d8-posix.cc 26.2 KB
Newer Older
1
// Copyright 2009 the V8 project authors. All rights reserved.
2 3
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
4 5

#include <errno.h>
6
#include <fcntl.h>
7
#include <signal.h>
8
#include <stdlib.h>
9
#include <string.h>
yangguo's avatar
yangguo committed
10
#include <sys/select.h>
11
#include <sys/stat.h>
12
#include <sys/time.h>
13 14
#include <sys/types.h>
#include <sys/wait.h>
15 16
#include <unistd.h>

17
#include "src/d8.h"
18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80

namespace v8 {


// If the buffer ends in the middle of a UTF-8 sequence then we return
// the length of the string up to but not including the incomplete UTF-8
// sequence.  If the buffer ends with a valid UTF-8 sequence then we
// return the whole buffer.
static int LengthWithoutIncompleteUtf8(char* buffer, int len) {
  int answer = len;
  // 1-byte encoding.
  static const int kUtf8SingleByteMask = 0x80;
  static const int kUtf8SingleByteValue = 0x00;
  // 2-byte encoding.
  static const int kUtf8TwoByteMask = 0xe0;
  static const int kUtf8TwoByteValue = 0xc0;
  // 3-byte encoding.
  static const int kUtf8ThreeByteMask = 0xf0;
  static const int kUtf8ThreeByteValue = 0xe0;
  // 4-byte encoding.
  static const int kUtf8FourByteMask = 0xf8;
  static const int kUtf8FourByteValue = 0xf0;
  // Subsequent bytes of a multi-byte encoding.
  static const int kMultiByteMask = 0xc0;
  static const int kMultiByteValue = 0x80;
  int multi_byte_bytes_seen = 0;
  while (answer > 0) {
    int c = buffer[answer - 1];
    // Ends in valid single-byte sequence?
    if ((c & kUtf8SingleByteMask) == kUtf8SingleByteValue) return answer;
    // Ends in one or more subsequent bytes of a multi-byte value?
    if ((c & kMultiByteMask) == kMultiByteValue) {
      multi_byte_bytes_seen++;
      answer--;
    } else {
      if ((c & kUtf8TwoByteMask) == kUtf8TwoByteValue) {
        if (multi_byte_bytes_seen >= 1) {
          return answer + 2;
        }
        return answer - 1;
      } else if ((c & kUtf8ThreeByteMask) == kUtf8ThreeByteValue) {
        if (multi_byte_bytes_seen >= 2) {
          return answer + 3;
        }
        return answer - 1;
      } else if ((c & kUtf8FourByteMask) == kUtf8FourByteValue) {
        if (multi_byte_bytes_seen >= 3) {
          return answer + 4;
        }
        return answer - 1;
      } else {
        return answer;  // Malformed UTF-8.
      }
    }
  }
  return 0;
}


// Suspends the thread until there is data available from the child process.
// Returns false on timeout, true on data ready.
static bool WaitOnFD(int fd,
                     int read_timeout,
81
                     int total_timeout,
82
                     const struct timeval& start_time) {
83 84
  fd_set readfds, writefds, exceptfds;
  struct timeval timeout;
85 86
  int gone = 0;
  if (total_timeout != -1) {
87 88
    struct timeval time_now;
    gettimeofday(&time_now, NULL);
89 90 91
    time_t seconds = time_now.tv_sec - start_time.tv_sec;
    gone = static_cast<int>(seconds * 1000 +
                            (time_now.tv_usec - start_time.tv_usec) / 1000);
92
    if (gone >= total_timeout) return false;
93 94 95 96 97 98 99
  }
  FD_ZERO(&readfds);
  FD_ZERO(&writefds);
  FD_ZERO(&exceptfds);
  FD_SET(fd, &readfds);
  FD_SET(fd, &exceptfds);
  if (read_timeout == -1 ||
100 101
      (total_timeout != -1 && total_timeout - gone < read_timeout)) {
    read_timeout = total_timeout - gone;
102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120
  }
  timeout.tv_usec = (read_timeout % 1000) * 1000;
  timeout.tv_sec = read_timeout / 1000;
  int number_of_fds_ready = select(fd + 1,
                                   &readfds,
                                   &writefds,
                                   &exceptfds,
                                   read_timeout != -1 ? &timeout : NULL);
  return number_of_fds_ready == 1;
}


