2017-02-08 00:56:07 +01:00
|
|
|
# VM (Executing JavaScript)
|
2012-02-27 20:09:35 +01:00
|
|
|
|
2017-01-23 04:16:21 +01:00
|
|
|
<!--introduced_in=v0.10.0-->
|
|
|
|
|
2016-07-16 00:35:38 +02:00
|
|
|
> Stability: 2 - Stable
|
2012-03-03 00:14:03 +01:00
|
|
|
|
2012-02-27 20:09:35 +01:00
|
|
|
<!--name=vm-->
|
2010-10-28 14:18:16 +02:00
|
|
|
|
2016-05-18 06:56:01 +02:00
|
|
|
The `vm` module provides APIs for compiling and running code within V8 Virtual
|
2018-10-26 18:27:40 +02:00
|
|
|
Machine contexts. **The `vm` module is not a security mechanism. Do
|
2018-09-25 18:51:56 +02:00
|
|
|
not use it to run untrusted code**. The term "sandbox" is used throughout these
|
|
|
|
docs simply to refer to a separate context, and does not confer any security
|
|
|
|
guarantees.
|
2017-11-07 18:22:23 +01:00
|
|
|
|
|
|
|
JavaScript code can be compiled and run immediately or
|
|
|
|
compiled, saved, and run later.
|
|
|
|
|
|
|
|
A common use case is to run the code in a sandboxed environment.
|
|
|
|
The sandboxed code uses a different V8 Context, meaning that
|
|
|
|
it has a different global object than the rest of the code.
|
|
|
|
|
|
|
|
One can provide the context by ["contextifying"][contextified] a sandbox
|
2018-05-08 13:17:24 +02:00
|
|
|
object. The sandboxed code treats any property in the sandbox like a
|
|
|
|
global variable. Any changes to global variables caused by the sandboxed
|
2017-11-07 18:22:23 +01:00
|
|
|
code are reflected in the sandbox object.
|
2010-10-28 14:18:16 +02:00
|
|
|
|
2016-01-17 18:39:07 +01:00
|
|
|
```js
|
|
|
|
const vm = require('vm');
|
2010-10-28 14:18:16 +02:00
|
|
|
|
2017-11-07 18:22:23 +01:00
|
|
|
const x = 1;
|
|
|
|
|
|
|
|
const sandbox = { x: 2 };
|
|
|
|
vm.createContext(sandbox); // Contextify the sandbox.
|
|
|
|
|
|
|
|
const code = 'x += 40; var y = 17;';
|
2018-12-10 13:27:32 +01:00
|
|
|
// `x` and `y` are global variables in the sandboxed environment.
|
2017-11-07 18:22:23 +01:00
|
|
|
// Initially, x has the value 2 because that is the value of sandbox.x.
|
|
|
|
vm.runInContext(code, sandbox);
|
|
|
|
|
|
|
|
console.log(sandbox.x); // 42
|
|
|
|
console.log(sandbox.y); // 17
|
|
|
|
|
|
|
|
console.log(x); // 1; y is not defined.
|
|
|
|
```
|
2010-10-28 14:18:16 +02:00
|
|
|
|
2018-07-28 04:21:30 +02:00
|
|
|
## Class: vm.SourceTextModule
|
2018-01-14 08:35:51 +01:00
|
|
|
<!-- YAML
|
2018-02-21 17:28:13 +01:00
|
|
|
added: v9.6.0
|
2018-01-14 08:35:51 +01:00
|
|
|
-->
|
|
|
|
|
|
|
|
> Stability: 1 - Experimental
|
|
|
|
|
|
|
|
*This feature is only available with the `--experimental-vm-modules` command
|
|
|
|
flag enabled.*
|
|
|
|
|
2018-07-28 04:21:30 +02:00
|
|
|
The `vm.SourceTextModule` class provides a low-level interface for using
|
|
|
|
ECMAScript modules in VM contexts. It is the counterpart of the `vm.Script`
|
|
|
|
class that closely mirrors [Source Text Module Record][]s as defined in the
|
|
|
|
ECMAScript specification.
|
2018-01-14 08:35:51 +01:00
|
|
|
|
2018-07-28 04:21:30 +02:00
|
|
|
Unlike `vm.Script` however, every `vm.SourceTextModule` object is bound to a
|
|
|
|
context from its creation. Operations on `vm.SourceTextModule` objects are
|
|
|
|
intrinsically asynchronous, in contrast with the synchronous nature of
|
|
|
|
`vm.Script` objects. With the help of async functions, however, manipulating
|
|
|
|
`vm.SourceTextModule` objects is fairly straightforward.
|
2018-01-14 08:35:51 +01:00
|
|
|
|
2018-07-28 04:21:30 +02:00
|
|
|
Using a `vm.SourceTextModule` object requires four distinct steps:
|
|
|
|
creation/parsing, linking, instantiation, and evaluation. These four steps are
|
|
|
|
illustrated in the following example.
|
2018-01-14 08:35:51 +01:00
|
|
|
|
2018-02-06 06:55:16 +01:00
|
|
|
This implementation lies at a lower level than the [ECMAScript Module
|
2018-01-14 08:35:51 +01:00
|
|
|
loader][]. There is also currently no way to interact with the Loader, though
|
|
|
|
support is planned.
|
|
|
|
|
|
|
|
```js
|
|
|
|
const vm = require('vm');
|
|
|
|
|
|
|
|
const contextifiedSandbox = vm.createContext({ secret: 42 });
|
|
|
|
|
|
|
|
(async () => {
|
|
|
|
// Step 1
|
|
|
|
//
|
2018-07-28 04:21:30 +02:00
|
|
|
// Create a Module by constructing a new `vm.SourceTextModule` object. This
|
|
|
|
// parses the provided source text, throwing a `SyntaxError` if anything goes
|
|
|
|
// wrong. By default, a Module is created in the top context. But here, we
|
|
|
|
// specify `contextifiedSandbox` as the context this Module belongs to.
|
2018-01-14 08:35:51 +01:00
|
|
|
//
|
|
|
|
// Here, we attempt to obtain the default export from the module "foo", and
|
|
|
|
// put it into local binding "secret".
|
|
|
|
|
2018-07-28 04:21:30 +02:00
|
|
|
const bar = new vm.SourceTextModule(`
|
2018-01-14 08:35:51 +01:00
|
|
|
import s from 'foo';
|
|
|
|
s;
|
|
|
|
`, { context: contextifiedSandbox });
|
|
|
|
|
|
|
|
// Step 2
|
|
|
|
//
|
|
|
|
// "Link" the imported dependencies of this Module to it.
|
|
|
|
//
|
|
|
|
// The provided linking callback (the "linker") accepts two arguments: the
|
|
|
|
// parent module (`bar` in this case) and the string that is the specifier of
|
|
|
|
// the imported module. The callback is expected to return a Module that
|
|
|
|
// corresponds to the provided specifier, with certain requirements documented
|
|
|
|
// in `module.link()`.
|
|
|
|
//
|
|
|
|
// If linking has not started for the returned Module, the same linker
|
|
|
|
// callback will be called on the returned Module.
|
|
|
|
//
|
|
|
|
// Even top-level Modules without dependencies must be explicitly linked. The
|
|
|
|
// callback provided would never be called, however.
|
|
|
|
//
|
|
|
|
// The link() method returns a Promise that will be resolved when all the
|
|
|
|
// Promises returned by the linker resolve.
|
|
|
|
//
|
|
|
|
// Note: This is a contrived example in that the linker function creates a new
|
|
|
|
// "foo" module every time it is called. In a full-fledged module system, a
|
|
|
|
// cache would probably be used to avoid duplicated modules.
|
|
|
|
|
2018-01-31 06:03:56 +01:00
|
|
|
async function linker(specifier, referencingModule) {
|
2018-01-14 08:35:51 +01:00
|
|
|
if (specifier === 'foo') {
|
2018-07-28 04:21:30 +02:00
|
|
|
return new vm.SourceTextModule(`
|
2018-01-14 08:35:51 +01:00
|
|
|
// The "secret" variable refers to the global variable we added to
|
|
|
|
// "contextifiedSandbox" when creating the context.
|
|
|
|
export default secret;
|
|
|
|
`, { context: referencingModule.context });
|
|
|
|
|
|
|
|
// Using `contextifiedSandbox` instead of `referencingModule.context`
|
|
|
|
// here would work as well.
|
|
|
|
}
|
|
|
|
throw new Error(`Unable to resolve dependency: ${specifier}`);
|
|
|
|
}
|
|
|
|
await bar.link(linker);
|
|
|
|
|
|
|
|
// Step 3
|
|
|
|
//
|
|
|
|
// Instantiate the top-level Module.
|
|
|
|
//
|
|
|
|
// Only the top-level Module needs to be explicitly instantiated; its
|
|
|
|
// dependencies will be recursively instantiated by instantiate().
