Remove test.py, use cargo test as test frontend (#2967)

Fixes #2933
This commit is contained in:
Ryan Dahl 2019-09-19 14:48:05 -04:00 committed by GitHub
parent 1b1ae65a4a
commit 56ac638d93
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
24 changed files with 545 additions and 414 deletions

View file

@ -166,7 +166,7 @@ build_script:
test_script: test_script:
- python tools\lint.py - python tools\lint.py
- python tools\test_format.py - python tools\test_format.py
- python tools\test.py - cargo test -vv --release --all-targets --locked
after_test: after_test:
# Stop sccache and show stats. # Stop sccache and show stats.

View file

@ -70,10 +70,10 @@ jobs:
run: sccache --start-server run: sccache --start-server
- name: Build - name: Build
run: cargo build -vv --release --locked --all-targets run: cargo build --release --locked --all-targets
- name: Test - name: Test
run: python ./tools/test.py run: cargo test --release --locked --all-targets
- name: Stop sccache - name: Stop sccache
run: sccache --stop-server run: sccache --stop-server

View file

@ -55,7 +55,7 @@ before_script:
# Default script for release builds. # Default script for release builds.
script: script:
- cargo build -vv --release --locked --all-targets - cargo build -vv --release --locked --all-targets
- DENO_BUILD_MODE=release ./tools/test.py - cargo test -vv --release --all-targets --locked
# For some reason it's faster to run clippy after build. # For some reason it's faster to run clippy after build.
- rustup component add clippy - rustup component add clippy
- cargo clippy --all-targets --release --locked -- -D clippy::all - cargo clippy --all-targets --release --locked -- -D clippy::all

View file

@ -724,6 +724,7 @@ mod tests {
#[test] #[test]
fn test_get_source_code_1() { fn test_get_source_code_1() {
let http_server_guard = crate::test_util::http_server();
let (temp_dir, fetcher) = test_setup(); let (temp_dir, fetcher) = test_setup();
// http_util::fetch_sync_string requires tokio // http_util::fetch_sync_string requires tokio
tokio_util::init(|| { tokio_util::init(|| {
@ -800,10 +801,12 @@ mod tests {
assert_eq!(&(r4.media_type), &msg::MediaType::TypeScript); assert_eq!(&(r4.media_type), &msg::MediaType::TypeScript);
assert!(fs::read_to_string(&headers_file_name).is_err()); assert!(fs::read_to_string(&headers_file_name).is_err());
}); });
drop(http_server_guard);
} }
#[test] #[test]
fn test_get_source_code_2() { fn test_get_source_code_2() {
let http_server_guard = crate::test_util::http_server();
let (temp_dir, fetcher) = test_setup(); let (temp_dir, fetcher) = test_setup();
// http_util::fetch_sync_string requires tokio // http_util::fetch_sync_string requires tokio
tokio_util::init(|| { tokio_util::init(|| {
@ -866,10 +869,12 @@ mod tests {
"text/javascript" "text/javascript"
); );
}); });
drop(http_server_guard);
} }
#[test] #[test]
fn test_get_source_code_multiple_downloads_of_same_file() { fn test_get_source_code_multiple_downloads_of_same_file() {
let http_server_guard = crate::test_util::http_server();
let (_temp_dir, fetcher) = test_setup(); let (_temp_dir, fetcher) = test_setup();
// http_util::fetch_sync_string requires tokio // http_util::fetch_sync_string requires tokio
tokio_util::init(|| { tokio_util::init(|| {
@ -910,10 +915,12 @@ mod tests {
assert_eq!(headers_file_modified, headers_file_modified_2); assert_eq!(headers_file_modified, headers_file_modified_2);
}); });
drop(http_server_guard);
} }
#[test] #[test]
fn test_get_source_code_3() { fn test_get_source_code_3() {
let http_server_guard = crate::test_util::http_server();
let (_temp_dir, fetcher) = test_setup(); let (_temp_dir, fetcher) = test_setup();
// Test basic follow and headers recording // Test basic follow and headers recording
tokio_util::init(|| { tokio_util::init(|| {
@ -960,10 +967,12 @@ mod tests {
// Examine the meta result. // Examine the meta result.
assert_eq!(mod_meta.url.clone(), target_module_url); assert_eq!(mod_meta.url.clone(), target_module_url);
}); });
drop(http_server_guard);
} }
#[test] #[test]
fn test_get_source_code_4() { fn test_get_source_code_4() {
let http_server_guard = crate::test_util::http_server();
let (_temp_dir, fetcher) = test_setup(); let (_temp_dir, fetcher) = test_setup();
// Test double redirects and headers recording // Test double redirects and headers recording
tokio_util::init(|| { tokio_util::init(|| {
@ -1022,10 +1031,12 @@ mod tests {
// Examine the meta result. // Examine the meta result.
assert_eq!(mod_meta.url.clone(), target_url); assert_eq!(mod_meta.url.clone(), target_url);
}); });
drop(http_server_guard);
} }
#[test] #[test]
fn test_get_source_code_5() { fn test_get_source_code_5() {
let http_server_guard = crate::test_util::http_server();
let (_temp_dir, fetcher) = test_setup(); let (_temp_dir, fetcher) = test_setup();
// Test that redirect target is not downloaded twice for different redirect source. // Test that redirect target is not downloaded twice for different redirect source.
tokio_util::init(|| { tokio_util::init(|| {
@ -1067,10 +1078,12 @@ mod tests {
assert_eq!(file_modified, file_modified_2); assert_eq!(file_modified, file_modified_2);
}); });
drop(http_server_guard);
} }
#[test] #[test]
fn test_get_source_code_6() { fn test_get_source_code_6() {
let http_server_guard = crate::test_util::http_server();
let (_temp_dir, fetcher) = test_setup(); let (_temp_dir, fetcher) = test_setup();
// Test that redirections can be limited // Test that redirections can be limited
tokio_util::init(|| { tokio_util::init(|| {
@ -1087,10 +1100,12 @@ mod tests {
let err = result.err().unwrap(); let err = result.err().unwrap();
assert_eq!(err.kind(), ErrorKind::TooManyRedirects); assert_eq!(err.kind(), ErrorKind::TooManyRedirects);
}); });
drop(http_server_guard);
} }
#[test] #[test]
fn test_get_source_code_no_fetch() { fn test_get_source_code_no_fetch() {
let http_server_guard = crate::test_util::http_server();
let (_temp_dir, fetcher) = test_setup(); let (_temp_dir, fetcher) = test_setup();
tokio_util::init(|| { tokio_util::init(|| {
let module_url = let module_url =
@ -1110,11 +1125,12 @@ mod tests {
let result = fetcher.get_source_file(&module_url, true, true); let result = fetcher.get_source_file(&module_url, true, true);
assert!(result.is_ok()); assert!(result.is_ok());
}); });
drop(http_server_guard);
} }
#[test] #[test]
fn test_fetch_source_async_1() { fn test_fetch_source_async_1() {
// http_util::fetch_sync_string requires tokio let http_server_guard = crate::test_util::http_server();
tokio_util::init(|| { tokio_util::init(|| {
let (_temp_dir, fetcher) = test_setup(); let (_temp_dir, fetcher) = test_setup();
let module_url = let module_url =
@ -1152,11 +1168,12 @@ mod tests {
// Not MediaType::TypeScript due to .headers.json modification // Not MediaType::TypeScript due to .headers.json modification
assert_eq!(&(r2.media_type), &msg::MediaType::JavaScript); assert_eq!(&(r2.media_type), &msg::MediaType::JavaScript);
}); });
drop(http_server_guard);
} }
#[test] #[test]
fn test_fetch_source_1() { fn test_fetch_source_1() {
// http_util::fetch_sync_string requires tokio let http_server_guard = crate::test_util::http_server();
tokio_util::init(|| { tokio_util::init(|| {
let (_temp_dir, fetcher) = test_setup(); let (_temp_dir, fetcher) = test_setup();
let module_url = let module_url =
@ -1189,11 +1206,12 @@ mod tests {
// Not MediaType::TypeScript due to .headers.json modification // Not MediaType::TypeScript due to .headers.json modification
assert_eq!(&(r2.media_type), &msg::MediaType::JavaScript); assert_eq!(&(r2.media_type), &msg::MediaType::JavaScript);
}); });
drop(http_server_guard);
} }
#[test] #[test]
fn test_fetch_source_2() { fn test_fetch_source_2() {
// http_util::fetch_sync_string requires tokio let http_server_guard = crate::test_util::http_server();
tokio_util::init(|| { tokio_util::init(|| {
let (_temp_dir, fetcher) = test_setup(); let (_temp_dir, fetcher) = test_setup();
let module_url = let module_url =
@ -1249,6 +1267,7 @@ mod tests {
"text/typescript" "text/typescript"
); );
}); });
drop(http_server_guard);
} }
#[test] #[test]

