mirror of
https://github.com/denoland/deno.git
synced 2024-11-23 15:16:54 -05:00
046cccfe17
Deno.core.dispatch() used to push the "control" buf onto the shared array buffer before calling into V8, with the idea that it was one less argument to parse. Turns out there is no more overhead passing the control ArrayBuffer directly over. Furthermore this optimization was making the refactors outlined in #2730 more complex. Therefore it is being removed.
1168 lines
34 KiB
Rust
1168 lines
34 KiB
Rust
// Copyright 2018 the Deno authors. All rights reserved. MIT license.
|
|
|
|
// Do not add dependenies to modules.rs. it should remain decoupled from the
|
|
// isolate to keep the Isolate struct from becoming too bloating for users who
|
|
// do not need asynchronous module loading.
|
|
|
|
use crate::any_error::ErrBox;
|
|
use crate::js_errors::CoreJSError;
|
|
use crate::js_errors::V8Exception;
|
|
use crate::libdeno;
|
|
use crate::libdeno::deno_buf;
|
|
use crate::libdeno::deno_dyn_import_id;
|
|
use crate::libdeno::deno_mod;
|
|
use crate::libdeno::deno_pinned_buf;
|
|
use crate::libdeno::PinnedBuf;
|
|
use crate::libdeno::Snapshot1;
|
|
use crate::libdeno::Snapshot2;
|
|
use crate::shared_queue::SharedQueue;
|
|
use crate::shared_queue::RECOMMENDED_SIZE;
|
|
use futures::stream::{FuturesUnordered, Stream};
|
|
use futures::task;
|
|
use futures::Async::*;
|
|
use futures::Future;
|
|
use futures::Poll;
|
|
use libc::c_char;
|
|
use libc::c_void;
|
|
use std::ffi::CStr;
|
|
use std::ffi::CString;
|
|
use std::ptr::null;
|
|
use std::sync::{Arc, Mutex, Once};
|
|
|
|
pub type Buf = Box<[u8]>;
|
|
|
|
pub type OpAsyncFuture<E> = Box<dyn Future<Item = Buf, Error = E> + Send>;
|
|
|
|
pub enum Op<E> {
|
|
Sync(Buf),
|
|
Async(OpAsyncFuture<E>),
|
|
}
|
|
|
|
pub type CoreError = ();
|
|
|
|
type CoreOpAsyncFuture = OpAsyncFuture<CoreError>;
|
|
|
|
pub type CoreOp = Op<CoreError>;
|
|
|
|
/// Stores a script used to initalize a Isolate
|
|
pub struct Script<'a> {
|
|
pub source: &'a str,
|
|
pub filename: &'a str,
|
|
}
|
|
|
|
// TODO(ry) It's ugly that we have both Script and OwnedScript. Ideally we
|
|
// wouldn't expose such twiddly complexity.
|
|
struct OwnedScript {
|
|
pub source: String,
|
|
pub filename: String,
|
|
}
|
|
|
|
impl From<Script<'_>> for OwnedScript {
|
|
fn from(s: Script) -> OwnedScript {
|
|
OwnedScript {
|
|
source: s.source.to_string(),
|
|
filename: s.filename.to_string(),
|
|
}
|
|
}
|
|
}
|
|
|
|
/// Represents data used to initialize isolate at startup
|
|
/// either a binary snapshot or a javascript source file
|
|
/// in the form of the StartupScript struct.
|
|
pub enum StartupData<'a> {
|
|
Script(Script<'a>),
|
|
Snapshot(&'a [u8]),
|
|
LibdenoSnapshot(Snapshot1<'a>),
|
|
None,
|
|
}
|
|
|
|
pub type OpResult<E> = Result<Op<E>, E>;
|
|
|
|
type CoreDispatchFn = dyn Fn(&[u8], Option<PinnedBuf>) -> CoreOp;
|
|
|
|
pub type DynImportFuture =
|
|
Box<dyn Future<Item = deno_mod, Error = ErrBox> + Send>;
|
|
type DynImportFn = dyn Fn(&str, &str) -> DynImportFuture;
|
|
|
|
type JSErrorCreateFn = dyn Fn(V8Exception) -> ErrBox;
|
|
|
|
/// Wraps DynImportFuture to include the deno_dyn_import_id, so that it doesn't
|
|
/// need to be exposed.
|
|
struct DynImport {
|
|
id: deno_dyn_import_id,
|
|
inner: DynImportFuture,
|
|
}
|
|
|
|
impl Future for DynImport {
|
|
type Item = (deno_dyn_import_id, deno_mod);
|
|
type Error = (deno_mod, ErrBox);
|
|
fn poll(&mut self) -> Poll<Self::Item, Self::Error> {
|
|
match self.inner.poll() {
|
|
Ok(Ready(mod_id)) => Ok(Ready((self.id, mod_id))),
|
|
Ok(NotReady) => Ok(NotReady),
|
|
Err(e) => Err((self.id, e)),
|
|
}
|
|
}
|
|
}
|
|
|
|
/// A single execution context of JavaScript. Corresponds roughly to the "Web
|
|
/// Worker" concept in the DOM. An Isolate is a Future that can be used with
|
|
/// Tokio. The Isolate future complete when there is an error or when all
|
|
/// pending ops have completed.
|
|
///
|
|
/// Ops are created in JavaScript by calling Deno.core.dispatch(), and in Rust
|
|
/// by implementing deno::Dispatch::dispatch. An async Op corresponds exactly to
|
|
/// a Promise in JavaScript.
