// Copyright 2018-2019 the Deno authors. All rights reserved. MIT license. use atty; use crate::ansi; use crate::errors; use crate::errors::{permission_denied, DenoError, DenoResult, ErrorKind}; use crate::fs as deno_fs; use crate::http_util; use crate::isolate::Buf; use crate::isolate::Isolate; use crate::isolate::IsolateState; use crate::isolate::Op; use crate::js_errors::apply_source_map; use crate::js_errors::JSErrorColor; use crate::libdeno; use crate::msg; use crate::msg_util; use crate::repl; use crate::resolve_addr::resolve_addr; use crate::resources; use crate::resources::table_entries; use crate::resources::Resource; use crate::tokio_util; use crate::version; use deno_core::JSError; use flatbuffers::FlatBufferBuilder; use futures; use futures::Async; use futures::Poll; use futures::Sink; use futures::Stream; use hyper; use hyper::rt::Future; use remove_dir_all::remove_dir_all; use std; use std::convert::From; use std::fs; use std::net::Shutdown; use std::path::Path; use std::path::PathBuf; use std::process::Command; use std::sync::atomic::Ordering; use std::sync::Arc; use std::time::{Duration, Instant, SystemTime, UNIX_EPOCH}; use tokio; use tokio::net::TcpListener; use tokio::net::TcpStream; use tokio_process::CommandExt; use tokio_threadpool; #[cfg(unix)] use std::os::unix::fs::PermissionsExt; #[cfg(unix)] use std::os::unix::process::ExitStatusExt; type OpResult = DenoResult; // TODO Ideally we wouldn't have to box the Op being returned. // The box is just to make it easier to get a prototype refactor working. type OpCreator = fn(isolate: &Isolate, base: &msg::Base<'_>, data: libdeno::deno_buf) -> Box; #[inline] fn empty_buf() -> Buf { Box::new([]) } /// Processes raw messages from JavaScript. /// This functions invoked every time libdeno.send() is called. /// control corresponds to the first argument of libdeno.send(). /// data corresponds to the second argument of libdeno.send(). pub fn dispatch( isolate: &Isolate, control: libdeno::deno_buf, data: libdeno::deno_buf, ) -> (bool, Box) { let base = msg::get_root_as_base(&control); let is_sync = base.sync(); let inner_type = base.inner_type(); let cmd_id = base.cmd_id(); let op: Box = { // Handle regular ops. let op_creator: OpCreator = match inner_type { msg::Any::Accept => op_accept, msg::Any::Chdir => op_chdir, msg::Any::Chmod => op_chmod, msg::Any::Close => op_close, msg::Any::CopyFile => op_copy_file, msg::Any::Cwd => op_cwd, msg::Any::Dial => op_dial, msg::Any::Environ => op_env, msg::Any::Exit => op_exit, msg::Any::Fetch => op_fetch, msg::Any::FetchModuleMetaData => op_fetch_module_meta_data, msg::Any::FormatError => op_format_error, msg::Any::GlobalTimer => op_global_timer, msg::Any::GlobalTimerStop => op_global_timer_stop, msg::Any::IsTTY => op_is_tty, msg::Any::Listen => op_listen, msg::Any::MakeTempDir => op_make_temp_dir, msg::Any::Metrics => op_metrics, msg::Any::Mkdir => op_mkdir, msg::Any::Now => op_now, msg::Any::Open => op_open, msg::Any::PermissionRevoke => op_revoke_permission, msg::Any::Permissions => op_permissions, msg::Any::Read => op_read, msg::Any::ReadDir => op_read_dir, msg::Any::ReadFile => op_read_file, msg::Any::Readlink => op_read_link, msg::Any::Remove => op_remove, msg::Any::Rename => op_rename, msg::Any::ReplReadline => op_repl_readline, msg::Any::ReplStart => op_repl_start, msg::Any::Resources => op_resources, msg::Any::Run => op_run, msg::Any::RunStatus => op_run_status, msg::Any::Seek => op_seek, msg::Any::SetEnv => op_set_env, msg::Any::Shutdown => op_shutdown, msg::Any::Start => op_start, msg::Any::Stat => op_stat, msg::Any::Symlink => op_symlink, msg::Any::Truncate => op_truncate, msg::Any::WorkerGetMessage => op_worker_get_message, msg::Any::WorkerPostMessage => op_worker_post_message, msg::Any::Write => op_write, msg::Any::WriteFile => op_write_file, _ => panic!(format!( "Unhandled message {}", msg::enum_name_any(inner_type) )), }; op_creator(&isolate, &base, data) }; let boxed_op = Box::new( op.or_else(move |err: DenoError| -> DenoResult { debug!("op err {}", err); // No matter whether we got an Err or Ok, we want a serialized message to // send back. So transform the DenoError into a deno_buf. let builder = &mut FlatBufferBuilder::new(); let errmsg_offset = builder.create_string(&format!("{}", err)); Ok(serialize_response( cmd_id, builder, msg::BaseArgs { error: Some(errmsg_offset), error_kind: err.kind(), ..Default::default() }, )) }).and_then(move |buf: Buf| -> DenoResult { // Handle empty responses. For sync responses we just want // to send null. For async we want to send a small message // with the cmd_id. let buf = if is_sync || buf.len() > 0 { buf } else { let builder = &mut FlatBufferBuilder::new(); serialize_response( cmd_id, builder, msg::BaseArgs { ..Default::default() }, ) }; Ok(buf) }), ); debug!( "msg_from_js {} sync {}", msg::enum_name_any(inner_type), base.sync() ); (base.sync(), boxed_op) } fn op_now( _isolate: &Isolate, base: &msg::Base<'_>, data: libdeno::deno_buf, ) -> Box { assert_eq!(data.len(), 0); let start = SystemTime::now(); let since_the_epoch = start.duration_since(UNIX_EPOCH).unwrap(); let time = since_the_epoch.as_secs() * 1000 + u64::from(since_the_epoch.subsec_millis()); let builder = &mut FlatBufferBuilder::new(); let inner = msg::NowRes::create(builder, &msg::NowResArgs { time }); ok_future(serialize_response( base.cmd_id(), builder, msg::BaseArgs { inner: Some(inner.as_union_value()), inner_type: msg::Any::NowRes, ..Default::default() }, )) } fn op_is_tty( _isolate: &Isolate, base: &msg::Base<'_>, _data: libdeno::deno_buf, ) -> Box { let builder = &mut FlatBufferBuilder::new(); let inner = msg::IsTTYRes::create( builder, &msg::IsTTYResArgs { stdin: atty::is(atty::Stream::Stdin), stdout: atty::is(atty::Stream::Stdout), stderr: atty::is(atty::Stream::Stderr), }, ); ok_future(serialize_response( base.cmd_id(), builder, msg::BaseArgs { inner: Some(inner.as_union_value()), inner_type: msg::Any::IsTTYRes, ..Default::default() }, )) } fn op_exit( _isolate: &Isolate, base: &msg::Base<'_>, _data: libdeno::deno_buf, ) -> Box { let inner = base.inner_as_exit().unwrap(); std::process::exit(inner.code()) } fn op_start( isolate: &Isolate, base: &msg::Base<'_>, data: libdeno::deno_buf, ) -> Box { assert_eq!