mirror of
https://github.com/denoland/deno.git
synced 2024-11-21 15:04:11 -05:00
251840a60d
A test is going to fail on windows (I'm not on a windows machine atm, so running the CI to see what fails) Closes #26080
5179 lines
153 KiB
Rust
5179 lines
153 KiB
Rust
// Copyright 2018-2024 the Deno authors. All rights reserved. MIT license.
|
|
|
|
use std::io::BufReader;
|
|
use std::io::Cursor;
|
|
use std::io::Read;
|
|
use std::io::Write;
|
|
use std::process::Command;
|
|
use std::process::Stdio;
|
|
use std::sync::Arc;
|
|
|
|
use bytes::Bytes;
|
|
use deno_core::serde_json::json;
|
|
use deno_core::url;
|
|
|
|
use deno_tls::rustls;
|
|
use deno_tls::rustls::ClientConnection;
|
|
use deno_tls::rustls_pemfile;
|
|
use deno_tls::TlsStream;
|
|
use pretty_assertions::assert_eq;
|
|
use test_util as util;
|
|
use test_util::itest;
|
|
use test_util::TempDir;
|
|
use trust_dns_client::serialize::txt::Lexer;
|
|
use trust_dns_client::serialize::txt::Parser;
|
|
use util::assert_contains;
|
|
use util::assert_not_contains;
|
|
use util::env_vars_for_npm_tests;
|
|
use util::PathRef;
|
|
use util::TestContext;
|
|
use util::TestContextBuilder;
|
|
|
|
const CODE_CACHE_DB_FILE_NAME: &str = "v8_code_cache_v2";
|
|
|
|
itest!(stdout_write_all {
|
|
args: "run --quiet run/stdout_write_all.ts",
|
|
output: "run/stdout_write_all.out",
|
|
});
|
|
|
|
itest!(stdin_read_all {
|
|
args: "run --quiet run/stdin_read_all.ts",
|
|
output: "run/stdin_read_all.out",
|
|
input: Some("01234567890123456789012345678901234567890123456789"),
|
|
});
|
|
|
|
itest!(stdout_write_sync_async {
|
|
args: "run --quiet run/stdout_write_sync_async.ts",
|
|
output: "run/stdout_write_sync_async.out",
|
|
});
|
|
|
|
itest!(_001_hello {
|
|
args: "run --reload run/001_hello.js",
|
|
output: "run/001_hello.js.out",
|
|
});
|
|
|
|
itest!(_002_hello {
|
|
args: "run --quiet --reload run/002_hello.ts",
|
|
output: "run/002_hello.ts.out",
|
|
});
|
|
|
|
itest!(_003_relative_import {
|
|
args: "run --quiet --reload run/003_relative_import.ts",
|
|
output: "run/003_relative_import.ts.out",
|
|
});
|
|
|
|
itest!(_004_set_timeout {
|
|
args: "run --quiet --reload run/004_set_timeout.ts",
|
|
output: "run/004_set_timeout.ts.out",
|
|
});
|
|
|
|
itest!(_005_more_imports {
|
|
args: "run --quiet --reload run/005_more_imports.ts",
|
|
output: "run/005_more_imports.ts.out",
|
|
});
|
|
|
|
itest!(_006_url_imports {
|
|
args: "run --quiet --reload --allow-import run/006_url_imports.ts",
|
|
output: "run/006_url_imports.ts.out",
|
|
http_server: true,
|
|
});
|
|
|
|
itest!(_012_async {
|
|
args: "run --quiet --reload run/012_async.ts",
|
|
output: "run/012_async.ts.out",
|
|
});
|
|
|
|
itest!(_013_dynamic_import {
|
|
args: "run --quiet --reload --allow-read run/013_dynamic_import.ts",
|
|
output: "run/013_dynamic_import.ts.out",
|
|
});
|
|
|
|
itest!(_014_duplicate_import {
|
|
args: "run --quiet --reload --allow-read run/014_duplicate_import.ts ",
|
|
output: "run/014_duplicate_import.ts.out",
|
|
});
|
|
|
|
itest!(_015_duplicate_parallel_import {
|
|
args:
|
|
"run --quiet --reload --allow-read run/015_duplicate_parallel_import.js",
|
|
output: "run/015_duplicate_parallel_import.js.out",
|
|
});
|
|
|
|
itest!(_016_double_await {
|
|
args: "run --quiet --allow-read --reload run/016_double_await.ts",
|
|
output: "run/016_double_await.ts.out",
|
|
});
|
|
|
|
itest!(_017_import_redirect {
|
|
args: "run --quiet --allow-import --reload run/017_import_redirect.ts",
|
|
output: "run/017_import_redirect.ts.out",
|
|
});
|
|
|
|
itest!(_017_import_redirect_check {
|
|
args:
|
|
"run --quiet --allow-import --reload --check run/017_import_redirect.ts",
|
|
output: "run/017_import_redirect.ts.out",
|
|
});
|
|
|
|
itest!(_017_import_redirect_vendor_dir {
|
|
args:
|
|
"run --quiet --allow-import --reload --vendor --check $TESTDATA/run/017_import_redirect.ts",
|
|
output: "run/017_import_redirect.ts.out",
|
|
temp_cwd: true,
|
|
});
|
|
|
|
itest!(_017_import_redirect_info {
|
|
args: "info --quiet --allow-import --reload run/017_import_redirect.ts",
|
|
output: "run/017_import_redirect_info.out",
|
|
});
|
|
|
|
itest!(_018_async_catch {
|
|
args: "run --quiet --reload run/018_async_catch.ts",
|
|
output: "run/018_async_catch.ts.out",
|
|
});
|
|
|
|
itest!(_019_media_types {
|
|
args: "run --reload --allow-import run/019_media_types.ts",
|
|
output: "run/019_media_types.ts.out",
|
|
http_server: true,
|
|
});
|
|
|
|
itest!(_020_json_modules {
|
|
args: "run --reload run/020_json_modules.ts",
|
|
output: "run/020_json_modules.ts.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
itest!(_021_mjs_modules {
|
|
args: "run --quiet --reload run/021_mjs_modules.ts",
|
|
output: "run/021_mjs_modules.ts.out",
|
|
});
|
|
|
|
itest!(_025_reload_js_type_error {
|
|
args: "run --quiet --reload run/025_reload_js_type_error.js",
|
|
output: "run/025_reload_js_type_error.js.out",
|
|
});
|
|
|
|
itest!(_027_redirect_typescript {
|
|
args: "run --quiet --reload --allow-import run/027_redirect_typescript.ts",
|
|
output: "run/027_redirect_typescript.ts.out",
|
|
http_server: true,
|
|
});
|
|
|
|
itest!(_027_redirect_typescript_vendor_dir {
|
|
args:
|
|
"run --quiet --reload --vendor --allow-import $TESTDATA/run/027_redirect_typescript.ts",
|
|
output: "run/027_redirect_typescript.ts.out",
|
|
http_server: true,
|
|
temp_cwd: true,
|
|
});
|
|
|
|
itest!(_028_args {
|
|
args:
|
|
"run --quiet --reload run/028_args.ts --arg1 val1 --arg2=val2 -- arg3 arg4",
|
|
output: "run/028_args.ts.out",
|
|
});
|
|
|
|
itest!(_033_import_map_remote {
|
|
args:
|
|
"run --quiet --reload --allow-import --import-map=http://127.0.0.1:4545/import_maps/import_map_remote.json import_maps/test_remote.ts",
|
|
output: "run/033_import_map_remote.out",
|
|
http_server: true,
|
|
});
|
|
|
|
itest!(_033_import_map_vendor_dir_remote {
|
|
args:
|
|
"run --quiet --reload --allow-import --import-map=http://127.0.0.1:4545/import_maps/import_map_remote.json --vendor $TESTDATA/import_maps/test_remote.ts",
|
|
output: "run/033_import_map_remote.out",
|
|
http_server: true,
|
|
temp_cwd: true,
|
|
});
|
|
|
|
itest!(_033_import_map_data_uri {
|
|
args:
|
|
"run --quiet --reload --allow-import --import-map=data:application/json;charset=utf-8;base64,ewogICJpbXBvcnRzIjogewogICAgInRlc3Rfc2VydmVyLyI6ICJodHRwOi8vbG9jYWxob3N0OjQ1NDUvIgogIH0KfQ== run/import_maps/test_data.ts",
|
|
output: "run/import_maps/test_data.ts.out",
|
|
http_server: true,
|
|
});
|
|
|
|
itest!(onload {
|
|
args: "run --quiet --reload --config ../config/deno.json run/onload/main.ts",
|
|
output: "run/onload/main.out",
|
|
});
|
|
|
|
itest!(_035_cached_only_flag {
|
|
args: "run --reload --check --allow-import --cached-only http://127.0.0.1:4545/run/019_media_types.ts",
|
|
output: "run/035_cached_only_flag.out",
|
|
exit_code: 1,
|
|
http_server: true,
|
|
});
|
|
|
|
itest!(_038_checkjs {
|
|
// checking if JS file is run through TS compiler
|
|
args:
|
|
"run --reload --config run/checkjs.tsconfig.json --check run/038_checkjs.js",
|
|
exit_code: 1,
|
|
output: "run/038_checkjs.js.out",
|
|
});
|
|
|
|
itest!(_042_dyn_import_evalcontext {
|
|
args: "run --quiet --allow-read --reload run/042_dyn_import_evalcontext.ts",
|
|
output: "run/042_dyn_import_evalcontext.ts.out",
|
|
});
|
|
|
|
itest!(_044_bad_resource {
|
|
args: "run --quiet --reload --allow-read run/044_bad_resource.ts",
|
|
output: "run/044_bad_resource.ts.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
itest!(_046_tsx {
|
|
args: "run --quiet --reload run/046_jsx_test.tsx",
|
|
output: "run/046_jsx_test.tsx.out",
|
|
});
|
|
|
|
itest!(_047_jsx {
|
|
args: "run --quiet --reload run/047_jsx_test.jsx",
|
|
output: "run/047_jsx_test.jsx.out",
|
|
});
|
|
|
|
itest!(_048_media_types_jsx {
|
|
args: "run --reload --allow-import run/048_media_types_jsx.ts",
|
|
output: "run/048_media_types_jsx.ts.out",
|
|
http_server: true,
|
|
});
|
|
|
|
itest!(_052_no_remote_flag {
|
|
args:
|
|
"run --reload --check --allow-import --no-remote http://127.0.0.1:4545/run/019_media_types.ts",
|
|
output: "run/052_no_remote_flag.out",
|
|
exit_code: 1,
|
|
http_server: true,
|
|
});
|
|
|
|
itest!(_058_tasks_microtasks_close {
|
|
args: "run --quiet run/058_tasks_microtasks_close.ts",
|
|
output: "run/058_tasks_microtasks_close.ts.out",
|
|
});
|
|
|
|
itest!(_059_fs_relative_path_perm {
|
|
args: "run run/059_fs_relative_path_perm.ts",
|
|
output: "run/059_fs_relative_path_perm.ts.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
itest!(_070_location {
|
|
args: "run --location https://foo/bar?baz#bat run/070_location.ts",
|
|
output: "run/070_location.ts.out",
|
|
});
|
|
|
|
itest!(_071_location_unset {
|
|
args: "run run/071_location_unset.ts",
|
|
output: "run/071_location_unset.ts.out",
|
|
});
|
|
|
|
itest!(_072_location_relative_fetch {
|
|
args: "run --location http://127.0.0.1:4545/ --allow-net run/072_location_relative_fetch.ts",
|
|
output: "run/072_location_relative_fetch.ts.out",
|
|
http_server: true,
|
|
});
|
|
|
|
// tests the beforeunload event
|
|
itest!(beforeunload_event {
|
|
args: "run run/before_unload.js",
|
|
output: "run/before_unload.js.out",
|
|
});
|
|
|
|
// tests the serialization of webstorage (both localStorage and sessionStorage)
|
|
itest!(webstorage_serialization {
|
|
args: "run run/webstorage/serialization.ts",
|
|
output: "run/webstorage/serialization.ts.out",
|
|
});
|
|
|
|
// tests to ensure that when `--location` is set, all code shares the same
|
|
// localStorage cache based on the origin of the location URL.
|
|
#[test]
|
|
fn webstorage_location_shares_origin() {
|
|
let deno_dir = util::new_deno_dir();
|
|
|
|
let output = util::deno_cmd_with_deno_dir(&deno_dir)
|
|
.current_dir(util::testdata_path())
|
|
.arg("run")
|
|
.arg("--location")
|
|
.arg("https://example.com/a.ts")
|
|
.arg("run/webstorage/fixture.ts")
|
|
.stdout(Stdio::piped())
|
|
.spawn()
|
|
.unwrap()
|
|
.wait_with_output()
|
|
.unwrap();
|
|
assert!(output.status.success());
|
|
assert_eq!(output.stdout, b"Storage { length: 0 }\n");
|
|
|
|
let output = util::deno_cmd_with_deno_dir(&deno_dir)
|
|
.current_dir(util::testdata_path())
|
|
.arg("run")
|
|
.arg("--location")
|
|
.arg("https://example.com/b.ts")
|
|
.arg("run/webstorage/logger.ts")
|
|
.stdout(Stdio::piped())
|
|
.spawn()
|
|
.unwrap()
|
|
.wait_with_output()
|
|
.unwrap();
|
|
assert!(output.status.success());
|
|
assert_eq!(output.stdout, b"Storage { hello: \"deno\", length: 1 }\n");
|
|
}
|
|
|
|
// test to ensure that when a --config file is set, but no --location, that
|
|
// storage persists against unique configuration files.
|
|
#[test]
|
|
fn webstorage_config_file() {
|
|
let context = TestContext::default();
|
|
|
|
context
|
|
.new_command()
|
|
.args(
|
|
"run --config run/webstorage/config_a.jsonc run/webstorage/fixture.ts",
|
|
)
|
|
.run()
|
|
.assert_matches_text("Storage { length: 0 }\n");
|
|
|
|
context
|
|
.new_command()
|
|
.args("run --config run/webstorage/config_b.jsonc run/webstorage/logger.ts")
|
|
.run()
|
|
.assert_matches_text("Storage { length: 0 }\n");
|
|
|
|
context
|
|
.new_command()
|
|
.args("run --config run/webstorage/config_a.jsonc run/webstorage/logger.ts")
|
|
.run()
|
|
.assert_matches_text("Storage { hello: \"deno\", length: 1 }\n");
|
|
}
|
|
|
|
// tests to ensure `--config` does not effect persisted storage when a
|
|
// `--location` is provided.
|
|
#[test]
|
|
fn webstorage_location_precedes_config() {
|
|
let context = TestContext::default();
|
|
|
|
context.new_command()
|
|
.args("run --location https://example.com/a.ts --config run/webstorage/config_a.jsonc run/webstorage/fixture.ts")
|
|
.run()
|
|
.assert_matches_text("Storage { length: 0 }\n");
|
|
|
|
context.new_command()
|
|
.args("run --location https://example.com/b.ts --config run/webstorage/config_b.jsonc run/webstorage/logger.ts")
|
|
.run()
|
|
.assert_matches_text("Storage { hello: \"deno\", length: 1 }\n");
|
|
}
|
|
|
|
// test to ensure that when there isn't a configuration or location, that the
|
|
// main module is used to determine how to persist storage data.
|
|
#[test]
|
|
fn webstorage_main_module() {
|
|
let context = TestContext::default();
|
|
|
|
context
|
|
.new_command()
|
|
.args("run run/webstorage/fixture.ts")
|
|
.run()
|
|
.assert_matches_text("Storage { length: 0 }\n");
|
|
|
|
context
|
|
.new_command()
|
|
.args("run run/webstorage/logger.ts")
|
|
.run()
|
|
.assert_matches_text("Storage { length: 0 }\n");
|
|
|
|
context
|
|
.new_command()
|
|
.args("run run/webstorage/fixture.ts")
|
|
.run()
|
|
.assert_matches_text("Storage { hello: \"deno\", length: 1 }\n");
|
|
}
|
|
|
|
itest!(_075_import_local_query_hash {
|
|
args: "run run/075_import_local_query_hash.ts",
|
|
output: "run/075_import_local_query_hash.ts.out",
|
|
});
|
|
|
|
itest!(_077_fetch_empty {
|
|
args: "run -A run/077_fetch_empty.ts",
|
|
output: "run/077_fetch_empty.ts.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
itest!(_078_unload_on_exit {
|
|
args: "run run/078_unload_on_exit.ts",
|
|
output: "run/078_unload_on_exit.ts.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
itest!(_079_location_authentication {
|
|
args:
|
|
"run --location https://foo:bar@baz/qux run/079_location_authentication.ts",
|
|
output: "run/079_location_authentication.ts.out",
|
|
});
|
|
|
|
itest!(_081_location_relative_fetch_redirect {
|
|
args: "run --location http://127.0.0.1:4546/ --allow-net run/081_location_relative_fetch_redirect.ts",
|
|
output: "run/081_location_relative_fetch_redirect.ts.out",
|
|
http_server: true,
|
|
});
|
|
|
|
itest!(_082_prepare_stack_trace_throw {
|
|
args: "run run/082_prepare_stack_trace_throw.js",
|
|
output: "run/082_prepare_stack_trace_throw.js.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
#[test]
|
|
fn _083_legacy_external_source_map() {
|
|
let _g = util::http_server();
|
|
let deno_dir = TempDir::new();
|
|
let module_url = url::Url::parse(
|
|
"http://localhost:4545/run/083_legacy_external_source_map.ts",
|
|
)
|
|
.unwrap();
|
|
// Write a faulty old external source map.
|
|
let faulty_map_path = deno_dir.path().join("gen/http/localhost_PORT4545/9576bd5febd0587c5c4d88d57cb3ac8ebf2600c529142abe3baa9a751d20c334.js.map");
|
|
faulty_map_path.parent().create_dir_all();
|
|
faulty_map_path.write(r#"{\"version\":3,\"file\":\"\",\"sourceRoot\":\"\",\"sources\":[\"http://localhost:4545/083_legacy_external_source_map.ts\"],\"names\":[],\"mappings\":\";AAAA,MAAM,IAAI,KAAK,CAAC,KAAK,CAAC,CAAC\"}"#);
|
|
let output = Command::new(util::deno_exe_path())
|
|
.env("DENO_DIR", deno_dir.path())
|
|
.current_dir(util::testdata_path())
|
|
.arg("run")
|
|
.arg(module_url.to_string())
|
|
.output()
|
|
.unwrap();
|
|
// Before https://github.com/denoland/deno/issues/6965 was fixed, the faulty
|
|
// old external source map would cause a panic while formatting the error
|
|
// and the exit code would be 101. The external source map should be ignored
|
|
// in favor of the inline one.
|
|
assert_eq!(output.status.code(), Some(1));
|
|
let out = std::str::from_utf8(&output.stdout).unwrap();
|
|
assert_eq!(out, "");
|
|
}
|
|
|
|
itest!(dynamic_import_async_error {
|
|
args: "run --allow-read run/dynamic_import_async_error/main.ts",
|
|
output: "run/dynamic_import_async_error/main.out",
|
|
});
|
|
|
|
itest!(dynamic_import_already_rejected {
|
|
args: "run --allow-read run/dynamic_import_already_rejected/main.ts",
|
|
output: "run/dynamic_import_already_rejected/main.out",
|
|
});
|
|
|
|
itest!(dynamic_import_concurrent_non_statically_analyzable {
|
|
args: "run --allow-import --allow-read --allow-net --quiet run/dynamic_import_concurrent_non_statically_analyzable/main.ts",
|
|
output: "run/dynamic_import_concurrent_non_statically_analyzable/main.out",
|
|
http_server: true,
|
|
});
|
|
|
|
itest!(_088_dynamic_import_already_evaluating {
|
|
args: "run --allow-read run/088_dynamic_import_already_evaluating.ts",
|
|
output: "run/088_dynamic_import_already_evaluating.ts.out",
|
|
});
|
|
|
|
itest!(_089_run_allow_list {
|
|
args: "run --allow-run=curl run/089_run_allow_list.ts",
|
|
envs: vec![
|
|
("LD_LIBRARY_PATH".to_string(), "".to_string()),
|
|
("DYLD_FALLBACK_LIBRARY_PATH".to_string(), "".to_string())
|
|
],
|
|
output: "run/089_run_allow_list.ts.out",
|
|
});
|
|
|
|
#[test]
|
|
fn _090_run_permissions_request() {
|
|
TestContext::default()
|
|
.new_command()
|
|
.args_vec(["run", "--quiet", "run/090_run_permissions_request.ts"])
|
|
.with_pty(|mut console| {
|
|
console.expect(concat!(
|
|
"┏ ⚠️ Deno requests run access to \"ls\".\r\n",
|
|
"┠─ Requested by `Deno.permissions.request()` API.\r\n",
|
|
"┠─ Learn more at: https://docs.deno.com/go/--allow-run\r\n",
|
|
"┠─ Run again with --allow-run to bypass this prompt.\r\n",
|
|
"┗ Allow? [y/n/A] (y = yes, allow; n = no, deny; A = allow all run permissions)",
|
|
));
|
|
console.human_delay();
|
|
console.write_line_raw("y");
|
|
console.expect("Granted run access to \"ls\".");
|
|
console.expect(concat!(
|
|
"┏ ⚠️ Deno requests run access to \"cat\".\r\n",
|
|
"┠─ Requested by `Deno.permissions.request()` API.\r\n",
|
|
"┠─ Learn more at: https://docs.deno.com/go/--allow-run\r\n",
|
|
"┠─ Run again with --allow-run to bypass this prompt.\r\n",
|
|
"┗ Allow? [y/n/A] (y = yes, allow; n = no, deny; A = allow all run permissions)",
|
|
));
|
|
console.human_delay();
|
|
console.write_line_raw("n");
|
|
console.expect("Denied run access to \"cat\".");
|
|
console.expect("granted");
|
|
console.expect("denied");
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn _090_run_permissions_request_sync() {
|
|
TestContext::default()
|
|
.new_command()
|
|
.args_vec(["run", "--quiet", "run/090_run_permissions_request_sync.ts"])
|
|
.with_pty(|mut console| {
|
|
console.expect(concat!(
|
|
"┏ ⚠️ Deno requests run access to \"ls\".\r\n",
|
|
"┠─ Requested by `Deno.permissions.request()` API.\r\n",
|
|
"┠─ Learn more at: https://docs.deno.com/go/--allow-run\r\n",
|
|
"┠─ Run again with --allow-run to bypass this prompt.\r\n",
|
|
"┗ Allow? [y/n/A] (y = yes, allow; n = no, deny; A = allow all run permissions)",
|
|
));
|
|
console.human_delay();
|
|
console.write_line_raw("y");
|
|
console.expect("Granted run access to \"ls\".");
|
|
console.expect(concat!(
|
|
"┏ ⚠️ Deno requests run access to \"cat\".\r\n",
|
|
"┠─ Requested by `Deno.permissions.request()` API.\r\n",
|
|
"┠─ Learn more at: https://docs.deno.com/go/--allow-run\r\n",
|
|
"┠─ Run again with --allow-run to bypass this prompt.\r\n",
|
|
"┗ Allow? [y/n/A] (y = yes, allow; n = no, deny; A = allow all run permissions)",
|
|
));
|
|
console.human_delay();
|
|
console.write_line_raw("n");
|
|
console.expect("Denied run access to \"cat\".");
|
|
console.expect("granted");
|
|
console.expect("denied");
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn permissions_prompt_allow_all() {
|
|
TestContext::default()
|
|
.new_command()
|
|
.args_vec(["run", "--quiet", "run/permissions_prompt_allow_all.ts"])
|
|
.with_pty(|mut console| {
|
|
// "run" permissions
|
|
console.expect(concat!(
|
|
"┏ ⚠️ Deno requests run access to \"FOO\".\r\n",
|
|
"┠─ Requested by `Deno.permissions.request()` API.\r\n",
|
|
"┠─ Learn more at: https://docs.deno.com/go/--allow-run\r\n",
|
|
"┠─ Run again with --allow-run to bypass this prompt.\r\n",
|
|
"┗ Allow? [y/n/A] (y = yes, allow; n = no, deny; A = allow all run permissions)",
|
|
));
|
|
console.human_delay();
|
|
console.write_line_raw("A");
|
|
console.expect("✅ Granted all run access.");
|
|
// "read" permissions
|
|
console.expect(concat!(
|
|
"┏ ⚠️ Deno requests read access to \"FOO\".\r\n",
|
|
"┠─ Requested by `Deno.permissions.request()` API.\r\n",
|
|
"┠─ Learn more at: https://docs.deno.com/go/--allow-read\r\n",
|
|
"┠─ Run again with --allow-read to bypass this prompt.\r\n",
|
|
"┗ Allow? [y/n/A] (y = yes, allow; n = no, deny; A = allow all read permissions)",
|
|
));
|
|
console.human_delay();
|
|
console.write_line_raw("A");
|
|
console.expect("✅ Granted all read access.");
|
|
// "write" permissions
|
|
console.expect(concat!(
|
|
"┏ ⚠️ Deno requests write access to \"FOO\".\r\n",
|
|
"┠─ Requested by `Deno.permissions.request()` API.\r\n",
|
|
"┠─ Learn more at: https://docs.deno.com/go/--allow-write\r\n",
|
|
"┠─ Run again with --allow-write to bypass this prompt.\r\n",
|
|
"┗ Allow? [y/n/A] (y = yes, allow; n = no, deny; A = allow all write permissions)",
|
|
));
|
|
console.human_delay();
|
|
console.write_line_raw("A");
|
|
console.expect("✅ Granted all write access.");
|
|
// "net" permissions
|
|
console.expect(concat!(
|
|
"┏ ⚠️ Deno requests net access to \"foo\".\r\n",
|
|
"┠─ Requested by `Deno.permissions.request()` API.\r\n",
|
|
"┠─ Learn more at: https://docs.deno.com/go/--allow-net\r\n",
|
|
"┠─ Run again with --allow-net to bypass this prompt.\r\n",
|
|
"┗ Allow? [y/n/A] (y = yes, allow; n = no, deny; A = allow all net permissions)",
|
|
));
|
|
console.human_delay();
|
|
console.write_line_raw("A");
|
|
console.expect("✅ Granted all net access.");
|
|
// "env" permissions
|
|
console.expect(concat!(
|
|
"┏ ⚠️ Deno requests env access to \"FOO\".\r\n",
|
|
"┠─ Requested by `Deno.permissions.request()` API.\r\n",
|
|
"┠─ Learn more at: https://docs.deno.com/go/--allow-env\r\n",
|
|
"┠─ Run again with --allow-env to bypass this prompt.\r\n",
|
|
"┗ Allow? [y/n/A] (y = yes, allow; n = no, deny; A = allow all env permissions)",
|
|
));
|
|
console.human_delay();
|
|
console.write_line_raw("A");
|
|
console.expect("✅ Granted all env access.");
|
|
// "sys" permissions
|
|
console.expect(concat!(
|
|
"┏ ⚠️ Deno requests sys access to \"loadavg\".\r\n",
|
|
"┠─ Requested by `Deno.permissions.request()` API.\r\n",
|
|
"┠─ Learn more at: https://docs.deno.com/go/--allow-sys\r\n",
|
|
"┠─ Run again with --allow-sys to bypass this prompt.\r\n",
|
|
"┗ Allow? [y/n/A] (y = yes, allow; n = no, deny; A = allow all sys permissions)",
|
|
));
|
|
console.human_delay();
|
|
console.write_line_raw("A");
|
|
console.expect("✅ Granted all sys access.");
|
|
// "ffi" permissions
|
|
console.expect(concat!(
|
|
"┏ ⚠️ Deno requests ffi access to \"FOO\".\r\n",
|
|
"┠─ Requested by `Deno.permissions.request()` API.\r\n",
|
|
"┠─ Learn more at: https://docs.deno.com/go/--allow-ffi\r\n",
|
|
"┠─ Run again with --allow-ffi to bypass this prompt.\r\n",
|
|
"┗ Allow? [y/n/A] (y = yes, allow; n = no, deny; A = allow all ffi permissions)",
|
|
));
|
|
console.human_delay();
|
|
console.write_line_raw("A");
|
|
console.expect("✅ Granted all ffi access.")
