123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423 |
- const ChildProcess = require('child_process')
- const { expect } = require('chai')
- const fs = require('fs')
- const path = require('path')
- const os = require('os')
- const { ipcRenderer } = require('electron')
- const features = process.electronBinding('features')
- const { emittedOnce } = require('./events-helpers')
- const { ifit } = require('./spec-helpers')
- describe('node feature', () => {
- const fixtures = path.join(__dirname, 'fixtures')
- describe('child_process', () => {
- beforeEach(function () {
- if (!features.isRunAsNodeEnabled()) {
- this.skip()
- }
- })
- describe('child_process.fork', () => {
- it('works in current process', (done) => {
- const child = ChildProcess.fork(path.join(fixtures, 'module', 'ping.js'))
- child.on('message', msg => {
- expect(msg).to.equal('message')
- done()
- })
- child.send('message')
- })
- it('preserves args', (done) => {
- const args = ['--expose_gc', '-test', '1']
- const child = ChildProcess.fork(path.join(fixtures, 'module', 'process_args.js'), args)
- child.on('message', (msg) => {
- expect(args).to.deep.equal(msg.slice(2))
- done()
- })
- child.send('message')
- })
- it('works in forked process', (done) => {
- const child = ChildProcess.fork(path.join(fixtures, 'module', 'fork_ping.js'))
- child.on('message', (msg) => {
- expect(msg).to.equal('message')
- done()
- })
- child.send('message')
- })
- it('works in forked process when options.env is specifed', (done) => {
- const child = ChildProcess.fork(path.join(fixtures, 'module', 'fork_ping.js'), [], {
- path: process.env['PATH']
- })
- child.on('message', (msg) => {
- expect(msg).to.equal('message')
- done()
- })
- child.send('message')
- })
- it('has String::localeCompare working in script', (done) => {
- const child = ChildProcess.fork(path.join(fixtures, 'module', 'locale-compare.js'))
- child.on('message', (msg) => {
- expect(msg).to.deep.equal([0, -1, 1])
- done()
- })
- child.send('message')
- })
- it('has setImmediate working in script', (done) => {
- const child = ChildProcess.fork(path.join(fixtures, 'module', 'set-immediate.js'))
- child.on('message', (msg) => {
- expect(msg).to.equal('ok')
- done()
- })
- child.send('message')
- })
- it('pipes stdio', (done) => {
- const child = ChildProcess.fork(path.join(fixtures, 'module', 'process-stdout.js'), { silent: true })
- let data = ''
- child.stdout.on('data', (chunk) => {
- data += String(chunk)
- })
- child.on('close', (code) => {
- expect(code).to.equal(0)
- expect(data).to.equal('pipes stdio')
- done()
- })
- })
- it('works when sending a message to a process forked with the --eval argument', (done) => {
- const source = "process.on('message', (message) => { process.send(message) })"
- const forked = ChildProcess.fork('--eval', [source])
- forked.once('message', (message) => {
- expect(message).to.equal('hello')
- done()
- })
- forked.send('hello')
- })
- it('has the electron version in process.versions', (done) => {
- const source = 'process.send(process.versions)'
- const forked = ChildProcess.fork('--eval', [source])
- forked.on('message', (message) => {
- expect(message)
- .to.have.own.property('electron')
- .that.is.a('string')
- .and.matches(/^\d+\.\d+\.\d+(\S*)?$/)
- done()
- })
- })
- })
- describe('child_process.spawn', () => {
- let child
- afterEach(() => {
- if (child != null) child.kill()
- })
- it('supports spawning Electron as a node process via the ELECTRON_RUN_AS_NODE env var', (done) => {
- child = ChildProcess.spawn(process.execPath, [path.join(__dirname, 'fixtures', 'module', 'run-as-node.js')], {
- env: {
- ELECTRON_RUN_AS_NODE: true
- }
- })
- let output = ''
- child.stdout.on('data', data => {
- output += data
- })
- child.stdout.on('close', () => {
- expect(JSON.parse(output)).to.deep.equal({
- processLog: process.platform === 'win32' ? 'function' : 'undefined',
- processType: 'undefined',
- window: 'undefined'
- })
- done()
- })
- })
- })
- describe('child_process.exec', () => {
- (process.platform === 'linux' ? it : it.skip)('allows executing a setuid binary from non-sandboxed renderer', () => {
- // Chrome uses prctl(2) to set the NO_NEW_PRIVILEGES flag on Linux (see
- // https://github.com/torvalds/linux/blob/40fde647cc/Documentation/userspace-api/no_new_privs.rst).
- // We disable this for unsandboxed processes, which the remote tests
- // are running in. If this test fails with an error like 'effective uid
- // is not 0', then it's likely that our patch to prevent the flag from
- // being set has become ineffective.
