|
1 | 1 | # Permissions
|
2 | 2 |
|
3 |
| -This section exposes security features available to be adopted in a |
4 |
| -Node.js application. The available scopes are: |
| 3 | +Permissions can be used to control what system resources the |
| 4 | +Node.js process has access to or what actions the process can take |
| 5 | +with those resources. Permissions can also control what modules can |
| 6 | +be accessed by other modules. |
5 | 7 |
|
6 |
| -* [Resource-based permissions](#resource-based-permissions) |
7 |
| -* [Process-based permissions](#process-based-permissions) |
| 8 | +* [Process-based permissions](#process-based-permissions) control the Node.js process's access to |
| 9 | +resources such as the file system or the network. The resource can be |
| 10 | +entirely allowed or denied, or actions related to it can be controlled; |
| 11 | +for example, you can allow file system reads while denying writes. |
8 | 12 |
|
9 |
| -Resource-based permissions stands for the managment of modules using |
10 |
| -policies. A policy can guarantee which module/resource is available |
11 |
| -during the application execution. |
| 13 | +* [Module-based permissions](#module-based-permissions) control which files or URLs are available |
| 14 | +to other modules during application execution. This can be used to |
| 15 | +control what modules can be accessed by third-party dependencies, |
| 16 | +for example. |
12 | 17 |
|
13 |
| -Process-based permissions stands for the management of resources such |
14 |
| -as _File System_ or _Network_. A permission can be configured to restrict |
15 |
| -access to specific resources, for instance, one can restrict access to |
16 |
| -all the _File System_ write. |
| 18 | +Both types of permissions can be used together to provide a |
| 19 | +safer environment. If you find a potential security vulnerability, |
| 20 | +please refer to our [Security Policy][]. |
17 | 21 |
|
18 |
| -Both permissions can be used together to provide a safer environment. |
| 22 | +## Process-based permissions |
19 | 23 |
|
20 |
| -**Note**: if you find a potential security vulnerability on Node.js, |
21 |
| -refer to our [Security Policy][]. |
| 24 | +// STUB |
22 | 25 |
|
23 |
| -## Resource-based permissions |
| 26 | +## Module-based permissions |
24 | 27 |
|
25 | 28 | ## Policies
|
26 | 29 |
|
@@ -447,9 +450,7 @@ not adopt the origin of the `blob:` URL.
|
447 | 450 | Additionally, import maps only work on `import` so it may be desirable to add a
|
448 | 451 | `"import"` condition to all dependency mappings.
|
449 | 452 |
|
450 |
| -## Process-based permissions |
451 |
| - |
| 453 | +[Security Policy]: https://github.com/nodejs/node/blob/main/SECURITY.md |
452 | 454 | [import maps]: https://url.spec.whatwg.org/#relative-url-with-fragment-string
|
453 | 455 | [relative-url string]: https://url.spec.whatwg.org/#relative-url-with-fragment-string
|
454 | 456 | [special schemes]: https://url.spec.whatwg.org/#special-scheme
|
455 |
| -[Security Policy]: https://github.com/nodejs/node/blob/main/SECURITY.md |
|
0 commit comments