// Checks whether we ran out of time on the timeout.  Returns true if we ran out
// of time, false if we still have time.
static bool TimeIsOut(const struct timeval& start_time, const int& total_time) {
  if (total_time == -1) return false;
  struct timeval time_now;
  gettimeofday(&time_now, NULL);
  // Careful about overflow.
121
  int seconds = static_cast<int>(time_now.tv_sec - start_time.tv_sec);
122 123 124 125
  if (seconds > 100) {
    if (seconds * 1000 > total_time) return true;
    return false;
  }
126
  int useconds = static_cast<int>(time_now.tv_usec - start_time.tv_usec);
127 128 129 130 131 132 133 134 135 136 137 138 139
  if (seconds * 1000000 + useconds > total_time * 1000) {
    return true;
  }
  return false;
}


// A utility class that does a non-hanging waitpid on the child process if we
// bail out of the System() function early.  If you don't ever do a waitpid on
// a subprocess then it turns into one of those annoying 'zombie processes'.
class ZombieProtector {
 public:
  explicit ZombieProtector(int pid): pid_(pid) { }
140
  ~ZombieProtector() { if (pid_ != 0) waitpid(pid_, NULL, 0); }
141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161
  void ChildIsDeadNow() { pid_ = 0; }
 private:
  int pid_;
};


// A utility class that closes a file descriptor when it goes out of scope.
class OpenFDCloser {
 public:
  explicit OpenFDCloser(int fd): fd_(fd) { }
  ~OpenFDCloser() { close(fd_); }
 private:
  int fd_;
};


// A utility class that takes the array of command arguments and puts then in an
// array of new[]ed UTF-8 C strings.  Deallocates them again when it goes out of
// scope.
class ExecArgs {
 public:
162 163 164
  ExecArgs() {
    exec_args_[0] = NULL;
  }
165
  bool Init(Isolate* isolate, Local<Value> arg0, Local<Array> command_args) {
166
    String::Utf8Value prog(arg0);
167 168 169
    if (*prog == NULL) {
      const char* message =
          "os.system(): String conversion of program name failed";
170 171 172
      isolate->ThrowException(
          String::NewFromUtf8(isolate, message, NewStringType::kNormal)
              .ToLocalChecked());
173 174 175
      return false;
    }
    int len = prog.length() + 3;
176 177 178 179 180
    char* c_arg = new char[len];
    snprintf(c_arg, len, "%s", *prog);
    exec_args_[0] = c_arg;
    int i = 1;
    for (unsigned j = 0; j < command_args->Length(); i++, j++) {
181 182 183
      Local<Value> arg(
          command_args->Get(isolate->GetCurrentContext(),
                            Integer::New(isolate, j)).ToLocalChecked());
184
      String::Utf8Value utf8_arg(arg);
185 186 187 188
      if (*utf8_arg == NULL) {
        exec_args_[i] = NULL;  // Consistent state for destructor.
        const char* message =
            "os.system(): String conversion of argument failed.";
189 190 191
        isolate->ThrowException(
            String::NewFromUtf8(isolate, message, NewStringType::kNormal)
                .ToLocalChecked());
192 193
        return false;
      }
194 195 196 197 198 199
      int len = utf8_arg.length() + 1;
      char* c_arg = new char[len];
      snprintf(c_arg, len, "%s", *utf8_arg);
      exec_args_[i] = c_arg;
    }
    exec_args_[i] = NULL;
200
    return true;
201 202 203 204 205 206 207 208 209 210 211
  }
  ~ExecArgs() {
    for (unsigned i = 0; i < kMaxArgs; i++) {
      if (exec_args_[i] == NULL) {
        return;
      }
      delete [] exec_args_[i];
      exec_args_[i] = 0;
    }
  }
  static const unsigned kMaxArgs = 1000;
212 213
  char* const* arg_array() const { return exec_args_; }
  const char* arg0() const { return exec_args_[0]; }
214

