![Shelley Vohr](/assets/img/avatar_default.png)
* chore: bump Node.js to v22.9.0 * build: drop base64 dep in GN build https://github.com/nodejs/node/pull/52856 * build,tools: make addons tests work with GN https://github.com/nodejs/node/pull/50737 * fs: add fast api for InternalModuleStat https://github.com/nodejs/node/pull/51344 * src: move package_json_reader cache to c++ https://github.com/nodejs/node/pull/50322 * crypto: disable PKCS#1 padding for privateDecrypt https://github.com/nodejs-private/node-private/pull/525 * src: move more crypto code to ncrypto https://github.com/nodejs/node/pull/54320 * crypto: ensure valid point on elliptic curve in SubtleCrypto.importKey https://github.com/nodejs/node/pull/50234 * src: shift more crypto impl details to ncrypto https://github.com/nodejs/node/pull/54028 * src: switch crypto APIs to use Maybe<void> https://github.com/nodejs/node/pull/54775 * crypto: remove DEFAULT_ENCODING https://github.com/nodejs/node/pull/47182 * deps: update libuv to 1.47.0 https://github.com/nodejs/node/pull/50650 * build: fix conflict gyp configs https://github.com/nodejs/node/pull/53605 * lib,src: drop --experimental-network-imports https://github.com/nodejs/node/pull/53822 * esm: align sync and async load implementations https://github.com/nodejs/node/pull/49152 * esm: remove unnecessary toNamespacedPath calls https://github.com/nodejs/node/pull/53656 * module: detect ESM syntax by trying to recompile as SourceTextModule https://github.com/nodejs/node/pull/52413 * test: adapt debugger tests to V8 11.4 https://github.com/nodejs/node/pull/49639 * lib: update usage of always on Atomics API https://github.com/nodejs/node/pull/49639 * test: adapt test-fs-write to V8 internal changes https://github.com/nodejs/node/pull/49639 * test: adapt to new V8 trusted memory spaces https://github.com/nodejs/node/pull/50115 * deps: update libuv to 1.47.0 https://github.com/nodejs/node/pull/50650 * src: use non-deprecated v8::Uint8Array::kMaxLength https://github.com/nodejs/node/pull/50115 * src: update default V8 platform to override functions with location https://github.com/nodejs/node/pull/51362 * src: add missing TryCatch https://github.com/nodejs/node/pull/51362 * lib,test: handle new Iterator global https://github.com/nodejs/node/pull/51362 * src: use non-deprecated version of CreateSyntheticModule https://github.com/nodejs/node/pull/50115 * src: remove calls to recently deprecated V8 APIs https://github.com/nodejs/node/pull/52996 * src: use new V8 API to define stream accessor https://github.com/nodejs/node/pull/53084 * src: do not use deprecated V8 API https://github.com/nodejs/node/pull/53084 * src: do not use soon-to-be-deprecated V8 API https://github.com/nodejs/node/pull/53174 * src: migrate to new V8 interceptors API https://github.com/nodejs/node/pull/52745 * src: use supported API to get stalled TLA messages https://github.com/nodejs/node/pull/51362 * module: print location of unsettled top-level await in entry points https://github.com/nodejs/node/pull/51999 * test: make snapshot comparison more flexible https://github.com/nodejs/node/pull/54375 * test: do not set concurrency on parallelized runs https://github.com/nodejs/node/pull/52177 * src: move FromNamespacedPath to path.cc https://github.com/nodejs/node/pull/53540 * test: adapt to new V8 trusted memory spaces https://github.com/nodejs/node/pull/50115 * build: add option to enable clang-cl on Windows https://github.com/nodejs/node/pull/52870 * chore: fixup patch indices * chore: add/remove changed files * esm: drop support for import assertions https://github.com/nodejs/node/pull/54890 * build: compile with C++20 support https://github.com/nodejs/node/pull/52838 * deps: update nghttp2 to 1.62.1 https://github.com/nodejs/node/pull/52966 * src: parse inspector profiles with simdjson https://github.com/nodejs/node/pull/51783 * build: add GN build files https://github.com/nodejs/node/pull/47637 * deps,lib,src: add experimental web storage https://github.com/nodejs/node/pull/52435 * build: add missing BoringSSL dep * src: rewrite task runner in c++ https://github.com/nodejs/node/pull/52609 * fixup! build: add GN build files * src: stop using deprecated fields of v8::FastApiCallbackOptions https://github.com/nodejs/node/pull/54077 * fix: shadow variable * build: add back incorrectly removed SetAccessor patch * fixup! fixup! build: add GN build files * crypto: fix integer comparison in crypto for BoringSSL * src,lib: reducing C++ calls of esm legacy main resolve https://github.com/nodejs/node/pull/48325 * src: move more crypto_dh.cc code to ncrypto https://github.com/nodejs/node/pull/54459 * chore: fixup GN files for previous commit * src: move