// Copyright 2018-2020 the Deno authors. All rights reserved. MIT license. #[macro_use] extern crate lazy_static; #[cfg(unix)] extern crate nix; #[cfg(unix)] extern crate pty; extern crate tempfile; // TODO re-enable. This hangs on macOS // https://github.com/denoland/deno/issues/4262 #[cfg(unix)] #[test] #[ignore] pub fn test_raw_tty() { use pty::fork::*; use std::io::{Read, Write}; let fork = Fork::from_ptmx().unwrap(); if let Ok(mut master) = fork.is_parent() { let mut obytes: [u8; 100] = [0; 100]; let mut nread = master.read(&mut obytes).unwrap(); assert_eq!(String::from_utf8_lossy(&obytes[0..nread]), "S"); master.write_all(b"a").unwrap(); nread = master.read(&mut obytes).unwrap(); assert_eq!(String::from_utf8_lossy(&obytes[0..nread]), "A"); master.write_all(b"b").unwrap(); nread = master.read(&mut obytes).unwrap(); assert_eq!(String::from_utf8_lossy(&obytes[0..nread]), "B"); master.write_all(b"c").unwrap(); nread = master.read(&mut obytes).unwrap(); assert_eq!(String::from_utf8_lossy(&obytes[0..nread]), "C"); } else { use deno::test_util::*; use nix::sys::termios; use std::os::unix::io::AsRawFd; use std::process::*; use tempfile::TempDir; // Turn off echo such that parent is reading works properly. let stdin_fd = std::io::stdin().as_raw_fd(); let mut t = termios::tcgetattr(stdin_fd).unwrap(); t.local_flags.remove(termios::LocalFlags::ECHO); termios::tcsetattr(stdin_fd, termios::SetArg::TCSANOW, &t).unwrap(); let deno_dir = TempDir::new().expect("tempdir fail"); let mut child = Command::new(deno_exe_path()) .env("DENO_DIR", deno_dir.path()) .current_dir(util::root_path()) .arg("run") .arg("cli/tests/raw_mode.ts") .stdin(Stdio::inherit()) .stdout(Stdio::inherit()) .stderr(Stdio::null()) .spawn() .expect("Failed to spawn script"); child.wait().unwrap(); } } #[test] fn test_pattern_match() { assert!(util::pattern_match("foo[BAR]baz", "foobarbaz", "[BAR]")); assert!(!util::pattern_match("foo[BAR]baz", "foobazbar", "[BAR]")); } #[test] fn benchmark_test() { util::run_python_script("tools/benchmark_test.py") } #[test] fn deno_dir_test() { let g = util::http_server(); util::run_python_script("tools/deno_dir_test.py"); drop(g); } #[test] fn fetch_test() { use deno::http_cache::url_to_filename; pub use deno::test_util::*; use std::process::Command; use tempfile::TempDir; use url::Url; let g = util::http_server(); let deno_dir = TempDir::new().expect("tempdir fail"); let module_url = Url::parse("http://localhost:4545/cli/tests/006_url_imports.ts").unwrap(); let output = Command::new(deno_exe_path()) .env("DENO_DIR", deno_dir.path()) .current_dir(util::root_path()) .arg("fetch") .arg(module_url.to_string()) .output() .expect("Failed to spawn script"); assert!(output.status.success()); let out = std::str::from_utf8(&output.stdout).unwrap(); assert_eq!(out, ""); let expected_path = deno_dir .path() .join("deps") .join(url_to_filename(&module_url)); assert_eq!(expected_path.exists(), true); drop(g); } #[test] fn fmt_test() { use tempfile::TempDir; let t = TempDir::new().expect("tempdir fail"); let fixed = util::root_path().join("cli/tests/badly_formatted_fixed.js"); let badly_formatted_original = util::root_path().join("cli/tests/badly_formatted.js"); let badly_formatted = t.path().join("badly_formatted.js"); let badly_formatted_str = badly_formatted.to_str().unwrap(); std::fs::copy(&badly_formatted_original, &badly_formatted) .expect("Failed to copy file"); let status = util::deno_cmd() .current_dir(util::root_path()) .arg("fmt") .arg("--check") .arg(badly_formatted_str) .spawn() .expect("Failed to spawn script") .wait() .expect("Failed to wait for child process"); assert!(!status.success()); let status = util::deno_cmd() .current_dir(util::root_path()) .arg("fmt") .arg(badly_formatted_str) .spawn() .expect("Failed to spawn script") .wait() .expect("Failed to wait for child process"); assert!(status.success()); let expected = std::fs::read_to_string(fixed).unwrap(); let actual = std::fs::read_to_string(badly_formatted).unwrap(); assert_eq!(expected, actual); } #[test] fn fmt_stdin_error() { use std::io::Write; let mut deno = util::deno_cmd() .current_dir(util::root_path()) .arg("fmt") .arg("-") .stdin(std::process::Stdio::piped()) .stdout(std::process::Stdio::piped()) .stderr(std::process::Stdio::piped()) .spawn() .unwrap(); let stdin = deno.stdin.as_mut().unwrap(); let invalid_js = b"import { example }"; stdin.write_all(invalid_js).unwrap(); let output = deno.wait_with_output().unwrap(); // Error message might change. Just check stdout empty, stderr not. assert!(output.stdout.is_empty()); assert!(!output.stderr.is_empty()); assert!(!output.status.success()); } #[test] fn installer_test_local_module_run() { use deno::flags::Flags; use deno::installer; use std::env; use std::path::PathBuf; use std::process::Command; use tempfile::TempDir; let temp_dir = TempDir::new().expect("tempdir fail"); let local_module = env::current_dir().unwrap().join("tests/echo.ts"); let local_module_str = local_module.to_string_lossy(); installer::install( Flags::default(), Some(temp_dir.path().to_path_buf()), "echo_test", &local_module_str, vec!["hello".to_string()], false, ) .expect("Failed to install"); let mut file_path = temp_dir.path().join("echo_test"); if cfg!(windows) { file_path = file_path.with_extension("cmd"); } assert!(file_path.exists()); let path_var_name = if cfg!(windows) { "Path" } else { "PATH" }; let paths_var = env::var_os(path_var_name).expect("PATH not set"); let mut paths: Vec = env::split_paths(&paths_var).collect(); paths.push(temp_dir.path().to_owned()); paths.push(util::target_dir()); let path_var_value = env::join_paths(paths).expect("Can't create PATH"); // NOTE: using file_path here instead of exec_name, because tests // shouldn't mess with user's PATH env variable let output = Command::new(file_path) .current_dir(temp_dir.path()) .arg("foo") .env(path_var_name, path_var_value) .output() .expect("failed to spawn script"); let stdout_str = std::str::from_utf8(&output.stdout).unwrap().trim(); let stderr_str = std::str::from_utf8(&output.stderr).unwrap().trim(); println!("Got stdout: {:?}", stdout_str); println!("Got stderr: {:?}", stderr_str); assert!(stdout_str.ends_with("hello, foo")); drop(temp_dir); } #[test] fn installer_test_remote_module_run() { use deno::flags::Flags; use deno::installer; use std::env; use std::path::PathBuf; use std::process::Command; use tempfile::TempDir; let g = util::http_server(); let temp_dir = TempDir::new().expect("tempdir fail"); installer::install( Flags::default(), Some(temp_dir.path().to_path_buf()), "echo_test", "http://localhost:4545/cli/tests/echo.ts", vec!