mirror of
https://github.com/nodejs/node.git
synced 2024-11-21 10:59:27 +00:00
b34512e38e
This PR adds a |preload| arg to the node::LoadEnvironment to allow embedders to set a preload function for the environment, which will run after the environment is loaded and before the main script runs. This is similiar to the --require CLI option, but runs a C++ function, and can only be set by embedders. The preload function can be used by embedders to inject scripts before running the main script, for example: 1. In Electron it is used to initialize the ASAR virtual filesystem, inject custom process properties, etc. 2. In VS Code it can be used to reset the module search paths for extensions. PR-URL: https://github.com/nodejs/node/pull/51539 Reviewed-By: Joyee Cheung <joyeec9h3@gmail.com> Reviewed-By: Yagiz Nizipli <yagiz.nizipli@sentry.io>
809 lines
26 KiB
C++
809 lines
26 KiB
C++
#include "node_buffer.h"
|
|
#include "node_internals.h"
|
|
#include "libplatform/libplatform.h"
|
|
#include "util.h"
|
|
|
|
#include <string>
|
|
#include "gtest/gtest.h"
|
|
#include "node_test_fixture.h"
|
|
#include <stdio.h>
|
|
#include <cstdio>
|
|
|
|
using node::AtExit;
|
|
using node::RunAtExit;
|
|
using node::USE;
|
|
using v8::Context;
|
|
using v8::Local;
|
|
|
|
static bool called_cb_1 = false;
|
|
static bool called_cb_2 = false;
|
|
static bool called_cb_ordered_1 = false;
|
|
static bool called_cb_ordered_2 = false;
|
|
static bool called_at_exit_js = false;
|
|
static void at_exit_callback1(void* arg);
|
|
static void at_exit_callback2(void* arg);
|
|
static void at_exit_callback_ordered1(void* arg);
|
|
static void at_exit_callback_ordered2(void* arg);
|
|
static void at_exit_js(void* arg);
|
|
static std::string cb_1_arg; // NOLINT(runtime/string)
|
|
|
|
class EnvironmentTest : public EnvironmentTestFixture {
|
|
private:
|
|
void TearDown() override {
|
|
EnvironmentTestFixture::TearDown();
|
|
called_cb_1 = false;
|
|
called_cb_2 = false;
|
|
called_cb_ordered_1 = false;
|
|
called_cb_ordered_2 = false;
|
|
}
|
|
};
|
|
|
|
TEST_F(EnvironmentTest, EnvironmentWithoutBrowserGlobals) {
|
|
const v8::HandleScope handle_scope(isolate_);
|
|
Argv argv;
|
|
Env env{handle_scope, argv, node::EnvironmentFlags::kNoBrowserGlobals};
|
|
|
|
SetProcessExitHandler(*env, [&](node::Environment* env_, int exit_code) {
|
|
EXPECT_EQ(*env, env_);
|
|
EXPECT_EQ(exit_code, 0);
|
|
node::Stop(*env);
|
|
});
|
|
|
|
node::LoadEnvironment(
|
|
*env,
|
|
"const assert = require('assert');"
|
|
"const path = require('path');"
|
|
"const relativeRequire = "
|
|
" require('module').createRequire(path.join(process.cwd(), 'stub.js'));"
|
|
"const { intrinsics, nodeGlobals } = "
|
|
" relativeRequire('./test/common/globals');"
|
|
"const items = Object.getOwnPropertyNames(globalThis);"
|
|
"const leaks = [];"
|
|
"for (const item of items) {"
|
|
" if (intrinsics.has(item)) {"
|
|
" continue;"
|
|
" }"
|
|
" if (nodeGlobals.has(item)) {"
|
|
" continue;"
|
|
" }"
|
|
" leaks.push(item);"
|
|
"}"
|
|
"assert.deepStrictEqual(leaks, []);");
|
|
}
|
|
|
|
TEST_F(EnvironmentTest, EnvironmentWithESMLoader) {
|
|
const v8::HandleScope handle_scope(isolate_);
|
|
Argv argv;
|
|
Env env {handle_scope, argv};
|
|
