mirror of
https://github.com/swc-project/swc.git
synced 2024-12-19 03:31:45 +03:00
158 lines
4.6 KiB
TypeScript
158 lines
4.6 KiB
TypeScript
|
// Copyright 2018-2020 the Deno authors. All rights reserved. MIT license.
|
|||
|
import {
|
|||
|
assert,
|
|||
|
assertEquals,
|
|||
|
assertNotEquals,
|
|||
|
assertThrows,
|
|||
|
unitTest,
|
|||
|
} from "./test_util.ts";
|
|||
|
|
|||
|
unitTest({ perms: { env: true } }, function envSuccess(): void {
|
|||
|
Deno.env.set("TEST_VAR", "A");
|
|||
|
const env = Deno.env.toObject();
|
|||
|
Deno.env.set("TEST_VAR", "B");
|
|||
|
assertEquals(env["TEST_VAR"], "A");
|
|||
|
assertNotEquals(Deno.env.get("TEST_VAR"), env["TEST_VAR"]);
|
|||
|
});
|
|||
|
|
|||
|
unitTest({ perms: { env: true } }, function envNotFound(): void {
|
|||
|
const r = Deno.env.get("env_var_does_not_exist!");
|
|||
|
assertEquals(r, undefined);
|
|||
|
});
|
|||
|
|
|||
|
unitTest({ perms: { env: true } }, function deleteEnv(): void {
|
|||
|
Deno.env.set("TEST_VAR", "A");
|
|||
|
assertEquals(Deno.env.get("TEST_VAR"), "A");
|
|||
|
assertEquals(Deno.env.delete("TEST_VAR"), undefined);
|
|||
|
assertEquals(Deno.env.get("TEST_VAR"), undefined);
|
|||
|
});
|
|||
|
|
|||
|
unitTest(function envPermissionDenied1(): void {
|
|||
|
assertThrows(() => {
|
|||
|
Deno.env.toObject();
|
|||
|
}, Deno.errors.PermissionDenied);
|
|||
|
});
|
|||
|
|
|||
|
unitTest(function envPermissionDenied2(): void {
|
|||
|
assertThrows(() => {
|
|||
|
Deno.env.get("PATH");
|
|||
|
}, Deno.errors.PermissionDenied);
|
|||
|
});
|
|||
|
|
|||
|
// This test verifies that on Windows, environment variables are
|
|||
|
// case-insensitive. Case normalization needs be done using the collation
|
|||
|
// that Windows uses, rather than naively using String.toLowerCase().
|
|||
|
unitTest(
|
|||
|
{
|
|||
|
ignore: Deno.build.os !== "windows",
|
|||
|
perms: { read: true, env: true, run: true },
|
|||
|
},
|
|||
|
async function envCaseInsensitive() {
|
|||
|
// Utility function that runs a Deno subprocess with the environment
|
|||
|
// specified in `inputEnv`. The subprocess reads the environment variables
|
|||
|
// which are in the keys of `expectedEnv` and writes them to stdout as JSON.
|
|||
|
// It is then verified that these match with the values of `expectedEnv`.
|
|||
|
const checkChildEnv = async (
|
|||
|
inputEnv: Record<string, string>,
|
|||
|
expectedEnv: Record<string, string>
|
|||
|
): Promise<void> => {
|
|||
|
const src = `
|
|||
|
console.log(
|
|||
|
${JSON.stringify(Object.keys(expectedEnv))}.map(k => Deno.env.get(k))
|
|||
|
)`;
|
|||
|
const proc = Deno.run({
|
|||
|
cmd: [Deno.execPath(), "eval", src],
|
|||
|
env: inputEnv,
|
|||
|
stdout: "piped",
|
|||
|
});
|
|||
|
const status = await proc.status();
|
|||
|
assertEquals(status.success, true);
|
|||
|
const expectedValues = Object.values(expectedEnv);
|
|||
|
const actualValues = JSON.parse(
|
|||
|
new TextDecoder().decode(await proc.output())
|
|||
|
);
|
|||
|
assertEquals(actualValues, expectedValues);
|
|||
|
proc.close();
|
|||
|
};
|
|||
|
|
|||
|
assertEquals(Deno.env.get("path"), Deno.env.get("PATH"));
|
|||
|
assertEquals(Deno.env.get("Path"), Deno.env.get("PATH"));
|
|||
|
|
|||
|
// Check 'foo', 'Foo' and 'Foo' are case folded.
