From 0e0a5c24ea8b17d410c30bf3fcb70c749b35f8b3 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Bartek=20Iwa=C5=84czuk?= Date: Wed, 4 Sep 2024 13:21:02 +0100 Subject: test: run js_unit_tests with `--unstable-*` flags (#25394) --- tests/integration/js_unit_tests.rs | 32 +++++++++++++++++++++++++------- 1 file changed, 25 insertions(+), 7 deletions(-) (limited to 'tests/integration/js_unit_tests.rs') diff --git a/tests/integration/js_unit_tests.rs b/tests/integration/js_unit_tests.rs index 0baa114b4..b6a204157 100644 --- a/tests/integration/js_unit_tests.rs +++ b/tests/integration/js_unit_tests.rs @@ -116,22 +116,40 @@ util::unit_test_factory!( fn js_unit_test(test: String) { let _g = util::http_server(); - let deno = util::deno_cmd() + let mut deno = util::deno_cmd() .current_dir(util::root_path()) .arg("test") .arg("--config") .arg(util::deno_config_path()) .arg("--no-lock") - .arg("--unstable") + // TODO(bartlomieju): would be better if we could apply this unstable + // flag to particular files, but there's many of them that rely on unstable + // net APIs (`reusePort` in `listen` and `listenTls`; `listenDatagram`, `createHttpClient`) + .arg("--unstable-net") + .arg("--unstable-http") .arg("--location=http://127.0.0.1:4545/") .arg("--no-prompt"); + if test == "broadcast_channel_test" { + deno = deno.arg("--unstable-broadcast-channel"); + } + + if test == "cron_test" { + deno = deno.arg("--unstable-cron"); + } + + if test.contains("kv_") { + deno = deno.arg("--unstable-kv"); + } + + if test == "worker_permissions_test" || test == "worker_test" { + deno = deno.arg("--unstable-worker-options"); + } + // TODO(mmastrac): it would be better to just load a test CA for all tests - let deno = if test == "websocket_test" || test == "tls_sni_test" { - deno.arg("--unsafely-ignore-certificate-errors") - } else { - deno - }; + if test == "websocket_test" || test == "tls_sni_test" { + deno = deno.arg("--unsafely-ignore-certificate-errors"); + } let mut deno = deno .arg("-A") -- cgit v1.2.3