2020-01-02 20:13:47 +00:00
|
|
|
// Copyright 2018-2020 the Deno authors. All rights reserved. MIT license.
|
2020-02-18 15:08:18 +00:00
|
|
|
use crate::colors;
|
2020-02-19 13:17:13 +00:00
|
|
|
use crate::http_cache::HttpCache;
|
2019-07-31 11:58:41 +00:00
|
|
|
use crate::http_util;
|
2020-01-16 15:10:01 +00:00
|
|
|
use crate::http_util::create_http_client;
|
2019-04-25 17:29:21 +00:00
|
|
|
use crate::http_util::FetchOnceResult;
|
2019-07-31 11:58:41 +00:00
|
|
|
use crate::msg;
|
2020-02-23 19:51:29 +00:00
|
|
|
use crate::op_error::OpError;
|
2020-05-11 11:13:27 +00:00
|
|
|
use crate::permissions::Permissions;
|
2020-08-03 21:39:48 +00:00
|
|
|
use crate::text_encoding;
|
2020-01-05 16:56:18 +00:00
|
|
|
use deno_core::ErrBox;
|
|
|
|
use deno_core::ModuleSpecifier;
|
2019-11-17 00:17:47 +00:00
|
|
|
use futures::future::FutureExt;
|
2020-03-10 12:26:17 +00:00
|
|
|
use log::info;
|
2020-08-03 21:39:48 +00:00
|
|
|
use std::borrow::Cow;
|
2019-07-31 11:58:41 +00:00
|
|
|
use std::collections::HashMap;
|
|
|
|
use std::fs;
|
2019-11-17 00:17:47 +00:00
|
|
|
use std::future::Future;
|
2020-02-19 13:17:13 +00:00
|
|
|
use std::io::Read;
|
2019-07-31 11:58:41 +00:00
|
|
|
use std::path::Path;
|
|
|
|
use std::path::PathBuf;
|
2019-11-17 00:17:47 +00:00
|
|
|
use std::pin::Pin;
|
2019-07-31 11:58:41 +00:00
|
|
|
use std::result::Result;
|
|
|
|
use std::str;
|
|
|
|
use std::sync::Arc;
|
|
|
|
use std::sync::Mutex;
|
|
|
|
use url::Url;
|
|
|
|
|
2020-08-03 21:39:48 +00:00
|
|
|
/// Structure representing a text document.
|
|
|
|
#[derive(Debug, Clone)]
|
|
|
|
pub struct TextDocument {
|
|
|
|
bytes: Vec<u8>,
|
|
|
|
charset: Cow<'static, str>,
|
|
|
|
}
|
|
|
|
|
|
|
|
impl TextDocument {
|
|
|
|
pub fn new(
|
|
|
|
bytes: Vec<u8>,
|
|
|
|
charset: Option<impl Into<Cow<'static, str>>>,
|
|
|
|
) -> TextDocument {
|
|
|
|
let charset = charset
|
|
|
|
.map(|cs| cs.into())
|
|
|
|
.unwrap_or_else(|| text_encoding::detect_charset(&bytes).into());
|
|
|
|
TextDocument { bytes, charset }
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn as_bytes(&self) -> &Vec<u8> {
|
|
|
|
&self.bytes
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn into_bytes(self) -> Vec<u8> {
|
|
|
|
self.bytes
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn to_str(&self) -> Result<Cow<str>, std::io::Error> {
|
|
|
|
text_encoding::convert_to_utf8(&self.bytes, &self.charset)
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn to_string(&self) -> Result<String, std::io::Error> {
|
|
|
|
self.to_str().map(String::from)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl From<Vec<u8>> for TextDocument {
|
|
|
|
fn from(bytes: Vec<u8>) -> Self {
|
|
|
|
TextDocument::new(bytes, Option::<&str>::None)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-07-31 11:58:41 +00:00
|
|
|
/// Structure representing local or remote file.
|
|
|
|
///
|
|
|
|
/// In case of remote file `url` might be different than originally requested URL, if so
|
|
|
|
/// `redirect_source_url` will contain original URL and `url` will be equal to final location.
|
|
|
|
#[derive(Debug, Clone)]
|
|
|
|
pub struct SourceFile {
|
|
|
|
pub url: Url,
|
|
|
|
pub filename: PathBuf,
|
2020-05-18 10:59:29 +00:00
|
|
|
pub types_header: Option<String>,
|
2019-07-31 11:58:41 +00:00
|
|
|
pub media_type: msg::MediaType,
|
2020-08-03 21:39:48 +00:00
|
|
|
pub source_code: TextDocument,
|
2019-07-31 11:58:41 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/// Simple struct implementing in-process caching to prevent multiple
|
|
|
|
/// fs reads/net fetches for same file.
|
|
|
|
#[derive(Clone, Default)]
|
|
|
|
pub struct SourceFileCache(Arc<Mutex<HashMap<String, SourceFile>>>);
|
|
|
|
|
|
|
|
impl SourceFileCache {
|
|
|
|
pub fn set(&self, key: String, source_file: SourceFile) {
|
|
|
|
let mut c = self.0.lock().unwrap();
|
|
|
|
c.insert(key, source_file);
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn get(&self, key: String) -> Option<SourceFile> {
|
|
|
|
let c = self.0.lock().unwrap();
|
|
|
|
match c.get(&key) {
|
|
|
|
Some(source_file) => Some(source_file.clone()),
|
|
|
|
None => None,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
const SUPPORTED_URL_SCHEMES: [&str; 3] = ["http", "https", "file"];
|
|
|
|
|
|
|
|
#[derive(Clone)]
|
|
|
|
pub struct SourceFileFetcher {
|
|
|
|
source_file_cache: SourceFileCache,
|
2020-06-13 17:09:39 +00:00
|
|
|
cache_blocklist: Vec<String>,
|
2019-07-31 11:58:41 +00:00
|
|
|
use_disk_cache: bool,
|
2019-12-03 22:48:53 +00:00
|
|
|
no_remote: bool,
|
|
|
|
cached_only: bool,
|
2020-01-16 15:10:01 +00:00
|
|
|
http_client: reqwest::Client,
|
2020-02-19 13:17:13 +00:00
|
|
|
// This field is public only to expose it's location
|
|
|
|
pub http_cache: HttpCache,
|
2019-07-31 11:58:41 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
impl SourceFileFetcher {
|
|
|
|
pub fn new(
|
2020-02-19 13:17:13 +00:00
|
|
|
http_cache: HttpCache,
|
2019-07-31 11:58:41 +00:00
|
|
|
use_disk_cache: bool,
|
2020-06-13 17:09:39 +00:00
|
|
|
cache_blocklist: Vec<String>,
|
2019-12-03 22:48:53 +00:00
|
|
|
no_remote: bool,
|
|
|
|
cached_only: bool,
|
2020-02-17 16:59:51 +00:00
|
|
|
ca_file: Option<String>,
|
|
|
|
) -> Result<Self, ErrBox> {
|
2019-07-31 11:58:41 +00:00
|
|
|
let file_fetcher = Self {
|
2020-02-19 13:17:13 +00:00
|
|
|
http_cache,
|
2019-07-31 11:58:41 +00:00
|
|
|
source_file_cache: SourceFileCache::default(),
|
2020-06-13 17:09:39 +00:00
|
|
|
cache_blocklist,
|
2019-07-31 11:58:41 +00:00
|
|
|
use_disk_cache,
|
2019-12-03 22:48:53 +00:00
|
|
|
no_remote,
|
|
|
|
cached_only,
|
2020-02-17 16:59:51 +00:00
|
|
|
http_client: create_http_client(ca_file)?,
|
2019-07-31 11:58:41 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
Ok(file_fetcher)
|
|
|
|
}
|
|
|
|
|
2020-05-07 13:57:10 +00:00
|
|
|
pub fn check_if_supported_scheme(url: &Url) -> Result<(), ErrBox> {
|
2019-07-31 11:58:41 +00:00
|
|
|
if !SUPPORTED_URL_SCHEMES.contains(&url.scheme()) {
|
|
|
|
return Err(
|
2020-02-23 19:51:29 +00:00
|
|
|
OpError::other(
|
2019-07-31 11:58:41 +00:00
|
|
|
format!("Unsupported scheme \"{}\" for module \"{}\". Supported schemes: {:#?}", url.scheme(), url, SUPPORTED_URL_SCHEMES),
|
|
|
|
).into()
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
2019-11-22 17:46:57 +00:00
|
|
|
/// Required for TS compiler and source maps.
|
2020-04-16 03:14:28 +00:00
|
|
|
pub fn fetch_cached_source_file(
|
2020-01-04 10:20:52 +00:00
|
|
|
&self,
|
2019-07-31 11:58:41 +00:00
|
|
|
specifier: &ModuleSpecifier,
|
2020-05-11 11:13:27 +00:00
|
|
|
permissions: Permissions,
|
2019-11-22 17:46:57 +00:00
|
|
|
) -> Option<SourceFile> {
|
|
|
|
let maybe_source_file = self.source_file_cache.get(specifier.to_string());
|
|
|
|
|
|
|
|
if maybe_source_file.is_some() {
|
|
|
|
return maybe_source_file;
|
|
|
|
}
|
|
|
|
|
|
|
|
// If file is not in memory cache check if it can be found
|
|
|
|
// in local cache - which effectively means trying to fetch
|
2020-02-19 22:51:10 +00:00
|
|
|
// using "--cached-only" flag.
|
|
|
|
// It should be safe to for caller block on this
|
|
|
|
// future, because it doesn't actually do any asynchronous
|
|
|
|
// action in that path.
|
2020-04-16 03:14:28 +00:00
|
|
|
if let Ok(maybe_source_file) =
|
2020-05-11 11:13:27 +00:00
|
|
|
self.get_source_file_from_local_cache(specifier.as_url(), &permissions)
|
2020-04-16 03:14:28 +00:00
|
|
|
{
|
|
|
|
return maybe_source_file;
|
|
|
|
}
|
|
|
|
|
|
|
|
None
|
2019-07-31 11:58:41 +00:00
|
|
|
}
|
|
|
|
|
2020-02-28 14:17:56 +00:00
|
|
|
/// Save a given source file into cache.
|
|
|
|
/// Allows injection of files that normally would not present
|
|
|
|
/// in filesystem.
|
|
|
|
/// This is useful when e.g. TS compiler retrieves a custom file
|
|
|
|
/// under a dummy specifier.
|
|
|
|
pub fn save_source_file_in_cache(
|
|
|
|
&self,
|
|
|
|
specifier: &ModuleSpecifier,
|
|
|
|
file: SourceFile,
|
|
|
|
) {
|
|
|
|
self.source_file_cache.set(specifier.to_string(), file);
|
|
|
|
}
|
|
|
|
|
2020-02-25 19:42:00 +00:00
|
|
|
pub async fn fetch_source_file(
|
2019-12-14 22:12:34 +00:00
|
|
|
&self,
|
2019-07-31 11:58:41 +00:00
|
|
|
specifier: &ModuleSpecifier,
|
2019-11-25 14:33:23 +00:00
|
|
|
maybe_referrer: Option<ModuleSpecifier>,
|
2020-05-11 11:13:27 +00:00
|
|
|
permissions: Permissions,
|
2020-02-19 22:51:10 +00:00
|
|
|
) -> Result<SourceFile, ErrBox> {
|
2019-07-31 11:58:41 +00:00
|
|
|
let module_url = specifier.as_url().to_owned();
|
2020-06-10 12:19:41 +00:00
|
|
|
debug!(
|
|
|
|
"fetch_source_file specifier: {} maybe_referrer: {:#?}",
|
|
|
|
&module_url,
|
|
|
|
maybe_referrer.as_ref()
|
|
|
|
);
|
2019-07-31 11:58:41 +00:00
|
|
|
|
|
|
|
// Check if this file was already fetched and can be retrieved from in-process cache.
|
2020-02-19 22:51:10 +00:00
|
|
|
let maybe_cached_file = self.source_file_cache.get(specifier.to_string());
|
|
|
|
if let Some(source_file) = maybe_cached_file {
|
|
|
|
return Ok(source_file);
|
2019-07-31 11:58:41 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
let source_file_cache = self.source_file_cache.clone();
|
|
|
|
let specifier_ = specifier.clone();
|
|
|
|
|
2020-02-19 22:51:10 +00:00
|
|
|
let result = self
|
2020-02-25 19:42:00 +00:00
|
|
|
.get_source_file(
|
2020-02-19 22:51:10 +00:00
|
|
|
&module_url,
|
|
|
|
self.use_disk_cache,
|
|
|
|
self.no_remote,
|
|
|
|
self.cached_only,
|
2020-05-11 11:13:27 +00:00
|
|
|
&permissions,
|
2020-02-19 22:51:10 +00:00
|
|
|
)
|
|
|
|
.await;
|
2019-12-14 22:12:34 +00:00
|
|
|
|
2020-02-19 22:51:10 +00:00
|
|
|
match result {
|
|
|
|
Ok(mut file) => {
|
|
|
|
// TODO: move somewhere?
|
2020-08-03 21:39:48 +00:00
|
|
|
if file.source_code.bytes.starts_with(b"#!") {
|
|
|
|
file.source_code =
|
|
|
|
filter_shebang(&file.source_code.to_str().unwrap()[..]).into();
|
2020-02-19 22:51:10 +00:00
|
|
|
}
|
2019-12-14 22:12:34 +00:00
|
|
|
|
2020-02-19 22:51:10 +00:00
|
|
|
// Cache in-process for subsequent access.
|
|
|
|
source_file_cache.set(specifier_.to_string(), file.clone());
|
2019-12-14 22:12:34 +00:00
|
|
|
|
2020-02-19 22:51:10 +00:00
|
|
|
Ok(file)
|
2019-12-14 22:12:34 +00:00
|
|
|
}
|
2020-02-19 22:51:10 +00:00
|
|
|
Err(err) => {
|
2020-02-23 19:51:29 +00:00
|
|
|
// FIXME(bartlomieju): rewrite this whole block
|
|
|
|
|
|
|
|
// FIXME(bartlomieju): very ugly
|
|
|
|
let mut is_not_found = false;
|
|
|
|
if let Some(e) = err.downcast_ref::<std::io::Error>() {
|
|
|
|
if e.kind() == std::io::ErrorKind::NotFound {
|
|
|
|
is_not_found = true;
|
|
|
|
}
|
|
|
|
}
|
2020-02-19 22:51:10 +00:00
|
|
|
let referrer_suffix = if let Some(referrer) = maybe_referrer {
|
|
|
|
format!(r#" from "{}""#, referrer)
|
|
|
|
} else {
|
|
|
|
"".to_owned()
|
|
|
|
};
|
|
|
|
// Hack: Check error message for "--cached-only" because the kind
|
|
|
|
// conflicts with other errors.
|
|
|
|
let err = if err.to_string().contains("--cached-only") {
|
|
|
|
let msg = format!(
|
|
|
|
r#"Cannot find module "{}"{} in cache, --cached-only is specified"#,
|
|
|
|
module_url, referrer_suffix
|
|
|
|
);
|
2020-02-23 19:51:29 +00:00
|
|
|
OpError::not_found(msg).into()
|
|
|
|
} else if is_not_found {
|
2020-02-19 22:51:10 +00:00
|
|
|
let msg = format!(
|
|
|
|
r#"Cannot resolve module "{}"{}"#,
|
|
|
|
module_url, referrer_suffix
|
|
|
|
);
|
2020-02-23 19:51:29 +00:00
|
|
|
OpError::not_found(msg).into()
|
2020-02-19 22:51:10 +00:00
|
|
|
} else {
|
|
|
|
err
|
|
|
|
};
|
|
|
|
Err(err)
|
|
|
|
}
|
|
|
|
}
|
2019-07-31 11:58:41 +00:00
|
|
|
}
|
|
|
|
|
2020-04-16 03:14:28 +00:00
|
|
|
fn get_source_file_from_local_cache(
|
|
|
|
&self,
|
|
|
|
module_url: &Url,
|
2020-05-11 11:13:27 +00:00
|
|
|
permissions: &Permissions,
|
2020-04-16 03:14:28 +00:00
|
|
|
) -> Result<Option<SourceFile>, ErrBox> {
|
|
|
|
let url_scheme = module_url.scheme();
|
|
|
|
let is_local_file = url_scheme == "file";
|
|
|
|
SourceFileFetcher::check_if_supported_scheme(&module_url)?;
|
|
|
|
|
|
|
|
// Local files are always fetched from disk bypassing cache entirely.