|
|
node::Environment* envi = *env;
|
|
envi->options()->experimental_vm_modules = true;
|
|
|
|
SetProcessExitHandler(*env, [&](node::Environment* env_, int exit_code) {
|
|
EXPECT_EQ(*env, env_);
|
|
EXPECT_EQ(exit_code, 0);
|
|
node::Stop(*env);
|
|
});
|
|
|
|
node::LoadEnvironment(
|
|
*env,
|
|
"const { SourceTextModule } = require('vm');"
|
|
"(async () => {"
|
|
"const stmString = 'globalThis.importResult = import(\"\")';"
|
|
"const m = new SourceTextModule(stmString, {"
|
|
"importModuleDynamically: (async () => {"
|
|
"const m = new SourceTextModule('');"
|
|
"await m.link(() => 0);"
|
|
"await m.evaluate();"
|
|
"return m.namespace;"
|
|
"}),"
|
|
"});"
|
|
"await m.link(() => 0);"
|
|
"await m.evaluate();"
|
|
"delete globalThis.importResult;"
|
|
"process.exit(0);"
|
|
"})()");
|
|
}
|
|
|
|
class RedirectStdErr {
|
|
public:
|
|
explicit RedirectStdErr(const char* filename) : filename_(filename) {
|
|
fflush(stderr);
|
|
fgetpos(stderr, &pos_);
|
|
fd_ = dup(fileno(stderr));
|
|
USE(freopen(filename_, "w", stderr));
|
|
}
|
|
|
|
~RedirectStdErr() {
|
|
fflush(stderr);
|
|
dup2(fd_, fileno(stderr));
|
|
close(fd_);
|
|
remove(filename_);
|
|
clearerr(stderr);
|
|
fsetpos(stderr, &pos_);
|
|
}
|
|
|
|
private:
|
|
int fd_;
|
|
fpos_t pos_;
|
|
const char* filename_;
|
|
};
|
|
|
|
TEST_F(EnvironmentTest, EnvironmentWithNoESMLoader) {
|
|
// The following line will cause stderr to get redirected to avoid the
|
|
// error that would otherwise be printed to the console by this test.
|
|
RedirectStdErr redirect_scope("environment_test.log");
|
|
const v8::HandleScope handle_scope(isolate_);
|
|
Argv argv;
|
|
Env env {handle_scope, argv, node::EnvironmentFlags::kNoRegisterESMLoader};
|
|
|
|
node::Environment* envi = *env;
|
|
envi->options()->experimental_vm_modules = true;
|
|
|
|
SetProcessExitHandler(*env, [&](node::Environment* env_, int exit_code) {
|
|
EXPECT_EQ(*env, env_);
|
|
EXPECT_EQ(exit_code, 1);
|
|
node::Stop(*env);
|
|
});
|
|
|
|
node::LoadEnvironment(
|
|
*env,
|
|
"const { SourceTextModule } = require('vm');"
|
|
"(async () => {"
|
|
"const stmString = 'globalThis.importResult = import(\"\")';"
|
|
"const m = new SourceTextModule(stmString, {"
|
|
"importModuleDynamically: (async () => {"
|
|
"const m = new SourceTextModule('');"
|
|
"await m.link(() => 0);"
|
|
"await m.evaluate();"
|
|
"return m.namespace;"
|
|
"}),"
|
|
"});"
|
|
"await m.link(() => 0);"
|
|
"await m.evaluate();"
|
|
"delete globalThis.importResult;"
|
|
"})()");
|
|
}
|
|
|
|
TEST_F(EnvironmentTest, PreExecutionPreparation) {
|
|
const v8::HandleScope handle_scope(isolate_);
|
|
const Argv argv;
|
|
Env env {handle_scope, argv};
|
|
|
|
node::LoadEnvironment(*env, [&](const node::StartExecutionCallbackInfo& info)
|
|
-> v8::MaybeLocal<v8::Value> {
|
|
return v8::Null(isolate_);
|
|
});
|
|
|
|
v8::Local<v8::Context> context = isolate_->GetCurrentContext();
|
|
const char* run_script = "process.argv0";
|
|
v8::Local<v8::Script> script = v8::Script::Compile(
|
|
context,
|
|
v8::String::NewFromOneByte(isolate_,
|
|
reinterpret_cast<const uint8_t*>(run_script))
|
|
.ToLocalChecked())
|
|
.ToLocalChecked();
|
|
v8::Local<v8::Value> result = script->Run(context).ToLocalChecked();
