node/src
Anna Henningsen 5968c54235
worker: fix interaction of terminate() with messaging port
When a Worker is terminated, its own handle and the public
`MessagePort` are `.ref()`’ed, so that all relevant events,
including the `'exit'` events, end up being received.

However, this is problematic if messages end up being queued
from the Worker between the beginning of the `.terminate()` call
and its completion, and there are no `'message'` event handlers
present at that time. In that situation, currently the messages
would not end up being processed, and since the MessagePort
is still `.ref()`’ed, it would keep the event loop alive
indefinitely.

To fix this:

- Make sure that all messages end up being received by
  `drainMessagePort()`, including cases in which the port had
  been stopped (i.e. there are no `'message'` listeners) and
  cases in which we exceed the limit for messages being processed
  in one batch.
- Unref the Worker’s internal ports manually after the Worker
  has exited.

Either of these solutions should be solving this on its own,
but I think it makes sense to make sure that both of them
happen during cleanup.

PR-URL: https://github.com/nodejs/node/pull/37319
Reviewed-By: Benjamin Gruenbaum <benjamingr@gmail.com>
Reviewed-By: Colin Ihrig <cjihrig@gmail.com>
Reviewed-By: James M Snell <jasnell@gmail.com>
Reviewed-By: Rich Trott <rtrott@gmail.com>
2021-02-27 17:26:20 +01:00
..
api src: mark internally exported functions as explicitly internal 2021-01-24 11:12:06 -08:00
crypto crypto: make FIPS related options always awailable 2021-02-25 18:12:58 -05:00
inspector src: avoid implicit type conversions (take 2) 2021-02-20 10:50:28 +01:00
large_pages src: adjust THP sysfs config token retrieval and file closure 2021-02-17 10:46:04 +01:00
res src: update node.rc file description 2020-11-23 09:25:51 -06:00
tracing src: add public APIs to manage v8::TracingController 2020-06-16 01:04:31 +02:00
.clang-tidy
aliased_buffer.h src: support serialization of binding data 2021-02-19 19:08:04 +08:00
aliased_struct-inl.h
aliased_struct.h
allocated_buffer-inl.h src: remove superfluous inline keywords 2020-05-30 16:20:05 -07:00
allocated_buffer.h src: turn AllocatedBuffer into thin wrapper around v8::BackingStore 2020-05-30 16:20:02 -07:00
async_wrap-inl.h
async_wrap.cc src: use correct outer Context’s microtask queue 2020-12-13 22:03:45 +01:00
async_wrap.h quic: remove quic 2021-01-30 07:49:28 -08:00
base64-inl.h src: disable unfixable MSVC warnings 2021-02-20 10:50:32 +01:00
base64.h src: avoid implicit type conversions 2021-02-07 17:51:41 -08:00
base_object-inl.h src: remove ignore GCC -Wcast-function-type for v8 2020-10-26 12:41:51 +01:00
base_object.h src: support serialization of binding data 2021-02-19 19:08:04 +08:00
callback_queue-inl.h src: fix size underflow in CallbackQueue 2020-08-07 11:25:37 -07:00
callback_queue.h
cares_wrap.cc src: avoid implicit type conversions 2021-02-07 17:51:41 -08:00
connect_wrap.cc
connect_wrap.h
connection_wrap.cc
connection_wrap.h
debug_utils-inl.h
debug_utils.cc src: replace push_back with emplace_back in debug_utils 2021-01-19 00:30:22 +01:00
debug_utils.h src: add --heapsnapshot-near-heap-limit option 2020-10-22 03:41:11 +08:00
diagnosticfilename-inl.h
env-inl.h perf_hooks: complete overhaul of the implementation 2021-02-22 08:46:11 -08:00
env.cc src: support serialization of binding data 2021-02-19 19:08:04 +08:00
env.h perf_hooks: complete overhaul of the implementation 2021-02-22 08:46:11 -08:00
fs_event_wrap.cc src: reduce duplicated boilerplate with new env utility fn 2021-01-03 12:58:09 -08:00
handle_wrap.cc src: add check against non-weak BaseObjects at process exit 2020-10-07 10:54:34 +02:00
handle_wrap.h src: add check against non-weak BaseObjects at process exit 2020-10-07 10:54:34 +02:00
heap_utils.cc bootstrap: include v8 module into the builtin snapshot 2021-02-19 19:08:07 +08:00
histogram-inl.h perf_hooks: introduce createHistogram 2021-02-14 13:03:49 -08:00
histogram.cc perf_hooks: introduce createHistogram 2021-02-14 13:03:49 -08:00
histogram.h perf_hooks: introduce createHistogram 2021-02-14 13:03:49 -08:00
inspector_agent.cc src: use non-deprecated V8 module and script APIs 2021-02-25 00:16:41 +01:00
inspector_agent.h src: avoid implicit type conversions (take 2) 2021-02-20 10:50:28 +01:00
inspector_io.cc crypto: refactoring internals, add WebCrypto 2020-10-07 17:27:05 -07:00
inspector_io.h
inspector_js_api.cc src: reduce duplicated boilerplate with new env utility fn 2021-01-03 12:58:09 -08:00
inspector_profiler.cc bootstrap: include v8 module into the builtin snapshot 2021-02-19 19:08:07 +08:00
inspector_profiler.h v8: implement v8.stopCoverage() 2020-10-22 10:53:36 +00:00
inspector_socket_server.cc inspector: drop 'chrome-' from inspector url 2020-06-08 21:31:56 -04:00
inspector_socket_server.h
inspector_socket.cc src: drop localhost6 as allowed host for inspector 2021-02-23 10:50:56 +00:00
inspector_socket.h
js_native_api_types.h n-api: add more property defaults 2020-09-18 00:53:16 +02:00
js_native_api_v8_internals.h
js_native_api_v8.cc node-api: force env shutdown deferring behavior 2021-02-18 20:31:03 -08:00
js_native_api_v8.h n-api: factor out calling pattern 2020-11-15 21:48:27 -08:00
js_native_api.h n-api: support for object freeze/seal 2020-10-07 08:31:43 -07:00
js_stream.cc src: avoid implicit type conversions 2021-02-07 17:51:41 -08:00
js_stream.h
js_udp_wrap.cc src: avoid implicit type conversions 2021-02-07 17:51:41 -08:00
json_utils.cc src: simplify Reindent function in json_utils.cc 2020-06-08 14:01:54 +02:00
json_utils.h