|
|
|
|
if is_local_file {
|
2020-05-11 11:13:27 +00:00
|
|
|
return self.fetch_local_file(&module_url, permissions).map(Some);
|
2020-04-16 03:14:28 +00:00
|
|
|
}
|
|
|
|
|
2020-06-15 21:46:48 +00:00
|
|
|
self.fetch_cached_remote_source(&module_url, 10)
|
2020-04-16 03:14:28 +00:00
|
|
|
}
|
|
|
|
|
2019-07-31 11:58:41 +00:00
|
|
|
/// This is main method that is responsible for fetching local or remote files.
|
|
|
|
///
|
|
|
|
/// If this is a remote module, and it has not yet been cached, the resulting
|
|
|
|
/// download will be cached on disk for subsequent access.
|
|
|
|
///
|
|
|
|
/// If `use_disk_cache` is true then remote files are fetched from disk cache.
|
|
|
|
///
|
2019-12-03 22:48:53 +00:00
|
|
|
/// If `no_remote` is true then this method will fail for remote files.
|
|
|
|
///
|
|
|
|
/// If `cached_only` is true then this method will fail for remote files
|
|
|
|
/// not already cached.
|
2020-02-25 19:42:00 +00:00
|
|
|
async fn get_source_file(
|
2020-01-04 10:20:52 +00:00
|
|
|
&self,
|
2019-07-31 11:58:41 +00:00
|
|
|
module_url: &Url,
|
|
|
|
use_disk_cache: bool,
|
2019-12-03 22:48:53 +00:00
|
|
|
no_remote: bool,
|
|
|
|
cached_only: bool,
|
2020-05-11 11:13:27 +00:00
|
|
|
permissions: &Permissions,
|
2020-02-19 22:51:10 +00:00
|
|
|
) -> Result<SourceFile, ErrBox> {
|
2019-07-31 11:58:41 +00:00
|
|
|
let url_scheme = module_url.scheme();
|
|
|
|
let is_local_file = url_scheme == "file";
|
2020-02-19 22:51:10 +00:00
|
|
|
SourceFileFetcher::check_if_supported_scheme(&module_url)?;
|
2019-07-31 11:58:41 +00:00
|
|
|
|
|
|
|
// Local files are always fetched from disk bypassing cache entirely.
|
|
|
|
if is_local_file {
|
2020-05-11 11:13:27 +00:00
|
|
|
return self.fetch_local_file(&module_url, permissions);
|
2019-07-31 11:58:41 +00:00
|
|
|
}
|
|
|
|
|
2019-12-03 22:48:53 +00:00
|
|
|
// The file is remote, fail if `no_remote` is true.
|
|
|
|
if no_remote {
|
2020-02-19 22:51:10 +00:00
|
|
|
let e = std::io::Error::new(
|
|
|
|
std::io::ErrorKind::NotFound,
|
|
|
|
format!(
|
|
|
|
"Not allowed to get remote file '{}'",
|
|
|
|
module_url.to_string()
|
|
|
|
),
|
|
|
|
);
|
|
|
|
return Err(e.into());
|
2019-12-03 22:48:53 +00:00
|
|
|
}
|
|
|
|
|
2019-07-31 11:58:41 +00:00
|
|
|
// Fetch remote file and cache on-disk for subsequent access
|
2020-02-19 22:51:10 +00:00
|
|
|
self
|
2020-05-11 11:13:27 +00:00
|
|
|
.fetch_remote_source(
|
|
|
|
&module_url,
|
|
|
|
use_disk_cache,
|
|
|
|
cached_only,
|
|
|
|
10,
|
|
|
|
permissions,
|
|
|
|
)
|
2020-02-19 22:51:10 +00:00
|
|
|
.await
|
2019-07-31 11:58:41 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/// Fetch local source file.
|
2020-05-11 11:13:27 +00:00
|
|
|
fn fetch_local_file(
|
|
|
|
&self,
|
|
|
|
module_url: &Url,
|
|
|
|
permissions: &Permissions,
|
|
|
|
) -> Result<SourceFile, ErrBox> {
|
2019-08-13 01:52:03 +00:00
|
|
|
let filepath = module_url.to_file_path().map_err(|()| {
|
2020-02-23 19:51:29 +00:00
|
|
|
ErrBox::from(OpError::uri_error(
|
2019-08-13 01:52:03 +00:00
|
|
|
"File URL contains invalid path".to_owned(),
|
|
|
|
))
|
|
|
|
})?;
|
2019-07-31 11:58:41 +00:00
|
|
|
|
2020-05-11 11:13:27 +00:00
|
|
|
permissions.check_read(&filepath)?;
|
2019-07-31 11:58:41 +00:00
|
|
|
let source_code = match fs::read(filepath.clone()) {
|
|
|
|
Ok(c) => c,
|
|
|
|
Err(e) => return Err(e.into()),
|
|
|
|
};
|
|
|
|
|
2020-08-03 21:39:48 +00:00
|
|
|
let (media_type, charset) = map_content_type(&filepath, None);
|
2019-07-31 11:58:41 +00:00
|
|
|
Ok(SourceFile {
|
|
|
|
url: module_url.clone(),
|
|
|
|
filename: filepath,
|
|
|
|
media_type,
|
2020-08-03 21:39:48 +00:00
|
|
|
source_code: TextDocument::new(source_code, charset),
|
2020-05-18 10:59:29 +00:00
|
|
|
types_header: None,
|
2019-07-31 11:58:41 +00:00
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Fetch cached remote file.
|
|
|
|
///
|
|
|
|
/// This is a recursive operation if source file has redirections.
|
|
|
|
///
|
2020-02-28 18:15:31 +00:00
|
|
|
/// It will keep reading <filename>.metadata.json for information about redirection.
|
2019-07-31 11:58:41 +00:00
|
|
|
/// `module_initial_source_name` would be None on first call,
|
|
|
|
/// and becomes the name of the very first module that initiates the call
|
|
|
|
/// in subsequent recursions.
|
|
|
|
///
|
|
|
|
/// AKA if redirection occurs, module_initial_source_name is the source path
|
|
|
|
/// that user provides, and the final module_name is the resolved path
|
|
|
|
/// after following all redirections.
|
|
|
|
fn fetch_cached_remote_source(
|
2020-01-04 10:20:52 +00:00
|
|
|
&self,
|
2019-07-31 11:58:41 +00:00
|
|
|
module_url: &Url,
|
2020-06-15 21:46:48 +00:00
|
|
|
redirect_limit: i64,
|
2019-07-31 11:58:41 +00:00
|
|
|
) -> Result<Option<SourceFile>, ErrBox> {
|
2020-06-15 21:46:48 +00:00
|
|
|
if redirect_limit < 0 {
|
|
|
|
let e = OpError::http("too many redirects".to_string());
|
|
|
|
return Err(e.into());
|
|
|
|
}
|
|
|
|
|
2020-02-19 13:17:13 +00:00
|
|
|
let result = self.http_cache.get(&module_url);
|
|
|
|
let result = match result {
|
2019-07-31 11:58:41 +00:00
|
|
|
Err(e) => {
|
2020-02-19 13:17:13 +00:00
|
|
|
if let Some(e) = e.downcast_ref::<std::io::Error>() {
|
|
|
|
if e.kind() == std::io::ErrorKind::NotFound {
|
|
|
|
return Ok(None);
|
|
|
|
}
|
2019-07-31 11:58:41 +00:00
|
|
|
}
|
2020-02-19 13:17:13 +00:00
|
|
|
return Err(e);
|
2019-07-31 11:58:41 +00:00
|
|
|
}
|
|
|
|
Ok(c) => c,
|
|
|
|
};
|
2020-02-19 13:17:13 +00:00
|
|
|
|
|
|
|
let (mut source_file, headers) = result;
|
|
|
|
if let Some(redirect_to) = headers.get("location") {
|
2020-02-28 14:04:18 +00:00
|
|
|
let redirect_url = match Url::parse(redirect_to) {
|
|
|
|
Ok(redirect_url) => redirect_url,
|
|
|
|
Err(url::ParseError::RelativeUrlWithoutBase) => {
|
|
|
|
let mut url = module_url.clone();
|
|
|
|
url.set_path(redirect_to);
|
|
|
|
url
|
|
|
|
}
|
|
|
|
Err(e) => {
|
|
|
|
return Err(e.into());
|
|
|
|
}
|
|
|
|
};
|
2020-06-15 21:46:48 +00:00
|
|
|
return self
|
|
|
|
.fetch_cached_remote_source(&redirect_url, redirect_limit - 1);
|
2020-02-19 13:17:13 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
let mut source_code = Vec::new();
|
|
|
|
source_file.read_to_end(&mut source_code)?;
|
|
|
|
|
|
|
|
let cache_filename = self.http_cache.get_cache_filename(module_url);
|
|
|
|
let fake_filepath = PathBuf::from(module_url.path());
|
2020-08-03 21:39:48 +00:00
|
|
|
let (media_type, charset) = map_content_type(
|
2020-02-19 13:17:13 +00:00
|
|
|
&fake_filepath,
|
|
|
|
headers.get("content-type").map(|e| e.as_str()),
|
|
|
|
);
|
2020-05-18 10:59:29 +00:00
|
|
|
let types_header = headers.get("x-typescript-types").map(|e| e.to_string());
|
2019-07-31 11:58:41 +00:00
|
|
|
Ok(Some(SourceFile {
|
|
|
|
url: module_url.clone(),
|
2020-02-19 13:17:13 +00:00
|
|
|
filename: cache_filename,
|
2019-07-31 11:58:41 +00:00
|
|
|
media_type,
|
2020-08-03 21:39:48 +00:00
|
|
|
source_code: TextDocument::new(source_code, charset),
|
2020-05-18 10:59:29 +00:00
|
|
|
types_header,
|
2019-07-31 11:58:41 +00:00
|
|
|
}))
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Asynchronously fetch remote source file specified by the URL following redirects.
|
2020-02-19 22:51:10 +00:00
|
|
|
///
|
|
|
|
/// Note that this is a recursive method so it can't be "async", but rather return
|
|
|
|
/// Pin<Box<..>>.
|
2020-02-25 19:42:00 +00:00
|
|
|
fn fetch_remote_source(
|
2020-01-04 10:20:52 +00:00
|
|
|
&self,
|
2019-07-31 11:58:41 +00:00
|
|
|
module_url: &Url,
|
|
|
|
use_disk_cache: bool,
|
2019-12-03 22:48:53 +00:00
|
|
|
cached_only: bool,
|
2019-07-31 11:58:41 +00:00
|
|
|
redirect_limit: i64,
|
2020-05-11 11:13:27 +00:00
|
|
|
permissions: &Permissions,
|
2020-02-19 22:51:10 +00:00
|
|
|
) -> Pin<Box<dyn Future<Output = Result<SourceFile, ErrBox>>>> {
|
2019-07-31 11:58:41 +00:00
|
|
|
if redirect_limit < 0 {
|
2020-02-23 19:51:29 +00:00
|
|
|
let e = OpError::http("too many redirects".to_string());
|
2020-02-19 22:51:10 +00:00
|
|
|
return futures::future::err(e.into()).boxed_local();
|
2019-07-31 11:58:41 +00:00
|
|
|
}
|
|
|
|
|
2020-05-11 11:13:27 +00:00
|
|
|
if let Err(e) = permissions.check_net_url(&module_url) {
|
|
|
|
return futures::future::err(e.into()).boxed_local();
|
|
|
|
}
|
|
|
|
|
2020-06-13 17:09:39 +00:00
|
|
|
let is_blocked =
|
|
|
|
check_cache_blocklist(module_url, self.cache_blocklist.as_ref());
|
2019-07-31 11:58:41 +00:00
|
|
|
// First try local cache
|
2020-06-13 17:09:39 +00:00
|
|
|
if use_disk_cache && !is_blocked {
|
2020-06-15 21:46:48 +00:00
|
|
|
match self.fetch_cached_remote_source(&module_url, redirect_limit) {
|
2019-07-31 11:58:41 +00:00
|
|
|
Ok(Some(source_file)) => {
|
2020-02-19 22:51:10 +00:00
|
|
|
return futures::future::ok(source_file).boxed_local();
|
2019-07-31 11:58:41 +00:00
|
|
|
}
|
|
|
|
Ok(None) => {
|
|
|
|
// there's no cached version
|
|
|
|
}
|
|
|
|
Err(err) => {
|
2020-02-19 22:51:10 +00:00
|
|
|
return futures::future::err(err).boxed_local();
|
2019-07-31 11:58:41 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// If file wasn't found in cache check if we can fetch it
|
2019-12-03 22:48:53 +00:00
|
|
|
if cached_only {
|
2019-07-31 11:58:41 +00:00
|
|
|
// We can't fetch remote file - bail out
|
2019-11-17 00:17:47 +00:00
|
|
|
return futures::future::err(
|
2019-07-31 11:58:41 +00:00
|
|
|
std::io::Error::new(
|
2020-02-12 16:02:34 +00:00
|
|
|
std::io::ErrorKind::NotFound,
|
2019-07-31 11:58:41 +00:00
|
|
|
format!(
|
2020-02-12 16:02:34 +00:00
|
|
|
"Cannot find remote file '{}' in cache, --cached-only is specified",
|
2019-07-31 11:58:41 +00:00
|
|
|
module_url.to_string()
|
|
|
|
),
|
2019-07-31 21:11:37 +00:00
|
|
|
)
|
|
|
|
.into(),
|
2019-11-17 00:17:47 +00:00
|
|
|
)
|
2020-02-19 22:51:10 +00:00
|
|
|
.boxed_local();
|
2019-07-31 11:58:41 +00:00
|
|
|
}
|
|
|
|
|
2020-06-29 12:17:37 +00:00
|
|
|
info!("{} {}", colors::green("Download"), module_url.to_string());
|
2020-03-10 12:26:17 +00:00
|
|
|
|
2019-07-31 11:58:41 +00:00
|
|
|
let dir = self.clone();
|
|
|
|
let module_url = module_url.clone();
|
2020-02-19 13:17:13 +00:00
|
|
|
let module_etag = match self.http_cache.get(&module_url) {
|
|
|
|
Ok((_, headers)) => headers.get("etag").map(String::from),
|
|
|
|
Err(_) => None,
|
|
|
|
};
|
2020-05-11 11:13:27 +00:00
|
|
|
let permissions = permissions.clone();
|
2020-01-16 15:10:01 +00:00
|
|
|
let http_client = self.http_client.clone();
|
2019-07-31 11:58:41 +00:00
|
|
|
// Single pass fetch, either yields code or yields redirect.
|
2020-01-04 10:20:52 +00:00
|
|
|
let f = async move {
|
2020-02-04 16:27:50 +00:00
|
|
|
match http_util::fetch_once(http_client, &module_url, module_etag).await?
|
2020-01-16 15:10:01 +00:00
|
|
|
{
|
2020-01-11 10:11:05 +00:00
|
|
|
FetchOnceResult::NotModified => {
|
|
|
|
let source_file =
|
2020-06-15 21:46:48 +00:00
|
|
|
dir.fetch_cached_remote_source(&module_url, 10)?.unwrap();
|
2020-01-11 10:11:05 +00:00
|
|
|
|
|
|
|
Ok(source_file)
|
|
|
|
}
|
2020-02-19 13:17:13 +00:00
|
|
|
FetchOnceResult::Redirect(new_module_url, headers) => {
|
2019-07-31 11:58:41 +00:00
|
|
|
// If redirects, update module_name and filename for next looped call.
