save headers for all intermediate redirects (#2677)

This commit is contained in:
Bartek Iwańczuk 2019-07-23 00:52:40 +02:00 committed by Ryan Dahl
parent 9c22961b6a
commit 70de8dd51d
4 changed files with 233 additions and 225 deletions

View file

@ -447,7 +447,6 @@ impl TsCompiler {
let compiled_module = SourceFile { let compiled_module = SourceFile {
url: source_file.url.clone(), url: source_file.url.clone(),
redirect_source_url: None,
filename: compiled_code_filename, filename: compiled_code_filename,
media_type: msg::MediaType::JavaScript, media_type: msg::MediaType::JavaScript,
source_code: compiled_code, source_code: compiled_code,
@ -515,7 +514,6 @@ impl TsCompiler {
let source_map_file = SourceFile { let source_map_file = SourceFile {
url: module_specifier.as_url().to_owned(), url: module_specifier.as_url().to_owned(),
redirect_source_url: None,
filename: source_map_filename, filename: source_map_filename,
media_type: msg::MediaType::JavaScript, media_type: msg::MediaType::JavaScript,
source_code, source_code,
@ -634,7 +632,6 @@ mod tests {
let mut out = SourceFile { let mut out = SourceFile {
url: specifier.as_url().clone(), url: specifier.as_url().clone(),
redirect_source_url: None,
filename: PathBuf::from("/tests/002_hello.ts"), filename: PathBuf::from("/tests/002_hello.ts"),
media_type: msg::MediaType::TypeScript, media_type: msg::MediaType::TypeScript,
source_code: include_bytes!("../tests/002_hello.ts").to_vec(), source_code: include_bytes!("../tests/002_hello.ts").to_vec(),

View file

@ -1,4 +1,5 @@
// Copyright 2018-2019 the Deno authors. All rights reserved. MIT license. // Copyright 2018-2019 the Deno authors. All rights reserved. MIT license.
use crate::deno_error::too_many_redirects;
use crate::deno_error::DenoError; use crate::deno_error::DenoError;
use crate::deno_error::ErrorKind; use crate::deno_error::ErrorKind;
use crate::deno_error::GetErrorKind; use crate::deno_error::GetErrorKind;
@ -10,7 +11,7 @@ use crate::tokio_util;
use deno::ErrBox; use deno::ErrBox;
use deno::ModuleSpecifier; use deno::ModuleSpecifier;
use dirs; use dirs;
use futures::future::{loop_fn, Either, Loop}; use futures::future::Either;
use futures::Future; use futures::Future;
use http; use http;
use serde_json; use serde_json;
@ -34,7 +35,6 @@ use url::Url;
#[derive(Debug, Clone)] #[derive(Debug, Clone)]
pub struct SourceFile { pub struct SourceFile {
pub url: Url, pub url: Url,
pub redirect_source_url: Option<Url>,
pub filename: PathBuf, pub filename: PathBuf,
pub media_type: msg::MediaType, pub media_type: msg::MediaType,
pub source_code: Vec<u8>, pub source_code: Vec<u8>,
@ -275,51 +275,13 @@ impl DenoDir {
} }
} }
// We're dealing with remote file, first try local cache
if use_disk_cache {
match self.fetch_cached_remote_source(&module_url, None) {
Ok(Some(source_file)) => {
return Either::A(futures::future::ok(source_file));
}
Ok(None) => {
// there's no cached version
}
Err(err) => {
return Either::A(futures::future::err(err));
}
}
}
// If remote file wasn't found check if we can fetch it
if no_remote_fetch {
// We can't fetch remote file - bail out
return Either::A(futures::future::err(
std::io::Error::new(
std::io::ErrorKind::NotFound,
format!(
"cannot find remote file '{}' in cache",
module_url.to_string()
),
).into(),
));
}
// Fetch remote file and cache on-disk for subsequent access // Fetch remote file and cache on-disk for subsequent access
// not cached/local, try remote. Either::B(self.fetch_remote_source_async(
let module_url_ = module_url.clone(); &module_url,
Either::B(self use_disk_cache,
.fetch_remote_source_async(&module_url) no_remote_fetch,
// TODO: cache fetched remote source here - `fetch_remote_source` should only fetch with 10,
// redirects, nothing more ))
.and_then(move |maybe_remote_source| match maybe_remote_source {
Some(output) => Ok(output),
None => Err(
std::io::Error::new(
std::io::ErrorKind::NotFound,
format!("cannot find remote file '{}'", module_url_.to_string()),
).into(),
),
}))
} }
/// Fetch local source file. /// Fetch local source file.