215 216 217 218 219 220
 private:
  char* exec_args_[kMaxArgs + 1];
};


// Gets the optional timeouts from the arguments to the system() call.
221
static bool GetTimeouts(const v8::FunctionCallbackInfo<v8::Value>& args,
222 223 224 225
                        int* read_timeout,
                        int* total_timeout) {
  if (args.Length() > 3) {
    if (args[3]->IsNumber()) {
226 227 228
      *total_timeout = args[3]
                           ->Int32Value(args.GetIsolate()->GetCurrentContext())
                           .FromJust();
229
    } else {
230 231 232 233
      args.GetIsolate()->ThrowException(
          String::NewFromUtf8(args.GetIsolate(),
                              "system: Argument 4 must be a number",
                              NewStringType::kNormal).ToLocalChecked());
234 235 236 237 238
      return false;
    }
  }
  if (args.Length() > 2) {
    if (args[2]->IsNumber()) {
239 240 241
      *read_timeout = args[2]
                          ->Int32Value(args.GetIsolate()->GetCurrentContext())
                          .FromJust();
242
    } else {
243 244 245 246
      args.GetIsolate()->ThrowException(
          String::NewFromUtf8(args.GetIsolate(),
                              "system: Argument 3 must be a number",
                              NewStringType::kNormal).ToLocalChecked());
247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262
      return false;
    }
  }
  return true;
}


static const int kReadFD = 0;
static const int kWriteFD = 1;


// This is run in the child process after fork() but before exec().  It normally
// ends with the child process being replaced with the desired child program.
// It only returns if an error occurred.
static void ExecSubprocess(int* exec_error_fds,
                           int* stdout_fds,
263
                           const ExecArgs& exec_args) {
264 265 266 267 268 269 270 271 272 273
  close(exec_error_fds[kReadFD]);  // Don't need this in the child.
  close(stdout_fds[kReadFD]);      // Don't need this in the child.
  close(1);                        // Close stdout.
  dup2(stdout_fds[kWriteFD], 1);   // Dup pipe fd to stdout.
  close(stdout_fds[kWriteFD]);     // Don't need the original fd now.
  fcntl(exec_error_fds[kWriteFD], F_SETFD, FD_CLOEXEC);
  execvp(exec_args.arg0(), exec_args.arg_array());
  // Only get here if the exec failed.  Write errno to the parent to tell
  // them it went wrong.  If it went well the pipe is closed.
  int err = errno;
274
  ssize_t bytes_written;
275 276 277
  do {
    bytes_written = write(exec_error_fds[kWriteFD], &err, sizeof(err));
  } while (bytes_written == -1 && errno == EINTR);
278 279 280 281 282 283
  // Return (and exit child process).
}


// Runs in the parent process.  Checks that the child was able to exec (closing
// the file desriptor), or reports an error if it failed.
284
static bool ChildLaunchedOK(Isolate* isolate, int* exec_error_fds) {
285
  ssize_t bytes_read;
286 287 288 289 290
  int err;
  do {
    bytes_read = read(exec_error_fds[kReadFD], &err, sizeof(err));
  } while (bytes_read == -1 && errno == EINTR);
  if (bytes_read != 0) {
291 292 293
    isolate->ThrowException(
        String::NewFromUtf8(isolate, strerror(err), NewStringType::kNormal)
            .ToLocalChecked());
294 295 296 297 298 299 300 301
    return false;
  }
  return true;
}