|
2020-02-19 13:17:13 +00:00
|
|
|
dir.http_cache.set(&module_url, headers, &[])?;
|
2019-07-31 11:58:41 +00:00
|
|
|
|
|
|
|
// Recurse
|
2020-01-04 10:20:52 +00:00
|
|
|
dir
|
2020-02-25 19:42:00 +00:00
|
|
|
.fetch_remote_source(
|
2020-01-04 10:20:52 +00:00
|
|
|
&new_module_url,
|
|
|
|
use_disk_cache,
|
|
|
|
cached_only,
|
|
|
|
redirect_limit - 1,
|
2020-05-11 11:13:27 +00:00
|
|
|
&permissions,
|
2020-01-04 10:20:52 +00:00
|
|
|
)
|
|
|
|
.await
|
2019-07-31 11:58:41 +00:00
|
|
|
}
|
2020-02-19 13:17:13 +00:00
|
|
|
FetchOnceResult::Code(source, headers) => {
|
2019-07-31 11:58:41 +00:00
|
|
|
// We land on the code.
|
2020-02-19 13:17:13 +00:00
|
|
|
dir.http_cache.set(&module_url, headers.clone(), &source)?;
|
2019-07-31 11:58:41 +00:00
|
|
|
|
2020-02-19 13:17:13 +00:00
|
|
|
let cache_filepath = dir.http_cache.get_cache_filename(&module_url);
|
|
|
|
// Used to sniff out content type from file extension - probably to be removed
|
|
|
|
let fake_filepath = PathBuf::from(module_url.path());
|
2020-08-03 21:39:48 +00:00
|
|
|
let (media_type, charset) = map_content_type(
|
2020-02-19 13:17:13 +00:00
|
|
|
&fake_filepath,
|
|
|
|
headers.get("content-type").map(String::as_str),
|
|
|
|
);
|
2019-07-31 11:58:41 +00:00
|
|
|
|
2020-05-18 10:59:29 +00:00
|
|
|
let types_header =
|
|
|
|
headers.get("x-typescript-types").map(String::to_string);
|
2020-01-26 18:59:41 +00:00
|
|
|
|
2019-07-31 11:58:41 +00:00
|
|
|
let source_file = SourceFile {
|
|
|
|
url: module_url.clone(),
|
2020-02-19 13:17:13 +00:00
|
|
|
filename: cache_filepath,
|
2019-07-31 11:58:41 +00:00
|
|
|
media_type,
|
2020-08-03 21:39:48 +00:00
|
|
|
source_code: TextDocument::new(source, charset),
|
2020-05-18 10:59:29 +00:00
|
|
|
types_header,
|
2019-07-31 11:58:41 +00:00
|
|
|
};
|
|
|
|
|
2020-01-04 10:20:52 +00:00
|
|
|
Ok(source_file)
|
2019-07-31 11:58:41 +00:00
|
|
|
}
|
2019-04-25 17:29:21 +00:00
|
|
|
}
|
2020-01-04 10:20:52 +00:00
|
|
|
};
|
2019-07-31 11:58:41 +00:00
|
|
|
|
2020-02-19 22:51:10 +00:00
|
|
|
f.boxed_local()
|
2019-07-31 11:58:41 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-05-20 14:25:40 +00:00
|
|
|
pub fn map_file_extension(path: &Path) -> msg::MediaType {
|
2019-07-31 11:58:41 +00:00
|
|
|
match path.extension() {
|
|
|
|
None => msg::MediaType::Unknown,
|
|
|
|
Some(os_str) => match os_str.to_str() {
|
|
|
|
Some("ts") => msg::MediaType::TypeScript,
|
2019-10-02 14:46:36 +00:00
|
|
|
Some("tsx") => msg::MediaType::TSX,
|
2019-07-31 11:58:41 +00:00
|
|
|
Some("js") => msg::MediaType::JavaScript,
|
2019-10-02 14:46:36 +00:00
|
|
|
Some("jsx") => msg::MediaType::JSX,
|
2019-07-31 11:58:41 +00:00
|
|
|
Some("mjs") => msg::MediaType::JavaScript,
|
2020-05-31 19:08:26 +00:00
|
|
|
Some("cjs") => msg::MediaType::JavaScript,
|
2019-07-31 11:58:41 +00:00
|
|
|
Some("json") => msg::MediaType::Json,
|
2019-11-14 13:31:39 +00:00
|
|
|
Some("wasm") => msg::MediaType::Wasm,
|
2019-07-31 11:58:41 +00:00
|
|
|
_ => msg::MediaType::Unknown,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-08-03 21:39:48 +00:00
|
|
|
// convert a ContentType string into a enumerated MediaType + optional charset
|
|
|
|
fn map_content_type(
|
|
|
|
path: &Path,
|
|
|
|
content_type: Option<&str>,
|
|
|
|
) -> (msg::MediaType, Option<String>) {
|
2019-07-31 11:58:41 +00:00
|
|
|
match content_type {
|
|
|
|
Some(content_type) => {
|
2020-08-03 21:39:48 +00:00
|
|
|
// Sometimes there is additional data after the media type in
|
2019-07-31 11:58:41 +00:00
|
|
|
// Content-Type so we have to do a bit of manipulation so we are only
|
2020-08-03 21:39:48 +00:00
|
|
|
// dealing with the actual media type.
|
|
|
|
let mut ct_iter = content_type.split(';');
|
|
|
|
let ct = ct_iter.next().unwrap();
|
|
|
|
let media_type = match ct.to_lowercase().as_ref() {
|
2019-07-31 11:58:41 +00:00
|
|
|
"application/typescript"
|
|
|
|
| "text/typescript"
|
|
|
|
| "video/vnd.dlna.mpeg-tts"
|
|
|
|
| "video/mp2t"
|
2019-10-16 17:35:04 +00:00
|
|
|
| "application/x-typescript" => {
|
|
|
|
map_js_like_extension(path, msg::MediaType::TypeScript)
|
|
|
|
}
|
2019-07-31 11:58:41 +00:00
|
|
|
"application/javascript"
|
|
|
|
| "text/javascript"
|
|
|
|
| "application/ecmascript"
|
|
|
|
| "text/ecmascript"
|
2020-05-31 19:08:26 +00:00
|
|
|
| "application/x-javascript"
|
|
|
|
| "application/node" => {
|
2019-10-16 17:35:04 +00:00
|
|
|
map_js_like_extension(path, msg::MediaType::JavaScript)
|
|
|
|
}
|
2019-07-31 11:58:41 +00:00
|
|
|
"application/json" | "text/json" => msg::MediaType::Json,
|
2020-03-06 16:31:22 +00:00
|
|
|
"application/wasm" => msg::MediaType::Wasm,
|
2019-11-15 05:14:08 +00:00
|
|
|
// Handle plain and possibly webassembly
|
|
|
|
"text/plain" | "application/octet-stream" => map_file_extension(path),
|
2019-07-31 11:58:41 +00:00
|
|
|
_ => {
|
|
|
|
debug!("unknown content type: {}", content_type);
|
|
|
|
msg::MediaType::Unknown
|
|
|
|
}
|
2020-08-03 21:39:48 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
let charset = ct_iter
|
|
|
|
.map(str::trim)
|
|
|
|
.find_map(|s| s.strip_prefix("charset="))
|
|
|
|
.map(String::from);
|
|
|
|
|
|
|
|
(media_type, charset)
|
2019-07-31 11:58:41 +00:00
|
|
|
}
|
2020-08-03 21:39:48 +00:00
|
|
|
None => (map_file_extension(path), None),
|
2019-07-31 11:58:41 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-10-16 17:35:04 +00:00
|
|
|
fn map_js_like_extension(
|
|
|
|
path: &Path,
|
|
|
|
default: msg::MediaType,
|
|
|
|
) -> msg::MediaType {
|
|
|
|
match path.extension() {
|
|
|
|
None => default,
|
|
|
|
Some(os_str) => match os_str.to_str() {
|
|
|
|
None => default,
|
|
|
|
Some("jsx") => msg::MediaType::JSX,
|
|
|
|
Some("tsx") => msg::MediaType::TSX,
|
|
|
|
Some(_) => default,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-08-03 21:39:48 +00:00
|
|
|
fn filter_shebang(string: &str) -> Vec<u8> {
|
2019-07-31 11:58:41 +00:00
|
|
|
if let Some(i) = string.find('\n') {
|
|
|
|
let (_, rest) = string.split_at(i);
|
|
|
|
rest.as_bytes().to_owned()
|
|
|
|
} else {
|
|
|
|
Vec::new()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-06-13 17:09:39 +00:00
|
|
|
fn check_cache_blocklist(url: &Url, black_list: &[String]) -> bool {
|
2019-10-17 14:29:06 +00:00
|
|
|
let mut url_without_fragmets = url.clone();
|
|
|
|
url_without_fragmets.set_fragment(None);
|
|
|
|
if black_list.contains(&String::from(url_without_fragmets.as_str())) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
let mut url_without_query_strings = url_without_fragmets;
|
|
|
|
url_without_query_strings.set_query(None);
|
|
|
|
let mut path_buf = PathBuf::from(url_without_query_strings.as_str());
|
|
|
|
loop {
|
|
|
|
if black_list.contains(&String::from(path_buf.to_str().unwrap())) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
if !path_buf.pop() {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
false
|
|
|
|
}
|
|
|
|
|
2019-07-31 11:58:41 +00:00
|
|
|
#[derive(Debug, Default)]
|
|
|
|
/// Header metadata associated with a particular "symbolic" source code file.
|
|
|
|
/// (the associated source code file might not be cached, while remaining
|
|
|
|
/// a user accessible entity through imports (due to redirects)).
|
|
|
|
pub struct SourceCodeHeaders {
|
|
|
|
/// MIME type of the source code.
|
|
|
|
pub mime_type: Option<String>,
|
|
|
|
/// Where should we actually look for source code.
|
|
|
|
/// This should be an absolute path!
|
|
|
|
pub redirect_to: Option<String>,
|
2020-01-11 10:11:05 +00:00
|
|
|
/// ETag of the remote source file
|
|
|
|
pub etag: Option<String>,
|
2020-01-26 18:59:41 +00:00
|
|
|
/// X-TypeScript-Types defines the location of a .d.ts file
|
|
|
|
pub x_typescript_types: Option<String>,
|
2019-07-31 11:58:41 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
#[cfg(test)]
|
|
|
|
mod tests {
|
|
|
|
use super::*;
|
|
|
|
use tempfile::TempDir;
|
|
|
|
|
|
|
|
fn setup_file_fetcher(dir_path: &Path) -> SourceFileFetcher {
|
|
|
|
SourceFileFetcher::new(
|
2020-05-07 12:32:57 +00:00
|
|
|
HttpCache::new(&dir_path.to_path_buf().join("deps")),
|
2019-07-31 11:58:41 +00:00
|
|
|
true,
|
2019-10-17 14:29:06 +00:00
|
|
|
vec![],
|
2019-07-31 11:58:41 +00:00
|
|
|
false,
|
2019-12-03 22:48:53 +00:00
|
|
|
false,
|
2020-02-17 16:59:51 +00:00
|
|
|
None,
|
2019-07-31 21:11:37 +00:00
|
|
|
)
|
|
|
|
.expect("setup fail")
|
2019-07-31 11:58:41 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
fn test_setup() -> (TempDir, SourceFileFetcher) {
|
|
|
|
let temp_dir = TempDir::new().expect("tempdir fail");
|
|
|
|
let fetcher = setup_file_fetcher(temp_dir.path());
|
|
|
|
(temp_dir, fetcher)
|
|
|
|
}
|
|
|
|
|
|
|
|
macro_rules! file_url {
|
|
|
|
($path:expr) => {
|
|
|
|
if cfg!(target_os = "windows") {
|
|
|
|
concat!("file:///C:", $path)
|
|
|
|
} else {
|
|
|
|
concat!("file://", $path)
|
|
|
|
}
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2019-10-17 14:29:06 +00:00
|
|
|
#[test]
|
2020-06-13 17:09:39 +00:00
|
|
|
fn test_cache_blocklist() {
|
2019-10-17 14:29:06 +00:00
|
|
|
let args = crate::flags::resolve_urls(vec![
|
|
|
|
String::from("http://deno.land/std"),
|
|
|
|
String::from("http://github.com/example/mod.ts"),
|
|
|
|
String::from("http://fragment.com/mod.ts#fragment"),
|
|
|
|
String::from("http://query.com/mod.ts?foo=bar"),
|
|
|
|
String::from("http://queryandfragment.com/mod.ts?foo=bar#fragment"),
|
|
|
|
]);
|
|
|
|
|
|
|
|
let u: Url = "http://deno.land/std/fs/mod.ts".parse().unwrap();
|
2020-06-13 17:09:39 +00:00
|
|
|
assert_eq!(check_cache_blocklist(&u, &args), true);
|
2019-10-17 14:29:06 +00:00
|
|
|
|
|
|
|
let u: Url = "http://github.com/example/file.ts".parse().unwrap();
|
2020-06-13 17:09:39 +00:00
|
|
|
assert_eq!(check_cache_blocklist(&u, &args), false);
|
2019-10-17 14:29:06 +00:00
|
|
|
|
|
|
|
let u: Url = "http://github.com/example/mod.ts".parse().unwrap();
|
2020-06-13 17:09:39 +00:00
|
|
|
assert_eq!(check_cache_blocklist(&u, &args), true);
|
2019-10-17 14:29:06 +00:00
|
|
|
|
|
|
|
let u: Url = "http://github.com/example/mod.ts?foo=bar".parse().unwrap();
|
2020-06-13 17:09:39 +00:00
|
|
|
assert_eq!(check_cache_blocklist(&u, &args), true);
|
2019-10-17 14:29:06 +00:00
|
|
|
|
|
|
|
let u: Url = "http://github.com/example/mod.ts#fragment".parse().unwrap();
|
2020-06-13 17:09:39 +00:00
|
|
|
assert_eq!(check_cache_blocklist(&u, &args), true);
|
2019-10-17 14:29:06 +00:00
|
|
|
|
|
|
|
let u: Url = "http://fragment.com/mod.ts".parse().unwrap();
|
2020-06-13 17:09:39 +00:00
|
|
|
assert_eq!(check_cache_blocklist(&u, &args), true);
|
2019-10-17 14:29:06 +00:00
|
|
|
|
|
|
|
let u: Url = "http://query.com/mod.ts".parse().unwrap();
|
2020-06-13 17:09:39 +00:00
|
|
|
assert_eq!(check_cache_blocklist(&u, &args), false);
|
2019-10-17 14:29:06 +00:00
|
|
|
|
|
|
|
let u: Url = "http://fragment.com/mod.ts#fragment".parse().unwrap();
|
2020-06-13 17:09:39 +00:00
|
|
|
assert_eq!(check_cache_blocklist(&u, &args), true);
|
2019-10-17 14:29:06 +00:00
|
|
|
|
|
|
|
let u: Url = "http://query.com/mod.ts?foo=bar".parse().unwrap();
|
2020-06-13 17:09:39 +00:00
|
|
|
assert_eq!(check_cache_blocklist(&u, &args), true);
|
2019-10-17 14:29:06 +00:00
|
|
|
|
|
|
|
let u: Url = "http://queryandfragment.com/mod.ts".parse().unwrap();
|
2020-06-13 17:09:39 +00:00
|
|
|
assert_eq!(check_cache_blocklist(&u, &args), false);
|
2019-10-17 14:29:06 +00:00
|
|
|
|
|
|
|
let u: Url = "http://queryandfragment.com/mod.ts?foo=bar"
|
|
|
|
.parse()
|
|
|
|
.unwrap();
|
2020-06-13 17:09:39 +00:00
|
|
|
assert_eq!(check_cache_blocklist(&u, &args), true);
|
2019-10-17 14:29:06 +00:00
|
|
|
|
|
|
|
let u: Url = "http://queryandfragment.com/mod.ts#fragment"
|
|
|
|
.parse()
|
|
|
|
.unwrap();
|
2020-06-13 17:09:39 +00:00
|
|
|
assert_eq!(check_cache_blocklist(&u, &args), false);
|
2019-10-17 14:29:06 +00:00
|
|
|
|
|
|
|
let u: Url = "http://query.com/mod.ts?foo=bar#fragment".parse().unwrap();
|
2020-06-13 17:09:39 +00:00
|
|
|
assert_eq!(check_cache_blocklist(&u, &args), true);
|
2019-10-17 14:29:06 +00:00
|
|
|
|
|
|
|
let u: Url = "http://fragment.com/mod.ts?foo=bar#fragment"
|
|
|
|
.parse()
|
|
|
|
.unwrap();
|
2020-06-13 17:09:39 +00:00
|
|
|
assert_eq!(check_cache_blocklist(&u, &args), true);
|
2019-10-17 14:29:06 +00:00
|
|
|
}
|
|
|
|
|
2019-08-13 01:52:03 +00:00
|
|
|
#[test]
|
|
|
|
fn test_fetch_local_file_no_panic() {
|
|
|
|
let (_temp_dir, fetcher) = test_setup();
|
|
|
|
if cfg!(windows) {
|
|
|
|
// Should fail: missing drive letter.