@ -337,7 +299,6 @@ impl DenoDir {
let media_type = map_content_type(&filepath, None); let media_type = map_content_type(&filepath, None);
Ok(SourceFile { Ok(SourceFile {
url: module_url.clone(), url: module_url.clone(),
redirect_source_url: None,
filename: filepath, filename: filepath,
media_type, media_type,
source_code, source_code,
@ -359,7 +320,6 @@ impl DenoDir {
fn fetch_cached_remote_source( fn fetch_cached_remote_source(
self: &Self, self: &Self,
module_url: &Url, module_url: &Url,
maybe_initial_module_url: Option<Url>,
) -> Result<Option<SourceFile>, ErrBox> { ) -> Result<Option<SourceFile>, ErrBox> {
let source_code_headers = self.get_source_code_headers(&module_url); let source_code_headers = self.get_source_code_headers(&module_url);
// If source code headers says that it would redirect elsewhere, // If source code headers says that it would redirect elsewhere,
@ -374,16 +334,10 @@ impl DenoDir {
// real_module_name = https://import-meta.now.sh/sub/final1.js // real_module_name = https://import-meta.now.sh/sub/final1.js
let redirect_url = Url::parse(&redirect_to).expect("Should be valid URL"); let redirect_url = Url::parse(&redirect_to).expect("Should be valid URL");
let mut maybe_initial_module_url = maybe_initial_module_url;
// If this is the first redirect attempt,
// then maybe_initial_module_url should be None.
// In that case, use current module name as maybe_initial_module_url.
if maybe_initial_module_url.is_none() {
maybe_initial_module_url = Some(module_url.clone());
}
// Recurse. // Recurse.
return self // TODO(bartlomieju): I'm pretty sure we should call `fetch_remote_source_async` here.
.fetch_cached_remote_source(&redirect_url, maybe_initial_module_url); // Should we expect that all redirects are cached?
return self.fetch_cached_remote_source(&redirect_url);
} }
// No redirect needed or end of redirects. // No redirect needed or end of redirects.
@ -408,7 +362,6 @@ impl DenoDir {
); );
Ok(Some(SourceFile { Ok(Some(SourceFile {
url: module_url.clone(), url: module_url.clone(),
redirect_source_url: maybe_initial_module_url,
filename: filepath, filename: filepath,
media_type, media_type,
source_code, source_code,
@ -419,99 +372,114 @@ impl DenoDir {
fn fetch_remote_source_async( fn fetch_remote_source_async(
self: &Self, self: &Self,
module_url: &Url, module_url: &Url,
) -> impl Future<Item = Option<SourceFile>, Error = ErrBox> { use_disk_cache: bool,
no_remote_fetch: bool,
redirect_limit: i64,
) -> Box<SourceFileFuture> {
use crate::http_util::FetchOnceResult; use crate::http_util::FetchOnceResult;
if redirect_limit < 0 {
return Box::new(futures::future::err(too_many_redirects()));
}
// First try local cache
if use_disk_cache {
match self.fetch_cached_remote_source(&module_url) {
Ok(Some(source_file)) => {
return Box::new(futures::future::ok(source_file));
}
Ok(None) => {
// there's no cached version
}
Err(err) => {
return Box::new(futures::future::err(err));
}
}
}
// If file wasn't found in cache check if we can fetch it
if no_remote_fetch {
// We can't fetch remote file - bail out
return Box::new(futures::future::err(
std::io::Error::new(
std::io::ErrorKind::NotFound,
format!(
"cannot find remote file '{}' in cache",
module_url.to_string()
),
).into(),
));
}
let download_job = self.progress.add("Download", &module_url.to_string()); let download_job = self.progress.add("Download", &module_url.to_string());
// We write a special ".headers.json" file into the `.deno/deps` directory along side the let module_uri = url_into_uri(&module_url);
// cached file, containing just the media type and possible redirect target (both are http headers).