|
|
|
|
|
|
|
|
bar.instantiate();
|
|
|
|
|
|
|
|
// Step 4
|
|
|
|
//
|
|
|
|
// Evaluate the Module. The evaluate() method returns a Promise with a single
|
|
|
|
// property "result" that contains the result of the very last statement
|
|
|
|
// executed in the Module. In the case of `bar`, it is `s;`, which refers to
|
|
|
|
// the default export of the `foo` module, the `secret` we set in the
|
|
|
|
// beginning to 42.
|
|
|
|
|
|
|
|
const { result } = await bar.evaluate();
|
|
|
|
|
|
|
|
console.log(result);
|
|
|
|
// Prints 42.
|
|
|
|
})();
|
|
|
|
```
|
|
|
|
|
2018-07-28 04:21:30 +02:00
|
|
|
### Constructor: new vm.SourceTextModule(code[, options])
|
2018-01-14 08:35:51 +01:00
|
|
|
|
|
|
|
* `code` {string} JavaScript Module code to parse
|
|
|
|
* `options`
|
2018-04-02 03:44:32 +02:00
|
|
|
* `url` {string} URL used in module resolution and stack traces. **Default:**
|
2018-01-14 08:35:51 +01:00
|
|
|
`'vm:module(i)'` where `i` is a context-specific ascending index.
|
|
|
|
* `context` {Object} The [contextified][] object as returned by the
|
2018-04-29 19:46:41 +02:00
|
|
|
`vm.createContext()` method, to compile and evaluate this `Module` in.
|
2018-01-14 08:35:51 +01:00
|
|
|
* `lineOffset` {integer} Specifies the line number offset that is displayed
|
2018-04-29 19:46:41 +02:00
|
|
|
in stack traces produced by this `Module`.
|
|
|
|
* `columnOffset` {integer} Specifies the column number offset that is
|
|
|
|
displayed in stack traces produced by this `Module`.
|
2018-08-18 00:26:34 +02:00
|
|
|
* `initializeImportMeta` {Function} Called during evaluation of this `Module`
|
2018-04-29 19:46:41 +02:00
|
|
|
to initialize the `import.meta`. This function has the signature `(meta,
|
|
|
|
module)`, where `meta` is the `import.meta` object in the `Module`, and
|
2018-07-28 04:21:30 +02:00
|
|
|
`module` is this `vm.SourceTextModule` object.
|
2018-08-18 00:26:34 +02:00
|
|
|
* `importModuleDynamically` {Function} Called during evaluation of this
|
|
|
|
module when `import()` is called. This function has the signature
|
|
|
|
`(specifier, module)` where `specifier` is the specifier passed to
|
|
|
|
`import()` and `module` is this `vm.SourceTextModule`. If this option is
|
|
|
|
not specified, calls to `import()` will reject with
|
|
|
|
[`ERR_VM_DYNAMIC_IMPORT_CALLBACK_MISSING`][]. This method can return a
|
|
|
|
[Module Namespace Object][], but returning a `vm.SourceTextModule` is
|
|
|
|
recommended in order to take advantage of error tracking, and to avoid
|
|
|
|
issues with namespaces that contain `then` function exports.
|
2018-01-14 08:35:51 +01:00
|
|
|
|
|
|
|
Creates a new ES `Module` object.
|
|
|
|
|
2017-09-01 17:03:41 +02:00
|
|
|
Properties assigned to the `import.meta` object that are objects may
|
2018-04-29 19:46:41 +02:00
|
|
|
allow the `Module` to access information outside the specified `context`, if the
|
2018-03-07 04:46:39 +01:00
|
|
|
object is created in the top level context. Use `vm.runInContext()` to create
|
|
|
|
objects in a specific context.
|
|
|
|
|
|
|
|
```js
|
|
|
|
const vm = require('vm');
|
|
|
|
|
|
|
|
const contextifiedSandbox = vm.createContext({ secret: 42 });
|
|
|
|
|
|
|
|
(async () => {
|
2018-07-28 04:21:30 +02:00
|
|
|
const module = new vm.SourceTextModule(
|
2018-03-07 04:46:39 +01:00
|
|
|
'Object.getPrototypeOf(import.meta.prop).secret = secret;',
|
|
|
|
{
|
|
|
|
initializeImportMeta(meta) {
|
|
|
|
// Note: this object is created in the top context. As such,
|
|
|
|
// Object.getPrototypeOf(import.meta.prop) points to the
|
|
|
|
// Object.prototype in the top context rather than that in
|
|
|
|
// the sandbox.
|
|
|
|
meta.prop = {};
|
|
|
|
}
|
|
|
|
});
|
|
|
|
// Since module has no dependencies, the linker function will never be called.
|
|
|
|
await module.link(() => {});
|
2018-07-20 16:00:40 +02:00
|
|
|
module.instantiate();
|
2018-03-07 04:46:39 +01:00
|
|
|
await module.evaluate();
|
|
|
|
|
|
|
|
// Now, Object.prototype.secret will be equal to 42.
|
|
|
|
//
|
|
|
|
// To fix this problem, replace
|
|
|
|
// meta.prop = {};
|
|
|
|
// above with
|
|
|
|
// meta.prop = vm.runInContext('{}', contextifiedSandbox);
|
|
|
|
})();
|
|
|
|
```
|
|
|
|
|
2018-01-14 08:35:51 +01:00
|
|
|
### module.dependencySpecifiers
|
|
|
|
|
|
|
|
* {string[]}
|
|
|
|
|
|
|
|
The specifiers of all dependencies of this module. The returned array is frozen
|
|
|
|
to disallow any changes to it.
|
|
|
|
|
2018-04-29 19:46:41 +02:00
|
|
|
Corresponds to the `[[RequestedModules]]` field of
|
|
|
|
[Source Text Module Record][]s in the ECMAScript specification.
|
2018-01-14 08:35:51 +01:00
|
|
|
|
|
|
|
### module.error
|
|
|
|
|
|
|
|
* {any}
|
|
|
|
|
2018-02-12 08:31:55 +01:00
|
|
|
If the `module.status` is `'errored'`, this property contains the exception
|
|
|
|
thrown by the module during evaluation. If the status is anything else,
|
|
|
|
accessing this property will result in a thrown exception.
|
2018-01-14 08:35:51 +01:00
|
|
|
|
2018-02-06 06:55:16 +01:00
|
|
|
The value `undefined` cannot be used for cases where there is not a thrown
|
2018-01-14 08:35:51 +01:00
|
|
|
exception due to possible ambiguity with `throw undefined;`.
|
|
|
|
|
2018-04-29 19:46:41 +02:00
|
|
|
Corresponds to the `[[EvaluationError]]` field of [Source Text Module Record][]s
|
2018-01-14 08:35:51 +01:00
|
|
|
in the ECMAScript specification.
|
|
|
|
|
|
|
|
### module.evaluate([options])
|
|
|
|
|
|
|
|
* `options` {Object}
|
2018-10-12 19:25:25 +02:00
|
|
|
* `timeout` {integer} Specifies the number of milliseconds to evaluate
|
2018-01-14 08:35:51 +01:00
|
|
|
before terminating execution. If execution is interrupted, an [`Error`][]
|
2018-10-12 19:25:25 +02:00
|
|
|
will be thrown. This value must be a strictly positive integer.
|
2018-01-14 08:35:51 +01:00
|
|
|
* `breakOnSigint` {boolean} If `true`, the execution will be terminated when
|
|
|
|
`SIGINT` (Ctrl+C) is received. Existing handlers for the event that have
|
2018-04-02 07:38:48 +02:00
|
|
|
been attached via `process.on('SIGINT')` will be disabled during script
|
2018-01-14 08:35:51 +01:00
|
|
|
execution, but will continue to work after that. If execution is
|
|
|
|
interrupted, an [`Error`][] will be thrown.
|
|
|
|
* Returns: {Promise}
|
|
|
|
|
|
|
|
Evaluate the module.
|
|
|
|
|
|
|
|
This must be called after the module has been instantiated; otherwise it will
|
|
|
|
throw an error. It could be called also when the module has already been
|
|
|
|
evaluated, in which case it will do one of the following two things:
|
|
|
|
|
|
|
|
- return `undefined` if the initial evaluation ended in success (`module.status`
|
|
|
|
is `'evaluated'`)
|
|
|
|
- rethrow the same exception the initial evaluation threw if the initial
|
|
|
|
evaluation ended in an error (`module.status` is `'errored'`)
|
|
|
|
|
|
|
|
This method cannot be called while the module is being evaluated
|
|
|
|
(`module.status` is `'evaluating'`) to prevent infinite recursion.
|
|
|
|
|
|
|
|
Corresponds to the [Evaluate() concrete method][] field of [Source Text Module
|
|
|
|
Record][]s in the ECMAScript specification.
|
|
|
|
|
|
|
|
### module.instantiate()
|
|
|
|
|
|
|
|
Instantiate the module. This must be called after linking has completed
|
|
|
|
(`linkingStatus` is `'linked'`); otherwise it will throw an error. It may also
|
|
|
|
throw an exception if one of the dependencies does not provide an export the
|
|
|
|
parent module requires.
|
|
|
|
|
|
|
|
However, if this function succeeded, further calls to this function after the
|
|
|
|
initial instantiation will be no-ops, to be consistent with the ECMAScript
|
|
|
|
specification.
