2019-09-20 17:41:40 +03:00
|
|
|
import { expect } from 'chai';
|
|
|
|
import * as childProcess from 'child_process';
|
2021-06-07 22:19:39 +03:00
|
|
|
import * as fs from 'fs';
|
2019-09-20 17:41:40 +03:00
|
|
|
import * as path from 'path';
|
|
|
|
import * as util from 'util';
|
2023-01-26 00:01:25 +03:00
|
|
|
import { emittedOnce } from './lib/events-helpers';
|
|
|
|
import { getRemoteContext, ifdescribe, ifit, itremote, useRemoteContext } from './lib/spec-helpers';
|
2023-02-16 17:41:41 +03:00
|
|
|
import { webContents } from 'electron/main';
|
2022-08-05 03:20:17 +03:00
|
|
|
import { EventEmitter } from 'stream';
|
2019-09-20 17:41:40 +03:00
|
|
|
|
2020-06-23 06:32:45 +03:00
|
|
|
const features = process._linkedBinding('electron_common_features');
|
2021-03-22 23:11:03 +03:00
|
|
|
const mainFixturesPath = path.resolve(__dirname, 'fixtures');
|
2019-09-20 17:41:40 +03:00
|
|
|
|
|
|
|
describe('node feature', () => {
|
2022-08-16 22:23:13 +03:00
|
|
|
const fixtures = path.join(__dirname, 'fixtures');
|
2022-08-05 03:20:17 +03:00
|
|
|
|
2019-09-20 17:41:40 +03:00
|
|
|
describe('child_process', () => {
|
|
|
|
describe('child_process.fork', () => {
|
2020-07-01 01:10:36 +03:00
|
|
|
it('Works in browser process', async () => {
|
2019-09-20 17:41:40 +03:00
|
|
|
const child = childProcess.fork(path.join(fixtures, 'module', 'ping.js'));
|
2020-07-01 01:10:36 +03:00
|
|
|
const message = emittedOnce(child, 'message');
|
2019-09-20 17:41:40 +03:00
|
|
|
child.send('message');
|
2020-07-01 01:10:36 +03:00
|
|
|
const [msg] = await message;
|
|
|
|
expect(msg).to.equal('message');
|
2019-09-20 17:41:40 +03:00
|
|
|
});
|
|
|
|
});
|
|
|
|
});
|
|
|
|
|
2022-08-05 03:20:17 +03:00
|
|
|
ifdescribe(features.isRunAsNodeEnabled())('child_process in renderer', () => {
|
|
|
|
useRemoteContext();
|
|
|
|
|
|
|
|
describe('child_process.fork', () => {
|
|
|
|
itremote('works in current process', async (fixtures: string) => {
|
|
|
|
const child = require('child_process').fork(require('path').join(fixtures, 'module', 'ping.js'));
|
|
|
|
const message = new Promise<any>(resolve => child.once('message', resolve));
|
|
|
|
child.send('message');
|
|
|
|
const msg = await message;
|
|
|
|
expect(msg).to.equal('message');
|
|
|
|
}, [fixtures]);
|
|
|
|
|
|
|
|
itremote('preserves args', async (fixtures: string) => {
|
|
|
|
const args = ['--expose_gc', '-test', '1'];
|
|
|
|
const child = require('child_process').fork(require('path').join(fixtures, 'module', 'process_args.js'), args);
|
|
|
|
const message = new Promise<any>(resolve => child.once('message', resolve));
|
|
|
|
child.send('message');
|
|
|
|
const msg = await message;
|
|
|
|
expect(args).to.deep.equal(msg.slice(2));
|
|
|
|
}, [fixtures]);
|
|
|
|
|
|
|
|
itremote('works in forked process', async (fixtures: string) => {
|
|
|
|
const child = require('child_process').fork(require('path').join(fixtures, 'module', 'fork_ping.js'));
|
|
|
|
const message = new Promise<any>(resolve => child.once('message', resolve));
|
|
|
|
child.send('message');
|
|
|
|
const msg = await message;
|
|
|
|
expect(msg).to.equal('message');
|
|
|
|
}, [fixtures]);
|
|
|
|
|
|
|
|
itremote('works in forked process when options.env is specified', async (fixtures: string) => {
|
|
|
|
const child = require('child_process').fork(require('path').join(fixtures, 'module', 'fork_ping.js'), [], {
|
|
|
|
path: process.env.PATH
|
|
|
|
});
|
|
|
|
const message = new Promise<any>(resolve => child.once('message', resolve));
|
|
|
|
child.send('message');
|
|
|
|
const msg = await message;
|
|
|
|
expect(msg).to.equal('message');
|
|
|
|
}, [fixtures]);
|
|
|
|
|
|
|
|
itremote('has String::localeCompare working in script', async (fixtures: string) => {
|
|
|
|
const child = require('child_process').fork(require('path').join(fixtures, 'module', 'locale-compare.js'));
|
|
|
|
const message = new Promise<any>(resolve => child.once('message', resolve));
|
|
|
|
child.send('message');
|
|
|
|
const msg = await message;
|
|
|
|
expect(msg).to.deep.equal([0, -1, 1]);
|
|
|
|
}, [fixtures]);
|
|
|
|
|
|
|
|
itremote('has setImmediate working in script', async (fixtures: string) => {
|
|
|
|
const child = require('child_process').fork(require('path').join(fixtures, 'module', 'set-immediate.js'));
|
|
|
|
const message = new Promise<any>(resolve => child.once('message', resolve));
|
|
|
|
child.send('message');
|
|
|
|
const msg = await message;
|
|
|
|
expect(msg).to.equal('ok');
|
|
|
|
}, [fixtures]);
|
|
|
|
|
|
|
|
itremote('pipes stdio', async (fixtures: string) => {
|
|
|
|
