// Copyright 2018-2019 the Deno authors. All rights reserved. MIT license. use crate::deno_dir; use crate::errors::DenoResult; use crate::flags; use crate::global_timer::GlobalTimer; use crate::modules::Modules; use crate::permissions::DenoPermissions; use deno_core::Buf; use futures::sync::mpsc as async_mpsc; use std; use std::env; use std::sync::atomic::{AtomicUsize, Ordering}; use std::sync::Arc; use std::sync::Mutex; pub type WorkerSender = async_mpsc::Sender; pub type WorkerReceiver = async_mpsc::Receiver; pub type WorkerChannels = (WorkerSender, WorkerReceiver); // AtomicU64 is currently unstable #[derive(Default)] pub struct Metrics { pub ops_dispatched: AtomicUsize, pub ops_completed: AtomicUsize, pub bytes_sent_control: AtomicUsize, pub bytes_sent_data: AtomicUsize, pub bytes_received: AtomicUsize, pub resolve_count: AtomicUsize, } // Isolate cannot be passed between threads but IsolateState can. // IsolateState satisfies Send and Sync. // So any state that needs to be accessed outside the main V8 thread should be // inside IsolateState. #[cfg_attr(feature = "cargo-clippy", allow(stutter))] pub struct IsolateState { pub dir: deno_dir::DenoDir, pub argv: Vec, pub permissions: DenoPermissions, pub flags: flags::DenoFlags, pub metrics: Metrics, pub modules: Mutex, pub worker_channels: Option>, pub global_timer: Mutex, } impl IsolateState { pub fn new( flags: flags::DenoFlags, argv_rest: Vec, worker_channels: Option, ) -> Self { let custom_root = env::var("DENO_DIR").map(|s| s.into()).ok(); Self { dir: deno_dir::DenoDir::new(flags.reload, flags.recompile, custom_root) .unwrap(), argv: argv_rest, permissions: DenoPermissions::from_flags(&flags), flags, metrics: Metrics::default(), modules: Mutex::new(Modules::new()), worker_channels: worker_channels.map(Mutex::new), global_timer: Mutex::new(GlobalTimer::new()), } } pub fn main_module(&self) -> Option { if self.argv.len() <= 1 { None } else { let specifier = self.argv[1].clone(); let referrer = "."; match self.dir.resolve_module_url(&specifier, referrer) { Ok(url) => Some(url.to_string()), Err(e) => { debug!("Potentially swallowed error {}", e); None } } } } #[inline] pub fn check_read(&self, filename: &str) -> DenoResult<()> { self.permissions.check_read(filename) } #[inline] pub fn check_write(&self, filename: &str) -> DenoResult<()> { self.permissions.check_write(filename) } #[inline] pub fn check_env(&self) -> DenoResult<()> { self.permissions.check_env() } #[inline] pub fn check_net(&self, filename: &str) -> DenoResult<()> { self.permissions.check_net(filename) } #[inline] pub fn check_run(&self) -> DenoResult<()> { self.permissions.check_run() } #[cfg(test)] pub fn mock() -> IsolateState { let argv = vec![String::from("./deno"), String::from("hello.js")]; // For debugging: argv.push_back(String::from("-D")); let (flags, rest_argv, _) = flags::set_flags(argv).unwrap(); IsolateState::new(flags, rest_argv, None) } pub fn metrics_op_dispatched( &self, bytes_sent_control: usize, bytes_sent_data: usize, ) { self.metrics.ops_dispatched.fetch_add(1, Ordering::SeqCst); self .metrics .bytes_sent_control .fetch_add(bytes_sent_control, Ordering::SeqCst); self .metrics .bytes_sent_data .fetch_add(bytes_sent_data, Ordering::SeqCst); } pub fn metrics_op_completed(&self, bytes_received: usize) { self.metrics.ops_completed.fetch_add(1, Ordering::SeqCst); self .metrics .bytes_received .fetch_add(bytes_received, Ordering::SeqCst); } } /// Provides state getter function pub trait IsolateStateContainer { fn state(&self) -> Arc; }