(data.len(), 0); let mut builder = FlatBufferBuilder::new(); let argv = isolate .state .argv .iter() .map(|s| s.as_str()) .collect::>(); let argv_off = builder.create_vector_of_strings(argv.as_slice()); let cwd_path = std::env::current_dir().unwrap(); let cwd_off = builder.create_string(deno_fs::normalize_path(cwd_path.as_ref()).as_ref()); let exec_path = builder.create_string(std::env::current_exe().unwrap().to_str().unwrap()); let v8_version = version::v8(); let v8_version_off = builder.create_string(v8_version); let deno_version = version::DENO; let deno_version_off = builder.create_string(deno_version); let main_module = isolate .state .main_module() .map(|m| builder.create_string(&m)); let inner = msg::StartRes::create( &mut builder, &msg::StartResArgs { cwd: Some(cwd_off), pid: std::process::id(), argv: Some(argv_off), main_module, debug_flag: isolate.state.flags.log_debug, types_flag: isolate.state.flags.types, version_flag: isolate.state.flags.version, v8_version: Some(v8_version_off), deno_version: Some(deno_version_off), no_color: !ansi::use_color(), exec_path: Some(exec_path), ..Default::default() }, ); ok_future(serialize_response( base.cmd_id(), &mut builder, msg::BaseArgs { inner_type: msg::Any::StartRes, inner: Some(inner.as_union_value()), ..Default::default() }, )) } fn op_format_error( isolate: &Isolate, base: &msg::Base<'_>, data: libdeno::deno_buf, ) -> Box { assert_eq!(data.len(), 0); let inner = base.inner_as_format_error().unwrap(); let orig_error = String::from(inner.error().unwrap()); let js_error = JSError::from_v8_exception(&orig_error).unwrap(); let js_error_mapped = apply_source_map(&js_error, &isolate.state.dir); let js_error_string = JSErrorColor(&js_error_mapped).to_string(); let mut builder = FlatBufferBuilder::new(); let new_error = builder.create_string(&js_error_string); let inner = msg::FormatErrorRes::create( &mut builder, &msg::FormatErrorResArgs { error: Some(new_error), ..Default::default() }, ); ok_future(serialize_response( base.cmd_id(), &mut builder, msg::BaseArgs { inner_type: msg::Any::FormatErrorRes, inner: Some(inner.as_union_value()), ..Default::default() }, )) } fn serialize_response( cmd_id: u32, builder: &mut FlatBufferBuilder<'_>, mut args: msg::BaseArgs<'_>, ) -> Buf { args.cmd_id = cmd_id; let base = msg::Base::create(builder, &args); msg::finish_base_buffer(builder, base); let data = builder.finished_data(); // println!("serialize_response {:x?}", data); data.into() } #[inline] pub fn ok_future(buf: Buf) -> Box { Box::new(futures::future::ok(buf)) } // Shout out to Earl Sweatshirt. #[inline] pub fn odd_future(err: DenoError) -> Box { Box::new(futures::future::err(err)) } // https://github.com/denoland/deno/blob/golang/os.go#L100-L154 fn op_fetch_module_meta_data( isolate: &Isolate, base: &msg::Base<'_>, data: libdeno::deno_buf, ) -> Box { assert_eq!(data.len(), 0); let inner = base.inner_as_fetch_module_meta_data().unwrap(); let cmd_id = base.cmd_id(); let specifier = inner.specifier().unwrap(); let referrer = inner.referrer().unwrap(); // Check for allow read since this operation could be used to read from the file system. if !isolate.permissions.allow_read.load(Ordering::SeqCst) { debug!("No read permission for fetch_module_meta_data"); return odd_future(permission_denied()); } // Check for allow write since this operation could be used to write to the file system. if !isolate.permissions.allow_write.load(Ordering::SeqCst) { debug!("No network permission for fetch_module_meta_data"); return odd_future(permission_denied()); } // Check for allow net since this operation could be used to make https/http requests. if !isolate.permissions.allow_net.load(Ordering::SeqCst) { debug!("No network permission for fetch_module_meta_data"); return odd_future(permission_denied()); } assert_eq!( isolate.state.dir.root.join("gen"), isolate.state.dir.gen, "Sanity check" ); Box::new(futures::future::result(|| -> OpResult { let builder = &mut FlatBufferBuilder::new(); let out = isolate .state .dir .fetch_module_meta_data(specifier, referrer)?; let data_off = builder.create_vector(out.source_code.as_slice()); let msg_args = msg::FetchModuleMetaDataResArgs { module_name: Some(builder.create_string(&out.module_name)), filename: Some(builder.create_string(&out.filename)), media_type: out.media_type, data: Some(data_off), }; let inner = msg::FetchModuleMetaDataRes::create(builder, &msg_args); Ok(serialize_response( cmd_id, builder, msg::BaseArgs { inner: Some(inner.as_union_value()), inner_type: msg::Any::FetchModuleMetaDataRes, ..Default::default() }, )) }())) } fn op_chdir( _isolate: &Isolate, base: &msg::Base<'_>, data: libdeno::deno_buf, ) -> Box { assert_eq!(data.len(), 0); let inner = base.inner_as_chdir().unwrap(); let directory = inner.directory().unwrap(); Box::new(futures::future::result(|| -> OpResult { std::env::set_current_dir(&directory)?; Ok(empty_buf()) }())) } fn op_global_timer_stop( isolate: &Isolate, base: &msg::Base<'_>, data: libdeno::deno_buf, ) -> Box { assert!(base.sync()); assert_eq!(data.len(), 0); let mut t = isolate.state.global_timer.lock().unwrap(); t.cancel(); ok_future(empty_buf()) } fn op_global_timer( isolate: &Isolate, base: &msg::Base<'_>, data: libdeno::deno_buf, ) -> Box { assert!(!base.sync()); assert_eq!(data.len(), 0); let cmd_id = base.cmd_id(); let inner = base.inner_as_global_timer().unwrap(); let val = inner.timeout(); assert!