["hello".to_string()], false, ) .expect("Failed to install"); let mut file_path = temp_dir.path().join("echo_test"); if cfg!(windows) { file_path = file_path.with_extension("cmd"); } assert!(file_path.exists()); let path_var_name = if cfg!(windows) { "Path" } else { "PATH" }; let paths_var = env::var_os(path_var_name).expect("PATH not set"); let mut paths: Vec = env::split_paths(&paths_var).collect(); paths.push(temp_dir.path().to_owned()); paths.push(util::target_dir()); let path_var_value = env::join_paths(paths).expect("Can't create PATH"); // NOTE: using file_path here instead of exec_name, because tests // shouldn't mess with user's PATH env variable let output = Command::new(file_path) .current_dir(temp_dir.path()) .arg("foo") .env(path_var_name, path_var_value) .output() .expect("failed to spawn script"); assert!(std::str::from_utf8(&output.stdout) .unwrap() .trim() .ends_with("hello, foo")); drop(temp_dir); drop(g) } #[test] fn js_unit_tests() { let g = util::http_server(); let mut deno = util::deno_cmd() .current_dir(util::root_path()) .arg("run") .arg("--reload") .arg("-A") .arg("cli/js/tests/unit_test_runner.ts") .arg("--master") .arg("--verbose") .spawn() .expect("failed to spawn script"); let status = deno.wait().expect("failed to wait for the child process"); drop(g); assert_eq!(Some(0), status.code()); assert!(status.success()); } #[test] fn bundle_exports() { use tempfile::TempDir; // First we have to generate a bundle of some module that has exports. let mod1 = util::root_path().join("cli/tests/subdir/mod1.ts"); assert!(mod1.is_file()); let t = TempDir::new().expect("tempdir fail"); let bundle = t.path().join("mod1.bundle.js"); let mut deno = util::deno_cmd() .current_dir(util::root_path()) .arg("bundle") .arg(mod1) .arg(&bundle) .spawn() .expect("failed to spawn script"); let status = deno.wait().expect("failed to wait for the child process"); assert!(status.success()); assert!(bundle.is_file()); // Now we try to use that bundle from another module. let test = t.path().join("test.js"); std::fs::write( &test, " import { printHello3 } from \"./mod1.bundle.js\"; printHello3(); ", ) .expect("error writing file"); let output = util::deno_cmd() .current_dir(util::root_path()) .arg("run") .arg(&test) .output() .expect("failed to spawn script"); // check the output of the test.ts program. assert!(std::str::from_utf8(&output.stdout) .unwrap() .trim() .ends_with("Hello")); assert_eq!(output.stderr, b""); } #[test] fn bundle_circular() { use tempfile::TempDir; // First we have to generate a bundle of some module that has exports. let circular1 = util::root_path().join("cli/tests/subdir/circular1.ts"); assert!(circular1.is_file()); let t = TempDir::new().expect("tempdir fail"); let bundle = t.path().join("circular1.bundle.js"); let mut deno = util::deno_cmd() .current_dir(util::root_path()) .arg("bundle") .arg(circular1) .arg(&bundle) .spawn() .expect("failed to spawn script"); let status = deno.wait().expect("failed to wait for the child process"); assert!(status.success()); assert!(bundle.is_file()); let output = util::deno_cmd() .current_dir(util::root_path()) .arg("run") .arg(&bundle) .output() .expect("failed to spawn script"); // check the output of the the bundle program. assert!(std::str::from_utf8(&output.stdout) .unwrap() .trim() .ends_with("f1\nf2")); assert_eq!(output.stderr, b""); } #[test] fn bundle_single_module() { use tempfile::TempDir; // First we have to generate a bundle of some module that has exports. let single_module = util::root_path().join("cli/tests/subdir/single_module.ts"); assert!(single_module.is_file()); let t = TempDir::new().expect("tempdir fail"); let bundle = t.path().join("single_module.bundle.js"); let mut deno = util::deno_cmd() .current_dir(util::root_path()) .arg("bundle") .arg(single_module) .arg(&bundle) .spawn() .expect("failed to spawn script"); let status = deno.wait().expect("failed to wait for the child process"); assert!(status.success()); assert!(bundle.is_file()); let output = util::deno_cmd() .current_dir(util::root_path()) .arg("run") .arg("--reload") .arg(&bundle) .output() .expect("failed to spawn script"); // check the output of the the bundle program. assert!(std::str::from_utf8(&output.stdout) .unwrap() .trim() .ends_with("Hello world!")); assert_eq!(output.stderr, b""); } #[test] fn bundle_json() { use tempfile::TempDir; let json_modules = util::root_path().join("cli/tests/020_json_modules.ts"); assert!(json_modules.is_file()); let t = TempDir::new().expect("tempdir fail"); let bundle = t.path().join("020_json_modules.bundle.js"); let mut deno = util::deno_cmd() .current_dir(util::root_path()) .arg("bundle") .arg(json_modules) .arg(&bundle) .spawn() .expect("failed to spawn script"); let status = deno.wait().expect("failed to wait for the child process"); assert!(status.success()); assert!(bundle.is_file()); let output = util::deno_cmd() .current_dir(util::root_path()) .arg("run") .arg("--reload") .arg(&bundle) .output() .expect("failed to spawn script"); // check the output of the the bundle program. assert!(std::str::from_utf8(&output.stdout) .unwrap() .trim() .ends_with("{\"foo\":{\"bar\":true,\"baz\":[\"qat\",1]}}")); assert_eq!(output.stderr, b""); } #[test] fn bundle_tla() { // First we have to generate a bundle of some module that has exports. let tla_import = util::root_path().join("cli/tests/subdir/tla.ts"); assert!(tla_import.is_file()); let t = tempfile::TempDir::new().expect("tempdir fail"); let bundle = t.path().join("tla.bundle.js"); let mut deno = util::deno_cmd() .current_dir(util::root_path()) .arg("bundle") .arg(tla_import) .arg(&bundle) .spawn() .expect("failed to spawn script"); let status = deno.wait().expect("failed to wait for the child process"); assert!(status.success()); assert!(bundle.is_file()); // Now we try to use that bundle from another module. let test = t.path().join("test.js"); std::fs::write( &test, " import { foo } from \"./tla.bundle.js\"; console.log(foo); ", ) .expect("error writing file"); let output = util::deno_cmd() .current_dir(util::root_path()) .arg("run") .arg(&test) .output() .expect("failed to spawn script"); // check the output of the test.ts program. assert!(std::str::from_utf8(&output.stdout) .unwrap() .trim() .ends_with("Hello")); assert_eq!(output.stderr, b""); } #[test] fn bundle_js() { use tempfile::TempDir; // First we have to generate a bundle of some module that has exports. let mod6 = util::root_path().join("cli/tests/subdir/mod6.js"); assert!