|
|
CHECK(result->IsString());
|
|
}
|
|
|
|
TEST_F(EnvironmentTest, LoadEnvironmentWithCallback) {
|
|
const v8::HandleScope handle_scope(isolate_);
|
|
const Argv argv;
|
|
Env env {handle_scope, argv};
|
|
|
|
v8::Local<v8::Context> context = isolate_->GetCurrentContext();
|
|
bool called_cb = false;
|
|
node::LoadEnvironment(*env,
|
|
[&](const node::StartExecutionCallbackInfo& info)
|
|
-> v8::MaybeLocal<v8::Value> {
|
|
called_cb = true;
|
|
|
|
CHECK(info.process_object->IsObject());
|
|
CHECK(info.native_require->IsFunction());
|
|
|
|
v8::Local<v8::Value> argv0 = info.process_object->Get(
|
|
context,
|
|
v8::String::NewFromOneByte(
|
|
isolate_,
|
|
reinterpret_cast<const uint8_t*>("argv0"))
|
|
.ToLocalChecked()).ToLocalChecked();
|
|
CHECK(argv0->IsString());
|
|
|
|
return info.process_object;
|
|
});
|
|
|
|
CHECK(called_cb);
|
|
}
|
|
|
|
TEST_F(EnvironmentTest, LoadEnvironmentWithSource) {
|
|
const v8::HandleScope handle_scope(isolate_);
|
|
const Argv argv;
|
|
Env env {handle_scope, argv};
|
|
|
|
v8::Local<v8::Context> context = isolate_->GetCurrentContext();
|
|
v8::Local<v8::Value> main_ret =
|
|
node::LoadEnvironment(*env,
|
|
"return { process, require };").ToLocalChecked();
|
|
|
|
CHECK(main_ret->IsObject());
|
|
CHECK(main_ret.As<v8::Object>()->Get(
|
|
context,
|
|
v8::String::NewFromOneByte(
|
|
isolate_,
|
|
reinterpret_cast<const uint8_t*>("process"))
|
|
.ToLocalChecked())
|
|
.ToLocalChecked()->IsObject());
|
|
CHECK(main_ret.As<v8::Object>()->Get(
|
|
context,
|
|
v8::String::NewFromOneByte(
|
|
isolate_,
|
|
reinterpret_cast<const uint8_t*>("require"))
|
|
.ToLocalChecked())
|
|
.ToLocalChecked()->IsFunction());
|
|
}
|
|
|
|
TEST_F(EnvironmentTest, AtExitWithEnvironment) {
|
|
const v8::HandleScope handle_scope(isolate_);
|
|
const Argv argv;
|
|
Env env {handle_scope, argv};
|
|
|
|
AtExit(*env, at_exit_callback1, nullptr);
|
|
RunAtExit(*env);
|
|
EXPECT_TRUE(called_cb_1);
|
|
}
|
|
|
|
TEST_F(EnvironmentTest, AtExitOrder) {
|
|
const v8::HandleScope handle_scope(isolate_);
|
|
const Argv argv;
|
|
Env env {handle_scope, argv};
|
|
|
|
// Test that callbacks are run in reverse order.
|
|
AtExit(*env, at_exit_callback_ordered1, nullptr);
|
|
AtExit(*env, at_exit_callback_ordered2, nullptr);
|
|
RunAtExit(*env);
|
|
EXPECT_TRUE(called_cb_ordered_1);
|
|
EXPECT_TRUE(called_cb_ordered_2);
|
|
}
|
|
|
|
TEST_F(EnvironmentTest, AtExitWithArgument) {
|
|
const v8::HandleScope handle_scope(isolate_);
|
|
const Argv argv;
|
|
Env env {handle_scope, argv};
|
|
|
|
std::string arg{"some args"};
|
|
AtExit(*env, at_exit_callback1, static_cast<void*>(&arg));
|
|
RunAtExit(*env);
|
|
EXPECT_EQ(arg, cb_1_arg);
|
|
}
|
|
|
|
TEST_F(EnvironmentTest, AtExitRunsJS) {
|
|
const v8::HandleScope handle_scope(isolate_);
|
|
const Argv argv;
|
|
Env env {handle_scope, argv};
|
|
|
|
AtExit(*env, at_exit_js, static_cast<void*>(isolate_));
|
|
EXPECT_FALSE(called_at_exit_js);
|
|
RunAtExit(*env);
|
|
EXPECT_TRUE(called_at_exit_js);
|
|
}
|
|
|
|
TEST_F(EnvironmentTest, MultipleEnvironmentsPerIsolate) {
|
|
const v8::HandleScope handle_scope(isolate_);
|
|
const Argv argv;
|
|
// Only one of the Environments can have default flags and own the inspector.