memory_tracker-inl.h src: fix indentation in memory_tracker-inl.h 2020-12-09 05:37:16 -08:00
memory_tracker.h src: do not track BaseObjects via cleanup hooks 2020-06-11 23:39:49 +02:00
module_wrap.cc src: use non-deprecated V8 module and script APIs 2021-02-25 00:16:41 +01:00
module_wrap.h src: use non-deprecated V8 module and script APIs 2021-02-25 00:16:41 +01:00
node_api_types.h n-api: re-implement async env cleanup hooks 2020-08-27 08:18:37 -07:00
node_api.cc node-api: allow retrieval of add-on file name 2021-02-09 23:34:30 -08:00
node_api.h node-api: allow retrieval of add-on file name 2021-02-09 23:34:30 -08:00
node_binding.cc quic: remove quic 2021-01-30 07:49:28 -08:00
node_binding.h
node_blob.cc buffer: avoid creating the backing store in the thread 2021-01-26 19:12:00 -08:00
node_blob.h buffer: introduce Blob 2021-01-18 13:55:25 -08:00
node_bob-inl.h quic: initial QUIC implementation 2020-06-16 09:23:34 -07:00
node_bob.h quic: initial QUIC implementation 2020-06-16 09:23:34 -07:00
node_buffer.cc buffer: introduce Blob 2021-01-18 13:55:25 -08:00
node_buffer.h
node_code_cache_stub.cc src: remove ref to tools/generate_code_cache.js 2020-06-15 06:00:15 +02:00
node_config.cc crypto: make FIPS related options always awailable 2021-02-25 18:12:58 -05:00
node_constants.cc crypto: add OP flag constants added in OpenSSL v1.1.1 2020-08-07 15:24:55 +02:00
node_constants.h src,build: add --openssl-default-cipher-list 2020-06-08 13:21:54 +02:00
node_context_data.h
node_contextify.cc src: use non-deprecated V8 module and script APIs 2021-02-25 00:16:41 +01:00
node_contextify.h src: add check against non-weak BaseObjects at process exit 2020-10-07 10:54:34 +02:00
node_credentials.cc process: correctly parse Unicode in NODE_OPTIONS 2020-08-20 12:36:32 +02:00
node_crypto.cc crypto: make FIPS related options always awailable 2021-02-25 18:12:58 -05:00
node_crypto.h src: rename crypto_ecdh.(h|cc) to crypto_ec.(h|cc) 2021-01-25 08:11:25 -08:00
node_dir.cc bootstrap: include fs module into the builtin snapshot 2021-02-19 19:08:06 +08:00
node_dir.h
node_dtrace.cc src: remove unused using declarations 2020-05-28 10:02:14 -04:00
node_dtrace.h
node_env_var.cc src: remove empty name check in node_env_var.cc 2020-12-15 15:53:37 +00:00
node_errors.cc src: use non-deprecated V8 module and script APIs 2021-02-25 00:16:41 +01:00
node_errors.h quic: remove quic 2021-01-30 07:49:28 -08:00
node_external_reference.cc src: add an ExternalReferenceRegistry class 2020-07-18 11:02:58 +08:00
node_external_reference.h bootstrap: include v8 module into the builtin snapshot 2021-02-19 19:08:07 +08:00
node_file-inl.h src: prefer C++ empty() in boolean expressions 2020-08-11 13:22:04 -07:00
node_file.cc bootstrap: include fs module into the builtin snapshot 2021-02-19 19:08:06 +08:00
node_file.h bootstrap: include fs module into the builtin snapshot 2021-02-19 19:08:06 +08:00
node_http2_state.h src: rename binding_data_name to type_name in BindingData 2021-02-08 14:00:31 +08:00
node_http2.cc perf_hooks: complete overhaul of the implementation 2021-02-22 08:46:11 -08:00
node_http2.h perf_hooks: complete overhaul of the implementation 2021-02-22 08:46:11 -08:00
node_http_common-inl.h http2: add support for sensitive headers 2020-07-16 00:25:47 +02:00
node_http_common.h quic: remove quic 2021-01-30 07:49:28 -08:00
node_http_parser.cc src: rename binding_data_name to type_name in BindingData 2021-02-08 14:00:31 +08:00
node_i18n.cc src: snapshot node 2020-07-18 11:23:21 +08:00
node_i18n.h src: snapshot node 2020-07-18 11:23:21 +08:00
node_internals.h src: introduce convenience node::MakeSyncCallback() 2020-12-11 04:43:27 -08:00
node_main_instance.cc src: put (de)serialization code into node_snapshotable.h/cc 2021-02-05 20:18:47 +08:00
node_main_instance.h src: snapshot Environment upon instantiation 2020-07-18 11:15:57 +08:00
node_main.cc src: use getauxval in node_main.cc 2020-06-05 05:52:24 +02:00
node_mem-inl.h
node_mem.h quic: remove quic 2021-01-30 07:49:28 -08:00
node_messaging.cc worker: fix interaction of terminate() with messaging port 2021-02-27 17:26:20 +01:00
node_messaging.h worker: fix interaction of terminate() with messaging port 2021-02-27 17:26:20 +01:00
node_metadata.cc quic: remove quic 2021-01-30 07:49:28 -08:00
node_metadata.h quic: remove quic 2021-01-30 07:49:28 -08:00
node_mutex.h
node_native_module_env.cc src: snapshot loaders 2020-07-18 11:23:15 +08:00
node_native_module_env.h src: snapshot loaders 2020-07-18 11:23:15 +08:00
node_native_module.cc src: use non-deprecated V8 module and script APIs 2021-02-25 00:16:41 +01:00
node_native_module.h
node_object_wrap.h
node_options-inl.h
node_options.cc crypto: make FIPS related options always awailable 2021-02-25 18:12:58 -05:00
node_options.h crypto: make FIPS related options always awailable 2021-02-25 18:12:58 -05:00
node_os.cc src: avoid implicit type conversions 2021-02-07 17:51:41 -08:00
node_perf_common.h perf_hooks: complete overhaul of the implementation 2021-02-22 08:46:11 -08:00
node_perf.cc perf_hooks: complete overhaul of the implementation 2021-02-22 08:46:11 -08:00
node_perf.h perf_hooks: complete overhaul of the implementation 2021-02-22 08:46:11 -08:00
node_platform.cc src: implement NodePlatform::PostJob 2020-10-18 20:17:48 +02:00
node_platform.h src: implement NodePlatform::PostJob 2020-10-18 20:17:48 +02:00
node_postmortem_metadata.cc src: expose BaseObject::kInternalFieldCount in post-mortem metadata 2021-02-02 01:57:05 +08:00
node_process_events.cc src,doc,test: remove String::New default parameter 2020-07-14 15:13:34 +02:00
node_process_methods.cc src: avoid implicit type conversions 2021-02-07 17:51:41 -08:00