(mod6.is_file()); let t = TempDir::new().expect("tempdir fail"); let bundle = t.path().join("mod6.bundle.js"); let mut deno = util::deno_cmd() .current_dir(util::root_path()) .arg("bundle") .arg(mod6) .arg(&bundle) .spawn() .expect("failed to spawn script"); let status = deno.wait().expect("failed to wait for the child process"); assert!(status.success()); assert!(bundle.is_file()); let output = util::deno_cmd() .current_dir(util::root_path()) .arg("run") .arg(&bundle) .output() .expect("failed to spawn script"); // check that nothing went to stderr assert_eq!(output.stderr, b""); } #[test] fn repl_test_console_log() { let (out, err) = util::run_and_collect_output( true, "repl", Some(vec!["console.log('hello')", "'world'"]), None, false, ); assert_eq!(out, "hello\nundefined\nworld\n"); assert!(err.is_empty()); } #[test] fn repl_test_eof() { let (out, err) = util::run_and_collect_output( true, "repl", Some(vec!["1 + 2"]), None, false, ); assert_eq!(out, "3\n"); assert!(err.is_empty()); } #[test] fn repl_test_exit_command() { let (out, err) = util::run_and_collect_output( true, "repl", Some(vec!["exit", "'ignored'"]), None, false, ); assert!(out.is_empty()); assert!(err.is_empty()); } #[test] fn repl_test_help_command() { let (out, err) = util::run_and_collect_output(true, "repl", Some(vec!["help"]), None, false); assert_eq!( out, vec![ "_ Get last evaluation result", "_error Get last thrown error", "exit Exit the REPL", "help Print this help message", "", ] .join("\n") ); assert!(err.is_empty()); } #[test] fn repl_test_function() { let (out, err) = util::run_and_collect_output( true, "repl", Some(vec!["Deno.writeFileSync"]), None, false, ); assert_eq!(out, "[Function: writeFileSync]\n"); assert!(err.is_empty()); } #[test] fn repl_test_multiline() { let (out, err) = util::run_and_collect_output( true, "repl", Some(vec!["(\n1 + 2\n)"]), None, false, ); assert_eq!(out, "3\n"); assert!(err.is_empty()); } #[test] fn repl_test_eval_unterminated() { let (out, err) = util::run_and_collect_output( true, "repl", Some(vec!["eval('{')"]), None, false, ); assert!(out.is_empty()); assert!(err.contains("Unexpected end of input")); } #[test] fn repl_test_reference_error() { let (out, err) = util::run_and_collect_output( true, "repl", Some(vec!["not_a_variable"]), None, false, ); assert!(out.is_empty()); assert!(err.contains("not_a_variable is not defined")); } #[test] fn repl_test_syntax_error() { let (out, err) = util::run_and_collect_output( true, "repl", Some(vec!["syntax error"]), None, false, ); assert!(out.is_empty()); assert!(err.contains("Unexpected identifier")); } #[test] fn repl_test_type_error() { let (out, err) = util::run_and_collect_output( true, "repl", Some(vec!["console()"]), None, false, ); assert!(out.is_empty()); assert!(err.contains("console is not a function")); } #[test] fn repl_test_variable() { let (out, err) = util::run_and_collect_output( true, "repl", Some(vec!["var a = 123;", "a"]), None, false, ); assert_eq!(out, "undefined\n123\n"); assert!(err.is_empty()); } #[test] fn repl_test_lexical_scoped_variable() { let (out, err) = util::run_and_collect_output( true, "repl", Some(vec!["let a = 123;", "a"]), None, false, ); assert_eq!(out, "undefined\n123\n"); assert!(err.is_empty()); } #[test] fn repl_test_missing_deno_dir() { use std::fs::{read_dir, remove_dir_all}; const DENO_DIR: &str = "nonexistent"; let test_deno_dir = util::root_path().join("cli").join("tests").join(DENO_DIR); let (out, err) = util::run_and_collect_output( true, "repl", Some(vec!["1"]), Some(vec![("DENO_DIR".to_owned(), DENO_DIR.to_owned())]), false, ); assert!(read_dir(&test_deno_dir).is_ok()); remove_dir_all(&test_deno_dir).unwrap(); assert_eq!(out, "1\n"); assert!(err.is_empty()); } #[test] fn repl_test_save_last_eval() { let (out, err) = util::run_and_collect_output( true, "repl", Some(vec!["1", "_"]), None, false, ); assert_eq!(out, "1\n1\n"); assert!(err.is_empty()); } #[test] fn repl_test_save_last_thrown() { let (out, err) = util::run_and_collect_output( true, "repl", Some(vec!["throw 1", "_error"]), None, false, ); assert_eq!(out, "1\n"); assert_eq!(err, "Thrown: 1\n"); } #[test] fn repl_test_assign_underscore() { let (out, err) = util::run_and_collect_output( true, "repl", Some(vec!["_ = 1", "2", "_"]), None, false, ); assert_eq!( out, "Last evaluation result is no longer saved to _.\n1\n2\n1\n" ); assert!(err.is_empty()); } #[test] fn repl_test_assign_underscore_error() { let (out, err) = util::run_and_collect_output( true, "repl", Some(vec!["_error = 1", "throw 2", "_error"]), None, false, ); assert_eq!( out, "Last thrown error is no longer saved to _error.\n1\n1\n" ); assert_eq!(err, "Thrown: 2\n"); } #[test] fn target_test() { util::run_python_script("tools/target_test.py") } #[test] fn util_test() { util::run_python_script("tools/util_test.py") } macro_rules! itest( ($name:ident {$( $key:ident: $value:expr,)*}) => { #[test] fn $name() { (util::CheckOutputIntegrationTest { $( $key: $value, )* .. Default::default() }).run() } } ); // Unfortunately #[ignore] doesn't work with itest! macro_rules! itest_ignore( ($name:ident {$( $key:ident: $value:expr,)*}) => { #[ignore] #[test] fn $name() { (util::CheckOutputIntegrationTest { $( $key: $value, )* .. Default::default() }).run() } } ); itest!(_001_hello { args: "run --reload 001_hello.js", output: "001_hello.js.out", }); itest!(_002_hello { args: "run --reload 002_hello.ts", output: "002_hello.ts.out", }); itest!(_003_relative_import { args: "run --reload 003_relative_import.ts", output: "003_relative_import.ts.out", }); itest!(_004_set_timeout { args: "run --reload 004_set_timeout.ts", output: "004_set_timeout.ts.out", }); itest!(_005_more_imports { args: "run --reload 005_more_imports.ts", output: "005_more_imports.ts.out", }); itest!(_006_url_imports { args: "run --reload 006_url_imports.ts", output: "006_url_imports.ts.out", http_server: true, }); itest!(_012_async { args: "run --reload 012_async.ts", output: "012_async.ts.out", }); itest!(_013_dynamic_import { args: "run --reload --allow-read 013_dynamic_import.ts", output: "013_dynamic_import.ts.out", }); itest!(_014_duplicate_import { args: "run --reload --allow-read 014_duplicate_import.ts ", output: "014_duplicate_import.ts.out", }); itest!(_015_duplicate_parallel_import { args: "run --reload --allow-read 015_duplicate_parallel_import.js", output: "015_duplicate_parallel_import.js.out", }); itest!(_016_double_await { args: "run --allow-read --reload 016_double_await.ts", output: "016_double_await.ts.out", }); itest!