|
|
},
|
|
);
|
|
}
|
|
|
|
#[test]
|
|
fn permissions_prompt_allow_all_2() {
|
|
TestContext::default()
|
|
.new_command()
|
|
.args_vec(["run", "--quiet", "run/permissions_prompt_allow_all_2.ts"])
|
|
.with_pty(|mut console| {
|
|
// "env" permissions
|
|
console.expect(concat!(
|
|
"┏ ⚠️ Deno requests env access to \"FOO\".\r\n",
|
|
"┠─ Learn more at: https://docs.deno.com/go/--allow-env\r\n",
|
|
"┠─ Run again with --allow-env to bypass this prompt.\r\n",
|
|
"┗ Allow? [y/n/A] (y = yes, allow; n = no, deny; A = allow all env permissions)",
|
|
));
|
|
console.human_delay();
|
|
console.write_line_raw("A");
|
|
console.expect("✅ Granted all env access.");
|
|
|
|
// "sys" permissions
|
|
console.expect(concat!(
|
|
"┏ ⚠️ Deno requests sys access to \"loadavg\".\r\n",
|
|
"┠─ Requested by `Deno.loadavg()` API.\r\n",
|
|
"┠─ Learn more at: https://docs.deno.com/go/--allow-sys\r\n",
|
|
"┠─ Run again with --allow-sys to bypass this prompt.\r\n",
|
|
"┗ Allow? [y/n/A] (y = yes, allow; n = no, deny; A = allow all sys permissions)",
|
|
));
|
|
console.human_delay();
|
|
console.write_line_raw("A");
|
|
console.expect("✅ Granted all sys access.");
|
|
|
|
// "read" permissions
|
|
console.expect(concat!(
|
|
"┏ ⚠️ Deno requests read access to <CWD>.\r\n",
|
|
"┠─ Requested by `Deno.cwd()` API.\r\n",
|
|
"┠─ Learn more at: https://docs.deno.com/go/--allow-read\r\n",
|
|
"┠─ Run again with --allow-read to bypass this prompt.\r\n",
|
|
"┗ Allow? [y/n/A] (y = yes, allow; n = no, deny; A = allow all read permissions)",
|
|
));
|
|
console.human_delay();
|
|
console.write_line_raw("A");
|
|
console.expect("✅ Granted all read access.");
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn permissions_prompt_allow_all_lowercase_a() {
|
|
TestContext::default()
|
|
.new_command()
|
|
.args_vec(["run", "--quiet", "run/permissions_prompt_allow_all.ts"])
|
|
.with_pty(|mut console| {
|
|
// "run" permissions
|
|
console.expect(concat!(
|
|
"┏ ⚠️ Deno requests run access to \"FOO\".\r\n",
|
|
"┠─ Requested by `Deno.permissions.request()` API.\r\n",
|
|
"┠─ Learn more at: https://docs.deno.com/go/--allow-run\r\n",
|
|
"┠─ Run again with --allow-run to bypass this prompt.\r\n",
|
|
"┗ Allow? [y/n/A] (y = yes, allow; n = no, deny; A = allow all run permissions)",
|
|
));
|
|
console.human_delay();
|
|
console.write_line_raw("a");
|
|
console.expect("Unrecognized option.");
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn permission_request_long() {
|
|
TestContext::default()
|
|
.new_command()
|
|
.args_vec(["run", "--quiet", "run/permission_request_long.ts"])
|
|
.with_pty(|mut console| {
|
|
console.expect(concat!(
|
|
"was larger than the configured maximum length (10240 bytes): denying request.\r\n",
|
|
"❌ WARNING: This may indicate that code is trying to bypass or hide permission check requests.\r\n",
|
|
"❌ Run again with --allow-read to bypass this check if this is really what you want to do.\r\n",
|
|
));
|
|
});
|
|
}
|
|
|
|
itest!(deny_all_permission_args {
|
|
args: "run --deny-env --deny-read --deny-write --deny-ffi --deny-run --deny-sys --deny-net run/deny_all_permission_args.js",
|
|
output: "run/deny_all_permission_args.out",
|
|
});
|
|
|
|
itest!(deny_some_permission_args {
|
|
args: "run --allow-env --deny-env=FOO --allow-read --deny-read=/foo --allow-write --deny-write=/foo --allow-ffi --deny-ffi=/foo --allow-run --deny-run=foo --allow-sys --deny-sys=hostname --allow-net --deny-net=127.0.0.1 run/deny_some_permission_args.js",
|
|
output: "run/deny_some_permission_args.out",
|
|
});
|
|
|
|
#[test]
|
|
fn permissions_cache() {
|
|
TestContext::default()
|
|
.new_command()
|
|
.args_vec(["run", "--quiet", "run/permissions_cache.ts"])
|
|
.with_pty(|mut console| {
|
|
console.expect(concat!(
|
|
"prompt\r\n",
|
|
"┏ ⚠️ Deno requests read access to \"foo\".\r\n",
|
|
"┠─ Requested by `Deno.permissions.request()` API.\r\n",
|
|
"┠─ Learn more at: https://docs.deno.com/go/--allow-read\r\n",
|
|
"┠─ Run again with --allow-read to bypass this prompt.\r\n",
|
|
"┗ Allow? [y/n/A] (y = yes, allow; n = no, deny; A = allow all read permissions)",
|
|
));
|
|
console.human_delay();
|
|
console.write_line_raw("y");
|
|
console.expect("✅ Granted read access to \"foo\".");
|
|
console.expect("granted");
|
|
console.expect("prompt");
|
|
});
|
|
}
|
|
|
|
itest!(env_file {
|
|
args: "run --env=env --allow-env run/env_file.ts",
|
|
output: "run/env_file.out",
|
|
});
|
|
|
|
itest!(env_file_missing {
|
|
args: "run --env=missing --allow-env run/env_file.ts",
|
|
output: "run/env_file_missing.out",
|
|
});
|
|
|
|
itest!(_091_use_define_for_class_fields {
|
|
args: "run --check run/091_use_define_for_class_fields.ts",
|
|
output: "run/091_use_define_for_class_fields.ts.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
itest!(js_import_detect {
|
|
args: "run --quiet --reload run/js_import_detect.ts",
|
|
output: "run/js_import_detect.ts.out",
|
|
exit_code: 0,
|
|
});
|
|
|
|
itest!(blob_gc_finalization {
|
|
args: "run run/blob_gc_finalization.js",
|
|
output: "run/blob_gc_finalization.js.out",
|
|
exit_code: 0,
|
|
});
|
|
|
|
itest!(fetch_response_finalization {
|
|
args:
|
|
"run --v8-flags=--expose-gc --allow-net run/fetch_response_finalization.js",
|
|
output: "run/fetch_response_finalization.js.out",
|
|
http_server: true,
|
|
exit_code: 0,
|
|
});
|
|
|
|
itest!(import_type {
|
|
args: "run --reload run/import_type.ts",
|
|
output: "run/import_type.ts.out",
|
|
});
|
|
|
|
itest!(import_type_no_check {
|
|
args: "run --reload --no-check run/import_type.ts",
|
|
output: "run/import_type.ts.out",
|
|
});
|
|
|
|
itest!(private_field_presence {
|
|
args: "run --reload run/private_field_presence.ts",
|
|
output: "run/private_field_presence.ts.out",
|
|
});
|
|
|
|
itest!(private_field_presence_no_check {
|
|
args: "run --reload --no-check run/private_field_presence.ts",
|
|
output: "run/private_field_presence.ts.out",
|
|
});
|
|
|
|
itest!(lock_write_fetch {
|
|
args:
|
|
"run --quiet --allow-import --allow-read --allow-write --allow-env --allow-run run/lock_write_fetch/main.ts",
|
|
output: "run/lock_write_fetch/main.out",
|
|
http_server: true,
|
|
exit_code: 0,
|
|
});
|
|
|
|
itest!(lock_check_ok {
|
|
args:
|
|
"run --quiet --allow-import --lock=run/lock_check_ok.json http://127.0.0.1:4545/run/003_relative_import.ts",
|
|
output: "run/003_relative_import.ts.out",
|
|
http_server: true,
|
|
});
|
|
|
|
itest!(lock_check_ok2 {
|
|
args:
|
|
"run --allow-import --lock=run/lock_check_ok2.json run/019_media_types.ts",
|
|
output: "run/019_media_types.ts.out",
|
|
http_server: true,
|
|
});
|
|
|
|
itest!(lock_v2_check_ok {
|
|
args:
|
|
"run --allow-import --quiet --lock=run/lock_v2_check_ok.json http://127.0.0.1:4545/run/003_relative_import.ts",
|
|
output: "run/003_relative_import.ts.out",
|
|
http_server: true,
|
|
});
|
|
|
|
itest!(lock_v2_check_ok2 {
|
|
args: "run --allow-import --lock=run/lock_v2_check_ok2.json run/019_media_types.ts",
|
|
output: "run/019_media_types.ts.out",
|
|
http_server: true,
|
|
});
|
|
|
|
#[test]
|
|
fn lock_redirects() {
|
|
let context = TestContextBuilder::new()
|
|
.use_temp_cwd()
|
|
.use_http_server()
|
|
.add_npm_env_vars()
|
|
.build();
|
|
let temp_dir = context.temp_dir();
|
|
temp_dir.write("deno.json", "{}"); // cause a lockfile to be created
|
|
temp_dir.write(
|
|
"main.ts",
|
|
"import 'http://localhost:4546/run/001_hello.js';",
|
|
);
|
|
context
|
|
.new_command()
|
|
.args("run --allow-import main.ts")
|
|
.run()
|
|
.skip_output_check();
|
|
let initial_lockfile_text = r#"{
|
|
"version": "4",
|
|
"redirects": {
|
|
"http://localhost:4546/run/001_hello.js": "http://localhost:4545/run/001_hello.js"
|
|
},
|
|
"remote": {
|
|
"http://localhost:4545/run/001_hello.js": "c479db5ea26965387423ca438bb977d0b4788d5901efcef52f69871e4c1048c5"
|
|
}
|
|
}
|
|
"#;
|
|
assert_eq!(temp_dir.read_to_string("deno.lock"), initial_lockfile_text);
|
|
context
|
|
.new_command()
|
|
.args("run --allow-import main.ts")
|
|
.run()
|
|
.assert_matches_text("Hello World\n");
|
|
assert_eq!(temp_dir.read_to_string("deno.lock"), initial_lockfile_text);
|
|
|
|
// now try changing where the redirect occurs in the lockfile
|
|
temp_dir.write("deno.lock", r#"{
|
|
"version": "4",
|
|
"redirects": {
|
|
"http://localhost:4546/run/001_hello.js": "http://localhost:4545/echo.ts"
|
|
},
|
|
"remote": {
|
|
"http://localhost:4545/run/001_hello.js": "c479db5ea26965387423ca438bb977d0b4788d5901efcef52f69871e4c1048c5"
|
|
}
|
|
}
|
|
"#);
|
|
|
|
// also, add some npm dependency to ensure it doesn't end up in
|
|
// the redirects as they're currently stored separately
|
|
temp_dir.write(
|
|
"main.ts",
|
|
"import 'http://localhost:4546/run/001_hello.js';\n import 'npm:@denotest/esm-basic';\n",
|
|
);
|
|
|
|
// it should use the echo script instead
|
|
context
|
|
.new_command()
|
|
.args("run --allow-import main.ts Hi there")
|
|
.run()
|
|
.assert_matches_text(concat!(
|
|
"Download http://localhost:4545/echo.ts\n",
|
|
"Download http://localhost:4260/@denotest/esm-basic\n",
|
|
"Download http://localhost:4260/@denotest/esm-basic/1.0.0.tgz\n",
|
|
"Hi, there",
|
|
));
|
|
util::assertions::assert_wildcard_match(
|
|
&temp_dir.read_to_string("deno.lock"),
|
|
r#"{
|
|
"version": "4",
|
|
"specifiers": {
|
|
"npm:@denotest/esm-basic@*": "1.0.0"
|
|
},
|
|
"npm": {
|
|
"@denotest/esm-basic@1.0.0": {
|
|
"integrity": "sha512-[WILDCARD]"
|
|
}
|
|
},
|
|
"redirects": {
|
|
"http://localhost:4546/run/001_hello.js": "http://localhost:4545/echo.ts"
|
|
},
|
|
"remote": {
|
|
"http://localhost:4545/echo.ts": "829eb4d67015a695d70b2a33c78b631b29eea1dbac491a6bfcf394af2a2671c2",
|
|
"http://localhost:4545/run/001_hello.js": "c479db5ea26965387423ca438bb977d0b4788d5901efcef52f69871e4c1048c5"
|
|
}
|
|
}
|
|
"#,
|
|
);
|
|
}
|
|
|
|
#[test]
|
|
fn lock_deno_json_package_json_deps() {
|
|
let context = TestContextBuilder::new()
|
|
.use_temp_cwd()
|
|
.use_http_server()
|
|
.add_npm_env_vars()
|
|
.add_jsr_env_vars()
|
|
.build();
|
|
let temp_dir = context.temp_dir().path();
|
|
let deno_json = temp_dir.join("deno.json");
|
|
let package_json = temp_dir.join("package.json");
|
|
|
|
// add a jsr and npm dependency
|
|
deno_json.write_json(&json!({
|
|
"nodeModulesDir": "auto",
|
|
"imports": {
|
|
"esm-basic": "npm:@denotest/esm-basic",
|
|
"module_graph": "jsr:@denotest/module-graph@1.4",
|
|
}
|
|
}));
|
|
let main_ts = temp_dir.join("main.ts");
|
|
main_ts.write("import 'esm-basic'; import 'module_graph';");
|
|
context
|
|
.new_command()
|
|
.args("cache main.ts")
|
|
.run()
|
|
.skip_output_check();
|
|
let lockfile = temp_dir.join("deno.lock");
|
|
let esm_basic_integrity =
|
|
get_lockfile_npm_package_integrity(&lockfile, "@denotest/esm-basic@1.0.0");
|
|
lockfile.assert_matches_json(json!({
|
|
"version": "4",
|
|
"specifiers": {
|
|
"jsr:@denotest/module-graph@1.4": "1.4.0",
|
|
"npm:@denotest/esm-basic@*": "1.0.0"
|
|
},
|
|
"jsr": {
|
|
"@denotest/module-graph@1.4.0": {
|
|
"integrity": "32de0973c5fa55772326fcd504a757f386d2b010db3e13e78f3bcf851e69473d"
|
|
}
|
|
},
|
|
"npm": {
|
|
"@denotest/esm-basic@1.0.0": {
|
|
"integrity": esm_basic_integrity
|
|
}
|
|
},
|
|
"workspace": {
|
|
"dependencies": [
|
|
"jsr:@denotest/module-graph@1.4",
|
|
"npm:@denotest/esm-basic@*"
|
|
]
|
|
}
|
|
}));
|
|
|
|
// now remove the npm dependency from the deno.json and move
|
|
// it to a package.json that uses an alias
|
|
deno_json.write_json(&json!({
|
|
"nodeModulesDir": "auto",
|
|
"imports": {
|
|
"module_graph": "jsr:@denotest/module-graph@1.4",
|
|
}
|
|
}));
|
|
package_json.write_json(&json!({
|
|
"dependencies": {
|
|
"esm-basic": "npm:@denotest/esm-basic"
|
|
}
|
|
}));
|
|
context
|
|
.new_command()
|
|
.args("cache main.ts")
|
|
.run()
|
|
.skip_output_check();
|
|
main_ts.write("import 'module_graph';");
|
|
context
|
|
.new_command()
|
|
// ensure this doesn't clear out packageJson below
|
|
.args("cache --no-npm main.ts")
|
|
.run()
|
|
.skip_output_check();
|
|
lockfile.assert_matches_json(json!({
|
|
"version": "4",
|
|
"specifiers": {
|
|
"jsr:@denotest/module-graph@1.4": "1.4.0",
|
|
"npm:@denotest/esm-basic@*": "1.0.0"
|
|
},
|
|
"jsr": {
|
|
"@denotest/module-graph@1.4.0": {
|
|
"integrity": "32de0973c5fa55772326fcd504a757f386d2b010db3e13e78f3bcf851e69473d"
|
|
}
|
|
},
|
|
"npm": {
|
|
"@denotest/esm-basic@1.0.0": {
|
|
"integrity": esm_basic_integrity
|
|
}
|
|
},
|
|
"workspace": {
|
|
"dependencies": [
|
|
"jsr:@denotest/module-graph@1.4"
|
|
],
|
|
"packageJson": {
|
|
"dependencies": [
|
|
"npm:@denotest/esm-basic@*"
|
|
]
|
|
}
|
|
}
|
|
}));
|
|
|
|
// now remove the package.json
|
|
package_json.remove_file();
|
|
|
|
// cache and it will remove the package.json
|
|
context
|
|
.new_command()
|
|
.args("cache main.ts")
|
|
.run()
|
|
.skip_output_check();
|
|
lockfile.assert_matches_json(json!({
|
|
"version": "4",
|
|
"specifiers": {
|
|
"jsr:@denotest/module-graph@1.4": "1.4.0",
|
|
},
|
|
"jsr": {
|
|
"@denotest/module-graph@1.4.0": {
|
|
"integrity": "32de0973c5fa55772326fcd504a757f386d2b010db3e13e78f3bcf851e69473d"
|
|
}
|
|
},
|
|
"workspace": {
|
|
"dependencies": [
|
|
"jsr:@denotest/module-graph@1.4"
|
|
]
|
|
}
|
|
}));
|
|
|
|
// now remove the deps from the deno.json
|
|
deno_json.write_json(&json!({
|
|
"nodeModulesDir": "auto"
|
|
}));
|
|
main_ts.write("");
|
|
context
|
|
.new_command()
|
|
.args("cache main.ts")
|
|
.run()
|
|
.skip_output_check();
|
|
|
|
lockfile.assert_matches_json(json!({
|
|
"version": "4"
|
|
}));
|
|
}
|
|
|
|
#[test]
|
|
fn lock_deno_json_package_json_deps_workspace() {
|
|
let context = TestContextBuilder::new()
|
|
.use_temp_cwd()
|
|
.use_http_server()
|
|
.add_npm_env_vars()
|
|
.add_jsr_env_vars()
|
|
.build();
|
|
let temp_dir = context.temp_dir().path();
|
|
|
|
// deno.json
|
|
let deno_json = temp_dir.join("deno.json");
|
|
deno_json.write_json(&json!({
|
|
"nodeModulesDir": "auto"
|
|
}));
|
|
|
|
// package.json
|
|
let package_json = temp_dir.join("package.json");
|
|
package_json.write_json(&json!({
|
|
"workspaces": ["package-a"],
|
|
"dependencies": {
|
|
"@denotest/cjs-default-export": "1"
|
|
}
|
|
}));
|
|
// main.ts
|
|
let main_ts = temp_dir.join("main.ts");
|
|
main_ts.write("import '@denotest/cjs-default-export';");
|
|
|
|
// package-a/package.json
|
|
let a_package = temp_dir.join("package-a");
|
|
a_package.create_dir_all();
|
|
let a_package_json = a_package.join("package.json");
|
|
a_package_json.write_json(&json!({
|
|
"dependencies": {
|
|
"@denotest/esm-basic": "1"
|
|
}
|
|
}));
|
|
// package-a/main.ts
|
|
let main_ts = a_package.join("main.ts");
|
|
main_ts.write("import '@denotest/esm-basic';");
|
|
context
|
|
.new_command()
|
|
.args("run package-a/main.ts")
|
|
.run()
|
|
.skip_output_check();
|
|
let lockfile = temp_dir.join("deno.lock");
|
|
let esm_basic_integrity =
|
|
get_lockfile_npm_package_integrity(&lockfile, "@denotest/esm-basic@1.0.0");
|
|
let cjs_default_export_integrity = get_lockfile_npm_package_integrity(
|
|
&lockfile,
|
|
"@denotest/cjs-default-export@1.0.0",
|
|
);
|
|
|
|
lockfile.assert_matches_json(json!({
|
|
"version": "4",
|
|
"specifiers": {
|
|
"npm:@denotest/cjs-default-export@1": "1.0.0",
|
|
"npm:@denotest/esm-basic@1": "1.0.0"
|
|
},
|
|
"npm": {
|
|
"@denotest/cjs-default-export@1.0.0": {
|
|
"integrity": cjs_default_export_integrity
|
|
},
|
|
"@denotest/esm-basic@1.0.0": {
|
|
"integrity": esm_basic_integrity
|
|
}
|
|
},
|
|
"workspace": {
|
|
"packageJson": {
|
|
"dependencies": [
|
|
"npm:@denotest/cjs-default-export@1"
|
|
]
|
|
},
|
|
"members": {
|
|
"package-a": {
|
|
"packageJson": {
|
|
"dependencies": [
|
|
"npm:@denotest/esm-basic@1"
|
|
]
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}));
|
|
|
|
// run a command that causes discovery of the root package.json beside the lockfile
|
|
context
|
|
.new_command()
|
|
.args("run main.ts")
|
|
.run()
|
|
.skip_output_check();
|
|
// now we should see the dependencies
|
|
let cjs_default_export_integrity = get_lockfile_npm_package_integrity(
|
|
&lockfile,
|
|
"@denotest/cjs-default-export@1.0.0",
|
|
);
|
|
let expected_lockfile = json!({
|
|
"version": "4",
|
|
"specifiers": {
|
|
"npm:@denotest/cjs-default-export@1": "1.0.0",
|
|
"npm:@denotest/esm-basic@1": "1.0.0"
|
|
},
|
|
"npm": {
|
|
"@denotest/cjs-default-export@1.0.0": {
|
|
"integrity": cjs_default_export_integrity
|
|
},
|
|
"@denotest/esm-basic@1.0.0": {
|
|
"integrity": esm_basic_integrity
|
|
}
|
|
},
|
|
"workspace": {
|
|
"packageJson": {
|
|
"dependencies": [
|
|
"npm:@denotest/cjs-default-export@1"
|
|
]
|
|
},
|
|
"members": {
|
|
"package-a": {
|
|
"packageJson": {
|
|
"dependencies": [
|
|
"npm:@denotest/esm-basic@1"
|
|
]
|
|
}
|
|
}
|
|
}
|
|
}
|
|
});
|
|
lockfile.assert_matches_json(expected_lockfile.clone());
|
|
|
|
// now run the command again in the package with the nested package.json
|
|
context
|
|
.new_command()
|
|
.args("run package-a/main.ts")
|
|
.run()
|
|
.skip_output_check();
|
|
// the lockfile should stay the same as the above because the package.json
|
|
// was found in a different directory
|
|
lockfile.assert_matches_json(expected_lockfile.clone());
|
|
}
|
|
|
|
fn get_lockfile_npm_package_integrity(
|
|
lockfile: &PathRef,
|
|
package_name: &str,
|
|
) -> String {
|
|
// todo(dsherret): it would be nice if the test server didn't produce
|
|
// different hashes depending on what operating system it's running on
|
|
lockfile
|
|
.read_json_value()
|
|
.get("npm")
|
|
.unwrap()
|
|
.get(package_name)
|
|
.unwrap()
|
|
.get("integrity")
|
|
.unwrap()
|
|
.as_str()
|
|
.unwrap()
|
|
.to_string()
|
|
}
|
|
|
|
itest!(mts_dmts_mjs {
|
|
args: "run subdir/import.mts",
|
|
output: "run/mts_dmts_mjs.out",
|
|
});
|
|
|
|
itest!(mts_dmts_mjs_no_check {
|
|
args: "run --no-check subdir/import.mts",
|
|
output: "run/mts_dmts_mjs.out",
|
|
});
|
|
|
|
itest!(async_error {
|
|
exit_code: 1,
|
|
args: "run --reload run/async_error.ts",
|
|
output: "run/async_error.ts.out",
|
|
});
|
|
|
|
itest!(config {
|
|
args:
|
|
"run --reload --config run/config/tsconfig.json --check run/config/main.ts",
|
|
output: "run/config/main.out",
|
|
});
|
|
|
|
itest!(config_types {
|
|
args:
|
|
"run --reload --quiet --check=all --config run/config_types/tsconfig.json run/config_types/main.ts",
|
|
output: "run/config_types/main.out",
|
|
});
|
|
|
|
itest!(config_types_remote {
|
|
http_server: true,
|
|
args: "run --allow-import --reload --quiet --check=all --config run/config_types/remote.tsconfig.json run/config_types/main.ts",
|
|
output: "run/config_types/main.out",
|
|
});
|
|
|
|
itest!(empty_typescript {
|
|
args: "run --reload --check run/empty.ts",
|
|
output_str: Some("Check file:[WILDCARD]/run/empty.ts\n"),
|
|
});
|
|
|
|
itest!(error_001 {
|
|
args: "run --reload run/error_001.ts",
|
|
exit_code: 1,
|
|
output: "run/error_001.ts.out",
|
|
});
|
|
|
|
itest!(error_002 {
|
|
args: "run --reload run/error_002.ts",
|
|
exit_code: 1,
|
|
output: "run/error_002.ts.out",
|
|
});
|
|
|
|
itest!(error_003_typescript {
|
|
args: "run --reload --check run/error_003_typescript.ts",
|
|
exit_code: 1,
|
|
output: "run/error_003_typescript.ts.out",
|
|
});
|
|
|
|
// Supposing that we've already attempted to run error_003_typescript.ts
|
|
// we want to make sure that JS wasn't emitted. Running again without reload flag
|
|
// should result in the same output.