// If redirect target is present, the file itself if not cached.
// In future resolutions, we would instead follow this redirect target ("redirect_to").
loop_fn(
(
self.clone(),
None,
module_url.clone(),
),
|(
dir,
mut maybe_initial_module_url,
module_url,
)| {
let module_uri = url_into_uri(&module_url);
// Single pass fetch, either yields code or yields redirect.
http_util::fetch_string_once(module_uri).and_then(
move |fetch_once_result| {
match fetch_once_result {
FetchOnceResult::Redirect(uri) => {
// If redirects, update module_name and filename for next looped call.
let new_module_url = Url::parse(&uri.to_string()).expect("http::uri::Uri should be parseable as Url");
if maybe_initial_module_url.is_none() { let dir = self.clone();
maybe_initial_module_url = Some(module_url); let module_url = module_url.clone();
}
// Not yet completed. Follow the redirect and loop. // Single pass fetch, either yields code or yields redirect.
Ok(Loop::Continue(( let f =
dir, http_util::fetch_string_once(module_uri).and_then(move |r| match r {
maybe_initial_module_url, FetchOnceResult::Redirect(uri) => {
new_module_url, // If redirects, update module_name and filename for next looped call.
))) let new_module_url = Url::parse(&uri.to_string())
} .expect("http::uri::Uri should be parseable as Url");
FetchOnceResult::Code(source, maybe_content_type) => {
// TODO: move caching logic outside this function
// We land on the code.
dir.save_source_code_headers(
&module_url,
maybe_content_type.clone(),
None,
).unwrap();
dir
.save_source_code_headers(
&module_url,
None,
Some(new_module_url.to_string()),
).unwrap();
dir.save_source_code( // Explicit drop to keep reference alive until future completes.
&module_url, drop(download_job);
&source
).unwrap();
if let Some(redirect_source_url) = &maybe_initial_module_url { // Recurse
dir.save_source_code_headers( Either::A(dir.fetch_remote_source_async(
redirect_source_url, &new_module_url,
maybe_content_type.clone(), use_disk_cache,
Some(module_url.to_string()) no_remote_fetch,
).unwrap() redirect_limit - 1,
} ))
}
FetchOnceResult::Code(source, maybe_content_type) => {
// We land on the code.
dir
.save_source_code_headers(
&module_url,
maybe_content_type.clone(),
None,
).unwrap();
let filepath = dir dir.save_source_code(&module_url, &source).unwrap();
.deps_cache
.location
.join(dir.deps_cache.get_cache_filename(&module_url));
let media_type = map_content_type( let filepath = dir
&filepath, .deps_cache
maybe_content_type.as_ref().map(String::as_str), .location
); .join(dir.deps_cache.get_cache_filename(&module_url));
let source_file = SourceFile { let media_type = map_content_type(
url: module_url, &filepath,
redirect_source_url: maybe_initial_module_url, maybe_content_type.as_ref().map(String::as_str),
filename: filepath, );
media_type,
source_code: source.as_bytes().to_owned(),
};
Ok(Loop::Break(Some(source_file))) let source_file = SourceFile {
} url: module_url.clone(),
} filename: filepath,
}, media_type,
) source_code: source.as_bytes().to_owned(),
}, };
)
.then(move |r| { // Explicit drop to keep reference alive until future completes.
// Explicit drop to keep reference alive until future completes. drop(download_job);
drop(download_job);
r Either::B(futures::future::ok(source_file))
}) }
});
Box::new(f)
} }
/// Get header metadata associated with a remote file. /// Get header metadata associated with a remote file.
