mirror of
https://github.com/denoland/deno.git
synced 2024-11-22 15:06:54 -05:00
45c49034a7
- "SpawnOutput" extends "ChildStatus" instead of composing it - "SpawnOutput::stdout", "SpawnOutput::stderr", "Child::stdin", "Child::stdout" and "Child::stderr" are no longer optional, instead made them getters that throw at runtime if that stream wasn't set to "piped". - Remove the complicated "<T extends SpawnOptions = SpawnOptions>" which we currently need to give proper type hints for the availability of these fields. Their typings for these would get increasingly complex if it became dependent on more options (e.g. "SpawnOptions::pty" which if set should make the stdio streams unavailable)
216 lines
6.5 KiB
TypeScript
216 lines
6.5 KiB
TypeScript
// Copyright 2018-2022 the Deno authors. All rights reserved. MIT license.
|
||
import {
|
||
assert,
|
||
assertEquals,
|
||
assertNotEquals,
|
||
assertThrows,
|
||
} from "./test_util.ts";
|
||
|
||
Deno.test({ permissions: { env: true } }, function envSuccess() {
|
||
Deno.env.set("TEST_VAR", "A");
|
||
const env = Deno.env.toObject();
|
||
Deno.env.set("TEST_VAR", "B");
|
||
assertEquals(env["TEST_VAR"], "A");
|
||
assertNotEquals(Deno.env.get("TEST_VAR"), env["TEST_VAR"]);
|
||
});
|
||
|
||
Deno.test({ permissions: { env: true } }, function envNotFound() {
|
||
const r = Deno.env.get("env_var_does_not_exist!");
|
||
assertEquals(r, undefined);
|
||
});
|
||
|
||
Deno.test({ permissions: { env: true } }, function deleteEnv() {
|
||
Deno.env.set("TEST_VAR", "A");
|
||
assertEquals(Deno.env.get("TEST_VAR"), "A");
|
||
assertEquals(Deno.env.delete("TEST_VAR"), undefined);
|
||
assertEquals(Deno.env.get("TEST_VAR"), undefined);
|
||
});
|
||
|
||
Deno.test({ permissions: { env: true } }, function avoidEmptyNamedEnv() {
|
||
assertThrows(() => Deno.env.set("", "v"), TypeError);
|
||
assertThrows(() => Deno.env.set("a=a", "v"), TypeError);
|
||
assertThrows(() => Deno.env.set("a\0a", "v"), TypeError);
|
||
assertThrows(() => Deno.env.set("TEST_VAR", "v\0v"), TypeError);
|
||
|
||
assertThrows(() => Deno.env.get(""), TypeError);
|
||
assertThrows(() => Deno.env.get("a=a"), TypeError);
|
||
assertThrows(() => Deno.env.get("a\0a"), TypeError);
|
||
|
||
assertThrows(() => Deno.env.delete(""), TypeError);
|
||
assertThrows(() => Deno.env.delete("a=a"), TypeError);
|
||
assertThrows(() => Deno.env.delete("a\0a"), TypeError);
|
||
});
|
||
|
||
Deno.test({ permissions: { env: false } }, function envPermissionDenied1() {
|
||
assertThrows(() => {
|
||
Deno.env.toObject();
|
||
}, Deno.errors.PermissionDenied);
|
||
});
|
||
|
||
Deno.test({ permissions: { env: false } }, function envPermissionDenied2() {
|
||
assertThrows(() => {
|
||
Deno.env.get("PATH");
|
||
}, Deno.errors.PermissionDenied);
|
||
});
|
||
|
||
// This test verifies that on Windows, environment variables are
|
||
// case-insensitive. Case normalization needs be done using the collation
|
||
// that Windows uses, rather than naively using String.toLowerCase().
|
||
Deno.test(
|
||
{
|
||
ignore: Deno.build.os !== "windows",
|
||
permissions: { read: true, env: true, run: true },
|
||
},
|
||
async function envCaseInsensitive() {
|
||
// Utility function that runs a Deno subprocess with the environment
|
||
// specified in `inputEnv`. The subprocess reads the environment variables
|
||
// which are in the keys of `expectedEnv` and writes them to stdout as JSON.
|
||
// It is then verified that these match with the values of `expectedEnv`.
|
||
const checkChildEnv = async (
|
||
inputEnv: Record<string, string>,
|
||
expectedEnv: Record<string, string>,
|
||
) => {
|
||
const src = `
|
||
console.log(
|
||
${JSON.stringify(Object.keys(expectedEnv))}.map(k => Deno.env.get(k))
|
||
)`;
|
||
const { success, stdout } = await Deno.spawn(Deno.execPath(), {
|
||
args: ["eval", src],
|
||
env: { ...inputEnv, NO_COLOR: "1" },
|
||
});
|
||
assertEquals(success, true);
|
||
const expectedValues = Object.values(expectedEnv);
|
||
const actualValues = JSON.parse(new TextDecoder().decode(stdout));
|
||
assertEquals(actualValues, expectedValues);
|
||
};
|
||
|
||
assertEquals(Deno.env.get("path"), Deno.env.get("PATH"));
|
||
assertEquals(Deno.env.get("Path"), Deno.env.get("PATH"));
|
||
|
||
// Check 'foo', 'Foo' and 'Foo' are case folded.