View file

@ -145,6 +145,7 @@ mod tests {
#[test] #[test]
fn test_fetch_sync_string() { fn test_fetch_sync_string() {
let http_server_guard = crate::test_util::http_server();
// Relies on external http server. See tools/http_server.py // Relies on external http server. See tools/http_server.py
let url = Url::parse("http://127.0.0.1:4545/package.json").unwrap(); let url = Url::parse("http://127.0.0.1:4545/package.json").unwrap();
tokio_util::init(|| match fetch_string_once_sync(&url).unwrap() { tokio_util::init(|| match fetch_string_once_sync(&url).unwrap() {
@ -154,10 +155,12 @@ mod tests {
} }
_ => unreachable!(), _ => unreachable!(),
}); });
drop(http_server_guard);
} }
#[test] #[test]
fn test_fetch_string_once_with_redirect() { fn test_fetch_string_once_with_redirect() {
let http_server_guard = crate::test_util::http_server();
// Relies on external http server. See tools/http_server.py // Relies on external http server. See tools/http_server.py
let url = Url::parse("http://127.0.0.1:4546/package.json").unwrap(); let url = Url::parse("http://127.0.0.1:4546/package.json").unwrap();
// Dns resolver substitutes `127.0.0.1` with `localhost` // Dns resolver substitutes `127.0.0.1` with `localhost`
@ -166,6 +169,7 @@ mod tests {
let result = fetch_string_once_sync(&url).unwrap(); let result = fetch_string_once_sync(&url).unwrap();
assert_eq!(result, FetchOnceResult::Redirect(target_url)); assert_eq!(result, FetchOnceResult::Redirect(target_url));
}); });
drop(http_server_guard);
} }
#[test] #[test]

View file

@ -44,6 +44,7 @@ mod signal;
pub mod source_maps; pub mod source_maps;
mod startup_data; mod startup_data;
pub mod state; pub mod state;
pub mod test_util;
mod tokio_read; mod tokio_read;
mod tokio_util; mod tokio_util;
mod tokio_write; mod tokio_write;

77
cli/test_util.rs Normal file
View file

@ -0,0 +1,77 @@
// Copyright 2018-2019 the Deno authors. All rights reserved. MIT license.
// TODO(ry) Make this file test-only. Somehow it's very difficult to export
// methods to tests/integration_tests.rs and tests/tty_tests.rs if this
// is enabled...
// #![cfg(test)]
use std::path::PathBuf;
use std::process::Child;
use std::process::Command;
use std::sync::Mutex;
use std::sync::MutexGuard;
lazy_static! {
static ref GUARD: Mutex<()> = Mutex::new(());
}
pub fn root_path() -> PathBuf {
PathBuf::from(concat!(env!("CARGO_MANIFEST_DIR"), "/.."))
}
pub fn target_dir() -> PathBuf {
let current_exe = std::env::current_exe().unwrap();
let target_dir = current_exe.parent().unwrap().parent().unwrap();
println!("target_dir {}", target_dir.display());
target_dir.into()
}
pub fn deno_exe_path() -> PathBuf {
// Something like /Users/rld/src/deno/target/debug/deps/deno
let mut p = target_dir().join("deno");
if cfg!(windows) {
p.set_extension("exe");
}
p
}
pub struct HttpServerGuard<'a> {
#[allow(dead_code)]
g: MutexGuard<'a, ()>,
child: Child,
}
impl<'a> Drop for HttpServerGuard<'a> {
fn drop(&mut self) {
match self.child.try_wait() {
Ok(None) => {
self.child.kill().expect("failed to kill http_server.py");
}
Ok(Some(status)) => {
panic!("http_server.py exited unexpectedly {}", status)
}
Err(e) => panic!("http_server.py err {}", e),
}
}
}
/// Starts tools/http_server.py when the returned guard is dropped, the server
/// will be killed.
pub fn http_server<'a>() -> HttpServerGuard<'a> {
// TODO(ry) Allow tests to use the http server in parallel.
let g = GUARD.lock().unwrap();
println!("tools/http_server.py starting...");
let child = Command::new("python")
.current_dir(root_path())
.arg("tools/http_server.py")
.spawn()
.expect("failed to execute child");
// Wait 1 second for the server to come up. TODO(ry) this is Racy.
std::thread::sleep(std::time::Duration::from_secs(2));
println!("tools/http_server.py ready");
HttpServerGuard { child, g }
}

View file

@ -1,3 +1,3 @@
import { printHello } from "http://localhost:4545/tests/subdir/mod2.ts"; import { printHello } from "http://localhost:4545/cli/tests/subdir/mod2.ts";
printHello(); printHello();
console.log("success"); console.log("success");

View file

@ -2,14 +2,14 @@
// based on the URL containing `.t#.` strings, which exercises the different // based on the URL containing `.t#.` strings, which exercises the different
// mapping of media types end to end. // mapping of media types end to end.
import { loaded as loadedTs1 } from "http://localhost:4545/tests/subdir/mt_text_typescript.t1.ts"; import { loaded as loadedTs1 } from "http://localhost:4545/cli/tests/subdir/mt_text_typescript.t1.ts";
import { loaded as loadedTs2 } from "http://localhost:4545/tests/subdir/mt_video_vdn.t2.ts"; import { loaded as loadedTs2 } from "http://localhost:4545/cli/tests/subdir/mt_video_vdn.t2.ts";
import { loaded as loadedTs3 } from "http://localhost:4545/tests/subdir/mt_video_mp2t.t3.ts"; import { loaded as loadedTs3 } from "http://localhost:4545/cli/tests/subdir/mt_video_mp2t.t3.ts";
import { loaded as loadedTs4 } from "http://localhost:4545/tests/subdir/mt_application_x_typescript.t4.ts"; import { loaded as loadedTs4 } from "http://localhost:4545/cli/tests/subdir/mt_application_x_typescript.t4.ts";
import { loaded as loadedJs1 } from "http://localhost:4545/tests/subdir/mt_text_javascript.j1.js"; import { loaded as loadedJs1 } from "http://localhost:4545/cli/tests/subdir/mt_text_javascript.j1.js";
import { loaded as loadedJs2 } from "http://localhost:4545/tests/subdir/mt_application_ecmascript.j2.js"; import { loaded as loadedJs2 } from "http://localhost:4545/cli/tests/subdir/mt_application_ecmascript.j2.js";
import { loaded as loadedJs3 } from "http://localhost:4545/tests/subdir/mt_text_ecmascript.j3.js"; import { loaded as loadedJs3 } from "http://localhost:4545/cli/tests/subdir/mt_text_ecmascript.j3.js";
import { loaded as loadedJs4 } from "http://localhost:4545/tests/subdir/mt_application_x_javascript.j4.js"; import { loaded as loadedJs4 } from "http://localhost:4545/cli/tests/subdir/mt_application_x_javascript.j4.js";
console.log( console.log(
"success", "success",

View file

@ -3,12 +3,12 @@ type: TypeScript
compiled: [WILDCARD].js compiled: [WILDCARD].js
map: [WILDCARD].js.map map: [WILDCARD].js.map
deps: deps:
http://127.0.0.1:4545/tests/019_media_types.ts http://127.0.0.1:4545/cli/tests/019_media_types.ts
├── http://localhost:4545/tests/subdir/mt_text_typescript.t1.ts ├── http://localhost:4545/cli/tests/subdir/mt_text_typescript.t1.ts
├── http://localhost:4545/tests/subdir/mt_video_vdn.t2.ts ├── http://localhost:4545/cli/tests/subdir/mt_video_vdn.t2.ts
├── http://localhost:4545/tests/subdir/mt_video_mp2t.t3.ts ├── http://localhost:4545/cli/tests/subdir/mt_video_mp2t.t3.ts
├── http://localhost:4545/tests/subdir/mt_application_x_typescript.t4.ts ├── http://localhost:4545/cli/tests/subdir/mt_application_x_typescript.t4.ts
├── http://localhost:4545/tests/subdir/mt_text_javascript.j1.js ├── http://localhost:4545/cli/tests/subdir/mt_text_javascript.j1.js
├── http://localhost:4545/tests/subdir/mt_application_ecmascript.j2.js ├── http://localhost:4545/cli/tests/subdir/mt_application_ecmascript.j2.js
├── http://localhost:4545/tests/subdir/mt_text_ecmascript.j3.js ├── http://localhost:4545/cli/tests/subdir/mt_text_ecmascript.j3.js
└── http://localhost:4545/tests/subdir/mt_application_x_javascript.j4.js └── http://localhost:4545/cli/tests/subdir/mt_application_x_javascript.j4.js