|
|
pub struct Isolate {
|
|
libdeno_isolate: *const libdeno::isolate,
|
|
shared_libdeno_isolate: Arc<Mutex<Option<*const libdeno::isolate>>>,
|
|
dispatch: Option<Arc<CoreDispatchFn>>,
|
|
dyn_import: Option<Arc<DynImportFn>>,
|
|
js_error_create: Arc<JSErrorCreateFn>,
|
|
needs_init: bool,
|
|
shared: SharedQueue,
|
|
pending_ops: FuturesUnordered<CoreOpAsyncFuture>,
|
|
pending_dyn_imports: FuturesUnordered<DynImport>,
|
|
have_unpolled_ops: bool,
|
|
startup_script: Option<OwnedScript>,
|
|
}
|
|
|
|
unsafe impl Send for Isolate {}
|
|
|
|
impl Drop for Isolate {
|
|
fn drop(&mut self) {
|
|
// remove shared_libdeno_isolate reference
|
|
*self.shared_libdeno_isolate.lock().unwrap() = None;
|
|
|
|
unsafe { libdeno::deno_delete(self.libdeno_isolate) }
|
|
}
|
|
}
|
|
|
|
static DENO_INIT: Once = Once::new();
|
|
|
|
impl Isolate {
|
|
/// startup_data defines the snapshot or script used at startup to initialize
|
|
/// the isolate.
|
|
pub fn new(startup_data: StartupData, will_snapshot: bool) -> Self {
|
|
DENO_INIT.call_once(|| {
|
|
unsafe { libdeno::deno_init() };
|
|
});
|
|
|
|
let shared = SharedQueue::new(RECOMMENDED_SIZE);
|
|
|
|
let needs_init = true;
|
|
|
|
let mut libdeno_config = libdeno::deno_config {
|
|
will_snapshot: will_snapshot.into(),
|
|
load_snapshot: Snapshot2::empty(),
|
|
shared: shared.as_deno_buf(),
|
|
recv_cb: Self::pre_dispatch,
|
|
dyn_import_cb: Self::dyn_import,
|
|
};
|
|
|
|
let mut startup_script: Option<OwnedScript> = None;
|
|
|
|
// Separate into Option values for each startup type
|
|
match startup_data {
|
|
StartupData::Script(d) => {
|
|
startup_script = Some(d.into());
|
|
}
|
|
StartupData::Snapshot(d) => {
|
|
libdeno_config.load_snapshot = d.into();
|
|
}
|
|
StartupData::LibdenoSnapshot(d) => {
|
|
libdeno_config.load_snapshot = d;
|
|
}
|
|
StartupData::None => {}
|
|
};
|
|
|
|
let libdeno_isolate = unsafe { libdeno::deno_new(libdeno_config) };
|
|
|
|
Self {
|
|
libdeno_isolate,
|
|
shared_libdeno_isolate: Arc::new(Mutex::new(Some(libdeno_isolate))),
|
|
dispatch: None,
|
|
dyn_import: None,
|
|
js_error_create: Arc::new(CoreJSError::from_v8_exception),
|
|
shared,
|
|
needs_init,
|
|
pending_ops: FuturesUnordered::new(),
|
|
have_unpolled_ops: false,
|
|
pending_dyn_imports: FuturesUnordered::new(),
|
|
startup_script,
|
|
}
|
|
}
|
|
|
|
/// Defines the how Deno.core.dispatch() acts.
|
|
/// Called whenever Deno.core.dispatch() is called in JavaScript. zero_copy_buf
|
|
/// corresponds to the second argument of Deno.core.dispatch().
|
|
pub fn set_dispatch<F>(&mut self, f: F)
|
|
where
|
|
F: Fn(&[u8], Option<PinnedBuf>) -> CoreOp + Send + Sync + 'static,
|
|
{
|
|
self.dispatch = Some(Arc::new(f));
|
|
}
|
|
|
|
pub fn set_dyn_import<F>(&mut self, f: F)
|
|
where
|
|
F: Fn(&str, &str) -> DynImportFuture + Send + Sync + 'static,
|
|
{
|
|
self.dyn_import = Some(Arc::new(f));
|
|
}
|
|
|
|
/// Allows a callback to be set whenever a V8 exception is made. This allows
|
|
/// the caller to wrap the V8Exception into an error. By default this callback
|
|
/// is set to CoreJSError::from_v8_exception.
|
|
pub fn set_js_error_create<F>(&mut self, f: F)
|
|
where
|
|
F: Fn(V8Exception) -> ErrBox + 'static,
|
|
{
|
|
self.js_error_create = Arc::new(f);
|
|
}
|
|
|
|
/// Get a thread safe handle on the isolate.
|
|
pub fn shared_isolate_handle(&mut self) -> IsolateHandle {
|
|
IsolateHandle {
|
|
shared_libdeno_isolate: self.shared_libdeno_isolate.clone(),
|
|
}
|
|
}
|
|
|
|
/// Executes a bit of built-in JavaScript to provide Deno.sharedQueue.
|
|
fn shared_init(&mut self) {
|
|
if self.needs_init {
|
|
self.needs_init = false;
|
|
js_check(
|
|
self.execute("shared_queue.js", include_str!("shared_queue.js")),
|
|
);
|
|
// Maybe execute the startup script.
|
|
if let Some(s) = self.startup_script.take() {
|
|
self.execute(&s.filename, &s.source).unwrap()
|
|
}
|
|
}
|
|
}
|
|
|
|
extern "C" fn dyn_import(
|
|
user_data: *mut c_void,
|
|
specifier: *const c_char,
|
|
referrer: *const c_char,
|
|
id: deno_dyn_import_id,
|
|
) {
|
|
assert_ne!(user_data, std::ptr::null_mut());
|
|
let isolate = unsafe { Isolate::from_raw_ptr(user_data) };
|
|
let specifier = unsafe { CStr::from_ptr(specifier).to_str().unwrap() };
|
|
let referrer = unsafe { CStr::from_ptr(referrer).to_str().unwrap() };
|
|
debug!("dyn_import specifier {} referrer {} ", specifier, referrer);
|
|
|
|
if let Some(ref f) = isolate.dyn_import {
|
|
let inner = f(specifier, referrer);
|
|
let fut = DynImport { inner, id };
|
|
task::current().notify();
|
|
isolate.pending_dyn_imports.push(fut);
|
|
} else {
|
|
panic!("dyn_import callback not set")
|
|
}
|
|
}
|
|
|
|
extern "C" fn pre_dispatch(
|
|
user_data: *mut c_void,
|
|
control_argv0: deno_buf,
|
|
zero_copy_buf: deno_pinned_buf,
|
|
) {
|
|
let isolate = unsafe { Isolate::from_raw_ptr(user_data) };
|
|
|
|
let op = if let Some(ref f) = isolate.dispatch {
|
|
f(control_argv0.as_ref(), PinnedBuf::new(zero_copy_buf))
|
|
} else {
|
|
panic!("isolate.dispatch not set")
|
|
};
|
|
|
|
debug_assert_eq!(isolate.shared.size(), 0);
|
|
match op {
|
|
Op::Sync(buf) => {
|
|
// For sync messages, we always return the response via Deno.core.send's
|
|
// return value.