|
|
// https://github.com/denoland/deno/issues/2436
|
|
itest!(error_003_typescript2 {
|
|
args: "run --check run/error_003_typescript.ts",
|
|
exit_code: 1,
|
|
output: "run/error_003_typescript.ts.out",
|
|
});
|
|
|
|
itest!(error_004_missing_module {
|
|
args: "run --reload run/error_004_missing_module.ts",
|
|
exit_code: 1,
|
|
output: "run/error_004_missing_module.ts.out",
|
|
});
|
|
|
|
itest!(error_005_missing_dynamic_import {
|
|
args:
|
|
"run --reload --allow-read --quiet run/error_005_missing_dynamic_import.ts",
|
|
exit_code: 1,
|
|
output: "run/error_005_missing_dynamic_import.ts.out",
|
|
});
|
|
|
|
itest!(error_006_import_ext_failure {
|
|
args: "run --reload run/error_006_import_ext_failure.ts",
|
|
exit_code: 1,
|
|
output: "run/error_006_import_ext_failure.ts.out",
|
|
});
|
|
|
|
itest!(error_007_any {
|
|
args: "run --reload run/error_007_any.ts",
|
|
exit_code: 1,
|
|
output: "run/error_007_any.ts.out",
|
|
});
|
|
|
|
itest!(error_008_checkjs {
|
|
args: "run --reload run/error_008_checkjs.js",
|
|
exit_code: 1,
|
|
output: "run/error_008_checkjs.js.out",
|
|
});
|
|
|
|
itest!(error_009_extensions_error {
|
|
args: "run run/error_009_extensions_error.js",
|
|
output: "run/error_009_extensions_error.js.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
itest!(error_011_bad_module_specifier {
|
|
args: "run --reload run/error_011_bad_module_specifier.ts",
|
|
exit_code: 1,
|
|
output: "run/error_011_bad_module_specifier.ts.out",
|
|
});
|
|
|
|
itest!(error_012_bad_dynamic_import_specifier {
|
|
args: "run --reload --check run/error_012_bad_dynamic_import_specifier.ts",
|
|
exit_code: 1,
|
|
output: "run/error_012_bad_dynamic_import_specifier.ts.out",
|
|
});
|
|
|
|
itest!(error_013_missing_script {
|
|
args: "run --reload missing_file_name",
|
|
exit_code: 1,
|
|
output: "run/error_013_missing_script.out",
|
|
});
|
|
|
|
itest!(error_014_catch_dynamic_import_error {
|
|
args:
|
|
"run --reload --allow-read run/error_014_catch_dynamic_import_error.js",
|
|
output: "run/error_014_catch_dynamic_import_error.js.out",
|
|
});
|
|
|
|
itest!(error_015_dynamic_import_permissions {
|
|
args: "run --reload --quiet run/error_015_dynamic_import_permissions.js",
|
|
output: "run/error_015_dynamic_import_permissions.out",
|
|
exit_code: 1,
|
|
http_server: true,
|
|
});
|
|
|
|
// We have an allow-import flag but not allow-read, it should still result in error.
|
|
itest!(error_016_dynamic_import_permissions2 {
|
|
args:
|
|
"run --reload --allow-import run/error_016_dynamic_import_permissions2.js",
|
|
output: "run/error_016_dynamic_import_permissions2.out",
|
|
exit_code: 1,
|
|
http_server: true,
|
|
});
|
|
|
|
itest!(error_017_hide_long_source_ts {
|
|
args: "run --reload --check run/error_017_hide_long_source_ts.ts",
|
|
output: "run/error_017_hide_long_source_ts.ts.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
itest!(error_018_hide_long_source_js {
|
|
args: "run run/error_018_hide_long_source_js.js",
|
|
output: "run/error_018_hide_long_source_js.js.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
itest!(error_019_stack_function {
|
|
args: "run run/error_019_stack_function.ts",
|
|
output: "run/error_019_stack_function.ts.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
itest!(error_020_stack_constructor {
|
|
args: "run run/error_020_stack_constructor.ts",
|
|
output: "run/error_020_stack_constructor.ts.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
itest!(error_021_stack_method {
|
|
args: "run run/error_021_stack_method.ts",
|
|
output: "run/error_021_stack_method.ts.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
itest!(error_022_stack_custom_error {
|
|
args: "run run/error_022_stack_custom_error.ts",
|
|
output: "run/error_022_stack_custom_error.ts.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
itest!(error_023_stack_async {
|
|
args: "run run/error_023_stack_async.ts",
|
|
output: "run/error_023_stack_async.ts.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
itest!(error_024_stack_promise_all {
|
|
args: "run run/error_024_stack_promise_all.ts",
|
|
output: "run/error_024_stack_promise_all.ts.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
itest!(error_025_tab_indent {
|
|
args: "run run/error_025_tab_indent",
|
|
output: "run/error_025_tab_indent.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
itest!(error_026_remote_import_error {
|
|
args: "run --allow-import run/error_026_remote_import_error.ts",
|
|
output: "run/error_026_remote_import_error.ts.out",
|
|
exit_code: 1,
|
|
http_server: true,
|
|
});
|
|
|
|
itest!(error_for_await {
|
|
args: "run --reload --check run/error_for_await.ts",
|
|
output: "run/error_for_await.ts.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
itest!(error_missing_module_named_import {
|
|
args: "run --reload run/error_missing_module_named_import.ts",
|
|
output: "run/error_missing_module_named_import.ts.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
itest!(error_no_check {
|
|
args: "run --reload --no-check run/error_no_check.ts",
|
|
output: "run/error_no_check.ts.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
itest!(error_syntax {
|
|
args: "run --reload run/error_syntax.js",
|
|
exit_code: 1,
|
|
output: "run/error_syntax.js.out",
|
|
});
|
|
|
|
itest!(error_syntax_empty_trailing_line {
|
|
args: "run --reload run/error_syntax_empty_trailing_line.mjs",
|
|
exit_code: 1,
|
|
output: "run/error_syntax_empty_trailing_line.mjs.out",
|
|
});
|
|
|
|
itest!(error_type_definitions {
|
|
args: "run --reload --check run/error_type_definitions.ts",
|
|
exit_code: 1,
|
|
output: "run/error_type_definitions.ts.out",
|
|
});
|
|
|
|
itest!(error_local_static_import_from_remote_ts {
|
|
args: "run --allow-import --reload http://localhost:4545/run/error_local_static_import_from_remote.ts",
|
|
exit_code: 1,
|
|
http_server: true,
|
|
output: "run/error_local_static_import_from_remote.ts.out",
|
|
});
|
|
|
|
itest!(error_local_static_import_from_remote_js {
|
|
args: "run --allow-import --reload http://localhost:4545/run/error_local_static_import_from_remote.js",
|
|
exit_code: 1,
|
|
http_server: true,
|
|
output: "run/error_local_static_import_from_remote.js.out",
|
|
});
|
|
|
|
itest!(exit_error42 {
|
|
exit_code: 42,
|
|
args: "run --quiet --reload run/exit_error42.ts",
|
|
output: "run/exit_error42.ts.out",
|
|
});
|
|
|
|
itest!(set_exit_code_0 {
|
|
args: "run --no-check run/set_exit_code_0.ts",
|
|
output_str: Some(""),
|
|
exit_code: 0,
|
|
});
|
|
|
|
itest!(set_exit_code_1 {
|
|
args: "run --no-check run/set_exit_code_1.ts",
|
|
output_str: Some(""),
|
|
exit_code: 42,
|
|
});
|
|
|
|
itest!(set_exit_code_2 {
|
|
args: "run --no-check run/set_exit_code_2.ts",
|
|
output_str: Some(""),
|
|
exit_code: 42,
|
|
});
|
|
|
|
itest!(op_exit_op_set_exit_code_in_worker {
|
|
args: "run --no-check --allow-read run/op_exit_op_set_exit_code_in_worker.ts",
|
|
exit_code: 21,
|
|
output_str: Some(""),
|
|
});
|
|
|
|
itest!(deno_exit_tampering {
|
|
args: "run --no-check run/deno_exit_tampering.ts",
|
|
output_str: Some(""),
|
|
exit_code: 42,
|
|
});
|
|
|
|
itest!(heapstats {
|
|
args: "run --quiet --v8-flags=--expose-gc run/heapstats.js",
|
|
output: "run/heapstats.js.out",
|
|
});
|
|
|
|
itest!(finalization_registry {
|
|
args: "run --quiet --v8-flags=--expose-gc run/finalization_registry.js",
|
|
output: "run/finalization_registry.js.out",
|
|
});
|
|
|
|
itest!(https_import {
|
|
args: "run --allow-import --quiet --reload --cert tls/RootCA.pem run/https_import.ts",
|
|
output: "run/https_import.ts.out",
|
|
http_server: true,
|
|
});
|
|
|
|
itest!(if_main {
|
|
args: "run --quiet --reload run/if_main.ts",
|
|
output: "run/if_main.ts.out",
|
|
});
|
|
|
|
itest!(import_meta {
|
|
args: "run --allow-import --quiet --reload --import-map=run/import_meta/importmap.json run/import_meta/main.ts",
|
|
output: "run/import_meta/main.out",
|
|
http_server: true,
|
|
});
|
|
|
|
itest!(main_module {
|
|
args: "run --quiet --reload run/main_module/main.ts",
|
|
output: "run/main_module/main.out",
|
|
});
|
|
|
|
itest!(no_check {
|
|
args: "run --allow-import --quiet --reload --no-check run/006_url_imports.ts",
|
|
output: "run/006_url_imports.ts.out",
|
|
http_server: true,
|
|
});
|
|
|
|
itest!(no_check_decorators {
|
|
args: "run --quiet --reload --no-check run/decorators/experimental/no_check/main.ts",
|
|
output: "run/decorators/experimental/no_check/main.out",
|
|
});
|
|
|
|
itest!(decorators_tc39_proposal {
|
|
args: "run --quiet --reload --check run/decorators/tc39_proposal/main.ts",
|
|
output: "run/decorators/tc39_proposal/main.out",
|
|
});
|
|
|
|
itest!(check_remote {
|
|
args:
|
|
"run --quiet --allow-import --reload --check=all run/no_check_remote.ts",
|
|
output: "run/no_check_remote.ts.disabled.out",
|
|
exit_code: 1,
|
|
http_server: true,
|
|
});
|
|
|
|
itest!(no_check_remote {
|
|
args: "run --allow-import --quiet --reload --no-check=remote run/no_check_remote.ts",
|
|
output: "run/no_check_remote.ts.enabled.out",
|
|
http_server: true,
|
|
});
|
|
|
|
itest!(runtime_decorators {
|
|
args: "run --quiet --reload --no-check run/decorators/experimental/runtime/main.ts",
|
|
output: "run/decorators/experimental/runtime/main.out",
|
|
});
|
|
|
|
itest!(seed_random {
|
|
args: "run --seed=100 run/seed_random.js",
|
|
output: "run/seed_random.js.out",
|
|
});
|
|
|
|
itest!(type_definitions {
|
|
args: "run --reload run/type_definitions.ts",
|
|
output: "run/type_definitions.ts.out",
|
|
});
|
|
|
|
itest!(type_definitions_for_export {
|
|
args: "run --reload --check run/type_definitions_for_export.ts",
|
|
output: "run/type_definitions_for_export.ts.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
itest!(type_directives_01 {
|
|
args:
|
|
"run --allow-import --reload --check=all -L debug run/type_directives_01.ts",
|
|
output: "run/type_directives_01.ts.out",
|
|
http_server: true,
|
|
});
|
|
|
|
itest!(type_directives_02 {
|
|
args:
|
|
"run --allow-import --reload --check=all -L debug run/type_directives_02.ts",
|
|
output: "run/type_directives_02.ts.out",
|
|
});
|
|
|
|
#[test]
|
|
fn type_directives_js_main() {
|
|
let context = TestContext::default();
|
|
let output = context
|
|
.new_command()
|
|
.args("run --reload -L debug --check run/type_directives_js_main.js")
|
|
.run();
|
|
output.assert_matches_text("[WILDCARD] - FileFetcher::fetch_no_follow_with_options - specifier: file:///[WILDCARD]/subdir/type_reference.d.ts[WILDCARD]");
|
|
let output = context
|
|
.new_command()
|
|
.args("run --reload -L debug run/type_directives_js_main.js")
|
|
.run();
|
|
assert_not_contains!(output.combined_output(), "type_reference.d.ts");
|
|
}
|
|
|
|
itest!(type_directives_redirect {
|
|
args: "run --allow-import --reload --check run/type_directives_redirect.ts",
|
|
output: "run/type_directives_redirect.ts.out",
|
|
http_server: true,
|
|
});
|
|
|
|
itest!(type_headers_deno_types {
|
|
args: "run --allow-import --reload --check run/type_headers_deno_types.ts",
|
|
output: "run/type_headers_deno_types.ts.out",
|
|
http_server: true,
|
|
});
|
|
|
|
itest!(ts_type_imports {
|
|
args: "run --reload --check run/ts_type_imports.ts",
|
|
output: "run/ts_type_imports.ts.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
itest!(ts_decorators {
|
|
args: "run --reload --check run/decorators/experimental/ts/main.ts",
|
|
output: "run/decorators/experimental/ts/main.out",
|
|
});
|
|
|
|
itest!(ts_type_only_import {
|
|
args: "run --reload --check run/ts_type_only_import.ts",
|
|
output: "run/ts_type_only_import.ts.out",
|
|
});
|
|
|
|
itest!(swc_syntax_error {
|
|
args: "run --reload --check run/swc_syntax_error.ts",
|
|
output: "run/swc_syntax_error.ts.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
itest!(unbuffered_stderr {
|
|
args: "run --reload run/unbuffered_stderr.ts",
|
|
output: "run/unbuffered_stderr.ts.out",
|
|
});
|
|
|
|
itest!(unbuffered_stdout {
|
|
args: "run --quiet --reload run/unbuffered_stdout.ts",
|
|
output: "run/unbuffered_stdout.ts.out",
|
|
});
|
|
|
|
itest!(v8_flags_run {
|
|
args: "run --v8-flags=--expose-gc run/v8_flags.js",
|
|
output: "run/v8_flags.js.out",
|
|
});
|
|
|
|
itest!(v8_flags_env_run {
|
|
envs: vec![("DENO_V8_FLAGS".to_string(), "--expose-gc".to_string())],
|
|
args: "run run/v8_flags.js",
|
|
output: "run/v8_flags.js.out",
|
|
});
|
|
|
|
itest!(v8_flags_unrecognized {
|
|
args: "repl --v8-flags=--foo,bar,--trace-gc,-baz",
|
|
output: "run/v8_flags_unrecognized.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
itest!(v8_help {
|
|
args: "repl --v8-flags=--help",
|
|
output: "run/v8_help.out",
|
|
});
|
|
|
|
itest!(unsupported_dynamic_import_scheme {
|
|
args: "eval import('xxx:')",
|
|
output: "run/unsupported_dynamic_import_scheme.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
itest!(wasm {
|
|
args: "run --quiet run/wasm.ts",
|
|
output: "run/wasm.ts.out",
|
|
});
|
|
|
|
itest!(wasm_shared {
|
|
args: "run --quiet run/wasm_shared.ts",
|
|
output: "run/wasm_shared.out",
|
|
});
|
|
|
|
itest!(wasm_async {
|
|
args: "run run/wasm_async.js",
|
|
output: "run/wasm_async.out",
|
|
});
|
|
|
|
itest!(wasm_unreachable {
|
|
args: "run --allow-read run/wasm_unreachable.js",
|
|
output: "run/wasm_unreachable.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
itest!(wasm_url {
|
|
args: "run --quiet --allow-net=localhost:4545 run/wasm_url.js",
|
|
output: "run/wasm_url.out",
|
|
exit_code: 1,
|
|
http_server: true,
|
|
});
|
|
|
|
itest!(weakref {
|
|
args: "run --quiet --reload run/weakref.ts",
|
|
output: "run/weakref.ts.out",
|
|
});
|
|
|
|
itest!(top_level_await_order {
|
|
args: "run --allow-read run/top_level_await/order.js",
|
|
output: "run/top_level_await/order.out",
|
|
});
|
|
|
|
itest!(top_level_await_loop {
|
|
args: "run --allow-read run/top_level_await/loop.js",
|
|
output: "run/top_level_await/loop.out",
|
|
});
|
|
|
|
itest!(top_level_await_circular {
|
|
args: "run --allow-read run/top_level_await/circular.js",
|
|
output: "run/top_level_await/circular.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
// Regression test for https://github.com/denoland/deno/issues/11238.
