mirror of
https://github.com/nodejs/node.git
synced 2024-11-21 10:59:27 +00:00
a6d54f179d
Closes: https://github.com/nodejs/node/issues/52991 PR-URL: https://github.com/nodejs/node/pull/52996 Fixes: https://github.com/nodejs/node/issues/52991 Reviewed-By: Chengzhong Wu <legendecas@gmail.com> Reviewed-By: Yagiz Nizipli <yagiz.nizipli@sentry.io> Reviewed-By: Juan José Arboleda <soyjuanarbol@gmail.com>
806 lines
25 KiB
C++
806 lines
25 KiB
C++
#include "node_buffer.h"
|
|
#include "node_internals.h"
|
|
#include "libplatform/libplatform.h"
|
|
#include "util.h"
|
|
|
|
#include <string>
|
|
#include "gtest/gtest.h"
|
|
#include "node_test_fixture.h"
|
|
#include <stdio.h>
|
|
#include <cstdio>
|
|
|
|
using node::AtExit;
|
|
using node::RunAtExit;
|
|
using node::USE;
|
|
using v8::Context;
|
|
using v8::Local;
|
|
|
|
static bool called_cb_1 = false;
|
|
static bool called_cb_2 = false;
|
|
static bool called_cb_ordered_1 = false;
|
|
static bool called_cb_ordered_2 = false;
|
|
static bool called_at_exit_js = false;
|
|
static void at_exit_callback1(void* arg);
|
|
static void at_exit_callback2(void* arg);
|
|
static void at_exit_callback_ordered1(void* arg);
|
|
static void at_exit_callback_ordered2(void* arg);
|
|
static void at_exit_js(void* arg);
|
|
static std::string cb_1_arg; // NOLINT(runtime/string)
|
|
|
|
class EnvironmentTest : public EnvironmentTestFixture {
|
|
private:
|
|
void TearDown() override {
|
|
EnvironmentTestFixture::TearDown();
|
|
called_cb_1 = false;
|
|
called_cb_2 = false;
|
|
called_cb_ordered_1 = false;
|
|
called_cb_ordered_2 = false;
|
|
}
|
|
};
|
|
|
|
TEST_F(EnvironmentTest, EnvironmentWithoutBrowserGlobals) {
|
|
const v8::HandleScope handle_scope(isolate_);
|
|
Argv argv;
|
|
Env env{handle_scope, argv, node::EnvironmentFlags::kNoBrowserGlobals};
|
|
|
|
SetProcessExitHandler(*env, [&](node::Environment* env_, int exit_code) {
|
|
EXPECT_EQ(*env, env_);
|
|
EXPECT_EQ(exit_code, 0);
|
|
node::Stop(*env);
|
|
});
|
|
|
|
node::LoadEnvironment(
|
|
*env,
|
|
"const assert = require('assert');"
|
|
"const path = require('path');"
|
|
"const relativeRequire = "
|
|
" require('module').createRequire(path.join(process.cwd(), 'stub.js'));"
|
|
"const { intrinsics, nodeGlobals } = "
|
|
" relativeRequire('./test/common/globals');"
|
|
"const items = Object.getOwnPropertyNames(globalThis);"
|
|
"const leaks = [];"
|
|
"for (const item of items) {"
|
|
" if (intrinsics.has(item)) {"
|
|
" continue;"
|
|
" }"
|
|
" if (nodeGlobals.has(item)) {"
|
|
" continue;"
|
|
" }"
|
|
" leaks.push(item);"
|
|
"}"
|
|
"assert.deepStrictEqual(leaks, []);");
|
|
}
|
|
|
|
TEST_F(EnvironmentTest, EnvironmentWithESMLoader) {
|
|
const v8::HandleScope handle_scope(isolate_);
|
|
Argv argv;
|
|
Env env {handle_scope, argv};
|
|
|
|
node::Environment* envi = *env;
|
|
envi->options()->experimental_vm_modules = true;
|
|
|
|
SetProcessExitHandler(*env, [&](node::Environment* env_, int exit_code) {
|
|
EXPECT_EQ(*env, env_);
|
|
EXPECT_EQ(exit_code, 0);
|
|
node::Stop(*env);
|
|
});
|
|
|
|
node::LoadEnvironment(
|
|
*env,
|
|
"const { SourceTextModule } = require('vm');"
|
|
"(async () => {"
|
|
"const stmString = 'globalThis.importResult = import(\"\")';"
|
|
"const m = new SourceTextModule(stmString, {"
|
|
"importModuleDynamically: (async () => {"
|
|
"const m = new SourceTextModule('');"
|
|
"await m.link(() => 0);"
|
|
"await m.evaluate();"
|
|
"return m.namespace;"
|
|
"}),"
|
|
"});"
|
|
"await m.link(() => 0);"
|
|
"await m.evaluate();"
|
|
"delete globalThis.importResult;"
|
|
"process.exit(0);"
|
|
"})()");
|
|
}
|
|
|
|
class RedirectStdErr {
|
|
public:
|
|
explicit RedirectStdErr(const char* filename) : filename_(filename) {
|
|
fflush(stderr);
|
|
fgetpos(stderr, &pos_);
|
|
fd_ = dup(fileno(stderr));
|
|
USE(freopen(filename_, "w", stderr));
|
|
}
|
|
|
|
~RedirectStdErr() {
|
|
fflush(stderr);
|
|
dup2(fd_, fileno(stderr));
|
|
close(fd_);
|
|
remove(filename_);
|
|
clearerr(stderr);
|
|
fsetpos(stderr, &pos_);
|
|
}
|
|
|
|
private:
|
|
int fd_;
|
|
fpos_t pos_;
|
|
const char* filename_;
|
|
};
|
|
|
|
TEST_F(EnvironmentTest, EnvironmentWithNoESMLoader) {
|
|
// The following line will cause stderr to get redirected to avoid the
|
|
// error that would otherwise be printed to the console by this test.