(val >= 0); let mut t = isolate.state.global_timer.lock().unwrap(); let deadline = Instant::now() + Duration::from_millis(val as u64); let f = t.new_timeout(deadline); Box::new(f.then(move |_| { let builder = &mut FlatBufferBuilder::new(); let inner = msg::GlobalTimerRes::create(builder, &msg::GlobalTimerResArgs {}); Ok(serialize_response( cmd_id, builder, msg::BaseArgs { inner: Some(inner.as_union_value()), inner_type: msg::Any::GlobalTimerRes, ..Default::default() }, )) })) } fn op_set_env( isolate: &Isolate, base: &msg::Base<'_>, data: libdeno::deno_buf, ) -> Box { assert_eq!(data.len(), 0); let inner = base.inner_as_set_env().unwrap(); let key = inner.key().unwrap(); let value = inner.value().unwrap(); if let Err(e) = isolate.check_env() { return odd_future(e); } std::env::set_var(key, value); ok_future(empty_buf()) } fn op_env( isolate: &Isolate, base: &msg::Base<'_>, data: libdeno::deno_buf, ) -> Box { assert_eq!(data.len(), 0); let cmd_id = base.cmd_id(); if let Err(e) = isolate.check_env() { return odd_future(e); } let builder = &mut FlatBufferBuilder::new(); let vars: Vec<_> = std::env::vars() .map(|(key, value)| msg_util::serialize_key_value(builder, &key, &value)) .collect(); let tables = builder.create_vector(&vars); let inner = msg::EnvironRes::create( builder, &msg::EnvironResArgs { map: Some(tables) }, ); ok_future(serialize_response( cmd_id, builder, msg::BaseArgs { inner: Some(inner.as_union_value()), inner_type: msg::Any::EnvironRes, ..Default::default() }, )) } fn op_permissions( isolate: &Isolate, base: &msg::Base<'_>, data: libdeno::deno_buf, ) -> Box { assert_eq!(data.len(), 0); let cmd_id = base.cmd_id(); let builder = &mut FlatBufferBuilder::new(); let inner = msg::PermissionsRes::create( builder, &msg::PermissionsResArgs { run: isolate.permissions.allows_run(), read: isolate.permissions.allows_read(), write: isolate.permissions.allows_write(), net: isolate.permissions.allows_net(), env: isolate.permissions.allows_env(), }, ); ok_future(serialize_response( cmd_id, builder, msg::BaseArgs { inner: Some(inner.as_union_value()), inner_type: msg::Any::PermissionsRes, ..Default::default() }, )) } fn op_revoke_permission( isolate: &Isolate, base: &msg::Base<'_>, data: libdeno::deno_buf, ) -> Box { assert_eq!(data.len(), 0); let inner = base.inner_as_permission_revoke().unwrap(); let permission = inner.permission().unwrap(); let result = match permission { "run" => isolate.permissions.revoke_run(), "read" => isolate.permissions.revoke_read(), "write" => isolate.permissions.revoke_write(), "net" => isolate.permissions.revoke_net(), "env" => isolate.permissions.revoke_env(), _ => Ok(()), }; if let Err(e) = result { return odd_future(e); } ok_future(empty_buf()) } fn op_fetch( isolate: &Isolate, base: &msg::Base<'_>, data: libdeno::deno_buf, ) -> Box { let inner = base.inner_as_fetch().unwrap(); let cmd_id = base.cmd_id(); let header = inner.header().unwrap(); assert!(header.is_request()); let url = header.url().unwrap(); let body = if data.is_empty() { hyper::Body::empty() } else { hyper::Body::from(Vec::from(&*data)) }; let maybe_req = msg_util::deserialize_request(header, body); if let Err(e) = maybe_req { return odd_future(e); } let req = maybe_req.unwrap(); if let Err(e) = isolate.check_net(url) { return odd_future(e); } let client = http_util::get_client(); debug!("Before fetch {}", url); let future = client .request(req) .map_err(DenoError::from) .and_then(move |res| { let builder = &mut FlatBufferBuilder::new(); let header_off = msg_util::serialize_http_response(builder, &res); let body = res.into_body(); let body_resource = resources::add_hyper_body(body); let inner = msg::FetchRes::create( builder, &msg::FetchResArgs { header: Some(header_off), body_rid: body_resource.rid, }, ); Ok(serialize_response( cmd_id, builder, msg::BaseArgs { inner: Some(inner.as_union_value()), inner_type: msg::Any::FetchRes, ..Default::default() }, )) }); Box::new(future) } // This is just type conversion. Implement From trait? // See https://github.com/tokio-rs/tokio/blob/ffd73a64e7ec497622b7f939e38017afe7124dc4/tokio-fs/src/lib.rs#L76-L85 fn convert_blocking(f: F) -> Poll where F: FnOnce() -> DenoResult, { use futures::Async::*; match tokio_threadpool::blocking(f) { Ok(Ready(Ok(v))) => Ok(v.into()), Ok(Ready(Err(err))) => Err(err), Ok(NotReady) => Ok(NotReady), Err(_err) => panic!("blocking error"), } } fn blocking(is_sync: bool, f: F) -> Box where F: 'static + Send + FnOnce() -> DenoResult, { if is_sync { Box::new(futures::future::result(f())) } else { Box::new(tokio_util::poll_fn(move || convert_blocking(f))) } } fn op_make_temp_dir( isolate: &Isolate, base: &msg::Base<'_>, data: libdeno::deno_buf, ) -> Box { assert_eq!(data.len(), 0); let base = Box::new(*base); let inner = base.inner_as_make_temp_dir().unwrap(); let cmd_id = base.cmd_id(); // FIXME if let Err(e) = isolate.check_write("make_temp") { return odd_future(e); } let dir = inner.dir().map(PathBuf::from); let prefix = inner.prefix().map(String::from); let suffix = inner.suffix().map(String::from); blocking(base.sync(), move || -> OpResult { // TODO(piscisaureus): use byte vector for paths, not a string. // See https://github.com/denoland/deno/issues/627. // We can't assume that paths are always valid utf8 strings. let path = deno_fs::make_temp_dir( // Converting Option to Option<&str> dir.as_ref().map(|x| &**x), prefix.as_ref().map(|x| &**x), suffix.as_ref().map(|x| &**x), )?; let builder = &mut FlatBufferBuilder::new(); let path_off = builder.create_string(path.to_str().unwrap()); let inner = msg::MakeTempDirRes::create( builder, &msg::MakeTempDirResArgs { path: Some(path_off), }, ); Ok(serialize_response( cmd_id, builder, msg::BaseArgs { inner: Some(inner.as_union_value()), inner_type: msg::Any::MakeTempDirRes, ..Default::default() }, )) }) } fn op_mkdir( isolate: &Isolate, base: &msg::Base<'_>, data: libdeno::deno_buf, ) -> Box { assert_eq!(data.len(), 0); let inner = base.inner_as_mkdir().unwrap(); let path = String::from(inner.path().unwrap()); let recursive = inner.recursive(); let mode = inner.mode(); if let Err(e) = isolate.check_write(&path) { return odd_future(e); } blocking(base.sync(), move || { debug!