// Copyright 2018-2022 the Deno authors. All rights reserved. MIT license. use deno_core::url; use std::process::Command; use test_util as util; use test_util::TempDir; itest!(stdout_write_all { args: "run --quiet stdout_write_all.ts", output: "stdout_write_all.out", }); itest!(_001_hello { args: "run --reload 001_hello.js", output: "001_hello.js.out", envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())], }); itest!(_002_hello { args: "run --quiet --reload 002_hello.ts", output: "002_hello.ts.out", }); itest!(_003_relative_import { args: "run --quiet --reload 003_relative_import.ts", output: "003_relative_import.ts.out", }); itest!(_004_set_timeout { args: "run --quiet --reload 004_set_timeout.ts", output: "004_set_timeout.ts.out", }); itest!(_005_more_imports { args: "run --quiet --reload 005_more_imports.ts", output: "005_more_imports.ts.out", }); itest!(_006_url_imports { args: "run --quiet --reload 006_url_imports.ts", output: "006_url_imports.ts.out", http_server: true, }); itest!(_012_async { args: "run --quiet --reload 012_async.ts", output: "012_async.ts.out", }); itest!(_013_dynamic_import { args: "run --quiet --reload --allow-read 013_dynamic_import.ts", output: "013_dynamic_import.ts.out", }); itest!(_014_duplicate_import { args: "run --quiet --reload --allow-read 014_duplicate_import.ts ", output: "014_duplicate_import.ts.out", }); itest!(_015_duplicate_parallel_import { args: "run --quiet --reload --allow-read 015_duplicate_parallel_import.js", output: "015_duplicate_parallel_import.js.out", }); itest!(_016_double_await { args: "run --quiet --allow-read --reload 016_double_await.ts", output: "016_double_await.ts.out", }); itest!(_017_import_redirect { args: "run --quiet --reload 017_import_redirect.ts", output: "017_import_redirect.ts.out", }); itest!(_017_import_redirect_nocheck { args: "run --quiet --reload --no-check 017_import_redirect.ts", output: "017_import_redirect.ts.out", }); itest!(_017_import_redirect_info { args: "info --quiet --reload 017_import_redirect.ts", output: "017_import_redirect_info.out", }); itest!(_018_async_catch { args: "run --quiet --reload 018_async_catch.ts", output: "018_async_catch.ts.out", }); itest!(_019_media_types { args: "run --reload 019_media_types.ts", output: "019_media_types.ts.out", http_server: true, }); itest!(_020_json_modules { args: "run --reload 020_json_modules.ts", output: "020_json_modules.ts.out", exit_code: 1, }); itest!(_021_mjs_modules { args: "run --quiet --reload 021_mjs_modules.ts", output: "021_mjs_modules.ts.out", }); itest!(_023_no_ext { args: "run --reload --check 023_no_ext", output: "023_no_ext.out", envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())], }); // TODO(lucacasonato): remove --unstable when permissions goes stable itest!(_025_hrtime { args: "run --quiet --allow-hrtime --unstable --reload 025_hrtime.ts", output: "025_hrtime.ts.out", }); itest!(_025_reload_js_type_error { args: "run --quiet --reload 025_reload_js_type_error.js", output: "025_reload_js_type_error.js.out", }); itest!(_026_redirect_javascript { args: "run --quiet --reload 026_redirect_javascript.js", output: "026_redirect_javascript.js.out", http_server: true, }); itest!(_027_redirect_typescript { args: "run --quiet --reload 027_redirect_typescript.ts", output: "027_redirect_typescript.ts.out", http_server: true, }); itest!(_028_args { args: "run --quiet --reload 028_args.ts --arg1 val1 --arg2=val2 -- arg3 arg4", output: "028_args.ts.out", }); itest!(_033_import_map { args: "run --quiet --reload --import-map=import_maps/import_map.json import_maps/test.ts", output: "033_import_map.out", }); itest!(_033_import_map_remote { args: "run --quiet --reload --import-map=http://127.0.0.1:4545/import_maps/import_map_remote.json --unstable import_maps/test_remote.ts", output: "033_import_map_remote.out", http_server: true, }); itest!(_034_onload { args: "run --quiet --reload 034_onload/main.ts", output: "034_onload.out", }); itest!(_035_cached_only_flag { args: "run --reload --check --cached-only http://127.0.0.1:4545/019_media_types.ts", output: "035_cached_only_flag.out", exit_code: 1, http_server: true, envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())], }); itest!(_038_checkjs { // checking if JS file is run through TS compiler args: "run --reload --config checkjs.tsconfig.json 038_checkjs.js", exit_code: 1, output: "038_checkjs.js.out", }); itest!(_042_dyn_import_evalcontext { args: "run --quiet --allow-read --reload 042_dyn_import_evalcontext.ts", output: "042_dyn_import_evalcontext.ts.out", }); itest!(_044_bad_resource { args: "run --quiet --reload --allow-read 044_bad_resource.ts", output: "044_bad_resource.ts.out", exit_code: 1, }); itest!(_045_proxy { args: "run -L debug --allow-net --allow-env --allow-run --allow-read --reload --quiet 045_proxy_test.ts", output: "045_proxy_test.ts.out", http_server: true, }); itest!(_046_tsx { args: "run --quiet --reload 046_jsx_test.tsx", output: "046_jsx_test.tsx.out", }); itest!(_047_jsx { args: "run --quiet --reload 047_jsx_test.jsx", output: "047_jsx_test.jsx.out", }); itest!(_048_media_types_jsx { args: "run --reload 048_media_types_jsx.ts", output: "048_media_types_jsx.ts.out", http_server: true, }); itest!(_052_no_remote_flag { args: "run --reload --check --no-remote http://127.0.0.1:4545/019_media_types.ts", output: "052_no_remote_flag.out", exit_code: 1, http_server: true, envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())], }); itest!(_056_make_temp_file_write_perm { args: "run --quiet --allow-read --allow-write=./subdir/ 056_make_temp_file_write_perm.ts", output: "056_make_temp_file_write_perm.out", }); itest!(_058_tasks_microtasks_close { args: "run --quiet 058_tasks_microtasks_close.ts", output: "058_tasks_microtasks_close.ts.out", }); itest!(_059_fs_relative_path_perm { args: "run 059_fs_relative_path_perm.ts", output: "059_fs_relative_path_perm.ts.out", exit_code: 1, }); itest!(_070_location { args: "run --location https://foo/bar?baz#bat 070_location.ts", output: "070_location.ts.out", }); itest!(_071_location_unset { args: "run 071_location_unset.ts", output: "071_location_unset.ts.out", }); itest!(_072_location_relative_fetch { args: "run --location http://127.0.0.1:4545/ --allow-net 072_location_relative_fetch.ts", output: "072_location_relative_fetch.ts.out", http_server: true, }); // tests the serialization of webstorage (both localStorage and sessionStorage) itest!(webstorage_serialization { args: "run webstorage/serialization.ts", output: "webstorage/serialization.ts.out", }); // tests to ensure that when `--location` is set, all code shares the same // localStorage cache based on the origin of the location URL. #[test] fn webstorage_location_shares_origin() { let deno_dir = util::new_deno_dir(); let mut deno_cmd = util::deno_cmd_with_deno_dir(&deno_dir); let output = deno_cmd .current_dir(util::testdata_path()) .arg("run") .arg("--location") .arg("https://example.com/a.ts") .arg("webstorage/fixture.ts") .stdout(std::process::Stdio::piped()) .spawn() .unwrap() .wait_with_output() .unwrap(); assert!(output.status.success()); assert_eq!(output.stdout, b"Storage { length: 0 }\n"); let mut deno_cmd = util::deno_cmd_with_deno_dir(&deno_dir); let output = deno_cmd .current_dir(util::testdata_path()) .arg("run") .arg("--location") .arg("https://example.com/b.ts") .arg("webstorage/logger.ts") .stdout(std::process::Stdio::piped()) .spawn() .unwrap() .wait_with_output() .unwrap(); assert!(output.status.success()); assert_eq!(output.stdout, b"Storage { length: 1, hello: \"deno\" }\n"); } // test to ensure that when a --config file is set, but no --location, that // storage persists against unique configuration files. #[test] fn webstorage_config_file() { let deno_dir = util::new_deno_dir(); let mut deno_cmd = util::deno_cmd_with_deno_dir(&deno_dir); let output = deno_cmd .current_dir(util::testdata_path()) .arg("run") .arg("--config") .arg("webstorage/config_a.jsonc") .arg("webstorage/fixture.ts") .stdout(std::process::Stdio::piped()) .spawn() .unwrap() .wait_with_output() .unwrap(); assert!(output.status.success()); assert_eq!(output.stdout, b"Storage { length: 0 }\n"); let mut deno_cmd = util::deno_cmd_with_deno_dir(&deno_dir); let output = deno_cmd .current_dir(util::testdata_path()) .arg("run") .arg("--config") .arg("webstorage/config_b.jsonc") .arg("webstorage/logger.ts") .stdout(std::process::Stdio::piped()) .spawn() .unwrap() .wait_with_output() .unwrap(); assert!(output.status.success()); assert_eq!(output.stdout, b"Storage { length: 0 }\n"); let mut deno_cmd = util::deno_cmd_with_deno_dir(&deno_dir); let output = deno_cmd .current_dir(util::testdata_path()) .arg("run") .arg("--config") .arg("webstorage/config_a.jsonc") .arg("webstorage/logger.ts") .stdout(std::process::Stdio::piped()) .spawn() .unwrap() .wait_with_output() .unwrap(); assert!(output.status.success()); assert_eq!