|
|
RedirectStdErr redirect_scope("environment_test.log");
|
|
const v8::HandleScope handle_scope(isolate_);
|
|
Argv argv;
|
|
Env env {handle_scope, argv, node::EnvironmentFlags::kNoRegisterESMLoader};
|
|
|
|
node::Environment* envi = *env;
|
|
envi->options()->experimental_vm_modules = true;
|
|
|
|
SetProcessExitHandler(*env, [&](node::Environment* env_, int exit_code) {
|
|
EXPECT_EQ(*env, env_);
|
|
EXPECT_EQ(exit_code, 1);
|
|
node::Stop(*env);
|
|
});
|
|
|
|
node::LoadEnvironment(
|
|
*env,
|
|
"const { SourceTextModule } = require('vm');"
|
|
"(async () => {"
|
|
"const stmString = 'globalThis.importResult = import(\"\")';"
|
|
"const m = new SourceTextModule(stmString, {"
|
|
"importModuleDynamically: (async () => {"
|
|
"const m = new SourceTextModule('');"
|
|
"await m.link(() => 0);"
|
|
"await m.evaluate();"
|
|
"return m.namespace;"
|
|
"}),"
|
|
"});"
|
|
"await m.link(() => 0);"
|
|
"await m.evaluate();"
|
|
"delete globalThis.importResult;"
|
|
"})()");
|
|
}
|
|
|
|
TEST_F(EnvironmentTest, PreExecutionPreparation) {
|
|
const v8::HandleScope handle_scope(isolate_);
|
|
const Argv argv;
|
|
Env env {handle_scope, argv};
|
|
|
|
node::LoadEnvironment(*env, [&](const node::StartExecutionCallbackInfo& info)
|
|
-> v8::MaybeLocal<v8::Value> {
|
|
return v8::Null(isolate_);
|
|
});
|
|
|
|
v8::Local<v8::Context> context = isolate_->GetCurrentContext();
|
|
const char* run_script = "process.argv0";
|
|
v8::Local<v8::Script> script = v8::Script::Compile(
|
|
context,
|
|
v8::String::NewFromOneByte(isolate_,
|
|
reinterpret_cast<const uint8_t*>(run_script))
|
|
.ToLocalChecked())
|
|
.ToLocalChecked();
|
|
v8::Local<v8::Value> result = script->Run(context).ToLocalChecked();
|
|
CHECK(result->IsString());
|
|
}
|
|
|
|
TEST_F(EnvironmentTest, LoadEnvironmentWithCallback) {
|
|
const v8::HandleScope handle_scope(isolate_);
|
|
const Argv argv;
|
|
Env env {handle_scope, argv};
|
|
|
|
v8::Local<v8::Context> context = isolate_->GetCurrentContext();
|
|
bool called_cb = false;
|
|
node::LoadEnvironment(*env,
|
|
[&](const node::StartExecutionCallbackInfo& info)
|
|
-> v8::MaybeLocal<v8::Value> {
|
|
called_cb = true;
|
|
|
|
CHECK(info.process_object->IsObject());
|
|
CHECK(info.native_require->IsFunction());
|
|
|
|
v8::Local<v8::Value> argv0 = info.process_object->Get(
|
|
context,
|
|
v8::String::NewFromOneByte(
|
|
isolate_,
|
|
reinterpret_cast<const uint8_t*>("argv0"))
|
|
.ToLocalChecked()).ToLocalChecked();
|
