diff --git a/cli/tests/integration/bundle_tests.rs b/cli/tests/integration/bundle_tests.rs new file mode 100644 index 0000000000..1ef1a39f50 --- /dev/null +++ b/cli/tests/integration/bundle_tests.rs @@ -0,0 +1,377 @@ +// Copyright 2018-2021 the Deno authors. All rights reserved. MIT license. + +use crate::itest; +use tempfile::TempDir; +use test_util as util; + +#[test] +fn bundle_exports() { + // First we have to generate a bundle of some module that has exports. + let mod1 = util::root_path().join("cli/tests/subdir/mod1.ts"); + assert!(mod1.is_file()); + let t = TempDir::new().expect("tempdir fail"); + let bundle = t.path().join("mod1.bundle.js"); + let mut deno = util::deno_cmd() + .current_dir(util::root_path()) + .arg("bundle") + .arg(mod1) + .arg(&bundle) + .spawn() + .expect("failed to spawn script"); + let status = deno.wait().expect("failed to wait for the child process"); + assert!(status.success()); + assert!(bundle.is_file()); + + // Now we try to use that bundle from another module. + let test = t.path().join("test.js"); + std::fs::write( + &test, + " + import { printHello3 } from \"./mod1.bundle.js\"; + printHello3(); ", + ) + .expect("error writing file"); + + let output = util::deno_cmd() + .current_dir(util::root_path()) + .arg("run") + .arg(&test) + .output() + .expect("failed to spawn script"); + // check the output of the test.ts program. + assert!(std::str::from_utf8(&output.stdout) + .unwrap() + .trim() + .ends_with("Hello")); + assert_eq!(output.stderr, b""); +} + +#[test] +fn bundle_exports_no_check() { + // First we have to generate a bundle of some module that has exports. + let mod1 = util::root_path().join("cli/tests/subdir/mod1.ts"); + assert!(mod1.is_file()); + let t = TempDir::new().expect("tempdir fail"); + let bundle = t.path().join("mod1.bundle.js"); + let mut deno = util::deno_cmd() + .current_dir(util::root_path()) + .arg("bundle") + .arg("--no-check") + .arg(mod1) + .arg(&bundle) + .spawn() + .expect("failed to spawn script"); + let status = deno.wait().expect("failed to wait for the child process"); + assert!(status.success()); + assert!(bundle.is_file()); + + // Now we try to use that bundle from another module. + let test = t.path().join("test.js"); + std::fs::write( + &test, + " + import { printHello3 } from \"./mod1.bundle.js\"; + printHello3(); ", + ) + .expect("error writing file"); + + let output = util::deno_cmd() + .current_dir(util::root_path()) + .arg("run") + .arg(&test) + .output() + .expect("failed to spawn script"); + // check the output of the test.ts program. + assert!(std::str::from_utf8(&output.stdout) + .unwrap() + .trim() + .ends_with("Hello")); + assert_eq!(output.stderr, b""); +} + +#[test] +fn bundle_circular() { + // First we have to generate a bundle of some module that has exports. + let circular1 = util::root_path().join("cli/tests/subdir/circular1.ts"); + assert!(circular1.is_file()); + let t = TempDir::new().expect("tempdir fail"); + let bundle = t.path().join("circular1.bundle.js"); + let mut deno = util::deno_cmd() + .current_dir(util::root_path()) + .arg("bundle") + .arg(circular1) + .arg(&bundle) + .spawn() + .expect("failed to spawn script"); + let status = deno.wait().expect("failed to wait for the child process"); + assert!(status.success()); + assert!(bundle.is_file()); + + let output = util::deno_cmd() + .current_dir(util::root_path()) + .arg("run") + .arg(&bundle) + .output() + .expect("failed to spawn script"); + // check the output of the the bundle program. + assert!(std::str::from_utf8(&output.stdout) + .unwrap() + .trim() + .ends_with("f2\nf1")); + assert_eq!(output.stderr, b""); +} + +#[test] +fn bundle_single_module() { + // First we have to generate a bundle of some module that has exports. + let single_module = + util::root_path().join("cli/tests/subdir/single_module.ts"); + assert!(single_module.is_file()); + let t = TempDir::new().expect("tempdir fail"); + let bundle = t.path().join("single_module.bundle.js"); + let mut deno = util::deno_cmd() + .current_dir(util::root_path()) + .arg("bundle") + .arg(single_module) + .arg(&bundle) + .spawn() + .expect("failed to spawn script"); + let status = deno.wait().expect("failed to wait for the child process"); + assert!(status.success()); + assert!(bundle.is_file()); + + let output = util::deno_cmd() + .current_dir(util::root_path()) + .arg("run") + .arg(&bundle) + .output() + .expect("failed to spawn script"); + // check the output of the the bundle program. + assert!(std::str::from_utf8(&output.stdout) + .unwrap() + .trim() + .ends_with("Hello world!")); + assert_eq!(output.stderr, b""); +} + +#[test] +fn bundle_tla() { + // First we have to generate a bundle of some module that has exports. + let tla_import = util::root_path().join("cli/tests/subdir/tla.ts"); + assert!(tla_import.is_file()); + let t = tempfile::TempDir::new().expect("tempdir fail"); + let bundle = t.path().join("tla.bundle.js"); + let mut deno = util::deno_cmd() + .current_dir(util::root_path()) + .arg("bundle") + .arg(tla_import) + .arg(&bundle) + .spawn() + .expect("failed to spawn script"); + let status = deno.wait().expect("failed to wait for the child process"); + assert!(status.success()); + assert!(bundle.is_file()); + + // Now we try to use that bundle from another module. + let test = t.path().join("test.js"); + std::fs::write( + &test, + " + import { foo } from \"./tla.bundle.js\"; + console.log(foo); ", + ) + .expect("error writing file"); + + let output = util::deno_cmd() + .current_dir(util::root_path()) + .arg("run") + .arg(&test) + .output() + .expect("failed to spawn script"); + // check the output of the test.ts program. + assert!(std::str::from_utf8(&output.stdout) + .unwrap() + .trim() + .ends_with("Hello")); + assert_eq!(output.stderr, b""); +} + +#[test] +fn bundle_js() { + // First we have to generate a bundle of some module that has exports. + let mod6 = util::root_path().join("cli/tests/subdir/mod6.js"); + assert!(mod6.is_file()); + let t = TempDir::new().expect("tempdir fail"); + let bundle = t.path().join("mod6.bundle.js"); + let mut deno = util::deno_cmd() + .current_dir(util::root_path()) + .arg("bundle") + .arg(mod6) + .arg(&bundle) + .spawn() + .expect("failed to spawn script"); + let status = deno.wait().expect("failed to wait for the child process"); + assert!(status.success()); + assert!(bundle.is_file()); + + let output = util::deno_cmd() + .current_dir(util::root_path()) + .arg("run") + .arg(&bundle) + .output() + .expect("failed to spawn script"); + // check that nothing went to stderr + assert_eq!(output.stderr, b""); +} + +#[test] +fn bundle_dynamic_import() { + let _g = util::http_server(); + let dynamic_import = + util::root_path().join("cli/tests/bundle_dynamic_import.ts"); + assert!(dynamic_import.is_file()); + let t = TempDir::new().expect("tempdir fail"); + let bundle = t.path().join("bundle_dynamic_import.bundle.js"); + let mut deno = util::deno_cmd() + .current_dir(util::root_path()) + .arg("bundle") + .arg(dynamic_import) + .arg(&bundle) + .spawn() + .expect("failed to spawn script"); + let status = deno.wait().expect("failed to wait for the child process"); + assert!(status.success()); + assert!(bundle.is_file()); + + let output = util::deno_cmd() + .current_dir(util::root_path()) + .arg("run") + .arg("--allow-net") + .arg("--quiet") + .arg(&bundle) + .output() + .expect("failed to spawn script"); + // check the output of the test.ts program. + assert!(std::str::from_utf8(&output.stdout) + .unwrap() + .trim() + .ends_with("Hello")); + assert_eq!(output.stderr, b""); +} + +#[test] +fn bundle_import_map() { + let import = util::root_path().join("cli/tests/bundle_im.ts"); + let import_map_path = util::root_path().join("cli/tests/bundle_im.json"); + assert!(import.is_file()); + let t = TempDir::new().expect("tempdir fail"); + let bundle = t.path().join("import_map.bundle.js"); + let mut deno = util::deno_cmd() + .current_dir(util::root_path()) + .arg("bundle") + .arg("--import-map") + .arg(import_map_path) + .arg(import) + .arg(&bundle) + .spawn() + .expect("failed to spawn script"); + let status = deno.wait().expect("failed to wait for the child process"); + assert!(status.success()); + assert!(bundle.is_file()); + + // Now we try to use that bundle from another module. + let test = t.path().join("test.js"); + std::fs::write( + &test, + " + import { printHello3 } from \"./import_map.bundle.js\"; + printHello3(); ", + ) + .expect("error writing file"); + + let output = util::deno_cmd() + .current_dir(util::root_path()) + .arg("run") + .arg(&test) + .output() + .expect("failed to spawn script"); + // check the output of the test.ts program. + assert!(std::str::from_utf8(&output.stdout) + .unwrap() + .trim() + .ends_with("Hello")); + assert_eq!(output.stderr, b""); +} + +#[test] +fn bundle_import_map_no_check() { + let import = util::root_path().join("cli/tests/bundle_im.ts"); + let import_map_path = util::root_path().join("cli/tests/bundle_im.json"); + assert!(import.is_file()); + let t = TempDir::new().expect("tempdir fail"); + let bundle = t.path().join("import_map.bundle.js"); + let mut deno = util::deno_cmd() + .current_dir(util::root_path()) + .arg("bundle") + .arg("--no-check") + .arg("--import-map") + .arg(import_map_path) + .arg(import) + .arg(&bundle) + .spawn() + .expect("failed to spawn script"); + let status = deno.wait().expect("failed to wait for the child process"); + assert!(status.success()); + assert!(bundle.is_file()); + + // Now we try to use that bundle from another module. + let test = t.path().join("test.js"); + std::fs::write( + &test, + " + import { printHello3 } from \"./import_map.bundle.js\"; + printHello3(); ", + ) + .expect("error writing file"); + + let output = util::deno_cmd() + .current_dir(util::root_path()) + .arg("run") + .arg(&test) + .output() + .expect("failed to spawn script"); + // check the output of the test.ts program. + assert!(std::str::from_utf8(&output.stdout) + .unwrap() + .trim() + .ends_with("Hello")); + assert_eq!(output.stderr, b""); +} + +itest!(lock_check_err_with_bundle { + args: "bundle --lock=lock_check_err_with_bundle.json http://127.0.0.1:4545/cli/tests/subdir/mod1.ts", + output: "lock_check_err_with_bundle.out", + exit_code: 10, + http_server: true, +}); + +itest!(bundle { + args: "bundle subdir/mod1.ts", + output: "bundle.test.out", +}); + +itest!(bundle_jsx { + args: "bundle jsx_import_from_ts.ts", + output: "bundle_jsx.out", +}); + +itest!(error_027_bundle_with_bare_import { + args: "bundle error_027_bundle_with_bare_import.ts", + output: "error_027_bundle_with_bare_import.ts.out", + exit_code: 1, +}); + +itest!(ts_decorators_bundle { + args: "bundle ts_decorators_bundle.ts", + output: "ts_decorators_bundle.out", +}); diff --git a/cli/tests/integration/cache_tests.rs b/cli/tests/integration/cache_tests.rs new file mode 100644 index 0000000000..c97741a137 --- /dev/null +++ b/cli/tests/integration/cache_tests.rs @@ -0,0 +1,50 @@ +// Copyright 2018-2021 the Deno authors. All rights reserved. MIT license. + +use crate::itest; + +itest!(_036_import_map_fetch { + args: + "cache --quiet --reload --import-map=import_maps/import_map.json import_maps/test.ts", + output: "036_import_map_fetch.out", +}); + +itest!(_037_fetch_multiple { + args: "cache --reload fetch/test.ts fetch/other.ts", + http_server: true, + output: "037_fetch_multiple.out", +}); + +itest!(_095_cache_with_bare_import { + args: "cache 095_cache_with_bare_import.ts", + output: "095_cache_with_bare_import.ts.out", + exit_code: 1, +}); + +itest!(cache_extensionless { + args: "cache --reload http://localhost:4545/cli/tests/subdir/no_js_ext", + output: "cache_extensionless.out", + http_server: true, +}); + +itest!(cache_random_extension { + args: "cache --reload http://localhost:4545/cli/tests/subdir/no_js_ext@1.0.0", + output: "cache_random_extension.out", + http_server: true, +}); + +itest!(performance_stats { + args: "cache --reload --log-level debug 002_hello.ts", + output: "performance_stats.out", +}); + +itest!(redirect_cache { + http_server: true, + args: "cache --reload http://localhost:4548/cli/tests/subdir/redirects/a.ts", + output: "redirect_cache.out", +}); + +itest!(ignore_require { + args: "cache --reload --no-check ignore_require.js", + output_str: Some(""), + exit_code: 0, +}); diff --git a/cli/tests/integration/compile_tests.rs b/cli/tests/integration/compile_tests.rs new file mode 100644 index 0000000000..0748821ddb --- /dev/null +++ b/cli/tests/integration/compile_tests.rs @@ -0,0 +1,372 @@ +// Copyright 2018-2021 the Deno authors. All rights reserved. MIT license. + +use std::process::Command; +use tempfile::TempDir; +use test_util as util; + +#[test] +fn compile() { + let dir = TempDir::new().expect("tempdir fail"); + let exe = if cfg!(windows) { + dir.path().join("welcome.exe") + } else { + dir.path().join("welcome") + }; + let output = util::deno_cmd() + .current_dir(util::root_path()) + .arg("compile") + .arg("--unstable") + .arg("--output") + .arg(&exe) + .arg("./test_util/std/examples/welcome.ts") + .stdout(std::process::Stdio::piped()) + .spawn() + .unwrap() + .wait_with_output() + .unwrap(); + assert!(output.status.success()); + let output = Command::new(exe) + .stdout(std::process::Stdio::piped()) + .spawn() + .unwrap() + .wait_with_output() + .unwrap(); + assert!(output.status.success()); + assert_eq!(output.stdout, "Welcome to Deno!\n".as_bytes()); +} + +#[ignore] +#[test] +#[cfg(windows)] +// https://github.com/denoland/deno/issues/9667 +fn compile_windows_ext() { + let dir = TempDir::new().expect("tempdir fail"); + let exe = dir.path().join("welcome_9667"); + let output = util::deno_cmd() + .current_dir(util::root_path()) + .arg("compile") + .arg("--unstable") + .arg("--output") + .arg(&exe) + .arg("--target") + .arg("x86_64-unknown-linux-gnu") + .arg("./test_util/std/examples/welcome.ts") + // TODO(kt3k): Prints command output to the test log for debugging purpose. + // Uncomment this line when this test become stable. + //.stdout(std::process::Stdio::piped()) + .spawn() + .unwrap() + .wait_with_output() + .unwrap(); + assert!(output.status.success()); + assert!(std::path::Path::new(&exe).exists()); +} + +#[test] +fn standalone_args() { + let dir = TempDir::new().expect("tempdir fail"); + let exe = if cfg!(windows) { + dir.path().join("args.exe") + } else { + dir.path().join("args") + }; + let output = util::deno_cmd() + .current_dir(util::root_path()) + .arg("compile") + .arg("--unstable") + .arg("--output") + .arg(&exe) + .arg("./cli/tests/028_args.ts") + .arg("a") + .arg("b") + .stdout(std::process::Stdio::piped()) + .spawn() + .unwrap() + .wait_with_output() + .unwrap(); + assert!(output.status.success()); + let output = Command::new(exe) + .arg("foo") + .arg("--bar") + .arg("--unstable") + .stdout(std::process::Stdio::piped()) + .spawn() + .unwrap() + .wait_with_output() + .unwrap(); + assert!(output.status.success()); + assert_eq!(output.stdout, b"a\nb\nfoo\n--bar\n--unstable\n"); +} + +#[test] +fn standalone_error() { + let dir = TempDir::new().expect("tempdir fail"); + let exe = if cfg!(windows) { + dir.path().join("error.exe") + } else { + dir.path().join("error") + }; + let output = util::deno_cmd() + .current_dir(util::root_path()) + .arg("compile") + .arg("--unstable") + .arg("--output") + .arg(&exe) + .arg("./cli/tests/standalone_error.ts") + .stdout(std::process::Stdio::piped()) + .spawn() + .unwrap() + .wait_with_output() + .unwrap(); + assert!(output.status.success()); + let output = Command::new(exe) + .env("NO_COLOR", "1") + .stdout(std::process::Stdio::piped()) + .stderr(std::process::Stdio::piped()) + .spawn() + .unwrap() + .wait_with_output() + .unwrap(); + assert!(!output.status.success()); + assert_eq!(output.stdout, b""); + let expected_stderr = "error: Error: boom!\n at boom (file://$deno$/bundle.js:2:11)\n at foo (file://$deno$/bundle.js:5:5)\n at file://$deno$/bundle.js:7:1\n"; + let stderr = String::from_utf8(output.stderr).unwrap(); + assert_eq!(stderr, expected_stderr); +} + +#[test] +fn standalone_no_module_load() { + let dir = TempDir::new().expect("tempdir fail"); + let exe = if cfg!(windows) { + dir.path().join("hello.exe") + } else { + dir.path().join("hello") + }; + let output = util::deno_cmd() + .current_dir(util::root_path()) + .arg("compile") + .arg("--unstable") + .arg("--output") + .arg(&exe) + .arg("./cli/tests/standalone_import.ts") + .stdout(std::process::Stdio::piped()) + .spawn() + .unwrap() + .wait_with_output() + .unwrap(); + assert!(output.status.success()); + let output = Command::new(exe) + .stdout(std::process::Stdio::piped()) + .stderr(std::process::Stdio::piped()) + .spawn() + .unwrap() + .wait_with_output() + .unwrap(); + assert!(!output.status.success()); + assert_eq!(output.stdout, b"start\n"); + let stderr_str = String::from_utf8(output.stderr).unwrap(); + assert!(util::strip_ansi_codes(&stderr_str) + .contains("Self-contained binaries don't support module loading")); +} + +#[test] +fn standalone_load_datauri() { + let dir = TempDir::new().expect("tempdir fail"); + let exe = if cfg!(windows) { + dir.path().join("load_datauri.exe") + } else { + dir.path().join("load_datauri") + }; + let output = util::deno_cmd() + .current_dir(util::root_path()) + .arg("compile") + .arg("--unstable") + .arg("--output") + .arg(&exe) + .arg("./cli/tests/standalone_import_datauri.ts") + .stdout(std::process::Stdio::piped()) + .spawn() + .unwrap() + .wait_with_output() + .unwrap(); + assert!(output.status.success()); + let output = Command::new(exe) + .stdout(std::process::Stdio::piped()) + .stderr(std::process::Stdio::piped()) + .spawn() + .unwrap() + .wait_with_output() + .unwrap(); + assert!(output.status.success()); + assert_eq!(output.stdout, b"Hello Deno!\n"); +} + +#[test] +fn standalone_compiler_ops() { + let dir = TempDir::new().expect("tempdir fail"); + let exe = if cfg!(windows) { + dir.path().join("standalone_compiler_ops.exe") + } else { + dir.path().join("standalone_compiler_ops") + }; + let output = util::deno_cmd() + .current_dir(util::root_path()) + .arg("compile") + .arg("--unstable") + .arg("--output") + .arg(&exe) + .arg("./cli/tests/standalone_compiler_ops.ts") + .stdout(std::process::Stdio::piped()) + .spawn() + .unwrap() + .wait_with_output() + .unwrap(); + assert!(output.status.success()); + let output = Command::new(exe) + .stdout(std::process::Stdio::piped()) + .stderr(std::process::Stdio::piped()) + .spawn() + .unwrap() + .wait_with_output() + .unwrap(); + assert!(output.status.success()); + assert_eq!(output.stdout, b"Hello, Compiler API!\n"); +} + +#[test] +fn compile_with_directory_exists_error() { + let dir = TempDir::new().expect("tempdir fail"); + let exe = if cfg!(windows) { + dir.path().join("args.exe") + } else { + dir.path().join("args") + }; + std::fs::create_dir(&exe).expect("cannot create directory"); + let output = util::deno_cmd() + .current_dir(util::root_path()) + .arg("compile") + .arg("--unstable") + .arg("--output") + .arg(&exe) + .arg("./cli/tests/028_args.ts") + .stderr(std::process::Stdio::piped()) + .spawn() + .unwrap() + .wait_with_output() + .unwrap(); + assert!(!output.status.success()); + let expected_stderr = + format!("Could not compile: {:?} is a directory.\n", &exe); + let stderr = String::from_utf8(output.stderr).unwrap(); + assert!(stderr.contains(&expected_stderr)); +} + +#[test] +fn compile_with_conflict_file_exists_error() { + let dir = TempDir::new().expect("tempdir fail"); + let exe = if cfg!(windows) { + dir.path().join("args.exe") + } else { + dir.path().join("args") + }; + std::fs::write(&exe, b"SHOULD NOT BE OVERWRITTEN") + .expect("cannot create file"); + let output = util::deno_cmd() + .current_dir(util::root_path()) + .arg("compile") + .arg("--unstable") + .arg("--output") + .arg(&exe) + .arg("./cli/tests/028_args.ts") + .stderr(std::process::Stdio::piped()) + .spawn() + .unwrap() + .wait_with_output() + .unwrap(); + assert!(!output.status.success()); + let expected_stderr = + format!("Could not compile: cannot overwrite {:?}.\n", &exe); + let stderr = String::from_utf8(output.stderr).unwrap(); + dbg!(&stderr); + assert!(stderr.contains(&expected_stderr)); + assert!(std::fs::read(&exe) + .expect("cannot read file") + .eq(b"SHOULD NOT BE OVERWRITTEN")); +} + +#[test] +fn compile_and_overwrite_file() { + let dir = TempDir::new().expect("tempdir fail"); + let exe = if cfg!(windows) { + dir.path().join("args.exe") + } else { + dir.path().join("args") + }; + let output = util::deno_cmd() + .current_dir(util::root_path()) + .arg("compile") + .arg("--unstable") + .arg("--output") + .arg(&exe) + .arg("./cli/tests/028_args.ts") + .stderr(std::process::Stdio::piped()) + .spawn() + .unwrap() + .wait_with_output() + .unwrap(); + assert!(output.status.success()); + assert!(&exe.exists()); + + let recompile_output = util::deno_cmd() + .current_dir(util::root_path()) + .arg("compile") + .arg("--unstable") + .arg("--output") + .arg(&exe) + .arg("./cli/tests/028_args.ts") + .stderr(std::process::Stdio::piped()) + .spawn() + .unwrap() + .wait_with_output() + .unwrap(); + assert!(recompile_output.status.success()); +} + +#[test] +fn standalone_runtime_flags() { + let dir = TempDir::new().expect("tempdir fail"); + let exe = if cfg!(windows) { + dir.path().join("flags.exe") + } else { + dir.path().join("flags") + }; + let output = util::deno_cmd() + .current_dir(util::root_path()) + .arg("compile") + .arg("--unstable") + .arg("--allow-read") + .arg("--seed") + .arg("1") + .arg("--output") + .arg(&exe) + .arg("./cli/tests/standalone_runtime_flags.ts") + .stdout(std::process::Stdio::piped()) + .spawn() + .unwrap() + .wait_with_output() + .unwrap(); + assert!(output.status.success()); + let output = Command::new(exe) + .stdout(std::process::Stdio::piped()) + .stderr(std::process::Stdio::piped()) + .spawn() + .unwrap() + .wait_with_output() + .unwrap(); + assert!(!output.status.success()); + let stdout_str = String::from_utf8(output.stdout).unwrap(); + assert_eq!(util::strip_ansi_codes(&stdout_str), "0.147205063401058\n"); + let stderr_str = String::from_utf8(output.stderr).unwrap(); + assert!(util::strip_ansi_codes(&stderr_str) + .contains("PermissionDenied: Requires write access")); +} diff --git a/cli/tests/integration/coverage_tests.rs b/cli/tests/integration/coverage_tests.rs new file mode 100644 index 0000000000..dce3fb38ca --- /dev/null +++ b/cli/tests/integration/coverage_tests.rs @@ -0,0 +1,156 @@ +// Copyright 2018-2021 the Deno authors. All rights reserved. MIT license. + +use std::fs; +use tempfile::TempDir; +use test_util as util; + +#[test] +fn branch() { + let tempdir = TempDir::new().expect("tempdir fail"); + let tempdir = tempdir.path().join("cov"); + let status = util::deno_cmd() + .current_dir(util::root_path()) + .arg("test") + .arg("--quiet") + .arg("--unstable") + .arg(format!("--coverage={}", tempdir.to_str().unwrap())) + .arg("cli/tests/coverage/branch_test.ts") + .stdout(std::process::Stdio::piped()) + .stderr(std::process::Stdio::inherit()) + .status() + .expect("failed to spawn test runner"); + + assert!(status.success()); + + let output = util::deno_cmd() + .current_dir(util::root_path()) + .arg("coverage") + .arg("--quiet") + .arg("--unstable") + .arg(format!("{}/", tempdir.to_str().unwrap())) + .stdout(std::process::Stdio::piped()) + .stderr(std::process::Stdio::inherit()) + .output() + .expect("failed to spawn coverage reporter"); + + let actual = + util::strip_ansi_codes(std::str::from_utf8(&output.stdout).unwrap()) + .to_string(); + + let expected = fs::read_to_string( + util::root_path().join("cli/tests/coverage/expected_branch.out"), + ) + .unwrap(); + + if !util::wildcard_match(&expected, &actual) { + println!("OUTPUT\n{}\nOUTPUT", actual); + println!("EXPECTED\n{}\nEXPECTED", expected); + panic!("pattern match failed"); + } + + assert!(output.status.success()); + + let output = util::deno_cmd() + .current_dir(util::root_path()) + .arg("coverage") + .arg("--quiet") + .arg("--unstable") + .arg("--lcov") + .arg(format!("{}/", tempdir.to_str().unwrap())) + .stdout(std::process::Stdio::piped()) + .stderr(std::process::Stdio::inherit()) + .output() + .expect("failed to spawn coverage reporter"); + + let actual = + util::strip_ansi_codes(std::str::from_utf8(&output.stdout).unwrap()) + .to_string(); + + let expected = fs::read_to_string( + util::root_path().join("cli/tests/coverage/expected_branch.lcov"), + ) + .unwrap(); + + if !util::wildcard_match(&expected, &actual) { + println!("OUTPUT\n{}\nOUTPUT", actual); + println!("EXPECTED\n{}\nEXPECTED", expected); + panic!("pattern match failed"); + } + + assert!(output.status.success()); +} + +#[test] +fn complex() { + let tempdir = TempDir::new().expect("tempdir fail"); + let status = util::deno_cmd() + .current_dir(util::root_path()) + .arg("test") + .arg("--quiet") + .arg("--unstable") + .arg(format!("--coverage={}", tempdir.path().to_str().unwrap())) + .arg("cli/tests/coverage/complex_test.ts") + .stdout(std::process::Stdio::piped()) + .stderr(std::process::Stdio::inherit()) + .status() + .expect("failed to spawn test runner"); + + assert!(status.success()); + + let output = util::deno_cmd() + .current_dir(util::root_path()) + .arg("coverage") + .arg("--quiet") + .arg("--unstable") + .arg(format!("{}/", tempdir.path().to_str().unwrap())) + .stdout(std::process::Stdio::piped()) + .stderr(std::process::Stdio::inherit()) + .output() + .expect("failed to spawn coverage reporter"); + + let actual = + util::strip_ansi_codes(std::str::from_utf8(&output.stdout).unwrap()) + .to_string(); + + let expected = fs::read_to_string( + util::root_path().join("cli/tests/coverage/expected_complex.out"), + ) + .unwrap(); + + if !util::wildcard_match(&expected, &actual) { + println!("OUTPUT\n{}\nOUTPUT", actual); + println!("EXPECTED\n{}\nEXPECTED", expected); + panic!("pattern match failed"); + } + + assert!(output.status.success()); + + let output = util::deno_cmd() + .current_dir(util::root_path()) + .arg("coverage") + .arg("--quiet") + .arg("--unstable") + .arg("--lcov") + .arg(format!("{}/", tempdir.path().to_str().unwrap())) + .stdout(std::process::Stdio::piped()) + .stderr(std::process::Stdio::inherit()) + .output() + .expect("failed to spawn coverage reporter"); + + let actual = + util::strip_ansi_codes(std::str::from_utf8(&output.stdout).unwrap()) + .to_string(); + + let expected = fs::read_to_string( + util::root_path().join("cli/tests/coverage/expected_complex.lcov"), + ) + .unwrap(); + + if !util::wildcard_match(&expected, &actual) { + println!("OUTPUT\n{}\nOUTPUT", actual); + println!("EXPECTED\n{}\nEXPECTED", expected); + panic!("pattern match failed"); + } + + assert!(output.status.success()); +} diff --git a/cli/tests/integration/doc_tests.rs b/cli/tests/integration/doc_tests.rs new file mode 100644 index 0000000000..d6ddb455e3 --- /dev/null +++ b/cli/tests/integration/doc_tests.rs @@ -0,0 +1,45 @@ +// Copyright 2018-2021 the Deno authors. All rights reserved. MIT license. + +use crate::itest; + +itest!(deno_doc_builtin { + args: "doc", + output: "deno_doc_builtin.out", +}); + +itest!(deno_doc { + args: "doc deno_doc.ts", + output: "deno_doc.out", +}); + +itest!(deno_doc_import_map { + args: "doc --unstable --import-map=doc/import_map.json doc/use_import_map.js", + output: "doc/use_import_map.out", +}); + +itest!(deno_doc_types_hint { + args: "doc doc/types_hint.ts", + output: "doc/types_hint.out", +}); + +itest!(deno_doc_types_ref { + args: "doc doc/types_ref.js", + output: "doc/types_ref.out", +}); + +itest!(deno_doc_types_header { + args: "doc --reload doc/types_header.ts", + output: "doc/types_header.out", + http_server: true, +}); + +itest!(_060_deno_doc_displays_all_overloads_in_details_view { + args: "doc 060_deno_doc_displays_all_overloads_in_details_view.ts NS.test", + output: "060_deno_doc_displays_all_overloads_in_details_view.ts.out", +}); + +itest!(deno_doc_types_header_direct { + args: "doc --reload http://127.0.0.1:4545/xTypeScriptTypes.js", + output: "doc/types_header.out", + http_server: true, +}); diff --git a/cli/tests/integration/eval_tests.rs b/cli/tests/integration/eval_tests.rs new file mode 100644 index 0000000000..40fa26158c --- /dev/null +++ b/cli/tests/integration/eval_tests.rs @@ -0,0 +1,44 @@ +// Copyright 2018-2021 the Deno authors. All rights reserved. MIT license. + +use crate::itest; +use test_util as util; + +#[test] +fn eval_p() { + let output = util::deno_cmd() + .arg("eval") + .arg("-p") + .arg("1+2") + .stdout(std::process::Stdio::piped()) + .spawn() + .unwrap() + .wait_with_output() + .unwrap(); + assert!(output.status.success()); + let stdout_str = + util::strip_ansi_codes(std::str::from_utf8(&output.stdout).unwrap().trim()); + assert_eq!("3", stdout_str); +} + +itest!(_029_eval { + args: "eval console.log(\"hello\")", + output: "029_eval.out", +}); + +// Ugly parentheses due to whitespace delimiting problem. +itest!(_030_eval_ts { + args: "eval --quiet --ext=ts console.log((123)as(number))", // 'as' is a TS keyword only + output: "030_eval_ts.out", +}); + +itest!(_041_dyn_import_eval { + args: "eval import('./subdir/mod4.js').then(console.log)", + output: "041_dyn_import_eval.out", +}); + +// Cannot write the expression to evaluate as "console.log(typeof gc)" +// because itest! splits args on whitespace. +itest!(v8_flags_eval { + args: "eval --v8-flags=--expose-gc console.log(typeof(gc))", + output: "v8_flags.js.out", +}); diff --git a/cli/tests/integration/fmt_tests.rs b/cli/tests/integration/fmt_tests.rs new file mode 100644 index 0000000000..4aab38fcfa --- /dev/null +++ b/cli/tests/integration/fmt_tests.rs @@ -0,0 +1,184 @@ +// Copyright 2018-2021 the Deno authors. All rights reserved. MIT license. + +use crate::itest; +use tempfile::TempDir; +use test_util as util; + +#[test] +fn fmt_test() { + let t = TempDir::new().expect("tempdir fail"); + let fixed_js = util::root_path().join("cli/tests/badly_formatted_fixed.js"); + let badly_formatted_original_js = + util::root_path().join("cli/tests/badly_formatted.mjs"); + let badly_formatted_js = t.path().join("badly_formatted.js"); + let badly_formatted_js_str = badly_formatted_js.to_str().unwrap(); + std::fs::copy(&badly_formatted_original_js, &badly_formatted_js) + .expect("Failed to copy file"); + + let fixed_md = util::root_path().join("cli/tests/badly_formatted_fixed.md"); + let badly_formatted_original_md = + util::root_path().join("cli/tests/badly_formatted.md"); + let badly_formatted_md = t.path().join("badly_formatted.md"); + let badly_formatted_md_str = badly_formatted_md.to_str().unwrap(); + std::fs::copy(&badly_formatted_original_md, &badly_formatted_md) + .expect("Failed to copy file"); + + let fixed_json = + util::root_path().join("cli/tests/badly_formatted_fixed.json"); + let badly_formatted_original_json = + util::root_path().join("cli/tests/badly_formatted.json"); + let badly_formatted_json = t.path().join("badly_formatted.json"); + let badly_formatted_json_str = badly_formatted_json.to_str().unwrap(); + std::fs::copy(&badly_formatted_original_json, &badly_formatted_json) + .expect("Failed to copy file"); + // First, check formatting by ignoring the badly formatted file. + let status = util::deno_cmd() + .current_dir(util::root_path()) + .arg("fmt") + .arg(format!( + "--ignore={},{},{}", + badly_formatted_js_str, badly_formatted_md_str, badly_formatted_json_str + )) + .arg("--check") + .arg(badly_formatted_js_str) + .arg(badly_formatted_md_str) + .arg(badly_formatted_json_str) + .spawn() + .expect("Failed to spawn script") + .wait() + .expect("Failed to wait for child process"); + // No target files found + assert!(!status.success()); + + // Check without ignore. + let status = util::deno_cmd() + .current_dir(util::root_path()) + .arg("fmt") + .arg("--check") + .arg(badly_formatted_js_str) + .arg(badly_formatted_md_str) + .arg(badly_formatted_json_str) + .spawn() + .expect("Failed to spawn script") + .wait() + .expect("Failed to wait for child process"); + assert!(!status.success()); + + // Format the source file. + let status = util::deno_cmd() + .current_dir(util::root_path()) + .arg("fmt") + .arg(badly_formatted_js_str) + .arg(badly_formatted_md_str) + .arg(badly_formatted_json_str) + .spawn() + .expect("Failed to spawn script") + .wait() + .expect("Failed to wait for child process"); + assert!(status.success()); + let expected_js = std::fs::read_to_string(fixed_js).unwrap(); + let expected_md = std::fs::read_to_string(fixed_md).unwrap(); + let expected_json = std::fs::read_to_string(fixed_json).unwrap(); + let actual_js = std::fs::read_to_string(badly_formatted_js).unwrap(); + let actual_md = std::fs::read_to_string(badly_formatted_md).unwrap(); + let actual_json = std::fs::read_to_string(badly_formatted_json).unwrap(); + assert_eq!(expected_js, actual_js); + assert_eq!(expected_md, actual_md); + assert_eq!(expected_json, actual_json); +} + +#[test] +fn fmt_stdin_error() { + use std::io::Write; + let mut deno = util::deno_cmd() + .current_dir(util::root_path()) + .arg("fmt") + .arg("-") + .stdin(std::process::Stdio::piped()) + .stdout(std::process::Stdio::piped()) + .stderr(std::process::Stdio::piped()) + .spawn() + .unwrap(); + let stdin = deno.stdin.as_mut().unwrap(); + let invalid_js = b"import { example }"; + stdin.write_all(invalid_js).unwrap(); + let output = deno.wait_with_output().unwrap(); + // Error message might change. Just check stdout empty, stderr not. + assert!(output.stdout.is_empty()); + assert!(!output.stderr.is_empty()); + assert!(!output.status.success()); +} + +#[test] +fn fmt_ignore_unexplicit_files() { + let output = util::deno_cmd() + .current_dir(util::root_path()) + .env("NO_COLOR", "1") + .arg("fmt") + .arg("--check") + .arg("--ignore=./") + .stderr(std::process::Stdio::piped()) + .spawn() + .unwrap() + .wait_with_output() + .unwrap(); + assert!(!output.status.success()); + assert_eq!( + String::from_utf8_lossy(&output.stderr), + "error: No target files found.\n" + ); +} + +itest!(fmt_check_tests_dir { + args: "fmt --check ./ --ignore=.test_coverage", + output: "fmt/expected_fmt_check_tests_dir.out", + exit_code: 1, +}); + +itest!(fmt_quiet_check_fmt_dir { + args: "fmt --check --quiet fmt/", + output_str: Some(""), + exit_code: 0, +}); + +itest!(fmt_check_formatted_files { + args: "fmt --check fmt/formatted1.js fmt/formatted2.ts fmt/formatted3.md fmt/formatted4.jsonc", + output: "fmt/expected_fmt_check_formatted_files.out", + exit_code: 0, + }); + +itest!(fmt_check_ignore { + args: "fmt --check --ignore=fmt/formatted1.js fmt/", + output: "fmt/expected_fmt_check_ignore.out", + exit_code: 0, +}); + +itest!(fmt_stdin { + args: "fmt -", + input: Some("const a = 1\n"), + output_str: Some("const a = 1;\n"), +}); + +itest!(fmt_stdin_markdown { + args: "fmt --ext=md -", + input: Some("# Hello Markdown\n```ts\nconsole.log( \"text\")\n```\n"), + output_str: Some("# Hello Markdown\n\n```ts\nconsole.log(\"text\");\n```\n"), +}); + +itest!(fmt_stdin_json { + args: "fmt --ext=json -", + input: Some("{ \"key\": \"value\"}"), + output_str: Some("{ \"key\": \"value\" }\n"), +}); + +itest!(fmt_stdin_check_formatted { + args: "fmt --check -", + input: Some("const a = 1;\n"), + output_str: Some(""), +}); + +itest!(fmt_stdin_check_not_formatted { + args: "fmt --check -", + input: Some("const a = 1\n"), + output_str: Some("Not formatted stdin\n"), +}); diff --git a/cli/tests/integration/info_tests.rs b/cli/tests/integration/info_tests.rs new file mode 100644 index 0000000000..190c0330c5 --- /dev/null +++ b/cli/tests/integration/info_tests.rs @@ -0,0 +1,113 @@ +// Copyright 2018-2021 the Deno authors. All rights reserved. MIT license. + +use crate::itest; +use tempfile::TempDir; +use test_util as util; + +#[test] +fn info_with_compiled_source() { + let _g = util::http_server(); + let module_path = "http://127.0.0.1:4545/cli/tests/048_media_types_jsx.ts"; + let t = TempDir::new().expect("tempdir fail"); + + let mut deno = util::deno_cmd() + .env("DENO_DIR", t.path()) + .current_dir(util::root_path()) + .arg("cache") + .arg(&module_path) + .spawn() + .expect("failed to spawn script"); + let status = deno.wait().expect("failed to wait for the child process"); + assert!(status.success()); + + let output = util::deno_cmd() + .env("DENO_DIR", t.path()) + .env("NO_COLOR", "1") + .current_dir(util::root_path()) + .arg("info") + .arg(&module_path) + .output() + .expect("failed to spawn script"); + + let str_output = std::str::from_utf8(&output.stdout).unwrap().trim(); + eprintln!("{}", str_output); + // check the output of the test.ts program. + assert!(str_output.contains("emit: ")); + assert_eq!(output.stderr, b""); +} + +itest!(_022_info_flag_script { + args: "info http://127.0.0.1:4545/cli/tests/019_media_types.ts", + output: "022_info_flag_script.out", + http_server: true, +}); + +itest!(_031_info_ts_error { + args: "info 031_info_ts_error.ts", + output: "031_info_ts_error.out", +}); + +itest!(_041_info_flag { + args: "info", + output: "041_info_flag.out", +}); + +itest!(_042_info_flag_location { + args: "info --location https://deno.land", + output: "041_info_flag_location.out", +}); + +itest!(info_json { + args: "info --json --unstable", + output: "info_json.out", +}); + +itest!(info_json_location { + args: "info --json --unstable --location https://deno.land", + output: "info_json_location.out", +}); + +itest!(_049_info_flag_script_jsx { + args: "info http://127.0.0.1:4545/cli/tests/048_media_types_jsx.ts", + output: "049_info_flag_script_jsx.out", + http_server: true, +}); + +itest!(_055_info_file_json { + args: "info --quiet --json --unstable 005_more_imports.ts", + output: "055_info_file_json.out", + exit_code: 0, +}); + +itest!(_065_import_map_info { + args: + "info --quiet --import-map=import_maps/import_map.json import_maps/test.ts", + output: "065_import_map_info.out", +}); + +itest!(_076_info_json_deps_order { + args: "info --unstable --json 076_info_json_deps_order.ts", + output: "076_info_json_deps_order.out", +}); + +itest!(info_missing_module { + args: "info error_009_missing_js_module.js", + output: "info_missing_module.out", +}); + +itest!(info_recursive_modules { + args: "info --quiet info_recursive_imports_test.ts", + output: "info_recursive_imports_test.out", + exit_code: 0, +}); + +itest!(info_type_import { + args: "info info_type_import.ts", + output: "info_type_import.out", +}); + +itest!(_054_info_local_imports { + args: "info --quiet 005_more_imports.ts", + output: "054_info_local_imports.out", + exit_code: 0, +}); diff --git a/cli/tests/integration/inspector_tests.rs b/cli/tests/integration/inspector_tests.rs new file mode 100644 index 0000000000..ebbfe94d27 --- /dev/null +++ b/cli/tests/integration/inspector_tests.rs @@ -0,0 +1,495 @@ +// Copyright 2018-2021 the Deno authors. All rights reserved. MIT license. + +use deno_core::futures; +use deno_core::futures::prelude::*; +use deno_core::serde_json; +use deno_core::url; +use deno_runtime::deno_fetch::reqwest; +use deno_runtime::deno_websocket::tokio_tungstenite; +use std::io::BufRead; +use test_util as util; + +fn inspect_flag_with_unique_port(flag_prefix: &str) -> String { + use std::sync::atomic::{AtomicU16, Ordering}; + static PORT: AtomicU16 = AtomicU16::new(9229); + let port = PORT.fetch_add(1, Ordering::Relaxed); + format!("{}=127.0.0.1:{}", flag_prefix, port) +} + +fn extract_ws_url_from_stderr( + stderr_lines: &mut impl std::iter::Iterator, +) -> url::Url { + let stderr_first_line = stderr_lines.next().unwrap(); + assert!(stderr_first_line.starts_with("Debugger listening on ")); + let v: Vec<_> = stderr_first_line.match_indices("ws:").collect(); + assert_eq!(v.len(), 1); + let ws_url_index = v[0].0; + let ws_url = &stderr_first_line[ws_url_index..]; + url::Url::parse(ws_url).unwrap() +} + +#[tokio::test] +async fn inspector_connect() { + let script = util::tests_path().join("inspector1.js"); + let mut child = util::deno_cmd() + .arg("run") + .arg(inspect_flag_with_unique_port("--inspect")) + .arg(script) + .stderr(std::process::Stdio::piped()) + .spawn() + .unwrap(); + + let stderr = child.stderr.as_mut().unwrap(); + let mut stderr_lines = + std::io::BufReader::new(stderr).lines().map(|r| r.unwrap()); + let ws_url = extract_ws_url_from_stderr(&mut stderr_lines); + + // We use tokio_tungstenite as a websocket client because warp (which is + // a dependency of Deno) uses it. + let (_socket, response) = tokio_tungstenite::connect_async(ws_url) + .await + .expect("Can't connect"); + assert_eq!("101 Switching Protocols", response.status().to_string()); + child.kill().unwrap(); + child.wait().unwrap(); +} + +#[derive(Debug)] +enum TestStep { + StdOut(&'static str), + StdErr(&'static str), + WsRecv(&'static str), + WsSend(&'static str), +} + +#[tokio::test] +async fn inspector_break_on_first_line() { + let script = util::tests_path().join("inspector2.js"); + let mut child = util::deno_cmd() + .arg("run") + .arg(inspect_flag_with_unique_port("--inspect-brk")) + .arg(script) + .stdout(std::process::Stdio::piped()) + .stderr(std::process::Stdio::piped()) + .spawn() + .unwrap(); + + let stderr = child.stderr.as_mut().unwrap(); + let mut stderr_lines = + std::io::BufReader::new(stderr).lines().map(|r| r.unwrap()); + let ws_url = extract_ws_url_from_stderr(&mut stderr_lines); + + let (socket, response) = tokio_tungstenite::connect_async(ws_url) + .await + .expect("Can't connect"); + assert_eq!(response.status(), 101); // Switching protocols. + + let (mut socket_tx, socket_rx) = socket.split(); + let mut socket_rx = + socket_rx.map(|msg| msg.unwrap().to_string()).filter(|msg| { + let pass = !msg.starts_with(r#"{"method":"Debugger.scriptParsed","#); + futures::future::ready(pass) + }); + + let stdout = child.stdout.as_mut().unwrap(); + let mut stdout_lines = + std::io::BufReader::new(stdout).lines().map(|r| r.unwrap()); + + use TestStep::*; + let test_steps = vec![ + WsSend(r#"{"id":1,"method":"Runtime.enable"}"#), + WsSend(r#"{"id":2,"method":"Debugger.enable"}"#), + WsRecv( + r#"{"method":"Runtime.executionContextCreated","params":{"context":{"id":1,"#, + ), + WsRecv(r#"{"id":1,"result":{}}"#), + WsRecv(r#"{"id":2,"result":{"debuggerId":"#), + WsSend(r#"{"id":3,"method":"Runtime.runIfWaitingForDebugger"}"#), + WsRecv(r#"{"id":3,"result":{}}"#), + WsRecv(r#"{"method":"Debugger.paused","#), + WsSend( + r#"{"id":4,"method":"Runtime.evaluate","params":{"expression":"Deno.core.print(\"hello from the inspector\\n\")","contextId":1,"includeCommandLineAPI":true,"silent":false,"returnByValue":true}}"#, + ), + WsRecv(r#"{"id":4,"result":{"result":{"type":"undefined"}}}"#), + StdOut("hello from the inspector"), + WsSend(r#"{"id":5,"method":"Debugger.resume"}"#), + WsRecv(r#"{"id":5,"result":{}}"#), + StdOut("hello from the script"), + ]; + + for step in test_steps { + match step { + StdOut(s) => assert_eq!