@ -728,9 +696,16 @@ mod tests {
fn fetch_remote_source( fn fetch_remote_source(
self: &Self, self: &Self,
module_url: &Url, module_url: &Url,
_filepath: &Path, use_disk_cache: bool,
) -> Result<Option<SourceFile>, ErrBox> { no_remote_fetch: bool,
tokio_util::block_on(self.fetch_remote_source_async(module_url)) redirect_limit: i64,
) -> Result<SourceFile, ErrBox> {
tokio_util::block_on(self.fetch_remote_source_async(
module_url,
use_disk_cache,
no_remote_fetch,
redirect_limit,
))
} }
/// Synchronous version of get_source_file_async /// Synchronous version of get_source_file_async
@ -1047,10 +1022,6 @@ mod tests {
// Examine the meta result. // Examine the meta result.
assert_eq!(mod_meta.url.clone(), target_module_url); assert_eq!(mod_meta.url.clone(), target_module_url);
assert_eq!(
&mod_meta.redirect_source_url.clone().unwrap(),
&redirect_module_url
);
}); });
} }
@ -1059,64 +1030,127 @@ mod tests {
let (_temp_dir, deno_dir) = test_setup(); let (_temp_dir, deno_dir) = test_setup();
// Test double redirects and headers recording // Test double redirects and headers recording
tokio_util::init(|| { tokio_util::init(|| {
let redirect_module_url = let double_redirect_url =
Url::parse("http://localhost:4548/tests/subdir/redirects/redirect1.js") Url::parse("http://localhost:4548/tests/subdir/redirects/redirect1.js")
.unwrap(); .unwrap();
let redirect_source_filepath = deno_dir let double_redirect_path = deno_dir
.deps_cache .deps_cache
.location .location
.join("http/localhost_PORT4548/tests/subdir/redirects/redirect1.js"); .join("http/localhost_PORT4548/tests/subdir/redirects/redirect1.js");
let redirect_source_filename =
redirect_source_filepath.to_str().unwrap().to_string(); let redirect_url =
let redirect_source_filename_intermediate = deno_dir Url::parse("http://localhost:4546/tests/subdir/redirects/redirect1.js")
.unwrap();
let redirect_path = deno_dir
.deps_cache .deps_cache
.location .location
.join("http/localhost_PORT4546/tests/subdir/redirects/redirect1.js"); .join("http/localhost_PORT4546/tests/subdir/redirects/redirect1.js");
let target_module_url =
let target_url =
Url::parse("http://localhost:4545/tests/subdir/redirects/redirect1.js") Url::parse("http://localhost:4545/tests/subdir/redirects/redirect1.js")
.unwrap(); .unwrap();
let target_module_name = target_module_url.to_string(); let target_path = deno_dir
let redirect_target_filepath = deno_dir
.deps_cache .deps_cache
.location .location
.join("http/localhost_PORT4545/tests/subdir/redirects/redirect1.js"); .join("http/localhost_PORT4545/tests/subdir/redirects/redirect1.js");
let redirect_target_filename =
redirect_target_filepath.to_str().unwrap().to_string();
let mod_meta = deno_dir let mod_meta = deno_dir
.get_source_file(&redirect_module_url, true, false) .get_source_file(&double_redirect_url, true, false)
.unwrap(); .unwrap();
// File that requires redirection is not downloaded. assert!(fs::read_to_string(&double_redirect_path).is_err());
assert!(fs::read_to_string(&redirect_source_filename).is_err()); assert!(fs::read_to_string(&redirect_path).is_err());
// ... but its .headers.json is created.
let redirect_source_headers =
deno_dir.get_source_code_headers(&redirect_module_url);
assert_eq!(
redirect_source_headers.redirect_to.unwrap(),
target_module_name
);
// In the intermediate redirection step, file is also not downloaded. let double_redirect_headers =
assert!( deno_dir.get_source_code_headers(&double_redirect_url);
fs::read_to_string(&redirect_source_filename_intermediate).is_err() assert_eq!(
double_redirect_headers.redirect_to.unwrap(),
redirect_url.to_string()
);
let redirect_headers = deno_dir.get_source_code_headers(&redirect_url);
assert_eq!(
redirect_headers.redirect_to.unwrap(),
target_url.to_string()
); );
// The target of redirection is downloaded instead. // The target of redirection is downloaded instead.
