summaryrefslogtreecommitdiff
path: root/runtime/inspector_server.rs
diff options
context:
space:
mode:
authorBartek IwaƄczuk <biwanczuk@gmail.com>2021-05-26 21:07:12 +0200
committerGitHub <noreply@github.com>2021-05-26 21:07:12 +0200
commite5beb800c94099852964d482a32a13f5c29ec147 (patch)
tree1ad89cc15efa84efe690e05b18d5827e1983dbca /runtime/inspector_server.rs
parente9edd7e14d9d78f03c5f2e67fcc44e4dbaab8f2c (diff)
refactor: move JsRuntimeInspector to deno_core (#10763)
This commit moves implementation of "JsRuntimeInspector" to "deno_core" crate. To achieve that following changes were made: * "Worker" and "WebWorker" no longer own instance of "JsRuntimeInspector", instead it is now owned by "deno_core::JsRuntime". * Consequently polling of inspector is no longer done in "Worker"/"WebWorker", instead it's done in "deno_core::JsRuntime::poll_event_loop". * "deno_core::JsRuntime::poll_event_loop" and "deno_core::JsRuntime::run_event_loop", now accept "wait_for_inspector" boolean that tells if event loop should still be "pending" if there are active inspector sessions - this change fixes the problem that inspector disconnects from the frontend and process exits once the code has stopped executing.
Diffstat (limited to 'runtime/inspector_server.rs')
-rw-r--r--runtime/inspector_server.rs388
1 files changed, 388 insertions, 0 deletions
diff --git a/runtime/inspector_server.rs b/runtime/inspector_server.rs
new file mode 100644
index 000000000..a205455fa
--- /dev/null
+++ b/runtime/inspector_server.rs
@@ -0,0 +1,388 @@
+// Copyright 2018-2021 the Deno authors. All rights reserved. MIT license.
+
+use core::convert::Infallible as Never; // Alias for the future `!` type.
+use deno_core::error::AnyError;
+use deno_core::futures::channel::mpsc;
+use deno_core::futures::channel::mpsc::UnboundedReceiver;
+use deno_core::futures::channel::mpsc::UnboundedSender;
+use deno_core::futures::channel::oneshot;
+use deno_core::futures::future;
+use deno_core::futures::future::Future;
+use deno_core::futures::pin_mut;
+use deno_core::futures::prelude::*;
+use deno_core::futures::select;
+use deno_core::futures::stream::StreamExt;
+use deno_core::futures::task::Poll;
+use deno_core::serde_json;
+use deno_core::serde_json::json;
+use deno_core::serde_json::Value;
+use deno_core::InspectorSessionProxy;
+use deno_websocket::tokio_tungstenite::tungstenite;
+use std::cell::RefCell;
+use std::collections::HashMap;
+use std::convert::Infallible;
+use std::net::SocketAddr;
+use std::process;
+use std::rc::Rc;
+use std::thread;
+use uuid::Uuid;
+
+/// Websocket server that is used to proxy connections from
+/// devtools to the inspector.