(&stdout_lines.next().unwrap(), s), + WsRecv(s) => assert!(socket_rx.next().await.unwrap().starts_with(s)), + WsSend(s) => socket_tx.send(s.into()).await.unwrap(), + _ => unreachable!(), + } + } + + child.kill().unwrap(); + child.wait().unwrap(); +} + +#[tokio::test] +async fn inspector_pause() { + let script = util::tests_path().join("inspector1.js"); + let mut child = util::deno_cmd() + .arg("run") + .arg(inspect_flag_with_unique_port("--inspect")) + .arg(script) + .stderr(std::process::Stdio::piped()) + .spawn() + .unwrap(); + + let stderr = child.stderr.as_mut().unwrap(); + let mut stderr_lines = + std::io::BufReader::new(stderr).lines().map(|r| r.unwrap()); + let ws_url = extract_ws_url_from_stderr(&mut stderr_lines); + + // We use tokio_tungstenite as a websocket client because warp (which is + // a dependency of Deno) uses it. + let (mut socket, _) = tokio_tungstenite::connect_async(ws_url) + .await + .expect("Can't connect"); + + /// Returns the next websocket message as a string ignoring + /// Debugger.scriptParsed messages. + async fn ws_read_msg( + socket: &mut tokio_tungstenite::WebSocketStream< + tokio_tungstenite::MaybeTlsStream, + >, + ) -> String { + use deno_core::futures::stream::StreamExt; + while let Some(msg) = socket.next().await { + let msg = msg.unwrap().to_string(); + // FIXME(bartlomieju): fails because there's a file loaded + // called 150_errors.js + // assert!(!msg.contains("error")); + if !msg.contains("Debugger.scriptParsed") { + return msg; + } + } + unreachable!() + } + + socket + .send(r#"{"id":6,"method":"Debugger.enable"}"#.into()) + .await + .unwrap(); + + let msg = ws_read_msg(&mut socket).await; + println!("response msg 1 {}", msg); + assert!(msg.starts_with(r#"{"id":6,"result":{"debuggerId":"#)); + + socket + .send(r#"{"id":31,"method":"Debugger.pause"}"#.into()) + .await + .unwrap(); + + let msg = ws_read_msg(&mut socket).await; + println!("response msg 2 {}", msg); + assert_eq!(msg, r#"{"id":31,"result":{}}"#); + + child.kill().unwrap(); +} + +#[tokio::test] +async fn inspector_port_collision() { + // Skip this test on WSL, which allows multiple processes to listen on the + // same port, rather than making `bind()` fail with `EADDRINUSE`. + if cfg!(target_os = "linux") && std::env::var_os("WSL_DISTRO_NAME").is_some() + { + return; + } + + let script = util::tests_path().join("inspector1.js"); + let inspect_flag = inspect_flag_with_unique_port("--inspect"); + + let mut child1 = util::deno_cmd() + .arg("run") + .arg(&inspect_flag) + .arg(script.clone()) + .stderr(std::process::Stdio::piped()) + .spawn() + .unwrap(); + + let stderr_1 = child1.stderr.as_mut().unwrap(); + let mut stderr_1_lines = std::io::BufReader::new(stderr_1) + .lines() + .map(|r| r.unwrap()); + let _ = extract_ws_url_from_stderr(&mut stderr_1_lines); + + let mut child2 = util::deno_cmd() + .arg("run") + .arg(&inspect_flag) + .arg(script) + .stderr(std::process::Stdio::piped()) + .spawn() + .unwrap(); + + let stderr_2 = child2.stderr.as_mut().unwrap(); + let stderr_2_error_message = std::io::BufReader::new(stderr_2) + .lines() + .map(|r| r.unwrap()) + .inspect(|line| assert!(!line.contains("Debugger listening"))) + .find(|line| line.contains("Cannot start inspector server")); + assert!(stderr_2_error_message.is_some()); + + child1.kill().unwrap(); + child1.wait().unwrap(); + child2.wait().unwrap(); +} + +#[tokio::test] +async fn inspector_does_not_hang() { + let script = util::tests_path().join("inspector3.js"); + let mut child = util::deno_cmd() + .arg("run") + .arg(inspect_flag_with_unique_port("--inspect-brk")) + .env("NO_COLOR", "1") + .arg(script) + .stdout(std::process::Stdio::piped()) + .stderr(std::process::Stdio::piped()) + .spawn() + .unwrap(); + + let stderr = child.stderr.as_mut().unwrap(); + let mut stderr_lines = + std::io::BufReader::new(stderr).lines().map(|r| r.unwrap()); + let ws_url = extract_ws_url_from_stderr(&mut stderr_lines); + + let (socket, response) = tokio_tungstenite::connect_async(ws_url) + .await + .expect("Can't connect"); + assert_eq!(response.status(), 101); // Switching protocols. + + let (mut socket_tx, socket_rx) = socket.split(); + let mut socket_rx = + socket_rx.map(|msg| msg.unwrap().to_string()).filter(|msg| { + let pass = !msg.starts_with(r#"{"method":"Debugger.scriptParsed","#); + futures::future::ready(pass) + }); + + let stdout = child.stdout.as_mut().unwrap(); + let mut stdout_lines = + std::io::BufReader::new(stdout).lines().map(|r| r.unwrap()); + + use TestStep::*; + let test_steps = vec![ + WsSend(r#"{"id":1,"method":"Runtime.enable"}"#), + WsSend(r#"{"id":2,"method":"Debugger.enable"}"#), + WsRecv( + r#"{"method":"Runtime.executionContextCreated","params":{"context":{"id":1,"#, + ), + WsRecv(r#"{"id":1,"result":{}}"#), + WsRecv(r#"{"id":2,"result":{"debuggerId":"#), + WsSend(r#"{"id":3,"method":"Runtime.runIfWaitingForDebugger"}"#), + WsRecv(r#"{"id":3,"result":{}}"#), + WsRecv(r#"{"method":"Debugger.paused","#), + WsSend(r#"{"id":4,"method":"Debugger.resume"}"#), + WsRecv(r#"{"id":4,"result":{}}"#), + WsRecv(r#"{"method":"Debugger.resumed","params":{}}"#), + ]; + + for step in test_steps { + match step { + WsRecv(s) => assert!(socket_rx.next().await.unwrap().starts_with(s)), + WsSend(s) => socket_tx.send(s.into()).await.unwrap(), + _ => unreachable!(), + } + } + + for i in 0..128u32 { + let request_id = i + 10; + // Expect the number {i} on stdout. + let s = i.to_string(); + assert_eq!(stdout_lines.next().unwrap(), s); + // Expect console.log + let s = r#"{"method":"Runtime.consoleAPICalled","#; + assert!(socket_rx.next().await.unwrap().starts_with(s)); + // Expect hitting the `debugger` statement. + let s = r#"{"method":"Debugger.paused","#; + assert!(socket_rx.next().await.unwrap().starts_with(s)); + // Send the 'Debugger.resume' request. + let s = format!(r#"{{"id":{},"method":"Debugger.resume"}}"#, request_id); + socket_tx.send(s.into()).await.unwrap(); + // Expect confirmation of the 'Debugger.resume' request. + let s = format!(r#"{{"id":{},"result":{{}}}}"#, request_id); + assert_eq!(socket_rx.next().await.unwrap(), s); + let s = r#"{"method":"Debugger.resumed","params":{}}"#; + assert_eq!(socket_rx.next().await.unwrap(), s); + } + + // Check that we can gracefully close the websocket connection. + socket_tx.close().await.unwrap(); + socket_rx.for_each(|_| async {}).await; + + assert_eq!(&stdout_lines.next().unwrap(), "done"); + assert!(child.wait().unwrap().success()); +} + +#[tokio::test] +async fn inspector_without_brk_runs_code() { + let script = util::tests_path().join("inspector4.js"); + let mut child = util::deno_cmd() + .arg("run") + .arg(inspect_flag_with_unique_port("--inspect")) + .arg(script) + .stdout(std::process::Stdio::piped()) + .stderr(std::process::Stdio::piped()) + .spawn() + .unwrap(); + + let stderr = child.stderr.as_mut().unwrap(); + let mut stderr_lines = + std::io::BufReader::new(stderr).lines().map(|r| r.unwrap()); + let _ = extract_ws_url_from_stderr(&mut stderr_lines); + + // Check that inspector actually runs code without waiting for inspector + // connection. + let stdout = child.stdout.as_mut().unwrap(); + let mut stdout_lines = + std::io::BufReader::new(stdout).lines().map(|r| r.unwrap()); + let stdout_first_line = stdout_lines.next().unwrap(); + assert_eq!(stdout_first_line, "hello"); + + child.kill().unwrap(); + child.wait().unwrap(); +} + +#[tokio::test] +async fn inspector_runtime_evaluate_does_not_crash() { + let mut child = util::deno_cmd() + .arg("repl") + .arg(inspect_flag_with_unique_port("--inspect")) + .stdin(std::process::Stdio::piped()) + .stdout(std::process::Stdio::piped()) + .stderr(std::process::Stdio::piped()) + .spawn() + .unwrap(); + + let stderr = child.stderr.as_mut().unwrap(); + let mut stderr_lines = std::io::BufReader::new(stderr) + .lines() + .map(|r| r.unwrap()) + .filter(|s| s.as_str() != "Debugger session started."); + let ws_url = extract_ws_url_from_stderr(&mut stderr_lines); + + let (socket, response) = tokio_tungstenite::connect_async(ws_url) + .await + .expect("Can't connect"); + assert_eq!(response.status(), 101); // Switching protocols. + + let (mut socket_tx, socket_rx) = socket.split(); + let mut socket_rx = + socket_rx.map(|msg| msg.unwrap().to_string()).filter(|msg| { + let pass = !msg.starts_with(r#"{"method":"Debugger.scriptParsed","#); + futures::future::ready(pass) + }); + + let stdin = child.stdin.take().unwrap(); + + let stdout = child.stdout.as_mut().unwrap(); + let mut stdout_lines = std::io::BufReader::new(stdout) + .lines() + .map(|r| r.unwrap()) + .filter(|s| !s.starts_with("Deno ")); + + use TestStep::*; + let test_steps = vec![ + WsSend(r#"{"id":1,"method":"Runtime.enable"}"#), + WsSend(r#"{"id":2,"method":"Debugger.enable"}"#), + WsRecv( + r#"{"method":"Runtime.executionContextCreated","params":{"context":{"id":1,"#, + ), + WsRecv(r#"{"id":1,"result":{}}"#), + WsRecv(r#"{"id":2,"result":{"debuggerId":"#), + WsSend(r#"{"id":3,"method":"Runtime.runIfWaitingForDebugger"}"#), + WsRecv(r#"{"id":3,"result":{}}"#), + StdOut("exit using ctrl+d or close()"), + WsSend( + r#"{"id":4,"method":"Runtime.compileScript","params":{"expression":"Deno.cwd()","sourceURL":"","persistScript":false,"executionContextId":1}}"#, + ), + WsRecv(r#"{"id":4,"result":{}}"#), + WsSend( + r#"{"id":5,"method":"Runtime.evaluate","params":{"expression":"Deno.cwd()","objectGroup":"console","includeCommandLineAPI":true,"silent":false,"contextId":1,"returnByValue":true,"generatePreview":true,"userGesture":true,"awaitPromise":false,"replMode":true}}"#, + ), + WsRecv(r#"{"id":5,"result":{"result":{"type":"string","value":""#), + WsSend( + r#"{"id":6,"method":"Runtime.evaluate","params":{"expression":"console.error('done');","objectGroup":"console","includeCommandLineAPI":true,"silent":false,"contextId":1,"returnByValue":true,"generatePreview":true,"userGesture":true,"awaitPromise":false,"replMode":true}}"#, + ), + WsRecv(r#"{"method":"Runtime.consoleAPICalled"#), + WsRecv(r#"{"id":6,"result":{"result":{"type":"undefined"}}}"#), + StdErr("done"), + ]; + + for step in test_steps { + match step { + StdOut(s) => assert_eq!(&stdout_lines.next().unwrap(), s), + StdErr(s) => assert_eq!(&stderr_lines.next().unwrap(), s), + WsRecv(s) => assert!(socket_rx.next().await.unwrap().starts_with(s)), + WsSend(s) => socket_tx.send(s.into()).await.unwrap(), + } + } + + drop(stdin); + child.wait().unwrap(); +} + +#[tokio::test] +async fn inspector_json() { + let script = util::tests_path().join("inspector1.js"); + let mut child = util::deno_cmd() + .arg("run") + .arg(inspect_flag_with_unique_port("--inspect")) + .arg(script) + .stderr(std::process::Stdio::piped()) + .spawn() + .unwrap(); + + let stderr = child.stderr.as_mut().unwrap(); + let mut stderr_lines = + std::io::BufReader::new(stderr).lines().map(|r| r.unwrap()); + let ws_url = extract_ws_url_from_stderr(&mut stderr_lines); + let mut url = ws_url.clone(); + let _ = url.set_scheme("http"); + url.set_path("/json"); + let resp = reqwest::get(url).await.unwrap(); + assert_eq!(resp.status(), reqwest::StatusCode::OK); + let endpoint_list: Vec = + serde_json::from_str(&resp.text().await.unwrap()).unwrap(); + let matching_endpoint = endpoint_list + .iter() + .find(|e| e["webSocketDebuggerUrl"] == ws_url.as_str()); + assert!(matching_endpoint.is_some()); + child.kill().unwrap(); +} + +#[tokio::test] +async fn inspector_json_list() { + let script = util::tests_path().join("inspector1.js"); + let mut child = util::deno_cmd() + .arg("run") + .arg(inspect_flag_with_unique_port("--inspect")) + .arg(script) + .stderr(std::process::Stdio::piped()) + .spawn() + .unwrap(); + + let stderr = child.stderr.as_mut().unwrap(); + let mut stderr_lines = + std::io::BufReader::new(stderr).lines().map(|r| r.unwrap()); + let ws_url = extract_ws_url_from_stderr(&mut stderr_lines); + let mut url = ws_url.clone(); + let _ = url.set_scheme("http"); + url.set_path("/json/list"); + let resp = reqwest::get(url).await.unwrap(); + assert_eq!(resp.status(), reqwest::StatusCode::OK); + let endpoint_list: Vec = + serde_json::from_str(&resp.text().await.unwrap()).unwrap(); + let matching_endpoint = endpoint_list + .iter() + .find(|e| e["webSocketDebuggerUrl"] == ws_url.as_str()); + assert!(matching_endpoint.is_some()); + child.kill().unwrap(); +} diff --git a/cli/tests/integration/install_tests.rs b/cli/tests/integration/install_tests.rs new file mode 100644 index 0000000000..e5229df8f8 --- /dev/null +++ b/cli/tests/integration/install_tests.rs @@ -0,0 +1,78 @@ +// Copyright 2018-2021 the Deno authors. All rights reserved. MIT license. + +use std::process::Command; +use tempfile::TempDir; +use test_util as util; + +#[test] +fn installer_test_local_module_run() { + let temp_dir = TempDir::new().expect("tempdir fail"); + let bin_dir = temp_dir.path().join("bin"); + std::fs::create_dir(&bin_dir).unwrap(); + let status = util::deno_cmd() + .current_dir(util::root_path()) + .arg("install") + .arg("--name") + .arg("echo_test") + .arg("--root") + .arg(temp_dir.path()) + .arg(util::tests_path().join("echo.ts")) + .arg("hello") + .spawn() + .unwrap() + .wait() + .unwrap(); + assert!(status.success()); + let mut file_path = bin_dir.join("echo_test"); + if cfg!(windows) { + file_path = file_path.with_extension("cmd"); + } + assert!(file_path.exists()); + // NOTE: using file_path here instead of exec_name, because tests + // shouldn't mess with user's PATH env variable + let output = Command::new(file_path) + .current_dir(temp_dir.path()) + .arg("foo") + .env("PATH", util::target_dir()) + .output() + .expect("failed to spawn script"); + let stdout_str = std::str::from_utf8(&output.stdout).unwrap().trim(); + assert!(stdout_str.ends_with("hello, foo")); +} + +#[test] +fn installer_test_remote_module_run() { + let _g = util::http_server(); + let temp_dir = TempDir::new().expect("tempdir fail"); + let bin_dir = temp_dir.path().join("bin"); + std::fs::create_dir(&bin_dir).unwrap(); + let status = util::deno_cmd() + .current_dir(util::root_path()) + .arg("install") + .arg("--name") + .arg("echo_test") + .arg("--root") + .arg(temp_dir.path()) + .arg("http://localhost:4545/cli/tests/echo.ts") + .arg("hello") + .spawn() + .unwrap() + .wait() + .unwrap(); + assert!(status.success()); + let mut file_path = bin_dir.join("echo_test"); + if cfg!(windows) { + file_path = file_path.with_extension("cmd"); + } + assert!(file_path.exists()); + let output = Command::new(file_path) + .current_dir(temp_dir.path()) + .arg("foo") + .env("PATH", util::target_dir()) + .output() + .expect("failed to spawn script"); + assert!(std::str::from_utf8(&output.stdout) + .unwrap() + .trim() + .ends_with("hello, foo")); +} diff --git a/cli/tests/integration/lint_tests.rs b/cli/tests/integration/lint_tests.rs new file mode 100644 index 0000000000..3eb9657ed0 --- /dev/null +++ b/cli/tests/integration/lint_tests.rs @@ -0,0 +1,82 @@ +// Copyright 2018-2021 the Deno authors. All rights reserved. MIT license. + +use crate::itest; +use test_util as util; + +#[test] +fn ignore_unexplicit_files() { + let output = util::deno_cmd() + .current_dir(util::root_path()) + .env("NO_COLOR", "1") + .arg("lint") + .arg("--unstable") + .arg("--ignore=./") + .stderr(std::process::Stdio::piped()) + .spawn() + .unwrap() + .wait_with_output() + .unwrap(); + assert!(!output.status.success()); + assert_eq!( + String::from_utf8_lossy(&output.stderr), + "error: No target files found.\n" + ); +} + +itest!(all { + args: "lint --unstable lint/file1.js lint/file2.ts lint/ignored_file.ts", + output: "lint/expected.out", + exit_code: 1, +}); + +itest!(quiet { + args: "lint --unstable --quiet lint/file1.js", + output: "lint/expected_quiet.out", + exit_code: 1, +}); + +itest!(json { + args: + "lint --unstable --json lint/file1.js lint/file2.ts lint/ignored_file.ts lint/malformed.js", + output: "lint/expected_json.out", + exit_code: 1, + }); + +itest!(ignore { + args: "lint --unstable --ignore=lint/file1.js,lint/malformed.js lint/", + output: "lint/expected_ignore.out", + exit_code: 1, +}); + +itest!(glob { + args: "lint --unstable --ignore=lint/malformed.js lint/", + output: "lint/expected_glob.out", + exit_code: 1, +}); + +itest!(stdin { + args: "lint --unstable -", + input: Some("let _a: any;"), + output: "lint/expected_from_stdin.out", + exit_code: 1, +}); + +itest!(stdin_json { + args: "lint --unstable --json -", + input: Some("let _a: any;"), + output: "lint/expected_from_stdin_json.out", + exit_code: 1, +}); + +itest!(rules { + args: "lint --unstable --rules", + output: "lint/expected_rules.out", + exit_code: 0, +}); + +// Make sure that the rules are printed if quiet option is enabled. +itest!(rules_quiet { + args: "lint --unstable --rules -q", + output: "lint/expected_rules.out", + exit_code: 0, +}); diff --git a/cli/tests/integration_tests_lsp.rs b/cli/tests/integration/lsp_tests.rs similarity index 100% rename from cli/tests/integration_tests_lsp.rs rename to cli/tests/integration/lsp_tests.rs diff --git a/cli/tests/integration/mod.rs b/cli/tests/integration/mod.rs new file mode 100644 index 0000000000..fab2f20a5e --- /dev/null +++ b/cli/tests/integration/mod.rs @@ -0,0 +1,1092 @@ +// Copyright 2018-2021 the Deno authors. All rights reserved. MIT license. + +use crate::itest; +use deno_core::url; +use deno_runtime::ops::tls::rustls; +use deno_runtime::ops::tls::webpki; +use deno_runtime::ops::tls::TlsStream; +use std::fs; +use std::io::BufReader; +use std::io::Cursor; +use std::io::{Read, Write}; +use std::process::Command; +use std::sync::Arc; +use tempfile::TempDir; +use test_util as util; +use tokio::task::LocalSet; + +#[macro_export] +macro_rules! itest( +($name:ident {$( $key:ident: $value:expr,)*}) => { + #[test] + fn $name() { + (test_util::CheckOutputIntegrationTest { + $( + $key: $value, + )* + .. Default::default() + }).run() + } +} +); + +// These files have `_tests.rs` suffix to make it easier to tell which file is +// the test (ex. `lint_tests.rs`) and which is the implementation (ex. `lint.rs`) +// when both are open, especially for two tabs in VS Code + +#[path = "bundle_tests.rs"] +mod bundle; +#[path = "cache_tests.rs"] +mod cache; +#[path = "compile_tests.rs"] +mod compile; +#[path = "coverage_tests.rs"] +mod coverage; +#[path = "doc_tests.rs"] +mod doc; +#[path = "eval_tests.rs"] +mod eval; +#[path = "fmt_tests.rs"] +mod fmt; +#[path = "info_tests.rs"] +mod info; +#[path = "inspector_tests.rs"] +mod inspector; +#[path = "install_tests.rs"] +mod install; +#[path = "lint_tests.rs"] +mod lint; +#[path = "lsp_tests.rs"] +mod lsp; +#[path = "repl_tests.rs"] +mod repl; +#[path = "run_tests.rs"] +mod run; +#[path = "test_tests.rs"] +mod test; +#[path = "upgrade_tests.rs"] +mod upgrade; +#[path = "watcher_tests.rs"] +mod watcher; +#[path = "worker_tests.rs"] +mod worker; + +#[test] +fn help_flag() { + let status = util::deno_cmd() + .current_dir(util::root_path()) + .arg("--help") + .spawn() + .unwrap() + .wait() + .unwrap(); + assert!(status.success()); +} + +#[test] +fn version_short_flag() { + let status = util::deno_cmd() + .current_dir(util::root_path()) + .arg("-V") + .spawn() + .unwrap() + .wait() + .unwrap(); + assert!(status.success()); +} + +#[test] +fn version_long_flag() { + let status = util::deno_cmd() + .current_dir(util::root_path()) + .arg("--version") + .spawn() + .unwrap() + .wait() + .unwrap(); + assert!(status.success()); +} + +itest!(types { + args: "types", + output: "types.out", +}); + +#[test] +fn cache_test() { + let _g = util::http_server(); + let deno_dir = TempDir::new().expect("tempdir fail"); + let module_url = + url::Url::parse("http://localhost:4545/cli/tests/006_url_imports.ts") + .unwrap(); + let output = Command::new(util::deno_exe_path()) + .env("DENO_DIR", deno_dir.path()) + .current_dir(util::root_path()) + .arg("cache") + .arg("-L") + .arg("debug") + .arg(module_url.to_string()) + .output() + .expect("Failed to spawn script"); + assert!(output.status.success()); + + let out = std::str::from_utf8(&output.stderr).unwrap(); + // Check if file and dependencies are written successfully + assert!(out.contains("host.writeFile(\"deno://subdir/print_hello.js\")")); + assert!(out.contains("host.writeFile(\"deno://subdir/mod2.js\")")); + assert!(out.contains("host.writeFile(\"deno://006_url_imports.js\")")); + + let prg = util::deno_exe_path(); + let output = Command::new(&prg) + .env("DENO_DIR", deno_dir.path()) + .env("HTTP_PROXY", "http://nil") + .env("NO_COLOR", "1") + .current_dir(util::root_path()) + .arg("run") + .arg(module_url.to_string()) + .output() + .expect("Failed to spawn script"); + + let str_output = std::str::from_utf8(&output.stdout).unwrap(); + + let module_output_path = + util::root_path().join("cli/tests/006_url_imports.ts.out"); + let mut module_output = String::new(); + let mut module_output_file = fs::File::open(module_output_path).unwrap(); + module_output_file + .read_to_string(&mut module_output) + .unwrap(); + + assert_eq!(module_output, str_output); +} + +#[test] +fn cache_invalidation_test() { + let deno_dir = TempDir::new().expect("tempdir fail"); + let fixture_path = deno_dir.path().join("fixture.ts"); + { + let mut file = std::fs::File::create(fixture_path.clone()) + .expect("could not create fixture"); + file + .write_all(b"console.log(\"42\");") + .expect("could not write fixture"); + } + let output = Command::new(util::deno_exe_path()) + .env("DENO_DIR", deno_dir.path()) + .current_dir(util::root_path()) + .arg("run") + .arg(fixture_path.to_str().unwrap()) + .output() + .expect("Failed to spawn script"); + assert!(output.status.success()); + let actual = std::str::from_utf8(&output.stdout).unwrap(); + assert_eq!(actual, "42\n"); + { + let mut file = std::fs::File::create(fixture_path.clone()) + .expect("could not create fixture"); + file + .write_all(b"console.log(\"43\");") + .expect("could not write fixture"); + } + let output = Command::new(util::deno_exe_path()) + .env("DENO_DIR", deno_dir.path()) + .current_dir(util::root_path()) + .arg("run") + .arg(fixture_path.to_str().unwrap()) + .output() + .expect("Failed to spawn script"); + assert!(output.status.success()); + let actual = std::str::from_utf8(&output.stdout).unwrap(); + assert_eq!(actual, "43\n"); +} + +#[test] +fn cache_invalidation_test_no_check() { + let deno_dir = TempDir::new().expect("tempdir fail"); + let fixture_path = deno_dir.path().join("fixture.ts"); + { + let mut file = std::fs::File::create(fixture_path.clone()) + .expect("could not create fixture"); + file + .write_all(b"console.log(\"42\");") + .expect("could not write fixture"); + } + let output = Command::new(util::deno_exe_path()) + .env("DENO_DIR", deno_dir.path()) + .current_dir(util::root_path()) + .arg("run") + .arg("--no-check") + .arg(fixture_path.to_str().unwrap()) + .output() + .expect("Failed to spawn script"); + assert!(output.status.success()); + let actual = std::str::from_utf8(&output.stdout).unwrap(); + assert_eq!(actual, "42\n"); + { + let mut file = std::fs::File::create(fixture_path.clone()) + .expect("could not create fixture"); + file + .write_all(b"console.log(\"43\");") + .expect("could not write fixture"); + } + let output = Command::new(util::deno_exe_path()) + .env("DENO_DIR", deno_dir.path()) + .current_dir(util::root_path()) + .arg("run") + .arg("--no-check") + .arg(fixture_path.to_str().unwrap()) + .output() + .expect("Failed to spawn script"); + assert!(output.status.success()); + let actual = std::str::from_utf8(&output.stdout).unwrap(); + assert_eq!(actual, "43\n"); +} + +#[test] +fn ts_dependency_recompilation() { + let t = TempDir::new().expect("tempdir fail"); + let ats = t.path().join("a.ts"); + + std::fs::write( + &ats, + " + import { foo } from \"./b.ts\"; + + function print(str: string): void { + console.log(str); + } + + print(foo);", + ) + .unwrap(); + + let bts = t.path().join("b.ts"); + std::fs::write( + &bts, + " + export const foo = \"foo\";", + ) + .unwrap(); + + let output = util::deno_cmd() + .current_dir(util::root_path()) + .env("NO_COLOR", "1") + .arg("run") + .arg(&ats) + .output() + .expect("failed to spawn script"); + + let stdout_output = std::str::from_utf8(&output.stdout).unwrap().trim(); + let stderr_output = std::str::from_utf8(&output.stderr).unwrap().trim(); + + assert!(stdout_output.ends_with("foo")); + assert!(stderr_output.starts_with("Check")); + + // Overwrite contents of b.ts and run again + std::fs::write( + &bts, + " + export const foo = 5;", + ) + .expect("error writing file"); + + let output = util::deno_cmd() + .current_dir(util::root_path()) + .env("NO_COLOR", "1") + .arg("run") + .arg(&ats) + .output() + .expect("failed to spawn script"); + + let stdout_output = std::str::from_utf8(&output.stdout).unwrap().trim(); + let stderr_output = std::str::from_utf8(&output.stderr).unwrap().trim(); + + // error: TS2345 [ERROR]: Argument of type '5' is not assignable to parameter of type 'string'. + assert!(stderr_output.contains("TS2345")); + assert!(!output.status.success()); + assert!(stdout_output.is_empty()); +} + +#[test] +fn ts_no_recheck_on_redirect() { + let deno_dir = util::new_deno_dir(); + let e = util::deno_exe_path(); + + let redirect_ts = util::root_path().join("cli/tests/017_import_redirect.ts"); + assert!(redirect_ts.is_file()); + let mut cmd = Command::new(e.clone()); + cmd.env("DENO_DIR", deno_dir.path()); + let mut initial = cmd + .current_dir(util::root_path()) + .arg("run") + .arg(redirect_ts.clone()) + .spawn() + .expect("failed to span script"); + let status_initial = + initial.wait().expect("failed to wait for child process"); + assert!(status_initial.success()); + + let mut cmd = Command::new(e); + cmd.env("DENO_DIR", deno_dir.path()); + let output = cmd + .current_dir(util::root_path()) + .arg("run") + .arg(redirect_ts) + .output() + .expect("failed to spawn script"); + + assert!(std::str::from_utf8(&output.stderr).unwrap().is_empty()); +} + +#[test] +fn ts_reload() { + let hello_ts = util::root_path().join("cli/tests/002_hello.ts"); + assert!(hello_ts.is_file()); + + let deno_dir = TempDir::new().expect("tempdir fail"); + let mut initial = util::deno_cmd_with_deno_dir(deno_dir.path()) + .current_dir(util::root_path()) + .arg("cache") + .arg(&hello_ts) + .spawn() + .expect("failed to spawn script"); + let status_initial = + initial.wait().expect("failed to wait for child process"); + assert!(status_initial.success()); + + let output = util::deno_cmd_with_deno_dir(deno_dir.path()) + .current_dir(util::root_path()) + .arg("cache") + .arg("--reload") + .arg("-L") + .arg("debug") + .arg(&hello_ts) + .output() + .expect("failed to spawn script"); + + // check the output of the the bundle program. + let output_path = hello_ts.canonicalize().unwrap(); + assert!(std::str::from_utf8(&output.stderr) + .unwrap() + .trim() + .contains(&format!( + "host.getSourceFile(\"{}\", Latest)", + url::Url::from_file_path(&output_path).unwrap().as_str() + ))); +} + +#[test] +fn timeout_clear() { + // https://github.com/denoland/deno/issues/7599 + + use std::time::Duration; + use std::time::Instant; + + let source_code = r#" +const handle = setTimeout(() => { + console.log("timeout finish"); +}, 10000); +clearTimeout(handle); +console.log("finish"); +"#; + + let mut p = util::deno_cmd() + .current_dir(util::tests_path()) + .arg("run") + .arg("-") + .stdin(std::process::Stdio::piped()) + .spawn() + .unwrap(); + let stdin = p.stdin.as_mut().unwrap(); + stdin.write_all(source_code.as_bytes()).unwrap(); + let start = Instant::now(); + let status = p.wait().unwrap(); + let end = Instant::now(); + assert!(status.success()); + // check that program did not run for 10 seconds + // for timeout to clear + assert!(end - start < Duration::new(10, 0)); +} + +#[test] +fn compiler_api() { + let status = util::deno_cmd() + .current_dir(util::tests_path()) + .arg("test") + .arg("--unstable") + .arg("--reload") + .arg("--allow-read") + .arg("compiler_api_test.ts") + .spawn() + .unwrap() + .wait() + .unwrap(); + assert!(status.success()); +} + +#[test] +fn broken_stdout() { + let (reader, writer) = os_pipe::pipe().unwrap(); + // drop the reader to create a broken pipe + drop(reader); + + let output = util::deno_cmd() + .current_dir(util::root_path()) + .arg("eval") + .arg("console.log(3.14)") + .stdout(writer) + .stderr(std::process::Stdio::piped()) + .spawn() + .unwrap() + .wait_with_output() + .unwrap(); + + assert!(!output.status.success()); + let stderr = std::str::from_utf8(output.stderr.as_ref()).unwrap().trim(); + assert!(stderr.contains("Uncaught BrokenPipe")); + assert!(!stderr.contains("panic")); +} + +// TODO(lucacasonato): reenable these tests once we figure out what is wrong with cafile tests +// itest!(cafile_url_imports { +// args: "run --quiet --reload --cert tls/RootCA.pem cafile_url_imports.ts", +// output: "cafile_url_imports.ts.out", +// http_server: true, +// }); + +// itest!(cafile_ts_fetch { +// args: +// "run --quiet --reload --allow-net --cert tls/RootCA.pem cafile_ts_fetch.ts", +// output: "cafile_ts_fetch.ts.out", +// http_server: true, +// }); + +// itest!(cafile_eval { +// args: "eval --cert tls/RootCA.pem fetch('https://localhost:5545/cli/tests/cafile_ts_fetch.ts.out').then(r=>r.text()).then(t=>console.log(t.trimEnd()))", +// output: "cafile_ts_fetch.ts.out", +// http_server: true, +// }); + +// itest!(cafile_info { +// args: +// "info --quiet --cert tls/RootCA.pem https://localhost:5545/cli/tests/cafile_info.ts", +// output: "cafile_info.ts.out", +// http_server: true, +// }); + +#[test] +#[ignore] +fn cafile_env_fetch() { + use deno_core::url::Url; + let _g = util::http_server(); + let deno_dir = TempDir::new().expect("tempdir fail"); + let module_url = + Url::parse("https://localhost:5545/cli/tests/cafile_url_imports.ts") + .unwrap(); + let cafile = util::root_path().join("cli/tests/tls/RootCA.pem"); + let output = Command::new(util::deno_exe_path()) + .env("DENO_DIR", deno_dir.path()) + .env("DENO_CERT", cafile) + .current_dir(util::root_path()) + .arg("cache") + .arg(module_url.to_string()) + .output() + .expect("Failed to spawn script"); + assert!(output.status.success()); +} + +#[test] +#[ignore] +fn cafile_fetch() { + use deno_core::url::Url; + let _g = util::http_server(); + let deno_dir = TempDir::new().expect("tempdir fail"); + let module_url = + Url::parse("http://localhost:4545/cli/tests/cafile_url_imports.ts") + .unwrap(); + let cafile = util::root_path().join("cli/tests/tls/RootCA.pem"); + let output = Command::new(util::deno_exe_path()) + .env("DENO_DIR", deno_dir.path()) + .current_dir(util::root_path()) + .arg("cache") + .arg("--cert") + .arg(cafile) + .arg(module_url.to_string()) + .output() + .expect("Failed to spawn script"); + assert!(output.status.success()); + let out = std::str::from_utf8(&output.stdout).unwrap(); + assert_eq!(out, ""); +} + +#[test] +#[ignore] +fn cafile_install_remote_module() { + let _g = util::http_server(); + let temp_dir = TempDir::new().expect("tempdir fail"); + let bin_dir = temp_dir.path().join("bin"); + std::fs::create_dir(&bin_dir).unwrap(); + let deno_dir = TempDir::new().expect("tempdir fail"); + let cafile = util::root_path().join("cli/tests/tls/RootCA.pem"); + + let install_output = Command::new(util::deno_exe_path()) + .env("DENO_DIR", deno_dir.path()) + .current_dir(util::root_path()) + .arg("install") + .arg("--cert") + .arg(cafile) + .arg("--root") + .arg(temp_dir.path()) + .arg("-n") + .arg("echo_test") + .arg("https://localhost:5545/cli/tests/echo.ts") + .output() + .expect("Failed to spawn script"); + println!("{}", std::str::from_utf8(&install_output.stdout).unwrap()); + eprintln!("{}", std::str::from_utf8(&install_output.stderr).unwrap()); + assert!(install_output.status.success()); + + let mut echo_test_path = bin_dir.join("echo_test"); + if cfg!(windows) { + echo_test_path = echo_test_path.with_extension("cmd"); + } + assert!(echo_test_path.exists()); + + let output = Command::new(echo_test_path) + .current_dir(temp_dir.path()) + .arg("foo") + .env("PATH", util::target_dir()) + .output() + .expect("failed to spawn script"); + let stdout = std::str::from_utf8(&output.stdout).unwrap().trim(); + assert!(stdout.ends_with("foo")); +} + +#[test] +#[ignore] +fn cafile_bundle_remote_exports() { + let _g = util::http_server(); + + // First we have to generate a bundle of some remote module that has exports. + let mod1 = "https://localhost:5545/cli/tests/subdir/mod1.ts"; + let cafile = util::root_path().join("cli/tests/tls/RootCA.pem"); + let t = TempDir::new().expect("tempdir fail"); + let bundle = t.path().join("mod1.bundle.js"); + let mut deno = util::deno_cmd() + .current_dir(util::root_path()) + .arg("bundle") + .arg("--cert") + .arg(cafile) + .arg(mod1) + .arg(&bundle) + .spawn() + .expect("failed to spawn script"); + let status = deno.wait().expect("failed to wait for the child process"); + assert!(status.success()); + assert!(bundle.is_file()); + + // Now we try to use that bundle from another module. + let test = t.path().join("test.js"); + std::fs::write( + &test, + " + import { printHello3 } from \"./mod1.bundle.js\"; + printHello3(); ", + ) + .expect("error writing file"); + + let output = util::deno_cmd() + .current_dir(util::root_path()) + .arg("run") + .arg(&test) + .output() + .expect("failed to spawn script"); + // check the output of the test.ts program. + assert!(std::str::from_utf8(&output.stdout) + .unwrap() + .trim() + .ends_with("Hello")); + assert_eq!(output.stderr, b""); +} + +#[test] +fn websocket() { + let _g = util::http_server(); + + let script = util::tests_path().join("websocket_test.ts"); + let root_ca = util::tests_path().join("tls/RootCA.pem"); + let status = util::deno_cmd() + .arg("test") + .arg("--unstable") + .arg("--allow-net") + .arg("--cert") + .arg(root_ca) + .arg(script) + .spawn() + .unwrap() + .wait() + .unwrap(); + + assert!(status.success()); +} + +#[cfg(not(windows))] +#[test] +fn set_raw_should_not_panic_on_no_tty() { + let output = util::deno_cmd() + .arg("eval") + .arg("--unstable") + .arg("Deno.setRaw(Deno.stdin.rid, true)") + // stdin set to piped so it certainly does not refer to TTY + .stdin(std::process::Stdio::piped()) + // stderr is piped so we can capture output. + .stderr(std::process::Stdio::piped()) + .spawn() + .unwrap() + .wait_with_output() + .unwrap(); + assert!(!output.status.success()); + let stderr = std::str::from_utf8(&output.stderr).unwrap().trim(); + assert!(stderr.contains("BadResource")); +} + +#[tokio::test(flavor = "multi_thread", worker_threads = 2)] +async fn test_resolve_dns() { + use std::collections::BTreeMap; + use std::net::Ipv4Addr; + use std::net::Ipv6Addr; + use std::net::SocketAddr; + use std::str::FromStr; + use std::sync::Arc; + use std::sync::RwLock; + use std::time::Duration; + use tokio::net::TcpListener; + use tokio::net::UdpSocket; + use tokio::sync::oneshot; + use trust_dns_client::rr::LowerName; + use trust_dns_client::rr::RecordType; + use trust_dns_client::rr::RrKey; + use trust_dns_server::authority::Catalog; + use trust_dns_server::authority::ZoneType; + use trust_dns_server::proto::rr::rdata::mx::MX; + use trust_dns_server::proto::rr::rdata::soa::SOA; + use trust_dns_server::proto::rr::rdata::srv::SRV; + use trust_dns_server::proto::rr::rdata::txt::TXT; + use trust_dns_server::proto::rr::record_data::RData; + use trust_dns_server::proto::rr::resource::Record; + use trust_dns_server::proto::rr::Name; + use trust_dns_server::proto::rr::RecordSet; + use trust_dns_server::store::in_memory::InMemoryAuthority; + use trust_dns_server::ServerFuture; + + const DNS_PORT: u16 = 4553; + + // Setup DNS server for testing + async fn run_dns_server(tx: oneshot::Sender<()>) { + let catalog = { + let records = { + let mut map = BTreeMap::new(); + let lookup_name = "www.example.com".parse::().unwrap(); + let lookup_name_lower = LowerName::new(&lookup_name); + + // Inserts SOA record + let soa = SOA::new( + Name::from_str("net").unwrap(), + Name::from_str("example").unwrap(), + 0, + i32::MAX, + i32::MAX, + i32::MAX, + 0, + ); + let rdata = RData::SOA(soa); + let record = Record::from_rdata(Name::new(), u32::MAX, rdata); + let record_set = RecordSet::from(record); + map + .insert(RrKey::new(Name::root().into(), RecordType::SOA), record_set); + + // Inserts A record + let rdata = RData::A(Ipv4Addr::new(1, 2, 3, 4)); + let record = Record::from_rdata(lookup_name.clone(), u32::MAX, rdata); + let record_set = RecordSet::from(record); + map.insert( + RrKey::new(lookup_name_lower.clone(), RecordType::A), + record_set, + ); + + // Inserts AAAA record + let rdata = RData::AAAA(Ipv6Addr::new(1, 2, 3, 4, 5, 6, 7, 8)); + let record = Record::from_rdata(lookup_name.clone(), u32::MAX, rdata); + let record_set = RecordSet::from(record); + map.insert( + RrKey::new(lookup_name_lower.clone(), RecordType::AAAA), + record_set, + ); + + // Inserts ANAME record + let rdata = RData::ANAME(Name::from_str("aname.com").unwrap()); + let record = Record::from_rdata(lookup_name.clone(), u32::MAX, rdata); + let record_set = RecordSet::from(record); + map.insert( + RrKey::new(lookup_name_lower.clone(), RecordType::ANAME), + record_set, + ); + + // Inserts CNAME record + let rdata = RData::CNAME(Name::from_str("cname.com").unwrap()); + let record = + Record::from_rdata(Name::from_str("foo").unwrap(), u32::MAX, rdata); + let record_set = RecordSet::from(record); + map.insert( + RrKey::new(lookup_name_lower.clone(), RecordType::CNAME), + record_set, + ); + + // Inserts MX record + let rdata = RData::MX(MX::new(0, Name::from_str("mx.com").unwrap())); + let record = Record::from_rdata(lookup_name.clone(), u32::MAX, rdata); + let record_set = RecordSet::from(record); + map.insert( + RrKey::new(lookup_name_lower.clone(), RecordType::MX), + record_set, + ); + + // Inserts PTR record + let rdata = RData::PTR(Name::from_str("ptr.com").unwrap()); + let record = Record::from_rdata( + Name::from_str("5.6.7.8").unwrap(), + u32::MAX, + rdata, + ); + let record_set = RecordSet::from(record); + map.insert( + RrKey::new("5.6.7.8".parse().unwrap(), RecordType::PTR), + record_set, + ); + + // Inserts SRV record + let rdata = RData::SRV(SRV::new( + 0, + 100, + 1234, + Name::from_str("srv.com").unwrap(), + )); + let record = Record::from_rdata( + Name::from_str("_Service._TCP.example.com").unwrap(), + u32::MAX, + rdata, + ); + let record_set = RecordSet::from(record); + map.insert( + RrKey::new(lookup_name_lower.clone(), RecordType::SRV), + record_set, + ); + + // Inserts TXT record + let rdata = + RData::TXT(TXT::new(vec!["foo".to_string(), "bar".to_string()])); + let record = Record::from_rdata(lookup_name, u32::MAX, rdata); + let record_set = RecordSet::from(record); + map.insert(RrKey::new(lookup_name_lower, RecordType::TXT), record_set); + + map + }; + + let authority = Box::new(Arc::new(RwLock::new( + InMemoryAuthority::new( + Name::from_str("com").unwrap(), + records, + ZoneType::Primary, + false, + ) + .unwrap(), + ))); + let mut c = Catalog::new(); + c.upsert(Name::root().into(), authority); + c + }; + + let mut server_fut = ServerFuture::new(catalog); + let socket_addr = SocketAddr::from(([127, 0, 0, 1], DNS_PORT)); + let tcp_listener = TcpListener::bind(socket_addr).await.unwrap(); + let udp_socket = UdpSocket::bind(socket_addr).await.unwrap(); + server_fut.register_socket(udp_socket); + server_fut.register_listener(tcp_listener, Duration::from_secs(2)); + + // Notifies that the DNS server is ready + tx.send(()).unwrap(); + + server_fut.block_until_done().await.unwrap(); + } + + let (ready_tx, ready_rx) = oneshot::channel(); + let dns_server_fut = run_dns_server(ready_tx); + let handle = tokio::spawn(dns_server_fut); + + // Waits for the DNS server to be ready + ready_rx.await.unwrap(); + + // Pass: `--allow-net` + { + let output = util::deno_cmd() + .current_dir(util::tests_path()) + .env("NO_COLOR", "1") + .arg("run") + .arg("--allow-net") + .arg("--unstable") + .arg("resolve_dns.ts") + .stdout(std::process::Stdio::piped()) + .stderr(std::process::Stdio::piped()) + .spawn() + .unwrap() + .wait_with_output() + .unwrap(); + let err = String::from_utf8_lossy(&output.stderr); + let out = String::from_utf8_lossy(&output.stdout); + assert!(output.status.success()); + assert!(err.starts_with("Check file")); + + let expected = + std::fs::read_to_string(util::tests_path().join("resolve_dns.ts.out")) + .unwrap(); + assert_eq!(expected, out); + } + + // Pass: `--allow-net=127.0.0.1:4553` + { + let output = util::deno_cmd() + .current_dir(util::tests_path()) + .env("NO_COLOR", "1") + .arg("run") + .arg("--allow-net=127.0.0.1:4553") + .arg("--unstable") + .arg("resolve_dns.ts") + .stdout(std::process::Stdio::piped()) + .stderr(std::process::Stdio::piped()) + .spawn() + .unwrap() + .wait_with_output() + .unwrap(); + let err = String::from_utf8_lossy(&output.stderr); + let out = String::from_utf8_lossy(&output.stdout); + assert!(output.status.success()); + assert!(err.starts_with("Check file")); + + let expected = + std::fs::read_to_string(util::tests_path().join("resolve_dns.ts.out")) + .unwrap(); + assert_eq!(expected, out); + } + + // Permission error: `--allow-net=deno.land` + { + let output = util::deno_cmd() + .current_dir(util::tests_path()) + .env("NO_COLOR", "1") + .arg("run") + .arg("--allow-net=deno.land") + .arg("--unstable") + .arg("resolve_dns.ts") + .stdout(std::process::Stdio::piped()) + .stderr(std::process::Stdio::piped()) + .spawn() + .unwrap() + .wait_with_output() + .unwrap(); + let err = String::from_utf8_lossy(&output.stderr); + let out = String::from_utf8_lossy(&output.stdout); + assert!(!output.status.success()); + assert!(err.starts_with("Check file")); + assert!(err.contains(r#"error: Uncaught (in promise) PermissionDenied: Requires net access to "127.0.0.1:4553""#)); + assert!(out.is_empty()); + } + + // Permission error: no permission specified + { + let output = util::deno_cmd() + .current_dir(util::tests_path()) + .env("NO_COLOR", "1") + .arg("run") + .arg("--unstable") + .arg("resolve_dns.ts") + .stdout(std::process::Stdio::piped()) + .stderr(std::process::Stdio::piped()) + .spawn() + .unwrap() + .wait_with_output() + .unwrap(); + let err = String::from_utf8_lossy(&output.stderr); + let out = String::from_utf8_lossy(&output.stdout); + assert!(!output.status.success()); + assert!(err.starts_with("Check file")); + assert!(err.contains(r#"error: Uncaught (in promise) PermissionDenied: Requires net access to "127.0.0.1:4553""#)); + assert!(out.is_empty()); + } + + handle.abort(); +} + +#[test] +fn typecheck_declarations_ns() { + let status = util::deno_cmd() + .arg("test") + .arg("--doc") + .arg(util::root_path().join("cli/dts/lib.deno.ns.d.ts")) + .spawn() + .unwrap() + .wait() + .unwrap(); + assert!(status.success()); +} + +#[test] +fn typecheck_declarations_unstable() { + let status = util::deno_cmd() + .arg("test") + .arg("--doc") + .arg("--unstable") + .arg(util::root_path().join("cli/dts/lib.deno.unstable.d.ts")) + .spawn() + .unwrap() + .wait() + .unwrap(); + assert!(status.success()); +} + +#[test] +fn js_unit_tests_lint() { + let status = util::deno_cmd() + .arg("lint") + .arg("--unstable") + .arg(util::root_path().join("cli/tests/unit")) + .spawn() + .unwrap() + .wait() + .unwrap(); + assert!(status.success()); +} + +#[test] +fn js_unit_tests() { + let _g = util::http_server(); + + // Note that the unit tests are not safe for concurrency and must be run with a concurrency limit + // of one because there are some chdir tests in there. + // TODO(caspervonb) split these tests into two groups: parallel and serial. + let mut deno = util::deno_cmd() + .current_dir(util::root_path()) + .arg("test") + .arg("--unstable") + .arg("--location=http://js-unit-tests/foo/bar") + .arg("-A") + .arg("cli/tests/unit") + .spawn() + .expect("failed to spawn script"); + + let status = deno.wait().expect("failed to wait for the child process"); + assert_eq!(Some(0), status.code()); + assert!(status.success()); +} + +#[tokio::test] +async fn listen_tls_alpn() { + // TLS streams require the presence of an ambient local task set to gracefully + // close dropped connections in the background. + LocalSet::new() + .run_until(async { + let mut child = util::deno_cmd() + .current_dir(util::root_path()) + .arg("run") + .arg("--unstable") + .arg("--quiet") + .arg("--allow-net") + .arg("--allow-read") + .arg("./cli/tests/listen_tls_alpn.ts") + .arg("4504") + .stdout(std::process::Stdio::piped()) + .spawn() + .unwrap(); + let stdout = child.stdout.as_mut().unwrap(); + let mut buffer = [0; 5]; + let read = stdout.read(&mut buffer).unwrap(); + assert_eq!(read, 5); + let msg = std::str::from_utf8(&buffer).unwrap(); + assert_eq!(msg, "READY"); + + let mut cfg = rustls::ClientConfig::new(); + let reader = + &mut BufReader::new(Cursor::new(include_bytes!("../tls/RootCA.crt"))); + cfg.root_store.add_pem_file(reader).unwrap(); + cfg.alpn_protocols.push("foobar".as_bytes().to_vec()); + let cfg = Arc::new(cfg); + + let hostname = + webpki::DNSNameRef::try_from_ascii_str("localhost").unwrap(); + + let tcp_stream = tokio::net::TcpStream::connect("localhost:4504") + .await + .unwrap(); + let mut tls_stream = + TlsStream::new_client_side(tcp_stream, &cfg, hostname); + tls_stream.handshake().await.unwrap(); + let (_, session) = tls_stream.get_ref(); + + let alpn = session.get_alpn_protocol().unwrap(); + assert_eq!(std::str::from_utf8(alpn).unwrap(), "foobar"); + + child.kill().unwrap(); + child.wait().unwrap(); + }) + .await; +} + +#[tokio::test] +async fn listen_tls_alpn_fail() { + // TLS streams require the presence of an ambient local task set to gracefully + // close dropped connections in the background. + LocalSet::new() + .run_until(async { + let mut child = util::deno_cmd() + .current_dir(util::root_path()) + .arg("run") + .arg("--unstable") + .arg("--quiet") + .arg("--allow-net") + .arg("--allow-read") + .arg("./cli/tests/listen_tls_alpn.ts") + .arg("4505") + .stdout(std::process::Stdio::piped()) + .spawn() + .unwrap(); + let stdout = child.stdout.as_mut().unwrap(); + let mut buffer = [0; 5]; + let read = stdout.read(&mut buffer).unwrap(); + assert_eq!(read, 5); + let msg = std::str::from_utf8(&buffer).unwrap(); + assert_eq!(msg, "READY"); + + let mut cfg = rustls::ClientConfig::new(); + let reader = + &mut BufReader::new(Cursor::new(include_bytes!("../tls/RootCA.crt"))); + cfg.root_store.add_pem_file(reader).unwrap(); + cfg.alpn_protocols.push("boofar".as_bytes().to_vec()); + let cfg = Arc::new(cfg); + + let hostname = + webpki::DNSNameRef::try_from_ascii_str("localhost").unwrap(); + + let tcp_stream = tokio::net::TcpStream::connect("localhost:4505") + .await + .unwrap(); + let mut tls_stream = + TlsStream::new_client_side(tcp_stream, &cfg, hostname); + tls_stream.handshake().await.unwrap(); + let (_, session) = tls_stream.get_ref(); + + assert!(session.get_alpn_protocol().is_none()); + + child.kill().unwrap(); + child.wait().unwrap(); + }) + .await; +} diff --git a/cli/tests/tools/repl_tests.rs b/cli/tests/integration/repl_tests.rs similarity index 100% rename from cli/tests/tools/repl_tests.rs rename to cli/tests/integration/repl_tests.rs diff --git a/cli/tests/integration/run_tests.rs b/cli/tests/integration/run_tests.rs new file mode 100644 index 0000000000..964d2dd7c3 --- /dev/null +++ b/cli/tests/integration/run_tests.rs @@ -0,0 +1,1751 @@ +// Copyright 2018-2021 the Deno authors. All rights reserved. MIT license. + +use deno_core::url; +use std::process::Command; +use tempfile::TempDir; +use test_util as util; + +itest!(stdout_write_all { + args: "run --quiet stdout_write_all.ts", + output: "stdout_write_all.out", +}); + +itest!(_001_hello { + args: "run --reload 001_hello.js", + output: "001_hello.js.out", +}); + +itest!(_002_hello { + args: "run --quiet --reload 002_hello.ts", + output: "002_hello.ts.out", +}); + +itest!(_003_relative_import { + args: "run --quiet --reload 003_relative_import.ts", + output: "003_relative_import.ts.out", +}); + +itest!(_004_set_timeout { + args: "run --quiet --reload 004_set_timeout.ts", + output: "004_set_timeout.ts.out", +}); + +itest!(_005_more_imports { + args: "run --quiet --reload 005_more_imports.ts", + output: "005_more_imports.ts.out", +}); + +itest!(_006_url_imports { + args: "run --quiet --reload 006_url_imports.ts", + output: "006_url_imports.ts.out", + http_server: true, +}); + +itest!(_012_async { + args: "run --quiet --reload 012_async.ts", + output: "012_async.ts.out", +}); + +itest!(_013_dynamic_import { + args: "run --quiet --reload --allow-read 013_dynamic_import.ts", + output: "013_dynamic_import.ts.out", +}); + +itest!(_014_duplicate_import { + args: "run --quiet --reload --allow-read 014_duplicate_import.ts ", + output: "014_duplicate_import.ts.out", +}); + +itest!(_015_duplicate_parallel_import { + args: "run --quiet --reload --allow-read 015_duplicate_parallel_import.js", + output: "015_duplicate_parallel_import.js.out", +}); + +itest!(_016_double_await { + args: "run --quiet --allow-read --reload 016_double_await.ts", + output: "016_double_await.ts.out", +}); + +itest!(_017_import_redirect { + args: "run --quiet --reload 017_import_redirect.ts", + output: "017_import_redirect.ts.out", +}); + +itest!(_017_import_redirect_nocheck { + args: "run --quiet --reload --no-check 017_import_redirect.ts", + output: "017_import_redirect.ts.out", +}); + +itest!(_017_import_redirect_info { + args: "info --quiet --reload 017_import_redirect.ts", + output: "017_import_redirect_info.out", +}); + +itest!(_018_async_catch { + args: "run --quiet --reload 018_async_catch.ts", + output: "018_async_catch.ts.out", +}); + +itest!(_019_media_types { + args: "run --reload 019_media_types.ts", + output: "019_media_types.ts.out", + http_server: true, +}); + +itest!(_020_json_modules { + args: "run --reload 020_json_modules.ts", + output: "020_json_modules.ts.out", + exit_code: 1, +}); + +itest!(_021_mjs_modules { + args: "run --quiet --reload 021_mjs_modules.ts", + output: "021_mjs_modules.ts.out", +}); + +itest!(_023_no_ext { + args: "run --reload 023_no_ext", + output: "023_no_ext.out", +}); + +// TODO(lucacasonato): remove --unstable when permissions goes stable +itest!(_025_hrtime { + args: "run --quiet --allow-hrtime --unstable --reload 025_hrtime.ts", + output: "025_hrtime.ts.out", +}); + +itest!(_025_reload_js_type_error { + args: "run --quiet --reload 025_reload_js_type_error.js", + output: "025_reload_js_type_error.js.out", +}); + +itest!(_026_redirect_javascript { + args: "run --quiet --reload 026_redirect_javascript.js", + output: "026_redirect_javascript.js.out", + http_server: true, +}); + +itest!(_027_redirect_typescript { + args: "run --quiet --reload 027_redirect_typescript.ts", + output: "027_redirect_typescript.ts.out", + http_server: true, +}); + +itest!(_028_args { + args: "run --quiet --reload 028_args.ts --arg1 val1 --arg2=val2 -- arg3 arg4", + output: "028_args.ts.out", +}); + +itest!(_033_import_map { + args: + "run --quiet --reload --import-map=import_maps/import_map.json import_maps/test.ts", + output: "033_import_map.out", +}); + +itest!(_033_import_map_remote { + args: + "run --quiet --reload --import-map=http://127.0.0.1:4545/cli/tests/import_maps/import_map_remote.json --unstable import_maps/test_remote.ts", + output: "033_import_map_remote.out", + http_server: true, +}); + +itest!(_034_onload { + args: "run --quiet --reload 034_onload/main.ts", + output: "034_onload.out", +}); + +itest!(_035_cached_only_flag { + args: + "run --reload --cached-only http://127.0.0.1:4545/cli/tests/019_media_types.ts", + output: "035_cached_only_flag.out", + exit_code: 1, + http_server: true, +}); + +itest!(_038_checkjs { + // checking if JS file is run through TS compiler + args: "run --reload --config 038_checkjs.tsconfig.json 038_checkjs.js", + exit_code: 1, + output: "038_checkjs.js.out", +}); + +itest!(_042_dyn_import_evalcontext { + args: "run --quiet --allow-read --reload 042_dyn_import_evalcontext.ts", + output: "042_dyn_import_evalcontext.ts.out", +}); + +itest!(_044_bad_resource { + args: "run --quiet --reload --allow-read 044_bad_resource.ts", + output: "044_bad_resource.ts.out", + exit_code: 1, +}); + +itest!(_045_proxy { + args: "run -L debug --allow-net --allow-env --allow-run --allow-read --reload --quiet 045_proxy_test.ts", + output: "045_proxy_test.ts.out", + http_server: true, +}); + +itest!(_046_tsx { + args: "run --quiet --reload 046_jsx_test.tsx", + output: "046_jsx_test.tsx.out", +}); + +itest!(_047_jsx { + args: "run --quiet --reload 047_jsx_test.jsx", + output: "047_jsx_test.jsx.out", +}); + +itest!(_048_media_types_jsx { + args: "run --reload 048_media_types_jsx.ts", + output: "048_media_types_jsx.ts.out", + http_server: true, +}); + +itest!(_052_no_remote_flag { + args: + "run --reload --no-remote http://127.0.0.1:4545/cli/tests/019_media_types.ts", + output: "052_no_remote_flag.out", + exit_code: 1, + http_server: true, +}); + +itest!(_056_make_temp_file_write_perm { + args: + "run --quiet --allow-read --allow-write=./subdir/ 056_make_temp_file_write_perm.ts", + output: "056_make_temp_file_write_perm.out", +}); + +itest!(_058_tasks_microtasks_close { + args: "run --quiet 058_tasks_microtasks_close.ts", + output: "058_tasks_microtasks_close.ts.out", +}); + +itest!(_059_fs_relative_path_perm { + args: "run 059_fs_relative_path_perm.ts", + output: "059_fs_relative_path_perm.ts.out", + exit_code: 1, +}); + +itest!(_070_location { + args: "run --location https://foo/bar?baz#bat 070_location.ts", + output: "070_location.ts.out", +}); + +itest!(_071_location_unset { + args: "run 071_location_unset.ts", + output: "071_location_unset.ts.out", + exit_code: 1, +}); + +itest!(_072_location_relative_fetch { + args: "run --location http://127.0.0.1:4545/cli/tests/ --allow-net 072_location_relative_fetch.ts", + output: "072_location_relative_fetch.ts.out", + http_server: true, + }); + +itest!(_075_import_local_query_hash { + args: "run 075_import_local_query_hash.ts", + output: "075_import_local_query_hash.ts.out", +}); + +itest!(_077_fetch_empty { + args: "run -A 077_fetch_empty.ts", + output: "077_fetch_empty.ts.out", + exit_code: 1, +}); + +itest!(_078_unload_on_exit { + args: "run 078_unload_on_exit.ts", + output: "078_unload_on_exit.ts.out", + exit_code: 1, +}); + +itest!(_079_location_authentication { + args: "run --location https://foo:bar@baz/qux 079_location_authentication.ts", + output: "079_location_authentication.ts.out", +}); + +itest!(_080_deno_emit_permissions { + args: "run --unstable 080_deno_emit_permissions.ts", + output: "080_deno_emit_permissions.ts.out", + exit_code: 1, +}); + +itest!(_081_location_relative_fetch_redirect { + args: "run --location http://127.0.0.1:4546/ --allow-net 081_location_relative_fetch_redirect.ts", + output: "081_location_relative_fetch_redirect.ts.out", + http_server: true, + }); + +itest!(_082_prepare_stack_trace_throw { + args: "run 082_prepare_stack_trace_throw.js", + output: "082_prepare_stack_trace_throw.js.out", + exit_code: 1, +}); + +#[test] +fn _083_legacy_external_source_map() { + let _g = util::http_server(); + let deno_dir = TempDir::new().expect("tempdir fail"); + let module_url = url::Url::parse( + "http://localhost:4545/cli/tests/083_legacy_external_source_map.ts", + ) + .unwrap(); + // Write a faulty old external source map. + let faulty_map_path = deno_dir.path().join("gen/http/localhost_PORT4545/9576bd5febd0587c5c4d88d57cb3ac8ebf2600c529142abe3baa9a751d20c334.js.map"); + std::fs::create_dir_all(faulty_map_path.parent().unwrap()) + .expect("Failed to create faulty source map dir."); + std::fs::write(faulty_map_path, "{\"version\":3,\"file\":\"\",\"sourceRoot\":\"\",\"sources\":[\"http://localhost:4545/cli/tests/083_legacy_external_source_map.ts\"],\"names\":[],\"mappings\":\";AAAA,MAAM,IAAI,KAAK,CAAC,KAAK,CAAC,CAAC\"}").expect("Failed to write faulty source map."); + let output = Command::new(util::deno_exe_path()) + .env("DENO_DIR", deno_dir.path()) + .current_dir(util::root_path()) + .arg("run") + .arg(module_url.to_string()) + .output() + .expect("Failed to spawn script"); + // Before https://github.com/denoland/deno/issues/6965 was fixed, the faulty + // old external source map would cause a panic while formatting the error + // and the exit code would be 101. The external source map should be ignored + // in favor of the inline one. + assert_eq!(output.status.code(), Some(1)); + let out = std::str::from_utf8(&output.stdout).unwrap(); + assert_eq!(out, ""); +} + +itest!(_085_dynamic_import_async_error { + args: "run --allow-read 085_dynamic_import_async_error.ts", + output: "085_dynamic_import_async_error.ts.out", +}); + +itest!(_086_dynamic_import_already_rejected { + args: "run --allow-read 086_dynamic_import_already_rejected.ts", + output: "086_dynamic_import_already_rejected.ts.out", +}); + +itest!(_087_no_check_imports_not_used_as_values { + args: "run --config preserve_imports.tsconfig.json --no-check 087_no_check_imports_not_used_as_values.ts", + output: "087_no_check_imports_not_used_as_values.ts.out", + }); + +itest!(_088_dynamic_import_already_evaluating { + args: "run --allow-read 088_dynamic_import_already_evaluating.ts", + output: "088_dynamic_import_already_evaluating.ts.out", +}); + +itest!(_089_run_allow_list { + args: "run --allow-run=curl 089_run_allow_list.ts", + output: "089_run_allow_list.ts.out", +}); + +#[cfg(unix)] +#[test] +fn _090_run_permissions_request() { + let args = "run 090_run_permissions_request.ts"; + let output = "090_run_permissions_request.ts.out"; + let input = b"y\nn\n"; + + util::test_pty(args, output, input); +} + +itest!(_091_use_define_for_class_fields { + args: "run 091_use_define_for_class_fields.ts", + output: "091_use_define_for_class_fields.ts.out", + exit_code: 1, +}); + +itest!(_092_import_map_unmapped_bare_specifier { + args: "run --import-map import_maps/import_map.json 092_import_map_unmapped_bare_specifier.ts", + output: "092_import_map_unmapped_bare_specifier.ts.out", + exit_code: 1, +}); + +itest!(js_import_detect { + args: "run --quiet --reload js_import_detect.ts", + output: "js_import_detect.ts.out", + exit_code: 0, +}); + +itest!(lock_write_requires_lock { + args: "run --lock-write some_file.ts", + output: "lock_write_requires_lock.out", + exit_code: 1, +}); + +itest!(lock_write_fetch { + args: + "run --quiet --allow-read --allow-write --allow-env --allow-run lock_write_fetch.ts", + output: "lock_write_fetch.ts.out", + http_server: true, + exit_code: 0, +}); + +itest!(lock_check_ok { + args: "run --lock=lock_check_ok.json http://127.0.0.1:4545/cli/tests/003_relative_import.ts", + output: "003_relative_import.ts.out", + http_server: true, + }); + +itest!(lock_check_ok2 { + args: "run --lock=lock_check_ok2.json 019_media_types.ts", + output: "019_media_types.ts.out", + http_server: true, +}); + +itest!(lock_dynamic_imports { + args: "run --lock=lock_dynamic_imports.json --allow-read --allow-net http://127.0.0.1:4545/cli/tests/013_dynamic_import.ts", + output: "lock_dynamic_imports.out", + exit_code: 10, + http_server: true, +}); + +itest!(lock_check_err { + args: "run --lock=lock_check_err.json http://127.0.0.1:4545/cli/tests/003_relative_import.ts", + output: "lock_check_err.out", + exit_code: 10, + http_server: true, +}); + +itest!(lock_check_err2 { + args: "run --lock=lock_check_err2.json 019_media_types.ts", + output: "lock_check_err2.out", + exit_code: 10, + http_server: true, +}); + +itest!(async_error { + exit_code: 1, + args: "run --reload async_error.ts", + output: "async_error.ts.out", +}); + +itest!(config { + args: "run --reload --config config.tsconfig.json config.ts", + exit_code: 1, + output: "config.ts.out", +}); + +itest!(config_types { + args: + "run --reload --quiet --config config_types.tsconfig.json config_types.ts", + output: "config_types.ts.out", +}); + +itest!(config_types_remote { + http_server: true, + args: "run --reload --quiet --config config_types_remote.tsconfig.json config_types.ts", + output: "config_types.ts.out", + }); + +itest!(empty_typescript { + args: "run --reload subdir/empty.ts", + output_str: Some("Check file:[WILDCARD]tests/subdir/empty.ts\n"), +}); + +itest!(error_001 { + args: "run --reload error_001.ts", + exit_code: 1, + output: "error_001.ts.out", +}); + +itest!(error_002 { + args: "run --reload error_002.ts", + exit_code: 1, + output: "error_002.ts.out", +}); + +itest!(error_003_typescript { + args: "run --reload error_003_typescript.ts", + exit_code: 1, + output: "error_003_typescript.ts.out", +}); + +// Supposing that we've already attempted to run error_003_typescript.ts +// we want to make sure that JS wasn't emitted. Running again without reload flag +// should result in the same output. +// https://github.com/denoland/deno/issues/2436 +itest!(error_003_typescript2 { + args: "run error_003_typescript.ts", + exit_code: 1, + output: "error_003_typescript.ts.out", +}); + +itest!(error_004_missing_module { + args: "run --reload error_004_missing_module.ts", + exit_code: 1, + output: "error_004_missing_module.ts.out", +}); + +itest!(error_005_missing_dynamic_import { + args: "run --reload --allow-read --quiet error_005_missing_dynamic_import.ts", + exit_code: 1, + output: "error_005_missing_dynamic_import.ts.out", +}); + +itest!(error_006_import_ext_failure { + args: "run --reload error_006_import_ext_failure.ts", + exit_code: 1, + output: "error_006_import_ext_failure.ts.out", +}); + +itest!(error_007_any { + args: "run --reload error_007_any.ts", + exit_code: 1, + output: "error_007_any.ts.out", +}); + +itest!(error_008_checkjs { + args: "run --reload error_008_checkjs.js", + exit_code: 1, + output: "error_008_checkjs.js.out", +}); + +itest!(error_009_extensions_error { + args: "run error_009_extensions_error.js", + output: "error_009_extensions_error.js.out", + exit_code: 1, +}); + +itest!(error_011_bad_module_specifier { + args: "run --reload error_011_bad_module_specifier.ts", + exit_code: 1, + output: "error_011_bad_module_specifier.ts.out", +}); + +itest!(error_012_bad_dynamic_import_specifier { + args: "run --reload error_012_bad_dynamic_import_specifier.ts", + exit_code: 1, + output: "error_012_bad_dynamic_import_specifier.ts.out", +}); + +itest!(error_013_missing_script { + args: "run --reload missing_file_name", + exit_code: 1, + output: "error_013_missing_script.out", +}); + +itest!(error_014_catch_dynamic_import_error { + args: "run --reload --allow-read error_014_catch_dynamic_import_error.js", + output: "error_014_catch_dynamic_import_error.js.out", +}); + +itest!(error_015_dynamic_import_permissions { + args: "run --reload --quiet error_015_dynamic_import_permissions.js", + output: "error_015_dynamic_import_permissions.out", + exit_code: 1, + http_server: true, +}); + +// We have an allow-net flag but not allow-read, it should still result in error. +itest!(error_016_dynamic_import_permissions2 { + args: "run --reload --allow-net error_016_dynamic_import_permissions2.js", + output: "error_016_dynamic_import_permissions2.out", + exit_code: 1, + http_server: true, +}); + +itest!(error_017_hide_long_source_ts { + args: "run --reload error_017_hide_long_source_ts.ts", + output: "error_017_hide_long_source_ts.ts.out", + exit_code: 1, +}); + +itest!(error_018_hide_long_source_js { + args: "run error_018_hide_long_source_js.js", + output: "error_018_hide_long_source_js.js.out", + exit_code: 1, +}); + +itest!(error_019_stack_function { + args: "run error_019_stack_function.ts", + output: "error_019_stack_function.ts.out", + exit_code: 1, +}); + +itest!(error_020_stack_constructor { + args: "run error_020_stack_constructor.ts", + output: "error_020_stack_constructor.ts.out", + exit_code: 1, +}); + +itest!(error_021_stack_method { + args: "run error_021_stack_method.ts", + output: "error_021_stack_method.ts.out", + exit_code: 1, +}); + +itest!(error_022_stack_custom_error { + args: "run error_022_stack_custom_error.ts", + output: "error_022_stack_custom_error.ts.out", + exit_code: 1, +}); + +itest!(error_023_stack_async { + args: "run error_023_stack_async.ts", + output: "error_023_stack_async.ts.out", + exit_code: 1, +}); + +itest!(error_024_stack_promise_all { + args: "run error_024_stack_promise_all.ts", + output: "error_024_stack_promise_all.ts.out", + exit_code: 1, +}); + +itest!(error_025_tab_indent { + args: "run error_025_tab_indent", + output: "error_025_tab_indent.out", + exit_code: 1, +}); + +itest!(error_026_remote_import_error { + args: "run error_026_remote_import_error.ts", + output: "error_026_remote_import_error.ts.out", + exit_code: 1, + http_server: true, +}); + +itest!(error_missing_module_named_import { + args: "run --reload error_missing_module_named_import.ts", + output: "error_missing_module_named_import.ts.out", + exit_code: 1, +}); + +itest!(error_no_check { + args: "run --reload --no-check error_no_check.ts", + output: "error_no_check.ts.out", + exit_code: 1, +}); + +itest!(error_syntax { + args: "run --reload error_syntax.js", + exit_code: 1, + output: "error_syntax.js.out", +}); + +itest!(error_syntax_empty_trailing_line { + args: "run --reload error_syntax_empty_trailing_line.mjs", + exit_code: 1, + output: "error_syntax_empty_trailing_line.mjs.out", +}); + +itest!(error_type_definitions { + args: "run --reload error_type_definitions.ts", + exit_code: 1, + output: "error_type_definitions.ts.out", +}); + +itest!(error_local_static_import_from_remote_ts { + args: "run --reload http://localhost:4545/cli/tests/error_local_static_import_from_remote.ts", + exit_code: 1, + http_server: true, + output: "error_local_static_import_from_remote.ts.out", + }); + +itest!(error_local_static_import_from_remote_js { + args: "run --reload http://localhost:4545/cli/tests/error_local_static_import_from_remote.js", + exit_code: 1, + http_server: true, + output: "error_local_static_import_from_remote.js.out", + }); + +itest!(exit_error42 { + exit_code: 42, + args: "run --quiet --reload exit_error42.ts", + output: "exit_error42.ts.out", +}); + +itest!(heapstats { + args: "run --quiet --unstable --v8-flags=--expose-gc heapstats.js", + output: "heapstats.js.out", +}); + +itest!(https_import { + args: "run --quiet --reload --cert tls/RootCA.pem https_import.ts", + output: "https_import.ts.out", + http_server: true, +}); + +itest!(if_main { + args: "run --quiet --reload if_main.ts", + output: "if_main.ts.out", +}); + +itest!(import_meta { + args: "run --quiet --reload import_meta.ts", + output: "import_meta.ts.out", +}); + +itest!(main_module { + args: "run --quiet --allow-read --reload main_module.ts", + output: "main_module.ts.out", +}); + +itest!(no_check { + args: "run --quiet --reload --no-check 006_url_imports.ts", + output: "006_url_imports.ts.out", + http_server: true, +}); + +itest!(no_check_decorators { + args: "run --quiet --reload --no-check no_check_decorators.ts", + output: "no_check_decorators.ts.out", +}); + +itest!(runtime_decorators { + args: "run --quiet --reload --no-check runtime_decorators.ts", + output: "runtime_decorators.ts.out", +}); + +itest!(lib_dom_asynciterable { + args: "run --quiet --unstable --reload lib_dom_asynciterable.ts", + output: "lib_dom_asynciterable.ts.out", +}); + +itest!(lib_ref { + args: "run --quiet --unstable --reload lib_ref.ts", + output: "lib_ref.ts.out", +}); + +itest!(lib_runtime_api { + args: "run --quiet --unstable --reload lib_runtime_api.ts", + output: "lib_runtime_api.ts.out", +}); + +itest!(seed_random { + args: "run --seed=100 seed_random.js", + + output: "seed_random.js.out", +}); + +itest!(type_definitions { + args: "run --reload type_definitions.ts", + output: "type_definitions.ts.out", +}); + +itest!(type_definitions_for_export { + args: "run --reload type_definitions_for_export.ts", + output: "type_definitions_for_export.ts.out", + exit_code: 1, +}); + +itest!(type_directives_01 { + args: "run --reload -L debug type_directives_01.ts", + output: "type_directives_01.ts.out", + http_server: true, +}); + +itest!(type_directives_02 { + args: "run --reload -L debug type_directives_02.ts", + output: "type_directives_02.ts.out", +}); + +itest!(type_directives_js_main { + args: "run --reload -L debug type_directives_js_main.js", + output: "type_directives_js_main.js.out", + exit_code: 0, +}); + +itest!(type_directives_redirect { + args: "run --reload type_directives_redirect.ts", + output: "type_directives_redirect.ts.out", + http_server: true, +}); + +itest!(type_headers_deno_types { + args: "run --reload type_headers_deno_types.ts", + output: "type_headers_deno_types.ts.out", + http_server: true, +}); + +itest!(ts_type_imports { + args: "run --reload ts_type_imports.ts", + output: "ts_type_imports.ts.out", + exit_code: 1, +}); + +itest!(ts_decorators { + args: "run --reload -c tsconfig.decorators.json ts_decorators.ts", + output: "ts_decorators.ts.out", +}); + +itest!(ts_type_only_import { + args: "run --reload ts_type_only_import.ts", + output: "ts_type_only_import.ts.out", +}); + +itest!(swc_syntax_error { + args: "run --reload swc_syntax_error.ts", + output: "swc_syntax_error.ts.out", + exit_code: 1, +}); + +itest!(unbuffered_stderr { + args: "run --reload unbuffered_stderr.ts", + output: "unbuffered_stderr.ts.out", +}); + +itest!(unbuffered_stdout { + args: "run --quiet --reload unbuffered_stdout.ts", + output: "unbuffered_stdout.ts.out", +}); + +itest!(v8_flags_run { + args: "run --v8-flags=--expose-gc v8_flags.js", + output: "v8_flags.js.out", +}); + +itest!(v8_flags_unrecognized { + args: "repl --v8-flags=--foo,bar,--trace-gc,-baz", + output: "v8_flags_unrecognized.out", + exit_code: 1, +}); + +itest!(v8_help { + args: "repl --v8-flags=--help", + output: "v8_help.out", +}); + +itest!(unsupported_dynamic_import_scheme { + args: "eval import('xxx:')", + output: "unsupported_dynamic_import_scheme.out", + exit_code: 1, +}); + +itest!(wasm { + args: "run --quiet wasm.ts", + output: "wasm.ts.out", +}); + +itest!(wasm_shared { + args: "run --quiet wasm_shared.ts", + output: "wasm_shared.out", +}); + +itest!(wasm_async { + args: "run wasm_async.js", + output: "wasm_async.out", +}); + +itest!(wasm_unreachable { + args: "run wasm_unreachable.js", + output: "wasm_unreachable.out", + exit_code: 1, +}); + +itest!(weakref { + args: "run --quiet --reload weakref.ts", + output: "weakref.ts.out", +}); + +itest!(top_level_await_order { + args: "run --allow-read top_level_await_order.js", + output: "top_level_await_order.out", +}); + +itest!(top_level_await_loop { + args: "run --allow-read top_level_await_loop.js", + output: "top_level_await_loop.out", +}); + +itest!(top_level_await_circular { + args: "run --allow-read top_level_await_circular.js", + output: "top_level_await_circular.out", + exit_code: 1, +}); + +itest!(top_level_await_unresolved { + args: "run top_level_await_unresolved.js", + output: "top_level_await_unresolved.out", + exit_code: 1, +}); + +itest!(top_level_await { + args: "run --allow-read top_level_await.js", + output: "top_level_await.out", +}); + +itest!(top_level_await_ts { + args: "run --quiet --allow-read top_level_await.ts", + output: "top_level_await.out", +}); + +itest!(top_level_for_await { + args: "run --quiet top_level_for_await.js", + output: "top_level_for_await.out", +}); + +itest!(top_level_for_await_ts { + args: "run --quiet top_level_for_await.ts", + output: "top_level_for_await.out", +}); + +itest!(unstable_disabled { + args: "run --reload unstable.ts", + exit_code: 1, + output: "unstable_disabled.out", +}); + +itest!(unstable_enabled { + args: "run --quiet --reload --unstable unstable.ts", + output: "unstable_enabled.out", +}); + +itest!(unstable_disabled_js { + args: "run --reload unstable.js", + output: "unstable_disabled_js.out", +}); + +itest!(unstable_enabled_js { + args: "run --quiet --reload --unstable unstable.ts", + output: "unstable_enabled_js.out", +}); + +itest!(unstable_worker { + args: "run --reload --unstable --quiet --allow-read unstable_worker.ts", + output: "unstable_worker.ts.out", +}); + +itest!(_053_import_compression { + args: "run --quiet --reload --allow-net 053_import_compression/main.ts", + output: "053_import_compression.out", + http_server: true, +}); + +itest!(disallow_http_from_https_js { + args: "run --quiet --reload --cert tls/RootCA.pem https://localhost:5545/cli/tests/disallow_http_from_https.js", + output: "disallow_http_from_https_js.out", + http_server: true, + exit_code: 1, +}); + +itest!(disallow_http_from_https_ts { + args: "run --quiet --reload --cert tls/RootCA.pem https://localhost:5545/cli/tests/disallow_http_from_https.ts", + output: "disallow_http_from_https_ts.out", + http_server: true, + exit_code: 1, +}); + +itest!(dynamic_import_conditional { + args: "run --quiet --reload dynamic_import_conditional.js", + output: "dynamic_import_conditional.js.out", +}); + +itest!(tsx_imports { + args: "run --reload tsx_imports.ts", + output: "tsx_imports.ts.out", +}); + +itest!(fix_dynamic_import_errors { + args: "run --reload fix_dynamic_import_errors.js", + output: "fix_dynamic_import_errors.js.out", +}); + +itest!(fix_emittable_skipped { + args: "run --reload fix_emittable_skipped.js", + output: "fix_emittable_skipped.ts.out", +}); + +itest!(fix_exotic_specifiers { + args: "run --quiet --reload fix_exotic_specifiers.ts", + output: "fix_exotic_specifiers.ts.out", +}); + +itest!(fix_js_import_js { + args: "run --quiet --reload fix_js_import_js.ts", + output: "fix_js_import_js.ts.out", +}); + +itest!(fix_js_imports { + args: "run --quiet --reload fix_js_imports.ts", + output: "fix_js_imports.ts.out", +}); + +itest!(fix_tsc_file_exists { + args: "run --quiet --reload tsc/test.js", + output: "fix_tsc_file_exists.out", +}); + +itest!(fix_worker_dispatchevent { + args: "run --quiet --reload fix_worker_dispatchevent.ts", + output: "fix_worker_dispatchevent.ts.out", +}); + +itest!(es_private_fields { + args: "run --quiet --reload es_private_fields.js", + output: "es_private_fields.js.out", +}); + +itest!(cjs_imports { + args: "run --quiet --reload cjs_imports.ts", + output: "cjs_imports.ts.out", +}); + +itest!(ts_import_from_js { + args: "run --quiet --reload ts_import_from_js.js", + output: "ts_import_from_js.js.out", + http_server: true, +}); + +itest!(jsx_import_from_ts { + args: "run --quiet --reload jsx_import_from_ts.ts", + output: "jsx_import_from_ts.ts.out", +}); + +itest!(single_compile_with_reload { + args: "run --reload --allow-read single_compile_with_reload.ts", + output: "single_compile_with_reload.ts.out", +}); + +itest!(proto_exploit { + args: "run proto_exploit.js", + output: "proto_exploit.js.out", +}); + +itest!(reference_types { + args: "run --reload --quiet reference_types.ts", + output: "reference_types.ts.out", +}); + +itest!(references_types_remote { + http_server: true, + args: "run --reload --quiet reference_types_remote.ts", + output: "reference_types_remote.ts.out", +}); + +itest!(import_data_url_error_stack { + args: "run --quiet --reload import_data_url_error_stack.ts", + output: "import_data_url_error_stack.ts.out", + exit_code: 1, +}); + +itest!(import_data_url_import_relative { + args: "run --quiet --reload import_data_url_import_relative.ts", + output: "import_data_url_import_relative.ts.out", + exit_code: 1, +}); + +itest!(import_data_url_import_map { + args: "run --quiet --reload --import-map import_maps/import_map.json import_data_url.ts", + output: "import_data_url.ts.out", + }); + +itest!(import_data_url_imports { + args: "run --quiet --reload import_data_url_imports.ts", + output: "import_data_url_imports.ts.out", + http_server: true, +}); + +itest!(import_data_url_jsx { + args: "run --quiet --reload import_data_url_jsx.ts", + output: "import_data_url_jsx.ts.out", +}); + +itest!(import_data_url { + args: "run --quiet --reload import_data_url.ts", + output: "import_data_url.ts.out", +}); + +itest!(import_dynamic_data_url { + args: "run --quiet --reload import_dynamic_data_url.ts", + output: "import_dynamic_data_url.ts.out", +}); + +itest!(import_blob_url_error_stack { + args: "run --quiet --reload import_blob_url_error_stack.ts", + output: "import_blob_url_error_stack.ts.out", + exit_code: 1, +}); + +itest!(import_blob_url_import_relative { + args: "run --quiet --reload import_blob_url_import_relative.ts", + output: "import_blob_url_import_relative.ts.out", + exit_code: 1, +}); + +itest!(import_blob_url_imports { + args: + "run --quiet --reload --allow-net=localhost:4545 import_blob_url_imports.ts", + output: "import_blob_url_imports.ts.out", + http_server: true, +}); + +itest!(import_blob_url_jsx { + args: "run --quiet --reload import_blob_url_jsx.ts", + output: "import_blob_url_jsx.ts.out", +}); + +itest!(import_blob_url { + args: "run --quiet --reload import_blob_url.ts", + output: "import_blob_url.ts.out", +}); + +itest!(import_file_with_colon { + args: "run --quiet --reload import_file_with_colon.ts", + output: "import_file_with_colon.ts.out", + http_server: true, +}); +// FIXME(bartlomieju): disabled, because this test is very flaky on CI +// itest!(local_sources_not_cached_in_memory { +// args: "run --allow-read --allow-write no_mem_cache.js", +// output: "no_mem_cache.js.out", +// }); + +// This test checks that inline source map data is used. It uses a hand crafted +// source map that maps to a file that exists, but is not loaded into the module +// graph (inline_js_source_map_2.ts) (because there are no direct dependencies). +// Source line is not remapped because no inline source contents are included in +// the sourcemap and the file is not present in the dependency graph. +itest!(inline_js_source_map_2 { + args: "run --quiet inline_js_source_map_2.js", + output: "inline_js_source_map_2.js.out", + exit_code: 1, +}); + +// This test checks that inline source map data is used. It uses a hand crafted +// source map that maps to a file that exists, but is not loaded into the module +// graph (inline_js_source_map_2.ts) (because there are no direct dependencies). +// Source line remapped using th inline source contents that are included in the +// inline source map. +itest!(inline_js_source_map_2_with_inline_contents { + args: "run --quiet inline_js_source_map_2_with_inline_contents.js", + output: "inline_js_source_map_2_with_inline_contents.js.out", + exit_code: 1, +}); + +// This test checks that inline source map data is used. It uses a hand crafted +// source map that maps to a file that exists, and is loaded into the module +// graph because of a direct import statement (inline_js_source_map.ts). The +// source map was generated from an earlier version of this file, where the throw +// was not commented out. The source line is remapped using source contents that +// from the module graph. +itest!(inline_js_source_map_with_contents_from_graph { + args: "run --quiet inline_js_source_map_with_contents_from_graph.js", + output: "inline_js_source_map_with_contents_from_graph.js.out", + exit_code: 1, + http_server: true, +}); + +// This test ensures that a descriptive error is shown when we're unable to load +// the import map. Even though this tests only the `run` subcommand, we can be sure +// that the error message is similar for other subcommands as they all use +// `program_state.maybe_import_map` to access the import map underneath. +itest!(error_import_map_unable_to_load { + args: "run --import-map=import_maps/does_not_exist.json import_maps/test.ts", + output: "error_import_map_unable_to_load.out", + exit_code: 1, +}); + +#[test] +fn no_validate_asm() { + let output = util::deno_cmd() + .current_dir(util::root_path()) + .arg("run") + .arg("cli/tests/no_validate_asm.js") + .stderr(std::process::Stdio::piped()) + .stdout(std::process::Stdio::piped()) + .spawn() + .unwrap() + .wait_with_output() + .unwrap(); + assert!(output.status.success()); + assert!(output.stderr.is_empty()); + assert!(output.stdout.is_empty()); +} + +#[test] +fn exec_path() { + let output = util::deno_cmd() + .current_dir(util::root_path()) + .arg("run") + .arg("--allow-read") + .arg("cli/tests/exec_path.ts") + .stdout(std::process::Stdio::piped()) + .spawn() + .unwrap() + .wait_with_output() + .unwrap(); + assert!(output.status.success()); + let stdout_str = std::str::from_utf8(&output.stdout).unwrap().trim(); + let actual = + std::fs::canonicalize(&std::path::Path::new(stdout_str)).unwrap(); + let expected = std::fs::canonicalize(util::deno_exe_path()).unwrap(); + assert_eq!(expected, actual); +} + +#[cfg(windows)] +// Clippy suggests to remove the `NoStd` prefix from all variants. I disagree. +#[allow(clippy::enum_variant_names)] +enum WinProcConstraints { + NoStdIn, + NoStdOut, + NoStdErr, +} + +#[cfg(windows)] +fn run_deno_script_constrained( + script_path: std::path::PathBuf, + constraints: WinProcConstraints, +) -> Result<(), i64> { + let file_path = "cli/tests/DenoWinRunner.ps1"; + let constraints = match constraints { + WinProcConstraints::NoStdIn => "1", + WinProcConstraints::NoStdOut => "2", + WinProcConstraints::NoStdErr => "4", + }; + let deno_exe_path = util::deno_exe_path() + .into_os_string() + .into_string() + .unwrap(); + + let deno_script_path = script_path.into_os_string().into_string().unwrap(); + + let args = vec![&deno_exe_path[..], &deno_script_path[..], constraints]; + util::run_powershell_script_file(file_path, args) +} + +#[cfg(windows)] +#[test] +fn should_not_panic_on_no_stdin() { + let output = run_deno_script_constrained( + util::tests_path().join("echo.ts"), + WinProcConstraints::NoStdIn, + ); + output.unwrap(); +} + +#[cfg(windows)] +#[test] +fn should_not_panic_on_no_stdout() { + let output = run_deno_script_constrained( + util::tests_path().join("echo.ts"), + WinProcConstraints::NoStdOut, + ); + output.unwrap(); +} + +#[cfg(windows)] +#[test] +fn should_not_panic_on_no_stderr() { + let output = run_deno_script_constrained( + util::tests_path().join("echo.ts"), + WinProcConstraints::NoStdErr, + ); + output.unwrap(); +} + +#[cfg(not(windows))] +#[test] +fn should_not_panic_on_undefined_home_environment_variable() { + let output = util::deno_cmd() + .current_dir(util::root_path()) + .arg("run") + .arg("cli/tests/echo.ts") + .env_remove("HOME") + .spawn() + .unwrap() + .wait_with_output() + .unwrap(); + assert!(output.status.success()); +} + +#[test] +fn should_not_panic_on_undefined_deno_dir_environment_variable() { + let output = util::deno_cmd() + .current_dir(util::root_path()) + .arg("run") + .arg("cli/tests/echo.ts") + .env_remove("DENO_DIR") + .spawn() + .unwrap() + .wait_with_output() + .unwrap(); + assert!(output.status.success()); +} + +#[cfg(not(windows))] +#[test] +fn should_not_panic_on_undefined_deno_dir_and_home_environment_variables() { + let output = util::deno_cmd() + .current_dir(util::root_path()) + .arg("run") + .arg("cli/tests/echo.ts") + .env_remove("DENO_DIR") + .env_remove("HOME") + .spawn() + .unwrap() + .wait_with_output() + .unwrap(); + assert!(output.status.success()); +} + +#[test] +fn rust_log() { + // Without RUST_LOG the stderr is empty. + let output = util::deno_cmd() + .current_dir(util::root_path()) + .arg("run") + .arg("cli/tests/001_hello.js") + .stderr(std::process::Stdio::piped()) + .spawn() + .unwrap() + .wait_with_output() + .unwrap(); + assert!(output.status.success()); + assert!(output.stderr.is_empty()); + + // With RUST_LOG the stderr is not empty. + let output = util::deno_cmd() + .current_dir(util::root_path()) + .arg("run") + .arg("cli/tests/001_hello.js") + .env("RUST_LOG", "debug") + .stderr(std::process::Stdio::piped()) + .spawn() + .unwrap() + .wait_with_output() + .unwrap(); + assert!(output.status.success()); + assert!(!output.stderr.is_empty()); +} + +mod permissions { + use test_util as util; + + #[test] + fn with_allow() { + for permission in &util::PERMISSION_VARIANTS { + let status = util::deno_cmd() + .current_dir(&util::tests_path()) + .arg("run") + .arg(format!("--allow-{0}", permission)) + .arg("permission_test.ts") + .arg(format!("{0}Required", permission)) + .spawn() + .unwrap() + .wait() + .unwrap(); + assert!(status.success()); + } + } + + #[test] + fn without_allow() { + for permission in &util::PERMISSION_VARIANTS { + let (_, err) = util::run_and_collect_output( + false, + &format!("run permission_test.ts {0}Required", permission), + None, + None, + false, + ); + assert!(err.contains(util::PERMISSION_DENIED_PATTERN)); + } + } + + #[test] + fn rw_inside_project_dir() { + const PERMISSION_VARIANTS: [&str; 2] = ["read", "write"]; + for permission in &PERMISSION_VARIANTS { + let status = util::deno_cmd() + .current_dir(&util::tests_path()) + .arg("run") + .arg(format!( + "--allow-{0}={1}", + permission, + util::root_path().into_os_string().into_string().unwrap() + )) + .arg("complex_permissions_test.ts") + .arg(permission) + .arg("complex_permissions_test.ts") + .spawn() + .unwrap() + .wait() + .unwrap(); + assert!(status.success()); + } + } + + #[test] + fn rw_outside_test_dir() { + const PERMISSION_VARIANTS: [&str; 2] = ["read", "write"]; + for permission in &PERMISSION_VARIANTS { + let (_, err) = util::run_and_collect_output( + false, + &format!( + "run --allow-{0}={1} complex_permissions_test.ts {0} {2}", + permission, + util::root_path() + .join("cli") + .join("tests") + .into_os_string() + .into_string() + .unwrap(), + util::root_path() + .join("Cargo.toml") + .into_os_string() + .into_string() + .unwrap(), + ), + None, + None, + false, + ); + assert!(err.contains(util::PERMISSION_DENIED_PATTERN)); + } + } + + #[test] + fn rw_inside_test_dir() { + const PERMISSION_VARIANTS: [&str; 2] = ["read", "write"]; + for permission in &PERMISSION_VARIANTS { + let status = util::deno_cmd() + .current_dir(&util::tests_path()) + .arg("run") + .arg(format!( + "--allow-{0}={1}", + permission, + util::root_path() + .join("cli") + .join("tests") + .into_os_string() + .into_string() + .unwrap() + )) + .arg("complex_permissions_test.ts") + .arg(permission) + .arg("complex_permissions_test.ts") + .spawn() + .unwrap() + .wait() + .unwrap(); + assert!(status.success()); + } + } + + #[test] + fn rw_outside_test_and_js_dir() { + const PERMISSION_VARIANTS: [&str; 2] = ["read", "write"]; + let test_dir = util::root_path() + .join("cli") + .join("tests") + .into_os_string() + .into_string() + .unwrap(); + let js_dir = util::root_path() + .join("js") + .into_os_string() + .into_string() + .unwrap(); + for permission in &PERMISSION_VARIANTS { + let (_, err) = util::run_and_collect_output( + false, + &format!( + "run --allow-{0}={1},{2} complex_permissions_test.ts {0} {3}", + permission, + test_dir, + js_dir, + util::root_path() + .join("Cargo.toml") + .into_os_string() + .into_string() + .unwrap(), + ), + None, + None, + false, + ); + assert!(err.contains(util::PERMISSION_DENIED_PATTERN)); + } + } + + #[test] + fn rw_inside_test_and_js_dir() { + const PERMISSION_VARIANTS: [&str; 2] = ["read", "write"]; + let test_dir = util::root_path() + .join("cli") + .join("tests") + .into_os_string() + .into_string() + .unwrap(); + let js_dir = util::root_path() + .join("js") + .into_os_string() + .into_string() + .unwrap(); + for permission in &PERMISSION_VARIANTS { + let status = util::deno_cmd() + .current_dir(&util::tests_path()) + .arg("run") + .arg(format!("--allow-{0}={1},{2}", permission, test_dir, js_dir)) + .arg("complex_permissions_test.ts") + .arg(permission) + .arg("complex_permissions_test.ts") + .spawn() + .unwrap() + .wait() + .unwrap(); + assert!(status.success()); + } + } + + #[test] + fn rw_relative() { + const PERMISSION_VARIANTS: [&str; 2] = ["read", "write"]; + for permission in &PERMISSION_VARIANTS { + let status = util::deno_cmd() + .current_dir(&util::tests_path()) + .arg("run") + .arg(format!("--allow-{0}=.", permission)) + .arg("complex_permissions_test.ts") + .arg(permission) + .arg("complex_permissions_test.ts") + .spawn() + .unwrap() + .wait() + .unwrap(); + assert!(status.success()); + } + } + + #[test] + fn rw_no_prefix() { + const PERMISSION_VARIANTS: [&str; 2] = ["read", "write"]; + for permission in &PERMISSION_VARIANTS { + let status = util::deno_cmd() + .current_dir(&util::tests_path()) + .arg("run") + .arg(format!("--allow-{0}=tls/../", permission)) + .arg("complex_permissions_test.ts") + .arg(permission) + .arg("complex_permissions_test.ts") + .spawn() + .unwrap() + .wait() + .unwrap(); + assert!(status.success()); + } + } + + #[test] + fn net_fetch_allow_localhost_4545() { + let (_, err) = util::run_and_collect_output( + true, + "run --allow-net=localhost:4545 complex_permissions_test.ts netFetch http://localhost:4545/", + None, + None, + true, + ); + assert!(!err.contains(util::PERMISSION_DENIED_PATTERN)); + } + + #[test] + fn net_fetch_allow_deno_land() { + let (_, err) = util::run_and_collect_output( + false, + "run --allow-net=deno.land complex_permissions_test.ts netFetch http://localhost:4545/", + None, + None, + true, + ); + assert!(err.contains(util::PERMISSION_DENIED_PATTERN)); + } + + #[test] + fn net_fetch_localhost_4545_fail() { + let (_, err) = util::run_and_collect_output( + false, + "run --allow-net=localhost:4545 complex_permissions_test.ts netFetch http://localhost:4546/", + None, + None, + true, + ); + assert!(err.contains(util::PERMISSION_DENIED_PATTERN)); + } + + #[test] + fn net_fetch_localhost() { + let (_, err) = util::run_and_collect_output( + true, + "run --allow-net=localhost complex_permissions_test.ts netFetch http://localhost:4545/ http://localhost:4546/ http://localhost:4547/", + None, + None, + true, + ); + assert!(!err.contains(util::PERMISSION_DENIED_PATTERN)); + } + + #[test] + fn net_connect_allow_localhost_ip_4555() { + let (_, err) = util::run_and_collect_output( + true, + "run --allow-net=127.0.0.1:4545 complex_permissions_test.ts netConnect 127.0.0.1:4545", + None, + None, + true, + ); + assert!(!err.contains(util::PERMISSION_DENIED_PATTERN)); + } + + #[test] + fn net_connect_allow_deno_land() { + let (_, err) = util::run_and_collect_output( + false, + "run --allow-net=deno.land complex_permissions_test.ts netConnect 127.0.0.1:4546", + None, + None, + true, + ); + assert!(err.contains(util::PERMISSION_DENIED_PATTERN)); + } + + #[test] + fn net_connect_allow_localhost_ip_4545_fail() { + let (_, err) = util::run_and_collect_output( + false, + "run --allow-net=127.0.0.1:4545 complex_permissions_test.ts netConnect 127.0.0.1:4546", + None, + None, + true, + ); + assert!(err.contains(util::PERMISSION_DENIED_PATTERN)); + } + + #[test] + fn net_connect_allow_localhost_ip() { + let (_, err) = util::run_and_collect_output( + true, + "run --allow-net=127.0.0.1 complex_permissions_test.ts netConnect 127.0.0.1:4545 127.0.0.1:4546 127.0.0.1:4547", + None, + None, + true, + ); + assert!(!err.contains(util::PERMISSION_DENIED_PATTERN)); + } + + #[test] + fn net_listen_allow_localhost_4555() { + let (_, err) = util::run_and_collect_output( + true, + "run --allow-net=localhost:4558 complex_permissions_test.ts netListen localhost:4558", + None, + None, + false, + ); + assert!(!err.contains(util::PERMISSION_DENIED_PATTERN)); + } + + #[test] + fn net_listen_allow_deno_land() { + let (_, err) = util::run_and_collect_output( + false, + "run --allow-net=deno.land complex_permissions_test.ts netListen localhost:4545", + None, + None, + false, + ); + assert!(err.contains(util::PERMISSION_DENIED_PATTERN)); + } + + #[test] + fn net_listen_allow_localhost_4555_fail() { + let (_, err) = util::run_and_collect_output( + false, + "run --allow-net=localhost:4555 complex_permissions_test.ts netListen localhost:4556", + None, + None, + false, + ); + assert!(err.contains(util::PERMISSION_DENIED_PATTERN)); + } + + #[test] + fn net_listen_allow_localhost() { + // Port 4600 is chosen to not colide with those used by + // target/debug/test_server + let (_, err) = util::run_and_collect_output( + true, + "run --allow-net=localhost complex_permissions_test.ts netListen localhost:4600", + None, + None, + false, + ); + assert!(!err.contains(util::PERMISSION_DENIED_PATTERN)); + } + + #[cfg(unix)] + #[test] + fn _061_permissions_request() { + let args = "run 061_permissions_request.ts"; + let output = "061_permissions_request.ts.out"; + let input = b"y\nn\n"; + + util::test_pty(args, output, input); + } + + #[cfg(unix)] + #[test] + fn _062_permissions_request_global() { + let args = "run 062_permissions_request_global.ts"; + let output = "062_permissions_request_global.ts.out"; + let input = b"y\n"; + + util::test_pty(args, output, input); + } + + itest!(_063_permissions_revoke { + args: "run --allow-read=foo,bar 063_permissions_revoke.ts", + output: "063_permissions_revoke.ts.out", + }); + + itest!(_064_permissions_revoke_global { + args: "run --allow-read=foo,bar 064_permissions_revoke_global.ts", + output: "064_permissions_revoke_global.ts.out", + }); + + #[cfg(unix)] + #[test] + fn _066_prompt() { + let args = "run --unstable 066_prompt.ts"; + let output = "066_prompt.ts.out"; + // These are answers to prompt, confirm, and alert calls. + let input = b"John Doe\n\nfoo\nY\nN\nyes\n\nwindows\r\n\n\n"; + + util::test_pty(args, output, input); + } + + itest!(dynamic_import_permissions_remote_remote { + args: "run --quiet --reload --allow-net=localhost:4545 dynamic_import/permissions_remote_remote.ts", + output: "dynamic_import/permissions_remote_remote.ts.out", + http_server: true, + exit_code: 1, + }); + + itest!(dynamic_import_permissions_data_remote { + args: "run --quiet --reload --allow-net=localhost:4545 dynamic_import/permissions_data_remote.ts", + output: "dynamic_import/permissions_data_remote.ts.out", + http_server: true, + exit_code: 1, + }); + + itest!(dynamic_import_permissions_blob_remote { + args: "run --quiet --reload --allow-net=localhost:4545 dynamic_import/permissions_blob_remote.ts", + output: "dynamic_import/permissions_blob_remote.ts.out", + http_server: true, + exit_code: 1, + }); + + itest!(dynamic_import_permissions_data_local { + args: "run --quiet --reload --allow-net=localhost:4545 dynamic_import/permissions_data_local.ts", + output: "dynamic_import/permissions_data_local.ts.out", + http_server: true, + exit_code: 1, + }); + + itest!(dynamic_import_permissions_blob_local { + args: "run --quiet --reload --allow-net=localhost:4545 dynamic_import/permissions_blob_local.ts", + output: "dynamic_import/permissions_blob_local.ts.out", + http_server: true, + exit_code: 1, + }); +} diff --git a/cli/tests/integration/test_tests.rs b/cli/tests/integration/test_tests.rs new file mode 100644 index 0000000000..ef9fad6791 --- /dev/null +++ b/cli/tests/integration/test_tests.rs @@ -0,0 +1,98 @@ +// Copyright 2018-2021 the Deno authors. All rights reserved. MIT license. + +use crate::itest; +use test_util as util; + +#[test] +fn no_color() { + let (out, _) = util::run_and_collect_output( + false, + "test test/deno_test_no_color.ts", + None, + Some(vec![("NO_COLOR".to_owned(), "true".to_owned())]), + false, + ); + // ANSI escape codes should be stripped. + assert!(out.contains("test success ... ok")); + assert!(out.contains("test fail ... FAILED")); + assert!(out.contains("test ignored ... ignored")); + assert!(out.contains("test result: FAILED. 1 passed; 1 failed; 1 ignored; 0 measured; 0 filtered out")); +} + +itest!(all { + args: "test test/test_runner_test.ts", + exit_code: 1, + output: "test/deno_test.out", +}); + +itest!(doc { + args: "test --doc --allow-all test/doc.ts", + exit_code: 1, + output: "test/doc.out", +}); + +itest!(allow_all { + args: "test --unstable --allow-all test/allow_all.ts", + exit_code: 0, + output: "test/allow_all.out", +}); + +itest!(allow_none { + args: "test --unstable test/allow_none.ts", + exit_code: 1, + output: "test/allow_none.out", +}); + +itest!(fail_fast { + args: "test --fail-fast test/test_runner_test.ts", + exit_code: 1, + output: "test/deno_test_fail_fast.out", +}); + +itest!(only { + args: "test test/deno_test_only.ts", + exit_code: 1, + output: "test/deno_test_only.ts.out", +}); + +itest!(no_check { + args: "test --no-check test/test_runner_test.ts", + exit_code: 1, + output: "test/deno_test.out", +}); + +itest!(finally_cleartimeout { + args: "test test/test_finally_cleartimeout.ts", + exit_code: 1, + output: "test/test_finally_cleartimeout.out", +}); + +itest!(unresolved_promise { + args: "test test/test_unresolved_promise.js", + exit_code: 1, + output: "test/deno_test_unresolved_promise.out", +}); + +itest!(unhandled_rejection { + args: "test test/unhandled_rejection.ts", + exit_code: 1, + output: "test/unhandled_rejection.out", +}); + +itest!(exit_sanitizer { + args: "test test/exit_sanitizer_test.ts", + output: "test/exit_sanitizer_test.out", + exit_code: 1, +}); + +itest!(quiet { + args: "test --quiet test/quiet_test.ts", + exit_code: 0, + output: "test/quiet_test.out", +}); + +itest!(_067_test_no_run_type_error { + args: "test --unstable --no-run test_type_error", + output: "067_test_no_run_type_error.out", + exit_code: 1, +}); diff --git a/cli/tests/integration/upgrade_tests.rs b/cli/tests/integration/upgrade_tests.rs new file mode 100644 index 0000000000..4edd7a418e --- /dev/null +++ b/cli/tests/integration/upgrade_tests.rs @@ -0,0 +1,145 @@ +// Copyright 2018-2021 the Deno authors. All rights reserved. MIT license. + +use std::process::Command; +use tempfile::TempDir; +use test_util as util; + +// Warning: this test requires internet access. +// TODO(#7412): reenable. test is flaky +#[test] +#[ignore] +fn upgrade_in_tmpdir() { + let temp_dir = TempDir::new().unwrap(); + let exe_path = temp_dir.path().join("deno"); + let _ = std::fs::copy(util::deno_exe_path(), &exe_path).unwrap(); + assert!(exe_path.exists()); + let _mtime1 = std::fs::metadata(&exe_path).unwrap().modified().unwrap(); + let status = Command::new(&exe_path) + .arg("upgrade") + .arg("--force") + .spawn() + .unwrap() + .wait() + .unwrap(); + assert!(status.success()); + let _mtime2 = std::fs::metadata(&exe_path).unwrap().modified().unwrap(); + // TODO(ry) assert!(mtime1 < mtime2); +} + +// Warning: this test requires internet access. +// TODO(#7412): reenable. test is flaky +#[test] +#[ignore] +fn upgrade_with_space_in_path() { + let temp_dir = tempfile::Builder::new() + .prefix("directory with spaces") + .tempdir() + .unwrap(); + let exe_path = temp_dir.path().join("deno"); + let _ = std::fs::copy(util::deno_exe_path(), &exe_path).unwrap(); + assert!(exe_path.exists()); + let status = Command::new(&exe_path) + .arg("upgrade") + .arg("--force") + .env("TMP", temp_dir.path()) + .spawn() + .unwrap() + .wait() + .unwrap(); + assert!(status.success()); +} + +// Warning: this test requires internet access. +// TODO(#7412): reenable. test is flaky +#[test] +#[ignore] +fn upgrade_with_version_in_tmpdir() { + let temp_dir = TempDir::new().unwrap(); + let exe_path = temp_dir.path().join("deno"); + let _ = std::fs::copy(util::deno_exe_path(), &exe_path).unwrap(); + assert!(exe_path.exists()); + let _mtime1 = std::fs::metadata(&exe_path).unwrap().modified().unwrap(); + let status = Command::new(&exe_path) + .arg("upgrade") + .arg("--force") + .arg("--version") + .arg("0.42.0") + .spawn() + .unwrap() + .wait() + .unwrap(); + assert!(status.success()); + let upgraded_deno_version = String::from_utf8( + Command::new(&exe_path).arg("-V").output().unwrap().stdout, + ) + .unwrap(); + assert!(upgraded_deno_version.contains("0.42.0")); + let _mtime2 = std::fs::metadata(&exe_path).unwrap().modified().unwrap(); + // TODO(ry) assert!(mtime1 < mtime2); +} + +// Warning: this test requires internet access. +// TODO(#7412): reenable. test is flaky +#[test] +#[ignore] +fn upgrade_with_canary_in_tmpdir() { + let temp_dir = TempDir::new().unwrap(); + let exe_path = temp_dir.path().join("deno"); + let _ = std::fs::copy(util::deno_exe_path(), &exe_path).unwrap(); + assert!(exe_path.exists()); + let _mtime1 = std::fs::metadata(&exe_path).unwrap().modified().unwrap(); + let status = Command::new(&exe_path) + .arg("upgrade") + .arg("--canary") + .arg("--version") + .arg("e6685f0f01b8a11a5eaff020f5babcfde76b3038") + .spawn() + .unwrap() + .wait() + .unwrap(); + assert!(status.success()); + let upgraded_deno_version = String::from_utf8( + Command::new(&exe_path).arg("-V").output().unwrap().stdout, + ) + .unwrap(); + assert!(upgraded_deno_version.contains("e6685f0")); + let _mtime2 = std::fs::metadata(&exe_path).unwrap().modified().unwrap(); + // TODO(ry) assert!(mtime1 < mtime2); +} + +// Warning: this test requires internet access. +// TODO(#7412): reenable. test is flaky +#[test] +#[ignore] +fn upgrade_with_out_in_tmpdir() { + let temp_dir = TempDir::new().unwrap(); + let exe_path = temp_dir.path().join("deno"); + let new_exe_path = temp_dir.path().join("foo"); + let _ = std::fs::copy(util::deno_exe_path(), &exe_path).unwrap(); + assert!(exe_path.exists()); + let mtime1 = std::fs::metadata(&exe_path).unwrap().modified().unwrap(); + let status = Command::new(&exe_path) + .arg("upgrade") + .arg("--version") + .arg("1.0.2") + .arg("--output") + .arg(&new_exe_path.to_str().unwrap()) + .spawn() + .unwrap() + .wait() + .unwrap(); + assert!(status.success()); + assert!(new_exe_path.exists()); + let mtime2 = std::fs::metadata(&exe_path).unwrap().modified().unwrap(); + assert_eq!(mtime1, mtime2); // Original exe_path was not changed. + + let v = String::from_utf8( + Command::new(&new_exe_path) + .arg("-V") + .output() + .unwrap() + .stdout, + ) + .unwrap(); + assert!(v.contains("1.0.2")); +} diff --git a/cli/tests/integration/watcher_tests.rs b/cli/tests/integration/watcher_tests.rs new file mode 100644 index 0000000000..3e9aa563a7 --- /dev/null +++ b/cli/tests/integration/watcher_tests.rs @@ -0,0 +1,597 @@ +// Copyright 2018-2021 the Deno authors. All rights reserved. MIT license. + +use std::io::BufRead; +use tempfile::TempDir; +use test_util as util; + +// Helper function to skip watcher output that contains "Restarting" +// phrase. +fn skip_restarting_line( + mut stderr_lines: impl Iterator, +) -> String { + loop { + let msg = stderr_lines.next().unwrap(); + if !msg.contains("Restarting") { + return msg; + } + } +} + +/// Helper function to skip watcher output that doesn't contain +/// "{job_name} finished" phrase. +fn wait_for_process_finished( + job_name: &str, + stderr_lines: &mut impl Iterator, +) { + let phrase = format!("{} finished", job_name); + loop { + let msg = stderr_lines.next().unwrap(); + if msg.contains(&phrase) { + break; + } + } +} + +/// Helper function to skip watcher output that doesn't contain +/// "{job_name} failed" phrase. +fn wait_for_process_failed( + job_name: &str, + stderr_lines: &mut impl Iterator, +) { + let phrase = format!("{} failed", job_name); + loop { + let msg = stderr_lines.next().unwrap(); + if msg.contains(&phrase) { + break; + } + } +} + +#[test] +fn fmt_watch_test() { + let t = TempDir::new().expect("tempdir fail"); + let fixed = util::root_path().join("cli/tests/badly_formatted_fixed.js"); + let badly_formatted_original = + util::root_path().join("cli/tests/badly_formatted.mjs"); + let badly_formatted = t.path().join("badly_formatted.js"); + std::fs::copy(&badly_formatted_original, &badly_formatted) + .expect("Failed to copy file"); + + let mut child = util::deno_cmd() + .current_dir(util::root_path()) + .arg("fmt") + .arg(&badly_formatted) + .arg("--watch") + .arg("--unstable") + .stdout(std::process::Stdio::piped()) + .stderr(std::process::Stdio::piped()) + .spawn() + .expect("Failed to spawn script"); + let stderr = child.stderr.as_mut().unwrap(); + let stderr_lines = + std::io::BufReader::new(stderr).lines().map(|r| r.unwrap()); + + // TODO(lucacasonato): remove this timeout. It seems to be needed on Linux. + std::thread::sleep(std::time::Duration::from_secs(1)); + + assert!(skip_restarting_line(stderr_lines).contains("badly_formatted.js")); + + let expected = std::fs::read_to_string(fixed.clone()).unwrap(); + let actual = std::fs::read_to_string(badly_formatted.clone()).unwrap(); + assert_eq!(expected, actual); + + // Change content of the file again to be badly formatted + std::fs::copy(&badly_formatted_original, &badly_formatted) + .expect("Failed to copy file"); + std::thread::sleep(std::time::Duration::from_secs(1)); + + // Check if file has been automatically formatted by watcher + let expected = std::fs::read_to_string(fixed).unwrap(); + let actual = std::fs::read_to_string(badly_formatted).unwrap(); + assert_eq!(expected, actual); + + // the watcher process is still alive + assert!(child.try_wait().unwrap().is_none()); + + child.kill().unwrap(); + drop(t); +} + +#[test] +fn bundle_js_watch() { + use std::path::PathBuf; + // Test strategy extends this of test bundle_js by adding watcher + let t = TempDir::new().expect("tempdir fail"); + let file_to_watch = t.path().join("file_to_watch.js"); + std::fs::write(&file_to_watch, "console.log('Hello world');") + .expect("error writing file"); + assert!(file_to_watch.is_file()); + let t = TempDir::new().expect("tempdir fail"); + let bundle = t.path().join("mod6.bundle.js"); + let mut deno = util::deno_cmd() + .current_dir(util::root_path()) + .arg("bundle") + .arg(&file_to_watch) + .arg(&bundle) + .arg("--watch") + .arg("--unstable") + .env("NO_COLOR", "1") + .stdout(std::process::Stdio::piped()) + .stderr(std::process::Stdio::piped()) + .spawn() + .expect("failed to spawn script"); + + let stderr = deno.stderr.as_mut().unwrap(); + let mut stderr_lines = + std::io::BufReader::new(stderr).lines().map(|r| r.unwrap()); + + std::thread::sleep(std::time::Duration::from_secs(1)); + assert!(stderr_lines.next().unwrap().contains("file_to_watch.js")); + assert!(stderr_lines.next().unwrap().contains("mod6.bundle.js")); + let file = PathBuf::from(&bundle); + assert!(file.is_file()); + wait_for_process_finished("Bundle", &mut stderr_lines); + + std::fs::write(&file_to_watch, "console.log('Hello world2');") + .expect("error writing file"); + std::thread::sleep(std::time::Duration::from_secs(1)); + assert!(stderr_lines + .next() + .unwrap() + .contains("File change detected!")); + assert!(stderr_lines.next().unwrap().contains("file_to_watch.js")); + assert!(stderr_lines.next().unwrap().contains("mod6.bundle.js")); + let file = PathBuf::from(&bundle); + assert!(file.is_file()); + wait_for_process_finished("Bundle", &mut stderr_lines); + + // Confirm that the watcher keeps on working even if the file is updated and has invalid syntax + std::fs::write(&file_to_watch, "syntax error ^^") + .expect("error writing file"); + std::thread::sleep(std::time::Duration::from_secs(1)); + assert!(stderr_lines + .next() + .unwrap() + .contains("File change detected!")); + assert!(stderr_lines.next().unwrap().contains("error: ")); + wait_for_process_failed("Bundle", &mut stderr_lines); + + // the watcher process is still alive + assert!(deno.try_wait().unwrap().is_none()); + + deno.kill().unwrap(); + drop(t); +} + +/// Confirm that the watcher continues to work even if module resolution fails at the *first* attempt +#[test] +fn bundle_watch_not_exit() { + let t = TempDir::new().expect("tempdir fail"); + let file_to_watch = t.path().join("file_to_watch.js"); + std::fs::write(&file_to_watch, "syntax error ^^") + .expect("error writing file"); + let target_file = t.path().join("target.js"); + + let mut deno = util::deno_cmd() + .current_dir(util::root_path()) + .arg("bundle") + .arg(&file_to_watch) + .arg(&target_file) + .arg("--watch") + .arg("--unstable") + .env("NO_COLOR", "1") + .stdout(std::process::Stdio::piped()) + .stderr(std::process::Stdio::piped()) + .spawn() + .expect("failed to spawn script"); + + let stderr = deno.stderr.as_mut().unwrap(); + let mut stderr_lines = + std::io::BufReader::new(stderr).lines().map(|r| r.unwrap()); + + std::thread::sleep(std::time::Duration::from_secs(1)); + assert!(stderr_lines.next().unwrap().contains("error:")); + assert!(stderr_lines.next().unwrap().contains("Bundle failed")); + // the target file hasn't been created yet + assert!(!target_file.is_file()); + + // Make sure the watcher actually restarts and works fine with the proper syntax + std::fs::write(&file_to_watch, "console.log(42);") + .expect("error writing file"); + std::thread::sleep(std::time::Duration::from_secs(1)); + assert!(stderr_lines + .next() + .unwrap() + .contains("File change detected!")); + assert!(stderr_lines.next().unwrap().contains("file_to_watch.js")); + assert!(stderr_lines.next().unwrap().contains("target.js")); + wait_for_process_finished("Bundle", &mut stderr_lines); + // bundled file is created + assert!(target_file.is_file()); + + // the watcher process is still alive + assert!(deno.try_wait().unwrap().is_none()); + + deno.kill().unwrap(); + drop(t); +} + +#[test] +fn run_watch() { + let t = TempDir::new().expect("tempdir fail"); + let file_to_watch = t.path().join("file_to_watch.js"); + std::fs::write(&file_to_watch, "console.log('Hello world');") + .expect("error writing file"); + + let mut child = util::deno_cmd() + .current_dir(util::root_path()) + .arg("run") + .arg("--watch") + .arg("--unstable") + .arg(&file_to_watch) + .env("NO_COLOR", "1") + .stdout(std::process::Stdio::piped()) + .stderr(std::process::Stdio::piped()) + .spawn() + .expect("failed to spawn script"); + + let stdout = child.stdout.as_mut().unwrap(); + let mut stdout_lines = + std::io::BufReader::new(stdout).lines().map(|r| r.unwrap()); + let stderr = child.stderr.as_mut().unwrap(); + let mut stderr_lines = + std::io::BufReader::new(stderr).lines().map(|r| r.unwrap()); + + assert!(stdout_lines.next().unwrap().contains("Hello world")); + wait_for_process_finished("Process", &mut stderr_lines); + + // TODO(lucacasonato): remove this timeout. It seems to be needed on Linux. + std::thread::sleep(std::time::Duration::from_secs(1)); + + // Change content of the file + std::fs::write(&file_to_watch, "console.log('Hello world2');") + .expect("error writing file"); + // Events from the file watcher is "debounced", so we need to wait for the next execution to start + std::thread::sleep(std::time::Duration::from_secs(1)); + + assert!(stderr_lines.next().unwrap().contains("Restarting")); + assert!(stdout_lines.next().unwrap().contains("Hello world2")); + wait_for_process_finished("Process", &mut stderr_lines); + + // Add dependency + let another_file = t.path().join("another_file.js"); + std::fs::write(&another_file, "export const foo = 0;") + .expect("error writing file"); + std::fs::write( + &file_to_watch, + "import { foo } from './another_file.js'; console.log(foo);", + ) + .expect("error writing file"); + std::thread::sleep(std::time::Duration::from_secs(1)); + assert!(stderr_lines.next().unwrap().contains("Restarting")); + assert!(stdout_lines.next().unwrap().contains('0')); + wait_for_process_finished("Process", &mut stderr_lines); + + // Confirm that restarting occurs when a new file is updated + std::fs::write(&another_file, "export const foo = 42;") + .expect("error writing file"); + std::thread::sleep(std::time::Duration::from_secs(1)); + assert!(stderr_lines.next().unwrap().contains("Restarting")); + assert!(stdout_lines.next().unwrap().contains("42")); + wait_for_process_finished("Process", &mut stderr_lines); + + // Confirm that the watcher keeps on working even if the file is updated and has invalid syntax + std::fs::write(&file_to_watch, "syntax error ^^") + .expect("error writing file"); + std::thread::sleep(std::time::Duration::from_secs(1)); + assert!(stderr_lines.next().unwrap().contains("Restarting")); + assert!(stderr_lines.next().unwrap().contains("error:")); + wait_for_process_failed("Process", &mut stderr_lines); + + // Then restore the file + std::fs::write( + &file_to_watch, + "import { foo } from './another_file.js'; console.log(foo);", + ) + .expect("error writing file"); + std::thread::sleep(std::time::Duration::from_secs(1)); + assert!(stderr_lines.next().unwrap().contains("Restarting")); + assert!(stdout_lines.next().unwrap().contains("42")); + wait_for_process_finished("Process", &mut stderr_lines); + + // Update the content of the imported file with invalid syntax + std::fs::write(&another_file, "syntax error ^^").expect("error writing file"); + std::thread::sleep(std::time::Duration::from_secs(1)); + assert!(stderr_lines.next().unwrap().contains("Restarting")); + assert!(stderr_lines.next().unwrap().contains("error:")); + wait_for_process_failed("Process", &mut stderr_lines); + + // Modify the imported file and make sure that restarting occurs + std::fs::write(&another_file, "export const foo = 'modified!';") + .expect("error writing file"); + std::thread::sleep(std::time::Duration::from_secs(1)); + assert!(stderr_lines.next().unwrap().contains("Restarting")); + assert!(stdout_lines.next().unwrap().contains("modified!")); + wait_for_process_finished("Process", &mut stderr_lines); + + // the watcher process is still alive + assert!(child.try_wait().unwrap().is_none()); + + child.kill().unwrap(); + drop(t); +} + +/// Confirm that the watcher continues to work even if module resolution fails at the *first* attempt +#[test] +fn run_watch_not_exit() { + let t = TempDir::new().expect("tempdir fail"); + let file_to_watch = t.path().join("file_to_watch.js"); + std::fs::write(&file_to_watch, "syntax error ^^") + .expect("error writing file"); + + let mut child = util::deno_cmd() + .current_dir(util::root_path()) + .arg("run") + .arg("--watch") + .arg("--unstable") + .arg(&file_to_watch) + .env("NO_COLOR", "1") + .stdout(std::process::Stdio::piped()) + .stderr(std::process::Stdio::piped()) + .spawn() + .expect("failed to spawn script"); + + let stdout = child.stdout.as_mut().unwrap(); + let mut stdout_lines = + std::io::BufReader::new(stdout).lines().map(|r| r.unwrap()); + let stderr = child.stderr.as_mut().unwrap(); + let mut stderr_lines = + std::io::BufReader::new(stderr).lines().map(|r| r.unwrap()); + + std::thread::sleep(std::time::Duration::from_secs(1)); + assert!(stderr_lines.next().unwrap().contains("error:")); + assert!(stderr_lines.next().unwrap().contains("Process failed")); + + // Make sure the watcher actually restarts and works fine with the proper syntax + std::fs::write(&file_to_watch, "console.log(42);") + .expect("error writing file"); + std::thread::sleep(std::time::Duration::from_secs(1)); + assert!(stderr_lines.next().unwrap().contains("Restarting")); + assert!(stdout_lines.next().unwrap().contains("42")); + wait_for_process_finished("Process", &mut stderr_lines); + + // the watcher process is still alive + assert!(child.try_wait().unwrap().is_none()); + + child.kill().unwrap(); + drop(t); +} + +#[test] +fn run_watch_with_import_map_and_relative_paths() { + fn create_relative_tmp_file( + directory: &TempDir, + filename: &'static str, + filecontent: &'static str, + ) -> std::path::PathBuf { + let absolute_path = directory.path().join(filename); + std::fs::write(&absolute_path, filecontent).expect("error writing file"); + let relative_path = absolute_path + .strip_prefix(util::root_path()) + .expect("unable to create relative temporary file") + .to_owned(); + assert!(relative_path.is_relative()); + relative_path + } + let temp_directory = + TempDir::new_in(util::root_path()).expect("tempdir fail"); + let file_to_watch = create_relative_tmp_file( + &temp_directory, + "file_to_watch.js", + "console.log('Hello world');", + ); + let import_map_path = create_relative_tmp_file( + &temp_directory, + "import_map.json", + "{\"imports\": {}}", + ); + + let mut child = util::deno_cmd() + .current_dir(util::root_path()) + .arg("run") + .arg("--unstable") + .arg("--watch") + .arg("--import-map") + .arg(&import_map_path) + .arg(&file_to_watch) + .env("NO_COLOR", "1") + .stdout(std::process::Stdio::piped()) + .stderr(std::process::Stdio::piped()) + .spawn() + .expect("failed to spawn script"); + + let stdout = child.stdout.as_mut().unwrap(); + let mut stdout_lines = + std::io::BufReader::new(stdout).lines().map(|r| r.unwrap()); + let stderr = child.stderr.as_mut().unwrap(); + let mut stderr_lines = + std::io::BufReader::new(stderr).lines().map(|r| r.unwrap()); + + assert!(stderr_lines.next().unwrap().contains("Process finished")); + assert!(stdout_lines.next().unwrap().contains("Hello world")); + + child.kill().unwrap(); + + drop(file_to_watch); + drop(import_map_path); + temp_directory.close().unwrap(); +} + +// TODO(bartlomieju): flaky (https://github.com/denoland/deno/issues/10552) +#[ignore] +#[test] +fn test_watch() { + macro_rules! assert_contains { + ($string:expr, $($test:expr),+) => { + let string = $string; // This might be a function call or something + if !($(string.contains($test))||+) { + panic!("{:?} does not contain any of {:?}", string, [$($test),+]); + } + } + } + + let t = TempDir::new().expect("tempdir fail"); + + let mut child = util::deno_cmd() + .current_dir(util::root_path()) + .arg("test") + .arg("--watch") + .arg("--unstable") + .arg("--no-check") + .arg(&t.path()) + .env("NO_COLOR", "1") + .stdout(std::process::Stdio::piped()) + .stderr(std::process::Stdio::piped()) + .spawn() + .expect("failed to spawn script"); + + let stdout = child.stdout.as_mut().unwrap(); + let mut stdout_lines = + std::io::BufReader::new(stdout).lines().map(|r| r.unwrap()); + let stderr = child.stderr.as_mut().unwrap(); + let mut stderr_lines = + std::io::BufReader::new(stderr).lines().map(|r| r.unwrap()); + + assert_contains!( + stdout_lines.next().unwrap(), + "No matching test modules found" + ); + wait_for_process_finished("Test", &mut stderr_lines); + + let foo_file = t.path().join("foo.js"); + let bar_file = t.path().join("bar.js"); + let foo_test = t.path().join("foo_test.js"); + let bar_test = t.path().join("bar_test.js"); + std::fs::write(&foo_file, "export default function foo() { 1 + 1 }") + .expect("error writing file"); + std::fs::write(&bar_file, "export default function bar() { 2 + 2 }") + .expect("error writing file"); + std::fs::write( + &foo_test, + "import foo from './foo.js'; Deno.test('foo', foo);", + ) + .expect("error writing file"); + std::fs::write( + &bar_test, + "import bar from './bar.js'; Deno.test('bar', bar);", + ) + .expect("error writing file"); + + assert_contains!(stdout_lines.next().unwrap(), "running 1 test"); + assert_contains!(stdout_lines.next().unwrap(), "foo", "bar"); + assert_contains!(stdout_lines.next().unwrap(), "running 1 test"); + assert_contains!(stdout_lines.next().unwrap(), "foo", "bar"); + stdout_lines.next(); + stdout_lines.next(); + stdout_lines.next(); + wait_for_process_finished("Test", &mut stderr_lines); + + // Change content of the file + std::fs::write( + &foo_test, + "import foo from './foo.js'; Deno.test('foobar', foo);", + ) + .expect("error writing file"); + + assert_contains!(stderr_lines.next().unwrap(), "Restarting"); + assert_contains!(stdout_lines.next().unwrap(), "running 1 test"); + assert_contains!(stdout_lines.next().unwrap(), "foobar"); + stdout_lines.next(); + stdout_lines.next(); + stdout_lines.next(); + wait_for_process_finished("Test", &mut stderr_lines); + + // Add test + let another_test = t.path().join("new_test.js"); + std::fs::write(&another_test, "Deno.test('another one', () => 3 + 3)") + .expect("error writing file"); + assert_contains!(stderr_lines.next().unwrap(), "Restarting"); + assert_contains!(stdout_lines.next().unwrap(), "running 1 test"); + assert_contains!(stdout_lines.next().unwrap(), "another one"); + stdout_lines.next(); + stdout_lines.next(); + stdout_lines.next(); + wait_for_process_finished("Test", &mut stderr_lines); + + // Confirm that restarting occurs when a new file is updated + std::fs::write(&another_test, "Deno.test('another one', () => 3 + 3); Deno.test('another another one', () => 4 + 4)") + .expect("error writing file"); + assert_contains!(stderr_lines.next().unwrap(), "Restarting"); + assert_contains!(stdout_lines.next().unwrap(), "running 2 tests"); + assert_contains!(stdout_lines.next().unwrap(), "another one"); + assert_contains!(stdout_lines.next().unwrap(), "another another one"); + stdout_lines.next(); + stdout_lines.next(); + stdout_lines.next(); + wait_for_process_finished("Test", &mut stderr_lines); + + // Confirm that the watcher keeps on working even if the file is updated and has invalid syntax + std::fs::write(&another_test, "syntax error ^^").expect("error writing file"); + assert_contains!(stderr_lines.next().unwrap(), "Restarting"); + assert_contains!(stderr_lines.next().unwrap(), "error:"); + assert_contains!(stderr_lines.next().unwrap(), "Test failed"); + + // Then restore the file + std::fs::write(&another_test, "Deno.test('another one', () => 3 + 3)") + .expect("error writing file"); + assert_contains!(stderr_lines.next().unwrap(), "Restarting"); + assert_contains!(stdout_lines.next().unwrap(), "running 1 test"); + assert_contains!(stdout_lines.next().unwrap(), "another one"); + stdout_lines.next(); + stdout_lines.next(); + stdout_lines.next(); + wait_for_process_finished("Test", &mut stderr_lines); + + // Confirm that the watcher keeps on working even if the file is updated and the test fails + // This also confirms that it restarts when dependencies change + std::fs::write( + &foo_file, + "export default function foo() { throw new Error('Whoops!'); }", + ) + .expect("error writing file"); + assert_contains!(stderr_lines.next().unwrap(), "Restarting"); + assert_contains!(stdout_lines.next().unwrap(), "running 1 test"); + assert_contains!(stdout_lines.next().unwrap(), "FAILED"); + while !stdout_lines.next().unwrap().contains("test result") {} + stdout_lines.next(); + wait_for_process_finished("Test", &mut stderr_lines); + + // Then restore the file + std::fs::write(&foo_file, "export default function foo() { 1 + 1 }") + .expect("error writing file"); + assert_contains!(stderr_lines.next().unwrap(), "Restarting"); + assert_contains!(stdout_lines.next().unwrap(), "running 1 test"); + assert_contains!(stdout_lines.next().unwrap(), "foo"); + stdout_lines.next(); + stdout_lines.next(); + stdout_lines.next(); + wait_for_process_finished("Test", &mut stderr_lines); + + // Test that circular dependencies work fine + std::fs::write( + &foo_file, + "import './bar.js'; export default function foo() { 1 + 1 }", + ) + .expect("error writing file"); + std::fs::write( + &bar_file, + "import './foo.js'; export default function bar() { 2 + 2 }", + ) + .expect("error writing file"); + + // the watcher process is still alive + assert!(child.try_wait().unwrap().is_none()); + + child.kill().unwrap(); + drop(t); +} diff --git a/cli/tests/integration/worker_tests.rs b/cli/tests/integration/worker_tests.rs new file mode 100644 index 0000000000..45727813c6 --- /dev/null +++ b/cli/tests/integration/worker_tests.rs @@ -0,0 +1,102 @@ +// Copyright 2018-2021 the Deno authors. All rights reserved. MIT license. + +use crate::itest; +use test_util as util; + +#[test] +fn workers() { + let _g = util::http_server(); + let status = util::deno_cmd() + .current_dir(util::tests_path()) + .arg("test") + .arg("--reload") + .arg("--location") + .arg("http://127.0.0.1:4545/cli/tests/") + .arg("--allow-net") + .arg("--allow-read") + .arg("--unstable") + .arg("workers/test.ts") + .spawn() + .unwrap() + .wait() + .unwrap(); + assert!(status.success()); +} + +itest!(worker_error { + args: "run -A workers/worker_error.ts", + output: "workers/worker_error.ts.out", + exit_code: 1, +}); + +itest!(worker_nested_error { + args: "run -A workers/worker_nested_error.ts", + output: "workers/worker_nested_error.ts.out", + exit_code: 1, +}); + +itest!(nonexistent_worker { + args: "run --allow-read workers/nonexistent_worker.ts", + output: "workers/nonexistent_worker.out", + exit_code: 1, +}); + +itest!(_084_worker_custom_inspect { + args: "run --allow-read 084_worker_custom_inspect.ts", + output: "084_worker_custom_inspect.ts.out", +}); + +itest!(error_worker_permissions_local { + args: "run --reload error_worker_permissions_local.ts", + output: "error_worker_permissions_local.ts.out", + exit_code: 1, +}); + +itest!(error_worker_permissions_remote { + args: "run --reload error_worker_permissions_remote.ts", + http_server: true, + output: "error_worker_permissions_remote.ts.out", + exit_code: 1, +}); + +itest!(worker_permissions_remote_remote { + args: "run --quiet --reload --allow-net=localhost:4545 workers/permissions_remote_remote.ts", + output: "workers/permissions_remote_remote.ts.out", + http_server: true, + exit_code: 1, +}); + +itest!(worker_permissions_dynamic_remote { + args: "run --quiet --reload --allow-net --unstable workers/permissions_dynamic_remote.ts", + output: "workers/permissions_dynamic_remote.ts.out", + http_server: true, + exit_code: 1, +}); + +itest!(worker_permissions_data_remote { + args: "run --quiet --reload --allow-net=localhost:4545 workers/permissions_data_remote.ts", + output: "workers/permissions_data_remote.ts.out", + http_server: true, + exit_code: 1, +}); + +itest!(worker_permissions_blob_remote { + args: "run --quiet --reload --allow-net=localhost:4545 workers/permissions_blob_remote.ts", + output: "workers/permissions_blob_remote.ts.out", + http_server: true, + exit_code: 1, +}); + +itest!(worker_permissions_data_local { + args: "run --quiet --reload --allow-net=localhost:4545 workers/permissions_data_local.ts", + output: "workers/permissions_data_local.ts.out", + http_server: true, + exit_code: 1, +}); + +itest!(worker_permissions_blob_local { + args: "run --quiet --reload --allow-net=localhost:4545 workers/permissions_blob_local.ts", + output: "workers/permissions_blob_local.ts.out", + http_server: true, + exit_code: 1, +}); diff --git a/cli/tests/integration_tests.rs b/cli/tests/integration_tests.rs index d93c9ae1c1..368e96f949 100644 --- a/cli/tests/integration_tests.rs +++ b/cli/tests/integration_tests.rs @@ -1,5967 +1,6 @@ // Copyright 2018-2021 the Deno authors. All rights reserved. MIT license. -use deno_core::futures; -use deno_core::futures::prelude::*; -use deno_core::serde_json; -use deno_core::url; -use deno_runtime::deno_fetch::reqwest; -use deno_runtime::deno_websocket::tokio_tungstenite; -use deno_runtime::ops::tls::rustls; -use deno_runtime::ops::tls::webpki; -use deno_runtime::ops::tls::TlsStream; -use std::fs; -use std::io::BufReader; -use std::io::Cursor; -use std::io::{BufRead, Read, Write}; -use std::process::Command; -use std::sync::Arc; -use tempfile::TempDir; -use test_util as util; -use tokio::task::LocalSet; -#[test] -fn typecheck_declarations_ns() { - let status = util::deno_cmd() - .arg("test") - .arg("--doc") - .arg(util::root_path().join("cli/dts/lib.deno.ns.d.ts")) - .spawn() - .unwrap() - .wait() - .unwrap(); - assert!(status.success()); -} +// The tests exist in a sub folder instead of as separate files in +// this directory so that cargo doesn't compile each file as a new crate. -#[test] -fn typecheck_declarations_unstable() { - let status = util::deno_cmd() - .arg("test") - .arg("--doc") - .arg("--unstable") - .arg(util::root_path().join("cli/dts/lib.deno.unstable.d.ts")) - .spawn() - .unwrap() - .wait() - .unwrap(); - assert!(status.success()); -} - -#[test] -fn js_unit_tests_lint() { - let status = util::deno_cmd() - .arg("lint") - .arg("--unstable") - .arg(util::root_path().join("cli/tests/unit")) - .spawn() - .unwrap() - .wait() - .unwrap(); - assert!(status.success()); -} - -#[test] -fn js_unit_tests() { - let _g = util::http_server(); - - // Note that the unit tests are not safe for concurrency and must be run with a concurrency limit - // of one because there are some chdir tests in there. - // TODO(caspervonb) split these tests into two groups: parallel and serial. - let mut deno = util::deno_cmd() - .current_dir(util::root_path()) - .arg("test") - .arg("--unstable") - .arg("--location=http://js-unit-tests/foo/bar") - .arg("-A") - .arg("cli/tests/unit") - .spawn() - .expect("failed to spawn script"); - - let status = deno.wait().expect("failed to wait for the child process"); - assert_eq!(Some(0), status.code()); - assert!(status.success()); -} - -// resolve submodules from the current directory -// rather than the "integration" sub directory -#[path = ""] -mod integration { - use super::*; - - #[path = "tools/repl_tests.rs"] - mod repl; - - macro_rules! itest( - ($name:ident {$( $key:ident: $value:expr,)*}) => { - #[test] - fn $name() { - (util::CheckOutputIntegrationTest { - $( - $key: $value, - )* - .. Default::default() - }).run() - } - } -); - - #[test] - fn help_flag() { - let status = util::deno_cmd() - .current_dir(util::root_path()) - .arg("--help") - .spawn() - .unwrap() - .wait() - .unwrap(); - assert!(status.success()); - } - - #[test] - fn version_short_flag() { - let status = util::deno_cmd() - .current_dir(util::root_path()) - .arg("-V") - .spawn() - .unwrap() - .wait() - .unwrap(); - assert!(status.success()); - } - - #[test] - fn version_long_flag() { - let status = util::deno_cmd() - .current_dir(util::root_path()) - .arg("--version") - .spawn() - .unwrap() - .wait() - .unwrap(); - assert!(status.success()); - } - - #[test] - fn x_deno_warning() { - let _g = util::http_server(); - let output = util::deno_cmd() - .current_dir(util::root_path()) - .arg("run") - .arg("--reload") - .arg("http://127.0.0.1:4545/cli/tests/x_deno_warning.js") - .stdout(std::process::Stdio::piped()) - .stderr(std::process::Stdio::piped()) - .spawn() - .unwrap() - .wait_with_output() - .unwrap(); - assert!(output.status.success()); - let stdout_str = std::str::from_utf8(&output.stdout).unwrap().trim(); - let stderr_str = std::str::from_utf8(&output.stderr).unwrap().trim(); - assert_eq!("testing x-deno-warning header", stdout_str); - assert!(util::strip_ansi_codes(stderr_str).contains("Warning foobar")); - } - - #[test] - fn eval_p() { - let output = util::deno_cmd() - .arg("eval") - .arg("-p") - .arg("1+2") - .stdout(std::process::Stdio::piped()) - .spawn() - .unwrap() - .wait_with_output() - .unwrap(); - assert!(output.status.success()); - let stdout_str = util::strip_ansi_codes( - std::str::from_utf8(&output.stdout).unwrap().trim(), - ); - assert_eq!("3", stdout_str); - } - - #[test] - fn run_from_stdin() { - let mut deno = util::deno_cmd() - .current_dir(util::root_path()) - .arg("run") - .arg("-") - .stdout(std::process::Stdio::piped()) - .stdin(std::process::Stdio::piped()) - .spawn() - .unwrap(); - deno - .stdin - .as_mut() - .unwrap() - .write_all(b"console.log(\"Hello World\");") - .unwrap(); - let output = deno.wait_with_output().unwrap(); - assert!(output.status.success()); - - let deno_out = std::str::from_utf8(&output.stdout).unwrap().trim(); - assert_eq!("Hello World", deno_out); - - let mut deno = util::deno_cmd() - .current_dir(util::root_path()) - .arg("run") - .arg("-") - .stdout(std::process::Stdio::piped()) - .stdin(std::process::Stdio::piped()) - .spawn() - .unwrap(); - deno - .stdin - .as_mut() - .unwrap() - .write_all(b"console.log(\"Bye cached code\");") - .unwrap(); - let output = deno.wait_with_output().unwrap(); - assert!(output.status.success()); - - let deno_out = std::str::from_utf8(&output.stdout).unwrap().trim(); - assert_eq!("Bye cached code", deno_out); - } - - #[test] - fn no_color() { - let output = util::deno_cmd() - .current_dir(util::root_path()) - .arg("run") - .arg("cli/tests/no_color.js") - .env("NO_COLOR", "1") - .stdout(std::process::Stdio::piped()) - .spawn() - .unwrap() - .wait_with_output() - .unwrap(); - assert!(output.status.success()); - let stdout_str = std::str::from_utf8(&output.stdout).unwrap().trim(); - assert_eq!("noColor true", stdout_str); - - let output = util::deno_cmd() - .current_dir(util::root_path()) - .arg("run") - .arg("cli/tests/no_color.js") - .stdout(std::process::Stdio::piped()) - .spawn() - .unwrap() - .wait_with_output() - .unwrap(); - assert!(output.status.success()); - let stdout_str = std::str::from_utf8(&output.stdout).unwrap().trim(); - assert_eq!("noColor false", util::strip_ansi_codes(stdout_str)); - } - - #[test] - fn auth_tokens() { - let _g = util::http_server(); - let output = util::deno_cmd() - .current_dir(util::root_path()) - .arg("run") - .arg("http://127.0.0.1:4551/cli/tests/001_hello.js") - .stdout(std::process::Stdio::piped()) - .stderr(std::process::Stdio::piped()) - .spawn() - .unwrap() - .wait_with_output() - .unwrap(); - assert!(!output.status.success()); - let stdout_str = std::str::from_utf8(&output.stdout).unwrap().trim(); - assert!(stdout_str.is_empty()); - let stderr_str = std::str::from_utf8(&output.stderr).unwrap().trim(); - eprintln!("{}", stderr_str); - assert!(stderr_str.contains("Import 'http://127.0.0.1:4551/cli/tests/001_hello.js' failed: 404 Not Found")); - - let output = util::deno_cmd() - .current_dir(util::root_path()) - .arg("run") - .arg("http://127.0.0.1:4551/cli/tests/001_hello.js") - .env("DENO_AUTH_TOKENS", "abcdef123456789@127.0.0.1:4551") - .stdout(std::process::Stdio::piped()) - .stderr(std::process::Stdio::piped()) - .spawn() - .unwrap() - .wait_with_output() - .unwrap(); - assert!(output.status.success()); - let stdout_str = std::str::from_utf8(&output.stdout).unwrap().trim(); - assert_eq!(util::strip_ansi_codes(stdout_str), "Hello World"); - } - - #[cfg(unix)] - #[test] - pub fn test_raw_tty() { - use std::io::{Read, Write}; - use util::pty::fork::*; - - let deno_exe = util::deno_exe_path(); - let root_path = util::root_path(); - let fork = Fork::from_ptmx().unwrap(); - - if let Ok(mut master) = fork.is_parent() { - let mut obytes: [u8; 100] = [0; 100]; - let mut nread = master.read(&mut obytes).unwrap(); - assert_eq!(String::from_utf8_lossy(&obytes[0..nread]), "S"); - master.write_all(b"a").unwrap(); - nread = master.read(&mut obytes).unwrap(); - assert_eq!(String::from_utf8_lossy(&obytes[0..nread]), "A"); - master.write_all(b"b").unwrap(); - nread = master.read(&mut obytes).unwrap(); - assert_eq!(String::from_utf8_lossy(&obytes[0..nread]), "B"); - master.write_all(b"c").unwrap(); - nread = master.read(&mut obytes).unwrap(); - assert_eq!(String::from_utf8_lossy(&obytes[0..nread]), "C"); - fork.wait().unwrap(); - } else { - use nix::sys::termios; - use std::os::unix::io::AsRawFd; - - // Turn off echo such that parent is reading works properly. - let stdin_fd = std::io::stdin().as_raw_fd(); - let mut t = termios::tcgetattr(stdin_fd).unwrap(); - t.local_flags.remove(termios::LocalFlags::ECHO); - termios::tcsetattr(stdin_fd, termios::SetArg::TCSANOW, &t).unwrap(); - - std::env::set_current_dir(root_path).unwrap(); - let err = exec::Command::new(deno_exe) - .arg("run") - .arg("--unstable") - .arg("--quiet") - .arg("--no-check") - .arg("cli/tests/raw_mode.ts") - .exec(); - println!("err {}", err); - unreachable!() - } - } - - #[cfg(unix)] - #[test] - pub fn test_raw_tty_cbreak() { - use std::io::{Read, Write}; - use util::pty::fork::*; - let deno_exe = util::deno_exe_path(); - let root_path = util::root_path(); - let fork = Fork::from_ptmx().unwrap(); - - if let Ok(mut master) = fork.is_parent() { - let mut obytes: [u8; 100] = [0; 100]; - let mut nread = master.read(&mut obytes).unwrap(); - assert_eq!(String::from_utf8_lossy(&obytes[0..nread]), "S"); - master.write_all(&[3]).unwrap(); // send SIGINT - master.flush().unwrap(); - nread = master.read(&mut obytes).unwrap(); - assert_eq!(String::from_utf8_lossy(&obytes[0..nread]), "A"); - fork.wait().unwrap(); - } else { - // Keep echo enabled such that 'C^' would be printed in non-raw mode. - std::env::set_current_dir(root_path).unwrap(); - let err = exec::Command::new(deno_exe) - .arg("run") - .arg("--unstable") - .arg("--quiet") - .arg("--no-check") - .arg("cli/tests/raw_mode_cbreak.ts") - .exec(); - println!("err {}", err); - unreachable!() - } - } - - #[test] - fn deno_dir_test() { - use std::fs::remove_dir_all; - let _g = util::http_server(); - let deno_dir = TempDir::new().expect("tempdir fail"); - remove_dir_all(deno_dir.path()).unwrap(); - - // Run deno with no env flag - let status = util::deno_cmd() - .env_remove("DENO_DIR") - .current_dir(util::root_path()) - .arg("run") - .arg("http://localhost:4545/cli/tests/subdir/print_hello.ts") - .spawn() - .expect("Failed to spawn script") - .wait() - .expect("Failed to wait for child process"); - assert!(status.success()); - assert!(!deno_dir.path().exists()); - - // Run deno with DENO_DIR env flag - let status = util::deno_cmd() - .env("DENO_DIR", deno_dir.path()) - .current_dir(util::root_path()) - .arg("run") - .arg("http://localhost:4545/cli/tests/subdir/print_hello.ts") - .spawn() - .expect("Failed to spawn script") - .wait() - .expect("Failed to wait for child process"); - assert!(status.success()); - assert!(deno_dir.path().is_dir()); - assert!(deno_dir.path().join("deps").is_dir()); - assert!(deno_dir.path().join("gen").is_dir()); - - remove_dir_all(deno_dir.path()).unwrap(); - } - - #[test] - fn cache_test() { - let _g = util::http_server(); - let deno_dir = TempDir::new().expect("tempdir fail"); - let module_url = - url::Url::parse("http://localhost:4545/cli/tests/006_url_imports.ts") - .unwrap(); - let output = Command::new(util::deno_exe_path()) - .env("DENO_DIR", deno_dir.path()) - .current_dir(util::root_path()) - .arg("cache") - .arg("-L") - .arg("debug") - .arg(module_url.to_string()) - .output() - .expect("Failed to spawn script"); - assert!(output.status.success()); - - let out = std::str::from_utf8(&output.stderr).unwrap(); - // Check if file and dependencies are written successfully - assert!(out.contains("host.writeFile(\"deno://subdir/print_hello.js\")")); - assert!(out.contains("host.writeFile(\"deno://subdir/mod2.js\")")); - assert!(out.contains("host.writeFile(\"deno://006_url_imports.js\")")); - - let prg = util::deno_exe_path(); - let output = Command::new(&prg) - .env("DENO_DIR", deno_dir.path()) - .env("HTTP_PROXY", "http://nil") - .env("NO_COLOR", "1") - .current_dir(util::root_path()) - .arg("run") - .arg(module_url.to_string()) - .output() - .expect("Failed to spawn script"); - - let str_output = std::str::from_utf8(&output.stdout).unwrap(); - - let module_output_path = - util::root_path().join("cli/tests/006_url_imports.ts.out"); - let mut module_output = String::new(); - let mut module_output_file = fs::File::open(module_output_path).unwrap(); - module_output_file - .read_to_string(&mut module_output) - .unwrap(); - - assert_eq!(module_output, str_output); - } - - #[test] - fn cache_invalidation_test() { - let deno_dir = TempDir::new().expect("tempdir fail"); - let fixture_path = deno_dir.path().join("fixture.ts"); - { - let mut file = std::fs::File::create(fixture_path.clone()) - .expect("could not create fixture"); - file - .write_all(b"console.log(\"42\");") - .expect("could not write fixture"); - } - let output = Command::new(util::deno_exe_path()) - .env("DENO_DIR", deno_dir.path()) - .current_dir(util::root_path()) - .arg("run") - .arg(fixture_path.to_str().unwrap()) - .output() - .expect("Failed to spawn script"); - assert!(output.status.success()); - let actual = std::str::from_utf8(&output.stdout).unwrap(); - assert_eq!(actual, "42\n"); - { - let mut file = std::fs::File::create(fixture_path.clone()) - .expect("could not create fixture"); - file - .write_all(b"console.log(\"43\");") - .expect("could not write fixture"); - } - let output = Command::new(util::deno_exe_path()) - .env("DENO_DIR", deno_dir.path()) - .current_dir(util::root_path()) - .arg("run") - .arg(fixture_path.to_str().unwrap()) - .output() - .expect("Failed to spawn script"); - assert!(output.status.success()); - let actual = std::str::from_utf8(&output.stdout).unwrap(); - assert_eq!(actual, "43\n"); - } - - #[test] - fn cache_invalidation_test_no_check() { - let deno_dir = TempDir::new().expect("tempdir fail"); - let fixture_path = deno_dir.path().join("fixture.ts"); - { - let mut file = std::fs::File::create(fixture_path.clone()) - .expect("could not create fixture"); - file - .write_all(b"console.log(\"42\");") - .expect("could not write fixture"); - } - let output = Command::new(util::deno_exe_path()) - .env("DENO_DIR", deno_dir.path()) - .current_dir(util::root_path()) - .arg("run") - .arg("--no-check") - .arg(fixture_path.to_str().unwrap()) - .output() - .expect("Failed to spawn script"); - assert!(output.status.success()); - let actual = std::str::from_utf8(&output.stdout).unwrap(); - assert_eq!(actual, "42\n"); - { - let mut file = std::fs::File::create(fixture_path.clone()) - .expect("could not create fixture"); - file - .write_all(b"console.log(\"43\");") - .expect("could not write fixture"); - } - let output = Command::new(util::deno_exe_path()) - .env("DENO_DIR", deno_dir.path()) - .current_dir(util::root_path()) - .arg("run") - .arg("--no-check") - .arg(fixture_path.to_str().unwrap()) - .output() - .expect("Failed to spawn script"); - assert!(output.status.success()); - let actual = std::str::from_utf8(&output.stdout).unwrap(); - assert_eq!(actual, "43\n"); - } - - #[test] - fn fmt_test() { - let t = TempDir::new().expect("tempdir fail"); - let fixed_js = util::root_path().join("cli/tests/badly_formatted_fixed.js"); - let badly_formatted_original_js = - util::root_path().join("cli/tests/badly_formatted.mjs"); - let badly_formatted_js = t.path().join("badly_formatted.js"); - let badly_formatted_js_str = badly_formatted_js.to_str().unwrap(); - std::fs::copy(&badly_formatted_original_js, &badly_formatted_js) - .expect("Failed to copy file"); - - let fixed_md = util::root_path().join("cli/tests/badly_formatted_fixed.md"); - let badly_formatted_original_md = - util::root_path().join("cli/tests/badly_formatted.md"); - let badly_formatted_md = t.path().join("badly_formatted.md"); - let badly_formatted_md_str = badly_formatted_md.to_str().unwrap(); - std::fs::copy(&badly_formatted_original_md, &badly_formatted_md) - .expect("Failed to copy file"); - - let fixed_json = - util::root_path().join("cli/tests/badly_formatted_fixed.json"); - let badly_formatted_original_json = - util::root_path().join("cli/tests/badly_formatted.json"); - let badly_formatted_json = t.path().join("badly_formatted.json"); - let badly_formatted_json_str = badly_formatted_json.to_str().unwrap(); - std::fs::copy(&badly_formatted_original_json, &badly_formatted_json) - .expect("Failed to copy file"); - // First, check formatting by ignoring the badly formatted file. - let status = util::deno_cmd() - .current_dir(util::root_path()) - .arg("fmt") - .arg(format!( - "--ignore={},{},{}", - badly_formatted_js_str, - badly_formatted_md_str, - badly_formatted_json_str - )) - .arg("--check") - .arg(badly_formatted_js_str) - .arg(badly_formatted_md_str) - .arg(badly_formatted_json_str) - .spawn() - .expect("Failed to spawn script") - .wait() - .expect("Failed to wait for child process"); - // No target files found - assert!(!status.success()); - - // Check without ignore. - let status = util::deno_cmd() - .current_dir(util::root_path()) - .arg("fmt") - .arg("--check") - .arg(badly_formatted_js_str) - .arg(badly_formatted_md_str) - .arg(badly_formatted_json_str) - .spawn() - .expect("Failed to spawn script") - .wait() - .expect("Failed to wait for child process"); - assert!(!status.success()); - - // Format the source file. - let status = util::deno_cmd() - .current_dir(util::root_path()) - .arg("fmt") - .arg(badly_formatted_js_str) - .arg(badly_formatted_md_str) - .arg(badly_formatted_json_str) - .spawn() - .expect("Failed to spawn script") - .wait() - .expect("Failed to wait for child process"); - assert!(status.success()); - let expected_js = std::fs::read_to_string(fixed_js).unwrap(); - let expected_md = std::fs::read_to_string(fixed_md).unwrap(); - let expected_json = std::fs::read_to_string(fixed_json).unwrap(); - let actual_js = std::fs::read_to_string(badly_formatted_js).unwrap(); - let actual_md = std::fs::read_to_string(badly_formatted_md).unwrap(); - let actual_json = std::fs::read_to_string(badly_formatted_json).unwrap(); - assert_eq!(expected_js, actual_js); - assert_eq!(expected_md, actual_md); - assert_eq!(expected_json, actual_json); - } - - mod file_watcher { - use super::*; - - // Helper function to skip watcher output that contains "Restarting" - // phrase. - fn skip_restarting_line( - mut stderr_lines: impl Iterator, - ) -> String { - loop { - let msg = stderr_lines.next().unwrap(); - if !msg.contains("Restarting") { - return msg; - } - } - } - - /// Helper function to skip watcher output that doesn't contain - /// "{job_name} finished" phrase. - fn wait_for_process_finished( - job_name: &str, - stderr_lines: &mut impl Iterator, - ) { - let phrase = format!("{} finished", job_name); - loop { - let msg = stderr_lines.next().unwrap(); - if msg.contains(&phrase) { - break; - } - } - } - - /// Helper function to skip watcher output that doesn't contain - /// "{job_name} failed" phrase. - fn wait_for_process_failed( - job_name: &str, - stderr_lines: &mut impl Iterator, - ) { - let phrase = format!("{} failed", job_name); - loop { - let msg = stderr_lines.next().unwrap(); - if msg.contains(&phrase) { - break; - } - } - } - - #[test] - fn fmt_watch_test() { - let t = TempDir::new().expect("tempdir fail"); - let fixed = util::root_path().join("cli/tests/badly_formatted_fixed.js"); - let badly_formatted_original = - util::root_path().join("cli/tests/badly_formatted.mjs"); - let badly_formatted = t.path().join("badly_formatted.js"); - std::fs::copy(&badly_formatted_original, &badly_formatted) - .expect("Failed to copy file"); - - let mut child = util::deno_cmd() - .current_dir(util::root_path()) - .arg("fmt") - .arg(&badly_formatted) - .arg("--watch") - .arg("--unstable") - .stdout(std::process::Stdio::piped()) - .stderr(std::process::Stdio::piped()) - .spawn() - .expect("Failed to spawn script"); - let stderr = child.stderr.as_mut().unwrap(); - let stderr_lines = - std::io::BufReader::new(stderr).lines().map(|r| r.unwrap()); - - // TODO(lucacasonato): remove this timeout. It seems to be needed on Linux. - std::thread::sleep(std::time::Duration::from_secs(1)); - - assert!(skip_restarting_line(stderr_lines).contains("badly_formatted.js")); - - let expected = std::fs::read_to_string(fixed.clone()).unwrap(); - let actual = std::fs::read_to_string(badly_formatted.clone()).unwrap(); - assert_eq!(expected, actual); - - // Change content of the file again to be badly formatted - std::fs::copy(&badly_formatted_original, &badly_formatted) - .expect("Failed to copy file"); - std::thread::sleep(std::time::Duration::from_secs(1)); - - // Check if file has been automatically formatted by watcher - let expected = std::fs::read_to_string(fixed).unwrap(); - let actual = std::fs::read_to_string(badly_formatted).unwrap(); - assert_eq!(expected, actual); - - // the watcher process is still alive - assert!(child.try_wait().unwrap().is_none()); - - child.kill().unwrap(); - drop(t); - } - - #[test] - fn bundle_js_watch() { - use std::path::PathBuf; - // Test strategy extends this of test bundle_js by adding watcher - let t = TempDir::new().expect("tempdir fail"); - let file_to_watch = t.path().join("file_to_watch.js"); - std::fs::write(&file_to_watch, "console.log('Hello world');") - .expect("error writing file"); - assert!(file_to_watch.is_file()); - let t = TempDir::new().expect("tempdir fail"); - let bundle = t.path().join("mod6.bundle.js"); - let mut deno = util::deno_cmd() - .current_dir(util::root_path()) - .arg("bundle") - .arg(&file_to_watch) - .arg(&bundle) - .arg("--watch") - .arg("--unstable") - .env("NO_COLOR", "1") - .stdout(std::process::Stdio::piped()) - .stderr(std::process::Stdio::piped()) - .spawn() - .expect("failed to spawn script"); - - let stderr = deno.stderr.as_mut().unwrap(); - let mut stderr_lines = - std::io::BufReader::new(stderr).lines().map(|r| r.unwrap()); - - std::thread::sleep(std::time::Duration::from_secs(1)); - assert!(stderr_lines.next().unwrap().contains("file_to_watch.js")); - assert!(stderr_lines.next().unwrap().contains("mod6.bundle.js")); - let file = PathBuf::from(&bundle); - assert!(file.is_file()); - wait_for_process_finished("Bundle", &mut stderr_lines); - - std::fs::write(&file_to_watch, "console.log('Hello world2');") - .expect("error writing file"); - std::thread::sleep(std::time::Duration::from_secs(1)); - assert!(stderr_lines - .next() - .unwrap() - .contains("File change detected!")); - assert!(stderr_lines.next().unwrap().contains("file_to_watch.js")); - assert!(stderr_lines.next().unwrap().contains("mod6.bundle.js")); - let file = PathBuf::from(&bundle); - assert!(file.is_file()); - wait_for_process_finished("Bundle", &mut stderr_lines); - - // Confirm that the watcher keeps on working even if the file is updated and has invalid syntax - std::fs::write(&file_to_watch, "syntax error ^^") - .expect("error writing file"); - std::thread::sleep(std::time::Duration::from_secs(1)); - assert!(stderr_lines - .next() - .unwrap() - .contains("File change detected!")); - assert!(stderr_lines.next().unwrap().contains("error: ")); - wait_for_process_failed("Bundle", &mut stderr_lines); - - // the watcher process is still alive - assert!(deno.try_wait().unwrap().is_none()); - - deno.kill().unwrap(); - drop(t); - } - - /// Confirm that the watcher continues to work even if module resolution fails at the *first* attempt - #[test] - fn bundle_watch_not_exit() { - let t = TempDir::new().expect("tempdir fail"); - let file_to_watch = t.path().join("file_to_watch.js"); - std::fs::write(&file_to_watch, "syntax error ^^") - .expect("error writing file"); - let target_file = t.path().join("target.js"); - - let mut deno = util::deno_cmd() - .current_dir(util::root_path()) - .arg("bundle") - .arg(&file_to_watch) - .arg(&target_file) - .arg("--watch") - .arg("--unstable") - .env("NO_COLOR", "1") - .stdout(std::process::Stdio::piped()) - .stderr(std::process::Stdio::piped()) - .spawn() - .expect("failed to spawn script"); - - let stderr = deno.stderr.as_mut().unwrap(); - let mut stderr_lines = - std::io::BufReader::new(stderr).lines().map(|r| r.unwrap()); - - std::thread::sleep(std::time::Duration::from_secs(1)); - assert!(stderr_lines.next().unwrap().contains("error:")); - assert!(stderr_lines.next().unwrap().contains("Bundle failed")); - // the target file hasn't been created yet - assert!(!target_file.is_file()); - - // Make sure the watcher actually restarts and works fine with the proper syntax - std::fs::write(&file_to_watch, "console.log(42);") - .expect("error writing file"); - std::thread::sleep(std::time::Duration::from_secs(1)); - assert!(stderr_lines - .next() - .unwrap() - .contains("File change detected!")); - assert!(stderr_lines.next().unwrap().contains("file_to_watch.js")); - assert!(stderr_lines.next().unwrap().contains("target.js")); - wait_for_process_finished("Bundle", &mut stderr_lines); - // bundled file is created - assert!(target_file.is_file()); - - // the watcher process is still alive - assert!(deno.try_wait().unwrap().is_none()); - - deno.kill().unwrap(); - drop(t); - } - - #[test] - fn run_watch() { - let t = TempDir::new().expect("tempdir fail"); - let file_to_watch = t.path().join("file_to_watch.js"); - std::fs::write(&file_to_watch, "console.log('Hello world');") - .expect("error writing file"); - - let mut child = util::deno_cmd() - .current_dir(util::root_path()) - .arg("run") - .arg("--watch") - .arg("--unstable") - .arg(&file_to_watch) - .env("NO_COLOR", "1") - .stdout(std::process::Stdio::piped()) - .stderr(std::process::Stdio::piped()) - .spawn() - .expect("failed to spawn script"); - - let stdout = child.stdout.as_mut().unwrap(); - let mut stdout_lines = - std::io::BufReader::new(stdout).lines().map(|r| r.unwrap()); - let stderr = child.stderr.as_mut().unwrap(); - let mut stderr_lines = - std::io::BufReader::new(stderr).lines().map(|r| r.unwrap()); - - assert!(stdout_lines.next().unwrap().contains("Hello world")); - wait_for_process_finished("Process", &mut stderr_lines); - - // TODO(lucacasonato): remove this timeout. It seems to be needed on Linux. - std::thread::sleep(std::time::Duration::from_secs(1)); - - // Change content of the file - std::fs::write(&file_to_watch, "console.log('Hello world2');") - .expect("error writing file"); - // Events from the file watcher is "debounced", so we need to wait for the next execution to start - std::thread::sleep(std::time::Duration::from_secs(1)); - - assert!(stderr_lines.next().unwrap().contains("Restarting")); - assert!(stdout_lines.next().unwrap().contains("Hello world2")); - wait_for_process_finished("Process", &mut stderr_lines); - - // Add dependency - let another_file = t.path().join("another_file.js"); - std::fs::write(&another_file, "export const foo = 0;") - .expect("error writing file"); - std::fs::write( - &file_to_watch, - "import { foo } from './another_file.js'; console.log(foo);", - ) - .expect("error writing file"); - std::thread::sleep(std::time::Duration::from_secs(1)); - assert!(stderr_lines.next().unwrap().contains("Restarting")); - assert!(stdout_lines.next().unwrap().contains('0')); - wait_for_process_finished("Process", &mut stderr_lines); - - // Confirm that restarting occurs when a new file is updated - std::fs::write(&another_file, "export const foo = 42;") - .expect("error writing file"); - std::thread::sleep(std::time::Duration::from_secs(1)); - assert!(stderr_lines.next().unwrap().contains("Restarting")); - assert!(stdout_lines.next().unwrap().contains("42")); - wait_for_process_finished("Process", &mut stderr_lines); - - // Confirm that the watcher keeps on working even if the file is updated and has invalid syntax - std::fs::write(&file_to_watch, "syntax error ^^") - .expect("error writing file"); - std::thread::sleep(std::time::Duration::from_secs(1)); - assert!(stderr_lines.next().unwrap().contains("Restarting")); - assert!(stderr_lines.next().unwrap().contains("error:")); - wait_for_process_failed("Process", &mut stderr_lines); - - // Then restore the file - std::fs::write( - &file_to_watch, - "import { foo } from './another_file.js'; console.log(foo);", - ) - .expect("error writing file"); - std::thread::sleep(std::time::Duration::from_secs(1)); - assert!(stderr_lines.next().unwrap().contains("Restarting")); - assert!(stdout_lines.next().unwrap().contains("42")); - wait_for_process_finished("Process", &mut stderr_lines); - - // Update the content of the imported file with invalid syntax - std::fs::write(&another_file, "syntax error ^^") - .expect("error writing file"); - std::thread::sleep(std::time::Duration::from_secs(1)); - assert!(stderr_lines.next().unwrap().contains("Restarting")); - assert!(stderr_lines.next().unwrap().contains("error:")); - wait_for_process_failed("Process", &mut stderr_lines); - - // Modify the imported file and make sure that restarting occurs - std::fs::write(&another_file, "export const foo = 'modified!';") - .expect("error writing file"); - std::thread::sleep(std::time::Duration::from_secs(1)); - assert!(stderr_lines.next().unwrap().contains("Restarting")); - assert!(stdout_lines.next().unwrap().contains("modified!")); - wait_for_process_finished("Process", &mut stderr_lines); - - // the watcher process is still alive - assert!(child.try_wait().unwrap().is_none()); - - child.kill().unwrap(); - drop(t); - } - - /// Confirm that the watcher continues to work even if module resolution fails at the *first* attempt - #[test] - fn run_watch_not_exit() { - let t = TempDir::new().expect("tempdir fail"); - let file_to_watch = t.path().join("file_to_watch.js"); - std::fs::write(&file_to_watch, "syntax error ^^") - .expect("error writing file"); - - let mut child = util::deno_cmd() - .current_dir(util::root_path()) - .arg("run") - .arg("--watch") - .arg("--unstable") - .arg(&file_to_watch) - .env("NO_COLOR", "1") - .stdout(std::process::Stdio::piped()) - .stderr(std::process::Stdio::piped()) - .spawn() - .expect("failed to spawn script"); - - let stdout = child.stdout.as_mut().unwrap(); - let mut stdout_lines = - std::io::BufReader::new(stdout).lines().map(|r| r.unwrap()); - let stderr = child.stderr.as_mut().unwrap(); - let mut stderr_lines = - std::io::BufReader::new(stderr).lines().map(|r| r.unwrap()); - - std::thread::sleep(std::time::Duration::from_secs(1)); - assert!(stderr_lines.next().unwrap().contains("error:")); - assert!(stderr_lines.next().unwrap().contains("Process failed")); - - // Make sure the watcher actually restarts and works fine with the proper syntax - std::fs::write(&file_to_watch, "console.log(42);") - .expect("error writing file"); - std::thread::sleep(std::time::Duration::from_secs(1)); - assert!(stderr_lines.next().unwrap().contains("Restarting")); - assert!(stdout_lines.next().unwrap().contains("42")); - wait_for_process_finished("Process", &mut stderr_lines); - - // the watcher process is still alive - assert!(child.try_wait().unwrap().is_none()); - - child.kill().unwrap(); - drop(t); - } - - #[test] - fn run_watch_with_import_map_and_relative_paths() { - fn create_relative_tmp_file( - directory: &TempDir, - filename: &'static str, - filecontent: &'static str, - ) -> std::path::PathBuf { - let absolute_path = directory.path().join(filename); - std::fs::write(&absolute_path, filecontent) - .expect("error writing file"); - let relative_path = absolute_path - .strip_prefix(util::root_path()) - .expect("unable to create relative temporary file") - .to_owned(); - assert!(relative_path.is_relative()); - relative_path - } - let temp_directory = - TempDir::new_in(util::root_path()).expect("tempdir fail"); - let file_to_watch = create_relative_tmp_file( - &temp_directory, - "file_to_watch.js", - "console.log('Hello world');", - ); - let import_map_path = create_relative_tmp_file( - &temp_directory, - "import_map.json", - "{\"imports\": {}}", - ); - - let mut child = util::deno_cmd() - .current_dir(util::root_path()) - .arg("run") - .arg("--unstable") - .arg("--watch") - .arg("--import-map") - .arg(&import_map_path) - .arg(&file_to_watch) - .env("NO_COLOR", "1") - .stdout(std::process::Stdio::piped()) - .stderr(std::process::Stdio::piped()) - .spawn() - .expect("failed to spawn script"); - - let stdout = child.stdout.as_mut().unwrap(); - let mut stdout_lines = - std::io::BufReader::new(stdout).lines().map(|r| r.unwrap()); - let stderr = child.stderr.as_mut().unwrap(); - let mut stderr_lines = - std::io::BufReader::new(stderr).lines().map(|r| r.unwrap()); - - assert!(stderr_lines.next().unwrap().contains("Process finished")); - assert!(stdout_lines.next().unwrap().contains("Hello world")); - - child.kill().unwrap(); - - drop(file_to_watch); - drop(import_map_path); - temp_directory.close().unwrap(); - } - - // TODO(bartlomieju): flaky (https://github.com/denoland/deno/issues/10552) - #[ignore] - #[test] - fn test_watch() { - macro_rules! assert_contains { - ($string:expr, $($test:expr),+) => { - let string = $string; // This might be a function call or something - if !($(string.contains($test))||+) { - panic!("{:?} does not contain any of {:?}", string, [$($test),+]); - } - } - } - - let t = TempDir::new().expect("tempdir fail"); - - let mut child = util::deno_cmd() - .current_dir(util::root_path()) - .arg("test") - .arg("--watch") - .arg("--unstable") - .arg("--no-check") - .arg(&t.path()) - .env("NO_COLOR", "1") - .stdout(std::process::Stdio::piped()) - .stderr(std::process::Stdio::piped()) - .spawn() - .expect("failed to spawn script"); - - let stdout = child.stdout.as_mut().unwrap(); - let mut stdout_lines = - std::io::BufReader::new(stdout).lines().map(|r| r.unwrap()); - let stderr = child.stderr.as_mut().unwrap(); - let mut stderr_lines = - std::io::BufReader::new(stderr).lines().map(|r| r.unwrap()); - - assert_contains!( - stdout_lines.next().unwrap(), - "No matching test modules found" - ); - wait_for_process_finished("Test", &mut stderr_lines); - - let foo_file = t.path().join("foo.js"); - let bar_file = t.path().join("bar.js"); - let foo_test = t.path().join("foo_test.js"); - let bar_test = t.path().join("bar_test.js"); - std::fs::write(&foo_file, "export default function foo() { 1 + 1 }") - .expect("error writing file"); - std::fs::write(&bar_file, "export default function bar() { 2 + 2 }") - .expect("error writing file"); - std::fs::write( - &foo_test, - "import foo from './foo.js'; Deno.test('foo', foo);", - ) - .expect("error writing file"); - std::fs::write( - &bar_test, - "import bar from './bar.js'; Deno.test('bar', bar);", - ) - .expect("error writing file"); - - assert_contains!(stdout_lines.next().unwrap(), "running 1 test"); - assert_contains!(stdout_lines.next().unwrap(), "foo", "bar"); - assert_contains!(stdout_lines.next().unwrap(), "running 1 test"); - assert_contains!(stdout_lines.next().unwrap(), "foo", "bar"); - stdout_lines.next(); - stdout_lines.next(); - stdout_lines.next(); - wait_for_process_finished("Test", &mut stderr_lines); - - // Change content of the file - std::fs::write( - &foo_test, - "import foo from './foo.js'; Deno.test('foobar', foo);", - ) - .expect("error writing file"); - - assert_contains!(stderr_lines.next().unwrap(), "Restarting"); - assert_contains!(stdout_lines.next().unwrap(), "running 1 test"); - assert_contains!(stdout_lines.next().unwrap(), "foobar"); - stdout_lines.next(); - stdout_lines.next(); - stdout_lines.next(); - wait_for_process_finished("Test", &mut stderr_lines); - - // Add test - let another_test = t.path().join("new_test.js"); - std::fs::write(&another_test, "Deno.test('another one', () => 3 + 3)") - .expect("error writing file"); - assert_contains!(stderr_lines.next().unwrap(), "Restarting"); - assert_contains!(stdout_lines.next().unwrap(), "running 1 test"); - assert_contains!(stdout_lines.next().unwrap(), "another one"); - stdout_lines.next(); - stdout_lines.next(); - stdout_lines.next(); - wait_for_process_finished("Test", &mut stderr_lines); - - // Confirm that restarting occurs when a new file is updated - std::fs::write(&another_test, "Deno.test('another one', () => 3 + 3); Deno.test('another another one', () => 4 + 4)") - .expect("error writing file"); - assert_contains!(stderr_lines.next().unwrap(), "Restarting"); - assert_contains!(stdout_lines.next().unwrap(), "running 2 tests"); - assert_contains!(stdout_lines.next().unwrap(), "another one"); - assert_contains!(stdout_lines.next().unwrap(), "another another one"); - stdout_lines.next(); - stdout_lines.next(); - stdout_lines.next(); - wait_for_process_finished("Test", &mut stderr_lines); - - // Confirm that the watcher keeps on working even if the file is updated and has invalid syntax - std::fs::write(&another_test, "syntax error ^^") - .expect("error writing file"); - assert_contains!(stderr_lines.next().unwrap(), "Restarting"); - assert_contains!(stderr_lines.next().unwrap(), "error:"); - assert_contains!(stderr_lines.next().unwrap(), "Test failed"); - - // Then restore the file - std::fs::write(&another_test, "Deno.test('another one', () => 3 + 3)") - .expect("error writing file"); - assert_contains!(stderr_lines.next().unwrap(), "Restarting"); - assert_contains!(stdout_lines.next().unwrap(), "running 1 test"); - assert_contains!(stdout_lines.next().unwrap(), "another one"); - stdout_lines.next(); - stdout_lines.next(); - stdout_lines.next(); - wait_for_process_finished("Test", &mut stderr_lines); - - // Confirm that the watcher keeps on working even if the file is updated and the test fails - // This also confirms that it restarts when dependencies change - std::fs::write( - &foo_file, - "export default function foo() { throw new Error('Whoops!'); }", - ) - .expect("error writing file"); - assert_contains!(stderr_lines.next().unwrap(), "Restarting"); - assert_contains!(stdout_lines.next().unwrap(), "running 1 test"); - assert_contains!(stdout_lines.next().unwrap(), "FAILED"); - while !stdout_lines.next().unwrap().contains("test result") {} - stdout_lines.next(); - wait_for_process_finished("Test", &mut stderr_lines); - - // Then restore the file - std::fs::write(&foo_file, "export default function foo() { 1 + 1 }") - .expect("error writing file"); - assert_contains!(stderr_lines.next().unwrap(), "Restarting"); - assert_contains!(stdout_lines.next().unwrap(), "running 1 test"); - assert_contains!(stdout_lines.next().unwrap(), "foo"); - stdout_lines.next(); - stdout_lines.next(); - stdout_lines.next(); - wait_for_process_finished("Test", &mut stderr_lines); - - // Test that circular dependencies work fine - std::fs::write( - &foo_file, - "import './bar.js'; export default function foo() { 1 + 1 }", - ) - .expect("error writing file"); - std::fs::write( - &bar_file, - "import './foo.js'; export default function bar() { 2 + 2 }", - ) - .expect("error writing file"); - - // the watcher process is still alive - assert!(child.try_wait().unwrap().is_none()); - - child.kill().unwrap(); - drop(t); - } - } - - #[test] - fn fmt_stdin_error() { - use std::io::Write; - let mut deno = util::deno_cmd() - .current_dir(util::root_path()) - .arg("fmt") - .arg("-") - .stdin(std::process::Stdio::piped()) - .stdout(std::process::Stdio::piped()) - .stderr(std::process::Stdio::piped()) - .spawn() - .unwrap(); - let stdin = deno.stdin.as_mut().unwrap(); - let invalid_js = b"import { example }"; - stdin.write_all(invalid_js).unwrap(); - let output = deno.wait_with_output().unwrap(); - // Error message might change. Just check stdout empty, stderr not. - assert!(output.stdout.is_empty()); - assert!(!output.stderr.is_empty()); - assert!(!output.status.success()); - } - - // Warning: this test requires internet access. - // TODO(#7412): reenable. test is flaky - #[test] - #[ignore] - fn upgrade_in_tmpdir() { - let temp_dir = TempDir::new().unwrap(); - let exe_path = temp_dir.path().join("deno"); - let _ = std::fs::copy(util::deno_exe_path(), &exe_path).unwrap(); - assert!(exe_path.exists()); - let _mtime1 = std::fs::metadata(&exe_path).unwrap().modified().unwrap(); - let status = Command::new(&exe_path) - .arg("upgrade") - .arg("--force") - .spawn() - .unwrap() - .wait() - .unwrap(); - assert!(status.success()); - let _mtime2 = std::fs::metadata(&exe_path).unwrap().modified().unwrap(); - // TODO(ry) assert!(mtime1 < mtime2); - } - - // Warning: this test requires internet access. - // TODO(#7412): reenable. test is flaky - #[test] - #[ignore] - fn upgrade_with_space_in_path() { - let temp_dir = tempfile::Builder::new() - .prefix("directory with spaces") - .tempdir() - .unwrap(); - let exe_path = temp_dir.path().join("deno"); - let _ = std::fs::copy(util::deno_exe_path(), &exe_path).unwrap(); - assert!(exe_path.exists()); - let status = Command::new(&exe_path) - .arg("upgrade") - .arg("--force") - .env("TMP", temp_dir.path()) - .spawn() - .unwrap() - .wait() - .unwrap(); - assert!(status.success()); - } - - // Warning: this test requires internet access. - // TODO(#7412): reenable. test is flaky - #[test] - #[ignore] - fn upgrade_with_version_in_tmpdir() { - let temp_dir = TempDir::new().unwrap(); - let exe_path = temp_dir.path().join("deno"); - let _ = std::fs::copy(util::deno_exe_path(), &exe_path).unwrap(); - assert!(exe_path.exists()); - let _mtime1 = std::fs::metadata(&exe_path).unwrap().modified().unwrap(); - let status = Command::new(&exe_path) - .arg("upgrade") - .arg("--force") - .arg("--version") - .arg("0.42.0") - .spawn() - .unwrap() - .wait() - .unwrap(); - assert!(status.success()); - let upgraded_deno_version = String::from_utf8( - Command::new(&exe_path).arg("-V").output().unwrap().stdout, - ) - .unwrap(); - assert!(upgraded_deno_version.contains("0.42.0")); - let _mtime2 = std::fs::metadata(&exe_path).unwrap().modified().unwrap(); - // TODO(ry) assert!(mtime1 < mtime2); - } - - // Warning: this test requires internet access. - // TODO(#7412): reenable. test is flaky - #[test] - #[ignore] - fn upgrade_with_canary_in_tmpdir() { - let temp_dir = TempDir::new().unwrap(); - let exe_path = temp_dir.path().join("deno"); - let _ = std::fs::copy(util::deno_exe_path(), &exe_path).unwrap(); - assert!(exe_path.exists()); - let _mtime1 = std::fs::metadata(&exe_path).unwrap().modified().unwrap(); - let status = Command::new(&exe_path) - .arg("upgrade") - .arg("--canary") - .arg("--version") - .arg("e6685f0f01b8a11a5eaff020f5babcfde76b3038") - .spawn() - .unwrap() - .wait() - .unwrap(); - assert!(status.success()); - let upgraded_deno_version = String::from_utf8( - Command::new(&exe_path).arg("-V").output().unwrap().stdout, - ) - .unwrap(); - assert!(upgraded_deno_version.contains("e6685f0")); - let _mtime2 = std::fs::metadata(&exe_path).unwrap().modified().unwrap(); - // TODO(ry) assert!(mtime1 < mtime2); - } - - // Warning: this test requires internet access. - // TODO(#7412): reenable. test is flaky - #[test] - #[ignore] - fn upgrade_with_out_in_tmpdir() { - let temp_dir = TempDir::new().unwrap(); - let exe_path = temp_dir.path().join("deno"); - let new_exe_path = temp_dir.path().join("foo"); - let _ = std::fs::copy(util::deno_exe_path(), &exe_path).unwrap(); - assert!(exe_path.exists()); - let mtime1 = std::fs::metadata(&exe_path).unwrap().modified().unwrap(); - let status = Command::new(&exe_path) - .arg("upgrade") - .arg("--version") - .arg("1.0.2") - .arg("--output") - .arg(&new_exe_path.to_str().unwrap()) - .spawn() - .unwrap() - .wait() - .unwrap(); - assert!(status.success()); - assert!(new_exe_path.exists()); - let mtime2 = std::fs::metadata(&exe_path).unwrap().modified().unwrap(); - assert_eq!(mtime1, mtime2); // Original exe_path was not changed. - - let v = String::from_utf8( - Command::new(&new_exe_path) - .arg("-V") - .output() - .unwrap() - .stdout, - ) - .unwrap(); - assert!(v.contains("1.0.2")); - } - - #[test] - fn installer_test_local_module_run() { - let temp_dir = TempDir::new().expect("tempdir fail"); - let bin_dir = temp_dir.path().join("bin"); - std::fs::create_dir(&bin_dir).unwrap(); - let status = util::deno_cmd() - .current_dir(util::root_path()) - .arg("install") - .arg("--name") - .arg("echo_test") - .arg("--root") - .arg(temp_dir.path()) - .arg(util::tests_path().join("echo.ts")) - .arg("hello") - .spawn() - .unwrap() - .wait() - .unwrap(); - assert!(status.success()); - let mut file_path = bin_dir.join("echo_test"); - if cfg!(windows) { - file_path = file_path.with_extension("cmd"); - } - assert!(file_path.exists()); - // NOTE: using file_path here instead of exec_name, because tests - // shouldn't mess with user's PATH env variable - let output = Command::new(file_path) - .current_dir(temp_dir.path()) - .arg("foo") - .env("PATH", util::target_dir()) - .output() - .expect("failed to spawn script"); - let stdout_str = std::str::from_utf8(&output.stdout).unwrap().trim(); - assert!(stdout_str.ends_with("hello, foo")); - } - - #[test] - fn installer_test_remote_module_run() { - let _g = util::http_server(); - let temp_dir = TempDir::new().expect("tempdir fail"); - let bin_dir = temp_dir.path().join("bin"); - std::fs::create_dir(&bin_dir).unwrap(); - let status = util::deno_cmd() - .current_dir(util::root_path()) - .arg("install") - .arg("--name") - .arg("echo_test") - .arg("--root") - .arg(temp_dir.path()) - .arg("http://localhost:4545/cli/tests/echo.ts") - .arg("hello") - .spawn() - .unwrap() - .wait() - .unwrap(); - assert!(status.success()); - let mut file_path = bin_dir.join("echo_test"); - if cfg!(windows) { - file_path = file_path.with_extension("cmd"); - } - assert!(file_path.exists()); - let output = Command::new(file_path) - .current_dir(temp_dir.path()) - .arg("foo") - .env("PATH", util::target_dir()) - .output() - .expect("failed to spawn script"); - assert!(std::str::from_utf8(&output.stdout) - .unwrap() - .trim() - .ends_with("hello, foo")); - } - - #[test] - fn ts_dependency_recompilation() { - let t = TempDir::new().expect("tempdir fail"); - let ats = t.path().join("a.ts"); - - std::fs::write( - &ats, - " - import { foo } from \"./b.ts\"; - - function print(str: string): void { - console.log(str); - } - - print(foo);", - ) - .unwrap(); - - let bts = t.path().join("b.ts"); - std::fs::write( - &bts, - " - export const foo = \"foo\";", - ) - .unwrap(); - - let output = util::deno_cmd() - .current_dir(util::root_path()) - .env("NO_COLOR", "1") - .arg("run") - .arg(&ats) - .output() - .expect("failed to spawn script"); - - let stdout_output = std::str::from_utf8(&output.stdout).unwrap().trim(); - let stderr_output = std::str::from_utf8(&output.stderr).unwrap().trim(); - - assert!(stdout_output.ends_with("foo")); - assert!(stderr_output.starts_with("Check")); - - // Overwrite contents of b.ts and run again - std::fs::write( - &bts, - " - export const foo = 5;", - ) - .expect("error writing file"); - - let output = util::deno_cmd() - .current_dir(util::root_path()) - .env("NO_COLOR", "1") - .arg("run") - .arg(&ats) - .output() - .expect("failed to spawn script"); - - let stdout_output = std::str::from_utf8(&output.stdout).unwrap().trim(); - let stderr_output = std::str::from_utf8(&output.stderr).unwrap().trim(); - - // error: TS2345 [ERROR]: Argument of type '5' is not assignable to parameter of type 'string'. - assert!(stderr_output.contains("TS2345")); - assert!(!output.status.success()); - assert!(stdout_output.is_empty()); - } - - #[test] - fn ts_no_recheck_on_redirect() { - let deno_dir = util::new_deno_dir(); - let e = util::deno_exe_path(); - - let redirect_ts = - util::root_path().join("cli/tests/017_import_redirect.ts"); - assert!(redirect_ts.is_file()); - let mut cmd = Command::new(e.clone()); - cmd.env("DENO_DIR", deno_dir.path()); - let mut initial = cmd - .current_dir(util::root_path()) - .arg("run") - .arg(redirect_ts.clone()) - .spawn() - .expect("failed to span script"); - let status_initial = - initial.wait().expect("failed to wait for child process"); - assert!(status_initial.success()); - - let mut cmd = Command::new(e); - cmd.env("DENO_DIR", deno_dir.path()); - let output = cmd - .current_dir(util::root_path()) - .arg("run") - .arg(redirect_ts) - .output() - .expect("failed to spawn script"); - - assert!(std::str::from_utf8(&output.stderr).unwrap().is_empty()); - } - - #[test] - fn ts_reload() { - let hello_ts = util::root_path().join("cli/tests/002_hello.ts"); - assert!(hello_ts.is_file()); - - let deno_dir = TempDir::new().expect("tempdir fail"); - let mut initial = util::deno_cmd_with_deno_dir(deno_dir.path()) - .current_dir(util::root_path()) - .arg("cache") - .arg(&hello_ts) - .spawn() - .expect("failed to spawn script"); - let status_initial = - initial.wait().expect("failed to wait for child process"); - assert!(status_initial.success()); - - let output = util::deno_cmd_with_deno_dir(deno_dir.path()) - .current_dir(util::root_path()) - .arg("cache") - .arg("--reload") - .arg("-L") - .arg("debug") - .arg(&hello_ts) - .output() - .expect("failed to spawn script"); - - // check the output of the the bundle program. - let output_path = hello_ts.canonicalize().unwrap(); - assert!(std::str::from_utf8(&output.stderr) - .unwrap() - .trim() - .contains(&format!( - "host.getSourceFile(\"{}\", Latest)", - url::Url::from_file_path(&output_path).unwrap().as_str() - ))); - } - - #[test] - fn bundle_exports() { - // First we have to generate a bundle of some module that has exports. - let mod1 = util::root_path().join("cli/tests/subdir/mod1.ts"); - assert!(mod1.is_file()); - let t = TempDir::new().expect("tempdir fail"); - let bundle = t.path().join("mod1.bundle.js"); - let mut deno = util::deno_cmd() - .current_dir(util::root_path()) - .arg("bundle") - .arg(mod1) - .arg(&bundle) - .spawn() - .expect("failed to spawn script"); - let status = deno.wait().expect("failed to wait for the child process"); - assert!(status.success()); - assert!(bundle.is_file()); - - // Now we try to use that bundle from another module. - let test = t.path().join("test.js"); - std::fs::write( - &test, - " - import { printHello3 } from \"./mod1.bundle.js\"; - printHello3(); ", - ) - .expect("error writing file"); - - let output = util::deno_cmd() - .current_dir(util::root_path()) - .arg("run") - .arg(&test) - .output() - .expect("failed to spawn script"); - // check the output of the test.ts program. - assert!(std::str::from_utf8(&output.stdout) - .unwrap() - .trim() - .ends_with("Hello")); - assert_eq!(output.stderr, b""); - } - - #[test] - fn bundle_exports_no_check() { - // First we have to generate a bundle of some module that has exports. - let mod1 = util::root_path().join("cli/tests/subdir/mod1.ts"); - assert!(mod1.is_file()); - let t = TempDir::new().expect("tempdir fail"); - let bundle = t.path().join("mod1.bundle.js"); - let mut deno = util::deno_cmd() - .current_dir(util::root_path()) - .arg("bundle") - .arg("--no-check") - .arg(mod1) - .arg(&bundle) - .spawn() - .expect("failed to spawn script"); - let status = deno.wait().expect("failed to wait for the child process"); - assert!(status.success()); - assert!(bundle.is_file()); - - // Now we try to use that bundle from another module. - let test = t.path().join("test.js"); - std::fs::write( - &test, - " - import { printHello3 } from \"./mod1.bundle.js\"; - printHello3(); ", - ) - .expect("error writing file"); - - let output = util::deno_cmd() - .current_dir(util::root_path()) - .arg("run") - .arg(&test) - .output() - .expect("failed to spawn script"); - // check the output of the test.ts program. - assert!(std::str::from_utf8(&output.stdout) - .unwrap() - .trim() - .ends_with("Hello")); - assert_eq!(output.stderr, b""); - } - - #[test] - fn bundle_circular() { - // First we have to generate a bundle of some module that has exports. - let circular1 = util::root_path().join("cli/tests/subdir/circular1.ts"); - assert!(circular1.is_file()); - let t = TempDir::new().expect("tempdir fail"); - let bundle = t.path().join("circular1.bundle.js"); - let mut deno = util::deno_cmd() - .current_dir(util::root_path()) - .arg("bundle") - .arg(circular1) - .arg(&bundle) - .spawn() - .expect("failed to spawn script"); - let status = deno.wait().expect("failed to wait for the child process"); - assert!(status.success()); - assert!(bundle.is_file()); - - let output = util::deno_cmd() - .current_dir(util::root_path()) - .arg("run") - .arg(&bundle) - .output() - .expect("failed to spawn script"); - // check the output of the the bundle program. - assert!(std::str::from_utf8(&output.stdout) - .unwrap() - .trim() - .ends_with("f2\nf1")); - assert_eq!(output.stderr, b""); - } - - #[test] - fn bundle_single_module() { - // First we have to generate a bundle of some module that has exports. - let single_module = - util::root_path().join("cli/tests/subdir/single_module.ts"); - assert!(single_module.is_file()); - let t = TempDir::new().expect("tempdir fail"); - let bundle = t.path().join("single_module.bundle.js"); - let mut deno = util::deno_cmd() - .current_dir(util::root_path()) - .arg("bundle") - .arg(single_module) - .arg(&bundle) - .spawn() - .expect("failed to spawn script"); - let status = deno.wait().expect("failed to wait for the child process"); - assert!(status.success()); - assert!(bundle.is_file()); - - let output = util::deno_cmd() - .current_dir(util::root_path()) - .arg("run") - .arg(&bundle) - .output() - .expect("failed to spawn script"); - // check the output of the the bundle program. - assert!(std::str::from_utf8(&output.stdout) - .unwrap() - .trim() - .ends_with("Hello world!")); - assert_eq!(output.stderr, b""); - } - - #[test] - fn bundle_tla() { - // First we have to generate a bundle of some module that has exports. - let tla_import = util::root_path().join("cli/tests/subdir/tla.ts"); - assert!(tla_import.is_file()); - let t = tempfile::TempDir::new().expect("tempdir fail"); - let bundle = t.path().join("tla.bundle.js"); - let mut deno = util::deno_cmd() - .current_dir(util::root_path()) - .arg("bundle") - .arg(tla_import) - .arg(&bundle) - .spawn() - .expect("failed to spawn script"); - let status = deno.wait().expect("failed to wait for the child process"); - assert!(status.success()); - assert!(bundle.is_file()); - - // Now we try to use that bundle from another module. - let test = t.path().join("test.js"); - std::fs::write( - &test, - " - import { foo } from \"./tla.bundle.js\"; - console.log(foo); ", - ) - .expect("error writing file"); - - let output = util::deno_cmd() - .current_dir(util::root_path()) - .arg("run") - .arg(&test) - .output() - .expect("failed to spawn script"); - // check the output of the test.ts program. - assert!(std::str::from_utf8(&output.stdout) - .unwrap() - .trim() - .ends_with("Hello")); - assert_eq!(output.stderr, b""); - } - - #[test] - fn bundle_js() { - // First we have to generate a bundle of some module that has exports. - let mod6 = util::root_path().join("cli/tests/subdir/mod6.js"); - assert!(mod6.is_file()); - let t = TempDir::new().expect("tempdir fail"); - let bundle = t.path().join("mod6.bundle.js"); - let mut deno = util::deno_cmd() - .current_dir(util::root_path()) - .arg("bundle") - .arg(mod6) - .arg(&bundle) - .spawn() - .expect("failed to spawn script"); - let status = deno.wait().expect("failed to wait for the child process"); - assert!(status.success()); - assert!(bundle.is_file()); - - let output = util::deno_cmd() - .current_dir(util::root_path()) - .arg("run") - .arg(&bundle) - .output() - .expect("failed to spawn script"); - // check that nothing went to stderr - assert_eq!(output.stderr, b""); - } - - #[test] - fn bundle_dynamic_import() { - let _g = util::http_server(); - let dynamic_import = - util::root_path().join("cli/tests/bundle_dynamic_import.ts"); - assert!(dynamic_import.is_file()); - let t = TempDir::new().expect("tempdir fail"); - let bundle = t.path().join("bundle_dynamic_import.bundle.js"); - let mut deno = util::deno_cmd() - .current_dir(util::root_path()) - .arg("bundle") - .arg(dynamic_import) - .arg(&bundle) - .spawn() - .expect("failed to spawn script"); - let status = deno.wait().expect("failed to wait for the child process"); - assert!(status.success()); - assert!(bundle.is_file()); - - let output = util::deno_cmd() - .current_dir(util::root_path()) - .arg("run") - .arg("--allow-net") - .arg("--quiet") - .arg(&bundle) - .output() - .expect("failed to spawn script"); - // check the output of the test.ts program. - assert!(std::str::from_utf8(&output.stdout) - .unwrap() - .trim() - .ends_with("Hello")); - assert_eq!(output.stderr, b""); - } - - #[test] - fn bundle_import_map() { - let import = util::root_path().join("cli/tests/bundle_im.ts"); - let import_map_path = util::root_path().join("cli/tests/bundle_im.json"); - assert!(import.is_file()); - let t = TempDir::new().expect("tempdir fail"); - let bundle = t.path().join("import_map.bundle.js"); - let mut deno = util::deno_cmd() - .current_dir(util::root_path()) - .arg("bundle") - .arg("--import-map") - .arg(import_map_path) - .arg(import) - .arg(&bundle) - .spawn() - .expect("failed to spawn script"); - let status = deno.wait().expect("failed to wait for the child process"); - assert!(status.success()); - assert!(bundle.is_file()); - - // Now we try to use that bundle from another module. - let test = t.path().join("test.js"); - std::fs::write( - &test, - " - import { printHello3 } from \"./import_map.bundle.js\"; - printHello3(); ", - ) - .expect("error writing file"); - - let output = util::deno_cmd() - .current_dir(util::root_path()) - .arg("run") - .arg(&test) - .output() - .expect("failed to spawn script"); - // check the output of the test.ts program. - assert!(std::str::from_utf8(&output.stdout) - .unwrap() - .trim() - .ends_with("Hello")); - assert_eq!(output.stderr, b""); - } - - #[test] - fn bundle_import_map_no_check() { - let import = util::root_path().join("cli/tests/bundle_im.ts"); - let import_map_path = util::root_path().join("cli/tests/bundle_im.json"); - assert!(import.is_file()); - let t = TempDir::new().expect("tempdir fail"); - let bundle = t.path().join("import_map.bundle.js"); - let mut deno = util::deno_cmd() - .current_dir(util::root_path()) - .arg("bundle") - .arg("--no-check") - .arg("--import-map") - .arg(import_map_path) - .arg(import) - .arg(&bundle) - .spawn() - .expect("failed to spawn script"); - let status = deno.wait().expect("failed to wait for the child process"); - assert!(status.success()); - assert!(bundle.is_file()); - - // Now we try to use that bundle from another module. - let test = t.path().join("test.js"); - std::fs::write( - &test, - " - import { printHello3 } from \"./import_map.bundle.js\"; - printHello3(); ", - ) - .expect("error writing file"); - - let output = util::deno_cmd() - .current_dir(util::root_path()) - .arg("run") - .arg(&test) - .output() - .expect("failed to spawn script"); - // check the output of the test.ts program. - assert!(std::str::from_utf8(&output.stdout) - .unwrap() - .trim() - .ends_with("Hello")); - assert_eq!(output.stderr, b""); - } - - #[test] - fn info_with_compiled_source() { - let _g = util::http_server(); - let module_path = "http://127.0.0.1:4545/cli/tests/048_media_types_jsx.ts"; - let t = TempDir::new().expect("tempdir fail"); - - let mut deno = util::deno_cmd() - .env("DENO_DIR", t.path()) - .current_dir(util::root_path()) - .arg("cache") - .arg(&module_path) - .spawn() - .expect("failed to spawn script"); - let status = deno.wait().expect("failed to wait for the child process"); - assert!(status.success()); - - let output = util::deno_cmd() - .env("DENO_DIR", t.path()) - .env("NO_COLOR", "1") - .current_dir(util::root_path()) - .arg("info") - .arg(&module_path) - .output() - .expect("failed to spawn script"); - - let str_output = std::str::from_utf8(&output.stdout).unwrap().trim(); - eprintln!("{}", str_output); - // check the output of the test.ts program. - assert!(str_output.contains("emit: ")); - assert_eq!(output.stderr, b""); - } - - itest!(stdout_write_all { - args: "run --quiet stdout_write_all.ts", - output: "stdout_write_all.out", - }); - - itest!(_001_hello { - args: "run --reload 001_hello.js", - output: "001_hello.js.out", - }); - - itest!(_002_hello { - args: "run --quiet --reload 002_hello.ts", - output: "002_hello.ts.out", - }); - - itest!(_003_relative_import { - args: "run --quiet --reload 003_relative_import.ts", - output: "003_relative_import.ts.out", - }); - - itest!(_004_set_timeout { - args: "run --quiet --reload 004_set_timeout.ts", - output: "004_set_timeout.ts.out", - }); - - itest!(_005_more_imports { - args: "run --quiet --reload 005_more_imports.ts", - output: "005_more_imports.ts.out", - }); - - itest!(_006_url_imports { - args: "run --quiet --reload 006_url_imports.ts", - output: "006_url_imports.ts.out", - http_server: true, - }); - - itest!(_012_async { - args: "run --quiet --reload 012_async.ts", - output: "012_async.ts.out", - }); - - itest!(_013_dynamic_import { - args: "run --quiet --reload --allow-read 013_dynamic_import.ts", - output: "013_dynamic_import.ts.out", - }); - - itest!(_014_duplicate_import { - args: "run --quiet --reload --allow-read 014_duplicate_import.ts ", - output: "014_duplicate_import.ts.out", - }); - - itest!(_015_duplicate_parallel_import { - args: "run --quiet --reload --allow-read 015_duplicate_parallel_import.js", - output: "015_duplicate_parallel_import.js.out", - }); - - itest!(_016_double_await { - args: "run --quiet --allow-read --reload 016_double_await.ts", - output: "016_double_await.ts.out", - }); - - itest!(_017_import_redirect { - args: "run --quiet --reload 017_import_redirect.ts", - output: "017_import_redirect.ts.out", - }); - - itest!(_017_import_redirect_nocheck { - args: "run --quiet --reload --no-check 017_import_redirect.ts", - output: "017_import_redirect.ts.out", - }); - - itest!(_017_import_redirect_info { - args: "info --quiet --reload 017_import_redirect.ts", - output: "017_import_redirect_info.out", - }); - - itest!(_018_async_catch { - args: "run --quiet --reload 018_async_catch.ts", - output: "018_async_catch.ts.out", - }); - - itest!(_019_media_types { - args: "run --reload 019_media_types.ts", - output: "019_media_types.ts.out", - http_server: true, - }); - - itest!(_020_json_modules { - args: "run --reload 020_json_modules.ts", - output: "020_json_modules.ts.out", - exit_code: 1, - }); - - itest!(_021_mjs_modules { - args: "run --quiet --reload 021_mjs_modules.ts", - output: "021_mjs_modules.ts.out", - }); - - itest!(_022_info_flag_script { - args: "info http://127.0.0.1:4545/cli/tests/019_media_types.ts", - output: "022_info_flag_script.out", - http_server: true, - }); - - itest!(_023_no_ext { - args: "run --reload 023_no_ext", - output: "023_no_ext.out", - }); - - // TODO(lucacasonato): remove --unstable when permissions goes stable - itest!(_025_hrtime { - args: "run --quiet --allow-hrtime --unstable --reload 025_hrtime.ts", - output: "025_hrtime.ts.out", - }); - - itest!(_025_reload_js_type_error { - args: "run --quiet --reload 025_reload_js_type_error.js", - output: "025_reload_js_type_error.js.out", - }); - - itest!(_026_redirect_javascript { - args: "run --quiet --reload 026_redirect_javascript.js", - output: "026_redirect_javascript.js.out", - http_server: true, - }); - - mod test { - use super::*; - - #[test] - fn no_color() { - let (out, _) = util::run_and_collect_output( - false, - "test test/deno_test_no_color.ts", - None, - Some(vec![("NO_COLOR".to_owned(), "true".to_owned())]), - false, - ); - // ANSI escape codes should be stripped. - assert!(out.contains("test success ... ok")); - assert!(out.contains("test fail ... FAILED")); - assert!(out.contains("test ignored ... ignored")); - assert!(out.contains("test result: FAILED. 1 passed; 1 failed; 1 ignored; 0 measured; 0 filtered out")); - } - - itest!(all { - args: "test test/test_runner_test.ts", - exit_code: 1, - output: "test/deno_test.out", - }); - - itest!(doc { - args: "test --doc --allow-all test/doc.ts", - exit_code: 1, - output: "test/doc.out", - }); - - itest!(allow_all { - args: "test --unstable --allow-all test/allow_all.ts", - exit_code: 0, - output: "test/allow_all.out", - }); - - itest!(allow_none { - args: "test --unstable test/allow_none.ts", - exit_code: 1, - output: "test/allow_none.out", - }); - - itest!(fail_fast { - args: "test --fail-fast test/test_runner_test.ts", - exit_code: 1, - output: "test/deno_test_fail_fast.out", - }); - - itest!(only { - args: "test test/deno_test_only.ts", - exit_code: 1, - output: "test/deno_test_only.ts.out", - }); - - itest!(no_check { - args: "test --no-check test/test_runner_test.ts", - exit_code: 1, - output: "test/deno_test.out", - }); - - itest!(finally_cleartimeout { - args: "test test/test_finally_cleartimeout.ts", - exit_code: 1, - output: "test/test_finally_cleartimeout.out", - }); - - itest!(unresolved_promise { - args: "test test/test_unresolved_promise.js", - exit_code: 1, - output: "test/deno_test_unresolved_promise.out", - }); - - itest!(unhandled_rejection { - args: "test test/unhandled_rejection.ts", - exit_code: 1, - output: "test/unhandled_rejection.out", - }); - - itest!(exit_sanitizer { - args: "test test/exit_sanitizer_test.ts", - output: "test/exit_sanitizer_test.out", - exit_code: 1, - }); - - itest!(quiet { - args: "test --quiet test/quiet_test.ts", - exit_code: 0, - output: "test/quiet_test.out", - }); - } - - #[test] - fn timeout_clear() { - // https://github.com/denoland/deno/issues/7599 - - use std::time::Duration; - use std::time::Instant; - - let source_code = r#" -const handle = setTimeout(() => { - console.log("timeout finish"); -}, 10000); -clearTimeout(handle); -console.log("finish"); -"#; - - let mut p = util::deno_cmd() - .current_dir(util::tests_path()) - .arg("run") - .arg("-") - .stdin(std::process::Stdio::piped()) - .spawn() - .unwrap(); - let stdin = p.stdin.as_mut().unwrap(); - stdin.write_all(source_code.as_bytes()).unwrap(); - let start = Instant::now(); - let status = p.wait().unwrap(); - let end = Instant::now(); - assert!(status.success()); - // check that program did not run for 10 seconds - // for timeout to clear - assert!(end - start < Duration::new(10, 0)); - } - - #[test] - fn workers() { - let _g = util::http_server(); - let status = util::deno_cmd() - .current_dir(util::tests_path()) - .arg("test") - .arg("--reload") - .arg("--location") - .arg("http://127.0.0.1:4545/cli/tests/") - .arg("--allow-net") - .arg("--allow-read") - .arg("--unstable") - .arg("workers/test.ts") - .spawn() - .unwrap() - .wait() - .unwrap(); - assert!(status.success()); - } - - itest!(worker_error { - args: "run -A workers/worker_error.ts", - output: "workers/worker_error.ts.out", - exit_code: 1, - }); - - itest!(worker_nested_error { - args: "run -A workers/worker_nested_error.ts", - output: "workers/worker_nested_error.ts.out", - exit_code: 1, - }); - - itest!(nonexistent_worker { - args: "run --allow-read workers/nonexistent_worker.ts", - output: "workers/nonexistent_worker.out", - exit_code: 1, - }); - - #[test] - fn compiler_api() { - let status = util::deno_cmd() - .current_dir(util::tests_path()) - .arg("test") - .arg("--unstable") - .arg("--reload") - .arg("--allow-read") - .arg("compiler_api_test.ts") - .spawn() - .unwrap() - .wait() - .unwrap(); - assert!(status.success()); - } - - itest!(_027_redirect_typescript { - args: "run --quiet --reload 027_redirect_typescript.ts", - output: "027_redirect_typescript.ts.out", - http_server: true, - }); - - itest!(_028_args { - args: - "run --quiet --reload 028_args.ts --arg1 val1 --arg2=val2 -- arg3 arg4", - output: "028_args.ts.out", - }); - - itest!(_029_eval { - args: "eval console.log(\"hello\")", - output: "029_eval.out", - }); - - // Ugly parentheses due to whitespace delimiting problem. - itest!(_030_eval_ts { - args: "eval --quiet --ext=ts console.log((123)as(number))", // 'as' is a TS keyword only - output: "030_eval_ts.out", - }); - - itest!(_031_info_ts_error { - args: "info 031_info_ts_error.ts", - output: "031_info_ts_error.out", - }); - - itest!(_033_import_map { - args: - "run --quiet --reload --import-map=import_maps/import_map.json import_maps/test.ts", - output: "033_import_map.out", - }); - - itest!(_033_import_map_remote { - args: - "run --quiet --reload --import-map=http://127.0.0.1:4545/cli/tests/import_maps/import_map_remote.json --unstable import_maps/test_remote.ts", - output: "033_import_map_remote.out", - http_server: true, - }); - - itest!(_034_onload { - args: "run --quiet --reload 034_onload/main.ts", - output: "034_onload.out", - }); - - itest!(_035_cached_only_flag { - args: - "run --reload --cached-only http://127.0.0.1:4545/cli/tests/019_media_types.ts", - output: "035_cached_only_flag.out", - exit_code: 1, - http_server: true, - }); - - itest!(_036_import_map_fetch { - args: - "cache --quiet --reload --import-map=import_maps/import_map.json import_maps/test.ts", - output: "036_import_map_fetch.out", - }); - - itest!(_037_fetch_multiple { - args: "cache --reload fetch/test.ts fetch/other.ts", - http_server: true, - output: "037_fetch_multiple.out", - }); - - itest!(_038_checkjs { - // checking if JS file is run through TS compiler - args: "run --reload --config 038_checkjs.tsconfig.json 038_checkjs.js", - exit_code: 1, - output: "038_checkjs.js.out", - }); - - itest!(_041_dyn_import_eval { - args: "eval import('./subdir/mod4.js').then(console.log)", - output: "041_dyn_import_eval.out", - }); - - itest!(_041_info_flag { - args: "info", - output: "041_info_flag.out", - }); - - itest!(_042_info_flag_location { - args: "info --location https://deno.land", - output: "041_info_flag_location.out", - }); - - itest!(info_json { - args: "info --json --unstable", - output: "info_json.out", - }); - - itest!(info_json_location { - args: "info --json --unstable --location https://deno.land", - output: "info_json_location.out", - }); - - itest!(_042_dyn_import_evalcontext { - args: "run --quiet --allow-read --reload 042_dyn_import_evalcontext.ts", - output: "042_dyn_import_evalcontext.ts.out", - }); - - itest!(_044_bad_resource { - args: "run --quiet --reload --allow-read 044_bad_resource.ts", - output: "044_bad_resource.ts.out", - exit_code: 1, - }); - - itest!(_045_proxy { - args: "run -L debug --allow-net --allow-env --allow-run --allow-read --reload --quiet 045_proxy_test.ts", - output: "045_proxy_test.ts.out", - http_server: true, - }); - - itest!(_046_tsx { - args: "run --quiet --reload 046_jsx_test.tsx", - output: "046_jsx_test.tsx.out", - }); - - itest!(_047_jsx { - args: "run --quiet --reload 047_jsx_test.jsx", - output: "047_jsx_test.jsx.out", - }); - - itest!(_048_media_types_jsx { - args: "run --reload 048_media_types_jsx.ts", - output: "048_media_types_jsx.ts.out", - http_server: true, - }); - - itest!(_049_info_flag_script_jsx { - args: "info http://127.0.0.1:4545/cli/tests/048_media_types_jsx.ts", - output: "049_info_flag_script_jsx.out", - http_server: true, - }); - - itest!(_052_no_remote_flag { - args: - "run --reload --no-remote http://127.0.0.1:4545/cli/tests/019_media_types.ts", - output: "052_no_remote_flag.out", - exit_code: 1, - http_server: true, - }); - - itest!(_054_info_local_imports { - args: "info --quiet 005_more_imports.ts", - output: "054_info_local_imports.out", - exit_code: 0, - }); - - itest!(_055_info_file_json { - args: "info --quiet --json --unstable 005_more_imports.ts", - output: "055_info_file_json.out", - exit_code: 0, - }); - - itest!(_056_make_temp_file_write_perm { - args: - "run --quiet --allow-read --allow-write=./subdir/ 056_make_temp_file_write_perm.ts", - output: "056_make_temp_file_write_perm.out", - }); - - itest!(_058_tasks_microtasks_close { - args: "run --quiet 058_tasks_microtasks_close.ts", - output: "058_tasks_microtasks_close.ts.out", - }); - - itest!(_059_fs_relative_path_perm { - args: "run 059_fs_relative_path_perm.ts", - output: "059_fs_relative_path_perm.ts.out", - exit_code: 1, - }); - - itest!(_060_deno_doc_displays_all_overloads_in_details_view { - args: "doc 060_deno_doc_displays_all_overloads_in_details_view.ts NS.test", - output: "060_deno_doc_displays_all_overloads_in_details_view.ts.out", - }); - - #[cfg(unix)] - #[test] - fn _061_permissions_request() { - let args = "run 061_permissions_request.ts"; - let output = "061_permissions_request.ts.out"; - let input = b"y\nn\n"; - - util::test_pty(args, output, input); - } - - #[cfg(unix)] - #[test] - fn _062_permissions_request_global() { - let args = "run 062_permissions_request_global.ts"; - let output = "062_permissions_request_global.ts.out"; - let input = b"y\n"; - - util::test_pty(args, output, input); - } - - itest!(_063_permissions_revoke { - args: "run --allow-read=foo,bar 063_permissions_revoke.ts", - output: "063_permissions_revoke.ts.out", - }); - - itest!(_064_permissions_revoke_global { - args: "run --allow-read=foo,bar 064_permissions_revoke_global.ts", - output: "064_permissions_revoke_global.ts.out", - }); - - itest!(_065_import_map_info { - args: - "info --quiet --import-map=import_maps/import_map.json import_maps/test.ts", - output: "065_import_map_info.out", - }); - - #[cfg(unix)] - #[test] - fn _066_prompt() { - let args = "run --unstable 066_prompt.ts"; - let output = "066_prompt.ts.out"; - // These are answers to prompt, confirm, and alert calls. - let input = b"John Doe\n\nfoo\nY\nN\nyes\n\nwindows\r\n\n\n"; - - util::test_pty(args, output, input); - } - - itest!(_067_test_no_run_type_error { - args: "test --unstable --no-run test_type_error", - output: "067_test_no_run_type_error.out", - exit_code: 1, - }); - - itest!(_070_location { - args: "run --location https://foo/bar?baz#bat 070_location.ts", - output: "070_location.ts.out", - }); - - itest!(_071_location_unset { - args: "run 071_location_unset.ts", - output: "071_location_unset.ts.out", - exit_code: 1, - }); - - itest!(_072_location_relative_fetch { - args: "run --location http://127.0.0.1:4545/cli/tests/ --allow-net 072_location_relative_fetch.ts", - output: "072_location_relative_fetch.ts.out", - http_server: true, - }); - - itest!(_075_import_local_query_hash { - args: "run 075_import_local_query_hash.ts", - output: "075_import_local_query_hash.ts.out", - }); - - itest!(_076_info_json_deps_order { - args: "info --unstable --json 076_info_json_deps_order.ts", - output: "076_info_json_deps_order.out", - }); - - itest!(_077_fetch_empty { - args: "run -A 077_fetch_empty.ts", - output: "077_fetch_empty.ts.out", - exit_code: 1, - }); - - itest!(_078_unload_on_exit { - args: "run 078_unload_on_exit.ts", - output: "078_unload_on_exit.ts.out", - exit_code: 1, - }); - - itest!(_079_location_authentication { - args: - "run --location https://foo:bar@baz/qux 079_location_authentication.ts", - output: "079_location_authentication.ts.out", - }); - - itest!(_080_deno_emit_permissions { - args: "run --unstable 080_deno_emit_permissions.ts", - output: "080_deno_emit_permissions.ts.out", - exit_code: 1, - }); - - itest!(_081_location_relative_fetch_redirect { - args: "run --location http://127.0.0.1:4546/ --allow-net 081_location_relative_fetch_redirect.ts", - output: "081_location_relative_fetch_redirect.ts.out", - http_server: true, - }); - - itest!(_082_prepare_stack_trace_throw { - args: "run 082_prepare_stack_trace_throw.js", - output: "082_prepare_stack_trace_throw.js.out", - exit_code: 1, - }); - - #[test] - fn _083_legacy_external_source_map() { - let _g = util::http_server(); - let deno_dir = TempDir::new().expect("tempdir fail"); - let module_url = url::Url::parse( - "http://localhost:4545/cli/tests/083_legacy_external_source_map.ts", - ) - .unwrap(); - // Write a faulty old external source map. - let faulty_map_path = deno_dir.path().join("gen/http/localhost_PORT4545/9576bd5febd0587c5c4d88d57cb3ac8ebf2600c529142abe3baa9a751d20c334.js.map"); - std::fs::create_dir_all(faulty_map_path.parent().unwrap()) - .expect("Failed to create faulty source map dir."); - std::fs::write(faulty_map_path, "{\"version\":3,\"file\":\"\",\"sourceRoot\":\"\",\"sources\":[\"http://localhost:4545/cli/tests/083_legacy_external_source_map.ts\"],\"names\":[],\"mappings\":\";AAAA,MAAM,IAAI,KAAK,CAAC,KAAK,CAAC,CAAC\"}").expect("Failed to write faulty source map."); - let output = Command::new(util::deno_exe_path()) - .env("DENO_DIR", deno_dir.path()) - .current_dir(util::root_path()) - .arg("run") - .arg(module_url.to_string()) - .output() - .expect("Failed to spawn script"); - // Before https://github.com/denoland/deno/issues/6965 was fixed, the faulty - // old external source map would cause a panic while formatting the error - // and the exit code would be 101. The external source map should be ignored - // in favor of the inline one. - assert_eq!(output.status.code(), Some(1)); - let out = std::str::from_utf8(&output.stdout).unwrap(); - assert_eq!(out, ""); - } - - itest!(_084_worker_custom_inspect { - args: "run --allow-read 084_worker_custom_inspect.ts", - output: "084_worker_custom_inspect.ts.out", - }); - - itest!(_085_dynamic_import_async_error { - args: "run --allow-read 085_dynamic_import_async_error.ts", - output: "085_dynamic_import_async_error.ts.out", - }); - - itest!(_086_dynamic_import_already_rejected { - args: "run --allow-read 086_dynamic_import_already_rejected.ts", - output: "086_dynamic_import_already_rejected.ts.out", - }); - - itest!(_087_no_check_imports_not_used_as_values { - args: "run --config preserve_imports.tsconfig.json --no-check 087_no_check_imports_not_used_as_values.ts", - output: "087_no_check_imports_not_used_as_values.ts.out", - }); - - itest!(_088_dynamic_import_already_evaluating { - args: "run --allow-read 088_dynamic_import_already_evaluating.ts", - output: "088_dynamic_import_already_evaluating.ts.out", - }); - - itest!(_089_run_allow_list { - args: "run --allow-run=curl 089_run_allow_list.ts", - output: "089_run_allow_list.ts.out", - }); - - #[cfg(unix)] - #[test] - fn _090_run_permissions_request() { - let args = "run 090_run_permissions_request.ts"; - let output = "090_run_permissions_request.ts.out"; - let input = b"y\nn\n"; - - util::test_pty(args, output, input); - } - - #[test] - fn broken_stdout() { - let (reader, writer) = os_pipe::pipe().unwrap(); - // drop the reader to create a broken pipe - drop(reader); - - let output = util::deno_cmd() - .current_dir(util::root_path()) - .arg("eval") - .arg("console.log(3.14)") - .stdout(writer) - .stderr(std::process::Stdio::piped()) - .spawn() - .unwrap() - .wait_with_output() - .unwrap(); - - assert!(!output.status.success()); - let stderr = std::str::from_utf8(output.stderr.as_ref()).unwrap().trim(); - assert!(stderr.contains("Uncaught BrokenPipe")); - assert!(!stderr.contains("panic")); - } - - itest!(_091_use_define_for_class_fields { - args: "run 091_use_define_for_class_fields.ts", - output: "091_use_define_for_class_fields.ts.out", - exit_code: 1, - }); - - itest!(_092_import_map_unmapped_bare_specifier { - args: "run --import-map import_maps/import_map.json 092_import_map_unmapped_bare_specifier.ts", - output: "092_import_map_unmapped_bare_specifier.ts.out", - exit_code: 1, - }); - - itest!(_095_cache_with_bare_import { - args: "cache 095_cache_with_bare_import.ts", - output: "095_cache_with_bare_import.ts.out", - exit_code: 1, - }); - - itest!(dynamic_import_permissions_remote_remote { - args: "run --quiet --reload --allow-net=localhost:4545 dynamic_import/permissions_remote_remote.ts", - output: "dynamic_import/permissions_remote_remote.ts.out", - http_server: true, - exit_code: 1, - }); - - itest!(dynamic_import_permissions_data_remote { - args: "run --quiet --reload --allow-net=localhost:4545 dynamic_import/permissions_data_remote.ts", - output: "dynamic_import/permissions_data_remote.ts.out", - http_server: true, - exit_code: 1, - }); - - itest!(dynamic_import_permissions_blob_remote { - args: "run --quiet --reload --allow-net=localhost:4545 dynamic_import/permissions_blob_remote.ts", - output: "dynamic_import/permissions_blob_remote.ts.out", - http_server: true, - exit_code: 1, - }); - - itest!(dynamic_import_permissions_data_local { - args: "run --quiet --reload --allow-net=localhost:4545 dynamic_import/permissions_data_local.ts", - output: "dynamic_import/permissions_data_local.ts.out", - http_server: true, - exit_code: 1, - }); - - itest!(dynamic_import_permissions_blob_local { - args: "run --quiet --reload --allow-net=localhost:4545 dynamic_import/permissions_blob_local.ts", - output: "dynamic_import/permissions_blob_local.ts.out", - http_server: true, - exit_code: 1, - }); - - itest!(js_import_detect { - args: "run --quiet --reload js_import_detect.ts", - output: "js_import_detect.ts.out", - exit_code: 0, - }); - - itest!(lock_write_requires_lock { - args: "run --lock-write some_file.ts", - output: "lock_write_requires_lock.out", - exit_code: 1, - }); - - itest!(lock_write_fetch { - args: - "run --quiet --allow-read --allow-write --allow-env --allow-run lock_write_fetch.ts", - output: "lock_write_fetch.ts.out", - http_server: true, - exit_code: 0, - }); - - itest!(lock_check_ok { - args: "run --lock=lock_check_ok.json http://127.0.0.1:4545/cli/tests/003_relative_import.ts", - output: "003_relative_import.ts.out", - http_server: true, - }); - - itest!(lock_check_ok2 { - args: "run --lock=lock_check_ok2.json 019_media_types.ts", - output: "019_media_types.ts.out", - http_server: true, - }); - - itest!(lock_dynamic_imports { - args: "run --lock=lock_dynamic_imports.json --allow-read --allow-net http://127.0.0.1:4545/cli/tests/013_dynamic_import.ts", - output: "lock_dynamic_imports.out", - exit_code: 10, - http_server: true, - }); - - itest!(lock_check_err { - args: "run --lock=lock_check_err.json http://127.0.0.1:4545/cli/tests/003_relative_import.ts", - output: "lock_check_err.out", - exit_code: 10, - http_server: true, - }); - - itest!(lock_check_err2 { - args: "run --lock=lock_check_err2.json 019_media_types.ts", - output: "lock_check_err2.out", - exit_code: 10, - http_server: true, - }); - - itest!(lock_check_err_with_bundle { - args: "bundle --lock=lock_check_err_with_bundle.json http://127.0.0.1:4545/cli/tests/subdir/mod1.ts", - output: "lock_check_err_with_bundle.out", - exit_code: 10, - http_server: true, - }); - - itest!(async_error { - exit_code: 1, - args: "run --reload async_error.ts", - output: "async_error.ts.out", - }); - - itest!(bundle { - args: "bundle subdir/mod1.ts", - output: "bundle.test.out", - }); - - itest!(bundle_jsx { - args: "bundle jsx_import_from_ts.ts", - output: "bundle_jsx.out", - }); - - itest!(fmt_check_tests_dir { - args: "fmt --check ./ --ignore=.test_coverage", - output: "fmt/expected_fmt_check_tests_dir.out", - exit_code: 1, - }); - - itest!(fmt_quiet_check_fmt_dir { - args: "fmt --check --quiet fmt/", - output_str: Some(""), - exit_code: 0, - }); - - itest!(fmt_check_formatted_files { - args: "fmt --check fmt/formatted1.js fmt/formatted2.ts fmt/formatted3.md fmt/formatted4.jsonc", - output: "fmt/expected_fmt_check_formatted_files.out", - exit_code: 0, - }); - - itest!(fmt_check_ignore { - args: "fmt --check --ignore=fmt/formatted1.js fmt/", - output: "fmt/expected_fmt_check_ignore.out", - exit_code: 0, - }); - - itest!(fmt_stdin { - args: "fmt -", - input: Some("const a = 1\n"), - output_str: Some("const a = 1;\n"), - }); - - itest!(fmt_stdin_markdown { - args: "fmt --ext=md -", - input: Some("# Hello Markdown\n```ts\nconsole.log( \"text\")\n```\n"), - output_str: Some( - "# Hello Markdown\n\n```ts\nconsole.log(\"text\");\n```\n" - ), - }); - - itest!(fmt_stdin_json { - args: "fmt --ext=json -", - input: Some("{ \"key\": \"value\"}"), - output_str: Some("{ \"key\": \"value\" }\n"), - }); - - itest!(fmt_stdin_check_formatted { - args: "fmt --check -", - input: Some("const a = 1;\n"), - output_str: Some(""), - }); - - itest!(fmt_stdin_check_not_formatted { - args: "fmt --check -", - input: Some("const a = 1\n"), - output_str: Some("Not formatted stdin\n"), - }); - - itest!(config { - args: "run --reload --config config.tsconfig.json config.ts", - exit_code: 1, - output: "config.ts.out", - }); - - itest!(config_types { - args: - "run --reload --quiet --config config_types.tsconfig.json config_types.ts", - output: "config_types.ts.out", - }); - - itest!(config_types_remote { - http_server: true, - args: "run --reload --quiet --config config_types_remote.tsconfig.json config_types.ts", - output: "config_types.ts.out", - }); - - itest!(empty_typescript { - args: "run --reload subdir/empty.ts", - output_str: Some("Check file:[WILDCARD]tests/subdir/empty.ts\n"), - }); - - itest!(error_001 { - args: "run --reload error_001.ts", - exit_code: 1, - output: "error_001.ts.out", - }); - - itest!(error_002 { - args: "run --reload error_002.ts", - exit_code: 1, - output: "error_002.ts.out", - }); - - itest!(error_003_typescript { - args: "run --reload error_003_typescript.ts", - exit_code: 1, - output: "error_003_typescript.ts.out", - }); - - // Supposing that we've already attempted to run error_003_typescript.ts - // we want to make sure that JS wasn't emitted. Running again without reload flag - // should result in the same output. - // https://github.com/denoland/deno/issues/2436 - itest!(error_003_typescript2 { - args: "run error_003_typescript.ts", - exit_code: 1, - output: "error_003_typescript.ts.out", - }); - - itest!(error_004_missing_module { - args: "run --reload error_004_missing_module.ts", - exit_code: 1, - output: "error_004_missing_module.ts.out", - }); - - itest!(error_005_missing_dynamic_import { - args: - "run --reload --allow-read --quiet error_005_missing_dynamic_import.ts", - exit_code: 1, - output: "error_005_missing_dynamic_import.ts.out", - }); - - itest!(error_006_import_ext_failure { - args: "run --reload error_006_import_ext_failure.ts", - exit_code: 1, - output: "error_006_import_ext_failure.ts.out", - }); - - itest!(error_007_any { - args: "run --reload error_007_any.ts", - exit_code: 1, - output: "error_007_any.ts.out", - }); - - itest!(error_008_checkjs { - args: "run --reload error_008_checkjs.js", - exit_code: 1, - output: "error_008_checkjs.js.out", - }); - - itest!(error_009_extensions_error { - args: "run error_009_extensions_error.js", - output: "error_009_extensions_error.js.out", - exit_code: 1, - }); - - itest!(error_011_bad_module_specifier { - args: "run --reload error_011_bad_module_specifier.ts", - exit_code: 1, - output: "error_011_bad_module_specifier.ts.out", - }); - - itest!(error_012_bad_dynamic_import_specifier { - args: "run --reload error_012_bad_dynamic_import_specifier.ts", - exit_code: 1, - output: "error_012_bad_dynamic_import_specifier.ts.out", - }); - - itest!(error_013_missing_script { - args: "run --reload missing_file_name", - exit_code: 1, - output: "error_013_missing_script.out", - }); - - itest!(error_014_catch_dynamic_import_error { - args: "run --reload --allow-read error_014_catch_dynamic_import_error.js", - output: "error_014_catch_dynamic_import_error.js.out", - }); - - itest!(error_015_dynamic_import_permissions { - args: "run --reload --quiet error_015_dynamic_import_permissions.js", - output: "error_015_dynamic_import_permissions.out", - exit_code: 1, - http_server: true, - }); - - // We have an allow-net flag but not allow-read, it should still result in error. - itest!(error_016_dynamic_import_permissions2 { - args: "run --reload --allow-net error_016_dynamic_import_permissions2.js", - output: "error_016_dynamic_import_permissions2.out", - exit_code: 1, - http_server: true, - }); - - itest!(error_017_hide_long_source_ts { - args: "run --reload error_017_hide_long_source_ts.ts", - output: "error_017_hide_long_source_ts.ts.out", - exit_code: 1, - }); - - itest!(error_018_hide_long_source_js { - args: "run error_018_hide_long_source_js.js", - output: "error_018_hide_long_source_js.js.out", - exit_code: 1, - }); - - itest!(error_019_stack_function { - args: "run error_019_stack_function.ts", - output: "error_019_stack_function.ts.out", - exit_code: 1, - }); - - itest!(error_020_stack_constructor { - args: "run error_020_stack_constructor.ts", - output: "error_020_stack_constructor.ts.out", - exit_code: 1, - }); - - itest!(error_021_stack_method { - args: "run error_021_stack_method.ts", - output: "error_021_stack_method.ts.out", - exit_code: 1, - }); - - itest!(error_022_stack_custom_error { - args: "run error_022_stack_custom_error.ts", - output: "error_022_stack_custom_error.ts.out", - exit_code: 1, - }); - - itest!(error_023_stack_async { - args: "run error_023_stack_async.ts", - output: "error_023_stack_async.ts.out", - exit_code: 1, - }); - - itest!(error_024_stack_promise_all { - args: "run error_024_stack_promise_all.ts", - output: "error_024_stack_promise_all.ts.out", - exit_code: 1, - }); - - itest!(error_025_tab_indent { - args: "run error_025_tab_indent", - output: "error_025_tab_indent.out", - exit_code: 1, - }); - - itest!(error_026_remote_import_error { - args: "run error_026_remote_import_error.ts", - output: "error_026_remote_import_error.ts.out", - exit_code: 1, - http_server: true, - }); - - itest!(error_027_bundle_with_bare_import { - args: "bundle error_027_bundle_with_bare_import.ts", - output: "error_027_bundle_with_bare_import.ts.out", - exit_code: 1, - }); - - itest!(error_missing_module_named_import { - args: "run --reload error_missing_module_named_import.ts", - output: "error_missing_module_named_import.ts.out", - exit_code: 1, - }); - - itest!(error_no_check { - args: "run --reload --no-check error_no_check.ts", - output: "error_no_check.ts.out", - exit_code: 1, - }); - - itest!(error_syntax { - args: "run --reload error_syntax.js", - exit_code: 1, - output: "error_syntax.js.out", - }); - - itest!(error_syntax_empty_trailing_line { - args: "run --reload error_syntax_empty_trailing_line.mjs", - exit_code: 1, - output: "error_syntax_empty_trailing_line.mjs.out", - }); - - itest!(error_type_definitions { - args: "run --reload error_type_definitions.ts", - exit_code: 1, - output: "error_type_definitions.ts.out", - }); - - itest!(error_local_static_import_from_remote_ts { - args: "run --reload http://localhost:4545/cli/tests/error_local_static_import_from_remote.ts", - exit_code: 1, - http_server: true, - output: "error_local_static_import_from_remote.ts.out", - }); - - itest!(error_local_static_import_from_remote_js { - args: "run --reload http://localhost:4545/cli/tests/error_local_static_import_from_remote.js", - exit_code: 1, - http_server: true, - output: "error_local_static_import_from_remote.js.out", - }); - - itest!(error_worker_permissions_local { - args: "run --reload error_worker_permissions_local.ts", - output: "error_worker_permissions_local.ts.out", - exit_code: 1, - }); - - itest!(error_worker_permissions_remote { - args: "run --reload error_worker_permissions_remote.ts", - http_server: true, - output: "error_worker_permissions_remote.ts.out", - exit_code: 1, - }); - - itest!(worker_permissions_remote_remote { - args: "run --quiet --reload --allow-net=localhost:4545 workers/permissions_remote_remote.ts", - output: "workers/permissions_remote_remote.ts.out", - http_server: true, - exit_code: 1, - }); - - itest!(worker_permissions_dynamic_remote { - args: "run --quiet --reload --allow-net --unstable workers/permissions_dynamic_remote.ts", - output: "workers/permissions_dynamic_remote.ts.out", - http_server: true, - exit_code: 1, - }); - - itest!(worker_permissions_data_remote { - args: "run --quiet --reload --allow-net=localhost:4545 workers/permissions_data_remote.ts", - output: "workers/permissions_data_remote.ts.out", - http_server: true, - exit_code: 1, - }); - - itest!(worker_permissions_blob_remote { - args: "run --quiet --reload --allow-net=localhost:4545 workers/permissions_blob_remote.ts", - output: "workers/permissions_blob_remote.ts.out", - http_server: true, - exit_code: 1, - }); - - itest!(worker_permissions_data_local { - args: "run --quiet --reload --allow-net=localhost:4545 workers/permissions_data_local.ts", - output: "workers/permissions_data_local.ts.out", - http_server: true, - exit_code: 1, - }); - - itest!(worker_permissions_blob_local { - args: "run --quiet --reload --allow-net=localhost:4545 workers/permissions_blob_local.ts", - output: "workers/permissions_blob_local.ts.out", - http_server: true, - exit_code: 1, - }); - - itest!(exit_error42 { - exit_code: 42, - args: "run --quiet --reload exit_error42.ts", - output: "exit_error42.ts.out", - }); - - itest!(heapstats { - args: "run --quiet --unstable --v8-flags=--expose-gc heapstats.js", - output: "heapstats.js.out", - }); - - itest!(https_import { - args: "run --quiet --reload --cert tls/RootCA.pem https_import.ts", - output: "https_import.ts.out", - http_server: true, - }); - - itest!(if_main { - args: "run --quiet --reload if_main.ts", - output: "if_main.ts.out", - }); - - itest!(import_meta { - args: "run --quiet --reload import_meta.ts", - output: "import_meta.ts.out", - }); - - itest!(main_module { - args: "run --quiet --allow-read --reload main_module.ts", - output: "main_module.ts.out", - }); - - itest!(no_check { - args: "run --quiet --reload --no-check 006_url_imports.ts", - output: "006_url_imports.ts.out", - http_server: true, - }); - - itest!(no_check_decorators { - args: "run --quiet --reload --no-check no_check_decorators.ts", - output: "no_check_decorators.ts.out", - }); - - itest!(runtime_decorators { - args: "run --quiet --reload --no-check runtime_decorators.ts", - output: "runtime_decorators.ts.out", - }); - - itest!(lib_dom_asynciterable { - args: "run --quiet --unstable --reload lib_dom_asynciterable.ts", - output: "lib_dom_asynciterable.ts.out", - }); - - itest!(lib_ref { - args: "run --quiet --unstable --reload lib_ref.ts", - output: "lib_ref.ts.out", - }); - - itest!(lib_runtime_api { - args: "run --quiet --unstable --reload lib_runtime_api.ts", - output: "lib_runtime_api.ts.out", - }); - - itest!(seed_random { - args: "run --seed=100 seed_random.js", - - output: "seed_random.js.out", - }); - - itest!(type_definitions { - args: "run --reload type_definitions.ts", - output: "type_definitions.ts.out", - }); - - itest!(type_definitions_for_export { - args: "run --reload type_definitions_for_export.ts", - output: "type_definitions_for_export.ts.out", - exit_code: 1, - }); - - itest!(type_directives_01 { - args: "run --reload -L debug type_directives_01.ts", - output: "type_directives_01.ts.out", - http_server: true, - }); - - itest!(type_directives_02 { - args: "run --reload -L debug type_directives_02.ts", - output: "type_directives_02.ts.out", - }); - - itest!(type_directives_js_main { - args: "run --reload -L debug type_directives_js_main.js", - output: "type_directives_js_main.js.out", - exit_code: 0, - }); - - itest!(type_directives_redirect { - args: "run --reload type_directives_redirect.ts", - output: "type_directives_redirect.ts.out", - http_server: true, - }); - - itest!(type_headers_deno_types { - args: "run --reload type_headers_deno_types.ts", - output: "type_headers_deno_types.ts.out", - http_server: true, - }); - - itest!(ts_type_imports { - args: "run --reload ts_type_imports.ts", - output: "ts_type_imports.ts.out", - exit_code: 1, - }); - - itest!(ts_decorators { - args: "run --reload -c tsconfig.decorators.json ts_decorators.ts", - output: "ts_decorators.ts.out", - }); - - itest!(ts_decorators_bundle { - args: "bundle ts_decorators_bundle.ts", - output: "ts_decorators_bundle.out", - }); - - itest!(ts_type_only_import { - args: "run --reload ts_type_only_import.ts", - output: "ts_type_only_import.ts.out", - }); - - itest!(swc_syntax_error { - args: "run --reload swc_syntax_error.ts", - output: "swc_syntax_error.ts.out", - exit_code: 1, - }); - - itest!(types { - args: "types", - output: "types.out", - }); - - itest!(unbuffered_stderr { - args: "run --reload unbuffered_stderr.ts", - output: "unbuffered_stderr.ts.out", - }); - - itest!(unbuffered_stdout { - args: "run --quiet --reload unbuffered_stdout.ts", - output: "unbuffered_stdout.ts.out", - }); - - // Cannot write the expression to evaluate as "console.log(typeof gc)" - // because itest! splits args on whitespace. - itest!(v8_flags_eval { - args: "eval --v8-flags=--expose-gc console.log(typeof(gc))", - output: "v8_flags.js.out", - }); - - itest!(v8_flags_run { - args: "run --v8-flags=--expose-gc v8_flags.js", - output: "v8_flags.js.out", - }); - - itest!(v8_flags_unrecognized { - args: "repl --v8-flags=--foo,bar,--trace-gc,-baz", - output: "v8_flags_unrecognized.out", - exit_code: 1, - }); - - itest!(v8_help { - args: "repl --v8-flags=--help", - output: "v8_help.out", - }); - - itest!(unsupported_dynamic_import_scheme { - args: "eval import('xxx:')", - output: "unsupported_dynamic_import_scheme.out", - exit_code: 1, - }); - - itest!(wasm { - args: "run --quiet wasm.ts", - output: "wasm.ts.out", - }); - - itest!(wasm_shared { - args: "run --quiet wasm_shared.ts", - output: "wasm_shared.out", - }); - - itest!(wasm_async { - args: "run wasm_async.js", - output: "wasm_async.out", - }); - - itest!(wasm_unreachable { - args: "run wasm_unreachable.js", - output: "wasm_unreachable.out", - exit_code: 1, - }); - - itest!(weakref { - args: "run --quiet --reload weakref.ts", - output: "weakref.ts.out", - }); - - itest!(top_level_await_order { - args: "run --allow-read top_level_await_order.js", - output: "top_level_await_order.out", - }); - - itest!(top_level_await_loop { - args: "run --allow-read top_level_await_loop.js", - output: "top_level_await_loop.out", - }); - - itest!(top_level_await_circular { - args: "run --allow-read top_level_await_circular.js", - output: "top_level_await_circular.out", - exit_code: 1, - }); - - itest!(top_level_await_unresolved { - args: "run top_level_await_unresolved.js", - output: "top_level_await_unresolved.out", - exit_code: 1, - }); - - itest!(top_level_await { - args: "run --allow-read top_level_await.js", - output: "top_level_await.out", - }); - - itest!(top_level_await_ts { - args: "run --quiet --allow-read top_level_await.ts", - output: "top_level_await.out", - }); - - itest!(top_level_for_await { - args: "run --quiet top_level_for_await.js", - output: "top_level_for_await.out", - }); - - itest!(top_level_for_await_ts { - args: "run --quiet top_level_for_await.ts", - output: "top_level_for_await.out", - }); - - itest!(unstable_disabled { - args: "run --reload unstable.ts", - exit_code: 1, - output: "unstable_disabled.out", - }); - - itest!(unstable_enabled { - args: "run --quiet --reload --unstable unstable.ts", - output: "unstable_enabled.out", - }); - - itest!(unstable_disabled_js { - args: "run --reload unstable.js", - output: "unstable_disabled_js.out", - }); - - itest!(unstable_enabled_js { - args: "run --quiet --reload --unstable unstable.ts", - output: "unstable_enabled_js.out", - }); - - itest!(unstable_worker { - args: "run --reload --unstable --quiet --allow-read unstable_worker.ts", - output: "unstable_worker.ts.out", - }); - - itest!(_053_import_compression { - args: "run --quiet --reload --allow-net 053_import_compression/main.ts", - output: "053_import_compression.out", - http_server: true, - }); - - itest!(cache_extensionless { - args: "cache --reload http://localhost:4545/cli/tests/subdir/no_js_ext", - output: "cache_extensionless.out", - http_server: true, - }); - - itest!(cache_random_extension { - args: - "cache --reload http://localhost:4545/cli/tests/subdir/no_js_ext@1.0.0", - output: "cache_random_extension.out", - http_server: true, - }); - - // TODO(lucacasonato): reenable these tests once we figure out what is wrong with cafile tests - // itest!(cafile_url_imports { - // args: "run --quiet --reload --cert tls/RootCA.pem cafile_url_imports.ts", - // output: "cafile_url_imports.ts.out", - // http_server: true, - // }); - - // itest!(cafile_ts_fetch { - // args: - // "run --quiet --reload --allow-net --cert tls/RootCA.pem cafile_ts_fetch.ts", - // output: "cafile_ts_fetch.ts.out", - // http_server: true, - // }); - - // itest!(cafile_eval { - // args: "eval --cert tls/RootCA.pem fetch('https://localhost:5545/cli/tests/cafile_ts_fetch.ts.out').then(r=>r.text()).then(t=>console.log(t.trimEnd()))", - // output: "cafile_ts_fetch.ts.out", - // http_server: true, - // }); - - // itest!(cafile_info { - // args: - // "info --quiet --cert tls/RootCA.pem https://localhost:5545/cli/tests/cafile_info.ts", - // output: "cafile_info.ts.out", - // http_server: true, - // }); - - itest!(disallow_http_from_https_js { - args: "run --quiet --reload --cert tls/RootCA.pem https://localhost:5545/cli/tests/disallow_http_from_https.js", - output: "disallow_http_from_https_js.out", - http_server: true, - exit_code: 1, - }); - - itest!(disallow_http_from_https_ts { - args: "run --quiet --reload --cert tls/RootCA.pem https://localhost:5545/cli/tests/disallow_http_from_https.ts", - output: "disallow_http_from_https_ts.out", - http_server: true, - exit_code: 1, - }); - - itest!(dynamic_import_conditional { - args: "run --quiet --reload dynamic_import_conditional.js", - output: "dynamic_import_conditional.js.out", - }); - - itest!(tsx_imports { - args: "run --reload tsx_imports.ts", - output: "tsx_imports.ts.out", - }); - - itest!(fix_dynamic_import_errors { - args: "run --reload fix_dynamic_import_errors.js", - output: "fix_dynamic_import_errors.js.out", - }); - - itest!(fix_emittable_skipped { - args: "run --reload fix_emittable_skipped.js", - output: "fix_emittable_skipped.ts.out", - }); - - itest!(fix_exotic_specifiers { - args: "run --quiet --reload fix_exotic_specifiers.ts", - output: "fix_exotic_specifiers.ts.out", - }); - - itest!(fix_js_import_js { - args: "run --quiet --reload fix_js_import_js.ts", - output: "fix_js_import_js.ts.out", - }); - - itest!(fix_js_imports { - args: "run --quiet --reload fix_js_imports.ts", - output: "fix_js_imports.ts.out", - }); - - itest!(fix_tsc_file_exists { - args: "run --quiet --reload tsc/test.js", - output: "fix_tsc_file_exists.out", - }); - - itest!(fix_worker_dispatchevent { - args: "run --quiet --reload fix_worker_dispatchevent.ts", - output: "fix_worker_dispatchevent.ts.out", - }); - - itest!(es_private_fields { - args: "run --quiet --reload es_private_fields.js", - output: "es_private_fields.js.out", - }); - - itest!(cjs_imports { - args: "run --quiet --reload cjs_imports.ts", - output: "cjs_imports.ts.out", - }); - - itest!(ts_import_from_js { - args: "run --quiet --reload ts_import_from_js.js", - output: "ts_import_from_js.js.out", - http_server: true, - }); - - itest!(jsx_import_from_ts { - args: "run --quiet --reload jsx_import_from_ts.ts", - output: "jsx_import_from_ts.ts.out", - }); - - itest!(single_compile_with_reload { - args: "run --reload --allow-read single_compile_with_reload.ts", - output: "single_compile_with_reload.ts.out", - }); - - itest!(performance_stats { - args: "cache --reload --log-level debug 002_hello.ts", - output: "performance_stats.out", - }); - - itest!(proto_exploit { - args: "run proto_exploit.js", - output: "proto_exploit.js.out", - }); - - itest!(redirect_cache { - http_server: true, - args: - "cache --reload http://localhost:4548/cli/tests/subdir/redirects/a.ts", - output: "redirect_cache.out", - }); - - itest!(reference_types { - args: "run --reload --quiet reference_types.ts", - output: "reference_types.ts.out", - }); - - itest!(references_types_remote { - http_server: true, - args: "run --reload --quiet reference_types_remote.ts", - output: "reference_types_remote.ts.out", - }); - - itest!(deno_doc_types_header_direct { - args: "doc --reload http://127.0.0.1:4545/xTypeScriptTypes.js", - output: "doc/types_header.out", - http_server: true, - }); - - itest!(import_data_url_error_stack { - args: "run --quiet --reload import_data_url_error_stack.ts", - output: "import_data_url_error_stack.ts.out", - exit_code: 1, - }); - - itest!(import_data_url_import_relative { - args: "run --quiet --reload import_data_url_import_relative.ts", - output: "import_data_url_import_relative.ts.out", - exit_code: 1, - }); - - itest!(import_data_url_import_map { - args: "run --quiet --reload --import-map import_maps/import_map.json import_data_url.ts", - output: "import_data_url.ts.out", - }); - - itest!(import_data_url_imports { - args: "run --quiet --reload import_data_url_imports.ts", - output: "import_data_url_imports.ts.out", - http_server: true, - }); - - itest!(import_data_url_jsx { - args: "run --quiet --reload import_data_url_jsx.ts", - output: "import_data_url_jsx.ts.out", - }); - - itest!(import_data_url { - args: "run --quiet --reload import_data_url.ts", - output: "import_data_url.ts.out", - }); - - itest!(import_dynamic_data_url { - args: "run --quiet --reload import_dynamic_data_url.ts", - output: "import_dynamic_data_url.ts.out", - }); - - itest!(import_blob_url_error_stack { - args: "run --quiet --reload import_blob_url_error_stack.ts", - output: "import_blob_url_error_stack.ts.out", - exit_code: 1, - }); - - itest!(import_blob_url_import_relative { - args: "run --quiet --reload import_blob_url_import_relative.ts", - output: "import_blob_url_import_relative.ts.out", - exit_code: 1, - }); - - itest!(import_blob_url_imports { - args: "run --quiet --reload --allow-net=localhost:4545 import_blob_url_imports.ts", - output: "import_blob_url_imports.ts.out", - http_server: true, - }); - - itest!(import_blob_url_jsx { - args: "run --quiet --reload import_blob_url_jsx.ts", - output: "import_blob_url_jsx.ts.out", - }); - - itest!(import_blob_url { - args: "run --quiet --reload import_blob_url.ts", - output: "import_blob_url.ts.out", - }); - - itest!(import_file_with_colon { - args: "run --quiet --reload import_file_with_colon.ts", - output: "import_file_with_colon.ts.out", - http_server: true, - }); - - itest!(info_missing_module { - args: "info error_009_missing_js_module.js", - output: "info_missing_module.out", - }); - - itest!(info_recursive_modules { - args: "info --quiet info_recursive_imports_test.ts", - output: "info_recursive_imports_test.out", - exit_code: 0, - }); - - itest!(info_type_import { - args: "info info_type_import.ts", - output: "info_type_import.out", - }); - - itest!(ignore_require { - args: "cache --reload --no-check ignore_require.js", - output_str: Some(""), - exit_code: 0, - }); - - // FIXME(bartlomieju): disabled, because this test is very flaky on CI - // itest!(local_sources_not_cached_in_memory { - // args: "run --allow-read --allow-write no_mem_cache.js", - // output: "no_mem_cache.js.out", - // }); - - // This test checks that inline source map data is used. It uses a hand crafted - // source map that maps to a file that exists, but is not loaded into the module - // graph (inline_js_source_map_2.ts) (because there are no direct dependencies). - // Source line is not remapped because no inline source contents are included in - // the sourcemap and the file is not present in the dependency graph. - itest!(inline_js_source_map_2 { - args: "run --quiet inline_js_source_map_2.js", - output: "inline_js_source_map_2.js.out", - exit_code: 1, - }); - - // This test checks that inline source map data is used. It uses a hand crafted - // source map that maps to a file that exists, but is not loaded into the module - // graph (inline_js_source_map_2.ts) (because there are no direct dependencies). - // Source line remapped using th inline source contents that are included in the - // inline source map. - itest!(inline_js_source_map_2_with_inline_contents { - args: "run --quiet inline_js_source_map_2_with_inline_contents.js", - output: "inline_js_source_map_2_with_inline_contents.js.out", - exit_code: 1, - }); - - // This test checks that inline source map data is used. It uses a hand crafted - // source map that maps to a file that exists, and is loaded into the module - // graph because of a direct import statement (inline_js_source_map.ts). The - // source map was generated from an earlier version of this file, where the throw - // was not commented out. The source line is remapped using source contents that - // from the module graph. - itest!(inline_js_source_map_with_contents_from_graph { - args: "run --quiet inline_js_source_map_with_contents_from_graph.js", - output: "inline_js_source_map_with_contents_from_graph.js.out", - exit_code: 1, - http_server: true, - }); - - // This test ensures that a descriptive error is shown when we're unable to load - // the import map. Even though this tests only the `run` subcommand, we can be sure - // that the error message is similar for other subcommands as they all use - // `program_state.maybe_import_map` to access the import map underneath. - itest!(error_import_map_unable_to_load { - args: - "run --import-map=import_maps/does_not_exist.json import_maps/test.ts", - output: "error_import_map_unable_to_load.out", - exit_code: 1, - }); - - #[test] - fn no_validate_asm() { - let output = util::deno_cmd() - .current_dir(util::root_path()) - .arg("run") - .arg("cli/tests/no_validate_asm.js") - .stderr(std::process::Stdio::piped()) - .stdout(std::process::Stdio::piped()) - .spawn() - .unwrap() - .wait_with_output() - .unwrap(); - assert!(output.status.success()); - assert!(output.stderr.is_empty()); - assert!(output.stdout.is_empty()); - } - - #[test] - #[ignore] - fn cafile_env_fetch() { - use deno_core::url::Url; - let _g = util::http_server(); - let deno_dir = TempDir::new().expect("tempdir fail"); - let module_url = - Url::parse("https://localhost:5545/cli/tests/cafile_url_imports.ts") - .unwrap(); - let cafile = util::root_path().join("cli/tests/tls/RootCA.pem"); - let output = Command::new(util::deno_exe_path()) - .env("DENO_DIR", deno_dir.path()) - .env("DENO_CERT", cafile) - .current_dir(util::root_path()) - .arg("cache") - .arg(module_url.to_string()) - .output() - .expect("Failed to spawn script"); - assert!(output.status.success()); - } - - #[test] - #[ignore] - fn cafile_fetch() { - use deno_core::url::Url; - let _g = util::http_server(); - let deno_dir = TempDir::new().expect("tempdir fail"); - let module_url = - Url::parse("http://localhost:4545/cli/tests/cafile_url_imports.ts") - .unwrap(); - let cafile = util::root_path().join("cli/tests/tls/RootCA.pem"); - let output = Command::new(util::deno_exe_path()) - .env("DENO_DIR", deno_dir.path()) - .current_dir(util::root_path()) - .arg("cache") - .arg("--cert") - .arg(cafile) - .arg(module_url.to_string()) - .output() - .expect("Failed to spawn script"); - assert!(output.status.success()); - let out = std::str::from_utf8(&output.stdout).unwrap(); - assert_eq!(out, ""); - } - - #[test] - #[ignore] - fn cafile_install_remote_module() { - let _g = util::http_server(); - let temp_dir = TempDir::new().expect("tempdir fail"); - let bin_dir = temp_dir.path().join("bin"); - std::fs::create_dir(&bin_dir).unwrap(); - let deno_dir = TempDir::new().expect("tempdir fail"); - let cafile = util::root_path().join("cli/tests/tls/RootCA.pem"); - - let install_output = Command::new(util::deno_exe_path()) - .env("DENO_DIR", deno_dir.path()) - .current_dir(util::root_path()) - .arg("install") - .arg("--cert") - .arg(cafile) - .arg("--root") - .arg(temp_dir.path()) - .arg("-n") - .arg("echo_test") - .arg("https://localhost:5545/cli/tests/echo.ts") - .output() - .expect("Failed to spawn script"); - println!("{}", std::str::from_utf8(&install_output.stdout).unwrap()); - eprintln!("{}", std::str::from_utf8(&install_output.stderr).unwrap()); - assert!(install_output.status.success()); - - let mut echo_test_path = bin_dir.join("echo_test"); - if cfg!(windows) { - echo_test_path = echo_test_path.with_extension("cmd"); - } - assert!(echo_test_path.exists()); - - let output = Command::new(echo_test_path) - .current_dir(temp_dir.path()) - .arg("foo") - .env("PATH", util::target_dir()) - .output() - .expect("failed to spawn script"); - let stdout = std::str::from_utf8(&output.stdout).unwrap().trim(); - assert!(stdout.ends_with("foo")); - } - - #[test] - #[ignore] - fn cafile_bundle_remote_exports() { - let _g = util::http_server(); - - // First we have to generate a bundle of some remote module that has exports. - let mod1 = "https://localhost:5545/cli/tests/subdir/mod1.ts"; - let cafile = util::root_path().join("cli/tests/tls/RootCA.pem"); - let t = TempDir::new().expect("tempdir fail"); - let bundle = t.path().join("mod1.bundle.js"); - let mut deno = util::deno_cmd() - .current_dir(util::root_path()) - .arg("bundle") - .arg("--cert") - .arg(cafile) - .arg(mod1) - .arg(&bundle) - .spawn() - .expect("failed to spawn script"); - let status = deno.wait().expect("failed to wait for the child process"); - assert!(status.success()); - assert!(bundle.is_file()); - - // Now we try to use that bundle from another module. - let test = t.path().join("test.js"); - std::fs::write( - &test, - " - import { printHello3 } from \"./mod1.bundle.js\"; - printHello3(); ", - ) - .expect("error writing file"); - - let output = util::deno_cmd() - .current_dir(util::root_path()) - .arg("run") - .arg(&test) - .output() - .expect("failed to spawn script"); - // check the output of the test.ts program. - assert!(std::str::from_utf8(&output.stdout) - .unwrap() - .trim() - .ends_with("Hello")); - assert_eq!(output.stderr, b""); - } - - mod doc { - use super::*; - - itest!(deno_doc_builtin { - args: "doc", - output: "deno_doc_builtin.out", - }); - - itest!(deno_doc { - args: "doc deno_doc.ts", - output: "deno_doc.out", - }); - - itest!(deno_doc_import_map { - args: - "doc --unstable --import-map=doc/import_map.json doc/use_import_map.js", - output: "doc/use_import_map.out", - }); - - itest!(deno_doc_types_hint { - args: "doc doc/types_hint.ts", - output: "doc/types_hint.out", - }); - - itest!(deno_doc_types_ref { - args: "doc doc/types_ref.js", - output: "doc/types_ref.out", - }); - - itest!(deno_doc_types_header { - args: "doc --reload doc/types_header.ts", - output: "doc/types_header.out", - http_server: true, - }); - } - - mod lint { - use super::*; - - #[test] - fn ignore_unexplicit_files() { - let output = util::deno_cmd() - .current_dir(util::root_path()) - .env("NO_COLOR", "1") - .arg("lint") - .arg("--unstable") - .arg("--ignore=./") - .stderr(std::process::Stdio::piped()) - .spawn() - .unwrap() - .wait_with_output() - .unwrap(); - assert!(!output.status.success()); - assert_eq!( - String::from_utf8_lossy(&output.stderr), - "error: No target files found.\n" - ); - } - - itest!(all { - args: "lint --unstable lint/file1.js lint/file2.ts lint/ignored_file.ts", - output: "lint/expected.out", - exit_code: 1, - }); - - itest!(quiet { - args: "lint --unstable --quiet lint/file1.js", - output: "lint/expected_quiet.out", - exit_code: 1, - }); - - itest!(json { - args: - "lint --unstable --json lint/file1.js lint/file2.ts lint/ignored_file.ts lint/malformed.js", - output: "lint/expected_json.out", - exit_code: 1, - }); - - itest!(ignore { - args: "lint --unstable --ignore=lint/file1.js,lint/malformed.js lint/", - output: "lint/expected_ignore.out", - exit_code: 1, - }); - - itest!(glob { - args: "lint --unstable --ignore=lint/malformed.js lint/", - output: "lint/expected_glob.out", - exit_code: 1, - }); - - itest!(stdin { - args: "lint --unstable -", - input: Some("let _a: any;"), - output: "lint/expected_from_stdin.out", - exit_code: 1, - }); - - itest!(stdin_json { - args: "lint --unstable --json -", - input: Some("let _a: any;"), - output: "lint/expected_from_stdin_json.out", - exit_code: 1, - }); - - itest!(rules { - args: "lint --unstable --rules", - output: "lint/expected_rules.out", - exit_code: 0, - }); - - // Make sure that the rules are printed if quiet option is enabled. - itest!(rules_quiet { - args: "lint --unstable --rules -q", - output: "lint/expected_rules.out", - exit_code: 0, - }); - } - - mod coverage { - use super::*; - - #[test] - fn branch() { - let tempdir = TempDir::new().expect("tempdir fail"); - let tempdir = tempdir.path().join("cov"); - let status = util::deno_cmd() - .current_dir(util::root_path()) - .arg("test") - .arg("--quiet") - .arg("--unstable") - .arg(format!("--coverage={}", tempdir.to_str().unwrap())) - .arg("cli/tests/coverage/branch_test.ts") - .stdout(std::process::Stdio::piped()) - .stderr(std::process::Stdio::inherit()) - .status() - .expect("failed to spawn test runner"); - - assert!(status.success()); - - let output = util::deno_cmd() - .current_dir(util::root_path()) - .arg("coverage") - .arg("--quiet") - .arg("--unstable") - .arg(format!("{}/", tempdir.to_str().unwrap())) - .stdout(std::process::Stdio::piped()) - .stderr(std::process::Stdio::inherit()) - .output() - .expect("failed to spawn coverage reporter"); - - let actual = - util::strip_ansi_codes(std::str::from_utf8(&output.stdout).unwrap()) - .to_string(); - - let expected = fs::read_to_string( - util::root_path().join("cli/tests/coverage/expected_branch.out"), - ) - .unwrap(); - - if !util::wildcard_match(&expected, &actual) { - println!("OUTPUT\n{}\nOUTPUT", actual); - println!("EXPECTED\n{}\nEXPECTED", expected); - panic!("pattern match failed"); - } - - assert!(output.status.success()); - - let output = util::deno_cmd() - .current_dir(util::root_path()) - .arg("coverage") - .arg("--quiet") - .arg("--unstable") - .arg("--lcov") - .arg(format!("{}/", tempdir.to_str().unwrap())) - .stdout(std::process::Stdio::piped()) - .stderr(std::process::Stdio::inherit()) - .output() - .expect("failed to spawn coverage reporter"); - - let actual = - util::strip_ansi_codes(std::str::from_utf8(&output.stdout).unwrap()) - .to_string(); - - let expected = fs::read_to_string( - util::root_path().join("cli/tests/coverage/expected_branch.lcov"), - ) - .unwrap(); - - if !util::wildcard_match(&expected, &actual) { - println!("OUTPUT\n{}\nOUTPUT", actual); - println!("EXPECTED\n{}\nEXPECTED", expected); - panic!("pattern match failed"); - } - - assert!(output.status.success()); - } - - #[test] - fn complex() { - let tempdir = TempDir::new().expect("tempdir fail"); - let status = util::deno_cmd() - .current_dir(util::root_path()) - .arg("test") - .arg("--quiet") - .arg("--unstable") - .arg(format!("--coverage={}", tempdir.path().to_str().unwrap())) - .arg("cli/tests/coverage/complex_test.ts") - .stdout(std::process::Stdio::piped()) - .stderr(std::process::Stdio::inherit()) - .status() - .expect("failed to spawn test runner"); - - assert!(status.success()); - - let output = util::deno_cmd() - .current_dir(util::root_path()) - .arg("coverage") - .arg("--quiet") - .arg("--unstable") - .arg(format!("{}/", tempdir.path().to_str().unwrap())) - .stdout(std::process::Stdio::piped()) - .stderr(std::process::Stdio::inherit()) - .output() - .expect("failed to spawn coverage reporter"); - - let actual = - util::strip_ansi_codes(std::str::from_utf8(&output.stdout).unwrap()) - .to_string(); - - let expected = fs::read_to_string( - util::root_path().join("cli/tests/coverage/expected_complex.out"), - ) - .unwrap(); - - if !util::wildcard_match(&expected, &actual) { - println!("OUTPUT\n{}\nOUTPUT", actual); - println!("EXPECTED\n{}\nEXPECTED", expected); - panic!("pattern match failed"); - } - - assert!(output.status.success()); - - let output = util::deno_cmd() - .current_dir(util::root_path()) - .arg("coverage") - .arg("--quiet") - .arg("--unstable") - .arg("--lcov") - .arg(format!("{}/", tempdir.path().to_str().unwrap())) - .stdout(std::process::Stdio::piped()) - .stderr(std::process::Stdio::inherit()) - .output() - .expect("failed to spawn coverage reporter"); - - let actual = - util::strip_ansi_codes(std::str::from_utf8(&output.stdout).unwrap()) - .to_string(); - - let expected = fs::read_to_string( - util::root_path().join("cli/tests/coverage/expected_complex.lcov"), - ) - .unwrap(); - - if !util::wildcard_match(&expected, &actual) { - println!("OUTPUT\n{}\nOUTPUT", actual); - println!("EXPECTED\n{}\nEXPECTED", expected); - panic!("pattern match failed"); - } - - assert!(output.status.success()); - } - } - - mod permissions { - use super::*; - - #[test] - fn with_allow() { - for permission in &util::PERMISSION_VARIANTS { - let status = util::deno_cmd() - .current_dir(&util::tests_path()) - .arg("run") - .arg(format!("--allow-{0}", permission)) - .arg("permission_test.ts") - .arg(format!("{0}Required", permission)) - .spawn() - .unwrap() - .wait() - .unwrap(); - assert!(status.success()); - } - } - - #[test] - fn without_allow() { - for permission in &util::PERMISSION_VARIANTS { - let (_, err) = util::run_and_collect_output( - false, - &format!("run permission_test.ts {0}Required", permission), - None, - None, - false, - ); - assert!(err.contains(util::PERMISSION_DENIED_PATTERN)); - } - } - - #[test] - fn rw_inside_project_dir() { - const PERMISSION_VARIANTS: [&str; 2] = ["read", "write"]; - for permission in &PERMISSION_VARIANTS { - let status = util::deno_cmd() - .current_dir(&util::tests_path()) - .arg("run") - .arg(format!( - "--allow-{0}={1}", - permission, - util::root_path().into_os_string().into_string().unwrap() - )) - .arg("complex_permissions_test.ts") - .arg(permission) - .arg("complex_permissions_test.ts") - .spawn() - .unwrap() - .wait() - .unwrap(); - assert!(status.success()); - } - } - - #[test] - fn rw_outside_test_dir() { - const PERMISSION_VARIANTS: [&str; 2] = ["read", "write"]; - for permission in &PERMISSION_VARIANTS { - let (_, err) = util::run_and_collect_output( - false, - &format!( - "run --allow-{0}={1} complex_permissions_test.ts {0} {2}", - permission, - util::root_path() - .join("cli") - .join("tests") - .into_os_string() - .into_string() - .unwrap(), - util::root_path() - .join("Cargo.toml") - .into_os_string() - .into_string() - .unwrap(), - ), - None, - None, - false, - ); - assert!(err.contains(util::PERMISSION_DENIED_PATTERN)); - } - } - - #[test] - fn rw_inside_test_dir() { - const PERMISSION_VARIANTS: [&str; 2] = ["read", "write"]; - for permission in &PERMISSION_VARIANTS { - let status = util::deno_cmd() - .current_dir(&util::tests_path()) - .arg("run") - .arg(format!( - "--allow-{0}={1}", - permission, - util::root_path() - .join("cli") - .join("tests") - .into_os_string() - .into_string() - .unwrap() - )) - .arg("complex_permissions_test.ts") - .arg(permission) - .arg("complex_permissions_test.ts") - .spawn() - .unwrap() - .wait() - .unwrap(); - assert!(status.success()); - } - } - - #[test] - fn rw_outside_test_and_js_dir() { - const PERMISSION_VARIANTS: [&str; 2] = ["read", "write"]; - let test_dir = util::root_path() - .join("cli") - .join("tests") - .into_os_string() - .into_string() - .unwrap(); - let js_dir = util::root_path() - .join("js") - .into_os_string() - .into_string() - .unwrap(); - for permission in &PERMISSION_VARIANTS { - let (_, err) = util::run_and_collect_output( - false, - &format!( - "run --allow-{0}={1},{2} complex_permissions_test.ts {0} {3}", - permission, - test_dir, - js_dir, - util::root_path() - .join("Cargo.toml") - .into_os_string() - .into_string() - .unwrap(), - ), - None, - None, - false, - ); - assert!(err.contains(util::PERMISSION_DENIED_PATTERN)); - } - } - - #[test] - fn rw_inside_test_and_js_dir() { - const PERMISSION_VARIANTS: [&str; 2] = ["read", "write"]; - let test_dir = util::root_path() - .join("cli") - .join("tests") - .into_os_string() - .into_string() - .unwrap(); - let js_dir = util::root_path() - .join("js") - .into_os_string() - .into_string() - .unwrap(); - for permission in &PERMISSION_VARIANTS { - let status = util::deno_cmd() - .current_dir(&util::tests_path()) - .arg("run") - .arg(format!("--allow-{0}={1},{2}", permission, test_dir, js_dir)) - .arg("complex_permissions_test.ts") - .arg(permission) - .arg("complex_permissions_test.ts") - .spawn() - .unwrap() - .wait() - .unwrap(); - assert!(status.success()); - } - } - - #[test] - fn rw_relative() { - const PERMISSION_VARIANTS: [&str; 2] = ["read", "write"]; - for permission in &PERMISSION_VARIANTS { - let status = util::deno_cmd() - .current_dir(&util::tests_path()) - .arg("run") - .arg(format!("--allow-{0}=.", permission)) - .arg("complex_permissions_test.ts") - .arg(permission) - .arg("complex_permissions_test.ts") - .spawn() - .unwrap() - .wait() - .unwrap(); - assert!(status.success()); - } - } - - #[test] - fn rw_no_prefix() { - const PERMISSION_VARIANTS: [&str; 2] = ["read", "write"]; - for permission in &PERMISSION_VARIANTS { - let status = util::deno_cmd() - .current_dir(&util::tests_path()) - .arg("run") - .arg(format!("--allow-{0}=tls/../", permission)) - .arg("complex_permissions_test.ts") - .arg(permission) - .arg("complex_permissions_test.ts") - .spawn() - .unwrap() - .wait() - .unwrap(); - assert!(status.success()); - } - } - - #[test] - fn net_fetch_allow_localhost_4545() { - let (_, err) = util::run_and_collect_output( - true, - "run --allow-net=localhost:4545 complex_permissions_test.ts netFetch http://localhost:4545/", - None, - None, - true, - ); - assert!(!err.contains(util::PERMISSION_DENIED_PATTERN)); - } - - #[test] - fn net_fetch_allow_deno_land() { - let (_, err) = util::run_and_collect_output( - false, - "run --allow-net=deno.land complex_permissions_test.ts netFetch http://localhost:4545/", - None, - None, - true, - ); - assert!(err.contains(util::PERMISSION_DENIED_PATTERN)); - } - - #[test] - fn net_fetch_localhost_4545_fail() { - let (_, err) = util::run_and_collect_output( - false, - "run --allow-net=localhost:4545 complex_permissions_test.ts netFetch http://localhost:4546/", - None, - None, - true, - ); - assert!(err.contains(util::PERMISSION_DENIED_PATTERN)); - } - - #[test] - fn net_fetch_localhost() { - let (_, err) = util::run_and_collect_output( - true, - "run --allow-net=localhost complex_permissions_test.ts netFetch http://localhost:4545/ http://localhost:4546/ http://localhost:4547/", - None, - None, - true, - ); - assert!(!err.contains(util::PERMISSION_DENIED_PATTERN)); - } - - #[test] - fn net_connect_allow_localhost_ip_4555() { - let (_, err) = util::run_and_collect_output( - true, - "run --allow-net=127.0.0.1:4545 complex_permissions_test.ts netConnect 127.0.0.1:4545", - None, - None, - true, - ); - assert!(!err.contains(util::PERMISSION_DENIED_PATTERN)); - } - - #[test] - fn net_connect_allow_deno_land() { - let (_, err) = util::run_and_collect_output( - false, - "run --allow-net=deno.land complex_permissions_test.ts netConnect 127.0.0.1:4546", - None, - None, - true, - ); - assert!(err.contains(util::PERMISSION_DENIED_PATTERN)); - } - - #[test] - fn net_connect_allow_localhost_ip_4545_fail() { - let (_, err) = util::run_and_collect_output( - false, - "run --allow-net=127.0.0.1:4545 complex_permissions_test.ts netConnect 127.0.0.1:4546", - None, - None, - true, - ); - assert!(err.contains(util::PERMISSION_DENIED_PATTERN)); - } - - #[test] - fn net_connect_allow_localhost_ip() { - let (_, err) = util::run_and_collect_output( - true, - "run --allow-net=127.0.0.1 complex_permissions_test.ts netConnect 127.0.0.1:4545 127.0.0.1:4546 127.0.0.1:4547", - None, - None, - true, - ); - assert!(!err.contains(util::PERMISSION_DENIED_PATTERN)); - } - - #[test] - fn net_listen_allow_localhost_4555() { - let (_, err) = util::run_and_collect_output( - true, - "run --allow-net=localhost:4558 complex_permissions_test.ts netListen localhost:4558", - None, - None, - false, - ); - assert!(!err.contains(util::PERMISSION_DENIED_PATTERN)); - } - - #[test] - fn net_listen_allow_deno_land() { - let (_, err) = util::run_and_collect_output( - false, - "run --allow-net=deno.land complex_permissions_test.ts netListen localhost:4545", - None, - None, - false, - ); - assert!(err.contains(util::PERMISSION_DENIED_PATTERN)); - } - - #[test] - fn net_listen_allow_localhost_4555_fail() { - let (_, err) = util::run_and_collect_output( - false, - "run --allow-net=localhost:4555 complex_permissions_test.ts netListen localhost:4556", - None, - None, - false, - ); - assert!