|
|
itest!(top_level_await_nested {
|
|
args: "run --allow-read run/top_level_await/nested/main.js",
|
|
output: "run/top_level_await/nested.out",
|
|
});
|
|
|
|
itest!(top_level_await_unresolved {
|
|
args: "run run/top_level_await/unresolved.js",
|
|
output: "run/top_level_await/unresolved.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
itest!(top_level_await {
|
|
args: "run --allow-read run/top_level_await/top_level_await.js",
|
|
output: "run/top_level_await/top_level_await.out",
|
|
});
|
|
|
|
itest!(top_level_await_ts {
|
|
args: "run --quiet --allow-read run/top_level_await/top_level_await.ts",
|
|
output: "run/top_level_await/top_level_await.out",
|
|
});
|
|
|
|
itest!(top_level_for_await {
|
|
args: "run --quiet run/top_level_await/top_level_for_await.js",
|
|
output: "run/top_level_await/top_level_for_await.out",
|
|
});
|
|
|
|
itest!(top_level_for_await_ts {
|
|
args: "run --quiet run/top_level_await/top_level_for_await.ts",
|
|
output: "run/top_level_await/top_level_for_await.out",
|
|
});
|
|
|
|
itest!(unstable_worker {
|
|
args: "run --reload --quiet --allow-read run/unstable_worker.ts",
|
|
output: "run/unstable_worker.ts.out",
|
|
});
|
|
|
|
itest!(unstable_worker_options_disabled {
|
|
args: "run --quiet --reload --allow-read run/unstable_worker_options.js",
|
|
output: "run/unstable_worker_options.disabled.out",
|
|
exit_code: 70,
|
|
});
|
|
|
|
itest!(unstable_worker_options_enabled {
|
|
args: "run --quiet --reload --allow-read --unstable-worker-options run/unstable_worker_options.js",
|
|
output: "run/unstable_worker_options.enabled.out",
|
|
});
|
|
|
|
itest!(unstable_broadcast_channel_disabled {
|
|
args: "run --quiet --reload --allow-read run/unstable_broadcast_channel.js",
|
|
output: "run/unstable_broadcast_channel.disabled.out",
|
|
});
|
|
|
|
itest!(unstable_broadcast_channel_enabled {
|
|
args: "run --quiet --reload --allow-read --unstable-broadcast-channel run/unstable_broadcast_channel.js",
|
|
output: "run/unstable_broadcast_channel.enabled.out",
|
|
});
|
|
|
|
itest!(unstable_cron_disabled {
|
|
args: "run --quiet --reload --allow-read run/unstable_cron.js",
|
|
output: "run/unstable_cron.disabled.out",
|
|
});
|
|
|
|
itest!(unstable_cron_enabled {
|
|
args:
|
|
"run --quiet --reload --allow-read --unstable-cron run/unstable_cron.js",
|
|
output: "run/unstable_cron.enabled.out",
|
|
});
|
|
|
|
itest!(unstable_net_disabled {
|
|
args: "run --quiet --reload --allow-read run/unstable_net.js",
|
|
output: "run/unstable_net.disabled.out",
|
|
});
|
|
|
|
itest!(unstable_net_enabled {
|
|
args: "run --quiet --reload --allow-read --unstable-net run/unstable_net.js",
|
|
output: "run/unstable_net.enabled.out",
|
|
});
|
|
|
|
itest!(unstable_kv_disabled {
|
|
args: "run --quiet --reload --allow-read run/unstable_kv.js",
|
|
output: "run/unstable_kv.disabled.out",
|
|
});
|
|
|
|
itest!(unstable_kv_enabled {
|
|
args: "run --quiet --reload --allow-read --unstable-kv run/unstable_kv.js",
|
|
output: "run/unstable_kv.enabled.out",
|
|
});
|
|
|
|
itest!(import_compression {
|
|
args: "run --allow-import --quiet --reload --allow-net run/import_compression/main.ts",
|
|
output: "run/import_compression/main.out",
|
|
http_server: true,
|
|
});
|
|
|
|
itest!(disallow_http_from_https_js {
|
|
args: "run --allow-import --quiet --reload --cert tls/RootCA.pem https://localhost:5545/run/disallow_http_from_https.js",
|
|
output: "run/disallow_http_from_https_js.out",
|
|
http_server: true,
|
|
exit_code: 1,
|
|
});
|
|
|
|
itest!(disallow_http_from_https_ts {
|
|
args: "run --allow-import --quiet --reload --cert tls/RootCA.pem https://localhost:5545/run/disallow_http_from_https.ts",
|
|
output: "run/disallow_http_from_https_ts.out",
|
|
http_server: true,
|
|
exit_code: 1,
|
|
});
|
|
|
|
itest!(dynamic_import_conditional {
|
|
args: "run --quiet --reload run/dynamic_import_conditional.js",
|
|
output: "run/dynamic_import_conditional.js.out",
|
|
});
|
|
|
|
itest!(tsx_imports {
|
|
args: "run --reload --check run/tsx_imports/tsx_imports.ts",
|
|
output: "run/tsx_imports/tsx_imports.ts.out",
|
|
});
|
|
|
|
itest!(fix_dynamic_import_errors {
|
|
args: "run --reload run/fix_dynamic_import_errors.js",
|
|
output: "run/fix_dynamic_import_errors.js.out",
|
|
});
|
|
|
|
itest!(fix_emittable_skipped {
|
|
args: "run --reload run/fix_emittable_skipped.js",
|
|
output: "run/fix_emittable_skipped.ts.out",
|
|
});
|
|
|
|
itest!(fix_js_import_js {
|
|
args: "run --quiet --reload run/fix_js_import_js.ts",
|
|
output: "run/fix_js_import_js.ts.out",
|
|
});
|
|
|
|
itest!(fix_js_imports {
|
|
args: "run --quiet --reload run/fix_js_imports.ts",
|
|
output: "run/fix_js_imports.ts.out",
|
|
});
|
|
|
|
itest!(fix_tsc_file_exists {
|
|
args: "run --quiet --reload tsc/test.js",
|
|
output: "run/fix_tsc_file_exists.out",
|
|
});
|
|
|
|
itest!(fix_worker_dispatchevent {
|
|
args: "run --quiet --reload run/fix_worker_dispatchevent.ts",
|
|
output: "run/fix_worker_dispatchevent.ts.out",
|
|
});
|
|
|
|
itest!(es_private_fields {
|
|
args: "run --quiet --reload run/es_private_fields.js",
|
|
output: "run/es_private_fields.js.out",
|
|
});
|
|
|
|
itest!(ts_import_from_js {
|
|
args: "run --allow-import --quiet --reload run/ts_import_from_js/main.js",
|
|
output: "run/ts_import_from_js/main.out",
|
|
http_server: true,
|
|
});
|
|
|
|
itest!(jsx_import_from_ts {
|
|
args: "run --quiet --reload run/jsx_import_from_ts.ts",
|
|
output: "run/jsx_import_from_ts.ts.out",
|
|
});
|
|
|
|
itest!(jsx_import_source_pragma {
|
|
args: "run --reload --allow-import run/jsx_import_source_pragma.tsx",
|
|
output: "run/jsx_import_source.out",
|
|
http_server: true,
|
|
});
|
|
|
|
itest!(jsx_import_source_pragma_with_config {
|
|
args:
|
|
"run --reload --allow-import --config jsx/deno-jsx.jsonc --no-lock run/jsx_import_source_pragma.tsx",
|
|
output: "run/jsx_import_source.out",
|
|
http_server: true,
|
|
});
|
|
|
|
itest!(jsx_import_source_pragma_with_dev_config {
|
|
args:
|
|
"run --reload --allow-import --config jsx/deno-jsxdev.jsonc --no-lock run/jsx_import_source_pragma.tsx",
|
|
output: "run/jsx_import_source_dev.out",
|
|
http_server: true,
|
|
});
|
|
|
|
itest!(jsx_import_source_no_pragma {
|
|
args:
|
|
"run --allow-import --reload --config jsx/deno-jsx.jsonc --no-lock run/jsx_import_source_no_pragma.tsx",
|
|
output: "run/jsx_import_source.out",
|
|
http_server: true,
|
|
});
|
|
|
|
itest!(jsx_import_source_no_pragma_dev {
|
|
args: "run --allow-import --reload --config jsx/deno-jsxdev.jsonc --no-lock run/jsx_import_source_no_pragma.tsx",
|
|
output: "run/jsx_import_source_dev.out",
|
|
http_server: true,
|
|
});
|
|
|
|
itest!(jsx_import_source_pragma_import_map {
|
|
args: "run --allow-import --reload --import-map jsx/import-map.json run/jsx_import_source_pragma_import_map.tsx",
|
|
output: "run/jsx_import_source_import_map.out",
|
|
http_server: true,
|
|
});
|
|
|
|
itest!(jsx_import_source_pragma_import_map_dev {
|
|
args: "run --allow-import --reload --import-map jsx/import-map.json --config jsx/deno-jsxdev-import-map.jsonc run/jsx_import_source_pragma_import_map.tsx",
|
|
output: "run/jsx_import_source_import_map_dev.out",
|
|
http_server: true,
|
|
});
|
|
|
|
itest!(jsx_import_source_precompile_import_map {
|
|
args: "run --allow-import --reload --check --import-map jsx/import-map.json --no-lock --config jsx/deno-jsx-precompile.jsonc run/jsx_precompile/no_pragma.tsx",
|
|
output: "run/jsx_precompile/no_pragma.out",
|
|
http_server: true,
|
|
});
|
|
|
|
itest!(jsx_import_source_precompile_import_map_skip_element {
|
|
args: "run --allow-import --reload --check --import-map jsx/import-map.json --no-lock --config jsx/deno-jsx-precompile-skip.jsonc run/jsx_precompile/skip.tsx",
|
|
output: "run/jsx_precompile/skip.out",
|
|
http_server: true,
|
|
});
|
|
|
|
itest!(jsx_import_source_import_map {
|
|
args: "run --allow-import --reload --import-map jsx/import-map.json --no-lock --config jsx/deno-jsx-import-map.jsonc run/jsx_import_source_no_pragma.tsx",
|
|
output: "run/jsx_import_source_import_map.out",
|
|
http_server: true,
|
|
});
|
|
|
|
itest!(jsx_import_source_import_map_dev {
|
|
args: "run --allow-import --reload --import-map jsx/import-map.json --no-lock --config jsx/deno-jsxdev-import-map.jsonc run/jsx_import_source_no_pragma.tsx",
|
|
output: "run/jsx_import_source_import_map_dev.out",
|
|
http_server: true,
|
|
});
|
|
|
|
itest!(jsx_import_source_import_map_scoped {
|
|
args: "run --allow-import --reload --import-map jsx/import-map-scoped.json --no-lock --config jsx/deno-jsx-import-map.jsonc subdir/jsx_import_source_no_pragma.tsx",
|
|
output: "run/jsx_import_source_import_map.out",
|
|
http_server: true,
|
|
});
|
|
|
|
itest!(jsx_import_source_import_map_scoped_dev {
|
|
args: "run --allow-import --reload --import-map jsx/import-map-scoped.json --no-lock --config jsx/deno-jsxdev-import-map.jsonc subdir/jsx_import_source_no_pragma.tsx",
|
|
output: "run/jsx_import_source_import_map_dev.out",
|
|
http_server: true,
|
|
});
|
|
|
|
itest!(jsx_import_source_pragma_no_check {
|
|
args:
|
|
"run --allow-import --reload --no-check run/jsx_import_source_pragma.tsx",
|
|
output: "run/jsx_import_source.out",
|
|
http_server: true,
|
|
});
|
|
|
|
itest!(jsx_import_source_pragma_with_config_no_check {
|
|
args: "run --allow-import --reload --config jsx/deno-jsx.jsonc --no-lock --no-check run/jsx_import_source_pragma.tsx",
|
|
output: "run/jsx_import_source.out",
|
|
http_server: true,
|
|
});
|
|
|
|
itest!(jsx_import_source_pragma_with_config_vendor_dir {
|
|
args: "run --allow-import --reload --config jsx/deno-jsx.jsonc --no-lock --vendor $TESTDATA/run/jsx_import_source_pragma.tsx",
|
|
output: "run/jsx_import_source.out",
|
|
http_server: true,
|
|
temp_cwd: true,
|
|
copy_temp_dir: Some("jsx/"),
|
|
});
|
|
|
|
itest!(jsx_import_source_no_pragma_no_check {
|
|
args:
|
|
"run --allow-import --reload --config jsx/deno-jsx.jsonc --no-lock --no-check run/jsx_import_source_no_pragma.tsx",
|
|
output: "run/jsx_import_source.out",
|
|
http_server: true,
|
|
});
|
|
|
|
itest!(jsx_import_source_pragma_import_map_no_check {
|
|
args: "run --allow-import --reload --import-map jsx/import-map.json --no-check run/jsx_import_source_pragma_import_map.tsx",
|
|
output: "run/jsx_import_source_import_map.out",
|
|
http_server: true,
|
|
});
|
|
|
|
itest!(jsx_import_source_import_map_no_check {
|
|
args: "run --allow-import --reload --import-map jsx/import-map.json --no-lock --config jsx/deno-jsx-import-map.jsonc --no-check run/jsx_import_source_no_pragma.tsx",
|
|
output: "run/jsx_import_source_import_map.out",
|
|
http_server: true,
|
|
});
|
|
|
|
itest!(jsx_import_source_error {
|
|
args: "run --config jsx/deno-jsx-error.jsonc --check run/jsx_import_source_no_pragma.tsx",
|
|
output: "run/jsx_import_source_error.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
itest!(single_compile_with_reload {
|
|
args: "run --reload --allow-read run/single_compile_with_reload.ts",
|
|
output: "run/single_compile_with_reload.ts.out",
|
|
});
|
|
|
|
itest!(proto_exploit {
|
|
args: "run run/proto_exploit.js",
|
|
output: "run/proto_exploit.js.out",
|
|
});
|
|
|
|
itest!(reference_types {
|
|
args: "run --reload --quiet run/reference_types.ts",
|
|
output: "run/reference_types.ts.out",
|
|
});
|
|
|
|
itest!(references_types_remote {
|
|
http_server: true,
|
|
args: "run --reload --quiet run/reference_types_remote.ts",
|
|
output: "run/reference_types_remote.ts.out",
|
|
});
|
|
|
|
itest!(reference_types_error {
|
|
args:
|
|
"run --config run/checkjs.tsconfig.json --check run/reference_types_error.js",
|
|
output: "run/reference_types_error.js.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
itest!(reference_types_error_vendor_dir {
|
|
args:
|
|
"run --config run/checkjs.tsconfig.json --check --vendor $TESTDATA/run/reference_types_error.js",
|
|
output: "run/reference_types_error.js.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
itest!(reference_types_error_no_check {
|
|
args: "run --no-check run/reference_types_error.js",
|
|
output_str: Some(""),
|
|
});
|
|
|
|
itest!(import_data_url_error_stack {
|
|
args: "run --quiet --reload run/import_data_url_error_stack.ts",
|
|
output: "run/import_data_url_error_stack.ts.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
itest!(import_data_url_import_relative {
|
|
args: "run --quiet --reload run/import_data_url_import_relative.ts",
|
|
output: "run/import_data_url_import_relative.ts.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
itest!(import_data_url_imports {
|
|
args: "run --allow-import --quiet --reload run/import_data_url_imports.ts",
|
|
output: "run/import_data_url_imports.ts.out",
|
|
http_server: true,
|
|
});
|
|
|
|
itest!(import_data_url_jsx {
|
|
args: "run --quiet --reload run/import_data_url_jsx.ts",
|
|
output: "run/import_data_url_jsx.ts.out",
|
|
});
|
|
|
|
itest!(import_data_url {
|
|
args: "run --quiet --reload run/import_data_url.ts",
|
|
output: "run/import_data_url.ts.out",
|
|
});
|
|
|
|
itest!(import_dynamic_data_url {
|
|
args: "run --quiet --reload run/import_dynamic_data_url.ts",
|
|
output: "run/import_dynamic_data_url.ts.out",
|
|
});
|
|
|
|
itest!(import_blob_url_error_stack {
|
|
args: "run --quiet --reload run/import_blob_url_error_stack.ts",
|
|
output: "run/import_blob_url_error_stack.ts.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
itest!(import_blob_url_import_relative {
|
|
args: "run --quiet --reload run/import_blob_url_import_relative.ts",
|
|
output: "run/import_blob_url_import_relative.ts.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
itest!(import_blob_url_imports {
|
|
args:
|
|
"run --allow-import --quiet --reload --allow-net=localhost:4545 run/import_blob_url_imports.ts",
|
|
output: "run/import_blob_url_imports.ts.out",
|
|
http_server: true,
|
|
});
|
|
|
|
itest!(import_blob_url_jsx {
|
|
args: "run --quiet --reload run/import_blob_url_jsx.ts",
|
|
output: "run/import_blob_url_jsx.ts.out",
|
|
});
|
|
|
|
itest!(import_blob_url {
|
|
args: "run --quiet --reload run/import_blob_url.ts",
|
|
output: "run/import_blob_url.ts.out",
|
|
});
|
|
|
|
itest!(import_file_with_colon {
|
|
args: "run --allow-import --quiet --reload run/import_file_with_colon.ts",
|
|
output: "run/import_file_with_colon.ts.out",
|
|
http_server: true,
|
|
});
|
|
|
|
itest!(import_extensionless {
|
|
args: "run --allow-import --quiet --reload run/import_extensionless.ts",
|
|
output: "run/import_extensionless.ts.out",
|
|
http_server: true,
|
|
});
|
|
|
|
itest!(classic_workers_event_loop {
|
|
args:
|
|
"run --enable-testing-features-do-not-use run/classic_workers_event_loop.js",
|
|
output: "run/classic_workers_event_loop.js.out",
|
|
});
|
|
|
|
// FIXME(bartlomieju): disabled, because this test is very flaky on CI
|
|
// itest!(local_sources_not_cached_in_memory {
|
|
// args: "run --allow-read --allow-write run/no_mem_cache.js",
|
|
// output: "run/no_mem_cache.js.out",
|
|
// });
|
|
|
|
// This test checks that inline source map data is used. It uses a hand crafted
|
|
// source map that maps to a file that exists, but is not loaded into the module
|
|
// graph (inline_js_source_map_2.ts) (because there are no direct dependencies).
|
|
// Source line is not remapped because no inline source contents are included in
|
|
// the sourcemap and the file is not present in the dependency graph.
|
|
itest!(inline_js_source_map_2 {
|
|
args: "run --quiet run/inline_js_source_map_2.js",
|
|
output: "run/inline_js_source_map_2.js.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
// This test checks that inline source map data is used. It uses a hand crafted
|
|
// source map that maps to a file that exists, but is not loaded into the module
|
|
// graph (inline_js_source_map_2.ts) (because there are no direct dependencies).
|
|
// Source line remapped using th inline source contents that are included in the
|
|
// inline source map.
|
|
itest!(inline_js_source_map_2_with_inline_contents {
|
|
args: "run --quiet run/inline_js_source_map_2_with_inline_contents.js",
|
|
output: "run/inline_js_source_map_2_with_inline_contents.js.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
// This test checks that inline source map data is used. It uses a hand crafted
|
|
// source map that maps to a file that exists, and is loaded into the module
|
|
// graph because of a direct import statement (inline_js_source_map.ts). The
|
|
// source map was generated from an earlier version of this file, where the throw
|
|
// was not commented out. The source line is remapped using source contents that
|
|
// from the module graph.
|
|
itest!(inline_js_source_map_with_contents_from_graph {
|
|
args: "run --allow-import --quiet run/inline_js_source_map_with_contents_from_graph.js",
|
|
output: "run/inline_js_source_map_with_contents_from_graph.js.out",
|
|
exit_code: 1,
|
|
http_server: true,
|
|
});
|
|
|
|
// This test ensures that a descriptive error is shown when we're unable to load
|
|
// the import map. Even though this tests only the `run` subcommand, we can be sure
|
|
// that the error message is similar for other subcommands as they all use
|
|
// `program_state.maybe_import_map` to access the import map underneath.
|
|
itest!(error_import_map_unable_to_load {
|
|
args: "run --import-map=import_maps/does_not_exist.json import_maps/test.ts",
|
|
output: "run/error_import_map_unable_to_load.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
// Test that setting `self` in the main thread to some other value doesn't break
|
|
// the world.
|
|
itest!(replace_self {
|
|
args: "run run/replace_self.js",
|
|
output: "run/replace_self.js.out",
|
|
});
|
|
|
|
itest!(worker_event_handler_test {
|
|
args: "run --quiet --reload --allow-read run/worker_event_handler_test.js",
|
|
output: "run/worker_event_handler_test.js.out",
|
|
});
|
|
|
|
itest!(worker_close_race {
|
|
args: "run --quiet --reload --allow-read run/worker_close_race.js",
|
|
output: "run/worker_close_race.js.out",
|
|
});
|
|
|
|
itest!(worker_drop_handle_race {
|
|
args: "run --quiet --reload --allow-read run/worker_drop_handle_race.js",
|
|
output: "run/worker_drop_handle_race.js.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
itest!(worker_drop_handle_race_terminate {
|
|
args: "run run/worker_drop_handle_race_terminate.js",
|
|
output: "run/worker_drop_handle_race_terminate.js.out",
|
|
});
|
|
|
|
itest!(worker_close_nested {
|
|
args: "run --quiet --reload --allow-read run/worker_close_nested.js",
|
|
output: "run/worker_close_nested.js.out",
|
|
});
|
|
|
|
itest!(worker_message_before_close {
|
|
args: "run --quiet --reload --allow-read run/worker_message_before_close.js",
|
|
output: "run/worker_message_before_close.js.out",
|
|
});
|
|
|
|
itest!(worker_close_in_wasm_reactions {
|
|
args:
|
|
"run --quiet --reload --allow-read run/worker_close_in_wasm_reactions.js",
|
|
output: "run/worker_close_in_wasm_reactions.js.out",
|
|
});
|
|
|
|
itest!(shebang_tsc {
|
|
args: "run --quiet --check run/shebang.ts",
|
|
output: "run/shebang.ts.out",
|
|
});
|
|
|
|
itest!(shebang_swc {
|
|
args: "run --quiet run/shebang.ts",
|
|
output: "run/shebang.ts.out",
|
|
});
|
|
|
|
itest!(shebang_with_json_imports_tsc {
|
|
args: "run --quiet import_attributes/json_with_shebang.ts",
|
|
output: "import_attributes/json_with_shebang.ts.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
itest!(shebang_with_json_imports_swc {
|
|
args: "run --quiet --no-check import_attributes/json_with_shebang.ts",
|
|
output: "import_attributes/json_with_shebang.ts.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
#[test]
|
|
fn no_validate_asm() {
|
|
let output = util::deno_cmd()
|
|
.current_dir(util::testdata_path())
|
|
.arg("run")
|
|
.arg("run/no_validate_asm.js")
|
|
.piped_output()
|
|
.spawn()
|
|
.unwrap()
|
|
.wait_with_output()
|
|
.unwrap();
|
|
assert!(output.status.success());
|
|
assert!(output.stderr.is_empty());
|
|
assert!(output.stdout.is_empty());
|
|
}
|
|
|
|
#[test]
|
|
fn exec_path() {
|
|
let output = util::deno_cmd()
|
|
.current_dir(util::testdata_path())
|
|
.arg("run")
|
|
.arg("--allow-read")
|
|
.arg("run/exec_path.ts")
|
|
.stdout(Stdio::piped())
|
|
.spawn()
|
|
.unwrap()
|
|
.wait_with_output()
|
|
.unwrap();
|
|
assert!(output.status.success());
|
|
let stdout_str = std::str::from_utf8(&output.stdout).unwrap().trim();
|
|
let actual = PathRef::new(std::path::Path::new(stdout_str)).canonicalize();
|
|
let expected = util::deno_exe_path().canonicalize();
|
|
assert_eq!(expected, actual);
|
|
}
|
|
|
|
#[test]
|
|
fn run_from_stdin_defaults_to_ts() {
|
|
let source_code = r#"
|
|
interface Lollipop {
|
|
_: number;
|
|
}
|
|
console.log("executing typescript");
|
|
"#;
|
|
|
|
let mut p = util::deno_cmd()
|
|
.arg("run")
|
|
.arg("--check")
|
|
.arg("-")
|
|
.stdin(std::process::Stdio::piped())
|
|
.stdout_piped()
|
|
.spawn()
|
|
.unwrap();
|
|
let stdin = p.stdin.as_mut().unwrap();
|
|
stdin.write_all(source_code.as_bytes()).unwrap();
|
|
let result = p.wait_with_output().unwrap();
|
|
assert!(result.status.success());
|
|
let stdout_str = std::str::from_utf8(&result.stdout).unwrap().trim();
|
|
assert_eq!(stdout_str, "executing typescript");
|
|
}
|
|
|
|
#[test]
|
|
fn run_from_stdin_ext() {
|
|
let source_code = r#"
|
|
let i = 123;
|
|
i = "hello"
|
|
console.log("executing javascript");
|
|
"#;
|
|
|
|
let mut p = util::deno_cmd()
|
|
.args("run --ext js --check -")
|
|
.stdin(std::process::Stdio::piped())
|
|
.stdout_piped()
|
|
.spawn()
|
|
.unwrap();
|
|
let stdin = p.stdin.as_mut().unwrap();
|
|
stdin.write_all(source_code.as_bytes()).unwrap();
|
|
let result = p.wait_with_output().unwrap();
|
|
assert!(result.status.success());
|
|
let stdout_str = std::str::from_utf8(&result.stdout).unwrap().trim();
|
|
assert_eq!(stdout_str, "executing javascript");
|
|
}
|
|
|
|
#[cfg(windows)]
|
|
// Clippy suggests to remove the `NoStd` prefix from all variants. I disagree.
|
|
#[allow(clippy::enum_variant_names)]
|
|
enum WinProcConstraints {
|
|
NoStdIn,
|
|
NoStdOut,
|
|
NoStdErr,
|
|
}
|
|
|
|
#[cfg(windows)]
|
|
fn run_deno_script_constrained(
|
|
script_path: test_util::PathRef,
|
|
constraints: WinProcConstraints,
|
|
) -> Result<(), i64> {
|
|
let file_path = "assets/DenoWinRunner.ps1";
|
|
let constraints = match constraints {
|
|
WinProcConstraints::NoStdIn => "1",
|
|
WinProcConstraints::NoStdOut => "2",
|
|
WinProcConstraints::NoStdErr => "4",
|
|
};
|
|
let deno_exe_path = util::deno_exe_path().to_string();
|
|
let deno_script_path = script_path.to_string();
|
|
let args = vec![&deno_exe_path[..], &deno_script_path[..], constraints];
|
|
util::run_powershell_script_file(file_path, args)
|
|
}
|
|
|
|
#[cfg(windows)]
|
|
#[test]
|
|
fn should_not_panic_on_no_stdin() {
|
|
let output = run_deno_script_constrained(
|
|
util::testdata_path().join("echo.ts"),
|
|
WinProcConstraints::NoStdIn,
|
|
);
|
|
output.unwrap();
|
|
}
|
|
|
|
#[cfg(windows)]
|
|
#[test]
|
|
fn should_not_panic_on_no_stdout() {
|
|
let output = run_deno_script_constrained(
|
|
util::testdata_path().join("echo.ts"),
|
|
WinProcConstraints::NoStdOut,
|
|
);
|
|
output.unwrap();
|
|
}
|
|
|
|
#[cfg(windows)]
|
|
#[test]
|
|
fn should_not_panic_on_no_stderr() {
|
|
let output = run_deno_script_constrained(
|
|
util::testdata_path().join("echo.ts"),
|
|
WinProcConstraints::NoStdErr,
|
|
);
|
|
output.unwrap();
|
|
}
|
|
|
|
#[cfg(not(windows))]
|
|
#[test]
|
|
fn should_not_panic_on_undefined_home_environment_variable() {
|
|
let output = util::deno_cmd()
|
|
.current_dir(util::testdata_path())
|
|
.arg("run")
|
|
.arg("echo.ts")
|
|
.env_remove("HOME")
|
|
.spawn()
|
|
.unwrap()
|
|
.wait_with_output()
|
|
.unwrap();
|
|
assert!(output.status.success());
|
|
}
|
|
|
|
#[test]
|
|
fn should_not_panic_on_undefined_deno_dir_environment_variable() {
|
|
let output = util::deno_cmd()
|
|
.current_dir(util::testdata_path())
|
|
.arg("run")
|
|
.arg("echo.ts")
|
|
.env_remove("DENO_DIR")
|
|
.spawn()
|
|
.unwrap()
|
|
.wait_with_output()
|
|
.unwrap();
|
|
assert!(output.status.success());
|
|
}
|
|
|
|
#[cfg(not(windows))]
|
|
#[test]
|
|
fn should_not_panic_on_undefined_deno_dir_and_home_environment_variables() {
|
|
let output = util::deno_cmd()
|
|
.current_dir(util::testdata_path())
|
|
.arg("run")
|
|
.arg("echo.ts")
|
|
.env_remove("DENO_DIR")
|
|
.env_remove("HOME")
|
|
.spawn()
|
|
.unwrap()
|
|
.wait_with_output()
|
|
.unwrap();
|
|
assert!(output.status.success());
|
|
}
|
|
|
|
#[test]
|
|
fn deno_log() {
|
|
// Without DENO_LOG the stderr is empty.
|
|
let output = util::deno_cmd()
|
|
.current_dir(util::testdata_path())
|
|
.arg("run")
|
|
.arg("run/001_hello.js")
|
|
.stderr_piped()
|
|
.spawn()
|
|
.unwrap()
|
|
.wait_with_output()
|
|
.unwrap();
|
|
assert!(output.status.success());
|
|
assert!(output.stderr.is_empty());
|
|
|
|
// With DENO_LOG the stderr is not empty.
