2017-02-08 00:56:07 +01:00
|
|
|
# VM (Executing JavaScript)
|
2012-02-27 20:09:35 +01:00
|
|
|
|
2017-01-23 04:16:21 +01:00
|
|
|
<!--introduced_in=v0.10.0-->
|
|
|
|
|
2016-07-16 00:35:38 +02:00
|
|
|
> Stability: 2 - Stable
|
2012-03-03 00:14:03 +01:00
|
|
|
|
2012-02-27 20:09:35 +01:00
|
|
|
<!--name=vm-->
|
2010-10-28 14:18:16 +02:00
|
|
|
|
2016-05-18 06:56:01 +02:00
|
|
|
The `vm` module provides APIs for compiling and running code within V8 Virtual
|
2017-11-07 18:22:23 +01:00
|
|
|
Machine contexts.
|
|
|
|
|
|
|
|
JavaScript code can be compiled and run immediately or
|
|
|
|
compiled, saved, and run later.
|
|
|
|
|
|
|
|
A common use case is to run the code in a sandboxed environment.
|
|
|
|
The sandboxed code uses a different V8 Context, meaning that
|
|
|
|
it has a different global object than the rest of the code.
|
|
|
|
|
|
|
|
One can provide the context by ["contextifying"][contextified] a sandbox
|
|
|
|
object. The sandboxed code treats any property on the sandbox like a
|
|
|
|
global variable. Any changes on global variables caused by the sandboxed
|
|
|
|
code are reflected in the sandbox object.
|
2010-10-28 14:18:16 +02:00
|
|
|
|
2016-01-17 18:39:07 +01:00
|
|
|
```js
|
|
|
|
const vm = require('vm');
|
2010-10-28 14:18:16 +02:00
|
|
|
|
2017-11-07 18:22:23 +01:00
|
|
|
const x = 1;
|
|
|
|
|
|
|
|
const sandbox = { x: 2 };
|
|
|
|
vm.createContext(sandbox); // Contextify the sandbox.
|
|
|
|
|
|
|
|
const code = 'x += 40; var y = 17;';
|
|
|
|
// x and y are global variables in the sandboxed environment.
|
|
|
|
// Initially, x has the value 2 because that is the value of sandbox.x.
|
|
|
|
vm.runInContext(code, sandbox);
|
|
|
|
|
|
|
|
console.log(sandbox.x); // 42
|
|
|
|
console.log(sandbox.y); // 17
|
|
|
|
|
|
|
|
console.log(x); // 1; y is not defined.
|
|
|
|
```
|
2010-10-28 14:18:16 +02:00
|
|
|
|
2018-02-06 06:55:16 +01:00
|
|
|
**The vm module is not a security mechanism. Do not use it to run untrusted
|
|
|
|
code**.
|
2017-02-25 21:11:50 +01:00
|
|
|
|
2018-01-14 08:35:51 +01:00
|
|
|
## Class: vm.Module
|
|
|
|
<!-- YAML
|
2018-02-21 17:28:13 +01:00
|
|
|
added: v9.6.0
|
2018-01-14 08:35:51 +01:00
|
|
|
-->
|
|
|
|
|
|
|
|
> Stability: 1 - Experimental
|
|
|
|
|
|
|
|
*This feature is only available with the `--experimental-vm-modules` command
|
|
|
|
flag enabled.*
|
|
|
|
|
|
|
|
The `vm.Module` class provides a low-level interface for using ECMAScript
|
|
|
|
modules in VM contexts. It is the counterpart of the `vm.Script` class that
|
|
|
|
closely mirrors [Source Text Module Record][]s as defined in the ECMAScript
|
|
|
|
specification.
|
|
|
|
|
|
|
|
Unlike `vm.Script` however, every `vm.Module` object is bound to a context from
|
|
|
|
its creation. Operations on `vm.Module` objects are intrinsically asynchronous,
|
|
|
|
in contrast with the synchronous nature of `vm.Script` objects. With the help
|
|
|
|
of async functions, however, manipulating `vm.Module` objects is fairly
|
|
|
|
straightforward.
|
|
|
|
|
|
|
|
Using a `vm.Module` object requires four distinct steps: creation/parsing,
|
|
|
|
linking, instantiation, and evaluation. These four steps are illustrated in the
|
|
|
|
following example.
|
|
|
|
|
2018-02-06 06:55:16 +01:00
|
|
|
This implementation lies at a lower level than the [ECMAScript Module
|
2018-01-14 08:35:51 +01:00
|
|
|
loader][]. There is also currently no way to interact with the Loader, though
|
|
|
|
support is planned.
|
|
|
|
|
|
|
|
```js
|
|
|
|
const vm = require('vm');
|
|
|
|
|
|
|
|
const contextifiedSandbox = vm.createContext({ secret: 42 });
|
|
|
|
|
|
|
|
(async () => {
|
|
|
|
// Step 1
|
|
|
|
//
|
|
|
|
// Create a Module by constructing a new `vm.Module` object. This parses the
|
|
|
|
// provided source text, throwing a `SyntaxError` if anything goes wrong. By
|
|
|
|
// default, a Module is created in the top context. But here, we specify
|
|
|
|
// `contextifiedSandbox` as the context this Module belongs to.
|
|
|
|
//
|
|
|
|
// Here, we attempt to obtain the default export from the module "foo", and
|
|
|
|
// put it into local binding "secret".
|
|
|
|
|
|
|
|
const bar = new vm.Module(`
|
|
|
|
import s from 'foo';
|
|
|
|
s;
|
|
|
|
`, { context: contextifiedSandbox });
|
|
|
|
|
|
|
|
// Step 2
|
|
|
|
//
|
|
|
|
// "Link" the imported dependencies of this Module to it.
|
|
|
|
//
|
|
|
|
// The provided linking callback (the "linker") accepts two arguments: the
|
|
|
|
// parent module (`bar` in this case) and the string that is the specifier of
|
|
|
|
// the imported module. The callback is expected to return a Module that
|
|
|
|
// corresponds to the provided specifier, with certain requirements documented
|
|
|
|
// in `module.link()`.
|
|
|
|
//
|
|
|
|
// If linking has not started for the returned Module, the same linker
|
|
|
|
// callback will be called on the returned Module.
|
|
|
|
//
|
|
|
|
// Even top-level Modules without dependencies must be explicitly linked. The
|
|
|
|
// callback provided would never be called, however.
|
|
|
|
//
|
|
|
|
// The link() method returns a Promise that will be resolved when all the
|
|
|
|
// Promises returned by the linker resolve.
|
|
|
|
//
|
|
|
|
// Note: This is a contrived example in that the linker function creates a new
|
|
|
|
// "foo" module every time it is called. In a full-fledged module system, a
|
|
|
|
// cache would probably be used to avoid duplicated modules.
|
|
|
|
|
2018-01-31 06:03:56 +01:00
|
|
|
async function linker(specifier, referencingModule) {
|
2018-01-14 08:35:51 +01:00
|
|
|
if (specifier === 'foo') {
|
|
|
|
return new vm.Module(`
|
|
|
|
// The "secret" variable refers to the global variable we added to
|
|
|
|
// "contextifiedSandbox" when creating the context.
|
|
|
|
export default secret;
|
|
|
|
`, { context: referencingModule.context });
|
|
|
|
|
|
|
|
// Using `contextifiedSandbox` instead of `referencingModule.context`
|
|
|
|
// here would work as well.
|
|
|
|
}
|
|
|
|
throw new Error(`Unable to resolve dependency: ${specifier}`);
|
|
|
|
}
|
|
|
|
await bar.link(linker);
|
|
|
|
|
|
|
|
// Step 3
|
|
|
|
//
|
|
|
|
// Instantiate the top-level Module.