|
|
Env env1 {handle_scope, argv};
|
|
Env env2 {handle_scope, argv, node::EnvironmentFlags::kNoFlags};
|
|
|
|
AtExit(*env1, at_exit_callback1, nullptr);
|
|
AtExit(*env2, at_exit_callback2, nullptr);
|
|
RunAtExit(*env1);
|
|
EXPECT_TRUE(called_cb_1);
|
|
EXPECT_FALSE(called_cb_2);
|
|
|
|
RunAtExit(*env2);
|
|
EXPECT_TRUE(called_cb_2);
|
|
}
|
|
|
|
TEST_F(EnvironmentTest, NoEnvironmentSanity) {
|
|
const v8::HandleScope handle_scope(isolate_);
|
|
v8::Local<v8::Context> context = v8::Context::New(isolate_);
|
|
EXPECT_EQ(node::Environment::GetCurrent(context), nullptr);
|
|
EXPECT_EQ(node::GetCurrentEnvironment(context), nullptr);
|
|
EXPECT_EQ(node::Environment::GetCurrent(isolate_), nullptr);
|
|
|
|
v8::Context::Scope context_scope(context);
|
|
EXPECT_EQ(node::Environment::GetCurrent(context), nullptr);
|
|
EXPECT_EQ(node::GetCurrentEnvironment(context), nullptr);
|
|
EXPECT_EQ(node::Environment::GetCurrent(isolate_), nullptr);
|
|
}
|
|
|
|
TEST_F(EnvironmentTest, NonNodeJSContext) {
|
|
const v8::HandleScope handle_scope(isolate_);
|
|
const Argv argv;
|
|
Env test_env {handle_scope, argv};
|
|
|
|
EXPECT_EQ(node::Environment::GetCurrent(v8::Local<v8::Context>()), nullptr);
|
|
|
|
node::Environment* env = *test_env;
|
|
EXPECT_EQ(node::Environment::GetCurrent(isolate_), env);
|
|
EXPECT_EQ(node::Environment::GetCurrent(env->context()), env);
|
|
EXPECT_EQ(node::GetCurrentEnvironment(env->context()), env);
|
|
|
|
v8::Local<v8::Context> context = v8::Context::New(isolate_);
|
|
EXPECT_EQ(node::Environment::GetCurrent(context), nullptr);
|
|
EXPECT_EQ(node::GetCurrentEnvironment(context), nullptr);
|
|
EXPECT_EQ(node::Environment::GetCurrent(isolate_), env);
|
|
|
|
v8::Context::Scope context_scope(context);
|
|
EXPECT_EQ(node::Environment::GetCurrent(context), nullptr);
|
|
EXPECT_EQ(node::GetCurrentEnvironment(context), nullptr);
|
|
EXPECT_EQ(node::Environment::GetCurrent(isolate_), nullptr);
|
|
}
|
|
|
|
static void at_exit_callback1(void* arg) {
|
|
called_cb_1 = true;
|
|
if (arg) {
|
|
cb_1_arg = *static_cast<std::string*>(arg);
|
|
}
|
|
}
|
|
|
|
static void at_exit_callback2(void* arg) {
|
|
called_cb_2 = true;
|
|
}
|
|
|
|
static void at_exit_callback_ordered1(void* arg) {
|
|
EXPECT_TRUE(called_cb_ordered_2);
|
|
called_cb_ordered_1 = true;
|
|
}
|
|
|
|
static void at_exit_callback_ordered2(void* arg) {
|
|
EXPECT_FALSE(called_cb_ordered_1);
|
|
called_cb_ordered_2 = true;
|
|
}
|
|
|
|
static void at_exit_js(void* arg) {
|
|
v8::Isolate* isolate = static_cast<v8::Isolate*>(arg);
|
|
v8::HandleScope handle_scope(isolate);
|
|
v8::Local<v8::Object> obj = v8::Object::New(isolate);
|
|
EXPECT_FALSE(obj.IsEmpty()); // Assert VM is still alive.
|
|
EXPECT_TRUE(obj->IsObject());
|
|
called_at_exit_js = true;
|
|
}
|
|
|
|
TEST_F(EnvironmentTest, SetImmediateCleanup) {
|
|
int called = 0;
|
|
int called_unref = 0;
|
|
|
|
{
|
|
const v8::HandleScope handle_scope(isolate_);
|
|
const Argv argv;
|
|
Env env {handle_scope, argv};
|
|
|
|
node::LoadEnvironment(*env,
|
|
[&](const node::StartExecutionCallbackInfo& info)
|
|
-> v8::MaybeLocal<v8::Value> {
|
|
return v8::Object::New(isolate_);
|
|
});
|
|
|
|
(*env)->SetImmediate([&](node::Environment* env_arg) {
|
|
EXPECT_EQ(env_arg, *env);
|
|
called++;
|
|
}, node::CallbackFlags::kRefed);
|
|
(*env)->SetImmediate([&](node::Environment* env_arg) {
|
|
EXPECT_EQ(env_arg, *env);
|
|
called_unref++;
|
|
}, node::CallbackFlags::kUnrefed);
|
|
}
|
|
|
|
EXPECT_EQ(called, 1);
|
|
EXPECT_EQ(called_unref, 0);
|
|
}
|
|
|
|
static char hello[] = "hello";
|
|
|
|
TEST_F(EnvironmentTest, BufferWithFreeCallbackIsDetached) {
|
|
// Test that a Buffer allocated with a free callback is detached after
|
|
// its callback has been called.