|
|
// TODO(ry) check that if JSError thrown during respond(), that it will be
|
|
// picked up.
|
|
let _ = isolate.respond(Some(&buf));
|
|
}
|
|
Op::Async(fut) => {
|
|
isolate.pending_ops.push(fut);
|
|
isolate.have_unpolled_ops = true;
|
|
}
|
|
}
|
|
}
|
|
|
|
#[inline]
|
|
unsafe fn from_raw_ptr<'a>(ptr: *const c_void) -> &'a mut Self {
|
|
let ptr = ptr as *mut _;
|
|
&mut *ptr
|
|
}
|
|
|
|
#[inline]
|
|
fn as_raw_ptr(&self) -> *const c_void {
|
|
self as *const _ as *const c_void
|
|
}
|
|
|
|
/// Executes traditional JavaScript code (traditional = not ES modules)
|
|
///
|
|
/// ErrBox can be downcast to a type that exposes additional information about
|
|
/// the V8 exception. By default this type is CoreJSError, however it may be a
|
|
/// different type if Isolate::set_js_error_create() has been used.
|
|
pub fn execute(
|
|
&mut self,
|
|
js_filename: &str,
|
|
js_source: &str,
|
|
) -> Result<(), ErrBox> {
|
|
self.shared_init();
|
|
let filename = CString::new(js_filename).unwrap();
|
|
let source = CString::new(js_source).unwrap();
|
|
unsafe {
|
|
libdeno::deno_execute(
|
|
self.libdeno_isolate,
|
|
self.as_raw_ptr(),
|
|
filename.as_ptr(),
|
|
source.as_ptr(),
|
|
)
|
|
};
|
|
self.check_last_exception()
|
|
}
|
|
|
|
fn check_last_exception(&self) -> Result<(), ErrBox> {
|
|
let ptr = unsafe { libdeno::deno_last_exception(self.libdeno_isolate) };
|
|
if ptr.is_null() {
|
|
Ok(())
|
|
} else {
|
|
let js_error_create = &*self.js_error_create;
|
|
let cstr = unsafe { CStr::from_ptr(ptr) };
|
|
let json_str = cstr.to_str().unwrap();
|
|
let v8_exception = V8Exception::from_json(json_str).unwrap();
|
|
let js_error = js_error_create(v8_exception);
|
|
Err(js_error)
|
|
}
|
|
}
|
|
|
|
fn check_promise_errors(&self) {
|
|
unsafe {
|
|
libdeno::deno_check_promise_errors(self.libdeno_isolate);
|
|
}
|
|
}
|
|
|
|
fn respond(&mut self, maybe_buf: Option<&[u8]>) -> Result<(), ErrBox> {
|
|
let buf = match maybe_buf {
|
|
None => deno_buf::empty(),
|
|
Some(r) => deno_buf::from(r),
|
|
};
|
|
unsafe {
|
|
libdeno::deno_respond(self.libdeno_isolate, self.as_raw_ptr(), buf)
|
|
}
|
|
self.check_last_exception()
|
|
}
|
|
|
|
/// Low-level module creation.
|
|
pub fn mod_new(
|
|
&self,
|
|
main: bool,
|
|
name: &str,
|
|
source: &str,
|
|
) -> Result<deno_mod, ErrBox> {
|
|
let name_ = CString::new(name.to_string()).unwrap();
|
|
let name_ptr = name_.as_ptr() as *const libc::c_char;
|
|
|
|
let source_ = CString::new(source.to_string()).unwrap();
|
|
let source_ptr = source_.as_ptr() as *const libc::c_char;
|
|
|
|
let id = unsafe {
|
|
libdeno::deno_mod_new(self.libdeno_isolate, main, name_ptr, source_ptr)
|
|
};
|
|
|
|
self.check_last_exception().map(|_| id).map_err(|err| {
|
|
assert_eq!(id, 0);
|
|
err
|
|
})
|
|
}
|
|
|
|
pub fn mod_get_imports(&self, id: deno_mod) -> Vec<String> {
|
|
let len =
|
|
unsafe { libdeno::deno_mod_imports_len(self.libdeno_isolate, id) };
|
|
let mut out = Vec::new();
|
|
for i in 0..len {
|
|
let specifier_ptr =
|
|
unsafe { libdeno::deno_mod_imports_get(self.libdeno_isolate, id, i) };
|
|
let specifier_c: &CStr = unsafe { CStr::from_ptr(specifier_ptr) };
|
|
let specifier: &str = specifier_c.to_str().unwrap();
|
|
|
|
out.push(specifier.to_string());
|
|
}
|
|
out
|
|
}
|
|
|
|
/// Takes a snapshot. The isolate should have been created with will_snapshot
|
|
/// set to true.
|
|
///
|
|
/// ErrBox can be downcast to a type that exposes additional information about
|
|
/// the V8 exception. By default this type is CoreJSError, however it may be a
|
|
/// different type if Isolate::set_js_error_create() has been used.