more crypto code to ncrypto https://github.com/nodejs/node/pull/54320 * Fixup Perfetto ifdef guards * fix: missing electron_natives dep * fix: node_use_node_platform = false * fix: include src/node_snapshot_stub.cc in libnode * 5507047: [import-attributes] Remove support for import assertions https://chromium-review.googlesource.com/c/v8/v8/+/5507047 * fix: restore v8-sandbox.h in filenames.json * fix: re-add original-fs generation logic * fix: ngtcp2 openssl dep * test: try removing NAPI_VERSION undef * chore(deps): bump @types/node * src: move more crypto_dh.cc code to ncrypto https://github.com/nodejs/node/pull/54459 * esm: remove unnecessary toNamespacedPath calls https://github.com/nodejs/node/pull/53656 * buffer: fix out of range for toString https://github.com/nodejs/node/pull/54553 * lib: rewrite AsyncLocalStorage without async_hooks https://github.com/nodejs/node/pull/48528 * module: print amount of load time of a cjs module https://github.com/nodejs/node/pull/52213 * test: skip reproducible snapshot test on 32-bit https://github.com/nodejs/node/pull/53592 * fixup! src: move more crypto_dh.cc code to ncrypto * test: adjust emittedUntil return type * chore: remove redundant wpt streams patch * fixup! chore(deps): bump @types/node * fix: gn executable name on Windows * fix: build on Windows * fix: rename conflicting win32 symbols in //third_party/sqlite On Windows otherwise we get: lld-link: error: duplicate symbol: sqlite3_win32_write_debug >>> defined at .\..\..\third_party\electron_node\deps\sqlite\sqlite3.c:47987 >>> obj/third_party/electron_node/deps/sqlite/sqlite/sqlite3.obj >>> defined at obj/third_party/sqlite\chromium_sqlite3/sqlite3_shim.obj lld-link: error: duplicate symbol: sqlite3_win32_sleep >>> defined at .\..\..\third_party\electron_node\deps\sqlite\sqlite3.c:48042 >>> obj/third_party/electron_node/deps/sqlite/sqlite/sqlite3.obj >>> defined at obj/third_party/sqlite\chromium_sqlite3/sqlite3_shim.obj lld-link: error: duplicate symbol: sqlite3_win32_is_nt >>> defined at .\..\..\third_party\electron_node\deps\sqlite\sqlite3.c:48113 >>> obj/third_party/electron_node/deps/sqlite/sqlite/sqlite3.obj >>> defined at obj/third_party/sqlite\chromium_sqlite3/sqlite3_shim.obj lld-link: error: duplicate symbol: sqlite3_win32_utf8_to_unicode >>> defined at .\..\..\third_party\electron_node\deps\sqlite\sqlite3.c:48470 >>> obj/third_party/electron_node/deps/sqlite/sqlite/sqlite3.obj >>> defined at obj/third_party/sqlite\chromium_sqlite3/sqlite3_shim.obj lld-link: error: duplicate symbol: sqlite3_win32_unicode_to_utf8 >>> defined at .\..\..\third_party\electron_node\deps\sqlite\sqlite3.c:48486 >>> obj/third_party/electron_node/deps/sqlite/sqlite/sqlite3.obj >>> defined at obj/third_party/sqlite\chromium_sqlite3/sqlite3_shim.obj lld-link: error: duplicate symbol: sqlite3_win32_mbcs_to_utf8 >>> defined at .\..\..\third_party\electron_node\deps\sqlite\sqlite3.c:48502 >>> obj/third_party/electron_node/deps/sqlite/sqlite/sqlite3.obj >>> defined at obj/third_party/sqlite\chromium_sqlite3/sqlite3_shim.obj lld-link: error: duplicate symbol: sqlite3_win32_mbcs_to_utf8_v2 >>> defined at .\..\..\third_party\electron_node\deps\sqlite\sqlite3.c:48518 >>> obj/third_party/electron_node/deps/sqlite/sqlite/sqlite3.obj >>> defined at obj/third_party/sqlite\chromium_sqlite3/sqlite3_shim.obj lld-link: error: duplicate symbol: sqlite3_win32_utf8_to_mbcs >>> defined at .\..\..\third_party\electron_node\deps\sqlite\sqlite3.c:48534 >>> obj/third_party/electron_node/deps/sqlite/sqlite/sqlite3.obj >>> defined at obj/third_party/sqlite\chromium_sqlite3/sqlite3_shim.obj lld-link: error: duplicate symbol: sqlite3_win32_utf8_to_mbcs_v2 >>> defined at .\..\..\third_party\electron_node\deps\sqlite\sqlite3.c:48550 >>> obj/third_party/electron_node/deps/sqlite/sqlite/sqlite3.obj >>> defined at obj/third_party/sqlite\chromium_sqlite3/sqlite3_shim.obj * docs: remove unnecessary ts-expect-error after types bump * src: move package resolver to c++ https://github.com/nodejs/node/pull/50322 * build: set ASAN detect_container_overflow=0 https://github.com/nodejs/node/issues/55584 * chore: fixup rebase * test: disable failing ASAN test * win: almost fix race detecting ESRCH in uv_kill https://github.com/libuv/libuv/pull/4341
745 lines
29 KiB
TypeScript
745 lines
29 KiB
TypeScript
import { systemPreferences } from 'electron';
|
|
import { BrowserWindow, MessageChannelMain, utilityProcess, app } from 'electron/main';
|
|
|
|
import { expect } from 'chai';
|
|
|
|
import * as childProcess from 'node:child_process';
|
|
import { once } from 'node:events';
|
|
import * as path from 'node:path';
|
|
import { setImmediate } from 'node:timers/promises';
|