|
|
|
|
let u = Url::parse("file:///etc/passwd").unwrap();
|
2020-05-11 11:13:27 +00:00
|
|
|
fetcher
|
|
|
|
.fetch_local_file(&u, &Permissions::allow_all())
|
|
|
|
.unwrap_err();
|
2019-08-13 01:52:03 +00:00
|
|
|
} else {
|
|
|
|
// Should fail: local network paths are not supported on unix.
|
|
|
|
let u = Url::parse("file://server/etc/passwd").unwrap();
|
2020-05-11 11:13:27 +00:00
|
|
|
fetcher
|
|
|
|
.fetch_local_file(&u, &Permissions::allow_all())
|
|
|
|
.unwrap_err();
|
2019-08-13 01:52:03 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-02-03 13:53:50 +00:00
|
|
|
#[tokio::test]
|
|
|
|
async fn test_get_source_code_1() {
|
2020-08-10 21:31:05 +00:00
|
|
|
let _http_server_guard = test_util::http_server();
|
2019-07-31 11:58:41 +00:00
|
|
|
let (temp_dir, fetcher) = test_setup();
|
2019-10-06 19:03:30 +00:00
|
|
|
let fetcher_1 = fetcher.clone();
|
|
|
|
let fetcher_2 = fetcher.clone();
|
|
|
|
let module_url =
|
2020-02-02 21:55:22 +00:00
|
|
|
Url::parse("http://localhost:4545/cli/tests/subdir/mod2.ts").unwrap();
|
2019-10-06 19:03:30 +00:00
|
|
|
let module_url_1 = module_url.clone();
|
|
|
|
let module_url_2 = module_url.clone();
|
2020-02-28 18:15:31 +00:00
|
|
|
|
|
|
|
let cache_filename = fetcher.http_cache.get_cache_filename(&module_url);
|
2019-07-31 11:58:41 +00:00
|
|
|
|
2020-02-03 13:53:50 +00:00
|
|
|
let result = fetcher
|
2020-05-11 11:13:27 +00:00
|
|
|
.get_source_file(
|
|
|
|
&module_url,
|
|
|
|
true,
|
|
|
|
false,
|
|
|
|
false,
|
|
|
|
&Permissions::allow_all(),
|
|
|
|
)
|
2020-02-03 13:53:50 +00:00
|
|
|
.await;
|
|
|
|
assert!(result.is_ok());
|
|
|
|
let r = result.unwrap();
|
|
|
|
assert_eq!(
|
2020-08-03 21:39:48 +00:00
|
|
|
r.source_code.bytes,
|
2020-02-03 13:53:50 +00:00
|
|
|
&b"export { printHello } from \"./print_hello.ts\";\n"[..]
|
|
|
|
);
|
|
|
|
assert_eq!(&(r.media_type), &msg::MediaType::TypeScript);
|
2020-02-28 18:15:31 +00:00
|
|
|
|
|
|
|
let mut metadata =
|
|
|
|
crate::http_cache::Metadata::read(&cache_filename).unwrap();
|
2020-02-03 13:53:50 +00:00
|
|
|
|
2020-02-19 13:17:13 +00:00
|
|
|
// Modify .headers.json, write using fs write
|
2020-02-28 18:15:31 +00:00
|
|
|
metadata.headers = HashMap::new();
|
|
|
|
metadata
|
|
|
|
.headers
|
|
|
|
.insert("content-type".to_string(), "text/javascript".to_string());
|
|
|
|
metadata.write(&cache_filename).unwrap();
|
|
|
|
|
2020-02-03 13:53:50 +00:00
|
|
|
let result2 = fetcher_1
|
2020-05-11 11:13:27 +00:00
|
|
|
.get_source_file(
|
|
|
|
&module_url,
|
|
|
|
true,
|
|
|
|
false,
|
|
|
|
false,
|
|
|
|
&Permissions::allow_all(),
|
|
|
|
)
|
2020-02-03 13:53:50 +00:00
|
|
|
.await;
|
|
|
|
assert!(result2.is_ok());
|
|
|
|
let r2 = result2.unwrap();
|
|
|
|
assert_eq!(
|
2020-08-03 21:39:48 +00:00
|
|
|
r2.source_code.bytes,
|
2020-02-03 13:53:50 +00:00
|
|
|
&b"export { printHello } from \"./print_hello.ts\";\n"[..]
|
|
|
|
);
|
2020-02-25 19:42:00 +00:00
|
|
|
// If get_source_file does not call remote, this should be JavaScript
|
2020-02-03 13:53:50 +00:00
|
|
|
// as we modified before! (we do not overwrite .headers.json due to no http fetch)
|
|
|
|
assert_eq!(&(r2.media_type), &msg::MediaType::JavaScript);
|
2020-02-19 13:17:13 +00:00
|
|
|
let (_, headers) = fetcher_2.http_cache.get(&module_url_1).unwrap();
|
|
|
|
|
|
|
|
assert_eq!(headers.get("content-type").unwrap(), "text/javascript");
|
2020-02-03 13:53:50 +00:00
|
|
|
|
|
|
|
// Modify .headers.json again, but the other way around
|
2020-02-28 18:15:31 +00:00
|
|
|
metadata.headers = HashMap::new();
|
|
|
|
metadata
|
|
|
|
.headers
|
|
|
|
.insert("content-type".to_string(), "application/json".to_string());
|
|
|
|
metadata.write(&cache_filename).unwrap();
|
|
|
|
|
2020-02-03 13:53:50 +00:00
|
|
|
let result3 = fetcher_2
|
2020-05-11 11:13:27 +00:00
|
|
|
.get_source_file(
|
|
|
|
&module_url_1,
|
|
|
|
true,
|
|
|
|
false,
|
|
|
|
false,
|
|
|
|
&Permissions::allow_all(),
|
|
|
|
)
|
2020-02-03 13:53:50 +00:00
|
|
|
.await;
|
|
|
|
assert!(result3.is_ok());
|
|
|
|
let r3 = result3.unwrap();
|
|
|
|
assert_eq!(
|
2020-08-03 21:39:48 +00:00
|
|
|
r3.source_code.bytes,
|
2020-02-03 13:53:50 +00:00
|
|
|
&b"export { printHello } from \"./print_hello.ts\";\n"[..]
|
|
|
|
);
|
2020-02-25 19:42:00 +00:00
|
|
|
// If get_source_file does not call remote, this should be JavaScript
|
2020-02-03 13:53:50 +00:00
|
|
|
// as we modified before! (we do not overwrite .headers.json due to no http fetch)
|
|
|
|
assert_eq!(&(r3.media_type), &msg::MediaType::Json);
|
2020-02-28 18:15:31 +00:00
|
|
|
let metadata = crate::http_cache::Metadata::read(&cache_filename).unwrap();
|
|
|
|
assert_eq!(
|
|
|
|
metadata.headers.get("content-type").unwrap(),
|
|
|
|
"application/json"
|
|
|
|
);
|
2020-02-03 13:53:50 +00:00
|
|
|
|
|
|
|
// let's create fresh instance of DenoDir (simulating another freshh Deno process)
|
|
|
|
// and don't use cache
|
|
|
|
let fetcher = setup_file_fetcher(temp_dir.path());
|
|
|
|
let result4 = fetcher
|
2020-05-11 11:13:27 +00:00
|
|
|
.get_source_file(
|
|
|
|
&module_url_2,
|
|
|
|
false,
|
|
|
|
false,
|
|
|
|
false,
|
|
|
|
&Permissions::allow_all(),
|
|
|
|
)
|
2020-02-03 13:53:50 +00:00
|
|
|
.await;
|
|
|
|
assert!(result4.is_ok());
|
|
|
|
let r4 = result4.unwrap();
|
|
|
|
let expected4 = &b"export { printHello } from \"./print_hello.ts\";\n"[..];
|
2020-08-03 21:39:48 +00:00
|
|
|
assert_eq!(r4.source_code.bytes, expected4);
|
2020-02-19 13:17:13 +00:00
|
|
|
// Resolved back to TypeScript
|
2020-02-03 13:53:50 +00:00
|
|
|
assert_eq!(&(r4.media_type), &msg::MediaType::TypeScript);
|
2019-07-31 11:58:41 +00:00
|
|
|
}
|
|
|
|
|
2020-02-03 13:53:50 +00:00
|
|
|
#[tokio::test]
|
|
|
|
async fn test_get_source_code_2() {
|
2020-08-10 21:31:05 +00:00
|
|
|
let _http_server_guard = test_util::http_server();
|
2019-07-31 11:58:41 +00:00
|
|
|
let (temp_dir, fetcher) = test_setup();
|
2019-10-06 19:03:30 +00:00
|
|
|
let module_url =
|
2020-02-02 21:55:22 +00:00
|
|
|
Url::parse("http://localhost:4545/cli/tests/subdir/mismatch_ext.ts")
|
|
|
|
.unwrap();
|
2019-10-06 19:03:30 +00:00
|
|
|
let module_url_1 = module_url.clone();
|
2020-02-28 18:15:31 +00:00
|
|
|
|
|
|
|
let cache_filename = fetcher.http_cache.get_cache_filename(&module_url);
|
2019-07-31 11:58:41 +00:00
|
|
|
|
2020-02-03 13:53:50 +00:00
|
|
|
let result = fetcher
|
2020-05-11 11:13:27 +00:00
|
|
|
.get_source_file(
|
|
|
|
&module_url,
|
|
|
|
true,
|
|
|
|
false,
|
|
|
|
false,
|
|
|
|
&Permissions::allow_all(),
|
|
|
|
)
|
2020-02-03 13:53:50 +00:00
|
|
|
.await;
|
|
|
|
assert!(result.is_ok());
|
|
|
|
let r = result.unwrap();
|
|
|
|
let expected = b"export const loaded = true;\n";
|
2020-08-03 21:39:48 +00:00
|
|
|
assert_eq!(r.source_code.bytes, expected);
|
2020-02-03 13:53:50 +00:00
|
|
|
assert_eq!(&(r.media_type), &msg::MediaType::JavaScript);
|
2020-02-19 13:17:13 +00:00
|
|
|
let (_, headers) = fetcher.http_cache.get(&module_url).unwrap();
|
|
|
|
assert_eq!(headers.get("content-type").unwrap(), "text/javascript");
|
2020-02-03 13:53:50 +00:00
|
|
|
|
|
|
|
// Modify .headers.json
|
2020-02-28 18:15:31 +00:00
|
|
|
let mut metadata =
|
|
|
|
crate::http_cache::Metadata::read(&cache_filename).unwrap();
|
|
|
|
metadata.headers = HashMap::new();
|
|
|
|
metadata
|
|
|
|
.headers
|
|
|
|
.insert("content-type".to_string(), "text/typescript".to_string());
|
|
|
|
metadata.write(&cache_filename).unwrap();
|
|
|
|
|
2020-02-03 13:53:50 +00:00
|
|
|
let result2 = fetcher
|
2020-05-11 11:13:27 +00:00
|
|
|
.get_source_file(
|
|
|
|
&module_url,
|
|
|
|
true,
|
|
|
|
false,
|
|
|
|
false,
|
|
|
|
&Permissions::allow_all(),
|
|
|
|
)
|
2020-02-03 13:53:50 +00:00
|
|
|
.await;
|
|
|
|
assert!(result2.is_ok());
|
|
|
|
let r2 = result2.unwrap();
|
|
|
|
let expected2 = b"export const loaded = true;\n";
|
2020-08-03 21:39:48 +00:00
|
|
|
assert_eq!(r2.source_code.bytes, expected2);
|
2020-02-25 19:42:00 +00:00
|
|
|
// If get_source_file does not call remote, this should be TypeScript
|
2020-02-03 13:53:50 +00:00
|
|
|
// as we modified before! (we do not overwrite .headers.json due to no http
|
|
|
|
// fetch)
|
|
|
|
assert_eq!(&(r2.media_type), &msg::MediaType::TypeScript);
|
2020-02-28 18:15:31 +00:00
|
|
|
let metadata = crate::http_cache::Metadata::read(&cache_filename).unwrap();
|
2020-02-19 13:17:13 +00:00
|
|
|
assert_eq!(
|
2020-02-28 18:15:31 +00:00
|
|
|
metadata.headers.get("content-type").unwrap(),
|
|
|
|
"text/typescript"
|
2020-02-19 13:17:13 +00:00
|
|
|
);
|
2020-02-03 13:53:50 +00:00
|
|
|
|
2020-02-19 13:17:13 +00:00
|
|
|
// let's create fresh instance of DenoDir (simulating another fresh Deno
|
2020-02-03 13:53:50 +00:00
|
|
|
// process) and don't use cache
|
|
|
|
let fetcher = setup_file_fetcher(temp_dir.path());
|
|
|
|
let result3 = fetcher
|
2020-05-11 11:13:27 +00:00
|
|
|
.get_source_file(
|
|
|
|
&module_url_1,
|
|
|
|
false,
|
|
|
|
false,
|
|
|
|
false,
|
|
|
|
&Permissions::allow_all(),
|
|
|
|
)
|
2020-02-03 13:53:50 +00:00
|
|
|
.await;
|
|
|
|
assert!(result3.is_ok());
|
|
|
|
let r3 = result3.unwrap();
|
|
|
|
let expected3 = b"export const loaded = true;\n";
|
2020-08-03 21:39:48 +00:00
|
|
|
assert_eq!(r3.source_code.bytes, expected3);
|
2020-02-03 13:53:50 +00:00
|
|
|
// Now the old .headers.json file should be overwritten back to JavaScript!