|
|
let output = util::deno_cmd()
|
|
.current_dir(util::testdata_path())
|
|
.arg("run")
|
|
.arg("run/001_hello.js")
|
|
.env("DENO_LOG", "debug")
|
|
.stderr_piped()
|
|
.spawn()
|
|
.unwrap()
|
|
.wait_with_output()
|
|
.unwrap();
|
|
assert!(output.status.success());
|
|
assert!(!output.stderr.is_empty());
|
|
}
|
|
|
|
#[test]
|
|
fn dont_cache_on_check_fail() {
|
|
let context = TestContext::default();
|
|
let output = context
|
|
.new_command()
|
|
.args("run --check=all --reload run/error_003_typescript.ts")
|
|
.split_output()
|
|
.run();
|
|
assert!(!output.stderr().is_empty());
|
|
output.skip_stdout_check();
|
|
output.assert_exit_code(1);
|
|
|
|
let output = context
|
|
.new_command()
|
|
.args("run --check=all run/error_003_typescript.ts")
|
|
.split_output()
|
|
.run();
|
|
assert!(!output.stderr().is_empty());
|
|
output.skip_stdout_check();
|
|
output.assert_exit_code(1);
|
|
}
|
|
|
|
mod permissions {
|
|
use test_util as util;
|
|
use test_util::itest;
|
|
use util::TestContext;
|
|
|
|
#[test]
|
|
fn with_allow() {
|
|
for permission in &util::PERMISSION_VARIANTS {
|
|
let status = util::deno_cmd()
|
|
.current_dir(util::testdata_path())
|
|
.arg("run")
|
|
.arg(format!("--allow-{permission}"))
|
|
.arg("run/permission_test.ts")
|
|
.arg(format!("{permission}Required"))
|
|
.spawn()
|
|
.unwrap()
|
|
.wait()
|
|
.unwrap();
|
|
assert!(status.success());
|
|
}
|
|
}
|
|
|
|
#[test]
|
|
fn without_allow() {
|
|
for permission in &util::PERMISSION_VARIANTS {
|
|
let (_, err) = util::run_and_collect_output(
|
|
false,
|
|
&format!("run run/permission_test.ts {permission}Required"),
|
|
None,
|
|
None,
|
|
false,
|
|
);
|
|
assert!(err.contains(util::PERMISSION_DENIED_PATTERN));
|
|
}
|
|
}
|
|
|
|
#[test]
|
|
fn rw_inside_project_dir() {
|
|
const PERMISSION_VARIANTS: [&str; 2] = ["read", "write"];
|
|
for permission in &PERMISSION_VARIANTS {
|
|
let status = util::deno_cmd()
|
|
.current_dir(util::testdata_path())
|
|
.arg("run")
|
|
.arg(format!(
|
|
"--allow-{0}={1}",
|
|
permission,
|
|
util::testdata_path()
|
|
))
|
|
.arg("run/complex_permissions_test.ts")
|
|
.arg(permission)
|
|
.arg("run/complex_permissions_test.ts")
|
|
.spawn()
|
|
.unwrap()
|
|
.wait()
|
|
.unwrap();
|
|
assert!(status.success());
|
|
}
|
|
}
|
|
|
|
#[test]
|
|
fn rw_outside_test_dir() {
|
|
const PERMISSION_VARIANTS: [&str; 2] = ["read", "write"];
|
|
for permission in &PERMISSION_VARIANTS {
|
|
let (_, err) = util::run_and_collect_output(
|
|
false,
|
|
&format!(
|
|
"run --allow-{0}={1} run/complex_permissions_test.ts {0} {2}",
|
|
permission,
|
|
util::testdata_path(),
|
|
util::root_path().join("Cargo.toml"),
|
|
),
|
|
None,
|
|
None,
|
|
false,
|
|
);
|
|
assert!(err.contains(util::PERMISSION_DENIED_PATTERN));
|
|
}
|
|
}
|
|
|
|
#[test]
|
|
fn rw_inside_test_dir() {
|
|
const PERMISSION_VARIANTS: [&str; 2] = ["read", "write"];
|
|
for permission in &PERMISSION_VARIANTS {
|
|
let status = util::deno_cmd()
|
|
.current_dir(util::testdata_path())
|
|
.arg("run")
|
|
.arg(format!(
|
|
"--allow-{0}={1}",
|
|
permission,
|
|
util::testdata_path(),
|
|
))
|
|
.arg("run/complex_permissions_test.ts")
|
|
.arg(permission)
|
|
.arg("run/complex_permissions_test.ts")
|
|
.spawn()
|
|
.unwrap()
|
|
.wait()
|
|
.unwrap();
|
|
assert!(status.success());
|
|
}
|
|
}
|
|
|
|
#[test]
|
|
fn rw_outside_test_and_js_dir() {
|
|
const PERMISSION_VARIANTS: [&str; 2] = ["read", "write"];
|
|
let test_dir = util::testdata_path();
|
|
let js_dir = util::root_path().join("js");
|
|
for permission in &PERMISSION_VARIANTS {
|
|
let (_, err) = util::run_and_collect_output(
|
|
false,
|
|
&format!(
|
|
"run --allow-{0}={1},{2} run/complex_permissions_test.ts {0} {3}",
|
|
permission,
|
|
test_dir,
|
|
js_dir,
|
|
util::root_path().join("Cargo.toml"),
|
|
),
|
|
None,
|
|
None,
|
|
false,
|
|
);
|
|
assert!(err.contains(util::PERMISSION_DENIED_PATTERN));
|
|
}
|
|
}
|
|
|
|
#[test]
|
|
fn rw_inside_test_and_js_dir() {
|
|
const PERMISSION_VARIANTS: [&str; 2] = ["read", "write"];
|
|
let test_dir = util::testdata_path();
|
|
let js_dir = util::root_path().join("js");
|
|
for permission in &PERMISSION_VARIANTS {
|
|
let status = util::deno_cmd()
|
|
.current_dir(util::testdata_path())
|
|
.arg("run")
|
|
.arg(format!("--allow-{permission}={test_dir},{js_dir}"))
|
|
.arg("run/complex_permissions_test.ts")
|
|
.arg(permission)
|
|
.arg("run/complex_permissions_test.ts")
|
|
.spawn()
|
|
.unwrap()
|
|
.wait()
|
|
.unwrap();
|
|
assert!(status.success());
|
|
}
|
|
}
|
|
|
|
#[test]
|
|
fn rw_relative() {
|
|
const PERMISSION_VARIANTS: [&str; 2] = ["read", "write"];
|
|
for permission in &PERMISSION_VARIANTS {
|
|
let status = util::deno_cmd()
|
|
.current_dir(util::testdata_path())
|
|
.arg("run")
|
|
.arg(format!("--allow-{permission}=."))
|
|
.arg("run/complex_permissions_test.ts")
|
|
.arg(permission)
|
|
.arg("run/complex_permissions_test.ts")
|
|
.spawn()
|
|
.unwrap()
|
|
.wait()
|
|
.unwrap();
|
|
assert!(status.success());
|
|
}
|
|
}
|
|
|
|
#[test]
|
|
fn rw_no_prefix() {
|
|
const PERMISSION_VARIANTS: [&str; 2] = ["read", "write"];
|
|
for permission in &PERMISSION_VARIANTS {
|
|
let status = util::deno_cmd()
|
|
.current_dir(util::testdata_path())
|
|
.arg("run")
|
|
.arg(format!("--allow-{permission}=tls/../"))
|
|
.arg("run/complex_permissions_test.ts")
|
|
.arg(permission)
|
|
.arg("run/complex_permissions_test.ts")
|
|
.spawn()
|
|
.unwrap()
|
|
.wait()
|
|
.unwrap();
|
|
assert!(status.success());
|
|
}
|
|
}
|
|
|
|
#[test]
|
|
fn net_fetch_allow_localhost_4545() {
|
|
// ensure the http server is running for those tests so they run
|
|
// deterministically whether the http server is running or not
|
|
let _http_guard = util::http_server();
|
|
let (_, err) = util::run_and_collect_output(
|
|
true,
|
|
"run --allow-net=localhost:4545 run/complex_permissions_test.ts netFetch http://localhost:4545/",
|
|
None,
|
|
None,
|
|
true,
|
|
);
|
|
assert!(!err.contains(util::PERMISSION_DENIED_PATTERN));
|
|
}
|
|
|
|
#[test]
|
|
fn net_fetch_allow_deno_land() {
|
|
let _http_guard = util::http_server();
|
|
let (_, err) = util::run_and_collect_output(
|
|
false,
|
|
"run --allow-net=deno.land run/complex_permissions_test.ts netFetch http://localhost:4545/",
|
|
None,
|
|
None,
|
|
true,
|
|
);
|
|
assert!(err.contains(util::PERMISSION_DENIED_PATTERN));
|
|
}
|
|
|
|
#[test]
|
|
fn net_fetch_localhost_4545_fail() {
|
|
let _http_guard = util::http_server();
|
|
let (_, err) = util::run_and_collect_output(
|
|
false,
|
|
"run --allow-net=localhost:4545 run/complex_permissions_test.ts netFetch http://localhost:4546/",
|
|
None,
|
|
None,
|
|
true,
|
|
);
|
|
assert!(err.contains(util::PERMISSION_DENIED_PATTERN));
|
|
}
|
|
|
|
#[test]
|
|
fn net_fetch_localhost() {
|
|
let _http_guard = util::http_server();
|
|
let (_, err) = util::run_and_collect_output(
|
|
true,
|
|
"run --allow-net=localhost run/complex_permissions_test.ts netFetch http://localhost:4545/ http://localhost:4546/ http://localhost:4547/",
|
|
None,
|
|
None,
|
|
true,
|
|
);
|
|
assert!(!err.contains(util::PERMISSION_DENIED_PATTERN));
|
|
}
|
|
|
|
#[test]
|
|
fn net_connect_allow_localhost_ip_4555() {
|
|
let _http_guard = util::http_server();
|
|
let (_, err) = util::run_and_collect_output(
|
|
true,
|
|
"run --allow-net=127.0.0.1:4545 run/complex_permissions_test.ts netConnect 127.0.0.1:4545",
|
|
None,
|
|
None,
|
|
true,
|
|
);
|
|
assert!(!err.contains(util::PERMISSION_DENIED_PATTERN));
|
|
}
|
|
|
|
#[test]
|
|
fn net_connect_allow_deno_land() {
|
|
let _http_guard = util::http_server();
|
|
let (_, err) = util::run_and_collect_output(
|
|
false,
|
|
"run --allow-net=deno.land run/complex_permissions_test.ts netConnect 127.0.0.1:4546",
|
|
None,
|
|
None,
|
|
true,
|
|
);
|
|
assert!(err.contains(util::PERMISSION_DENIED_PATTERN));
|
|
}
|
|
|
|
#[test]
|
|
fn net_connect_allow_localhost_ip_4545_fail() {
|
|
let _http_guard = util::http_server();
|
|
let (_, err) = util::run_and_collect_output(
|
|
false,
|
|
"run --allow-net=127.0.0.1:4545 run/complex_permissions_test.ts netConnect 127.0.0.1:4546",
|
|
None,
|
|
None,
|
|
true,
|
|
);
|
|
assert!(err.contains(util::PERMISSION_DENIED_PATTERN));
|
|
}
|
|
|
|
#[test]
|
|
fn net_connect_allow_localhost_ip() {
|
|
let _http_guard = util::http_server();
|
|
let (_, err) = util::run_and_collect_output(
|
|
true,
|
|
"run --allow-net=127.0.0.1 run/complex_permissions_test.ts netConnect 127.0.0.1:4545 127.0.0.1:4546 127.0.0.1:4547",
|
|
None,
|
|
None,
|
|
true,
|
|
);
|
|
assert!(!err.contains(util::PERMISSION_DENIED_PATTERN));
|
|
}
|
|
|
|
#[test]
|
|
fn net_listen_allow_localhost_4555() {
|
|
let _http_guard = util::http_server();
|
|
let (_, err) = util::run_and_collect_output(
|
|
true,
|
|
"run --allow-net=localhost:4588 run/complex_permissions_test.ts netListen localhost:4588",
|
|
None,
|
|
None,
|
|
false,
|
|
);
|
|
assert!(!err.contains(util::PERMISSION_DENIED_PATTERN));
|
|
}
|
|
|
|
#[test]
|
|
fn net_listen_allow_deno_land() {
|
|
let _http_guard = util::http_server();
|
|
let (_, err) = util::run_and_collect_output(
|
|
false,
|
|
"run --allow-net=deno.land run/complex_permissions_test.ts netListen localhost:4545",
|
|
None,
|
|
None,
|
|
false,
|
|
);
|
|
assert!(err.contains(util::PERMISSION_DENIED_PATTERN));
|
|
}
|
|
|
|
#[test]
|
|
fn net_listen_allow_localhost_4555_fail() {
|
|
let _http_guard = util::http_server();
|
|
let (_, err) = util::run_and_collect_output(
|
|
false,
|
|
"run --allow-net=localhost:4555 run/complex_permissions_test.ts netListen localhost:4556",
|
|
None,
|
|
None,
|
|
false,
|
|
);
|
|
assert!(err.contains(util::PERMISSION_DENIED_PATTERN));
|
|
}
|
|
|
|
#[test]
|
|
fn net_listen_allow_localhost() {
|
|
let _http_guard = util::http_server();
|
|
// Port 4600 is chosen to not collide with those used by
|
|
// target/debug/test_server
|
|
let (_, err) = util::run_and_collect_output(
|
|
true,
|
|
"run --allow-net=localhost run/complex_permissions_test.ts netListen localhost:4600",
|
|
None,
|
|
None,
|
|
false,
|
|
);
|
|
assert!(!err.contains(util::PERMISSION_DENIED_PATTERN));
|
|
}
|
|
|
|
#[test]
|
|
fn _061_permissions_request() {
|
|
TestContext::default()
|
|
.new_command()
|
|
.args_vec(["run", "--quiet", "run/061_permissions_request.ts"])
|
|
.with_pty(|mut console| {
|
|
console.expect(concat!(
|
|
"┏ ⚠️ Deno requests read access to \"foo\".\r\n",
|
|
"┠─ Requested by `Deno.permissions.request()` API.\r\n",
|
|
"┠─ Learn more at: https://docs.deno.com/go/--allow-read\r\n",
|
|
"┠─ Run again with --allow-read to bypass this prompt.\r\n",
|
|
"┗ Allow? [y/n/A] (y = yes, allow; n = no, deny; A = allow all read permissions)",
|
|
));
|
|
console.human_delay();
|
|
console.write_line_raw("y");
|
|
console.expect(concat!(
|
|
"┏ ⚠️ Deno requests read access to \"bar\".\r\n",
|
|
"┠─ Requested by `Deno.permissions.request()` API.\r\n",
|
|
"┠─ Learn more at: https://docs.deno.com/go/--allow-read\r\n",
|
|
"┠─ Run again with --allow-read to bypass this prompt.\r\n",
|
|
"┗ Allow? [y/n/A] (y = yes, allow; n = no, deny; A = allow all read permissions)",
|
|
));
|
|
console.human_delay();
|
|
console.write_line_raw("n");
|
|
console.expect("granted");
|
|
console.expect("prompt");
|
|
console.expect("denied");
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn _061_permissions_request_sync() {
|
|
TestContext::default()
|
|
.new_command()
|
|
.args_vec(["run", "--quiet", "run/061_permissions_request_sync.ts"])
|
|
.with_pty(|mut console| {
|
|
console.expect(concat!(
|
|
"┏ ⚠️ Deno requests read access to \"foo\".\r\n",
|
|
"┠─ Requested by `Deno.permissions.request()` API.\r\n",
|
|
"┠─ Learn more at: https://docs.deno.com/go/--allow-read\r\n",
|
|
"┠─ Run again with --allow-read to bypass this prompt.\r\n",
|
|
"┗ Allow? [y/n/A] (y = yes, allow; n = no, deny; A = allow all read permissions)",
|
|
));
|
|
console.human_delay();
|
|
console.write_line_raw("y");
|
|
console.expect(concat!(
|
|
"┏ ⚠️ Deno requests read access to \"bar\".\r\n",
|
|
"┠─ Requested by `Deno.permissions.request()` API.\r\n",
|
|
"┠─ Learn more at: https://docs.deno.com/go/--allow-read\r\n",
|
|
"┠─ Run again with --allow-read to bypass this prompt.\r\n",
|
|
"┗ Allow? [y/n/A] (y = yes, allow; n = no, deny; A = allow all read permissions)",
|
|
));
|
|
console.human_delay();
|
|
console.write_line_raw("n");
|
|
console.expect("granted");
|
|
console.expect("prompt");
|
|
console.expect("denied");
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn _062_permissions_request_global() {
|
|
TestContext::default()
|
|
.new_command()
|
|
.args_vec(["run", "--quiet", "run/062_permissions_request_global.ts"])
|
|
.with_pty(|mut console| {
|
|
console.expect(concat!(
|
|
"┏ ⚠️ Deno requests read access.\r\n",
|
|
"┠─ Requested by `Deno.permissions.request()` API.\r\n",
|
|
"┠─ Learn more at: https://docs.deno.com/go/--allow-read\r\n",
|
|
"┠─ Run again with --allow-read to bypass this prompt.\r\n",
|
|
"┗ Allow? [y/n/A] (y = yes, allow; n = no, deny; A = allow all read permissions)",
|
|
));
|
|
console.human_delay();
|
|
console.write_line_raw("y\n");
|
|
console
|
|
.expect("PermissionStatus { state: \"granted\", onchange: null }");
|
|
console
|
|
.expect("PermissionStatus { state: \"granted\", onchange: null }");
|
|
console
|
|
.expect("PermissionStatus { state: \"granted\", onchange: null }");
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn _062_permissions_request_global_sync() {
|
|
TestContext::default()
|
|
.new_command()
|
|
.args_vec(["run", "--quiet", "run/062_permissions_request_global_sync.ts"])
|
|
.with_pty(|mut console| {
|
|
console.expect(concat!(
|
|
"┏ ⚠️ Deno requests read access.\r\n",
|
|
"┠─ Requested by `Deno.permissions.request()` API.\r\n",
|
|
"┠─ Learn more at: https://docs.deno.com/go/--allow-read\r\n",
|
|
"┠─ Run again with --allow-read to bypass this prompt.\r\n",
|
|
"┗ Allow? [y/n/A] (y = yes, allow; n = no, deny; A = allow all read permissions)",
|
|
));
|
|
console.human_delay();
|
|
console.write_line_raw("y");
|
|
console
|
|
.expect("PermissionStatus { state: \"granted\", onchange: null }");
|
|
console
|
|
.expect("PermissionStatus { state: \"granted\", onchange: null }");
|
|
console
|
|
.expect("PermissionStatus { state: \"granted\", onchange: null }");
|
|
});
|
|
}
|
|
|
|
itest!(_063_permissions_revoke {
|
|
args: "run --allow-read=foo,bar run/063_permissions_revoke.ts",
|
|
output: "run/063_permissions_revoke.ts.out",
|
|
});
|
|
|
|
itest!(_063_permissions_revoke_sync {
|
|
args: "run --allow-read=foo,bar run/063_permissions_revoke_sync.ts",
|
|
output: "run/063_permissions_revoke.ts.out",
|
|
});
|
|
|
|
itest!(_064_permissions_revoke_global {
|
|
args: "run --allow-read=foo,bar run/064_permissions_revoke_global.ts",
|
|
output: "run/064_permissions_revoke_global.ts.out",
|
|
});
|
|
|
|
itest!(_064_permissions_revoke_global_sync {
|
|
args: "run --allow-read=foo,bar run/064_permissions_revoke_global_sync.ts",
|
|
output: "run/064_permissions_revoke_global.ts.out",
|
|
});
|
|
|
|
itest!(_065_permissions_revoke_net {
|
|
args: "run --allow-net run/065_permissions_revoke_net.ts",
|
|
output: "run/065_permissions_revoke_net.ts.out",
|
|
});
|
|
|
|
#[test]
|
|
fn _066_prompt() {
|
|
TestContext::default()
|
|
.new_command()
|
|
.args_vec(["run", "--quiet", "run/066_prompt.ts"])
|
|
.with_pty(|mut console| {
|
|
console.expect("What is your name? Jane Doe");
|
|
console.write_line_raw("");
|
|
console.expect("Your name is Jane Doe.");
|
|
|
|
console.expect("Prompt ");
|
|
console.write_line_raw("foo");
|
|
console.expect("Your input is foo.");
|
|
console.expect("Question 0 [y/N] ");
|
|
console.write_line_raw("Y");
|
|
console.expect("Your answer is true");
|
|
console.expect("Question 1 [y/N] ");
|
|
console.write_line_raw("N");
|
|
console.expect("Your answer is false");
|
|
console.expect("Question 2 [y/N] ");
|
|
console.write_line_raw("yes");
|
|
console.expect("Your answer is false");
|
|
console.expect("Confirm [y/N] ");
|
|
console.write_line("");
|
|
console.expect("Your answer is false");
|
|
console.expect("What is Windows EOL? ");
|
|
console.write_line("windows");
|
|
console.expect("Your answer is \"windows\"");
|
|
console.expect("Hi [Enter] ");
|
|
console.write_line("");
|
|
console.expect("Alert [Enter] ");
|
|
console.write_line("");
|
|
console.expect("The end of test");
|
|
});
|
|
}
|
|
|
|
itest!(dynamic_import_static_analysis_no_permissions {
|
|
args: "run --quiet --reload --no-prompt dynamic_import/static_analysis_no_permissions.ts",
|
|
output: "dynamic_import/static_analysis_no_permissions.ts.out",
|
|
});
|
|
|
|
itest!(dynamic_import_permissions_remote_remote {
|
|
args: "run --quiet --reload --allow-import=localhost:4545 dynamic_import/permissions_remote_remote.ts",
|
|
output: "dynamic_import/permissions_remote_remote.ts.out",
|
|
http_server: true,
|
|
exit_code: 1,
|
|
});
|
|
|
|
itest!(dynamic_import_permissions_data_remote {
|
|
args: "run --quiet --reload --allow-import=localhost:4545 dynamic_import/permissions_data_remote.ts",
|
|
output: "dynamic_import/permissions_data_remote.ts.out",
|
|
http_server: true,
|
|
exit_code: 1,
|
|
});
|
|
|
|
itest!(dynamic_import_permissions_blob_remote {
|
|
args: "run --quiet --reload --allow-net=localhost:4545 dynamic_import/permissions_blob_remote.ts",
|
|
output: "dynamic_import/permissions_blob_remote.ts.out",
|
|
http_server: true,
|
|
exit_code: 1,
|
|
});
|
|
|
|
itest!(dynamic_import_permissions_data_local {
|
|
args: "run --quiet --reload --allow-net=localhost:4545 dynamic_import/permissions_data_local.ts",
|
|
output: "dynamic_import/permissions_data_local.ts.out",
|
|
http_server: true,
|
|
exit_code: 1,
|
|
});
|
|
|
|
itest!(dynamic_import_permissions_blob_local {
|
|
args: "run --quiet --reload --allow-net=localhost:4545 dynamic_import/permissions_blob_local.ts",
|
|
output: "dynamic_import/permissions_blob_local.ts.out",
|
|
http_server: true,
|
|
exit_code: 1,
|
|
});
|
|
}
|
|
|
|
itest!(tls_starttls {
|
|
args: "run --quiet --reload --allow-net --allow-read --cert tls/RootCA.pem --config ../config/deno.json run/tls_starttls.js",
|
|
output: "run/tls.out",
|
|
});
|
|
|
|
itest!(tls_connecttls {
|
|
args: "run --quiet --reload --allow-net --allow-read --cert tls/RootCA.pem --config ../config/deno.json run/tls_connecttls.js",
|
|
output: "run/tls.out",
|
|
});
|
|
|
|
itest!(byte_order_mark {
|
|
args: "run --no-check run/byte_order_mark.ts",
|
|
output: "run/byte_order_mark.out",
|
|
});
|
|
|
|
#[test]
|
|
#[cfg(windows)]
|
|
fn process_stdin_read_unblock() {
|
|
TestContext::default()
|
|
.new_command()
|
|
.args_vec(["run", "run/process_stdin_unblock.mjs"])
|
|
.with_pty(|mut console| {
|
|
console.write_raw("b");
|
|
console.human_delay();
|
|
console.write_line_raw("s");
|
|
console.expect_all(&["1", "1"]);
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn issue9750() {
|
|
TestContext::default()
|
|
.new_command()
|
|
.args_vec(["run", "run/issue9750.js"])
|
|
.with_pty(|mut console| {
|
|
console.expect("Enter 'yy':");
|
|
console.write_line_raw("yy");
|
|
console.expect(concat!(
|
|
"┏ ⚠️ Deno requests env access.\r\n",
|
|
"┠─ Requested by `Deno.permissions.request()` API.\r\n",
|
|
"┠─ Learn more at: https://docs.deno.com/go/--allow-env\r\n",
|
|
"┠─ Run again with --allow-env to bypass this prompt.\r\n",
|
|
"┗ Allow? [y/n/A] (y = yes, allow; n = no, deny; A = allow all env permissions)",
|
|
));
|
|
console.human_delay();
|
|
console.write_line_raw("n");
|
|
console.expect("Denied env access.");
|
|
console.expect(concat!(
|
|
"┏ ⚠️ Deno requests env access to \"SECRET\".\r\n",
|
|
"┠─ Learn more at: https://docs.deno.com/go/--allow-env\r\n",
|
|
"┠─ Run again with --allow-env to bypass this prompt.\r\n",
|
|
"┗ Allow? [y/n/A] (y = yes, allow; n = no, deny; A = allow all env permissions)",
|
|
));
|
|
console.human_delay();
|
|
console.write_line_raw("n");
|
|
console.expect_all(&[
|
|
"Denied env access to \"SECRET\".",
|
|
"NotCapable: Requires env access to \"SECRET\", run again with the --allow-env flag",
|
|
]);
|
|
});
|
|
}
|
|
|
|
// Regression test for https://github.com/denoland/deno/issues/11451.
|
|
itest!(dom_exception_formatting {
|
|
args: "run run/dom_exception_formatting.ts",
|
|
output: "run/dom_exception_formatting.ts.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
itest!(long_data_url_formatting {
|
|
args: "run run/long_data_url_formatting.ts",
|
|
output: "run/long_data_url_formatting.ts.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
itest!(eval_context_throw_dom_exception {
|
|
args: "run run/eval_context_throw_dom_exception.js",
|
|
output: "run/eval_context_throw_dom_exception.js.out",
|
|
});
|
|
|
|
#[test]
|
|
#[cfg(unix)]
|
|
fn navigator_language_unix() {
|
|
let (res, _) = util::run_and_collect_output(
|
|
true,
|
|
"run navigator_language.ts",
|
|
None,
|
|
Some(vec![("LC_ALL".to_owned(), "pl_PL".to_owned())]),
|
|
false,
|
|
);
|
|
assert_eq!(res, "pl-PL\n")
|
|
}
|
|
|
|
#[test]
|
|
fn navigator_language() {
|
|
let (res, _) = util::run_and_collect_output(
|
|
true,
|
|
"run navigator_language.ts",
|
|
None,
|
|
None,
|
|
false,
|
|
);
|
|
assert!(!res.is_empty())
|
|
}
|
|
|
|
#[test]
|
|
#[cfg(unix)]
|
|
fn navigator_languages_unix() {
|
|
let (res, _) = util::run_and_collect_output(
|
|
true,
|
|
"run navigator_languages.ts",
|
|
None,
|
|
Some(vec![
|
|
("LC_ALL".to_owned(), "pl_PL".to_owned()),
|
|
("NO_COLOR".to_owned(), "1".to_owned()),
|
|
]),
|
|
false,
|
|
);
|
|
assert_eq!(res, "[ \"pl-PL\" ]\n")
|
|
}
|
|
|
|
#[test]
|
|
fn navigator_languages() {
|
|
let (res, _) = util::run_and_collect_output(
|
|
true,
|
|
"run navigator_languages.ts",
|
|
None,
|
|
None,
|
|
false,
|
|
);
|
|
assert!(!res.is_empty())
|
|
}
|
|
|
|
/// Regression test for https://github.com/denoland/deno/issues/12740.