|
|
const v8::HandleScope handle_scope(isolate_);
|
|
const Argv argv;
|
|
|
|
int callback_calls = 0;
|
|
|
|
v8::Local<v8::ArrayBuffer> ab;
|
|
{
|
|
Env env {handle_scope, argv};
|
|
v8::Local<v8::Object> buf_obj = node::Buffer::New(
|
|
isolate_,
|
|
hello,
|
|
sizeof(hello),
|
|
[](char* data, void* hint) {
|
|
CHECK_EQ(data, hello);
|
|
++*static_cast<int*>(hint);
|
|
},
|
|
&callback_calls).ToLocalChecked();
|
|
CHECK(buf_obj->IsUint8Array());
|
|
ab = buf_obj.As<v8::Uint8Array>()->Buffer();
|
|
CHECK_EQ(ab->ByteLength(), sizeof(hello));
|
|
}
|
|
|
|
CHECK_EQ(callback_calls, 1);
|
|
CHECK_EQ(ab->ByteLength(), 0);
|
|
}
|
|
|
|
#if HAVE_INSPECTOR
|
|
TEST_F(EnvironmentTest, InspectorMultipleEmbeddedEnvironments) {
|
|
// Tests that child Environments can be created through the public API
|
|
// that are accessible by the inspector.
|
|
// This test sets a global variable in the child Environment, and reads it
|
|
// back both through the inspector and inside the child Environment, and
|
|
// makes sure that those correspond to the value that was originally set.
|
|
const v8::HandleScope handle_scope(isolate_);
|
|
const Argv argv;
|
|
Env env {handle_scope, argv};
|
|
|
|
v8::Local<v8::Context> context = isolate_->GetCurrentContext();
|
|
node::LoadEnvironment(*env,
|
|
"'use strict';\n"
|
|
"const { Worker } = require('worker_threads');\n"
|
|
"const { Session } = require('inspector');\n"
|
|
|
|
"const session = new Session();\n"
|
|
"session.connect();\n"
|
|
"session.on('NodeWorker.attachedToWorker', (\n"
|
|
" ({ params: { workerInfo, sessionId } }) => {\n"
|
|
" session.post('NodeWorker.sendMessageToWorker', {\n"
|
|
" sessionId,\n"
|
|
" message: JSON.stringify({\n"
|
|
" id: 1,\n"
|
|
" method: 'Runtime.evaluate',\n"
|
|
" params: {\n"
|
|
" expression: 'globalThis.variableFromParent = 42;'\n"
|
|
" }\n"
|
|
" })\n"
|
|
" });\n"
|
|
" session.on('NodeWorker.receivedMessageFromWorker',\n"
|
|
" ({ params: { message } }) => {\n"
|
|
" global.messageFromWorker = \n"
|
|
" JSON.parse(message).result.result.value;\n"
|
|
" });\n"
|
|
" }));\n"
|
|
"session.post('NodeWorker.enable', { waitForDebuggerOnStart: false });\n")
|
|
.ToLocalChecked();
|
|
|
|
struct ChildEnvironmentData {
|
|
node::ThreadId thread_id;
|
|
std::unique_ptr<node::InspectorParentHandle> inspector_parent_handle;
|
|
node::MultiIsolatePlatform* platform;
|
|
int32_t extracted_value = -1;
|
|
uv_async_t thread_stopped_async;
|
|
};
|
|
|
|
ChildEnvironmentData data;
|
|
data.thread_id = node::AllocateEnvironmentThreadId();
|
|
data.inspector_parent_handle =
|
|
GetInspectorParentHandle(*env, data.thread_id, "file:///embedded.js");
|
|
CHECK(data.inspector_parent_handle);
|
|
data.platform = GetMultiIsolatePlatform(*env);
|
|
CHECK_NOT_NULL(data.platform);
|
|
|
|
bool thread_stopped = false;
|
|
int err = uv_async_init(
|
|
¤t_loop, &data.thread_stopped_async, [](uv_async_t* async) {
|
|
*static_cast<bool*>(async->data) = true;
|
|
uv_close(reinterpret_cast<uv_handle_t*>(async), nullptr);
|
|
});
|
|
CHECK_EQ(err, 0);
|
|
data.thread_stopped_async.data = &thread_stopped;
|
|
|
|
uv_thread_t thread;
|
|
err = uv_thread_create(&thread, [](void* arg) {
|
|
ChildEnvironmentData* data = static_cast<ChildEnvironmentData*>(arg);
|
|
std::shared_ptr<node::ArrayBufferAllocator> aba =
|
|
node::ArrayBufferAllocator::Create();
|