|
|
|
|
// (due to http fetch)
|
|
|
|
assert_eq!(&(r3.media_type), &msg::MediaType::JavaScript);
|
2020-02-19 13:17:13 +00:00
|
|
|
let (_, headers) = fetcher.http_cache.get(&module_url).unwrap();
|
|
|
|
assert_eq!(headers.get("content-type").unwrap(), "text/javascript");
|
2019-07-31 11:58:41 +00:00
|
|
|
}
|
|
|
|
|
2020-02-03 13:53:50 +00:00
|
|
|
#[tokio::test]
|
|
|
|
async fn test_get_source_code_multiple_downloads_of_same_file() {
|
2020-08-10 21:31:05 +00:00
|
|
|
let _http_server_guard = test_util::http_server();
|
2019-07-31 11:58:41 +00:00
|
|
|
let (_temp_dir, fetcher) = test_setup();
|
2019-11-22 17:46:57 +00:00
|
|
|
let specifier = ModuleSpecifier::resolve_url(
|
2020-02-02 21:55:22 +00:00
|
|
|
"http://localhost:4545/cli/tests/subdir/mismatch_ext.ts",
|
2019-11-22 17:46:57 +00:00
|
|
|
)
|
|
|
|
.unwrap();
|
2020-02-28 18:15:31 +00:00
|
|
|
let cache_filename =
|
|
|
|
fetcher.http_cache.get_cache_filename(&specifier.as_url());
|
2019-07-31 11:58:41 +00:00
|
|
|
|
2019-11-22 17:46:57 +00:00
|
|
|
// first download
|
2020-05-11 11:13:27 +00:00
|
|
|
let r = fetcher
|
|
|
|
.fetch_source_file(&specifier, None, Permissions::allow_all())
|
|
|
|
.await;
|
2020-02-03 13:53:50 +00:00
|
|
|
assert!(r.is_ok());
|
2019-11-22 17:46:57 +00:00
|
|
|
|
2020-02-28 18:15:31 +00:00
|
|
|
let headers_file_name =
|
|
|
|
crate::http_cache::Metadata::filename(&cache_filename);
|
2019-11-22 17:46:57 +00:00
|
|
|
let result = fs::File::open(&headers_file_name);
|
|
|
|
assert!(result.is_ok());
|
|
|
|
let headers_file = result.unwrap();
|
|
|
|
// save modified timestamp for headers file
|
|
|
|
let headers_file_metadata = headers_file.metadata().unwrap();
|
|
|
|
let headers_file_modified = headers_file_metadata.modified().unwrap();
|
|
|
|
|
2020-02-03 13:53:50 +00:00
|
|
|
// download file again, it should use already fetched file even though
|
|
|
|
// `use_disk_cache` is set to false, this can be verified using source
|
|
|
|
// header file creation timestamp (should be the same as after first
|
|
|
|
// download)
|
2020-05-11 11:13:27 +00:00
|
|
|
let r = fetcher
|
|
|
|
.fetch_source_file(&specifier, None, Permissions::allow_all())
|
|
|
|
.await;
|
2020-02-03 13:53:50 +00:00
|
|
|
assert!(r.is_ok());
|
2019-11-22 17:46:57 +00:00
|
|
|
|
|
|
|
let result = fs::File::open(&headers_file_name);
|
|
|
|
assert!(result.is_ok());
|
|
|
|
let headers_file_2 = result.unwrap();
|
|
|
|
// save modified timestamp for headers file
|
|
|
|
let headers_file_metadata_2 = headers_file_2.metadata().unwrap();
|
|
|
|
let headers_file_modified_2 = headers_file_metadata_2.modified().unwrap();
|
|
|
|
|
|
|
|
assert_eq!(headers_file_modified, headers_file_modified_2);
|
2019-07-31 11:58:41 +00:00
|
|
|
}
|
|
|
|
|
2020-02-03 13:53:50 +00:00
|
|
|
#[tokio::test]
|
|
|
|
async fn test_get_source_code_3() {
|
2020-08-10 21:31:05 +00:00
|
|
|
let _http_server_guard = test_util::http_server();
|
2019-07-31 11:58:41 +00:00
|
|
|
let (_temp_dir, fetcher) = test_setup();
|
|
|
|
|
2020-02-02 21:55:22 +00:00
|
|
|
let redirect_module_url = Url::parse(
|
|
|
|
"http://localhost:4546/cli/tests/subdir/redirects/redirect1.js",
|
|
|
|
)
|
|
|
|
.unwrap();
|
2020-02-19 13:17:13 +00:00
|
|
|
let redirect_source_filepath =
|
|
|
|
fetcher.http_cache.get_cache_filename(&redirect_module_url);
|
2019-10-06 19:03:30 +00:00
|
|
|
let redirect_source_filename =
|
|
|
|
redirect_source_filepath.to_str().unwrap().to_string();
|
2020-02-02 21:55:22 +00:00
|
|
|
let target_module_url = Url::parse(
|
|
|
|
"http://localhost:4545/cli/tests/subdir/redirects/redirect1.js",
|
|
|
|
)
|
|
|
|
.unwrap();
|
2020-02-19 13:17:13 +00:00
|
|
|
let redirect_target_filepath =
|
|
|
|
fetcher.http_cache.get_cache_filename(&target_module_url);
|
2019-10-06 19:03:30 +00:00
|
|
|
let redirect_target_filename =
|
|
|
|
redirect_target_filepath.to_str().unwrap().to_string();
|
2019-07-31 11:58:41 +00:00
|
|
|
|
2019-10-06 19:03:30 +00:00
|
|
|
// Test basic follow and headers recording
|
2020-02-03 13:53:50 +00:00
|
|
|
let result = fetcher
|
2020-05-11 11:13:27 +00:00
|
|
|
.get_source_file(
|
|
|
|
&redirect_module_url,
|
|
|
|
true,
|
|
|
|
false,
|
|
|
|
false,
|
|
|
|
&Permissions::allow_all(),
|
|
|
|
)
|
2020-02-03 13:53:50 +00:00
|
|
|
.await;
|
|
|
|
assert!(result.is_ok());
|
|
|
|
let mod_meta = result.unwrap();
|
2020-02-19 13:17:13 +00:00
|
|
|
// File that requires redirection should be empty file.
|
|
|
|
assert_eq!(fs::read_to_string(&redirect_source_filename).unwrap(), "");
|
|
|
|
let (_, headers) = fetcher.http_cache.get(&redirect_module_url).unwrap();
|
2020-02-03 13:53:50 +00:00
|
|
|
assert_eq!(
|
2020-02-19 13:17:13 +00:00
|
|
|
headers.get("location").unwrap(),
|
2020-02-03 13:53:50 +00:00
|
|
|
"http://localhost:4545/cli/tests/subdir/redirects/redirect1.js"
|
|
|
|
);
|
|
|
|
// The target of redirection is downloaded instead.
|
|
|
|
assert_eq!(
|
|
|
|
fs::read_to_string(&redirect_target_filename).unwrap(),
|
|
|
|
"export const redirect = 1;\n"
|
|
|
|
);
|
2020-02-19 13:17:13 +00:00
|
|
|
let (_, headers) = fetcher.http_cache.get(&target_module_url).unwrap();
|
|
|
|
assert!(headers.get("location").is_none());
|
2020-02-03 13:53:50 +00:00
|
|
|
// Examine the meta result.
|
|
|
|
assert_eq!(mod_meta.url, target_module_url);
|
2019-07-31 11:58:41 +00:00
|
|
|
}
|
|
|
|
|
2020-02-03 13:53:50 +00:00
|
|
|
#[tokio::test]
|
|
|
|
async fn test_get_source_code_4() {
|
2020-08-10 21:31:05 +00:00
|
|
|
let _http_server_guard = test_util::http_server();
|
2019-07-31 11:58:41 +00:00
|
|
|
let (_temp_dir, fetcher) = test_setup();
|
2020-02-02 21:55:22 +00:00
|
|
|
let double_redirect_url = Url::parse(
|
|
|
|
"http://localhost:4548/cli/tests/subdir/redirects/redirect1.js",
|
|
|
|
)
|
|
|
|
.unwrap();
|
2020-02-19 13:17:13 +00:00
|
|
|
let double_redirect_path =
|
|
|
|
fetcher.http_cache.get_cache_filename(&double_redirect_url);
|
2019-07-31 11:58:41 +00:00
|
|
|
|
2020-02-02 21:55:22 +00:00
|
|
|
let redirect_url = Url::parse(
|
|
|
|
"http://localhost:4546/cli/tests/subdir/redirects/redirect1.js",
|
|
|
|
)
|
|
|
|
.unwrap();
|
2020-02-19 13:17:13 +00:00
|
|
|
let redirect_path = fetcher.http_cache.get_cache_filename(&redirect_url);
|
2019-07-31 11:58:41 +00:00
|
|
|
|
2020-02-02 21:55:22 +00:00
|
|
|
let target_url = Url::parse(
|
|
|
|
"http://localhost:4545/cli/tests/subdir/redirects/redirect1.js",
|
|
|
|
)
|
|
|
|
.unwrap();
|
2020-02-19 13:17:13 +00:00
|
|
|
let target_path = fetcher.http_cache.get_cache_filename(&target_url);
|
2019-07-31 11:58:41 +00:00
|
|
|
|
2019-10-06 19:03:30 +00:00
|
|
|
// Test double redirects and headers recording
|
2020-02-03 13:53:50 +00:00
|
|
|
let result = fetcher
|
2020-05-11 11:13:27 +00:00
|
|
|
.get_source_file(
|
|
|
|
&double_redirect_url,
|
|
|
|
true,
|
|
|
|
false,
|
|
|
|
false,
|
|
|
|
&Permissions::allow_all(),
|
|
|
|
)
|
2020-02-03 13:53:50 +00:00
|
|
|
.await;
|
|
|
|
assert!(result.is_ok());
|
|
|
|
let mod_meta = result.unwrap();
|
2020-02-19 13:17:13 +00:00
|
|
|
assert_eq!(fs::read_to_string(&double_redirect_path).unwrap(), "");
|
|
|
|
assert_eq!(fs::read_to_string(&redirect_path).unwrap(), "");
|
2020-02-03 13:53:50 +00:00
|
|
|
|
2020-02-19 13:17:13 +00:00
|
|
|
let (_, headers) = fetcher.http_cache.get(&double_redirect_url).unwrap();
|
|
|
|
assert_eq!(headers.get("location").unwrap(), &redirect_url.to_string());
|
|
|
|
|
|
|
|
let (_, headers) = fetcher.http_cache.get(&redirect_url).unwrap();
|
|
|
|
assert_eq!(headers.get("location").unwrap(), &target_url.to_string());
|
2020-02-03 13:53:50 +00:00
|
|
|
|
|
|
|
// The target of redirection is downloaded instead.
|
|
|
|
assert_eq!(
|
|
|
|
fs::read_to_string(&target_path).unwrap(),
|
|
|
|
"export const redirect = 1;\n"
|
|
|
|
);
|
2020-02-19 13:17:13 +00:00
|
|
|
let (_, headers) = fetcher.http_cache.get(&target_url).unwrap();
|
|
|
|
assert!(headers.get("location").is_none());
|
2020-02-03 13:53:50 +00:00
|
|
|
|
|
|
|
// Examine the meta result.
|
|
|
|
assert_eq!(mod_meta.url, target_url);
|
2019-07-31 11:58:41 +00:00
|
|
|
}
|
|
|
|
|
2020-02-03 13:53:50 +00:00
|
|
|
#[tokio::test]
|
|
|
|
async fn test_get_source_code_5() {
|
2020-08-10 21:31:05 +00:00
|
|
|
let _http_server_guard = test_util::http_server();
|
2019-07-31 11:58:41 +00:00
|
|
|
let (_temp_dir, fetcher) = test_setup();
|
|
|
|
|
2020-02-02 21:55:22 +00:00
|
|
|
let double_redirect_url = Url::parse(
|
|
|
|
"http://localhost:4548/cli/tests/subdir/redirects/redirect1.js",
|
|
|
|
)
|
|
|
|
.unwrap();
|
2019-07-31 11:58:41 +00:00
|
|
|
|
2020-02-02 21:55:22 +00:00
|
|
|
let redirect_url = Url::parse(
|
|
|
|
"http://localhost:4546/cli/tests/subdir/redirects/redirect1.js",
|
|
|
|
)
|
|
|
|
.unwrap();
|
2019-07-31 11:58:41 +00:00
|
|
|
|
2020-02-19 13:17:13 +00:00
|
|
|
let target_path = fetcher.http_cache.get_cache_filename(&redirect_url);
|
2019-10-06 19:03:30 +00:00
|
|
|
let target_path_ = target_path.clone();
|
2019-07-31 11:58:41 +00:00
|
|
|
|
2019-10-06 19:03:30 +00:00
|
|
|
// Test that redirect target is not downloaded twice for different redirect source.
|
2020-02-03 13:53:50 +00:00
|
|
|
let result = fetcher
|
2020-05-11 11:13:27 +00:00
|
|
|
.get_source_file(
|
|
|
|
&double_redirect_url,
|
|
|
|
true,
|
|
|
|
false,
|
|
|
|
false,
|
|
|
|
&Permissions::allow_all(),
|
|
|
|
)
|
2020-02-03 13:53:50 +00:00
|
|
|
.await;
|
|
|
|
assert!(result.is_ok());
|
|
|
|
let result = fs::File::open(&target_path);
|
|
|
|
assert!(result.is_ok());
|
|
|
|
let file = result.unwrap();
|
|
|
|
// save modified timestamp for headers file of redirect target
|
|
|
|
let file_metadata = file.metadata().unwrap();
|
|
|
|
let file_modified = file_metadata.modified().unwrap();
|
|
|
|
|
|
|
|
// When another file is fetched that also point to redirect target, then
|
|
|
|
// redirect target shouldn't be downloaded again. It can be verified
|
|
|
|
// using source header file creation timestamp (should be the same as
|
|
|
|
// after first `get_source_file`)
|
|
|
|
let result = fetcher
|
2020-05-11 11:13:27 +00:00
|
|
|
.get_source_file(
|
|
|
|
&redirect_url,
|
|
|
|
true,
|
|
|
|
false,
|
|
|
|
false,
|
|
|
|
&Permissions::allow_all(),
|
|
|
|
)
|
2020-02-03 13:53:50 +00:00
|
|
|
.await;
|
|
|
|
assert!(result.is_ok());
|
|
|
|
let result = fs::File::open(&target_path_);
|
|
|
|
assert!(result.is_ok());
|
|
|
|
let file_2 = result.unwrap();
|
|
|
|
// save modified timestamp for headers file
|
|
|
|
let file_metadata_2 = file_2.metadata().unwrap();
|
|
|
|
let file_modified_2 = file_metadata_2.modified().unwrap();
|
|
|
|
|
|
|
|
assert_eq!(file_modified, file_modified_2);
|
2019-07-31 11:58:41 +00:00
|
|
|
}
|
|
|
|
|
2020-02-03 13:53:50 +00:00
|
|
|
#[tokio::test]
|
|
|
|
async fn test_get_source_code_6() {
|
2020-08-10 21:31:05 +00:00
|
|
|
let _http_server_guard = test_util::http_server();
|
2019-07-31 11:58:41 +00:00
|
|
|
let (_temp_dir, fetcher) = test_setup();
|
2020-02-02 21:55:22 +00:00
|
|
|
let double_redirect_url = Url::parse(
|
|
|
|
"http://localhost:4548/cli/tests/subdir/redirects/redirect1.js",
|
|
|
|
)
|
|
|
|
.unwrap();
|
2019-10-06 19:03:30 +00:00
|
|
|
|
2019-07-31 11:58:41 +00:00
|
|
|
// Test that redirections can be limited
|
2020-02-03 13:53:50 +00:00
|
|
|
let result = fetcher
|
2020-05-11 11:13:27 +00:00
|
|
|
.fetch_remote_source(
|
|
|
|
&double_redirect_url,
|
|
|
|
false,
|
|
|
|
false,
|
|
|
|
2,
|
|
|
|
&Permissions::allow_all(),
|
|
|
|
)
|
2020-02-03 13:53:50 +00:00
|
|
|
.await;
|
|
|
|
assert!(result.is_ok());
|
|
|
|
|
|
|
|
let result = fetcher
|
2020-05-11 11:13:27 +00:00
|
|
|
.fetch_remote_source(
|
|
|
|
&double_redirect_url,
|
|
|
|
false,
|
|
|
|
false,
|
|
|
|
1,
|
|
|
|
&Permissions::allow_all(),
|
|
|
|
)
|
2020-02-03 13:53:50 +00:00
|
|
|
.await;
|
|
|
|
assert!(result.is_err());
|
2020-06-15 21:46:48 +00:00
|
|
|
|
|
|
|
// Test that redirections in cached files are limited as well
|
|
|
|
let result = fetcher.fetch_cached_remote_source(&double_redirect_url, 2);
|
|
|
|
assert!(result.is_ok());
|
|
|
|
|
|
|
|
let result = fetcher.fetch_cached_remote_source(&double_redirect_url, 1);
|
|
|
|
assert!(result.is_err());
|
2019-07-31 11:58:41 +00:00
|
|
|
}
|
|
|
|
|
2020-02-28 14:04:18 +00:00
|
|
|
#[tokio::test]
|
|
|
|
async fn test_get_source_code_7() {
|
2020-08-10 21:31:05 +00:00
|
|
|
let _http_server_guard = test_util::http_server();
|
2020-02-28 14:04:18 +00:00
|
|
|
let (_temp_dir, fetcher) = test_setup();
|
|
|
|
|
|
|
|
// Testing redirect with Location set to absolute url.
