// Copyright 2018-2025 the Deno authors. MIT license. use std::path::Path; use std::path::PathBuf; use std::rc::Rc; use std::sync::Arc; use deno_core::error::JsError; use deno_node::NodeRequireLoaderRc; use deno_path_util::url_from_file_path; use deno_path_util::url_to_file_path; use deno_resolver::npm::DenoInNpmPackageChecker; use deno_resolver::npm::NpmResolver; use deno_runtime::BootstrapOptions; use deno_runtime::FeatureChecker; use deno_runtime::UNSTABLE_FEATURES; use deno_runtime::WorkerExecutionMode; use deno_runtime::WorkerLogLevel; use deno_runtime::colors; use deno_runtime::deno_broadcast_channel::InMemoryBroadcastChannel; use deno_runtime::deno_core; use deno_runtime::deno_core::CompiledWasmModuleStore; use deno_runtime::deno_core::Extension; use deno_runtime::deno_core::JsRuntime; use deno_runtime::deno_core::LocalInspectorSession; use deno_runtime::deno_core::ModuleLoader; use deno_runtime::deno_core::SharedArrayBufferStore; use deno_runtime::deno_core::error::CoreError; use deno_runtime::deno_core::v8; use deno_runtime::deno_fs; use deno_runtime::deno_napi::DenoRtNativeAddonLoaderRc; use deno_runtime::deno_node::NodeExtInitServices; use deno_runtime::deno_node::NodeRequireLoader; use deno_runtime::deno_node::NodeResolver; use deno_runtime::deno_permissions::PermissionsContainer; use deno_runtime::deno_process::NpmProcessStateProviderRc; use deno_runtime::deno_telemetry::OtelConfig; use deno_runtime::deno_tls::RootCertStoreProvider; use deno_runtime::deno_web::BlobStore; use deno_runtime::fmt_errors::format_js_error; use deno_runtime::inspector_server::InspectorServer; use deno_runtime::ops::worker_host::CreateWebWorkerCb; use deno_runtime::web_worker::WebWorker; use deno_runtime::web_worker::WebWorkerOptions; use deno_runtime::web_worker::WebWorkerServiceOptions; use deno_runtime::worker::MainWorker; use deno_runtime::worker::WorkerOptions; use deno_runtime::worker::WorkerServiceOptions; use node_resolver::UrlOrPath; use node_resolver::errors::ResolvePkgJsonBinExportError; use url::Url; use crate::args::has_trace_permissions_enabled; use crate::sys::DenoLibSys; use crate::util::checksum; pub struct CreateModuleLoaderResult { pub module_loader: Rc, pub node_require_loader: Rc, } pub trait ModuleLoaderFactory: Send + Sync { fn create_for_main( &self, root_permissions: PermissionsContainer, ) -> CreateModuleLoaderResult; fn create_for_worker( &self, parent_permissions: PermissionsContainer, permissions: PermissionsContainer, ) -> CreateModuleLoaderResult; } enum StorageKeyResolverStrategy { Specified(Option), UseMainModule, } pub struct StorageKeyResolver(StorageKeyResolverStrategy); impl StorageKeyResolver { pub fn from_flag(location: &Url) -> Self { // if a location is set, then the ascii serialization of the location is // used, unless the origin is opaque, and then no storage origin is set, as // we can't expect the origin to be reproducible let storage_origin = location.origin(); Self(StorageKeyResolverStrategy::Specified( if storage_origin.is_tuple() { Some(storage_origin.ascii_serialization()) } else { None }, )) } pub fn from_config_file_url(url: &Url) -> Self { Self(StorageKeyResolverStrategy::Specified(Some(url.to_string()))) } pub fn new_use_main_module() -> Self { Self(StorageKeyResolverStrategy::UseMainModule) } /// Creates a storage key resolver that will always resolve to being empty. pub fn empty() -> Self { Self(StorageKeyResolverStrategy::Specified(None)) } /// Resolves the storage key to use based on the current flags, config, or main module. pub fn resolve_storage_key(&self, main_module: &Url) -> Option { // use the stored value or fall back to using the path of the main module. match &self.0 { StorageKeyResolverStrategy::Specified(value) => value.clone(), StorageKeyResolverStrategy::UseMainModule => { Some(main_module.to_string()) } } } } pub fn get_cache_storage_dir() -> PathBuf { // ok because this won't ever be used by the js runtime #[allow(clippy::disallowed_methods)] // Note: we currently use temp_dir() to avoid managing storage size. std::env::temp_dir().join("deno_cache") } /// By default V8 uses 1.4Gb heap limit which is meant for browser tabs. /// Instead probe for the total memory on the system and use it instead /// as a default. In case the platform is Linux and `DENO_USE_CGROUPS` is set, /// parse cgroup config to get the cgroup-constrained memory limit. pub fn create_isolate_create_params( // This is used only in Linux to get cgroup-constrained memory limit. #[allow(unused_variables)] sys: &TSys, ) -> Option { #[cfg(any(target_os = "android", target_os = "linux"))] { linux::get_memory_limit(sys).map(|memory_limit| { v8::CreateParams::default() .heap_limits_from_system_memory(memory_limit, 0) }) } #[cfg(not(any(target_os = "android", target_os = "linux")))] { let maybe_mem_info = deno_runtime::deno_os::sys_info::mem_info(); maybe_mem_info.map(|mem_info| { v8::CreateParams::default() .heap_limits_from_system_memory(mem_info.total, 0) }) } } #[cfg(any(target_os = "android", target_os = "linux"))] mod linux { /// Get memory limit with cgroup (either v1 or v2) taken into account. pub(super) fn get_memory_limit( sys: &TSys, ) -> Option { let system_total_memory = deno_runtime::deno_os::sys_info::mem_info() .map(|mem_info| mem_info.total); // For performance, parse cgroup config only when DENO_USE_CGROUPS is set if std::env::var("DENO_USE_CGROUPS").is_err() { return system_total_memory; } let Ok(self_cgroup) = sys.fs_read_to_string("/proc/self/cgroup") else { return system_total_memory; }; let limit = match parse_self_cgroup(&self_cgroup) { CgroupVersion::V1 { cgroup_relpath } => { let limit_path = std::path::Path::new("/sys/fs/cgroup/memory") .join(cgroup_relpath) .join("memory.limit_in_bytes"); sys .fs_read_to_string(limit_path) .ok() .and_then(|s| s.trim().parse::().ok()) } CgroupVersion::V2 { cgroup_relpath } => { let limit_path = std::path::Path::new("/sys/fs/cgroup") .join(cgroup_relpath) .join("memory.max"); sys .fs_read_to_string(limit_path) .ok() .and_then(|s| s.trim().parse::().ok()) } CgroupVersion::None => system_total_memory, }; limit.or(system_total_memory) } enum CgroupVersion<'a> { V1 { cgroup_relpath: &'a str }, V2 { cgroup_relpath: &'a str }, None, } fn parse_self_cgroup(self_cgroup_content: &str) -> CgroupVersion<'_> { // Initialize the cgroup version as None. This will be updated based on the parsed lines. let mut cgroup_version = CgroupVersion::None; // Iterate through each line in the cgroup content. Each line represents a cgroup entry. for line in self_cgroup_content.lines() { // Split the line into parts using ":" as the delimiter. The format is typically: // "::" let split = line.split(":").collect::>(); match &split[..] { // If the line specifies "memory" as the subsystem, it indicates cgroup v1 is used // for memory management. Extract the relative path and update the cgroup version. [_, "memory", cgroup_v1_relpath] => { cgroup_version = CgroupVersion::V1 { cgroup_relpath: cgroup_v1_relpath .strip_prefix("/") .unwrap_or(cgroup_v1_relpath), }; // Break early since v1 explicitly manages memory, and no further checks are needed. break; } // If the line starts with "0::", it indicates cgroup v2 is used. However, in hybrid // mode, memory might still be managed by v1. Continue checking other lines to confirm. ["0", "", cgroup_v2_relpath] => { cgroup_version = CgroupVersion::V2 { cgroup_relpath: cgroup_v2_relpath .strip_prefix("/") .unwrap_or(cgroup_v2_relpath), }; } _ => {} } } cgroup_version } #[test] fn test_parse_self_cgroup_v2() { let self_cgroup = "0::/user.slice/user-1000.slice/session-3.scope"; let cgroup_version = parse_self_cgroup(self_cgroup); assert!