mirror of
https://github.com/nodejs/node.git
synced 2024-11-21 10:59:27 +00:00
7a2f1b9738
PR-URL: https://github.com/nodejs/node/pull/53996 Reviewed-By: James M Snell <jasnell@gmail.com> Reviewed-By: Yagiz Nizipli <yagiz@nizipli.com> Reviewed-By: Luigi Pinca <luigipinca@gmail.com>
145 lines
5.3 KiB
JavaScript
145 lines
5.3 KiB
JavaScript
'use strict';
|
|
|
|
const common = require('../common');
|
|
const fixtures = require('../common/fixtures');
|
|
const tmpdir = require('../common/tmpdir');
|
|
const { inspect } = require('util');
|
|
|
|
const { readFileSync, copyFileSync, statSync } = require('fs');
|
|
const {
|
|
spawnSyncAndExitWithoutError,
|
|
} = require('../common/child_process');
|
|
|
|
function skipIfSingleExecutableIsNotSupported() {
|
|
if (!process.config.variables.single_executable_application)
|
|
common.skip('Single Executable Application support has been disabled.');
|
|
|
|
if (!['darwin', 'win32', 'linux'].includes(process.platform))
|
|
common.skip(`Unsupported platform ${process.platform}.`);
|
|
|
|
if (process.platform === 'linux' && process.config.variables.is_debug === 1)
|
|
common.skip('Running the resultant binary fails with `Couldn\'t read target executable"`.');
|
|
|
|
if (process.config.variables.node_shared)
|
|
common.skip('Running the resultant binary fails with ' +
|
|
'`/home/iojs/node-tmp/.tmp.2366/sea: error while loading shared libraries: ' +
|
|
'libnode.so.112: cannot open shared object file: No such file or directory`.');
|
|
|
|
if (process.config.variables.icu_gyp_path === 'tools/icu/icu-system.gyp')
|
|
common.skip('Running the resultant binary fails with ' +
|
|
'`/home/iojs/node-tmp/.tmp.2379/sea: error while loading shared libraries: ' +
|
|
'libicui18n.so.71: cannot open shared object file: No such file or directory`.');
|
|
|
|
if (!process.config.variables.node_use_openssl || process.config.variables.node_shared_openssl)
|
|
common.skip('Running the resultant binary fails with `Node.js is not compiled with OpenSSL crypto support`.');
|
|
|
|
if (process.config.variables.want_separate_host_toolset !== 0)
|
|
common.skip('Running the resultant binary fails with `Segmentation fault (core dumped)`.');
|
|
|
|
if (process.platform === 'linux') {
|
|
const osReleaseText = readFileSync('/etc/os-release', { encoding: 'utf-8' });
|
|
const isAlpine = /^NAME="Alpine Linux"/m.test(osReleaseText);
|
|
if (isAlpine) common.skip('Alpine Linux is not supported.');
|
|
|
|
if (process.arch === 's390x') {
|
|
common.skip('On s390x, postject fails with `memory access out of bounds`.');
|
|
}
|
|
}
|
|
|
|
if (process.config.variables.ubsan) {
|
|
common.skip('UndefinedBehavior Sanitizer is not supported');
|
|
}
|
|
|
|
try {
|
|
readFileSync(process.execPath);
|
|
} catch (e) {
|
|
if (e.code === 'ERR_FS_FILE_TOO_LARGE') {
|
|
common.skip('The Node.js binary is too large to be supported by postject');
|
|
}
|
|
}
|
|
|
|
tmpdir.refresh();
|
|
|
|
// The SEA tests involve making a copy of the executable and writing some fixtures
|
|
// to the tmpdir. To be safe, ensure that the disk space has at least a copy of the
|
|
// executable and some extra space for blobs and configs is available.
|
|
const stat = statSync(process.execPath);
|
|
const expectedSpace = stat.size + 10 * 1024 * 1024;
|
|
if (!tmpdir.hasEnoughSpace(expectedSpace)) {
|
|
common.skip(`Available disk space < ${Math.floor(expectedSpace / 1024 / 1024)} MB`);
|
|
}
|
|
}
|
|
|
|
function generateSEA(targetExecutable, sourceExecutable, seaBlob, verifyWorkflow = false) {
|
|
try {
|
|
copyFileSync(sourceExecutable, targetExecutable);
|
|
} catch (e) {
|
|
const message = `Cannot copy ${sourceExecutable} to ${targetExecutable}: ${inspect(e)}`;
|
|
if (verifyWorkflow) {
|
|
throw new Error(message);
|
|
}
|
|
common.skip(message);
|
|
}
|
|
console.log(`Copied ${sourceExecutable} to ${targetExecutable}`);
|
|
|
|
const postjectFile = fixtures.path('postject-copy', 'node_modules', 'postject', 'dist', 'cli.js');
|
|
try {
|
|
spawnSyncAndExitWithoutError(process.execPath, [
|
|
postjectFile,
|
|
targetExecutable,
|
|
'NODE_SEA_BLOB',
|
|
seaBlob,
|
|
'--sentinel-fuse', 'NODE_SEA_FUSE_fce680ab2cc467b6e072b8b5df1996b2',
|
|
...process.platform === 'darwin' ? [ '--macho-segment-name', 'NODE_SEA' ] : [],
|
|
]);
|
|
} catch (e) {
|
|
const message = `Cannot inject ${seaBlob} into ${targetExecutable}: ${inspect(e)}`;
|
|
if (verifyWorkflow) {
|
|
throw new Error(message);
|
|
}
|
|
common.skip(message);
|
|
}
|
|
console.log(`Injected ${seaBlob} into ${targetExecutable}`);
|
|
|
|
if (process.platform === 'darwin') {
|
|
try {
|
|
spawnSyncAndExitWithoutError('codesign', [ '--sign', '-', targetExecutable ]);
|
|
spawnSyncAndExitWithoutError('codesign', [ '--verify', targetExecutable ]);
|
|
} catch (e) {
|
|
const message = `Cannot sign ${targetExecutable}: ${inspect(e)}`;
|
|
if (verifyWorkflow) {
|
|
throw new Error(message);
|
|
}
|
|
common.skip(message);
|
|
}
|
|
console.log(`Signed ${targetExecutable}`);
|
|
} else if (process.platform === 'win32') {
|
|
try {
|
|
spawnSyncAndExitWithoutError('where', [ 'signtool' ]);
|
|
} catch (e) {
|
|
const message = `Cannot find signtool: ${inspect(e)}`;
|
|
if (verifyWorkflow) {
|
|
throw new Error(message);
|
|
}
|
|
common.skip(message);
|
|
}
|
|
let stderr;
|
|
try {
|
|
({ stderr } = spawnSyncAndExitWithoutError('signtool', [ 'sign', '/fd', 'SHA256', targetExecutable ]));
|
|
spawnSyncAndExitWithoutError('signtool', ['verify', '/pa', 'SHA256', targetExecutable]);
|
|
} catch (e) {
|
|
const message = `Cannot sign ${targetExecutable}: ${inspect(e)}\n${stderr}`;
|
|
if (verifyWorkflow) {
|
|
throw new Error(message);
|
|
}
|
|
common.skip(message);
|
|
}
|
|
console.log(`Signed ${targetExecutable}`);
|
|
}
|
|
}
|
|
|
|
module.exports = {
|
|
skipIfSingleExecutableIsNotSupported,
|
|
generateSEA,
|
|
};
|