// Accumulates the output from the child in a string handle.  Returns true if it
// succeeded or false if an exception was thrown.
302 303 304 305
static Local<Value> GetStdout(Isolate* isolate, int child_fd,
                              const struct timeval& start_time,
                              int read_timeout, int total_timeout) {
  Local<String> accumulator = String::Empty(isolate);
306 307 308 309 310 311

  int fullness = 0;
  static const int kStdoutReadBufferSize = 4096;
  char buffer[kStdoutReadBufferSize];

  if (fcntl(child_fd, F_SETFL, O_NONBLOCK) != 0) {
312
    return isolate->ThrowException(
313 314
        String::NewFromUtf8(isolate, strerror(errno), NewStringType::kNormal)
            .ToLocalChecked());
315 316 317 318
  }

  int bytes_read;
  do {
319 320
    bytes_read = static_cast<int>(
        read(child_fd, buffer + fullness, kStdoutReadBufferSize - fullness));
321 322 323 324 325 326
    if (bytes_read == -1) {
      if (errno == EAGAIN) {
        if (!WaitOnFD(child_fd,
                      read_timeout,
                      total_timeout,
                      start_time) ||
327
            (TimeIsOut(start_time, total_timeout))) {
328
          return isolate->ThrowException(
329 330
              String::NewFromUtf8(isolate, "Timed out waiting for output",
                                  NewStringType::kNormal).ToLocalChecked());
331 332 333 334 335 336 337 338 339 340 341 342
        }
        continue;
      } else if (errno == EINTR) {
        continue;
      } else {
        break;
      }
    }
    if (bytes_read + fullness > 0) {
      int length = bytes_read == 0 ?
                   bytes_read + fullness :
                   LengthWithoutIncompleteUtf8(buffer, bytes_read + fullness);
343 344 345
      Local<String> addition =
          String::NewFromUtf8(isolate, buffer, NewStringType::kNormal, length)
              .ToLocalChecked();
346
      accumulator = String::Concat(accumulator, addition);
347 348 349 350 351 352 353 354 355 356 357 358 359 360
      fullness = bytes_read + fullness - length;
      memcpy(buffer, buffer + length, fullness);
    }
  } while (bytes_read != 0);
  return accumulator;
}


// Modern Linux has the waitid call, which is like waitpid, but more useful
// if you want a timeout.  If we don't have waitid we can't limit the time
// waiting for the process to exit without losing the information about
// whether it exited normally.  In the common case this doesn't matter because
// we don't get here before the child has closed stdout and most programs don't
// do that before they exit.
361 362 363 364
//
// We're disabling usage of waitid in Mac OS X because it doens't work for us:
// a parent process hangs on waiting while a child process is already a zombie.
// See http://code.google.com/p/v8/issues/detail?id=401.
365 366 367
#if defined(WNOWAIT) && !defined(ANDROID) && !defined(__APPLE__) \
    && !defined(__NetBSD__)
#if !defined(__FreeBSD__)
368 369
#define HAS_WAITID 1
#endif
370
#endif
371 372 373


// Get exit status of child.
374 375
static bool WaitForChild(Isolate* isolate,
                         int pid,
376 377
                         ZombieProtector& child_waiter,  // NOLINT
                         const struct timeval& start_time,
378 379 380 381 382 383 384 385 386 387 388 389 390 391
                         int read_timeout,
                         int total_timeout) {
#ifdef HAS_WAITID

  siginfo_t child_info;
  child_info.si_pid = 0;
  int useconds = 1;
  // Wait for child to exit.
  while (child_info.si_pid == 0) {
    waitid(P_PID, pid, &child_info, WEXITED | WNOHANG | WNOWAIT);
    usleep(useconds);
    if (useconds < 1000000) useconds <<= 1;
    if ((read_timeout != -1 && useconds / 1000 > read_timeout) ||
        (TimeIsOut(start_time, total_timeout))) {
392 393 394 395
      isolate->ThrowException(
          String::NewFromUtf8(isolate,
                              "Timed out waiting for process to terminate",
                              NewStringType::kNormal).ToLocalChecked());
396 397 398 399 400 401 402 403 404 405
      kill(pid, SIGINT);
      return false;
    }
  }
  if (child_info.si_code == CLD_KILLED) {
    char message[999];
    snprintf(message,
             sizeof(message),
             "Child killed by signal %d",
             child_info.si_status);
406 407 408
    isolate->ThrowException(
        String::NewFromUtf8(isolate, message, NewStringType::kNormal)
            .ToLocalChecked());
409 410 411 412 413 414 415 416
    return false;
  }
  if (child_info.si_code == CLD_EXITED && child_info.si_status != 0) {
    char message[999];
    snprintf(message,
             sizeof(message),
             "Child exited with status %d",
             child_info.si_status);
417 418 419
    isolate->ThrowException(
        String::NewFromUtf8(isolate, message, NewStringType::kNormal)
            .ToLocalChecked());
420 421 422 423 424 425 426 427 428 429 430 431 432 433
    return false;
  }