|
|
|
|
//
|
|
|
|
// Only the top-level Module needs to be explicitly instantiated; its
|
|
|
|
// dependencies will be recursively instantiated by instantiate().
|
|
|
|
|
|
|
|
bar.instantiate();
|
|
|
|
|
|
|
|
// Step 4
|
|
|
|
//
|
|
|
|
// Evaluate the Module. The evaluate() method returns a Promise with a single
|
|
|
|
// property "result" that contains the result of the very last statement
|
|
|
|
// executed in the Module. In the case of `bar`, it is `s;`, which refers to
|
|
|
|
// the default export of the `foo` module, the `secret` we set in the
|
|
|
|
// beginning to 42.
|
|
|
|
|
|
|
|
const { result } = await bar.evaluate();
|
|
|
|
|
|
|
|
console.log(result);
|
|
|
|
// Prints 42.
|
|
|
|
})();
|
|
|
|
```
|
|
|
|
|
|
|
|
### Constructor: new vm.Module(code[, options])
|
|
|
|
|
|
|
|
* `code` {string} JavaScript Module code to parse
|
|
|
|
* `options`
|
2018-04-02 03:44:32 +02:00
|
|
|
* `url` {string} URL used in module resolution and stack traces. **Default:**
|
2018-01-14 08:35:51 +01:00
|
|
|
`'vm:module(i)'` where `i` is a context-specific ascending index.
|
|
|
|
* `context` {Object} The [contextified][] object as returned by the
|
2018-04-29 19:46:41 +02:00
|
|
|
`vm.createContext()` method, to compile and evaluate this `Module` in.
|
2018-01-14 08:35:51 +01:00
|
|
|
* `lineOffset` {integer} Specifies the line number offset that is displayed
|
2018-04-29 19:46:41 +02:00
|
|
|
in stack traces produced by this `Module`.
|
|
|
|
* `columnOffset` {integer} Specifies the column number offset that is
|
|
|
|
displayed in stack traces produced by this `Module`.
|
|
|
|
* `initalizeImportMeta` {Function} Called during evaluation of this `Module`
|
|
|
|
to initialize the `import.meta`. This function has the signature `(meta,
|
|
|
|
module)`, where `meta` is the `import.meta` object in the `Module`, and
|
2018-03-07 04:46:39 +01:00
|
|
|
`module` is this `vm.Module` object.
|
2018-01-14 08:35:51 +01:00
|
|
|
|
|
|
|
Creates a new ES `Module` object.
|
|
|
|
|
2018-03-07 04:46:39 +01:00
|
|
|
*Note*: Properties assigned to the `import.meta` object that are objects may
|
2018-04-29 19:46:41 +02:00
|
|
|
allow the `Module` to access information outside the specified `context`, if the
|
2018-03-07 04:46:39 +01:00
|
|
|
object is created in the top level context. Use `vm.runInContext()` to create
|
|
|
|
objects in a specific context.
|
|
|
|
|
|
|
|
```js
|
|
|
|
const vm = require('vm');
|
|
|
|
|
|
|
|
const contextifiedSandbox = vm.createContext({ secret: 42 });
|
|
|
|
|
|
|
|
(async () => {
|
|
|
|
const module = new vm.Module(
|
|
|
|
'Object.getPrototypeOf(import.meta.prop).secret = secret;',
|
|
|
|
{
|
|
|
|
initializeImportMeta(meta) {
|
|
|
|
// Note: this object is created in the top context. As such,
|
|
|
|
// Object.getPrototypeOf(import.meta.prop) points to the
|
|
|
|
// Object.prototype in the top context rather than that in
|
|
|
|
// the sandbox.
|
|
|
|
meta.prop = {};
|
|
|
|
}
|
|
|
|
});
|
|
|
|
// Since module has no dependencies, the linker function will never be called.
|
|
|
|
await module.link(() => {});
|
|
|
|
module.initialize();
|
|
|
|
await module.evaluate();
|
|
|
|
|
|
|
|
// Now, Object.prototype.secret will be equal to 42.
|
|
|
|
//
|
|
|
|
// To fix this problem, replace
|
|
|
|
// meta.prop = {};
|
|
|
|
// above with
|
|
|
|
// meta.prop = vm.runInContext('{}', contextifiedSandbox);
|
|
|
|
})();
|
|
|
|
```
|
|
|
|
|
2018-01-14 08:35:51 +01:00
|
|
|
### module.dependencySpecifiers
|
|
|
|
|
|
|
|
* {string[]}
|
|
|
|
|
|
|
|
The specifiers of all dependencies of this module. The returned array is frozen
|
|
|
|
to disallow any changes to it.
|
|
|
|
|
2018-04-29 19:46:41 +02:00
|
|
|
Corresponds to the `[[RequestedModules]]` field of
|
|
|
|
[Source Text Module Record][]s in the ECMAScript specification.
|
2018-01-14 08:35:51 +01:00
|
|
|
|
|
|
|
### module.error
|
|
|
|
|
|
|
|
* {any}
|
|
|
|
|
2018-02-12 08:31:55 +01:00
|
|
|
If the `module.status` is `'errored'`, this property contains the exception
|
|
|
|
thrown by the module during evaluation. If the status is anything else,
|
|
|
|
accessing this property will result in a thrown exception.
|
2018-01-14 08:35:51 +01:00
|
|
|
|
2018-02-06 06:55:16 +01:00
|
|
|
The value `undefined` cannot be used for cases where there is not a thrown
|
2018-01-14 08:35:51 +01:00
|
|
|
exception due to possible ambiguity with `throw undefined;`.
|
|
|
|
|
2018-04-29 19:46:41 +02:00
|
|
|
Corresponds to the `[[EvaluationError]]` field of [Source Text Module Record][]s
|
2018-01-14 08:35:51 +01:00
|
|
|
in the ECMAScript specification.
|
|
|
|
|
|
|
|
### module.linkingStatus
|
|
|
|
|
|
|
|
* {string}
|
|
|
|
|
|
|
|
The current linking status of `module`. It will be one of the following values:
|
|
|
|
|
|
|
|
- `'unlinked'`: `module.link()` has not yet been called.
|
|
|
|
- `'linking'`: `module.link()` has been called, but not all Promises returned by
|
|
|
|
the linker function have been resolved yet.
|
|
|
|
- `'linked'`: `module.link()` has been called, and all its dependencies have
|
|
|
|
been successfully linked.
|
|
|
|
- `'errored'`: `module.link()` has been called, but at least one of its
|
2018-04-29 19:46:41 +02:00
|
|
|
dependencies failed to link, either because the callback returned a `Promise`
|
|
|
|
that is rejected, or because the `Module` the callback returned is invalid.
|
2018-01-14 08:35:51 +01:00
|
|
|
|
|
|
|
### module.namespace
|
|
|
|
|
|
|
|
* {Object}
|
|
|
|
|
|
|
|
The namespace object of the module. This is only available after instantiation
|
|
|
|
(`module.instantiate()`) has completed.
|
|
|
|
|
|
|
|
Corresponds to the [GetModuleNamespace][] abstract operation in the ECMAScript
|
|
|
|
specification.
|
|
|
|
|
|
|
|
### module.status
|
|
|
|
|
|
|
|
* {string}
|
|
|
|
|
|
|
|
The current status of the module. Will be one of:
|
|
|
|
|
|
|
|
- `'uninstantiated'`: The module is not instantiated. It may because of any of
|
|
|
|
the following reasons:
|
|
|
|
|
|
|
|
- The module was just created.