(output.stdout, b"Storage { length: 1, hello: \"deno\" }\n"); } // tests to ensure `--config` does not effect persisted storage when a // `--location` is provided. #[test] fn webstorage_location_precedes_config() { let deno_dir = util::new_deno_dir(); let mut deno_cmd = util::deno_cmd_with_deno_dir(&deno_dir); let output = deno_cmd .current_dir(util::testdata_path()) .arg("run") .arg("--location") .arg("https://example.com/a.ts") .arg("--config") .arg("webstorage/config_a.jsonc") .arg("webstorage/fixture.ts") .stdout(std::process::Stdio::piped()) .spawn() .unwrap() .wait_with_output() .unwrap(); assert!(output.status.success()); assert_eq!(output.stdout, b"Storage { length: 0 }\n"); let mut deno_cmd = util::deno_cmd_with_deno_dir(&deno_dir); let output = deno_cmd .current_dir(util::testdata_path()) .arg("run") .arg("--location") .arg("https://example.com/b.ts") .arg("--config") .arg("webstorage/config_b.jsonc") .arg("webstorage/logger.ts") .stdout(std::process::Stdio::piped()) .spawn() .unwrap() .wait_with_output() .unwrap(); assert!(output.status.success()); assert_eq!(output.stdout, b"Storage { length: 1, hello: \"deno\" }\n"); } // test to ensure that when there isn't a configuration or location, that the // main module is used to determine how to persist storage data. #[test] fn webstorage_main_module() { let deno_dir = util::new_deno_dir(); let mut deno_cmd = util::deno_cmd_with_deno_dir(&deno_dir); let output = deno_cmd .current_dir(util::testdata_path()) .arg("run") .arg("webstorage/fixture.ts") .stdout(std::process::Stdio::piped()) .spawn() .unwrap() .wait_with_output() .unwrap(); assert!(output.status.success()); assert_eq!(output.stdout, b"Storage { length: 0 }\n"); let mut deno_cmd = util::deno_cmd_with_deno_dir(&deno_dir); let output = deno_cmd .current_dir(util::testdata_path()) .arg("run") .arg("webstorage/logger.ts") .stdout(std::process::Stdio::piped()) .spawn() .unwrap() .wait_with_output() .unwrap(); assert!(output.status.success()); assert_eq!(output.stdout, b"Storage { length: 0 }\n"); let mut deno_cmd = util::deno_cmd_with_deno_dir(&deno_dir); let output = deno_cmd .current_dir(util::testdata_path()) .arg("run") .arg("webstorage/fixture.ts") .stdout(std::process::Stdio::piped()) .spawn() .unwrap() .wait_with_output() .unwrap(); assert!(output.status.success()); assert_eq!(output.stdout, b"Storage { length: 1, hello: \"deno\" }\n"); } itest!(_075_import_local_query_hash { args: "run 075_import_local_query_hash.ts", output: "075_import_local_query_hash.ts.out", }); itest!(_077_fetch_empty { args: "run -A 077_fetch_empty.ts", output: "077_fetch_empty.ts.out", exit_code: 1, }); itest!(_078_unload_on_exit { args: "run 078_unload_on_exit.ts", output: "078_unload_on_exit.ts.out", exit_code: 1, }); itest!(_079_location_authentication { args: "run --location https://foo:bar@baz/qux 079_location_authentication.ts", output: "079_location_authentication.ts.out", }); itest!(_080_deno_emit_permissions { args: "run --unstable 080_deno_emit_permissions.ts", output: "080_deno_emit_permissions.ts.out", exit_code: 1, }); itest!(_081_location_relative_fetch_redirect { args: "run --location http://127.0.0.1:4546/ --allow-net 081_location_relative_fetch_redirect.ts", output: "081_location_relative_fetch_redirect.ts.out", http_server: true, }); itest!(_082_prepare_stack_trace_throw { args: "run 082_prepare_stack_trace_throw.js", output: "082_prepare_stack_trace_throw.js.out", exit_code: 1, }); #[test] fn _083_legacy_external_source_map() { let _g = util::http_server(); let deno_dir = TempDir::new(); let module_url = url::Url::parse("http://localhost:4545/083_legacy_external_source_map.ts") .unwrap(); // Write a faulty old external source map. let faulty_map_path = deno_dir.path().join("gen/http/localhost_PORT4545/9576bd5febd0587c5c4d88d57cb3ac8ebf2600c529142abe3baa9a751d20c334.js.map"); std::fs::create_dir_all(faulty_map_path.parent().unwrap()).unwrap(); std::fs::write(faulty_map_path, "{\"version\":3,\"file\":\"\",\"sourceRoot\":\"\",\"sources\":[\"http://localhost:4545/083_legacy_external_source_map.ts\"],\"names\":[],\"mappings\":\";AAAA,MAAM,IAAI,KAAK,CAAC,KAAK,CAAC,CAAC\"}").unwrap(); let output = Command::new(util::deno_exe_path()) .env("DENO_DIR", deno_dir.path()) .current_dir(util::testdata_path()) .arg("run") .arg(module_url.to_string()) .output() .unwrap(); // Before https://github.com/denoland/deno/issues/6965 was fixed, the faulty // old external source map would cause a panic while formatting the error // and the exit code would be 101. The external source map should be ignored // in favor of the inline one. assert_eq!(output.status.code(), Some(1)); let out = std::str::from_utf8(&output.stdout).unwrap(); assert_eq!(out, ""); } itest!(_085_dynamic_import_async_error { args: "run --allow-read 085_dynamic_import_async_error.ts", output: "085_dynamic_import_async_error.ts.out", }); itest!(_086_dynamic_import_already_rejected { args: "run --allow-read 086_dynamic_import_already_rejected.ts", output: "086_dynamic_import_already_rejected.ts.out", }); itest!(_087_no_check_imports_not_used_as_values { args: "run --config preserve_imports.tsconfig.json --no-check 087_no_check_imports_not_used_as_values.ts", output: "087_no_check_imports_not_used_as_values.ts.out", }); itest!(_088_dynamic_import_already_evaluating { args: "run --allow-read 088_dynamic_import_already_evaluating.ts", output: "088_dynamic_import_already_evaluating.ts.out", }); itest!(_089_run_allow_list { args: "run --allow-run=curl 089_run_allow_list.ts", output: "089_run_allow_list.ts.out", }); #[test] fn _090_run_permissions_request() { let args = "run --quiet 090_run_permissions_request.ts"; use util::PtyData::*; util::test_pty2(args, vec![ Output("⚠️ ️Deno requests run access to \"ls\". Run again with --allow-run to bypass this prompt.\r\n Allow? [y/n (y = yes allow, n = no deny)]"), Input("y\n"), Output("⚠️ ️Deno requests run access to \"cat\". Run again with --allow-run to bypass this prompt.\r\n Allow? [y/n (y = yes allow, n = no deny)]"), Input("n\n"), Output("granted\r\n"), Output("prompt\r\n"), Output("denied\r\n"), ]); } itest!(_091_use_define_for_class_fields { args: "run 091_use_define_for_class_fields.ts", output: "091_use_define_for_class_fields.ts.out", exit_code: 1, }); itest!(_092_import_map_unmapped_bare_specifier { args: "run --import-map import_maps/import_map.json 092_import_map_unmapped_bare_specifier.ts", output: "092_import_map_unmapped_bare_specifier.ts.out", exit_code: 1, }); itest!(js_import_detect { args: "run --quiet --reload js_import_detect.ts", output: "js_import_detect.ts.out", exit_code: 0, }); itest!(blob_gc_finalization { args: "run blob_gc_finalization.js", output: "blob_gc_finalization.js.out", exit_code: 0, envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())], }); itest!(fetch_response_finalization { args: "run --v8-flags=--expose-gc --allow-net fetch_response_finalization.js", output: "fetch_response_finalization.js.out", http_server: true, exit_code: 0, envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())], }); itest!(import_type { args: "run --reload import_type.ts", output: "import_type.ts.out", }); itest!(import_type_no_check { args: "run --reload --no-check import_type.ts", output: "import_type.ts.out", }); itest!(private_field_presence { args: "run --reload private_field_presence.ts", output: "private_field_presence.ts.out", }); itest!(private_field_presence_no_check { args: "run --reload --no-check private_field_presence.ts", output: "private_field_presence.ts.out", }); itest!(lock_write_requires_lock { args: "run --lock-write some_file.ts", output: "lock_write_requires_lock.out", exit_code: 1, }); itest!(lock_write_fetch { args: "run --quiet --allow-read --allow-write --allow-env --allow-run lock_write_fetch.ts", output: "lock_write_fetch.ts.out", http_server: true, exit_code: 0, }); itest!(lock_check_ok { args: "run --lock=lock_check_ok.json http://127.0.0.1:4545/003_relative_import.ts", output: "003_relative_import.ts.out", http_server: true, }); itest!(lock_check_ok2 { args: "run --lock=lock_check_ok2.json 019_media_types.ts", output: "019_media_types.ts.out", http_server: true, }); itest!(lock_dynamic_imports { args: "run --lock=lock_dynamic_imports.json --allow-read --allow-net http://127.0.0.1:4545/013_dynamic_import.ts", output: "lock_dynamic_imports.out", exit_code: 10, http_server: true, }); itest!(lock_check_err { args: "run --lock=lock_check_err.json http://127.0.0.1:4545/003_relative_import.ts", output: "lock_check_err.out", exit_code: 10, http_server: true, }); itest!(lock_check_err2 { args: "run --lock=lock_check_err2.json 019_media_types.ts", output: "lock_check_err2.out", exit_code: 10, http_server: true, }); itest!(mts_dmts_mjs { args: "run subdir/import.mts", output: "mts_dmts_mjs.out", }); itest!(mts_dmts_mjs_no_check { args: "run --no-check subdir/import.mts", output: "mts_dmts_mjs.out", }); itest!(async_error { exit_code: 1, args: "run --reload async_error.ts", output: "async_error.ts.out", }); itest!(config { args: "run --reload --config config.tsconfig.json config.ts", exit_code: 1, output: "config.ts.out", }); itest!(config_types { args: "run --reload --quiet --config config_types.tsconfig.json config_types.ts", output: "config_types.ts.out", }); itest!