|
|
pub fn snapshot(&self) -> Result<Snapshot1<'static>, ErrBox> {
|
|
let snapshot = unsafe { libdeno::deno_snapshot_new(self.libdeno_isolate) };
|
|
match self.check_last_exception() {
|
|
Ok(..) => Ok(snapshot),
|
|
Err(err) => {
|
|
assert_eq!(snapshot.data_ptr, null());
|
|
assert_eq!(snapshot.data_len, 0);
|
|
Err(err)
|
|
}
|
|
}
|
|
}
|
|
|
|
fn dyn_import_done(
|
|
&self,
|
|
id: libdeno::deno_dyn_import_id,
|
|
result: Result<deno_mod, Option<String>>,
|
|
) -> Result<(), ErrBox> {
|
|
debug!("dyn_import_done {} {:?}", id, result);
|
|
let (mod_id, maybe_err_str) = match result {
|
|
Ok(mod_id) => (mod_id, None),
|
|
Err(None) => (0, None),
|
|
Err(Some(err_str)) => (0, Some(err_str)),
|
|
};
|
|
let err_ptr = maybe_err_str
|
|
.map(|e| e.as_ptr() as *const c_char)
|
|
.unwrap_or(std::ptr::null());
|
|
unsafe {
|
|
libdeno::deno_dyn_import_done(
|
|
self.libdeno_isolate,
|
|
self.as_raw_ptr(),
|
|
id,
|
|
mod_id,
|
|
err_ptr,
|
|
)
|
|
};
|
|
self.check_last_exception().map_err(|err| {
|
|
assert_eq!(id, 0);
|
|
err
|
|
})
|
|
}
|
|
}
|
|
|
|
/// Called during mod_instantiate() to resolve imports.
|
|
type ResolveFn<'a> = dyn FnMut(&str, deno_mod) -> deno_mod + 'a;
|
|
|
|
/// Used internally by Isolate::mod_instantiate to wrap ResolveFn and
|
|
/// encapsulate pointer casts.
|
|
struct ResolveContext<'a> {
|
|
resolve_fn: &'a mut ResolveFn<'a>,
|
|
}
|
|
|
|
impl<'a> ResolveContext<'a> {
|
|
#[inline]
|
|
fn as_raw_ptr(&mut self) -> *mut c_void {
|
|
self as *mut _ as *mut c_void
|
|
}
|
|
|
|
#[inline]
|
|
unsafe fn from_raw_ptr(ptr: *mut c_void) -> &'a mut Self {
|
|
&mut *(ptr as *mut _)
|
|
}
|
|
}
|
|
|
|
impl Isolate {
|
|
/// Instanciates a ES module
|
|
///
|
|
/// ErrBox can be downcast to a type that exposes additional information about
|
|
/// the V8 exception. By default this type is CoreJSError, however it may be a
|
|
/// different type if Isolate::set_js_error_create() has been used.
|
|
pub fn mod_instantiate(
|
|
&mut self,
|
|
id: deno_mod,
|
|
resolve_fn: &mut ResolveFn,
|
|
) -> Result<(), ErrBox> {
|
|
let libdeno_isolate = self.libdeno_isolate;
|
|
let mut ctx = ResolveContext { resolve_fn };
|
|
unsafe {
|
|
libdeno::deno_mod_instantiate(
|
|
libdeno_isolate,
|
|
ctx.as_raw_ptr(),
|
|
id,
|
|
Self::resolve_cb,
|
|
)
|
|
};
|
|
self.check_last_exception()
|
|
}
|
|
|
|
/// Called during mod_instantiate() only.
|
|
extern "C" fn resolve_cb(
|
|
user_data: *mut libc::c_void,
|
|
specifier_ptr: *const libc::c_char,
|
|
referrer: deno_mod,
|
|
) -> deno_mod {
|
|
let ResolveContext { resolve_fn } =
|
|
unsafe { ResolveContext::from_raw_ptr(user_data) };
|
|
let specifier_c: &CStr = unsafe { CStr::from_ptr(specifier_ptr) };
|
|
let specifier: &str = specifier_c.to_str().unwrap();
|
|
|
|
resolve_fn(specifier, referrer)
|
|
}
|
|
|
|
/// Evaluates an already instantiated ES module.
|
|
///
|
|
/// ErrBox can be downcast to a type that exposes additional information about
|
|
/// the V8 exception. By default this type is CoreJSError, however it may be a
|
|
/// different type if Isolate::set_js_error_create() has been used.
|
|
pub fn mod_evaluate(&mut self, id: deno_mod) -> Result<(), ErrBox> {
|
|
self.shared_init();
|
|
unsafe {
|
|
libdeno::deno_mod_evaluate(self.libdeno_isolate, self.as_raw_ptr(), id)
|
|
};
|
|
self.check_last_exception()
|
|
}
|
|
}
|
|
|
|
struct LockerScope {
|
|
libdeno_isolate: *const libdeno::isolate,
|
|
}
|
|
|
|
impl LockerScope {
|
|
fn new(libdeno_isolate: *const libdeno::isolate) -> LockerScope {
|
|
unsafe { libdeno::deno_lock(libdeno_isolate) }
|
|
LockerScope { libdeno_isolate }
|
|
}
|
|
}
|
|
|
|
impl Drop for LockerScope {
|
|
fn drop(&mut self) {
|
|
unsafe { libdeno::deno_unlock(self.libdeno_isolate) }
|
|
}
|
|
}
|
|
|
|
impl Future for Isolate {
|
|
type Item = ();
|
|
type Error = ErrBox;
|
|
|
|
fn poll(&mut self) -> Poll<(), ErrBox> {
|
|
self.shared_init();
|
|
|
|
let mut overflow_response: Option<Buf> = None;
|
|
|
|
loop {
|
|
// If there are any pending dyn_import futures, do those first.
|
|
loop {
|
|
match self.pending_dyn_imports.poll() {
|
|
Ok(NotReady) | Ok(Ready(None)) => break,
|
|
Ok(Ready(Some((dyn_import_id, mod_id)))) => {
|
|
match self.mod_evaluate(mod_id) {
|
|
Ok(()) => self.dyn_import_done(dyn_import_id, Ok(mod_id))?,
|
|
Err(..) => self.dyn_import_done(dyn_import_id, Err(None))?,
|
|
}
|
|
}
|
|
Err((dyn_import_id, err)) => {
|
|
self.dyn_import_done(dyn_import_id, Err(Some(err.to_string())))?