("op_mkdir {}", path); deno_fs::mkdir(Path::new(&path), mode, recursive)?; Ok(empty_buf()) }) } fn op_chmod( isolate: &Isolate, base: &msg::Base<'_>, data: libdeno::deno_buf, ) -> Box { assert_eq!(data.len(), 0); let inner = base.inner_as_chmod().unwrap(); let _mode = inner.mode(); let path = String::from(inner.path().unwrap()); if let Err(e) = isolate.check_write(&path) { return odd_future(e); } blocking(base.sync(), move || { debug!("op_chmod {}", &path); let path = PathBuf::from(&path); // Still check file/dir exists on windows let _metadata = fs::metadata(&path)?; // Only work in unix #[cfg(any(unix))] { // We need to use underscore to compile in Windows. #[cfg_attr( feature = "cargo-clippy", allow(clippy::used_underscore_binding) )] let mut permissions = _metadata.permissions(); #[cfg_attr( feature = "cargo-clippy", allow(clippy::used_underscore_binding) )] permissions.set_mode(_mode); fs::set_permissions(&path, permissions)?; } Ok(empty_buf()) }) } fn op_open( isolate: &Isolate, base: &msg::Base<'_>, data: libdeno::deno_buf, ) -> Box { assert_eq!(data.len(), 0); let cmd_id = base.cmd_id(); let inner = base.inner_as_open().unwrap(); let filename_str = inner.filename().unwrap(); let filename = PathBuf::from(&filename_str); let mode = inner.mode().unwrap(); let mut open_options = tokio::fs::OpenOptions::new(); match mode { "r" => { open_options.read(true); } "r+" => { open_options.read(true).write(true); } "w" => { open_options.create(true).write(true).truncate(true); } "w+" => { open_options .read(true) .create(true) .write(true) .truncate(true); } "a" => { open_options.create(true).append(true); } "a+" => { open_options.read(true).create(true).append(true); } "x" => { open_options.create_new(true).write(true); } "x+" => { open_options.create_new(true).read(true).write(true); } &_ => { panic!("Unknown file open mode."); } } match mode { "r" => { if let Err(e) = isolate.check_read(&filename_str) { return odd_future(e); } } "w" | "a" | "x" => { if let Err(e) = isolate.check_write(&filename_str) { return odd_future(e); } } &_ => { if let Err(e) = isolate.check_read(&filename_str) { return odd_future(e); } if let Err(e) = isolate.check_write(&filename_str) { return odd_future(e); } } } let op = open_options .open(filename) .map_err(DenoError::from) .and_then(move |fs_file| -> OpResult { let resource = resources::add_fs_file(fs_file); let builder = &mut FlatBufferBuilder::new(); let inner = msg::OpenRes::create(builder, &msg::OpenResArgs { rid: resource.rid }); Ok(serialize_response( cmd_id, builder, msg::BaseArgs { inner: Some(inner.as_union_value()), inner_type: msg::Any::OpenRes, ..Default::default() }, )) }); Box::new(op) } fn op_close( _isolate: &Isolate, base: &msg::Base<'_>, data: libdeno::deno_buf, ) -> Box { assert_eq!(data.len(), 0); let inner = base.inner_as_close().unwrap(); let rid = inner.rid(); match resources::lookup(rid) { None => odd_future(errors::bad_resource()), Some(resource) => { resource.close(); ok_future(empty_buf()) } } } fn op_shutdown( _isolate: &Isolate, base: &msg::Base<'_>, data: libdeno::deno_buf, ) -> Box { assert_eq!(data.len(), 0); let inner = base.inner_as_shutdown().unwrap(); let rid = inner.rid(); let how = inner.how(); match resources::lookup(rid) { None => odd_future(errors::bad_resource()), Some(mut resource) => { let shutdown_mode = match how { 0 => Shutdown::Read, 1 => Shutdown::Write, _ => unimplemented!(), }; blocking(base.sync(), move || { // Use UFCS for disambiguation Resource::shutdown(&mut resource, shutdown_mode)?; Ok(empty_buf()) }) } } } fn op_read( _isolate: &Isolate, base: &msg::Base<'_>, data: libdeno::deno_buf, ) -> Box { let cmd_id = base.cmd_id(); let inner = base.inner_as_read().unwrap(); let rid = inner.rid(); match resources::lookup(rid) { None => odd_future(errors::bad_resource()), Some(resource) => { let op = resources::eager_read(resource, data) .map_err(DenoError::from) .and_then(move |(_resource, _buf, nread)| { let builder = &mut FlatBufferBuilder::new(); let inner = msg::ReadRes::create( builder, &msg::ReadResArgs { nread: nread as u32, eof: nread == 0, }, ); Ok(serialize_response( cmd_id, builder, msg::BaseArgs { inner: Some(inner.as_union_value()), inner_type: msg::Any::ReadRes, ..Default::default() }, )) }); Box::new(op) } } } fn op_write( _isolate: &Isolate, base: &msg::Base<'_>, data: libdeno::deno_buf, ) -> Box { let cmd_id = base.cmd_id(); let inner = base.inner_as_write().unwrap(); let rid = inner.rid(); match resources::lookup(rid) { None => odd_future(errors::bad_resource()), Some(resource) => { let op = resources::eager_write(resource, data) .map_err(DenoError::from) .and_then(move |(_resource, _buf, nwritten)| { let builder = &mut FlatBufferBuilder::new(); let inner = msg::WriteRes::create( builder, &msg::WriteResArgs { nbyte: nwritten as u32, }, ); Ok(serialize_response( cmd_id, builder, msg::BaseArgs { inner: Some(inner.as_union_value()), inner_type: msg::Any::WriteRes, ..Default::default() }, )) }); Box::new(op) } } } fn op_seek( _isolate: &Isolate, base: &msg::Base<'_>, data: libdeno::deno_buf, ) -> Box { assert_eq!(data.len(), 0); let _cmd_id = base.cmd_id(); let inner = base.inner_as_seek().unwrap(); let rid = inner.rid(); let offset = inner.offset(); let whence = inner.whence(); match resources::lookup(rid) { None => odd_future(errors::bad_resource()), Some(resource) => { let op = resources::seek(resource, offset, whence) .and_then(move |_| Ok(empty_buf())); Box::new(op) } } } fn op_remove( isolate: &Isolate, base: &msg::Base<'_>, data: libdeno::deno_buf, ) -> Box { assert_eq!(data.len(), 0); let inner = base.inner_as_remove().unwrap(); let path_ = inner.path().unwrap(); let path = PathBuf::from(path_); let recursive = inner.recursive(); if let Err(e) = isolate.check_write(path.to_str().unwrap()) { return odd_future(e); } blocking(base.sync(), move || { debug!