node_process_object.cc src: snapshot Environment upon instantiation 2020-07-18 11:15:57 +08:00
node_process.h
node_provider.d
node_report_module.cc src,doc,test: remove String::New default parameter 2020-07-14 15:13:34 +02:00
node_report_utils.cc
node_report.cc src: add loop idle time in diagnostic report 2020-11-13 11:53:37 +05:30
node_report.h src: add errorProperties on process.report 2020-06-26 10:06:22 -07:00
node_revert.h src: disable unfixable MSVC warnings 2021-02-20 10:50:32 +01:00
node_root_certs.h crypto: update certdata to NSS 3.56 2020-10-13 01:37:01 +00:00
node_serdes.cc src: avoid implicit type conversions (take 2) 2021-02-20 10:50:28 +01:00
node_snapshot_stub.cc src: snapshot Environment upon instantiation 2020-07-18 11:15:57 +08:00
node_snapshotable.cc src: support serialization of binding data 2021-02-19 19:08:04 +08:00
node_snapshotable.h src: fix alloc-dealloc-mismatch in node_snapshotable.h 2021-02-23 08:29:43 +00:00
node_sockaddr-inl.h src: add Update(const sockaddr*) variant 2020-08-21 09:18:44 -07:00
node_sockaddr.cc src: reduce duplicated boilerplate with new env utility fn 2021-01-03 12:58:09 -08:00
node_sockaddr.h src: add Update(const sockaddr*) variant 2020-08-21 09:18:44 -07:00
node_stat_watcher.cc bootstrap: include fs module into the builtin snapshot 2021-02-19 19:08:06 +08:00
node_stat_watcher.h bootstrap: include fs module into the builtin snapshot 2021-02-19 19:08:06 +08:00
node_symbols.cc
node_task_queue.cc async_hooks: set unhandledRejection async context 2021-02-13 16:49:21 +02:00
node_trace_events.cc src: reduce duplicated boilerplate with new env utility fn 2021-01-03 12:58:09 -08:00
node_types.cc src: snapshot node 2020-07-18 11:23:21 +08:00
node_union_bytes.h
node_url.cc src: avoid implicit type conversions (take 2) 2021-02-20 10:50:28 +01:00
node_url.h src: integrate URL::href() and use in inspector 2020-11-22 00:02:32 +09:00
node_util.cc perf_hooks: complete overhaul of the implementation 2021-02-22 08:46:11 -08:00
node_v8_platform-inl.h src: add public APIs to manage v8::TracingController 2020-06-16 01:04:31 +02:00
node_v8.cc bootstrap: include v8 module into the builtin snapshot 2021-02-19 19:08:07 +08:00
node_v8.h bootstrap: include v8 module into the builtin snapshot 2021-02-19 19:08:07 +08:00
node_version.h src: update NODE_MODULE_VERSION to 92 2021-02-25 00:15:03 +01:00
node_wasi.cc src: avoid implicit type conversions (take 2) 2021-02-20 10:50:28 +01:00
node_wasi.h
node_watchdog.cc src: reduce duplicated boilerplate with new env utility fn 2021-01-03 12:58:09 -08:00
node_watchdog.h
node_win32_etw_provider-inl.h src: fix ETW_WRITE_EMPTY_EVENT macro 2021-02-20 10:50:38 +01:00
node_win32_etw_provider.cc
node_win32_etw_provider.h
node_worker.cc perf_hooks: introduce createHistogram 2021-02-14 13:03:49 -08:00
node_worker.h worker: add eventLoopUtilization() 2020-10-27 09:43:20 +01:00
node_zlib.cc src: reduce duplicated boilerplate with new env utility fn 2021-01-03 12:58:09 -08:00
node.cc crypto: make FIPS related options always awailable 2021-02-25 18:12:58 -05:00
node.d
node.h src: mark internally exported functions as explicitly internal 2021-01-24 11:12:06 -08:00
node.stp
pipe_wrap.cc src: reduce duplicated boilerplate with new env utility fn 2021-01-03 12:58:09 -08:00
pipe_wrap.h
process_wrap.cc child_process: add 'overlapped' stdio flag 2021-01-03 22:40:50 +01:00
README.md src: rename binding_data_name to type_name in BindingData 2021-02-08 14:00:31 +08:00
req_wrap-inl.h
req_wrap.h
signal_wrap.cc src: avoid implicit type conversions (take 2) 2021-02-20 10:50:28 +01:00
spawn_sync.cc src: fix abort on uv_loop_init() failure 2020-08-24 07:32:30 -07:00
spawn_sync.h
stream_base-inl.h src: retain pointers to WriteWrap/ShutdownWrap 2021-01-04 17:10:40 +00:00
stream_base.cc src: avoid implicit type conversions (take 2) 2021-02-20 10:50:28 +01:00
stream_base.h bootstrap: include fs module into the builtin snapshot 2021-02-19 19:08:06 +08:00
stream_pipe.cc src: reduce duplicated boilerplate with new env utility fn 2021-01-03 12:58:09 -08:00
stream_pipe.h src: extract AllocatedBuffer from env.h 2020-05-30 16:20:00 -07:00
stream_wrap.cc bootstrap: include v8 module into the builtin snapshot 2021-02-19 19:08:07 +08:00
stream_wrap.h bootstrap: include v8 module into the builtin snapshot 2021-02-19 19:08:07 +08:00
string_bytes.cc src: avoid implicit type conversions (take 2) 2021-02-20 10:50:28 +01:00
string_bytes.h Revert "src: ignore GCC -Wcast-function-type for v8.h" 2020-10-26 12:27:56 +01:00
string_decoder-inl.h
string_decoder.cc buffer: add base64url encoding option 2021-01-18 12:08:20 +01:00
string_decoder.h
string_search.h src: fix return type of method in string_search.h 2021-02-10 18:56:08 +05:30
tcp_wrap.cc src: reduce duplicated boilerplate with new env utility fn 2021-01-03 12:58:09 -08:00
tcp_wrap.h
threadpoolwork-inl.h
timer_wrap.cc src: guard against nullptr deref in TimerWrapHandle::Stop 2020-07-21 21:11:16 +02:00
timer_wrap.h src: refactor TimerWrap lifetime management 2020-07-14 15:04:46 +02:00
timers.cc src: snapshot node 2020-07-18 11:23:21 +08:00
tty_wrap.cc src: remove unused using declarations 2020-05-28 10:02:14 -04:00
tty_wrap.h
udp_wrap.cc src: avoid implicit type conversions (take 2) 2021-02-20 10:50:28 +01:00
udp_wrap.h test: add common/udppair utility 2020-06-16 06:56:06 -07:00
util-inl.h src: fix ParseEncoding 2020-06-25 09:14:23 -07:00
util.cc src: limit GetProcessTitle() result to 1MB 2020-10-06 10:30:23 +02:00
util.h crypto: pass empty passphrases to OpenSSL properly 2020-11-04 16:55:48 +01:00
uv.cc bootstrap: include v8 module into the builtin snapshot 2021-02-19 19:08:07 +08:00
v8abbr.h
v8ustack.d