|
|
|
|
let redirect_module_url = Url::parse(
|
|
|
|
"http://localhost:4550/REDIRECT/cli/tests/subdir/redirects/redirect1.js",
|
|
|
|
)
|
|
|
|
.unwrap();
|
|
|
|
let redirect_source_filepath =
|
|
|
|
fetcher.http_cache.get_cache_filename(&redirect_module_url);
|
|
|
|
let redirect_source_filename =
|
|
|
|
redirect_source_filepath.to_str().unwrap().to_string();
|
|
|
|
let target_module_url = Url::parse(
|
|
|
|
"http://localhost:4550/cli/tests/subdir/redirects/redirect1.js",
|
|
|
|
)
|
|
|
|
.unwrap();
|
|
|
|
let redirect_target_filepath =
|
|
|
|
fetcher.http_cache.get_cache_filename(&target_module_url);
|
|
|
|
let redirect_target_filename =
|
|
|
|
redirect_target_filepath.to_str().unwrap().to_string();
|
|
|
|
|
|
|
|
// Test basic follow and headers recording
|
|
|
|
let result = fetcher
|
2020-05-11 11:13:27 +00:00
|
|
|
.get_source_file(
|
|
|
|
&redirect_module_url,
|
|
|
|
true,
|
|
|
|
false,
|
|
|
|
false,
|
|
|
|
&Permissions::allow_all(),
|
|
|
|
)
|
2020-02-28 14:04:18 +00:00
|
|
|
.await;
|
|
|
|
assert!(result.is_ok());
|
|
|
|
let mod_meta = result.unwrap();
|
|
|
|
// File that requires redirection should be empty file.
|
|
|
|
assert_eq!(fs::read_to_string(&redirect_source_filename).unwrap(), "");
|
|
|
|
let (_, headers) = fetcher.http_cache.get(&redirect_module_url).unwrap();
|
|
|
|
assert_eq!(
|
|
|
|
headers.get("location").unwrap(),
|
|
|
|
"/cli/tests/subdir/redirects/redirect1.js"
|
|
|
|
);
|
|
|
|
// The target of redirection is downloaded instead.
|
|
|
|
assert_eq!(
|
|
|
|
fs::read_to_string(&redirect_target_filename).unwrap(),
|
|
|
|
"export const redirect = 1;\n"
|
|
|
|
);
|
|
|
|
let (_, headers) = fetcher.http_cache.get(&target_module_url).unwrap();
|
|
|
|
assert!(headers.get("location").is_none());
|
|
|
|
// Examine the meta result.
|
|
|
|
assert_eq!(mod_meta.url, target_module_url);
|
|
|
|
}
|
|
|
|
|
2020-02-03 13:53:50 +00:00
|
|
|
#[tokio::test]
|
|
|
|
async fn test_get_source_no_remote() {
|
2020-08-10 21:31:05 +00:00
|
|
|
let _http_server_guard = test_util::http_server();
|
2019-12-03 22:48:53 +00:00
|
|
|
let (_temp_dir, fetcher) = test_setup();
|
|
|
|
let module_url =
|
2020-02-02 21:55:22 +00:00
|
|
|
Url::parse("http://localhost:4545/cli/tests/002_hello.ts").unwrap();
|
2019-12-03 22:48:53 +00:00
|
|
|
// Remote modules are not allowed
|
2020-02-03 13:53:50 +00:00
|
|
|
let result = fetcher
|
2020-05-11 11:13:27 +00:00
|
|
|
.get_source_file(
|
|
|
|
&module_url,
|
|
|
|
true,
|
|
|
|
true,
|
|
|
|
false,
|
|
|
|
&Permissions::allow_all(),
|
|
|
|
)
|
2020-02-03 13:53:50 +00:00
|
|
|
.await;
|
|
|
|
assert!(result.is_err());
|
2020-02-23 19:51:29 +00:00
|
|
|
// FIXME(bartlomieju):
|
|
|
|
// let err = result.err().unwrap();
|
|
|
|
// assert_eq!(err.kind(), ErrorKind::NotFound);
|
2019-12-03 22:48:53 +00:00
|
|
|
}
|
|
|
|
|
2020-02-03 13:53:50 +00:00
|
|
|
#[tokio::test]
|
|
|
|
async fn test_get_source_cached_only() {
|
2020-08-10 21:31:05 +00:00
|
|
|
let _http_server_guard = test_util::http_server();
|
2019-07-31 11:58:41 +00:00
|
|
|
let (_temp_dir, fetcher) = test_setup();
|
2019-10-06 19:03:30 +00:00
|
|
|
let fetcher_1 = fetcher.clone();
|
|
|
|
let fetcher_2 = fetcher.clone();
|
|
|
|
let module_url =
|
2020-02-02 21:55:22 +00:00
|
|
|
Url::parse("http://localhost:4545/cli/tests/002_hello.ts").unwrap();
|
2019-10-06 19:03:30 +00:00
|
|
|
let module_url_1 = module_url.clone();
|
|
|
|
let module_url_2 = module_url.clone();
|
2020-02-03 13:53:50 +00:00
|
|
|
|
2019-12-03 22:48:53 +00:00
|
|
|
// file hasn't been cached before
|
2020-02-03 13:53:50 +00:00
|
|
|
let result = fetcher
|
2020-05-11 11:13:27 +00:00
|
|
|
.get_source_file(
|
|
|
|
&module_url,
|
|
|
|
true,
|
|
|
|
false,
|
|
|
|
true,
|
|
|
|
&Permissions::allow_all(),
|
|
|
|
)
|
2020-02-03 13:53:50 +00:00
|
|
|
.await;
|
|
|
|
assert!(result.is_err());
|
2020-02-23 19:51:29 +00:00
|
|
|
// FIXME(bartlomieju):
|
|
|
|
// let err = result.err().unwrap();
|
|
|
|
// assert_eq!(err.kind(), ErrorKind::NotFound);
|
2020-02-03 13:53:50 +00:00
|
|
|
|
|
|
|
// download and cache file
|
|
|
|
let result = fetcher_1
|
2020-05-11 11:13:27 +00:00
|
|
|
.get_source_file(
|
|
|
|
&module_url_1,
|
|
|
|
true,
|
|
|
|
false,
|
|
|
|
false,
|
|
|
|
&Permissions::allow_all(),
|
|
|
|
)
|
2020-02-03 13:53:50 +00:00
|
|
|
.await;
|
|
|
|
assert!(result.is_ok());
|
|
|
|
// module is already cached, should be ok even with `cached_only`
|
|
|
|
let result = fetcher_2
|
2020-05-11 11:13:27 +00:00
|
|
|
.get_source_file(
|
|
|
|
&module_url_2,
|
|
|
|
true,
|
|
|
|
false,
|
|
|
|
true,
|
|
|
|
&Permissions::allow_all(),
|
|
|
|
)
|
2020-02-03 13:53:50 +00:00
|
|
|
.await;
|
|
|
|
assert!(result.is_ok());
|
2019-07-31 11:58:41 +00:00
|
|
|
}
|
|
|
|
|
2020-02-03 13:53:50 +00:00
|
|
|
#[tokio::test]
|
2020-02-25 19:42:00 +00:00
|
|
|
async fn test_fetch_source_0() {
|
2020-08-10 21:31:05 +00:00
|
|
|
let _http_server_guard = test_util::http_server();
|
2019-10-06 19:03:30 +00:00
|
|
|
let (_temp_dir, fetcher) = test_setup();
|
|
|
|
let module_url =
|
2020-02-02 21:55:22 +00:00
|
|
|
Url::parse("http://127.0.0.1:4545/cli/tests/subdir/mt_video_mp2t.t3.ts")
|
2019-10-06 19:03:30 +00:00
|
|
|
.unwrap();
|
2020-02-03 13:53:50 +00:00
|
|
|
let result = fetcher
|
2020-05-11 11:13:27 +00:00
|
|
|
.fetch_remote_source(
|
|
|
|
&module_url,
|
|
|
|
false,
|
|
|
|
false,
|
|
|
|
10,
|
|
|
|
&Permissions::allow_all(),
|
|
|
|
)
|
2020-02-03 13:53:50 +00:00
|
|
|
.await;
|
|
|
|
assert!(result.is_ok());
|
|
|
|
let r = result.unwrap();
|
2020-08-03 21:39:48 +00:00
|
|
|
assert_eq!(r.source_code.bytes, b"export const loaded = true;\n");
|
2020-02-03 13:53:50 +00:00
|
|
|
assert_eq!(&(r.media_type), &msg::MediaType::TypeScript);
|
|
|
|
|
2020-02-28 18:15:31 +00:00
|
|
|
// Modify .metadata.json, make sure read from local
|
|
|
|
let cache_filename = fetcher.http_cache.get_cache_filename(&module_url);
|
|
|
|
let mut metadata =
|
|
|
|
crate::http_cache::Metadata::read(&cache_filename).unwrap();
|
|
|
|
metadata.headers = HashMap::new();
|
|
|
|
metadata
|
|
|
|
.headers
|
|
|
|
.insert("content-type".to_string(), "text/javascript".to_string());
|
|
|
|
metadata.write(&cache_filename).unwrap();
|
2019-10-06 19:03:30 +00:00
|
|
|
|
2020-06-15 21:46:48 +00:00
|
|
|
let result2 = fetcher.fetch_cached_remote_source(&module_url, 1);
|
2020-02-03 13:53:50 +00:00
|
|
|
assert!(result2.is_ok());
|
|
|
|
let r2 = result2.unwrap().unwrap();
|
2020-08-03 21:39:48 +00:00
|
|
|
assert_eq!(r2.source_code.bytes, b"export const loaded = true;\n");
|
2020-02-03 13:53:50 +00:00
|
|
|
// Not MediaType::TypeScript due to .headers.json modification
|
|
|
|
assert_eq!(&(r2.media_type), &msg::MediaType::JavaScript);
|
2019-07-31 11:58:41 +00:00
|
|
|
}
|
|
|
|
|
2020-02-03 13:53:50 +00:00
|
|
|
#[tokio::test]
|
2020-06-24 18:12:04 +00:00
|
|
|
async fn fetch_remote_source_no_ext() {
|
2020-08-10 21:31:05 +00:00
|
|
|
let _g = test_util::http_server();
|
2019-10-06 19:03:30 +00:00
|
|
|
let (_temp_dir, fetcher) = test_setup();
|
|
|
|
let module_url =
|
2020-06-24 18:12:04 +00:00
|
|
|
&Url::parse("http://localhost:4545/cli/tests/subdir/no_ext").unwrap();
|
2020-02-03 13:53:50 +00:00
|
|
|
let result = fetcher
|
2020-05-11 11:13:27 +00:00
|
|
|
.fetch_remote_source(
|
2020-06-24 18:12:04 +00:00
|
|
|
module_url,
|
2020-05-11 11:13:27 +00:00
|
|
|
false,
|
|
|
|
false,
|
|
|
|
10,
|
|
|
|
&Permissions::allow_all(),
|
|
|
|
)
|
2020-02-03 13:53:50 +00:00
|
|
|
.await;
|
|
|
|
assert!(result.is_ok());
|
|
|
|
let r = result.unwrap();
|
2020-08-03 21:39:48 +00:00
|
|
|
assert_eq!(r.source_code.bytes, b"export const loaded = true;\n");
|
2020-02-03 13:53:50 +00:00
|
|
|
assert_eq!(&(r.media_type), &msg::MediaType::TypeScript);
|
2020-06-24 18:12:04 +00:00
|
|
|
let (_, headers) = fetcher.http_cache.get(module_url).unwrap();
|
2020-02-19 13:17:13 +00:00
|
|
|
assert_eq!(headers.get("content-type").unwrap(), "text/typescript");
|
2020-06-24 18:12:04 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
#[tokio::test]
|
|
|
|
async fn fetch_remote_source_mismatch_ext() {
|
2020-08-10 21:31:05 +00:00
|
|
|
let _g = test_util::http_server();
|
2020-06-24 18:12:04 +00:00
|
|
|
let (_temp_dir, fetcher) = test_setup();
|
|
|
|
let module_url =
|
|
|
|
&Url::parse("http://localhost:4545/cli/tests/subdir/mismatch_ext.ts")
|
|
|
|
.unwrap();
|
|
|
|
let result = fetcher
|
2020-05-11 11:13:27 +00:00
|
|
|
.fetch_remote_source(
|
2020-06-24 18:12:04 +00:00
|
|
|
module_url,
|
2020-05-11 11:13:27 +00:00
|
|
|
false,
|
|
|
|
false,
|
|
|
|
10,
|
|
|
|
&Permissions::allow_all(),
|
|
|
|
)
|
2020-02-03 13:53:50 +00:00
|
|
|
.await;
|
|
|
|
assert!(result.is_ok());
|
|
|
|
let r2 = result.unwrap();
|
2020-08-03 21:39:48 +00:00
|
|
|
assert_eq!(r2.source_code.bytes, b"export const loaded = true;\n");
|
2020-02-03 13:53:50 +00:00
|
|
|
assert_eq!(&(r2.media_type), &msg::MediaType::JavaScript);
|
2020-06-24 18:12:04 +00:00
|
|
|
let (_, headers) = fetcher.http_cache.get(module_url).unwrap();
|
2020-02-19 13:17:13 +00:00
|
|
|
assert_eq!(headers.get("content-type").unwrap(), "text/javascript");
|
2020-06-24 18:12:04 +00:00
|
|
|
}
|
2020-02-19 13:17:13 +00:00
|
|
|
|
2020-06-24 18:12:04 +00:00
|
|
|
#[tokio::test]
|
|
|
|
async fn fetch_remote_source_unknown_ext() {
|
2020-08-10 21:31:05 +00:00
|
|
|
let _g = test_util::http_server();
|
2020-06-24 18:12:04 +00:00
|
|
|
let (_temp_dir, fetcher) = test_setup();
|
|
|
|
let module_url =
|
|
|
|
&Url::parse("http://localhost:4545/cli/tests/subdir/unknown_ext.deno")
|
|
|
|
.unwrap();
|
|
|
|
let result = fetcher
|
2020-05-11 11:13:27 +00:00
|
|
|
.fetch_remote_source(
|
2020-06-24 18:12:04 +00:00
|
|
|
module_url,
|
2020-05-11 11:13:27 +00:00
|
|
|
false,
|
|
|
|
false,
|
|
|
|
10,
|
|
|
|
&Permissions::allow_all(),
|
|
|
|
)
|
2020-02-03 13:53:50 +00:00
|
|
|
.await;
|
|
|
|
assert!(result.is_ok());
|
|
|
|
let r3 = result.unwrap();
|
2020-08-03 21:39:48 +00:00
|
|
|
assert_eq!(r3.source_code.bytes, b"export const loaded = true;\n");
|
2020-02-03 13:53:50 +00:00
|
|
|
assert_eq!(&(r3.media_type), &msg::MediaType::TypeScript);
|
2020-06-24 18:12:04 +00:00
|
|
|
let (_, headers) = fetcher.http_cache.get(module_url).unwrap();
|
2020-02-19 13:17:13 +00:00
|
|
|
assert_eq!(headers.get("content-type").unwrap(), "text/typescript");
|
2019-07-31 11:58:41 +00:00
|
|
|
}
|
|
|
|
|
2020-02-03 13:53:50 +00:00
|
|
|
#[tokio::test]
|
|
|
|
async fn test_fetch_source_file() {
|
2019-07-31 11:58:41 +00:00
|
|
|
let (_temp_dir, fetcher) = test_setup();
|
|
|
|
|
2019-11-22 17:46:57 +00:00
|
|
|
// Test failure case.