|
|
|
|
|
|
|
|
Unlike other methods operating on `Module`, this function completes
|
|
|
|
synchronously and returns nothing.
|
|
|
|
|
|
|
|
Corresponds to the [Instantiate() concrete method][] field of [Source Text
|
|
|
|
Module Record][]s in the ECMAScript specification.
|
|
|
|
|
|
|
|
### module.link(linker)
|
|
|
|
|
|
|
|
* `linker` {Function}
|
|
|
|
* Returns: {Promise}
|
|
|
|
|
|
|
|
Link module dependencies. This method must be called before instantiation, and
|
|
|
|
can only be called once per module.
|
|
|
|
|
|
|
|
Two parameters will be passed to the `linker` function:
|
|
|
|
|
|
|
|
- `specifier` The specifier of the requested module:
|
|
|
|
<!-- eslint-skip -->
|
|
|
|
```js
|
|
|
|
import foo from 'foo';
|
|
|
|
// ^^^^^ the module specifier
|
|
|
|
```
|
2018-01-31 06:03:56 +01:00
|
|
|
- `referencingModule` The `Module` object `link()` is called on.
|
2018-01-14 08:35:51 +01:00
|
|
|
|
|
|
|
The function is expected to return a `Module` object or a `Promise` that
|
|
|
|
eventually resolves to a `Module` object. The returned `Module` must satisfy the
|
|
|
|
following two invariants:
|
|
|
|
|
|
|
|
- It must belong to the same context as the parent `Module`.
|
|
|
|
- Its `linkingStatus` must not be `'errored'`.
|
|
|
|
|
|
|
|
If the returned `Module`'s `linkingStatus` is `'unlinked'`, this method will be
|
|
|
|
recursively called on the returned `Module` with the same provided `linker`
|
|
|
|
function.
|
|
|
|
|
|
|
|
`link()` returns a `Promise` that will either get resolved when all linking
|
|
|
|
instances resolve to a valid `Module`, or rejected if the linker function either
|
|
|
|
throws an exception or returns an invalid `Module`.
|
|
|
|
|
|
|
|
The linker function roughly corresponds to the implementation-defined
|
|
|
|
[HostResolveImportedModule][] abstract operation in the ECMAScript
|
|
|
|
specification, with a few key differences:
|
|
|
|
|
|
|
|
- The linker function is allowed to be asynchronous while
|
|
|
|
[HostResolveImportedModule][] is synchronous.
|
|
|
|
- The linker function is executed during linking, a Node.js-specific stage
|
|
|
|
before instantiation, while [HostResolveImportedModule][] is called during
|
|
|
|
instantiation.
|
|
|
|
|
|
|
|
The actual [HostResolveImportedModule][] implementation used during module
|
|
|
|
instantiation is one that returns the modules linked during linking. Since at
|
|
|
|
that point all modules would have been fully linked already, the
|
|
|
|
[HostResolveImportedModule][] implementation is fully synchronous per
|
|
|
|
specification.
|
|
|
|
|
2018-07-22 12:09:30 +02:00
|
|
|
### module.linkingStatus
|
|
|
|
|
|
|
|
* {string}
|
|
|
|
|
|
|
|
The current linking status of `module`. It will be one of the following values:
|
|
|
|
|
|
|
|
- `'unlinked'`: `module.link()` has not yet been called.
|
|
|
|
- `'linking'`: `module.link()` has been called, but not all Promises returned by
|
|
|
|
the linker function have been resolved yet.
|
|
|
|
- `'linked'`: `module.link()` has been called, and all its dependencies have
|
|
|
|
been successfully linked.
|
|
|
|
- `'errored'`: `module.link()` has been called, but at least one of its
|
|
|
|
dependencies failed to link, either because the callback returned a `Promise`
|
|
|
|
that is rejected, or because the `Module` the callback returned is invalid.
|
|
|
|
|
|
|
|
### module.namespace
|
|
|
|
|
|
|
|
* {Object}
|
|
|
|
|
|
|
|
The namespace object of the module. This is only available after instantiation
|
|
|
|
(`module.instantiate()`) has completed.
|
|
|
|
|
|
|
|
Corresponds to the [GetModuleNamespace][] abstract operation in the ECMAScript
|
|
|
|
specification.
|
|
|
|
|
|
|
|
### module.status
|
|
|
|
|
|
|
|
* {string}
|
|
|
|
|
|
|
|
The current status of the module. Will be one of:
|
|
|
|
|
|
|
|
- `'uninstantiated'`: The module is not instantiated. It may because of any of
|
|
|
|
the following reasons:
|
|
|
|
|
|
|
|
- The module was just created.
|
|
|
|
- `module.instantiate()` has been called on this module, but it failed for
|
|
|
|
some reason.
|
|
|
|
|
|
|
|
This status does not convey any information regarding if `module.link()` has
|
|
|
|
been called. See `module.linkingStatus` for that.
|
|
|
|
|
|
|
|
- `'instantiating'`: The module is currently being instantiated through a
|
|
|
|
`module.instantiate()` call on itself or a parent module.
|
|
|
|
|
|
|
|
- `'instantiated'`: The module has been instantiated successfully, but
|
|
|
|
`module.evaluate()` has not yet been called.
|
|
|
|
|
|
|
|
- `'evaluating'`: The module is being evaluated through a `module.evaluate()` on
|
|
|
|
itself or a parent module.
|
|
|
|
|
|
|
|
- `'evaluated'`: The module has been successfully evaluated.
|
|
|
|
|
|
|
|
- `'errored'`: The module has been evaluated, but an exception was thrown.
|
|
|
|
|
|
|
|
Other than `'errored'`, this status string corresponds to the specification's
|
|
|
|
[Source Text Module Record][]'s `[[Status]]` field. `'errored'` corresponds to
|
|
|
|
`'evaluated'` in the specification, but with `[[EvaluationError]]` set to a
|
|
|
|
value that is not `undefined`.
|
|
|
|
|
|
|
|
### module.url
|
|
|
|
|
|
|
|
* {string}
|
|
|
|
|
|
|
|
The URL of the current module, as set in the constructor.
|
|
|
|
|
2016-05-18 06:56:01 +02:00
|
|
|
## Class: vm.Script
|
2016-05-27 04:21:30 +02:00
|
|
|
<!-- YAML
|
|
|
|
added: v0.3.1
|
|
|
|
-->
|
2012-04-25 09:11:06 +02:00
|
|
|
|
2016-05-18 06:56:01 +02:00
|
|
|
Instances of the `vm.Script` class contain precompiled scripts that can be
|
|
|
|
executed in specific sandboxes (or "contexts").
|
2012-04-25 09:11:06 +02:00
|
|
|
|
2015-11-04 18:30:11 +01:00
|
|
|
### new vm.Script(code, options)
|
2016-05-27 04:21:30 +02:00
|
|
|
<!-- YAML
|
|
|
|
added: v0.3.1
|
2017-02-21 23:38:50 +01:00
|
|
|
changes:
|
|
|
|
- version: v5.7.0
|
|
|
|
pr-url: https://github.com/nodejs/node/pull/4777
|
|
|
|
description: The `cachedData` and `produceCachedData` options are
|
|
|
|
supported now.
|
2018-07-03 09:44:13 +02:00
|
|
|
- version: v10.6.0
|
2018-04-25 19:22:20 +02:00
|
|
|
pr-url: https://github.com/nodejs/node/pull/20300
|
|
|
|
description: The `produceCachedData` is deprecated in favour of
|
|
|
|
`script.createCachedData()`
|
2016-05-27 04:21:30 +02:00
|
|
|
-->
|
2012-04-25 09:11:06 +02:00
|
|
|
|
2016-05-18 06:56:01 +02:00
|
|
|
* `code` {string} The JavaScript code to compile.
|
|
|
|
* `options`
|
|
|
|
* `filename` {string} Specifies the filename used in stack traces produced
|
|
|
|
by this script.
|
|
|
|
* `lineOffset` {number} Specifies the line number offset that is displayed
|
|
|
|
in stack traces produced by this script.
|
|
|
|
* `columnOffset` {number} Specifies the column number offset that is displayed
|
|
|
|
in stack traces produced by this script.
|
2018-09-18 07:28:41 +02:00
|
|
|
* `cachedData` {Buffer|TypedArray|DataView} Provides an optional `Buffer` or
|
|
|
|
`TypedArray`, or `DataView` with V8's code cache data for the supplied
|
|
|
|
source. When supplied, the `cachedDataRejected` value will be set to
|
|
|
|
either `true` or `false` depending on acceptance of the data by V8.
|
2016-05-18 06:56:01 +02:00
|
|
|
* `produceCachedData` {boolean} When `true` and no `cachedData` is present, V8
|
|
|
|
will attempt to produce code cache data for `code`. Upon success, a
|
|
|
|
`Buffer` with V8's code cache data will be produced and stored in the
|
|
|
|
`cachedData` property of the returned `vm.Script` instance.
|
|
|
|
The `cachedDataProduced` value will be set to either `true` or `false`
|
|
|
|
depending on whether code cache data is produced successfully.