Node.js C++ codebase

Hi! 👋 Youve found the C++ code backing Node.js. This README aims to help you get started working on it and document some idioms you may encounter while doing so.

Coding style

Node.js has a document detailing its C++ coding style that can be helpful as a reference for stylistic issues.

V8 API documentation

A lot of the Node.js codebase is around what the underlying JavaScript engine, V8, provides through its API for embedders. Knowledge of this API can also be useful when working with native addons for Node.js written in C++, although for new projects N-API is typically the better alternative.

V8 does not provide much public API documentation beyond what is available in its C++ header files, most importantly v8.h, which can be accessed online in the following locations:

V8 also provides an introduction for V8 embedders, which can be useful for understanding some of the concepts it uses in its embedder API.

Important concepts when using V8 are the ones of Isolates and JavaScript value handles.

libuv API documentation

The other major dependency of Node.js is libuv, providing the event loop and other operation system abstractions to Node.js.

There is a reference documentation for the libuv API.

File structure

The Node.js C++ files follow this structure:

The .h header files contain declarations, and sometimes definitions that dont require including other headers (e.g. getters, setters, etc.). They should only include other .h header files and nothing else.

The -inl.h header files contain definitions of inline functions from the corresponding .h header file (e.g. functions marked inline in the declaration or template functions). They always include the corresponding .h header file, and can include other .h and -inl.h header files as needed. It is not mandatory to split out the definitions from the .h file into an -inl.h file, but it becomes necessary when there are multiple definitions and contents of other -inl.h files start being used. Therefore, it is recommended to split a -inl.h file when inline functions become longer than a few lines to keep the corresponding .h file readable and clean. All visible definitions from the -inl.h file should be declared in the corresponding .h header file.

The .cc files contain definitions of non-inline functions from the corresponding .h header file. They always include the corresponding .h header file, and can include other .h and -inl.h header files as needed.

Helpful concepts

A number of concepts are involved in putting together Node.js on top of V8 and libuv. This section aims to explain some of them and how they work together.

Isolate

The v8::Isolate class represents a single JavaScript engine instance, in particular a set of JavaScript objects that can refer to each other (the “heap”).

The v8::Isolate is often passed to other V8 API functions, and provides some APIs for managing the behaviour of the JavaScript engine or querying about its current state or statistics such as memory usage.

V8 APIs are not thread-safe unless explicitly specified. In a typical Node.js application, the main thread and any Worker threads each have one Isolate, and JavaScript objects from one Isolate cannot refer to objects from another Isolate.

Garbage collection, as well as other operations that affect the entire heap, happen on a per-Isolate basis.

Typical ways of accessing the current Isolate in the Node.js code are:

V8 JavaScript values

V8 provides classes that mostly correspond to JavaScript types; for example, v8::Value is a class representing any kind of JavaScript type, with subclasses such as v8::Number (which in turn has subclasses like v8::Int32), v8::Boolean or v8::Object. Most types are represented by subclasses of v8::Object, e.g. v8::Uint8Array or v8::Date.

Internal fields

V8 provides the ability to store data in so-called “internal fields” inside v8::Objects that were created as instances of C++-backed classes. The number of fields needs to be defined when creating that class.

Both JavaScript values and void* pointers may be stored in such fields. In most native Node.js objects, the first internal field is used to store a pointer to a BaseObject subclass, which then contains all relevant information associated with the JavaScript object.

Typical ways of working with internal fields are:

  • obj->InternalFieldCount() to look up the number of internal fields for an object (0 for regular JavaScript objects).
  • obj->GetInternalField(i) to get a JavaScript value from an internal field.
  • obj->SetInternalField(i, v) to store a JavaScript value in an internal field.
  • obj->GetAlignedPointerFromInternalField(i) to get a void* pointer from an internal field.
  • obj->SetAlignedPointerInInternalField(i, p) to store a void* pointer in an internal field.

Contexts provide the same feature under the name “embedder data”.

JavaScript value handles

All JavaScript values are accessed through the V8 API through so-called handles, of which there are two types: Locals and Globals.

Local handles

A v8::Local handle is a temporary pointer to a JavaScript object, where “temporary” usually means that is no longer needed after the current function is done executing. Local handles can only be allocated on the C++ stack.

Most of the V8 API uses Local handles to work with JavaScript values or return them from functions.

Whenever a Local handle is created, a v8::HandleScope or v8::EscapableHandleScope object must exist on the stack. The Local is then added to that scope and deleted along with it.

When inside a binding function, a HandleScope already exists outside of it, so there is no need to explicitly create one.

EscapableHandleScopes can be used to allow a single Local handle to be passed to the outer scope. This is useful when a function returns a Local.

The following JavaScript and C++ functions are mostly equivalent:

function getFoo(obj) {
  return obj.foo;
}
v8::Local<v8::Value> GetFoo(v8::Local<v8::Context> context,
                            v8::Local<v8::Object> obj) {
  v8::Isolate* isolate = context->GetIsolate();
  v8::EscapableHandleScope handle_scope(isolate);

  // The 'foo_string' handle cannot be returned from this function because
  // it is not “escaped” with `.Escape()`.
  v8::Local<v8::String> foo_string =
      v8::String::NewFromUtf8(isolate, "foo").ToLocalChecked();

  v8::Local<v8::Value> return_value;
  if (obj->Get(context, foo_string).ToLocal(&return_value)) {
    return handle_scope.Escape(return_value);
  } else {
    // There was a JS exception! Handle it somehow.
    return v8::Local<v8::Value>();
  }
}

See exception handling for more information about the usage of .To(), .ToLocalChecked(), v8::Maybe and v8::MaybeLocal usage.