assert_eq!( assert_eq!(
fs::read_to_string(&redirect_target_filename).unwrap(), fs::read_to_string(&target_path).unwrap(),
"export const redirect = 1;\n" "export const redirect = 1;\n"
); );
let redirect_target_headers = let redirect_target_headers =
deno_dir.get_source_code_headers(&target_module_url); deno_dir.get_source_code_headers(&target_url);
assert!(redirect_target_headers.redirect_to.is_none()); assert!(redirect_target_headers.redirect_to.is_none());
// Examine the meta result. // Examine the meta result.
assert_eq!(mod_meta.url.clone(), target_module_url); assert_eq!(mod_meta.url.clone(), target_url);
assert_eq!( });
&mod_meta.redirect_source_url.clone().unwrap(), }
&redirect_module_url
); #[test]
fn test_get_source_code_5() {
let (_temp_dir, deno_dir) = test_setup();
// Test that redirect target is not downloaded twice for different redirect source.
tokio_util::init(|| {
let double_redirect_url =
Url::parse("http://localhost:4548/tests/subdir/redirects/redirect1.js")
.unwrap();
let redirect_url =
Url::parse("http://localhost:4546/tests/subdir/redirects/redirect1.js")
.unwrap();
let target_path = deno_dir
.deps_cache
.location
.join("http/localhost_PORT4545/tests/subdir/redirects/redirect1.js");
deno_dir
.get_source_file(&double_redirect_url, true, false)
.unwrap();
let result = fs::File::open(&target_path);
assert!(result.is_ok());
let file = result.unwrap();
// save modified timestamp for headers file of redirect target
let file_metadata = file.metadata().unwrap();
let file_modified = file_metadata.modified().unwrap();
// When another file is fetched that also point to redirect target, then redirect target
// shouldn't be downloaded again. It can be verified using source header file creation
// timestamp (should be the same as after first `get_source_file`)
deno_dir
.get_source_file(&redirect_url, true, false)
.unwrap();
let result = fs::File::open(&target_path);
assert!(result.is_ok());
let file_2 = result.unwrap();
// save modified timestamp for headers file
let file_metadata_2 = file_2.metadata().unwrap();
let file_modified_2 = file_metadata_2.modified().unwrap();
assert_eq!(file_modified, file_modified_2);
});
}
#[test]
fn test_get_source_code_6() {
let (_temp_dir, deno_dir) = test_setup();
// Test that redirections can be limited
tokio_util::init(|| {
let double_redirect_url =
Url::parse("http://localhost:4548/tests/subdir/redirects/redirect1.js")
.unwrap();
let result =
deno_dir.fetch_remote_source(&double_redirect_url, false, false, 2);
assert!(result.is_ok());
let result =
deno_dir.fetch_remote_source(&double_redirect_url, false, false, 1);
assert!(result.is_err());
let err = result.err().unwrap();
assert_eq!(err.kind(), ErrorKind::TooManyRedirects);
}); });
} }
@ -1157,10 +1191,14 @@ mod tests {
.get_cache_filename_with_extension(&module_url, "headers.json"), .get_cache_filename_with_extension(&module_url, "headers.json"),
); );
let result = let result = tokio_util::block_on(deno_dir.fetch_remote_source_async(
tokio_util::block_on(deno_dir.fetch_remote_source_async(&module_url)); &module_url,
false,
false,
10,
));
assert!(result.is_ok()); assert!(result.is_ok());
let r = result.unwrap().unwrap(); let r = result.unwrap();
assert_eq!(r.source_code, b"export const loaded = true;\n"); assert_eq!(r.source_code, b"export const loaded = true;\n");
assert_eq!(&(r.media_type), &msg::MediaType::TypeScript); assert_eq!(&(r.media_type), &msg::MediaType::TypeScript);