|
|
}
|
|
}
|
|
}
|
|
|
|
// Now handle actual ops.
|
|
self.have_unpolled_ops = false;
|
|
#[allow(clippy::match_wild_err_arm)]
|
|
match self.pending_ops.poll() {
|
|
Err(_) => panic!("unexpected op error"),
|
|
Ok(Ready(None)) => break,
|
|
Ok(NotReady) => break,
|
|
Ok(Ready(Some(buf))) => {
|
|
let successful_push = self.shared.push(&buf);
|
|
if !successful_push {
|
|
// If we couldn't push the response to the shared queue, because
|
|
// there wasn't enough size, we will return the buffer via the
|
|
// legacy route, using the argument of deno_respond.
|
|
overflow_response = Some(buf);
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
if self.shared.size() > 0 {
|
|
// Lock the current thread for V8.
|
|
let locker = LockerScope::new(self.libdeno_isolate);
|
|
self.respond(None)?;
|
|
// The other side should have shifted off all the messages.
|
|
assert_eq!(self.shared.size(), 0);
|
|
drop(locker);
|
|
}
|
|
|
|
if overflow_response.is_some() {
|
|
// Lock the current thread for V8.
|
|
let locker = LockerScope::new(self.libdeno_isolate);
|
|
let buf = overflow_response.take().unwrap();
|
|
self.respond(Some(&buf))?;
|
|
drop(locker);
|
|
}
|
|
|
|
self.check_promise_errors();
|
|
self.check_last_exception()?;
|
|
|
|
// We're idle if pending_ops is empty.
|
|
if self.pending_ops.is_empty() {
|
|
Ok(futures::Async::Ready(()))
|
|
} else {
|
|
if self.have_unpolled_ops {
|
|
task::current().notify();
|
|
}
|
|
Ok(futures::Async::NotReady)
|
|
}
|
|
}
|
|
}
|
|
|
|
/// IsolateHandle is a thread safe handle on an Isolate. It exposed thread safe V8 functions.
|
|
#[derive(Clone)]
|
|
pub struct IsolateHandle {
|
|
shared_libdeno_isolate: Arc<Mutex<Option<*const libdeno::isolate>>>,
|
|
}
|
|
|
|
unsafe impl Send for IsolateHandle {}
|
|
|
|
impl IsolateHandle {
|
|
/// Terminate the execution of any currently running javascript.
|
|
/// After terminating execution it is probably not wise to continue using
|
|
/// the isolate.
|
|
pub fn terminate_execution(&self) {
|
|
unsafe {
|
|
if let Some(isolate) = *self.shared_libdeno_isolate.lock().unwrap() {
|
|
libdeno::deno_terminate_execution(isolate)
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
pub fn js_check(r: Result<(), ErrBox>) {
|
|
if let Err(e) = r {
|
|
panic!(e.to_string());
|
|
}
|
|
}
|
|
|
|
#[cfg(test)]
|
|
pub mod tests {
|
|
use super::*;
|
|
use futures::executor::spawn;
|
|
use futures::future::lazy;
|
|
use futures::future::ok;
|
|
use futures::Async;
|
|
use std::ops::FnOnce;
|
|
use std::sync::atomic::{AtomicUsize, Ordering};
|
|
|
|
fn run_in_task<F, R>(f: F) -> R
|
|
where
|
|
F: FnOnce() -> R,
|
|
{
|
|
spawn(lazy(move || ok::<R, ()>(f()))).wait_future().unwrap()
|
|
}
|
|
|
|
fn poll_until_ready<F>(
|
|
future: &mut F,
|
|
max_poll_count: usize,
|
|
) -> Result<F::Item, F::Error>
|
|
where
|
|
F: Future,
|
|
{
|
|
for _ in 0..max_poll_count {
|
|
match future.poll() {
|
|
Ok(NotReady) => continue,
|
|
Ok(Ready(val)) => return Ok(val),
|
|
Err(err) => return Err(err),
|
|
}
|
|
}
|
|
panic!(
|
|
"Isolate still not ready after polling {} times.",
|
|
max_poll_count
|
|
)
|
|
}
|
|
|
|
pub enum Mode {
|
|
AsyncImmediate,
|
|
OverflowReqSync,
|
|
OverflowResSync,
|
|
OverflowReqAsync,
|
|
OverflowResAsync,
|
|
}
|
|
|
|
pub fn setup(mode: Mode) -> (Isolate, Arc<AtomicUsize>) {
|
|
let dispatch_count = Arc::new(AtomicUsize::new(0));
|
|
let dispatch_count_ = dispatch_count.clone();
|
|
|
|
let mut isolate = Isolate::new(StartupData::None, false);
|
|
isolate.set_dispatch(move |control, _| -> CoreOp {
|
|
dispatch_count_.fetch_add(1, Ordering::Relaxed);
|
|
match mode {
|
|
Mode::AsyncImmediate => {
|
|
assert_eq!(control.len(), 1);
|
|
assert_eq!(control[0], 42);
|
|
let buf = vec![43u8].into_boxed_slice();
|
|
Op::Async(Box::new(futures::future::ok(buf)))
|
|
}
|
|
Mode::OverflowReqSync => {
|
|
assert_eq!(control.len(), 100 * 1024 * 1024);
|
|
let buf = vec![43u8].into_boxed_slice();
|
|
Op::Sync(buf)
|
|
}
|
|
Mode::OverflowResSync => {
|
|
assert_eq!(control.len(), 1);
|
|
assert_eq!(control[0], 42);
|
|
let mut vec = Vec::<u8>::new();
|
|
