123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313 |
- // Copyright (c) 2015 GitHub, Inc.
- // Use of this source code is governed by the MIT license that can be
- // found in the LICENSE file.
- #include "shell/app/node_main.h"
- #include <map>
- #include <memory>
- #include <string>
- #include <string_view>
- #include <utility>
- #include <vector>
- #include "base/base_switches.h"
- #include "base/command_line.h"
- #include "base/containers/fixed_flat_set.h"
- #include "base/environment.h"
- #include "base/feature_list.h"
- #include "base/task/single_thread_task_runner.h"
- #include "base/task/thread_pool/thread_pool_instance.h"
- #include "content/public/common/content_switches.h"
- #include "electron/fuses.h"
- #include "electron/mas.h"
- #include "gin/array_buffer.h"
- #include "gin/public/isolate_holder.h"
- #include "gin/v8_initializer.h"
- #include "shell/app/uv_task_runner.h"
- #include "shell/browser/javascript_environment.h"
- #include "shell/common/api/electron_bindings.h"
- #include "shell/common/gin_helper/dictionary.h"
- #include "shell/common/node_bindings.h"
- #include "shell/common/node_includes.h"
- #include "shell/common/node_util.h"
- #if BUILDFLAG(IS_WIN)
- #include "chrome/child/v8_crashpad_support_win.h"
- #endif
- #if BUILDFLAG(IS_LINUX)
- #include "base/posix/global_descriptors.h"
- #include "base/strings/string_number_conversions.h"
- #include "components/crash/core/app/crash_switches.h" // nogncheck
- #include "content/public/common/content_descriptors.h"
- #endif
- #if BUILDFLAG(IS_MAC)
- #include "shell/common/mac/codesign_util.h"
- #endif
- #if !IS_MAS_BUILD()
- #include "components/crash/core/app/crashpad.h" // nogncheck
- #include "shell/app/electron_crash_reporter_client.h"
- #include "shell/common/crash_keys.h"
- #endif
- namespace {
- // Preparse Node.js cli options to pass to Node.js
- // See https://nodejs.org/api/cli.html#cli_options
- void ExitIfContainsDisallowedFlags(const std::vector<std::string>& argv) {
- // Options that are unilaterally disallowed.
- static constexpr auto disallowed = base::MakeFixedFlatSet<std::string_view>({
- "--enable-fips",
- "--force-fips",
- "--openssl-config",
- "--use-bundled-ca",
- "--use-openssl-ca",
- });
- for (const auto& arg : argv) {
- const auto key = std::string_view{arg}.substr(0, arg.find('='));
- if (disallowed.contains(key)) {
- LOG(ERROR) << "The Node.js cli flag " << key
- << " is not supported in Electron";
- // Node.js returns 9 from ProcessGlobalArgs for any errors encountered
- // when setting up cli flags and env vars. Since we're outlawing these
- // flags (making them errors) exit with the same error code for
- // consistency.
- exit(9);
- }
- }
- }
- #if BUILDFLAG(IS_MAC)
- // A list of node envs that may be used to inject scripts.
- const char* kHijackableEnvs[] = {"NODE_OPTIONS", "NODE_REPL_EXTERNAL_MODULE"};
- // Return true if there is any env in kHijackableEnvs.