|
|
|
|
let specifier =
|
|
|
|
ModuleSpecifier::resolve_url(file_url!("/baddir/hello.ts")).unwrap();
|
2020-05-11 11:13:27 +00:00
|
|
|
let r = fetcher
|
|
|
|
.fetch_source_file(&specifier, None, Permissions::allow_all())
|
|
|
|
.await;
|
2020-02-03 13:53:50 +00:00
|
|
|
assert!(r.is_err());
|
2019-11-22 17:46:57 +00:00
|
|
|
|
2020-07-19 17:49:44 +00:00
|
|
|
let p = std::path::PathBuf::from(env!("CARGO_MANIFEST_DIR"))
|
2020-07-23 14:27:26 +00:00
|
|
|
.join("rt/99_main.js");
|
2019-11-22 17:46:57 +00:00
|
|
|
let specifier =
|
|
|
|
ModuleSpecifier::resolve_url_or_path(p.to_str().unwrap()).unwrap();
|
2020-05-11 11:13:27 +00:00
|
|
|
let r = fetcher
|
|
|
|
.fetch_source_file(&specifier, None, Permissions::allow_all())
|
|
|
|
.await;
|
2020-02-03 13:53:50 +00:00
|
|
|
assert!(r.is_ok());
|
2019-07-31 11:58:41 +00:00
|
|
|
}
|
|
|
|
|
2020-02-03 13:53:50 +00:00
|
|
|
#[tokio::test]
|
|
|
|
async fn test_fetch_source_file_1() {
|
2019-07-31 11:58:41 +00:00
|
|
|
/*recompile ts file*/
|
|
|
|
let (_temp_dir, fetcher) = test_setup();
|
|
|
|
|
2019-11-22 17:46:57 +00:00
|
|
|
// Test failure case.
|
|
|
|
let specifier =
|
|
|
|
ModuleSpecifier::resolve_url(file_url!("/baddir/hello.ts")).unwrap();
|
2020-05-11 11:13:27 +00:00
|
|
|
let r = fetcher
|
|
|
|
.fetch_source_file(&specifier, None, Permissions::allow_all())
|
|
|
|
.await;
|
2020-02-03 13:53:50 +00:00
|
|
|
assert!(r.is_err());
|
2019-11-22 17:46:57 +00:00
|
|
|
|
2020-07-19 17:49:44 +00:00
|
|
|
let p = std::path::PathBuf::from(env!("CARGO_MANIFEST_DIR"))
|
2020-07-23 14:27:26 +00:00
|
|
|
.join("rt/99_main.js");
|
2019-11-22 17:46:57 +00:00
|
|
|
let specifier =
|
|
|
|
ModuleSpecifier::resolve_url_or_path(p.to_str().unwrap()).unwrap();
|
2020-05-11 11:13:27 +00:00
|
|
|
let r = fetcher
|
|
|
|
.fetch_source_file(&specifier, None, Permissions::allow_all())
|
|
|
|
.await;
|
2020-02-03 13:53:50 +00:00
|
|
|
assert!(r.is_ok());
|
2019-07-31 11:58:41 +00:00
|
|
|
}
|
|
|
|
|
2020-02-03 13:53:50 +00:00
|
|
|
#[tokio::test]
|
|
|
|
async fn test_fetch_source_file_2() {
|
2020-01-26 18:59:41 +00:00
|
|
|
/*recompile ts file*/
|
|
|
|
let (_temp_dir, fetcher) = test_setup();
|
|
|
|
|
|
|
|
let p = std::path::PathBuf::from(env!("CARGO_MANIFEST_DIR"))
|
|
|
|
.join("tests/001_hello.js");
|
|
|
|
let specifier =
|
|
|
|
ModuleSpecifier::resolve_url_or_path(p.to_str().unwrap()).unwrap();
|
2020-05-11 11:13:27 +00:00
|
|
|
let r = fetcher
|
|
|
|
.fetch_source_file(&specifier, None, Permissions::allow_all())
|
|
|
|
.await;
|
2020-02-03 13:53:50 +00:00
|
|
|
assert!(r.is_ok());
|
2020-01-26 18:59:41 +00:00
|
|
|
}
|
|
|
|
|
2019-07-31 11:58:41 +00:00
|
|
|
#[test]
|
|
|
|
fn test_resolve_module_3() {
|
|
|
|
// unsupported schemes
|
|
|
|
let test_cases = [
|
|
|
|
"ftp://localhost:4545/testdata/subdir/print_hello.ts",
|
|
|
|
"blob:https://whatwg.org/d0360e2f-caee-469f-9a2f-87d5b0456f6f",
|
|
|
|
];
|
|
|
|
|
|
|
|
for &test in test_cases.iter() {
|
|
|
|
let url = Url::parse(test).unwrap();
|
2020-02-23 19:51:29 +00:00
|
|
|
assert!(SourceFileFetcher::check_if_supported_scheme(&url).is_err());
|
2019-07-31 11:58:41 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-08-03 21:39:48 +00:00
|
|
|
async fn test_fetch_source_file_from_disk_nonstandard_encoding(
|
|
|
|
charset: &str,
|
|
|
|
expected_content: String,
|
|
|
|
) {
|
|
|
|
let (_temp_dir, fetcher) = test_setup();
|
|
|
|
|
|
|
|
let p = std::path::PathBuf::from(env!("CARGO_MANIFEST_DIR"))
|
|
|
|
.join(format!("tests/encoding/{}.ts", charset));
|
|
|
|
let specifier =
|
|
|
|
ModuleSpecifier::resolve_url_or_path(p.to_str().unwrap()).unwrap();
|
|
|
|
let r = fetcher
|
|
|
|
.fetch_source_file(&specifier, None, Permissions::allow_all())
|
|
|
|
.await;
|
|
|
|
assert!(r.is_ok());
|
|
|
|
let fetched_file = r.unwrap();
|
|
|
|
let source_code = fetched_file.source_code.to_str();
|
|
|
|
assert!(source_code.is_ok());
|
|
|
|
let actual = source_code.unwrap();
|
|
|
|
assert_eq!(expected_content, actual);
|
|
|
|
}
|
|
|
|
|
|
|
|
#[tokio::test]
|
|
|
|
async fn test_fetch_source_file_from_disk_utf_16_be() {
|
|
|
|
test_fetch_source_file_from_disk_nonstandard_encoding(
|
|
|
|
"utf-16be",
|
|
|
|
String::from_utf8(
|
|
|
|
b"\xEF\xBB\xBFconsole.log(\"Hello World\");\x0A".to_vec(),
|
|
|
|
)
|
|
|
|
.unwrap(),
|
|
|
|
)
|
|
|
|
.await;
|
|
|
|
}
|
|
|
|
|
|
|
|
#[tokio::test]
|
|
|
|
async fn test_fetch_source_file_from_disk_utf_16_le() {
|
|
|
|
test_fetch_source_file_from_disk_nonstandard_encoding(
|
|
|
|
"utf-16le",
|
|
|
|
String::from_utf8(
|
|
|
|
b"\xEF\xBB\xBFconsole.log(\"Hello World\");\x0A".to_vec(),
|
|
|
|
)
|
|
|
|
.unwrap(),
|
|
|
|
)
|
|
|
|
.await;
|
|
|
|
}
|
|
|
|
|
|
|
|
#[tokio::test]
|
|
|
|
async fn test_fetch_source_file_from_disk_utf_8_with_bom() {
|
|
|
|
test_fetch_source_file_from_disk_nonstandard_encoding(
|
|
|
|
"utf-8",
|
|
|
|
String::from_utf8(
|
|
|
|
b"\xEF\xBB\xBFconsole.log(\"Hello World\");\x0A".to_vec(),
|
|
|
|
)
|
|
|
|
.unwrap(),
|
|
|
|
)
|
|
|
|
.await;
|
|
|
|
}
|
|
|
|
|
2019-07-31 11:58:41 +00:00
|
|
|
#[test]
|
|
|
|
fn test_map_file_extension() {
|
|
|
|
assert_eq!(
|
|
|
|
map_file_extension(Path::new("foo/bar.ts")),
|
|
|
|
msg::MediaType::TypeScript
|
|
|
|
);
|
2019-10-02 14:46:36 +00:00
|
|
|
assert_eq!(
|
|
|
|
map_file_extension(Path::new("foo/bar.tsx")),
|
|
|
|
msg::MediaType::TSX
|
|
|
|
);
|
2019-07-31 11:58:41 +00:00
|
|
|
assert_eq!(
|
|
|
|
map_file_extension(Path::new("foo/bar.d.ts")),
|
|
|
|
msg::MediaType::TypeScript
|
|
|
|
);
|
|
|
|
assert_eq!(
|
|
|
|
map_file_extension(Path::new("foo/bar.js")),
|
|
|
|
msg::MediaType::JavaScript
|
|
|
|
);
|
2019-10-02 14:46:36 +00:00
|
|
|
assert_eq!(
|
|
|
|
map_file_extension(Path::new("foo/bar.jsx")),
|
|
|
|
msg::MediaType::JSX
|
|
|
|
);
|
2019-07-31 11:58:41 +00:00
|
|
|
assert_eq!(
|
|
|
|
map_file_extension(Path::new("foo/bar.json")),
|
|
|
|
msg::MediaType::Json
|
|
|
|
);
|
2019-11-14 13:31:39 +00:00
|
|
|
assert_eq!(
|
|
|
|
map_file_extension(Path::new("foo/bar.wasm")),
|
|
|
|
msg::MediaType::Wasm
|
|
|
|
);
|
2020-05-31 19:08:26 +00:00
|
|
|
assert_eq!(
|
|
|
|
map_file_extension(Path::new("foo/bar.cjs")),
|
|
|
|
msg::MediaType::JavaScript
|
|
|
|
);
|
2019-07-31 11:58:41 +00:00
|
|
|
assert_eq!(
|
|
|
|
map_file_extension(Path::new("foo/bar.txt")),
|
|
|
|
msg::MediaType::Unknown
|
|
|
|
);
|
|
|
|
assert_eq!(
|
|
|
|
map_file_extension(Path::new("foo/bar")),
|
|
|
|
msg::MediaType::Unknown
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
2019-10-16 17:35:04 +00:00
|
|
|
fn test_map_content_type_extension_only() {
|
2019-07-31 11:58:41 +00:00
|
|
|
// Extension only
|
|
|
|
assert_eq!(
|
2020-08-03 21:39:48 +00:00
|
|
|
map_content_type(Path::new("foo/bar.ts"), None).0,
|
2019-07-31 11:58:41 +00:00
|
|
|
msg::MediaType::TypeScript
|
|
|
|
);
|
2019-10-02 14:46:36 +00:00
|
|
|
assert_eq!(
|
2020-08-03 21:39:48 +00:00
|
|
|
map_content_type(Path::new("foo/bar.tsx"), None).0,
|
2019-10-02 14:46:36 +00:00
|
|
|
msg::MediaType::TSX
|
|
|
|
);
|
2019-07-31 11:58:41 +00:00
|
|
|
assert_eq!(
|
2020-08-03 21:39:48 +00:00
|
|
|
map_content_type(Path::new("foo/bar.d.ts"), None).0,
|
2019-07-31 11:58:41 +00:00
|
|
|
msg::MediaType::TypeScript
|
|
|
|
);
|
|
|
|
assert_eq!(
|
2020-08-03 21:39:48 +00:00
|
|
|
map_content_type(Path::new("foo/bar.js"), None).0,
|
2019-07-31 11:58:41 +00:00
|
|
|
msg::MediaType::JavaScript
|
|
|
|
);
|
2019-10-16 17:35:04 +00:00
|
|
|
assert_eq!(
|
2020-08-03 21:39:48 +00:00
|
|
|
map_content_type(Path::new("foo/bar.txt"), None).0,
|
2019-10-16 17:35:04 +00:00
|
|
|
msg::MediaType::Unknown
|
|
|
|
);
|
2019-10-02 14:46:36 +00:00
|
|
|
assert_eq!(
|
2020-08-03 21:39:48 +00:00
|
|
|
map_content_type(Path::new("foo/bar.jsx"), None).0,
|
2019-10-02 14:46:36 +00:00
|
|
|
msg::MediaType::JSX
|
|
|
|
);
|
2019-07-31 11:58:41 +00:00
|
|
|
assert_eq!(
|
2020-08-03 21:39:48 +00:00
|
|
|
map_content_type(Path::new("foo/bar.json"), None).0,
|
2019-07-31 11:58:41 +00:00
|
|
|
msg::MediaType::Json
|
|
|
|
);
|
2019-11-14 13:31:39 +00:00
|
|
|
assert_eq!(
|
2020-08-03 21:39:48 +00:00
|
|
|
map_content_type(Path::new("foo/bar.wasm"), None).0,
|
2019-11-14 13:31:39 +00:00
|
|
|
msg::MediaType::Wasm
|
|
|
|
);
|
2020-05-31 19:08:26 +00:00
|
|
|
assert_eq!(
|
2020-08-03 21:39:48 +00:00
|
|
|
map_content_type(Path::new("foo/bar.cjs"), None).0,
|
2020-05-31 19:08:26 +00:00
|
|
|
msg::MediaType::JavaScript
|
|
|
|
);
|
2019-07-31 11:58:41 +00:00
|
|
|
assert_eq!(
|
2020-08-03 21:39:48 +00:00
|
|
|
map_content_type(Path::new("foo/bar"), None).0,
|
2019-07-31 11:58:41 +00:00
|
|
|
msg::MediaType::Unknown
|
|
|
|
);
|
2019-10-16 17:35:04 +00:00
|
|
|
}
|
2019-07-31 11:58:41 +00:00
|
|
|
|
2019-10-16 17:35:04 +00:00
|
|
|
#[test]
|
|
|
|
fn test_map_content_type_media_type_with_no_extension() {
|
2019-07-31 11:58:41 +00:00
|
|
|
// Media Type
|
|
|
|
assert_eq!(
|
2020-08-03 21:39:48 +00:00
|
|
|
map_content_type(Path::new("foo/bar"), Some("application/typescript")).0,
|
2019-07-31 11:58:41 +00:00
|
|
|
msg::MediaType::TypeScript
|
|
|
|
);
|
|
|
|
assert_eq!(
|
2020-08-03 21:39:48 +00:00
|
|
|
map_content_type(Path::new("foo/bar"), Some("text/typescript")).0,
|
2019-07-31 11:58:41 +00:00
|
|
|
msg::MediaType::TypeScript
|
|
|
|
);
|
|
|
|
assert_eq!(
|
2020-08-03 21:39:48 +00:00
|
|
|
map_content_type(Path::new("foo/bar"), Some("video/vnd.dlna.mpeg-tts")).0,
|
2019-07-31 11:58:41 +00:00
|
|
|
msg::MediaType::TypeScript
|
|
|
|
);
|
|
|
|
assert_eq!(
|
2020-08-03 21:39:48 +00:00
|
|
|
map_content_type(Path::new("foo/bar"), Some("video/mp2t")).0,
|
2019-07-31 11:58:41 +00:00
|
|
|
msg::MediaType::TypeScript
|
|
|
|
);
|
|
|
|
assert_eq!(
|
2020-08-03 21:39:48 +00:00
|
|
|
map_content_type(Path::new("foo/bar"), Some("application/x-typescript"))
|
|
|
|
.0,
|
2019-07-31 11:58:41 +00:00
|
|
|
msg::MediaType::TypeScript
|
|
|
|
);
|
|
|
|
assert_eq!(
|
2020-08-03 21:39:48 +00:00
|
|
|
map_content_type(Path::new("foo/bar"), Some("application/javascript")).0,
|
2019-07-31 11:58:41 +00:00
|
|
|
msg::MediaType::JavaScript
|
|
|
|
);
|
|
|
|
assert_eq!(
|
2020-08-03 21:39:48 +00:00
|
|
|
map_content_type(Path::new("foo/bar"), Some("text/javascript")).0,
|
2019-07-31 11:58:41 +00:00
|
|
|
msg::MediaType::JavaScript
|
|
|
|
);
|
|
|
|
assert_eq!(
|
2020-08-03 21:39:48 +00:00
|
|
|
map_content_type(Path::new("foo/bar"), Some("application/ecmascript")).0,
|
2019-07-31 11:58:41 +00:00
|
|
|
msg::MediaType::JavaScript
|
|
|
|
);
|
|
|
|
assert_eq!(
|
2020-08-03 21:39:48 +00:00
|
|
|
map_content_type(Path::new("foo/bar"), Some("text/ecmascript")).0,
|
2019-07-31 11:58:41 +00:00
|
|
|