|
CHECK(argv0->IsString());
|
|
|
|
return info.process_object;
|
|
});
|
|
|
|
CHECK(called_cb);
|
|
}
|
|
|
|
TEST_F(EnvironmentTest, LoadEnvironmentWithSource) {
|
|
const v8::HandleScope handle_scope(isolate_);
|
|
const Argv argv;
|
|
Env env {handle_scope, argv};
|
|
|
|
v8::Local<v8::Context> context = isolate_->GetCurrentContext();
|
|
v8::Local<v8::Value> main_ret =
|
|
node::LoadEnvironment(*env,
|
|
"return { process, require };").ToLocalChecked();
|
|
|
|
CHECK(main_ret->IsObject());
|
|
CHECK(main_ret.As<v8::Object>()->Get(
|
|
context,
|
|
v8::String::NewFromOneByte(
|
|
isolate_,
|
|
reinterpret_cast<const uint8_t*>("process"))
|
|
.ToLocalChecked())
|
|
.ToLocalChecked()->IsObject());
|
|
CHECK(main_ret.As<v8::Object>()->Get(
|
|
context,
|
|
v8::String::NewFromOneByte(
|
|
isolate_,
|
|
reinterpret_cast<const uint8_t*>("require"))
|
|
.ToLocalChecked())
|
|
.ToLocalChecked()->IsFunction());
|
|
}
|
|
|
|
TEST_F(EnvironmentTest, AtExitWithEnvironment) {
|
|
const v8::HandleScope handle_scope(isolate_);
|
|
const Argv argv;
|
|
Env env {handle_scope, argv};
|
|
|
|
AtExit(*env, at_exit_callback1, nullptr);
|
|
RunAtExit(*env);
|
|
EXPECT_TRUE(called_cb_1);
|
|
}
|
|
|
|
TEST_F(EnvironmentTest, AtExitOrder) {
|
|
const v8::HandleScope handle_scope(isolate_);
|
|
const Argv argv;
|
|
Env env {handle_scope, argv};
|
|
|
|
// Test that callbacks are run in reverse order.
|
|
AtExit(*env, at_exit_callback_ordered1, nullptr);
|
|
AtExit(*env, at_exit_callback_ordered2, nullptr);
|
|
RunAtExit(*env);
|
|
EXPECT_TRUE(called_cb_ordered_1);
|
|
EXPECT_TRUE(called_cb_ordered_2);
|
|
}
|
|
|
|
TEST_F(EnvironmentTest, AtExitWithArgument) {
|
|
const v8::HandleScope handle_scope(isolate_);
|
|
const Argv argv;
|
|
Env env {handle_scope, argv};
|
|
|
|
std::string arg{"some args"};
|
|
AtExit(*env, at_exit_callback1, static_cast<void*>(&arg));
|
|
RunAtExit(*env);
|
|
EXPECT_EQ(arg, cb_1_arg);
|
|
}
|
|
|
|
TEST_F(EnvironmentTest, AtExitRunsJS) {
|
|
const v8::HandleScope handle_scope(isolate_);
|
|
const Argv argv;
|
|
Env env {handle_scope, argv};
|
|
|
|
AtExit(*env, at_exit_js, static_cast<void*>(isolate_));
|
|
EXPECT_FALSE(called_at_exit_js);
|
|
RunAtExit(*env);
|
|
EXPECT_TRUE(called_at_exit_js);
|
|
}
|
|
|
|
TEST_F(EnvironmentTest, MultipleEnvironmentsPerIsolate) {
|
|
const v8::HandleScope handle_scope(isolate_);
|
|
const Argv argv;
|
|
// Only one of the Environments can have default flags and own the inspector.