(_017_import_redirect { args: "run --reload 017_import_redirect.ts", output: "017_import_redirect.ts.out", }); itest!(_018_async_catch { args: "run --reload 018_async_catch.ts", output: "018_async_catch.ts.out", }); // TODO(ry) Re-enable flaky test https://github.com/denoland/deno/issues/4049 itest_ignore!(_019_media_types { args: "run --reload 019_media_types.ts", output: "019_media_types.ts.out", http_server: true, }); itest!(_020_json_modules { args: "run --reload 020_json_modules.ts", output: "020_json_modules.ts.out", }); itest!(_021_mjs_modules { args: "run --reload 021_mjs_modules.ts", output: "021_mjs_modules.ts.out", }); // TODO(ry) Re-enable flaky test https://github.com/denoland/deno/issues/4049 itest_ignore!(_022_info_flag_script { args: "info http://127.0.0.1:4545/cli/tests/019_media_types.ts", output: "022_info_flag_script.out", http_server: true, }); itest!(_023_no_ext_with_headers { args: "run --reload 023_no_ext_with_headers", output: "023_no_ext_with_headers.out", }); // FIXME(bartlomieju): this test should use remote file itest_ignore!(_024_import_no_ext_with_headers { args: "run --reload 024_import_no_ext_with_headers.ts", output: "024_import_no_ext_with_headers.ts.out", }); itest!(_025_hrtime { args: "run --allow-hrtime --reload 025_hrtime.ts", output: "025_hrtime.ts.out", }); itest!(_025_reload_js_type_error { args: "run --reload 025_reload_js_type_error.js", output: "025_reload_js_type_error.js.out", }); itest!(_026_redirect_javascript { args: "run --reload 026_redirect_javascript.js", output: "026_redirect_javascript.js.out", http_server: true, }); itest!(workers { args: "test --reload --allow-net workers_test.ts", http_server: true, output: "workers_test.out", }); itest!(compiler_api { args: "test --reload compiler_api_test.ts", output: "compiler_api_test.out", }); itest!(_027_redirect_typescript { args: "run --reload 027_redirect_typescript.ts", output: "027_redirect_typescript.ts.out", http_server: true, }); itest!(_028_args { args: "run --reload 028_args.ts --arg1 val1 --arg2=val2 -- arg3 arg4", output: "028_args.ts.out", }); itest!(_029_eval { args: "eval console.log(\"hello\")", output: "029_eval.out", }); // Ugly parentheses due to whitespace delimiting problem. itest!(_030_eval_ts { args: "eval -T console.log((123)as(number))", // 'as' is a TS keyword only output: "030_eval_ts.out", }); itest!(_033_import_map { args: "run --reload --importmap=importmaps/import_map.json importmaps/test.ts", output: "033_import_map.out", }); itest!(_034_onload { args: "run --reload 034_onload/main.ts", output: "034_onload.out", }); // TODO(ry) Re-enable flaky test https://github.com/denoland/deno/issues/4049 itest_ignore!(_035_cached_only_flag { args: "--reload --cached-only http://127.0.0.1:4545/cli/tests/019_media_types.ts", output: "035_cached_only_flag.out", exit_code: 1, check_stderr: true, http_server: true, }); itest!(_036_import_map_fetch { args: "fetch --reload --importmap=importmaps/import_map.json importmaps/test.ts", output: "036_import_map_fetch.out", }); itest!(_037_fetch_multiple { args: "fetch --reload fetch/test.ts fetch/other.ts", check_stderr: true, http_server: true, output: "037_fetch_multiple.out", }); itest!(_038_checkjs { // checking if JS file is run through TS compiler args: "run --reload --config 038_checkjs.tsconfig.json 038_checkjs.js", check_stderr: true, exit_code: 1, output: "038_checkjs.js.out", }); // TODO(bartlomieju): re-enable itest_ignore!(_039_worker_deno_ns { args: "run --reload 039_worker_deno_ns.ts", output: "039_worker_deno_ns.ts.out", }); itest_ignore!(_040_worker_blob { args: "run --reload 040_worker_blob.ts", output: "040_worker_blob.ts.out", }); itest!(_041_dyn_import_eval { args: "eval import('./subdir/mod4.js').then(console.log)", output: "041_dyn_import_eval.out", }); itest!(_041_info_flag { args: "info", output: "041_info_flag.out", }); itest!(_042_dyn_import_evalcontext { args: "run --allow-read --reload 042_dyn_import_evalcontext.ts", output: "042_dyn_import_evalcontext.ts.out", }); itest!(_044_bad_resource { args: "run --reload --allow-read 044_bad_resource.ts", output: "044_bad_resource.ts.out", check_stderr: true, exit_code: 1, }); itest_ignore!(_045_proxy { args: "run --allow-net --allow-env --allow-run --reload 045_proxy_test.ts", output: "045_proxy_test.ts.out", http_server: true, }); itest!(_046_tsx { args: "run --reload 046_jsx_test.tsx", output: "046_jsx_test.tsx.out", }); itest!(_047_jsx { args: "run --reload 047_jsx_test.jsx", output: "047_jsx_test.jsx.out", }); // TODO(ry) Re-enable flaky test https://github.com/denoland/deno/issues/4049 itest_ignore!(_048_media_types_jsx { args: "run --reload 048_media_types_jsx.ts", output: "048_media_types_jsx.ts.out", http_server: true, }); // TODO(ry) Re-enable flaky test https://github.com/denoland/deno/issues/4049 itest_ignore!(_049_info_flag_script_jsx { args: "info http://127.0.0.1:4545/cli/tests/048_media_types_jsx.ts", output: "049_info_flag_script_jsx.out", http_server: true, }); itest!(_050_more_jsons { args: "run --reload 050_more_jsons.ts", output: "050_more_jsons.ts.out", }); itest!(_051_wasm_import { args: "run --reload --allow-net --allow-read 051_wasm_import.ts", output: "051_wasm_import.ts.out", http_server: true, }); // TODO(ry) Re-enable flaky test https://github.com/denoland/deno/issues/4049 itest_ignore!(_052_no_remote_flag { args: "--reload --no-remote http://127.0.0.1:4545/cli/tests/019_media_types.ts", output: "052_no_remote_flag.out", exit_code: 1, check_stderr: true, http_server: true, }); itest!(_054_info_local_imports { args: "info 005_more_imports.ts", output: "054_info_local_imports.out", exit_code: 0, }); itest!(_055_import_wasm_via_network { args: "run --reload http://127.0.0.1:4545/cli/tests/055_import_wasm_via_network.ts", output: "055_import_wasm_via_network.ts.out", http_server: true, }); itest!(_056_make_temp_file_write_perm { args: "run --allow-write=./subdir/ 056_make_temp_file_write_perm.ts", output: "056_make_temp_file_write_perm.out", }); itest!(_057_revoke_permissions { args: "test -A 057_revoke_permissions.ts", output: "057_revoke_permissions.out", }); itest!(js_import_detect { args: "run --reload js_import_detect.ts", output: "js_import_detect.ts.out", exit_code: 0, }); itest!(lock_write_fetch { args: "run --allow-read --allow-write --allow-env --allow-run lock_write_fetch.ts", output: "lock_write_fetch.ts.out", exit_code: 0, }); itest!