1
0
Fork 0
mirror of https://github.com/denoland/deno.git synced 2024-12-01 16:51:13 -05:00
denoland-deno/runtime
ctrl+d 38b618ce35
fix(runtime/ops): Fix watchfs remove event (#27041)
Fix related to #26906. 
Currently, if a file is removed, no event is emitted because the file
path no longer exists. As a result, [this
check](12b377247b/runtime/ops/fs_events.rs (L149))
returns false.

With this PR, an additional check is introduced to verify if the file
exists. If the file does not exist, a custom "remove" event is emitted.
This change is necessary because, based on tests conducted on macOS and
Linux (Ubuntu 24.04.1 LTS), Linux emits a "rename" event instead of a
"remove" event when a file is deleted. Introducing a dedicated "remove"
event ensures consistent and clearer behavior across platforms.
2024-11-25 21:08:52 +05:30
..
examples/extension feat(ext/fetch): allow embedders to use hickory_dns_resolver instead of default GaiResolver (#26740) 2024-11-15 11:44:11 +01:00
js feat(unstable): Instrument fetch (#27057) 2024-11-25 16:38:07 +01:00
ops fix(runtime/ops): Fix watchfs remove event (#27041) 2024-11-25 21:08:52 +05:30
permissions chore: forward v2.1.1 release commit to main (#26981) 2024-11-21 14:35:32 -05:00
Cargo.toml chore: forward v2.1.1 release commit to main (#26981) 2024-11-21 14:35:32 -05:00
clippy.toml fix: otel resiliency (#26857) 2024-11-14 12:16:28 +00:00
code_cache.rs perf(compile): code cache (#26528) 2024-11-18 20:09:28 +00:00
errors.rs refactor: use boxed_error in some places (#26887) 2024-11-15 23:22:50 -05:00
fmt_errors.rs feat(cli): add --unstable-node-globals flag (#26617) 2024-11-14 13:11:29 +00:00
fs_util.rs refactor: use deno_path_util (#25918) 2024-09-28 07:55:01 -04:00
inspector_server.rs fix: clamp smi in fast calls by default (#26506) 2024-10-31 10:10:07 +05:30
js.rs refactor: remove snapshotting from deno_runtime (#21794) 2024-01-10 16:30:50 +01:00
lib.rs perf: use available system memory for v8 isolate memory limit (#26868) 2024-11-15 10:33:03 +01:00
permissions.rs refactor(runtime/permissions): use concrete error types (#26464) 2024-11-04 09:17:21 -08:00
README.md fix (doc): Typo in runtime/README.md (#20020) 2023-12-13 17:24:32 +00:00
shared.rs feat(runtime): remove public OTEL trace API (#26854) 2024-11-18 23:55:22 +00:00
snapshot.rs feat(ext/http): Make http server parameters configurable (#26785) 2024-11-18 17:46:24 -08:00
sys_info.rs perf: use available system memory for v8 isolate memory limit (#26868) 2024-11-15 10:33:03 +01:00
tokio_util.rs fix(cli): increase size of blocking task threadpool on windows (#26465) 2024-10-22 12:52:18 -07:00
web_worker.rs feat: permission stack traces in ops (#26938) 2024-11-20 21:24:04 +00:00
worker.rs feat: permission stack traces in ops (#26938) 2024-11-20 21:24:04 +00:00
worker_bootstrap.rs fix: otel resiliency (#26857) 2024-11-14 12:16:28 +00:00

deno_runtime crate

crates docs

This is a slim version of the Deno CLI which removes typescript integration and various tooling (like lint and doc). Basically only JavaScript execution with Deno's operating system bindings (ops).

Stability

This crate is built using battle-tested modules that were originally in the deno crate, however the API of this crate is subject to rapid and breaking changes.

MainWorker

The main API of this crate is MainWorker. MainWorker is a structure encapsulating deno_core::JsRuntime with a set of ops used to implement Deno namespace.

When creating a MainWorker implementors must call MainWorker::bootstrap to prepare JS runtime for use.

MainWorker is highly configurable and allows to customize many of the runtime's properties:

  • module loading implementation
  • error formatting
  • support for source maps
  • support for V8 inspector and Chrome Devtools debugger
  • HTTP client user agent, CA certificate
  • random number generator seed

Worker Web API

deno_runtime comes with support for Worker Web API. The Worker API is implemented using WebWorker structure.

When creating a new instance of MainWorker implementors must provide a callback function that is used when creating a new instance of Worker.

All WebWorker instances are descendents of MainWorker which is responsible for setting up communication with child worker. Each WebWorker spawns a new OS thread that is dedicated solely to that worker.