mirror of
https://github.com/denoland/deno
synced 2024-11-05 18:45:24 +00:00
159 lines
4.5 KiB
Rust
159 lines
4.5 KiB
Rust
// Copyright 2018-2019 the Deno authors. All rights reserved. MIT license.
|
|
use crate::deno_dir;
|
|
use crate::errors::DenoResult;
|
|
use crate::flags;
|
|
use crate::global_timer::GlobalTimer;
|
|
use crate::modules::Modules;
|
|
use crate::permissions::DenoPermissions;
|
|
use deno_core::deno_mod;
|
|
use deno_core::Buf;
|
|
use futures::sync::mpsc as async_mpsc;
|
|
use std;
|
|
use std::env;
|
|
use std::sync::atomic::{AtomicUsize, Ordering};
|
|
use std::sync::Arc;
|
|
use std::sync::Mutex;
|
|
|
|
pub type WorkerSender = async_mpsc::Sender<Buf>;
|
|
pub type WorkerReceiver = async_mpsc::Receiver<Buf>;
|
|
pub type WorkerChannels = (WorkerSender, WorkerReceiver);
|
|
|
|
// AtomicU64 is currently unstable
|
|
#[derive(Default)]
|
|
pub struct Metrics {
|
|
pub ops_dispatched: AtomicUsize,
|
|
pub ops_completed: AtomicUsize,
|
|
pub bytes_sent_control: AtomicUsize,
|
|
pub bytes_sent_data: AtomicUsize,
|
|
pub bytes_received: AtomicUsize,
|
|
pub resolve_count: AtomicUsize,
|
|
}
|
|
|
|
// Isolate cannot be passed between threads but IsolateState can.
|
|
// IsolateState satisfies Send and Sync.
|
|
// So any state that needs to be accessed outside the main V8 thread should be
|
|
// inside IsolateState.
|
|
#[cfg_attr(feature = "cargo-clippy", allow(stutter))]
|
|
pub struct IsolateState {
|
|
pub dir: deno_dir::DenoDir,
|
|
pub argv: Vec<String>,
|
|
pub permissions: DenoPermissions,
|
|
pub flags: flags::DenoFlags,
|
|
pub metrics: Metrics,
|
|
pub modules: Mutex<Modules>,
|
|
pub worker_channels: Option<Mutex<WorkerChannels>>,
|
|
pub global_timer: Mutex<GlobalTimer>,
|
|
}
|
|
|
|
impl IsolateState {
|
|
pub fn new(
|
|
flags: flags::DenoFlags,
|
|
argv_rest: Vec<String>,
|
|
worker_channels: Option<WorkerChannels>,
|
|
) -> Self {
|
|
let custom_root = env::var("DENO_DIR").map(|s| s.into()).ok();
|
|
|
|
Self {
|
|
dir: deno_dir::DenoDir::new(flags.reload, flags.recompile, custom_root)
|
|
.unwrap(),
|
|
argv: argv_rest,
|
|
permissions: DenoPermissions::from_flags(&flags),
|
|
flags,
|
|
metrics: Metrics::default(),
|
|
modules: Mutex::new(Modules::new()),
|
|
worker_channels: worker_channels.map(Mutex::new),
|
|
global_timer: Mutex::new(GlobalTimer::new()),
|
|
}
|
|
}
|
|
|
|
pub fn main_module(&self) -> Option<String> {
|
|
if self.argv.len() <= 1 {
|
|
None
|
|
} else {
|
|
let specifier = self.argv[1].clone();
|
|
let referrer = ".";
|
|
match self.dir.resolve_module_url(&specifier, referrer) {
|
|
Ok(url) => Some(url.to_string()),
|
|
Err(e) => {
|
|
debug!("Potentially swallowed error {}", e);
|
|
None
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
#[inline]
|
|
pub fn check_read(&self, filename: &str) -> DenoResult<()> {
|
|
self.permissions.check_read(filename)
|
|
}
|
|
|
|
#[inline]
|
|
pub fn check_write(&self, filename: &str) -> DenoResult<()> {
|
|
self.permissions.check_write(filename)
|
|
}
|
|
|
|
#[inline]
|
|
pub fn check_env(&self) -> DenoResult<()> {
|
|
self.permissions.check_env()
|
|
}
|
|
|
|
#[inline]
|
|
pub fn check_net(&self, filename: &str) -> DenoResult<()> {
|
|
self.permissions.check_net(filename)
|
|
}
|
|
|
|
#[inline]
|
|
pub fn check_run(&self) -> DenoResult<()> {
|
|
self.permissions.check_run()
|
|
}
|
|
|
|
#[cfg(test)]
|
|
pub fn mock() -> IsolateState {
|
|
let argv = vec![String::from("./deno"), String::from("hello.js")];
|
|
// For debugging: argv.push_back(String::from("-D"));
|
|
let (flags, rest_argv, _) = flags::set_flags(argv).unwrap();
|
|
IsolateState::new(flags, rest_argv, None)
|
|
}
|
|
|
|
pub fn metrics_op_dispatched(
|
|
&self,
|
|
bytes_sent_control: usize,
|
|
bytes_sent_data: usize,
|
|
) {
|
|
self.metrics.ops_dispatched.fetch_add(1, Ordering::SeqCst);
|
|
self
|
|
.metrics
|
|
.bytes_sent_control
|
|
.fetch_add(bytes_sent_control, Ordering::SeqCst);
|
|
self
|
|
.metrics
|
|
.bytes_sent_data
|
|
.fetch_add(bytes_sent_data, Ordering::SeqCst);
|
|
}
|
|
|
|
pub fn metrics_op_completed(&self, bytes_received: usize) {
|
|
self.metrics.ops_completed.fetch_add(1, Ordering::SeqCst);
|
|
self
|
|
.metrics
|
|
.bytes_received
|
|
.fetch_add(bytes_received, Ordering::SeqCst);
|
|
}
|
|
}
|
|
|
|
/// Provides state getter function
|
|
pub trait IsolateStateContainer {
|
|
fn state(&self) -> Arc<IsolateState>;
|
|
}
|
|
|
|
/// Provides state_resolve function for IsolateStateContainer implementors
|
|
pub trait IsolateStateModuleResolution: IsolateStateContainer {
|
|
fn state_resolve(&mut self, specifier: &str, referrer: deno_mod) -> deno_mod {
|
|
let state = self.state();
|
|
state.metrics.resolve_count.fetch_add(1, Ordering::Relaxed);
|
|
let mut modules = state.modules.lock().unwrap();
|
|
modules.resolve_cb(&state.dir, specifier, referrer)
|
|
}
|
|
}
|
|
|
|
// Auto implementation for all IsolateStateContainer implementors
|
|
impl<T> IsolateStateModuleResolution for T where T: IsolateStateContainer {}
|