mirror of
https://github.com/denoland/deno.git
synced 2024-11-30 16:40:57 -05:00
d5634164cb
Closes https://github.com/denoland/deno/issues/2699 Closes https://github.com/denoland/deno/issues/2347 Uses unstable rustfmt features. Since dprint invokes `rustfmt` we do not need to switch the cargo toolchain to nightly. Do we care about formatting stability of our codebase across Rust versions? (I don't)
96 lines
3 KiB
Rust
96 lines
3 KiB
Rust
// Copyright 2018-2023 the Deno authors. All rights reserved. MIT license.
|
|
|
|
use crate::permissions::PermissionsContainer;
|
|
use deno_core::anyhow::Context;
|
|
use deno_core::error::AnyError;
|
|
use deno_core::op;
|
|
use deno_core::Extension;
|
|
use deno_core::ModuleSpecifier;
|
|
use deno_core::OpState;
|
|
|
|
pub fn init(main_module: ModuleSpecifier) -> Extension {
|
|
Extension::builder("deno_runtime")
|
|
.ops(vec![op_main_module::decl()])
|
|
.state(move |state| {
|
|
state.put::<ModuleSpecifier>(main_module.clone());
|
|
Ok(())
|
|
})
|
|
.build()
|
|
}
|
|
|
|
#[op]
|
|
fn op_main_module(state: &mut OpState) -> Result<String, AnyError> {
|
|
let main = state.borrow::<ModuleSpecifier>().to_string();
|
|
let main_url = deno_core::resolve_url_or_path(&main)?;
|
|
if main_url.scheme() == "file" {
|
|
let main_path = std::env::current_dir()
|
|
.context("Failed to get current working directory")?
|
|
.join(main_url.to_string());
|
|
state
|
|
.borrow_mut::<PermissionsContainer>()
|
|
.check_read_blind(&main_path, "main_module", "Deno.mainModule")?;
|
|
}
|
|
Ok(main)
|
|
}
|
|
|
|
pub fn ppid() -> i64 {
|
|
#[cfg(windows)]
|
|
{
|
|
// Adopted from rustup:
|
|
// https://github.com/rust-lang/rustup/blob/1.21.1/src/cli/self_update.rs#L1036
|
|
// Copyright Diggory Blake, the Mozilla Corporation, and rustup contributors.
|
|
// Licensed under either of
|
|
// - Apache License, Version 2.0
|
|
// - MIT license
|
|
use std::mem;
|
|
use winapi::shared::minwindef::DWORD;
|
|
use winapi::um::handleapi::CloseHandle;
|
|
use winapi::um::handleapi::INVALID_HANDLE_VALUE;
|
|
use winapi::um::processthreadsapi::GetCurrentProcessId;
|
|
use winapi::um::tlhelp32::CreateToolhelp32Snapshot;
|
|
use winapi::um::tlhelp32::Process32First;
|
|
use winapi::um::tlhelp32::Process32Next;
|
|
use winapi::um::tlhelp32::PROCESSENTRY32;
|
|
use winapi::um::tlhelp32::TH32CS_SNAPPROCESS;
|
|
// SAFETY: winapi calls
|
|
unsafe {
|
|
// Take a snapshot of system processes, one of which is ours
|
|
// and contains our parent's pid
|
|
let snapshot = CreateToolhelp32Snapshot(TH32CS_SNAPPROCESS, 0);
|
|
if snapshot == INVALID_HANDLE_VALUE {
|
|
return -1;
|
|
}
|
|
|
|
let mut entry: PROCESSENTRY32 = mem::zeroed();
|
|
entry.dwSize = mem::size_of::<PROCESSENTRY32>() as DWORD;
|
|
|
|
// Iterate over system processes looking for ours
|
|
let success = Process32First(snapshot, &mut entry);
|
|
if success == 0 {
|
|
CloseHandle(snapshot);
|
|
return -1;
|
|
}
|
|
|
|
let this_pid = GetCurrentProcessId();
|
|
while entry.th32ProcessID != this_pid {
|
|
let success = Process32Next(snapshot, &mut entry);
|
|
if success == 0 {
|
|
CloseHandle(snapshot);
|
|
return -1;
|
|
}
|
|
}
|
|
CloseHandle(snapshot);
|
|
|
|
// FIXME: Using the process ID exposes a race condition
|
|
// wherein the parent process already exited and the OS
|
|
// reassigned its ID.
|
|
let parent_id = entry.th32ParentProcessID;
|
|
parent_id.into()
|
|
}
|
|
}
|
|
#[cfg(not(windows))]
|
|
{
|
|
use std::os::unix::process::parent_id;
|
|
parent_id().into()
|
|
}
|
|
}
|