#else  // No waitid call.

  int child_status;
  waitpid(pid, &child_status, 0);  // We hang here if the child doesn't exit.
  child_waiter.ChildIsDeadNow();
  if (WIFSIGNALED(child_status)) {
    char message[999];
    snprintf(message,
             sizeof(message),
             "Child killed by signal %d",
             WTERMSIG(child_status));
434 435 436
    isolate->ThrowException(
        String::NewFromUtf8(isolate, message, NewStringType::kNormal)
            .ToLocalChecked());
437 438 439 440 441 442 443 444 445
    return false;
  }
  if (WEXITSTATUS(child_status) != 0) {
    char message[999];
    int exit_status = WEXITSTATUS(child_status);
    snprintf(message,
             sizeof(message),
             "Child exited with status %d",
             exit_status);
446 447 448
    isolate->ThrowException(
        String::NewFromUtf8(isolate, message, NewStringType::kNormal)
            .ToLocalChecked());
449 450 451 452 453 454 455 456 457 458
    return false;
  }

#endif  // No waitid call.

  return true;
}


// Implementation of the system() function (see d8.h for details).
459
void Shell::System(const v8::FunctionCallbackInfo<v8::Value>& args) {
460
  HandleScope scope(args.GetIsolate());
461 462
  int read_timeout = -1;
  int total_timeout = -1;
463
  if (!GetTimeouts(args, &read_timeout, &total_timeout)) return;
464
  Local<Array> command_args;
465 466
  if (args.Length() > 1) {
    if (!args[1]->IsArray()) {
467 468 469 470
      args.GetIsolate()->ThrowException(
          String::NewFromUtf8(args.GetIsolate(),
                              "system: Argument 2 must be an array",
                              NewStringType::kNormal).ToLocalChecked());
471
      return;
472
    }
473
    command_args = Local<Array>::Cast(args[1]);
474
  } else {
475
    command_args = Array::New(args.GetIsolate(), 0);
476 477
  }
  if (command_args->Length() > ExecArgs::kMaxArgs) {
478 479 480
    args.GetIsolate()->ThrowException(
        String::NewFromUtf8(args.GetIsolate(), "Too many arguments to system()",
                            NewStringType::kNormal).ToLocalChecked());
481
    return;
482 483
  }
  if (args.Length() < 1) {
484 485 486
    args.GetIsolate()->ThrowException(
        String::NewFromUtf8(args.GetIsolate(), "Too few arguments to system()",
                            NewStringType::kNormal).ToLocalChecked());
487
    return;
488 489 490 491 492
  }

  struct timeval start_time;
  gettimeofday(&start_time, NULL);

493
  ExecArgs exec_args;
494
  if (!exec_args.Init(args.GetIsolate(), args[0], command_args)) {
495
    return;
496
  }
497 498 499 500
  int exec_error_fds[2];
  int stdout_fds[2];

  if (pipe(exec_error_fds) != 0) {
501
    args.GetIsolate()->ThrowException(
502 503
        String::NewFromUtf8(args.GetIsolate(), "pipe syscall failed.",
                            NewStringType::kNormal).ToLocalChecked());
504
    return;
505 506
  }
  if (pipe(stdout_fds) != 0) {
507
    args.GetIsolate()->ThrowException(
508 509
        String::NewFromUtf8(args.GetIsolate(), "pipe syscall failed.",
                            NewStringType::kNormal).ToLocalChecked());
510
    return;
511 512 513 514 515 516 517 518 519 520 521 522 523 524 525
  }

  pid_t pid = fork();
  if (pid == 0) {  // Child process.
    ExecSubprocess(exec_error_fds, stdout_fds, exec_args);
    exit(1);
  }