|
|
|
|
- `module.instantiate()` has been called on this module, but it failed for
|
|
|
|
some reason.
|
|
|
|
|
|
|
|
This status does not convey any information regarding if `module.link()` has
|
|
|
|
been called. See `module.linkingStatus` for that.
|
|
|
|
|
|
|
|
- `'instantiating'`: The module is currently being instantiated through a
|
|
|
|
`module.instantiate()` call on itself or a parent module.
|
|
|
|
|
|
|
|
- `'instantiated'`: The module has been instantiated successfully, but
|
|
|
|
`module.evaluate()` has not yet been called.
|
|
|
|
|
|
|
|
- `'evaluating'`: The module is being evaluated through a `module.evaluate()` on
|
|
|
|
itself or a parent module.
|
|
|
|
|
|
|
|
- `'evaluated'`: The module has been successfully evaluated.
|
|
|
|
|
|
|
|
- `'errored'`: The module has been evaluated, but an exception was thrown.
|
|
|
|
|
|
|
|
Other than `'errored'`, this status string corresponds to the specification's
|
2018-04-29 19:46:41 +02:00
|
|
|
[Source Text Module Record][]'s `[[Status]]` field. `'errored'` corresponds to
|
|
|
|
`'evaluated'` in the specification, but with `[[EvaluationError]]` set to a
|
|
|
|
value that is not `undefined`.
|
2018-01-14 08:35:51 +01:00
|
|
|
|
|
|
|
### module.url
|
|
|
|
|
|
|
|
* {string}
|
|
|
|
|
|
|
|
The URL of the current module, as set in the constructor.
|
|
|
|
|
|
|
|
### module.evaluate([options])
|
|
|
|
|
|
|
|
* `options` {Object}
|
|
|
|
* `timeout` {number} Specifies the number of milliseconds to evaluate
|
|
|
|
before terminating execution. If execution is interrupted, an [`Error`][]
|
|
|
|
will be thrown.
|
|
|
|
* `breakOnSigint` {boolean} If `true`, the execution will be terminated when
|
|
|
|
`SIGINT` (Ctrl+C) is received. Existing handlers for the event that have
|
2018-04-02 07:38:48 +02:00
|
|
|
been attached via `process.on('SIGINT')` will be disabled during script
|
2018-01-14 08:35:51 +01:00
|
|
|
execution, but will continue to work after that. If execution is
|
|
|
|
interrupted, an [`Error`][] will be thrown.
|
|
|
|
* Returns: {Promise}
|
|
|
|
|
|
|
|
Evaluate the module.
|
|
|
|
|
|
|
|
This must be called after the module has been instantiated; otherwise it will
|
|
|
|
throw an error. It could be called also when the module has already been
|
|
|
|
evaluated, in which case it will do one of the following two things:
|
|
|
|
|
|
|
|
- return `undefined` if the initial evaluation ended in success (`module.status`
|
|
|
|
is `'evaluated'`)
|
|
|
|
- rethrow the same exception the initial evaluation threw if the initial
|
|
|
|
evaluation ended in an error (`module.status` is `'errored'`)
|
|
|
|
|
|
|
|
This method cannot be called while the module is being evaluated
|
|
|
|
(`module.status` is `'evaluating'`) to prevent infinite recursion.
|
|
|
|
|
|
|
|
Corresponds to the [Evaluate() concrete method][] field of [Source Text Module
|
|
|
|
Record][]s in the ECMAScript specification.
|
|
|
|
|
|
|
|
### module.instantiate()
|
|
|
|
|
|
|
|
Instantiate the module. This must be called after linking has completed
|
|
|
|
(`linkingStatus` is `'linked'`); otherwise it will throw an error. It may also
|
|
|
|
throw an exception if one of the dependencies does not provide an export the
|
|
|
|
parent module requires.
|
|
|
|
|
|
|
|
However, if this function succeeded, further calls to this function after the
|
|
|
|
initial instantiation will be no-ops, to be consistent with the ECMAScript
|
|
|
|
specification.
|
|
|
|
|
|
|
|
Unlike other methods operating on `Module`, this function completes
|
|
|
|
synchronously and returns nothing.
|
|
|
|
|
|
|
|
Corresponds to the [Instantiate() concrete method][] field of [Source Text
|
|
|
|
Module Record][]s in the ECMAScript specification.
|
|
|
|
|
|
|
|
### module.link(linker)
|
|
|
|
|
|
|
|
* `linker` {Function}
|
|
|
|
* Returns: {Promise}
|
|
|
|
|
|
|
|
Link module dependencies. This method must be called before instantiation, and
|
|
|
|
can only be called once per module.
|
|
|
|
|
|
|
|
Two parameters will be passed to the `linker` function:
|
|
|
|
|
|
|
|
- `specifier` The specifier of the requested module:
|
|
|
|
<!-- eslint-skip -->
|
|
|
|
```js
|
|
|
|
import foo from 'foo';
|
|
|
|
// ^^^^^ the module specifier
|
|
|
|
```
|
2018-01-31 06:03:56 +01:00
|
|
|
- `referencingModule` The `Module` object `link()` is called on.
|
2018-01-14 08:35:51 +01:00
|
|
|
|
|
|
|
The function is expected to return a `Module` object or a `Promise` that
|
|
|
|
eventually resolves to a `Module` object. The returned `Module` must satisfy the
|
|
|
|
following two invariants:
|
|
|
|
|
|
|
|
- It must belong to the same context as the parent `Module`.
|
|
|
|
- Its `linkingStatus` must not be `'errored'`.
|
|
|
|
|
|
|
|
If the returned `Module`'s `linkingStatus` is `'unlinked'`, this method will be
|
|
|
|
recursively called on the returned `Module` with the same provided `linker`
|
|
|
|
function.
|
|
|
|
|
|
|
|
`link()` returns a `Promise` that will either get resolved when all linking
|
|
|
|
instances resolve to a valid `Module`, or rejected if the linker function either
|
|
|
|
throws an exception or returns an invalid `Module`.
|
|
|
|
|
|
|
|
The linker function roughly corresponds to the implementation-defined
|
|
|
|
[HostResolveImportedModule][] abstract operation in the ECMAScript
|
|
|
|
specification, with a few key differences:
|
|
|
|
|
|
|
|
- The linker function is allowed to be asynchronous while
|
|
|
|
[HostResolveImportedModule][] is synchronous.
|
|
|
|
- The linker function is executed during linking, a Node.js-specific stage
|
|
|
|
before instantiation, while [HostResolveImportedModule][] is called during
|
|
|
|
instantiation.
|
|
|
|
|
|
|
|
The actual [HostResolveImportedModule][] implementation used during module
|
|
|
|
instantiation is one that returns the modules linked during linking. Since at
|
|
|
|
that point all modules would have been fully linked already, the
|
|
|
|
[HostResolveImportedModule][] implementation is fully synchronous per
|
|
|
|
specification.
|
|
|
|
|
2016-05-18 06:56:01 +02:00
|
|
|
## Class: vm.Script
|
2016-05-27 04:21:30 +02:00
|
|
|
<!-- YAML
|
|
|
|
added: v0.3.1
|
|
|
|
-->
|
2012-04-25 09:11:06 +02:00
|
|
|
|
2016-05-18 06:56:01 +02:00
|
|
|
Instances of the `vm.Script` class contain precompiled scripts that can be
|
|
|
|
executed in specific sandboxes (or "contexts").