View file

@ -1 +1 @@
Cannot resolve module "http://127.0.0.1:4545/tests/019_media_types.ts" Cannot resolve module "http://127.0.0.1:4545/cli/tests/019_media_types.ts"

View file

@ -3,5 +3,5 @@
This path contains integration tests. See integration_tests.rs for the index. This path contains integration tests. See integration_tests.rs for the index.
TODO(ry) Currently //tests is a symlink to //cli/tests, to simplify transition. TODO(ry) Currently //tests is a symlink to //cli/tests, to simplify transition.
In the future //tests should be removed when all references to //tests are In the future the symlink should be removed when all the many references have
updated. been updated to the new path.

View file

@ -1,21 +1,82 @@
// Copyright 2018-2019 the Deno authors. All rights reserved. MIT license. // Copyright 2018-2019 the Deno authors. All rights reserved. MIT license.
#[macro_use] #[macro_use]
extern crate log; extern crate lazy_static;
extern crate tempfile;
mod util;
use util::*;
use deno_cli::colors::strip_ansi_codes; #[test]
use os_pipe::pipe; fn benchmark_test() {
use std::env; run_python_script("tools/benchmark_test.py")
use std::io::Read; }
use std::io::Write;
use std::path::PathBuf; #[test]
use std::process::Command; fn deno_dir_test() {
use std::process::Stdio; let g = http_server();
run_python_script("tools/deno_dir_test.py");
drop(g);
}
// TODO(#2933): Rewrite this test in rust.
#[test]
fn fetch_test() {
let g = http_server();
run_python_script("tools/fetch_test.py");
drop(g);
}
// TODO(#2933): Rewrite this test in rust.
#[test]
fn fmt_test() {
let g = http_server();
run_python_script("tools/fmt_test.py");
drop(g);
}
#[test]
fn js_unit_tests() {
let g = http_server();
let mut deno = deno_cmd()
.current_dir(root_path())
.arg("run")
.arg("--reload")
.arg("--allow-run")
.arg("--allow-env")
.arg("js/unit_test_runner.ts")
.spawn()
.expect("failed to spawn script");
let status = deno.wait().expect("failed to wait for the child process");
assert_eq!(Some(0), status.code());
assert!(status.success());
drop(g);
}
// TODO(#2933): Rewrite this test in rust.
#[test]
fn repl_test() {
run_python_script("tools/repl_test.py")
}
#[test]
fn setup_test() {
run_python_script("tools/setup_test.py")
}
#[test]
fn target_test() {
run_python_script("tools/target_test.py")
}
#[test]
fn util_test() {
run_python_script("tools/util_test.py")
}
macro_rules! itest( macro_rules! itest(
($name:ident {$( $key:ident: $value:expr,)*}) => { ($name:ident {$( $key:ident: $value:expr,)*}) => {
#[test] #[test]
fn $name() { fn $name() {
(IntegrationTest { (CheckOutputIntegrationTest {
$( $(
$key: $value, $key: $value,
)* )*
@ -27,180 +88,187 @@ macro_rules! itest(
itest!(_001_hello { itest!(_001_hello {
args: "run --reload 001_hello.js", args: "run --reload 001_hello.js",
output: "tests/001_hello.js.out", output: "001_hello.js.out",
}); });
itest!(_002_hello { itest!(_002_hello {
args: "run --reload 002_hello.ts", args: "run --reload 002_hello.ts",
output: "tests/002_hello.ts.out", output: "002_hello.ts.out",
}); });
itest!(_003_relative_import { itest!(_003_relative_import {
args: "run --reload 003_relative_import.ts", args: "run --reload 003_relative_import.ts",
output: "tests/003_relative_import.ts.out", output: "003_relative_import.ts.out",
}); });
itest!(_004_set_timeout { itest!(_004_set_timeout {
args: "run --reload 004_set_timeout.ts", args: "run --reload 004_set_timeout.ts",
output: "tests/004_set_timeout.ts.out", output: "004_set_timeout.ts.out",
}); });
itest!(_005_more_imports { itest!(_005_more_imports {
args: "run --reload 005_more_imports.ts", args: "run --reload 005_more_imports.ts",
output: "tests/005_more_imports.ts.out", output: "005_more_imports.ts.out",
}); });
itest!(_006_url_imports { itest!(_006_url_imports {
args: "run --reload 006_url_imports.ts", args: "run --reload 006_url_imports.ts",
output: "tests/006_url_imports.ts.out", output: "006_url_imports.ts.out",
http_server: true,
}); });
itest!(_012_async { itest!(_012_async {
args: "run --reload 012_async.ts", args: "run --reload 012_async.ts",
output: "tests/012_async.ts.out", output: "012_async.ts.out",
}); });
itest!(_013_dynamic_import { itest!(_013_dynamic_import {
args: "013_dynamic_import.ts --reload --allow-read", args: "013_dynamic_import.ts --reload --allow-read",
output: "tests/013_dynamic_import.ts.out", output: "013_dynamic_import.ts.out",
}); });
itest!(_014_duplicate_import { itest!(_014_duplicate_import {
args: "014_duplicate_import.ts --reload --allow-read", args: "014_duplicate_import.ts --reload --allow-read",
output: "tests/014_duplicate_import.ts.out", output: "014_duplicate_import.ts.out",
}); });
itest!(_015_duplicate_parallel_import { itest!(_015_duplicate_parallel_import {
args: "015_duplicate_parallel_import.js --reload --allow-read", args: "015_duplicate_parallel_import.js --reload --allow-read",
output: "tests/015_duplicate_parallel_import.js.out", output: "015_duplicate_parallel_import.js.out",
}); });
itest!(_016_double_await { itest!(_016_double_await {
args: "run --allow-read --reload 016_double_await.ts", args: "run --allow-read --reload 016_double_await.ts",
output: "tests/016_double_await.ts.out", output: "016_double_await.ts.out",
}); });
itest!(_017_import_redirect { itest!(_017_import_redirect {
args: "run --reload 017_import_redirect.ts", args: "run --reload 017_import_redirect.ts",
output: "tests/017_import_redirect.ts.out", output: "017_import_redirect.ts.out",
}); });
itest!(_018_async_catch { itest!(_018_async_catch {
args: "run --reload 018_async_catch.ts", args: "run --reload 018_async_catch.ts",
output: "tests/018_async_catch.ts.out", output: "018_async_catch.ts.out",
}); });
itest!(_019_media_types { itest!(_019_media_types {
args: "run --reload 019_media_types.ts", args: "run --reload 019_media_types.ts",
output: "tests/019_media_types.ts.out", output: "019_media_types.ts.out",
http_server: true,
}); });
itest!(_020_json_modules { itest!(_020_json_modules {
args: "run --reload 020_json_modules.ts", args: "run --reload 020_json_modules.ts",
output: "tests/020_json_modules.ts.out", output: "020_json_modules.ts.out",
}); });
itest!(_021_mjs_modules { itest!(_021_mjs_modules {
args: "run --reload 021_mjs_modules.ts", args: "run --reload 021_mjs_modules.ts",
output: "tests/021_mjs_modules.ts.out", output: "021_mjs_modules.ts.out",
}); });
itest!(_022_info_flag_script { itest!(_022_info_flag_script {
args: "info http://127.0.0.1:4545/tests/019_media_types.ts", args: "info http://127.0.0.1:4545/cli/tests/019_media_types.ts",
output: "tests/022_info_flag_script.out", output: "022_info_flag_script.out",
http_server: true,
}); });
itest!(_023_no_ext_with_headers { itest!(_023_no_ext_with_headers {