("op_remove {}", path.display()); let metadata = fs::metadata(&path)?; if metadata.is_file() { fs::remove_file(&path)?; } else if recursive { remove_dir_all(&path)?; } else { fs::remove_dir(&path)?; } Ok(empty_buf()) }) } // Prototype https://github.com/denoland/deno/blob/golang/os.go#L171-L184 fn op_read_file( isolate: &Isolate, base: &msg::Base<'_>, data: libdeno::deno_buf, ) -> Box { assert_eq!(data.len(), 0); let inner = base.inner_as_read_file().unwrap(); let cmd_id = base.cmd_id(); let filename_ = inner.filename().unwrap(); let filename = PathBuf::from(filename_); debug!("op_read_file {}", filename.display()); if let Err(e) = isolate.check_read(&filename_) { return odd_future(e); } blocking(base.sync(), move || { let vec = fs::read(&filename)?; // Build the response message. memcpy data into inner. // TODO(ry) zero-copy. let builder = &mut FlatBufferBuilder::new(); let data_off = builder.create_vector(vec.as_slice()); let inner = msg::ReadFileRes::create( builder, &msg::ReadFileResArgs { data: Some(data_off), }, ); Ok(serialize_response( cmd_id, builder, msg::BaseArgs { inner: Some(inner.as_union_value()), inner_type: msg::Any::ReadFileRes, ..Default::default() }, )) }) } fn op_copy_file( isolate: &Isolate, base: &msg::Base<'_>, data: libdeno::deno_buf, ) -> Box { assert_eq!(data.len(), 0); let inner = base.inner_as_copy_file().unwrap(); let from_ = inner.from().unwrap(); let from = PathBuf::from(from_); let to_ = inner.to().unwrap(); let to = PathBuf::from(to_); if let Err(e) = isolate.check_read(&from_) { return odd_future(e); } if let Err(e) = isolate.check_write(&to_) { return odd_future(e); } debug!("op_copy_file {} {}", from.display(), to.display()); blocking(base.sync(), move || { // On *nix, Rust deem non-existent path as invalid input // See https://github.com/rust-lang/rust/issues/54800 // Once the issue is reolved, we should remove this workaround. if cfg!(unix) && !from.is_file() { return Err(errors::new( ErrorKind::NotFound, "File not found".to_string(), )); } fs::copy(&from, &to)?; Ok(empty_buf()) }) } macro_rules! to_seconds { ($time:expr) => {{ // Unwrap is safe here as if the file is before the unix epoch // something is very wrong. $time .and_then(|t| Ok(t.duration_since(UNIX_EPOCH).unwrap().as_secs())) .unwrap_or(0) }}; } #[cfg(any(unix))] fn get_mode(perm: &fs::Permissions) -> u32 { perm.mode() } #[cfg(not(any(unix)))] fn get_mode(_perm: &fs::Permissions) -> u32 { 0 } fn op_cwd( _isolate: &Isolate, base: &msg::Base<'_>, data: libdeno::deno_buf, ) -> Box { assert_eq!(data.len(), 0); let cmd_id = base.cmd_id(); Box::new(futures::future::result(|| -> OpResult { let path = std::env::current_dir()?; let builder = &mut FlatBufferBuilder::new(); let cwd = builder.create_string(&path.into_os_string().into_string().unwrap()); let inner = msg::CwdRes::create(builder, &msg::CwdResArgs { cwd: Some(cwd) }); Ok(serialize_response( cmd_id, builder, msg::BaseArgs { inner: Some(inner.as_union_value()), inner_type: msg::Any::CwdRes, ..Default::default() }, )) }())) } fn op_stat( isolate: &Isolate, base: &msg::Base<'_>, data: libdeno::deno_buf, ) -> Box { assert_eq!(data.len(), 0); let inner = base.inner_as_stat().unwrap(); let cmd_id = base.cmd_id(); let filename_ = inner.filename().unwrap(); let filename = PathBuf::from(filename_); let lstat = inner.lstat(); if let Err(e) = isolate.check_read(&filename_) { return odd_future(e); } blocking(base.sync(), move || { let builder = &mut FlatBufferBuilder::new(); debug!("op_stat {} {}", filename.display(), lstat); let metadata = if lstat { fs::symlink_metadata(&filename)? } else { fs::metadata(&filename)? }; let inner = msg::StatRes::create( builder, &msg::StatResArgs { is_file: metadata.is_file(), is_symlink: metadata.file_type().is_symlink(), len: metadata.len(), modified: to_seconds!(metadata.modified()), accessed: to_seconds!(metadata.accessed()), created: to_seconds!(metadata.created()), mode: get_mode(&metadata.permissions()), has_mode: cfg!(target_family = "unix"), ..Default::default() }, ); Ok(serialize_response( cmd_id, builder, msg::BaseArgs { inner: Some(inner.as_union_value()), inner_type: msg::Any::StatRes, ..Default::default() }, )) }) } fn op_read_dir( isolate: &Isolate, base: &msg::Base<'_>, data: libdeno::deno_buf, ) -> Box { assert_eq!(data.len(), 0); let inner = base.inner_as_read_dir().unwrap(); let cmd_id = base.cmd_id(); let path = String::from(inner.path().unwrap()); if let Err(e) = isolate.check_read(&path) { return odd_future(e); } blocking(base.sync(), move || -> OpResult { debug!("op_read_dir {}", path); let builder = &mut FlatBufferBuilder::new(); let entries: Vec<_> = fs::read_dir(Path::new(&path))? .map(|entry| { let entry = entry.unwrap(); let metadata = entry.metadata().unwrap(); let file_type = metadata.file_type(); let name = builder.create_string(entry.file_name().to_str().unwrap()); let path = builder.create_string(entry.path().to_str().unwrap()); msg::StatRes::create( builder, &msg::StatResArgs { is_file: file_type.is_file(), is_symlink: file_type.is_symlink(), len: metadata.len(), modified: to_seconds!(metadata.modified()), accessed: to_seconds!(metadata.accessed()), created: to_seconds!(metadata.created()), name: Some(name), path: Some(path), mode: get_mode(&metadata.permissions()), has_mode: cfg!(target_family = "unix"), }, ) }).collect(); let entries = builder.create_vector(&entries); let inner = msg::ReadDirRes::create( builder, &msg::ReadDirResArgs { entries: Some(entries), }, ); Ok(serialize_response( cmd_id, builder, msg::BaseArgs { inner: Some(inner.as_union_value()), inner_type: msg::Any::ReadDirRes, ..Default::default() }, )) }) } fn op_write_file( isolate: &Isolate, base: &msg::Base<'_>, data: libdeno::deno_buf, ) -> Box { let inner = base.inner_as_write_file().unwrap(); let filename = String::from(inner.filename().unwrap()); let update_perm = inner.update_perm(); let perm = inner.perm(); let is_create = inner.is_create(); let is_append = inner.is_append(); if let Err(e) = isolate.check_write(&filename) { return odd_future(e); } blocking(base.sync(), move || -> OpResult { debug!