|
uv_loop_t loop;
|
|
uv_loop_init(&loop);
|
|
v8::Isolate* isolate = NewIsolate(aba, &loop, data->platform);
|
|
CHECK_NOT_NULL(isolate);
|
|
|
|
{
|
|
v8::Isolate::Scope isolate_scope(isolate);
|
|
v8::HandleScope handle_scope(isolate);
|
|
|
|
v8::Local<v8::Context> context = node::NewContext(isolate);
|
|
CHECK(!context.IsEmpty());
|
|
v8::Context::Scope context_scope(context);
|
|
|
|
node::IsolateData* isolate_data = node::CreateIsolateData(
|
|
isolate,
|
|
&loop,
|
|
data->platform);
|
|
CHECK_NOT_NULL(isolate_data);
|
|
node::Environment* environment = node::CreateEnvironment(
|
|
isolate_data,
|
|
context,
|
|
{ "dummy" },
|
|
{},
|
|
node::EnvironmentFlags::kNoFlags,
|
|
data->thread_id,
|
|
std::move(data->inspector_parent_handle));
|
|
CHECK_NOT_NULL(environment);
|
|
|
|
v8::Local<v8::Value> extracted_value = LoadEnvironment(
|
|
environment,
|
|
"while (!global.variableFromParent) {}\n"
|
|
"return global.variableFromParent;").ToLocalChecked();
|
|
|
|
uv_run(&loop, UV_RUN_DEFAULT);
|
|
CHECK(extracted_value->IsInt32());
|
|
data->extracted_value = extracted_value.As<v8::Int32>()->Value();
|
|
|
|
node::FreeEnvironment(environment);
|
|
node::FreeIsolateData(isolate_data);
|
|
}
|
|
|
|
data->platform->UnregisterIsolate(isolate);
|
|
isolate->Dispose();
|
|
uv_run(&loop, UV_RUN_DEFAULT);
|
|
CHECK_EQ(uv_loop_close(&loop), 0);
|
|
|
|
uv_async_send(&data->thread_stopped_async);
|
|
}, &data);
|
|
CHECK_EQ(err, 0);
|
|
|
|
bool more;
|
|
do {
|
|
uv_run(¤t_loop, UV_RUN_DEFAULT);
|
|
data.platform->DrainTasks(isolate_);
|
|
more = uv_loop_alive(¤t_loop);
|
|
} while (!thread_stopped || more);
|
|
|
|
uv_thread_join(&thread);
|
|
|
|
v8::Local<v8::Value> from_inspector =
|
|
context->Global()->Get(
|
|
context,
|
|
v8::String::NewFromOneByte(
|
|
isolate_,
|
|
reinterpret_cast<const uint8_t*>("messageFromWorker"))
|
|
.ToLocalChecked())
|
|
.ToLocalChecked();
|
|
CHECK_EQ(data.extracted_value, 42);
|
|
CHECK_EQ(from_inspector->IntegerValue(context).FromJust(), 42);
|
|
}
|
|
#endif // HAVE_INSPECTOR
|
|
|
|
TEST_F(EnvironmentTest, ExitHandlerTest) {
|
|
const v8::HandleScope handle_scope(isolate_);
|
|
const Argv argv;
|
|
|
|
int callback_calls = 0;
|
|
|
|
Env env {handle_scope, argv};
|
|
SetProcessExitHandler(*env, [&](node::Environment* env_, int exit_code) {
|
|
EXPECT_EQ(*env, env_);
|
|
EXPECT_EQ(exit_code, 42);
|
|
callback_calls++;
|
|
node::Stop(*env);
|
|
});
|
|
// When terminating, v8 throws makes the current embedder call bail out
|
|
// with MaybeLocal<>()
|
|
EXPECT_TRUE(node::LoadEnvironment(*env, "process.exit(42)").IsEmpty());
|
|
EXPECT_EQ(callback_calls, 1);
|
|
}
|
|
|
|
TEST_F(EnvironmentTest, SetImmediateMicrotasks) {
|
|
int called = 0;
|
|
|
|
{
|
|
const v8::HandleScope handle_scope(isolate_);
|
|
const Argv argv;
|
|
Env env {handle_scope, argv};
|
|
|
|
node::LoadEnvironment(*env,
|
|
[&](const node::StartExecutionCallbackInfo& info)
|
|
-> v8::MaybeLocal<v8::Value> {
|
|
return v8::Object::New(isolate_);
|
|
});
|
|
|
|
(*env)->SetImmediate([&](node::Environment* env_arg) {
|
|
EXPECT_EQ(env_arg, *env);
|
|
isolate_->EnqueueMicrotask([](void* arg) {
|
|
++*static_cast<int*>(arg);
|
|
}, &called);
|
|
}, node::CallbackFlags::kRefed);
|
|
uv_run(¤t_loop, UV_RUN_DEFAULT);
|
|
}
|
|
|
|
EXPECT_EQ(called, 1);
|
|
}
|
|
|
|
#ifndef _WIN32 // No SIGINT on Windows.
