mirror of
https://github.com/denoland/deno.git
synced 2024-12-22 23:34:47 -05:00
ddbb7b83f2
This commit implements classic workers, but only when the `--enable-testing-features-do-not-use` flag is provided. This change is not user facing. Classic workers are used extensively in WPT tests. The classic workers do not support loading from disk, and do not support TypeScript. Co-authored-by: Luca Casonato <hello@lcas.dev>
313 lines
9.8 KiB
Rust
313 lines
9.8 KiB
Rust
// Copyright 2018-2021 the Deno authors. All rights reserved. MIT license.
|
|
|
|
use crate::colors;
|
|
use crate::file_fetcher::get_source_from_bytes;
|
|
use crate::file_fetcher::strip_shebang;
|
|
use crate::flags::Flags;
|
|
use crate::ops;
|
|
use crate::program_state::ProgramState;
|
|
use crate::version;
|
|
use data_url::DataUrl;
|
|
use deno_core::error::anyhow;
|
|
use deno_core::error::type_error;
|
|
use deno_core::error::uri_error;
|
|
use deno_core::error::AnyError;
|
|
use deno_core::error::Context;
|
|
use deno_core::futures::FutureExt;
|
|
use deno_core::located_script_name;
|
|
use deno_core::resolve_url;
|
|
use deno_core::serde::Deserialize;
|
|
use deno_core::serde::Serialize;
|
|
use deno_core::serde_json;
|
|
use deno_core::url::Url;
|
|
use deno_core::v8_set_flags;
|
|
use deno_core::ModuleLoader;
|
|
use deno_core::ModuleSpecifier;
|
|
use deno_core::OpState;
|
|
use deno_runtime::deno_broadcast_channel::InMemoryBroadcastChannel;
|
|
use deno_runtime::deno_web::BlobStore;
|
|
use deno_runtime::permissions::Permissions;
|
|
use deno_runtime::permissions::PermissionsOptions;
|
|
use deno_runtime::worker::MainWorker;
|
|
use deno_runtime::worker::WorkerOptions;
|
|
use deno_tls::create_default_root_cert_store;
|
|
use log::Level;
|
|
use std::cell::RefCell;
|
|
use std::convert::TryInto;
|
|
use std::env::current_exe;
|
|
use std::fs::File;
|
|
use std::io::BufReader;
|
|
use std::io::Cursor;
|
|
use std::io::Read;
|
|
use std::io::Seek;
|
|
use std::io::SeekFrom;
|
|
use std::iter::once;
|
|
use std::pin::Pin;
|
|
use std::rc::Rc;
|
|
use std::sync::Arc;
|
|
|
|
#[derive(Deserialize, Serialize)]
|
|
pub struct Metadata {
|
|
pub argv: Vec<String>,
|
|
pub unstable: bool,
|
|
pub seed: Option<u64>,
|
|
pub permissions: PermissionsOptions,
|
|
pub location: Option<Url>,
|
|
pub v8_flags: Vec<String>,
|
|
pub log_level: Option<Level>,
|
|
pub ca_stores: Option<Vec<String>>,
|
|
pub ca_data: Option<Vec<u8>>,
|
|
pub unsafely_ignore_certificate_errors: Option<Vec<String>>,
|
|
}
|
|
|
|
pub const MAGIC_TRAILER: &[u8; 8] = b"d3n0l4nd";
|
|
|
|
/// This function will try to run this binary as a standalone binary
|
|
/// produced by `deno compile`. It determines if this is a standalone
|
|
/// binary by checking for the magic trailer string `D3N0` at EOF-12.
|
|
/// The magic trailer is followed by:
|
|
/// - a u64 pointer to the JS bundle embedded in the binary
|
|
/// - a u64 pointer to JSON metadata (serialized flags) embedded in the binary
|
|
/// These are dereferenced, and the bundle is executed under the configuration
|
|
/// specified by the metadata. If no magic trailer is present, this function
|
|
/// exits with `Ok(None)`.
