mirror of
https://github.com/denoland/deno.git
synced 2024-11-01 09:24:20 -04:00
179 lines
5.2 KiB
TypeScript
179 lines
5.2 KiB
TypeScript
// Copyright 2018-2020 the Deno authors. All rights reserved. MIT license.
|
||
import {
|
||
assert,
|
||
assertEquals,
|
||
assertNotEquals,
|
||
assertThrows,
|
||
unitTest,
|
||
} from "./test_util.ts";
|
||
|
||
unitTest({ perms: { env: true } }, function envSuccess(): void {
|
||
Deno.env.set("TEST_VAR", "A");
|
||
const env = Deno.env.toObject();
|
||
Deno.env.set("TEST_VAR", "B");
|
||
assertEquals(env["TEST_VAR"], "A");
|
||
assertNotEquals(Deno.env.get("TEST_VAR"), env["TEST_VAR"]);
|
||
});
|
||
|
||
unitTest({ perms: { env: true } }, function envNotFound(): void {
|
||
const r = Deno.env.get("env_var_does_not_exist!");
|
||
assertEquals(r, undefined);
|
||
});
|
||
|
||
unitTest({ perms: { env: true } }, function deleteEnv(): void {
|
||
Deno.env.set("TEST_VAR", "A");
|
||
assertEquals(Deno.env.get("TEST_VAR"), "A");
|
||
assertEquals(Deno.env.delete("TEST_VAR"), undefined);
|
||
assertEquals(Deno.env.get("TEST_VAR"), undefined);
|
||
});
|
||
|
||
unitTest(function envPermissionDenied1(): void {
|
||
assertThrows(() => {
|
||
Deno.env.toObject();
|
||
}, Deno.errors.PermissionDenied);
|
||
});
|
||
|
||
unitTest(function envPermissionDenied2(): void {
|
||
assertThrows(() => {
|
||
Deno.env.get("PATH");
|
||
}, Deno.errors.PermissionDenied);
|
||
});
|
||
|
||
// This test verifies that on Windows, environment variables are
|
||
// case-insensitive. Case normalization needs be done using the collation
|
||
// that Windows uses, rather than naively using String.toLowerCase().
|
||
unitTest(
|
||
{
|
||
ignore: Deno.build.os !== "windows",
|
||
perms: { read: true, env: true, run: true },
|
||
},
|
||
async function envCaseInsensitive() {
|
||
// Utility function that runs a Deno subprocess with the environment
|
||
// specified in `inputEnv`. The subprocess reads the environment variables
|
||
// which are in the keys of `expectedEnv` and writes them to stdout as JSON.
|
||
// It is then verified that these match with the values of `expectedEnv`.
|
||
const checkChildEnv = async (
|
||
inputEnv: Record<string, string>,
|
||
expectedEnv: Record<string, string>,
|
||
): Promise<void> => {
|
||
const src = `
|
||
console.log(
|
||
${JSON.stringify(Object.keys(expectedEnv))}.map(k => Deno.env.get(k))
|
||
)`;
|
||
const proc = Deno.run({
|
||
cmd: [Deno.execPath(), "eval", src],
|
||
env: inputEnv,
|
||
stdout: "piped",
|
||
});
|
||
const status = await proc.status();
|
||
assertEquals(status.success, true);
|
||
const expectedValues = Object.values(expectedEnv);
|
||
const actualValues = JSON.parse(
|
||
new TextDecoder().decode(await proc.output()),
|
||
);
|
||
assertEquals(actualValues, expectedValues);
|
||
proc.close();
|
||
};
|
||
|
||
assertEquals(Deno.env.get("path"), Deno.env.get("PATH"));
|
||
assertEquals(Deno.env.get("Path"), Deno.env.get("PATH"));
|
||
|
||
// Check 'foo', 'Foo' and 'Foo' are case folded.