(config_types_remote { http_server: true, args: "run --reload --quiet --config config_types_remote.tsconfig.json config_types.ts", output: "config_types.ts.out", }); itest!(empty_typescript { args: "run --reload --check subdir/empty.ts", output_str: Some("Check file:[WILDCARD]/subdir/empty.ts\n"), envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())], }); itest!(error_001 { args: "run --reload error_001.ts", exit_code: 1, output: "error_001.ts.out", }); itest!(error_002 { args: "run --reload error_002.ts", exit_code: 1, output: "error_002.ts.out", }); itest!(error_003_typescript { args: "run --reload error_003_typescript.ts", exit_code: 1, output: "error_003_typescript.ts.out", }); // Supposing that we've already attempted to run error_003_typescript.ts // we want to make sure that JS wasn't emitted. Running again without reload flag // should result in the same output. // https://github.com/denoland/deno/issues/2436 itest!(error_003_typescript2 { args: "run error_003_typescript.ts", exit_code: 1, output: "error_003_typescript.ts.out", }); itest!(error_004_missing_module { args: "run --reload error_004_missing_module.ts", exit_code: 1, output: "error_004_missing_module.ts.out", }); itest!(error_005_missing_dynamic_import { args: "run --reload --allow-read --quiet error_005_missing_dynamic_import.ts", exit_code: 1, output: "error_005_missing_dynamic_import.ts.out", }); itest!(error_006_import_ext_failure { args: "run --reload error_006_import_ext_failure.ts", exit_code: 1, output: "error_006_import_ext_failure.ts.out", }); itest!(error_007_any { args: "run --reload error_007_any.ts", exit_code: 1, output: "error_007_any.ts.out", }); itest!(error_008_checkjs { args: "run --reload error_008_checkjs.js", exit_code: 1, output: "error_008_checkjs.js.out", }); itest!(error_009_extensions_error { args: "run error_009_extensions_error.js", output: "error_009_extensions_error.js.out", exit_code: 1, }); itest!(error_011_bad_module_specifier { args: "run --reload error_011_bad_module_specifier.ts", exit_code: 1, output: "error_011_bad_module_specifier.ts.out", }); itest!(error_012_bad_dynamic_import_specifier { args: "run --reload --check error_012_bad_dynamic_import_specifier.ts", exit_code: 1, output: "error_012_bad_dynamic_import_specifier.ts.out", envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())], }); itest!(error_013_missing_script { args: "run --reload missing_file_name", exit_code: 1, output: "error_013_missing_script.out", envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())], }); itest!(error_014_catch_dynamic_import_error { args: "run --reload --allow-read error_014_catch_dynamic_import_error.js", output: "error_014_catch_dynamic_import_error.js.out", envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())], }); itest!(error_015_dynamic_import_permissions { args: "run --reload --quiet error_015_dynamic_import_permissions.js", output: "error_015_dynamic_import_permissions.out", exit_code: 1, http_server: true, }); // We have an allow-net flag but not allow-read, it should still result in error. itest!(error_016_dynamic_import_permissions2 { args: "run --reload --allow-net error_016_dynamic_import_permissions2.js", output: "error_016_dynamic_import_permissions2.out", exit_code: 1, http_server: true, }); itest!(error_017_hide_long_source_ts { args: "run --reload error_017_hide_long_source_ts.ts", output: "error_017_hide_long_source_ts.ts.out", exit_code: 1, }); itest!(error_018_hide_long_source_js { args: "run error_018_hide_long_source_js.js", output: "error_018_hide_long_source_js.js.out", exit_code: 1, envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())], }); itest!(error_019_stack_function { args: "run error_019_stack_function.ts", output: "error_019_stack_function.ts.out", exit_code: 1, }); itest!(error_020_stack_constructor { args: "run error_020_stack_constructor.ts", output: "error_020_stack_constructor.ts.out", exit_code: 1, }); itest!(error_021_stack_method { args: "run error_021_stack_method.ts", output: "error_021_stack_method.ts.out", exit_code: 1, }); itest!(error_022_stack_custom_error { args: "run error_022_stack_custom_error.ts", output: "error_022_stack_custom_error.ts.out", exit_code: 1, }); itest!(error_023_stack_async { args: "run error_023_stack_async.ts", output: "error_023_stack_async.ts.out", exit_code: 1, }); itest!(error_024_stack_promise_all { args: "run error_024_stack_promise_all.ts", output: "error_024_stack_promise_all.ts.out", exit_code: 1, }); itest!(error_025_tab_indent { args: "run error_025_tab_indent", output: "error_025_tab_indent.out", exit_code: 1, }); itest!(error_026_remote_import_error { args: "run error_026_remote_import_error.ts", output: "error_026_remote_import_error.ts.out", exit_code: 1, http_server: true, }); itest!(error_for_await { args: "run --reload error_for_await.ts", output: "error_for_await.ts.out", exit_code: 1, }); itest!(error_missing_module_named_import { args: "run --reload error_missing_module_named_import.ts", output: "error_missing_module_named_import.ts.out", exit_code: 1, }); itest!(error_no_check { args: "run --reload --no-check error_no_check.ts", output: "error_no_check.ts.out", exit_code: 1, }); itest!(error_syntax { args: "run --reload error_syntax.js", exit_code: 1, output: "error_syntax.js.out", envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())], }); itest!(error_syntax_empty_trailing_line { args: "run --reload error_syntax_empty_trailing_line.mjs", exit_code: 1, output: "error_syntax_empty_trailing_line.mjs.out", envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())], }); itest!(error_type_definitions { args: "run --reload error_type_definitions.ts", exit_code: 1, output: "error_type_definitions.ts.out", }); itest!(error_local_static_import_from_remote_ts { args: "run --reload http://localhost:4545/error_local_static_import_from_remote.ts", exit_code: 1, http_server: true, output: "error_local_static_import_from_remote.ts.out", }); itest!(error_local_static_import_from_remote_js { args: "run --reload http://localhost:4545/error_local_static_import_from_remote.js", exit_code: 1, http_server: true, output: "error_local_static_import_from_remote.js.out", }); itest!(exit_error42 { exit_code: 42, args: "run --quiet --reload exit_error42.ts", output: "exit_error42.ts.out", }); itest!(set_exit_code_0 { args: "run --no-check --unstable set_exit_code_0.ts", output: "empty.out", exit_code: 0, }); itest!(set_exit_code_1 { args: "run --no-check --unstable set_exit_code_1.ts", output: "empty.out", exit_code: 42, }); itest!(set_exit_code_2 { args: "run --no-check --unstable set_exit_code_2.ts", output: "empty.out", exit_code: 42, }); itest!(set_exit_code_in_worker { args: "run --no-check --unstable --allow-read set_exit_code_in_worker.ts", output: "empty.out", exit_code: 42, }); itest!(heapstats { args: "run --quiet --unstable --v8-flags=--expose-gc heapstats.js", output: "heapstats.js.out", }); itest!(finalization_registry { args: "run --quiet --unstable --v8-flags=--expose-gc finalization_registry.js", output: "finalization_registry.js.out", }); itest!(https_import { args: "run --quiet --reload --cert tls/RootCA.pem https_import.ts", output: "https_import.ts.out", http_server: true, }); itest!(if_main { args: "run --quiet --reload if_main.ts", output: "if_main.ts.out", }); itest!(import_meta { args: "run --quiet --reload import_meta.ts", output: "import_meta.ts.out", }); itest!(main_module { args: "run --quiet --allow-read --reload main_module.ts", output: "main_module.ts.out", }); itest!(no_check { args: "run --quiet --reload --no-check 006_url_imports.ts", output: "006_url_imports.ts.out", http_server: true, }); itest!(no_check_decorators { args: "run --quiet --reload --no-check no_check_decorators.ts", output: "no_check_decorators.ts.out", }); itest!(check_remote { args: "run --quiet --reload no_check_remote.ts", output: "no_check_remote.ts.disabled.out", exit_code: 1, http_server: true, }); itest!(no_check_remote { args: "run --quiet --reload --no-check=remote no_check_remote.ts", output: "no_check_remote.ts.enabled.out", http_server: true, }); itest!(runtime_decorators { args: "run --quiet --reload --no-check runtime_decorators.ts", output: "runtime_decorators.ts.out", }); itest!(lib_dom_asynciterable { args: "run --quiet --unstable --reload lib_dom_asynciterable.ts", output: "lib_dom_asynciterable.ts.out", }); itest!(lib_ref { args: "run --quiet --unstable --reload lib_ref.ts", output: "lib_ref.ts.out", }); itest!(lib_runtime_api { args: "run --quiet --unstable --reload lib_runtime_api.ts", output: "lib_runtime_api.ts.out", }); itest!(seed_random { args: "run --seed=100 seed_random.js", output: "seed_random.js.out", envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())], }); itest!(type_definitions { args: "run --reload type_definitions.ts", output: "type_definitions.ts.out", }); itest!(type_definitions_for_export { args: "run --reload --check type_definitions_for_export.ts", output: "type_definitions_for_export.ts.out", exit_code: 1, envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())], }); itest!(type_directives_01 { args: "run --reload -L debug type_directives_01.ts", output: "type_directives_01.ts.out", http_server: true, }); itest!