|
2012-04-25 09:11:06 +02:00
|
|
|
|
2015-11-04 18:30:11 +01:00
|
|
|
### new vm.Script(code, options)
|
2016-05-27 04:21:30 +02:00
|
|
|
<!-- YAML
|
|
|
|
added: v0.3.1
|
2017-02-21 23:38:50 +01:00
|
|
|
changes:
|
|
|
|
- version: v5.7.0
|
|
|
|
pr-url: https://github.com/nodejs/node/pull/4777
|
|
|
|
description: The `cachedData` and `produceCachedData` options are
|
|
|
|
supported now.
|
2016-05-27 04:21:30 +02:00
|
|
|
-->
|
2012-04-25 09:11:06 +02:00
|
|
|
|
2016-05-18 06:56:01 +02:00
|
|
|
* `code` {string} The JavaScript code to compile.
|
|
|
|
* `options`
|
|
|
|
* `filename` {string} Specifies the filename used in stack traces produced
|
|
|
|
by this script.
|
|
|
|
* `lineOffset` {number} Specifies the line number offset that is displayed
|
|
|
|
in stack traces produced by this script.
|
|
|
|
* `columnOffset` {number} Specifies the column number offset that is displayed
|
|
|
|
in stack traces produced by this script.
|
|
|
|
* `displayErrors` {boolean} When `true`, if an [`Error`][] error occurs
|
|
|
|
while compiling the `code`, the line of code causing the error is attached
|
|
|
|
to the stack trace.
|
|
|
|
* `timeout` {number} Specifies the number of milliseconds to execute `code`
|
|
|
|
before terminating execution. If execution is terminated, an [`Error`][]
|
|
|
|
will be thrown.
|
|
|
|
* `cachedData` {Buffer} Provides an optional `Buffer` with V8's code cache
|
|
|
|
data for the supplied source. When supplied, the `cachedDataRejected` value
|
|
|
|
will be set to either `true` or `false` depending on acceptance of the data
|
|
|
|
by V8.
|
|
|
|
* `produceCachedData` {boolean} When `true` and no `cachedData` is present, V8
|
|
|
|
will attempt to produce code cache data for `code`. Upon success, a
|
|
|
|
`Buffer` with V8's code cache data will be produced and stored in the
|
|
|
|
`cachedData` property of the returned `vm.Script` instance.
|
|
|
|
The `cachedDataProduced` value will be set to either `true` or `false`
|
|
|
|
depending on whether code cache data is produced successfully.
|
|
|
|
|
|
|
|
Creating a new `vm.Script` object compiles `code` but does not run it. The
|
2017-12-28 04:21:06 +01:00
|
|
|
compiled `vm.Script` can be run later multiple times. The `code` is not bound to
|
|
|
|
any global object; rather, it is bound before each run, just for that run.
|
2015-11-04 18:30:11 +01:00
|
|
|
|
|
|
|
### script.runInContext(contextifiedSandbox[, options])
|
2016-05-27 04:21:30 +02:00
|
|
|
<!-- YAML
|
|
|
|
added: v0.3.1
|
2017-02-21 23:38:50 +01:00
|
|
|
changes:
|
|
|
|
- version: v6.3.0
|
|
|
|
pr-url: https://github.com/nodejs/node/pull/6635
|
|
|
|
description: The `breakOnSigint` option is supported now.
|
2016-05-27 04:21:30 +02:00
|
|
|
-->
|
2015-11-04 18:30:11 +01:00
|
|
|
|
2016-05-18 06:56:01 +02:00
|
|
|
* `contextifiedSandbox` {Object} A [contextified][] object as returned by the
|
|
|
|
`vm.createContext()` method.
|
|
|
|
* `options` {Object}
|
|
|
|
* `filename` {string} Specifies the filename used in stack traces produced
|
|
|
|
by this script.
|
|
|
|
* `lineOffset` {number} Specifies the line number offset that is displayed
|
|
|
|
in stack traces produced by this script.
|
|
|
|
* `columnOffset` {number} Specifies the column number offset that is displayed
|
|
|
|
in stack traces produced by this script.
|
|
|
|
* `displayErrors` {boolean} When `true`, if an [`Error`][] error occurs
|
|
|
|
while compiling the `code`, the line of code causing the error is attached
|
|
|
|
to the stack trace.
|
|
|
|
* `timeout` {number} Specifies the number of milliseconds to execute `code`
|
|
|
|
before terminating execution. If execution is terminated, an [`Error`][]
|
|
|
|
will be thrown.
|
2016-05-08 03:28:47 +02:00
|
|
|
* `breakOnSigint`: if `true`, the execution will be terminated when
|
|
|
|
`SIGINT` (Ctrl+C) is received. Existing handlers for the
|
2018-04-02 07:38:48 +02:00
|
|
|
event that have been attached via `process.on('SIGINT')` will be disabled
|
2016-05-08 03:28:47 +02:00
|
|
|
during script execution, but will continue to work after that.
|
|
|
|
If execution is terminated, an [`Error`][] will be thrown.
|
|
|
|
|
2016-05-18 06:56:01 +02:00
|
|
|
Runs the compiled code contained by the `vm.Script` object within the given
|
2016-01-31 15:29:27 +01:00
|
|
|
`contextifiedSandbox` and returns the result. Running code does not have access
|
|
|
|
to local scope.
|
2015-11-04 18:30:11 +01:00
|
|
|
|
2016-05-18 06:56:01 +02:00
|
|
|
The following example compiles code that increments a global variable, sets
|
|
|
|
the value of another global variable, then execute the code multiple times.
|
|
|
|
The globals are contained in the `sandbox` object.
|
2015-11-04 18:30:11 +01:00
|
|
|
|
2016-01-17 18:39:07 +01:00
|
|
|
```js
|
|
|
|
const util = require('util');
|
|
|
|
const vm = require('vm');
|
2012-04-25 09:11:06 +02:00
|
|
|
|
2016-05-18 06:56:01 +02:00
|
|
|
const sandbox = {
|
2016-01-17 18:39:07 +01:00
|
|
|
animal: 'cat',
|
|
|
|
count: 2
|
|
|
|
};
|
2012-04-25 09:11:06 +02:00
|
|
|
|
2016-05-18 06:56:01 +02:00
|
|
|
const script = new vm.Script('count += 1; name = "kitty";');
|
2012-04-25 09:11:06 +02:00
|
|
|
|
2017-10-07 02:28:37 +02:00
|
|
|
const context = vm.createContext(sandbox);
|
2017-04-22 14:22:40 +02:00
|
|
|
for (let i = 0; i < 10; ++i) {
|
2016-01-17 18:39:07 +01:00
|
|
|
script.runInContext(context);
|
|
|
|
}
|
2012-04-25 09:11:06 +02:00
|
|
|
|
2016-01-17 18:39:07 +01:00
|
|
|
console.log(util.inspect(sandbox));
|
2012-04-25 09:11:06 +02:00
|
|
|
|
2016-01-17 18:39:07 +01:00
|
|
|
// { animal: 'cat', count: 12, name: 'kitty' }
|
|
|
|
```
|
2010-10-28 14:18:16 +02:00
|
|
|
|
2018-02-06 06:55:16 +01:00
|
|
|
Using the `timeout` or `breakOnSigint` options will result in new event loops
|
|
|
|
and corresponding threads being started, which have a non-zero performance
|
|
|
|
overhead.