|
2018-06-27 20:59:40 +02:00
|
|
|
This option is deprecated in favor of `script.createCachedData()`.
|
2018-08-18 00:26:34 +02:00
|
|
|
* `importModuleDynamically` {Function} Called during evaluation of this
|
|
|
|
module when `import()` is called. This function has the signature
|
|
|
|
`(specifier, module)` where `specifier` is the specifier passed to
|
|
|
|
`import()` and `module` is this `vm.SourceTextModule`. If this option is
|
|
|
|
not specified, calls to `import()` will reject with
|
|
|
|
[`ERR_VM_DYNAMIC_IMPORT_CALLBACK_MISSING`][]. This method can return a
|
|
|
|
[Module Namespace Object][], but returning a `vm.SourceTextModule` is
|
|
|
|
recommended in order to take advantage of error tracking, and to avoid
|
|
|
|
issues with namespaces that contain `then` function exports.
|
2016-05-18 06:56:01 +02:00
|
|
|
|
|
|
|
Creating a new `vm.Script` object compiles `code` but does not run it. The
|
2017-12-28 04:21:06 +01:00
|
|
|
compiled `vm.Script` can be run later multiple times. The `code` is not bound to
|
|
|
|
any global object; rather, it is bound before each run, just for that run.
|
2015-11-04 18:30:11 +01:00
|
|
|
|
2018-04-25 19:22:20 +02:00
|
|
|
### script.createCachedData()
|
|
|
|
<!-- YAML
|
2018-07-03 09:44:13 +02:00
|
|
|
added: v10.6.0
|
2018-04-25 19:22:20 +02:00
|
|
|
-->
|
|
|
|
|
|
|
|
* Returns: {Buffer}
|
|
|
|
|
|
|
|
Creates a code cache that can be used with the Script constructor's
|
|
|
|
`cachedData` option. Returns a Buffer. This method may be called at any
|
|
|
|
time and any number of times.
|
|
|
|
|
|
|
|
```js
|
|
|
|
const script = new vm.Script(`
|
|
|
|
function add(a, b) {
|
|
|
|
return a + b;
|
|
|
|
}
|
|
|
|
|
|
|
|
const x = add(1, 2);
|
|
|
|
`);
|
|
|
|
|
|
|
|
const cacheWithoutX = script.createCachedData();
|
|
|
|
|
|
|
|
script.runInThisContext();
|
|
|
|
|
|
|
|
const cacheWithX = script.createCachedData();
|
|
|
|
```
|
|
|
|
|
2015-11-04 18:30:11 +01:00
|
|
|
### script.runInContext(contextifiedSandbox[, options])
|
2016-05-27 04:21:30 +02:00
|
|
|
<!-- YAML
|
|
|
|
added: v0.3.1
|
2017-02-21 23:38:50 +01:00
|
|
|
changes:
|
|
|
|
- version: v6.3.0
|
|
|
|
pr-url: https://github.com/nodejs/node/pull/6635
|
|
|
|
description: The `breakOnSigint` option is supported now.
|
2016-05-27 04:21:30 +02:00
|
|
|
-->
|
2015-11-04 18:30:11 +01:00
|
|
|
|
2016-05-18 06:56:01 +02:00
|
|
|
* `contextifiedSandbox` {Object} A [contextified][] object as returned by the
|
|
|
|
`vm.createContext()` method.
|
|
|
|
* `options` {Object}
|
|
|
|
* `filename` {string} Specifies the filename used in stack traces produced
|
|
|
|
by this script.
|
|
|
|
* `lineOffset` {number} Specifies the line number offset that is displayed
|
|
|
|
in stack traces produced by this script.
|
|
|
|
* `columnOffset` {number} Specifies the column number offset that is displayed
|
|
|
|
in stack traces produced by this script.
|
|
|
|
* `displayErrors` {boolean} When `true`, if an [`Error`][] error occurs
|
|
|
|
while compiling the `code`, the line of code causing the error is attached
|
|
|
|
to the stack trace.
|
2018-10-12 19:25:25 +02:00
|
|
|
* `timeout` {integer} Specifies the number of milliseconds to execute `code`
|
2016-05-18 06:56:01 +02:00
|
|
|
before terminating execution. If execution is terminated, an [`Error`][]
|
2018-10-12 19:25:25 +02:00
|
|
|
will be thrown. This value must be a strictly positive integer.
|
2016-05-08 03:28:47 +02:00
|
|
|
* `breakOnSigint`: if `true`, the execution will be terminated when
|
|
|
|
`SIGINT` (Ctrl+C) is received. Existing handlers for the
|
2018-04-02 07:38:48 +02:00
|
|
|
event that have been attached via `process.on('SIGINT')` will be disabled
|
2016-05-08 03:28:47 +02:00
|
|
|
during script execution, but will continue to work after that.
|
|
|
|
If execution is terminated, an [`Error`][] will be thrown.
|
|
|
|
|
2016-05-18 06:56:01 +02:00
|
|
|
Runs the compiled code contained by the `vm.Script` object within the given
|
2016-01-31 15:29:27 +01:00
|
|
|
`contextifiedSandbox` and returns the result. Running code does not have access
|
|
|
|
to local scope.
|
2015-11-04 18:30:11 +01:00
|
|
|
|
2016-05-18 06:56:01 +02:00
|
|
|
The following example compiles code that increments a global variable, sets
|
|
|
|
the value of another global variable, then execute the code multiple times.
|
|
|
|
The globals are contained in the `sandbox` object.
|
2015-11-04 18:30:11 +01:00
|
|
|
|
2016-01-17 18:39:07 +01:00
|
|
|
```js
|
|
|
|
const util = require('util');
|
|
|
|
const vm = require('vm');
|
2012-04-25 09:11:06 +02:00
|
|
|
|
2016-05-18 06:56:01 +02:00
|
|
|
const sandbox = {
|
2016-01-17 18:39:07 +01:00
|
|
|
animal: 'cat',
|
|
|
|
count: 2
|
|
|
|
};
|
2012-04-25 09:11:06 +02:00
|
|
|
|
2016-05-18 06:56:01 +02:00
|
|
|
const script = new vm.Script('count += 1; name = "kitty";');
|
2012-04-25 09:11:06 +02:00
|
|
|
|
2017-10-07 02:28:37 +02:00
|
|
|
const context = vm.createContext(sandbox);
|
2017-04-22 14:22:40 +02:00
|
|
|
for (let i = 0; i < 10; ++i) {
|
2016-01-17 18:39:07 +01:00
|
|
|
script.runInContext(context);
|
|
|
|
}
|
2012-04-25 09:11:06 +02:00
|
|
|
|
2016-01-17 18:39:07 +01:00
|
|
|
console.log(util.inspect(sandbox));
|
2012-04-25 09:11:06 +02:00
|
|
|
|
2016-01-17 18:39:07 +01:00
|
|
|
// { animal: 'cat', count: 12, name: 'kitty' }
|
|
|
|
```
|
2010-10-28 14:18:16 +02:00
|
|
|
|
2018-02-06 06:55:16 +01:00
|
|
|
Using the `timeout` or `breakOnSigint` options will result in new event loops
|
|
|
|
and corresponding threads being started, which have a non-zero performance
|
|
|
|
overhead.
|
2017-04-29 23:48:03 +02:00
|
|
|
|
2017-06-06 11:00:32 +02:00
|
|
|
### script.runInNewContext([sandbox[, options]])
|
2016-05-27 04:21:30 +02:00
|
|
|
<!-- YAML
|
|
|
|
added: v0.3.1
|
2018-03-19 06:56:00 +01:00
|
|
|
changes:
|
2018-03-02 18:53:46 +01:00
|
|
|
- version: v10.0.0
|
2018-03-19 06:56:00 +01:00
|
|
|
pr-url: https://github.com/nodejs/node/pull/19016
|
|
|
|
description: The `contextCodeGeneration` option is supported now.
|
2016-05-27 04:21:30 +02:00
|
|
|
-->
|
2015-11-04 18:30:11 +01:00
|
|
|
|
2016-05-18 06:56:01 +02:00
|
|
|
* `sandbox` {Object} An object that will be [contextified][]. If `undefined`, a
|
|
|
|
new object will be created.
|
|
|
|
* `options` {Object}
|
|
|
|
* `filename` {string} Specifies the filename used in stack traces produced
|
|
|
|
by this script.
|
|
|
|
* `lineOffset` {number} Specifies the line number offset that is displayed
|
|
|
|
in stack traces produced by this script.
|
|
|
|
* `columnOffset` {number} Specifies the column number offset that is displayed
|
|
|
|
in stack traces produced by this script.
|
|
|
|
* `displayErrors` {boolean} When `true`, if an [`Error`][] error occurs
|
|
|
|
while compiling the `code`, the line of code causing the error is attached
|
|
|
|
to the stack trace.
|
2018-10-12 19:25:25 +02:00
|
|
|
* `timeout` {integer} Specifies the number of milliseconds to execute `code`
|
2016-05-18 06:56:01 +02:00
|
|
|
before terminating execution. If execution is terminated, an [`Error`][]
|
2018-10-12 19:25:25 +02:00
|
|
|
will be thrown. This value must be a strictly positive integer.