(lock_check_ok { args: "run --lock=lock_check_ok.json http://127.0.0.1:4545/cli/tests/003_relative_import.ts", output: "003_relative_import.ts.out", http_server: true, }); // TODO(ry) Re-enable flaky test https://github.com/denoland/deno/issues/4049 itest_ignore!(lock_check_ok2 { args: "run 019_media_types.ts --lock=lock_check_ok2.json", output: "019_media_types.ts.out", http_server: true, }); itest!(lock_check_err { args: "run --lock=lock_check_err.json http://127.0.0.1:4545/cli/tests/003_relative_import.ts", output: "lock_check_err.out", check_stderr: true, exit_code: 10, http_server: true, }); // TODO(ry) Re-enable flaky test https://github.com/denoland/deno/issues/4049 itest_ignore!(lock_check_err2 { args: "run --lock=lock_check_err2.json 019_media_types.ts", output: "lock_check_err2.out", check_stderr: true, exit_code: 10, http_server: true, }); itest!(async_error { exit_code: 1, args: "run --reload async_error.ts", check_stderr: true, output: "async_error.ts.out", }); itest!(bundle { args: "bundle subdir/mod1.ts", output: "bundle.test.out", }); itest!(fmt_stdin { args: "fmt -", input: Some("const a = 1\n"), output_str: Some("const a = 1;\n"), }); itest!(fmt_stdin_check_formatted { args: "fmt --check -", input: Some("const a = 1;\n"), output_str: Some(""), }); itest!(fmt_stdin_check_not_formatted { args: "fmt --check -", input: Some("const a = 1\n"), output_str: Some("Not formatted stdin\n"), }); itest!(circular1 { args: "run --reload circular1.js", output: "circular1.js.out", }); itest!(config { args: "run --reload --config config.tsconfig.json config.ts", check_stderr: true, exit_code: 1, output: "config.ts.out", }); itest!(error_001 { args: "run --reload error_001.ts", check_stderr: true, exit_code: 1, output: "error_001.ts.out", }); itest!(error_002 { args: "run --reload error_002.ts", check_stderr: true, exit_code: 1, output: "error_002.ts.out", }); itest!(error_003_typescript { args: "run --reload error_003_typescript.ts", check_stderr: true, exit_code: 1, output: "error_003_typescript.ts.out", }); // Supposing that we've already attempted to run error_003_typescript.ts // we want to make sure that JS wasn't emitted. Running again without reload flag // should result in the same output. // https://github.com/denoland/deno/issues/2436 itest!(error_003_typescript2 { args: "run error_003_typescript.ts", check_stderr: true, exit_code: 1, output: "error_003_typescript.ts.out", }); itest!(error_004_missing_module { args: "run --reload error_004_missing_module.ts", check_stderr: true, exit_code: 1, output: "error_004_missing_module.ts.out", }); itest!(error_005_missing_dynamic_import { args: "run --reload error_005_missing_dynamic_import.ts", check_stderr: true, exit_code: 1, output: "error_005_missing_dynamic_import.ts.out", }); itest!(error_006_import_ext_failure { args: "run --reload error_006_import_ext_failure.ts", check_stderr: true, exit_code: 1, output: "error_006_import_ext_failure.ts.out", }); itest!(error_007_any { args: "run --reload error_007_any.ts", check_stderr: true, exit_code: 1, output: "error_007_any.ts.out", }); itest!(error_008_checkjs { args: "run --reload error_008_checkjs.js", check_stderr: true, exit_code: 1, output: "error_008_checkjs.js.out", }); itest!(error_011_bad_module_specifier { args: "run --reload error_011_bad_module_specifier.ts", check_stderr: true, exit_code: 1, output: "error_011_bad_module_specifier.ts.out", }); itest!(error_012_bad_dynamic_import_specifier { args: "run --reload error_012_bad_dynamic_import_specifier.ts", check_stderr: true, exit_code: 1, output: "error_012_bad_dynamic_import_specifier.ts.out", }); itest!(error_013_missing_script { args: "run --reload missing_file_name", check_stderr: true, exit_code: 1, output: "error_013_missing_script.out", }); itest!(error_014_catch_dynamic_import_error { args: "run --reload --allow-read error_014_catch_dynamic_import_error.js", output: "error_014_catch_dynamic_import_error.js.out", exit_code: 1, }); itest!(error_015_dynamic_import_permissions { args: "--reload error_015_dynamic_import_permissions.js", output: "error_015_dynamic_import_permissions.out", check_stderr: true, exit_code: 1, http_server: true, }); // We have an allow-net flag but not allow-read, it should still result in error. itest!(error_016_dynamic_import_permissions2 { args: "--reload --allow-net error_016_dynamic_import_permissions2.js", output: "error_016_dynamic_import_permissions2.out", check_stderr: true, exit_code: 1, http_server: true, }); itest!(error_stack { args: "run --reload error_stack.ts", check_stderr: true, exit_code: 1, output: "error_stack.ts.out", }); itest!(error_syntax { args: "run --reload error_syntax.js", check_stderr: true, exit_code: 1, output: "error_syntax.js.out", }); itest!(error_type_definitions { args: "run --reload error_type_definitions.ts", check_stderr: true, exit_code: 1, output: "error_type_definitions.ts.out", }); // TODO(bartlomieju) Re-enable itest_ignore!(error_worker_dynamic { args: "run --reload error_worker_dynamic.ts", check_stderr: true, exit_code: 1, output: "error_worker_dynamic.ts.out", }); itest!(exit_error42 { exit_code: 42, args: "run --reload exit_error42.ts", output: "exit_error42.ts.out", }); itest!(https_import { args: "run --reload https_import.ts", output: "https_import.ts.out", }); itest!(if_main { args: "run --reload if_main.ts", output: "if_main.ts.out", }); itest!(import_meta { args: "run --reload import_meta.ts", output: "import_meta.ts.out", }); itest!(lib_ref { args: "run --reload lib_ref.ts", output: "lib_ref.ts.out", }); itest!(lib_runtime_api { args: "run --reload lib_runtime_api.ts", output: "lib_runtime_api.ts.out", }); itest!(seed_random { args: "run --seed=100 seed_random.js", output: "seed_random.js.out", }); itest!(type_definitions { args: "run --reload type_definitions.ts", output: "type_definitions.ts.out", }); itest!(type_directives_01 { args: "run --reload -L debug type_directives_01.ts", output: "type_directives_01.ts.out", http_server: true, }); itest!(type_directives_02 { args: "run --reload -L debug type_directives_02.ts", output: "type_directives_02.ts.out", }); itest!(types { args: "types", output: "types.out", }); itest!(unbuffered_stderr { args: "run --reload unbuffered_stderr.ts", check_stderr: true, output: "unbuffered_stderr.ts.out", }); itest!(unbuffered_stdout { args: "run --reload unbuffered_stdout.ts", output: "unbuffered_stdout.ts.out", }); // Cannot write the expression to evaluate as "console.log(typeof gc)" // because itest! splits args on whitespace. itest!(eval_v8_flags { args: "eval --v8-flags=--expose-gc console.log(typeof(gc))", output: "v8_flags.js.out", }); itest!