const child = require('child_process').fork(require('path').join(fixtures, 'module', 'process-stdout.js'), { silent: true });
|
|
|
|
let data = '';
|
|
|
|
child.stdout.on('data', (chunk: any) => {
|
|
|
|
data += String(chunk);
|
|
|
|
});
|
|
|
|
const code = await new Promise<any>(resolve => child.once('close', resolve));
|
|
|
|
expect(code).to.equal(0);
|
|
|
|
expect(data).to.equal('pipes stdio');
|
|
|
|
}, [fixtures]);
|
|
|
|
|
|
|
|
itremote('works when sending a message to a process forked with the --eval argument', async () => {
|
|
|
|
const source = "process.on('message', (message) => { process.send(message) })";
|
|
|
|
const forked = require('child_process').fork('--eval', [source]);
|
|
|
|
const message = new Promise(resolve => forked.once('message', resolve));
|
|
|
|
forked.send('hello');
|
|
|
|
const msg = await message;
|
|
|
|
expect(msg).to.equal('hello');
|
|
|
|
});
|
|
|
|
|
|
|
|
it('has the electron version in process.versions', async () => {
|
|
|
|
const source = 'process.send(process.versions)';
|
|
|
|
const forked = require('child_process').fork('--eval', [source]);
|
2023-02-17 21:32:39 +03:00
|
|
|
const [message] = await emittedOnce(forked, 'message');
|
2022-08-05 03:20:17 +03:00
|
|
|
expect(message)
|
|
|
|
.to.have.own.property('electron')
|
|
|
|
.that.is.a('string')
|
|
|
|
.and.matches(/^\d+\.\d+\.\d+(\S*)?$/);
|
|
|
|
});
|
|
|
|
});
|
|
|
|
|
|
|
|
describe('child_process.spawn', () => {
|
|
|
|
itremote('supports spawning Electron as a node process via the ELECTRON_RUN_AS_NODE env var', async (fixtures: string) => {
|
|
|
|
const child = require('child_process').spawn(process.execPath, [require('path').join(fixtures, 'module', 'run-as-node.js')], {
|
|
|
|
env: {
|
|
|
|
ELECTRON_RUN_AS_NODE: true
|
|
|
|
}
|
|
|
|
});
|
|
|
|
|
|
|
|
let output = '';
|
|
|
|
child.stdout.on('data', (data: any) => {
|
|
|
|
output += data;
|
|
|
|
});
|
|
|
|
try {
|
|
|
|
await new Promise(resolve => child.stdout.once('close', resolve));
|
|
|
|
expect(JSON.parse(output)).to.deep.equal({
|
|
|
|
stdoutType: 'pipe',
|
|
|
|
processType: 'undefined',
|
|
|
|
window: 'undefined'
|
|
|
|
});
|
|
|
|
} finally {
|
|
|
|
child.kill();
|
|
|
|
}
|
|
|
|
}, [fixtures]);
|
|
|
|
});
|
|
|
|
|
|
|
|
describe('child_process.exec', () => {
|
|
|
|
ifit(process.platform === 'linux')('allows executing a setuid binary from non-sandboxed renderer', async () => {
|
|
|
|
// Chrome uses prctl(2) to set the NO_NEW_PRIVILEGES flag on Linux (see
|
|
|
|
// https://github.com/torvalds/linux/blob/40fde647cc/Documentation/userspace-api/no_new_privs.rst).
|
|
|
|
// We disable this for unsandboxed processes, which the renderer tests
|
|
|
|
// are running in. If this test fails with an error like 'effective uid
|
|
|
|
// is not 0', then it's likely that our patch to prevent the flag from
|
|
|
|
// being set has become ineffective.
|
|
|
|
const w = await getRemoteContext();
|
|
|
|
const stdout = await w.webContents.executeJavaScript('require(\'child_process\').execSync(\'sudo --help\')');
|
|
|
|
expect(stdout).to.not.be.empty();
|
|
|
|
});
|
|
|
|
});
|
|
|
|
});
|
|
|
|
|
2021-04-09 10:09:17 +03:00
|
|
|
it('does not hang when using the fs module in the renderer process', async () => {
|
2021-03-22 23:11:03 +03:00
|
|
|
const appPath = path.join(mainFixturesPath, 'apps', 'libuv-hang', 'main.js');
|
|
|
|
const appProcess = childProcess.spawn(process.execPath, [appPath], {
|
|
|
|
cwd: path.join(mainFixturesPath, 'apps', 'libuv-hang'),
|
|
|
|
stdio: 'inherit'
|
|
|
|
});
|
|
|
|
const [code] = await emittedOnce(appProcess, 'close');
|
|
|
|
expect(code).to.equal(0);
|
|
|
|
});
|
|
|
|
|
2019-09-20 17:41:40 +03:00
|
|
|
describe('contexts', () => {
|
|
|
|
describe('setTimeout called under Chromium event loop in browser process', () => {
|
2020-02-07 05:59:38 +03:00
|
|
|
it('Can be scheduled in time', (done) => {
|
2019-09-20 17:41:40 +03:00
|
|
|
setTimeout(done, 0);
|
|
|
|
});
|
|
|
|
|
2020-02-07 05:59:38 +03:00
|
|
|
it('Can be promisified', (done) => {
|
2019-09-20 17:41:40 +03:00
|
|
|
util.promisify(setTimeout)(0).then(done);
|
|
|
|
});
|
|
|
|
});
|
|
|
|
|
|
|
|
describe('setInterval called under Chromium event loop in browser process', () => {
|
|
|
|
it('can be scheduled in time', (done) => {
|
|
|
|
let interval: any = null;
|
|
|
|
let clearing = false;
|
|
|
|
const clear = () => {
|
|
|
|
if (interval === null || clearing) return;
|
|
|
|
|
|
|
|
// interval might trigger while clearing (remote is slow sometimes)
|
|
|
|
clearing = true;
|
|
|
|
clearInterval(interval);
|
|
|
|
clearing = false;
|
|
|
|
interval = null;
|
|
|
|
done();