|
2017-12-17 22:38:15 +01:00
|
|
|
* `contextName` {string} Human-readable name of the newly created context.
|
|
|
|
**Default:** `'VM Context i'`, where `i` is an ascending numerical index of
|
|
|
|
the created context.
|
|
|
|
* `contextOrigin` {string} [Origin][origin] corresponding to the newly
|
|
|
|
created context for display purposes. The origin should be formatted like a
|
|
|
|
URL, but with only the scheme, host, and port (if necessary), like the
|
|
|
|
value of the [`url.origin`][] property of a [`URL`][] object. Most notably,
|
|
|
|
this string should omit the trailing slash, as that denotes a path.
|
|
|
|
**Default:** `''`.
|
2018-02-26 21:29:41 +01:00
|
|
|
* `contextCodeGeneration` {Object}
|
|
|
|
* `strings` {boolean} If set to false any calls to `eval` or function
|
|
|
|
constructors (`Function`, `GeneratorFunction`, etc) will throw an
|
2018-04-02 03:44:32 +02:00
|
|
|
`EvalError`. **Default:** `true`.
|
2018-02-26 21:29:41 +01:00
|
|
|
* `wasm` {boolean} If set to false any attempt to compile a WebAssembly
|
2018-04-02 03:44:32 +02:00
|
|
|
module will throw a `WebAssembly.CompileError`. **Default:** `true`.
|
2016-05-18 06:56:01 +02:00
|
|
|
|
|
|
|
First contextifies the given `sandbox`, runs the compiled code contained by
|
|
|
|
the `vm.Script` object within the created sandbox, and returns the result.
|
|
|
|
Running code does not have access to local scope.
|
|
|
|
|
|
|
|
The following example compiles code that sets a global variable, then executes
|
|
|
|
the code multiple times in different contexts. The globals are set on and
|
|
|
|
contained within each individual `sandbox`.
|
2015-11-04 18:30:11 +01:00
|
|
|
|
2016-01-17 18:39:07 +01:00
|
|
|
```js
|
|
|
|
const util = require('util');
|
|
|
|
const vm = require('vm');
|
2015-11-04 18:30:11 +01:00
|
|
|
|
2016-01-17 18:39:07 +01:00
|
|
|
const script = new vm.Script('globalVar = "set"');
|
2015-11-04 18:30:11 +01:00
|
|
|
|
2016-05-18 06:56:01 +02:00
|
|
|
const sandboxes = [{}, {}, {}];
|
2016-01-17 18:39:07 +01:00
|
|
|
sandboxes.forEach((sandbox) => {
|
|
|
|
script.runInNewContext(sandbox);
|
|
|
|
});
|
2015-11-04 18:30:11 +01:00
|
|
|
|
2016-01-17 18:39:07 +01:00
|
|
|
console.log(util.inspect(sandboxes));
|
2015-11-04 18:30:11 +01:00
|
|
|
|
2016-01-17 18:39:07 +01:00
|
|
|
// [{ globalVar: 'set' }, { globalVar: 'set' }, { globalVar: 'set' }]
|
|
|
|
```
|
2015-11-04 18:30:11 +01:00
|
|
|
|
|
|
|
### script.runInThisContext([options])
|
2016-05-27 04:21:30 +02:00
|
|
|
<!-- YAML
|
|
|
|
added: v0.3.1
|
|
|
|
-->
|
2015-11-04 18:30:11 +01:00
|
|
|
|
2016-05-18 06:56:01 +02:00
|
|
|
* `options` {Object}
|
|
|
|
* `filename` {string} Specifies the filename used in stack traces produced
|
|
|
|
by this script.
|
|
|
|
* `lineOffset` {number} Specifies the line number offset that is displayed
|
|
|
|
in stack traces produced by this script.
|
|
|
|
* `columnOffset` {number} Specifies the column number offset that is displayed
|
|
|
|
in stack traces produced by this script.
|
|
|
|
* `displayErrors` {boolean} When `true`, if an [`Error`][] error occurs
|
|
|
|
while compiling the `code`, the line of code causing the error is attached
|
|
|
|
to the stack trace.
|
2018-10-12 19:25:25 +02:00
|
|
|
* `timeout` {integer} Specifies the number of milliseconds to execute `code`
|
2016-05-18 06:56:01 +02:00
|
|
|
before terminating execution. If execution is terminated, an [`Error`][]
|
2018-10-12 19:25:25 +02:00
|
|
|
will be thrown. This value must be a strictly positive integer.
|
2016-05-18 06:56:01 +02:00
|
|
|
|
|
|
|
Runs the compiled code contained by the `vm.Script` within the context of the
|
|
|
|
current `global` object. Running code does not have access to local scope, but
|
|
|
|
*does* have access to the current `global` object.
|
|
|
|
|
|
|
|
The following example compiles code that increments a `global` variable then
|
|
|
|
executes that code multiple times:
|
2015-11-04 18:30:11 +01:00
|
|
|
|
2016-01-17 18:39:07 +01:00
|
|
|
```js
|
|
|
|
const vm = require('vm');
|
2015-11-04 18:30:11 +01:00
|
|
|
|
2016-01-17 18:39:07 +01:00
|
|
|
global.globalVar = 0;
|
2010-10-28 14:18:16 +02:00
|
|
|
|
2016-01-17 18:39:07 +01:00
|
|
|
const script = new vm.Script('globalVar += 1', { filename: 'myfile.vm' });
|
2015-11-04 18:30:11 +01:00
|
|
|
|
2017-04-22 14:22:40 +02:00
|
|
|
for (let i = 0; i < 1000; ++i) {
|
2016-01-17 18:39:07 +01:00
|
|
|
script.runInThisContext();
|
|
|
|
}
|
2015-11-04 18:30:11 +01:00
|
|
|
|
2016-01-17 18:39:07 +01:00
|
|
|
console.log(globalVar);
|
2015-11-04 18:30:11 +01:00
|
|
|
|
2016-01-17 18:39:07 +01:00
|
|
|
// 1000
|
|
|
|
```
|
2015-11-04 18:30:11 +01:00
|
|
|
|
2018-06-28 08:35:19 +02:00
|
|
|
## vm.compileFunction(code[, params[, options]])
|
|
|
|
<!-- YAML
|
2018-09-06, Version 10.10.0 (Current)
Notable changes:
* child_process:
* `TypedArray` and `DataView` values are now accepted as input by
`execFileSync` and `spawnSync`. https://github.com/nodejs/node/pull/22409
* coverage:
* Native V8 code coverage information can now be output to disk by setting the
environment variable `NODE_V8_COVERAGE` to a directory. https://github.com/nodejs/node/pull/22527
* deps:
* The bundled npm was upgraded to version 6.4.1. https://github.com/nodejs/node/pull/22591
* Changelogs:
[6.3.0-next.0](https://github.com/npm/cli/releases/tag/v6.3.0-next.0)
[6.3.0](https://github.com/npm/cli/releases/tag/v6.3.0)
[6.4.0](https://github.com/npm/cli/releases/tag/v6.4.0)
[6.4.1](https://github.com/npm/cli/releases/tag/v6.4.1)
* fs:
* The methods `fs.read`, `fs.readSync`, `fs.write`, `fs.writeSync`,
`fs.writeFile` and `fs.writeFileSync` now all accept `TypedArray` and
`DataView` objects. https://github.com/nodejs/node/pull/22150
* A new boolean option, `withFileTypes`, can be passed to to `fs.readdir` and
`fs.readdirSync`. If set to true, the methods return an array of directory
entries. These are objects that can be used to determine the type of each
entry and filter them based on that without calling `fs.stat`. https://github.com/nodejs/node/pull/22020
* http2:
* The `http2` module is no longer experimental. https://github.com/nodejs/node/pull/22466
* os:
* Added two new methods: `os.getPriority` and `os.setPriority`, allowing to
manipulate the scheduling priority of processes. https://github.com/nodejs/node/pull/22407
* process:
* Added `process.allowedNodeEnvironmentFlags`. This object can be used to
programmatically validate and list flags that are allowed in the
`NODE_OPTIONS` environment variable. https://github.com/nodejs/node/pull/19335
* src:
* Deprecated option variables in public C++ API. https://github.com/nodejs/node/pull/22515
* Refactored options parsing. https://github.com/nodejs/node/pull/22392
* vm:
* Added `vm.compileFunction`, a method to create new JavaScript functions from
a source body, with options similar to those of the other `vm` methods. https://github.com/nodejs/node/pull/21571
* Added new collaborators:
* [lundibundi](https://github.com/lundibundi) - Denys Otrishko
PR-URL: https://github.com/nodejs/node/pull/22716
2018-09-03 20:14:31 +02:00
|
|
|
added: v10.10.0
|
2018-06-28 08:35:19 +02:00
|
|
|
-->
|
|
|
|
* `code` {string} The body of the function to compile.
|
|
|
|
* `params` {string[]} An array of strings containing all parameters for the
|
|
|
|
function.