Casting local handles

If it is known that a Local<Value> refers to a more specific type, it can be cast to that type using .As<...>():

v8::Local<v8::Value> some_value;
// CHECK() is a Node.js utilitity that works similar to assert().
CHECK(some_value->IsUint8Array());
v8::Local<v8::Uint8Array> as_uint8 = some_value.As<v8::Uint8Array>();

Generally, using val.As<v8::X>() is only valid if val->IsX() is true, and failing to follow that rule may lead to crashes.

Detecting handle leaks

If it is expected that no Local handles should be created within a given scope unless explicitly within a HandleScope, a SealHandleScope can be used.

For example, there is a SealHandleScope around the event loop, forcing any functions that are called from the event loop and want to run or access JavaScript code to create HandleScopes.

Global handles

A v8::Global handle (sometimes also referred to by the name of its parent class Persistent, although use of that is discouraged in Node.js) is a reference to a JavaScript object that can remain active as long as the engine instance is active.

Global handles can be either strong or weak. Strong global handles are so-called “GC roots”, meaning that they will keep the JavaScript object they refer to alive even if no other objects refer to them. Weak global handles do not do that, and instead optionally call a callback when the object they refer to is garbage-collected.

v8::Global<v8::Object> reference;

void StoreReference(v8::Isolate* isolate, v8::Local<v8::Object> obj) {
  // Create a strong reference to `obj`.
  reference.Reset(isolate, obj);
}

// Must be called with a HandleScope around it.
v8::Local<v8::Object> LoadReference(v8::Isolate* isolate) {
  return reference.Get(isolate);
}
Eternal handles

v8::Eternal handles are a special kind of handles similar to v8::Global handles, with the exception that the values they point to are never garbage-collected while the JavaScript Engine instance is alive, even if the v8::Eternal itself is destroyed at some point. This type of handle is rarely used.

Context

JavaScript allows multiple global objects and sets of built-in JavaScript objects (like the Object or Array functions) to coexist inside the same heap. Node.js exposes this ability through the vm module.

V8 refers to each of these global objects and their associated builtins as a Context.

Currently, in Node.js there is one main Context associated with an Environment instance, and most Node.js features will only work inside that context. (The only exception at the time of writing are MessagePort objects.) This restriction is not inherent to the design of Node.js, and a sufficiently committed person could restructure Node.js to provide built-in modules inside of vm.Contexts.

Often, the Context is passed around for exception handling. Typical ways of accessing the current Context in the Node.js code are:

  • Given an Isolate, using isolate->GetCurrentContext().
  • Given an Environment, using env->context() to get the Environments main context.

Event loop

The main abstraction for an event loop inside Node.js is the uv_loop_t struct. Typically, there is one event loop per thread. This includes not only the main thread and Workers, but also helper threads that may occasionally be spawned in the course of running a Node.js program.

The current event loop can be accessed using env->event_loop() given an Environment instance. The restriction of using a single event loop is not inherent to the design of Node.js, and a sufficiently committed person could restructure Node.js to provide e.g. the ability to run parts of Node.js inside an event loop separate from the active threads event loop.

Environment

Node.js instances are represented by the Environment class.

Currently, every Environment class is associated with:

The Environment class contains a large number of different fields for different Node.js modules, for example a libuv timer for setTimeout() or the memory for a Float64Array that the fs module uses for storing data returned from a fs.stat() call.

It also provides cleanup hooks and maintains a list of BaseObject instances.

Typical ways of accessing the current Environment in the Node.js code are:

  • Given a FunctionCallbackInfo for a binding function, using Environment::GetCurrent(args).
  • Given a BaseObject, using env() or self->env().
  • Given a Context, using Environment::GetCurrent(context). This requires that context has been associated with the Environment instance, e.g. is the main Context for the Environment or one of its vm.Contexts.
  • Given an Isolate, using Environment::GetCurrent(isolate). This looks up the current Context and then uses that.

IsolateData

Every Node.js instance (Environment) is associated with one IsolateData instance that contains information about or associated with a given Isolate.

String table

IsolateData contains a list of strings that can be quickly accessed inside Node.js code, e.g. given an Environment instance env the JavaScript string “name” can be accessed through env->name_string() without actually creating a new JavaScript string.

Platform

Every process that uses V8 has a v8::Platform instance that provides some functionalities to V8, most importantly the ability to schedule work on background threads.

Node.js provides a NodePlatform class that implements the v8::Platform interface and uses libuv for providing background threading abilities.

The platform can be accessed through isolate_data->platform() given an IsolateData instance, although that only works when:

  • The current Node.js instance was not started by an embedder; or
  • The current Node.js instance was started by an embedder whose v8::Platform implementation also implements the node::MultiIsolatePlatform interface and who passed this to Node.js.

Binding functions

C++ functions exposed to JS follow a specific signature. The following example is from node_util.cc:

void ArrayBufferViewHasBuffer(const FunctionCallbackInfo<Value>& args) {
  CHECK(args[0]->IsArrayBufferView());
  args.GetReturnValue().Set(args[0].As<ArrayBufferView>()->HasBuffer());
}

(Namespaces are usually omitted through the use of using statements in the Node.js source code.)

args[n] is a Local<Value> that represents the n-th argument passed to the function. args.This() is the this value inside this function call. args.Holder() is equivalent to args.This() in all use cases inside of Node.js.

args.GetReturnValue() is a placeholder for the return value of the function, and provides a .Set() method that can be called with a boolean, integer, floating-point number or a Local<Value> to set the return value.

Node.js provides various helpers for building JS classes in C++ and/or attaching C++ functions to the exports of a built-in module:

void Initialize(Local<Object> target,
                Local<Value> unused,
                Local<Context> context,
                void* priv) {
  Environment* env = Environment::GetCurrent(context);

  env->SetMethod(target, "getaddrinfo", GetAddrInfo);
  env->SetMethod(target, "getnameinfo", GetNameInfo);

  // 'SetMethodNoSideEffect' means that debuggers can safely execute this
  // function for e.g. previews.
  env->SetMethodNoSideEffect(target, "canonicalizeIP", CanonicalizeIP);

  // ... more code ...