|
|
Env env1 {handle_scope, argv};
|
|
Env env2 {handle_scope, argv, node::EnvironmentFlags::kNoFlags};
|
|
|
|
AtExit(*env1, at_exit_callback1, nullptr);
|
|
AtExit(*env2, at_exit_callback2, nullptr);
|
|
RunAtExit(*env1);
|
|
EXPECT_TRUE(called_cb_1);
|
|
EXPECT_FALSE(called_cb_2);
|
|
|
|
RunAtExit(*env2);
|
|
EXPECT_TRUE(called_cb_2);
|
|
}
|
|
|
|
TEST_F(EnvironmentTest, NoEnvironmentSanity) {
|
|
const v8::HandleScope handle_scope(isolate_);
|
|
v8::Local<v8::Context> context = v8::Context::New(isolate_);
|
|
EXPECT_EQ(node::Environment::GetCurrent(context), nullptr);
|
|
EXPECT_EQ(node::GetCurrentEnvironment(context), nullptr);
|
|
EXPECT_EQ(node::Environment::GetCurrent(isolate_), nullptr);
|
|
|
|
v8::Context::Scope context_scope(context);
|
|
EXPECT_EQ(node::Environment::GetCurrent(context), nullptr);
|
|
EXPECT_EQ(node::GetCurrentEnvironment(context), nullptr);
|
|
EXPECT_EQ(node::Environment::GetCurrent(isolate_), nullptr);
|
|
}
|
|
|
|
TEST_F(EnvironmentTest, NonNodeJSContext) {
|
|
const v8::HandleScope handle_scope(isolate_);
|
|
const Argv argv;
|
|
Env test_env {handle_scope, argv};
|
|
|
|
EXPECT_EQ(node::Environment::GetCurrent(v8::Local<v8::Context>()), nullptr);
|
|
|
|
node::Environment* env = *test_env;
|
|
EXPECT_EQ(node::Environment::GetCurrent(isolate_), env);
|
|
EXPECT_EQ(node::Environment::GetCurrent(env->context()), env);
|
|
EXPECT_EQ(node::GetCurrentEnvironment(env->context()), env);
|
|
|
|
v8::Local<v8::Context> context = v8::Context::New(isolate_);
|
|
EXPECT_EQ(node::Environment::GetCurrent(context), nullptr);
|
|
EXPECT_EQ(node::GetCurrentEnvironment(context), nullptr);
|
|
EXPECT_EQ(node::Environment::GetCurrent(isolate_), env);
|
|
|
|
v8::Context::Scope context_scope(context);
|
|
EXPECT_EQ(node::Environment::GetCurrent(context), nullptr);
|
|
EXPECT_EQ(node::GetCurrentEnvironment(context), nullptr);
|
|
EXPECT_EQ(node::Environment::GetCurrent(isolate_), nullptr);
|
|
}
|
|
|
|
static void at_exit_callback1(void* arg) {
|
|
called_cb_1 = true;
|
|
if (arg) {
|
|
cb_1_arg = *static_cast<std::string*>(arg);
|
|
}
|
|
}
|
|
|
|
static void at_exit_callback2(void* arg) {
|
|
called_cb_2 = true;
|
|
}
|
|
|
|
static void at_exit_callback_ordered1(void* arg) {
|
|
EXPECT_TRUE(called_cb_ordered_2);
|
|
called_cb_ordered_1 = true;
|
|
}
|
|
|
|
static void at_exit_callback_ordered2(void* arg) {
|
|
EXPECT_FALSE(called_cb_ordered_1);
|
|
called_cb_ordered_2 = true;
|
|
}
|
|
|
|
static void at_exit_js(void* arg) {
|
|
v8::Isolate* isolate = static_cast<v8::Isolate*>(arg);
|
|
v8::HandleScope handle_scope(isolate);
|
|
v8::Local<v8::Object> obj = v8::Object::New(isolate);
|
|
EXPECT_FALSE(obj.IsEmpty()); // Assert VM is still alive.
|
|
EXPECT_TRUE(obj->IsObject());
|
|
called_at_exit_js = true;
|
|
}
|
|
|
|
TEST_F(EnvironmentTest, SetImmediateCleanup) {
|
|
int called = 0;
|
|
int called_unref = 0;
|
|
|
|
{
|
|
const v8::HandleScope handle_scope(isolate_);
|
|
const Argv argv;
|
|
Env env {handle_scope, argv};
|
|
|
|
node::LoadEnvironment(*env,
|
|
[&](const node::StartExecutionCallbackInfo& info)
|
|
-> v8::MaybeLocal<v8::Value> {
|
|
return v8::Object::New(isolate_);
|
|
});
|
|
|
|
(*env)->SetImmediate([&](node::Environment* env_arg) {
|
|
EXPECT_EQ(env_arg, *env);
|
|
called++;
|
|
}, node::CallbackFlags::kRefed);
|
|
(*env)->SetImmediate([&](node::Environment* env_arg) {
|
|
EXPECT_EQ(env_arg, *env);
|
|
called_unref++;
|
|
}, node::CallbackFlags::kUnrefed);
|
|
}
|
|
|
|
EXPECT_EQ(called, 1);
|
|
EXPECT_EQ(called_unref, 0);
|
|
}
|
|
|
|
static char hello[] = "hello";
|
|
|
|
TEST_F(EnvironmentTest, BufferWithFreeCallbackIsDetached) {
|
|
// Test that a Buffer allocated with a free callback is detached after
|
|
// its callback has been called.