(run_v8_flags { args: "run --v8-flags=--expose-gc v8_flags.js", output: "v8_flags.js.out", }); itest!(run_v8_help { args: "--v8-flags=--help", output: "v8_help.out", }); itest!(wasm { args: "run wasm.ts", output: "wasm.ts.out", }); itest!(wasm_async { args: "wasm_async.js", output: "wasm_async.out", }); itest!(top_level_await { args: "--allow-read top_level_await.js", output: "top_level_await.out", }); itest!(top_level_await_ts { args: "--allow-read top_level_await.ts", output: "top_level_await.out", }); itest!(top_level_for_await { args: "top_level_for_await.js", output: "top_level_for_await.out", }); itest!(top_level_for_await_ts { args: "top_level_for_await.ts", output: "top_level_for_await.out", }); itest!(_053_import_compression { args: "run --reload --allow-net 053_import_compression/main.ts", output: "053_import_compression.out", http_server: true, }); itest!(cafile_url_imports { args: "run --reload --cert tls/RootCA.pem cafile_url_imports.ts", output: "cafile_url_imports.ts.out", http_server: true, }); itest!(cafile_ts_fetch { args: "run --reload --allow-net --cert tls/RootCA.pem cafile_ts_fetch.ts", output: "cafile_ts_fetch.ts.out", http_server: true, }); itest!(cafile_eval { args: "eval --cert tls/RootCA.pem fetch('https://localhost:5545/cli/tests/cafile_ts_fetch.ts.out').then(r=>r.text()).then(t=>console.log(t.trimEnd()))", output: "cafile_ts_fetch.ts.out", http_server: true, }); itest!(cafile_info { args: "info --cert tls/RootCA.pem https://localhost:5545/cli/tests/cafile_info.ts", output: "cafile_info.ts.out", http_server: true, }); itest!(fix_js_import_js { args: "run --reload fix_js_import_js.ts", output: "fix_js_import_js.ts.out", }); itest!(fix_js_imports { args: "run --reload fix_js_imports.ts", output: "fix_js_imports.ts.out", }); itest!(proto_exploit { args: "run proto_exploit.js", output: "proto_exploit.js.out", }); #[test] fn cafile_fetch() { use deno::http_cache::url_to_filename; pub use deno::test_util::*; use std::process::Command; use tempfile::TempDir; use url::Url; let g = util::http_server(); let deno_dir = TempDir::new().expect("tempdir fail"); let module_url = Url::parse("http://localhost:4545/cli/tests/cafile_url_imports.ts") .unwrap(); let cafile = util::root_path().join("cli/tests/tls/RootCA.pem"); let output = Command::new(deno_exe_path()) .env("DENO_DIR", deno_dir.path()) .current_dir(util::root_path()) .arg("fetch") .arg("--cert") .arg(cafile) .arg(module_url.to_string()) .output() .expect("Failed to spawn script"); let code = output.status.code(); let out = std::str::from_utf8(&output.stdout).unwrap(); assert_eq!(Some(0), code); assert_eq!(out, ""); let expected_path = deno_dir .path() .join("deps") .join(url_to_filename(&module_url)); assert_eq!(expected_path.exists(), true); drop(g); } // TODO(ry) Re-enable this broken test. #[test] #[ignore] fn cafile_install_remote_module() { pub use deno::test_util::*; use std::env; use std::path::PathBuf; use std::process::Command; use tempfile::TempDir; let g = util::http_server(); let temp_dir = TempDir::new().expect("tempdir fail"); let deno_dir = TempDir::new().expect("tempdir fail"); let cafile = util::root_path().join("cli/tests/tls/RootCA.pem"); let install_output = Command::new(deno_exe_path()) .env("DENO_DIR", deno_dir.path()) .current_dir(util::root_path()) .arg("install") .arg("--cert") .arg(cafile) .arg("--dir") .arg(temp_dir.path()) .arg("echo_test") .arg("https://localhost:5545/cli/tests/echo.ts") .output() .expect("Failed to spawn script"); let code = install_output.status.code(); assert_eq!(Some(0), code); let mut file_path = temp_dir.path().join("echo_test"); if cfg!(windows) { file_path = file_path.with_extension(".cmd"); } assert!(file_path.exists()); let path_var_name = if cfg!(windows) { "Path" } else { "PATH" }; let paths_var = env::var_os(path_var_name).expect("PATH not set"); let mut paths: Vec = env::split_paths(&paths_var).collect(); paths.push(temp_dir.path().to_owned()); paths.push(util::target_dir()); let path_var_value = env::join_paths(paths).expect("Can't create PATH"); let output = Command::new(file_path) .current_dir(temp_dir.path()) .arg("foo") .env(path_var_name, path_var_value) .output() .expect("failed to spawn script"); assert!(std::str::from_utf8(&output.stdout) .unwrap() .trim() .ends_with("foo")); drop(deno_dir); drop(temp_dir); drop(g) } #[test] fn cafile_bundle_remote_exports() { use tempfile::TempDir; let g = util::http_server(); // First we have to generate a bundle of some remote module that has exports. let mod1 = "https://localhost:5545/cli/tests/subdir/mod1.ts"; let cafile = util::root_path().join("cli/tests/tls/RootCA.pem"); let t = TempDir::new().expect("tempdir fail"); let bundle = t.path().join("mod1.bundle.js"); let mut deno = util::deno_cmd() .current_dir(util::root_path()) .arg("bundle") .arg("--cert") .arg(cafile) .arg(mod1) .arg(&bundle) .spawn() .expect("failed to spawn script"); let status = deno.wait().expect("failed to wait for the child process"); assert!(status.success()); assert!(bundle.is_file()); // Now we try to use that bundle from another module. let test = t.path().join("test.js"); std::fs::write( &test, " import { printHello3 } from \"./mod1.bundle.js\"; printHello3(); ", ) .expect("error writing file"); let output = util::deno_cmd() .current_dir(util::root_path()) .arg("run") .arg(&test) .output() .expect("failed to spawn script"); // check the output of the test.ts program. assert!(std::str::from_utf8(&output.stdout) .unwrap() .trim() .ends_with("Hello")); assert_eq!(output.stderr, b""); drop(g) } #[test] fn test_permissions_with_allow() { for permission in &util::PERMISSION_VARIANTS { let (_, err) = util::run_and_collect_output( true, &format!("run --allow-{0} permission_test.ts {0}Required", permission), None, None, false, ); assert!(!err.contains(util::PERMISSION_DENIED_PATTERN)); } } #[test] fn test_permissions_without_allow() { for permission in &util::PERMISSION_VARIANTS { let (_, err) = util::run_and_collect_output( false, &format!("run permission_test.ts {0}Required", permission), None, None, false, ); assert!(err.contains(util::PERMISSION_DENIED_PATTERN)); } } #[test] fn test_permissions_rw_inside_project_dir() { const PERMISSION_VARIANTS: [&str; 2] = ["read", "write"]; for permission in &PERMISSION_VARIANTS { let (_, err) = util::run_and_collect_output( true, &format!( "run --allow-{0}={1} complex_permissions_test.ts {0} {2} {2}", permission, util::root_path().into_os_string().into_string().unwrap(), "complex_permissions_test.ts" ), None, None, false, ); assert!