  // Parent process.  Ensure that we clean up if we exit this function early.
  ZombieProtector child_waiter(pid);
  close(exec_error_fds[kWriteFD]);
  close(stdout_fds[kWriteFD]);
  OpenFDCloser error_read_closer(exec_error_fds[kReadFD]);
  OpenFDCloser stdout_read_closer(stdout_fds[kReadFD]);

526 527
  Isolate* isolate = args.GetIsolate();
  if (!ChildLaunchedOK(isolate, exec_error_fds)) return;
528

529 530
  Local<Value> accumulator = GetStdout(isolate, stdout_fds[kReadFD], start_time,
                                       read_timeout, total_timeout);
531 532
  if (accumulator->IsUndefined()) {
    kill(pid, SIGINT);  // On timeout, kill the subprocess.
533 534
    args.GetReturnValue().Set(accumulator);
    return;
535 536
  }

537
  if (!WaitForChild(isolate, pid, child_waiter, start_time, read_timeout,
538
                    total_timeout)) {
539
    return;
540 541
  }

542
  args.GetReturnValue().Set(accumulator);
543 544 545
}


546
void Shell::ChangeDirectory(const v8::FunctionCallbackInfo<v8::Value>& args) {
547 548
  if (args.Length() != 1) {
    const char* message = "chdir() takes one argument";
549
    args.GetIsolate()->ThrowException(
550 551
        String::NewFromUtf8(args.GetIsolate(), message, NewStringType::kNormal)
            .ToLocalChecked());
552
    return;
553 554 555 556
  }
  String::Utf8Value directory(args[0]);
  if (*directory == NULL) {
    const char* message = "os.chdir(): String conversion of argument failed.";
557
    args.GetIsolate()->ThrowException(
558 559
        String::NewFromUtf8(args.GetIsolate(), message, NewStringType::kNormal)
            .ToLocalChecked());
560
    return;
561 562
  }
  if (chdir(*directory) != 0) {
563
    args.GetIsolate()->ThrowException(
564 565
        String::NewFromUtf8(args.GetIsolate(), strerror(errno),
                            NewStringType::kNormal).ToLocalChecked());
566
    return;
567 568 569 570
  }
}


571
void Shell::SetUMask(const v8::FunctionCallbackInfo<v8::Value>& args) {
572 573
  if (args.Length() != 1) {
    const char* message = "umask() takes one argument";
574
    args.GetIsolate()->ThrowException(
575 576
        String::NewFromUtf8(args.GetIsolate(), message, NewStringType::kNormal)
            .ToLocalChecked());
577
    return;
578 579
  }
  if (args[0]->IsNumber()) {
580 581
    int previous = umask(
        args[0]->Int32Value(args.GetIsolate()->GetCurrentContext()).FromJust());
582 583
    args.GetReturnValue().Set(previous);
    return;
584 585
  } else {
    const char* message = "umask() argument must be numeric";
586
    args.GetIsolate()->ThrowException(
587 588
        String::NewFromUtf8(args.GetIsolate(), message, NewStringType::kNormal)
            .ToLocalChecked());
589
    return;
590 591 592 593
  }
}


594
static bool CheckItsADirectory(Isolate* isolate, char* directory) {
595 596 597
  struct stat stat_buf;
  int stat_result = stat(directory, &stat_buf);
  if (stat_result != 0) {
598 599 600
    isolate->ThrowException(
        String::NewFromUtf8(isolate, strerror(errno), NewStringType::kNormal)
            .ToLocalChecked());
601 602 603
    return false;
  }
  if ((stat_buf.st_mode & S_IFDIR) != 0) return true;
604 605 606
  isolate->ThrowException(
      String::NewFromUtf8(isolate, strerror(EEXIST), NewStringType::kNormal)
          .ToLocalChecked());
607 608 609 610 611 612
  return false;
}


