1
0
Fork 0
mirror of https://github.com/denoland/deno.git synced 2025-01-21 21:50:00 -05:00
denoland-deno/ext/node/ops/worker_threads.rs
Leo Kettmeir ea30e188a8
refactor: update deno_core for error refactor (#26867)
Closes #26171

---------

Co-authored-by: David Sherret <dsherret@gmail.com>
2025-01-08 14:52:32 -08:00

114 lines
3 KiB
Rust

// Copyright 2018-2025 the Deno authors. MIT license.
use std::borrow::Cow;
use std::path::Path;
use std::path::PathBuf;
use deno_core::op2;
use deno_core::url::Url;
use deno_core::OpState;
use deno_error::JsErrorBox;
use sys_traits::FsCanonicalize;
use sys_traits::FsMetadata;
use crate::ExtNodeSys;
use crate::NodePermissions;
use crate::NodeRequireLoaderRc;
#[must_use = "the resolved return value to mitigate time-of-check to time-of-use issues"]
fn ensure_read_permission<'a, P>(
state: &mut OpState,
file_path: &'a Path,
) -> Result<Cow<'a, Path>, JsErrorBox>
where
P: NodePermissions + 'static,
{
let loader = state.borrow::<NodeRequireLoaderRc>().clone();
let permissions = state.borrow_mut::<P>();
loader.ensure_read_permission(permissions, file_path)
}
#[derive(Debug, thiserror::Error, deno_error::JsError)]
pub enum WorkerThreadsFilenameError {
#[class(inherit)]
#[error(transparent)]
Permission(JsErrorBox),
#[class(inherit)]
#[error("{0}")]
UrlParse(
#[from]
#[inherit]
url::ParseError,
),
#[class(generic)]
#[error("Relative path entries must start with '.' or '..'")]
InvalidRelativeUrl,
#[class(generic)]
#[error("URL from Path-String")]
UrlFromPathString,
#[class(generic)]
#[error("URL to Path-String")]
UrlToPathString,
#[class(generic)]
#[error("URL to Path")]
UrlToPath,
#[class(generic)]
#[error("File not found [{0:?}]")]
FileNotFound(PathBuf),
#[class(inherit)]
#[error(transparent)]
Fs(
#[from]
#[inherit]
deno_io::fs::FsError,
),
#[class(inherit)]
#[error(transparent)]
Io(
#[from]
#[inherit]
std::io::Error,
),
}
// todo(dsherret): we should remove this and do all this work inside op_create_worker
#[op2(stack_trace)]
#[string]
pub fn op_worker_threads_filename<
P: NodePermissions + 'static,
TSys: ExtNodeSys + 'static,
>(
state: &mut OpState,
#[string] specifier: String,
) -> Result<String, WorkerThreadsFilenameError> {
if specifier.starts_with("data:") {
return Ok(specifier);
}
let url: Url = if specifier.starts_with("file:") {
Url::parse(&specifier)?
} else {
let path = PathBuf::from(&specifier);
if path.is_relative() && !specifier.starts_with('.') {
return Err(WorkerThreadsFilenameError::InvalidRelativeUrl);
}
let path = ensure_read_permission::<P>(state, &path)
.map_err(WorkerThreadsFilenameError::Permission)?;
let sys = state.borrow::<TSys>();
let canonicalized_path =
deno_path_util::strip_unc_prefix(sys.fs_canonicalize(&path)?);
Url::from_file_path(canonicalized_path)
.map_err(|_| WorkerThreadsFilenameError::UrlFromPathString)?
};
let url_path = url
.to_file_path()
.map_err(|_| WorkerThreadsFilenameError::UrlToPathString)?;
let url_path = ensure_read_permission::<P>(state, &url_path)
.map_err(WorkerThreadsFilenameError::Permission)?;
let sys = state.borrow::<TSys>();
if !sys.fs_exists_no_err(&url_path) {
return Err(WorkerThreadsFilenameError::FileNotFound(
url_path.to_path_buf(),
));
}
Ok(url.to_string())
}