(matches!( cgroup_version, CgroupVersion::V2 { cgroup_relpath } if cgroup_relpath == "user.slice/user-1000.slice/session-3.scope" )); } #[test] fn test_parse_self_cgroup_hybrid() { let self_cgroup = r#"12:rdma:/ 11:blkio:/user.slice 10:devices:/user.slice 9:cpu,cpuacct:/user.slice 8:pids:/user.slice/user-1000.slice/session-3.scope 7:memory:/user.slice/user-1000.slice/session-3.scope 6:perf_event:/ 5:freezer:/ 4:net_cls,net_prio:/ 3:hugetlb:/ 2:cpuset:/ 1:name=systemd:/user.slice/user-1000.slice/session-3.scope 0::/user.slice/user-1000.slice/session-3.scope "#; let cgroup_version = parse_self_cgroup(self_cgroup); assert!(matches!( cgroup_version, CgroupVersion::V1 { cgroup_relpath } if cgroup_relpath == "user.slice/user-1000.slice/session-3.scope" )); } #[test] fn test_parse_self_cgroup_v1() { let self_cgroup = r#"11:hugetlb:/ 10:pids:/user.slice/user-1000.slice 9:perf_event:/ 8:devices:/user.slice 7:net_cls,net_prio:/ 6:memory:/ 5:blkio:/ 4:cpuset:/ 3:cpu,cpuacct:/ 2:freezer:/ 1:name=systemd:/user.slice/user-1000.slice/session-2.scope "#; let cgroup_version = parse_self_cgroup(self_cgroup); assert!(matches!( cgroup_version, CgroupVersion::V1 { cgroup_relpath } if cgroup_relpath.is_empty() )); } } #[derive(Debug, thiserror::Error, deno_error::JsError)] pub enum ResolveNpmBinaryEntrypointError { #[class(inherit)] #[error(transparent)] PathToUrl(#[from] deno_path_util::PathToUrlError), #[class(inherit)] #[error(transparent)] ResolvePkgJsonBinExport(ResolvePkgJsonBinExportError), #[class(generic)] #[error("{original:#}\n\nFallback failed: {fallback:#}")] Fallback { fallback: ResolveNpmBinaryEntrypointFallbackError, original: ResolvePkgJsonBinExportError, }, } #[derive(Debug, thiserror::Error, deno_error::JsError)] pub enum ResolveNpmBinaryEntrypointFallbackError { #[class(inherit)] #[error(transparent)] PackageSubpathResolve( node_resolver::errors::PackageSubpathFromDenoModuleResolveError, ), #[class(generic)] #[error("Cannot find module '{0}'")] ModuleNotFound(UrlOrPath), } pub struct LibMainWorkerOptions { pub argv: Vec, pub log_level: WorkerLogLevel, pub enable_op_summary_metrics: bool, pub enable_raw_imports: bool, pub enable_testing_features: bool, pub has_node_modules_dir: bool, pub inspect_brk: bool, pub inspect_wait: bool, pub strace_ops: Option>, pub is_inspecting: bool, /// If this is a `deno compile`-ed executable. pub is_standalone: bool, // If the runtime should try to use `export default { fetch }` pub auto_serve: bool, pub location: Option, pub argv0: Option, pub node_debug: Option, pub otel_config: OtelConfig, pub origin_data_folder_path: Option, pub seed: Option, pub unsafely_ignore_certificate_errors: Option>, pub skip_op_registration: bool, pub node_ipc: Option, pub no_legacy_abort: bool, pub startup_snapshot: Option<&'static [u8]>, pub serve_port: Option, pub serve_host: Option, } #[derive(Default, Clone)] pub struct LibWorkerFactoryRoots { pub compiled_wasm_module_store: CompiledWasmModuleStore, pub shared_array_buffer_store: SharedArrayBufferStore, } struct LibWorkerFactorySharedState { blob_store: Arc, broadcast_channel: InMemoryBroadcastChannel, code_cache: Option>, compiled_wasm_module_store: CompiledWasmModuleStore, deno_rt_native_addon_loader: Option, feature_checker: Arc, fs: Arc, maybe_inspector_server: Option>, module_loader_factory: Box, node_resolver: Arc, TSys>>, npm_process_state_provider: NpmProcessStateProviderRc, pkg_json_resolver: Arc>, root_cert_store_provider: Arc, shared_array_buffer_store: SharedArrayBufferStore, storage_key_resolver: StorageKeyResolver, sys: TSys, options: LibMainWorkerOptions, } impl LibWorkerFactorySharedState { fn