/* * Copyright (C)2014-2020 Haxe Foundation * * Permission is hereby granted, free of charge, to any person obtaining a * copy of this software and associated documentation files (the "Software"), * to deal in the Software without restriction, including without limitation * the rights to use, copy, modify, merge, publish, distribute, sublicense, * and/or sell copies of the Software, and to permit persons to whom the * Software is furnished to do so, subject to the following conditions: * * The above copyright notice and this permission notice shall be included in * all copies or substantial portions of the Software. * * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING * FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER * DEALINGS IN THE SOFTWARE. */ package js.node; import js.node.vm.Script; /** Options object used by Vm.run* methods. **/ typedef VmRunOptions = { > ScriptOptions, > ScriptRunOptions, } /** Using this class JavaScript code can be compiled and run immediately or compiled, saved, and run later. **/ @:jsRequire("vm") extern class Vm { /** Compiles `code`, runs it and returns the result. Running code does not have access to local scope. `filename` is optional, it's used only in stack traces. In case of syntax error in `code` emits the syntax error to stderr and throws an exception. **/ static function runInThisContext(code:String, ?options:VmRunOptions):Dynamic; /** Compiles `code`, contextifies `sandbox` if passed or creates a new contextified sandbox if it's omitted, and then runs the code with the sandbox as the global object and returns the result. `runInNewContext` takes the same options as `runInThisContext`. Note that running untrusted code is a tricky business requiring great care. `runInNewContext` is quite useful, but safely running untrusted code requires a separate process. **/ @:overload(function(code:String, ?sandbox:{}):Dynamic {}) static function runInNewContext(code:String, sandbox:{}, ?options:VmRunOptions):Dynamic; /** Compiles `code`, then runs it in `contextifiedSandbox` and returns the result. Running code does not have access to local scope. The `contextifiedSandbox` object must have been previously contextified via `createContext`; it will be used as the global object for code. `runInContext` takes the same options as `runInThisContext`. Note that running untrusted code is a tricky business requiring great care. `runInContext` is quite useful, but safely running untrusted code requires a separate process. **/ static function runInContext(code:String, contextifiedSandbox:VmContext, ?options:VmRunOptions):Dynamic; /** If given a sandbox object, will "contextify" that sandbox so that it can be used in calls to `runInContext` or `Script.runInContext`. Inside scripts run as such, sandbox will be the global object, retaining all its existing properties but also having the built-in objects and functions any standard global object has. Outside of scripts run by the vm module, sandbox will be unchanged. If not given a sandbox object, returns a new, empty contextified sandbox object you can use. This function is useful for creating a sandbox that can be used to run multiple scripts, e.g. if you were emulating a web browser it could be used to create a single sandbox representing a window's global object, then run all