|
2017-04-29 23:48:03 +02:00
|
|
|
|
2017-06-06 11:00:32 +02:00
|
|
|
### script.runInNewContext([sandbox[, options]])
|
2016-05-27 04:21:30 +02:00
|
|
|
<!-- YAML
|
|
|
|
added: v0.3.1
|
2018-03-19 06:56:00 +01:00
|
|
|
changes:
|
2018-03-02 18:53:46 +01:00
|
|
|
- version: v10.0.0
|
2018-03-19 06:56:00 +01:00
|
|
|
pr-url: https://github.com/nodejs/node/pull/19016
|
|
|
|
description: The `contextCodeGeneration` option is supported now.
|
2016-05-27 04:21:30 +02:00
|
|
|
-->
|
2015-11-04 18:30:11 +01:00
|
|
|
|
2016-05-18 06:56:01 +02:00
|
|
|
* `sandbox` {Object} An object that will be [contextified][]. If `undefined`, a
|
|
|
|
new object will be created.
|
|
|
|
* `options` {Object}
|
|
|
|
* `filename` {string} Specifies the filename used in stack traces produced
|
|
|
|
by this script.
|
|
|
|
* `lineOffset` {number} Specifies the line number offset that is displayed
|
|
|
|
in stack traces produced by this script.
|
|
|
|
* `columnOffset` {number} Specifies the column number offset that is displayed
|
|
|
|
in stack traces produced by this script.
|
|
|
|
* `displayErrors` {boolean} When `true`, if an [`Error`][] error occurs
|
|
|
|
while compiling the `code`, the line of code causing the error is attached
|
|
|
|
to the stack trace.
|
|
|
|
* `timeout` {number} Specifies the number of milliseconds to execute `code`
|
|
|
|
before terminating execution. If execution is terminated, an [`Error`][]
|
|
|
|
will be thrown.
|
2017-12-17 22:38:15 +01:00
|
|
|
* `contextName` {string} Human-readable name of the newly created context.
|
|
|
|
**Default:** `'VM Context i'`, where `i` is an ascending numerical index of
|
|
|
|
the created context.
|
|
|
|
* `contextOrigin` {string} [Origin][origin] corresponding to the newly
|
|
|
|
created context for display purposes. The origin should be formatted like a
|
|
|
|
URL, but with only the scheme, host, and port (if necessary), like the
|
|
|
|
value of the [`url.origin`][] property of a [`URL`][] object. Most notably,
|
|
|
|
this string should omit the trailing slash, as that denotes a path.
|
|
|
|
**Default:** `''`.
|
2018-02-26 21:29:41 +01:00
|
|
|
* `contextCodeGeneration` {Object}
|
|
|
|
* `strings` {boolean} If set to false any calls to `eval` or function
|
|
|
|
constructors (`Function`, `GeneratorFunction`, etc) will throw an
|
2018-04-02 03:44:32 +02:00
|
|
|
`EvalError`. **Default:** `true`.
|
2018-02-26 21:29:41 +01:00
|
|
|
* `wasm` {boolean} If set to false any attempt to compile a WebAssembly
|
2018-04-02 03:44:32 +02:00
|
|
|
module will throw a `WebAssembly.CompileError`. **Default:** `true`.
|
2016-05-18 06:56:01 +02:00
|
|
|
|
|
|
|
First contextifies the given `sandbox`, runs the compiled code contained by
|
|
|
|
the `vm.Script` object within the created sandbox, and returns the result.
|
|
|
|
Running code does not have access to local scope.
|
|
|
|
|
|
|
|
The following example compiles code that sets a global variable, then executes
|
|
|
|
the code multiple times in different contexts. The globals are set on and
|
|
|
|
contained within each individual `sandbox`.
|
2015-11-04 18:30:11 +01:00
|
|
|
|
2016-01-17 18:39:07 +01:00
|
|
|
```js
|
|
|
|
const util = require('util');
|
|
|
|
const vm = require('vm');
|
2015-11-04 18:30:11 +01:00
|
|
|
|
2016-01-17 18:39:07 +01:00
|
|
|
const script = new vm.Script('globalVar = "set"');
|
2015-11-04 18:30:11 +01:00
|
|
|
|
2016-05-18 06:56:01 +02:00
|
|
|
const sandboxes = [{}, {}, {}];
|
2016-01-17 18:39:07 +01:00
|
|
|
sandboxes.forEach((sandbox) => {
|
|
|
|
script.runInNewContext(sandbox);
|
|
|
|
});
|
2015-11-04 18:30:11 +01:00
|
|
|
|
2016-01-17 18:39:07 +01:00
|
|
|
console.log(util.inspect(sandboxes));
|
2015-11-04 18:30:11 +01:00
|
|
|
|
2016-01-17 18:39:07 +01:00
|
|
|
// [{ globalVar: 'set' }, { globalVar: 'set' }, { globalVar: 'set' }]
|
|
|
|
```
|
2015-11-04 18:30:11 +01:00
|
|
|
|
|
|
|
### script.runInThisContext([options])
|
2016-05-27 04:21:30 +02:00
|
|
|
<!-- YAML
|
|
|
|
added: v0.3.1
|
|
|
|
-->
|
2015-11-04 18:30:11 +01:00
|
|
|
|
2016-05-18 06:56:01 +02:00
|
|
|
* `options` {Object}
|
|
|
|
* `filename` {string} Specifies the filename used in stack traces produced
|
|
|
|
by this script.
|
|
|
|
* `lineOffset` {number} Specifies the line number offset that is displayed
|
|
|
|
in stack traces produced by this script.
|
|
|
|
* `columnOffset` {number} Specifies the column number offset that is displayed
|
|
|
|
in stack traces produced by this script.
|
|
|
|
* `displayErrors` {boolean} When `true`, if an [`Error`][] error occurs
|
|
|
|
while compiling the `code`, the line of code causing the error is attached
|
|
|
|
to the stack trace.
|
|
|
|
* `timeout` {number} Specifies the number of milliseconds to execute `code`
|
|
|
|
before terminating execution. If execution is terminated, an [`Error`][]
|
|
|
|
will be thrown.
|
|
|
|
|
|
|
|
Runs the compiled code contained by the `vm.Script` within the context of the
|
|
|
|
current `global` object. Running code does not have access to local scope, but
|
|
|
|
*does* have access to the current `global` object.
|
|
|
|
|
|
|
|
The following example compiles code that increments a `global` variable then
|
|
|
|
executes that code multiple times:
|
2015-11-04 18:30:11 +01:00
|
|
|
|
2016-01-17 18:39:07 +01:00
|
|
|
```js
|
|
|
|
const vm = require('vm');
|
2015-11-04 18:30:11 +01:00
|
|
|
|
2016-01-17 18:39:07 +01:00
|
|
|
global.globalVar = 0;
|
2010-10-28 14:18:16 +02:00
|
|
|
|
2016-01-17 18:39:07 +01:00
|
|
|
const script = new vm.Script('globalVar += 1', { filename: 'myfile.vm' });
|
2015-11-04 18:30:11 +01:00
|
|
|
|
2017-04-22 14:22:40 +02:00
|
|
|
for (let i = 0; i < 1000; ++i) {
|
2016-01-17 18:39:07 +01:00
|
|
|
script.runInThisContext();
|
|
|
|
}
|
2015-11-04 18:30:11 +01:00
|
|
|
|
2016-01-17 18:39:07 +01:00
|
|
|
console.log(globalVar);
|
2015-11-04 18:30:11 +01:00
|
|
|
|
2016-01-17 18:39:07 +01:00
|
|
|
// 1000
|
|
|
|
```
|
2015-11-04 18:30:11 +01:00
|
|
|
|
2017-12-17 22:38:15 +01:00
|
|
|
## vm.createContext([sandbox[, options]])
|
2016-05-27 04:21:30 +02:00
|
|
|
<!-- YAML
|
|
|
|
added: v0.3.1
|
2018-03-19 06:56:00 +01:00
|
|
|
changes:
|
2018-03-02 18:53:46 +01:00
|
|
|
- version: v10.0.0
|
2018-03-16 15:23:39 +01:00
|
|
|
pr-url: https://github.com/nodejs/node/pull/19398
|
|
|
|
description: The `sandbox` option can no longer be a function.