(type_directives_02 { args: "run --reload -L debug type_directives_02.ts", output: "type_directives_02.ts.out", }); itest!(type_directives_js_main { args: "run --reload -L debug type_directives_js_main.js", output: "type_directives_js_main.js.out", exit_code: 0, }); itest!(type_directives_redirect { args: "run --reload --check type_directives_redirect.ts", output: "type_directives_redirect.ts.out", http_server: true, envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())], }); itest!(type_headers_deno_types { args: "run --reload --check type_headers_deno_types.ts", output: "type_headers_deno_types.ts.out", http_server: true, envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())], }); itest!(ts_type_imports { args: "run --reload --check ts_type_imports.ts", output: "ts_type_imports.ts.out", exit_code: 1, envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())], }); itest!(ts_decorators { args: "run --reload -c tsconfig.decorators.json --check ts_decorators.ts", output: "ts_decorators.ts.out", envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())], }); itest!(ts_type_only_import { args: "run --reload --check ts_type_only_import.ts", output: "ts_type_only_import.ts.out", envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())], }); itest!(swc_syntax_error { args: "run --reload --check swc_syntax_error.ts", output: "swc_syntax_error.ts.out", exit_code: 1, envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())], }); itest!(unbuffered_stderr { args: "run --reload unbuffered_stderr.ts", output: "unbuffered_stderr.ts.out", }); itest!(unbuffered_stdout { args: "run --quiet --reload unbuffered_stdout.ts", output: "unbuffered_stdout.ts.out", }); itest!(v8_flags_run { args: "run --v8-flags=--expose-gc v8_flags.js", output: "v8_flags.js.out", envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())], }); itest!(v8_flags_unrecognized { args: "repl --v8-flags=--foo,bar,--trace-gc,-baz", output: "v8_flags_unrecognized.out", exit_code: 1, }); itest!(v8_help { args: "repl --v8-flags=--help", output: "v8_help.out", }); itest!(unsupported_dynamic_import_scheme { args: "eval import('xxx:')", output: "unsupported_dynamic_import_scheme.out", exit_code: 1, }); itest!(wasm { args: "run --quiet wasm.ts", output: "wasm.ts.out", }); itest!(wasm_shared { args: "run --quiet wasm_shared.ts", output: "wasm_shared.out", }); itest!(wasm_async { args: "run wasm_async.js", output: "wasm_async.out", envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())], }); itest!(wasm_unreachable { args: "run --allow-read wasm_unreachable.js", output: "wasm_unreachable.out", exit_code: 1, envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())], }); itest!(wasm_url { args: "run --quiet --allow-net=localhost:4545 wasm_url.js", output: "wasm_url.out", exit_code: 1, http_server: true, }); itest!(weakref { args: "run --quiet --reload weakref.ts", output: "weakref.ts.out", }); itest!(top_level_await_order { args: "run --allow-read top_level_await_order.js", output: "top_level_await_order.out", envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())], }); itest!(top_level_await_loop { args: "run --allow-read top_level_await_loop.js", output: "top_level_await_loop.out", envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())], }); itest!(top_level_await_circular { args: "run --allow-read top_level_await_circular.js", output: "top_level_await_circular.out", exit_code: 1, envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())], }); // Regression test for https://github.com/denoland/deno/issues/11238. itest!(top_level_await_nested { args: "run --allow-read top_level_await_nested/main.js", output: "top_level_await_nested.out", envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())], }); itest!(top_level_await_unresolved { args: "run top_level_await_unresolved.js", output: "top_level_await_unresolved.out", exit_code: 1, envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())], }); itest!(top_level_await { args: "run --allow-read top_level_await.js", output: "top_level_await.out", envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())], }); itest!(top_level_await_ts { args: "run --quiet --allow-read top_level_await.ts", output: "top_level_await.out", }); itest!(top_level_for_await { args: "run --quiet top_level_for_await.js", output: "top_level_for_await.out", }); itest!(top_level_for_await_ts { args: "run --quiet top_level_for_await.ts", output: "top_level_for_await.out", }); itest!(unstable_disabled { args: "run --reload unstable.ts", exit_code: 1, output: "unstable_disabled.out", }); itest!(unstable_enabled { args: "run --quiet --reload --unstable unstable.ts", output: "unstable_enabled.out", }); itest!(unstable_disabled_js { args: "run --reload unstable.js", output: "unstable_disabled_js.out", envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())], }); itest!(unstable_enabled_js { args: "run --quiet --reload --unstable unstable.ts", output: "unstable_enabled_js.out", }); itest!(unstable_worker { args: "run --reload --unstable --quiet --allow-read unstable_worker.ts", output: "unstable_worker.ts.out", }); itest!(_053_import_compression { args: "run --quiet --reload --allow-net 053_import_compression/main.ts", output: "053_import_compression.out", http_server: true, }); itest!(disallow_http_from_https_js { args: "run --quiet --reload --cert tls/RootCA.pem https://localhost:5545/disallow_http_from_https.js", output: "disallow_http_from_https_js.out", http_server: true, exit_code: 1, }); itest!(disallow_http_from_https_ts { args: "run --quiet --reload --cert tls/RootCA.pem https://localhost:5545/disallow_http_from_https.ts", output: "disallow_http_from_https_ts.out", http_server: true, exit_code: 1, }); itest!(dynamic_import_conditional { args: "run --quiet --reload dynamic_import_conditional.js", output: "dynamic_import_conditional.js.out", }); itest!(tsx_imports { args: "run --reload --check tsx_imports.ts", output: "tsx_imports.ts.out", envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())], }); itest!(fix_dynamic_import_errors { args: "run --reload fix_dynamic_import_errors.js", output: "fix_dynamic_import_errors.js.out", envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())], }); itest!(fix_emittable_skipped { args: "run --reload fix_emittable_skipped.js", output: "fix_emittable_skipped.ts.out", }); itest!(fix_exotic_specifiers { args: "run --quiet --reload fix_exotic_specifiers.ts", output: "fix_exotic_specifiers.ts.out", }); itest!(fix_js_import_js { args: "run --quiet --reload fix_js_import_js.ts", output: "fix_js_import_js.ts.out", }); itest!(fix_js_imports { args: "run --quiet --reload fix_js_imports.ts", output: "fix_js_imports.ts.out", }); itest!(fix_tsc_file_exists { args: "run --quiet --reload tsc/test.js", output: "fix_tsc_file_exists.out", }); itest!(fix_worker_dispatchevent { args: "run --quiet --reload fix_worker_dispatchevent.ts", output: "fix_worker_dispatchevent.ts.out", }); itest!(es_private_fields { args: "run --quiet --reload es_private_fields.js", output: "es_private_fields.js.out", }); itest!(cjs_imports { args: "run --quiet --reload cjs_imports.ts", output: "cjs_imports.ts.out", }); itest!(ts_import_from_js { args: "run --quiet --reload ts_import_from_js.js", output: "ts_import_from_js.js.out", http_server: true, }); itest!(jsx_import_from_ts { args: "run --quiet --reload jsx_import_from_ts.ts", output: "jsx_import_from_ts.ts.out", }); itest!(jsx_import_source_pragma { args: "run --reload jsx_import_source_pragma.tsx", output: "jsx_import_source.out", http_server: true, }); itest!(jsx_import_source_pragma_with_config { args: "run --reload --config jsx/deno-jsx.jsonc jsx_import_source_pragma.tsx", output: "jsx_import_source.out", http_server: true, }); itest!(jsx_import_source_pragma_with_dev_config { args: "run --reload --config jsx/deno-jsxdev.jsonc jsx_import_source_pragma.tsx", output: "jsx_import_source_dev.out", http_server: true, }); itest!(jsx_import_source_no_pragma { args: "run --reload --config jsx/deno-jsx.jsonc jsx_import_source_no_pragma.tsx", output: "jsx_import_source.out", http_server: true, }); itest!(jsx_import_source_no_pragma_dev { args: "run --reload --config jsx/deno-jsxdev.jsonc jsx_import_source_no_pragma.tsx", output: "jsx_import_source_dev.out", http_server: true, }); itest!(jsx_import_source_pragma_import_map { args: "run --reload --import-map jsx/import-map.json jsx_import_source_pragma_import_map.tsx", output: "jsx_import_source_import_map.out", http_server: true, }); itest!(jsx_import_source_pragma_import_map_dev { args: "run --reload --import-map jsx/import-map.json --config jsx/deno-jsxdev-import-map.jsonc jsx_import_source_pragma_import_map.tsx", output: "jsx_import_source_import_map_dev.out", http_server: true, }); itest!(jsx_import_source_import_map { args: "run --reload --import-map jsx/import-map.json --config jsx/deno-jsx-import-map.jsonc jsx_import_source_no_pragma.tsx", output: "jsx_import_source_import_map.out", http_server: true, }); itest!