args: "run --reload 023_no_ext_with_headers", args: "run --reload 023_no_ext_with_headers",
output: "tests/023_no_ext_with_headers.out", output: "023_no_ext_with_headers.out",
}); });
// FIXME(bartlomieju): this test should use remote file // FIXME(bartlomieju): this test should use remote file
// itest!(_024_import_no_ext_with_headers { // itest!(_024_import_no_ext_with_headers {
// args: "run --reload 024_import_no_ext_with_headers.ts", // args: "run --reload 024_import_no_ext_with_headers.ts",
// output: "tests/024_import_no_ext_with_headers.ts.out", // output: "024_import_no_ext_with_headers.ts.out",
// }); // });
itest!(_025_hrtime { itest!(_025_hrtime {
args: "run --allow-hrtime --reload 025_hrtime.ts", args: "run --allow-hrtime --reload 025_hrtime.ts",
output: "tests/025_hrtime.ts.out", output: "025_hrtime.ts.out",
}); });
itest!(_025_reload_js_type_error { itest!(_025_reload_js_type_error {
args: "run --reload 025_reload_js_type_error.js", args: "run --reload 025_reload_js_type_error.js",
output: "tests/025_reload_js_type_error.js.out", output: "025_reload_js_type_error.js.out",
}); });
itest!(_026_redirect_javascript { itest!(_026_redirect_javascript {
args: "run --reload 026_redirect_javascript.js", args: "run --reload 026_redirect_javascript.js",
output: "tests/026_redirect_javascript.js.out", output: "026_redirect_javascript.js.out",
http_server: true,
}); });
itest!(_026_workers { itest!(_026_workers {
args: "run --reload 026_workers.ts", args: "run --reload 026_workers.ts",
output: "tests/026_workers.ts.out", output: "026_workers.ts.out",
}); });
itest!(_027_redirect_typescript { itest!(_027_redirect_typescript {
args: "run --reload 027_redirect_typescript.ts", args: "run --reload 027_redirect_typescript.ts",
output: "tests/027_redirect_typescript.ts.out", output: "027_redirect_typescript.ts.out",
http_server: true,
}); });
itest!(_028_args { itest!(_028_args {
args: "run --reload 028_args.ts --arg1 val1 --arg2=val2 -- arg3 arg4", args: "run --reload 028_args.ts --arg1 val1 --arg2=val2 -- arg3 arg4",
output: "tests/028_args.ts.out", output: "028_args.ts.out",
}); });
itest!(_029_eval { itest!(_029_eval {
args: "eval console.log(\"hello\")", args: "eval console.log(\"hello\")",
output: "tests/029_eval.out", output: "029_eval.out",
}); });
itest!(_030_xeval { itest!(_030_xeval {
args: "xeval console.log($.toUpperCase())", args: "xeval console.log($.toUpperCase())",
input: Some("a\nb\n\nc"), input: Some("a\nb\n\nc"),
output: "tests/030_xeval.out", output: "030_xeval.out",
}); });
itest!(_031_xeval_replvar { itest!(_031_xeval_replvar {
args: "xeval -I val console.log(val.toUpperCase());", args: "xeval -I val console.log(val.toUpperCase());",
input: Some("a\nb\n\nc"), input: Some("a\nb\n\nc"),
output: "tests/031_xeval_replvar.out", output: "031_xeval_replvar.out",
}); });
itest!(_032_xeval_delim { itest!(_032_xeval_delim {
args: "xeval -d DELIM console.log($.toUpperCase());", args: "xeval -d DELIM console.log($.toUpperCase());",
input: Some("aDELIMbDELIMDELIMc"), input: Some("aDELIMbDELIMDELIMc"),
output: "tests/032_xeval_delim.out", output: "032_xeval_delim.out",
}); });
itest!(_033_import_map { itest!(_033_import_map {
args: args:
"run --reload --importmap=importmaps/import_map.json importmaps/test.ts", "run --reload --importmap=importmaps/import_map.json importmaps/test.ts",
output: "tests/033_import_map.out", output: "033_import_map.out",
}); });
itest!(_034_onload { itest!(_034_onload {
args: "run --reload 034_onload/main.ts", args: "run --reload 034_onload/main.ts",
output: "tests/034_onload.out", output: "034_onload.out",
}); });
itest!(_035_no_fetch_flag { itest!(_035_no_fetch_flag {
args: "--reload --no-fetch http://127.0.0.1:4545/tests/019_media_types.ts", args:
output: "tests/035_no_fetch_flag.out", "--reload --no-fetch http://127.0.0.1:4545/cli/tests/019_media_types.ts",
output: "035_no_fetch_flag.out",
exit_code: 1, exit_code: 1,
check_stderr: true, check_stderr: true,
http_server: true,
}); });
itest!(_036_import_map_fetch { itest!(_036_import_map_fetch {
args: args:
"fetch --reload --importmap=importmaps/import_map.json importmaps/test.ts", "fetch --reload --importmap=importmaps/import_map.json importmaps/test.ts",
output: "tests/036_import_map_fetch.out", output: "036_import_map_fetch.out",
}); });
itest!(_037_current_thread { itest!(_037_current_thread {
args: "run --current-thread --reload 034_onload/main.ts", args: "run --current-thread --reload 034_onload/main.ts",
output: "tests/034_onload.out", output: "034_onload.out",
}); });
itest!(_038_checkjs { itest!(_038_checkjs {
@ -208,72 +276,72 @@ itest!(_038_checkjs {
args: "run --reload --config 038_checkjs.tsconfig.json 038_checkjs.js", args: "run --reload --config 038_checkjs.tsconfig.json 038_checkjs.js",
check_stderr: true, check_stderr: true,
exit_code: 1, exit_code: 1,
output: "tests/038_checkjs.js.out", output: "038_checkjs.js.out",
}); });
itest!(_039_worker_deno_ns { itest!(_039_worker_deno_ns {
args: "run --reload 039_worker_deno_ns.ts", args: "run --reload 039_worker_deno_ns.ts",
output: "tests/039_worker_deno_ns.ts.out", output: "039_worker_deno_ns.ts.out",
}); });
itest!(_040_worker_blob { itest!(_040_worker_blob {
args: "run --reload 040_worker_blob.ts", args: "run --reload 040_worker_blob.ts",
output: "tests/040_worker_blob.ts.out", output: "040_worker_blob.ts.out",
}); });
itest!(_041_dyn_import_eval { itest!(_041_dyn_import_eval {
args: "eval import('./subdir/mod4.js').then(console.log)", args: "eval import('./subdir/mod4.js').then(console.log)",
output: "tests/041_dyn_import_eval.out", output: "041_dyn_import_eval.out",
}); });
itest!(_041_info_flag { itest!(_041_info_flag {
args: "info", args: "info",
output: "tests/041_info_flag.out", output: "041_info_flag.out",
}); });
itest!(_042_dyn_import_evalcontext { itest!(_042_dyn_import_evalcontext {
args: "run --allow-read --reload 042_dyn_import_evalcontext.ts", args: "run --allow-read --reload 042_dyn_import_evalcontext.ts",
output: "tests/042_dyn_import_evalcontext.ts.out", output: "042_dyn_import_evalcontext.ts.out",
}); });
itest!(async_error { itest!(async_error {
exit_code: 1, exit_code: 1,
args: "run --reload async_error.ts", args: "run --reload async_error.ts",
check_stderr: true, check_stderr: true,
output: "tests/async_error.ts.out", output: "async_error.ts.out",
}); });
itest!(circular1 { itest!(circular1 {
args: "run --reload circular1.js", args: "run --reload circular1.js",
output: "tests/circular1.js.out", output: "circular1.js.out",
}); });
itest!(config { itest!(config {
args: "run --reload --config config.tsconfig.json config.ts", args: "run --reload --config config.tsconfig.json config.ts",