|
||
await checkChildEnv({ foo: "X" }, { foo: "X", Foo: "X", FOO: "X" });
|
||
|
||
// Check that 'µ' and 'Μ' are not case folded.
|
||
const lc1 = "µ";
|
||
const uc1 = lc1.toUpperCase();
|
||
assertNotEquals(lc1, uc1);
|
||
await checkChildEnv(
|
||
{ [lc1]: "mu", [uc1]: "MU" },
|
||
{ [lc1]: "mu", [uc1]: "MU" },
|
||
);
|
||
|
||
// Check that 'dž' and 'DŽ' are folded, but 'Dž' is preserved.
|
||
const c2 = "Dž";
|
||
const lc2 = c2.toLowerCase();
|
||
const uc2 = c2.toUpperCase();
|
||
assertNotEquals(c2, lc2);
|
||
assertNotEquals(c2, uc2);
|
||
await checkChildEnv(
|
||
{ [c2]: "Dz", [lc2]: "dz" },
|
||
{ [c2]: "Dz", [lc2]: "dz", [uc2]: "dz" },
|
||
);
|
||
await checkChildEnv(
|
||
{ [c2]: "Dz", [uc2]: "DZ" },
|
||
{ [c2]: "Dz", [uc2]: "DZ", [lc2]: "DZ" },
|
||
);
|
||
},
|
||
);
|
||
|
||
unitTest(function osPid(): void {
|
||
assert(Deno.pid > 0);
|
||
});
|
||
|
||
unitTest(function osPpid(): void {
|
||
assert(Deno.ppid > 0);
|
||
});
|
||
|
||
unitTest(
|
||
{ perms: { run: true, read: true } },
|
||
async function osPpidIsEqualToPidOfParentProcess(): Promise<void> {
|
||
const decoder = new TextDecoder();
|
||
const process = Deno.run({
|
||
cmd: [Deno.execPath(), "eval", "-p", "--unstable", "Deno.ppid"],
|
||
stdout: "piped",
|
||
env: { NO_COLOR: "true" },
|
||
});
|
||
const output = await process.output();
|
||
process.close();
|
||
|
||
const expected = Deno.pid;
|
||
const actual = parseInt(decoder.decode(output));
|
||
assertEquals(actual, expected);
|
||
},
|
||
);
|
||
|
||
unitTest({ perms: { read: true } }, function execPath(): void {
|
||
assertNotEquals(Deno.execPath(), "");
|
||
});
|
||
|
||
unitTest({ perms: { read: false } }, function execPathPerm(): void {
|
||
assertThrows(
|
||
() => {
|
||
Deno.execPath();
|
||
},
|
||
Deno.errors.PermissionDenied,
|
||
"read access to <exec_path>, run again with the --allow-read flag",
|
||
);
|
||
});
|
||
|
||
unitTest({ perms: { env: true } }, function loadavgSuccess(): void {
|
||
const load = Deno.loadavg();
|
||
assertEquals(load.length, 3);
|
||
});
|
||
|
||
unitTest({ perms: { env: false } }, function loadavgPerm(): void {
|
||
assertThrows(() => {
|
||
Deno.loadavg();
|
||
}, Deno.errors.PermissionDenied);
|
||
});
|
||
|
||
unitTest({ perms: { env: true } }, function hostnameDir(): void {
|
||
assertNotEquals(Deno.hostname(), "");
|
||
});
|
||
|
||
unitTest({ perms: { env: false } }, function hostnamePerm(): void {
|
||
assertThrows(() => {
|
||
Deno.hostname();
|
||
}, Deno.errors.PermissionDenied);
|
||
});
|
||
|
||
unitTest({ perms: { env: true } }, function releaseDir(): void {
|
||
assertNotEquals(Deno.osRelease(), "");
|
||
});
|
||
|
||
unitTest({ perms: { env: false } }, function releasePerm(): void {
|
||
assertThrows(() => {
|
||
Deno.osRelease();
|
||
}, Deno.errors.PermissionDenied);
|
||
});
|