- const stdout = ChildProcess.execSync('sudo --help')
- expect(stdout).to.not.be.empty()
- })
- })
- })
- describe('contexts', () => {
- describe('setTimeout in fs callback', () => {
- it('does not crash', (done) => {
- fs.readFile(__filename, () => {
- setTimeout(done, 0)
- })
- })
- })
- describe('error thrown in renderer process node context', () => {
- it('gets emitted as a process uncaughtException event', (done) => {
- const error = new Error('boo!')
- const listeners = process.listeners('uncaughtException')
- process.removeAllListeners('uncaughtException')
- process.on('uncaughtException', (thrown) => {
- try {
- expect(thrown).to.equal(error)
- done()
- } catch (e) {
- done(e)
- } finally {
- process.removeAllListeners('uncaughtException')
- listeners.forEach((listener) => process.on('uncaughtException', listener))
- }
- })
- fs.readFile(__filename, () => {
- throw error
- })
- })
- })
- describe('error thrown in main process node context', () => {
- it('gets emitted as a process uncaughtException event', () => {
- const error = ipcRenderer.sendSync('handle-uncaught-exception', 'hello')
- expect(error).to.equal('hello')
- })
- })
- describe('promise rejection in main process node context', () => {
- it('gets emitted as a process unhandledRejection event', () => {
- const error = ipcRenderer.sendSync('handle-unhandled-rejection', 'hello')
- expect(error).to.equal('hello')
- })
- })
- describe('setTimeout called under blink env in renderer process', () => {
- it('can be scheduled in time', (done) => {
- setTimeout(done, 10)
- })
- it('works from the timers module', (done) => {
- require('timers').setTimeout(done, 10)
- })
- })
- describe('setInterval called under blink env in renderer process', () => {
- it('can be scheduled in time', (done) => {
- const id = setInterval(() => {
- clearInterval(id)
- done()
- }, 10)
- })
- it('can be scheduled in time from timers module', (done) => {
- const { setInterval, clearInterval } = require('timers')
- const id = setInterval(() => {
- clearInterval(id)
- done()
- }, 10)
- })
- })
- })
- describe('message loop', () => {
- describe('process.nextTick', () => {
- it('emits the callback', (done) => process.nextTick(done))
- it('works in nested calls', (done) => {
- process.nextTick(() => {
- process.nextTick(() => process.nextTick(done))
- })
- })
- })
- describe('setImmediate', () => {
- it('emits the callback', (done) => setImmediate(done))
- it('works in nested calls', (done) => {
- setImmediate(() => {
- setImmediate(() => setImmediate(done))
- })
- })
- })
- })
- describe('net.connect', () => {
- before(function () {
- if (!features.isRunAsNodeEnabled() || process.platform !== 'darwin') {
- this.skip()
- }
- })
- it('emit error when connect to a socket path without listeners', (done) => {
- const socketPath = path.join(os.tmpdir(), 'atom-shell-test.sock')
- const script = path.join(fixtures, 'module', 'create_socket.js')
- const child = ChildProcess.fork(script, [socketPath])
- child.on('exit', (code) => {
- expect(code).to.equal(0)
- const client = require('net').connect(socketPath)
- client.on('error', (error) => {
- expect(error.code).to.equal('ECONNREFUSED')
- done()
- })
- })
- })
- })
- describe('Buffer', () => {
- it('can be created from WebKit external string', () => {
- const p = document.createElement('p')
- p.innerText = '闲云潭影日悠悠,物换星移几度秋'
- const b = Buffer.from(p.innerText)
- expect(b.toString()).to.equal('闲云潭影日悠悠,物换星移几度秋')
- expect(Buffer.byteLength(p.innerText)).to.equal(45)
- })
- it('correctly parses external one-byte UTF8 string', () => {
- const p = document.createElement('p')
- p.innerText = 'Jøhänñéß'
- const b = Buffer.from(p.innerText)
- expect(b.toString()).to.equal('Jøhänñéß')
- expect(Buffer.byteLength(p.innerText)).to.equal(13)
- })
- it('does not crash when creating large Buffers', () => {
- let buffer = Buffer.from(new Array(4096).join(' '))
- expect(buffer.length).to.equal(4095)
- buffer = Buffer.from(new Array(4097).join(' '))
- expect(buffer.length).to.equal(4096)
- })
- it('does not crash for crypto operations', () => {
- const crypto = require('crypto')
- const data = 'lG9E+/g4JmRmedDAnihtBD4Dfaha/GFOjd+xUOQI05UtfVX3DjUXvrS98p7kZQwY3LNhdiFo7MY5rGft8yBuDhKuNNag9vRx/44IuClDhdQ='
- const key = 'q90K9yBqhWZnAMCMTOJfPQ=='
- const cipherText = '{"error_code":114,"error_message":"Tham số không hợp lệ","data":null}'
- for (let i = 0; i < 10000; ++i) {
- const iv = Buffer.from('0'.repeat(32), 'hex')
- const input = Buffer.from(data, 'base64')
- const decipher = crypto.createDecipheriv('aes-128-cbc', Buffer.from(key, 'base64'), iv)
- const result = Buffer.concat([decipher.update(input), decipher.final()]).toString('utf8')
- expect(cipherText).to.equal(result)
- }
- })
- })
- describe('process.stdout', () => {
- it('does not throw an exception when accessed', () => {
- expect(() => process.stdout).to.not.throw()
- })
- it('does not throw an exception when calling write()', () => {
- expect(() => {
- process.stdout.write('test')
- }).to.not.throw()
- })
- // TODO: figure out why process.stdout.isTTY is true on Darwin but not Linux/Win.