|
|
TEST_F(NodeZeroIsolateTestFixture, CtrlCWithOnlySafeTerminationTest) {
|
|
// We need to go through the whole setup dance here because we want to
|
|
// set only_terminate_in_safe_scope.
|
|
// Allocate and initialize Isolate.
|
|
v8::Isolate::CreateParams create_params;
|
|
create_params.array_buffer_allocator = allocator.get();
|
|
create_params.only_terminate_in_safe_scope = true;
|
|
v8::Isolate* isolate = v8::Isolate::Allocate();
|
|
CHECK_NOT_NULL(isolate);
|
|
platform->RegisterIsolate(isolate, ¤t_loop);
|
|
v8::Isolate::Initialize(isolate, create_params);
|
|
|
|
// Try creating Context + IsolateData + Environment.
|
|
{
|
|
v8::Isolate::Scope isolate_scope(isolate);
|
|
v8::HandleScope handle_scope(isolate);
|
|
|
|
auto context = node::NewContext(isolate);
|
|
CHECK(!context.IsEmpty());
|
|
v8::Context::Scope context_scope(context);
|
|
|
|
std::unique_ptr<node::IsolateData, decltype(&node::FreeIsolateData)>
|
|
isolate_data{node::CreateIsolateData(isolate,
|
|
¤t_loop,
|
|
platform.get()),
|
|
node::FreeIsolateData};
|
|
CHECK(isolate_data);
|
|
|
|
std::unique_ptr<node::Environment, decltype(&node::FreeEnvironment)>
|
|
environment{node::CreateEnvironment(isolate_data.get(),
|
|
context,
|
|
{},
|
|
{}),
|
|
node::FreeEnvironment};
|
|
CHECK(environment);
|
|
EXPECT_EQ(node::GetEnvironmentIsolateData(environment.get()),
|
|
isolate_data.get());
|
|
EXPECT_EQ(node::GetArrayBufferAllocator(isolate_data.get()), nullptr);
|
|
|
|
v8::Local<v8::Value> main_ret =
|
|
node::LoadEnvironment(environment.get(),
|
|
"'use strict';\n"
|
|
"const { runInThisContext } = require('vm');\n"
|
|
"try {\n"
|
|
" runInThisContext("
|
|
" `process.kill(process.pid, 'SIGINT'); while(true){}`, "
|
|
" { breakOnSigint: true });\n"
|
|
" return 'unreachable';\n"
|
|
"} catch (err) {\n"
|
|
" return err.code;\n"
|
|
"}").ToLocalChecked();
|
|
node::Utf8Value main_ret_str(isolate, main_ret);
|
|
EXPECT_EQ(std::string(*main_ret_str), "ERR_SCRIPT_EXECUTION_INTERRUPTED");
|
|
}
|
|
|
|
// Cleanup.
|
|
platform->UnregisterIsolate(isolate);
|
|
isolate->Dispose();
|
|
}
|
|
#endif // _WIN32
|
|
|
|
TEST_F(EnvironmentTest, NestedMicrotaskQueue) {
|
|
const v8::HandleScope handle_scope(isolate_);
|
|
const Argv argv;
|
|
|
|
std::unique_ptr<v8::MicrotaskQueue> queue = v8::MicrotaskQueue::New(
|
|
isolate_, v8::MicrotasksPolicy::kExplicit);
|
|
v8::Local<v8::Context> context =
|
|
v8::Context::New(isolate_,
|
|
nullptr,
|
|
{},
|
|
{},
|
|
v8::DeserializeInternalFieldsCallback(),
|
|
queue.get());
|
|
node::InitializeContext(context);
|
|
v8::Context::Scope context_scope(context);
|
|
|
|
using IntVec = std::vector<int>;
|
|
IntVec callback_calls;
|
|
v8::Local<v8::Function> must_call = v8::Function::New(
|
|
context,
|
|
[](const v8::FunctionCallbackInfo<v8::Value>& info) {
|
|
IntVec* callback_calls = static_cast<IntVec*>(
|
|
info.Data().As<v8::External>()->Value());
|
|
callback_calls->push_back(info[0].As<v8::Int32>()->Value());
|
|
},
|
|
v8::External::New(isolate_, static_cast<void*>(&callback_calls)))
|
|
.ToLocalChecked();
|
|
context->Global()->Set(
|
|
context,
|
|
v8::String::NewFromUtf8Literal(isolate_, "mustCall"),
|
|
must_call).Check();
|
|
|
|
node::Environment* env =
|
|