|
|
#[test]
|
|
fn issue12740() {
|
|
let mod_dir = TempDir::new();
|
|
let mod1_path = mod_dir.path().join("mod1.ts");
|
|
let mod2_path = mod_dir.path().join("mod2.ts");
|
|
mod1_path.write("");
|
|
let status = util::deno_cmd()
|
|
.current_dir(util::testdata_path())
|
|
.arg("run")
|
|
.arg(&mod1_path)
|
|
.stderr(Stdio::null())
|
|
.stdout(Stdio::null())
|
|
.spawn()
|
|
.unwrap()
|
|
.wait()
|
|
.unwrap();
|
|
assert!(status.success());
|
|
mod1_path.write("export { foo } from \"./mod2.ts\";");
|
|
mod2_path.write("(");
|
|
let status = util::deno_cmd()
|
|
.current_dir(util::testdata_path())
|
|
.arg("run")
|
|
.arg(&mod1_path)
|
|
.stderr(Stdio::null())
|
|
.stdout(Stdio::null())
|
|
.spawn()
|
|
.unwrap()
|
|
.wait()
|
|
.unwrap();
|
|
assert!(!status.success());
|
|
}
|
|
|
|
/// Regression test for https://github.com/denoland/deno/issues/12807.
|
|
#[test]
|
|
fn issue12807() {
|
|
let mod_dir = TempDir::new();
|
|
let mod1_path = mod_dir.path().join("mod1.ts");
|
|
let mod2_path = mod_dir.path().join("mod2.ts");
|
|
// With a fresh `DENO_DIR`, run a module with a dependency and a type error.
|
|
mod1_path.write("import './mod2.ts'; Deno.exit('0');");
|
|
mod2_path.write("console.log('Hello, world!');");
|
|
let status = util::deno_cmd()
|
|
.current_dir(util::testdata_path())
|
|
.arg("run")
|
|
.arg("--check")
|
|
.arg(&mod1_path)
|
|
.stderr(Stdio::null())
|
|
.stdout(Stdio::null())
|
|
.spawn()
|
|
.unwrap()
|
|
.wait()
|
|
.unwrap();
|
|
assert!(!status.success());
|
|
// Fix the type error and run again.
|
|
std::fs::write(&mod1_path, "import './mod2.ts'; Deno.exit(0);").unwrap();
|
|
let status = util::deno_cmd()
|
|
.current_dir(util::testdata_path())
|
|
.arg("run")
|
|
.arg("--check")
|
|
.arg(&mod1_path)
|
|
.stderr(Stdio::null())
|
|
.stdout(Stdio::null())
|
|
.spawn()
|
|
.unwrap()
|
|
.wait()
|
|
.unwrap();
|
|
assert!(status.success());
|
|
}
|
|
|
|
itest!(issue_13562 {
|
|
args: "run run/issue13562.ts",
|
|
output: "run/issue13562.ts.out",
|
|
});
|
|
|
|
itest!(import_attributes_static_import {
|
|
args: "run --allow-read import_attributes/static_import.ts",
|
|
output: "import_attributes/static_import.out",
|
|
});
|
|
|
|
itest!(import_attributes_static_export {
|
|
args: "run --allow-read import_attributes/static_export.ts",
|
|
output: "import_attributes/static_export.out",
|
|
});
|
|
|
|
itest!(import_attributes_static_error {
|
|
args: "run --allow-read import_attributes/static_error.ts",
|
|
output: "import_attributes/static_error.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
itest!(import_attributes_dynamic_import {
|
|
args: "run --allow-read --check import_attributes/dynamic_import.ts",
|
|
output: "import_attributes/dynamic_import.out",
|
|
});
|
|
|
|
itest!(import_attributes_dynamic_error {
|
|
args: "run --allow-read import_attributes/dynamic_error.ts",
|
|
output: "import_attributes/dynamic_error.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
itest!(import_attributes_type_check {
|
|
args: "run --allow-read --check import_attributes/type_check.ts",
|
|
output: "import_attributes/type_check.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
itest!(colors_without_global_this {
|
|
args: "run run/colors_without_globalThis.js",
|
|
output_str: Some("true\n"),
|
|
});
|
|
|
|
itest!(config_auto_discovered_for_local_script {
|
|
args: "run --quiet run/with_config/frontend_work.ts",
|
|
output_str: Some("ok\n"),
|
|
});
|
|
|
|
itest!(config_auto_discovered_for_local_script_log {
|
|
args: "run -L debug run/with_config/frontend_work.ts",
|
|
output: "run/with_config/auto_discovery_log.out",
|
|
});
|
|
|
|
itest!(no_config_auto_discovery_for_local_script {
|
|
args: "run --quiet --no-config --check run/with_config/frontend_work.ts",
|
|
output: "run/with_config/no_auto_discovery.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
itest!(config_not_auto_discovered_for_remote_script {
|
|
args: "run --allow-import --quiet http://127.0.0.1:4545/run/with_config/server_side_work.ts",
|
|
output_str: Some("ok\n"),
|
|
http_server: true,
|
|
});
|
|
|
|
// In this case we shouldn't discover `package.json` file, because it's in a
|
|
// directory that is above the directory containing `deno.json` file.
|
|
itest!(
|
|
package_json_auto_discovered_for_local_script_arg_with_stop {
|
|
args: "run -L debug with_stop/some/nested/dir/main.ts",
|
|
output: "run/with_package_json/with_stop/main.out",
|
|
cwd: Some("run/with_package_json/"),
|
|
copy_temp_dir: Some("run/with_package_json/"),
|
|
envs: env_vars_for_npm_tests(),
|
|
http_server: true,
|
|
exit_code: 1,
|
|
}
|
|
);
|
|
|
|
#[test]
|
|
fn package_json_no_node_modules_dir_created() {
|
|
// it should not create a node_modules directory
|
|
let context = TestContextBuilder::new()
|
|
.add_npm_env_vars()
|
|
.use_temp_cwd()
|
|
.build();
|
|
let temp_dir = context.temp_dir();
|
|
|
|
temp_dir.write("deno.json", "{}");
|
|
temp_dir.write("package.json", "{}");
|
|
temp_dir.write("main.ts", "");
|
|
|
|
context.new_command().args("run main.ts").run();
|
|
|
|
assert!(!temp_dir.path().join("node_modules").exists());
|
|
}
|
|
|
|
#[test]
|
|
fn node_modules_dir_no_npm_specifiers_no_dir_created() {
|
|
// it should not create a node_modules directory
|
|
let context = TestContextBuilder::new()
|
|
.add_npm_env_vars()
|
|
.use_temp_cwd()
|
|
.build();
|
|
let temp_dir = context.temp_dir();
|
|
|
|
temp_dir.write("deno.json", "{}");
|
|
temp_dir.write("main.ts", "");
|
|
|
|
context
|
|
.new_command()
|
|
.args("run --node-modules-dir main.ts")
|
|
.run();
|
|
|
|
assert!(!temp_dir.path().join("node_modules").exists());
|
|
}
|
|
|
|
itest!(wasm_streaming_panic_test {
|
|
args: "run run/wasm_streaming_panic_test.js",
|
|
output: "run/wasm_streaming_panic_test.js.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
// Regression test for https://github.com/denoland/deno/issues/13897.
|
|
itest!(fetch_async_error_stack {
|
|
args: "run --quiet -A run/fetch_async_error_stack.ts",
|
|
output: "run/fetch_async_error_stack.ts.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
itest!(event_listener_error {
|
|
args: "run --quiet run/event_listener_error.ts",
|
|
output: "run/event_listener_error.ts.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
itest!(event_listener_error_handled {
|
|
args: "run --quiet run/event_listener_error_handled.ts",
|
|
output: "run/event_listener_error_handled.ts.out",
|
|
});
|
|
|
|
// https://github.com/denoland/deno/pull/14159#issuecomment-1092285446
|
|
itest!(event_listener_error_immediate_exit {
|
|
args: "run --quiet run/event_listener_error_immediate_exit.ts",
|
|
output: "run/event_listener_error_immediate_exit.ts.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
// https://github.com/denoland/deno/pull/14159#issuecomment-1092285446
|
|
itest!(event_listener_error_immediate_exit_worker {
|
|
args: "run --quiet -A run/event_listener_error_immediate_exit_worker.ts",
|
|
output: "run/event_listener_error_immediate_exit_worker.ts.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
itest!(set_timeout_error {
|
|
args: "run --quiet run/set_timeout_error.ts",
|
|
output: "run/set_timeout_error.ts.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
itest!(set_timeout_error_handled {
|
|
args: "run --quiet run/set_timeout_error_handled.ts",
|
|
output: "run/set_timeout_error_handled.ts.out",
|
|
});
|
|
|
|
itest!(aggregate_error {
|
|
args: "run --quiet run/aggregate_error.ts",
|
|
output: "run/aggregate_error.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
itest!(complex_error {
|
|
args: "run --quiet run/complex_error.ts",
|
|
output: "run/complex_error.ts.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
// Regression test for https://github.com/denoland/deno/issues/16340.
|
|
itest!(error_with_errors_prop {
|
|
args: "run --quiet run/error_with_errors_prop.js",
|
|
output: "run/error_with_errors_prop.js.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
// Regression test for https://github.com/denoland/deno/issues/12143.
|
|
itest!(js_root_with_ts_check {
|
|
args: "run --quiet --check run/js_root_with_ts_check.js",
|
|
output: "run/js_root_with_ts_check.js.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
#[test]
|
|
fn check_local_then_remote() {
|
|
let _http_guard = util::http_server();
|
|
let deno_dir = util::new_deno_dir();
|
|
let output = util::deno_cmd_with_deno_dir(&deno_dir)
|
|
.current_dir(util::testdata_path())
|
|
.arg("run")
|
|
.arg("--allow-import")
|
|
.arg("--check")
|
|
.arg("run/remote_type_error/main.ts")
|
|
.spawn()
|
|
.unwrap()
|
|
.wait_with_output()
|
|
.unwrap();
|
|
assert!(output.status.success());
|
|
let output = util::deno_cmd_with_deno_dir(&deno_dir)
|
|
.current_dir(util::testdata_path())
|
|
.arg("run")
|
|
.arg("--allow-import")
|
|
.arg("--check=all")
|
|
.arg("run/remote_type_error/main.ts")
|
|
.env("NO_COLOR", "1")
|
|
.stderr_piped()
|
|
.spawn()
|
|
.unwrap()
|
|
.wait_with_output()
|
|
.unwrap();
|
|
assert!(!output.status.success());
|
|
let stderr = std::str::from_utf8(&output.stderr).unwrap();
|
|
assert_contains!(stderr, "Type 'string' is not assignable to type 'number'.");
|
|
}
|
|
|
|
// Regression test for https://github.com/denoland/deno/issues/15163
|
|
itest!(check_js_points_to_ts {
|
|
args: "run --quiet --check --config run/checkjs.tsconfig.json run/check_js_points_to_ts/test.js",
|
|
output: "run/check_js_points_to_ts/test.js.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
itest!(no_prompt_flag {
|
|
args: "run --quiet --no-prompt run/no_prompt.ts",
|
|
output_str: Some(""),
|
|
});
|
|
|
|
#[test]
|
|
fn permission_request_with_no_prompt() {
|
|
TestContext::default()
|
|
.new_command()
|
|
.env("NO_COLOR", "1")
|
|
.args_vec([
|
|
"run",
|
|
"--quiet",
|
|
"--no-prompt",
|
|
"run/permission_request_no_prompt.ts",
|
|
])
|
|
.with_pty(|mut console| {
|
|
console.expect("PermissionStatus { state: \"denied\", onchange: null }");
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn deno_no_prompt_environment_variable() {
|
|
let output = util::deno_cmd()
|
|
.current_dir(util::testdata_path())
|
|
.arg("run")
|
|
.arg("run/no_prompt.ts")
|
|
.env("DENO_NO_PROMPT", "1")
|
|
.spawn()
|
|
.unwrap()
|
|
.wait_with_output()
|
|
.unwrap();
|
|
assert!(output.status.success());
|
|
}
|
|
|
|
itest!(report_error {
|
|
args: "run --quiet run/report_error.ts",
|
|
output: "run/report_error.ts.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
itest!(report_error_handled {
|
|
args: "run --quiet run/report_error_handled.ts",
|
|
output: "run/report_error_handled.ts.out",
|
|
});
|
|
|
|
// Regression test for https://github.com/denoland/deno/issues/15513.
|
|
itest!(report_error_end_of_program {
|
|
args: "run --quiet run/report_error_end_of_program.ts",
|
|
output: "run/report_error_end_of_program.ts.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
itest!(queue_microtask_error {
|
|
args: "run --quiet run/queue_microtask_error.ts",
|
|
output: "run/queue_microtask_error.ts.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
itest!(queue_microtask_error_handled {
|
|
args: "run --quiet run/queue_microtask_error_handled.ts",
|
|
output: "run/queue_microtask_error_handled.ts.out",
|
|
});
|
|
|
|
itest!(spawn_stdout_inherit {
|
|
args: "run --quiet -A run/spawn_stdout_inherit.ts",
|
|
output: "run/spawn_stdout_inherit.ts.out",
|
|
});
|
|
|
|
itest!(error_name_non_string {
|
|
args: "run --quiet run/error_name_non_string.js",
|
|
output: "run/error_name_non_string.js.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
itest!(custom_inspect_url {
|
|
args: "run run/custom_inspect_url.js",
|
|
output: "run/custom_inspect_url.js.out",
|
|
});
|
|
|
|
itest!(config_json_import {
|
|
args: "run --quiet -c jsx/deno-jsx.json run/config_json_import.ts",
|
|
output: "run/config_json_import.ts.out",
|
|
http_server: true,
|
|
});
|
|
|
|
#[test]
|
|
fn running_declaration_files() {
|
|
let context = TestContextBuilder::new().use_temp_cwd().build();
|
|
let temp_dir = context.temp_dir();
|
|
let files = vec!["file.d.ts", "file.d.cts", "file.d.mts"];
|
|
|
|
for file in files {
|
|
temp_dir.write(file, "");
|
|
context
|
|
.new_command()
|
|
.args_vec(["run", file])
|
|
.run()
|
|
.skip_output_check()
|
|
.assert_exit_code(0);
|
|
}
|
|
}
|
|
|
|
itest!(test_and_bench_are_noops_in_run {
|
|
args: "run run/test_and_bench_in_run.js",
|
|
output_str: Some(""),
|
|
});
|
|
|
|
#[cfg(not(target_os = "windows"))]
|
|
itest!(spawn_kill_permissions {
|
|
args: "run --quiet --allow-run=cat spawn_kill_permissions.ts",
|
|
envs: vec![
|
|
("LD_LIBRARY_PATH".to_string(), "".to_string()),
|
|
("DYLD_FALLBACK_LIBRARY_PATH".to_string(), "".to_string())
|
|
],
|
|
output_str: Some(""),
|
|
});
|
|
|
|
itest!(followup_dyn_import_resolved {
|
|
args: "run --allow-read run/followup_dyn_import_resolves/main.ts",
|
|
output: "run/followup_dyn_import_resolves/main.ts.out",
|
|
});
|
|
|
|
itest!(unhandled_rejection {
|
|
args: "run --check run/unhandled_rejection.ts",
|
|
output: "run/unhandled_rejection.ts.out",
|
|
});
|
|
|
|
itest!(unhandled_rejection_sync_error {
|
|
args: "run --check run/unhandled_rejection_sync_error.ts",
|
|
output: "run/unhandled_rejection_sync_error.ts.out",
|
|
});
|
|
|
|
// Regression test for https://github.com/denoland/deno/issues/15661
|
|
itest!(unhandled_rejection_dynamic_import {
|
|
args: "run --allow-read run/unhandled_rejection_dynamic_import/main.ts",
|
|
output: "run/unhandled_rejection_dynamic_import/main.ts.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
// Regression test for https://github.com/denoland/deno/issues/16909
|
|
itest!(unhandled_rejection_dynamic_import2 {
|
|
args: "run --allow-read run/unhandled_rejection_dynamic_import2/main.ts",
|
|
output: "run/unhandled_rejection_dynamic_import2/main.ts.out",
|
|
});
|
|
|
|
itest!(rejection_handled {
|
|
args: "run --check run/rejection_handled.ts",
|
|
output: "run/rejection_handled.out",
|
|
});
|
|
|
|
itest!(nested_error {
|
|
args: "run run/nested_error/main.ts",
|
|
output: "run/nested_error/main.ts.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
itest!(node_env_var_allowlist {
|
|
args: "run --no-prompt run/node_env_var_allowlist.ts",
|
|
output: "run/node_env_var_allowlist.ts.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
#[test]
|
|
fn cache_test() {
|
|
let _g = util::http_server();
|
|
let deno_dir = TempDir::new();
|
|
let module_url =
|
|
url::Url::parse("http://localhost:4545/run/006_url_imports.ts").unwrap();
|
|
let output = Command::new(util::deno_exe_path())
|
|
.env("DENO_DIR", deno_dir.path())
|
|
.current_dir(util::testdata_path())
|
|
.arg("cache")
|
|
.arg("--allow-import=localhost:4545")
|
|
.arg("--check=all")
|
|
.arg("-L")
|
|
.arg("debug")
|
|
.arg(module_url.to_string())
|
|
.output()
|
|
.expect("Failed to spawn script");
|
|
assert!(output.status.success());
|
|
|
|
let prg = util::deno_exe_path();
|
|
let output = Command::new(prg)
|
|
.env("DENO_DIR", deno_dir.path())
|
|
.env("HTTP_PROXY", "http://nil")
|
|
.env("NO_COLOR", "1")
|
|
.current_dir(util::testdata_path())
|
|
.arg("run")
|
|
.arg("--allow-import=localhost:4545")
|
|
.arg(module_url.to_string())
|
|
.output()
|
|
.expect("Failed to spawn script");
|
|
|
|
let str_output = std::str::from_utf8(&output.stdout).unwrap();
|
|
|
|
let module_output_path =
|
|
util::testdata_path().join("run/006_url_imports.ts.out");
|
|
let mut module_output = String::new();
|
|
let mut module_output_file = std::fs::File::open(module_output_path).unwrap();
|
|
module_output_file
|
|
.read_to_string(&mut module_output)
|
|
.unwrap();
|
|
|
|
assert_eq!(module_output, str_output);
|
|
}
|
|
|
|
#[test]
|
|
fn cache_invalidation_test() {
|
|
let deno_dir = TempDir::new();
|
|
let fixture_path = deno_dir.path().join("fixture.ts");
|
|
fixture_path.write("console.log(\"42\");");
|
|
let output = Command::new(util::deno_exe_path())
|
|
.env("DENO_DIR", deno_dir.path())
|
|
.current_dir(util::testdata_path())
|
|
.arg("run")
|
|
.arg(&fixture_path)
|
|
.output()
|
|
.expect("Failed to spawn script");
|
|
assert!(output.status.success());
|
|
let actual = std::str::from_utf8(&output.stdout).unwrap();
|
|
assert_eq!(actual, "42\n");
|
|
fixture_path.write("console.log(\"43\");");
|
|
let output = Command::new(util::deno_exe_path())
|
|
.env("DENO_DIR", deno_dir.path())
|
|
.current_dir(util::testdata_path())
|
|
.arg("run")
|
|
.arg(fixture_path)
|
|
.output()
|
|
.expect("Failed to spawn script");
|
|
assert!(output.status.success());
|
|
let actual = std::str::from_utf8(&output.stdout).unwrap();
|
|
assert_eq!(actual, "43\n");
|
|
}
|
|
|
|
#[test]
|
|
fn cache_invalidation_test_no_check() {
|
|
let deno_dir = TempDir::new();
|
|
let fixture_path = deno_dir.path().join("fixture.ts");
|
|
fixture_path.write("console.log(\"42\");");
|
|
let output = Command::new(util::deno_exe_path())
|
|
.env("DENO_DIR", deno_dir.path())
|
|
.current_dir(util::testdata_path())
|
|
.arg("run")
|
|
.arg("--no-check")
|
|
.arg(&fixture_path)
|
|
.output()
|
|
.expect("Failed to spawn script");
|
|
assert!(output.status.success());
|
|
let actual = std::str::from_utf8(&output.stdout).unwrap();
|
|
assert_eq!(actual, "42\n");
|
|
fixture_path.write("console.log(\"43\");");
|
|
let output = Command::new(util::deno_exe_path())
|
|
.env("DENO_DIR", deno_dir.path())
|
|
.current_dir(util::testdata_path())
|
|
.arg("run")
|
|
.arg("--no-check")
|
|
.arg(fixture_path)
|
|
.output()
|
|
.expect("Failed to spawn script");
|
|
assert!(output.status.success());
|
|
let actual = std::str::from_utf8(&output.stdout).unwrap();
|
|
assert_eq!(actual, "43\n");
|
|
}
|
|
|
|
#[test]
|
|
fn ts_dependency_recompilation() {
|
|
let t = TempDir::new();
|
|
let ats = t.path().join("a.ts");
|
|
|
|
std::fs::write(
|
|
&ats,
|
|
"
|
|
import { foo } from \"./b.ts\";
|
|
|
|
function print(str: string): void {
|
|
console.log(str);
|
|
}
|
|
|
|
print(foo);",
|
|
)
|
|
.unwrap();
|
|
|
|
let bts = t.path().join("b.ts");
|
|
std::fs::write(
|
|
&bts,
|
|
"
|
|
export const foo = \"foo\";",
|
|
)
|
|
.unwrap();
|
|
|
|
let output = util::deno_cmd()
|
|
.current_dir(util::testdata_path())
|
|
.env("NO_COLOR", "1")
|
|
.arg("run")
|
|
.arg("--check")
|
|
.arg(&ats)
|
|
.output()
|
|
.expect("failed to spawn script");
|
|
|
|
let stdout_output = std::str::from_utf8(&output.stdout).unwrap().trim();
|
|
let stderr_output = std::str::from_utf8(&output.stderr).unwrap().trim();
|
|
|
|
assert!(stdout_output.ends_with("foo"));
|
|
assert!(stderr_output.starts_with("Check"));
|
|
|
|
// Overwrite contents of b.ts and run again
|
|
std::fs::write(
|
|
&bts,
|
|
"
|
|
export const foo = 5;",
|
|
)
|
|
.expect("error writing file");
|
|
|
|
let output = util::deno_cmd()
|
|
.current_dir(util::testdata_path())
|
|
.env("NO_COLOR", "1")
|
|
.arg("run")
|
|
.arg("--check")
|
|
.arg(&ats)
|
|
.output()
|
|
.expect("failed to spawn script");
|
|
|
|
let stdout_output = std::str::from_utf8(&output.stdout).unwrap().trim();
|
|
let stderr_output = std::str::from_utf8(&output.stderr).unwrap().trim();
|
|
|
|
// error: TS2345 [ERROR]: Argument of type '5' is not assignable to parameter of type 'string'.