|
|
|
|
* `options` {Object}
|
|
|
|
* `filename` {string} Specifies the filename used in stack traces produced
|
|
|
|
by this script. **Default:** `''`.
|
|
|
|
* `lineOffset` {number} Specifies the line number offset that is displayed
|
|
|
|
in stack traces produced by this script. **Default:** `0`.
|
|
|
|
* `columnOffset` {number} Specifies the column number offset that is displayed
|
|
|
|
in stack traces produced by this script. **Default:** `0`.
|
2018-09-18 07:28:41 +02:00
|
|
|
* `cachedData` {Buffer|TypedArray|DataView} Provides an optional `Buffer` or
|
|
|
|
`TypedArray`, or `DataView` with V8's code cache data for the supplied
|
|
|
|
source.
|
2018-06-28 08:35:19 +02:00
|
|
|
* `produceCachedData` {boolean} Specifies whether to produce new cache data.
|
|
|
|
**Default:** `false`.
|
2018-10-01 20:56:07 +02:00
|
|
|
* `parsingContext` {Object} The [contextified][] sandbox in which the said
|
|
|
|
function should be compiled in.
|
2018-06-28 08:35:19 +02:00
|
|
|
* `contextExtensions` {Object[]} An array containing a collection of context
|
|
|
|
extensions (objects wrapping the current scope) to be applied while
|
|
|
|
compiling. **Default:** `[]`.
|
|
|
|
|
|
|
|
Compiles the given code into the provided context/sandbox (if no context is
|
|
|
|
supplied, the current context is used), and returns it wrapped inside a
|
|
|
|
function with the given `params`.
|
|
|
|
|
2017-12-17 22:38:15 +01:00
|
|
|
## vm.createContext([sandbox[, options]])
|
2016-05-27 04:21:30 +02:00
|
|
|
<!-- YAML
|
|
|
|
added: v0.3.1
|
2018-03-19 06:56:00 +01:00
|
|
|
changes:
|
2018-03-02 18:53:46 +01:00
|
|
|
- version: v10.0.0
|
2018-03-16 15:23:39 +01:00
|
|
|
pr-url: https://github.com/nodejs/node/pull/19398
|
|
|
|
description: The `sandbox` option can no longer be a function.
|
2018-03-02 18:53:46 +01:00
|
|
|
- version: v10.0.0
|
2018-03-19 06:56:00 +01:00
|
|
|
pr-url: https://github.com/nodejs/node/pull/19016
|
|
|
|
description: The `codeGeneration` option is supported now.
|
2016-05-27 04:21:30 +02:00
|
|
|
-->
|
2010-10-28 14:18:16 +02:00
|
|
|
|
2016-05-18 06:56:01 +02:00
|
|
|
* `sandbox` {Object}
|
2017-12-17 22:38:15 +01:00
|
|
|
* `options` {Object}
|
|
|
|
* `name` {string} Human-readable name of the newly created context.
|
|
|
|
**Default:** `'VM Context i'`, where `i` is an ascending numerical index of
|
|
|
|
the created context.
|
|
|
|
* `origin` {string} [Origin][origin] corresponding to the newly created
|
|
|
|
context for display purposes. The origin should be formatted like a URL,
|
|
|
|
but with only the scheme, host, and port (if necessary), like the value of
|
|
|
|
the [`url.origin`][] property of a [`URL`][] object. Most notably, this
|
|
|
|
string should omit the trailing slash, as that denotes a path.
|
|
|
|
**Default:** `''`.
|
2018-02-26 21:29:41 +01:00
|
|
|
* `codeGeneration` {Object}
|
|
|
|
* `strings` {boolean} If set to false any calls to `eval` or function
|
|
|
|
constructors (`Function`, `GeneratorFunction`, etc) will throw an
|
2018-04-02 03:44:32 +02:00
|
|
|
`EvalError`. **Default:** `true`.
|
2018-02-26 21:29:41 +01:00
|
|
|
* `wasm` {boolean} If set to false any attempt to compile a WebAssembly
|
2018-04-02 03:44:32 +02:00
|
|
|
module will throw a `WebAssembly.CompileError`. **Default:** `true`.
|
2016-05-18 06:56:01 +02:00
|
|
|
|
|
|
|
If given a `sandbox` object, the `vm.createContext()` method will [prepare
|
2016-06-15 08:09:16 +02:00
|
|
|
that sandbox][contextified] so that it can be used in calls to
|
|
|
|
[`vm.runInContext()`][] or [`script.runInContext()`][]. Inside such scripts,
|
|
|
|
the `sandbox` object will be the global object, retaining all of its existing
|
|
|
|
properties but also having the built-in objects and functions any standard
|
2016-12-29 14:00:43 +01:00
|
|
|
[global object][] has. Outside of scripts run by the vm module, global variables
|
|
|
|
will remain unchanged.
|
|
|
|
|
|
|
|
```js
|
|
|
|
const util = require('util');
|
|
|
|
const vm = require('vm');
|
|
|
|
|
2017-04-22 14:22:40 +02:00
|
|
|
global.globalVar = 3;
|
2016-12-29 14:00:43 +01:00
|
|
|
|
|
|
|
const sandbox = { globalVar: 1 };
|
|
|
|
vm.createContext(sandbox);
|
|
|
|
|
|
|
|
vm.runInContext('globalVar *= 2;', sandbox);
|
|
|
|
|
2017-04-22 14:22:40 +02:00
|
|
|
console.log(util.inspect(sandbox)); // { globalVar: 2 }
|
2016-12-29 14:00:43 +01:00
|
|
|
|
|
|
|
console.log(util.inspect(globalVar)); // 3
|
|
|
|
```
|
2010-10-28 14:18:16 +02:00
|
|
|
|
2016-05-18 06:56:01 +02:00
|
|
|
If `sandbox` is omitted (or passed explicitly as `undefined`), a new, empty
|
|
|
|
[contextified][] sandbox object will be returned.
|
2010-10-28 14:18:16 +02:00
|
|
|
|
2016-05-18 06:56:01 +02:00
|
|
|
The `vm.createContext()` method is primarily useful for creating a single
|
|
|
|
sandbox that can be used to run multiple scripts. For instance, if emulating a
|
|
|
|
web browser, the method can be used to create a single sandbox representing a
|
|
|
|
window's global object, then run all `<script>` tags together within the context
|
|
|
|
of that sandbox.
|
2010-10-28 14:18:16 +02:00
|
|
|
|
2017-12-17 22:38:15 +01:00
|
|
|
The provided `name` and `origin` of the context are made visible through the
|
|
|
|
Inspector API.
|
|
|
|
|
2013-08-25 01:46:31 +02:00
|
|
|
## vm.isContext(sandbox)
|
2016-05-27 04:21:30 +02:00
|
|
|
<!-- YAML
|
|
|
|
added: v0.11.7
|
|
|
|
-->
|
2010-10-28 14:18:16 +02:00
|
|
|
|
2016-05-18 06:56:01 +02:00
|
|
|
* `sandbox` {Object}
|
2018-04-11 20:07:14 +02:00
|
|
|
* Returns: {boolean}
|
2010-10-28 14:18:16 +02:00
|
|
|
|
2016-05-18 06:56:01 +02:00
|
|
|
Returns `true` if the given `sandbox` object has been [contextified][] using
|
|
|
|
[`vm.createContext()`][].
|
2010-10-28 14:18:16 +02:00
|
|
|
|
2016-05-18 06:56:01 +02:00
|
|
|
## vm.runInContext(code, contextifiedSandbox[, options])
|
2010-10-28 14:18:16 +02:00
|
|
|
|
2016-05-18 06:56:01 +02:00
|
|
|
* `code` {string} The JavaScript code to compile and run.
|
|
|
|
* `contextifiedSandbox` {Object} The [contextified][] object that will be used
|
|
|
|
as the `global` when the `code` is compiled and run.
|
2018-04-10 10:21:56 +02:00
|
|
|
* `options` {Object|string}
|
2016-05-18 06:56:01 +02:00
|
|
|
* `filename` {string} Specifies the filename used in stack traces produced
|
|
|
|
by this script.
|
|
|
|
* `lineOffset` {number} Specifies the line number offset that is displayed
|
|
|
|
in stack traces produced by this script.
|
|
|
|
* `columnOffset` {number} Specifies the column number offset that is displayed
|
|
|
|
in stack traces produced by this script.
|
|
|
|
* `displayErrors` {boolean} When `true`, if an [`Error`][] error occurs
|
|
|
|
while compiling the `code`, the line of code causing the error is attached
|
|
|
|
to the stack trace.
|
2018-10-12 19:25:25 +02:00
|
|
|
* `timeout` {integer} Specifies the number of milliseconds to execute `code`
|
2016-05-18 06:56:01 +02:00
|
|
|
before terminating execution. If execution is terminated, an [`Error`][]
|
2018-10-12 19:25:25 +02:00
|
|
|
will be thrown. This value must be a strictly positive integer.
|
2016-05-18 06:56:01 +02:00
|
|
|
|
|
|
|
The `vm.runInContext()` method compiles `code`, runs it within the context of
|
|
|
|
the `contextifiedSandbox`, then returns the result. Running code does not have
|
|
|
|
access to the local scope. The `contextifiedSandbox` object *must* have been
|
|
|
|
previously [contextified][] using the [`vm.createContext()`][] method.
|
|
|
|
|
2018-04-10 10:21:56 +02:00
|
|
|
If `options` is a string, then it specifies the filename.
|
|
|
|
|
2016-05-18 06:56:01 +02:00
|
|
|
The following example compiles and executes different scripts using a single
|
|
|
|
[contextified][] object:
|
2010-10-28 14:18:16 +02:00
|
|
|
|
2016-01-17 18:39:07 +01:00
|
|
|
```js
|
|
|
|
const util = require('util');
|
|
|
|
const vm = require('vm');
|
2010-10-28 14:18:16 +02:00
|
|
|
|
2016-01-17 18:39:07 +01:00
|
|
|
const sandbox = { globalVar: 1 };
|
|
|
|
vm.createContext(sandbox);
|
2011-06-02 21:45:30 +02:00
|
|
|
|
2017-04-22 14:22:40 +02:00
|
|
|
for (let i = 0; i < 10; ++i) {
|
2016-05-18 06:56:01 +02:00
|
|
|
vm.runInContext('globalVar *= 2;', sandbox);
|
2016-01-17 18:39:07 +01:00
|
|
|
}
|
|
|
|
console.log(util.inspect(sandbox));
|
2011-06-02 21:45:30 +02:00
|
|
|
|
2016-01-17 18:39:07 +01:00
|
|
|
// { globalVar: 1024 }
|
|
|
|
```
|
2011-06-02 21:45:30 +02:00
|
|
|
|
2018-07-15 17:27:07 +02:00
|
|
|
## vm.runInNewContext(code[, sandbox[, options]])
|
2016-05-27 04:21:30 +02:00
|
|
|
<!-- YAML
|
|
|
|
added: v0.3.1
|
|
|
|
-->
|
2011-06-02 21:45:30 +02:00
|
|
|
|
2016-05-18 06:56:01 +02:00
|
|
|
* `code` {string} The JavaScript code to compile and run.
|
|
|
|
* `sandbox` {Object} An object that will be [contextified][]. If `undefined`, a
|
|
|
|
new object will be created.
|
2018-04-10 10:21:56 +02:00
|
|
|
* `options` {Object|string}
|
2016-05-18 06:56:01 +02:00
|
|
|
* `filename` {string} Specifies the filename used in stack traces produced
|
|
|
|
by this script.
|
|
|
|
* `lineOffset` {number} Specifies the line number offset that is displayed
|
|
|
|
in stack traces produced by this script.
|
|
|
|
* `columnOffset` {number} Specifies the column number offset that is displayed
|
|
|
|
in stack traces produced by this script.
|
|
|
|
* `displayErrors` {boolean} When `true`, if an [`Error`][] error occurs
|
|
|
|
while compiling the `code`, the line of code causing the error is attached
|
|
|
|
to the stack trace.
|
2018-10-12 19:25:25 +02:00
|
|
|
* `timeout` {integer} Specifies the number of milliseconds to execute `code`
|
2016-05-18 06:56:01 +02:00
|
|
|
before terminating execution. If execution is terminated, an [`Error`][]
|
2018-10-12 19:25:25 +02:00
|
|
|
will be thrown. This value must be a strictly positive integer.
|
2017-12-17 22:38:15 +01:00
|
|
|
* `contextName` {string} Human-readable name of the newly created context.
|
|
|
|
**Default:** `'VM Context i'`, where `i` is an ascending numerical index of
|
|
|
|
the created context.
|
|
|
|
* `contextOrigin` {string} [Origin][origin] corresponding to the newly
|
|
|
|
created context for display purposes. The origin should be formatted like a
|
|
|
|
URL, but with only the scheme, host, and port (if necessary), like the
|
|
|
|
value of the [`url.origin`][] property of a [`URL`][] object. Most notably,
|
|
|
|
this string should omit the trailing slash, as that denotes a path.
|
|
|
|
**Default:** `''`.
|
2016-05-18 06:56:01 +02:00
|
|
|
|
2016-08-07 11:53:16 +02:00
|
|
|
The `vm.runInNewContext()` first contextifies the given `sandbox` object (or
|
2016-05-18 06:56:01 +02:00
|
|
|
creates a new `sandbox` if passed as `undefined`), compiles the `code`, runs it
|
|
|
|
within the context of the created context, then returns the result. Running code
|
|
|
|
does not have access to the local scope.
|
|
|
|
|
2018-04-10 10:21:56 +02:00
|
|
|
If `options` is a string, then it specifies the filename.
|
|
|
|
|
2016-05-18 06:56:01 +02:00
|
|
|
The following example compiles and executes code that increments a global
|
|
|
|
variable and sets a new one. These globals are contained in the `sandbox`.
|
2011-06-02 21:45:30 +02:00
|
|
|
|
2016-01-17 18:39:07 +01:00
|
|
|
```js
|
|
|
|
const util = require('util');
|
|
|
|
const vm = require('vm');
|
2011-06-02 21:45:30 +02:00
|
|
|
|
2016-01-17 18:39:07 +01:00
|
|
|
const sandbox = {
|
|
|
|
animal: 'cat',
|
|
|
|
count: 2
|
|
|
|
};
|
2010-10-28 14:18:16 +02:00
|
|
|
|
2016-01-17 18:39:07 +01:00
|
|
|
vm.runInNewContext('count += 1; name = "kitty"', sandbox);
|
|
|
|
console.log(util.inspect(sandbox));
|
2010-10-28 14:18:16 +02:00
|
|
|
|
2016-01-17 18:39:07 +01:00
|
|
|
// { animal: 'cat', count: 3, name: 'kitty' }
|
|
|
|
```
|
2010-10-28 14:18:16 +02:00
|
|
|
|
2015-11-04 18:30:11 +01:00
|
|
|
## vm.runInThisContext(code[, options])
|
2016-05-27 04:21:30 +02:00
|
|
|
<!-- YAML
|
|
|
|
added: v0.3.1
|
|
|
|
-->
|
2010-10-28 14:18:16 +02:00
|
|
|
|
2016-05-18 06:56:01 +02:00
|
|
|
* `code` {string} The JavaScript code to compile and run.
|
2018-04-10 10:21:56 +02:00
|
|
|
* `options` {Object|string}
|
2016-05-18 06:56:01 +02:00
|
|
|
* `filename` {string} Specifies the filename used in stack traces produced
|
|
|
|
by this script.
|
|
|
|
* `lineOffset` {number} Specifies the line number offset that is displayed
|
|
|
|
in stack traces produced by this script.
|
|
|
|
* `columnOffset` {number} Specifies the column number offset that is displayed
|
|
|
|
in stack traces produced by this script.
|
|
|
|
* `displayErrors` {boolean} When `true`, if an [`Error`][] error occurs
|
|
|
|
while compiling the `code`, the line of code causing the error is attached
|
|
|
|
to the stack trace.
|
2018-10-12 19:25:25 +02:00
|
|
|
* `timeout` {integer} Specifies the number of milliseconds to execute `code`
|
2016-05-18 06:56:01 +02:00
|
|
|
before terminating execution. If execution is terminated, an [`Error`][]
|
2018-10-12 19:25:25 +02:00
|
|
|
will be thrown. This value must be a strictly positive integer.
|
2016-05-18 06:56:01 +02:00
|
|
|
|
|
|
|
`vm.runInThisContext()` compiles `code`, runs it within the context of the
|
|
|
|
current `global` and returns the result. Running code does not have access to
|
|
|
|
local scope, but does have access to the current `global` object.
|
|
|
|
|
2018-04-10 10:21:56 +02:00
|
|
|
If `options` is a string, then it specifies the filename.
|
|
|
|
|
2016-05-18 06:56:01 +02:00
|
|
|
The following example illustrates using both `vm.runInThisContext()` and
|
|
|
|
the JavaScript [`eval()`][] function to run the same code:
|
2014-08-22 15:09:24 +02:00
|
|
|
|
2017-04-22 14:22:40 +02:00
|
|
|
<!-- eslint-disable prefer-const -->
|
2016-01-17 18:39:07 +01:00
|
|
|
```js
|
|
|
|
const vm = require('vm');
|
2017-04-22 14:22:40 +02:00
|
|
|
let localVar = 'initial value';
|
2012-02-27 20:09:35 +01:00
|
|
|
|
2016-01-17 18:39:07 +01:00
|
|
|
const vmResult = vm.runInThisContext('localVar = "vm";');
|
2016-07-27 04:25:08 +02:00
|
|
|
console.log('vmResult:', vmResult);
|
|
|
|
console.log('localVar:', localVar);
|
2013-08-25 01:46:31 +02:00
|
|
|
|
2016-01-17 18:39:07 +01:00
|
|
|
const evalResult = eval('localVar = "eval";');
|
2016-07-27 04:25:08 +02:00
|
|
|
console.log('evalResult:', evalResult);
|
|
|
|
console.log('localVar:', localVar);
|
2013-08-25 01:46:31 +02:00
|
|
|
|
2016-01-17 18:39:07 +01:00
|
|
|
// vmResult: 'vm', localVar: 'initial value'
|
|
|
|
// evalResult: 'eval', localVar: 'eval'
|
|
|
|
```
|
2013-08-25 01:46:31 +02:00
|
|
|
|
2016-05-18 06:56:01 +02:00
|
|
|
Because `vm.runInThisContext()` does not have access to the local scope,
|
|
|
|
`localVar` is unchanged. In contrast, [`eval()`][] *does* have access to the
|
|
|
|
local scope, so the value `localVar` is changed. In this way
|
2016-06-15 08:09:16 +02:00
|
|
|
`vm.runInThisContext()` is much like an [indirect `eval()` call][], e.g.
|
2016-05-18 06:56:01 +02:00
|
|
|
`(0,eval)('code')`.
|
|
|
|
|
|
|
|
## Example: Running an HTTP Server within a VM
|
|
|
|
|
2018-02-12 08:31:55 +01:00
|
|
|
When using either [`script.runInThisContext()`][] or
|
|
|
|
[`vm.runInThisContext()`][], the code is executed within the current V8 global
|
|
|
|
context. The code passed to this VM context will have its own isolated scope.
|
2016-05-18 06:56:01 +02:00
|
|
|
|
|
|
|
In order to run a simple web server using the `http` module the code passed to
|
|
|
|
the context must either call `require('http')` on its own, or have a reference
|
|
|
|
to the `http` module passed to it. For instance:
|
2016-04-21 09:59:10 +02:00
|
|
|
|
|
|
|
```js
|
|
|
|
'use strict';
|
|
|
|
const vm = require('vm');
|
|
|
|
|
2017-05-31 15:50:50 +02:00
|
|
|
const code = `
|
2017-11-26 09:28:21 +01:00
|
|
|
((require) => {
|
2017-05-31 15:50:50 +02:00
|
|
|
const http = require('http');
|
2016-04-21 09:59:10 +02:00
|
|
|
|
2017-05-31 15:50:50 +02:00
|
|
|
http.createServer((request, response) => {
|
|
|
|
response.writeHead(200, { 'Content-Type': 'text/plain' });
|
|
|
|
response.end('Hello World\\n');
|
|
|
|
}).listen(8124);
|
2016-04-21 09:59:10 +02:00
|
|
|
|
2017-05-31 15:50:50 +02:00
|
|
|
console.log('Server running at http://127.0.0.1:8124/');
|
|
|
|
})`;
|
2016-04-21 09:59:10 +02:00
|
|
|
|
2017-04-21 16:38:31 +02:00
|
|
|
vm.runInThisContext(code)(require);
|
2018-04-29 13:16:44 +02:00
|
|
|
```
|
2016-04-21 09:59:10 +02:00
|
|
|
|
2018-02-06 06:55:16 +01:00
|
|
|
The `require()` in the above case shares the state with the context it is
|
|
|
|
passed from. This may introduce risks when untrusted code is executed, e.g.
|
2017-01-09 16:05:03 +01:00
|
|
|
altering objects in the context in unwanted ways.
|
2016-05-18 06:56:01 +02:00
|
|
|
|
|
|
|
## What does it mean to "contextify" an object?
|
|
|
|
|
|
|
|
All JavaScript executed within Node.js runs within the scope of a "context".
|
|
|
|
According to the [V8 Embedder's Guide][]:
|
|
|
|
|
|
|
|
> In V8, a context is an execution environment that allows separate, unrelated,
|
|
|
|
> JavaScript applications to run in a single instance of V8. You must explicitly
|
|
|
|
> specify the context in which you want any JavaScript code to be run.
|
|
|
|
|
|
|
|
When the method `vm.createContext()` is called, the `sandbox` object that is
|
|
|
|
passed in (or a newly created object if `sandbox` is `undefined`) is associated
|
|
|
|
internally with a new instance of a V8 Context. This V8 Context provides the
|
2017-06-06 11:00:32 +02:00
|
|
|
`code` run using the `vm` module's methods with an isolated global environment
|
2016-05-18 06:56:01 +02:00
|
|
|
within which it can operate. The process of creating the V8 Context and
|
|
|
|
associating it with the `sandbox` object is what this document refers to as
|
|
|
|
"contextifying" the `sandbox`.
|
2016-04-21 09:59:10 +02:00
|
|
|
|
2018-10-19 01:37:24 +02:00
|
|
|
## Timeout limitations when using process.nextTick(), Promises, and queueMicrotask()
|
|
|
|
|
|
|
|
Because of the internal mechanics of how the `process.nextTick()` queue and
|
|
|
|
the microtask queue that underlies Promises are implemented within V8 and
|
|
|
|
Node.js, it is possible for code running within a context to "escape" the
|
|
|
|
`timeout` set using `vm.runInContext()`, `vm.runInNewContext()`, and
|
|
|
|
`vm.runInThisContext()`.
|
|
|
|
|
|
|
|
For example, the following code executed by `vm.runInNewContext()` with a
|
|
|
|
timeout of 5 milliseconds schedules an infinite loop to run after a promise
|
|
|
|
resolves. The scheduled loop is never interrupted by the timeout:
|
|
|
|
|
|
|
|
```js
|
|
|
|
const vm = require('vm');
|
|
|
|
|
|
|
|
function loop() {
|
|
|
|
while (1) console.log(Date.now());
|
|
|
|
}
|
|
|
|
|
|
|
|
vm.runInNewContext(
|
|
|
|
'Promise.resolve().then(loop);',
|
|
|
|
{ loop, console },
|
|
|
|
{ timeout: 5 }
|
|
|
|
);
|
|
|
|
```
|
|
|
|
|
|
|
|
This issue also occurs when the `loop()` call is scheduled using
|
|
|
|
the `process.nextTick()` and `queueMicrotask()` functions.
|
|
|
|
|
|
|
|
This issue occurs because all contexts share the same microtask and nextTick
|
|
|
|
queues.
|
|
|
|
|
2018-08-18 00:26:34 +02:00
|
|
|
[`ERR_VM_DYNAMIC_IMPORT_CALLBACK_MISSING`]: errors.html#ERR_VM_DYNAMIC_IMPORT_CALLBACK_MISSING
|
2018-11-27 20:49:21 +01:00
|
|
|
[`Error`]: errors.html#errors_class_error
|
2017-12-17 22:38:15 +01:00
|
|
|
[`URL`]: url.html#url_class_url
|
2017-05-08 18:30:13 +02:00
|
|
|
[`eval()`]: https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/eval
|
2016-01-31 15:29:27 +01:00
|
|
|
[`script.runInContext()`]: #vm_script_runincontext_contextifiedsandbox_options
|
|
|
|
[`script.runInThisContext()`]: #vm_script_runinthiscontext_options
|
2018-04-01 09:32:26 +02:00
|
|
|
[`url.origin`]: url.html#url_url_origin
|
2017-12-17 22:38:15 +01:00
|
|
|
[`vm.createContext()`]: #vm_vm_createcontext_sandbox_options
|
2016-01-31 15:29:27 +01:00
|
|
|
[`vm.runInContext()`]: #vm_vm_runincontext_code_contextifiedsandbox_options
|
|
|
|
[`vm.runInThisContext()`]: #vm_vm_runinthiscontext_code_options
|
2018-01-14 08:35:51 +01:00
|
|
|
[ECMAScript Module Loader]: esm.html#esm_ecmascript_modules
|
|
|
|
[Evaluate() concrete method]: https://tc39.github.io/ecma262/#sec-moduleevaluation
|
2018-11-27 20:49:21 +01:00
|
|
|
[GetModuleNamespace]: https://tc39.github.io/ecma262/#sec-getmodulenamespace
|
2018-01-14 08:35:51 +01:00
|
|
|
[HostResolveImportedModule]: https://tc39.github.io/ecma262/#sec-hostresolveimportedmodule
|
|
|
|
[Instantiate() concrete method]: https://tc39.github.io/ecma262/#sec-moduledeclarationinstantiation
|
2018-11-27 20:49:21 +01:00
|
|
|
[Module Namespace Object]: https://tc39.github.io/ecma262/#sec-module-namespace-exotic-objects
|
2018-04-01 09:32:26 +02:00
|
|
|
[Source Text Module Record]: https://tc39.github.io/ecma262/#sec-source-text-module-records
|
2017-02-13 16:30:55 +01:00
|
|
|
[V8 Embedder's Guide]: https://github.com/v8/v8/wiki/Embedder's%20Guide#contexts
|
2017-05-08 18:30:13 +02:00
|
|
|
[contextified]: #vm_what_does_it_mean_to_contextify_an_object
|
|
|
|
[global object]: https://es5.github.io/#x15.1
|
|
|
|
[indirect `eval()` call]: https://es5.github.io/#x10.4.2
|
2017-12-17 22:38:15 +01:00
|
|
|
[origin]: https://developer.mozilla.org/en-US/docs/Glossary/Origin
|