// Returns true for success.  Creates intermediate directories as needed.  No
// error if the directory exists already.
613
static bool mkdirp(Isolate* isolate, char* directory, mode_t mask) {
614 615 616
  int result = mkdir(directory, mask);
  if (result == 0) return true;
  if (errno == EEXIST) {
617
    return CheckItsADirectory(isolate, directory);
618 619 620
  } else if (errno == ENOENT) {  // Intermediate path element is missing.
    char* last_slash = strrchr(directory, '/');
    if (last_slash == NULL) {
621 622 623
      isolate->ThrowException(
          String::NewFromUtf8(isolate, strerror(errno), NewStringType::kNormal)
              .ToLocalChecked());
624 625 626
      return false;
    }
    *last_slash = 0;
627
    if (!mkdirp(isolate, directory, mask)) return false;
628 629 630 631
    *last_slash = '/';
    result = mkdir(directory, mask);
    if (result == 0) return true;
    if (errno == EEXIST) {
632
      return CheckItsADirectory(isolate, directory);
633
    }
634 635 636
    isolate->ThrowException(
        String::NewFromUtf8(isolate, strerror(errno), NewStringType::kNormal)
            .ToLocalChecked());
637 638
    return false;
  } else {
639 640 641
    isolate->ThrowException(
        String::NewFromUtf8(isolate, strerror(errno), NewStringType::kNormal)
            .ToLocalChecked());
642 643 644 645 646
    return false;
  }
}


647
void Shell::MakeDirectory(const v8::FunctionCallbackInfo<v8::Value>& args) {
648 649 650
  mode_t mask = 0777;
  if (args.Length() == 2) {
    if (args[1]->IsNumber()) {
651 652 653
      mask = args[1]
                 ->Int32Value(args.GetIsolate()->GetCurrentContext())
                 .FromJust();
654 655
    } else {
      const char* message = "mkdirp() second argument must be numeric";
656
      args.GetIsolate()->ThrowException(
657 658
          String::NewFromUtf8(args.GetIsolate(), message,
                              NewStringType::kNormal).ToLocalChecked());
659
      return;
660 661 662
    }
  } else if (args.Length() != 1) {
    const char* message = "mkdirp() takes one or two arguments";
663
    args.GetIsolate()->ThrowException(
664 665
        String::NewFromUtf8(args.GetIsolate(), message, NewStringType::kNormal)
            .ToLocalChecked());
666
    return;
667 668 669 670
  }
  String::Utf8Value directory(args[0]);
  if (*directory == NULL) {
    const char* message = "os.mkdirp(): String conversion of argument failed.";
671
    args.GetIsolate()->ThrowException(
672 673
        String::NewFromUtf8(args.GetIsolate(), message, NewStringType::kNormal)
            .ToLocalChecked());
674
    return;
675
  }
676
  mkdirp(args.GetIsolate(), *directory, mask);
677 678 679
}


680
void Shell::RemoveDirectory(const v8::FunctionCallbackInfo<v8::Value>& args) {
681 682
  if (args.Length() != 1) {
    const char* message = "rmdir() takes one or two arguments";
683
    args.GetIsolate()->ThrowException(
684 685
        String::NewFromUtf8(args.GetIsolate(), message, NewStringType::kNormal)
            .ToLocalChecked());
686
    return;
687 688 689 690
  }
  String::Utf8Value directory(args[0]);
  if (*directory == NULL) {
    const char* message = "os.rmdir(): String conversion of argument failed.";
691
    args.GetIsolate()->ThrowException(
692 693
        String::NewFromUtf8(args.GetIsolate(), message, NewStringType::kNormal)
            .ToLocalChecked());
694
    return;
695 696 697 698 699
  }
  rmdir(*directory);
}