|
2018-03-02 18:53:46 +01:00
|
|
|
- version: v10.0.0
|
2018-03-19 06:56:00 +01:00
|
|
|
pr-url: https://github.com/nodejs/node/pull/19016
|
|
|
|
description: The `codeGeneration` option is supported now.
|
2016-05-27 04:21:30 +02:00
|
|
|
-->
|
2010-10-28 14:18:16 +02:00
|
|
|
|
2016-05-18 06:56:01 +02:00
|
|
|
* `sandbox` {Object}
|
2017-12-17 22:38:15 +01:00
|
|
|
* `options` {Object}
|
|
|
|
* `name` {string} Human-readable name of the newly created context.
|
|
|
|
**Default:** `'VM Context i'`, where `i` is an ascending numerical index of
|
|
|
|
the created context.
|
|
|
|
* `origin` {string} [Origin][origin] corresponding to the newly created
|
|
|
|
context for display purposes. The origin should be formatted like a URL,
|
|
|
|
but with only the scheme, host, and port (if necessary), like the value of
|
|
|
|
the [`url.origin`][] property of a [`URL`][] object. Most notably, this
|
|
|
|
string should omit the trailing slash, as that denotes a path.
|
|
|
|
**Default:** `''`.
|
2018-02-26 21:29:41 +01:00
|
|
|
* `codeGeneration` {Object}
|
|
|
|
* `strings` {boolean} If set to false any calls to `eval` or function
|
|
|
|
constructors (`Function`, `GeneratorFunction`, etc) will throw an
|
2018-04-02 03:44:32 +02:00
|
|
|
`EvalError`. **Default:** `true`.
|
2018-02-26 21:29:41 +01:00
|
|
|
* `wasm` {boolean} If set to false any attempt to compile a WebAssembly
|
2018-04-02 03:44:32 +02:00
|
|
|
module will throw a `WebAssembly.CompileError`. **Default:** `true`.
|
2016-05-18 06:56:01 +02:00
|
|
|
|
|
|
|
If given a `sandbox` object, the `vm.createContext()` method will [prepare
|
2016-06-15 08:09:16 +02:00
|
|
|
that sandbox][contextified] so that it can be used in calls to
|
|
|
|
[`vm.runInContext()`][] or [`script.runInContext()`][]. Inside such scripts,
|
|
|
|
the `sandbox` object will be the global object, retaining all of its existing
|
|
|
|
properties but also having the built-in objects and functions any standard
|
2016-12-29 14:00:43 +01:00
|
|
|
[global object][] has. Outside of scripts run by the vm module, global variables
|
|
|
|
will remain unchanged.
|
|
|
|
|
|
|
|
```js
|
|
|
|
const util = require('util');
|
|
|
|
const vm = require('vm');
|
|
|
|
|
2017-04-22 14:22:40 +02:00
|
|
|
global.globalVar = 3;
|
2016-12-29 14:00:43 +01:00
|
|
|
|
|
|
|
const sandbox = { globalVar: 1 };
|
|
|
|
vm.createContext(sandbox);
|
|
|
|
|
|
|
|
vm.runInContext('globalVar *= 2;', sandbox);
|
|
|
|
|
2017-04-22 14:22:40 +02:00
|
|
|
console.log(util.inspect(sandbox)); // { globalVar: 2 }
|
2016-12-29 14:00:43 +01:00
|
|
|
|
|
|
|
console.log(util.inspect(globalVar)); // 3
|
|
|
|
```
|
2010-10-28 14:18:16 +02:00
|
|
|
|
2016-05-18 06:56:01 +02:00
|
|
|
If `sandbox` is omitted (or passed explicitly as `undefined`), a new, empty
|
|
|
|
[contextified][] sandbox object will be returned.
|
2010-10-28 14:18:16 +02:00
|
|
|
|
2016-05-18 06:56:01 +02:00
|
|
|
The `vm.createContext()` method is primarily useful for creating a single
|
|
|
|
sandbox that can be used to run multiple scripts. For instance, if emulating a
|
|
|
|
web browser, the method can be used to create a single sandbox representing a
|
|
|
|
window's global object, then run all `<script>` tags together within the context
|
|
|
|
of that sandbox.
|
2010-10-28 14:18:16 +02:00
|
|
|
|
2017-12-17 22:38:15 +01:00
|
|
|
The provided `name` and `origin` of the context are made visible through the
|
|
|
|
Inspector API.
|
|
|
|
|
2013-08-25 01:46:31 +02:00
|
|
|
## vm.isContext(sandbox)
|
2016-05-27 04:21:30 +02:00
|
|
|
<!-- YAML
|
|
|
|
added: v0.11.7
|
|
|
|
-->
|
2010-10-28 14:18:16 +02:00
|
|
|
|
2016-05-18 06:56:01 +02:00
|
|
|
* `sandbox` {Object}
|
2018-04-11 20:07:14 +02:00
|
|
|
* Returns: {boolean}
|
2010-10-28 14:18:16 +02:00
|
|
|
|
2016-05-18 06:56:01 +02:00
|
|
|
Returns `true` if the given `sandbox` object has been [contextified][] using
|
|
|
|
[`vm.createContext()`][].
|
2010-10-28 14:18:16 +02:00
|
|
|
|
2016-05-18 06:56:01 +02:00
|
|
|
## vm.runInContext(code, contextifiedSandbox[, options])
|
2010-10-28 14:18:16 +02:00
|
|
|
|
2016-05-18 06:56:01 +02:00
|
|
|
* `code` {string} The JavaScript code to compile and run.
|
|
|
|
* `contextifiedSandbox` {Object} The [contextified][] object that will be used
|
|
|
|
as the `global` when the `code` is compiled and run.
|
2018-04-10 10:21:56 +02:00
|
|
|
* `options` {Object|string}
|
2016-05-18 06:56:01 +02:00
|
|
|
* `filename` {string} Specifies the filename used in stack traces produced
|
|
|
|
by this script.
|
|
|
|
* `lineOffset` {number} Specifies the line number offset that is displayed
|
|
|
|
in stack traces produced by this script.
|
|
|
|
* `columnOffset` {number} Specifies the column number offset that is displayed
|
|
|
|
in stack traces produced by this script.
|
|
|
|
* `displayErrors` {boolean} When `true`, if an [`Error`][] error occurs
|
|
|
|
while compiling the `code`, the line of code causing the error is attached
|
|
|
|
to the stack trace.
|
|
|
|
* `timeout` {number} Specifies the number of milliseconds to execute `code`
|
|
|
|
before terminating execution. If execution is terminated, an [`Error`][]
|
|
|
|
will be thrown.
|
|
|
|
|
|
|
|
The `vm.runInContext()` method compiles `code`, runs it within the context of
|
|
|
|
the `contextifiedSandbox`, then returns the result. Running code does not have
|
|
|
|
access to the local scope. The `contextifiedSandbox` object *must* have been
|
|
|
|
previously [contextified][] using the [`vm.createContext()`][] method.
|
|
|
|
|
2018-04-10 10:21:56 +02:00
|
|
|
If `options` is a string, then it specifies the filename.
