Skip to content

child_process: validate options.shell and correctly enforce shell invocation in exec/execSync #56761

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Closed

Conversation

Renegade334
Copy link
Contributor

Previously opened as #54623, and the PR description there is still valid. Unfortunately this was originally submitted while CI was blocked by the macos test platform issues, and never made it back to request-ci.

- narrow validation type to string (previously de facto not validated)
- ensure empty string is coerced to true
- add test cases for options.shell
@nodejs-github-bot nodejs-github-bot added child_process Issues and PRs related to the child_process subsystem. needs-ci PRs that need a full CI run. labels Jan 25, 2025
Copy link

codecov bot commented Jan 25, 2025

Codecov Report

All modified and coverable lines are covered by tests ✅

Project coverage is 89.21%. Comparing base (bade7a1) to head (975a59e).
Report is 1011 commits behind head on main.

Additional details and impacted files
@@            Coverage Diff             @@
##             main   #56761      +/-   ##
==========================================
- Coverage   89.21%   89.21%   -0.01%     
==========================================
  Files         662      662              
  Lines      192124   192129       +5     
  Branches    36980    36976       -4     
==========================================
+ Hits       171404   171407       +3     
- Misses      13552    13558       +6     
+ Partials     7168     7164       -4     
Files with missing lines Coverage Δ
lib/child_process.js 97.74% <100.00%> (+0.01%) ⬆️

... and 21 files with indirect coverage changes

🚀 New features to boost your workflow:
  • ❄️ Test Analytics: Detect flaky tests, report on failures, and find test suite problems.
  • 📦 JS Bundle Analysis: Save yourself from yourself by tracking and limiting bundle sizes in JS merges.

Comment on lines +203 to +204
}
options.shell ||= true;
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I don't understand why would we want to accept the empty string a valid value

Suggested change
}
options.shell ||= true;
} else {
options.shell = true;
}

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This suggested change would maintain the existing edge case behaviour when { shell: '' } is passed to exec.

  • It is not null, and validates as a string, so is passed through unchanged.
  • When this reaches spawn() downstream, because it is not a truthy value, a shell is not invoked.

exec() must always invoke a shell, and therefore anything that passes this validation needs to be a truthy value.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It would make more sense to throw on empty string IMO

Copy link
Contributor Author

@Renegade334 Renegade334 Apr 24, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'd agree, but this would then diverge from the behaviour of the other spawning child_process functions, unless we change them all? (Everywhere else considers { shell: '' } equivalent to { shell: undefined }.)

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I guess we could start by deprecating that, sure

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Separate PR?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yes, two separate PRs eve, one for doc-only deprecation, and one that adds a runtime warning. Would you like to take up that effort?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

While deprecated, should the behaviour of exec(..., { shell: '' }) be

  1. its current behaviour (attempt to spawn the target directly, equivalent to execFile(..., { shell: false })), or
  2. this proposal's behaviour (spawn a default shell, the same as exec(..., { shell: undefined })?

My vote would be for the latter – the whole point of exec is that it always invokes a shell, so I can't see that anyone would be relying on 1 as intended behaviour.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

IMO it should be the current behavior until we move forward with the deprecation at which point it will throw. I don't see the point of introducing an intermediary breaking change only to land another breaking change

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
child_process Issues and PRs related to the child_process subsystem. needs-ci PRs that need a full CI run.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants