0
0
Fork 0
mirror of https://github.com/denoland/deno.git synced 2025-03-03 17:34:47 -05:00

Support zero-copy data in libdeno.send(). (#838)

This is a large API refactor of deno.h which replaces
deno_send() and deno_set_response() with deno_respond().
It also adds a req_id parameter to the deno_recv_cb.

Make writeFile/writeFileSync use it.
This commit is contained in:
Ryan Dahl 2018-09-27 17:33:10 -04:00 committed by GitHub
parent bf93ca54dd
commit d38ccfc6dc
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
12 changed files with 379 additions and 190 deletions

View file

@ -28,10 +28,11 @@ export function handleAsyncMsgFromRust(ui8: Uint8Array) {
export function sendAsync(
builder: flatbuffers.Builder,
msgType: fbs.Any,
msg: flatbuffers.Offset
msg: flatbuffers.Offset,
data?: ArrayBufferView
): Promise<fbs.Base> {
maybePushTrace(msgType, false); // add to trace if tracing
const [cmdId, resBuf] = sendInternal(builder, msgType, msg, false);
const [cmdId, resBuf] = sendInternal(builder, msgType, msg, data, false);
util.assert(resBuf == null);
const promise = util.createResolvable<fbs.Base>();
promiseTable.set(cmdId, promise);
@ -42,16 +43,16 @@ export function sendAsync(
export function sendSync(
builder: flatbuffers.Builder,
msgType: fbs.Any,
msg: flatbuffers.Offset
msg: flatbuffers.Offset,
data?: ArrayBufferView
): null | fbs.Base {
maybePushTrace(msgType, true); // add to trace if tracing
const [cmdId, resBuf] = sendInternal(builder, msgType, msg, true);
const [cmdId, resBuf] = sendInternal(builder, msgType, msg, data, true);
util.assert(cmdId >= 0);
if (resBuf == null) {
return null;
} else {
const u8 = new Uint8Array(resBuf!);
// console.log("recv sync message", util.hexdump(u8));
const bb = new flatbuffers.ByteBuffer(u8);
const baseRes = fbs.Base.getRootAsBase(bb);
errors.maybeThrowError(baseRes);
@ -63,6 +64,7 @@ function sendInternal(
builder: flatbuffers.Builder,
msgType: fbs.Any,
msg: flatbuffers.Offset,
data: undefined | ArrayBufferView,
sync = true
): [number, null | Uint8Array] {
const cmdId = nextCmdId++;
@ -73,5 +75,5 @@ function sendInternal(
fbs.Base.addCmdId(builder, cmdId);
builder.finish(fbs.Base.endBase(builder));
return [cmdId, libdeno.send(builder.asUint8Array())];
return [cmdId, libdeno.send(builder.asUint8Array(), data)];
}

View file

@ -6,7 +6,7 @@ type MessageCallback = (msg: Uint8Array) => void;
interface Libdeno {
recv(cb: MessageCallback): void;
send(msg: ArrayBufferView): null | Uint8Array;
send(control: ArrayBufferView, data?: ArrayBufferView): null | Uint8Array;
print(x: string, isErr?: boolean): void;

View file

@ -41,14 +41,12 @@ function req(
filename: string,
data: Uint8Array,
perm: number
): [flatbuffers.Builder, fbs.Any, flatbuffers.Offset] {
): [flatbuffers.Builder, fbs.Any, flatbuffers.Offset, Uint8Array] {
const builder = new flatbuffers.Builder();
const filename_ = builder.createString(filename);
const dataOffset = fbs.WriteFile.createDataVector(builder, data);
fbs.WriteFile.startWriteFile(builder);
fbs.WriteFile.addFilename(builder, filename_);
fbs.WriteFile.addData(builder, dataOffset);
fbs.WriteFile.addPerm(builder, perm);
const msg = fbs.WriteFile.endWriteFile(builder);
return [builder, fbs.Any.WriteFile, msg];
return [builder, fbs.Any.WriteFile, msg, data];
}

View file

@ -25,6 +25,36 @@ Deno* FromIsolate(v8::Isolate* isolate) {
return static_cast<Deno*>(isolate->GetData(0));
}
void LazilyCreateDataMap(Deno* d) {
if (d->async_data_map.IsEmpty()) {
v8::HandleScope handle_scope(d->isolate);
// It's important for security reasons that async_data_map is not exposed to
// the VM.
auto async_data_map = v8::Map::New(d->isolate);
d->async_data_map.Reset(d->isolate, async_data_map);
}
DCHECK(!d->async_data_map.IsEmpty());
}
void AddDataRef(Deno* d, int32_t req_id, v8::Local<v8::Value> data_v) {
LazilyCreateDataMap(d);
auto async_data_map = d->async_data_map.Get(d->isolate);
auto context = d->context.Get(d->isolate);
auto req_id_v = v8::Integer::New(d->isolate, req_id);
auto r = async_data_map->Set(context, req_id_v, data_v);
CHECK(!r.IsEmpty());
}
void DeleteDataRef(Deno* d, int32_t req_id) {
LazilyCreateDataMap(d);
auto context = d->context.Get(d->isolate);
// Delete persistent reference to data ArrayBuffer.
auto async_data_map = d->async_data_map.Get(d->isolate);
auto req_id_v = v8::Integer::New(d->isolate, req_id);
auto maybe_deleted = async_data_map->Delete(context, req_id_v);
DCHECK(maybe_deleted.IsJust());
}
// Extracts a C string from a v8::V8 Utf8Value.
const char* ToCString(const v8::String::Utf8Value& value) {
return *value ? *value : "<string conversion failed>";
@ -214,17 +244,40 @@ void Send(const v8::FunctionCallbackInfo<v8::Value>& args) {
v8::Locker locker(d->isolate);
v8::EscapableHandleScope handle_scope(isolate);
CHECK_EQ(args.Length(), 1);
v8::Local<v8::Value> ab_v = args[0];
CHECK(ab_v->IsArrayBufferView());
auto buf = GetContents(isolate, v8::Local<v8::ArrayBufferView>::Cast(ab_v));
CHECK_EQ(d->currentArgs, nullptr); // libdeno.send re-entry forbidden.
int32_t req_id = d->next_req_id++;
v8::Local<v8::Value> control_v = args[0];
CHECK(control_v->IsArrayBufferView());
deno_buf control =
GetContents(isolate, v8::Local<v8::ArrayBufferView>::Cast(control_v));
deno_buf data = {nullptr, 0u, nullptr, 0u};
v8::Local<v8::Value> data_v;
if (args.Length() == 2) {
if (args[1]->IsArrayBufferView()) {
data_v = args[1];
data = GetContents(isolate, v8::Local<v8::ArrayBufferView>::Cast(data_v));
}
} else {
CHECK_EQ(args.Length(), 1);
}
DCHECK_EQ(d->currentArgs, nullptr);
d->currentArgs = &args;
d->cb(d, buf);
d->cb(d, req_id, control, data);
d->currentArgs = nullptr;
if (d->currentArgs == nullptr) {
// This indicates that deno_repond() was called already.
} else {
// Asynchronous.
d->currentArgs = nullptr;
// If the data ArrayBuffer was given, we must maintain a strong reference
// to it until deno_respond is called.
if (!data_v.IsEmpty()) {
AddDataRef(d, req_id, data_v);
}
}
}
// Sets the global error handler.
@ -358,6 +411,7 @@ void InitializeContext(v8::Isolate* isolate, v8::Local<v8::Context> context,
}
void AddIsolate(Deno* d, v8::Isolate* isolate) {
d->next_req_id = 0;
d->isolate = isolate;
// Leaving this code here because it will probably be useful later on, but
// disabling it now as I haven't got tests for the desired behavior.
@ -400,7 +454,17 @@ int deno_execute(Deno* d, const char* js_filename, const char* js_source) {
return deno::Execute(context, js_filename, js_source) ? 1 : 0;
}
int deno_send(Deno* d, deno_buf buf) {
int deno_respond(Deno* d, int32_t req_id, deno_buf buf) {
if (d->currentArgs != nullptr) {
// Synchronous response.
auto ab = deno::ImportBuf(d->isolate, buf);
d->currentArgs->GetReturnValue().Set(ab);
d->currentArgs = nullptr;
return 0;
}
// Asynchronous response.
v8::Locker locker(d->isolate);
v8::Isolate::Scope isolate_scope(d->isolate);
v8::HandleScope handle_scope(d->isolate);
@ -410,10 +474,12 @@ int deno_send(Deno* d, deno_buf buf) {
v8::TryCatch try_catch(d->isolate);
deno::DeleteDataRef(d, req_id);
auto recv = d->recv.Get(d->isolate);
if (recv.IsEmpty()) {
d->last_exception = "libdeno.recv has not been called.";
return 0;
return 1;
}
v8::Local<v8::Value> args[1];
@ -422,17 +488,10 @@ int deno_send(Deno* d, deno_buf buf) {
if (try_catch.HasCaught()) {
deno::HandleException(context, try_catch.Exception());
return 0;
return 1;
}
return 1;
}
void deno_set_response(Deno* d, deno_buf buf) {
// printf("deno_set_response: ");
// hexdump(buf.data_ptr, buf.data_len);
auto ab = deno::ImportBuf(d->isolate, buf);
d->currentArgs->GetReturnValue().Set(ab);
return 0;
}
void deno_delete(Deno* d) {

View file

@ -20,9 +20,11 @@ typedef struct {
struct deno_s;
typedef struct deno_s Deno;
// A callback to receive a message from deno.send javascript call.
// buf is valid only for the lifetime of the call.
typedef void (*deno_recv_cb)(Deno* d, deno_buf buf);
// A callback to receive a message from a libdeno.send() javascript call.
// control_buf is valid for only for the lifetime of this callback.
// data_buf is valid until deno_respond() is called.
typedef void (*deno_recv_cb)(Deno* d, int32_t req_id, deno_buf control_buf,
deno_buf data_buf);
void deno_init();
const char* deno_v8_version();
@ -39,21 +41,25 @@ void* deno_get_data(Deno*);
// 0 = fail, 1 = success
int deno_execute(Deno* d, const char* js_filename, const char* js_source);
// Routes message to the javascript callback set with deno.recv(). A false
// return value indicates error. Check deno_last_exception() for exception text.
// 0 = fail, 1 = success
// After calling deno_send(), the caller no longer owns `buf` and must not use
// it; deno_send() is responsible for releasing it's memory.
// TODO(piscisaureus) In C++ and/or Rust, use a smart pointer or similar to
// enforce this rule.
int deno_send(Deno* d, deno_buf buf);
// Call this inside a deno_recv_cb to respond synchronously to messages.
// If this is not called during the life time of a deno_recv_cb callback
// the deno.send() call in javascript will return null.
// After calling deno_set_response(), the caller no longer owns `buf` and must
// not access it; deno_set_response() is responsible for releasing it's memory.
void deno_set_response(Deno* d, deno_buf buf);
// deno_respond sends up to one message back for every deno_recv_cb made.
//
// If this is called during deno_recv_cb, the issuing libdeno.send() in
// javascript will synchronously return the specified buf as an ArrayBuffer (or
// null if buf is empty).
//
// If this is called after deno_recv_cb has returned, the deno_respond
// will call into the JS callback specified by libdeno.recv().
//
// (Ideally, but not currently: After calling deno_respond(), the caller no
// longer owns `buf` and must not use it; deno_respond() is responsible for
// releasing its memory.)
//
// Calling this function more than once with the same req_id will result in
// an error.
//
// A non-zero return value, means a JS exception was encountered during the
// libdeno.recv() callback. Check deno_last_exception() for exception text.
int deno_respond(Deno* d, int32_t req_id, deno_buf buf);
const char* deno_last_exception(Deno* d);

View file

@ -15,7 +15,9 @@ struct deno_s {
v8::Persistent<v8::Function> recv;
v8::Persistent<v8::Function> global_error_handler;
v8::Persistent<v8::Context> context;
v8::Persistent<v8::Map> async_data_map;
deno_recv_cb cb;
int32_t next_req_id;
void* data;
};
}

View file

@ -45,34 +45,17 @@ deno_buf StrBufNullAllocPtr(const char* str) {
return buf;
}
TEST(LibDenoTest, SendSuccess) {
Deno* d = deno_new(nullptr, nullptr);
EXPECT_TRUE(deno_execute(d, "a.js", "SendSuccess()"));
EXPECT_TRUE(deno_send(d, strbuf("abc")));
deno_delete(d);
}
TEST(LibDenoTest, SendWrongByteLength) {
Deno* d = deno_new(nullptr, nullptr);
EXPECT_TRUE(deno_execute(d, "a.js", "SendWrongByteLength()"));
// deno_send the wrong sized message, it should throw.
EXPECT_FALSE(deno_send(d, strbuf("abcd")));
std::string exception = deno_last_exception(d);
EXPECT_GT(exception.length(), 1u);
EXPECT_NE(exception.find("assert"), std::string::npos);
deno_delete(d);
}
TEST(LibDenoTest, SendNoCallback) {
Deno* d = deno_new(nullptr, nullptr);
// We didn't call deno.recv() in JS, should fail.
EXPECT_FALSE(deno_send(d, strbuf("abc")));
deno_delete(d);
void assert_null(deno_buf b) {
EXPECT_EQ(b.alloc_ptr, nullptr);
EXPECT_EQ(b.alloc_len, 0u);
EXPECT_EQ(b.data_ptr, nullptr);
EXPECT_EQ(b.data_len, 0u);
}
TEST(LibDenoTest, RecvReturnEmpty) {
static int count = 0;
Deno* d = deno_new(nullptr, [](auto _, auto buf) {
Deno* d = deno_new(nullptr, [](auto _, int req_id, auto buf, auto data_buf) {
assert_null(data_buf);
count++;
EXPECT_EQ(static_cast<size_t>(3), buf.data_len);
EXPECT_EQ(buf.data_ptr[0], 'a');
@ -86,14 +69,16 @@ TEST(LibDenoTest, RecvReturnEmpty) {
TEST(LibDenoTest, RecvReturnBar) {
static int count = 0;
Deno* d = deno_new(nullptr, [](auto deno, auto buf) {
count++;
EXPECT_EQ(static_cast<size_t>(3), buf.data_len);
EXPECT_EQ(buf.data_ptr[0], 'a');
EXPECT_EQ(buf.data_ptr[1], 'b');
EXPECT_EQ(buf.data_ptr[2], 'c');
deno_set_response(deno, strbuf("bar"));
});
Deno* d =
deno_new(nullptr, [](auto deno, int req_id, auto buf, auto data_buf) {
assert_null(data_buf);
count++;
EXPECT_EQ(static_cast<size_t>(3), buf.data_len);
EXPECT_EQ(buf.data_ptr[0], 'a');
EXPECT_EQ(buf.data_ptr[1], 'b');
EXPECT_EQ(buf.data_ptr[2], 'c');
deno_respond(deno, req_id, strbuf("bar"));
});
EXPECT_TRUE(deno_execute(d, "a.js", "RecvReturnBar()"));
EXPECT_EQ(count, 1);
deno_delete(d);
@ -107,31 +92,33 @@ TEST(LibDenoTest, DoubleRecvFails) {
TEST(LibDenoTest, SendRecvSlice) {
static int count = 0;
Deno* d = deno_new(nullptr, [](auto deno, auto buf) {
static const size_t alloc_len = 1024;
size_t i = count++;
// Check the size and offset of the slice.
size_t data_offset = buf.data_ptr - buf.alloc_ptr;
EXPECT_EQ(data_offset, i * 11);
EXPECT_EQ(buf.data_len, alloc_len - i * 30);
EXPECT_EQ(buf.alloc_len, alloc_len);
// Check values written by the JS side.
EXPECT_EQ(buf.data_ptr[0], 100 + i);
EXPECT_EQ(buf.data_ptr[buf.data_len - 1], 100 - i);
// Make copy of the backing buffer -- this is currently necessary because
// deno_set_response() takes ownership over the buffer, but we are not given
// ownership of `buf` by our caller.
uint8_t* alloc_ptr = reinterpret_cast<uint8_t*>(malloc(alloc_len));
memcpy(alloc_ptr, buf.alloc_ptr, alloc_len);
// Make a slice that is a bit shorter than the original.
deno_buf buf2{alloc_ptr, alloc_len, alloc_ptr + data_offset,
buf.data_len - 19};
// Place some values into the buffer for the JS side to verify.
buf2.data_ptr[0] = 200 + i;
buf2.data_ptr[buf2.data_len - 1] = 200 - i;
// Send back.
deno_set_response(deno, buf2);
});
Deno* d =
deno_new(nullptr, [](auto deno, int req_id, auto buf, auto data_buf) {
assert_null(data_buf);
static const size_t alloc_len = 1024;
size_t i = count++;
// Check the size and offset of the slice.
size_t data_offset = buf.data_ptr - buf.alloc_ptr;
EXPECT_EQ(data_offset, i * 11);
EXPECT_EQ(buf.data_len, alloc_len - i * 30);
EXPECT_EQ(buf.alloc_len, alloc_len);
// Check values written by the JS side.
EXPECT_EQ(buf.data_ptr[0], 100 + i);
EXPECT_EQ(buf.data_ptr[buf.data_len - 1], 100 - i);
// Make copy of the backing buffer -- this is currently necessary
// because deno_respond() takes ownership over the buffer, but we are
// not given ownership of `buf` by our caller.
uint8_t* alloc_ptr = reinterpret_cast<uint8_t*>(malloc(alloc_len));
memcpy(alloc_ptr, buf.alloc_ptr, alloc_len);
// Make a slice that is a bit shorter than the original.
deno_buf buf2{alloc_ptr, alloc_len, alloc_ptr + data_offset,
buf.data_len - 19};
// Place some values into the buffer for the JS side to verify.
buf2.data_ptr[0] = 200 + i;
buf2.data_ptr[buf2.data_len - 1] = 200 - i;
// Send back.
deno_respond(deno, req_id, buf2);
});
EXPECT_TRUE(deno_execute(d, "a.js", "SendRecvSlice()"));
EXPECT_EQ(count, 5);
deno_delete(d);
@ -139,7 +126,8 @@ TEST(LibDenoTest, SendRecvSlice) {
TEST(LibDenoTest, JSSendArrayBufferViewTypes) {
static int count = 0;
Deno* d = deno_new(nullptr, [](auto _, auto buf) {
Deno* d = deno_new(nullptr, [](auto _, int req_id, auto buf, auto data_buf) {
assert_null(data_buf);
count++;
size_t data_offset = buf.data_ptr - buf.alloc_ptr;
EXPECT_EQ(data_offset, 2468u);
@ -166,7 +154,8 @@ TEST(LibDenoTest, SnapshotBug) {
TEST(LibDenoTest, GlobalErrorHandling) {
static int count = 0;
Deno* d = deno_new(nullptr, [](auto _, auto buf) {
Deno* d = deno_new(nullptr, [](auto _, int req_id, auto buf, auto data_buf) {
assert_null(data_buf);
count++;
EXPECT_EQ(static_cast<size_t>(1), buf.data_len);
EXPECT_EQ(buf.data_ptr[0], 42);
@ -182,14 +171,25 @@ TEST(LibDenoTest, DoubleGlobalErrorHandlingFails) {
deno_delete(d);
}
TEST(LibDenoTest, SendNullAllocPtr) {
TEST(LibDenoTest, DataBuf) {
static int count = 0;
Deno* d = deno_new(nullptr, [](auto _, auto buf) { count++; });
EXPECT_TRUE(deno_execute(d, "a.js", "SendNullAllocPtr()"));
deno_buf buf = StrBufNullAllocPtr("abcd");
EXPECT_EQ(buf.alloc_ptr, nullptr);
EXPECT_EQ(buf.data_len, 4u);
EXPECT_TRUE(deno_send(d, buf));
EXPECT_EQ(count, 0);
static deno_buf data_buf_copy;
Deno* d = deno_new(nullptr,
[](auto _, int req_id, deno_buf buf, deno_buf data_buf) {
count++;
data_buf.data_ptr[0] = 4;
data_buf.data_ptr[1] = 2;
data_buf_copy = data_buf;
EXPECT_EQ(2u, buf.data_len);
EXPECT_EQ(2u, data_buf.data_len);
EXPECT_EQ(buf.data_ptr[0], 1);
EXPECT_EQ(buf.data_ptr[1], 2);
});
EXPECT_TRUE(deno_execute(d, "a.js", "DataBuf()"));
EXPECT_EQ(count, 1);
// data_buf was subsequently changed in JS, let's check that our copy reflects
// that.
EXPECT_EQ(data_buf_copy.data_ptr[0], 9);
EXPECT_EQ(data_buf_copy.data_ptr[1], 8);
deno_delete(d);
}

View file

@ -25,18 +25,6 @@ global.TypedArraySnapshots = () => {
assert(snapshotted[3] === 7);
};
global.SendSuccess = () => {
libdeno.recv(msg => {
libdeno.print("SendSuccess: ok");
});
};
global.SendWrongByteLength = () => {
libdeno.recv(msg => {
assert(msg.byteLength === 3);
});
};
global.RecvReturnEmpty = () => {
const m1 = new Uint8Array("abc".split("").map(c => c.charCodeAt(0)));
const m2 = m1.slice();
@ -128,13 +116,20 @@ global.DoubleGlobalErrorHandlingFails = () => {
libdeno.setGlobalErrorHandler((message, source, line, col, error) => {});
};
global.SendNullAllocPtr = () => {
libdeno.recv(msg => {
assert(msg instanceof Uint8Array);
assert(msg.byteLength === 4);
assert(msg[0] === "a".charCodeAt(0));
assert(msg[1] === "b".charCodeAt(0));
assert(msg[2] === "c".charCodeAt(0));
assert(msg[3] === "d".charCodeAt(0));
});
// Allocate this buf at the top level to avoid GC.
const dataBuf = new Uint8Array([3, 4]);
global.DataBuf = () => {
const a = new Uint8Array([1, 2]);
const b = dataBuf;
// The second parameter of send should modified by the
// privileged side.
const r = libdeno.send(a, b);
assert(r == null);
// b is different.
assert(b[0] === 4);
assert(b[1] === 2);
// Now we modify it again.
b[0] = 9;
b[1] = 8;
};

View file

@ -33,15 +33,21 @@ type OpResult = DenoResult<Buf>;
// TODO Ideally we wouldn't have to box the Op being returned.
// The box is just to make it easier to get a prototype refactor working.
type Handler = fn(state: Arc<IsolateState>, base: &msg::Base) -> Box<Op>;
type Handler =
fn(state: Arc<IsolateState>, base: &msg::Base, data: &'static mut [u8])
-> Box<Op>;
// Hopefully Rust optimizes this away.
fn empty_buf() -> Buf {
Box::new([])
}
pub fn msg_from_js(state: Arc<IsolateState>, bytes: &[u8]) -> (bool, Box<Op>) {
let base = msg::get_root_as_base(bytes);
pub fn msg_from_js(
state: Arc<IsolateState>,
control: &[u8],
data: &'static mut [u8],
) -> (bool, Box<Op>) {
let base = msg::get_root_as_base(control);
let is_sync = base.sync();
let msg_type = base.msg_type();
let cmd_id = base.cmd_id();
@ -71,7 +77,7 @@ pub fn msg_from_js(state: Arc<IsolateState>, bytes: &[u8]) -> (bool, Box<Op>) {
)),
};
let op: Box<Op> = handler(state.clone(), &base);
let op: Box<Op> = handler(state.clone(), &base, data);
let boxed_op = Box::new(
op.or_else(move |err: DenoError| -> DenoResult<Buf> {
debug!("op err {}", err);
@ -130,12 +136,21 @@ fn not_implemented() -> DenoError {
))
}
fn handle_exit(_config: Arc<IsolateState>, base: &msg::Base) -> Box<Op> {
fn handle_exit(
_config: Arc<IsolateState>,
base: &msg::Base,
_data: &'static mut [u8],
) -> Box<Op> {
let msg = base.msg_as_exit().unwrap();
std::process::exit(msg.code())
}
fn handle_start(state: Arc<IsolateState>, base: &msg::Base) -> Box<Op> {
fn handle_start(
state: Arc<IsolateState>,
base: &msg::Base,
data: &'static mut [u8],
) -> Box<Op> {
assert_eq!(data.len(), 0);
let mut builder = FlatBufferBuilder::new();
let argv = state.argv.iter().map(|s| s.as_str()).collect::<Vec<_>>();
@ -191,7 +206,12 @@ fn odd_future(err: DenoError) -> Box<Op> {
}
// https://github.com/denoland/isolate/blob/golang/os.go#L100-L154
fn handle_code_fetch(state: Arc<IsolateState>, base: &msg::Base) -> Box<Op> {
fn handle_code_fetch(
state: Arc<IsolateState>,
base: &msg::Base,
data: &'static mut [u8],
) -> Box<Op> {
assert_eq!(data.len(), 0);
let msg = base.msg_as_code_fetch().unwrap();
let cmd_id = base.cmd_id();
let module_specifier = msg.module_specifier().unwrap();
@ -228,7 +248,12 @@ fn handle_code_fetch(state: Arc<IsolateState>, base: &msg::Base) -> Box<Op> {
}
// https://github.com/denoland/isolate/blob/golang/os.go#L156-L169
fn handle_code_cache(state: Arc<IsolateState>, base: &msg::Base) -> Box<Op> {
fn handle_code_cache(
state: Arc<IsolateState>,
base: &msg::Base,
data: &'static mut [u8],
) -> Box<Op> {
assert_eq!(data.len(), 0);
let msg = base.msg_as_code_cache().unwrap();
let filename = msg.filename().unwrap();
let source_code = msg.source_code().unwrap();
@ -239,7 +264,12 @@ fn handle_code_cache(state: Arc<IsolateState>, base: &msg::Base) -> Box<Op> {
}()))
}
fn handle_set_timeout(state: Arc<IsolateState>, base: &msg::Base) -> Box<Op> {
fn handle_set_timeout(
state: Arc<IsolateState>,
base: &msg::Base,
data: &'static mut [u8],
) -> Box<Op> {
assert_eq!(data.len(), 0);
let msg = base.msg_as_set_timeout().unwrap();
let val = msg.timeout() as isize;
state
@ -248,7 +278,12 @@ fn handle_set_timeout(state: Arc<IsolateState>, base: &msg::Base) -> Box<Op> {
ok_future(empty_buf())
}
fn handle_set_env(state: Arc<IsolateState>, base: &msg::Base) -> Box<Op> {
fn handle_set_env(
state: Arc<IsolateState>,
base: &msg::Base,
data: &'static mut [u8],
) -> Box<Op> {
assert_eq!(data.len(), 0);
let msg = base.msg_as_set_env().unwrap();
let key = msg.key().unwrap();
let value = msg.value().unwrap();
@ -261,7 +296,12 @@ fn handle_set_env(state: Arc<IsolateState>, base: &msg::Base) -> Box<Op> {
ok_future(empty_buf())
}
fn handle_env(state: Arc<IsolateState>, base: &msg::Base) -> Box<Op> {
fn handle_env(
state: Arc<IsolateState>,
base: &msg::Base,
data: &'static mut [u8],
) -> Box<Op> {
assert_eq!(data.len(), 0);
let cmd_id = base.cmd_id();
if !state.flags.allow_env {
@ -302,7 +342,12 @@ fn handle_env(state: Arc<IsolateState>, base: &msg::Base) -> Box<Op> {
))
}
fn handle_fetch_req(state: Arc<IsolateState>, base: &msg::Base) -> Box<Op> {
fn handle_fetch_req(
state: Arc<IsolateState>,
base: &msg::Base,
data: &'static mut [u8],
) -> Box<Op> {
assert_eq!(data.len(), 0);
let msg = base.msg_as_fetch_req().unwrap();
let cmd_id = base.cmd_id();
let id = msg.id();
@ -436,7 +481,12 @@ macro_rules! blocking {
};
}
fn handle_make_temp_dir(state: Arc<IsolateState>, base: &msg::Base) -> Box<Op> {
fn handle_make_temp_dir(
state: Arc<IsolateState>,
base: &msg::Base,
data: &'static mut [u8],
) -> Box<Op> {
assert_eq!(data.len(), 0);
let base = Box::new(*base);
let msg = base.msg_as_make_temp_dir().unwrap();
let cmd_id = base.cmd_id();
@ -480,7 +530,12 @@ fn handle_make_temp_dir(state: Arc<IsolateState>, base: &msg::Base) -> Box<Op> {
})
}
fn handle_mkdir(state: Arc<IsolateState>, base: &msg::Base) -> Box<Op> {
fn handle_mkdir(
state: Arc<IsolateState>,
base: &msg::Base,
data: &'static mut [u8],
) -> Box<Op> {
assert_eq!(data.len(), 0);
let msg = base.msg_as_mkdir().unwrap();
let mode = msg.mode();
let path = String::from(msg.path().unwrap());
@ -496,7 +551,12 @@ fn handle_mkdir(state: Arc<IsolateState>, base: &msg::Base) -> Box<Op> {
})
}
fn handle_remove(state: Arc<IsolateState>, base: &msg::Base) -> Box<Op> {
fn handle_remove(
state: Arc<IsolateState>,
base: &msg::Base,
data: &'static mut [u8],
) -> Box<Op> {
assert_eq!(data.len(), 0);
let msg = base.msg_as_remove().unwrap();
let path = PathBuf::from(msg.path().unwrap());
let recursive = msg.recursive();
@ -520,7 +580,12 @@ fn handle_remove(state: Arc<IsolateState>, base: &msg::Base) -> Box<Op> {
}
// Prototype https://github.com/denoland/isolate/blob/golang/os.go#L171-L184
fn handle_read_file(_config: Arc<IsolateState>, base: &msg::Base) -> Box<Op> {
fn handle_read_file(
_config: Arc<IsolateState>,
base: &msg::Base,
data: &'static mut [u8],
) -> Box<Op> {
assert_eq!(data.len(), 0);
let msg = base.msg_as_read_file().unwrap();
let cmd_id = base.cmd_id();
let filename = PathBuf::from(msg.filename().unwrap());
@ -570,7 +635,12 @@ fn get_mode(_perm: fs::Permissions) -> u32 {
0
}
fn handle_stat(_config: Arc<IsolateState>, base: &msg::Base) -> Box<Op> {
fn handle_stat(
_config: Arc<IsolateState>,
base: &msg::Base,
data: &'static mut [u8],
) -> Box<Op> {
assert_eq!(data.len(), 0);
let msg = base.msg_as_stat().unwrap();
let cmd_id = base.cmd_id();
let filename = PathBuf::from(msg.filename().unwrap());
@ -612,7 +682,11 @@ fn handle_stat(_config: Arc<IsolateState>, base: &msg::Base) -> Box<Op> {
})
}
fn handle_write_file(state: Arc<IsolateState>, base: &msg::Base) -> Box<Op> {
fn handle_write_file(
state: Arc<IsolateState>,
base: &msg::Base,
data: &'static mut [u8],
) -> Box<Op> {
let msg = base.msg_as_write_file().unwrap();
if !state.flags.allow_write {
@ -620,12 +694,11 @@ fn handle_write_file(state: Arc<IsolateState>, base: &msg::Base) -> Box<Op> {
}
let filename = String::from(msg.filename().unwrap());
let data = Vec::from(msg.data().unwrap());
let perm = msg.perm();
blocking!(base.sync(), || -> OpResult {
debug!("handle_write_file {}", filename);
deno_fs::write_file(Path::new(&filename), data.as_slice(), perm)?;
debug!("handle_write_file {} {}", filename, data.len());
deno_fs::write_file(Path::new(&filename), data, perm)?;
Ok(empty_buf())
})
}
@ -636,7 +709,12 @@ fn remove_timer(state: Arc<IsolateState>, timer_id: u32) {
}
// Prototype: https://github.com/ry/isolate/blob/golang/timers.go#L25-L39
fn handle_timer_start(state: Arc<IsolateState>, base: &msg::Base) -> Box<Op> {
fn handle_timer_start(
state: Arc<IsolateState>,
base: &msg::Base,
data: &'static mut [u8],
) -> Box<Op> {
assert_eq!(data.len(), 0);
debug!("handle_timer_start");
let msg = base.msg_as_timer_start().unwrap();
let cmd_id = base.cmd_id();
@ -679,14 +757,24 @@ fn handle_timer_start(state: Arc<IsolateState>, base: &msg::Base) -> Box<Op> {
}
// Prototype: https://github.com/ry/isolate/blob/golang/timers.go#L40-L43
fn handle_timer_clear(state: Arc<IsolateState>, base: &msg::Base) -> Box<Op> {
fn handle_timer_clear(
state: Arc<IsolateState>,
base: &msg::Base,
data: &'static mut [u8],
) -> Box<Op> {
assert_eq!(data.len(), 0);
let msg = base.msg_as_timer_clear().unwrap();
debug!("handle_timer_clear");
remove_timer(state, msg.id());
ok_future(empty_buf())
}
fn handle_rename(state: Arc<IsolateState>, base: &msg::Base) -> Box<Op> {
fn handle_rename(
state: Arc<IsolateState>,
base: &msg::Base,
data: &'static mut [u8],
) -> Box<Op> {
assert_eq!(data.len(), 0);
if !state.flags.allow_write {
return odd_future(permission_denied());
}
@ -700,7 +788,12 @@ fn handle_rename(state: Arc<IsolateState>, base: &msg::Base) -> Box<Op> {
})
}
fn handle_symlink(state: Arc<IsolateState>, base: &msg::Base) -> Box<Op> {
fn handle_symlink(
state: Arc<IsolateState>,
base: &msg::Base,
data: &'static mut [u8],
) -> Box<Op> {
assert_eq!(data.len(), 0);
if !state.flags.allow_write {
return odd_future(permission_denied());
}
@ -720,7 +813,12 @@ fn handle_symlink(state: Arc<IsolateState>, base: &msg::Base) -> Box<Op> {
})
}
fn handle_read_link(_state: Arc<IsolateState>, base: &msg::Base) -> Box<Op> {
fn handle_read_link(
_state: Arc<IsolateState>,
base: &msg::Base,
data: &'static mut [u8],
) -> Box<Op> {
assert_eq!(data.len(), 0);
let msg = base.msg_as_readlink().unwrap();
let cmd_id = base.cmd_id();
let name = PathBuf::from(msg.name().unwrap());

View file

@ -36,12 +36,14 @@ pub type Buf = Box<[u8]>;
pub type Op = Future<Item = Buf, Error = DenoError> + Send;
// Returns (is_sync, op)
pub type Dispatch = fn(state: Arc<IsolateState>, buf: &[u8]) -> (bool, Box<Op>);
pub type Dispatch =
fn(state: Arc<IsolateState>, buf: &[u8], data_buf: &'static mut [u8])
-> (bool, Box<Op>);
pub struct Isolate {
ptr: *const libdeno::isolate,
dispatch: Dispatch,
rx: mpsc::Receiver<Buf>,
rx: mpsc::Receiver<(i32, Buf)>,
ntasks: i32,
pub state: Arc<IsolateState>,
}
@ -54,17 +56,17 @@ pub struct IsolateState {
pub timers: Mutex<HashMap<u32, futures::sync::oneshot::Sender<()>>>,
pub argv: Vec<String>,
pub flags: flags::DenoFlags,
tx: Mutex<Option<mpsc::Sender<Buf>>>,
tx: Mutex<Option<mpsc::Sender<(i32, Buf)>>>,
}
impl IsolateState {
// Thread safe.
fn send_to_js(&self, buf: Buf) {
fn send_to_js(&self, req_id: i32, buf: Buf) {
let mut g = self.tx.lock().unwrap();
let maybe_tx = g.as_mut();
assert!(maybe_tx.is_some(), "Expected tx to not be deleted.");
let tx = maybe_tx.unwrap();
tx.send(buf).expect("tx.send error");
tx.send((req_id, buf)).expect("tx.send error");
}
}
@ -79,7 +81,7 @@ impl Isolate {
let (flags, argv_rest) = flags::set_flags(argv);
// This channel handles sending async messages back to the runtime.
let (tx, rx) = mpsc::channel::<Buf>();
let (tx, rx) = mpsc::channel::<(i32, Buf)>();
let mut isolate = Box::new(Isolate {
ptr: 0 as *const libdeno::isolate,
@ -131,12 +133,10 @@ impl Isolate {
Ok(())
}
pub fn set_response(&self, buf: Buf) {
unsafe { libdeno::deno_set_response(self.ptr, buf.into()) }
}
pub fn send(&self, buf: Buf) {
unsafe { libdeno::deno_send(self.ptr, buf.into()) };
pub fn respond(&self, req_id: i32, buf: Buf) {
// TODO(zero-copy) Use Buf::leak(buf) to leak the heap allocated buf. And
// don't do the memcpy in ImportBuf() (in libdeno/binding.cc)
unsafe { libdeno::deno_respond(self.ptr, req_id, buf.into()) }
}
// TODO Use Park abstraction? Note at time of writing Tokio default runtime
@ -144,12 +144,12 @@ impl Isolate {
pub fn event_loop(&mut self) {
// Main thread event loop.
while !self.is_idle() {
let buf = self.rx.recv().unwrap();
let (req_id, buf) = self.rx.recv().unwrap();
// Receiving a message on rx exactly corresponds to an async task
// completing.
self.ntasks_decrement();
// Call into JS with the buf.
self.send(buf);
self.respond(req_id, buf);
}
}
@ -189,18 +189,38 @@ impl From<Buf> for libdeno::deno_buf {
}
// Dereferences the C pointer into the Rust Isolate object.
extern "C" fn pre_dispatch(d: *const libdeno::isolate, buf: libdeno::deno_buf) {
let bytes = unsafe { std::slice::from_raw_parts(buf.data_ptr, buf.data_len) };
extern "C" fn pre_dispatch(
d: *const libdeno::isolate,
req_id: i32,
control_buf: libdeno::deno_buf,
data_buf: libdeno::deno_buf,
) {
// control_buf is only valid for the lifetime of this call, thus is
// interpretted as a slice.
let control_slice = unsafe {
std::slice::from_raw_parts(control_buf.data_ptr, control_buf.data_len)
};
// data_buf is valid for the lifetime of the promise, thus a mutable buf with
// static lifetime.
let data_slice = unsafe {
std::slice::from_raw_parts_mut::<'static>(
data_buf.data_ptr,
data_buf.data_len,
)
};
let isolate = Isolate::from_c(d);
let dispatch = isolate.dispatch;
let (is_sync, op) = dispatch(isolate.state.clone(), bytes);
let (is_sync, op) =
dispatch(isolate.state.clone(), control_slice, data_slice);
if is_sync {
// Execute op synchronously.
let buf = tokio_util::block_on(op).unwrap();
if buf.len() != 0 {
// Set the synchronous response, the value returned from isolate.send().
isolate.set_response(buf);
isolate.respond(req_id, buf);
}
} else {
// Execute op asynchronously.
@ -213,7 +233,7 @@ extern "C" fn pre_dispatch(d: *const libdeno::isolate, buf: libdeno::deno_buf) {
let task = op
.and_then(move |buf| {
state.send_to_js(buf);
state.send_to_js(req_id, buf);
Ok(())
}).map_err(|_| ());
tokio::spawn(task);
@ -239,7 +259,8 @@ mod tests {
fn unreachable_dispatch(
_state: Arc<IsolateState>,
_buf: &[u8],
_control: &[u8],
_data: &'static mut [u8],
) -> (bool, Box<Op>) {
unreachable!();
}
@ -267,14 +288,19 @@ mod tests {
});
}
fn dispatch_sync(_state: Arc<IsolateState>, buf: &[u8]) -> (bool, Box<Op>) {
assert_eq!(buf[0], 4);
assert_eq!(buf[1], 5);
assert_eq!(buf[2], 6);
fn dispatch_sync(
_state: Arc<IsolateState>,
control: &[u8],
data: &'static mut [u8],
) -> (bool, Box<Op>) {
assert_eq!(control[0], 4);
assert_eq!(control[1], 5);
assert_eq!(control[2], 6);
assert_eq!(data.len(), 0);
// Send back some sync response.
let vec: Vec<u8> = vec![1, 2, 3];
let buf = vec.into_boxed_slice();
let op = Box::new(futures::future::ok(buf));
let control = vec.into_boxed_slice();
let op = Box::new(futures::future::ok(control));
(true, op)
}
}

View file

@ -19,7 +19,12 @@ pub struct deno_buf {
pub data_len: usize,
}
type DenoRecvCb = unsafe extern "C" fn(d: *const isolate, buf: deno_buf);
type DenoRecvCb = unsafe extern "C" fn(
d: *const isolate,
req_id: i32,
buf: deno_buf,
data_buf: deno_buf,
);
extern "C" {
pub fn deno_init();
@ -29,8 +34,7 @@ extern "C" {
pub fn deno_delete(i: *const isolate);
pub fn deno_last_exception(i: *const isolate) -> *const c_char;
pub fn deno_get_data(i: *const isolate) -> *const c_void;
pub fn deno_set_response(i: *const isolate, buf: deno_buf);
pub fn deno_send(i: *const isolate, buf: deno_buf);
pub fn deno_respond(i: *const isolate, req_id: i32, buf: deno_buf);
pub fn deno_execute(
i: *const isolate,
js_filename: *const c_char,

View file

@ -199,7 +199,6 @@ table ReadFileRes {
table WriteFile {
filename: string;
data: [ubyte];
perm: uint;
// perm specified by https://godoc.org/os#FileMode
}