- ifit(process.platform !== 'darwin')('isTTY should be undefined in the renderer process', function () {
- expect(process.stdout.isTTY).to.be.undefined()
- })
- })
- describe('process.stdin', () => {
- it('does not throw an exception when accessed', () => {
- expect(() => process.stdin).to.not.throw()
- })
- it('returns null when read from', () => {
- expect(process.stdin.read()).to.be.null()
- })
- })
- describe('process.version', () => {
- it('should not have -pre', () => {
- expect(process.version.endsWith('-pre')).to.be.false()
- })
- })
- describe('vm.runInNewContext', () => {
- it('should not crash', () => {
- require('vm').runInNewContext('')
- })
- })
- describe('crypto', () => {
- it('should list the ripemd160 hash in getHashes', () => {
- expect(require('crypto').getHashes()).to.include('ripemd160')
- })
- it('should be able to create a ripemd160 hash and use it', () => {
- const hash = require('crypto').createHash('ripemd160')
- hash.update('electron-ripemd160')
- expect(hash.digest('hex')).to.equal('fa7fec13c624009ab126ebb99eda6525583395fe')
- })
- it('should list aes-{128,256}-cfb in getCiphers', () => {
- expect(require('crypto').getCiphers()).to.include.members(['aes-128-cfb', 'aes-256-cfb'])
- })
- it('should be able to create an aes-128-cfb cipher', () => {
- require('crypto').createCipheriv('aes-128-cfb', '0123456789abcdef', '0123456789abcdef')
- })
- it('should be able to create an aes-256-cfb cipher', () => {
- require('crypto').createCipheriv('aes-256-cfb', '0123456789abcdef0123456789abcdef', '0123456789abcdef')
- })
- it('should list des-ede-cbc in getCiphers', () => {
- expect(require('crypto').getCiphers()).to.include('des-ede-cbc')
- })
- it('should be able to create an des-ede-cbc cipher', () => {
- const key = Buffer.from('0123456789abcdeff1e0d3c2b5a49786', 'hex')
- const iv = Buffer.from('fedcba9876543210', 'hex')
- require('crypto').createCipheriv('des-ede-cbc', key, iv)
- })
- it('should not crash when getting an ECDH key', () => {
- const ecdh = require('crypto').createECDH('prime256v1')
- expect(ecdh.generateKeys()).to.be.an.instanceof(Buffer)
- expect(ecdh.getPrivateKey()).to.be.an.instanceof(Buffer)
- })
- it('should not crash when generating DH keys or fetching DH fields', () => {
- const dh = require('crypto').createDiffieHellman('modp15')
- expect(dh.generateKeys()).to.be.an.instanceof(Buffer)
- expect(dh.getPublicKey()).to.be.an.instanceof(Buffer)
- expect(dh.getPrivateKey()).to.be.an.instanceof(Buffer)
- expect(dh.getPrime()).to.be.an.instanceof(Buffer)
- expect(dh.getGenerator()).to.be.an.instanceof(Buffer)
- })
- it('should not crash when creating an ECDH cipher', () => {
- const crypto = require('crypto')
- const dh = crypto.createECDH('prime256v1')
- dh.generateKeys()
- dh.setPrivateKey(dh.getPrivateKey())
- })
- })
- it('includes the electron version in process.versions', () => {
- expect(process.versions)
- .to.have.own.property('electron')
- .that.is.a('string')
- .and.matches(/^\d+\.\d+\.\d+(\S*)?$/)
- })
- it('includes the chrome version in process.versions', () => {
- expect(process.versions)
- .to.have.own.property('chrome')
- .that.is.a('string')
- .and.matches(/^\d+\.\d+\.\d+\.\d+$/)
- })
- })
|