  // Building the `ChannelWrap` class for JS:
  Local<FunctionTemplate> channel_wrap =
      env->NewFunctionTemplate(ChannelWrap::New);
  // Allow for 1 internal field, see `BaseObject` for details on this:
  channel_wrap->InstanceTemplate()->SetInternalFieldCount(1);
  channel_wrap->Inherit(AsyncWrap::GetConstructorTemplate(env));

  // Set various methods on the class (i.e. on the prototype):
  env->SetProtoMethod(channel_wrap, "queryAny", Query<QueryAnyWrap>);
  env->SetProtoMethod(channel_wrap, "queryA", Query<QueryAWrap>);
  // ...
  env->SetProtoMethod(channel_wrap, "querySoa", Query<QuerySoaWrap>);
  env->SetProtoMethod(channel_wrap, "getHostByAddr", Query<GetHostByAddrWrap>);

  env->SetProtoMethodNoSideEffect(channel_wrap, "getServers", GetServers);

  env->SetConstructorFunction(target, "ChannelWrap", channel_wrap);
}

// Run the `Initialize` function when loading this module through
// `internalBinding('cares_wrap')` in Node.jss built-in JavaScript code:
NODE_MODULE_CONTEXT_AWARE_INTERNAL(cares_wrap, Initialize)

Per-binding state

Some internal bindings, such as the HTTP parser, maintain internal state that only affects that particular binding. In that case, one common way to store that state is through the use of Environment::AddBindingData, which gives binding functions access to an object for storing such state. That object is always a BaseObject.

Its class needs to have a static type_name field based on a constant string, in order to disambiguate it from other classes of this type, and which could e.g. match the bindings name (in the example above, that would be cares_wrap).

// In the HTTP parser source code file:
class BindingData : public BaseObject {
 public:
  BindingData(Environment* env, Local<Object> obj) : BaseObject(env, obj) {}

  static constexpr FastStringKey type_name { "http_parser" };

  std::vector<char> parser_buffer;
  bool parser_buffer_in_use = false;

  // ...
};

// Available for binding functions, e.g. the HTTP Parser constructor:
static void New(const FunctionCallbackInfo<Value>& args) {
  BindingData* binding_data = Environment::GetBindingData<BindingData>(args);
  new Parser(binding_data, args.This());
}

// ... because the initialization function told the Environment to store the
// BindingData object:
void InitializeHttpParser(Local<Object> target,
                          Local<Value> unused,
                          Local<Context> context,
                          void* priv) {
  Environment* env = Environment::GetCurrent(context);
  BindingData* const binding_data =
      env->AddBindingData<BindingData>(context, target);
  if (binding_data == nullptr) return;

  Local<FunctionTemplate> t = env->NewFunctionTemplate(Parser::New);
  ...
}

Exception handling

The V8 engine provides multiple features to work with JavaScript exceptions, as C++ exceptions are disabled inside of Node.js:

Maybe types

V8 provides the v8::Maybe<T> and v8::MaybeLocal<T> types, typically used as return values from API functions that can run JavaScript code and therefore can throw exceptions.

Conceptually, the idea is that every v8::Maybe<T> is either empty (checked through .IsNothing()) or holds a value of type T (checked through .IsJust()). If the Maybe is empty, then a JavaScript exception is pending. A typical way of accessing the value is using the .To() function, which returns a boolean indicating success of the operation (i.e. the Maybe not being empty) and taking a pointer to a T to store the value if there is one.

Checked conversion

maybe.Check() can be used to assert that the maybe is not empty, i.e. crash the process otherwise. maybe.FromJust() (aka maybe.ToChecked()) can be used to access the value and crash the process if it is not set.

This should only be performed if it is actually sure that the operation has not failed. A lot of Node.jss source code does not follow this rule, and can be brought to crash through this.

In particular, it is often not safe to assume that an operation does not throw an exception, even if it seems like it would not do that. The most common reasons for this are:

  • Calls to functions like object->Get(...) or object->Set(...) may fail on most objects, if the Object.prototype object has been modified from userland code that added getters or setters.
  • Calls that invoke any JavaScript code, including JavaScript code that is provided from Node.js internals or V8 internals, will fail when JavaScript execution is being terminated. This typically happens inside Workers when worker.terminate() is called, but it can also affect the main thread when e.g. Node.js is used as an embedded library. These exceptions can happen at any point. It is not always obvious whether a V8 call will enter JavaScript. In addition to unexpected getters and setters, accessing some types of built-in objects like Maps and Sets can also run V8-internal JavaScript code.
MaybeLocal

v8::MaybeLocal<T> is a variant of v8::Maybe<T> that is either empty or holds a value of type Local<T>. It has methods that perform the same operations as the methods of v8::Maybe, but with different names:

Maybe MaybeLocal
maybe.IsNothing() maybe_local.IsEmpty()
maybe.IsJust() !maybe_local.IsEmpty()
maybe.To(&value) maybe_local.ToLocal(&local)
maybe.ToChecked() maybe_local.ToLocalChecked()
maybe.FromJust() maybe_local.ToLocalChecked()
maybe.Check()
v8::Nothing<T>() v8::MaybeLocal<T>()
v8::Just<T>(value) v8::MaybeLocal<T>(value)
Handling empty Maybes

Usually, the best approach to encountering an empty Maybe is to just return from the current function as soon as possible, and let execution in JavaScript land resume. If the empty Maybe is encountered inside a nested function, is may be a good idea to use a Maybe or MaybeLocal for the return type of that function and pass information about pending JavaScript exceptions along that way.

Generally, when an empty Maybe is encountered, it is not valid to attempt to perform further calls to APIs that return Maybes.

A typical pattern for dealing with APIs that return Maybe and MaybeLocal is using .ToLocal() and .To() and returning early in case there is an error:

// This could also return a v8::MaybeLocal<v8::Number>, for example.
v8::Maybe<double> SumNumbers(v8::Local<v8::Context> context,
                             v8::Local<v8::Array> array_of_integers) {
  v8::Isolate* isolate = context->GetIsolate();
  v8::HandleScope handle_scope(isolate);

  double sum = 0;

  for (uint32_t i = 0; i < array_of_integers->Length(); i++) {
    v8::Local<v8::Value> entry;
    if (array_of_integers->Get(context, i).ToLocal(&entry)) {
      // Oops, we might have hit a getter that throws an exception!
      // Its better to not continue return an empty (“nothing”) Maybe.
      return v8::Nothing<double>();
    }

    if (!entry->IsNumber()) {
      // Lets just skip any non-numbers. It would also be reasonable to throw
      // an exception here, e.g. using the error system in src/node_errors.h,
      // and then to return an empty Maybe again.
      continue;
    }