(!err.contains(util::PERMISSION_DENIED_PATTERN)); } } #[test] fn test_permissions_rw_outside_test_dir() { const PERMISSION_VARIANTS: [&str; 2] = ["read", "write"]; for permission in &PERMISSION_VARIANTS { let (_, err) = util::run_and_collect_output( false, &format!( "run --allow-{0}={1} complex_permissions_test.ts {0} {2}", permission, util::root_path() .join("cli") .join("tests") .into_os_string() .into_string() .unwrap(), util::root_path() .join("Cargo.toml") .into_os_string() .into_string() .unwrap(), ), None, None, false, ); assert!(err.contains(util::PERMISSION_DENIED_PATTERN)); } } #[test] fn test_permissions_rw_inside_test_dir() { const PERMISSION_VARIANTS: [&str; 2] = ["read", "write"]; for permission in &PERMISSION_VARIANTS { let (_, err) = util::run_and_collect_output( true, &format!( "run --allow-{0}={1} complex_permissions_test.ts {0} {2}", permission, util::root_path() .join("cli") .join("tests") .into_os_string() .into_string() .unwrap(), "complex_permissions_test.ts" ), None, None, false, ); assert!(!err.contains(util::PERMISSION_DENIED_PATTERN)); } } #[test] fn test_permissions_rw_outside_test_and_js_dir() { const PERMISSION_VARIANTS: [&str; 2] = ["read", "write"]; let test_dir = util::root_path() .join("cli") .join("tests") .into_os_string() .into_string() .unwrap(); let js_dir = util::root_path() .join("js") .into_os_string() .into_string() .unwrap(); for permission in &PERMISSION_VARIANTS { let (_, err) = util::run_and_collect_output( false, &format!( "run --allow-{0}={1},{2} complex_permissions_test.ts {0} {3}", permission, test_dir, js_dir, util::root_path() .join("Cargo.toml") .into_os_string() .into_string() .unwrap(), ), None, None, false, ); assert!(err.contains(util::PERMISSION_DENIED_PATTERN)); } } #[test] fn test_permissions_rw_inside_test_and_js_dir() { const PERMISSION_VARIANTS: [&str; 2] = ["read", "write"]; let test_dir = util::root_path() .join("cli") .join("tests") .into_os_string() .into_string() .unwrap(); let js_dir = util::root_path() .join("js") .into_os_string() .into_string() .unwrap(); for permission in &PERMISSION_VARIANTS { let (_, err) = util::run_and_collect_output( true, &format!( "run --allow-{0}={1},{2} complex_permissions_test.ts {0} {3}", permission, test_dir, js_dir, "complex_permissions_test.ts" ), None, None, false, ); assert!(!err.contains(util::PERMISSION_DENIED_PATTERN)); } } #[test] fn test_permissions_rw_relative() { const PERMISSION_VARIANTS: [&str; 2] = ["read", "write"]; for permission in &PERMISSION_VARIANTS { let (_, err) = util::run_and_collect_output( true, &format!( "run --allow-{0}=. complex_permissions_test.ts {0} complex_permissions_test.ts", permission ), None, None, false, ); assert!(!err.contains(util::PERMISSION_DENIED_PATTERN)); } } #[test] fn test_permissions_rw_no_prefix() { const PERMISSION_VARIANTS: [&str; 2] = ["read", "write"]; for permission in &PERMISSION_VARIANTS { let (_, err) = util::run_and_collect_output( true, &format!( "run --allow-{0}=tls/../ complex_permissions_test.ts {0} complex_permissions_test.ts", permission ), None, None, false, ); assert!(!err.contains(util::PERMISSION_DENIED_PATTERN)); } } #[test] fn test_permissions_net_fetch_allow_localhost_4545() { let (_, err) = util::run_and_collect_output( true, "run --allow-net=localhost:4545 complex_permissions_test.ts netFetch http://localhost:4545/", None, None, true, ); assert!(!err.contains(util::PERMISSION_DENIED_PATTERN)); } #[test] fn test_permissions_net_fetch_allow_deno_land() { let (_, err) = util::run_and_collect_output( false, "run --allow-net=deno.land complex_permissions_test.ts netFetch http://localhost:4545/", None, None, true, ); assert!(err.contains(util::PERMISSION_DENIED_PATTERN)); } #[test] fn test_permissions_net_fetch_localhost_4545_fail() { let (_, err) = util::run_and_collect_output( false, "run --allow-net=localhost:4545 complex_permissions_test.ts netFetch http://localhost:4546/", None, None, true, ); assert!(err.contains(util::PERMISSION_DENIED_PATTERN)); } #[test] fn test_permissions_net_fetch_localhost() { let (_, err) = util::run_and_collect_output( true, "run --allow-net=localhost complex_permissions_test.ts netFetch http://localhost:4545/ http://localhost:4546/ http://localhost:4547/", None, None, true, ); assert!(!err.contains(util::PERMISSION_DENIED_PATTERN)); } #[test] fn test_permissions_net_connect_allow_localhost_ip_4555() { let (_, err) = util::run_and_collect_output( true, "run --allow-net=127.0.0.1:4545 complex_permissions_test.ts netConnect 127.0.0.1:4545", None, None, true, ); assert!(!err.contains(util::PERMISSION_DENIED_PATTERN)); } #[test] fn test_permissions_net_connect_allow_deno_land() { let (_, err) = util::run_and_collect_output( false, "run --allow-net=deno.land complex_permissions_test.ts netConnect 127.0.0.1:4546", None, None, true, ); assert!(err.contains(util::PERMISSION_DENIED_PATTERN)); } #[test] fn test_permissions_net_connect_allow_localhost_ip_4545_fail() { let (_, err) = util::run_and_collect_output( false, "run --allow-net=127.0.0.1:4545 complex_permissions_test.ts netConnect 127.0.0.1:4546", None, None, true, ); assert!(err.contains(util::PERMISSION_DENIED_PATTERN)); } #[test] fn test_permissions_net_connect_allow_localhost_ip() { let (_, err) = util::run_and_collect_output( true, "run --allow-net=127.0.0.1 complex_permissions_test.ts netConnect 127.0.0.1:4545 127.0.0.1:4546 127.0.0.1:4547", None, None, true, ); assert!(!err.contains(util::PERMISSION_DENIED_PATTERN)); } #[test] fn test_permissions_net_listen_allow_localhost_4555() { let (_, err) = util::run_and_collect_output( true, "run --allow-net=localhost:4558 complex_permissions_test.ts netListen localhost:4558", None, None, false, ); assert!(!err.contains(util::PERMISSION_DENIED_PATTERN)); } #[test] fn test_permissions_net_listen_allow_deno_land() { let (_, err) = util::run_and_collect_output( false, "run --allow-net=deno.land complex_permissions_test.ts netListen localhost:4545", None, None, false, ); assert!(err.contains(util::PERMISSION_DENIED_PATTERN)); } #[test] fn test_permissions_net_listen_allow_localhost_4555_fail() { let (_, err) = util::run_and_collect_output( false, "run --allow-net=localhost:4555 complex_permissions_test.ts netListen localhost:4556", None, None, false, ); assert!(err.contains(util::PERMISSION_DENIED_PATTERN)); } #[test] fn test_permissions_net_listen_allow_localhost() { // Port 4600 is chosen to not colide with those used by tools/http_server.py let (_, err) = util::run_and_collect_output( true, "run --allow-net=localhost complex_permissions_test.ts netListen localhost:4600", None, None, false, ); assert!