|
|
const v8::HandleScope handle_scope(isolate_);
|
|
const Argv argv;
|
|
|
|
int callback_calls = 0;
|
|
|
|
v8::Local<v8::ArrayBuffer> ab;
|
|
{
|
|
Env env {handle_scope, argv};
|
|
v8::Local<v8::Object> buf_obj = node::Buffer::New(
|
|
isolate_,
|
|
hello,
|
|
sizeof(hello),
|
|
[](char* data, void* hint) {
|
|
CHECK_EQ(data, hello);
|
|
++*static_cast<int*>(hint);
|
|
},
|
|
&callback_calls).ToLocalChecked();
|
|
CHECK(buf_obj->IsUint8Array());
|
|
ab = buf_obj.As<v8::Uint8Array>()->Buffer();
|
|
CHECK_EQ(ab->ByteLength(), sizeof(hello));
|
|
}
|
|
|
|
CHECK_EQ(callback_calls, 1);
|
|
CHECK_EQ(ab->ByteLength(), 0);
|
|
}
|
|
|
|
#if HAVE_INSPECTOR
|
|
TEST_F(EnvironmentTest, InspectorMultipleEmbeddedEnvironments) {
|
|
// Tests that child Environments can be created through the public API
|
|
// that are accessible by the inspector.
|
|
// This test sets a global variable in the child Environment, and reads it
|
|
// back both through the inspector and inside the child Environment, and
|
|
// makes sure that those correspond to the value that was originally set.
|
|
const v8::HandleScope handle_scope(isolate_);
|
|
const Argv argv;
|
|
Env env {handle_scope, argv};
|
|
|
|
v8::Local<v8::Context> context = isolate_->GetCurrentContext();
|
|
node::LoadEnvironment(*env,
|
|
"'use strict';\n"
|
|
"const { Worker } = require('worker_threads');\n"
|
|
"const { Session } = require('inspector');\n"
|
|
|
|
"const session = new Session();\n"
|
|
"session.connect();\n"
|
|
"session.on('NodeWorker.attachedToWorker', (\n"
|
|
" ({ params: { workerInfo, sessionId } }) => {\n"
|
|
" session.post('NodeWorker.sendMessageToWorker', {\n"
|
|
" sessionId,\n"
|
|
" message: JSON.stringify({\n"
|
|
" id: 1,\n"
|
|
" method: 'Runtime.evaluate',\n"
|
|
" params: {\n"
|
|
" expression: 'globalThis.variableFromParent = 42;'\n"
|
|
" }\n"
|
|
" })\n"
|
|
" });\n"
|
|
" session.on('NodeWorker.receivedMessageFromWorker',\n"
|
|
" ({ params: { message } }) => {\n"
|
|
" global.messageFromWorker = \n"
|
|
" JSON.parse(message).result.result.value;\n"
|
|
" });\n"
|
|
" }));\n"
|
|
"session.post('NodeWorker.enable', { waitForDebuggerOnStart: false });\n")
|
|
.ToLocalChecked();
|
|
|
|
struct ChildEnvironmentData {
|
|
node::ThreadId thread_id;
|
|
std::unique_ptr<node::InspectorParentHandle> inspector_parent_handle;
|
|
node::MultiIsolatePlatform* platform;
|
|
int32_t extracted_value = -1;
|
|
uv_async_t thread_stopped_async;
|
|
};
|
|
|
|
ChildEnvironmentData data;
|
|
data.thread_id = node::AllocateEnvironmentThreadId();
|
|
data.inspector_parent_handle =
|
|
GetInspectorParentHandle(*env, data.thread_id, "file:///embedded.js");
|
|
CHECK(data.inspector_parent_handle);
|
|
data.platform = GetMultiIsolatePlatform(*env);
|
|
CHECK_NOT_NULL(data.platform);
|
|
|
|
bool thread_stopped = false;
|
|
int err = uv_async_init(
|
|
¤t_loop, &data.thread_stopped_async, [](uv_async_t* async) {
|
|
*static_cast<bool*>(async->data) = true;
|
|
uv_close(reinterpret_cast<uv_handle_t*>(async), nullptr);
|
|
});
|
|
CHECK_EQ(err, 0);
|
|
data.thread_stopped_async.data = &thread_stopped;
|
|
|
|
uv_thread_t thread;
|
|
err = uv_thread_create(&thread, [](void* arg) {
|
|
ChildEnvironmentData* data = static_cast<ChildEnvironmentData*>(arg);
|
|
std::shared_ptr<node::ArrayBufferAllocator> aba =
|
|
node::ArrayBufferAllocator::Create();
|