|
|
|
|
};
|
|
|
|
interval = setInterval(clear, 10);
|
|
|
|
});
|
|
|
|
});
|
2022-08-05 03:20:17 +03:00
|
|
|
|
|
|
|
const suspendListeners = (emitter: EventEmitter, eventName: string, callback: (...args: any[]) => void) => {
|
|
|
|
const listeners = emitter.listeners(eventName) as ((...args: any[]) => void)[];
|
|
|
|
emitter.removeAllListeners(eventName);
|
|
|
|
emitter.once(eventName, (...args) => {
|
|
|
|
emitter.removeAllListeners(eventName);
|
|
|
|
listeners.forEach((listener) => {
|
|
|
|
emitter.on(eventName, listener);
|
|
|
|
});
|
|
|
|
|
|
|
|
// eslint-disable-next-line standard/no-callback-literal
|
|
|
|
callback(...args);
|
|
|
|
});
|
|
|
|
};
|
|
|
|
describe('error thrown in main process node context', () => {
|
|
|
|
it('gets emitted as a process uncaughtException event', async () => {
|
|
|
|
fs.readFile(__filename, () => {
|
|
|
|
throw new Error('hello');
|
|
|
|
});
|
|
|
|
const result = await new Promise(resolve => suspendListeners(process, 'uncaughtException', (error) => {
|
|
|
|
resolve(error.message);
|
|
|
|
}));
|
|
|
|
expect(result).to.equal('hello');
|
|
|
|
});
|
|
|
|
});
|
|
|
|
|
|
|
|
describe('promise rejection in main process node context', () => {
|
|
|
|
it('gets emitted as a process unhandledRejection event', async () => {
|
|
|
|
fs.readFile(__filename, () => {
|
|
|
|
Promise.reject(new Error('hello'));
|
|
|
|
});
|
|
|
|
const result = await new Promise(resolve => suspendListeners(process, 'unhandledRejection', (error) => {
|
|
|
|
resolve(error.message);
|
|
|
|
}));
|
|
|
|
expect(result).to.equal('hello');
|
|
|
|
});
|
|
|
|
});
|
|
|
|
});
|
|
|
|
|
|
|
|
describe('contexts in renderer', () => {
|
|
|
|
useRemoteContext();
|
|
|
|
|
|
|
|
describe('setTimeout in fs callback', () => {
|
|
|
|
itremote('does not crash', async (filename: string) => {
|
|
|
|
await new Promise(resolve => require('fs').readFile(filename, () => {
|
|
|
|
setTimeout(resolve, 0);
|
|
|
|
}));
|
|
|
|
}, [__filename]);
|
|
|
|
});
|
|
|
|
|
|
|
|
describe('error thrown in renderer process node context', () => {
|
|
|
|
itremote('gets emitted as a process uncaughtException event', async (filename: string) => {
|
|
|
|
const error = new Error('boo!');
|
|
|
|
require('fs').readFile(filename, () => {
|
|
|
|
throw error;
|
|
|
|
});
|
|
|
|
await new Promise<void>((resolve, reject) => {
|
|
|
|
process.once('uncaughtException', (thrown) => {
|
|
|
|
try {
|
|
|
|
expect(thrown).to.equal(error);
|
|
|
|
resolve();
|
|
|
|
} catch (e) {
|
|
|
|
reject(e);
|
|
|
|
}
|
|
|
|
});
|
|
|
|
});
|
|
|
|
}, [__filename]);
|
|
|
|
});
|
|
|
|
|
|
|
|
describe('URL handling in the renderer process', () => {
|
|
|
|
itremote('can successfully handle WHATWG URLs constructed by Blink', (fixtures: string) => {
|
|
|
|
const url = new URL('file://' + require('path').resolve(fixtures, 'pages', 'base-page.html'));
|
|
|
|
expect(() => {
|
|
|
|
require('fs').createReadStream(url);
|
|
|
|
}).to.not.throw();
|
|
|
|
}, [fixtures]);
|
|
|
|
});
|
|
|
|
|
|
|
|
describe('setTimeout called under blink env in renderer process', () => {
|
|
|
|
itremote('can be scheduled in time', async () => {
|
|
|
|
await new Promise(resolve => setTimeout(resolve, 10));
|
|
|
|
});
|
|
|
|
|
|
|
|
itremote('works from the timers module', async () => {
|
|
|
|
await new Promise(resolve => require('timers').setTimeout(resolve, 10));
|
|
|
|
});
|
|
|
|
});
|
|
|
|
|
|
|
|
describe('setInterval called under blink env in renderer process', () => {
|
|
|
|
itremote('can be scheduled in time', async () => {
|
|
|
|
await new Promise<void>(resolve => {
|
|
|
|
const id = setInterval(() => {
|
|
|
|
clearInterval(id);
|
|
|
|
resolve();
|
|
|
|
}, 10);
|
|
|
|
});
|
|
|
|
});
|
|
|
|
|
|
|
|
itremote('can be scheduled in time from timers module', async () => {
|
|
|
|
const { setInterval, clearInterval } = require('timers');
|
|
|
|
await new Promise<void>(resolve => {
|
|
|
|
const id = setInterval(() => {
|
|
|
|
clearInterval(id);
|
|
|
|
resolve();
|
|
|
|
}, 10);
|
|
|
|
});
|
|
|
|
});
|
|
|
|
});
|
|
|
|
});
|
|
|
|
|
|
|
|
describe('message loop in renderer', () => {
|
|
|
|
useRemoteContext();
|
|
|
|
|
|
|
|
describe('process.nextTick', () => {
|
|
|
|
itremote('emits the callback', () => new Promise(resolve => process.nextTick(resolve)));
|
|
|
|
|
|
|
|
itremote('works in nested calls', () =>
|
|
|
|
new Promise(resolve => {
|
|
|
|
process.nextTick(() => {
|
|
|
|
process.nextTick(() => process.nextTick(resolve));
|
|
|
|
});
|
|
|
|
}));
|
|
|
|
});
|
|
|
|
|
|
|
|
describe('setImmediate', () => {
|
|
|
|