|
||
await checkChildEnv({ foo: "X" }, { foo: "X", Foo: "X", FOO: "X" });
|
||
|
||
// Check that 'µ' and 'Μ' are not case folded.
|
||
const lc1 = "µ";
|
||
const uc1 = lc1.toUpperCase();
|
||
assertNotEquals(lc1, uc1);
|
||
await checkChildEnv(
|
||
{ [lc1]: "mu", [uc1]: "MU" },
|
||
{ [lc1]: "mu", [uc1]: "MU" },
|
||
);
|
||
|
||
// Check that 'dž' and 'DŽ' are folded, but 'Dž' is preserved.
|
||
const c2 = "Dž";
|
||
const lc2 = c2.toLowerCase();
|
||
const uc2 = c2.toUpperCase();
|
||
assertNotEquals(c2, lc2);
|
||
assertNotEquals(c2, uc2);
|
||
await checkChildEnv(
|
||
{ [c2]: "Dz", [lc2]: "dz" },
|
||
{ [c2]: "Dz", [lc2]: "dz", [uc2]: "dz" },
|
||
);
|
||
await checkChildEnv(
|
||
{ [c2]: "Dz", [uc2]: "DZ" },
|
||
{ [c2]: "Dz", [uc2]: "DZ", [lc2]: "DZ" },
|
||
);
|
||
},
|
||
);
|
||
|
||
Deno.test(function osPid() {
|
||
assert(Deno.pid > 0);
|
||
});
|
||
|
||
Deno.test(function osPpid() {
|
||
assert(Deno.ppid > 0);
|
||
});
|
||
|
||
Deno.test(
|
||
{ permissions: { run: true, read: true } },
|
||
async function osPpidIsEqualToPidOfParentProcess() {
|
||
const decoder = new TextDecoder();
|
||
const { stdout } = await Deno.spawn(Deno.execPath(), {
|
||
args: ["eval", "-p", "--unstable", "Deno.ppid"],
|
||
env: { NO_COLOR: "true" },
|
||
});
|
||
|
||
const expected = Deno.pid;
|
||
const actual = parseInt(decoder.decode(stdout));
|
||
assertEquals(actual, expected);
|
||
},
|
||
);
|
||
|
||
Deno.test({ permissions: { read: true } }, function execPath() {
|
||
assertNotEquals(Deno.execPath(), "");
|
||
});
|
||
|
||
Deno.test({ permissions: { read: false } }, function execPathPerm() {
|
||
assertThrows(
|
||
() => {
|
||
Deno.execPath();
|
||
},
|
||
Deno.errors.PermissionDenied,
|
||
"Requires read access to <exec_path>, run again with the --allow-read flag",
|
||
);
|
||
});
|
||
|
||
Deno.test({ permissions: { env: true } }, function loadavgSuccess() {
|
||
const load = Deno.loadavg();
|
||
assertEquals(load.length, 3);
|
||
});
|
||
|
||
Deno.test({ permissions: { env: false } }, function loadavgPerm() {
|
||
assertThrows(() => {
|
||
Deno.loadavg();
|
||
}, Deno.errors.PermissionDenied);
|
||
});
|
||
|
||
Deno.test({ permissions: { env: true } }, function hostnameDir() {
|
||
assertNotEquals(Deno.hostname(), "");
|
||
});
|
||
|
||
Deno.test({ permissions: { env: false } }, function hostnamePerm() {
|
||
assertThrows(() => {
|
||
Deno.hostname();
|
||
}, Deno.errors.PermissionDenied);
|
||
});
|
||
|
||
Deno.test({ permissions: { env: true } }, function releaseDir() {
|
||
assertNotEquals(Deno.osRelease(), "");
|
||
});
|
||
|
||
Deno.test({ permissions: { env: false } }, function releasePerm() {
|
||
assertThrows(() => {
|
||
Deno.osRelease();
|
||
}, Deno.errors.PermissionDenied);
|
||
});
|
||
|
||
Deno.test({ permissions: { env: true } }, function systemMemoryInfo() {
|
||
const info = Deno.systemMemoryInfo();
|
||
assert(info.total >= 0);
|
||
assert(info.free >= 0);
|
||
assert(info.available >= 0);
|
||
assert(info.buffers >= 0);
|
||
assert(info.cached >= 0);
|
||
assert(info.swapTotal >= 0);
|
||
assert(info.swapFree >= 0);
|
||
});
|
||
|
||
Deno.test({ permissions: { env: true } }, function getUid() {
|
||
if (Deno.build.os === "windows") {
|
||
assertEquals(Deno.getUid(), null);
|
||
} else {
|
||
const uid = Deno.getUid();
|
||
assert(typeof uid === "number");
|
||
assert(uid > 0);
|
||
}
|
||
});
|
||
|
||
Deno.test({ permissions: { env: true } }, function getGid() {
|
||
if (Deno.build.os === "windows") {
|
||
assertEquals(Deno.getGid(), null);
|
||
} else {
|
||
const gid = Deno.getGid();
|
||
assert(typeof gid === "number");
|
||
assert(gid > 0);
|
||
}
|
||
});
|