|
uv_loop_t loop;
|
|
uv_loop_init(&loop);
|
|
v8::Isolate* isolate = NewIsolate(aba, &loop, data->platform);
|
|
CHECK_NOT_NULL(isolate);
|
|
|
|
{
|
|
v8::Isolate::Scope isolate_scope(isolate);
|
|
v8::HandleScope handle_scope(isolate);
|
|
|
|
v8::Local<v8::Context> context = node::NewContext(isolate);
|
|
CHECK(!context.IsEmpty());
|
|
v8::Context::Scope context_scope(context);
|
|
|
|
node::IsolateData* isolate_data = node::CreateIsolateData(
|
|
isolate,
|
|
&loop,
|
|
data->platform);
|
|
CHECK_NOT_NULL(isolate_data);
|
|
node::Environment* environment = node::CreateEnvironment(
|
|
isolate_data,
|
|
context,
|
|
{ "dummy" },
|
|
{},
|
|
node::EnvironmentFlags::kNoFlags,
|
|
data->thread_id,
|
|
std::move(data->inspector_parent_handle));
|
|
CHECK_NOT_NULL(environment);
|
|
|
|
v8::Local<v8::Value> extracted_value = LoadEnvironment(
|
|
environment,
|
|
"while (!global.variableFromParent) {}\n"
|
|
"return global.variableFromParent;").ToLocalChecked();
|
|
|
|
uv_run(&loop, UV_RUN_DEFAULT);
|
|
CHECK(extracted_value->IsInt32());
|
|
data->extracted_value = extracted_value.As<v8::Int32>()->Value();
|
|
|
|
node::FreeEnvironment(environment);
|
|
node::FreeIsolateData(isolate_data);
|
|
}
|
|
|
|
data->platform->UnregisterIsolate(isolate);
|
|
isolate->Dispose();
|
|
uv_run(&loop, UV_RUN_DEFAULT);
|
|
CHECK_EQ(uv_loop_close(&loop), 0);
|
|
|
|
uv_async_send(&data->thread_stopped_async);
|
|
}, &data);
|
|
CHECK_EQ(err, 0);
|
|
|
|
bool more;
|
|
do {
|
|
uv_run(¤t_loop, UV_RUN_DEFAULT);
|
|
data.platform->DrainTasks(isolate_);
|
|
more = uv_loop_alive(¤t_loop);
|
|
} while (!thread_stopped || more);
|
|
|
|
uv_thread_join(&thread);
|
|
|
|
v8::Local<v8::Value> from_inspector =
|
|
context->Global()->Get(
|
|
context,
|
|
v8::String::NewFromOneByte(
|
|
isolate_,
|
|
reinterpret_cast<const uint8_t*>("messageFromWorker"))
|
|
.ToLocalChecked())
|
|
.ToLocalChecked();
|
|
CHECK_EQ(data.extracted_value, 42);
|
|
CHECK_EQ(from_inspector->IntegerValue(context).FromJust(), 42);
|
|
}
|
|
#endif // HAVE_INSPECTOR
|
|
|
|
TEST_F(EnvironmentTest, ExitHandlerTest) {
|
|
const v8::HandleScope handle_scope(isolate_);
|
|
const Argv argv;
|
|
|
|
int callback_calls = 0;
|
|
|
|
Env env {handle_scope, argv};
|
|
SetProcessExitHandler(*env, [&](node::Environment* env_, int exit_code) {
|
|
EXPECT_EQ(*env, env_);
|
|
EXPECT_EQ(exit_code, 42);
|
|
callback_calls++;
|
|
node::Stop(*env);
|
|
});
|
|
// When terminating, v8 throws makes the current embedder call bail out
|
|
// with MaybeLocal<>()
|
|
EXPECT_TRUE(node::LoadEnvironment(*env, "process.exit(42)").IsEmpty());
|
|
EXPECT_EQ(callback_calls, 1);
|
|
}
|
|
|
|
TEST_F(EnvironmentTest, SetImmediateMicrotasks) {
|
|
int called = 0;
|
|
|
|
{
|
|
const v8::HandleScope handle_scope(isolate_);
|
|
const Argv argv;
|
|
Env env {handle_scope, argv};
|
|
|
|
node::LoadEnvironment(*env,
|
|
[&](const node::StartExecutionCallbackInfo& info)
|
|
-> v8::MaybeLocal<v8::Value> {
|
|
return v8::Object::New(isolate_);
|
|
});
|
|
|
|
(*env)->SetImmediate([&](node::Environment* env_arg) {
|
|
EXPECT_EQ(env_arg, *env);
|
|
isolate_->EnqueueMicrotask([](void* arg) {
|
|
++*static_cast<int*>(arg);
|
|
}, &called);
|
|
}, node::CallbackFlags::kRefed);
|
|
uv_run(¤t_loop, UV_RUN_DEFAULT);
|
|
}
|
|
|
|
EXPECT_EQ(called, 1);
|
|
}
|
|
|
|
#ifndef _WIN32 // No SIGINT on Windows.