// matching ext, no .headers.json file created // matching ext, no .headers.json file created
@ -1172,7 +1210,7 @@ mod tests {
Some("text/javascript".to_owned()), Some("text/javascript".to_owned()),
None, None,
); );
let result2 = deno_dir.fetch_cached_remote_source(&module_url, None); let result2 = deno_dir.fetch_cached_remote_source(&module_url);
assert!(result2.is_ok()); assert!(result2.is_ok());
let r2 = result2.unwrap().unwrap(); let r2 = result2.unwrap().unwrap();
assert_eq!(r2.source_code, b"export const loaded = true;\n"); assert_eq!(r2.source_code, b"export const loaded = true;\n");
@ -1189,19 +1227,15 @@ mod tests {
let module_url = let module_url =
Url::parse("http://localhost:4545/tests/subdir/mt_video_mp2t.t3.ts") Url::parse("http://localhost:4545/tests/subdir/mt_video_mp2t.t3.ts")
.unwrap(); .unwrap();
let filepath = deno_dir
.deps_cache
.location
.join("http/localhost_PORT4545/tests/subdir/mt_video_mp2t.t3.ts");
let headers_file_name = deno_dir.deps_cache.location.join( let headers_file_name = deno_dir.deps_cache.location.join(
deno_dir deno_dir
.deps_cache .deps_cache
.get_cache_filename_with_extension(&module_url, "headers.json"), .get_cache_filename_with_extension(&module_url, "headers.json"),
); );
let result = deno_dir.fetch_remote_source(&module_url, &filepath); let result = deno_dir.fetch_remote_source(&module_url, false, false, 10);
assert!(result.is_ok()); assert!(result.is_ok());
let r = result.unwrap().unwrap(); let r = result.unwrap();
assert_eq!(r.source_code, "export const loaded = true;\n".as_bytes()); assert_eq!(r.source_code, "export const loaded = true;\n".as_bytes());
assert_eq!(&(r.media_type), &msg::MediaType::TypeScript); assert_eq!(&(r.media_type), &msg::MediaType::TypeScript);
// matching ext, no .headers.json file created // matching ext, no .headers.json file created
@ -1213,7 +1247,7 @@ mod tests {
Some("text/javascript".to_owned()), Some("text/javascript".to_owned()),
None, None,
); );
let result2 = deno_dir.fetch_cached_remote_source(&module_url, None); let result2 = deno_dir.fetch_cached_remote_source(&module_url);
assert!(result2.is_ok()); assert!(result2.is_ok());
let r2 = result2.unwrap().unwrap(); let r2 = result2.unwrap().unwrap();
assert_eq!(r2.source_code, "export const loaded = true;\n".as_bytes()); assert_eq!(r2.source_code, "export const loaded = true;\n".as_bytes());
@ -1229,13 +1263,9 @@ mod tests {
let (_temp_dir, deno_dir) = test_setup(); let (_temp_dir, deno_dir) = test_setup();
let module_url = let module_url =
Url::parse("http://localhost:4545/tests/subdir/no_ext").unwrap(); Url::parse("http://localhost:4545/tests/subdir/no_ext").unwrap();
let filepath = deno_dir let result = deno_dir.fetch_remote_source(&module_url, false, false, 10);
.deps_cache
.location
.join("http/localhost_PORT4545/tests/subdir/no_ext");
let result = deno_dir.fetch_remote_source(&module_url, &filepath);
assert!(result.is_ok()); assert!(result.is_ok());
let r = result.unwrap().unwrap(); let r = result.unwrap();
assert_eq!(r.source_code, "export const loaded = true;\n".as_bytes()); assert_eq!(r.source_code, "export const loaded = true;\n".as_bytes());
assert_eq!(&(r.media_type), &msg::MediaType::TypeScript); assert_eq!(&(r.media_type), &msg::MediaType::TypeScript);
// no ext, should create .headers.json file // no ext, should create .headers.json file
@ -1250,13 +1280,10 @@ mod tests {
let module_url_2 = let module_url_2 =