700
void Shell::SetEnvironment(const v8::FunctionCallbackInfo<v8::Value>& args) {
701 702
  if (args.Length() != 2) {
    const char* message = "setenv() takes two arguments";
703
    args.GetIsolate()->ThrowException(
704 705
        String::NewFromUtf8(args.GetIsolate(), message, NewStringType::kNormal)
            .ToLocalChecked());
706
    return;
707 708 709 710 711 712
  }
  String::Utf8Value var(args[0]);
  String::Utf8Value value(args[1]);
  if (*var == NULL) {
    const char* message =
        "os.setenv(): String conversion of variable name failed.";
713
    args.GetIsolate()->ThrowException(
714 715
        String::NewFromUtf8(args.GetIsolate(), message, NewStringType::kNormal)
            .ToLocalChecked());
716
    return;
717 718 719 720
  }
  if (*value == NULL) {
    const char* message =
        "os.setenv(): String conversion of variable contents failed.";
721
    args.GetIsolate()->ThrowException(
722 723
        String::NewFromUtf8(args.GetIsolate(), message, NewStringType::kNormal)
            .ToLocalChecked());
724
    return;
725 726 727 728 729
  }
  setenv(*var, *value, 1);
}


730
void Shell::UnsetEnvironment(const v8::FunctionCallbackInfo<v8::Value>& args) {
731 732
  if (args.Length() != 1) {
    const char* message = "unsetenv() takes one argument";
733
    args.GetIsolate()->ThrowException(
734 735
        String::NewFromUtf8(args.GetIsolate(), message, NewStringType::kNormal)
            .ToLocalChecked());
736
    return;
737 738 739 740 741
  }
  String::Utf8Value var(args[0]);
  if (*var == NULL) {
    const char* message =
        "os.setenv(): String conversion of variable name failed.";
742
    args.GetIsolate()->ThrowException(
743 744
        String::NewFromUtf8(args.GetIsolate(), message, NewStringType::kNormal)
            .ToLocalChecked());
745
    return;
746 747 748 749 750
  }
  unsetenv(*var);
}


751 752 753
void Shell::AddOSMethods(Isolate* isolate, Local<ObjectTemplate> os_templ) {
  os_templ->Set(String::NewFromUtf8(isolate, "system", NewStringType::kNormal)
                    .ToLocalChecked(),
754
                FunctionTemplate::New(isolate, System));
755 756
  os_templ->Set(String::NewFromUtf8(isolate, "chdir", NewStringType::kNormal)
                    .ToLocalChecked(),
757
                FunctionTemplate::New(isolate, ChangeDirectory));
758 759
  os_templ->Set(String::NewFromUtf8(isolate, "setenv", NewStringType::kNormal)
                    .ToLocalChecked(),
760
                FunctionTemplate::New(isolate, SetEnvironment));
761 762
  os_templ->Set(String::NewFromUtf8(isolate, "unsetenv", NewStringType::kNormal)
                    .ToLocalChecked(),
763
                FunctionTemplate::New(isolate, UnsetEnvironment));
764 765
  os_templ->Set(String::NewFromUtf8(isolate, "umask", NewStringType::kNormal)
                    .ToLocalChecked(),
766
                FunctionTemplate::New(isolate, SetUMask));
767 768
  os_templ->Set(String::NewFromUtf8(isolate, "mkdirp", NewStringType::kNormal)
                    .ToLocalChecked(),
769
                FunctionTemplate::New(isolate, MakeDirectory));
770 771
  os_templ->Set(String::NewFromUtf8(isolate, "rmdir", NewStringType::kNormal)
                    .ToLocalChecked(),
772
                FunctionTemplate::New(isolate, RemoveDirectory));
773 774
}

775 776 777 778 779 780 781 782
void Shell::Exit(int exit_code) {
  // Use _exit instead of exit to avoid races between isolate
  // threads and static destructors.
  fflush(stdout);
  fflush(stderr);
  _exit(exit_code);
}

783
}  // namespace v8