@@ -557,30 +557,34 @@ Wildcards are supported too:
557
557
* ` --allow-fs-read=/home/test* ` will allow read access to everything
558
558
that matches the wildcard. e.g: ` /home/test/file1 ` or ` /home/test2 `
559
559
560
- #### Limitations and known issues
560
+ #### Permission Model constraints
561
561
562
562
There are constraints you need to know before using this system:
563
563
564
+ * The model does not inherit to a child node process or a worker thread.
565
+ * When using the Permission Model the following features will be restricted:
566
+ * Native modules
567
+ * Child process
568
+ * Worker Threads
569
+ * Inspector protocol
570
+ * File system access
571
+ * The Permission Model is initialized after the Node.js environment is set up.
572
+ However, certain flags such as ` --env-file ` or ` --openssl-config ` are designed
573
+ to read files before environment initialization. As a result, such flags are
574
+ not subject to the rules of the Permission Model.
575
+ * OpenSSL engines cannot be requested at runtime when the Permission
576
+ Model is enabled, affecting the built-in crypto, https, and tls modules.
577
+
578
+ #### Limitations and Known Issues
579
+
564
580
* When the permission model is enabled, Node.js may resolve some paths
565
581
differently than when it is disabled.
566
- * Native modules are restricted by default when using the Permission Model.
567
- * OpenSSL engines currently cannot be requested at runtime when the Permission
568
- Model is enabled, affecting the built-in crypto, https, and tls modules.
569
582
* Relative paths are not supported through the CLI (` --allow-fs-* ` ).
570
- * The model does not inherit to a child node process.
571
- * The model does not inherit to a worker thread.
572
583
* Symbolic links will be followed even to locations outside of the set of paths
573
584
that access has been granted to. Relative symbolic links may allow access to
574
585
arbitrary files and directories. When starting applications with the
575
586
permission model enabled, you must ensure that no paths to which access has
576
587
been granted contain relative symbolic links.
577
- * When creating symlinks the target (first argument) should have read and
578
- write access.
579
- * Permission changes are not retroactively applied to existing resources.
580
- * The Permission Model is initialized after the Node.js environment is set up.
581
- However, certain flags such as ` --env-file ` or ` --openssl-config ` are designed
582
- to read files before environment initialization. As a result, such flags are
583
- not subject to the rules of the Permission Model.
584
588
585
589
[ Import maps ] : https://url.spec.whatwg.org/#relative-url-with-fragment-string
586
590
[ Security Policy ] : https://github.com/nodejs/node/blob/main/SECURITY.md
0 commit comments