vec.resize(100 * 1024 * 1024, 0);
|
|
vec[0] = 99;
|
|
let buf = vec.into_boxed_slice();
|
|
Op::Sync(buf)
|
|
}
|
|
Mode::OverflowReqAsync => {
|
|
assert_eq!(control.len(), 100 * 1024 * 1024);
|
|
let buf = vec![43u8].into_boxed_slice();
|
|
Op::Async(Box::new(futures::future::ok(buf)))
|
|
}
|
|
Mode::OverflowResAsync => {
|
|
assert_eq!(control.len(), 1);
|
|
assert_eq!(control[0], 42);
|
|
let mut vec = Vec::<u8>::new();
|
|
vec.resize(100 * 1024 * 1024, 0);
|
|
vec[0] = 4;
|
|
let buf = vec.into_boxed_slice();
|
|
Op::Async(Box::new(futures::future::ok(buf)))
|
|
}
|
|
}
|
|
});
|
|
js_check(isolate.execute(
|
|
"setup.js",
|
|
r#"
|
|
function assert(cond) {
|
|
if (!cond) {
|
|
throw Error("assert");
|
|
}
|
|
}
|
|
"#,
|
|
));
|
|
assert_eq!(dispatch_count.load(Ordering::Relaxed), 0);
|
|
(isolate, dispatch_count)
|
|
}
|
|
|
|
#[test]
|
|
fn test_dispatch() {
|
|
let (mut isolate, dispatch_count) = setup(Mode::AsyncImmediate);
|
|
js_check(isolate.execute(
|
|
"filename.js",
|
|
r#"
|
|
let control = new Uint8Array([42]);
|
|
Deno.core.send(control);
|
|
async function main() {
|
|
Deno.core.send(control);
|
|
}
|
|
main();
|
|
"#,
|
|
));
|
|
assert_eq!(dispatch_count.load(Ordering::Relaxed), 2);
|
|
}
|
|
|
|
#[test]
|
|
fn test_mods() {
|
|
let (mut isolate, dispatch_count) = setup(Mode::AsyncImmediate);
|
|
let mod_a = isolate
|
|
.mod_new(
|
|
true,
|
|
"a.js",
|
|
r#"
|
|
import { b } from 'b.js'
|
|
if (b() != 'b') throw Error();
|
|
let control = new Uint8Array([42]);
|
|
Deno.core.send(control);
|
|
"#,
|
|
)
|
|
.unwrap();
|
|
assert_eq!(dispatch_count.load(Ordering::Relaxed), 0);
|
|
|
|
let imports = isolate.mod_get_imports(mod_a);
|
|
assert_eq!(imports, vec!["b.js".to_string()]);
|
|
|
|
let mod_b = isolate
|
|
.mod_new(false, "b.js", "export function b() { return 'b' }")
|
|
.unwrap();
|
|
let imports = isolate.mod_get_imports(mod_b);
|
|
assert_eq!(imports.len(), 0);
|
|
|
|
let resolve_count = Arc::new(AtomicUsize::new(0));
|
|
let resolve_count_ = resolve_count.clone();
|
|
|
|
let mut resolve = move |specifier: &str, _referrer: deno_mod| -> deno_mod {
|
|
resolve_count_.fetch_add(1, Ordering::SeqCst);
|
|
assert_eq!(specifier, "b.js");
|
|
mod_b
|
|
};
|
|
|
|
js_check(isolate.mod_instantiate(mod_b, &mut resolve));
|
|
assert_eq!(dispatch_count.load(Ordering::Relaxed), 0);
|
|
assert_eq!(resolve_count.load(Ordering::SeqCst), 0);
|
|
|
|
js_check(isolate.mod_instantiate(mod_a, &mut resolve));
|
|
assert_eq!(dispatch_count.load(Ordering::Relaxed), 0);
|
|
assert_eq!(resolve_count.load(Ordering::SeqCst), 1);
|
|
|
|
js_check(isolate.mod_evaluate(mod_a));
|
|
assert_eq!(dispatch_count.load(Ordering::Relaxed), 1);
|
|
assert_eq!(resolve_count.load(Ordering::SeqCst), 1);
|
|
}
|
|
|
|
#[test]
|
|
fn test_poll_async_immediate_ops() {
|
|
run_in_task(|| {
|
|
let (mut isolate, dispatch_count) = setup(Mode::AsyncImmediate);
|
|
|
|
js_check(isolate.execute(
|
|
"setup2.js",
|
|
r#"
|
|
let nrecv = 0;
|
|
Deno.core.setAsyncHandler((buf) => {
|
|
nrecv++;
|
|
});
|
|
"#,
|
|
));
|
|
assert_eq!(dispatch_count.load(Ordering::Relaxed), 0);
|
|
js_check(isolate.execute(
|
|
"check1.js",
|
|
r#"
|
|
assert(nrecv == 0);
|
|
let control = new Uint8Array([42]);
|
|
Deno.core.send(control);
|
|
assert(nrecv == 0);
|
|
"#,
|
|
));
|
|
assert_eq!(dispatch_count.load(Ordering::Relaxed), 1);
|
|
assert_eq!(Async::Ready(()), isolate.poll().unwrap());
|
|
assert_eq!(dispatch_count.load(Ordering::Relaxed), 1);
|
|
js_check(isolate.execute(
|
|
"check2.js",
|
|
r#"
|
|
assert(nrecv == 1);
|
|
Deno.core.send(control);
|
|
assert(nrecv == 1);
|
|
"#,
|
|
));
|
|
assert_eq!(dispatch_count.load(Ordering::Relaxed), 2);
|
|
assert_eq!(Async::Ready(()), isolate.poll().unwrap());
|
|
js_check(isolate.execute("check3.js", "assert(nrecv == 2)"));
|
|
assert_eq!(dispatch_count.load(Ordering::Relaxed), 2);
|
|
// We are idle, so the next poll should be the last.
|
|
assert_eq!(Async::Ready(()), isolate.poll().unwrap());
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn dyn_import_err() {
|
|
// Test an erroneous dynamic import where the specified module isn't found.