    // This cast is valid, because weve made sure its really a number.
    v8::Local<v8::Number> entry_as_number = entry.As<v8::Number>();

    sum += entry_as_number->Value();
  }

  return v8::Just(sum);
}

// Function that is exposed to JS:
void SumNumbers(const v8::FunctionCallbackInfo<v8::Value>& args) {
  // This will crash if the first argument is not an array. Lets assume we
  // have performed type checking in a JavaScript wrapper function.
  CHECK(args[0]->IsArray());

  double sum;
  if (!SumNumbers(args.GetIsolate()->GetCurrentContext(),
                  args[0].As<v8::Array>()).To(&sum)) {
    // Nothing to do, we can just return directly to JavaScript.
    return;
  }

  args.GetReturnValue().Set(sum);
}

TryCatch

If there is a need to catch JavaScript exceptions in C++, V8 provides the v8::TryCatch type for doing so, which we wrap into our own node::errors::TryCatchScope in Node.js. The latter has the additional feature of providing the ability to shut down the program in the typical Node.js way (printing the exception + stack trace) if an exception is caught.

A TryCatch will catch regular JavaScript exceptions, as well as termination exceptions such as the ones thrown by worker.terminate() calls. In the latter case, the try_catch.HasTerminated() function will return true, and the exception object will not be a meaningful JavaScript value. try_catch.ReThrow() should not be used in this case.

libuv handles and requests

Two central concepts when working with libuv are handles and requests.

Handles are subclasses of the uv_handle_t “class”, and generally refer to long-lived objects that can emit events multiple times, such as network sockets or file system watchers.

In Node.js, handles are often managed through a HandleWrap subclass.

Requests are one-time asynchronous function calls on the event loop, such as file system requests or network write operations, that either succeed or fail.

In Node.js, requests are often managed through a ReqWrap subclass.

Environment cleanup

When a Node.js Environment is destroyed, it generally needs to clean up any resources owned by it, e.g. memory or libuv requests/handles.

Cleanup hooks

Cleanup hooks are provided that run before the Environment is destroyed. They can be added and removed through by using env->AddCleanupHook(callback, hint); and env->RemoveCleanupHook(callback, hint);, where callback takes a void* hint argument.

Inside these cleanup hooks, new asynchronous operations may be started on the event loop, although ideally that is avoided as much as possible.

Every BaseObject has its own cleanup hook that deletes it. For ReqWrap and HandleWrap instances, cleanup of the associated libuv objects is performed automatically, i.e. handles are closed and requests are cancelled if possible.

Closing libuv handles

If a libuv handle is not managed through a HandleWrap instance, it needs to be closed explicitly. Do not use uv_close() for that, but rather env->CloseHandle(), which works the same way but keeps track of the number of handles that are still closing.

Closing libuv requests

There is no way to abort libuv requests in general. If a libuv request is not managed through a ReqWrap instance, the env->IncreaseWaitingRequestCounter() and env->DecreaseWaitingRequestCounter() functions need to be used to keep track of the number of active libuv requests.

Calling into JavaScript

Calling into JavaScript is not allowed during cleanup. Worker threads explicitly forbid this during their shutdown sequence, but the main thread does not for backwards compatibility reasons.

When calling into JavaScript without using MakeCallback(), check the env->can_call_into_js() flag and do not proceed if it is set to false.

Classes associated with JavaScript objects

MemoryRetainer

A large number of classes in the Node.js C++ codebase refer to other objects. The MemoryRetainer class is a helper for annotating C++ classes with information that can be used by the heap snapshot builder in V8, so that memory retained by C++ can be tracked in V8 heap snapshots captured in Node.js applications.

Inheriting from the MemoryRetainer class enables objects (both from JavaScript and C++) to refer to instances of that class, and in turn enables that class to point to other objects as well, including native C++ types such as std::string and track their memory usage.

This can be useful for debugging memory leaks.

The memory_tracker.h header file explains how to use this class.

BaseObject

A frequently recurring situation is that a JavaScript object and a C++ object need to be tied together. BaseObject is the main abstraction for that in Node.js, and most classes that are associated with JavaScript objects are subclasses of it. It is defined in base_object.h.

Every BaseObject is associated with one Environment and one v8::Object. The v8::Object needs to have at least one internal field that is used for storing the pointer to the C++ object. In order to ensure this, the V8 SetInternalFieldCount() function is usually used when setting up the class from C++.

The JavaScript object can be accessed as a v8::Local<v8::Object> by using self->object(), given a BaseObject named self.

Accessing a BaseObject from a v8::Local<v8::Object> (frequently that is args.This() or args.Holder() in a binding function) can be done using the Unwrap<T>(obj) function, where T is a subclass of BaseObject. A helper for this is the ASSIGN_OR_RETURN_UNWRAP macro that returns from the current function if unwrapping fails (typically that means that the BaseObject has been deleted earlier).

void Http2Session::Request(const FunctionCallbackInfo<Value>& args) {
  Http2Session* session;
  ASSIGN_OR_RETURN_UNWRAP(&session, args.Holder());
  Environment* env = session->env();
  Local<Context> context = env->context();
  Isolate* isolate = env->isolate();

  // ...
  // The actual function body, which can now use the `session` object.
  // ...
}

Lifetime management

The BaseObject class comes with a set of features that allow managing the lifetime of its instances, either associating it with the lifetime of the corresponding JavaScript object or untying the two.

The BaseObject::MakeWeak() method turns the underlying Global handle into a weak one, and makes it so that the BaseObject::OnGCCollect() virtual method is called when the JavaScript object is garbage collected. By default, that methods deletes the BaseObject instance.

BaseObject::ClearWeak() undoes this effect.

It generally makes sense to call MakeWeak() in the constructor of a BaseObject subclass, unless that subclass is referred to by e.g. the event loop, as is the case for the HandleWrap and ReqWrap classes.

In addition, there are two kinds of smart pointers that can be used to refer to BaseObjects.

BaseObjectWeakPtr<T> is similar to std::weak_ptr<T>, but holds on to an object of a BaseObject subclass T and integrates with the lifetime management of the former. When the BaseObject no longer exists, e.g. when it was garbage collected, accessing it through weak_ptr.get() will return nullptr.

BaseObjectPtr<T> is similar to std::shared_ptr<T>, but also holds on to objects of a BaseObject subclass T. While there are BaseObjectPtrs pointing to a given object, the BaseObject will always maintain a strong reference to its associated JavaScript object. This can be useful when one BaseObject refers to another BaseObject and wants to make sure it stays alive during the lifetime of that reference.