|
import { pathToFileURL } from 'node:url';
|
|
|
|
import { respondOnce, randomString, kOneKiloByte } from './lib/net-helpers';
|
|
import { ifit, startRemoteControlApp } from './lib/spec-helpers';
|
|
import { closeWindow } from './lib/window-helpers';
|
|
|
|
const fixturesPath = path.resolve(__dirname, 'fixtures', 'api', 'utility-process');
|
|
const isWindowsOnArm = process.platform === 'win32' && process.arch === 'arm64';
|
|
const isWindows32Bit = process.platform === 'win32' && process.arch === 'ia32';
|
|
|
|
describe('utilityProcess module', () => {
|
|
describe('UtilityProcess constructor', () => {
|
|
it('throws when empty script path is provided', async () => {
|
|
expect(() => {
|
|
utilityProcess.fork('');
|
|
}).to.throw();
|
|
});
|
|
|
|
it('throws when options.stdio is not valid', async () => {
|
|
expect(() => {
|
|
utilityProcess.fork(path.join(fixturesPath, 'empty.js'), [], {
|
|
execArgv: ['--test', '--test2'],
|
|
serviceName: 'test',
|
|
stdio: 'ipc'
|
|
});
|
|
}).to.throw(/stdio must be of the following values: inherit, pipe, ignore/);
|
|
|
|
expect(() => {
|
|
utilityProcess.fork(path.join(fixturesPath, 'empty.js'), [], {
|
|
execArgv: ['--test', '--test2'],
|
|
serviceName: 'test',
|
|
stdio: ['ignore', 'ignore']
|
|
});
|
|
}).to.throw(/configuration missing for stdin, stdout or stderr/);
|
|
|
|
expect(() => {
|
|
utilityProcess.fork(path.join(fixturesPath, 'empty.js'), [], {
|
|
execArgv: ['--test', '--test2'],
|
|
serviceName: 'test',
|
|
stdio: ['pipe', 'inherit', 'inherit']
|
|
});
|
|
}).to.throw(/stdin value other than ignore is not supported/);
|
|
});
|
|
});
|
|
|
|
describe('lifecycle events', () => {
|
|
it('emits \'spawn\' when child process successfully launches', async () => {
|
|
const child = utilityProcess.fork(path.join(fixturesPath, 'empty.js'));
|
|
await once(child, 'spawn');
|
|
});
|
|
|
|
it('emits \'exit\' when child process exits gracefully', (done) => {
|
|
const child = utilityProcess.fork(path.join(fixturesPath, 'empty.js'));
|
|
child.on('exit', (code) => {
|
|
expect(code).to.equal(0);
|
|
done();
|
|
});
|
|
});
|
|
|
|
it('emits \'exit\' when the child process file does not exist', (done) => {
|
|
const child = utilityProcess.fork('nonexistent');
|
|
child.on('exit', (code) => {
|
|
expect(code).to.equal(1);
|
|
done();
|
|
});
|
|
});
|
|
|
|
ifit(!isWindows32Bit)('emits the correct error code when child process exits nonzero', async () => {
|
|
const child = utilityProcess.fork(path.join(fixturesPath, 'empty.js'));
|
|
await once(child, 'spawn');
|
|
const exit = once(child, 'exit');
|
|
process.kill(child.pid!);
|
|
const [code] = await exit;
|
|
expect(code).to.not.equal(0);
|
|
});
|
|
|
|
ifit(!isWindows32Bit)('emits the correct error code when child process is killed', async () => {
|
|
const child = utilityProcess.fork(path.join(fixturesPath, 'empty.js'));
|
|
await once(child, 'spawn');
|
|
const exit = once(child, 'exit');
|
|
process.kill(child.pid!);
|
|
const [code] = await exit;
|
|
expect(code).to.not.equal(0);
|
|
});
|
|
|
|
ifit(!isWindows32Bit)('emits \'exit\' when child process crashes', async () => {
|
|
const child = utilityProcess.fork(path.join(fixturesPath, 'crash.js'));
|
|
// SIGSEGV code can differ across pipelines but should never be 0.
|
|
const [code] = await once(child, 'exit');
|
|
expect(code).to.not.equal(0);
|
|
});
|
|
|
|
ifit(!isWindows32Bit)('emits \'exit\' corresponding to the child process', async () => {
|
|
const child1 = utilityProcess.fork(path.join(fixturesPath, 'endless.js'));
|
|
await once(child1, 'spawn');
|
|
const child2 = utilityProcess.fork(path.join(fixturesPath, 'crash.js'));
|
|
await once(child2, 'exit');
|
|
expect(child1.kill()).to.be.true();
|
|
await once(child1, 'exit');
|
|
});
|
|
|
|
it('emits \'exit\' when there is uncaught exception', async () => {
|
|
const child = utilityProcess.fork(path.join(fixturesPath, 'exception.js'));
|
|
const [code] = await once(child, 'exit');
|
|
expect(code).to.equal(1);
|
|
});
|
|
|
|
it('emits \'exit\' when there is uncaught exception in ESM', async () => {
|
|
const child = utilityProcess.fork(path.join(fixturesPath, 'exception.mjs'));
|
|
const [code] = await once(child, 'exit');
|
|
expect(code).to.equal(1);
|
|
});
|
|
|
|
it('emits \'exit\' when process.exit is called', async () => {
|
|
const exitCode = 2;
|
|
const child = utilityProcess.fork(path.join(fixturesPath, 'custom-exit.js'), [`--exitCode=${exitCode}`]);
|
|
const [code] = await once(child, 'exit');
|
|
expect(code).to.equal(exitCode);
|
|
});
|
|
|
|
// 32-bit system will not have V8 Sandbox enabled.
|
|
// WoA testing does not have VS toolchain configured to build native addons.