node::CreateEnvironment(isolate_data_, context, {}, {});
|
|
CHECK_NE(nullptr, env);
|
|
|
|
v8::Local<v8::Function> eval_in_env = node::LoadEnvironment(
|
|
env,
|
|
"mustCall(1);\n"
|
|
"Promise.resolve().then(() => mustCall(2));\n"
|
|
"require('vm').runInNewContext("
|
|
" 'Promise.resolve().then(() => mustCall(3))',"
|
|
" { mustCall },"
|
|
" { microtaskMode: 'afterEvaluate' }"
|
|
");\n"
|
|
"require('vm').runInNewContext("
|
|
" 'Promise.resolve().then(() => mustCall(4))',"
|
|
" { mustCall }"
|
|
");\n"
|
|
"setTimeout(() => {"
|
|
" Promise.resolve().then(() => mustCall(5));"
|
|
"}, 10);\n"
|
|
"mustCall(6);\n"
|
|
"return eval;\n").ToLocalChecked().As<v8::Function>();
|
|
EXPECT_EQ(callback_calls, (IntVec { 1, 3, 6, 2, 4 }));
|
|
v8::Local<v8::Value> queue_microtask_code = v8::String::NewFromUtf8Literal(
|
|
isolate_, "queueMicrotask(() => mustCall(7));");
|
|
eval_in_env->Call(context,
|
|
v8::Null(isolate_),
|
|
1,
|
|
&queue_microtask_code).ToLocalChecked();
|
|
EXPECT_EQ(callback_calls, (IntVec { 1, 3, 6, 2, 4 }));
|
|
isolate_->PerformMicrotaskCheckpoint();
|
|
EXPECT_EQ(callback_calls, (IntVec { 1, 3, 6, 2, 4 }));
|
|
queue->PerformCheckpoint(isolate_);
|
|
EXPECT_EQ(callback_calls, (IntVec { 1, 3, 6, 2, 4, 7 }));
|
|
|
|
int exit_code = SpinEventLoop(env).FromJust();
|
|
EXPECT_EQ(exit_code, 0);
|
|
EXPECT_EQ(callback_calls, (IntVec { 1, 3, 6, 2, 4, 7, 5 }));
|
|
|
|
node::FreeEnvironment(env);
|
|
}
|
|
|
|
static bool interrupted = false;
|
|
static void OnInterrupt(void* arg) {
|
|
interrupted = true;
|
|
}
|
|
TEST_F(EnvironmentTest, RequestInterruptAtExit) {
|
|
const v8::HandleScope handle_scope(isolate_);
|
|
const Argv argv;
|
|
|
|
Local<Context> context = node::NewContext(isolate_);
|
|
CHECK(!context.IsEmpty());
|
|
context->Enter();
|
|
|
|
std::vector<std::string> args(*argv, *argv + 1);
|
|
std::vector<std::string> exec_args(*argv, *argv + 1);
|
|
node::Environment* environment =
|
|
node::CreateEnvironment(isolate_data_, context, args, exec_args);
|
|
CHECK_NE(nullptr, environment);
|
|
|
|
node::RequestInterrupt(environment, OnInterrupt, nullptr);
|
|
node::FreeEnvironment(environment);
|
|
EXPECT_TRUE(interrupted);
|
|
|
|
context->Exit();
|
|
}
|
|
|
|
TEST_F(EnvironmentTest, EmbedderPreload) {
|
|
v8::HandleScope handle_scope(isolate_);
|
|
v8::Local<v8::Context> context = node::NewContext(isolate_);
|
|
v8::Context::Scope context_scope(context);
|
|
|
|
node::EmbedderPreloadCallback preload = [](node::Environment* env,
|
|
v8::Local<v8::Value> process,
|
|
v8::Local<v8::Value> require) {
|
|
CHECK(process->IsObject());
|
|
CHECK(require->IsFunction());
|
|
process.As<v8::Object>()
|
|
->Set(env->context(),
|
|
v8::String::NewFromUtf8Literal(env->isolate(), "prop"),
|
|
v8::String::NewFromUtf8Literal(env->isolate(), "preload"))
|
|
.Check();
|
|
};
|
|
|
|
std::unique_ptr<node::Environment, decltype(&node::FreeEnvironment)> env(
|
|
node::CreateEnvironment(isolate_data_, context, {}, {}),
|
|
node::FreeEnvironment);
|
|
|
|
v8::Local<v8::Value> main_ret =
|
|
node::LoadEnvironment(env.get(), "return process.prop;", preload)
|
|
.ToLocalChecked();
|
|
node::Utf8Value main_ret_str(isolate_, main_ret);
|
|
EXPECT_EQ(std::string(*main_ret_str), "preload");
|
|
}
|