itremote('emits the callback', () => new Promise(resolve => setImmediate(resolve)));
|
|
|
|
|
|
|
|
itremote('works in nested calls', () => new Promise(resolve => {
|
|
|
|
setImmediate(() => {
|
|
|
|
setImmediate(() => setImmediate(resolve));
|
|
|
|
});
|
|
|
|
}));
|
|
|
|
});
|
|
|
|
});
|
|
|
|
|
|
|
|
ifdescribe(features.isRunAsNodeEnabled() && process.platform === 'darwin')('net.connect', () => {
|
|
|
|
itremote('emit error when connect to a socket path without listeners', async (fixtures: string) => {
|
|
|
|
const socketPath = require('path').join(require('os').tmpdir(), 'electron-test.sock');
|
|
|
|
const script = require('path').join(fixtures, 'module', 'create_socket.js');
|
|
|
|
const child = require('child_process').fork(script, [socketPath]);
|
|
|
|
const code = await new Promise(resolve => child.once('exit', resolve));
|
|
|
|
expect(code).to.equal(0);
|
|
|
|
const client = require('net').connect(socketPath);
|
|
|
|
const error = await new Promise<any>(resolve => client.once('error', resolve));
|
|
|
|
expect(error.code).to.equal('ECONNREFUSED');
|
|
|
|
}, [fixtures]);
|
|
|
|
});
|
|
|
|
|
|
|
|
describe('Buffer', () => {
|
|
|
|
useRemoteContext();
|
|
|
|
|
2022-10-12 03:01:57 +03:00
|
|
|
itremote('can be created from Blink external string', () => {
|
2022-08-05 03:20:17 +03:00
|
|
|
const p = document.createElement('p');
|
|
|
|
p.innerText = '闲云潭影日悠悠,物换星移几度秋';
|
|
|
|
const b = Buffer.from(p.innerText);
|
|
|
|
expect(b.toString()).to.equal('闲云潭影日悠悠,物换星移几度秋');
|
|
|
|
expect(Buffer.byteLength(p.innerText)).to.equal(45);
|
|
|
|
});
|
|
|
|
|
|
|
|
itremote('correctly parses external one-byte UTF8 string', () => {
|
|
|
|
const p = document.createElement('p');
|
|
|
|
p.innerText = 'Jøhänñéß';
|
|
|
|
const b = Buffer.from(p.innerText);
|
|
|
|
expect(b.toString()).to.equal('Jøhänñéß');
|
|
|
|
expect(Buffer.byteLength(p.innerText)).to.equal(13);
|
|
|
|
});
|
|
|
|
|
|
|
|
itremote('does not crash when creating large Buffers', () => {
|
|
|
|
let buffer = Buffer.from(new Array(4096).join(' '));
|
|
|
|
expect(buffer.length).to.equal(4095);
|
|
|
|
buffer = Buffer.from(new Array(4097).join(' '));
|
|
|
|
expect(buffer.length).to.equal(4096);
|
|
|
|
});
|
|
|
|
|
|
|
|
itremote('does not crash for crypto operations', () => {
|
|
|
|
const crypto = require('crypto');
|
|
|
|
const data = 'lG9E+/g4JmRmedDAnihtBD4Dfaha/GFOjd+xUOQI05UtfVX3DjUXvrS98p7kZQwY3LNhdiFo7MY5rGft8yBuDhKuNNag9vRx/44IuClDhdQ=';
|
|
|
|
const key = 'q90K9yBqhWZnAMCMTOJfPQ==';
|
|
|
|
const cipherText = '{"error_code":114,"error_message":"Tham số không hợp lệ","data":null}';
|
|
|
|
for (let i = 0; i < 10000; ++i) {
|
|
|
|
const iv = Buffer.from('0'.repeat(32), 'hex');
|
|
|
|
const input = Buffer.from(data, 'base64');
|
|
|
|
const decipher = crypto.createDecipheriv('aes-128-cbc', Buffer.from(key, 'base64'), iv);
|
|
|
|
const result = Buffer.concat([decipher.update(input), decipher.final()]).toString('utf8');
|
|
|
|
expect(cipherText).to.equal(result);
|
|
|
|
}
|
|
|
|
});
|
|
|
|
|
|
|
|
itremote('does not crash when using crypto.diffieHellman() constructors', () => {
|
|
|
|
const crypto = require('crypto');
|
|
|
|
|
|
|
|
crypto.createDiffieHellman('abc');
|
|
|
|
crypto.createDiffieHellman('abc', 2);
|
|
|
|
|
|
|
|
// Needed to test specific DiffieHellman ctors.
|
|
|
|
|
|
|
|
// eslint-disable-next-line no-octal
|
|
|
|
crypto.createDiffieHellman('abc', Buffer.from([2]));
|
|
|
|
// eslint-disable-next-line no-octal
|
|
|
|
crypto.createDiffieHellman('abc', '123');
|
|
|
|
});
|
|
|
|
|
|
|
|
itremote('does not crash when calling crypto.createPrivateKey() with an unsupported algorithm', () => {
|
|
|
|
const crypto = require('crypto');
|
|
|
|
|
|
|
|
const ed448 = {
|
|
|
|
crv: 'Ed448',
|
|
|
|
x: 'KYWcaDwgH77xdAwcbzOgvCVcGMy9I6prRQBhQTTdKXUcr-VquTz7Fd5adJO0wT2VHysF3bk3kBoA',
|
|
|
|
d: 'UhC3-vN5vp_g9PnTknXZgfXUez7Xvw-OfuJ0pYkuwzpYkcTvacqoFkV_O05WMHpyXkzH9q2wzx5n',
|
|
|
|
kty: 'OKP'
|
|
|
|
};
|
|
|
|
|
|
|
|
expect(() => {
|
|
|
|
crypto.createPrivateKey({ key: ed448, format: 'jwk' });
|
|
|
|
}).to.throw(/Invalid JWK data/);
|
|
|
|
});
|
|
|
|
});
|
|
|
|
|
|
|
|
describe('process.stdout', () => {
|
|
|
|
useRemoteContext();
|
|
|
|
|
|
|
|
itremote('does not throw an exception when accessed', () => {
|
|
|
|
expect(() => process.stdout).to.not.throw();
|
|
|
|
});
|
|
|
|
|
|
|
|
itremote('does not throw an exception when calling write()', () => {
|
|
|
|
expect(() => {
|
|
|
|
process.stdout.write('test');
|
|
|
|
}).to.not.throw();
|
|
|
|
});
|
|
|
|
|
|
|
|
// TODO: figure out why process.stdout.isTTY is true on Darwin but not Linux/Win.