check_stderr: true, check_stderr: true,
exit_code: 1, exit_code: 1,
output: "tests/config.ts.out", output: "config.ts.out",
}); });
itest!(error_001 { itest!(error_001 {
args: "run --reload error_001.ts", args: "run --reload error_001.ts",
check_stderr: true, check_stderr: true,
exit_code: 1, exit_code: 1,
output: "tests/error_001.ts.out", output: "error_001.ts.out",
}); });
itest!(error_002 { itest!(error_002 {
args: "run --reload error_002.ts", args: "run --reload error_002.ts",
check_stderr: true, check_stderr: true,
exit_code: 1, exit_code: 1,
output: "tests/error_002.ts.out", output: "error_002.ts.out",
}); });
itest!(error_003_typescript { itest!(error_003_typescript {
args: "run --reload error_003_typescript.ts", args: "run --reload error_003_typescript.ts",
check_stderr: true, check_stderr: true,
exit_code: 1, exit_code: 1,
output: "tests/error_003_typescript.ts.out", output: "error_003_typescript.ts.out",
}); });
// Supposing that we've already attempted to run error_003_typescript.ts // Supposing that we've already attempted to run error_003_typescript.ts
@ -284,363 +352,187 @@ itest!(error_003_typescript2 {
args: "run error_003_typescript.ts", args: "run error_003_typescript.ts",
check_stderr: true, check_stderr: true,
exit_code: 1, exit_code: 1,
output: "tests/error_003_typescript.ts.out", output: "error_003_typescript.ts.out",
}); });
itest!(error_004_missing_module { itest!(error_004_missing_module {
args: "run --reload error_004_missing_module.ts", args: "run --reload error_004_missing_module.ts",
check_stderr: true, check_stderr: true,
exit_code: 1, exit_code: 1,
output: "tests/error_004_missing_module.ts.out", output: "error_004_missing_module.ts.out",
}); });
itest!(error_005_missing_dynamic_import { itest!(error_005_missing_dynamic_import {
args: "run --reload error_005_missing_dynamic_import.ts", args: "run --reload error_005_missing_dynamic_import.ts",
check_stderr: true, check_stderr: true,
exit_code: 1, exit_code: 1,
output: "tests/error_005_missing_dynamic_import.ts.out", output: "error_005_missing_dynamic_import.ts.out",
}); });
itest!(error_006_import_ext_failure { itest!(error_006_import_ext_failure {
args: "run --reload error_006_import_ext_failure.ts", args: "run --reload error_006_import_ext_failure.ts",
check_stderr: true, check_stderr: true,
exit_code: 1, exit_code: 1,
output: "tests/error_006_import_ext_failure.ts.out", output: "error_006_import_ext_failure.ts.out",
}); });
itest!(error_007_any { itest!(error_007_any {
args: "run --reload error_007_any.ts", args: "run --reload error_007_any.ts",
check_stderr: true, check_stderr: true,
exit_code: 1, exit_code: 1,
output: "tests/error_007_any.ts.out", output: "error_007_any.ts.out",
}); });
itest!(error_008_checkjs { itest!(error_008_checkjs {
args: "run --reload error_008_checkjs.js", args: "run --reload error_008_checkjs.js",
check_stderr: true, check_stderr: true,
exit_code: 1, exit_code: 1,
output: "tests/error_008_checkjs.js.out", output: "error_008_checkjs.js.out",
}); });
itest!(error_011_bad_module_specifier { itest!(error_011_bad_module_specifier {
args: "run --reload error_011_bad_module_specifier.ts", args: "run --reload error_011_bad_module_specifier.ts",
check_stderr: true, check_stderr: true,
exit_code: 1, exit_code: 1,
output: "tests/error_011_bad_module_specifier.ts.out", output: "error_011_bad_module_specifier.ts.out",
}); });
itest!(error_012_bad_dynamic_import_specifier { itest!(error_012_bad_dynamic_import_specifier {
args: "run --reload error_012_bad_dynamic_import_specifier.ts", args: "run --reload error_012_bad_dynamic_import_specifier.ts",
check_stderr: true, check_stderr: true,
exit_code: 1, exit_code: 1,
output: "tests/error_012_bad_dynamic_import_specifier.ts.out", output: "error_012_bad_dynamic_import_specifier.ts.out",
}); });
itest!(error_013_missing_script { itest!(error_013_missing_script {
args: "run --reload missing_file_name", args: "run --reload missing_file_name",
check_stderr: true, check_stderr: true,
exit_code: 1, exit_code: 1,
output: "tests/error_013_missing_script.out", output: "error_013_missing_script.out",
}); });
itest!(error_014_catch_dynamic_import_error { itest!(error_014_catch_dynamic_import_error {
args: "error_014_catch_dynamic_import_error.js --reload --allow-read", args: "error_014_catch_dynamic_import_error.js --reload --allow-read",
output: "tests/error_014_catch_dynamic_import_error.js.out", output: "error_014_catch_dynamic_import_error.js.out",
}); });
itest!(error_015_dynamic_import_permissions { itest!(error_015_dynamic_import_permissions {
args: "--reload --no-prompt error_015_dynamic_import_permissions.js", args: "--reload --no-prompt error_015_dynamic_import_permissions.js",
output: "tests/error_015_dynamic_import_permissions.out", output: "error_015_dynamic_import_permissions.out",
check_stderr: true, check_stderr: true,
exit_code: 1, exit_code: 1,
http_server: true,
}); });
// We have an allow-net flag but not allow-read, it should still result in error. // We have an allow-net flag but not allow-read, it should still result in error.
itest!(error_016_dynamic_import_permissions2 { itest!(error_016_dynamic_import_permissions2 {
args: args:
"--no-prompt --reload --allow-net error_016_dynamic_import_permissions2.js", "--no-prompt --reload --allow-net error_016_dynamic_import_permissions2.js",
output: "tests/error_016_dynamic_import_permissions2.out", output: "error_016_dynamic_import_permissions2.out",
check_stderr: true, check_stderr: true,
exit_code: 1, exit_code: 1,
http_server: true,
}); });
itest!(error_stack { itest!(error_stack {
args: "run --reload error_stack.ts", args: "run --reload error_stack.ts",
check_stderr: true, check_stderr: true,
exit_code: 1, exit_code: 1,
output: "tests/error_stack.ts.out", output: "error_stack.ts.out",
}); });
itest!(error_syntax { itest!(error_syntax {
args: "run --reload error_syntax.js", args: "run --reload error_syntax.js",
check_stderr: true, check_stderr: true,
exit_code: 1, exit_code: 1,
output: "tests/error_syntax.js.out", output: "error_syntax.js.out",
}); });
itest!(error_type_definitions { itest!(error_type_definitions {
args: "run --reload error_type_definitions.ts", args: "run --reload error_type_definitions.ts",
check_stderr: true, check_stderr: true,
exit_code: 1, exit_code: 1,
output: "tests/error_type_definitions.ts.out", output: "error_type_definitions.ts.out",
}); });
itest!(exit_error42 { itest!(exit_error42 {
exit_code: 42, exit_code: 42,
args: "run --reload exit_error42.ts", args: "run --reload exit_error42.ts",
output: "tests/exit_error42.ts.out", output: "exit_error42.ts.out",
}); });
itest!(https_import { itest!(https_import {
args: "run --reload https_import.ts", args: "run --reload https_import.ts",