|
|
pub fn extract_standalone(
|
|
args: Vec<String>,
|
|
) -> Result<Option<(Metadata, String)>, AnyError> {
|
|
let current_exe_path = current_exe()?;
|
|
|
|
let mut current_exe = File::open(current_exe_path)?;
|
|
let trailer_pos = current_exe.seek(SeekFrom::End(-24))?;
|
|
let mut trailer = [0; 24];
|
|
current_exe.read_exact(&mut trailer)?;
|
|
let (magic_trailer, rest) = trailer.split_at(8);
|
|
if magic_trailer != MAGIC_TRAILER {
|
|
return Ok(None);
|
|
}
|
|
|
|
let (bundle_pos, rest) = rest.split_at(8);
|
|
let metadata_pos = rest;
|
|
let bundle_pos = u64_from_bytes(bundle_pos)?;
|
|
let metadata_pos = u64_from_bytes(metadata_pos)?;
|
|
let bundle_len = metadata_pos - bundle_pos;
|
|
let metadata_len = trailer_pos - metadata_pos;
|
|
current_exe.seek(SeekFrom::Start(bundle_pos))?;
|
|
|
|
let bundle = read_string_slice(&mut current_exe, bundle_pos, bundle_len)
|
|
.context("Failed to read source bundle from the current executable")?;
|
|
let metadata =
|
|
read_string_slice(&mut current_exe, metadata_pos, metadata_len)
|
|
.context("Failed to read metadata from the current executable")?;
|
|
|
|
let mut metadata: Metadata = serde_json::from_str(&metadata).unwrap();
|
|
metadata.argv.append(&mut args[1..].to_vec());
|
|
Ok(Some((metadata, bundle)))
|
|
}
|
|
|
|
fn u64_from_bytes(arr: &[u8]) -> Result<u64, AnyError> {
|
|
let fixed_arr: &[u8; 8] = arr
|
|
.try_into()
|
|
.context("Failed to convert the buffer into a fixed-size array")?;
|
|
Ok(u64::from_be_bytes(*fixed_arr))
|
|
}
|
|
|
|
fn read_string_slice(
|
|
file: &mut File,
|
|
pos: u64,
|
|
len: u64,
|
|
) -> Result<String, AnyError> {
|
|
let mut string = String::new();
|
|
file.seek(SeekFrom::Start(pos))?;
|
|
file.take(len).read_to_string(&mut string)?;
|
|
// TODO: check amount of bytes read
|
|
Ok(string)
|
|
}
|
|
|
|
fn get_source_from_data_url(
|
|
specifier: &ModuleSpecifier,
|
|
) -> Result<String, AnyError> {
|
|
let data_url = DataUrl::process(specifier.as_str())
|
|
.map_err(|e| uri_error(format!("{:?}", e)))?;
|
|
let mime = data_url.mime_type();
|
|
let charset = mime.get_parameter("charset").map(|v| v.to_string());
|
|
let (bytes, _) = data_url
|
|
.decode_to_vec()
|
|
.map_err(|e| uri_error(format!("{:?}", e)))?;
|
|
Ok(strip_shebang(get_source_from_bytes(bytes, charset)?))
|
|
}
|
|
|
|
const SPECIFIER: &str = "file://$deno$/bundle.js";
|
|
|
|
struct EmbeddedModuleLoader(String);
|
|
|
|
impl ModuleLoader for EmbeddedModuleLoader {
|
|
fn resolve(
|
|
&self,
|
|
_op_state: Rc<RefCell<OpState>>,
|
|
specifier: &str,
|
|
_referrer: &str,
|
|
_is_main: bool,
|
|
) -> Result<ModuleSpecifier, AnyError> {
|
|
if let Ok(module_specifier) = resolve_url(specifier) {
|
|
if get_source_from_data_url(&module_specifier).is_ok()
|
|
|| specifier == SPECIFIER
|
|
{
|
|
return Ok(module_specifier);
|
|
}
|
|
}
|
|
Err(type_error(
|
|
"Self-contained binaries don't support module loading",
|
|
))
|
|
}
|
|
|
|
fn load(
|
|
&self,
|
|
_op_state: Rc<RefCell<OpState>>,
|
|
module_specifier: &ModuleSpecifier,
|
|
_maybe_referrer: Option<ModuleSpecifier>,
|
|
_is_dynamic: bool,
|
|
) -> Pin<Box<deno_core::ModuleSourceFuture>> {
|
|
let module_specifier = module_specifier.clone();
|
|
let is_data_uri = get_source_from_data_url(&module_specifier).ok();
|
|
let code = if let Some(ref source) = is_data_uri {
|
|
source.to_string()
|
|
} else {
|
|
self.0.to_string()
|
|
};
|
|
async move {
|
|
if is_data_uri.is_none() && module_specifier.to_string() != SPECIFIER {
|
|
return Err(type_error(
|
|
"Self-contained binaries don't support module loading",
|
|
));
|
|
}
|
|
|
|
Ok(deno_core::ModuleSource {
|
|
code,
|
|
module_url_specified: module_specifier.to_string(),
|
|
module_url_found: module_specifier.to_string(),
|
|
})
|
|
}
|
|
.boxed_local()
|
|
}
|
|
}
|
|
|
|
fn metadata_to_flags(metadata: &Metadata) -> Flags {
|
|
let permissions = metadata.permissions.clone();
|
|
Flags {
|
|
argv: metadata.argv.clone(),
|
|
unstable: metadata.unstable,
|
|
seed: metadata.seed,
|
|
location: metadata.location.clone(),
|
|
allow_env: permissions.allow_env,
|
|
allow_hrtime: permissions.allow_hrtime,
|
|
allow_net: permissions.allow_net,
|
|
allow_ffi: permissions.allow_ffi,
|
|
allow_read: permissions.allow_read,
|
|
allow_run: permissions.allow_run,
|
|
allow_write: permissions.allow_write,
|
|
v8_flags: metadata.v8_flags.clone(),
|
|
log_level: metadata.log_level,
|
|
ca_stores: metadata.ca_stores.clone(),
|
|
..Default::default()
|
|
}
|
|
}
|
|
|
|
pub async fn run(
|
|
source_code: String,
|
|
metadata: Metadata,
|
|
) -> Result<(), AnyError> {
|
|
let flags = metadata_to_flags(&metadata);
|
|
let main_module = resolve_url(SPECIFIER)?;
|
|
let program_state = ProgramState::build(flags).await?;
|
|
let permissions = Permissions::from_options(&metadata.permissions);
|
|
let blob_store = BlobStore::default();
|
|
let broadcast_channel = InMemoryBroadcastChannel::default();
|
|
let module_loader = Rc::new(EmbeddedModuleLoader(source_code));
|
|
let create_web_worker_cb = Arc::new(|_| {
|
|
todo!("Worker are currently not supported in standalone binaries");
|
|
});
|
|
|
|
// Keep in sync with `main.rs`.