|
|
ifit(process.arch !== 'ia32' && process.arch !== 'arm' && !isWindowsOnArm)('emits \'error\' when fatal error is triggered from V8', async () => {
|
|
const child = utilityProcess.fork(path.join(fixturesPath, 'external-ab-test.js'));
|
|
const [type, location, report] = await once(child, 'error');
|
|
const [code] = await once(child, 'exit');
|
|
expect(type).to.equal('FatalError');
|
|
expect(location).to.equal('v8_ArrayBuffer_NewBackingStore');
|
|
const reportJSON = JSON.parse(report);
|
|
expect(reportJSON.header.trigger).to.equal('v8_ArrayBuffer_NewBackingStore');
|
|
const addonPath = path.join(require.resolve('@electron-ci/external-ab'), '..', '..', 'build', 'Release', 'external_ab.node');
|
|
expect(reportJSON.sharedObjects).to.include(path.toNamespacedPath(addonPath));
|
|
expect(code).to.not.equal(0);
|
|
});
|
|
});
|
|
|
|
describe('app \'child-process-gone\' event', () => {
|
|
const waitForCrash = (name: string) => {
|
|
return new Promise<Electron.Details>((resolve) => {
|
|
app.on('child-process-gone', function onCrash (_event, details) {
|
|
if (details.name === name) {
|
|
app.off('child-process-gone', onCrash);
|
|
resolve(details);
|
|
}
|
|
});
|
|
});
|
|
};
|
|
|
|
ifit(!isWindows32Bit)('with default serviceName', async () => {
|
|
const name = 'Node Utility Process';
|
|
const crashPromise = waitForCrash(name);
|
|
utilityProcess.fork(path.join(fixturesPath, 'crash.js'));
|
|
const details = await crashPromise;
|
|
expect(details.type).to.equal('Utility');
|
|
expect(details.serviceName).to.equal('node.mojom.NodeService');
|
|
expect(details.name).to.equal(name);
|
|
expect(details.reason).to.be.oneOf(['crashed', 'abnormal-exit']);
|
|
});
|
|
|
|
ifit(!isWindows32Bit)('with custom serviceName', async () => {
|
|
const name = crypto.randomUUID();
|
|
const crashPromise = waitForCrash(name);
|
|
utilityProcess.fork(path.join(fixturesPath, 'crash.js'), [], { serviceName: name });
|
|
const details = await crashPromise;
|
|
expect(details.type).to.equal('Utility');
|
|
expect(details.serviceName).to.equal('node.mojom.NodeService');
|
|
expect(details.name).to.equal(name);
|
|
expect(details.reason).to.be.oneOf(['crashed', 'abnormal-exit']);
|
|
});
|
|
});
|
|
|
|
describe('app.getAppMetrics()', () => {
|
|
it('with default serviceName', async () => {
|
|
const child = utilityProcess.fork(path.join(fixturesPath, 'endless.js'));
|
|
await once(child, 'spawn');
|
|
expect(child.pid).to.not.be.null();
|
|
|
|
await setImmediate();
|
|
|
|
const details = app.getAppMetrics().find(item => item.pid === child.pid)!;
|
|
expect(details).to.be.an('object');
|
|
expect(details.type).to.equal('Utility');
|
|
expect(details.serviceName).to.to.equal('node.mojom.NodeService');
|
|
expect(details.name).to.equal('Node Utility Process');
|
|
});
|
|
|
|
it('with custom serviceName', async () => {
|
|
const child = utilityProcess.fork(path.join(fixturesPath, 'endless.js'), [], { serviceName: 'Hello World!' });
|
|
await once(child, 'spawn');
|
|
expect(child.pid).to.not.be.null();
|
|
|
|
await setImmediate();
|
|
|
|
const details = app.getAppMetrics().find(item => item.pid === child.pid)!;
|
|
expect(details).to.be.an('object');
|
|
expect(details.type).to.equal('Utility');
|
|
expect(details.serviceName).to.to.equal('node.mojom.NodeService');
|
|
expect(details.name).to.equal('Hello World!');
|
|
});
|
|
});
|
|
|
|
describe('kill() API', () => {
|
|
it('terminates the child process gracefully', async () => {
|
|
const child = utilityProcess.fork(path.join(fixturesPath, 'endless.js'), [], {
|
|
serviceName: 'endless'
|
|
});
|
|
await once(child, 'spawn');
|
|
expect(child.kill()).to.be.true();
|
|
await once(child, 'exit');
|
|
});
|
|
});
|
|
|
|
describe('esm', () => {
|
|
it('is launches an mjs file', async () => {
|
|
const fixtureFile = path.join(fixturesPath, 'esm.mjs');
|
|
const child = utilityProcess.fork(fixtureFile, [], {
|
|
stdio: 'pipe'
|
|
});
|
|
await once(child, 'spawn');
|
|
expect(child.stdout).to.not.be.null();
|
|
let log = '';
|
|
child.stdout!.on('data', (chunk) => {
|
|
log += chunk.toString('utf8');
|
|
});
|
|
await once(child, 'exit');
|
|
expect(log).to.equal(pathToFileURL(fixtureFile) + '\n');
|
|
});
|
|
});
|
|
|
|
describe('pid property', () => {
|
|
it('is valid when child process launches successfully', async () => {
|
|
const child = utilityProcess.fork(path.join(fixturesPath, 'empty.js'));
|
|
await once(child, 'spawn');
|
|
expect(child.pid).to.not.be.null();
|
|
});
|
|
|
|
it('is undefined when child process fails to launch', async () => {
|
|
const child = utilityProcess.fork(path.join(fixturesPath, 'does-not-exist.js'));
|
|
expect(child.pid).to.be.undefined();
|
|
});
|
|
});
|
|
|
|