("op_write_file {} {}", filename, data.len()); deno_fs::write_file_2( Path::new(&filename), data, update_perm, perm, is_create, is_append, )?; Ok(empty_buf()) }) } fn op_rename( isolate: &Isolate, base: &msg::Base<'_>, data: libdeno::deno_buf, ) -> Box { assert_eq!(data.len(), 0); let inner = base.inner_as_rename().unwrap(); let oldpath = PathBuf::from(inner.oldpath().unwrap()); let newpath_ = inner.newpath().unwrap(); let newpath = PathBuf::from(newpath_); if let Err(e) = isolate.check_write(&newpath_) { return odd_future(e); } blocking(base.sync(), move || -> OpResult { debug!("op_rename {} {}", oldpath.display(), newpath.display()); fs::rename(&oldpath, &newpath)?; Ok(empty_buf()) }) } fn op_symlink( isolate: &Isolate, base: &msg::Base<'_>, data: libdeno::deno_buf, ) -> Box { assert_eq!(data.len(), 0); let inner = base.inner_as_symlink().unwrap(); let oldname = PathBuf::from(inner.oldname().unwrap()); let newname_ = inner.newname().unwrap(); let newname = PathBuf::from(newname_); if let Err(e) = isolate.check_write(&newname_) { return odd_future(e); } // TODO Use type for Windows. if cfg!(windows) { return odd_future(errors::new( ErrorKind::Other, "Not implemented".to_string(), )); } blocking(base.sync(), move || -> OpResult { debug!("op_symlink {} {}", oldname.display(), newname.display()); #[cfg(any(unix))] std::os::unix::fs::symlink(&oldname, &newname)?; Ok(empty_buf()) }) } fn op_read_link( isolate: &Isolate, base: &msg::Base<'_>, data: libdeno::deno_buf, ) -> Box { assert_eq!(data.len(), 0); let inner = base.inner_as_readlink().unwrap(); let cmd_id = base.cmd_id(); let name_ = inner.name().unwrap(); let name = PathBuf::from(name_); if let Err(e) = isolate.check_read(&name_) { return odd_future(e); } blocking(base.sync(), move || -> OpResult { debug!("op_read_link {}", name.display()); let path = fs::read_link(&name)?; let builder = &mut FlatBufferBuilder::new(); let path_off = builder.create_string(path.to_str().unwrap()); let inner = msg::ReadlinkRes::create( builder, &msg::ReadlinkResArgs { path: Some(path_off), }, ); Ok(serialize_response( cmd_id, builder, msg::BaseArgs { inner: Some(inner.as_union_value()), inner_type: msg::Any::ReadlinkRes, ..Default::default() }, )) }) } fn op_repl_start( isolate: &Isolate, base: &msg::Base<'_>, data: libdeno::deno_buf, ) -> Box { assert_eq!(data.len(), 0); let inner = base.inner_as_repl_start().unwrap(); let cmd_id = base.cmd_id(); let history_file = String::from(inner.history_file().unwrap()); debug!("op_repl_start {}", history_file); let history_path = repl::history_path(&isolate.state.dir, &history_file); let repl = repl::Repl::new(history_path); let resource = resources::add_repl(repl); let builder = &mut FlatBufferBuilder::new(); let inner = msg::ReplStartRes::create( builder, &msg::ReplStartResArgs { rid: resource.rid }, ); ok_future(serialize_response( cmd_id, builder, msg::BaseArgs { inner: Some(inner.as_union_value()), inner_type: msg::Any::ReplStartRes, ..Default::default() }, )) } fn op_repl_readline( _isolate: &Isolate, base: &msg::Base<'_>, data: libdeno::deno_buf, ) -> Box { assert_eq!(data.len(), 0); let inner = base.inner_as_repl_readline().unwrap(); let cmd_id = base.cmd_id(); let rid = inner.rid(); let prompt = inner.prompt().unwrap().to_owned(); debug!("op_repl_readline {} {}", rid, prompt); blocking(base.sync(), move || -> OpResult { let repl = resources::get_repl(rid)?; let line = repl.lock().unwrap().readline(&prompt)?; let builder = &mut FlatBufferBuilder::new(); let line_off = builder.create_string(&line); let inner = msg::ReplReadlineRes::create( builder, &msg::ReplReadlineResArgs { line: Some(line_off), }, ); Ok(serialize_response( cmd_id, builder, msg::BaseArgs { inner: Some(inner.as_union_value()), inner_type: msg::Any::ReplReadlineRes, ..Default::default() }, )) }) } fn op_truncate( isolate: &Isolate, base: &msg::Base<'_>, data: libdeno::deno_buf, ) -> Box { assert_eq!(data.len(), 0); let inner = base.inner_as_truncate().unwrap(); let filename = String::from(inner.name().unwrap()); let len = inner.len(); if let Err(e) = isolate.check_write(&filename) { return odd_future(e); } blocking(base.sync(), move || { debug!("op_truncate {} {}", filename, len); let f = fs::OpenOptions::new().write(true).open(&filename)?; f.set_len(u64::from(len))?; Ok(empty_buf()) }) } fn op_listen( isolate: &Isolate, base: &msg::Base<'_>, data: libdeno::deno_buf, ) -> Box { assert_eq!(data.len(), 0); if let Err(e) = isolate.check_net("listen") { return odd_future(e); } let cmd_id = base.cmd_id(); let inner = base.inner_as_listen().unwrap(); let network = inner.network().unwrap(); assert_eq!(network, "tcp"); let address = inner.address().unwrap(); Box::new(futures::future::result((move || { let addr = resolve_addr(address).wait()?; let listener = TcpListener::bind(&addr)?; let resource = resources::add_tcp_listener(listener); let builder = &mut FlatBufferBuilder::new(); let inner = msg::ListenRes::create( builder, &msg::ListenResArgs { rid: resource.rid }, ); Ok(serialize_response( cmd_id, builder, msg::BaseArgs { inner: Some(inner.as_union_value()), inner_type: msg::Any::ListenRes, ..Default::default() }, )) })())) } fn new_conn(cmd_id: u32, tcp_stream: TcpStream) -> OpResult { let tcp_stream_resource = resources::add_tcp_stream(tcp_stream); // TODO forward socket_addr to client. let builder = &mut FlatBufferBuilder::new(); let inner = msg::NewConn::create( builder, &msg::NewConnArgs { rid: tcp_stream_resource.rid, ..Default::default() }, ); Ok(serialize_response( cmd_id, builder, msg::BaseArgs { inner: Some(inner.as_union_value()), inner_type: msg::Any::NewConn, ..Default::default() }, )) } fn op_accept( isolate: &Isolate, base: &msg::Base<'_>, data: libdeno::deno_buf, ) -> Box { assert_eq!