msg::MediaType::JavaScript
|
|
|
|
);
|
|
|
|
assert_eq!(
|
2020-08-03 21:39:48 +00:00
|
|
|
map_content_type(Path::new("foo/bar"), Some("application/x-javascript"))
|
|
|
|
.0,
|
2019-07-31 11:58:41 +00:00
|
|
|
msg::MediaType::JavaScript
|
|
|
|
);
|
|
|
|
assert_eq!(
|
2020-08-03 21:39:48 +00:00
|
|
|
map_content_type(Path::new("foo/bar"), Some("application/json")).0,
|
2019-07-31 11:58:41 +00:00
|
|
|
msg::MediaType::Json
|
|
|
|
);
|
2020-05-31 19:08:26 +00:00
|
|
|
assert_eq!(
|
2020-08-03 21:39:48 +00:00
|
|
|
map_content_type(Path::new("foo/bar"), Some("application/node")).0,
|
2020-05-31 19:08:26 +00:00
|
|
|
msg::MediaType::JavaScript
|
|
|
|
);
|
2019-07-31 11:58:41 +00:00
|
|
|
assert_eq!(
|
2020-08-03 21:39:48 +00:00
|
|
|
map_content_type(Path::new("foo/bar"), Some("text/json")).0,
|
2019-07-31 11:58:41 +00:00
|
|
|
msg::MediaType::Json
|
|
|
|
);
|
2020-08-03 21:39:48 +00:00
|
|
|
assert_eq!(
|
|
|
|
map_content_type(Path::new("foo/bar"), Some("text/json; charset=utf-8 ")),
|
|
|
|
(msg::MediaType::Json, Some("utf-8".to_owned()))
|
|
|
|
);
|
2019-10-16 17:35:04 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_map_file_extension_media_type_with_extension() {
|
2019-07-31 11:58:41 +00:00
|
|
|
assert_eq!(
|
2020-08-03 21:39:48 +00:00
|
|
|
map_content_type(Path::new("foo/bar.ts"), Some("text/plain")).0,
|
2019-07-31 11:58:41 +00:00
|
|
|
msg::MediaType::TypeScript
|
|
|
|
);
|
|
|
|
assert_eq!(
|
2020-08-03 21:39:48 +00:00
|
|
|
map_content_type(Path::new("foo/bar.ts"), Some("foo/bar")).0,
|
2019-07-31 11:58:41 +00:00
|
|
|
msg::MediaType::Unknown
|
|
|
|
);
|
2019-10-16 17:35:04 +00:00
|
|
|
assert_eq!(
|
|
|
|
map_content_type(
|
|
|
|
Path::new("foo/bar.tsx"),
|
2020-01-11 10:11:05 +00:00
|
|
|
Some("application/typescript"),
|
2020-08-03 21:39:48 +00:00
|
|
|
)
|
|
|
|
.0,
|
2019-10-16 17:35:04 +00:00
|
|
|
msg::MediaType::TSX
|
|
|
|
);
|
|
|
|
assert_eq!(
|
|
|
|
map_content_type(
|
|
|
|
Path::new("foo/bar.tsx"),
|
2020-01-11 10:11:05 +00:00
|
|
|
Some("application/javascript"),
|
2020-08-03 21:39:48 +00:00
|
|
|
)
|
|
|
|
.0,
|
2019-10-16 17:35:04 +00:00
|
|
|
msg::MediaType::TSX
|
|
|
|
);
|
|
|
|
assert_eq!(
|
|
|
|
map_content_type(
|
|
|
|
Path::new("foo/bar.tsx"),
|
2020-01-11 10:11:05 +00:00
|
|
|
Some("application/x-typescript"),
|
2020-08-03 21:39:48 +00:00
|
|
|
)
|
|
|
|
.0,
|
2019-10-16 17:35:04 +00:00
|
|
|
msg::MediaType::TSX
|
|
|
|
);
|
|
|
|
assert_eq!(
|
|
|
|
map_content_type(
|
|
|
|
Path::new("foo/bar.tsx"),
|
2020-01-11 10:11:05 +00:00
|
|
|
Some("video/vnd.dlna.mpeg-tts"),
|
2020-08-03 21:39:48 +00:00
|
|
|
)
|
|
|
|
.0,
|
2019-10-16 17:35:04 +00:00
|
|
|
msg::MediaType::TSX
|
|
|
|
);
|
|
|
|
assert_eq!(
|
2020-08-03 21:39:48 +00:00
|
|
|
map_content_type(Path::new("foo/bar.tsx"), Some("video/mp2t")).0,
|
2019-10-16 17:35:04 +00:00
|
|
|
msg::MediaType::TSX
|
|
|
|
);
|
|
|
|
assert_eq!(
|
|
|
|
map_content_type(
|
|
|
|
Path::new("foo/bar.jsx"),
|
2020-01-11 10:11:05 +00:00
|
|
|
Some("application/javascript"),
|
2020-08-03 21:39:48 +00:00
|
|
|
)
|
|
|
|
.0,
|
2019-10-16 17:35:04 +00:00
|
|
|
msg::MediaType::JSX
|
|
|
|
);
|
|
|
|
assert_eq!(
|
|
|
|
map_content_type(
|
|
|
|
Path::new("foo/bar.jsx"),
|
2020-01-11 10:11:05 +00:00
|
|
|
Some("application/x-typescript"),
|
2020-08-03 21:39:48 +00:00
|
|
|
)
|
|
|
|
.0,
|
2019-10-16 17:35:04 +00:00
|
|
|
msg::MediaType::JSX
|
|
|
|
);
|
|
|
|
assert_eq!(
|
|
|
|
map_content_type(
|
|
|
|
Path::new("foo/bar.jsx"),
|
2020-01-11 10:11:05 +00:00
|
|
|
Some("application/ecmascript"),
|
2020-08-03 21:39:48 +00:00
|
|
|
)
|
|
|
|
.0,
|
2019-10-16 17:35:04 +00:00
|
|
|
msg::MediaType::JSX
|
|
|
|
);
|
|
|
|
assert_eq!(
|
2020-08-03 21:39:48 +00:00
|
|
|
map_content_type(Path::new("foo/bar.jsx"), Some("text/ecmascript")).0,
|
2019-10-16 17:35:04 +00:00
|
|
|
msg::MediaType::JSX
|
|
|
|
);
|
|
|
|
assert_eq!(
|
|
|
|
map_content_type(
|
|
|
|
Path::new("foo/bar.jsx"),
|
2020-01-11 10:11:05 +00:00
|
|
|
Some("application/x-javascript"),
|
2020-08-03 21:39:48 +00:00
|
|
|
)
|
|
|
|
.0,
|
2019-10-16 17:35:04 +00:00
|
|
|
msg::MediaType::JSX
|
|
|
|
);
|
2019-07-31 11:58:41 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_filter_shebang() {
|
2020-08-03 21:39:48 +00:00
|
|
|
assert_eq!(filter_shebang("#!"), b"");
|
|
|
|
assert_eq!(filter_shebang("#!\n\n"), b"\n\n");
|
|
|
|
let code = "#!/usr/bin/env deno\nconsole.log('hello');\n";
|
2020-01-26 15:50:15 +00:00
|
|
|
assert_eq!(filter_shebang(code), b"\nconsole.log('hello');\n");
|
2019-07-31 11:58:41 +00:00
|
|
|
}
|
2020-01-11 10:11:05 +00:00
|
|
|
|
2020-02-03 13:53:50 +00:00
|
|
|
#[tokio::test]
|
|
|
|
async fn test_fetch_with_etag() {
|
2020-08-10 21:31:05 +00:00
|
|
|
let _http_server_guard = test_util::http_server();
|
2020-01-11 10:11:05 +00:00
|
|
|
let (_temp_dir, fetcher) = test_setup();
|
|
|
|
let module_url =
|
|
|
|
Url::parse("http://127.0.0.1:4545/etag_script.ts").unwrap();
|
|
|
|
|
2020-02-03 13:53:50 +00:00
|
|
|
let source = fetcher
|
2020-05-11 11:13:27 +00:00
|
|
|
.fetch_remote_source(
|
|
|
|
&module_url,
|
|
|
|
false,
|
|
|
|
false,
|
|
|
|
1,
|
|
|
|
&Permissions::allow_all(),
|
|
|
|
)
|
2020-02-03 13:53:50 +00:00
|
|
|
.await;
|
|
|
|
assert!(source.is_ok());
|
|
|
|
let source = source.unwrap();
|
2020-08-03 21:39:48 +00:00
|
|
|
assert_eq!(source.source_code.bytes, b"console.log('etag')");
|
2020-02-03 13:53:50 +00:00
|
|
|
assert_eq!(&(source.media_type), &msg::MediaType::TypeScript);
|
2020-01-11 10:11:05 +00:00
|
|
|
|
2020-02-19 13:17:13 +00:00
|
|
|
let (_, headers) = fetcher.http_cache.get(&module_url).unwrap();
|
|
|
|
assert_eq!(headers.get("etag").unwrap(), "33a64df551425fcc55e");
|
2020-01-11 10:11:05 +00:00
|
|
|
|
2020-02-28 18:15:31 +00:00
|
|
|
let metadata_path = crate::http_cache::Metadata::filename(
|
|
|
|
&fetcher.http_cache.get_cache_filename(&module_url),
|
|
|
|
);
|
2020-01-11 10:11:05 +00:00
|
|
|
|
2020-02-28 18:15:31 +00:00
|
|
|
let modified1 = metadata_path.metadata().unwrap().modified().unwrap();
|
2020-01-11 10:11:05 +00:00
|
|
|
|
2020-02-03 13:53:50 +00:00
|
|
|
// Forcibly change the contents of the cache file and request
|
|
|
|
// it again with the cache parameters turned off.
|
|
|
|
// If the fetched content changes, the cached content is used.
|
2020-02-19 13:17:13 +00:00
|
|
|
let file_name = fetcher.http_cache.get_cache_filename(&module_url);
|
|
|
|
let _ = fs::write(&file_name, "changed content");
|
2020-02-03 13:53:50 +00:00
|
|
|
let cached_source = fetcher
|
2020-05-11 11:13:27 +00:00
|
|
|
.fetch_remote_source(
|
|
|
|
&module_url,
|
|
|
|
false,
|
|
|
|
false,
|
|
|
|
1,
|
|
|
|
&Permissions::allow_all(),
|
|
|
|
)
|
2020-02-03 13:53:50 +00:00
|
|
|
.await
|
|
|
|
.unwrap();
|
2020-08-03 21:39:48 +00:00
|
|
|
assert_eq!(cached_source.source_code.bytes, b"changed content");
|
2020-02-03 13:53:50 +00:00
|
|
|
|
2020-02-28 18:15:31 +00:00
|
|
|
let modified2 = metadata_path.metadata().unwrap().modified().unwrap();
|
2020-02-03 13:53:50 +00:00
|
|
|
|
|
|
|
// Assert that the file has not been modified
|
|
|
|
assert_eq!(modified1, modified2);
|
2020-01-11 10:11:05 +00:00
|
|
|
}
|
2020-01-26 18:59:41 +00:00
|
|
|
|
2020-02-03 13:53:50 +00:00
|
|
|
#[tokio::test]
|
|
|
|
async fn test_fetch_with_types_header() {
|
2020-08-10 21:31:05 +00:00
|
|
|
let _http_server_guard = test_util::http_server();
|
2020-01-26 18:59:41 +00:00
|
|
|
let (_temp_dir, fetcher) = test_setup();
|
|
|
|
let module_url =
|
|
|
|
Url::parse("http://127.0.0.1:4545/xTypeScriptTypes.js").unwrap();
|
2020-02-03 13:53:50 +00:00
|
|
|
let source = fetcher
|
2020-05-11 11:13:27 +00:00
|
|
|
.fetch_remote_source(
|
|
|
|
&module_url,
|
|
|
|
false,
|
|
|
|
false,
|
|
|
|
1,
|
|
|
|
&Permissions::allow_all(),
|
|
|
|
)
|
2020-02-03 13:53:50 +00:00
|
|
|
.await;
|
|
|
|
assert!(source.is_ok());
|
|
|
|
let source = source.unwrap();
|
2020-08-03 21:39:48 +00:00
|
|
|
assert_eq!(source.source_code.bytes, b"export const foo = 'foo';");
|
2020-02-03 13:53:50 +00:00
|
|
|
assert_eq!(&(source.media_type), &msg::MediaType::JavaScript);
|
|
|
|
assert_eq!(
|
2020-06-19 10:27:15 +00:00
|
|
|
source.types_header,
|
|
|
|
Some("./xTypeScriptTypes.d.ts".to_string())
|
2020-02-03 13:53:50 +00:00
|
|
|
);
|
2020-01-26 18:59:41 +00:00
|
|
|
}
|
2020-08-03 21:39:48 +00:00
|
|
|
|
|
|
|
#[tokio::test]
|
|
|
|
async fn test_fetch_source_file_from_net_utf16_le() {
|
|
|
|
let content =
|
|
|
|
std::str::from_utf8(b"\xEF\xBB\xBFconsole.log(\"Hello World\");\x0A")
|
|
|
|
.unwrap();
|
|
|
|
test_fetch_non_utf8_source_file_from_net(
|
|
|
|
"utf-16le",
|
|
|
|
"utf-16le.ts",
|
|
|
|
content,
|
|
|
|
)
|
|
|
|
.await;
|
|
|
|
}
|
|
|
|
|
|
|
|
#[tokio::test]
|
|
|
|
async fn test_fetch_source_file_from_net_utf16_be() {
|
|
|
|
let content =
|
|
|
|
std::str::from_utf8(b"\xEF\xBB\xBFconsole.log(\"Hello World\");\x0A")
|
|
|
|
.unwrap();
|
|
|
|
test_fetch_non_utf8_source_file_from_net(
|
|
|
|
"utf-16be",
|
|
|
|
"utf-16be.ts",
|
|
|
|
content,
|
|
|
|
)
|
|
|
|
.await;
|
|
|
|
}
|
|
|
|
|
|
|
|
#[tokio::test]
|
|
|
|
async fn test_fetch_source_file_from_net_windows_1255() {
|
|
|
|
let content = "console.log(\"\u{5E9}\u{5DC}\u{5D5}\u{5DD} \
|
|
|
|
\u{5E2}\u{5D5}\u{5DC}\u{5DD}\");\u{A}";
|
|
|
|
test_fetch_non_utf8_source_file_from_net(
|
|
|
|
"windows-1255",
|
|
|
|
"windows-1255",
|
|
|
|
content,
|
|
|
|
)
|
|
|
|
.await;
|
|
|
|
}
|
|
|
|
|
|
|
|
async fn test_fetch_non_utf8_source_file_from_net(
|
|
|
|
charset: &str,
|
|
|
|
file_name: &str,
|
|
|
|
expected_content: &str,
|
|
|
|
) {
|
2020-08-10 21:31:05 +00:00
|
|
|
let _http_server_guard = test_util::http_server();
|
2020-08-03 21:39:48 +00:00
|
|
|
let (_temp_dir, fetcher) = test_setup();
|
|
|
|
let module_url = Url::parse(&format!(
|
|
|
|
"http://127.0.0.1:4545/cli/tests/encoding/{}",
|
|
|
|
file_name
|
|
|
|
))
|
|
|
|
.unwrap();
|
|
|
|
|
|
|
|
let source = fetcher
|
|
|
|
.fetch_remote_source(
|
|
|
|
&module_url,
|
|
|
|
false,
|
|
|
|
false,
|
|
|
|
1,
|
|
|
|
&Permissions::allow_all(),
|
|
|
|
)
|
|
|
|
.await;
|
|
|
|
assert!(source.is_ok());
|
|
|
|
let source = source.unwrap();
|
|
|
|
assert_eq!(&source.source_code.charset.to_lowercase()[..], charset);
|
|
|
|
let text = &source.source_code.to_str().unwrap();
|
|
|
|
assert_eq!(text, expected_content);
|
|
|
|
assert_eq!(&(source.media_type), &msg::MediaType::TypeScript);
|
|
|
|
|
|
|
|
let (_, headers) = fetcher.http_cache.get(&module_url).unwrap();
|
|
|
|
assert_eq!(
|
|
|
|
headers.get("content-type").unwrap(),
|
|
|
|
&format!("application/typescript;charset={}", charset)
|
|
|
|
);
|
|
|
|
}
|
2019-07-31 11:58:41 +00:00
|
|
|
}
|