|
|
|
|
|
2016-05-18 06:56:01 +02:00
|
|
|
The following example compiles and executes different scripts using a single
|
|
|
|
[contextified][] object:
|
2010-10-28 14:18:16 +02:00
|
|
|
|
2016-01-17 18:39:07 +01:00
|
|
|
```js
|
|
|
|
const util = require('util');
|
|
|
|
const vm = require('vm');
|
2010-10-28 14:18:16 +02:00
|
|
|
|
2016-01-17 18:39:07 +01:00
|
|
|
const sandbox = { globalVar: 1 };
|
|
|
|
vm.createContext(sandbox);
|
2011-06-02 21:45:30 +02:00
|
|
|
|
2017-04-22 14:22:40 +02:00
|
|
|
for (let i = 0; i < 10; ++i) {
|
2016-05-18 06:56:01 +02:00
|
|
|
vm.runInContext('globalVar *= 2;', sandbox);
|
2016-01-17 18:39:07 +01:00
|
|
|
}
|
|
|
|
console.log(util.inspect(sandbox));
|
2011-06-02 21:45:30 +02:00
|
|
|
|
2016-01-17 18:39:07 +01:00
|
|
|
// { globalVar: 1024 }
|
|
|
|
```
|
2011-06-02 21:45:30 +02:00
|
|
|
|
2014-09-30 01:32:34 +02:00
|
|
|
## vm.runInNewContext(code[, sandbox][, options])
|
2016-05-27 04:21:30 +02:00
|
|
|
<!-- YAML
|
|
|
|
added: v0.3.1
|
|
|
|
-->
|
2011-06-02 21:45:30 +02:00
|
|
|
|
2016-05-18 06:56:01 +02:00
|
|
|
* `code` {string} The JavaScript code to compile and run.
|
|
|
|
* `sandbox` {Object} An object that will be [contextified][]. If `undefined`, a
|
|
|
|
new object will be created.
|
2018-04-10 10:21:56 +02:00
|
|
|
* `options` {Object|string}
|
2016-05-18 06:56:01 +02:00
|
|
|
* `filename` {string} Specifies the filename used in stack traces produced
|
|
|
|
by this script.
|
|
|
|
* `lineOffset` {number} Specifies the line number offset that is displayed
|
|
|
|
in stack traces produced by this script.
|
|
|
|
* `columnOffset` {number} Specifies the column number offset that is displayed
|
|
|
|
in stack traces produced by this script.
|
|
|
|
* `displayErrors` {boolean} When `true`, if an [`Error`][] error occurs
|
|
|
|
while compiling the `code`, the line of code causing the error is attached
|
|
|
|
to the stack trace.
|
|
|
|
* `timeout` {number} Specifies the number of milliseconds to execute `code`
|
|
|
|
before terminating execution. If execution is terminated, an [`Error`][]
|
|
|
|
will be thrown.
|
2017-12-17 22:38:15 +01:00
|
|
|
* `contextName` {string} Human-readable name of the newly created context.
|
|
|
|
**Default:** `'VM Context i'`, where `i` is an ascending numerical index of
|
|
|
|
the created context.
|
|
|
|
* `contextOrigin` {string} [Origin][origin] corresponding to the newly
|
|
|
|
created context for display purposes. The origin should be formatted like a
|
|
|
|
URL, but with only the scheme, host, and port (if necessary), like the
|
|
|
|
value of the [`url.origin`][] property of a [`URL`][] object. Most notably,
|
|
|
|
this string should omit the trailing slash, as that denotes a path.
|
|
|
|
**Default:** `''`.
|
2016-05-18 06:56:01 +02:00
|
|
|
|
2016-08-07 11:53:16 +02:00
|
|
|
The `vm.runInNewContext()` first contextifies the given `sandbox` object (or
|
2016-05-18 06:56:01 +02:00
|
|
|
creates a new `sandbox` if passed as `undefined`), compiles the `code`, runs it
|
|
|
|
within the context of the created context, then returns the result. Running code
|
|
|
|
does not have access to the local scope.
|
|
|
|
|
2018-04-10 10:21:56 +02:00
|
|
|
If `options` is a string, then it specifies the filename.
|
|
|
|
|
2016-05-18 06:56:01 +02:00
|
|
|
The following example compiles and executes code that increments a global
|
|
|
|
variable and sets a new one. These globals are contained in the `sandbox`.
|
2011-06-02 21:45:30 +02:00
|
|
|
|
2016-01-17 18:39:07 +01:00
|
|
|
```js
|
|
|
|
const util = require('util');
|
|
|
|
const vm = require('vm');
|
2011-06-02 21:45:30 +02:00
|
|
|
|
2016-01-17 18:39:07 +01:00
|
|
|
const sandbox = {
|
|
|
|
animal: 'cat',
|
|
|
|
count: 2
|
|
|
|
};
|
2010-10-28 14:18:16 +02:00
|
|
|
|
2016-01-17 18:39:07 +01:00
|
|
|
vm.runInNewContext('count += 1; name = "kitty"', sandbox);
|
|
|
|
console.log(util.inspect(sandbox));
|
2010-10-28 14:18:16 +02:00
|
|
|
|
2016-01-17 18:39:07 +01:00
|
|
|
// { animal: 'cat', count: 3, name: 'kitty' }
|
|
|
|
```
|
2010-10-28 14:18:16 +02:00
|
|
|
|
2015-11-04 18:30:11 +01:00
|
|
|
## vm.runInThisContext(code[, options])
|
2016-05-27 04:21:30 +02:00
|
|
|
<!-- YAML
|
|
|
|
added: v0.3.1
|
|
|
|
-->
|
2010-10-28 14:18:16 +02:00
|
|
|
|
2016-05-18 06:56:01 +02:00
|
|
|
* `code` {string} The JavaScript code to compile and run.
|
2018-04-10 10:21:56 +02:00
|
|
|
* `options` {Object|string}
|
2016-05-18 06:56:01 +02:00
|
|
|
* `filename` {string} Specifies the filename used in stack traces produced
|
|
|
|
by this script.
|
|
|
|
* `lineOffset` {number} Specifies the line number offset that is displayed
|
|
|
|
in stack traces produced by this script.
|
|
|
|
* `columnOffset` {number} Specifies the column number offset that is displayed
|
|
|
|
in stack traces produced by this script.
|
|
|
|
* `displayErrors` {boolean} When `true`, if an [`Error`][] error occurs
|
|
|
|
while compiling the `code`, the line of code causing the error is attached
|
|
|
|
to the stack trace.
|
|
|
|
* `timeout` {number} Specifies the number of milliseconds to execute `code`
|
|
|
|
before terminating execution. If execution is terminated, an [`Error`][]
|
|
|
|
will be thrown.
|
|
|
|
|
|
|
|
`vm.runInThisContext()` compiles `code`, runs it within the context of the
|
|
|
|
current `global` and returns the result. Running code does not have access to
|
|
|
|
local scope, but does have access to the current `global` object.
|
|
|
|
|
2018-04-10 10:21:56 +02:00
|
|
|
If `options` is a string, then it specifies the filename.
