mirror of
https://github.com/denoland/deno.git
synced 2024-12-28 01:59:06 -05:00
84 lines
2.3 KiB
Rust
84 lines
2.3 KiB
Rust
use crate::tools::test::TestEvent;
|
|
use deno_core::error::generic_error;
|
|
use deno_core::error::AnyError;
|
|
use deno_core::JsRuntime;
|
|
use deno_core::ModuleSpecifier;
|
|
use deno_core::OpState;
|
|
use deno_runtime::permissions::create_child_permissions;
|
|
use deno_runtime::permissions::ChildPermissionsArg;
|
|
use deno_runtime::permissions::Permissions;
|
|
use std::sync::mpsc::Sender;
|
|
use uuid::Uuid;
|
|
|
|
pub fn init(rt: &mut JsRuntime) {
|
|
super::reg_sync(rt, "op_pledge_test_permissions", op_pledge_test_permissions);
|
|
super::reg_sync(
|
|
rt,
|
|
"op_restore_test_permissions",
|
|
op_restore_test_permissions,
|
|
);
|
|
super::reg_sync(rt, "op_get_test_origin", op_get_test_origin);
|
|
super::reg_sync(rt, "op_dispatch_test_event", op_dispatch_test_event);
|
|
}
|
|
|
|
#[derive(Clone)]
|
|
struct PermissionsHolder(Uuid, Permissions);
|
|
|
|
pub fn op_pledge_test_permissions(
|
|
state: &mut OpState,
|
|
args: ChildPermissionsArg,
|
|
_: (),
|
|
) -> Result<Uuid, AnyError> {
|
|
deno_runtime::ops::check_unstable(state, "Deno.test.permissions");
|
|
|
|
let token = Uuid::new_v4();
|
|
let parent_permissions = state.borrow_mut::<Permissions>();
|
|
let worker_permissions = create_child_permissions(parent_permissions, args)?;
|
|
let parent_permissions = parent_permissions.clone();
|
|
|
|
state.put::<PermissionsHolder>(PermissionsHolder(token, parent_permissions));
|
|
|
|
// NOTE: This call overrides current permission set for the worker
|
|
state.put::<Permissions>(worker_permissions);
|
|
|
|
Ok(token)
|
|
}
|
|
|
|
pub fn op_restore_test_permissions(
|
|
state: &mut OpState,
|
|
token: Uuid,
|
|
_: (),
|
|
) -> Result<(), AnyError> {
|
|
deno_runtime::ops::check_unstable(state, "Deno.test.permissions");
|
|
|
|
if let Some(permissions_holder) = state.try_take::<PermissionsHolder>() {
|
|
if token != permissions_holder.0 {
|
|
panic!("restore test permissions token does not match the stored token");
|
|
}
|
|
|
|
let permissions = permissions_holder.1;
|
|
state.put::<Permissions>(permissions);
|
|
Ok(())
|
|
} else {
|
|
Err(generic_error("no permissions to restore"))
|
|
}
|
|
}
|
|
|
|
fn op_get_test_origin(
|
|
state: &mut OpState,
|
|
_: (),
|
|
_: (),
|
|
) -> Result<String, AnyError> {
|
|
Ok(state.borrow::<ModuleSpecifier>().to_string())
|
|
}
|
|
|
|
fn op_dispatch_test_event(
|
|
state: &mut OpState,
|
|
event: TestEvent,
|
|
_: (),
|
|
) -> Result<(), AnyError> {
|
|
let sender = state.borrow::<Sender<TestEvent>>().clone();
|
|
sender.send(event).ok();
|
|
|
|
Ok(())
|
|
}
|