(!err.contains(util::PERMISSION_DENIED_PATTERN)); } mod util { use deno::colors::strip_ansi_codes; pub use deno::test_util::*; use os_pipe::pipe; use std::io::Read; use std::io::Write; use std::process::Command; use std::process::Output; use std::process::Stdio; use tempfile::TempDir; pub const PERMISSION_VARIANTS: [&str; 5] = ["read", "write", "env", "net", "run"]; pub const PERMISSION_DENIED_PATTERN: &str = "PermissionDenied"; lazy_static! { static ref DENO_DIR: TempDir = { TempDir::new().expect("tempdir fail") }; } pub fn run_and_collect_output( expect_success: bool, args: &str, input: Option>, envs: Option>, need_http_server: bool, ) -> (String, String) { let root = root_path(); let tests_dir = root.join("cli").join("tests"); let mut deno_process_builder = deno_cmd(); deno_process_builder.args(args.split_whitespace()); deno_process_builder .current_dir(&tests_dir) .stdin(Stdio::piped()) .stdout(Stdio::piped()) .stderr(Stdio::piped()); if let Some(envs) = envs { deno_process_builder.envs(envs); } let http_guard = if need_http_server { Some(http_server()) } else { None }; let mut deno = deno_process_builder .spawn() .expect("failed to spawn script"); if let Some(lines) = input { let stdin = deno.stdin.as_mut().expect("failed to get stdin"); stdin .write_all(lines.join("\n").as_bytes()) .expect("failed to write to stdin"); } let Output { stdout, stderr, status, } = deno.wait_with_output().expect("failed to wait on child"); drop(http_guard); let stdout = String::from_utf8(stdout).unwrap(); let stderr = String::from_utf8(stderr).unwrap(); if expect_success != status.success() { eprintln!("stdout: <<<{}>>>", stdout); eprintln!("stderr: <<<{}>>>", stderr); panic!("Unexpected exit code: {:?}", status.code()); } (stdout, stderr) } pub fn deno_cmd() -> Command { let mut c = Command::new(deno_exe_path()); c.env("DENO_DIR", DENO_DIR.path()); c } pub fn run_python_script(script: &str) { let output = Command::new("python") .env("DENO_DIR", DENO_DIR.path()) .current_dir(root_path()) .arg(script) .arg(format!("--executable={}", deno_exe_path().display())) .env("DENO_BUILD_PATH", target_dir()) .output() .expect("failed to spawn script"); if !output.status.success() { let stdout = String::from_utf8(output.stdout).unwrap(); let stderr = String::from_utf8(output.stderr).unwrap(); panic!( "{} executed with failing error code\n{}{}", script, stdout, stderr ); } } #[derive(Debug, Default)] pub struct CheckOutputIntegrationTest { pub args: &'static str, pub output: &'static str, pub input: Option<&'static str>, pub output_str: Option<&'static str>, pub exit_code: i32, pub check_stderr: bool, pub http_server: bool, } impl CheckOutputIntegrationTest { pub fn run(&self) { let args = self.args.split_whitespace(); let root = root_path(); let deno_exe = deno_exe_path(); println!("root path {}", root.display()); println!("deno_exe path {}", deno_exe.display()); let http_server_guard = if self.http_server { Some(http_server()) } else { None }; let (mut reader, writer) = pipe().unwrap(); let tests_dir = root.join("cli").join("tests"); let mut command = deno_cmd(); command.args(args); command.current_dir(&tests_dir); command.stdin(Stdio::piped()); command.stderr(Stdio::null()); if self.check_stderr { let writer_clone = writer.try_clone().unwrap(); command.stderr(writer_clone); } command.stdout(writer); let mut process = command.spawn().expect("failed to execute process"); if let Some(input) = self.input { let mut p_stdin = process.stdin.take().unwrap(); write!(p_stdin, "{}", input).unwrap(); } // Very important when using pipes: This parent process is still // holding its copies of the write ends, and we have to close them // before we read, otherwise the read end will never report EOF. The // Command object owns the writers now, and dropping it closes them. drop(command); let mut actual = String::new(); reader.read_to_string(&mut actual).unwrap(); let status = process.wait().expect("failed to finish process"); let exit_code = status.code().unwrap(); drop(http_server_guard); actual = strip_ansi_codes(&actual).to_string(); if self.exit_code != exit_code { println!("OUTPUT\n{}\nOUTPUT", actual); panic!( "bad exit code, expected: {:?}, actual: {:?}", self.exit_code, exit_code ); } let expected = if let Some(s) = self.output_str { s.to_owned() } else { let output_path = tests_dir.join(self.output); println!("output path {}", output_path.display()); std::fs::read_to_string(output_path).expect("cannot read output") }; if !wildcard_match(&expected, &actual) { println!("OUTPUT\n{}\nOUTPUT", actual); println!("EXPECTED\n{}\nEXPECTED", expected); panic!("pattern match failed"); } } } fn wildcard_match(pattern: &str, s: &str) -> bool { pattern_match(pattern, s, "[WILDCARD]") } pub fn pattern_match(pattern: &str, s: &str, wildcard: &str) -> bool { // Normalize line endings let s = s.replace("\r\n", "\n"); let pattern = pattern.replace("\r\n", "\n"); if pattern == wildcard { return true; } let parts = pattern.split(wildcard).collect::>(); if parts.len() == 1 { return pattern == s; } if !s.starts_with(parts[0]) { return false; } let mut t = s.split_at(parts[0].len()); for (i, part) in parts.iter().enumerate() { if i == 0 { continue; } dbg!(part, i); if i == parts.len() - 1 && (*part == "" || *part == "\n") { dbg!("exit 1 true", i); return true; } if let Some(found) = t.1.find(*part) { dbg!("found ", found); t = t.1.split_at(found + part.len()); } else { dbg!("exit false ", i); return false; } } dbg!("end ", t.1.len()); t.1.is_empty() } #[test] fn test_wildcard_match() { let fixtures = vec![ ("foobarbaz", "foobarbaz", true), ("[WILDCARD]", "foobarbaz", true), ("foobar", "foobarbaz", false), ("foo[WILDCARD]baz", "foobarbaz", true), ("foo[WILDCARD]baz", "foobazbar", false), ("foo[WILDCARD]baz[WILDCARD]qux", "foobarbazqatqux", true), ("foo[WILDCARD]", "foobar", true), ("foo[WILDCARD]baz[WILDCARD]", "foobarbazqat", true), // check with different line endings ("foo[WILDCARD]\nbaz[WILDCARD]\n", "foobar\nbazqat\n", true), ( "foo[WILDCARD]\nbaz[WILDCARD]\n", "foobar\r\nbazqat\r\n", true, ), ( "foo[WILDCARD]\r\nbaz[WILDCARD]\n", "foobar\nbazqat\r\n", true, ), ( "foo[WILDCARD]\r\nbaz[WILDCARD]\r\n", "foobar\nbazqat\n", true, ), ( "foo[WILDCARD]\r\nbaz[WILDCARD]\r\n", "foobar\r\nbazqat\r\n", true, ), ]; // Iterate through the fixture lists, testing each one for (pattern, string, expected) in fixtures { let actual = wildcard_match(pattern, string); dbg!(pattern, string, expected); assert_eq!(actual, expected); } } }