|
|
assert!(stderr_output.contains("TS2345"));
|
|
assert!(!output.status.success());
|
|
assert!(stdout_output.is_empty());
|
|
}
|
|
|
|
#[test]
|
|
fn basic_auth_tokens() {
|
|
let _g = util::http_server();
|
|
|
|
let output = util::deno_cmd()
|
|
.current_dir(util::root_path())
|
|
.arg("run")
|
|
.arg("--allow-import")
|
|
.arg("http://127.0.0.1:4554/run/001_hello.js")
|
|
.piped_output()
|
|
.spawn()
|
|
.unwrap()
|
|
.wait_with_output()
|
|
.unwrap();
|
|
|
|
assert!(!output.status.success());
|
|
|
|
let stdout_str = std::str::from_utf8(&output.stdout).unwrap().trim();
|
|
assert!(stdout_str.is_empty());
|
|
|
|
let stderr_str = std::str::from_utf8(&output.stderr).unwrap().trim();
|
|
eprintln!("{stderr_str}");
|
|
|
|
assert!(stderr_str
|
|
.contains("Module not found \"http://127.0.0.1:4554/run/001_hello.js\"."));
|
|
|
|
let output = util::deno_cmd()
|
|
.current_dir(util::root_path())
|
|
.arg("run")
|
|
.arg("--allow-import")
|
|
.arg("http://127.0.0.1:4554/run/001_hello.js")
|
|
.env("DENO_AUTH_TOKENS", "testuser123:testpassabc@127.0.0.1:4554")
|
|
.piped_output()
|
|
.spawn()
|
|
.unwrap()
|
|
.wait_with_output()
|
|
.unwrap();
|
|
|
|
let stderr_str = std::str::from_utf8(&output.stderr).unwrap().trim();
|
|
eprintln!("{stderr_str}");
|
|
|
|
assert!(output.status.success());
|
|
|
|
let stdout_str = std::str::from_utf8(&output.stdout).unwrap().trim();
|
|
assert_eq!(util::strip_ansi_codes(stdout_str), "Hello World");
|
|
}
|
|
|
|
#[tokio::test(flavor = "multi_thread", worker_threads = 2)]
|
|
async fn test_resolve_dns() {
|
|
use std::net::SocketAddr;
|
|
use std::str::FromStr;
|
|
use std::sync::Arc;
|
|
use std::time::Duration;
|
|
use tokio::net::TcpListener;
|
|
use tokio::net::UdpSocket;
|
|
use tokio::sync::oneshot;
|
|
use trust_dns_server::authority::Catalog;
|
|
use trust_dns_server::authority::ZoneType;
|
|
use trust_dns_server::proto::rr::Name;
|
|
use trust_dns_server::store::in_memory::InMemoryAuthority;
|
|
use trust_dns_server::ServerFuture;
|
|
|
|
const DNS_PORT: u16 = 4553;
|
|
|
|
// Setup DNS server for testing
|
|
async fn run_dns_server(tx: oneshot::Sender<()>) {
|
|
let zone_file = std::fs::read_to_string(
|
|
util::testdata_path().join("run/resolve_dns.zone.in"),
|
|
)
|
|
.unwrap();
|
|
let lexer = Lexer::new(&zone_file);
|
|
let records =
|
|
Parser::new().parse(lexer, Some(Name::from_str("example.com").unwrap()));
|
|
if records.is_err() {
|
|
panic!("failed to parse: {:?}", records.err())
|
|
}
|
|
let (origin, records) = records.unwrap();
|
|
let authority = Box::new(Arc::new(
|
|
InMemoryAuthority::new(origin, records, ZoneType::Primary, false)
|
|
.unwrap(),
|
|
));
|
|
let mut catalog: Catalog = Catalog::new();
|
|
catalog.upsert(Name::root().into(), authority);
|
|
|
|
let mut server_fut = ServerFuture::new(catalog);
|
|
let socket_addr = SocketAddr::from(([127, 0, 0, 1], DNS_PORT));
|
|
let tcp_listener = TcpListener::bind(socket_addr).await.unwrap();
|
|
let udp_socket = UdpSocket::bind(socket_addr).await.unwrap();
|
|
server_fut.register_socket(udp_socket);
|
|
server_fut.register_listener(tcp_listener, Duration::from_secs(2));
|
|
|
|
// Notifies that the DNS server is ready
|
|
tx.send(()).unwrap();
|
|
|
|
server_fut.block_until_done().await.unwrap();
|
|
}
|
|
|
|
let (ready_tx, ready_rx) = oneshot::channel();
|
|
let dns_server_fut = run_dns_server(ready_tx);
|
|
let handle = tokio::spawn(dns_server_fut);
|
|
|
|
// Waits for the DNS server to be ready
|
|
ready_rx.await.unwrap();
|
|
|
|
// Pass: `--allow-net`
|
|
{
|
|
let output = util::deno_cmd()
|
|
.current_dir(util::testdata_path())
|
|
.env("NO_COLOR", "1")
|
|
.arg("run")
|
|
.arg("--check")
|
|
.arg("--allow-net")
|
|
.arg("run/resolve_dns.ts")
|
|
.piped_output()
|
|
.spawn()
|
|
.unwrap()
|
|
.wait_with_output()
|
|
.unwrap();
|
|
let err = String::from_utf8_lossy(&output.stderr);
|
|
let out = String::from_utf8_lossy(&output.stdout);
|
|
println!("{err}");
|
|
assert!(output.status.success());
|
|
assert!(err.starts_with("Check file"));
|
|
|
|
let expected = std::fs::read_to_string(
|
|
util::testdata_path().join("run/resolve_dns.ts.out"),
|
|
)
|
|
.unwrap();
|
|
assert_eq!(expected, out);
|
|
}
|
|
|
|
// Pass: `--allow-net=127.0.0.1:4553`
|
|
{
|
|
let output = util::deno_cmd()
|
|
.current_dir(util::testdata_path())
|
|
.env("NO_COLOR", "1")
|
|
.arg("run")
|
|
.arg("--check")
|
|
.arg("--allow-net=127.0.0.1:4553")
|
|
.arg("run/resolve_dns.ts")
|
|
.piped_output()
|
|
.spawn()
|
|
.unwrap()
|
|
.wait_with_output()
|
|
.unwrap();
|
|
let err = String::from_utf8_lossy(&output.stderr);
|
|
let out = String::from_utf8_lossy(&output.stdout);
|
|
if !output.status.success() {
|
|
eprintln!("stderr: {err}");
|
|
}
|
|
assert!(output.status.success());
|
|
assert!(err.starts_with("Check file"));
|
|
|
|
let expected = std::fs::read_to_string(
|
|
util::testdata_path().join("run/resolve_dns.ts.out"),
|
|
)
|
|
.unwrap();
|
|
assert_eq!(expected, out);
|
|
}
|
|
|
|
// Permission error: `--allow-net=deno.land`
|
|
{
|
|
let output = util::deno_cmd()
|
|
.current_dir(util::testdata_path())
|
|
.env("NO_COLOR", "1")
|
|
.arg("run")
|
|
.arg("--check")
|
|
.arg("--allow-net=deno.land")
|
|
.arg("run/resolve_dns.ts")
|
|
.piped_output()
|
|
.spawn()
|
|
.unwrap()
|
|
.wait_with_output()
|
|
.unwrap();
|
|
let err = String::from_utf8_lossy(&output.stderr);
|
|
let out = String::from_utf8_lossy(&output.stdout);
|
|
assert!(!output.status.success());
|
|
assert!(err.starts_with("Check file"));
|
|
assert!(err.contains(r#"error: Uncaught (in promise) NotCapable: Requires net access to "127.0.0.1:4553""#));
|
|
assert!(out.is_empty());
|
|
}
|
|
|
|
// Permission error: no permission specified
|
|
{
|
|
let output = util::deno_cmd()
|
|
.current_dir(util::testdata_path())
|
|
.env("NO_COLOR", "1")
|
|
.arg("run")
|
|
.arg("--check")
|
|
.arg("run/resolve_dns.ts")
|
|
.piped_output()
|
|
.spawn()
|
|
.unwrap()
|
|
.wait_with_output()
|
|
.unwrap();
|
|
let err = String::from_utf8_lossy(&output.stderr);
|
|
let out = String::from_utf8_lossy(&output.stdout);
|
|
assert!(!output.status.success());
|
|
assert!(err.starts_with("Check file"));
|
|
assert!(err.contains(r#"error: Uncaught (in promise) NotCapable: Requires net access to "127.0.0.1:4553""#));
|
|
assert!(out.is_empty());
|
|
}
|
|
|
|
handle.abort();
|
|
}
|
|
|
|
#[tokio::test]
|
|
async fn http2_request_url() {
|
|
let mut child = util::deno_cmd()
|
|
.current_dir(util::testdata_path())
|
|
.arg("run")
|
|
.arg("--quiet")
|
|
.arg("--allow-net")
|
|
.arg("--allow-read")
|
|
.arg("./run/http2_request_url.ts")
|
|
.arg("4506")
|
|
.stdout_piped()
|
|
.spawn()
|
|
.unwrap();
|
|
let stdout = child.stdout.as_mut().unwrap();
|
|
let mut buffer = [0; 5];
|
|
let read = stdout.read(&mut buffer).unwrap();
|
|
assert_eq!(read, 5);
|
|
let msg = std::str::from_utf8(&buffer).unwrap();
|
|
assert_eq!(msg, "READY");
|
|
|
|
let cert = reqwest::Certificate::from_pem(include_bytes!(
|
|
"../testdata/tls/RootCA.crt"
|
|
))
|
|
.unwrap();
|
|
|
|
let client = reqwest::Client::builder()
|
|
.add_root_certificate(cert)
|
|
.http2_prior_knowledge()
|
|
.build()
|
|
.unwrap();
|
|
|
|
let res = client.get("http://127.0.0.1:4506").send().await.unwrap();
|
|
assert_eq!(200, res.status());
|
|
|
|
let body = res.text().await.unwrap();
|
|
assert_eq!(body, "http://127.0.0.1:4506/");
|
|
|
|
child.kill().unwrap();
|
|
child.wait().unwrap();
|
|
}
|
|
|
|
#[cfg(not(windows))]
|
|
#[test]
|
|
fn set_raw_should_not_panic_on_no_tty() {
|
|
let output = util::deno_cmd()
|
|
.arg("eval")
|
|
.arg("Deno.stdin.setRaw(true)")
|
|
// stdin set to piped so it certainly does not refer to TTY
|
|
.stdin(std::process::Stdio::piped())
|
|
// stderr is piped so we can capture output.
|
|
.stderr_piped()
|
|
.spawn()
|
|
.unwrap()
|
|
.wait_with_output()
|
|
.unwrap();
|
|
assert!(!output.status.success());
|
|
let stderr = std::str::from_utf8(&output.stderr).unwrap().trim();
|
|
assert!(stderr.contains("BadResource"));
|
|
}
|
|
|
|
#[cfg(not(windows))]
|
|
#[test]
|
|
fn fsfile_set_raw_should_not_panic_on_no_tty() {
|
|
let output = util::deno_cmd()
|
|
.arg("eval")
|
|
.arg("Deno.openSync(\"/dev/stdin\").setRaw(true)")
|
|
// stdin set to piped so it certainly does not refer to TTY
|
|
.stdin(std::process::Stdio::piped())
|
|
// stderr is piped so we can capture output.
|
|
.stderr_piped()
|
|
.spawn()
|
|
.unwrap()
|
|
.wait_with_output()
|
|
.unwrap();
|
|
assert!(!output.status.success());
|
|
let stderr = std::str::from_utf8(&output.stderr).unwrap().trim();
|
|
assert!(
|
|
stderr.contains("BadResource"),
|
|
"stderr did not contain BadResource: {stderr}"
|
|
);
|
|
}
|
|
|
|
#[test]
|
|
fn timeout_clear() {
|
|
// https://github.com/denoland/deno/issues/7599
|
|
|
|
use std::time::Duration;
|
|
use std::time::Instant;
|
|
|
|
let source_code = r#"
|
|
const handle = setTimeout(() => {
|
|
console.log("timeout finish");
|
|
}, 10000);
|
|
clearTimeout(handle);
|
|
console.log("finish");
|
|
"#;
|
|
|
|
let mut p = util::deno_cmd()
|
|
.current_dir(util::testdata_path())
|
|
.arg("run")
|
|
.arg("-")
|
|
.stdin(std::process::Stdio::piped())
|
|
.spawn()
|
|
.unwrap();
|
|
let stdin = p.stdin.as_mut().unwrap();
|
|
stdin.write_all(source_code.as_bytes()).unwrap();
|
|
let start = Instant::now();
|
|
let status = p.wait().unwrap();
|
|
let end = Instant::now();
|
|
assert!(status.success());
|
|
// check that program did not run for 10 seconds
|
|
// for timeout to clear
|
|
assert!(end - start < Duration::new(10, 0));
|
|
}
|
|
|
|
#[test]
|
|
fn broken_stdout() {
|
|
let (reader, writer) = os_pipe::pipe().unwrap();
|
|
// drop the reader to create a broken pipe
|
|
drop(reader);
|
|
|
|
let output = util::deno_cmd()
|
|
.current_dir(util::testdata_path())
|
|
.arg("eval")
|
|
.arg("console.log(3.14)")
|
|
.stdout(writer)
|
|
.stderr_piped()
|
|
.spawn()
|
|
.unwrap()
|
|
.wait_with_output()
|
|
.unwrap();
|
|
|
|
assert!(!output.status.success());
|
|
let stderr = std::str::from_utf8(output.stderr.as_ref()).unwrap().trim();
|
|
assert!(stderr.contains("Uncaught (in promise) BrokenPipe"));
|
|
assert!(!stderr.contains("panic"));
|
|
}
|
|
|
|
#[test]
|
|
fn broken_stdout_repl() {
|
|
let (reader, writer) = os_pipe::pipe().unwrap();
|
|
// drop the reader to create a broken pipe
|
|
drop(reader);
|
|
|
|
let output = util::deno_cmd()
|
|
.current_dir(util::testdata_path())
|
|
.arg("repl")
|
|
.stdout(writer)
|
|
.stderr_piped()
|
|
.spawn()
|
|
.unwrap()
|
|
.wait_with_output()
|
|
.unwrap();
|
|
|
|
assert!(!output.status.success());
|
|
let stderr = std::str::from_utf8(output.stderr.as_ref()).unwrap().trim();
|
|
if cfg!(windows) {
|
|
assert_contains!(stderr, "The pipe is being closed. (os error 232)");
|
|
} else {
|
|
assert_contains!(stderr, "Broken pipe (os error 32)");
|
|
}
|
|
assert_not_contains!(stderr, "panic");
|
|
}
|
|
|
|
itest!(error_cause {
|
|
args: "run run/error_cause.ts",
|
|
output: "run/error_cause.ts.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
itest!(error_cause_recursive_aggregate {
|
|
args: "run error_cause_recursive_aggregate.ts",
|
|
output: "error_cause_recursive_aggregate.ts.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
itest!(error_cause_recursive_tail {
|
|
args: "run error_cause_recursive_tail.ts",
|
|
output: "error_cause_recursive_tail.ts.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
itest!(error_cause_recursive {
|
|
args: "run run/error_cause_recursive.ts",
|
|
output: "run/error_cause_recursive.ts.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
itest!(js_without_extension {
|
|
args: "run --ext js --check file_extensions/js_without_extension",
|
|
output: "file_extensions/js_without_extension.out",
|
|
exit_code: 0,
|
|
});
|
|
|
|
itest!(ts_without_extension {
|
|
args: "run --ext ts --check file_extensions/ts_without_extension",
|
|
output: "file_extensions/ts_without_extension.out",
|
|
exit_code: 0,
|
|
});
|
|
|
|
itest!(ext_flag_takes_precedence_over_extension {
|
|
args: "run --ext ts --check file_extensions/ts_with_js_extension.js",
|
|
output: "file_extensions/ts_with_js_extension.out",
|
|
exit_code: 0,
|
|
});
|
|
|
|
#[tokio::test(flavor = "multi_thread")]
|
|
async fn websocketstream_ping() {
|
|
let _g = util::http_server();
|
|
|
|
let script = util::testdata_path().join("run/websocketstream_ping_test.ts");
|
|
let root_ca = util::testdata_path().join("tls/RootCA.pem");
|
|
|
|
let srv_fn = hyper::service::service_fn(|mut req| async move {
|
|
let (response, upgrade_fut) =
|
|
fastwebsockets::upgrade::upgrade(&mut req).unwrap();
|
|
tokio::spawn(async move {
|
|
let mut ws = upgrade_fut.await.unwrap();
|
|
|
|
ws.write_frame(fastwebsockets::Frame::text(b"A"[..].into()))
|
|
.await
|
|
.unwrap();
|
|
ws.write_frame(fastwebsockets::Frame::new(
|
|
true,
|
|
fastwebsockets::OpCode::Ping,
|
|
None,
|
|
vec![].into(),
|
|
))
|
|
.await
|
|
.unwrap();
|
|
ws.write_frame(fastwebsockets::Frame::text(b"B"[..].into()))
|
|
.await
|
|
.unwrap();
|
|
let message = ws.read_frame().await.unwrap();
|
|
assert_eq!(message.opcode, fastwebsockets::OpCode::Pong);
|
|
ws.write_frame(fastwebsockets::Frame::text(b"C"[..].into()))
|
|
.await
|
|
.unwrap();
|
|
ws.write_frame(fastwebsockets::Frame::close_raw(vec![].into()))
|
|
.await
|
|
.unwrap();
|
|
});
|
|
Ok::<_, std::convert::Infallible>(response)
|
|
});
|
|
|
|
let child = util::deno_cmd()
|
|
.arg("test")
|
|
.arg("--unstable-net")
|
|
.arg("--allow-net")
|
|
.arg("--cert")
|
|
.arg(root_ca)
|
|
.arg(script)
|
|
.stdout_piped()
|
|
.spawn()
|
|
.unwrap();
|
|
let server = tokio::net::TcpListener::bind("127.0.0.1:4513")
|
|
.await
|
|
.unwrap();
|
|
tokio::spawn(async move {
|
|
let (stream, _) = server.accept().await.unwrap();
|
|
let io = hyper_util::rt::TokioIo::new(stream);
|
|
let conn_fut = hyper::server::conn::http1::Builder::new()
|
|
.serve_connection(io, srv_fn)
|
|
.with_upgrades();
|
|
|
|
if let Err(e) = conn_fut.await {
|
|
eprintln!("websocket server error: {e:?}");
|
|
}
|
|
});
|
|
|
|
let r = child.wait_with_output().unwrap();
|
|
assert!(r.status.success());
|
|
}
|
|
|
|
struct SpawnExecutor;
|
|
|
|
impl<Fut> hyper::rt::Executor<Fut> for SpawnExecutor
|
|
where
|
|
Fut: std::future::Future + Send + 'static,
|
|
Fut::Output: Send + 'static,
|
|
{
|
|
fn execute(&self, fut: Fut) {
|
|
deno_core::unsync::spawn(fut);
|
|
}
|
|
}
|
|
|
|
#[tokio::test]
|
|
async fn websocket_server_multi_field_connection_header() {
|
|
let script = util::testdata_path()
|
|
.join("run/websocket_server_multi_field_connection_header_test.ts");
|
|
let root_ca = util::testdata_path().join("tls/RootCA.pem");
|
|
let mut child = util::deno_cmd()
|
|
.arg("run")
|
|
.arg("--allow-net")
|
|
.arg("--cert")
|
|
.arg(root_ca)
|
|
.arg(script)
|
|
.stdout_piped()
|
|
.spawn()
|
|
.unwrap();
|
|
|
|
let stdout = child.stdout.as_mut().unwrap();
|
|
let mut buffer = [0; 5];
|
|
let read = stdout.read(&mut buffer).unwrap();
|
|
assert_eq!(read, 5);
|
|
let msg = std::str::from_utf8(&buffer).unwrap();
|
|
assert_eq!(msg, "READY");
|
|
|
|
let stream = tokio::net::TcpStream::connect("localhost:4319")
|
|
.await
|
|
.unwrap();
|
|
let req = http::Request::builder()
|
|
.header(http::header::UPGRADE, "websocket")
|
|
.header(http::header::CONNECTION, "keep-alive, Upgrade")
|
|
.header(
|
|
"Sec-WebSocket-Key",
|
|
fastwebsockets::handshake::generate_key(),
|
|
)
|
|
.header("Sec-WebSocket-Version", "13")
|
|
.uri("ws://localhost:4319")
|
|
.body(http_body_util::Empty::<Bytes>::new())
|
|
.unwrap();
|
|
|
|
let (mut socket, _) =
|
|
fastwebsockets::handshake::client(&SpawnExecutor, req, stream)
|
|
.await
|
|
.unwrap();
|
|
|
|
let message = socket.read_frame().await.unwrap();
|
|
assert_eq!(message.opcode, fastwebsockets::OpCode::Close);
|
|
assert!(message.payload.is_empty());
|
|
socket
|
|
.write_frame(fastwebsockets::Frame::close_raw(vec![].into()))
|
|
.await
|
|
.unwrap();
|
|
assert!(child.wait().unwrap().success());
|
|
}
|
|
|
|
#[tokio::test]
|
|
async fn websocket_server_idletimeout() {
|
|
test_util::timeout!(60);
|
|
let script =
|
|
util::testdata_path().join("run/websocket_server_idletimeout.ts");
|
|
let root_ca = util::testdata_path().join("tls/RootCA.pem");
|
|
let mut child = util::deno_cmd()
|
|
.arg("run")
|
|
.arg("--allow-net")
|
|
.arg("--cert")
|
|
.arg(root_ca)
|
|
.arg("--config")
|
|
.arg("./config/deno.json")
|
|
.arg(script)
|
|
.stdout_piped()
|
|
.spawn()
|
|
.unwrap();
|
|
|
|
let stdout = child.stdout.as_mut().unwrap();
|
|
let mut buf: Vec<u8> = vec![];
|
|
while !String::from_utf8(buf.clone()).unwrap().contains("READY") {
|
|
let mut buffer = [0; 64];
|
|
let read = stdout.read(&mut buffer).unwrap();
|
|
buf.extend_from_slice(&buffer[0..read]);
|
|
eprintln!("buf = {buf:?}");
|
|
}
|
|
|
|
let stream = tokio::net::TcpStream::connect("localhost:4509")
|
|
.await
|
|
.unwrap();
|
|
let req = http::Request::builder()
|
|
.header(http::header::UPGRADE, "websocket")
|
|
.header(http::header::CONNECTION, "keep-alive, Upgrade")
|
|
.header(
|
|
"Sec-WebSocket-Key",
|
|
fastwebsockets::handshake::generate_key(),
|
|
)
|
|
.header("Sec-WebSocket-Version", "13")
|
|
.uri("ws://localhost:4509")
|
|
.body(http_body_util::Empty::<Bytes>::new())
|
|
.unwrap();
|
|
|
|
let (_socket, _) =
|
|
fastwebsockets::handshake::client(&SpawnExecutor, req, stream)
|
|
.await
|
|
.unwrap();
|
|
assert_eq!(child.wait().unwrap().code(), Some(123));
|
|
}
|
|
|
|
itest!(no_lock_flag {
|
|
args: "run --allow-import --no-lock run/no_lock_flag/main.ts",
|
|
output: "run/no_lock_flag/main.out",
|
|
http_server: true,
|
|
exit_code: 0,
|
|
});
|
|
|
|
itest!(permission_args {
|
|
args: "run run/001_hello.js --allow-net",
|
|
output: "run/permission_args.out",
|
|
envs: vec![("NO_COLOR".to_string(), "1".to_string())],
|
|
});
|
|
|
|
itest!(permission_args_quiet {
|
|
args: "run --quiet run/001_hello.js --allow-net",
|
|
output: "run/001_hello.js.out",
|
|
});
|
|
|
|
// Regression test for https://github.com/denoland/deno/issues/16772
|
|
#[test]
|
|
fn file_fetcher_preserves_permissions() {
|
|
let context = TestContext::with_http_server();
|
|
context
|
|
.new_command()
|
|
.args("repl --quiet")
|
|
.with_pty(|mut console| {
|
|
console.write_line(
|
|
"const a = await import('http://localhost:4545/run/019_media_types.ts');",
|
|
);
|
|
console.expect("Allow?");
|
|
console.human_delay();
|
|
console.write_line_raw("y");
|
|
console.expect_all(&["success", "true"]);
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn stdio_streams_are_locked_in_permission_prompt() {
|
|
if !util::pty::Pty::is_supported() {
|
|
// Don't deal with the logic below if the with_pty
|
|
// block doesn't even run (ex. on Windows CI)
|
|
return;
|
|
}
|
|
|
|
let context = TestContextBuilder::new().build();
|
|
|
|
context
|
|
.new_command()
|
|
.args("repl")
|
|
.with_pty(|mut console| {
|
|
let malicious_output = r#"**malicious**"#;
|
|
|
|
// Start a worker that starts spamming stdout
|
|
console.write_line(r#"new Worker(URL.createObjectURL(new Blob(["setInterval(() => console.log('**malicious**'), 10)"])), { type: "module" });"#);
|
|
// The worker is now spamming
|
|
console.expect(malicious_output);
|
|
console.write_line(r#"Deno.readTextFileSync('../Cargo.toml');"#);
|
|
// We will get a permission prompt
|
|
console.expect("Allow? [y/n/A] (y = yes, allow; n = no, deny; A = allow all read permissions) > ");
|
|
// The worker is blocked, so nothing else should get written here
|
|
console.human_delay();
|
|
console.write_line_raw("i");
|
|
// We ensure that nothing gets written here between the permission prompt and this text, despire the delay
|
|
let newline = if cfg!(target_os = "linux") {
|
|
"^J"
|
|
} else {
|
|
"\r\n"
|
|
};
|
|
console.expect_raw_next(format!("i{newline}\u{1b}[1A\u{1b}[0J┗ Unrecognized option. Allow? [y/n/A] (y = yes, allow; n = no, deny; A = allow all read permissions) > "));
|
|
console.human_delay();
|
|
console.write_line_raw("y");
|
|
// We ensure that nothing gets written here between the permission prompt and this text, despire the delay
|
|
console.expect_raw_next(format!("y{newline}\x1b[5A\x1b[0J✅ Granted read access to \""));
|
|
|
|
// Back to spamming!
|
|
console.expect(malicious_output);
|
|
});
|
|
}
|
|
|
|
#[test]
|
|
fn permission_prompt_escapes_ansi_codes_and_control_chars() {
|
|
util::with_pty(&["repl"], |mut console| {
|
|
console.write_line(
|
|
r#"Deno.permissions.request({ name: "env", variable: "\rDo you like ice cream? y/n" });"#
|
|
);
|
|
// will be uppercase on windows
|
|
let env_name = if cfg!(windows) {
|
|
"\\rDO YOU LIKE ICE CREAM? Y/N"
|
|
} else {
|
|
"\\rDo you like ice cream? y/n"
|
|
};
|
|
console.expect(format!(
|
|
"\u{250f} \u{26a0}\u{fe0f} Deno requests env access to \"{}\".",
|
|
env_name
|
|
))
|
|
});
|
|
|
|
// windows doesn't support backslashes in paths, so just try this on unix
|
|
if cfg!(unix) {
|
|
let context = TestContextBuilder::default().use_temp_cwd().build();
|
|
context
|
|
.new_command()
|
|
.env("PATH", context.temp_dir().path())
|
|
.env("DYLD_FALLBACK_LIBRARY_PATH", "")
|
|
.env("LD_LIBRARY_PATH", "")
|
|
.args_vec(["repl", "--allow-write=."])