|
|
|
|
|
2016-05-18 06:56:01 +02:00
|
|
|
The following example illustrates using both `vm.runInThisContext()` and
|
|
|
|
the JavaScript [`eval()`][] function to run the same code:
|
2014-08-22 15:09:24 +02:00
|
|
|
|
2017-04-22 14:22:40 +02:00
|
|
|
<!-- eslint-disable prefer-const -->
|
2016-01-17 18:39:07 +01:00
|
|
|
```js
|
|
|
|
const vm = require('vm');
|
2017-04-22 14:22:40 +02:00
|
|
|
let localVar = 'initial value';
|
2012-02-27 20:09:35 +01:00
|
|
|
|
2016-01-17 18:39:07 +01:00
|
|
|
const vmResult = vm.runInThisContext('localVar = "vm";');
|
2016-07-27 04:25:08 +02:00
|
|
|
console.log('vmResult:', vmResult);
|
|
|
|
console.log('localVar:', localVar);
|
2013-08-25 01:46:31 +02:00
|
|
|
|
2016-01-17 18:39:07 +01:00
|
|
|
const evalResult = eval('localVar = "eval";');
|
2016-07-27 04:25:08 +02:00
|
|
|
console.log('evalResult:', evalResult);
|
|
|
|
console.log('localVar:', localVar);
|
2013-08-25 01:46:31 +02:00
|
|
|
|
2016-01-17 18:39:07 +01:00
|
|
|
// vmResult: 'vm', localVar: 'initial value'
|
|
|
|
// evalResult: 'eval', localVar: 'eval'
|
|
|
|
```
|
2013-08-25 01:46:31 +02:00
|
|
|
|
2016-05-18 06:56:01 +02:00
|
|
|
Because `vm.runInThisContext()` does not have access to the local scope,
|
|
|
|
`localVar` is unchanged. In contrast, [`eval()`][] *does* have access to the
|
|
|
|
local scope, so the value `localVar` is changed. In this way
|
2016-06-15 08:09:16 +02:00
|
|
|
`vm.runInThisContext()` is much like an [indirect `eval()` call][], e.g.
|
2016-05-18 06:56:01 +02:00
|
|
|
`(0,eval)('code')`.
|
|
|
|
|
|
|
|
## Example: Running an HTTP Server within a VM
|
|
|
|
|
2018-02-12 08:31:55 +01:00
|
|
|
When using either [`script.runInThisContext()`][] or
|
|
|
|
[`vm.runInThisContext()`][], the code is executed within the current V8 global
|
|
|
|
context. The code passed to this VM context will have its own isolated scope.
|
2016-05-18 06:56:01 +02:00
|
|
|
|
|
|
|
In order to run a simple web server using the `http` module the code passed to
|
|
|
|
the context must either call `require('http')` on its own, or have a reference
|
|
|
|
to the `http` module passed to it. For instance:
|
2016-04-21 09:59:10 +02:00
|
|
|
|
|
|
|
```js
|
|
|
|
'use strict';
|
|
|
|
const vm = require('vm');
|
|
|
|
|
2017-05-31 15:50:50 +02:00
|
|
|
const code = `
|
2017-11-26 09:28:21 +01:00
|
|
|
((require) => {
|
2017-05-31 15:50:50 +02:00
|
|
|
const http = require('http');
|
2016-04-21 09:59:10 +02:00
|
|
|
|
2017-05-31 15:50:50 +02:00
|
|
|
http.createServer((request, response) => {
|
|
|
|
response.writeHead(200, { 'Content-Type': 'text/plain' });
|
|
|
|
response.end('Hello World\\n');
|
|
|
|
}).listen(8124);
|
2016-04-21 09:59:10 +02:00
|
|
|
|
2017-05-31 15:50:50 +02:00
|
|
|
console.log('Server running at http://127.0.0.1:8124/');
|
|
|
|
})`;
|
2016-04-21 09:59:10 +02:00
|
|
|
|
2017-04-21 16:38:31 +02:00
|
|
|
vm.runInThisContext(code)(require);
|
2018-04-29 13:16:44 +02:00
|
|
|
```
|
2016-04-21 09:59:10 +02:00
|
|
|
|
2018-02-06 06:55:16 +01:00
|
|
|
The `require()` in the above case shares the state with the context it is
|
|
|
|
passed from. This may introduce risks when untrusted code is executed, e.g.
|
2017-01-09 16:05:03 +01:00
|
|
|
altering objects in the context in unwanted ways.
|
2016-05-18 06:56:01 +02:00
|
|
|
|
|
|
|
## What does it mean to "contextify" an object?
|
|
|
|
|
|
|
|
All JavaScript executed within Node.js runs within the scope of a "context".
|
|
|
|
According to the [V8 Embedder's Guide][]:
|
|
|
|
|
|
|
|
> In V8, a context is an execution environment that allows separate, unrelated,
|
|
|
|
> JavaScript applications to run in a single instance of V8. You must explicitly
|
|
|
|
> specify the context in which you want any JavaScript code to be run.
|
|
|
|
|
|
|
|
When the method `vm.createContext()` is called, the `sandbox` object that is
|
|
|
|
passed in (or a newly created object if `sandbox` is `undefined`) is associated
|
|
|
|
internally with a new instance of a V8 Context. This V8 Context provides the
|
2017-06-06 11:00:32 +02:00
|
|
|
`code` run using the `vm` module's methods with an isolated global environment
|
2016-05-18 06:56:01 +02:00
|
|
|
within which it can operate. The process of creating the V8 Context and
|
|
|
|
associating it with the `sandbox` object is what this document refers to as
|
|
|
|
"contextifying" the `sandbox`.
|
2016-04-21 09:59:10 +02:00
|
|
|
|
2015-11-28 00:30:32 +01:00
|
|
|
[`Error`]: errors.html#errors_class_error
|
2017-12-17 22:38:15 +01:00
|
|
|
[`URL`]: url.html#url_class_url
|
2017-05-08 18:30:13 +02:00
|
|
|
[`eval()`]: https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/eval
|
2016-01-31 15:29:27 +01:00
|
|
|
[`script.runInContext()`]: #vm_script_runincontext_contextifiedsandbox_options
|
|
|
|
[`script.runInThisContext()`]: #vm_script_runinthiscontext_options
|
2018-04-01 09:32:26 +02:00
|
|
|
[`url.origin`]: url.html#url_url_origin
|
2017-12-17 22:38:15 +01:00
|
|
|
[`vm.createContext()`]: #vm_vm_createcontext_sandbox_options
|
2016-01-31 15:29:27 +01:00
|
|
|
[`vm.runInContext()`]: #vm_vm_runincontext_code_contextifiedsandbox_options
|
|
|
|
[`vm.runInThisContext()`]: #vm_vm_runinthiscontext_code_options
|
2018-01-14 08:35:51 +01:00
|
|
|
[GetModuleNamespace]: https://tc39.github.io/ecma262/#sec-getmodulenamespace
|
|
|
|
[ECMAScript Module Loader]: esm.html#esm_ecmascript_modules
|
|
|
|
[Evaluate() concrete method]: https://tc39.github.io/ecma262/#sec-moduleevaluation
|
|
|
|
[HostResolveImportedModule]: https://tc39.github.io/ecma262/#sec-hostresolveimportedmodule
|
|
|
|
[Instantiate() concrete method]: https://tc39.github.io/ecma262/#sec-moduledeclarationinstantiation
|
2018-04-01 09:32:26 +02:00
|
|
|
[Source Text Module Record]: https://tc39.github.io/ecma262/#sec-source-text-module-records
|
2017-02-13 16:30:55 +01:00
|
|
|
[V8 Embedder's Guide]: https://github.com/v8/v8/wiki/Embedder's%20Guide#contexts
|
2017-05-08 18:30:13 +02:00
|
|
|
[contextified]: #vm_what_does_it_mean_to_contextify_an_object
|
|
|
|
[global object]: https://es5.github.io/#x15.1
|
|
|
|
[indirect `eval()` call]: https://es5.github.io/#x10.4.2
|
2017-12-17 22:38:15 +01:00
|
|
|
[origin]: https://developer.mozilla.org/en-US/docs/Glossary/Origin
|