resolve_unstable_features( &self, feature_checker: &FeatureChecker, ) -> Vec { let mut unstable_features = Vec::with_capacity(UNSTABLE_FEATURES.len()); for feature in UNSTABLE_FEATURES { if feature_checker.check(feature.name) { unstable_features.push(feature.id); } } unstable_features } fn create_node_init_services( &self, node_require_loader: NodeRequireLoaderRc, ) -> NodeExtInitServices, TSys> { NodeExtInitServices { node_require_loader, node_resolver: self.node_resolver.clone(), pkg_json_resolver: self.pkg_json_resolver.clone(), sys: self.sys.clone(), } } fn create_web_worker_callback( self: &Arc, stdio: deno_runtime::deno_io::Stdio, ) -> Arc { let shared = self.clone(); Arc::new(move |args| { let maybe_inspector_server = shared.maybe_inspector_server.clone(); let CreateModuleLoaderResult { module_loader, node_require_loader, } = shared.module_loader_factory.create_for_worker( args.parent_permissions.clone(), args.permissions.clone(), ); let create_web_worker_cb = shared.create_web_worker_callback(stdio.clone()); let maybe_storage_key = shared .storage_key_resolver .resolve_storage_key(&args.main_module); let cache_storage_dir = maybe_storage_key.map(|key| { // TODO(@satyarohith): storage quota management get_cache_storage_dir().join(checksum::r#gen(&[key.as_bytes()])) }); // TODO(bartlomieju): this is cruft, update FeatureChecker to spit out // list of enabled features. let feature_checker = shared.feature_checker.clone(); let unstable_features = shared.resolve_unstable_features(feature_checker.as_ref()); let services = WebWorkerServiceOptions { deno_rt_native_addon_loader: shared.deno_rt_native_addon_loader.clone(), root_cert_store_provider: Some(shared.root_cert_store_provider.clone()), module_loader, fs: shared.fs.clone(), node_services: Some( shared.create_node_init_services(node_require_loader), ), blob_store: shared.blob_store.clone(), broadcast_channel: shared.broadcast_channel.clone(), shared_array_buffer_store: Some( shared.shared_array_buffer_store.clone(), ), compiled_wasm_module_store: Some( shared.compiled_wasm_module_store.clone(), ), maybe_inspector_server, feature_checker, npm_process_state_provider: Some( shared.npm_process_state_provider.clone(), ), permissions: args.permissions, }; let options = WebWorkerOptions { name: args.name, main_module: args.main_module.clone(), worker_id: args.worker_id, bootstrap: BootstrapOptions { deno_version: crate::version::DENO_VERSION_INFO.deno.to_string(), args: shared.options.argv.clone(), cpu_count: std::thread::available_parallelism() .map(|p| p.get()) .unwrap_or(1), log_level: shared.options.log_level, enable_op_summary_metrics: shared.options.enable_op_summary_metrics, enable_testing_features: shared.options.enable_testing_features, locale: deno_core::v8::icu::get_language_tag(), location: Some(args.main_module), color_level: colors::get_color_level(), unstable_features, user_agent: crate::version::DENO_VERSION_INFO.user_agent.to_string(), inspect: shared.options.is_inspecting, is_standalone: shared.options.is_standalone, auto_serve: shared.options.auto_serve, has_node_modules_dir: shared.options.has_node_modules_dir, argv0: shared.options.argv0.clone(), node_debug: shared.options.node_debug.clone(), node_ipc_fd: None, mode: WorkerExecutionMode::Worker, serve_port: shared.options.serve_port, serve_host: shared.options.serve_host.clone(), otel_config: shared.options.otel_config.clone(), no_legacy_abort: shared.options.no_legacy_abort, close_on_idle: args.close_on_idle, }, extensions: vec![], startup_snapshot: shared.options.startup_snapshot, create_params: create_isolate_create_params(&shared.sys), unsafely_ignore_certificate_errors: shared .options .unsafely_ignore_certificate_errors .clone(), seed: shared.options.seed, create_web_worker_cb, format_js_error_fn: Some(Arc::new(format_js_error)), worker_type: args.worker_type, stdio: stdio.clone(), cache_storage_dir, strace_ops: shared.options.strace_ops.clone(), close_on_idle: args.close_on_idle, maybe_worker_metadata: args.maybe_worker_metadata, enable_raw_imports: shared.options.enable_raw_imports, enable_stack_trace_arg_in_ops: has_trace_permissions_enabled(), }; WebWorker::bootstrap_from_options(services, options) }) } } pub struct LibMainWorkerFactory { shared: Arc>, } impl LibMainWorkerFactory { #[allow(clippy::too_many_arguments)] pub fn new( blob_store: Arc, code_cache: Option>, deno_rt_native_addon_loader: Option, feature_checker: Arc, fs: Arc, maybe_inspector_server: Option>, module_loader_factory: Box, node_resolver: Arc< NodeResolver, TSys>, >, npm_process_state_provider: NpmProcessStateProviderRc, pkg_json_resolver: Arc>, root_cert_store_provider: Arc, storage_key_resolver: StorageKeyResolver, sys: TSys, options: LibMainWorkerOptions, roots: LibWorkerFactoryRoots, ) -> Self { Self { shared: Arc::new(LibWorkerFactorySharedState { blob_store, broadcast_channel: Default::default(), code_cache, compiled_wasm_module_store: roots.compiled_wasm_module_store, deno_rt_native_addon_loader, feature_checker, fs, maybe_inspector_server, module_loader_factory, node_resolver, npm_process_state_provider, pkg_json_resolver, root_cert_store_provider, shared_array_buffer_store: roots.shared_array_buffer_store, storage_key_resolver, sys, options, }), } } #[allow(clippy::result_large_err)] pub fn create_main_worker( &self, mode: WorkerExecutionMode, permissions: PermissionsContainer, main_module: Url, preload_modules: Vec, ) -> Result { self.create_custom_worker( mode, main_module, preload_modules, permissions, vec![], Default::default(), None, ) } #[allow(clippy::result_large_err)] #[allow(clippy::too_many_arguments)] pub fn create_custom_worker( &self, mode: WorkerExecutionMode, main_module: Url, preload_modules: Vec, permissions: PermissionsContainer, custom_extensions: Vec, stdio: deno_runtime::deno_io::Stdio, unconfigured_runtime: Option, ) -> Result { let shared = &self.shared; let CreateModuleLoaderResult { module_loader, node_require_loader, } = shared .module_loader_factory .create_for_main(permissions.clone()); // TODO(bartlomieju): this is cruft, update FeatureChecker to spit out // list of enabled features. let feature_checker = shared.feature_checker.clone(); let unstable_features = shared.resolve_unstable_features(feature_checker.as_ref()); let maybe_storage_key = shared .storage_key_resolver .resolve_storage_key(&main_module); let origin_storage_dir: Option = maybe_storage_key.as_ref().map(|key| { shared .options .origin_data_folder_path .as_ref() .unwrap() // must be set if storage key resolver returns a value .join(checksum::r#gen(&[key.as_bytes()])) }); let cache_storage_dir = maybe_storage_key.map(|key| { // TODO(@satyarohith): storage quota management get_cache_storage_dir().join(checksum::r#gen(&[key.as_bytes()])) }); let services = WorkerServiceOptions { deno_rt_native_addon_loader: shared.deno_rt_native_addon_loader.clone(), root_cert_store_provider: Some(shared.root_cert_store_provider.clone()), module_loader, fs: shared.fs.clone(), node_services: Some( shared.create_node_init_services(node_require_loader), ), npm_process_state_provider: Some( shared.npm_process_state_provider.clone(), ), blob_store: shared.blob_store.clone(), broadcast_channel: shared.broadcast_channel.clone(), fetch_dns_resolver: Default::default(), shared_array_buffer_store: Some(shared.shared_array_buffer_store.clone()), compiled_wasm_module_store: Some( shared.compiled_wasm_module_store.clone(), ), feature_checker, permissions, v8_code_cache: shared.code_cache.clone(), }; let options = WorkerOptions { bootstrap: BootstrapOptions { deno_version: crate::version::DENO_VERSION_INFO.deno.to_string(), args: shared.options.argv.clone(), cpu_count: std::thread::available_parallelism() .map(|p| p.get()) .unwrap_or(1), log_level: shared.options.log_level, enable_op_summary_metrics: shared.options.enable_op_summary_metrics, enable_testing_features: shared.options.enable_testing_features, locale: deno_core::v8::icu::get_language_tag(), location: shared.options.location.clone(), color_level: colors::get_color_level(), unstable_features, user_agent: crate::version::DENO_VERSION_INFO.user_agent.to_string(), inspect: shared.options.is_inspecting, is_standalone: shared.options.is_standalone, auto_serve: shared.options.auto_serve, has_node_modules_dir: shared.options.has_node_modules_dir, argv0: shared.options.argv0.clone(), node_debug: shared.options.node_debug.clone(), node_ipc_fd: shared.options.node_ipc, mode, no_legacy_abort: shared.options.no_legacy_abort, serve_port: shared.options.serve_port, serve_host: shared.options.serve_host.clone(), otel_config: shared.options.otel_config.clone(), close_on_idle: true, }, extensions: custom_extensions, startup_snapshot: shared.options.startup_snapshot, create_params: create_isolate_create_params(&shared.sys), unsafely_ignore_certificate_errors: shared .options .unsafely_ignore_certificate_errors .clone(), seed: shared.options.seed, format_js_error_fn: Some(Arc::new(format_js_error)), create_web_worker_cb: shared.create_web_worker_callback(stdio.clone()), maybe_inspector_server: shared.maybe_inspector_server.clone(), should_break_on_first_statement: shared.options.inspect_brk, should_wait_for_inspector_session: shared.options.inspect_wait, strace_ops: shared.options.strace_ops.clone(), cache_storage_dir, origin_storage_dir, stdio, skip_op_registration: shared.options.skip_op_registration, enable_raw_imports: shared.options.enable_raw_imports, enable_stack_trace_arg_in_ops: has_trace_permissions_enabled(), unconfigured_runtime, }; let mut worker = MainWorker::bootstrap_from_options(&main_module, services, options); worker.setup_memory_trim_handler(); Ok(LibMainWorker { main_module, preload_modules, worker, }) } #[allow(clippy::result_large_err)] pub fn resolve_npm_binary_entrypoint( &self, package_folder: &Path, sub_path: Option<&str>, ) -> Result { match self .shared .node_resolver .resolve_binary_export(package_folder, sub_path) { Ok(path) => Ok(url_from_file_path(&path)?), Err(original_err) => { // if the binary entrypoint was not found, fallback to regular node resolution let result = self.resolve_binary_entrypoint_fallback(package_folder, sub_path); match result { Ok(Some(path)) => Ok(url_from_file_path(&path)?), Ok(None) => { Err(ResolveNpmBinaryEntrypointError::ResolvePkgJsonBinExport( original_err, )) } Err(fallback_err) => Err(ResolveNpmBinaryEntrypointError::Fallback { original: original_err, fallback: fallback_err, }), } } } } /// resolve the binary entrypoint using regular node resolution fn resolve_binary_entrypoint_fallback( &self, package_folder: &Path, sub_path: Option<&str>, ) -> Result, ResolveNpmBinaryEntrypointFallbackError> { // only fallback if the user specified a sub path if sub_path.is_none() { // it's confusing to users if the package doesn't have any binary // entrypoint and we just execute the main script which will likely // have blank output, so do not resolve the entrypoint in this case return Ok(None); } let specifier = self .shared .node_resolver .resolve_package_subpath_from_deno_module( package_folder, sub_path, /* referrer */ None, node_resolver::ResolutionMode::Import, node_resolver::NodeResolutionKind::Execution, ) .map_err( ResolveNpmBinaryEntrypointFallbackError::PackageSubpathResolve, )?; let path = match specifier { UrlOrPath::Url(ref url) => match