|
|
.with_pty(|mut console| {
|
|
console.write_line_raw(r#"const boldANSI = "\u001b[1m";"#);
|
|
console.expect("undefined");
|
|
console.write_line_raw(r#"const unboldANSI = "\u001b[22m";"#);
|
|
console.expect("undefined");
|
|
console.write_line_raw(
|
|
r#"Deno.writeTextFileSync(`${boldANSI}cat${unboldANSI}`, "");"#,
|
|
);
|
|
console.expect("undefined");
|
|
console.write_line_raw(
|
|
r#"new Deno.Command(`./${boldANSI}cat${unboldANSI}`).spawn();"#,
|
|
);
|
|
console
|
|
.expect("\u{250f} \u{26a0}\u{fe0f} Deno requests run access to \"");
|
|
console.expect("\\u{1b}[1mcat\\u{1b}[22m\"."); // ensure escaped
|
|
});
|
|
}
|
|
}
|
|
|
|
itest!(dynamic_import_syntax_error {
|
|
args: "run -A run/dynamic_import_syntax_error.js",
|
|
output: "run/dynamic_import_syntax_error.js.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
itest!(extension_import {
|
|
args: "run run/extension_import.ts",
|
|
output: "run/extension_import.ts.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
itest!(extension_dynamic_import {
|
|
args: "run run/extension_dynamic_import.ts",
|
|
output: "run/extension_dynamic_import.ts.out",
|
|
exit_code: 1,
|
|
});
|
|
|
|
#[test]
|
|
pub fn vendor_dir_config_file() {
|
|
let test_context = TestContextBuilder::new()
|
|
.use_http_server()
|
|
.use_temp_cwd()
|
|
.build();
|
|
let temp_dir = test_context.temp_dir();
|
|
let vendor_dir = temp_dir.path().join("vendor");
|
|
let rm_vendor_dir = || std::fs::remove_dir_all(&vendor_dir).unwrap();
|
|
|
|
temp_dir.write("deno.json", r#"{ "vendor": true }"#);
|
|
temp_dir.write(
|
|
"main.ts",
|
|
r#"import { returnsHi } from 'http://localhost:4545/subdir/mod1.ts';
|
|
console.log(returnsHi());"#,
|
|
);
|
|
|
|
let deno_run_cmd = test_context
|
|
.new_command()
|
|
.args("run --allow-import --quiet main.ts");
|
|
deno_run_cmd.run().assert_matches_text("Hi\n");
|
|
|
|
assert!(vendor_dir.exists());
|
|
rm_vendor_dir();
|
|
temp_dir.write("deno.json", r#"{ "vendor": false }"#);
|
|
|
|
deno_run_cmd.run().assert_matches_text("Hi\n");
|
|
assert!(!vendor_dir.exists());
|
|
test_context
|
|
.new_command()
|
|
.args("cache --allow-import --quiet --vendor main.ts")
|
|
.run();
|
|
assert!(vendor_dir.exists());
|
|
rm_vendor_dir();
|
|
|
|
temp_dir.write("deno.json", r#"{ "vendor": true }"#);
|
|
let cache_command = test_context
|
|
.new_command()
|
|
.args("cache --allow-import --quiet main.ts");
|
|
cache_command.run();
|
|
|
|
assert!(vendor_dir.exists());
|
|
let mod1_file = vendor_dir
|
|
.join("http_localhost_4545")
|
|
.join("subdir")
|
|
.join("mod1.ts");
|
|
mod1_file.write("export function returnsHi() { return 'bye bye bye'; }");
|
|
|
|
// this is fine with a lockfile because users are supposed to be able
|
|
// to modify the vendor folder
|
|
deno_run_cmd.run().assert_matches_text("bye bye bye\n");
|
|
|
|
// try updating by deleting the lockfile
|
|
let lockfile = temp_dir.path().join("deno.lock");
|
|
lockfile.remove_file();
|
|
cache_command.run();
|
|
|
|
// should still run and the lockfile should be recreated
|
|
// (though with the checksum from the vendor folder)
|
|
deno_run_cmd.run().assert_matches_text("bye bye bye\n");
|
|
assert!(lockfile.exists());
|
|
|
|
// ensure we can add and execute files in directories that have a hash in them
|
|
test_context
|
|
.new_command()
|
|
// http_localhost_4545/subdir/#capitals_c75d7/main.js
|
|
.args("cache --allow-import http://localhost:4545/subdir/CAPITALS/main.js")
|
|
.run()
|
|
.skip_output_check();
|
|
assert_eq!(
|
|
vendor_dir.join("manifest.json").read_json_value(),
|
|
json!({
|
|
"folders": {
|
|
"http://localhost:4545/subdir/CAPITALS/": "http_localhost_4545/subdir/#capitals_c75d7"
|
|
}
|
|
})
|
|
);
|
|
vendor_dir
|
|
.join("http_localhost_4545/subdir/#capitals_c75d7/hello_there.ts")
|
|
.write("console.log('hello there');");
|
|
test_context
|
|
.new_command()
|
|
// todo(dsherret): seems wrong that we don't auto-discover the config file to get the vendor directory for this
|
|
.args("run --allow-import --vendor http://localhost:4545/subdir/CAPITALS/hello_there.ts")
|
|
.run()
|
|
.assert_matches_text("hello there\n");
|
|
|
|
// now try importing directly from the vendor folder
|
|
temp_dir.write(
|
|
"main.ts",
|
|
r#"import { returnsHi } from './vendor/http_localhost_4545/subdir/mod1.ts';
|
|
console.log(returnsHi());"#,
|
|
);
|
|
deno_run_cmd
|
|
.run()
|
|
.assert_matches_text("error: Importing from the vendor directory is not permitted. Use a remote specifier instead or disable vendoring.
|
|
at [WILDCARD]/main.ts:1:27
|
|
")
|
|
.assert_exit_code(1);
|
|
}
|
|
|
|
itest!(explicit_resource_management {
|
|
args: "run --quiet --check run/explicit_resource_management/main.ts",
|
|
output: "run/explicit_resource_management/main.out",
|
|
});
|
|
|
|
itest!(unsafe_proto {
|
|
args: "run -A run/unsafe_proto/main.js",
|
|
output: "run/unsafe_proto/main.out",
|
|
http_server: false,
|
|
exit_code: 0,
|
|
});
|
|
|
|
itest!(unsafe_proto_flag {
|
|
args: "run -A --unstable-unsafe-proto run/unsafe_proto/main.js",
|
|
output: "run/unsafe_proto/main_with_unsafe_proto_flag.out",
|
|
http_server: false,
|
|
exit_code: 0,
|
|
});
|
|
|
|
// TODO(bartlomieju): temporary disabled
|
|
// itest!(warn_on_deprecated_api {
|
|
// args: "run -A run/warn_on_deprecated_api/main.js",
|
|
// output: "run/warn_on_deprecated_api/main.out",
|
|
// http_server: true,
|
|
// exit_code: 0,
|
|
// });
|
|
|
|
// itest!(warn_on_deprecated_api_verbose {
|
|
// args: "run -A run/warn_on_deprecated_api/main.js",
|
|
// output: "run/warn_on_deprecated_api/main.verbose.out",
|
|
// envs: vec![("DENO_VERBOSE_WARNINGS".to_string(), "1".to_string())],
|
|
// http_server: true,
|
|
// exit_code: 0,
|
|
// });
|
|
|
|
// itest!(warn_on_deprecated_api_with_flag {
|
|
// args: "run -A --quiet run/warn_on_deprecated_api/main.js",
|
|
// output: "run/warn_on_deprecated_api/main_disabled_flag.out",
|
|
// http_server: true,
|
|
// exit_code: 0,
|
|
// });
|
|
|
|
// itest!(warn_on_deprecated_api_with_env_var {
|
|
// args: "run -A run/warn_on_deprecated_api/main.js",
|
|
// envs: vec![("DENO_NO_DEPRECATION_WARNINGS".to_string(), "1".to_string())],
|
|
// output: "run/warn_on_deprecated_api/main_disabled_env.out",
|
|
// http_server: true,
|
|
// exit_code: 0,
|
|
// });
|
|
|
|
#[test]
|
|
fn deno_json_imports_expand() {
|
|
let test_context = TestContextBuilder::for_npm().use_temp_cwd().build();
|
|
let dir = test_context.temp_dir();
|
|
dir.write(
|
|
"deno.json",
|
|
r#"{
|
|
"imports": {
|
|
"basic": "npm:@denotest/esm-basic"
|
|
}
|
|
}"#,
|
|
);
|
|
|
|
dir.write(
|
|
"main.ts",
|
|
r#"
|
|
// import map should resolve
|
|
import { setValue, getValue } from "basic";
|
|
// this entry should have been added automatically
|
|
import { hello } from "basic/other.mjs";
|
|
|
|
setValue(5);
|
|
console.log(getValue());
|
|
console.log(hello());
|
|
"#,
|
|
);
|
|
let output = test_context.new_command().args("run main.ts").run();
|
|
output.assert_matches_text("[WILDCARD]5\nhello, world!\n");
|
|
}
|
|
|
|
#[test]
|
|
fn deno_json_imports_expand_doesnt_overwrite_existing_entries() {
|
|
let test_context = TestContextBuilder::for_npm().use_temp_cwd().build();
|
|
let dir = test_context.temp_dir();
|
|
dir.write(
|
|
"deno.json",
|
|
r#"{
|
|
"imports": {
|
|
"basic": "npm:@denotest/esm-basic",
|
|
"basic/": "npm:/@denotest/sub-folders/folder_index_js/"
|
|
}
|
|
}"#,
|
|
);
|
|
|
|
dir.write(
|
|
"main.ts",
|
|
r#"
|
|
// import map should resolve
|
|
import { setValue, getValue } from "basic";
|
|
// this entry should map to explicitly specified "basic/" mapping
|
|
import { add } from "basic/index.js";
|
|
|
|
setValue(5);
|
|
console.log(getValue());
|
|
console.log(add(3, 4));
|
|
"#,
|
|
);
|
|
let output = test_context.new_command().args("run main.ts").run();
|
|
output.assert_matches_text("[WILDCARD]5\n7\n");
|
|
}
|
|
|
|
#[test]
|
|
fn code_cache_test() {
|
|
let test_context = TestContextBuilder::new().use_temp_cwd().build();
|
|
let deno_dir = test_context.deno_dir();
|
|
let temp_dir = test_context.temp_dir();
|
|
temp_dir.write("main.js", "console.log('Hello World - A');");
|
|
|
|
// First run with no prior cache.
|
|
{
|
|
let output = test_context
|
|
.new_command()
|
|
.args("run -Ldebug main.js")
|
|
.split_output()
|
|
.run();
|
|
|
|
output
|
|
.assert_stdout_matches_text("Hello World - A[WILDCARD]")
|
|
.assert_stderr_matches_text("[WILDCARD]Updating V8 code cache for ES module: file:///[WILDCARD]/main.js[WILDCARD]");
|
|
assert_not_contains!(output.stderr(), "V8 code cache hit");
|
|
|
|
// Check that the code cache database exists.
|
|
let code_cache_path = deno_dir.path().join(CODE_CACHE_DB_FILE_NAME);
|
|
assert!(code_cache_path.exists());
|
|
}
|
|
|
|
// 2nd run with cache.
|
|
{
|
|
let output = test_context
|
|
.new_command()
|
|
.args("run -Ldebug main.js")
|
|
.split_output()
|
|
.run();
|
|
|
|
output
|
|
.assert_stdout_matches_text("Hello World - A[WILDCARD]")
|
|
.assert_stderr_matches_text("[WILDCARD]V8 code cache hit for ES module: file:///[WILDCARD]/main.js[WILDCARD]");
|
|
assert_not_contains!(output.stderr(), "Updating V8 code cache");
|
|
}
|
|
|
|
// Rerun with --no-code-cache.
|
|
{
|
|
let output = test_context
|
|
.new_command()
|
|
.args("run -Ldebug --no-code-cache main.js")
|
|
.split_output()
|
|
.run();
|
|
|
|
output
|
|
.assert_stdout_matches_text("Hello World - A[WILDCARD]")
|
|
.skip_stderr_check();
|
|
assert_not_contains!(output.stderr(), "V8 code cache");
|
|
}
|
|
|
|
// Modify the script, and make sure that the cache is rejected.
|
|
temp_dir.write("main.js", "console.log('Hello World - B');");
|
|
{
|
|
let output = test_context
|
|
.new_command()
|
|
.args("run -Ldebug main.js")
|
|
.split_output()
|
|
.run();
|
|
|
|
output
|
|
.assert_stdout_matches_text("Hello World - B[WILDCARD]")
|
|
.assert_stderr_matches_text("[WILDCARD]Updating V8 code cache for ES module: file:///[WILDCARD]/main.js[WILDCARD]");
|
|
assert_not_contains!(output.stderr(), "V8 code cache hit");
|
|
}
|
|
}
|
|
|
|
#[test]
|
|
fn code_cache_npm_test() {
|
|
let test_context = TestContextBuilder::for_npm().use_temp_cwd().build();
|
|
let deno_dir = test_context.deno_dir();
|
|
let temp_dir = test_context.temp_dir();
|
|
temp_dir.write(
|
|
"main.js",
|
|
"import chalk from \"npm:chalk@5\";console.log(chalk('Hello World'));",
|
|
);
|
|
|
|
// First run with no prior cache.
|
|
{
|
|
let output = test_context
|
|
.new_command()
|
|
.args("run -Ldebug -A main.js")
|
|
.split_output()
|
|
.run();
|
|
|
|
output
|
|
.assert_stdout_matches_text("Hello World[WILDCARD]")
|
|
.assert_stderr_matches_text("[WILDCARD]Updating V8 code cache for ES module: file:///[WILDCARD]/main.js[WILDCARD]")
|
|
.assert_stderr_matches_text("[WILDCARD]Updating V8 code cache for ES module: file:///[WILDCARD]/chalk/5.[WILDCARD]/source/index.js[WILDCARD]");
|
|
assert_not_contains!(output.stderr(), "V8 code cache hit");
|
|
|
|
// Check that the code cache database exists.
|
|
let code_cache_path = deno_dir.path().join(CODE_CACHE_DB_FILE_NAME);
|
|
assert!(code_cache_path.exists());
|
|
}
|
|
|
|
// 2nd run with cache.
|
|
{
|
|
let output = test_context
|
|
.new_command()
|
|
.args("run -Ldebug -A main.js")
|
|
.split_output()
|
|
.run();
|
|
|
|
output
|
|
.assert_stdout_matches_text("Hello World[WILDCARD]")
|
|
.assert_stderr_matches_text("[WILDCARD]V8 code cache hit for ES module: file:///[WILDCARD]/main.js[WILDCARD]")
|
|
.assert_stderr_matches_text("[WILDCARD]V8 code cache hit for ES module: file:///[WILDCARD]/chalk/5.[WILDCARD]/source/index.js[WILDCARD]");
|
|
assert_not_contains!(output.stderr(), "Updating V8 code cache");
|
|
}
|
|
}
|
|
|
|
#[test]
|
|
fn code_cache_npm_with_require_test() {
|
|
let test_context = TestContextBuilder::for_npm().use_temp_cwd().build();
|
|
let deno_dir = test_context.deno_dir();
|
|
let temp_dir = test_context.temp_dir();
|
|
temp_dir.write(
|
|
"main.js",
|
|
"import fraction from \"npm:autoprefixer\";console.log(typeof fraction);",
|
|
);
|
|
|
|
// First run with no prior cache.
|
|
{
|
|
let output = test_context
|
|
.new_command()
|
|
.args("run -Ldebug -A main.js")
|
|
.split_output()
|
|
.run();
|
|
|
|
output
|
|
.assert_stdout_matches_text("function[WILDCARD]")
|
|
.assert_stderr_matches_text("[WILDCARD]Updating V8 code cache for ES module: file:///[WILDCARD]/main.js[WILDCARD]")
|
|
.assert_stderr_matches_text("[WILDCARD]Updating V8 code cache for ES module: file:///[WILDCARD]/autoprefixer/[WILDCARD]/autoprefixer.js[WILDCARD]")
|
|
.assert_stderr_matches_text("[WILDCARD]Updating V8 code cache for script: file:///[WILDCARD]/autoprefixer/[WILDCARD]/autoprefixer.js[WILDCARD]")
|
|
.assert_stderr_matches_text("[WILDCARD]Updating V8 code cache for script: file:///[WILDCARD]/browserslist/[WILDCARD]/index.js[WILDCARD]");
|
|
assert_not_contains!(output.stderr(), "V8 code cache hit");
|
|
|
|
// Check that the code cache database exists.
|
|
let code_cache_path = deno_dir.path().join(CODE_CACHE_DB_FILE_NAME);
|
|
assert!(code_cache_path.exists());
|
|
}
|
|
|
|
// 2nd run with cache.
|
|
{
|
|
let output = test_context
|
|
.new_command()
|
|
.args("run -Ldebug -A main.js")
|
|
.split_output()
|
|
.run();
|
|
|
|
output
|
|
.assert_stdout_matches_text("function[WILDCARD]")
|
|
.assert_stderr_matches_text("[WILDCARD]V8 code cache hit for ES module: file:///[WILDCARD]/main.js[WILDCARD]")
|
|
.assert_stderr_matches_text("[WILDCARD]V8 code cache hit for ES module: file:///[WILDCARD]/autoprefixer/[WILDCARD]/autoprefixer.js[WILDCARD]")
|
|
.assert_stderr_matches_text("[WILDCARD]V8 code cache hit for script: file:///[WILDCARD]/autoprefixer/[WILDCARD]/autoprefixer.js[WILDCARD]")
|
|
.assert_stderr_matches_text("[WILDCARD]V8 code cache hit for script: file:///[WILDCARD]/browserslist/[WILDCARD]/index.js[WILDCARD]");
|
|
assert_not_contains!(output.stderr(), "Updating V8 code cache");
|
|
}
|
|
}
|
|
|
|
#[test]
|
|
fn code_cache_npm_cjs_wrapper_module_many_exports() {
|
|
// The code cache was being invalidated because the CJS wrapper module
|
|
// had indeterministic output.
|
|
let test_context = TestContextBuilder::for_npm().use_temp_cwd().build();
|
|
let temp_dir = test_context.temp_dir();
|
|
temp_dir.write(
|
|
"main.js",
|
|
// this package has a few exports
|
|
"import { hello } from \"npm:@denotest/cjs-reexport-collision\";hello.sayHello();",
|
|
);
|
|
|
|
// First run with no prior cache.
|
|
{
|
|
let output = test_context
|
|
.new_command()
|
|
.args("run -Ldebug -A main.js")
|
|
.split_output()
|
|
.run();
|
|
|
|
assert_not_contains!(output.stderr(), "V8 code cache hit");
|
|
assert_contains!(output.stderr(), "Updating V8 code cache");
|
|
output.skip_stdout_check();
|
|
}
|
|
|
|
// 2nd run with cache.
|
|
{
|
|
let output = test_context
|
|
.new_command()
|
|
.args("run -Ldebug -A main.js")
|
|
.split_output()
|
|
.run();
|
|
assert_contains!(output.stderr(), "V8 code cache hit");
|
|
assert_not_contains!(output.stderr(), "Updating V8 code cache");
|
|
output.skip_stdout_check();
|
|
|
|
// should have two occurrences of this (one for entrypoint and one for wrapper module)
|
|
assert_eq!(
|
|
output
|
|
.stderr()
|
|
.split("V8 code cache hit for ES module")
|
|
.count(),
|
|
3
|
|
);
|
|
}
|
|
}
|
|
|
|
#[test]
|
|
fn node_process_stdin_unref_with_pty() {
|
|
TestContext::default()
|
|
.new_command()
|
|
.args_vec(["run", "--quiet", "run/node_process_stdin_unref_with_pty.js"])
|
|
.with_pty(|mut console| {
|
|
console.expect("START\r\n");
|
|
console.write_line("foo");
|
|
console.expect("foo\r\n");
|
|
console.write_line("bar");
|
|
console.expect("bar\r\n");
|
|
console.write_line("baz");
|
|
console.expect("baz\r\n");
|
|
});
|
|
|
|
TestContext::default()
|
|
.new_command()
|
|
.args_vec([
|
|
"run",
|
|
"--quiet",
|
|
"run/node_process_stdin_unref_with_pty.js",
|
|
"--unref",
|
|
])
|
|
.with_pty(|mut console| {
|
|
// if process.stdin.unref is called, the program immediately ends by skipping reading from stdin.
|
|
console.expect("START\r\nEND\r\n");
|
|
});
|
|
}
|
|
|
|
#[tokio::test]
|
|
async fn listen_tls_alpn() {
|
|
let mut child = util::deno_cmd()
|
|
.current_dir(util::testdata_path())
|
|
.arg("run")
|
|
.arg("--quiet")
|
|
.arg("--allow-net")
|
|
.arg("--allow-read")
|
|
.arg("./cert/listen_tls_alpn.ts")
|
|
.arg("4504")
|
|
.stdout_piped()
|
|
.spawn()
|
|
.unwrap();
|
|
let stdout = child.stdout.as_mut().unwrap();
|
|
let mut msg = [0; 5];
|
|
let read = stdout.read(&mut msg).unwrap();
|
|
assert_eq!(read, 5);
|
|
assert_eq!(&msg, b"READY");
|
|
|
|
let mut reader = &mut BufReader::new(Cursor::new(include_bytes!(
|
|
"../testdata/tls/RootCA.crt"
|
|
)));
|
|
let certs = rustls_pemfile::certs(&mut reader)
|
|
.collect::<Result<Vec<_>, _>>()
|
|
.unwrap();
|
|
let mut root_store = rustls::RootCertStore::empty();
|
|
root_store.add_parsable_certificates(certs);
|
|
let mut cfg = rustls::ClientConfig::builder()
|
|
.with_root_certificates(root_store)
|
|
.with_no_client_auth();
|
|
cfg.alpn_protocols.push(b"foobar".to_vec());
|
|
let cfg = Arc::new(cfg);
|
|
|
|
let hostname =
|
|
rustls::pki_types::ServerName::try_from("localhost".to_string()).unwrap();
|
|
|
|
let tcp_stream = tokio::net::TcpStream::connect("localhost:4504")
|
|
.await
|
|
.unwrap();
|
|
let mut tls_stream = TlsStream::new_client_side(
|
|
tcp_stream,
|
|
ClientConnection::new(cfg, hostname).unwrap(),
|
|
None,
|
|
);
|
|
|
|
let handshake = tls_stream.handshake().await.unwrap();
|
|
|
|
assert_eq!(handshake.alpn, Some(b"foobar".to_vec()));
|
|
|
|
let status = child.wait().unwrap();
|
|
assert!(status.success());
|
|
}
|
|
|
|
#[tokio::test]
|
|
async fn listen_tls_alpn_fail() {
|
|
let mut child = util::deno_cmd()
|
|
.current_dir(util::testdata_path())
|
|
.arg("run")
|
|
.arg("--quiet")
|
|
.arg("--allow-net")
|
|
.arg("--allow-read")
|
|
.arg("--config")
|
|
.arg("../config/deno.json")
|
|
.arg("./cert/listen_tls_alpn_fail.ts")
|
|
.arg("4505")
|
|
.stdout_piped()
|
|
.spawn()
|
|
.unwrap();
|
|
let stdout = child.stdout.as_mut().unwrap();
|
|
let mut msg = [0; 5];
|
|
let read = stdout.read(&mut msg).unwrap();
|
|
assert_eq!(read, 5);
|
|
assert_eq!(&msg, b"READY");
|
|
|
|
let mut reader = &mut BufReader::new(Cursor::new(include_bytes!(
|
|
"../testdata/tls/RootCA.crt"
|
|
)));
|
|
let certs = rustls_pemfile::certs(&mut reader)
|
|
.collect::<Result<Vec<_>, _>>()
|
|
.unwrap();
|
|
let mut root_store = rustls::RootCertStore::empty();
|
|
root_store.add_parsable_certificates(certs);
|
|
let mut cfg = rustls::ClientConfig::builder()
|
|
.with_root_certificates(root_store)
|
|
.with_no_client_auth();
|
|
cfg.alpn_protocols.push(b"boofar".to_vec());
|
|
let cfg = Arc::new(cfg);
|
|
|
|
let hostname = rustls::pki_types::ServerName::try_from("localhost").unwrap();
|
|
|
|
let tcp_stream = tokio::net::TcpStream::connect("localhost:4505")
|
|
.await
|
|
.unwrap();
|
|
let mut tls_stream = TlsStream::new_client_side(
|
|
tcp_stream,
|
|
ClientConnection::new(cfg, hostname).unwrap(),
|
|
None,
|
|
);
|
|
|
|
tls_stream.handshake().await.unwrap_err();
|
|
|
|
let status = child.wait().unwrap();
|
|
assert!(status.success());
|
|
}
|
|
|
|
// Couldn't get the directory readonly on windows on the CI
|
|
// so gave up because this being tested on unix is good enough
|
|
#[cfg(unix)]
|
|
#[test]
|
|
fn emit_failed_readonly_file_system() {
|
|
let context = TestContextBuilder::default().use_temp_cwd().build();
|
|
context.deno_dir().path().canonicalize().make_dir_readonly();
|
|
let temp_dir = context.temp_dir().path().canonicalize();
|
|
temp_dir.join("main.ts").write("import './other.ts';");
|
|
temp_dir.join("other.ts").write("console.log('hi');");
|
|
let output = context
|
|
.new_command()
|
|
.args("run --log-level=debug main.ts")
|
|
.run();
|
|
output.assert_matches_text("[WILDCARD]Error saving emit data ([WILDLINE]main.ts)[WILDCARD]Skipped emit cache save of [WILDLINE]other.ts[WILDCARD]hi[WILDCARD]");
|
|
}
|
|
|
|
// todo(dsherret): waiting on fix in https://github.com/servo/rust-url/issues/505
|
|
#[ignore]
|
|
#[cfg(windows)]
|
|
#[test]
|
|
fn handle_invalid_path_error() {
|
|
let deno_cmd = util::deno_cmd_with_deno_dir(&util::new_deno_dir());
|
|
let output = deno_cmd.arg("run").arg("file://asdf").output().unwrap();
|
|
assert_contains!(
|
|
String::from_utf8_lossy(&output.stderr),
|
|
"Invalid file path."
|
|
);
|
|
|
|
let deno_cmd = util::deno_cmd_with_deno_dir(&util::new_deno_dir());
|
|
let output = deno_cmd.arg("run").arg("/a/b").output().unwrap();
|
|
assert_contains!(String::from_utf8_lossy(&output.stderr), "Module not found");
|
|
|
|
let deno_cmd = util::deno_cmd_with_deno_dir(&util::new_deno_dir());
|
|
let output = deno_cmd.arg("run").arg("//a/b").output().unwrap();
|
|
assert_contains!(
|
|
String::from_utf8_lossy(&output.stderr),
|
|
"Invalid file path."
|
|
);
|
|
|
|
let deno_cmd = util::deno_cmd_with_deno_dir(&util::new_deno_dir());
|
|
let output = deno_cmd.arg("run").arg("///a/b").output().unwrap();
|
|
assert_contains!(String::from_utf8_lossy(&output.stderr), "Module not found");
|
|
}
|