- bool UnsetHijackableEnvs(base::Environment* env) {
- bool has = false;
- for (const char* name : kHijackableEnvs) {
- if (env->HasVar(name)) {
- env->UnSetVar(name);
- has = true;
- }
- }
- return has;
- }
- #endif
- #if IS_MAS_BUILD()
- void SetCrashKeyStub(const std::string& key, const std::string& value) {}
- void ClearCrashKeyStub(const std::string& key) {}
- #endif
- v8::Local<v8::Value> GetParameters(v8::Isolate* isolate) {
- std::map<std::string, std::string> keys;
- #if !IS_MAS_BUILD()
- electron::crash_keys::GetCrashKeys(&keys);
- #endif
- return gin::ConvertToV8(isolate, keys);
- }
- } // namespace
- namespace electron {
- int NodeMain(int argc, char* argv[]) {
- bool initialized = base::CommandLine::Init(argc, argv);
- if (!initialized) {
- LOG(ERROR) << "Failed to initialize CommandLine";
- exit(1);
- }
- auto os_env = base::Environment::Create();
- bool node_options_enabled = electron::fuses::IsNodeOptionsEnabled();
- if (!node_options_enabled) {
- os_env->UnSetVar("NODE_OPTIONS");
- os_env->UnSetVar("NODE_EXTRA_CA_CERTS");
- }
- #if BUILDFLAG(IS_MAC)
- if (!ProcessSignatureIsSameWithCurrentApp(getppid())) {
- // On macOS, it is forbidden to run sandboxed app with custom arguments
- // from another app, i.e. args are discarded in following call:
- // exec("Sandboxed.app", ["--custom-args-will-be-discarded"])
- // However it is possible to bypass the restriction by abusing the node mode
- // of Electron apps:
- // exec("Electron.app", {env: {ELECTRON_RUN_AS_NODE: "1",
- // NODE_OPTIONS: "--require 'bad.js'"}})
- // To prevent Electron apps from being used to work around macOS security
- // restrictions, when the parent process is not part of the app bundle, all
- // environment variables that may be used to inject scripts are removed.
- if (UnsetHijackableEnvs(os_env.get())) {
- LOG(ERROR) << "Node.js environment variables are disabled because this "
- "process is invoked by other apps.";
- }
- }
- #endif // BUILDFLAG(IS_MAC)
- #if BUILDFLAG(IS_WIN)
- v8_crashpad_support::SetUp();
- #endif
- #if BUILDFLAG(IS_LINUX)
- std::string fd_string, pid_string;
- if (os_env->GetVar("CRASHDUMP_SIGNAL_FD", &fd_string) &&
- os_env->GetVar("CRASHPAD_HANDLER_PID", &pid_string)) {
- int fd = -1, pid = -1;
- DCHECK(base::StringToInt(fd_string, &fd));
- DCHECK(base::StringToInt(pid_string, &pid));
- base::GlobalDescriptors::GetInstance()->Set(kCrashDumpSignal, fd);
- // Following API is unsafe in multi-threaded scenario, but at this point
- // we are still single threaded.
- os_env->UnSetVar("CRASHDUMP_SIGNAL_FD");
- os_env->UnSetVar("CRASHPAD_HANDLER_PID");
- }
- #endif
- int exit_code = 1;
- {
- // Feed gin::PerIsolateData with a task runner.
- uv_loop_t* loop = uv_default_loop();
- auto uv_task_runner = base::MakeRefCounted<UvTaskRunner>(loop);
- base::SingleThreadTaskRunner::CurrentDefaultHandle handle(uv_task_runner);
- // Initialize feature list.
- auto feature_list = std::make_unique<base::FeatureList>();
- feature_list->InitFromCommandLine("", "");
- base::FeatureList::SetInstance(std::move(feature_list));
- // Explicitly register electron's builtin bindings.
- NodeBindings::RegisterBuiltinBindings();
- // Hack around with the argv pointer. Used for process.title = "blah".
- argv = uv_setup_args(argc, argv);
- // Parse Node.js cli flags and strip out disallowed options.
- std::vector<std::string> args(argv, argv + argc);
- ExitIfContainsDisallowedFlags(args);
- std::unique_ptr<node::InitializationResult> result =
- node::InitializeOncePerProcess(
- args,
- {node::ProcessInitializationFlags::kNoInitializeV8,
- node::ProcessInitializationFlags::kNoInitializeNodeV8Platform});
- for (const std::string& error : result->errors())
- fprintf(stderr, "%s: %s\n", args[0].c_str(), error.c_str());
- if (result->early_return() != 0) {
- return result->exit_code();
- }
- #if BUILDFLAG(IS_LINUX)
- // On Linux, initialize crashpad after Nodejs init phase so that
- // crash and termination signal handlers can be set by the crashpad client.