(err.contains(util::PERMISSION_DENIED_PATTERN)); - } - - #[test] - fn net_listen_allow_localhost() { - // Port 4600 is chosen to not colide with those used by - // target/debug/test_server - let (_, err) = util::run_and_collect_output( - true, - "run --allow-net=localhost complex_permissions_test.ts netListen localhost:4600", - None, - None, - false, - ); - assert!(!err.contains(util::PERMISSION_DENIED_PATTERN)); - } - } - - mod inspector { - use super::*; - - fn inspect_flag_with_unique_port(flag_prefix: &str) -> String { - use std::sync::atomic::{AtomicU16, Ordering}; - static PORT: AtomicU16 = AtomicU16::new(9229); - let port = PORT.fetch_add(1, Ordering::Relaxed); - format!("{}=127.0.0.1:{}", flag_prefix, port) - } - - fn extract_ws_url_from_stderr( - stderr_lines: &mut impl std::iter::Iterator, - ) -> url::Url { - let stderr_first_line = stderr_lines.next().unwrap(); - assert!(stderr_first_line.starts_with("Debugger listening on ")); - let v: Vec<_> = stderr_first_line.match_indices("ws:").collect(); - assert_eq!(v.len(), 1); - let ws_url_index = v[0].0; - let ws_url = &stderr_first_line[ws_url_index..]; - url::Url::parse(ws_url).unwrap() - } - - #[tokio::test] - async fn inspector_connect() { - let script = util::tests_path().join("inspector1.js"); - let mut child = util::deno_cmd() - .arg("run") - .arg(inspect_flag_with_unique_port("--inspect")) - .arg(script) - .stderr(std::process::Stdio::piped()) - .spawn() - .unwrap(); - - let stderr = child.stderr.as_mut().unwrap(); - let mut stderr_lines = - std::io::BufReader::new(stderr).lines().map(|r| r.unwrap()); - let ws_url = extract_ws_url_from_stderr(&mut stderr_lines); - - // We use tokio_tungstenite as a websocket client because warp (which is - // a dependency of Deno) uses it. - let (_socket, response) = tokio_tungstenite::connect_async(ws_url) - .await - .expect("Can't connect"); - assert_eq!("101 Switching Protocols", response.status().to_string()); - child.kill().unwrap(); - child.wait().unwrap(); - } - - #[derive(Debug)] - enum TestStep { - StdOut(&'static str), - StdErr(&'static str), - WsRecv(&'static str), - WsSend(&'static str), - } - - #[tokio::test] - async fn inspector_break_on_first_line() { - let script = util::tests_path().join("inspector2.js"); - let mut child = util::deno_cmd() - .arg("run") - .arg(inspect_flag_with_unique_port("--inspect-brk")) - .arg(script) - .stdout(std::process::Stdio::piped()) - .stderr(std::process::Stdio::piped()) - .spawn() - .unwrap(); - - let stderr = child.stderr.as_mut().unwrap(); - let mut stderr_lines = - std::io::BufReader::new(stderr).lines().map(|r| r.unwrap()); - let ws_url = extract_ws_url_from_stderr(&mut stderr_lines); - - let (socket, response) = tokio_tungstenite::connect_async(ws_url) - .await - .expect("Can't connect"); - assert_eq!(response.status(), 101); // Switching protocols. - - let (mut socket_tx, socket_rx) = socket.split(); - let mut socket_rx = - socket_rx.map(|msg| msg.unwrap().to_string()).filter(|msg| { - let pass = !msg.starts_with(r#"{"method":"Debugger.scriptParsed","#); - futures::future::ready(pass) - }); - - let stdout = child.stdout.as_mut().unwrap(); - let mut stdout_lines = - std::io::BufReader::new(stdout).lines().map(|r| r.unwrap()); - - use TestStep::*; - let test_steps = vec![ - WsSend(r#"{"id":1,"method":"Runtime.enable"}"#), - WsSend(r#"{"id":2,"method":"Debugger.enable"}"#), - WsRecv( - r#"{"method":"Runtime.executionContextCreated","params":{"context":{"id":1,"#, - ), - WsRecv(r#"{"id":1,"result":{}}"#), - WsRecv(r#"{"id":2,"result":{"debuggerId":"#), - WsSend(r#"{"id":3,"method":"Runtime.runIfWaitingForDebugger"}"#), - WsRecv(r#"{"id":3,"result":{}}"#), - WsRecv(r#"{"method":"Debugger.paused","#), - WsSend( - r#"{"id":4,"method":"Runtime.evaluate","params":{"expression":"Deno.core.print(\"hello from the inspector\\n\")","contextId":1,"includeCommandLineAPI":true,"silent":false,"returnByValue":true}}"#, - ), - WsRecv(r#"{"id":4,"result":{"result":{"type":"undefined"}}}"#), - StdOut("hello from the inspector"), - WsSend(r#"{"id":5,"method":"Debugger.resume"}"#), - WsRecv(r#"{"id":5,"result":{}}"#), - StdOut("hello from the script"), - ]; - - for step in test_steps { - match step { - StdOut(s) => assert_eq!(&stdout_lines.next().unwrap(), s), - WsRecv(s) => assert!(socket_rx.next().await.unwrap().starts_with(s)), - WsSend(s) => socket_tx.send(s.into()).await.unwrap(), - _ => unreachable!(), - } - } - - child.kill().unwrap(); - child.wait().unwrap(); - } - - #[tokio::test] - async fn inspector_pause() { - let script = util::tests_path().join("inspector1.js"); - let mut child = util::deno_cmd() - .arg("run") - .arg(inspect_flag_with_unique_port("--inspect")) - .arg(script) - .stderr(std::process::Stdio::piped()) - .spawn() - .unwrap(); - - let stderr = child.stderr.as_mut().unwrap(); - let mut stderr_lines = - std::io::BufReader::new(stderr).lines().map(|r| r.unwrap()); - let ws_url = extract_ws_url_from_stderr(&mut stderr_lines); - - // We use tokio_tungstenite as a websocket client because warp (which is - // a dependency of Deno) uses it. - let (mut socket, _) = tokio_tungstenite::connect_async(ws_url) - .await - .expect("Can't connect"); - - /// Returns the next websocket message as a string ignoring - /// Debugger.scriptParsed messages. - async fn ws_read_msg( - socket: &mut tokio_tungstenite::WebSocketStream< - tokio_tungstenite::MaybeTlsStream, - >, - ) -> String { - use deno_core::futures::stream::StreamExt; - while let Some(msg) = socket.next().await { - let msg = msg.unwrap().to_string(); - // FIXME(bartlomieju): fails because there's a file loaded - // called 150_errors.js - // assert!(!msg.contains("error")); - if !msg.contains("Debugger.scriptParsed") { - return msg; - } - } - unreachable!() - } - - socket - .send(r#"{"id":6,"method":"Debugger.enable"}"#.into()) - .await - .unwrap(); - - let msg = ws_read_msg(&mut socket).await; - println!("response msg 1 {}", msg); - assert!(msg.starts_with(r#"{"id":6,"result":{"debuggerId":"#)); - - socket - .send(r#"{"id":31,"method":"Debugger.pause"}"#.into()) - .await - .unwrap(); - - let msg = ws_read_msg(&mut socket).await; - println!("response msg 2 {}", msg); - assert_eq!(msg, r#"{"id":31,"result":{}}"#); - - child.kill().unwrap(); - } - - #[tokio::test] - async fn inspector_port_collision() { - // Skip this test on WSL, which allows multiple processes to listen on the - // same port, rather than making `bind()` fail with `EADDRINUSE`. - if cfg!(target_os = "linux") - && std::env::var_os("WSL_DISTRO_NAME").is_some() - { - return; - } - - let script = util::tests_path().join("inspector1.js"); - let inspect_flag = inspect_flag_with_unique_port("--inspect"); - - let mut child1 = util::deno_cmd() - .arg("run") - .arg(&inspect_flag) - .arg(script.clone()) - .stderr(std::process::Stdio::piped()) - .spawn() - .unwrap(); - - let stderr_1 = child1.stderr.as_mut().unwrap(); - let mut stderr_1_lines = std::io::BufReader::new(stderr_1) - .lines() - .map(|r| r.unwrap()); - let _ = extract_ws_url_from_stderr(&mut stderr_1_lines); - - let mut child2 = util::deno_cmd() - .arg("run") - .arg(&inspect_flag) - .arg(script) - .stderr(std::process::Stdio::piped()) - .spawn() - .unwrap(); - - let stderr_2 = child2.stderr.as_mut().unwrap(); - let stderr_2_error_message = std::io::BufReader::new(stderr_2) - .lines() - .map(|r| r.unwrap()) - .inspect(|line| assert!(!line.contains("Debugger listening"))) - .find(|line| line.contains("Cannot start inspector server")); - assert!(stderr_2_error_message.is_some()); - - child1.kill().unwrap(); - child1.wait().unwrap(); - child2.wait().unwrap(); - } - - #[tokio::test] - async fn inspector_does_not_hang() { - let script = util::tests_path().join("inspector3.js"); - let mut child = util::deno_cmd() - .arg("run") - .arg(inspect_flag_with_unique_port("--inspect-brk")) - .env("NO_COLOR", "1") - .arg(script) - .stdout(std::process::Stdio::piped()) - .stderr(std::process::Stdio::piped()) - .spawn() - .unwrap(); - - let stderr = child.stderr.as_mut().unwrap(); - let mut stderr_lines = - std::io::BufReader::new(stderr).lines().map(|r| r.unwrap()); - let ws_url = extract_ws_url_from_stderr(&mut stderr_lines); - - let (socket, response) = tokio_tungstenite::connect_async(ws_url) - .await - .expect("Can't connect"); - assert_eq!(response.status(), 101); // Switching protocols. - - let (mut socket_tx, socket_rx) = socket.split(); - let mut socket_rx = - socket_rx.map(|msg| msg.unwrap().to_string()).filter(|msg| { - let pass = !msg.starts_with(r#"{"method":"Debugger.scriptParsed","#); - futures::future::ready(pass) - }); - - let stdout = child.stdout.as_mut().unwrap(); - let mut stdout_lines = - std::io::BufReader::new(stdout).lines().map(|r| r.unwrap()); - - use TestStep::*; - let test_steps = vec![ - WsSend(r#"{"id":1,"method":"Runtime.enable"}"#), - WsSend(r#"{"id":2,"method":"Debugger.enable"}"#), - WsRecv( - r#"{"method":"Runtime.executionContextCreated","params":{"context":{"id":1,"#, - ), - WsRecv(r#"{"id":1,"result":{}}"#), - WsRecv(r#"{"id":2,"result":{"debuggerId":"#), - WsSend(r#"{"id":3,"method":"Runtime.runIfWaitingForDebugger"}"#), - WsRecv(r#"{"id":3,"result":{}}"#), - WsRecv(r#"{"method":"Debugger.paused","#), - WsSend(r#"{"id":4,"method":"Debugger.resume"}"#), - WsRecv(r#"{"id":4,"result":{}}"#), - WsRecv(r#"{"method":"Debugger.resumed","params":{}}"#), - ]; - - for step in test_steps { - match step { - WsRecv(s) => assert!(socket_rx.next().await.unwrap().starts_with(s)), - WsSend(s) => socket_tx.send(s.into()).await.unwrap(), - _ => unreachable!(), - } - } - - for i in 0..128u32 { - let request_id = i + 10; - // Expect the number {i} on stdout. - let s = i.to_string(); - assert_eq!(stdout_lines.next().unwrap(), s); - // Expect console.log - let s = r#"{"method":"Runtime.consoleAPICalled","#; - assert!(socket_rx.next().await.unwrap().starts_with(s)); - // Expect hitting the `debugger` statement. - let s = r#"{"method":"Debugger.paused","#; - assert!(socket_rx.next().await.unwrap().starts_with(s)); - // Send the 'Debugger.resume' request. - let s = - format!(r#"{{"id":{},"method":"Debugger.resume"}}"#, request_id); - socket_tx.send(s.into()).await.unwrap(); - // Expect confirmation of the 'Debugger.resume' request. - let s = format!(r#"{{"id":{},"result":{{}}}}"#, request_id); - assert_eq!(socket_rx.next().await.unwrap(), s); - let s = r#"{"method":"Debugger.resumed","params":{}}"#; - assert_eq!(socket_rx.next().await.unwrap(), s); - } - - // Check that we can gracefully close the websocket connection. - socket_tx.close().await.unwrap(); - socket_rx.for_each(|_| async {}).await; - - assert_eq!(&stdout_lines.next().unwrap(), "done"); - assert!(child.wait().unwrap().success()); - } - - #[tokio::test] - async fn inspector_without_brk_runs_code() { - let script = util::tests_path().join("inspector4.js"); - let mut child = util::deno_cmd() - .arg("run") - .arg(inspect_flag_with_unique_port("--inspect")) - .arg(script) - .stdout(std::process::Stdio::piped()) - .stderr(std::process::Stdio::piped()) - .spawn() - .unwrap(); - - let stderr = child.stderr.as_mut().unwrap(); - let mut stderr_lines = - std::io::BufReader::new(stderr).lines().map(|r| r.unwrap()); - let _ = extract_ws_url_from_stderr(&mut stderr_lines); - - // Check that inspector actually runs code without waiting for inspector - // connection. - let stdout = child.stdout.as_mut().unwrap(); - let mut stdout_lines = - std::io::BufReader::new(stdout).lines().map(|r| r.unwrap()); - let stdout_first_line = stdout_lines.next().unwrap(); - assert_eq!(stdout_first_line, "hello"); - - child.kill().unwrap(); - child.wait().unwrap(); - } - - #[tokio::test] - async fn inspector_runtime_evaluate_does_not_crash() { - let mut child = util::deno_cmd() - .arg("repl") - .arg(inspect_flag_with_unique_port("--inspect")) - .stdin(std::process::Stdio::piped()) - .stdout(std::process::Stdio::piped()) - .stderr(std::process::Stdio::piped()) - .spawn() - .unwrap(); - - let stderr = child.stderr.as_mut().unwrap(); - let mut stderr_lines = std::io::BufReader::new(stderr) - .lines() - .map(|r| r.unwrap()) - .filter(|s| s.as_str() != "Debugger session started."); - let ws_url = extract_ws_url_from_stderr(&mut stderr_lines); - - let (socket, response) = tokio_tungstenite::connect_async(ws_url) - .await - .expect("Can't connect"); - assert_eq!(response.status(), 101); // Switching protocols. - - let (mut socket_tx, socket_rx) = socket.split(); - let mut socket_rx = - socket_rx.map(|msg| msg.unwrap().to_string()).filter(|msg| { - let pass = !msg.starts_with(r#"{"method":"Debugger.scriptParsed","#); - futures::future::ready(pass) - }); - - let stdin = child.stdin.take().unwrap(); - - let stdout = child.stdout.as_mut().unwrap(); - let mut stdout_lines = std::io::BufReader::new(stdout) - .lines() - .map(|r| r.unwrap()) - .filter(|s| !s.starts_with("Deno ")); - - use TestStep::*; - let test_steps = vec![ - WsSend(r#"{"id":1,"method":"Runtime.enable"}"#), - WsSend(r#"{"id":2,"method":"Debugger.enable"}"#), - WsRecv( - r#"{"method":"Runtime.executionContextCreated","params":{"context":{"id":1,"#, - ), - WsRecv(r#"{"id":1,"result":{}}"#), - WsRecv(r#"{"id":2,"result":{"debuggerId":"#), - WsSend(r#"{"id":3,"method":"Runtime.runIfWaitingForDebugger"}"#), - WsRecv(r#"{"id":3,"result":{}}"#), - StdOut("exit using ctrl+d or close()"), - WsSend( - r#"{"id":4,"method":"Runtime.compileScript","params":{"expression":"Deno.cwd()","sourceURL":"","persistScript":false,"executionContextId":1}}"#, - ), - WsRecv(r#"{"id":4,"result":{}}"#), - WsSend( - r#"{"id":5,"method":"Runtime.evaluate","params":{"expression":"Deno.cwd()","objectGroup":"console","includeCommandLineAPI":true,"silent":false,"contextId":1,"returnByValue":true,"generatePreview":true,"userGesture":true,"awaitPromise":false,"replMode":true}}"#, - ), - WsRecv(r#"{"id":5,"result":{"result":{"type":"string","value":""#), - WsSend( - r#"{"id":6,"method":"Runtime.evaluate","params":{"expression":"console.error('done');","objectGroup":"console","includeCommandLineAPI":true,"silent":false,"contextId":1,"returnByValue":true,"generatePreview":true,"userGesture":true,"awaitPromise":false,"replMode":true}}"#, - ), - WsRecv(r#"{"method":"Runtime.consoleAPICalled"#), - WsRecv(r#"{"id":6,"result":{"result":{"type":"undefined"}}}"#), - StdErr("done"), - ]; - - for step in test_steps { - match step { - StdOut(s) => assert_eq!(&stdout_lines.next().unwrap(), s), - StdErr(s) => assert_eq!(&stderr_lines.next().unwrap(), s), - WsRecv(s) => assert!(socket_rx.next().await.unwrap().starts_with(s)), - WsSend(s) => socket_tx.send(s.into()).await.unwrap(), - } - } - - drop(stdin); - child.wait().unwrap(); - } - - #[tokio::test] - async fn inspector_json() { - let script = util::tests_path().join("inspector1.js"); - let mut child = util::deno_cmd() - .arg("run") - .arg(inspect_flag_with_unique_port("--inspect")) - .arg(script) - .stderr(std::process::Stdio::piped()) - .spawn() - .unwrap(); - - let stderr = child.stderr.as_mut().unwrap(); - let mut stderr_lines = - std::io::BufReader::new(stderr).lines().map(|r| r.unwrap()); - let ws_url = extract_ws_url_from_stderr(&mut stderr_lines); - let mut url = ws_url.clone(); - let _ = url.set_scheme("http"); - url.set_path("/json"); - let resp = reqwest::get(url).await.unwrap(); - assert_eq!(resp.status(), reqwest::StatusCode::OK); - let endpoint_list: Vec = - serde_json::from_str(&resp.text().await.unwrap()).unwrap(); - let matching_endpoint = endpoint_list - .iter() - .find(|e| e["webSocketDebuggerUrl"] == ws_url.as_str()); - assert!(matching_endpoint.is_some()); - child.kill().unwrap(); - } - - #[tokio::test] - async fn inspector_json_list() { - let script = util::tests_path().join("inspector1.js"); - let mut child = util::deno_cmd() - .arg("run") - .arg(inspect_flag_with_unique_port("--inspect")) - .arg(script) - .stderr(std::process::Stdio::piped()) - .spawn() - .unwrap(); - - let stderr = child.stderr.as_mut().unwrap(); - let mut stderr_lines = - std::io::BufReader::new(stderr).lines().map(|r| r.unwrap()); - let ws_url = extract_ws_url_from_stderr(&mut stderr_lines); - let mut url = ws_url.clone(); - let _ = url.set_scheme("http"); - url.set_path("/json/list"); - let resp = reqwest::get(url).await.unwrap(); - assert_eq!(resp.status(), reqwest::StatusCode::OK); - let endpoint_list: Vec = - serde_json::from_str(&resp.text().await.unwrap()).unwrap(); - let matching_endpoint = endpoint_list - .iter() - .find(|e| e["webSocketDebuggerUrl"] == ws_url.as_str()); - assert!(matching_endpoint.is_some()); - child.kill().unwrap(); - } - } - - #[test] - fn websocket() { - let _g = util::http_server(); - - let script = util::tests_path().join("websocket_test.ts"); - let root_ca = util::tests_path().join("tls/RootCA.pem"); - let status = util::deno_cmd() - .arg("test") - .arg("--unstable") - .arg("--allow-net") - .arg("--cert") - .arg(root_ca) - .arg(script) - .spawn() - .unwrap() - .wait() - .unwrap(); - - assert!(status.success()); - } - - #[test] - fn exec_path() { - let output = util::deno_cmd() - .current_dir(util::root_path()) - .arg("run") - .arg("--allow-read") - .arg("cli/tests/exec_path.ts") - .stdout(std::process::Stdio::piped()) - .spawn() - .unwrap() - .wait_with_output() - .unwrap(); - assert!(output.status.success()); - let stdout_str = std::str::from_utf8(&output.stdout).unwrap().trim(); - let actual = - std::fs::canonicalize(&std::path::Path::new(stdout_str)).unwrap(); - let expected = std::fs::canonicalize(util::deno_exe_path()).unwrap(); - assert_eq!(expected, actual); - } - - #[cfg(not(windows))] - #[test] - fn set_raw_should_not_panic_on_no_tty() { - let output = util::deno_cmd() - .arg("eval") - .arg("--unstable") - .arg("Deno.setRaw(Deno.stdin.rid, true)") - // stdin set to piped so it certainly does not refer to TTY - .stdin(std::process::Stdio::piped()) - // stderr is piped so we can capture output. - .stderr(std::process::Stdio::piped()) - .spawn() - .unwrap() - .wait_with_output() - .unwrap(); - assert!(!output.status.success()); - let stderr = std::str::from_utf8(&output.stderr).unwrap().trim(); - assert!(stderr.contains("BadResource")); - } - - #[cfg(windows)] - // Clippy suggests to remove the `NoStd` prefix from all variants. I disagree. - #[allow(clippy::enum_variant_names)] - enum WinProcConstraints { - NoStdIn, - NoStdOut, - NoStdErr, - } - - #[cfg(windows)] - fn run_deno_script_constrained( - script_path: std::path::PathBuf, - constraints: WinProcConstraints, - ) -> Result<(), i64> { - let file_path = "cli/tests/DenoWinRunner.ps1"; - let constraints = match constraints { - WinProcConstraints::NoStdIn => "1", - WinProcConstraints::NoStdOut => "2", - WinProcConstraints::NoStdErr => "4", - }; - let deno_exe_path = util::deno_exe_path() - .into_os_string() - .into_string() - .unwrap(); - - let deno_script_path = script_path.into_os_string().into_string().unwrap(); - - let args = vec![&deno_exe_path[..], &deno_script_path[..], constraints]; - util::run_powershell_script_file(file_path, args) - } - - #[cfg(windows)] - #[test] - fn should_not_panic_on_no_stdin() { - let output = run_deno_script_constrained( - util::tests_path().join("echo.ts"), - WinProcConstraints::NoStdIn, - ); - output.unwrap(); - } - - #[cfg(windows)] - #[test] - fn should_not_panic_on_no_stdout() { - let output = run_deno_script_constrained( - util::tests_path().join("echo.ts"), - WinProcConstraints::NoStdOut, - ); - output.unwrap(); - } - - #[cfg(windows)] - #[test] - fn should_not_panic_on_no_stderr() { - let output = run_deno_script_constrained( - util::tests_path().join("echo.ts"), - WinProcConstraints::NoStdErr, - ); - output.unwrap(); - } - - #[cfg(not(windows))] - #[test] - fn should_not_panic_on_undefined_home_environment_variable() { - let output = util::deno_cmd() - .current_dir(util::root_path()) - .arg("run") - .arg("cli/tests/echo.ts") - .env_remove("HOME") - .spawn() - .unwrap() - .wait_with_output() - .unwrap(); - assert!(output.status.success()); - } - - #[test] - fn should_not_panic_on_undefined_deno_dir_environment_variable() { - let output = util::deno_cmd() - .current_dir(util::root_path()) - .arg("run") - .arg("cli/tests/echo.ts") - .env_remove("DENO_DIR") - .spawn() - .unwrap() - .wait_with_output() - .unwrap(); - assert!(output.status.success()); - } - - #[cfg(not(windows))] - #[test] - fn should_not_panic_on_undefined_deno_dir_and_home_environment_variables() { - let output = util::deno_cmd() - .current_dir(util::root_path()) - .arg("run") - .arg("cli/tests/echo.ts") - .env_remove("DENO_DIR") - .env_remove("HOME") - .spawn() - .unwrap() - .wait_with_output() - .unwrap(); - assert!(output.status.success()); - } - - #[test] - fn rust_log() { - // Without RUST_LOG the stderr is empty. - let output = util::deno_cmd() - .current_dir(util::root_path()) - .arg("run") - .arg("cli/tests/001_hello.js") - .stderr(std::process::Stdio::piped()) - .spawn() - .unwrap() - .wait_with_output() - .unwrap(); - assert!(output.status.success()); - assert!(output.stderr.is_empty()); - - // With RUST_LOG the stderr is not empty. - let output = util::deno_cmd() - .current_dir(util::root_path()) - .arg("run") - .arg("cli/tests/001_hello.js") - .env("RUST_LOG", "debug") - .stderr(std::process::Stdio::piped()) - .spawn() - .unwrap() - .wait_with_output() - .unwrap(); - assert!(output.status.success()); - assert!(!output.stderr.is_empty()); - } - - #[test] - fn fmt_ignore_unexplicit_files() { - let output = util::deno_cmd() - .current_dir(util::root_path()) - .env("NO_COLOR", "1") - .arg("fmt") - .arg("--check") - .arg("--ignore=./") - .stderr(std::process::Stdio::piped()) - .spawn() - .unwrap() - .wait_with_output() - .unwrap(); - assert!(!output.status.success()); - assert_eq!( - String::from_utf8_lossy(&output.stderr), - "error: No target files found.\n" - ); - } - - #[test] - fn compile() { - let dir = TempDir::new().expect("tempdir fail"); - let exe = if cfg!(windows) { - dir.path().join("welcome.exe") - } else { - dir.path().join("welcome") - }; - let output = util::deno_cmd() - .current_dir(util::root_path()) - .arg("compile") - .arg("--unstable") - .arg("--output") - .arg(&exe) - .arg("./test_util/std/examples/welcome.ts") - .stdout(std::process::Stdio::piped()) - .spawn() - .unwrap() - .wait_with_output() - .unwrap(); - assert!(output.status.success()); - let output = Command::new(exe) - .stdout(std::process::Stdio::piped()) - .spawn() - .unwrap() - .wait_with_output() - .unwrap(); - assert!(output.status.success()); - assert_eq!(output.stdout, "Welcome to Deno!\n".as_bytes()); - } - - #[ignore] - #[test] - #[cfg(windows)] - // https://github.com/denoland/deno/issues/9667 - fn compile_windows_ext() { - let dir = TempDir::new().expect("tempdir fail"); - let exe = dir.path().join("welcome_9667"); - let output = util::deno_cmd() - .current_dir(util::root_path()) - .arg("compile") - .arg("--unstable") - .arg("--output") - .arg(&exe) - .arg("--target") - .arg("x86_64-unknown-linux-gnu") - .arg("./test_util/std/examples/welcome.ts") - // TODO(kt3k): Prints command output to the test log for debugging purpose. - // Uncomment this line when this test become stable. - //.stdout(std::process::Stdio::piped()) - .spawn() - .unwrap() - .wait_with_output() - .unwrap(); - assert!(output.status.success()); - assert!(std::path::Path::new(&exe).exists()); - } - - #[test] - fn standalone_args() { - let dir = TempDir::new().expect("tempdir fail"); - let exe = if cfg!(windows) { - dir.path().join("args.exe") - } else { - dir.path().join("args") - }; - let output = util::deno_cmd() - .current_dir(util::root_path()) - .arg("compile") - .arg("--unstable") - .arg("--output") - .arg(&exe) - .arg("./cli/tests/028_args.ts") - .arg("a") - .arg("b") - .stdout(std::process::Stdio::piped()) - .spawn() - .unwrap() - .wait_with_output() - .unwrap(); - assert!(output.status.success()); - let output = Command::new(exe) - .arg("foo") - .arg("--bar") - .arg("--unstable") - .stdout(std::process::Stdio::piped()) - .spawn() - .unwrap() - .wait_with_output() - .unwrap(); - assert!(output.status.success()); - assert_eq!(output.stdout, b"a\nb\nfoo\n--bar\n--unstable\n"); - } - - #[test] - fn standalone_error() { - let dir = TempDir::new().expect("tempdir fail"); - let exe = if cfg!(windows) { - dir.path().join("error.exe") - } else { - dir.path().join("error") - }; - let output = util::deno_cmd() - .current_dir(util::root_path()) - .arg("compile") - .arg("--unstable") - .arg("--output") - .arg(&exe) - .arg("./cli/tests/standalone_error.ts") - .stdout(std::process::Stdio::piped()) - .spawn() - .unwrap() - .wait_with_output() - .unwrap(); - assert!(output.status.success()); - let output = Command::new(exe) - .env("NO_COLOR", "1") - .stdout(std::process::Stdio::piped()) - .stderr(std::process::Stdio::piped()) - .spawn() - .unwrap() - .wait_with_output() - .unwrap(); - assert!(!output.status.success()); - assert_eq!(output.stdout, b""); - let expected_stderr = "error: Error: boom!\n at boom (file://$deno$/bundle.js:2:11)\n at foo (file://$deno$/bundle.js:5:5)\n at file://$deno$/bundle.js:7:1\n"; - let stderr = String::from_utf8(output.stderr).unwrap(); - assert_eq!(stderr, expected_stderr); - } - - #[test] - fn standalone_no_module_load() { - let dir = TempDir::new().expect("tempdir fail"); - let exe = if cfg!(windows) { - dir.path().join("hello.exe") - } else { - dir.path().join("hello") - }; - let output = util::deno_cmd() - .current_dir(util::root_path()) - .arg("compile") - .arg("--unstable") - .arg("--output") - .arg(&exe) - .arg("./cli/tests/standalone_import.ts") - .stdout(std::process::Stdio::piped()) - .spawn() - .unwrap() - .wait_with_output() - .unwrap(); - assert!(output.status.success()); - let output = Command::new(exe) - .stdout(std::process::Stdio::piped()) - .stderr(std::process::Stdio::piped()) - .spawn() - .unwrap() - .wait_with_output() - .unwrap(); - assert!(!output.status.success()); - assert_eq!(output.stdout, b"start\n"); - let stderr_str = String::from_utf8(output.stderr).unwrap(); - assert!(util::strip_ansi_codes(&stderr_str) - .contains("Self-contained binaries don't support module loading")); - } - - #[test] - fn standalone_load_datauri() { - let dir = TempDir::new().expect("tempdir fail"); - let exe = if cfg!(windows) { - dir.path().join("load_datauri.exe") - } else { - dir.path().join("load_datauri") - }; - let output = util::deno_cmd() - .current_dir(util::root_path()) - .arg("compile") - .arg("--unstable") - .arg("--output") - .arg(&exe) - .arg("./cli/tests/standalone_import_datauri.ts") - .stdout(std::process::Stdio::piped()) - .spawn() - .unwrap() - .wait_with_output() - .unwrap(); - assert!(output.status.success()); - let output = Command::new(exe) - .stdout(std::process::Stdio::piped()) - .stderr(std::process::Stdio::piped()) - .spawn() - .unwrap() - .wait_with_output() - .unwrap(); - assert!(output.status.success()); - assert_eq!(output.stdout, b"Hello Deno!\n"); - } - - #[test] - fn standalone_compiler_ops() { - let dir = TempDir::new().expect("tempdir fail"); - let exe = if cfg!(windows) { - dir.path().join("standalone_compiler_ops.exe") - } else { - dir.path().join("standalone_compiler_ops") - }; - let output = util::deno_cmd() - .current_dir(util::root_path()) - .arg("compile") - .arg("--unstable") - .arg("--output") - .arg(&exe) - .arg("./cli/tests/standalone_compiler_ops.ts") - .stdout(std::process::Stdio::piped()) - .spawn() - .unwrap() - .wait_with_output() - .unwrap(); - assert!(output.status.success()); - let output = Command::new(exe) - .stdout(std::process::Stdio::piped()) - .stderr(std::process::Stdio::piped()) - .spawn() - .unwrap() - .wait_with_output() - .unwrap(); - assert!(output.status.success()); - assert_eq!(output.stdout, b"Hello, Compiler API!\n"); - } - - #[test] - fn compile_with_directory_exists_error() { - let dir = TempDir::new().expect("tempdir fail"); - let exe = if cfg!(windows) { - dir.path().join("args.exe") - } else { - dir.path().join("args") - }; - std::fs::create_dir(&exe).expect("cannot create directory"); - let output = util::deno_cmd() - .current_dir(util::root_path()) - .arg("compile") - .arg("--unstable") - .arg("--output") - .arg(&exe) - .arg("./cli/tests/028_args.ts") - .stderr(std::process::Stdio::piped()) - .spawn() - .unwrap() - .wait_with_output() - .unwrap(); - assert!(!output.status.success()); - let expected_stderr = - format!("Could not compile: {:?} is a directory.\n", &exe); - let stderr = String::from_utf8(output.stderr).unwrap(); - assert!(stderr.contains(&expected_stderr)); - } - - #[test] - fn compile_with_conflict_file_exists_error() { - let dir = TempDir::new().expect("tempdir fail"); - let exe = if cfg!(windows) { - dir.path().join("args.exe") - } else { - dir.path().join("args") - }; - std::fs::write(&exe, b"SHOULD NOT BE OVERWRITTEN") - .expect("cannot create file"); - let output = util::deno_cmd() - .current_dir(util::root_path()) - .arg("compile") - .arg("--unstable") - .arg("--output") - .arg(&exe) - .arg("./cli/tests/028_args.ts") - .stderr(std::process::Stdio::piped()) - .spawn() - .unwrap() - .wait_with_output() - .unwrap(); - assert!(!output.status.success()); - let expected_stderr = - format!("Could not compile: cannot overwrite {:?}.\n", &exe); - let stderr = String::from_utf8(output.stderr).unwrap(); - dbg!(&stderr); - assert!(stderr.contains(&expected_stderr)); - assert!(std::fs::read(&exe) - .expect("cannot read file") - .eq(b"SHOULD NOT BE OVERWRITTEN")); - } - - #[test] - fn compile_and_overwrite_file() { - let dir = TempDir::new().expect("tempdir fail"); - let exe = if cfg!(windows) { - dir.path().join("args.exe") - } else { - dir.path().join("args") - }; - let output = util::deno_cmd() - .current_dir(util::root_path()) - .arg("compile") - .arg("--unstable") - .arg("--output") - .arg(&exe) - .arg("./cli/tests/028_args.ts") - .stderr(std::process::Stdio::piped()) - .spawn() - .unwrap() - .wait_with_output() - .unwrap(); - assert!(output.status.success()); - assert!(&exe.exists()); - - let recompile_output = util::deno_cmd() - .current_dir(util::root_path()) - .arg("compile") - .arg("--unstable") - .arg("--output") - .arg(&exe) - .arg("./cli/tests/028_args.ts") - .stderr(std::process::Stdio::piped()) - .spawn() - .unwrap() - .wait_with_output() - .unwrap(); - assert!(recompile_output.status.success()); - } - - #[test] - fn standalone_runtime_flags() { - let dir = TempDir::new().expect("tempdir fail"); - let exe = if cfg!(windows) { - dir.path().join("flags.exe") - } else { - dir.path().join("flags") - }; - let output = util::deno_cmd() - .current_dir(util::root_path()) - .arg("compile") - .arg("--unstable") - .arg("--allow-read") - .arg("--seed") - .arg("1") - .arg("--output") - .arg(&exe) - .arg("./cli/tests/standalone_runtime_flags.ts") - .stdout(std::process::Stdio::piped()) - .spawn() - .unwrap() - .wait_with_output() - .unwrap(); - assert!(output.status.success()); - let output = Command::new(exe) - .stdout(std::process::Stdio::piped()) - .stderr(std::process::Stdio::piped()) - .spawn() - .unwrap() - .wait_with_output() - .unwrap(); - assert!(!output.status.success()); - let stdout_str = String::from_utf8(output.stdout).unwrap(); - assert_eq!(util::strip_ansi_codes(&stdout_str), "0.147205063401058\n"); - let stderr_str = String::from_utf8(output.stderr).unwrap(); - assert!(util::strip_ansi_codes(&stderr_str) - .contains("PermissionDenied: Requires write access")); - } - - #[tokio::test(flavor = "multi_thread", worker_threads = 2)] - async fn test_resolve_dns() { - use std::collections::BTreeMap; - use std::net::Ipv4Addr; - use std::net::Ipv6Addr; - use std::net::SocketAddr; - use std::str::FromStr; - use std::sync::Arc; - use std::sync::RwLock; - use std::time::Duration; - use tokio::net::TcpListener; - use tokio::net::UdpSocket; - use tokio::sync::oneshot; - use trust_dns_client::rr::LowerName; - use trust_dns_client::rr::RecordType; - use trust_dns_client::rr::RrKey; - use trust_dns_server::authority::Catalog; - use trust_dns_server::authority::ZoneType; - use trust_dns_server::proto::rr::rdata::mx::MX; - use trust_dns_server::proto::rr::rdata::soa::SOA; - use trust_dns_server::proto::rr::rdata::srv::SRV; - use trust_dns_server::proto::rr::rdata::txt::TXT; - use trust_dns_server::proto::rr::record_data::RData; - use trust_dns_server::proto::rr::resource::Record; - use trust_dns_server::proto::rr::Name; - use trust_dns_server::proto::rr::RecordSet; - use trust_dns_server::store::in_memory::InMemoryAuthority; - use trust_dns_server::ServerFuture; - - const DNS_PORT: u16 = 4553; - - // Setup DNS server for testing - async fn run_dns_server(tx: oneshot::Sender<()>) { - let catalog = { - let records = { - let mut map = BTreeMap::new(); - let lookup_name = "www.example.com".parse::().unwrap(); - let lookup_name_lower = LowerName::new(&lookup_name); - - // Inserts SOA record - let soa = SOA::new( - Name::from_str("net").unwrap(), - Name::from_str("example").unwrap(), - 0, - i32::MAX, - i32::MAX, - i32::MAX, - 0, - ); - let rdata = RData::SOA(soa); - let record = Record::from_rdata(Name::new(), u32::MAX, rdata); - let record_set = RecordSet::from(record); - map.insert( - RrKey::new(Name::root().into(), RecordType::SOA), - record_set, - ); - - // Inserts A record - let rdata = RData::A(Ipv4Addr::new(1, 2, 3, 4)); - let record = Record::from_rdata(lookup_name.clone(), u32::MAX, rdata); - let record_set = RecordSet::from(record); - map.insert( - RrKey::new(lookup_name_lower.clone(), RecordType::A), - record_set, - ); - - // Inserts AAAA record - let rdata = RData::AAAA(Ipv6Addr::new(1, 2, 3, 4, 5, 6, 7, 8)); - let record = Record::from_rdata(lookup_name.clone(), u32::MAX, rdata); - let record_set = RecordSet::from(record); - map.insert( - RrKey::new(lookup_name_lower.clone(), RecordType::AAAA), - record_set, - ); - - // Inserts ANAME record - let rdata = RData::ANAME(Name::from_str("aname.com").unwrap()); - let record = Record::from_rdata(lookup_name.clone(), u32::MAX, rdata); - let record_set = RecordSet::from(record); - map.insert( - RrKey::new(lookup_name_lower.clone(), RecordType::ANAME), - record_set, - ); - - // Inserts CNAME record - let rdata = RData::CNAME(Name::from_str("cname.com").unwrap()); - let record = - Record::from_rdata(Name::from_str("foo").unwrap(), u32::MAX, rdata); - let record_set = RecordSet::from(record); - map.insert( - RrKey::new(lookup_name_lower.clone(), RecordType::CNAME), - record_set, - ); - - // Inserts MX record - let rdata = RData::MX(MX::new(0, Name::from_str("mx.com").unwrap())); - let record = Record::from_rdata(lookup_name.clone(), u32::MAX, rdata); - let record_set = RecordSet::from(record); - map.insert( - RrKey::new(lookup_name_lower.clone(), RecordType::MX), - record_set, - ); - - // Inserts PTR record - let rdata = RData::PTR(Name::from_str("ptr.com").unwrap()); - let record = Record::from_rdata( - Name::from_str("5.6.7.8").unwrap(), - u32::MAX, - rdata, - ); - let record_set = RecordSet::from(record); - map.insert( - RrKey::new("5.6.7.8".parse().unwrap(), RecordType::PTR), - record_set, - ); - - // Inserts SRV record - let rdata = RData::SRV(SRV::new( - 0, - 100, - 1234, - Name::from_str("srv.com").unwrap(), - )); - let record = Record::from_rdata( - Name::from_str("_Service._TCP.example.com").unwrap(), - u32::MAX, - rdata, - ); - let record_set = RecordSet::from(record); - map.insert( - RrKey::new(lookup_name_lower.clone(), RecordType::SRV), - record_set, - ); - - // Inserts TXT record - let rdata = - RData::TXT(TXT::new(vec!["foo".to_string(), "bar".to_string()])); - let record = Record::from_rdata(lookup_name, u32::MAX, rdata); - let record_set = RecordSet::from(record); - map - .insert(RrKey::new(lookup_name_lower, RecordType::TXT), record_set); - - map - }; - - let authority = Box::new(Arc::new(RwLock::new( - InMemoryAuthority::new( - Name::from_str("com").unwrap(), - records, - ZoneType::Primary, - false, - ) - .unwrap(), - ))); - let mut c = Catalog::new(); - c.upsert(Name::root().into(), authority); - c - }; - - let mut server_fut = ServerFuture::new(catalog); - let socket_addr = SocketAddr::from(([127, 0, 0, 1], DNS_PORT)); - let tcp_listener = TcpListener::bind(socket_addr).await.unwrap(); - let udp_socket = UdpSocket::bind(socket_addr).await.unwrap(); - server_fut.register_socket(udp_socket); - server_fut.register_listener(tcp_listener, Duration::from_secs(2)); - - // Notifies that the DNS server is ready - tx.send(()).unwrap(); - - server_fut.block_until_done().await.unwrap(); - } - - let (ready_tx, ready_rx) = oneshot::channel(); - let dns_server_fut = run_dns_server(ready_tx); - let handle = tokio::spawn(dns_server_fut); - - // Waits for the DNS server to be ready - ready_rx.await.unwrap(); - - // Pass: `--allow-net` - { - let output = util::deno_cmd() - .current_dir(util::tests_path()) - .env("NO_COLOR", "1") - .arg("run") - .arg("--allow-net") - .arg("--unstable") - .arg("resolve_dns.ts") - .stdout(std::process::Stdio::piped()) - .stderr(std::process::Stdio::piped()) - .spawn() - .unwrap() - .wait_with_output() - .unwrap(); - let err = String::from_utf8_lossy(&output.stderr); - let out = String::from_utf8_lossy(&output.stdout); - assert!(output.status.success()); - assert!(err.starts_with("Check file")); - - let expected = - std::fs::read_to_string(util::tests_path().join("resolve_dns.ts.out")) - .unwrap(); - assert_eq!(expected, out); - } - - // Pass: `--allow-net=127.0.0.1:4553` - { - let output = util::deno_cmd() - .current_dir(util::tests_path()) - .env("NO_COLOR", "1") - .arg("run") - .arg("--allow-net=127.0.0.1:4553") - .arg("--unstable") - .arg("resolve_dns.ts") - .stdout(std::process::Stdio::piped()) - .stderr(std::process::Stdio::piped()) - .spawn() - .unwrap() - .wait_with_output() - .unwrap(); - let err = String::from_utf8_lossy(&output.stderr); - let out = String::from_utf8_lossy(&output.stdout); - assert!(output.status.success()); - assert!(err.starts_with("Check file")); - - let expected = - std::fs::read_to_string(util::tests_path().join("resolve_dns.ts.out")) - .unwrap(); - assert_eq!(expected, out); - } - - // Permission error: `--allow-net=deno.land` - { - let output = util::deno_cmd() - .current_dir(util::tests_path()) - .env("NO_COLOR", "1") - .arg("run") - .arg("--allow-net=deno.land") - .arg("--unstable") - .arg("resolve_dns.ts") - .stdout(std::process::Stdio::piped()) - .stderr(std::process::Stdio::piped()) - .spawn() - .unwrap() - .wait_with_output() - .unwrap(); - let err = String::from_utf8_lossy(&output.stderr); - let out = String::from_utf8_lossy(&output.stdout); - assert!(!output.status.success()); - assert!(err.starts_with("Check file")); - assert!(err.contains(r#"error: Uncaught (in promise) PermissionDenied: Requires net access to "127.0.0.1:4553""#)); - assert!(out.is_empty()); - } - - // Permission error: no permission specified - { - let output = util::deno_cmd() - .current_dir(util::tests_path()) - .env("NO_COLOR", "1") - .arg("run") - .arg("--unstable") - .arg("resolve_dns.ts") - .stdout(std::process::Stdio::piped()) - .stderr(std::process::Stdio::piped()) - .spawn() - .unwrap() - .wait_with_output() - .unwrap(); - let err = String::from_utf8_lossy(&output.stderr); - let out = String::from_utf8_lossy(&output.stdout); - assert!(!output.status.success()); - assert!(err.starts_with("Check file")); - assert!(err.contains(r#"error: Uncaught (in promise) PermissionDenied: Requires net access to "127.0.0.1:4553""#)); - assert!(out.is_empty()); - } - - handle.abort(); - } -} - -#[tokio::test] -async fn listen_tls_alpn() { - // TLS streams require the presence of an ambient local task set to gracefully - // close dropped connections in the background. - LocalSet::new() - .run_until(async { - let mut child = util::deno_cmd() - .current_dir(util::root_path()) - .arg("run") - .arg("--unstable") - .arg("--quiet") - .arg("--allow-net") - .arg("--allow-read") - .arg("./cli/tests/listen_tls_alpn.ts") - .arg("4504") - .stdout(std::process::Stdio::piped()) - .spawn() - .unwrap(); - let stdout = child.stdout.as_mut().unwrap(); - let mut buffer = [0; 5]; - let read = stdout.read(&mut buffer).unwrap(); - assert_eq!(read, 5); - let msg = std::str::from_utf8(&buffer).unwrap(); - assert_eq!(msg, "READY"); - - let mut cfg = rustls::ClientConfig::new(); - let reader = - &mut BufReader::new(Cursor::new(include_bytes!("./tls/RootCA.crt"))); - cfg.root_store.add_pem_file(reader).unwrap(); - cfg.alpn_protocols.push("foobar".as_bytes().to_vec()); - let cfg = Arc::new(cfg); - - let hostname = - webpki::DNSNameRef::try_from_ascii_str("localhost").unwrap(); - - let tcp_stream = tokio::net::TcpStream::connect("localhost:4504") - .await - .unwrap(); - let mut tls_stream = - TlsStream::new_client_side(tcp_stream, &cfg, hostname); - tls_stream.handshake().await.unwrap(); - let (_, session) = tls_stream.get_ref(); - - let alpn = session.get_alpn_protocol().unwrap(); - assert_eq!(std::str::from_utf8(alpn).unwrap(), "foobar"); - - child.kill().unwrap(); - child.wait().unwrap(); - }) - .await; -} - -#[tokio::test] -async fn listen_tls_alpn_fail() { - // TLS streams require the presence of an ambient local task set to gracefully - // close dropped connections in the background. - LocalSet::new() - .run_until(async { - let mut child = util::deno_cmd() - .current_dir(util::root_path()) - .arg("run") - .arg("--unstable") - .arg("--quiet") - .arg("--allow-net") - .arg("--allow-read") - .arg("./cli/tests/listen_tls_alpn.ts") - .arg("4505") - .stdout(std::process::Stdio::piped()) - .spawn() - .unwrap(); - let stdout = child.stdout.as_mut().unwrap(); - let mut buffer = [0; 5]; - let read = stdout.read(&mut buffer).unwrap(); - assert_eq!(read, 5); - let msg = std::str::from_utf8(&buffer).unwrap(); - assert_eq!(msg, "READY"); - - let mut cfg = rustls::ClientConfig::new(); - let reader = - &mut BufReader::new(Cursor::new(include_bytes!("./tls/RootCA.crt"))); - cfg.root_store.add_pem_file(reader).unwrap(); - cfg.alpn_protocols.push("boofar".as_bytes().to_vec()); - let cfg = Arc::new(cfg); - - let hostname = - webpki::DNSNameRef::try_from_ascii_str("localhost").unwrap(); - - let tcp_stream = tokio::net::TcpStream::connect("localhost:4505") - .await - .unwrap(); - let mut tls_stream = - TlsStream::new_client_side(tcp_stream, &cfg, hostname); - tls_stream.handshake().await.unwrap(); - let (_, session) = tls_stream.get_ref(); - - assert!(session.get_alpn_protocol().is_none()); - - child.kill().unwrap(); - child.wait().unwrap(); - }) - .await; -} +mod integration;