describe('stdout property', () => {
|
|
it('is null when child process launches with default stdio', async () => {
|
|
const child = utilityProcess.fork(path.join(fixturesPath, 'log.js'));
|
|
await once(child, 'spawn');
|
|
expect(child.stdout).to.be.null();
|
|
expect(child.stderr).to.be.null();
|
|
await once(child, 'exit');
|
|
});
|
|
|
|
it('is null when child process launches with ignore stdio configuration', async () => {
|
|
const child = utilityProcess.fork(path.join(fixturesPath, 'log.js'), [], {
|
|
stdio: 'ignore'
|
|
});
|
|
await once(child, 'spawn');
|
|
expect(child.stdout).to.be.null();
|
|
expect(child.stderr).to.be.null();
|
|
await once(child, 'exit');
|
|
});
|
|
|
|
it('is valid when child process launches with pipe stdio configuration', async () => {
|
|
const child = utilityProcess.fork(path.join(fixturesPath, 'log.js'), [], {
|
|
stdio: 'pipe'
|
|
});
|
|
await once(child, 'spawn');
|
|
expect(child.stdout).to.not.be.null();
|
|
let log = '';
|
|
child.stdout!.on('data', (chunk) => {
|
|
log += chunk.toString('utf8');
|
|
});
|
|
await once(child, 'exit');
|
|
expect(log).to.equal('hello\n');
|
|
});
|
|
});
|
|
|
|
describe('stderr property', () => {
|
|
it('is null when child process launches with default stdio', async () => {
|
|
const child = utilityProcess.fork(path.join(fixturesPath, 'log.js'));
|
|
await once(child, 'spawn');
|
|
expect(child.stdout).to.be.null();
|
|
expect(child.stderr).to.be.null();
|
|
await once(child, 'exit');
|
|
});
|
|
|
|
it('is null when child process launches with ignore stdio configuration', async () => {
|
|
const child = utilityProcess.fork(path.join(fixturesPath, 'log.js'), [], {
|
|
stdio: 'ignore'
|
|
});
|
|
await once(child, 'spawn');
|
|
expect(child.stderr).to.be.null();
|
|
await once(child, 'exit');
|
|
});
|
|
|
|
ifit(!isWindowsOnArm)('is valid when child process launches with pipe stdio configuration', async () => {
|
|
const child = utilityProcess.fork(path.join(fixturesPath, 'log.js'), [], {
|
|
stdio: ['ignore', 'pipe', 'pipe']
|
|
});
|
|
await once(child, 'spawn');
|
|
expect(child.stderr).to.not.be.null();
|
|
let log = '';
|
|
child.stderr!.on('data', (chunk) => {
|
|
log += chunk.toString('utf8');
|
|
});
|
|
await once(child, 'exit');
|
|
expect(log).to.equal('world');
|
|
});
|
|
});
|
|
|
|
describe('postMessage() API', () => {
|
|
it('establishes a default ipc channel with the child process', async () => {
|
|
const result = 'I will be echoed.';
|
|
const child = utilityProcess.fork(path.join(fixturesPath, 'post-message.js'));
|
|
await once(child, 'spawn');
|
|
child.postMessage(result);
|
|
const [data] = await once(child, 'message');
|
|
expect(data).to.equal(result);
|
|
const exit = once(child, 'exit');
|
|
expect(child.kill()).to.be.true();
|
|
await exit;
|
|
});
|
|
|
|
it('supports queuing messages on the receiving end', async () => {
|
|
const child = utilityProcess.fork(path.join(fixturesPath, 'post-message-queue.js'));
|
|
const p = once(child, 'spawn');
|
|
child.postMessage('This message');
|
|
child.postMessage(' is');
|
|
child.postMessage(' queued');
|
|
await p;
|
|
const [data] = await once(child, 'message');
|
|
expect(data).to.equal('This message is queued');
|
|
const exit = once(child, 'exit');
|
|
expect(child.kill()).to.be.true();
|
|
await exit;
|
|
});
|
|
|
|
it('handles the parent port trying to send an non-clonable object', async () => {
|
|
const child = utilityProcess.fork(path.join(fixturesPath, 'non-cloneable.js'));
|
|
await once(child, 'spawn');
|
|
child.postMessage('non-cloneable');
|
|
const [data] = await once(child, 'message');
|
|
expect(data).to.equal('caught-non-cloneable');
|
|
const exit = once(child, 'exit');
|
|
expect(child.kill()).to.be.true();
|
|
await exit;
|
|
});
|
|
});
|
|
|
|
describe('behavior', () => {
|
|
it('supports starting the v8 inspector with --inspect-brk', (done) => {
|
|
const child = utilityProcess.fork(path.join(fixturesPath, 'log.js'), [], {
|
|
stdio: 'pipe',
|
|
execArgv: ['--inspect-brk']
|
|
});
|
|
|
|
let output = '';
|
|
const cleanup = () => {
|
|
child.stderr!.removeListener('data', listener);
|
|
child.stdout!.removeListener('data', listener);
|
|
child.once('exit', () => { done(); });
|
|
child.kill();
|
|
};
|
|
|
|
const listener = (data: Buffer) => {
|
|
output += data;
|
|
if (/Debugger listening on ws:/m.test(output)) {
|
|
cleanup();
|
|
}
|
|
};
|
|
|
|
child.stderr!.on('data', listener);
|
|
child.stdout!.on('data', listener);
|
|
});
|
|
|
|
it('supports starting the v8 inspector with --inspect and a provided port', (done) => {
|
|
const child = utilityProcess.fork(path.join(fixturesPath, 'log.js'), [], {
|
|
stdio: 'pipe',
|
|
execArgv: ['--inspect=17364']
|
|
});
|
|
|
|
let output = '';