|
|
|
|
ifdescribe(process.platform !== 'darwin')('isTTY', () => {
|
|
|
|
itremote('should be undefined in the renderer process', function () {
|
|
|
|
expect(process.stdout.isTTY).to.be.undefined();
|
|
|
|
});
|
|
|
|
});
|
|
|
|
});
|
|
|
|
|
|
|
|
describe('process.stdin', () => {
|
|
|
|
useRemoteContext();
|
|
|
|
|
|
|
|
itremote('does not throw an exception when accessed', () => {
|
|
|
|
expect(() => process.stdin).to.not.throw();
|
|
|
|
});
|
|
|
|
|
|
|
|
itremote('returns null when read from', () => {
|
|
|
|
expect(process.stdin.read()).to.be.null();
|
|
|
|
});
|
|
|
|
});
|
|
|
|
|
|
|
|
describe('process.version', () => {
|
|
|
|
itremote('should not have -pre', () => {
|
|
|
|
expect(process.version.endsWith('-pre')).to.be.false();
|
|
|
|
});
|
|
|
|
});
|
|
|
|
|
|
|
|
describe('vm.runInNewContext', () => {
|
|
|
|
itremote('should not crash', () => {
|
|
|
|
require('vm').runInNewContext('');
|
|
|
|
});
|
|
|
|
});
|
|
|
|
|
|
|
|
describe('crypto', () => {
|
|
|
|
useRemoteContext();
|
|
|
|
itremote('should list the ripemd160 hash in getHashes', () => {
|
|
|
|
expect(require('crypto').getHashes()).to.include('ripemd160');
|
|
|
|
});
|
|
|
|
|
|
|
|
itremote('should be able to create a ripemd160 hash and use it', () => {
|
|
|
|
const hash = require('crypto').createHash('ripemd160');
|
|
|
|
hash.update('electron-ripemd160');
|
|
|
|
expect(hash.digest('hex')).to.equal('fa7fec13c624009ab126ebb99eda6525583395fe');
|
|
|
|
});
|
|
|
|
|
|
|
|
itremote('should list aes-{128,256}-cfb in getCiphers', () => {
|
|
|
|
expect(require('crypto').getCiphers()).to.include.members(['aes-128-cfb', 'aes-256-cfb']);
|
|
|
|
});
|
|
|
|
|
|
|
|
itremote('should be able to create an aes-128-cfb cipher', () => {
|
|
|
|
require('crypto').createCipheriv('aes-128-cfb', '0123456789abcdef', '0123456789abcdef');
|
|
|
|
});
|
|
|
|
|
|
|
|
itremote('should be able to create an aes-256-cfb cipher', () => {
|
|
|
|
require('crypto').createCipheriv('aes-256-cfb', '0123456789abcdef0123456789abcdef', '0123456789abcdef');
|
|
|
|
});
|
|
|
|
|
|
|
|
itremote('should be able to create a bf-{cbc,cfb,ecb} ciphers', () => {
|
|
|
|
require('crypto').createCipheriv('bf-cbc', Buffer.from('0123456789abcdef'), Buffer.from('01234567'));
|
|
|
|
require('crypto').createCipheriv('bf-cfb', Buffer.from('0123456789abcdef'), Buffer.from('01234567'));
|
|
|
|
require('crypto').createCipheriv('bf-ecb', Buffer.from('0123456789abcdef'), Buffer.from('01234567'));
|
|
|
|
});
|
|
|
|
|
|
|
|
itremote('should list des-ede-cbc in getCiphers', () => {
|
|
|
|
expect(require('crypto').getCiphers()).to.include('des-ede-cbc');
|
|
|
|
});
|
|
|
|
|
|
|
|
itremote('should be able to create an des-ede-cbc cipher', () => {
|
|
|
|
const key = Buffer.from('0123456789abcdeff1e0d3c2b5a49786', 'hex');
|
|
|
|
const iv = Buffer.from('fedcba9876543210', 'hex');
|
|
|
|
require('crypto').createCipheriv('des-ede-cbc', key, iv);
|
|
|
|
});
|
|
|
|
|
|
|
|
itremote('should not crash when getting an ECDH key', () => {
|
|
|
|
const ecdh = require('crypto').createECDH('prime256v1');
|
|
|
|
expect(ecdh.generateKeys()).to.be.an.instanceof(Buffer);
|
|
|
|
expect(ecdh.getPrivateKey()).to.be.an.instanceof(Buffer);
|
|
|
|
});
|
|
|
|
|
|
|
|
itremote('should not crash when generating DH keys or fetching DH fields', () => {
|
|
|
|
const dh = require('crypto').createDiffieHellman('modp15');
|
|
|
|
expect(dh.generateKeys()).to.be.an.instanceof(Buffer);
|
|
|
|
expect(dh.getPublicKey()).to.be.an.instanceof(Buffer);
|
|
|
|
expect(dh.getPrivateKey()).to.be.an.instanceof(Buffer);
|
|
|
|
expect(dh.getPrime()).to.be.an.instanceof(Buffer);
|
|
|
|
expect(dh.getGenerator()).to.be.an.instanceof(Buffer);
|
|
|
|
});
|
|
|
|
|
|
|
|
itremote('should not crash when creating an ECDH cipher', () => {
|
|
|
|
const crypto = require('crypto');
|
|
|
|
const dh = crypto.createECDH('prime256v1');
|
|
|
|
dh.generateKeys();
|
|
|
|
dh.setPrivateKey(dh.getPrivateKey());
|
|
|
|
});
|
|
|
|
});
|
|
|
|
|
|
|
|
itremote('includes the electron version in process.versions', () => {
|
|
|
|
expect(process.versions)
|
|
|
|
.to.have.own.property('electron')
|
|
|
|
.that.is.a('string')
|
|
|
|
.and.matches(/^\d+\.\d+\.\d+(\S*)?$/);
|
|
|
|
});
|
|
|
|
|
|
|
|
itremote('includes the chrome version in process.versions', () => {
|
|
|
|
expect(process.versions)
|
|
|
|
.to.have.own.property('chrome')
|
|
|
|
.that.is.a('string')
|
|
|
|
.and.matches(/^\d+\.\d+\.\d+\.\d+$/);
|
2019-09-20 17:41:40 +03:00
|
|
|
});
|
|
|
|
|
2019-11-02 04:06:15 +03:00
|
|
|
describe('NODE_OPTIONS', () => {
|
|
|
|
let child: childProcess.ChildProcessWithoutNullStreams;
|
|
|
|
let exitPromise: Promise<any[]>;
|
|
|
|
|
2020-02-07 05:59:38 +03:00
|
|
|
it('Fails for options disallowed by Node.js itself', (done) => {
|
|
|
|
after(async () => {
|
2019-11-02 04:06:15 +03:00
|
|
|
const [code, signal] = await exitPromise;
|
|
|
|
expect(signal).to.equal(null);
|
2020-02-07 05:59:38 +03:00
|