(data.len(), 0); if let Err(e) = isolate.check_net("accept") { return odd_future(e); } let cmd_id = base.cmd_id(); let inner = base.inner_as_accept().unwrap(); let server_rid = inner.rid(); match resources::lookup(server_rid) { None => odd_future(errors::bad_resource()), Some(server_resource) => { let op = resources::eager_accept(server_resource) .map_err(DenoError::from) .and_then(move |(tcp_stream, _socket_addr)| { new_conn(cmd_id, tcp_stream) }); Box::new(op) } } } fn op_dial( isolate: &Isolate, base: &msg::Base<'_>, data: libdeno::deno_buf, ) -> Box { assert_eq!(data.len(), 0); if let Err(e) = isolate.check_net("dial") { return odd_future(e); } let cmd_id = base.cmd_id(); let inner = base.inner_as_dial().unwrap(); let network = inner.network().unwrap(); assert_eq!(network, "tcp"); // TODO Support others. let address = inner.address().unwrap(); let op = resolve_addr(address) .map_err(DenoError::from) .and_then(move |addr| { TcpStream::connect(&addr) .map_err(DenoError::from) .and_then(move |tcp_stream| new_conn(cmd_id, tcp_stream)) }); Box::new(op) } fn op_metrics( isolate: &Isolate, base: &msg::Base<'_>, data: libdeno::deno_buf, ) -> Box { assert_eq!(data.len(), 0); let cmd_id = base.cmd_id(); let builder = &mut FlatBufferBuilder::new(); let inner = msg::MetricsRes::create( builder, &msg::MetricsResArgs::from(&isolate.state.metrics), ); ok_future(serialize_response( cmd_id, builder, msg::BaseArgs { inner: Some(inner.as_union_value()), inner_type: msg::Any::MetricsRes, ..Default::default() }, )) } fn op_resources( _isolate: &Isolate, base: &msg::Base<'_>, data: libdeno::deno_buf, ) -> Box { assert_eq!(data.len(), 0); let cmd_id = base.cmd_id(); let builder = &mut FlatBufferBuilder::new(); let serialized_resources = table_entries(); let res: Vec<_> = serialized_resources .iter() .map(|(key, value)| { let repr = builder.create_string(value); msg::Resource::create( builder, &msg::ResourceArgs { rid: *key, repr: Some(repr), }, ) }).collect(); let resources = builder.create_vector(&res); let inner = msg::ResourcesRes::create( builder, &msg::ResourcesResArgs { resources: Some(resources), }, ); ok_future(serialize_response( cmd_id, builder, msg::BaseArgs { inner: Some(inner.as_union_value()), inner_type: msg::Any::ResourcesRes, ..Default::default() }, )) } fn subprocess_stdio_map(v: msg::ProcessStdio) -> std::process::Stdio { match v { msg::ProcessStdio::Inherit => std::process::Stdio::inherit(), msg::ProcessStdio::Piped => std::process::Stdio::piped(), msg::ProcessStdio::Null => std::process::Stdio::null(), } } fn op_run( isolate: &Isolate, base: &msg::Base<'_>, data: libdeno::deno_buf, ) -> Box { assert!(base.sync()); let cmd_id = base.cmd_id(); if let Err(e) = isolate.check_run() { return odd_future(e); } assert_eq!(data.len(), 0); let inner = base.inner_as_run().unwrap(); let args = inner.args().unwrap(); let env = inner.env().unwrap(); let cwd = inner.cwd(); let mut c = Command::new(args.get(0)); (1..args.len()).for_each(|i| { let arg = args.get(i); c.arg(arg); }); cwd.map(|d| c.current_dir(d)); (0..env.len()).for_each(|i| { let entry = env.get(i); c.env(entry.key().unwrap(), entry.value().unwrap()); }); c.stdin(subprocess_stdio_map(inner.stdin())); c.stdout(subprocess_stdio_map(inner.stdout())); c.stderr(subprocess_stdio_map(inner.stderr())); // Spawn the command. let child = match c.spawn_async() { Ok(v) => v, Err(err) => { return odd_future(err.into()); } }; let pid = child.id(); let resources = resources::add_child(child); let mut res_args = msg::RunResArgs { rid: resources.child_rid, pid, ..Default::default() }; if let Some(stdin_rid) = resources.stdin_rid { res_args.stdin_rid = stdin_rid; } if let Some(stdout_rid) = resources.stdout_rid { res_args.stdout_rid = stdout_rid; } if let Some(stderr_rid) = resources.stderr_rid { res_args.stderr_rid = stderr_rid; } let builder = &mut FlatBufferBuilder::new(); let inner = msg::RunRes::create(builder, &res_args); ok_future(serialize_response( cmd_id, builder, msg::BaseArgs { inner: Some(inner.as_union_value()), inner_type: msg::Any::RunRes, ..Default::default() }, )) } fn op_run_status( isolate: &Isolate, base: &msg::Base<'_>, data: libdeno::deno_buf, ) -> Box { assert_eq!(data.len(), 0); let cmd_id = base.cmd_id(); let inner = base.inner_as_run_status().unwrap(); let rid = inner.rid(); if let Err(e) = isolate.check_run() { return odd_future(e); } let future = match resources::child_status(rid) { Err(e) => { return odd_future(e); } Ok(f) => f, }; let future = future.and_then(move |run_status| { let code = run_status.code(); #[cfg(unix)] let signal = run_status.signal(); #[cfg(not(unix))] let signal = None; code .or(signal) .expect("Should have either an exit code or a signal."); let got_signal = signal.is_some(); let builder = &mut FlatBufferBuilder::new(); let inner = msg::RunStatusRes::create( builder, &msg::RunStatusResArgs { got_signal, exit_code: code.unwrap_or(-1), exit_signal: signal.unwrap_or(-1), }, ); Ok(serialize_response( cmd_id, builder, msg::BaseArgs { inner: Some(inner.as_union_value()), inner_type: msg::Any::RunStatusRes, ..Default::default() }, )) }); Box::new(future) } struct GetMessageFuture { pub state: Arc, } impl Future for GetMessageFuture { type Item = Option; type Error = (); fn poll(&mut self) -> Result, Self::Error> { assert!(self.state.worker_channels.is_some()); match self.state.worker_channels { None => panic!("expected worker_channels"), Some(ref wc) => { let mut wc = wc.lock().unwrap(); wc.1.poll() } } } } fn op_worker_get_message( isolate: &Isolate, base: &msg::Base<'_>, data: libdeno::deno_buf, ) -> Box { assert_eq!(data.len(), 0); let cmd_id = base.cmd_id(); let op = GetMessageFuture { state: isolate.state.clone(), }; let op = op.map_err(move |_| -> DenoError { unimplemented!() }); let op = op.and_then(move |maybe_buf| -> DenoResult { debug!("op_worker_get_message"); let builder = &mut FlatBufferBuilder::new(); let data = maybe_buf.as_ref().map(|buf| builder.create_vector(buf)); let inner = msg::WorkerGetMessageRes::create( builder, &msg::WorkerGetMessageResArgs { data }, ); Ok(serialize_response( cmd_id, builder, msg::BaseArgs { inner: Some(inner.as_union_value()), inner_type: msg::Any::WorkerGetMessageRes, ..Default::default() }, )) }); Box::new(op) } fn op_worker_post_message( isolate: &Isolate, base: &msg::Base<'_>, data: libdeno::deno_buf, ) -> Box { let cmd_id = base.cmd_id(); let d = Vec::from(data.as_ref()).into_boxed_slice(); assert!