|
|
run_in_task(|| {
|
|
let count = Arc::new(AtomicUsize::new(0));
|
|
let count_ = count.clone();
|
|
let mut isolate = Isolate::new(StartupData::None, false);
|
|
isolate.set_dyn_import(move |specifier, referrer| {
|
|
count_.fetch_add(1, Ordering::Relaxed);
|
|
assert_eq!(specifier, "foo.js");
|
|
assert_eq!(referrer, "dyn_import2.js");
|
|
Box::new(futures::future::err(
|
|
std::io::Error::new(std::io::ErrorKind::Other, "oh no!").into(),
|
|
))
|
|
});
|
|
js_check(isolate.execute(
|
|
"dyn_import2.js",
|
|
r#"
|
|
(async () => {
|
|
await import("foo.js");
|
|
})();
|
|
"#,
|
|
));
|
|
assert_eq!(count.load(Ordering::Relaxed), 1);
|
|
|
|
// We should get an error here.
|
|
let result = isolate.poll();
|
|
assert!(result.is_err());
|
|
})
|
|
}
|
|
|
|
#[test]
|
|
fn dyn_import_ok() {
|
|
run_in_task(|| {
|
|
let count = Arc::new(AtomicUsize::new(0));
|
|
let count_ = count.clone();
|
|
|
|
// Sometimes Rust is really annoying.
|
|
use std::sync::Mutex;
|
|
let mod_b = Arc::new(Mutex::new(0));
|
|
let mod_b2 = mod_b.clone();
|
|
|
|
let mut isolate = Isolate::new(StartupData::None, false);
|
|
isolate.set_dyn_import(move |_specifier, referrer| {
|
|
count_.fetch_add(1, Ordering::Relaxed);
|
|
// assert_eq!(specifier, "foo.js");
|
|
assert_eq!(referrer, "dyn_import3.js");
|
|
let mod_id = mod_b2.lock().unwrap();
|
|
Box::new(futures::future::ok(*mod_id))
|
|
});
|
|
|
|
// Instantiate mod_b
|
|
{
|
|
let mut mod_id = mod_b.lock().unwrap();
|
|
*mod_id = isolate
|
|
.mod_new(false, "b.js", "export function b() { return 'b' }")
|
|
.unwrap();
|
|
let mut resolve = move |_specifier: &str,
|
|
_referrer: deno_mod|
|
|
-> deno_mod { unreachable!() };
|
|
js_check(isolate.mod_instantiate(*mod_id, &mut resolve));
|
|
}
|
|
// Dynamically import mod_b
|
|
js_check(isolate.execute(
|
|
"dyn_import3.js",
|
|
r#"
|
|
(async () => {
|
|
let mod = await import("foo1.js");
|
|
if (mod.b() !== 'b') {
|
|
throw Error("bad1");
|
|
}
|
|
// And again!
|
|
mod = await import("foo2.js");
|
|
if (mod.b() !== 'b') {
|
|
throw Error("bad2");
|
|
}
|
|
})();
|
|
"#,
|
|
));
|
|
|
|
assert_eq!(count.load(Ordering::Relaxed), 1);
|
|
assert_eq!(Ready(()), isolate.poll().unwrap());
|
|
assert_eq!(count.load(Ordering::Relaxed), 2);
|
|
assert_eq!(Ready(()), isolate.poll().unwrap());
|
|
assert_eq!(count.load(Ordering::Relaxed), 2);
|
|
})
|
|
}
|
|
|
|
#[test]
|
|
fn terminate_execution() {
|
|
let (tx, rx) = std::sync::mpsc::channel::<bool>();
|
|
let tx_clone = tx.clone();
|
|
|
|
let (mut isolate, _dispatch_count) = setup(Mode::AsyncImmediate);
|
|
let shared = isolate.shared_isolate_handle();
|
|
|
|
let t1 = std::thread::spawn(move || {
|
|
// allow deno to boot and run
|
|
std::thread::sleep(std::time::Duration::from_millis(100));
|
|
|
|
// terminate execution
|
|
shared.terminate_execution();
|
|
|
|
// allow shutdown
|
|
std::thread::sleep(std::time::Duration::from_millis(100));
|
|
|
|
// unless reported otherwise the test should fail after this point
|
|
tx_clone.send(false).ok();
|
|
});
|
|
|
|
let t2 = std::thread::spawn(move || {
|
|
// run an infinite loop
|
|
let res = isolate.execute(
|
|
"infinite_loop.js",
|
|
r#"
|
|
let i = 0;
|
|
while (true) { i++; }
|
|
"#,
|
|
);
|
|
|
|
// execute() terminated, which means terminate_execution() was successful.
|
|
tx.send(true).ok();
|
|
|
|
if let Err(e) = res {
|
|
assert_eq!(e.to_string(), "Uncaught Error: execution terminated");
|
|
} else {
|
|
panic!("should return an error");
|
|
}
|
|
|
|
// make sure the isolate is still unusable
|
|
let res = isolate.execute("simple.js", "1+1;");
|
|
if let Err(e) = res {
|
|
assert_eq!(e.to_string(), "Uncaught Error: execution terminated");
|
|
} else {
|
|
panic!("should return an error");
|
|
}
|
|
});
|
|
|
|
if !rx.recv().unwrap() {
|
|
panic!("should have terminated")
|
|
}
|
|
|
|
t1.join().unwrap();
|
|
t2.join().unwrap();
|
|
}
|
|
|
|
#[test]
|
|
fn dangling_shared_isolate() {
|
|
let shared = {
|
|
// isolate is dropped at the end of this block
|
|
let (mut isolate, _dispatch_count) = setup(Mode::AsyncImmediate);
|
|
isolate.shared_isolate_handle()
|
|
};
|
|
|
|
// this should not SEGFAULT
|
|
shared.terminate_execution();
|
|
}
|
|
|
|
#[test]
|
|
fn overflow_req_sync() {
|
|
let (mut isolate, dispatch_count) = setup(Mode::OverflowReqSync);
|
|
js_check(isolate.execute(
|
|
"overflow_req_sync.js",
|
|
r#"
|
|
let asyncRecv = 0;
|
|
Deno.core.setAsyncHandler((buf) => { asyncRecv++ });
|
|
// Large message that will overflow the shared space.