|
|
|
|
|
|
// Exit code 9 indicates cli flag parsing failure
|
|
|
|
expect(code).to.equal(9);
|
2019-11-02 04:06:15 +03:00
|
|
|
child.kill();
|
2020-02-07 05:59:38 +03:00
|
|
|
});
|
2019-11-02 04:06:15 +03:00
|
|
|
|
2022-06-27 11:29:18 +03:00
|
|
|
const env = { ...process.env, NODE_OPTIONS: '--v8-options' };
|
2019-11-02 04:06:15 +03:00
|
|
|
child = childProcess.spawn(process.execPath, { env });
|
2020-02-07 05:59:38 +03:00
|
|
|
exitPromise = emittedOnce(child, 'exit');
|
2019-11-02 04:06:15 +03:00
|
|
|
|
2020-02-07 05:59:38 +03:00
|
|
|
let output = '';
|
|
|
|
let success = false;
|
|
|
|
const cleanup = () => {
|
2019-11-02 04:06:15 +03:00
|
|
|
child.stderr.removeListener('data', listener);
|
|
|
|
child.stdout.removeListener('data', listener);
|
|
|
|
};
|
|
|
|
|
2020-02-07 05:59:38 +03:00
|
|
|
const listener = (data: Buffer) => {
|
2019-11-02 04:06:15 +03:00
|
|
|
output += data;
|
|
|
|
if (/electron: --v8-options is not allowed in NODE_OPTIONS/m.test(output)) {
|
2020-02-07 05:59:38 +03:00
|
|
|
success = true;
|
2019-11-02 04:06:15 +03:00
|
|
|
cleanup();
|
|
|
|
done();
|
|
|
|
}
|
|
|
|
};
|
2020-02-07 05:59:38 +03:00
|
|
|
|
2019-11-02 04:06:15 +03:00
|
|
|
child.stderr.on('data', listener);
|
|
|
|
child.stdout.on('data', listener);
|
2020-02-07 05:59:38 +03:00
|
|
|
child.on('exit', () => {
|
|
|
|
if (!success) {
|
|
|
|
cleanup();
|
|
|
|
done(new Error(`Unexpected output: ${output.toString()}`));
|
|
|
|
}
|
|
|
|
});
|
2019-11-02 04:06:15 +03:00
|
|
|
});
|
|
|
|
|
2020-02-07 05:59:38 +03:00
|
|
|
it('Disallows crypto-related options', (done) => {
|
|
|
|
after(() => {
|
|
|
|
child.kill();
|
|
|
|
});
|
|
|
|
|
2022-08-05 03:20:17 +03:00
|
|
|
const appPath = path.join(fixtures, 'module', 'noop.js');
|
2022-06-27 11:29:18 +03:00
|
|
|
const env = { ...process.env, NODE_OPTIONS: '--use-openssl-ca' };
|
2022-08-05 03:20:17 +03:00
|
|
|
child = childProcess.spawn(process.execPath, ['--enable-logging', appPath], { env });
|
2019-11-02 04:06:15 +03:00
|
|
|
|
2020-02-07 05:59:38 +03:00
|
|
|
let output = '';
|
|
|
|
const cleanup = () => {
|
2019-11-02 04:06:15 +03:00
|
|
|
child.stderr.removeListener('data', listener);
|
|
|
|
child.stdout.removeListener('data', listener);
|
|
|
|
};
|
|
|
|
|
2020-02-07 05:59:38 +03:00
|
|
|
const listener = (data: Buffer) => {
|
2019-11-02 04:06:15 +03:00
|
|
|
output += data;
|
|
|
|
if (/The NODE_OPTION --use-openssl-ca is not supported in Electron/m.test(output)) {
|
|
|
|
cleanup();
|
|
|
|
done();
|
|
|
|
}
|
|
|
|
};
|
2020-02-07 05:59:38 +03:00
|
|
|
|
|
|
|
child.stderr.on('data', listener);
|
|
|
|
child.stdout.on('data', listener);
|
|
|
|
});
|
2021-06-03 08:46:44 +03:00
|
|
|
|
|
|
|
it('does allow --require in non-packaged apps', async () => {
|
|
|
|
const appPath = path.join(fixtures, 'module', 'noop.js');
|
2022-06-27 11:29:18 +03:00
|
|
|
const env = {
|
|
|
|
...process.env,
|
2021-06-03 08:46:44 +03:00
|
|
|
NODE_OPTIONS: `--require=${path.join(fixtures, 'module', 'fail.js')}`
|
2022-06-27 11:29:18 +03:00
|
|
|
};
|
2021-06-03 08:46:44 +03:00
|
|
|
// App should exit with code 1.
|
|
|
|
const child = childProcess.spawn(process.execPath, [appPath], { env });
|
|
|
|
const [code] = await emittedOnce(child, 'exit');
|
|
|
|
expect(code).to.equal(1);
|
|
|
|
});
|
|
|
|
|
|
|
|
it('does not allow --require in packaged apps', async () => {
|
|
|
|
const appPath = path.join(fixtures, 'module', 'noop.js');
|
2022-06-27 11:29:18 +03:00
|
|
|
const env = {
|
|
|
|
...process.env,
|
2021-06-03 08:46:44 +03:00
|
|
|
ELECTRON_FORCE_IS_PACKAGED: 'true',
|
|
|
|
NODE_OPTIONS: `--require=${path.join(fixtures, 'module', 'fail.js')}`
|
2022-06-27 11:29:18 +03:00
|
|
|
};
|
2021-06-03 08:46:44 +03:00
|
|
|
// App should exit with code 0.
|
|
|
|
const child = childProcess.spawn(process.execPath, [appPath], { env });
|
|
|
|
const [code] = await emittedOnce(child, 'exit');
|
|
|
|
expect(code).to.equal(0);
|
|
|
|
});
|
2020-02-07 05:59:38 +03:00
|
|
|
});
|
|
|
|
|
2021-04-09 10:09:17 +03:00
|
|
|
ifdescribe(features.isRunAsNodeEnabled())('Node.js cli flags', () => {
|
2020-02-07 05:59:38 +03:00
|
|
|
let child: childProcess.ChildProcessWithoutNullStreams;
|
|
|
|
let exitPromise: Promise<any[]>;
|
|
|
|
|
2021-03-17 00:02:47 +03:00
|
|
|
it('Prohibits crypto-related flags in ELECTRON_RUN_AS_NODE mode', (done) => {
|
2020-02-07 05:59:38 +03:00
|
|
|
after(async () => {
|
|
|
|
const [code, signal] = await exitPromise;
|
|
|
|
expect(signal).to.equal(null);
|
|
|
|
expect(code).to.equal(9);
|
|
|
|
child.kill();
|
|
|
|
});
|
|
|
|
|
|
|
|
child = childProcess.spawn(process.execPath, ['--force-fips'], {
|
|
|
|
env: { ELECTRON_RUN_AS_NODE: 'true' }
|
|
|
|
});
|
|
|
|
exitPromise = emittedOnce(child, 'exit');
|
|
|
|
|
|
|
|
let output = '';
|
|
|
|
const cleanup = () => {
|
|
|
|
child.stderr.removeListener('data', listener);
|
|
|
|
child.stdout.removeListener('data', listener);
|
|
|
|
};
|
|
|
|
|
|
|
|
const listener = (data: Buffer) => {