|
|
TEST_F(NodeZeroIsolateTestFixture, CtrlCWithOnlySafeTerminationTest) {
|
|
// Allocate and initialize Isolate.
|
|
v8::Isolate::CreateParams create_params;
|
|
create_params.array_buffer_allocator = allocator.get();
|
|
v8::Isolate* isolate = v8::Isolate::Allocate();
|
|
CHECK_NOT_NULL(isolate);
|
|
platform->RegisterIsolate(isolate, ¤t_loop);
|
|
v8::Isolate::Initialize(isolate, create_params);
|
|
|
|
// Try creating Context + IsolateData + Environment.
|
|
{
|
|
v8::Isolate::Scope isolate_scope(isolate);
|
|
v8::HandleScope handle_scope(isolate);
|
|
|
|
auto context = node::NewContext(isolate);
|
|
CHECK(!context.IsEmpty());
|
|
v8::Context::Scope context_scope(context);
|
|
|
|
std::unique_ptr<node::IsolateData, decltype(&node::FreeIsolateData)>
|
|
isolate_data{node::CreateIsolateData(isolate,
|
|
¤t_loop,
|
|
platform.get()),
|
|
node::FreeIsolateData};
|
|
CHECK(isolate_data);
|
|
|
|
std::unique_ptr<node::Environment, decltype(&node::FreeEnvironment)>
|
|
environment{node::CreateEnvironment(isolate_data.get(),
|
|
context,
|
|
{},
|
|
{}),
|
|
node::FreeEnvironment};
|
|
CHECK(environment);
|
|
EXPECT_EQ(node::GetEnvironmentIsolateData(environment.get()),
|
|
isolate_data.get());
|
|
EXPECT_EQ(node::GetArrayBufferAllocator(isolate_data.get()), nullptr);
|
|
|
|
v8::Local<v8::Value> main_ret =
|
|
node::LoadEnvironment(environment.get(),
|
|
"'use strict';\n"
|
|
"const { runInThisContext } = require('vm');\n"
|
|
"try {\n"
|
|
" runInThisContext("
|
|
" `process.kill(process.pid, 'SIGINT'); while(true){}`, "
|
|
" { breakOnSigint: true });\n"
|
|
" return 'unreachable';\n"
|
|
"} catch (err) {\n"
|
|
" return err.code;\n"
|
|
"}").ToLocalChecked();
|
|
node::Utf8Value main_ret_str(isolate, main_ret);
|
|
EXPECT_EQ(std::string(*main_ret_str), "ERR_SCRIPT_EXECUTION_INTERRUPTED");
|
|
}
|
|
|
|
// Cleanup.
|
|
platform->UnregisterIsolate(isolate);
|
|
isolate->Dispose();
|
|
}
|
|
#endif // _WIN32
|
|
|
|
TEST_F(EnvironmentTest, NestedMicrotaskQueue) {
|
|
const v8::HandleScope handle_scope(isolate_);
|
|
const Argv argv;
|
|
|
|
std::unique_ptr<v8::MicrotaskQueue> queue = v8::MicrotaskQueue::New(
|
|
isolate_, v8::MicrotasksPolicy::kExplicit);
|
|
v8::Local<v8::Context> context =
|
|
v8::Context::New(isolate_,
|
|
nullptr,
|
|
{},
|
|
{},
|
|
v8::DeserializeInternalFieldsCallback(),
|
|
queue.get());
|
|
node::InitializeContext(context);
|
|
v8::Context::Scope context_scope(context);
|
|
|
|
using IntVec = std::vector<int>;
|
|
IntVec callback_calls;
|
|
v8::Local<v8::Function> must_call = v8::Function::New(
|
|
context,
|
|
[](const v8::FunctionCallbackInfo<v8::Value>& info) {
|
|
IntVec* callback_calls = static_cast<IntVec*>(
|
|
info.Data().As<v8::External>()->Value());
|
|
callback_calls->push_back(info[0].As<v8::Int32>()->Value());
|
|
},
|
|
v8::External::New(isolate_, static_cast<void*>(&callback_calls)))
|
|
.ToLocalChecked();
|
|
context->Global()->Set(
|
|
context,
|
|
v8::String::NewFromUtf8Literal(isolate_, "mustCall"),
|
|
must_call).Check();
|
|
|
|
node::Environment* env =
|
|
node::CreateEnvironment(isolate_data_, context, {}, {});
|
|
CHECK_NE(nullptr, env);
|
|
|
|