+pub struct InspectorServer {
+ pub host: SocketAddr,
+ register_inspector_tx: UnboundedSender<InspectorInfo>,
+ shutdown_server_tx: Option<oneshot::Sender<()>>,
+ thread_handle: Option<thread::JoinHandle<()>>,
+}
+
+impl InspectorServer {
+ pub fn new(host: SocketAddr, name: String) -> Self {
+ let (register_inspector_tx, register_inspector_rx) =
+ mpsc::unbounded::<InspectorInfo>();
+
+ let (shutdown_server_tx, shutdown_server_rx) = oneshot::channel();
+
+ let thread_handle = thread::spawn(move || {
+ let rt = crate::tokio_util::create_basic_runtime();
+ let local = tokio::task::LocalSet::new();
+ local.block_on(
+ &rt,
+ server(host, register_inspector_rx, shutdown_server_rx, name),
+ )
+ });
+
+ Self {
+ host,
+ register_inspector_tx,
+ shutdown_server_tx: Some(shutdown_server_tx),
+ thread_handle: Some(thread_handle),
+ }
+ }
+
+ pub fn register_inspector(
+ &self,
+ session_sender: UnboundedSender<InspectorSessionProxy>,
+ deregister_rx: oneshot::Receiver<()>,
+ ) {
+ let info = InspectorInfo::new(self.host, session_sender, deregister_rx);
+ self.register_inspector_tx.unbounded_send(info).unwrap();
+ }
+}
+
+impl Drop for InspectorServer {
+ fn drop(&mut self) {
+ if let Some(shutdown_server_tx) = self.shutdown_server_tx.take() {
+ shutdown_server_tx
+ .send(())
+ .expect("unable to send shutdown signal");
+ }
+
+ if let Some(thread_handle) = self.thread_handle.take() {
+ thread_handle.join().expect("unable to join thread");
+ }
+ }
+}
+
+// Needed so hyper can use non Send futures
+#[derive(Clone)]
+struct LocalExecutor;
+
+impl<Fut> hyper::rt::Executor<Fut> for LocalExecutor
+where
+ Fut: Future + 'static,
+ Fut::Output: 'static,
+{
+ fn execute(&self, fut: Fut) {
+ tokio::task::spawn_local(fut);
+ }
+}
+
+fn handle_ws_request(
+ req: http::Request<hyper::Body>,
+ inspector_map: Rc<RefCell<HashMap<Uuid, InspectorInfo>>>,
+) -> http::Result<http::Response<hyper::Body>> {
+ let (parts, body) = req.into_parts();
+ let req = http::Request::from_parts(parts, ());
+
+ if let Some(new_session_tx) = req
+ .uri()
+ .path()
+ .strip_prefix("/ws/")
+ .and_then(|s| Uuid::parse_str(s).ok())
+ .and_then(|uuid| {
+ inspector_map
+ .borrow()
+ .get(&uuid)
+ .map(|info| info.new_session_tx.clone())
+ })
+ {
+ let resp = tungstenite::handshake::server::create_response(&req)
+ .map(|resp| resp.map(|_| hyper::Body::empty()))
+ .or_else(|e| match e {
+ tungstenite::error::Error::HttpFormat(http_error) => Err(http_error),
+ _ => http::Response::builder()
+ .status(http::StatusCode::BAD_REQUEST)
+ .body("Not a valid Websocket Request".into()),
+ });
+
+ let (parts, _) = req.into_parts();
+ let req = http::Request::from_parts(parts, body);
+
+ if resp.is_ok() {
+ tokio::task::spawn_local(async move {
+ let upgraded = hyper::upgrade::on(req).await.unwrap();
+ let websocket =
+ deno_websocket::tokio_tungstenite::WebSocketStream::from_raw_socket(
+ upgraded,
+ tungstenite::protocol::Role::Server,
+ None,
+ )
+ .await;
+ let (proxy, pump) = create_websocket_proxy(websocket);
+ eprintln!("Debugger session started.");
+ let _ = new_session_tx.unbounded_send(proxy);
+ pump.await;
+ });
+ }
+ resp
+ } else {
+ http::Response::builder()
+ .status(http::StatusCode::NOT_FOUND)
+ .body("No Valid inspector".into())
+ }
+}
+
+fn handle_json_request(
+ inspector_map: Rc<RefCell<HashMap<Uuid, InspectorInfo>>>,
+) -> http::Result<http::Response<hyper::Body>> {
+ let data = inspector_map
+ .borrow()
+ .values()
+ .map(|info| info.get_json_metadata())
