mirror of
https://github.com/denoland/deno.git
synced 2024-12-26 00:59:24 -05:00
386d5c8310
Also removes permissions being passed in for node resolution. It was completely useless because we only checked it for reading package.json files, but Deno reading package.json files for resolution is perfectly fine. My guess is this is also a perf improvement because Deno is doing less work.
96 lines
2.9 KiB
Rust
96 lines
2.9 KiB
Rust
// Copyright 2018-2024 the Deno authors. All rights reserved. MIT license.
|
|
|
|
use deno_core::error::AnyError;
|
|
use deno_core::op2;
|
|
use deno_core::ModuleSpecifier;
|
|
use deno_core::OpState;
|
|
use deno_permissions::PermissionsContainer;
|
|
|
|
deno_core::extension!(
|
|
deno_runtime,
|
|
ops = [op_main_module, op_ppid],
|
|
options = { main_module: ModuleSpecifier },
|
|
state = |state, options| {
|
|
state.put::<ModuleSpecifier>(options.main_module);
|
|
},
|
|
);
|
|
|
|
#[op2]
|
|
#[string]
|
|
fn op_main_module(state: &mut OpState) -> Result<String, AnyError> {
|
|
let main_url = state.borrow::<ModuleSpecifier>();
|
|
let main_path = main_url.to_string();
|
|
if main_url.scheme() == "file" {
|
|
let main_path = main_url.to_file_path().unwrap();
|
|
state
|
|
.borrow_mut::<PermissionsContainer>()
|
|
.check_read_blind(&main_path, "main_module", "Deno.mainModule")?;
|
|
}
|
|
Ok(main_path)
|
|
}
|
|
|
|
/// This is an op instead of being done at initialization time because
|
|
/// it's expensive to retrieve the ppid on Windows.
|
|
#[op2(fast)]
|
|
#[number]
|
|
pub fn op_ppid() -> i64 {
|
|
#[cfg(windows)]
|
|
{
|
|
// Adopted from rustup:
|
|
// https://github.com/rust-lang/rustup/blob/1.21.1/src/cli/self_update.rs#L1036
|
|
// Copyright Diggory Blake, the Mozilla Corporation, and rustup contributors.
|
|
// Licensed under either of
|
|
// - Apache License, Version 2.0
|
|
// - MIT license
|
|
use std::mem;
|
|
use winapi::shared::minwindef::DWORD;
|
|
use winapi::um::handleapi::CloseHandle;
|
|
use winapi::um::handleapi::INVALID_HANDLE_VALUE;
|
|
use winapi::um::processthreadsapi::GetCurrentProcessId;
|
|
use winapi::um::tlhelp32::CreateToolhelp32Snapshot;
|
|
use winapi::um::tlhelp32::Process32First;
|
|
use winapi::um::tlhelp32::Process32Next;
|
|
use winapi::um::tlhelp32::PROCESSENTRY32;
|
|
use winapi::um::tlhelp32::TH32CS_SNAPPROCESS;
|
|
// SAFETY: winapi calls
|
|
unsafe {
|
|
// Take a snapshot of system processes, one of which is ours
|
|
// and contains our parent's pid
|
|
let snapshot = CreateToolhelp32Snapshot(TH32CS_SNAPPROCESS, 0);
|
|
if snapshot == INVALID_HANDLE_VALUE {
|
|
return -1;
|
|
}
|
|
|
|
let mut entry: PROCESSENTRY32 = mem::zeroed();
|
|
entry.dwSize = mem::size_of::<PROCESSENTRY32>() as DWORD;
|
|
|
|
// Iterate over system processes looking for ours
|
|
let success = Process32First(snapshot, &mut entry);
|
|
if success == 0 {
|
|
CloseHandle(snapshot);
|
|
return -1;
|
|
}
|
|
|
|
let this_pid = GetCurrentProcessId();
|
|
while entry.th32ProcessID != this_pid {
|
|
let success = Process32Next(snapshot, &mut entry);
|
|
if success == 0 {
|
|
CloseHandle(snapshot);
|
|
return -1;
|
|
}
|
|
}
|
|
CloseHandle(snapshot);
|
|
|
|
// FIXME: Using the process ID exposes a race condition
|
|
// wherein the parent process already exited and the OS
|
|
// reassigned its ID.
|
|
let parent_id = entry.th32ParentProcessID;
|
|
parent_id.into()
|
|
}
|
|
}
|
|
#[cfg(not(windows))]
|
|
{
|
|
use std::os::unix::process::parent_id;
|
|
parent_id().into()
|
|
}
|
|
}
|