|
|
|
|
output += data;
|
|
|
|
if (/.*The Node.js cli flag --force-fips is not supported in Electron/m.test(output)) {
|
|
|
|
cleanup();
|
|
|
|
done();
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2019-11-02 04:06:15 +03:00
|
|
|
child.stderr.on('data', listener);
|
|
|
|
child.stdout.on('data', listener);
|
|
|
|
});
|
|
|
|
});
|
|
|
|
|
2020-10-05 20:10:38 +03:00
|
|
|
describe('process.stdout', () => {
|
|
|
|
it('is a real Node stream', () => {
|
|
|
|
expect((process.stdout as any)._type).to.not.be.undefined();
|
|
|
|
});
|
|
|
|
});
|
|
|
|
|
2021-06-07 22:19:39 +03:00
|
|
|
describe('fs.readFile', () => {
|
|
|
|
it('can accept a FileHandle as the Path argument', async () => {
|
|
|
|
const filePathForHandle = path.resolve(mainFixturesPath, 'dogs-running.txt');
|
|
|
|
const fileHandle = await fs.promises.open(filePathForHandle, 'r');
|
|
|
|
|
|
|
|
const file = await fs.promises.readFile(fileHandle, { encoding: 'utf8' });
|
|
|
|
expect(file).to.not.be.empty();
|
|
|
|
await fileHandle.close();
|
|
|
|
});
|
|
|
|
});
|
|
|
|
|
2021-04-09 10:09:17 +03:00
|
|
|
ifdescribe(features.isRunAsNodeEnabled())('inspector', () => {
|
2019-09-20 17:41:40 +03:00
|
|
|
let child: childProcess.ChildProcessWithoutNullStreams;
|
2022-01-31 14:37:40 +03:00
|
|
|
let exitPromise: Promise<any[]> | null;
|
2019-09-20 17:41:40 +03:00
|
|
|
|
|
|
|
afterEach(async () => {
|
|
|
|
if (child && exitPromise) {
|
|
|
|
const [code, signal] = await exitPromise;
|
|
|
|
expect(signal).to.equal(null);
|
|
|
|
expect(code).to.equal(0);
|
|
|
|
} else if (child) {
|
|
|
|
child.kill();
|
|
|
|
}
|
2020-05-19 05:05:49 +03:00
|
|
|
child = null as any;
|
|
|
|
exitPromise = null as any;
|
2019-09-20 17:41:40 +03:00
|
|
|
});
|
|
|
|
|
2020-02-07 05:59:38 +03:00
|
|
|
it('Supports starting the v8 inspector with --inspect/--inspect-brk', (done) => {
|
2019-09-20 17:41:40 +03:00
|
|
|
child = childProcess.spawn(process.execPath, ['--inspect-brk', path.join(fixtures, 'module', 'run-as-node.js')], {
|
2020-02-07 05:59:38 +03:00
|
|
|
env: { ELECTRON_RUN_AS_NODE: 'true' }
|
2019-09-20 17:41:40 +03:00
|
|
|
});
|
|
|
|
|
|
|
|
let output = '';
|
2020-02-07 05:59:38 +03:00
|
|
|
const cleanup = () => {
|
|
|
|
child.stderr.removeListener('data', listener);
|
|
|
|
child.stdout.removeListener('data', listener);
|
2019-09-20 17:41:40 +03:00
|
|
|
};
|
2020-02-07 05:59:38 +03:00
|
|
|
|
|
|
|
const listener = (data: Buffer) => {
|
2019-09-20 17:41:40 +03:00
|
|
|
output += data;
|
2020-02-07 05:59:38 +03:00
|
|
|
if (/Debugger listening on ws:/m.test(output)) {
|
2019-09-20 17:41:40 +03:00
|
|
|
cleanup();
|
|
|
|
done();
|
|
|
|
}
|
|
|
|
};
|
2020-02-07 05:59:38 +03:00
|
|
|
|
|
|
|
child.stderr.on('data', listener);
|
|
|
|
child.stdout.on('data', listener);
|
2019-09-20 17:41:40 +03:00
|
|
|
});
|
|
|
|
|
2020-07-01 01:10:36 +03:00
|
|
|
it('Supports starting the v8 inspector with --inspect and a provided port', async () => {
|
2019-09-20 17:41:40 +03:00
|
|
|
child = childProcess.spawn(process.execPath, ['--inspect=17364', path.join(fixtures, 'module', 'run-as-node.js')], {
|
2020-02-07 05:59:38 +03:00
|
|
|
env: { ELECTRON_RUN_AS_NODE: 'true' }
|
2019-09-20 17:41:40 +03:00
|
|
|
});
|
|
|
|
exitPromise = emittedOnce(child, 'exit');
|
|
|
|
|
|
|
|
let output = '';
|
2020-02-07 05:59:38 +03:00
|
|
|
const listener = (data: Buffer) => { output += data; };
|
|
|
|
const cleanup = () => {
|
|
|
|
child.stderr.removeListener('data', listener);
|
|
|
|
child.stdout.removeListener('data', listener);
|
2019-09-20 17:41:40 +03:00
|
|
|
};
|
2020-02-07 05:59:38 +03:00
|
|
|
|
|
|
|
child.stderr.on('data', listener);
|
|
|
|
child.stdout.on('data', listener);
|
2020-07-01 01:10:36 +03:00
|
|
|
await emittedOnce(child, 'exit');
|
|
|
|
cleanup();
|
|
|
|
if (/^Debugger listening on ws:/m.test(output)) {
|
|
|
|
expect(output.trim()).to.contain(':17364', 'should be listening on port 17364');
|
|
|
|
} else {
|
|
|
|
throw new Error(`Unexpected output: ${output.toString()}`);
|
|
|
|
}
|
2019-09-20 17:41:40 +03:00
|
|
|
});
|
|
|
|
|
2020-07-01 01:10:36 +03:00
|
|
|
it('Does not start the v8 inspector when --inspect is after a -- argument', async () => {
|
2019-09-20 17:41:40 +03:00
|
|
|
child = childProcess.spawn(process.execPath, [path.join(fixtures, 'module', 'noop.js'), '--', '--inspect']);
|
|
|
|
exitPromise = emittedOnce(child, 'exit');
|
|
|
|
|
|
|
|
let output = '';
|
2020-02-07 05:59:38 +03:00
|
|
|
const listener = (data: Buffer) => { output += data; };
|
|
|
|
child.stderr.on('data', listener);
|
|
|
|
child.stdout.on('data', listener);
|
2020-07-01 01:10:36 +03:00
|
|
|
await emittedOnce(child, 'exit');
|
|
|
|
if (output.trim().startsWith('Debugger listening on ws://')) {
|
|
|
|
throw new Error('Inspector was started when it should not have been');
|
|
|
|
}
|
2019-09-20 17:41:40 +03:00
|
|
|
});
|
|
|
|
|
2021-03-17 00:02:47 +03:00
|
|
|
// IPC Electron child process not supported on Windows.