+ .collect::<Vec<_>>();
+ http::Response::builder()
+ .status(http::StatusCode::OK)
+ .header(http::header::CONTENT_TYPE, "application/json")
+ .body(serde_json::to_string(&data).unwrap().into())
+}
+
+fn handle_json_version_request(
+ version_response: Value,
+) -> http::Result<http::Response<hyper::Body>> {
+ http::Response::builder()
+ .status(http::StatusCode::OK)
+ .header(http::header::CONTENT_TYPE, "application/json")
+ .body(serde_json::to_string(&version_response).unwrap().into())
+}
+
+async fn server(
+ host: SocketAddr,
+ register_inspector_rx: UnboundedReceiver<InspectorInfo>,
+ shutdown_server_rx: oneshot::Receiver<()>,
+ name: String,
+) {
+ let inspector_map_ =
+ Rc::new(RefCell::new(HashMap::<Uuid, InspectorInfo>::new()));
+
+ let inspector_map = Rc::clone(&inspector_map_);
+ let register_inspector_handler = register_inspector_rx
+ .map(|info| {
+ eprintln!(
+ "Debugger listening on {}",
+ info.get_websocket_debugger_url()
+ );
+ if inspector_map.borrow_mut().insert(info.uuid, info).is_some() {
+ panic!("Inspector UUID already in map");
+ }
+ })
+ .collect::<()>();
+
+ let inspector_map = Rc::clone(&inspector_map_);
+ let deregister_inspector_handler = future::poll_fn(|cx| {
+ inspector_map
+ .borrow_mut()
+ .retain(|_, info| info.deregister_rx.poll_unpin(cx) == Poll::Pending);
+ Poll::<Never>::Pending
+ })
+ .fuse();
+
+ let json_version_response = json!({
+ "Browser": name,
+ "Protocol-Version": "1.3",
+ "V8-Version": deno_core::v8_version(),
+ });
+
+ let make_svc = hyper::service::make_service_fn(|_| {
+ let inspector_map = Rc::clone(&inspector_map_);
+ let json_version_response = json_version_response.clone();
+
+ future::ok::<_, Infallible>(hyper::service::service_fn(
+ move |req: http::Request<hyper::Body>| {
+ future::ready({
+ match (req.method(), req.uri().path()) {
+ (&http::Method::GET, path) if path.starts_with("/ws/") => {
+ handle_ws_request(req, inspector_map.clone())
+ }
+ (&http::Method::GET, "/json/version") => {
+ handle_json_version_request(json_version_response.clone())
+ }
+ (&http::Method::GET, "/json") => {
+ handle_json_request(inspector_map.clone())
+ }
+ (&http::Method::GET, "/json/list") => {
+ handle_json_request(inspector_map.clone())
+ }
+ _ => http::Response::builder()
+ .status(http::StatusCode::NOT_FOUND)
+ .body("Not Found".into()),
+ }
+ })
+ },
+ ))
+ });
+
+ // Create the server manually so it can use the Local Executor
+ let server_handler = hyper::server::Builder::new(
+ hyper::server::conn::AddrIncoming::bind(&host).unwrap_or_else(|e| {
+ eprintln!("Cannot start inspector server: {}.", e);
+ process::exit(1);
+ }),
+ hyper::server::conn::Http::new().with_executor(LocalExecutor),
+ )
+ .serve(make_svc)
+ .with_graceful_shutdown(async {
+ shutdown_server_rx.await.ok();
+ })
+ .unwrap_or_else(|err| {
+ eprintln!("Cannot start inspector server: {}.", err);
+ process::exit(1);
+ })
+ .fuse();
+
+ pin_mut!(register_inspector_handler);
+ pin_mut!(deregister_inspector_handler);
+ pin_mut!(server_handler);
+
+ select! {
+ _ = register_inspector_handler => {},
+ _ = deregister_inspector_handler => unreachable!(),
+ _ = server_handler => {},
+ }
+}
+
+/// Creates a future that proxies messages sent and received on a warp WebSocket
+/// to a UnboundedSender/UnboundedReceiver pair. We need this to sidestep
+/// Tokio's task budget, which causes issues when JsRuntimeInspector::poll_sessions()
+/// needs to block the thread because JavaScript execution is paused.