url_to_file_path(url) { Ok(path) => path, Err(_) => { return Err(ResolveNpmBinaryEntrypointFallbackError::ModuleNotFound( specifier, )); } }, UrlOrPath::Path(path) => path, }; if self.shared.sys.fs_exists_no_err(&path) { Ok(Some(path)) } else { Err(ResolveNpmBinaryEntrypointFallbackError::ModuleNotFound( UrlOrPath::Path(path), )) } } } pub struct LibMainWorker { main_module: Url, preload_modules: Vec, worker: MainWorker, } impl LibMainWorker { pub fn into_main_worker(self) -> MainWorker { self.worker } pub fn main_module(&self) -> &Url { &self.main_module } pub fn js_runtime(&mut self) -> &mut JsRuntime { &mut self.worker.js_runtime } #[inline] pub fn create_inspector_session(&mut self) -> LocalInspectorSession { self.worker.create_inspector_session() } #[inline] #[allow(clippy::result_large_err)] pub fn dispatch_load_event(&mut self) -> Result<(), JsError> { self.worker.dispatch_load_event() } #[inline] #[allow(clippy::result_large_err)] pub fn dispatch_beforeunload_event(&mut self) -> Result { self.worker.dispatch_beforeunload_event() } #[inline] #[allow(clippy::result_large_err)] pub fn dispatch_process_beforeexit_event(&mut self) -> Result { self.worker.dispatch_process_beforeexit_event() } #[inline] #[allow(clippy::result_large_err)] pub fn dispatch_unload_event(&mut self) -> Result<(), JsError> { self.worker.dispatch_unload_event() } #[inline] #[allow(clippy::result_large_err)] pub fn dispatch_process_exit_event(&mut self) -> Result<(), JsError> { self.worker.dispatch_process_exit_event() } pub async fn execute_main_module(&mut self) -> Result<(), CoreError> { let id = self.worker.preload_main_module(&self.main_module).await?; self.worker.evaluate_module(id).await } pub async fn execute_side_module(&mut self) -> Result<(), CoreError> { let id = self.worker.preload_side_module(&self.main_module).await?; self.worker.evaluate_module(id).await } pub async fn execute_preload_modules(&mut self) -> Result<(), CoreError> { for preload_module_url in self.preload_modules.iter() { let id = self.worker.preload_side_module(preload_module_url).await?; self.worker.evaluate_module(id).await?; self.worker.run_event_loop(false).await?; } Ok(()) } pub async fn run(&mut self) -> Result { log::debug!("main_module {}", self.main_module); // Run preload modules first if they were defined self.execute_preload_modules().await?; self.execute_main_module().await?; self.worker.dispatch_load_event()?; loop { self .worker .run_event_loop(/* wait for inspector */ false) .await?; let web_continue = self.worker.dispatch_beforeunload_event()?; if !web_continue { let node_continue = self.worker.dispatch_process_beforeexit_event()?; if !node_continue { break; } } } self.worker.dispatch_unload_event()?; self.worker.dispatch_process_exit_event()?; Ok(self.worker.exit_code()) } #[inline] pub async fn run_event_loop( &mut self, wait_for_inspector: bool, ) -> Result<(), CoreError> { self.worker.run_event_loop(wait_for_inspector).await } #[inline] pub fn exit_code(&self) -> i32 { self.worker.exit_code() } } #[cfg(test)] mod test { use super::*; #[test] fn storage_key_resolver_test() { let resolver = StorageKeyResolver(StorageKeyResolverStrategy::UseMainModule); let specifier = Url::parse("file:///a.ts").unwrap(); assert_eq!( resolver.resolve_storage_key(&specifier), Some(specifier.to_string()) ); let resolver = StorageKeyResolver(StorageKeyResolverStrategy::Specified(None)); assert_eq!(resolver.resolve_storage_key(&specifier), None); let resolver = StorageKeyResolver(StorageKeyResolverStrategy::Specified( Some("value".to_string()), )); assert_eq!( resolver.resolve_storage_key(&specifier), Some("value".to_string()) ); // test empty let resolver = StorageKeyResolver::empty(); assert_eq!(resolver.resolve_storage_key(&specifier), None); } }