|
|||
|
await checkChildEnv({ foo: "X" }, { foo: "X", Foo: "X", FOO: "X" });
|
|||
|
|
|||
|
// Check that 'µ' and 'Μ' are not case folded.
|
|||
|
const lc1 = "µ";
|
|||
|
const uc1 = lc1.toUpperCase();
|
|||
|
assertNotEquals(lc1, uc1);
|
|||
|
await checkChildEnv(
|
|||
|
{ [lc1]: "mu", [uc1]: "MU" },
|
|||
|
{ [lc1]: "mu", [uc1]: "MU" }
|
|||
|
);
|
|||
|
|
|||
|
// Check that 'dž' and 'DŽ' are folded, but 'Dž' is preserved.
|
|||
|
const c2 = "Dž";
|
|||
|
const lc2 = c2.toLowerCase();
|
|||
|
const uc2 = c2.toUpperCase();
|
|||
|
assertNotEquals(c2, lc2);
|
|||
|
assertNotEquals(c2, uc2);
|
|||
|
await checkChildEnv(
|
|||
|
{ [c2]: "Dz", [lc2]: "dz" },
|
|||
|
{ [c2]: "Dz", [lc2]: "dz", [uc2]: "dz" }
|
|||
|
);
|
|||
|
await checkChildEnv(
|
|||
|
{ [c2]: "Dz", [uc2]: "DZ" },
|
|||
|
{ [c2]: "Dz", [uc2]: "DZ", [lc2]: "DZ" }
|
|||
|
);
|
|||
|
}
|
|||
|
);
|
|||
|
|
|||
|
unitTest(function osPid(): void {
|
|||
|
assert(Deno.pid > 0);
|
|||
|
});
|
|||
|
|
|||
|
unitTest({ perms: { read: true } }, function execPath(): void {
|
|||
|
assertNotEquals(Deno.execPath(), "");
|
|||
|
});
|
|||
|
|
|||
|
unitTest({ perms: { read: false } }, function execPathPerm(): void {
|
|||
|
assertThrows(
|
|||
|
() => {
|
|||
|
Deno.execPath();
|
|||
|
},
|
|||
|
Deno.errors.PermissionDenied,
|
|||
|
"read access to <exec_path>, run again with the --allow-read flag"
|
|||
|
);
|
|||
|
});
|
|||
|
|
|||
|
unitTest({ perms: { env: true } }, function loadavgSuccess(): void {
|
|||
|
const load = Deno.loadavg();
|
|||
|
assertEquals(load.length, 3);
|
|||
|
});
|
|||
|
|
|||
|
unitTest({ perms: { env: false } }, function loadavgPerm(): void {
|
|||
|
assertThrows(() => {
|
|||
|
Deno.loadavg();
|
|||
|
}, Deno.errors.PermissionDenied);
|
|||
|
});
|
|||
|
|
|||
|
unitTest({ perms: { env: true } }, function hostnameDir(): void {
|
|||
|
assertNotEquals(Deno.hostname(), "");
|
|||
|
});
|
|||
|
|
|||
|
unitTest({ perms: { env: false } }, function hostnamePerm(): void {
|
|||
|
assertThrows(() => {
|
|||
|
Deno.hostname();
|
|||
|
}, Deno.errors.PermissionDenied);
|
|||
|
});
|
|||
|
|
|||
|
unitTest({ perms: { env: true } }, function releaseDir(): void {
|
|||
|
assertNotEquals(Deno.osRelease(), "");
|
|||
|
});
|
|||
|
|
|||
|
unitTest({ perms: { env: false } }, function releasePerm(): void {
|
|||
|
assertThrows(() => {
|
|||
|
Deno.osRelease();
|
|||
|
}, Deno.errors.PermissionDenied);
|
|||
|
});
|