(jsx_import_source_import_map_dev { args: "run --reload --import-map jsx/import-map.json --config jsx/deno-jsxdev-import-map.jsonc jsx_import_source_no_pragma.tsx", output: "jsx_import_source_import_map_dev.out", http_server: true, }); itest!(jsx_import_source_pragma_no_check { args: "run --reload --no-check jsx_import_source_pragma.tsx", output: "jsx_import_source.out", http_server: true, }); itest!(jsx_import_source_pragma_with_config_no_check { args: "run --reload --config jsx/deno-jsx.jsonc --no-check jsx_import_source_pragma.tsx", output: "jsx_import_source.out", http_server: true, }); // itest!(jsx_import_source_pragma_with_dev_config_no_check { // args: // "run --reload --config jsx/deno-jsxdev.jsonc --no-check jsx_import_source_pragma.tsx", // output: "jsx_import_source_dev.out", // http_server: true, // }); itest!(jsx_import_source_no_pragma_no_check { args: "run --reload --config jsx/deno-jsx.jsonc --no-check jsx_import_source_no_pragma.tsx", output: "jsx_import_source.out", http_server: true, }); // itest!(jsx_import_source_no_pragma_dev_no_check { // args: "run --reload --config jsx/deno-jsxdev.jsonc --no-check jsx_import_source_no_pragma.tsx", // output: "jsx_import_source_dev.out", // http_server: true, // }); itest!(jsx_import_source_pragma_import_map_no_check { args: "run --reload --import-map jsx/import-map.json --no-check jsx_import_source_pragma_import_map.tsx", output: "jsx_import_source_import_map.out", http_server: true, }); // itest!(jsx_import_source_pragma_import_map_dev_no_check { // args: "run --reload --import-map jsx/import-map.json --config jsx/deno-jsxdev-import-map.jsonc --no-check jsx_import_source_pragma_import_map.tsx", // output: "jsx_import_source_import_map_dev.out", // http_server: true, // }); itest!(jsx_import_source_import_map_no_check { args: "run --reload --import-map jsx/import-map.json --config jsx/deno-jsx-import-map.jsonc --no-check jsx_import_source_no_pragma.tsx", output: "jsx_import_source_import_map.out", http_server: true, }); // itest!(jsx_import_source_import_map_dev_no_check { // args: "run --reload --import-map jsx/import-map.json --config jsx/deno-jsxdev-import-map.jsonc --no-check jsx_import_source_no_pragma.tsx", // output: "jsx_import_source_import_map_dev.out", // http_server: true, // }); // TODO(#11128): Flaky. Re-enable later. // itest!(single_compile_with_reload { // args: "run --reload --allow-read single_compile_with_reload.ts", // output: "single_compile_with_reload.ts.out", // }); itest!(proto_exploit { args: "run proto_exploit.js", output: "proto_exploit.js.out", envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())], }); itest!(reference_types { args: "run --reload --quiet reference_types.ts", output: "reference_types.ts.out", }); itest!(references_types_remote { http_server: true, args: "run --reload --quiet reference_types_remote.ts", output: "reference_types_remote.ts.out", }); itest!(import_data_url_error_stack { args: "run --quiet --reload import_data_url_error_stack.ts", output: "import_data_url_error_stack.ts.out", exit_code: 1, }); itest!(import_data_url_import_relative { args: "run --quiet --reload import_data_url_import_relative.ts", output: "import_data_url_import_relative.ts.out", exit_code: 1, }); itest!(import_data_url_import_map { args: "run --quiet --reload --import-map import_maps/import_map.json import_data_url.ts", output: "import_data_url.ts.out", }); itest!(import_data_url_imports { args: "run --quiet --reload import_data_url_imports.ts", output: "import_data_url_imports.ts.out", http_server: true, }); itest!(import_data_url_jsx { args: "run --quiet --reload import_data_url_jsx.ts", output: "import_data_url_jsx.ts.out", }); itest!(import_data_url { args: "run --quiet --reload import_data_url.ts", output: "import_data_url.ts.out", }); itest!(import_dynamic_data_url { args: "run --quiet --reload import_dynamic_data_url.ts", output: "import_dynamic_data_url.ts.out", }); itest!(import_blob_url_error_stack { args: "run --quiet --reload import_blob_url_error_stack.ts", output: "import_blob_url_error_stack.ts.out", exit_code: 1, }); itest!(import_blob_url_import_relative { args: "run --quiet --reload import_blob_url_import_relative.ts", output: "import_blob_url_import_relative.ts.out", exit_code: 1, }); itest!(import_blob_url_imports { args: "run --quiet --reload --allow-net=localhost:4545 import_blob_url_imports.ts", output: "import_blob_url_imports.ts.out", http_server: true, }); itest!(import_blob_url_jsx { args: "run --quiet --reload import_blob_url_jsx.ts", output: "import_blob_url_jsx.ts.out", }); itest!(import_blob_url { args: "run --quiet --reload import_blob_url.ts", output: "import_blob_url.ts.out", }); itest!(import_file_with_colon { args: "run --quiet --reload import_file_with_colon.ts", output: "import_file_with_colon.ts.out", http_server: true, }); itest!(import_extensionless { args: "run --quiet --reload import_extensionless.ts", output: "import_extensionless.ts.out", http_server: true, }); itest!(classic_workers_event_loop { args: "run --enable-testing-features-do-not-use classic_workers_event_loop.js", output: "classic_workers_event_loop.js.out", envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())], }); // FIXME(bartlomieju): disabled, because this test is very flaky on CI // itest!(local_sources_not_cached_in_memory { // args: "run --allow-read --allow-write no_mem_cache.js", // output: "no_mem_cache.js.out", // }); // This test checks that inline source map data is used. It uses a hand crafted // source map that maps to a file that exists, but is not loaded into the module // graph (inline_js_source_map_2.ts) (because there are no direct dependencies). // Source line is not remapped because no inline source contents are included in // the sourcemap and the file is not present in the dependency graph. itest!(inline_js_source_map_2 { args: "run --quiet inline_js_source_map_2.js", output: "inline_js_source_map_2.js.out", exit_code: 1, }); // This test checks that inline source map data is used. It uses a hand crafted // source map that maps to a file that exists, but is not loaded into the module // graph (inline_js_source_map_2.ts) (because there are no direct dependencies). // Source line remapped using th inline source contents that are included in the // inline source map. itest!(inline_js_source_map_2_with_inline_contents { args: "run --quiet inline_js_source_map_2_with_inline_contents.js", output: "inline_js_source_map_2_with_inline_contents.js.out", exit_code: 1, }); // This test checks that inline source map data is used. It uses a hand crafted // source map that maps to a file that exists, and is loaded into the module // graph because of a direct import statement (inline_js_source_map.ts). The // source map was generated from an earlier version of this file, where the throw // was not commented out. The source line is remapped using source contents that // from the module graph. itest!(inline_js_source_map_with_contents_from_graph { args: "run --quiet inline_js_source_map_with_contents_from_graph.js", output: "inline_js_source_map_with_contents_from_graph.js.out", exit_code: 1, http_server: true, }); // This test ensures that a descriptive error is shown when we're unable to load // the import map. Even though this tests only the `run` subcommand, we can be sure // that the error message is similar for other subcommands as they all use // `program_state.maybe_import_map` to access the import map underneath. itest!(error_import_map_unable_to_load { args: "run --import-map=import_maps/does_not_exist.json import_maps/test.ts", output: "error_import_map_unable_to_load.out", exit_code: 1, envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())], }); // Test that setting `self` in the main thread to some other value doesn't break // the world. itest!(replace_self { args: "run replace_self.js", output: "replace_self.js.out", envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())], }); itest!(worker_event_handler_test { args: "run --quiet --reload --allow-read worker_event_handler_test.js", output: "worker_event_handler_test.js.out", }); itest!(worker_close_race { args: "run --quiet --reload --allow-read worker_close_race.js", output: "worker_close_race.js.out", }); itest!(worker_drop_handle_race { args: "run --quiet --reload --allow-read worker_drop_handle_race.js", output: "worker_drop_handle_race.js.out", exit_code: 1, }); itest!(worker_close_nested { args: "run --quiet --reload --allow-read worker_close_nested.js", output: "worker_close_nested.js.out", }); itest!(worker_message_before_close { args: "run --quiet --reload --allow-read worker_message_before_close.js", output: "worker_message_before_close.js.out", }); itest!(worker_close_in_wasm_reactions { args: "run --quiet --reload --allow-read worker_close_in_wasm_reactions.js", output: "worker_close_in_wasm_reactions.js.out", }); itest!(reference_types_error { args: "run --config checkjs.tsconfig.json --check reference_types_error.js", output: "reference_types_error.js.out", exit_code: 1, envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())], }); itest!(reference_types_error_no_check { args: "run --no-check reference_types_error.js", output_str: Some(""), }); itest!