|
|
const cleanup = () => {
|
|
child.stderr!.removeListener('data', listener);
|
|
child.stdout!.removeListener('data', listener);
|
|
child.once('exit', () => { done(); });
|
|
child.kill();
|
|
};
|
|
|
|
const listener = (data: Buffer) => {
|
|
output += data;
|
|
if (/Debugger listening on ws:/m.test(output)) {
|
|
expect(output.trim()).to.contain(':17364', 'should be listening on port 17364');
|
|
cleanup();
|
|
}
|
|
};
|
|
|
|
child.stderr!.on('data', listener);
|
|
child.stdout!.on('data', listener);
|
|
});
|
|
|
|
it('supports changing dns verbatim with --dns-result-order', (done) => {
|
|
const child = utilityProcess.fork(path.join(fixturesPath, 'dns-result-order.js'), [], {
|
|
stdio: 'pipe',
|
|
execArgv: ['--dns-result-order=ipv4first']
|
|
});
|
|
|
|
let output = '';
|
|
const cleanup = () => {
|
|
child.stderr!.removeListener('data', listener);
|
|
child.stdout!.removeListener('data', listener);
|
|
child.once('exit', () => { done(); });
|
|
child.kill();
|
|
};
|
|
|
|
const listener = (data: Buffer) => {
|
|
output += data;
|
|
expect(output.trim()).to.contain('ipv4first', 'default verbatim should be ipv4first');
|
|
cleanup();
|
|
};
|
|
|
|
child.stderr!.on('data', listener);
|
|
child.stdout!.on('data', listener);
|
|
});
|
|
|
|
ifit(process.platform !== 'win32')('supports redirecting stdout to parent process', async () => {
|
|
const result = 'Output from utility process';
|
|
const appProcess = childProcess.spawn(process.execPath, [path.join(fixturesPath, 'inherit-stdout'), `--payload=${result}`]);
|
|
let output = '';
|
|
appProcess.stdout.on('data', (data: Buffer) => { output += data; });
|
|
await once(appProcess, 'exit');
|
|
expect(output).to.equal(result);
|
|
});
|
|
|
|
ifit(process.platform !== 'win32')('supports redirecting stderr to parent process', async () => {
|
|
const result = 'Error from utility process';
|
|
const appProcess = childProcess.spawn(process.execPath, [path.join(fixturesPath, 'inherit-stderr'), `--payload=${result}`]);
|
|
let output = '';
|
|
appProcess.stderr.on('data', (data: Buffer) => { output += data; });
|
|
await once(appProcess, 'exit');
|
|
expect(output).to.include(result);
|
|
});
|
|
|
|
ifit(process.platform !== 'linux')('can access exposed main process modules from the utility process', async () => {
|
|
const message = 'Message from utility process';
|
|
const child = utilityProcess.fork(path.join(fixturesPath, 'expose-main-process-module.js'));
|
|
await once(child, 'spawn');
|
|
child.postMessage(message);
|
|
const [data] = await once(child, 'message');
|
|
expect(data).to.equal(systemPreferences.getMediaAccessStatus('screen'));
|
|
const exit = once(child, 'exit');
|
|
expect(child.kill()).to.be.true();
|
|
await exit;
|
|
});
|
|
|
|
it('can establish communication channel with sandboxed renderer', async () => {
|
|
const result = 'Message from sandboxed renderer';
|
|
const w = new BrowserWindow({
|
|
show: false,
|
|
webPreferences: {
|
|
preload: path.join(fixturesPath, 'preload.js')
|
|
}
|
|
});
|
|
await w.loadFile(path.join(__dirname, 'fixtures', 'blank.html'));
|
|
// Create Message port pair for Renderer <-> Utility Process.
|
|
const { port1: rendererPort, port2: childPort1 } = new MessageChannelMain();
|
|
w.webContents.postMessage('port', result, [rendererPort]);
|
|
// Send renderer and main channel port to utility process.
|
|
const child = utilityProcess.fork(path.join(fixturesPath, 'receive-message.js'));
|
|
await once(child, 'spawn');
|
|
child.postMessage('', [childPort1]);
|
|
const [data] = await once(child, 'message');
|
|
expect(data).to.equal(result);
|
|
// Cleanup.
|
|
const exit = once(child, 'exit');
|
|
expect(child.kill()).to.be.true();
|
|
await exit;
|
|
await closeWindow(w);
|
|
});
|
|
|
|
ifit(process.platform === 'linux')('allows executing a setuid binary with child_process', async () => {
|
|
const child = utilityProcess.fork(path.join(fixturesPath, 'suid.js'));
|
|
await once(child, 'spawn');
|
|
const [data] = await once(child, 'message');
|
|
expect(data).to.not.be.empty();
|
|
const exit = once(child, 'exit');
|
|
expect(child.kill()).to.be.true();
|
|
await exit;
|
|
});
|
|
|
|
it('inherits parent env as default', async () => {
|
|
const appProcess = childProcess.spawn(process.execPath, [path.join(fixturesPath, 'env-app')], {
|
|
env: {
|
|
FROM: 'parent',
|
|
...process.env
|
|
}
|
|
});
|
|
let output = '';
|
|
appProcess.stdout.on('data', (data: Buffer) => { output += data; });
|
|
await once(appProcess.stdout, 'end');
|
|
const result = process.platform === 'win32' ? '\r\nparent' : 'parent';
|
|
expect(output).to.equal(result);
|
|
});
|
|
|
|
// TODO(codebytere): figure out why this is failing in ASAN- builds on Linux.