+///
+/// This works because UnboundedSender/UnboundedReceiver are implemented in the
+/// 'futures' crate, therefore they can't participate in Tokio's cooperative
+/// task yielding.
+///
+/// A tuple is returned, where the first element is a duplex channel that can
+/// be used to send/receive messages on the websocket, and the second element
+/// is a future that does the forwarding.
+fn create_websocket_proxy(
+ websocket: deno_websocket::tokio_tungstenite::WebSocketStream<
+ hyper::upgrade::Upgraded,
+ >,
+) -> (InspectorSessionProxy, impl Future<Output = ()> + Send) {
+ // The 'outbound' channel carries messages sent to the websocket.
+ let (outbound_tx, outbound_rx) = mpsc::unbounded();
+
+ // The 'inbound' channel carries messages received from the websocket.
+ let (inbound_tx, inbound_rx) = mpsc::unbounded();
+
+ let proxy = InspectorSessionProxy {
+ tx: outbound_tx,
+ rx: inbound_rx,
+ };
+
+ // The pump future takes care of forwarding messages between the websocket
+ // and channels. It resolves to () when either side disconnects, ignoring any
+ // errors.
+ let pump = async move {
+ let (websocket_tx, websocket_rx) = websocket.split();
+
+ let outbound_pump = outbound_rx
+ .map(|(_maybe_call_id, msg)| tungstenite::Message::text(msg))
+ .map(Ok)
+ .forward(websocket_tx)
+ .map_err(|_| ());
+
+ let inbound_pump = websocket_rx
+ .map(|result| {
+ let result = result.map(|msg| msg.into_data()).map_err(AnyError::from);
+ inbound_tx.unbounded_send(result)
+ })
+ .map_err(|_| ())
+ .try_collect::<()>();
+
+ let _ = future::try_join(outbound_pump, inbound_pump).await;
+ };
+
+ (proxy, pump)
+}
+
+/// Inspector information that is sent from the isolate thread to the server
+/// thread when a new inspector is created.
+pub struct InspectorInfo {
+ pub host: SocketAddr,
+ pub uuid: Uuid,
+ pub thread_name: Option<String>,
+ pub new_session_tx: UnboundedSender<InspectorSessionProxy>,
+ pub deregister_rx: oneshot::Receiver<()>,
+}
+
+impl InspectorInfo {
+ pub fn new(
+ host: SocketAddr,
+ new_session_tx: mpsc::UnboundedSender<InspectorSessionProxy>,
+ deregister_rx: oneshot::Receiver<()>,
+ ) -> Self {
+ Self {
+ host,
+ uuid: Uuid::new_v4(),
+ thread_name: thread::current().name().map(|n| n.to_owned()),
+ new_session_tx,
+ deregister_rx,
+ }
+ }
+
+ fn get_json_metadata(&self) -> Value {
+ json!({
+ "description": "deno",
+ "devtoolsFrontendUrl": self.get_frontend_url(),
+ "faviconUrl": "https://deno.land/favicon.ico",
+ "id": self.uuid.to_string(),
+ "title": self.get_title(),
+ "type": "node",
+ // TODO(ry): "url": "file://",
+ "webSocketDebuggerUrl": self.get_websocket_debugger_url(),
+ })
+ }
+
+ pub fn get_websocket_debugger_url(&self) -> String {
+ format!("ws://{}/ws/{}", &self.host, &self.uuid)
+ }
+
+ fn get_frontend_url(&self) -> String {
+ format!(
+ "devtools://devtools/bundled/js_app.html?ws={}/ws/{}&experiments=true&v8only=true",
+ &self.host, &self.uuid
+ )
+ }
+
+ fn get_title(&self) -> String {
+ format!(
+ "[{}] deno{}",
+ process::id(),
+ self
+ .thread_name
+ .as_ref()
+ .map(|n| format!(" - {}", n))
+ .unwrap_or_default()
+ )
+ }
+}