(jsx_import_source_error { args: "run --config jsx/deno-jsx-error.jsonc --check jsx_import_source_no_pragma.tsx", output: "jsx_import_source_error.out", exit_code: 1, envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())], }); itest!(shebang_tsc { args: "run --quiet shebang.ts", output: "shebang.ts.out", }); itest!(shebang_swc { args: "run --quiet --no-check shebang.ts", output: "shebang.ts.out", }); itest!(shebang_with_json_imports_tsc { args: "run --quiet import_assertions/json_with_shebang.ts", output: "import_assertions/json_with_shebang.ts.out", exit_code: 1, }); itest!(shebang_with_json_imports_swc { args: "run --quiet --no-check import_assertions/json_with_shebang.ts", output: "import_assertions/json_with_shebang.ts.out", exit_code: 1, }); #[test] fn no_validate_asm() { let output = util::deno_cmd() .current_dir(util::testdata_path()) .env("DENO_FUTURE_CHECK", "1") .arg("run") .arg("no_validate_asm.js") .stderr(std::process::Stdio::piped()) .stdout(std::process::Stdio::piped()) .spawn() .unwrap() .wait_with_output() .unwrap(); assert!(output.status.success()); assert!(output.stderr.is_empty()); assert!(output.stdout.is_empty()); } #[test] fn exec_path() { let output = util::deno_cmd() .current_dir(util::testdata_path()) .arg("run") .arg("--allow-read") .arg("exec_path.ts") .stdout(std::process::Stdio::piped()) .spawn() .unwrap() .wait_with_output() .unwrap(); assert!(output.status.success()); let stdout_str = std::str::from_utf8(&output.stdout).unwrap().trim(); let actual = std::fs::canonicalize(&std::path::Path::new(stdout_str)).unwrap(); let expected = std::fs::canonicalize(util::deno_exe_path()).unwrap(); assert_eq!(expected, actual); } #[cfg(windows)] // Clippy suggests to remove the `NoStd` prefix from all variants. I disagree. #[allow(clippy::enum_variant_names)] enum WinProcConstraints { NoStdIn, NoStdOut, NoStdErr, } #[cfg(windows)] fn run_deno_script_constrained( script_path: std::path::PathBuf, constraints: WinProcConstraints, ) -> Result<(), i64> { let file_path = "DenoWinRunner.ps1"; let constraints = match constraints { WinProcConstraints::NoStdIn => "1", WinProcConstraints::NoStdOut => "2", WinProcConstraints::NoStdErr => "4", }; let deno_exe_path = util::deno_exe_path() .into_os_string() .into_string() .unwrap(); let deno_script_path = script_path.into_os_string().into_string().unwrap(); let args = vec![&deno_exe_path[..], &deno_script_path[..], constraints]; util::run_powershell_script_file(file_path, args) } #[cfg(windows)] #[test] fn should_not_panic_on_no_stdin() { let output = run_deno_script_constrained( util::testdata_path().join("echo.ts"), WinProcConstraints::NoStdIn, ); output.unwrap(); } #[cfg(windows)] #[test] fn should_not_panic_on_no_stdout() { let output = run_deno_script_constrained( util::testdata_path().join("echo.ts"), WinProcConstraints::NoStdOut, ); output.unwrap(); } #[cfg(windows)] #[test] fn should_not_panic_on_no_stderr() { let output = run_deno_script_constrained( util::testdata_path().join("echo.ts"), WinProcConstraints::NoStdErr, ); output.unwrap(); } #[cfg(not(windows))] #[test] fn should_not_panic_on_undefined_home_environment_variable() { let output = util::deno_cmd() .current_dir(util::testdata_path()) .arg("run") .arg("echo.ts") .env_remove("HOME") .spawn() .unwrap() .wait_with_output() .unwrap(); assert!(output.status.success()); } #[test] fn should_not_panic_on_undefined_deno_dir_environment_variable() { let output = util::deno_cmd() .current_dir(util::testdata_path()) .arg("run") .arg("echo.ts") .env_remove("DENO_DIR") .spawn() .unwrap() .wait_with_output() .unwrap(); assert!(output.status.success()); } #[cfg(not(windows))] #[test] fn should_not_panic_on_undefined_deno_dir_and_home_environment_variables() { let output = util::deno_cmd() .current_dir(util::testdata_path()) .arg("run") .arg("echo.ts") .env_remove("DENO_DIR") .env_remove("HOME") .spawn() .unwrap() .wait_with_output() .unwrap(); assert!(output.status.success()); } #[test] fn rust_log() { // Without RUST_LOG the stderr is empty. let output = util::deno_cmd() .current_dir(util::testdata_path()) .env("DENO_FUTURE_CHECK", "1") .arg("run") .arg("001_hello.js") .stderr(std::process::Stdio::piped()) .spawn() .unwrap() .wait_with_output() .unwrap(); assert!(output.status.success()); assert!(output.stderr.is_empty()); // With RUST_LOG the stderr is not empty. let output = util::deno_cmd() .current_dir(util::testdata_path()) .env("DENO_FUTURE_CHECK", "1") .arg("run") .arg("001_hello.js") .env("RUST_LOG", "debug") .stderr(std::process::Stdio::piped()) .spawn() .unwrap() .wait_with_output() .unwrap(); assert!(output.status.success()); assert!(!output.stderr.is_empty()); } #[test] fn dont_cache_on_check_fail() { let deno_dir = util::new_deno_dir(); let mut deno_cmd = util::deno_cmd_with_deno_dir(&deno_dir); let output = deno_cmd .current_dir(util::testdata_path()) .arg("run") .arg("--reload") .arg("error_003_typescript.ts") .stderr(std::process::Stdio::piped()) .spawn() .unwrap() .wait_with_output() .unwrap(); assert!(!output.status.success()); assert!(!output.stderr.is_empty()); let mut deno_cmd = util::deno_cmd_with_deno_dir(&deno_dir); let output = deno_cmd .current_dir(util::testdata_path()) .arg("run") .arg("error_003_typescript.ts") .stderr(std::process::Stdio::piped()) .spawn() .unwrap() .wait_with_output() .unwrap(); assert!(!output.status.success()); assert!(!output.stderr.is_empty()); } mod permissions { use test_util as util; #[test] fn with_allow() { for permission in &util::PERMISSION_VARIANTS { let status = util::deno_cmd() .current_dir(&util::testdata_path()) .arg("run") .arg(format!("--allow-{0}", permission)) .arg("permission_test.ts") .arg(format!("{0}Required", permission)) .spawn() .unwrap() .wait() .unwrap(); assert!(status.success()); } } #[test] fn without_allow() { for permission in &util::PERMISSION_VARIANTS { let (_, err) = util::run_and_collect_output( false, &format!("run permission_test.ts {0}Required", permission), None, None, false, ); assert!(err.contains(util::PERMISSION_DENIED_PATTERN)); } } #[test] fn rw_inside_project_dir() { const PERMISSION_VARIANTS: [&str; 2] = ["read", "write"]; for permission in &PERMISSION_VARIANTS { let status = util::deno_cmd() .current_dir(&util::testdata_path()) .arg("run") .arg(format!( "--allow-{0}={1}", permission, util::testdata_path() .into_os_string() .into_string() .unwrap() )) .arg("complex_permissions_test.ts") .arg(permission) .arg("complex_permissions_test.ts") .spawn() .unwrap() .wait() .unwrap(); assert!(status.success()); } } #[test] fn rw_outside_test_dir() { const PERMISSION_VARIANTS: [&str; 2] = ["read", "write"]; for permission in &PERMISSION_VARIANTS { let (_, err) = util::run_and_collect_output( false, &format!( "run --allow-{0}={1} complex_permissions_test.ts {0} {2}", permission, util::testdata_path() .into_os_string() .into_string() .unwrap(), util::root_path() .join("Cargo.toml") .into_os_string() .into_string() .unwrap(), ), None, None, false, ); assert!(err.contains(util::PERMISSION_DENIED_PATTERN)); } } #[test] fn rw_inside_test_dir() { const PERMISSION_VARIANTS: [&str; 2] = ["read", "write"]; for permission in &PERMISSION_VARIANTS { let status = util::deno_cmd() .current_dir(&util::testdata_path()) .arg("run") .arg(format!( "--allow-{0}={1}", permission, util::testdata_path() .into_os_string() .into_string() .unwrap() )) .arg("complex_permissions_test.ts") .arg(permission) .arg("complex_permissions_test.ts") .spawn() .unwrap() .wait() .unwrap(); assert!(status.success()); } } #[test] fn rw_outside_test_and_js_dir() { const PERMISSION_VARIANTS: [&str; 2] = ["read", "write"]; let test_dir = util::testdata_path() .into_os_string() .into_string() .unwrap(); let js_dir = util::root_path() .join("js") .into_os_string() .into_string() .unwrap(); for permission in &PERMISSION_VARIANTS { let (_, err) = util::run_and_collect_output( false, &format!( "run --allow-{0}={1},{2} complex_permissions_test.ts {0} {3}", permission, test_dir, js_dir, util::root_path() .join("Cargo.toml") .into_os_string() .into_string() .unwrap(), ), None, None, false, ); assert!(err.contains(util::PERMISSION_DENIED_PATTERN)); } } #[test] fn rw_inside_test_and_js_dir() { const PERMISSION_VARIANTS: [&str; 2] = ["read", "write"]; let test_dir = util::testdata_path() .into_os_string() .into_string() .unwrap(); let js_dir = util::root_path() .join("js") .into_os_string() .into_string() .unwrap(); for permission in &PERMISSION_VARIANTS { let status = util::deno_cmd() .current_dir(&util::testdata_path()) .arg("run") .arg(format!("--allow-{0}={1},{2}", permission, test_dir, js_dir)) .arg("complex_permissions_test.ts") .arg(permission) .arg("complex_permissions_test.ts") .spawn() .unwrap() .wait() .unwrap(); assert!(status.success()); } } #[test] fn rw_relative() { const PERMISSION_VARIANTS: [&str; 2] = ["read", "write"]; for permission in &PERMISSION_VARIANTS { let status = util::deno_cmd() .current_dir(&util::testdata_path()) .arg("run") .arg(format!("--allow-{0}=.", permission)) .arg("complex_permissions_test.ts") .arg(permission) .arg("complex_permissions_test.ts") .spawn() .unwrap() .wait() .unwrap(); assert!