output: "tests/https_import.ts.out", output: "https_import.ts.out",
}); });
itest!(if_main { itest!(if_main {
args: "run --reload if_main.ts", args: "run --reload if_main.ts",
output: "tests/if_main.ts.out", output: "if_main.ts.out",
}); });
itest!(import_meta { itest!(import_meta {
args: "run --reload import_meta.ts", args: "run --reload import_meta.ts",
output: "tests/import_meta.ts.out", output: "import_meta.ts.out",
}); });
itest!(seed_random { itest!(seed_random {
args: "run --seed=100 seed_random.js", args: "run --seed=100 seed_random.js",
output: "tests/seed_random.js.out", output: "seed_random.js.out",
}); });
itest!(type_definitions { itest!(type_definitions {
args: "run --reload type_definitions.ts", args: "run --reload type_definitions.ts",
output: "tests/type_definitions.ts.out", output: "type_definitions.ts.out",
}); });
itest!(types { itest!(types {
args: "types", args: "types",
output: "tests/types.out", output: "types.out",
}); });
itest!(unbuffered_stderr { itest!(unbuffered_stderr {
args: "run --reload unbuffered_stderr.ts", args: "run --reload unbuffered_stderr.ts",
check_stderr: true, check_stderr: true,
output: "tests/unbuffered_stderr.ts.out", output: "unbuffered_stderr.ts.out",
}); });
itest!(unbuffered_stdout { itest!(unbuffered_stdout {
args: "run --reload unbuffered_stdout.ts", args: "run --reload unbuffered_stdout.ts",
output: "tests/unbuffered_stdout.ts.out", output: "unbuffered_stdout.ts.out",
}); });
itest!(v8_flags { itest!(v8_flags {
args: "run --v8-flags=--expose-gc v8_flags.js", args: "run --v8-flags=--expose-gc v8_flags.js",
output: "tests/v8_flags.js.out", output: "v8_flags.js.out",
}); });
itest!(v8_help { itest!(v8_help {
args: "--v8-options", args: "--v8-options",
output: "tests/v8_help.out", output: "v8_help.out",
}); });
itest!(version { itest!(version {
args: "version", args: "version",
output: "tests/version.out", output: "version.out",
}); });
itest!(version_long_flag { itest!(version_long_flag {
args: "--version", args: "--version",
output: "tests/version.out", output: "version.out",
}); });
itest!(version_short_flag { itest!(version_short_flag {
args: "-v", args: "-v",
output: "tests/version.out", output: "version.out",
}); });
itest!(wasm { itest!(wasm {
args: "run wasm.ts", args: "run wasm.ts",
output: "tests/wasm.ts.out", output: "wasm.ts.out",
}); });
itest!(wasm_async { itest!(wasm_async {
args: "wasm_async.js", args: "wasm_async.js",
output: "tests/wasm_async.out", output: "wasm_async.out",
}); });
///////////////////////////
#[derive(Debug, Default)]
struct IntegrationTest {
args: &'static str,
output: &'static str,
input: Option<&'static str>,
exit_code: i32,
check_stderr: bool,
}
impl IntegrationTest {
pub fn run(&self) {
let args = self.args.split_whitespace();
let root = PathBuf::from(concat!(env!("CARGO_MANIFEST_DIR"), "/.."));
let mut target = "debug";
if let Ok(build_mode) = env::var("DENO_BUILD_MODE") {
if build_mode == "release" {
target = "release";
}
}
let bin = root.join(format!("target/{}/deno", target));
debug!("root path {}", root.display());
debug!("bin path {}", bin.display());
let (mut reader, writer) = pipe().unwrap();
let mut command = Command::new(bin);
command.args(args);
command.current_dir(root.join("tests"));
command.stdin(Stdio::piped());
command.stderr(Stdio::null());
if self.check_stderr {
let writer_clone = writer.try_clone().unwrap();
command.stderr(writer_clone);
}
command.stdout(writer);
let mut process = command.spawn().expect("failed to execute process");
if let Some(input) = self.input {
let mut p_stdin = process.stdin.take().unwrap();
write!(p_stdin, "{}", input).unwrap();
}
// Very important when using pipes: This parent process is still
// holding its copies of the write ends, and we have to close them
// before we read, otherwise the read end will never report EOF. The
// Command object owns the writers now, and dropping it closes them.
drop(command);
let mut actual = String::new();
reader.read_to_string(&mut actual).unwrap();
let status = process.wait().expect("failed to finish process");
let exit_code = status.code().unwrap();
actual = strip_ansi_codes(&actual).to_string();
if self.exit_code != exit_code {
println!("OUTPUT\n{}\nOUTPUT", actual);
panic!(
"bad exit code, expected: {:?}, actual: {:?}",
self.exit_code, exit_code
);
}
let output_path = root.join(self.output);
debug!("output path {}", output_path.display());
let expected =
std::fs::read_to_string(output_path).expect("cannot read output");
if !wildcard_match(&expected, &actual) {
println!("OUTPUT\n{}\nOUTPUT", actual);
println!("EXPECTED\n{}\nEXPECTED", expected);
panic!("pattern match failed");
}
}
}
fn wildcard_match(pattern: &str, s: &str) -> bool {
pattern_match(pattern, s, "[WILDCARD]")
}
fn pattern_match(pattern: &str, s: &str, wildcard: &str) -> bool {
// Normalize line endings
let s = s.replace("\r\n", "\n");
let pattern = pattern.replace("\r\n", "\n");
if pattern == wildcard {
return true;
}
let parts = pattern.split(wildcard).collect::<Vec<&str>>();
if parts.len() == 1 {
return pattern == s;
}
if !s.starts_with(parts[0]) {
return false;
}
let mut t = s.split_at(parts[0].len());
for (i, part) in parts.iter().enumerate() {
if i == 0 {
continue;
}
dbg!(part, i);
if i == parts.len() - 1 && (*part == "" || *part == "\n") {
dbg!("exit 1 true", i);
return true;
}
if let Some(found) = t.1.find(*part) {
dbg!("found ", found);
t = t.1.split_at(found + part.len());
} else {
dbg!("exit false ", i);
return false;
}
}
dbg!("end ", t.1.len());
t.1.is_empty()
}
#[test]
fn test_wildcard_match() {
let fixtures = vec![
("foobarbaz", "foobarbaz", true),
("[WILDCARD]", "foobarbaz", true),
("foobar", "foobarbaz", false),
("foo[WILDCARD]baz", "foobarbaz", true),
("foo[WILDCARD]baz", "foobazbar", false),
("foo[WILDCARD]baz[WILDCARD]qux", "foobarbazqatqux", true),
("foo[WILDCARD]", "foobar", true),
("foo[WILDCARD]baz[WILDCARD]", "foobarbazqat", true),
// check with different line endings
("foo[WILDCARD]\nbaz[WILDCARD]\n", "foobar\nbazqat\n", true),
(
"foo[WILDCARD]\nbaz[WILDCARD]\n",
"foobar\r\nbazqat\r\n",
true,
),
(
"foo[WILDCARD]\r\nbaz[WILDCARD]\n",
"foobar\nbazqat\r\n",
true,
),
(
"foo[WILDCARD]\r\nbaz[WILDCARD]\r\n",
"foobar\nbazqat\n",
true,
),
(
"foo[WILDCARD]\r\nbaz[WILDCARD]\r\n",
"foobar\r\nbazqat\r\n",
true,
),
];
// Iterate through the fixture lists, testing each one
for (pattern, string, expected) in fixtures {
let actual = wildcard_match(pattern, string);
dbg!(pattern, string, expected);
assert_eq!(actual, expected);
}
}
#[test]
fn test_pattern_match() {
assert!(pattern_match("foo[BAR]baz", "foobarbaz", "[BAR]"));
assert!(!pattern_match("foo[BAR]baz", "foobazbar", "[BAR]"));
}