(isolate.state.worker_channels.is_some()); let tx = match isolate.state.worker_channels { None => panic!("expected worker_channels"), Some(ref wc) => { let wc = wc.lock().unwrap(); wc.0.clone() } }; let op = tx.send(d); let op = op.map_err(|e| errors::new(ErrorKind::Other, e.to_string())); let op = op.and_then(move |_| -> DenoResult { let builder = &mut FlatBufferBuilder::new(); Ok(serialize_response( cmd_id, builder, msg::BaseArgs { ..Default::default() }, )) }); Box::new(op) } #[cfg(test)] mod tests { use super::*; use crate::isolate::{Isolate, IsolateState}; use crate::isolate_init::IsolateInit; use crate::permissions::DenoPermissions; use std::sync::atomic::AtomicBool; #[test] fn fetch_module_meta_fails_without_read() { let state = IsolateState::mock(); let permissions = DenoPermissions { allow_read: AtomicBool::new(false), allow_write: AtomicBool::new(true), allow_env: AtomicBool::new(true), allow_net: AtomicBool::new(true), allow_run: AtomicBool::new(true), ..Default::default() }; let isolate = Isolate::new( IsolateInit { snapshot: None, init_script: None, }, state, dispatch, permissions, ); let builder = &mut FlatBufferBuilder::new(); let fetch_msg_args = msg::FetchModuleMetaDataArgs { specifier: Some(builder.create_string("./somefile")), referrer: Some(builder.create_string(".")), }; let inner = msg::FetchModuleMetaData::create(builder, &fetch_msg_args); let base_args = msg::BaseArgs { inner: Some(inner.as_union_value()), inner_type: msg::Any::FetchModuleMetaData, ..Default::default() }; let base = msg::Base::create(builder, &base_args); msg::finish_base_buffer(builder, base); let data = builder.finished_data(); let final_msg = msg::get_root_as_base(&data); let fetch_result = op_fetch_module_meta_data( &isolate, &final_msg, libdeno::deno_buf::empty(), ).wait(); match fetch_result { Ok(_) => assert!(true), Err(e) => assert_eq!(e.to_string(), permission_denied().to_string()), } } #[test] fn fetch_module_meta_fails_without_write() { let state = IsolateState::mock(); let permissions = DenoPermissions { allow_read: AtomicBool::new(true), allow_write: AtomicBool::new(false), allow_env: AtomicBool::new(true), allow_net: AtomicBool::new(true), allow_run: AtomicBool::new(true), ..Default::default() }; let isolate = Isolate::new( IsolateInit { snapshot: None, init_script: None, }, state, dispatch, permissions, ); let builder = &mut FlatBufferBuilder::new(); let fetch_msg_args = msg::FetchModuleMetaDataArgs { specifier: Some(builder.create_string("./somefile")), referrer: Some(builder.create_string(".")), }; let inner = msg::FetchModuleMetaData::create(builder, &fetch_msg_args); let base_args = msg::BaseArgs { inner: Some(inner.as_union_value()), inner_type: msg::Any::FetchModuleMetaData, ..Default::default() }; let base = msg::Base::create(builder, &base_args); msg::finish_base_buffer(builder, base); let data = builder.finished_data(); let final_msg = msg::get_root_as_base(&data); let fetch_result = op_fetch_module_meta_data( &isolate, &final_msg, libdeno::deno_buf::empty(), ).wait(); match fetch_result { Ok(_) => assert!(true), Err(e) => assert_eq!(e.to_string(), permission_denied().to_string()), } } #[test] fn fetch_module_meta_fails_without_net() { let state = IsolateState::mock(); let permissions = DenoPermissions { allow_read: AtomicBool::new(true), allow_write: AtomicBool::new(true), allow_env: AtomicBool::new(true), allow_net: AtomicBool::new(false), allow_run: AtomicBool::new(true), ..Default::default() }; let isolate = Isolate::new( IsolateInit { snapshot: None, init_script: None, }, state, dispatch, permissions, ); let builder = &mut FlatBufferBuilder::new(); let fetch_msg_args = msg::FetchModuleMetaDataArgs { specifier: Some(builder.create_string("./somefile")), referrer: Some(builder.create_string(".")), }; let inner = msg::FetchModuleMetaData::create(builder, &fetch_msg_args); let base_args = msg::BaseArgs { inner: Some(inner.as_union_value()), inner_type: msg::Any::FetchModuleMetaData, ..Default::default() }; let base = msg::Base::create(builder, &base_args); msg::finish_base_buffer(builder, base); let data = builder.finished_data(); let final_msg = msg::get_root_as_base(&data); let fetch_result = op_fetch_module_meta_data( &isolate, &final_msg, libdeno::deno_buf::empty(), ).wait(); match fetch_result { Ok(_) => assert!(true), Err(e) => assert_eq!(e.to_string(), permission_denied().to_string()), } } #[test] fn fetch_module_meta_not_permission_denied_with_permissions() { let state = IsolateState::mock(); let permissions = DenoPermissions { allow_read: AtomicBool::new(true), allow_write: AtomicBool::new(true), allow_env: AtomicBool::new(false), allow_net: AtomicBool::new(true), allow_run: AtomicBool::new(false), ..Default::default() }; let isolate = Isolate::new( IsolateInit { snapshot: None, init_script: None, }, state, dispatch, permissions, ); let builder = &mut FlatBufferBuilder::new(); let fetch_msg_args = msg::FetchModuleMetaDataArgs { specifier: Some(builder.create_string("./somefile")), referrer: Some(builder.create_string(".")), }; let inner = msg::FetchModuleMetaData::create(builder, &fetch_msg_args); let base_args = msg::BaseArgs { inner: Some(inner.as_union_value()), inner_type: msg::Any::FetchModuleMetaData, ..Default::default() }; let base = msg::Base::create(builder, &base_args); msg::finish_base_buffer(builder, base); let data = builder.finished_data(); let final_msg = msg::get_root_as_base(&data); let fetch_result = op_fetch_module_meta_data( &isolate, &final_msg, libdeno::deno_buf::empty(), ).wait(); match fetch_result { Ok(_) => assert!(true), Err(e) => assert!(e.to_string() != permission_denied().to_string()), } } }