|
|
let control = new Uint8Array(100 * 1024 * 1024);
|
|
let response = Deno.core.dispatch(control);
|
|
assert(response instanceof Uint8Array);
|
|
assert(response.length == 1);
|
|
assert(response[0] == 43);
|
|
assert(asyncRecv == 0);
|
|
"#,
|
|
));
|
|
assert_eq!(dispatch_count.load(Ordering::Relaxed), 1);
|
|
}
|
|
|
|
#[test]
|
|
fn overflow_res_sync() {
|
|
// TODO(ry) This test is quite slow due to memcpy-ing 100MB into JS. We
|
|
// should optimize this.
|
|
let (mut isolate, dispatch_count) = setup(Mode::OverflowResSync);
|
|
js_check(isolate.execute(
|
|
"overflow_res_sync.js",
|
|
r#"
|
|
let asyncRecv = 0;
|
|
Deno.core.setAsyncHandler((buf) => { asyncRecv++ });
|
|
// Large message that will overflow the shared space.
|
|
let control = new Uint8Array([42]);
|
|
let response = Deno.core.dispatch(control);
|
|
assert(response instanceof Uint8Array);
|
|
assert(response.length == 100 * 1024 * 1024);
|
|
assert(response[0] == 99);
|
|
assert(asyncRecv == 0);
|
|
"#,
|
|
));
|
|
assert_eq!(dispatch_count.load(Ordering::Relaxed), 1);
|
|
}
|
|
|
|
#[test]
|
|
fn overflow_req_async() {
|
|
run_in_task(|| {
|
|
let (mut isolate, dispatch_count) = setup(Mode::OverflowReqAsync);
|
|
js_check(isolate.execute(
|
|
"overflow_req_async.js",
|
|
r#"
|
|
let asyncRecv = 0;
|
|
Deno.core.setAsyncHandler((buf) => {
|
|
assert(buf.byteLength === 1);
|
|
assert(buf[0] === 43);
|
|
asyncRecv++;
|
|
});
|
|
// Large message that will overflow the shared space.
|
|
let control = new Uint8Array(100 * 1024 * 1024);
|
|
let response = Deno.core.dispatch(control);
|
|
// Async messages always have null response.
|
|
assert(response == null);
|
|
assert(asyncRecv == 0);
|
|
"#,
|
|
));
|
|
assert_eq!(dispatch_count.load(Ordering::Relaxed), 1);
|
|
assert_eq!(Async::Ready(()), isolate.poll().unwrap());
|
|
js_check(isolate.execute("check.js", "assert(asyncRecv == 1);"));
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn overflow_res_async() {
|
|
run_in_task(|| {
|
|
// TODO(ry) This test is quite slow due to memcpy-ing 100MB into JS. We
|
|
// should optimize this.
|
|
let (mut isolate, dispatch_count) = setup(Mode::OverflowResAsync);
|
|
js_check(isolate.execute(
|
|
"overflow_res_async.js",
|
|
r#"
|
|
let asyncRecv = 0;
|
|
Deno.core.setAsyncHandler((buf) => {
|
|
assert(buf.byteLength === 100 * 1024 * 1024);
|
|
assert(buf[0] === 4);
|
|
asyncRecv++;
|
|
});
|
|
// Large message that will overflow the shared space.
|
|
let control = new Uint8Array([42]);
|
|
let response = Deno.core.dispatch(control);
|
|
assert(response == null);
|
|
assert(asyncRecv == 0);
|
|
"#,
|
|
));
|
|
assert_eq!(dispatch_count.load(Ordering::Relaxed), 1);
|
|
poll_until_ready(&mut isolate, 3).unwrap();
|
|
js_check(isolate.execute("check.js", "assert(asyncRecv == 1);"));
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn overflow_res_multiple_dispatch_async() {
|
|
// TODO(ry) This test is quite slow due to memcpy-ing 100MB into JS. We
|
|
// should optimize this.
|
|
run_in_task(|| {
|
|
let (mut isolate, dispatch_count) = setup(Mode::OverflowResAsync);
|
|
js_check(isolate.execute(
|
|
"overflow_res_multiple_dispatch_async.js",
|
|
r#"
|
|
let asyncRecv = 0;
|
|
Deno.core.setAsyncHandler((buf) => {
|
|
assert(buf.byteLength === 100 * 1024 * 1024);
|
|
assert(buf[0] === 4);
|
|
asyncRecv++;
|
|
});
|
|
// Large message that will overflow the shared space.
|
|
let control = new Uint8Array([42]);
|
|
let response = Deno.core.dispatch(control);
|
|
assert(response == null);
|
|
assert(asyncRecv == 0);
|
|
// Dispatch another message to verify that pending ops
|
|
// are done even if shared space overflows
|
|
Deno.core.dispatch(control);
|
|
"#,
|
|
));
|
|
assert_eq!(dispatch_count.load(Ordering::Relaxed), 2);
|
|
poll_until_ready(&mut isolate, 3).unwrap();
|
|
js_check(isolate.execute("check.js", "assert(asyncRecv == 2);"));
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn test_js() {
|
|
run_in_task(|| {
|
|
let (mut isolate, _dispatch_count) = setup(Mode::AsyncImmediate);
|
|
js_check(
|
|
isolate.execute(
|
|
"shared_queue_test.js",
|
|
include_str!("shared_queue_test.js"),
|
|
),
|
|
);
|
|
assert_eq!(Async::Ready(()), isolate.poll().unwrap());
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn will_snapshot() {
|
|
let snapshot = {
|
|
let mut isolate = Isolate::new(StartupData::None, true);
|
|
js_check(isolate.execute("a.js", "a = 1 + 2"));
|
|
let s = isolate.snapshot().unwrap();
|
|
drop(isolate);
|
|
s
|
|
};
|
|
|
|
let startup_data = StartupData::LibdenoSnapshot(snapshot);
|
|
let mut isolate2 = Isolate::new(startup_data, false);
|
|
js_check(isolate2.execute("check.js", "if (a != 3) throw Error('x')"));
|
|
}
|
|
}
|