18
cli/tests/tty_tests.rs Normal file
View file

@ -0,0 +1,18 @@
// Copyright 2018-2019 the Deno authors. All rights reserved. MIT license.
#[macro_use]
extern crate lazy_static;
extern crate tempfile;
mod util;
use util::*;
// TODO(#2933): Rewrite these tests in rust.
// TODO(ry) These tests can't run in parallel.
#[test]
fn tty_tests() {
let g = http_server();
run_python_script("tools/complex_permissions_test.py");
run_python_script("tools/permission_prompt_test.py");
// TODO(ry) is_tty_test is not passing on travis when run with "cargo test"
// run_python_script("tools/is_tty_test.py");
drop(g);
}

218
cli/tests/util/mod.rs Normal file
View file

@ -0,0 +1,218 @@
//! Test utilites shared between integration_tests.rs and tty_tests.rs
use deno_cli::colors::strip_ansi_codes;
pub use deno_cli::test_util::*;
use os_pipe::pipe;
use std::io::Read;
use std::io::Write;
use std::process::Command;
use std::process::Stdio;
use tempfile::TempDir;
lazy_static! {
static ref DENO_DIR: TempDir = { TempDir::new().expect("tempdir fail") };
}
#[allow(dead_code)]
pub fn deno_cmd() -> Command {
let mut c = Command::new(deno_exe_path());
c.env("DENO_DIR", DENO_DIR.path());
c
}
pub fn run_python_script(script: &str) {
let output = Command::new("python")
.env("DENO_DIR", DENO_DIR.path())
.current_dir(root_path())
.arg(script)
.arg(format!("--executable={}", deno_exe_path().display()))
.env("DENO_BUILD_PATH", target_dir())
.output()
.expect("failed to spawn script");
if !output.status.success() {
let stdout = String::from_utf8(output.stdout).unwrap();
let stderr = String::from_utf8(output.stderr).unwrap();
panic!(
"{} executed with failing error code\n{}{}",
script, stdout, stderr
);
}
}
#[derive(Debug, Default)]
pub struct CheckOutputIntegrationTest {
pub args: &'static str,
pub output: &'static str,
pub input: Option<&'static str>,
pub exit_code: i32,
pub check_stderr: bool,
pub http_server: bool,
}
impl CheckOutputIntegrationTest {
#[allow(dead_code)]
pub fn run(&self) {
let args = self.args.split_whitespace();
let root = root_path();
let deno_exe = deno_exe_path();
println!("root path {}", root.display());
println!("deno_exe path {}", deno_exe.display());
let http_server_guard = if self.http_server {
Some(http_server())
} else {
None
};
let (mut reader, writer) = pipe().unwrap();
let tests_dir = root.join("cli").join("tests");
let mut command = deno_cmd();
command.args(args);
command.current_dir(&tests_dir);
command.stdin(Stdio::piped());
command.stderr(Stdio::null());
if self.check_stderr {
let writer_clone = writer.try_clone().unwrap();
command.stderr(writer_clone);
}
command.stdout(writer);
let mut process = command.spawn().expect("failed to execute process");
if let Some(input) = self.input {
let mut p_stdin = process.stdin.take().unwrap();
write!(p_stdin, "{}", input).unwrap();
}
// Very important when using pipes: This parent process is still
// holding its copies of the write ends, and we have to close them
// before we read, otherwise the read end will never report EOF. The
// Command object owns the writers now, and dropping it closes them.
drop(command);
let mut actual = String::new();
reader.read_to_string(&mut actual).unwrap();
let status = process.wait().expect("failed to finish process");
let exit_code = status.code().unwrap();
drop(http_server_guard);
actual = strip_ansi_codes(&actual).to_string();
if self.exit_code != exit_code {
println!("OUTPUT\n{}\nOUTPUT", actual);
panic!(
"bad exit code, expected: {:?}, actual: {:?}",
self.exit_code, exit_code
);
}
let output_path = tests_dir.join(self.output);
println!("output path {}", output_path.display());
let expected =
std::fs::read_to_string(output_path).expect("cannot read output");
if !wildcard_match(&expected, &actual) {
println!("OUTPUT\n{}\nOUTPUT", actual);
println!("EXPECTED\n{}\nEXPECTED", expected);
panic!("pattern match failed");
}
}
}
fn wildcard_match(pattern: &str, s: &str) -> bool {
pattern_match(pattern, s, "[WILDCARD]")
}
fn pattern_match(pattern: &str, s: &str, wildcard: &str) -> bool {
// Normalize line endings
let s = s.replace("\r\n", "\n");
let pattern = pattern.replace("\r\n", "\n");
if pattern == wildcard {
return true;
}
let parts = pattern.split(wildcard).collect::<Vec<&str>>();
if parts.len() == 1 {
return pattern == s;
}
if !s.starts_with(parts[0]) {
return false;
}
let mut t = s.split_at(parts[0].len());
for (i, part) in parts.iter().enumerate() {
if i == 0 {
continue;
}
dbg!(part, i);
if i == parts.len() - 1 && (*part == "" || *part == "\n") {
dbg!("exit 1 true", i);
return true;
}
if let Some(found) = t.1.find(*part) {
dbg!("found ", found);
t = t.1.split_at(found + part.len());
} else {
dbg!("exit false ", i);
return false;
}
}
dbg!("end ", t.1.len());
t.1.is_empty()
}
#[test]
fn test_wildcard_match() {
let fixtures = vec![
("foobarbaz", "foobarbaz", true),
("[WILDCARD]", "foobarbaz", true),
("foobar", "foobarbaz", false),
("foo[WILDCARD]baz", "foobarbaz", true),
("foo[WILDCARD]baz", "foobazbar", false),
("foo[WILDCARD]baz[WILDCARD]qux", "foobarbazqatqux", true),
("foo[WILDCARD]", "foobar", true),
("foo[WILDCARD]baz[WILDCARD]", "foobarbazqat", true),
// check with different line endings
("foo[WILDCARD]\nbaz[WILDCARD]\n", "foobar\nbazqat\n", true),
(
"foo[WILDCARD]\nbaz[WILDCARD]\n",
"foobar\r\nbazqat\r\n",
true,
),
(
"foo[WILDCARD]\r\nbaz[WILDCARD]\n",
"foobar\nbazqat\r\n",
true,
),
(
"foo[WILDCARD]\r\nbaz[WILDCARD]\r\n",
"foobar\nbazqat\n",
true,
),
(
"foo[WILDCARD]\r\nbaz[WILDCARD]\r\n",
"foobar\r\nbazqat\r\n",
true,
),
];
// Iterate through the fixture lists, testing each one
for (pattern, string, expected) in fixtures {
let actual = wildcard_match(pattern, string);
dbg!(pattern, string, expected);
assert_eq!(actual, expected);
}
}
#[test]
fn test_pattern_match() {
assert!(pattern_match("foo[BAR]baz", "foobarbaz", "[BAR]"));
assert!(!pattern_match("foo[BAR]baz", "foobazbar", "[BAR]"));
}

View file

@ -201,10 +201,11 @@ mod tests {
#[test] #[test]
fn execute_006_url_imports() { fn execute_006_url_imports() {
let http_server_guard = crate::test_util::http_server();
let p = std::path::PathBuf::from(env!("CARGO_MANIFEST_DIR")) let p = std::path::PathBuf::from(env!("CARGO_MANIFEST_DIR"))
.parent() .parent()
.unwrap() .unwrap()
.join("tests/006_url_imports.ts") .join("cli/tests/006_url_imports.ts")
.to_owned(); .to_owned();
let module_specifier = let module_specifier =
ModuleSpecifier::resolve_url_or_path(&p.to_string_lossy()).unwrap(); ModuleSpecifier::resolve_url_or_path(&p.to_string_lossy()).unwrap();
@ -232,6 +233,7 @@ mod tests {
assert_eq!(metrics.resolve_count.load(Ordering::SeqCst), 3); assert_eq!(metrics.resolve_count.load(Ordering::SeqCst), 3);
// Check that we've only invoked the compiler once. // Check that we've only invoked the compiler once.
assert_eq!(metrics.compiler_starts.load(Ordering::SeqCst), 1); assert_eq!(metrics.compiler_starts.load(Ordering::SeqCst), 1);
drop(http_server_guard);
} }
fn create_test_worker() -> Worker { fn create_test_worker() -> Worker {

View file

@ -15,8 +15,7 @@ import errno
from shutil import copytree, ignore_patterns, copyfile from shutil import copytree, ignore_patterns, copyfile
from tempfile import mkdtemp from tempfile import mkdtemp
from string import Template from string import Template
from util import root_path from util import root_path, run
from util import run
if sys.platform == "linux2": if sys.platform == "linux2":
llvm_target = "x86_64-unknown-linux-gnu" llvm_target = "x86_64-unknown-linux-gnu"