|
|
|
|
ifit(process.platform !== 'win32')('does not crash when quitting with the inspector connected', function (done) {
|
2019-09-20 17:41:40 +03:00
|
|
|
child = childProcess.spawn(process.execPath, [path.join(fixtures, 'module', 'delay-exit'), '--inspect=0'], {
|
|
|
|
stdio: ['ipc']
|
|
|
|
}) as childProcess.ChildProcessWithoutNullStreams;
|
|
|
|
exitPromise = emittedOnce(child, 'exit');
|
|
|
|
|
2020-02-07 05:59:38 +03:00
|
|
|
const cleanup = () => {
|
|
|
|
child.stderr.removeListener('data', listener);
|
|
|
|
child.stdout.removeListener('data', listener);
|
|
|
|
};
|
|
|
|
|
2019-09-20 17:41:40 +03:00
|
|
|
let output = '';
|
2020-05-19 05:05:49 +03:00
|
|
|
const success = false;
|
2020-02-07 05:59:38 +03:00
|
|
|
function listener (data: Buffer) {
|
2019-09-20 17:41:40 +03:00
|
|
|
output += data;
|
2020-05-26 04:20:16 +03:00
|
|
|
console.log(data.toString()); // NOTE: temporary debug logging to try to catch flake.
|
2020-05-19 05:05:49 +03:00
|
|
|
const match = /^Debugger listening on (ws:\/\/.+:\d+\/.+)\n/m.exec(output.trim());
|
|
|
|
if (match) {
|
|
|
|
cleanup();
|
2020-05-26 04:20:16 +03:00
|
|
|
// NOTE: temporary debug logging to try to catch flake.
|
|
|
|
child.stderr.on('data', (m) => console.log(m.toString()));
|
|
|
|
child.stdout.on('data', (m) => console.log(m.toString()));
|
2023-02-16 17:41:41 +03:00
|
|
|
const w = (webContents as typeof ElectronInternal.WebContents).create();
|
2020-05-19 05:05:49 +03:00
|
|
|
w.loadURL('about:blank')
|
|
|
|
.then(() => w.executeJavaScript(`new Promise(resolve => {
|
|
|
|
const connection = new WebSocket(${JSON.stringify(match[1])})
|
|
|
|
connection.onopen = () => {
|
2020-05-26 17:47:49 +03:00
|
|
|
connection.onclose = () => resolve()
|
2020-05-19 05:05:49 +03:00
|
|
|
connection.close()
|
|
|
|
}
|
|
|
|
})`))
|
|
|
|
.then(() => {
|
2022-12-15 00:07:38 +03:00
|
|
|
w.destroy();
|
2020-05-19 05:05:49 +03:00
|
|
|
child.send('plz-quit');
|
|
|
|
done();
|
|
|
|
});
|
2019-09-20 17:41:40 +03:00
|
|
|
}
|
|
|
|
}
|
2020-02-07 05:59:38 +03:00
|
|
|
|
|
|
|
child.stderr.on('data', listener);
|
|
|
|
child.stdout.on('data', listener);
|
|
|
|
child.on('exit', () => {
|
|
|
|
if (!success) cleanup();
|
|
|
|
});
|
2019-09-20 17:41:40 +03:00
|
|
|
});
|
|
|
|
|
2020-07-01 01:10:36 +03:00
|
|
|
it('Supports js binding', async () => {
|
2019-09-20 17:41:40 +03:00
|
|
|
child = childProcess.spawn(process.execPath, ['--inspect', path.join(fixtures, 'module', 'inspector-binding.js')], {
|
2020-02-07 05:59:38 +03:00
|
|
|
env: { ELECTRON_RUN_AS_NODE: 'true' },
|
2019-09-20 17:41:40 +03:00
|
|
|
stdio: ['ipc']
|
|
|
|
}) as childProcess.ChildProcessWithoutNullStreams;
|
|
|
|
exitPromise = emittedOnce(child, 'exit');
|
|
|
|
|
2020-07-01 01:10:36 +03:00
|
|
|
const [{ cmd, debuggerEnabled, success }] = await emittedOnce(child, 'message');
|
|
|
|
expect(cmd).to.equal('assert');
|
|
|
|
expect(debuggerEnabled).to.be.true();
|
|
|
|
expect(success).to.be.true();
|
2019-09-20 17:41:40 +03:00
|
|
|
});
|
|
|
|
});
|
|
|
|
|
2021-04-09 10:09:17 +03:00
|
|
|
it('Can find a module using a package.json main field', () => {
|
2021-09-10 00:49:01 +03:00
|
|
|
const result = childProcess.spawnSync(process.execPath, [path.resolve(fixtures, 'api', 'electron-main-module', 'app.asar')], { stdio: 'inherit' });
|
2019-09-20 17:41:40 +03:00
|
|
|
expect(result.status).to.equal(0);
|
|
|
|
});
|
2020-04-21 22:18:22 +03:00
|
|
|
|
2020-07-01 01:10:36 +03:00
|
|
|
ifit(features.isRunAsNodeEnabled())('handles Promise timeouts correctly', async () => {
|
2020-04-21 22:18:22 +03:00
|
|
|
const scriptPath = path.join(fixtures, 'module', 'node-promise-timer.js');
|
|
|
|
const child = childProcess.spawn(process.execPath, [scriptPath], {
|
|
|
|
env: { ELECTRON_RUN_AS_NODE: 'true' }
|
|
|
|
});
|
2020-07-01 01:10:36 +03:00
|
|
|
const [code, signal] = await emittedOnce(child, 'exit');
|
|
|
|
expect(code).to.equal(0);
|
|
|
|
expect(signal).to.equal(null);
|
|
|
|
child.kill();
|
2020-04-21 22:18:22 +03:00
|
|
|
});
|
2020-06-17 20:08:10 +03:00
|
|
|
|
|
|
|
it('performs microtask checkpoint correctly', (done) => {
|
|
|
|
const f3 = async () => {
|
|
|
|
return new Promise((resolve, reject) => {
|
|
|
|
reject(new Error('oops'));
|
|
|
|
});
|
|
|
|
};
|
|
|
|
|
|
|
|
process.once('unhandledRejection', () => done('catch block is delayed to next tick'));
|
|
|
|
|
|
|
|
setTimeout(() => {
|
|
|
|
f3().catch(() => done());
|
|
|
|
});
|
|
|
|
});
|
2019-10-09 20:59:08 +03:00
|
|
|
});
|