- if (!pid_string.empty()) {
- auto* command_line = base::CommandLine::ForCurrentProcess();
- command_line->AppendSwitchASCII(
- crash_reporter::switches::kCrashpadHandlerPid, pid_string);
- ElectronCrashReporterClient::Create();
- crash_reporter::InitializeCrashpad(false, "node");
- crash_keys::SetCrashKeysFromCommandLine(
- *base::CommandLine::ForCurrentProcess());
- crash_keys::SetPlatformCrashKey();
- // Ensure the flags and env variable does not propagate to userland.
- command_line->RemoveSwitch(crash_reporter::switches::kCrashpadHandlerPid);
- }
- #elif BUILDFLAG(IS_WIN) || (BUILDFLAG(IS_MAC) && !IS_MAS_BUILD())
- ElectronCrashReporterClient::Create();
- crash_reporter::InitializeCrashpad(false, "node");
- crash_keys::SetCrashKeysFromCommandLine(
- *base::CommandLine::ForCurrentProcess());
- crash_keys::SetPlatformCrashKey();
- #endif
- gin::V8Initializer::LoadV8Snapshot(
- gin::V8SnapshotFileType::kWithAdditionalContext);
- // V8 requires a task scheduler.
- base::ThreadPoolInstance::CreateAndStartWithDefaultParams("Electron");
- // Allow Node.js to track the amount of time the event loop has spent
- // idle in the kernel’s event provider .
- uv_loop_configure(loop, UV_METRICS_IDLE_TIME);
- // Initialize gin::IsolateHolder.
- bool setup_wasm_streaming =
- node::per_process::cli_options->get_per_isolate_options()
- ->get_per_env_options()
- ->experimental_fetch;
- JavascriptEnvironment gin_env(loop, setup_wasm_streaming);
- v8::Isolate* isolate = gin_env.isolate();
- v8::Isolate::Scope isolate_scope(isolate);
- v8::Locker locker(isolate);
- node::Environment* env = nullptr;
- node::IsolateData* isolate_data = nullptr;
- {
- v8::HandleScope scope(isolate);
- isolate_data = node::CreateIsolateData(isolate, loop, gin_env.platform());
- CHECK_NE(nullptr, isolate_data);
- uint64_t env_flags = node::EnvironmentFlags::kDefaultFlags |
- node::EnvironmentFlags::kHideConsoleWindows;
- env = node::CreateEnvironment(
- isolate_data, isolate->GetCurrentContext(), result->args(),
- result->exec_args(),
- static_cast<node::EnvironmentFlags::Flags>(env_flags));
- CHECK_NE(nullptr, env);
- node::SetIsolateUpForNode(isolate);
- gin_helper::Dictionary process(isolate, env->process_object());
- process.SetMethod("crash", &ElectronBindings::Crash);
- // Setup process.crashReporter in child node processes
- auto reporter = gin_helper::Dictionary::CreateEmpty(isolate);
- reporter.SetMethod("getParameters", &GetParameters);
- #if IS_MAS_BUILD()
- reporter.SetMethod("addExtraParameter", &SetCrashKeyStub);
- reporter.SetMethod("removeExtraParameter", &ClearCrashKeyStub);
- #else
- reporter.SetMethod("addExtraParameter",
- &electron::crash_keys::SetCrashKey);
- reporter.SetMethod("removeExtraParameter",
- &electron::crash_keys::ClearCrashKey);
- #endif
- process.Set("crashReporter", reporter);
- }
- v8::HandleScope scope(isolate);
- node::LoadEnvironment(env, node::StartExecutionCallback{}, &OnNodePreload);
- // Potential reasons we get Nothing here may include: the env
- // is stopping, or the user hooks process.emit('exit').
- exit_code = node::SpinEventLoop(env).FromMaybe(1);
- node::ResetStdio();
- node::Stop(env, node::StopFlags::kDoNotTerminateIsolate);
- node::FreeEnvironment(env);
- node::FreeIsolateData(isolate_data);
- }
- // According to "src/gin/shell/gin_main.cc":
- //
- // gin::IsolateHolder waits for tasks running in ThreadPool in its
- // destructor and thus must be destroyed before ThreadPool starts skipping
- // CONTINUE_ON_SHUTDOWN tasks.
- base::ThreadPoolInstance::Get()->Shutdown();
- v8::V8::Dispose();
- return exit_code;
- }
- } // namespace electron
|