|
|
ifit(!process.env.IS_ASAN)('does not inherit parent env when custom env is provided', async () => {
|
|
const appProcess = childProcess.spawn(process.execPath, [path.join(fixturesPath, 'env-app'), '--create-custom-env'], {
|
|
env: {
|
|
FROM: 'parent',
|
|
...process.env
|
|
}
|
|
});
|
|
let output = '';
|
|
appProcess.stdout.on('data', (data: Buffer) => { output += data; });
|
|
await once(appProcess.stdout, 'end');
|
|
const result = process.platform === 'win32' ? '\r\nchild' : 'child';
|
|
expect(output).to.equal(result);
|
|
});
|
|
|
|
it('changes working directory with cwd', async () => {
|
|
const child = utilityProcess.fork('./log.js', [], {
|
|
cwd: fixturesPath,
|
|
stdio: ['ignore', 'pipe', 'ignore']
|
|
});
|
|
await once(child, 'spawn');
|
|
expect(child.stdout).to.not.be.null();
|
|
let log = '';
|
|
child.stdout!.on('data', (chunk) => {
|
|
log += chunk.toString('utf8');
|
|
});
|
|
await once(child, 'exit');
|
|
expect(log).to.equal('hello\n');
|
|
});
|
|
|
|
it('does not crash when running eval', async () => {
|
|
const child = utilityProcess.fork('./eval.js', [], {
|
|
cwd: fixturesPath,
|
|
stdio: 'ignore'
|
|
});
|
|
await once(child, 'spawn');
|
|
const [data] = await once(child, 'message');
|
|
expect(data).to.equal(42);
|
|
// Cleanup.
|
|
const exit = once(child, 'exit');
|
|
expect(child.kill()).to.be.true();
|
|
await exit;
|
|
});
|
|
|
|
it('should emit the app#login event when 401', async () => {
|
|
const { remotely } = await startRemoteControlApp();
|
|
const serverUrl = await respondOnce.toSingleURL((request, response) => {
|
|
if (!request.headers.authorization) {
|
|
return response.writeHead(401, { 'WWW-Authenticate': 'Basic realm="Foo"' }).end();
|
|
}
|
|
response.writeHead(200).end('ok');
|
|
});
|
|
const [loginAuthInfo, statusCode] = await remotely(async (serverUrl: string, fixture: string) => {
|
|
const { app, utilityProcess } = require('electron');
|
|
const { once } = require('node:events');
|
|
const child = utilityProcess.fork(fixture, [`--server-url=${serverUrl}`], {
|
|
stdio: 'ignore',
|
|
respondToAuthRequestsFromMainProcess: true
|
|
});
|
|
await once(child, 'spawn');
|
|
const [ev,,, authInfo, cb] = await once(app, 'login');
|
|
ev.preventDefault();
|
|
cb('dummy', 'pass');
|
|
const [result] = await once(child, 'message');
|
|
return [authInfo, ...result];
|
|
}, serverUrl, path.join(fixturesPath, 'net.js'));
|
|
expect(statusCode).to.equal(200);
|
|
expect(loginAuthInfo!.realm).to.equal('Foo');
|
|
expect(loginAuthInfo!.scheme).to.equal('basic');
|
|
});
|
|
|
|
it('should receive 401 response when cancelling authentication via app#login event', async () => {
|
|
const { remotely } = await startRemoteControlApp();
|
|
const serverUrl = await respondOnce.toSingleURL((request, response) => {
|
|
if (!request.headers.authorization) {
|
|
response.writeHead(401, { 'WWW-Authenticate': 'Basic realm="Foo"' });
|
|
response.end('unauthenticated');
|
|
} else {
|
|
response.writeHead(200).end('ok');
|
|
}
|
|
});
|
|
const [authDetails, responseBody, statusCode] = await remotely(async (serverUrl: string, fixture: string) => {
|
|
const { app, utilityProcess } = require('electron');
|
|
const { once } = require('node:events');
|
|
const child = utilityProcess.fork(fixture, [`--server-url=${serverUrl}`], {
|
|
stdio: 'ignore',
|
|
respondToAuthRequestsFromMainProcess: true
|
|
});
|
|
await once(child, 'spawn');
|
|
const [,, details,, cb] = await once(app, 'login');
|
|
cb();
|
|
const [response] = await once(child, 'message');
|
|
const [responseBody] = await once(child, 'message');
|
|
return [details, responseBody, ...response];
|
|
}, serverUrl, path.join(fixturesPath, 'net.js'));
|
|
expect(authDetails.url).to.equal(serverUrl);
|
|
expect(statusCode).to.equal(401);
|
|
expect(responseBody).to.equal('unauthenticated');
|
|
});
|
|
|
|
it('should upload body when 401', async () => {
|
|
const { remotely } = await startRemoteControlApp();
|
|
const serverUrl = await respondOnce.toSingleURL((request, response) => {
|
|
if (!request.headers.authorization) {
|
|
return response.writeHead(401, { 'WWW-Authenticate': 'Basic realm="Foo"' }).end();
|
|
}
|
|
response.writeHead(200);
|
|
request.on('data', (chunk) => response.write(chunk));
|
|
request.on('end', () => response.end());
|
|
});
|
|
const requestData = randomString(kOneKiloByte);
|
|
const [authDetails, responseBody, statusCode] = await remotely(async (serverUrl: string, requestData: string, fixture: string) => {
|
|
const { app, utilityProcess } = require('electron');
|
|
const { once } = require('node:events');
|
|
const child = utilityProcess.fork(fixture, [`--server-url=${serverUrl}`, '--request-data'], {