(status.success()); } } #[test] fn rw_no_prefix() { const PERMISSION_VARIANTS: [&str; 2] = ["read", "write"]; for permission in &PERMISSION_VARIANTS { let status = util::deno_cmd() .current_dir(&util::testdata_path()) .arg("run") .arg(format!("--allow-{0}=tls/../", permission)) .arg("complex_permissions_test.ts") .arg(permission) .arg("complex_permissions_test.ts") .spawn() .unwrap() .wait() .unwrap(); assert!(status.success()); } } #[test] fn net_fetch_allow_localhost_4545() { let (_, err) = util::run_and_collect_output( true, "run --allow-net=localhost:4545 complex_permissions_test.ts netFetch http://localhost:4545/", None, None, true, ); assert!(!err.contains(util::PERMISSION_DENIED_PATTERN)); } #[test] fn net_fetch_allow_deno_land() { let (_, err) = util::run_and_collect_output( false, "run --allow-net=deno.land complex_permissions_test.ts netFetch http://localhost:4545/", None, None, true, ); assert!(err.contains(util::PERMISSION_DENIED_PATTERN)); } #[test] fn net_fetch_localhost_4545_fail() { let (_, err) = util::run_and_collect_output( false, "run --allow-net=localhost:4545 complex_permissions_test.ts netFetch http://localhost:4546/", None, None, true, ); assert!(err.contains(util::PERMISSION_DENIED_PATTERN)); } #[test] fn net_fetch_localhost() { let (_, err) = util::run_and_collect_output( true, "run --allow-net=localhost complex_permissions_test.ts netFetch http://localhost:4545/ http://localhost:4546/ http://localhost:4547/", None, None, true, ); assert!(!err.contains(util::PERMISSION_DENIED_PATTERN)); } #[test] fn net_connect_allow_localhost_ip_4555() { let (_, err) = util::run_and_collect_output( true, "run --allow-net=127.0.0.1:4545 complex_permissions_test.ts netConnect 127.0.0.1:4545", None, None, true, ); assert!(!err.contains(util::PERMISSION_DENIED_PATTERN)); } #[test] fn net_connect_allow_deno_land() { let (_, err) = util::run_and_collect_output( false, "run --allow-net=deno.land complex_permissions_test.ts netConnect 127.0.0.1:4546", None, None, true, ); assert!(err.contains(util::PERMISSION_DENIED_PATTERN)); } #[test] fn net_connect_allow_localhost_ip_4545_fail() { let (_, err) = util::run_and_collect_output( false, "run --allow-net=127.0.0.1:4545 complex_permissions_test.ts netConnect 127.0.0.1:4546", None, None, true, ); assert!(err.contains(util::PERMISSION_DENIED_PATTERN)); } #[test] fn net_connect_allow_localhost_ip() { let (_, err) = util::run_and_collect_output( true, "run --allow-net=127.0.0.1 complex_permissions_test.ts netConnect 127.0.0.1:4545 127.0.0.1:4546 127.0.0.1:4547", None, None, true, ); assert!(!err.contains(util::PERMISSION_DENIED_PATTERN)); } #[test] fn net_listen_allow_localhost_4555() { let (_, err) = util::run_and_collect_output( true, "run --allow-net=localhost:4558 complex_permissions_test.ts netListen localhost:4558", None, None, false, ); assert!(!err.contains(util::PERMISSION_DENIED_PATTERN)); } #[test] fn net_listen_allow_deno_land() { let (_, err) = util::run_and_collect_output( false, "run --allow-net=deno.land complex_permissions_test.ts netListen localhost:4545", None, None, false, ); assert!(err.contains(util::PERMISSION_DENIED_PATTERN)); } #[test] fn net_listen_allow_localhost_4555_fail() { let (_, err) = util::run_and_collect_output( false, "run --allow-net=localhost:4555 complex_permissions_test.ts netListen localhost:4556", None, None, false, ); assert!(err.contains(util::PERMISSION_DENIED_PATTERN)); } #[test] fn net_listen_allow_localhost() { // Port 4600 is chosen to not colide with those used by // target/debug/test_server let (_, err) = util::run_and_collect_output( true, "run --allow-net=localhost complex_permissions_test.ts netListen localhost:4600", None, None, false, ); assert!(!err.contains(util::PERMISSION_DENIED_PATTERN)); } #[test] fn _061_permissions_request() { let args = "run --quiet 061_permissions_request.ts"; use util::PtyData::*; util::test_pty2(args, vec![ Output("⚠️ ️Deno requests read access to \"foo\". Run again with --allow-read to bypass this prompt.\r\n Allow? [y/n (y = yes allow, n = no deny)] "), Input("y\n"), Output("⚠️ ️Deno requests read access to \"bar\". Run again with --allow-read to bypass this prompt.\r\n Allow? [y/n (y = yes allow, n = no deny)]"), Input("n\n"), Output("granted\r\n"), Output("prompt\r\n"), Output("denied\r\n"), ]); } #[test] fn _062_permissions_request_global() { let args = "run --quiet 062_permissions_request_global.ts"; use util::PtyData::*; util::test_pty2(args, vec![ Output("⚠️ ️Deno requests read access. Run again with --allow-read to bypass this prompt.\r\n Allow? [y/n (y = yes allow, n = no deny)] "), Input("y\n"), Output("PermissionStatus { state: \"granted\", onchange: null }\r\n"), Output("PermissionStatus { state: \"granted\", onchange: null }\r\n"), Output("PermissionStatus { state: \"granted\", onchange: null }\r\n"), ]); } itest!(_063_permissions_revoke { args: "run --allow-read=foo,bar 063_permissions_revoke.ts", output: "063_permissions_revoke.ts.out", }); itest!(_064_permissions_revoke_global { args: "run --allow-read=foo,bar 064_permissions_revoke_global.ts", output: "064_permissions_revoke_global.ts.out", }); #[test] fn _066_prompt() { let args = "run --quiet --unstable 066_prompt.ts"; use util::PtyData::*; util::test_pty2( args, vec![ Output("What is your name? [Jane Doe] "), Input("John Doe\n"), Output("Your name is John Doe.\r\n"), Output("What is your name? [Jane Doe] "), Input("\n"), Output("Your name is Jane Doe.\r\n"), Output("Prompt "), Input("foo\n"), Output("Your input is foo.\r\n"), Output("Question 0 [y/N] "), Input("Y\n"), Output("Your answer is true\r\n"), Output("Question 1 [y/N] "), Input("N\n"), Output("Your answer is false\r\n"), Output("Question 2 [y/N] "), Input("yes\n"), Output("Your answer is false\r\n"), Output("Confirm [y/N] "), Input("\n"), Output("Your answer is false\r\n"), Output("What is Windows EOL? "), Input("windows\n"), Output("Your answer is \"windows\"\r\n"), Output("Hi [Enter] "), Input("\n"), Output("Alert [Enter] "), Input("\n"), Output("The end of test\r\n"), Output("What is EOF? "), Input("\n"), Output("Your answer is null\r\n"), ], ); } itest!(dynamic_import_permissions_remote_remote { args: "run --quiet --reload --allow-net=localhost:4545 dynamic_import/permissions_remote_remote.ts", output: "dynamic_import/permissions_remote_remote.ts.out", http_server: true, exit_code: 1, }); itest!(dynamic_import_permissions_data_remote { args: "run --quiet --reload --allow-net=localhost:4545 dynamic_import/permissions_data_remote.ts", output: "dynamic_import/permissions_data_remote.ts.out", http_server: true, exit_code: 1, }); itest!(dynamic_import_permissions_blob_remote { args: "run --quiet --reload --allow-net=localhost:4545 dynamic_import/permissions_blob_remote.ts", output: "dynamic_import/permissions_blob_remote.ts.out", http_server: true, exit_code: 1, }); itest!(dynamic_import_permissions_data_local { args: "run --quiet --reload --allow-net=localhost:4545 dynamic_import/permissions_data_local.ts", output: "dynamic_import/permissions_data_local.ts.out", http_server: true, exit_code: 1, }); itest!(dynamic_import_permissions_blob_local { args: "run --quiet --reload --allow-net=localhost:4545 dynamic_import/permissions_blob_local.ts", output: "dynamic_import/permissions_blob_local.ts.out", http_server: true, exit_code: 1, }); } itest!(tls_starttls { args: "run --quiet --reload --allow-net --allow-read --unstable --cert tls/RootCA.pem tls_starttls.js", output: "tls.out", }); itest!(tls_connecttls { args: "run --quiet --reload --allow-net --allow-read --cert tls/RootCA.pem tls_connecttls.js", output: "tls.out", }); itest!(byte_order_mark { args: "run --no-check byte_order_mark.ts", output: "byte_order_mark.out", }); #[test] fn issue9750() { use util::PtyData::*; util::test_pty2( "run --prompt issue9750.js", vec![ Output("Enter 'yy':\r\n"), Input("yy\n"), Output("⚠️ ️Deno requests env access. Run again with --allow-env to bypass this prompt.\r\n Allow? [y/n (y = yes allow, n = no deny)]"), Input("n\n"), Output("⚠️ ️Deno requests env access to \"SECRET\". Run again with --allow-env to bypass this prompt.\r\n Allow? [y/n (y = yes allow, n = no deny)]"), Input("n\n"), Output("error: Uncaught (in promise) PermissionDenied: Requires env access to \"SECRET\", run again with the --allow-env flag\r\n"), ], ); } // Regression test for https://github.com/denoland/deno/issues/11451. itest!(dom_exception_formatting { args: "run dom_exception_formatting.ts", output: "dom_exception_formatting.ts.out", exit_code: 1, }); itest!(long_data_url_formatting { args: "run long_data_url_formatting.ts", output: "long_data_url_formatting.ts.out", exit_code: 1, }); itest!(eval_context_throw_with_conflicting_source { args: "run eval_context_throw_with_conflicting_source.ts", output: "eval_context_throw_with_conflicting_source.ts.out", exit_code: 1, }); itest!