diff options
Diffstat (limited to 'cli/tools/run.rs')
-rw-r--r-- | cli/tools/run.rs | 169 |
1 files changed, 169 insertions, 0 deletions
diff --git a/cli/tools/run.rs b/cli/tools/run.rs new file mode 100644 index 000000000..d714c55d3 --- /dev/null +++ b/cli/tools/run.rs @@ -0,0 +1,169 @@ +// Copyright 2018-2022 the Deno authors. All rights reserved. MIT license. + +use std::io::Read; +use std::path::PathBuf; +use std::sync::Arc; + +use deno_ast::MediaType; +use deno_ast::ModuleSpecifier; +use deno_core::error::AnyError; +use deno_core::resolve_url_or_path; +use deno_runtime::permissions::Permissions; + +use crate::args::EvalFlags; +use crate::args::Flags; +use crate::args::RunFlags; +use crate::file_fetcher::File; +use crate::npm::NpmPackageReference; +use crate::proc_state::ProcState; +use crate::util; +use crate::worker::create_main_worker; + +pub async fn run_script( + flags: Flags, + run_flags: RunFlags, +) -> Result<i32, AnyError> { + if !flags.has_permission() && flags.has_permission_in_argv() { + log::warn!( + "{}", + crate::colors::yellow( + r#"Permission flags have likely been incorrectly set after the script argument. +To grant permissions, set them before the script argument. For example: + deno run --allow-read=. main.js"# + ) + ); + } + + if flags.watch.is_some() { + return run_with_watch(flags, run_flags.script).await; + } + + // TODO(bartlomieju): actually I think it will also fail if there's an import + // map specified and bare specifier is used on the command line - this should + // probably call `ProcState::resolve` instead + let ps = ProcState::build(flags).await?; + + // Run a background task that checks for available upgrades. If an earlier + // run of this background task found a new version of Deno. + super::upgrade::check_for_upgrades(ps.dir.upgrade_check_file_path()); + + let main_module = if NpmPackageReference::from_str(&run_flags.script).is_ok() + { + ModuleSpecifier::parse(&run_flags.script)? + } else { + resolve_url_or_path(&run_flags.script)? + }; + let permissions = + Permissions::from_options(&ps.options.permissions_options())?; + let mut worker = + create_main_worker(&ps, main_module.clone(), permissions).await?; + + let exit_code = worker.run().await?; + Ok(exit_code) +} + +pub async fn run_from_stdin(flags: Flags) -> Result<i32, AnyError> { + let ps = ProcState::build(flags).await?; + let main_module = resolve_url_or_path("./$deno$stdin.ts").unwrap(); + let mut worker = create_main_worker( + &ps.clone(), + main_module.clone(), + Permissions::from_options(&ps.options.permissions_options())?, + ) + .await?; + + let mut source = Vec::new(); + std::io::stdin().read_to_end(&mut source)?; + // Create a dummy source file. + let source_file = File { + local: main_module.clone().to_file_path().unwrap(), + maybe_types: None, + media_type: MediaType::TypeScript, + source: String::from_utf8(source)?.into(), + specifier: main_module.clone(), + maybe_headers: None, + }; + // Save our fake file into file fetcher cache + // to allow module access by TS compiler + ps.file_fetcher.insert_cached(source_file); + + let exit_code = worker.run().await?; + Ok(exit_code) +} + +// TODO(bartlomieju): this function is not handling `exit_code` set by the runtime +// code properly. +async fn run_with_watch(flags: Flags, script: String) -> Result<i32, AnyError> { + let flags = Arc::new(flags); + let main_module = resolve_url_or_path(&script)?; + let (sender, receiver) = tokio::sync::mpsc::unbounded_channel(); + + let operation = |(sender, main_module): ( + tokio::sync::mpsc::UnboundedSender<Vec<PathBuf>>, + ModuleSpecifier, + )| { + let flags = flags.clone(); + Ok(async move { + let ps = + ProcState::build_for_file_watcher((*flags).clone(), sender.clone()) + .await?; + let permissions = + Permissions::from_options(&ps.options.permissions_options())?; + let worker = + create_main_worker(&ps, main_module.clone(), permissions).await?; + worker.run_for_watcher().await?; + + Ok(()) + }) + }; + + util::file_watcher::watch_func2( + receiver, + operation, + (sender, main_module), + util::file_watcher::PrintConfig { + job_name: "Process".to_string(), + clear_screen: !flags.no_clear_screen, + }, + ) + .await?; + + Ok(0) +} + +pub async fn eval_command( + flags: Flags, + eval_flags: EvalFlags, +) -> Result<i32, AnyError> { + // deno_graph works off of extensions for local files to determine the media + // type, and so our "fake" specifier needs to have the proper extension. + let main_module = + resolve_url_or_path(&format!("./$deno$eval.{}", eval_flags.ext))?; + let ps = ProcState::build(flags).await?; + let permissions = + Permissions::from_options(&ps.options.permissions_options())?; + let mut worker = + create_main_worker(&ps, main_module.clone(), permissions).await?; + // Create a dummy source file. + let source_code = if eval_flags.print { + format!("console.log({})", eval_flags.code) + } else { + eval_flags.code + } + .into_bytes(); + + let file = File { + local: main_module.clone().to_file_path().unwrap(), + maybe_types: None, + media_type: MediaType::Unknown, + source: String::from_utf8(source_code)?.into(), + specifier: main_module.clone(), + maybe_headers: None, + }; + + // Save our fake file into file fetcher cache + // to allow module access by TS compiler. + ps.file_fetcher.insert_cached(file); + let exit_code = worker.run().await?; + Ok(exit_code) +} |