|
|
stdio: 'ignore',
|
|
respondToAuthRequestsFromMainProcess: true
|
|
});
|
|
await once(child, 'spawn');
|
|
await once(child, 'message');
|
|
child.postMessage(requestData);
|
|
const [,, details,, cb] = await once(app, 'login');
|
|
cb('user', 'pass');
|
|
const [response] = await once(child, 'message');
|
|
const [responseBody] = await once(child, 'message');
|
|
return [details, responseBody, ...response];
|
|
}, serverUrl, requestData, path.join(fixturesPath, 'net.js'));
|
|
expect(authDetails.url).to.equal(serverUrl);
|
|
expect(statusCode).to.equal(200);
|
|
expect(responseBody).to.equal(requestData);
|
|
});
|
|
|
|
it('should not emit the app#login event when 401 with {"credentials":"omit"}', async () => {
|
|
const rc = await startRemoteControlApp();
|
|
const serverUrl = await respondOnce.toSingleURL((request, response) => {
|
|
if (!request.headers.authorization) {
|
|
return response.writeHead(401, { 'WWW-Authenticate': 'Basic realm="Foo"' }).end();
|
|
}
|
|
response.writeHead(200).end('ok');
|
|
});
|
|
const [statusCode, responseHeaders] = await rc.remotely(async (serverUrl: string, fixture: string) => {
|
|
const { app, utilityProcess } = require('electron');
|
|
const { once } = require('node:events');
|
|
let gracefulExit = true;
|
|
const child = utilityProcess.fork(fixture, [`--server-url=${serverUrl}`, '--omit-credentials'], {
|
|
stdio: 'ignore',
|
|
respondToAuthRequestsFromMainProcess: true
|
|
});
|
|
await once(child, 'spawn');
|
|
app.on('login', () => {
|
|
gracefulExit = false;
|
|
});
|
|
const [result] = await once(child, 'message');
|
|
setTimeout(() => {
|
|
if (gracefulExit) {
|
|
app.quit();
|
|
} else {
|
|
process.exit(1);
|
|
}
|
|
});
|
|
return result;
|
|
}, serverUrl, path.join(fixturesPath, 'net.js'));
|
|
const [code] = await once(rc.process, 'exit');
|
|
expect(code).to.equal(0);
|
|
expect(statusCode).to.equal(401);
|
|
expect(responseHeaders['www-authenticate']).to.equal('Basic realm="Foo"');
|
|
});
|
|
|
|
it('should not emit the app#login event with default respondToAuthRequestsFromMainProcess', async () => {
|
|
const rc = await startRemoteControlApp();
|
|
const serverUrl = await respondOnce.toSingleURL((request, response) => {
|
|
if (!request.headers.authorization) {
|
|
return response.writeHead(401, { 'WWW-Authenticate': 'Basic realm="Foo"' }).end();
|
|
}
|
|
response.writeHead(200).end('ok');
|
|
});
|
|
const [loginAuthInfo, statusCode] = await rc.remotely(async (serverUrl: string, fixture: string) => {
|
|
const { app, utilityProcess } = require('electron');
|
|
const { once } = require('node:events');
|
|
let gracefulExit = true;
|
|
const child = utilityProcess.fork(fixture, [`--server-url=${serverUrl}`, '--use-net-login-event'], {
|
|
stdio: 'ignore'
|
|
});
|
|
await once(child, 'spawn');
|
|
app.on('login', () => {
|
|
gracefulExit = false;
|
|
});
|
|
const [authInfo] = await once(child, 'message');
|
|
const [result] = await once(child, 'message');
|
|
setTimeout(() => {
|
|
if (gracefulExit) {
|
|
app.quit();
|
|
} else {
|
|
process.exit(1);
|
|
}
|
|
});
|
|
return [authInfo, ...result];
|
|
}, serverUrl, path.join(fixturesPath, 'net.js'));
|
|
const [code] = await once(rc.process, 'exit');
|
|
expect(code).to.equal(0);
|
|
expect(statusCode).to.equal(200);
|
|
expect(loginAuthInfo!.realm).to.equal('Foo');
|
|
expect(loginAuthInfo!.scheme).to.equal('basic');
|
|
});
|
|
|
|
it('should emit the app#login event when creating requests with fetch API', async () => {
|
|
const { remotely } = await startRemoteControlApp();
|
|
const serverUrl = await respondOnce.toSingleURL((request, response) => {
|
|
if (!request.headers.authorization) {
|
|
return response.writeHead(401, { 'WWW-Authenticate': 'Basic realm="Foo"' }).end();
|
|
}
|
|
response.writeHead(200).end('ok');
|
|
});
|
|
const [loginAuthInfo, statusCode] = await remotely(async (serverUrl: string, fixture: string) => {
|
|
const { app, utilityProcess } = require('electron');
|
|
const { once } = require('node:events');
|
|
const child = utilityProcess.fork(fixture, [`--server-url=${serverUrl}`, '--use-fetch-api'], {
|
|
stdio: 'ignore',
|
|
respondToAuthRequestsFromMainProcess: true
|
|
});
|
|
await once(child, 'spawn');
|
|
const [ev,,, authInfo, cb] = await once(app, 'login');
|
|
ev.preventDefault();
|
|
cb('dummy', 'pass');
|
|
const [response] = await once(child, 'message');
|
|
return [authInfo, ...response];
|
|
}, serverUrl, path.join(fixturesPath, 'net.js'));
|
|
expect(statusCode).to.equal(200);
|
|
expect(loginAuthInfo!.realm).to.equal('Foo');
|
|
expect(loginAuthInfo!.scheme).to.equal('basic');
|
|
});
|
|
});
|
|
});
|