Url::parse("http://localhost:4545/tests/subdir/mismatch_ext.ts") Url::parse("http://localhost:4545/tests/subdir/mismatch_ext.ts")
.unwrap(); .unwrap();
let filepath_2 = deno_dir let result_2 =
.deps_cache deno_dir.fetch_remote_source(&module_url_2, false, false, 10);
.location
.join("http/localhost_PORT4545/tests/subdir/mismatch_ext.ts");
let result_2 = deno_dir.fetch_remote_source(&module_url_2, &filepath_2);
assert!(result_2.is_ok()); assert!(result_2.is_ok());
let r2 = result_2.unwrap().unwrap(); let r2 = result_2.unwrap();
assert_eq!(r2.source_code, "export const loaded = true;\n".as_bytes()); assert_eq!(r2.source_code, "export const loaded = true;\n".as_bytes());
assert_eq!(&(r2.media_type), &msg::MediaType::JavaScript); assert_eq!(&(r2.media_type), &msg::MediaType::JavaScript);
// mismatch ext, should create .headers.json file // mismatch ext, should create .headers.json file
@ -1272,13 +1299,10 @@ mod tests {
let module_url_3 = let module_url_3 =
Url::parse("http://localhost:4545/tests/subdir/unknown_ext.deno") Url::parse("http://localhost:4545/tests/subdir/unknown_ext.deno")
.unwrap(); .unwrap();
let filepath_3 = deno_dir let result_3 =
.deps_cache deno_dir.fetch_remote_source(&module_url_3, false, false, 10);
.location
.join("http/localhost_PORT4545/tests/subdir/unknown_ext.deno");
let result_3 = deno_dir.fetch_remote_source(&module_url_3, &filepath_3);
assert!(result_3.is_ok()); assert!(result_3.is_ok());
let r3 = result_3.unwrap().unwrap(); let r3 = result_3.unwrap();
assert_eq!(r3.source_code, "export const loaded = true;\n".as_bytes()); assert_eq!(r3.source_code, "export const loaded = true;\n".as_bytes());
assert_eq!(&(r3.media_type), &msg::MediaType::TypeScript); assert_eq!(&(r3.media_type), &msg::MediaType::TypeScript);
// unknown ext, should create .headers.json file // unknown ext, should create .headers.json file
@ -1292,24 +1316,6 @@ mod tests {
}); });
} }
// TODO: this test no more makes sense
// #[test]
// fn test_fetch_source_3() {
// // only local, no http_util::fetch_sync_string called
// let (_temp_dir, deno_dir) = test_setup();
// let cwd = std::env::current_dir().unwrap();
// let module_url =
// Url::parse("http://example.com/mt_text_typescript.t1.ts").unwrap();
// let filepath = cwd.join("tests/subdir/mt_text_typescript.t1.ts");
//
// let result =
// deno_dir.fetch_cached_remote_source(&module_url, None);
// assert!(result.is_ok());
// let r = result.unwrap().unwrap();
// assert_eq!(r.source_code, "export const loaded = true;\n".as_bytes());
// assert_eq!(&(r.media_type), &msg::MediaType::TypeScript);
// }
#[test] #[test]
fn test_fetch_source_file() { fn test_fetch_source_file() {
let (_temp_dir, deno_dir) = test_setup(); let (_temp_dir, deno_dir) = test_setup();

View file

@ -75,6 +75,10 @@ pub fn invalid_address_syntax() -> ErrBox {
StaticError(ErrorKind::InvalidInput, "invalid address syntax").into() StaticError(ErrorKind::InvalidInput, "invalid address syntax").into()
} }
pub fn too_many_redirects() -> ErrBox {
StaticError(ErrorKind::TooManyRedirects, "too many redirects").into()
}
pub trait GetErrorKind { pub trait GetErrorKind {
fn kind(&self) -> ErrorKind; fn kind(&self) -> ErrorKind;
} }

View file

@ -144,6 +144,7 @@ enum ErrorKind: byte {
InvalidPath, InvalidPath,
ImportPrefixMissing, ImportPrefixMissing,
UnsupportedFetchScheme, UnsupportedFetchScheme,
TooManyRedirects,
// other kinds // other kinds
Diagnostic, Diagnostic,