipe| sanitize_output(read_pipe_to_string(pipe), &args)); let status = process.wait().unwrap(); let std_out_err = std_out_err_handle.map(|(stdout, stderr)| { ( sanitize_output(stdout.join().unwrap(), &args), sanitize_output(stderr.join().unwrap(), &args), ) }); let exit_code = status.code(); #[cfg(unix)] let signal = { use std::os::unix::process::ExitStatusExt; status.signal() }; #[cfg(not(unix))] let signal = None; TestCommandOutput { exit_code, signal, combined, std_out_err, testdata_dir: self.context.testdata_dir.clone(), asserted_exit_code: RefCell::new(false), asserted_stdout: RefCell::new(false), asserted_stderr: RefCell::new(false), asserted_combined: RefCell::new(false), _test_context: self.context.clone(), } } } pub struct TestCommandOutput { combined: Option, std_out_err: Option<(String, String)>, exit_code: Option, signal: Option, testdata_dir: PathRef, asserted_stdout: RefCell, asserted_stderr: RefCell, asserted_combined: RefCell, asserted_exit_code: RefCell, // keep alive for the duration of the output reference _test_context: TestContext, } impl Drop for TestCommandOutput { // assert the output and exit code was asserted fn drop(&mut self) { fn panic_unasserted_output(text: &str) { println!("OUTPUT\n{text}\nOUTPUT"); panic!(concat!( "The non-empty text of the command was not asserted. ", "Call `output.skip_output_check()` to skip if necessary.", ),); } if std::thread::panicking() { return; } // either the combined output needs to be asserted or both stdout and stderr if let Some(combined) = &self.combined { if !*self.asserted_combined.borrow() && !combined.is_empty() { panic_unasserted_output(combined); } } if let Some((stdout, stderr)) = &self.std_out_err { if !*self.asserted_stdout.borrow() && !stdout.is_empty() { panic_unasserted_output(stdout); } if !*self.asserted_stderr.borrow() && !stderr.is_empty() { panic_unasserted_output(stderr); } } // now ensure the exit code was asserted if !*self.asserted_exit_code.borrow() && self.exit_code != Some(0) { panic!( "The non-zero exit code of the command was not asserted: {:?}", self.exit_code, ) } } } impl TestCommandOutput { pub fn testdata_dir(&self) -> &PathRef { &self.testdata_dir } pub fn skip_output_check(&self) -> &Self { *self.asserted_combined.borrow_mut() = true; *self.asserted_stdout.borrow_mut() = true; *self.asserted_stderr.borrow_mut() = true; self } pub fn skip_exit_code_check(&self) { *self.asserted_exit_code.borrow_mut() = true; } pub fn exit_code(&self) -> Option { self.skip_exit_code_check(); self.exit_code } pub fn signal(&self) -> Option { self.signal } pub fn combined_output(&self) -> &str { self.skip_output_check(); self .combined .as_deref() .expect("not available since .split_output() was called") } pub fn stdout(&self) -> &str { *self.asserted_stdout.borrow_mut() = true; self .std_out_err .as_ref() .map(|(stdout, _)| stdout.as_str()) .expect("call .split_output() on the builder") } pub fn stderr(&self) -> &str { *self.asserted_stderr.borrow_mut() = true; self .std_out_err .as_ref() .map(|(_, stderr)| stderr.as_str()) .expect("call .split_output() on the builder") } #[track_caller] pub fn assert_exit_code(&self, expected_exit_code: i32) -> &Self { let actual_exit_code = self.exit_code(); if let Some(exit_code) = &actual_exit_code { if *exit_code != expected_exit_code { self.print_output(); panic!( "bad exit code, expected: {:?}, actual: {:?}", expected_exit_code, exit_code, ); } } else { self.print_output(); if let Some(signal) = self.signal() { panic!( "process terminated by signal, expected exit code: {:?}, actual signal: {:?}", actual_exit_code, signal, ); } else { panic!( "process terminated without status code on non unix platform, expected exit code: {:?}", actual_exit_code, ); } } self } pub fn print_output(&self) { if let Some(combined) = &self.combined { println!("OUTPUT\n{combined}\nOUTPUT"); } else if let Some((stdout, stderr)) = &self.std_out_err { println!("STDOUT OUTPUT\n{stdout}\nSTDOUT OUTPUT"); println!("STDERR OUTPUT\n{stderr}\nSTDERR OUTPUT"); } } #[track_caller] pub fn assert_matches_text(&self, expected_text: impl AsRef) -> &Self { self.inner_assert_matches_text(self.combined_output(), expected_text) } #[track_caller] pub fn assert_matches_file(&self, file_path: impl AsRef) -> &Self { self.inner_assert_matches_file(self.combined_output(), file_path) } #[track_caller] pub fn assert_stdout_matches_text( &self, expected_text: impl AsRef, ) -> &Self { self.inner_assert_matches_text(self.stdout(), expected_text) } #[track_caller] pub fn assert_stdout_matches_file( &self, file_path: impl AsRef, ) -> &Self { self.inner_assert_matches_file(self.stdout(), file_path) } #[track_caller] pub fn assert_stderr_matches_text( &self, expected_text: impl AsRef, ) -> &Self { self.inner_assert_matches_text(self.stderr(), expected_text) } #[track_caller] pub fn assert_stderr_matches_file( &self, file_path: impl AsRef, ) -> &Self { self.inner_assert_matches_file(self.stderr(), file_path) } #[track_caller] fn inner_assert_matches_text( &self, actual: &str, expected: impl AsRef, ) -> &Self { assert_wildcard_match(actual, expected.as_ref()); self } #[track_caller] fn inner_assert_matches_file( &self, actual: &str, file_path: impl AsRef, ) -> &Self { let output_path = self.testdata_dir().join(file_path); println!("output path {}", output_path); let expected_text = output_path.read_to_string(); self.inner_assert_matches_text(actual, expected_text) } }