v8::Local<v8::Function> eval_in_env = node::LoadEnvironment(
|
|
env,
|
|
"mustCall(1);\n"
|
|
"Promise.resolve().then(() => mustCall(2));\n"
|
|
"require('vm').runInNewContext("
|
|
" 'Promise.resolve().then(() => mustCall(3))',"
|
|
" { mustCall },"
|
|
" { microtaskMode: 'afterEvaluate' }"
|
|
");\n"
|
|
"require('vm').runInNewContext("
|
|
" 'Promise.resolve().then(() => mustCall(4))',"
|
|
" { mustCall }"
|
|
");\n"
|
|
"setTimeout(() => {"
|
|
" Promise.resolve().then(() => mustCall(5));"
|
|
"}, 10);\n"
|
|
"mustCall(6);\n"
|
|
"return eval;\n").ToLocalChecked().As<v8::Function>();
|
|
EXPECT_EQ(callback_calls, (IntVec { 1, 3, 6, 2, 4 }));
|
|
v8::Local<v8::Value> queue_microtask_code = v8::String::NewFromUtf8Literal(
|
|
isolate_, "queueMicrotask(() => mustCall(7));");
|
|
eval_in_env->Call(context,
|
|
v8::Null(isolate_),
|
|
1,
|
|
&queue_microtask_code).ToLocalChecked();
|
|
EXPECT_EQ(callback_calls, (IntVec { 1, 3, 6, 2, 4 }));
|
|
isolate_->PerformMicrotaskCheckpoint();
|
|
EXPECT_EQ(callback_calls, (IntVec { 1, 3, 6, 2, 4 }));
|
|
queue->PerformCheckpoint(isolate_);
|
|
EXPECT_EQ(callback_calls, (IntVec { 1, 3, 6, 2, 4, 7 }));
|
|
|
|
int exit_code = SpinEventLoop(env).FromJust();
|
|
EXPECT_EQ(exit_code, 0);
|
|
EXPECT_EQ(callback_calls, (IntVec { 1, 3, 6, 2, 4, 7, 5 }));
|
|
|
|
node::FreeEnvironment(env);
|
|
}
|
|
|
|
static bool interrupted = false;
|
|
static void OnInterrupt(void* arg) {
|
|
interrupted = true;
|
|
}
|
|
TEST_F(EnvironmentTest, RequestInterruptAtExit) {
|
|
const v8::HandleScope handle_scope(isolate_);
|
|
const Argv argv;
|
|
|
|
Local<Context> context = node::NewContext(isolate_);
|
|
CHECK(!context.IsEmpty());
|
|
context->Enter();
|
|
|
|
std::vector<std::string> args(*argv, *argv + 1);
|
|
std::vector<std::string> exec_args(*argv, *argv + 1);
|
|
node::Environment* environment =
|
|
node::CreateEnvironment(isolate_data_, context, args, exec_args);
|
|
CHECK_NE(nullptr, environment);
|
|
|
|
node::RequestInterrupt(environment, OnInterrupt, nullptr);
|
|
node::FreeEnvironment(environment);
|
|
EXPECT_TRUE(interrupted);
|
|
|
|
context->Exit();
|
|
}
|
|
|
|
TEST_F(EnvironmentTest, EmbedderPreload) {
|
|
v8::HandleScope handle_scope(isolate_);
|
|
v8::Local<v8::Context> context = node::NewContext(isolate_);
|
|
v8::Context::Scope context_scope(context);
|
|
|
|
node::EmbedderPreloadCallback preload = [](node::Environment* env,
|
|
v8::Local<v8::Value> process,
|
|
v8::Local<v8::Value> require) {
|
|
CHECK(process->IsObject());
|
|
CHECK(require->IsFunction());
|
|
process.As<v8::Object>()
|
|
->Set(env->context(),
|
|
v8::String::NewFromUtf8Literal(env->isolate(), "prop"),
|
|
v8::String::NewFromUtf8Literal(env->isolate(), "preload"))
|
|
.Check();
|
|
};
|
|
|
|
std::unique_ptr<node::Environment, decltype(&node::FreeEnvironment)> env(
|
|
node::CreateEnvironment(isolate_data_, context, {}, {}),
|
|
node::FreeEnvironment);
|
|
|
|
v8::Local<v8::Value> main_ret =
|
|
node::LoadEnvironment(env.get(), "return process.prop;", preload)
|
|
.ToLocalChecked();
|
|
node::Utf8Value main_ret_str(isolate_, main_ret);
|
|
EXPECT_EQ(std::string(*main_ret_str), "preload");
|
|
}
|