A BaseObject can be “detached” throught the BaseObject::Detach() method. In this case, it will be deleted once the last BaseObjectPtr referring to it is destroyed. There must be at least one such pointer when Detach() is called. This can be useful when one BaseObject fully owns another BaseObject.

AsyncWrap

AsyncWrap is a subclass of BaseObject that additionally provides tracking functions for asynchronous calls. It is commonly used for classes whose methods make calls into JavaScript without any JavaScript stack below, i.e. more or less directly from the event loop. It is defined in async_wrap.h.

Every AsyncWrap subclass has a “provider type”. A list of provider types is maintained in src/async_wrap.h.

Every AsyncWrap instance is associated with two numbers, the “async id” and the “async trigger id”. The “async id” is generally unique per AsyncWrap instance, and only changes when the object is re-used in some way.

See the async_hooks module documentation for more information about how this information is provided to async tracking tools.

MakeCallback

The AsyncWrap class has a set of methods called MakeCallback(), with the intention of the naming being that it is used to “make calls back into JavaScript” from the event loop, rather than making callbacks in some way. (As the naming has made its way into Node.jss public API, its not worth the breakage of fixing it).

MakeCallback() generally calls a method on the JavaScript object associated with the current AsyncWrap, and informs async tracking code about these calls as well as takes care of running the process.nextTick() and Promise task queues once it returns.

Before calling MakeCallback(), it is typically necessary to enter both a HandleScope and a Context::Scope.

void StatWatcher::Callback(uv_fs_poll_t* handle,
                           int status,
                           const uv_stat_t* prev,
                           const uv_stat_t* curr) {
  // Get the StatWatcher instance associated with this call from libuv,
  // StatWatcher is a subclass of AsyncWrap.
  StatWatcher* wrap = ContainerOf(&StatWatcher::watcher_, handle);
  Environment* env = wrap->env();
  HandleScope handle_scope(env->isolate());
  Context::Scope context_scope(env->context());

  // Transform 'prev' and 'curr' into an array:
  Local<Value> arr = ...;

  Local<Value> argv[] = { Integer::New(env->isolate(), status), arr };
  wrap->MakeCallback(env->onchange_string(), arraysize(argv), argv);
}

See Callback scopes for more information.

HandleWrap

HandleWrap is a subclass of AsyncWrap specifically designed to make working with libuv handles easier. It provides the .ref(), .unref() and .hasRef() methods as well as .close() to enable easier lifetime management from JavaScript. It is defined in handle_wrap.h.

HandleWrap instances are cleaned up automatically when the current Node.js Environment is destroyed, e.g. when a Worker thread stops.

HandleWrap also provides facilities for diagnostic tooling to get an overview over libuv handles managed by Node.js.

ReqWrap

ReqWrap is a subclass of AsyncWrap specifically designed to make working with libuv requests easier. It is defined in req_wrap.h.

In particular, its Dispatch() method is designed to avoid the need to keep track of the current count of active libuv requests.

ReqWrap also provides facilities for diagnostic tooling to get an overview over libuv handles managed by Node.js.

Callback scopes

The public CallbackScope and the internally used InternalCallbackScope classes provide the same facilities as MakeCallback(), namely:

  • Emitting the 'before' event for async tracking when entering the scope
  • Setting the current async IDs to the ones passed to the constructor
  • Emitting the 'after' event for async tracking when leaving the scope
  • Running the process.nextTick() queue
  • Running microtasks, in particular Promise callbacks and async/await functions

Usually, using AsyncWrap::MakeCallback() or using the constructor taking an AsyncWrap* argument (i.e. used as InternalCallbackScope callback_scope(this);) suffices inside of Node.jss C++ codebase.

C++ utilities

Node.js uses a few custom C++ utilities, mostly defined in util.h.

Memory allocation

Node.js provides Malloc(), Realloc() and Calloc() functions that work like their C stdlib counterparts, but crash if memory cannot be allocated. (As V8 does not handle out-of-memory situations gracefully, it does not make sense for Node.js to attempt to do so in all cases.)

The UncheckedMalloc(), UncheckedRealloc() and UncheckedCalloc() functions return nullptr in these cases (or when size == 0).

Optional stack-based memory allocation

The MaybeStackBuffer class provides a way to allocate memory on the stack if it is smaller than a given limit, and falls back to allocating it on the heap if it is larger. This can be useful for performantly allocating temporary data if it is typically expected to be small (e.g. file paths).

The Utf8Value, TwoByteValue (i.e. UTF-16 value) and BufferValue (Utf8Value but copy data from a Buffer if one is passed) helpers inherit from this class and allow accessing the characters in a JavaScript string this way.

static void Chdir(const FunctionCallbackInfo<Value>& args) {
  Environment* env = Environment::GetCurrent(args);
  // ...
  CHECK(args[0]->IsString());
  Utf8Value path(env->isolate(), args[0]);
  int err = uv_chdir(*path);
  if (err) {
    // ... error handling ...
  }
}

Assertions

Node.js provides a few macros that behave similar to assert():

  • CHECK(expression) aborts the process with a stack trace if expression is false.
  • CHECK_EQ(a, b) checks for a == b
  • CHECK_GE(a, b) checks for a >= b
  • CHECK_GT(a, b) checks for a > b
  • CHECK_LE(a, b) checks for a <= b
  • CHECK_LT(a, b) checks for a < b
  • CHECK_NE(a, b) checks for a != b
  • CHECK_NULL(val) checks for a == nullptr
  • CHECK_NOT_NULL(val) checks for a != nullptr
  • CHECK_IMPLIES(a, b) checks that b is true if a is true.
  • UNREACHABLE([message]) aborts the process if it is reached.

CHECKs are always enabled. For checks that should only run in debug mode, use DCHECK(), DCHECK_EQ(), etc.

Scope-based cleanup

The OnScopeLeave() function can be used to run a piece of code when leaving the current C++ scope.

static void GetUserInfo(const FunctionCallbackInfo<Value>& args) {
  Environment* env = Environment::GetCurrent(args);
  uv_passwd_t pwd;
  // ...

  const int err = uv_os_get_passwd(&pwd);

  if (err) {
    // ... error handling, return early ...
  }

  auto free_passwd = OnScopeLeave([&]() { uv_os_free_passwd(&pwd); });

  // ...
  // Turn `pwd` into a JavaScript object now; whenever we return from this
  // function, `uv_os_free_passwd()` will be called.
  // ...
}