ServerJS/Modules/SecurableModules: Difference between revisions
Jump to navigation
Jump to search
(→Implementations: add helma ng) |
Wesgarland (talk | contribs) m (Added GPSEE link) |
||
Line 72: | Line 72: | ||
* pmuellr posted a sample loader http://wiki.github.com/pmuellr/modjewel | * pmuellr posted a sample loader http://wiki.github.com/pmuellr/modjewel | ||
* kriskowal: prototype for a client-side module loader that supports modules that conform to this specification using PATH relative URL's or module relative URL's without making security guarantees is partially complete in the [http://code.google.com/p/chironjs/source/browse/branch/safe/src/modules.js "safe" branch of modules.js]. | * kriskowal: prototype for a client-side module loader that supports modules that conform to this specification using PATH relative URL's or module relative URL's without making security guarantees is partially complete in the [http://code.google.com/p/chironjs/source/browse/branch/safe/src/modules.js "safe" branch of modules.js]. | ||
* wes garland at pagemail is working on a spidermonkey implementation | * wes garland at pagemail is working on a spidermonkey implementation called GPSEE: http://kenai.com/projects/gpsee/pages/Home | ||
* mob is implementing this in Ejscript http://www.ejscript.org | * mob is implementing this in Ejscript http://www.ejscript.org | ||
* nathan smith is implementing this for JScript and ASP at http://github.com/smith/interoperablejscript/tree/master | * nathan smith is implementing this for JScript and ASP at http://github.com/smith/interoperablejscript/tree/master | ||
* hannesw: Helma NG now implements (a superset of) the Securable Modules proposal http://github.com/hns/helma-ng/tree/master | * hannesw: Helma NG now implements (a superset of) the Securable Modules proposal http://github.com/hns/helma-ng/tree/master |
Revision as of 14:47, 6 April 2009
This specification addresses how modules should be written in order to be interoperable among a class of module systems that can be both client and server side, secure or insecure, implemented today or supported by future systems with syntax extensions. These modules are offered privacy of their top scope, facility for importing singleton objects from other modules, and exporting their own API. By implication, this specification defines the minimum features that a module system must provide in order to support interoperable modules.
Contract
Module Context
- A module receives a "require" function.
- The "require" function accepts a module identifier.
- "require" returns an object containing the exported API of the foreign module.
- If there is a dependency cycle, the foreign module may not have finished executing at the time it is required by one of its transitive dependencies; in this case, the object returned by "require" must contain at least the exports that the foreign module has prepared before the call to require that led to the current module's execution.
- If the requested module cannot be returned, "require" must throw an error.
- A module receives an "exports" object that it may add its exported API to as it executes.
- modules must use the "exports" object as the only means of exporting.
Module Identifiers
- A module identifier is a String of "terms" delimited by forward slashes.
- A term must be a camelCase identifier, ".", or "..".
- Module identifiers may not have file-name extensions like ".js".
- Module identifiers may be "relative" or "top-level". A module identifier is "relative" if the first term is "." or "..".
- Top-level identifiers are resolved off the conceptual module name space root.
- Relative identifiers are resolved relative to the identifier of the module in which "require" is written and called.
Unspecified
This specification leaves the following important points of interoperability unspecified:
- Whether modules are stored with a database, file system, or factory functions, or are interchangeable with link libraries.
- Whether a PATH is supported by the module loader for resolving module identifiers.
Unit Tests
Sample Code
math.js:
exports.add = function() { var sum = arguments[0]; for (var i=1; i<arguments.length; i++) { sum += arguments[i]; } return sum; };
increment.js:
var add = require('math').add; exports.increment = function(val) { return add(val, 1); };
program.js:
var inc = require('increment').increment; var a = 1; inc(a); // 2
Notes
- Secure Modules
- Notes on compiling modules for browsers
- On writing modules that also work as <script>s
Amendment Proposals
Implementations
- ondras is presently implementing this proposal for v8cgi http://code.google.com/p/v8cgi/
- tlrobinson is presently implementing this proposal for Jack http://github.com/tlrobinson/jack/tree/functional
- kriszyp has implemented this proposal in Persevere http://www.persvr.org/
- pmuellr posted a sample loader http://wiki.github.com/pmuellr/modjewel
- kriskowal: prototype for a client-side module loader that supports modules that conform to this specification using PATH relative URL's or module relative URL's without making security guarantees is partially complete in the "safe" branch of modules.js.
- wes garland at pagemail is working on a spidermonkey implementation called GPSEE: http://kenai.com/projects/gpsee/pages/Home
- mob is implementing this in Ejscript http://www.ejscript.org
- nathan smith is implementing this for JScript and ASP at http://github.com/smith/interoperablejscript/tree/master
- hannesw: Helma NG now implements (a superset of) the Securable Modules proposal http://github.com/hns/helma-ng/tree/master