|
|
v8_set_flags(
|
|
once("UNUSED_BUT_NECESSARY_ARG0".to_owned())
|
|
.chain(metadata.v8_flags.iter().cloned())
|
|
.collect::<Vec<_>>(),
|
|
);
|
|
|
|
let mut root_cert_store = program_state
|
|
.root_cert_store
|
|
.clone()
|
|
.unwrap_or_else(create_default_root_cert_store);
|
|
|
|
if let Some(cert) = metadata.ca_data {
|
|
let reader = &mut BufReader::new(Cursor::new(cert));
|
|
// This function does not return specific errors, if it fails give a generic message.
|
|
if let Err(_err) = root_cert_store.add_pem_file(reader) {
|
|
return Err(anyhow!("Unable to add pem file to certificate store"));
|
|
}
|
|
}
|
|
|
|
let options = WorkerOptions {
|
|
apply_source_maps: false,
|
|
args: metadata.argv,
|
|
debug_flag: metadata.log_level.map_or(false, |l| l == log::Level::Debug),
|
|
user_agent: version::get_user_agent(),
|
|
unstable: metadata.unstable,
|
|
enable_testing_features: false,
|
|
unsafely_ignore_certificate_errors: metadata
|
|
.unsafely_ignore_certificate_errors,
|
|
root_cert_store: Some(root_cert_store),
|
|
seed: metadata.seed,
|
|
js_error_create_fn: None,
|
|
create_web_worker_cb,
|
|
maybe_inspector_server: None,
|
|
should_break_on_first_statement: false,
|
|
module_loader,
|
|
runtime_version: version::deno(),
|
|
ts_version: version::TYPESCRIPT.to_string(),
|
|
no_color: !colors::use_color(),
|
|
get_error_class_fn: Some(&get_error_class_name),
|
|
location: metadata.location,
|
|
origin_storage_dir: None,
|
|
blob_store,
|
|
broadcast_channel,
|
|
shared_array_buffer_store: None,
|
|
cpu_count: num_cpus::get(),
|
|
};
|
|
let mut worker =
|
|
MainWorker::from_options(main_module.clone(), permissions, &options);
|
|
{
|
|
let js_runtime = &mut worker.js_runtime;
|
|
js_runtime
|
|
.op_state()
|
|
.borrow_mut()
|
|
.put::<Arc<ProgramState>>(program_state.clone());
|
|
ops::errors::init(js_runtime);
|
|
ops::runtime_compiler::init(js_runtime);
|
|
js_runtime.sync_ops_cache();
|
|
}
|
|
worker.bootstrap(&options);
|
|
worker.execute_module(&main_module).await?;
|
|
worker.execute_script(
|
|
&located_script_name!(),
|
|
"window.dispatchEvent(new Event('load'))",
|
|
)?;
|
|
worker.run_event_loop(true).await?;
|
|
worker.execute_script(
|
|
&located_script_name!(),
|
|
"window.dispatchEvent(new Event('unload'))",
|
|
)?;
|
|
std::process::exit(0);
|
|
}
|
|
|
|
fn get_error_class_name(e: &AnyError) -> &'static str {
|
|
deno_runtime::errors::get_error_class_name(e).unwrap_or_else(|| {
|
|
panic!(
|
|
"Error '{}' contains boxed error of unsupported type:{}",
|
|
e,
|
|
e.chain()
|
|
.map(|e| format!("\n {:?}", e))
|
|
.collect::<String>()
|
|
);
|
|
})
|
|
}
|