(eval_context_throw_dom_exception { args: "run eval_context_throw_dom_exception.js", output: "eval_context_throw_dom_exception.js.out", envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())], }); #[test] fn issue12453() { let _g = util::http_server(); let deno_dir = util::new_deno_dir(); let mut deno_cmd = util::deno_cmd_with_deno_dir(&deno_dir); let status = deno_cmd .current_dir(util::testdata_path()) .arg("run") .arg("--unstable") .arg("--allow-net") .arg("issue12453.js") .spawn() .unwrap() .wait() .unwrap(); assert!(status.success()); } /// Regression test for https://github.com/denoland/deno/issues/12740. #[test] fn issue12740() { let mod_dir = TempDir::new(); let mod1_path = mod_dir.path().join("mod1.ts"); let mod2_path = mod_dir.path().join("mod2.ts"); let mut deno_cmd = util::deno_cmd(); std::fs::write(&mod1_path, "").unwrap(); let status = deno_cmd .current_dir(util::testdata_path()) .arg("run") .arg(&mod1_path) .stderr(std::process::Stdio::null()) .stdout(std::process::Stdio::null()) .spawn() .unwrap() .wait() .unwrap(); assert!(status.success()); std::fs::write(&mod1_path, "export { foo } from \"./mod2.ts\";").unwrap(); std::fs::write(&mod2_path, "(").unwrap(); let status = deno_cmd .current_dir(util::testdata_path()) .arg("run") .arg(&mod1_path) .stderr(std::process::Stdio::null()) .stdout(std::process::Stdio::null()) .spawn() .unwrap() .wait() .unwrap(); assert!(!status.success()); } /// Regression test for https://github.com/denoland/deno/issues/12807. #[test] fn issue12807() { let mod_dir = TempDir::new(); let mod1_path = mod_dir.path().join("mod1.ts"); let mod2_path = mod_dir.path().join("mod2.ts"); let mut deno_cmd = util::deno_cmd(); // With a fresh `DENO_DIR`, run a module with a dependency and a type error. std::fs::write(&mod1_path, "import './mod2.ts'; Deno.exit('0');").unwrap(); std::fs::write(&mod2_path, "console.log('Hello, world!');").unwrap(); let status = deno_cmd .current_dir(util::testdata_path()) .arg("run") .arg(&mod1_path) .stderr(std::process::Stdio::null()) .stdout(std::process::Stdio::null()) .spawn() .unwrap() .wait() .unwrap(); assert!(!status.success()); // Fix the type error and run again. std::fs::write(&mod1_path, "import './mod2.ts'; Deno.exit(0);").unwrap(); let status = deno_cmd .current_dir(util::testdata_path()) .arg("run") .arg(&mod1_path) .stderr(std::process::Stdio::null()) .stdout(std::process::Stdio::null()) .spawn() .unwrap() .wait() .unwrap(); assert!(status.success()); } itest!(issue_13562 { args: "run issue13562.ts", output: "issue13562.ts.out", }); itest!(import_assertions_static_import { args: "run --allow-read import_assertions/static_import.ts", output: "import_assertions/static_import.out", }); itest!(import_assertions_static_export { args: "run --allow-read import_assertions/static_export.ts", output: "import_assertions/static_export.out", }); itest!(import_assertions_static_error { args: "run --allow-read import_assertions/static_error.ts", output: "import_assertions/static_error.out", exit_code: 1, }); itest!(import_assertions_dynamic_import { args: "run --allow-read import_assertions/dynamic_import.ts", output: "import_assertions/dynamic_import.out", }); itest!(import_assertions_dynamic_error { args: "run --allow-read import_assertions/dynamic_error.ts", output: "import_assertions/dynamic_error.out", exit_code: 1, }); itest!(import_assertions_type_check { args: "run --allow-read import_assertions/type_check.ts", output: "import_assertions/type_check.out", exit_code: 1, }); itest!(delete_window { args: "run delete_window.js", output_str: Some("true\n"), envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())], }); itest!(colors_without_global_this { args: "run colors_without_globalThis.js", output_str: Some("true\n"), envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())], }); itest!(config_auto_discovered_for_local_script { args: "run --quiet run/with_config/frontend_work.ts", output_str: Some("ok\n"), }); itest!(config_not_auto_discovered_for_remote_script { args: "run --quiet http://127.0.0.1:4545/run/with_config/server_side_work.ts", output_str: Some("ok\n"), http_server: true, }); itest!(wasm_streaming_panic_test { args: "run wasm_streaming_panic_test.js", output: "wasm_streaming_panic_test.js.out", exit_code: 1, envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())], }); // Regression test for https://github.com/denoland/deno/issues/13897. itest!(fetch_async_error_stack { args: "run --quiet -A fetch_async_error_stack.ts", output: "fetch_async_error_stack.ts.out", exit_code: 1, }); itest!(unstable_ffi_1 { args: "run unstable_ffi_1.js", output: "unstable_ffi_1.js.out", exit_code: 70, envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())], }); itest!(unstable_ffi_2 { args: "run unstable_ffi_2.js", output: "unstable_ffi_2.js.out", exit_code: 70, envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())], }); itest!(unstable_ffi_3 { args: "run unstable_ffi_3.js", output: "unstable_ffi_3.js.out", exit_code: 70, envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())], }); itest!(unstable_ffi_4 { args: "run unstable_ffi_4.js", output: "unstable_ffi_4.js.out", exit_code: 70, envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())], }); itest!(unstable_ffi_5 { args: "run unstable_ffi_5.js", output: "unstable_ffi_5.js.out", exit_code: 70, envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())], }); itest!(unstable_ffi_6 { args: "run unstable_ffi_6.js", output: "unstable_ffi_6.js.out", exit_code: 70, envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())], }); itest!(unstable_ffi_7 { args: "run unstable_ffi_7.js", output: "unstable_ffi_7.js.out", exit_code: 70, envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())], }); itest!(unstable_ffi_8 { args: "run unstable_ffi_8.js", output: "unstable_ffi_8.js.out", exit_code: 70, envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())], }); itest!(unstable_ffi_9 { args: "run unstable_ffi_9.js", output: "unstable_ffi_9.js.out", exit_code: 70, envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())], }); itest!(unstable_ffi_10 { args: "run unstable_ffi_10.js", output: "unstable_ffi_10.js.out", exit_code: 70, envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())], }); itest!(unstable_ffi_11 { args: "run unstable_ffi_11.js", output: "unstable_ffi_11.js.out", exit_code: 70, envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())], }); itest!(unstable_ffi_12 { args: "run unstable_ffi_12.js", output: "unstable_ffi_12.js.out", exit_code: 70, envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())], }); itest!(unstable_ffi_13 { args: "run unstable_ffi_13.js", output: "unstable_ffi_13.js.out", exit_code: 70, envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())], }); itest!(unstable_ffi_14 { args: "run unstable_ffi_14.js", output: "unstable_ffi_14.js.out", exit_code: 70, envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())], }); itest!(unstable_ffi_15 { args: "run unstable_ffi_15.js", output: "unstable_ffi_15.js.out", exit_code: 70, envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())], }); itest!(future_check1 { args: "run future_check.ts", output: "future_check1.out", }); itest!(future_check2 { args: "run --check future_check.ts", output: "future_check2.out", envs: vec![("DENO_FUTURE_CHECK".to_string(), "1".to_string())], }); itest!(event_listener_error { args: "run --quiet event_listener_error.ts", output: "event_listener_error.ts.out", exit_code: 1, }); itest!(event_listener_error_handled { args: "run --quiet event_listener_error_handled.ts", output: "event_listener_error_handled.ts.out", }); // https://github.com/denoland/deno/pull/14159#issuecomment-1092285446 itest!(event_listener_error_immediate_exit { args: "run --quiet event_listener_error_immediate_exit.ts", output: "event_listener_error_immediate_exit.ts.out", exit_code: 1, }); itest!(set_timeout_error { args: "run --quiet set_timeout_error.ts", output: "set_timeout_error.ts.out", exit_code: 1, }); itest!(set_timeout_error_handled { args: "run --quiet set_timeout_error_handled.ts", output: "set_timeout_error_handled.ts.out", }); itest!(aggregate_error { args: "run --quiet aggregate_error.ts", output: "aggregate_error.out", exit_code: 1, }); itest!(complex_error { args: "run --quiet complex_error.ts", output: "complex_error.ts.out", exit_code: 1, }); // Regression test for https://github.com/denoland/deno/issues/12143. itest!(js_root_with_ts_check { args: "run --quiet js_root_with_ts_check.js", output: "js_root_with_ts_check.js.out", exit_code: 1, }); itest!(no_prompt_flag { args: "run --quiet --unstable --no-prompt no_prompt.ts", output_str: Some(""), }); #[test] fn deno_no_prompt_environment_variable() { let output = util::deno_cmd() .current_dir(util::testdata_path()) .arg("run") .arg("--unstable") .arg("no_prompt.ts") .env("DENO_NO_PROMPT", "1") .spawn() .unwrap() .wait_with_output() .unwrap(); assert!(output.status.success()); } itest!(report_error { args: "run --quiet report_error.ts", output: "report_error.ts.out", exit_code: 1, }); itest!(report_error_handled { args: "run --quiet report_error_handled.ts", output: "report_error_handled.ts.out", }); itest!(spawn_stdout_inherit { args: "run --quiet --unstable -A spawn_stdout_inherit.ts", output: "spawn_stdout_inherit.ts.out", });