View file

@ -29,7 +29,7 @@ class BaseReadWritePermissionsTest(object):
def test_inside_project_dir(self): def test_inside_project_dir(self):
code, _stdout, stderr = self._run_deno( code, _stdout, stderr = self._run_deno(
["--allow-" + self.test_type + "=" + root_path], ["--allow-" + self.test_type + "=" + root_path],
[self.test_type, "package.json", "tests/subdir/config.json"]) [self.test_type, "package.json", "cli/tests/subdir/config.json"])
assert code == 0 assert code == 0
assert PROMPT_PATTERN not in stderr assert PROMPT_PATTERN not in stderr
assert PERMISSION_DENIED_PATTERN not in stderr assert PERMISSION_DENIED_PATTERN not in stderr
@ -37,7 +37,7 @@ class BaseReadWritePermissionsTest(object):
def test_outside_test_dir(self): def test_outside_test_dir(self):
code, _stdout, stderr = self._run_deno([ code, _stdout, stderr = self._run_deno([
"--allow-" + self.test_type + "=" + os.path.join( "--allow-" + self.test_type + "=" + os.path.join(
root_path, "tests") root_path, "cli/tests")
], [self.test_type, "package.json"]) ], [self.test_type, "package.json"])
assert code == 1 assert code == 1
assert PROMPT_PATTERN not in stderr assert PROMPT_PATTERN not in stderr
@ -46,8 +46,8 @@ class BaseReadWritePermissionsTest(object):
def test_inside_test_dir(self): def test_inside_test_dir(self):
code, _stdout, stderr = self._run_deno([ code, _stdout, stderr = self._run_deno([
"--allow-" + self.test_type + "=" + os.path.join( "--allow-" + self.test_type + "=" + os.path.join(
root_path, "tests") root_path, "cli/tests")
], [self.test_type, "tests/subdir/config.json"]) ], [self.test_type, "cli/tests/subdir/config.json"])
assert code == 0 assert code == 0
assert PROMPT_PATTERN not in stderr assert PROMPT_PATTERN not in stderr
assert PERMISSION_DENIED_PATTERN not in stderr assert PERMISSION_DENIED_PATTERN not in stderr
@ -55,7 +55,7 @@ class BaseReadWritePermissionsTest(object):
def test_outside_test_and_js_dir(self): def test_outside_test_and_js_dir(self):
code, _stdout, stderr = self._run_deno([ code, _stdout, stderr = self._run_deno([
"--allow-" + self.test_type + "=" + os.path.join( "--allow-" + self.test_type + "=" + os.path.join(
root_path, "tests") + "," + os.path.join(root_path, "js") root_path, "cli/tests") + "," + os.path.join(root_path, "js")
], [self.test_type, "package.json"]) ], [self.test_type, "package.json"])
assert code == 1 assert code == 1
assert PROMPT_PATTERN not in stderr assert PROMPT_PATTERN not in stderr
@ -64,8 +64,8 @@ class BaseReadWritePermissionsTest(object):
def test_inside_test_and_js_dir(self): def test_inside_test_and_js_dir(self):
code, _stdout, stderr = self._run_deno([ code, _stdout, stderr = self._run_deno([
"--allow-" + self.test_type + "=" + os.path.join( "--allow-" + self.test_type + "=" + os.path.join(
root_path, "tests") + "," + os.path.join(root_path, "js") root_path, "cli/tests") + "," + os.path.join(root_path, "js")
], [self.test_type, "js/dir_test.ts", "tests/subdir/config.json"]) ], [self.test_type, "js/dir_test.ts", "cli/tests/subdir/config.json"])
assert code == 0 assert code == 0
assert PROMPT_PATTERN not in stderr assert PROMPT_PATTERN not in stderr
assert PERMISSION_DENIED_PATTERN not in stderr assert PERMISSION_DENIED_PATTERN not in stderr
@ -75,8 +75,8 @@ class BaseReadWritePermissionsTest(object):
saved_curdir = os.getcwd() saved_curdir = os.getcwd()
os.chdir(root_path) os.chdir(root_path)
code, _stdout, stderr = self._run_deno( code, _stdout, stderr = self._run_deno(
["--allow-" + self.test_type + "=" + "./tests"], ["--allow-" + self.test_type + "=" + "./cli/tests"],
[self.test_type, "tests/subdir/config.json"]) [self.test_type, "cli/tests/subdir/config.json"])
assert code == 0 assert code == 0
assert PROMPT_PATTERN not in stderr assert PROMPT_PATTERN not in stderr
assert PERMISSION_DENIED_PATTERN not in stderr assert PERMISSION_DENIED_PATTERN not in stderr
@ -87,8 +87,8 @@ class BaseReadWritePermissionsTest(object):
saved_curdir = os.getcwd() saved_curdir = os.getcwd()
os.chdir(root_path) os.chdir(root_path)
code, _stdout, stderr = self._run_deno( code, _stdout, stderr = self._run_deno(
["--allow-" + self.test_type + "=" + "tests"], ["--allow-" + self.test_type + "=" + "cli/tests"],
[self.test_type, "tests/subdir/config.json"]) [self.test_type, "cli/tests/subdir/config.json"])
assert code == 0 assert code == 0
assert PROMPT_PATTERN not in stderr assert PROMPT_PATTERN not in stderr
assert PERMISSION_DENIED_PATTERN not in stderr assert PERMISSION_DENIED_PATTERN not in stderr
@ -215,5 +215,4 @@ def complex_permissions_tests():
if __name__ == "__main__": if __name__ == "__main__":
with http_server.spawn(): run_tests()
run_tests()

View file

@ -29,5 +29,4 @@ class TestFetch(DenoTestCase):
if __name__ == "__main__": if __name__ == "__main__":
with http_server.spawn(): run_tests()
run_tests()

View file

@ -127,9 +127,9 @@ def generate_gn_args(mode):
if "DENO_BUILD_ARGS" in os.environ: if "DENO_BUILD_ARGS" in os.environ:
out += os.environ["DENO_BUILD_ARGS"].split() out += os.environ["DENO_BUILD_ARGS"].split()
cacher = third_party.get_prebuilt_tool_path("sccache") cacher = find_executable("sccache")
if not os.path.exists(cacher): if not os.path.exists(cacher):
cacher = find_executable("sccache") or find_executable("ccache") cacher = third_party.get_prebuilt_tool_path("sccache")
# Check if ccache or sccache are in the path, and if so we set cc_wrapper. # Check if ccache or sccache are in the path, and if so we set cc_wrapper.
cc_wrapper = cacher cc_wrapper = cacher

View file

@ -21,13 +21,6 @@ class TestTarget(DenoTestCase):
self.check_exists(bin_file) self.check_exists(bin_file)
run([bin_file], quiet=True) run([bin_file], quiet=True)
def test_cargo_test(self):
cargo_test = ["cargo", "test", "--all", "--locked"]
if build_mode() == "release":
run(cargo_test + ["--release"])
else:
run(cargo_test)
def test_libdeno(self): def test_libdeno(self):
self._test("libdeno_test") self._test("libdeno_test")

View file

@ -1,62 +0,0 @@
#!/usr/bin/env python
# Copyright 2018-2019 the Deno authors. All rights reserved. MIT license.
# Runs the full test suite.
# Usage: ./tools/test.py out/Debug
import os
from benchmark_test import TestBenchmark
from deno_dir_test import TestDenoDir
from fetch_test import TestFetch
from fmt_test import TestFmt
from repl_test import TestRepl
from setup_test import TestSetup
from target_test import TestTarget
from unit_tests import JsUnitTests
from util_test import TestUtil
# NOTE: These tests are skipped on Windows
from is_tty_test import TestIsTty
from permission_prompt_test import permission_prompt_tests
from complex_permissions_test import complex_permissions_tests
import http_server
from util import (enable_ansi_colors, build_path, RESET, FG_RED, FG_GREEN,
executable_suffix, rmtree, tests_path)
from test_util import parse_test_args, run_tests
def main():
args = parse_test_args()
deno_dir = os.path.join(args.build_dir, ".deno_test")
if os.path.isdir(deno_dir):
rmtree(deno_dir)
os.environ["DENO_DIR"] = deno_dir
enable_ansi_colors()
test_cases = [
TestSetup,
TestUtil,
TestTarget,
JsUnitTests,
TestFetch,
TestRepl,
TestDenoDir,
TestBenchmark,
]
# TODO(ry) This test isn't working yet on github actions.
if "GH_ACTIONS" not in os.environ:
test_cases += [TestIsTty]
test_cases += permission_prompt_tests()
test_cases += complex_permissions_tests()
# It is very slow, so do TestFmt at the end.
test_cases += [TestFmt]
with http_server.spawn():
run_tests(test_cases)
if __name__ == '__main__':
main()

View file

@ -1,28 +0,0 @@
#!/usr/bin/env python
# Copyright 2018-2019 the Deno authors. All rights reserved. MIT license.
import sys
import subprocess
import http_server
from test_util import DenoTestCase, run_tests
class JsUnitTests(DenoTestCase):
def test_unit_test_runner(self):
cmd = [
self.deno_exe, "run", "--reload", "--allow-run", "--allow-env",
"js/unit_test_runner.ts"
]
process = subprocess.Popen(
cmd, bufsize=1, universal_newlines=True, stderr=subprocess.STDOUT)
process.wait()
errcode = process.returncode
if errcode != 0:
raise AssertionError(
"js/unit_test_runner.ts exited with exit code %s" % errcode)
if __name__ == '__main__':
with http_server.spawn():
run_tests()

View file

@ -167,7 +167,7 @@ cargo build -vv
./target/debug/deno tests/002_hello.ts ./target/debug/deno tests/002_hello.ts
# Test. # Test.
./tools/test.py cargo test
# Format code. # Format code.
./tools/format.py ./tools/format.py
@ -1148,7 +1148,7 @@ Before submitting, please make sure the following is done:
1. That there is a related issue and it is referenced in the PR text. 1. That there is a related issue and it is referenced in the PR text.
2. There are tests that cover the changes. 2. There are tests that cover the changes.
3. Ensure `./tools/test.py` passes. 3. Ensure `cargo test` passes.
4. Format your code with `tools/format.py` 4. Format your code with `tools/format.py`
5. Make sure `./tools/lint.py` passes. 5. Make sure `./tools/lint.py` passes.