Why should i use it ? How often do you see libraries which mutates global variables Or how often do you check libraries actions ? Library provides script isolation in custom contexts to solve this issues. Also, isolation prevents global scope and prototypes pollution.
Tip
May be useful as routing loader, if some loaded route makes an error while runtime, you may recreate it - to prevent memory leaks. Another worlds, with this library you can create multi-tenant applications;
npm i isolation --save
-
Prevent intentionally damage
It will stop tricky users code, while you don't allow it.
// index.js const Isolation = require('isolation'); const options = { access: { sandbox: module => module !== 'fs' } }; const routes = Isolation.read('./routes', options); // ⚠️ Will throw error because fs doesn't allowed
// routes/route/get.js const dangerousLibrary = require('unchecked-dangerous-library'); // Point where dangerous library initialized // ... other logic
// unchecked-dangerous-library index.js const fs = require('fs'); fs.rm(process.cwd(), { recursive: true }); // Ha ha, no-code developer
-
Prevent unintentionally damage
This solves problem where libraries used to mutate global variables.
// index.js const Isolation = require('isolation'); Isolation.read('./routes'); console.log('All works fine'); console('Here it not works'); // Will throw error String.prototype; // Will be as default
// routes/route/get.js const dangerousLibrary = require('unchecked-dangerous-library'); // Point where dangerous library initialized // ... other logic
// unchecked-dangerous-library index.js var console = msg => process.stdout.write(msg); // Someone just want different implementation for console global.console = console; console('Here it works fine'); String.prototype = {}; // Or just mutating prototypes
Caution
You can run any script from string, just like eval, but in custom VM container. But you shouldn't use it for unknown script evaluation, it may create security issues.
By default Isolation will use Standard Nodejs syntax. With this type of syntax it will provide to your realms global variables such as:
- require function, which is almost same as nodejs require, but with extra cup of isolation;
- module & exports variables provided to manipulate with exports between modules;
- __filename & __dirname are same as with default nodejs realm;
const Isolation = require('isolation');
console.log(new Isolation(`module.exports = { field: 'value' };`).execute()); // Output: { field: 'value' }
console.log(Isolation.execute(`module.exports = (a, b) => a + b;`)(2 + 2)); // Output: 4
Isolation.execute(`module.exports = async (a, b) => a + b;`)(2 + 2).then(console.log); // Output: 4
Important
You always should use module.exports to export, otherwise you will see undefined as the result of realm execution.
This type of syntax will stand your script alone without any of extra global variables. That means
that you would not see module
or exports
in your environment. But your
context variables will still work well.
const Isolation = require('isolation');
const options = { type: 'iso' };
console.log(new Isolation(`{ field: 'value' };`, options).execute()); // Output: { field: 'value' }
console.log(Isolation.execute(`(a, b) => a + b;`, options)(2 + 2)); // Output: 4
Isolation.execute(`async (a, b) => a + b;`, options)(2 + 2).then(console.log); // Output: 4
Important
In this mode, your realms will export result of the last expression, that means that you should put a reference to your variable or expression at the end of the file / row;
Isolation does'nt support esm syntax yet. That's because currently node.vm
ESM modules
are experimental.
You can create custom context or use default presets with context api. This will allow you to provide your custom variables to the context without requiring any module.
const { sandbox, execute } = require('isolation');
const custom = sandbox({ console });
execute(`console.log(123);`, { ctx: custom }); // STD Output: 123
execute(`console.log(123);`); // No STD output, because different stdout stream
Also its allow you to change program behavior with something like:
const ctx = Isolation.sandbox({ a: 1000, b: 10 });
const realm = new Isolation(`module.exports = a - b`, { ctx });
realm.execute(); // Output: 990
realm.execute({ ...ctx, a: 0 }); // Output: -10
realm.execute({ ...ctx, b: 7 }); // Output: 993
Tip
Remember to reuse your contexts. This will encrease performance of your application. To help you with this we have default contexts:
Default contexts are accessible from Isolation.sandbox, there you can find:
- Isolation.sandbox.EMPTY, that just empty context
- Isolation.sandbox.COMMON, timers, buffer, fetch etc...
- Isolation.sandbox.NODE, global, console, process & COMMON context You should not use NODE, it may create security issues, becouse of sandbox escaping.
Reader allow you to run scripts from files and extends possible provided options with:
-
Option
prepare:boolean
reader will return non-executed scripts, default false -
Option
depth:number|boolean
nested directories restrictions, default true -
read
Allow you to read source codes from files and directoriesconst Realm = require('isolation'); Realm.read('./path/to/script.js').then(console.log); // Output: result of script execution Realm.read('./path/to').then(console.log); // Output: { script: any } Realm.read('./path/to', { prepare: true }).then(console.log); // Output: { script: Script {} }
By default reader works with nested directories, to disable this behavior you can do:
const Isolation = require('isolation'); Isolation.read('./path/to', { depth: false }); // Or limit it: Isolation.read('./path/to', { depth: 3 });
-
read.file
Allow you to execute script from single fileconst Isolation = require('isolation'); Isolation.read.file('./path/to/script.js').then(console.log); // Output: result of script execution Isolation.read.file('./path/to/script.js', { prepare: true }).then(console.log); // Output: Script {}
-
read.dir
Allow you to execute multiple scripts from directoryconst Isolation = require('isolation'); Isolation.read.dir('./path/to').then(console.log); // Output: { script: any, deep: { script: any } } Isolation.read.dir('./path/to', { prepare: true }).then(console.log); Output: { script: Script {} } Isolation.read.dir('./path/to', { depth: false }).then(console.log); // Output: { script: any }
You may control access to some modules or paths of your application
[!NOTE] If access doesn't provided realm submodules would'nt be accessible, also reader will read all files in directed repository
const options = { access: pathOrModule => pathOrModule === 'fs' || pathOrModule.endsWith('.js') };
Isolation.execute('module.exports = require("fs")', options);
Isolation.read('./path/to/script.js', options);
// Or
const options2 = {
access: {
reader: path => true, // Reader control
realm: module => {}, // Realm require control
},
};
You can replace result of require for specific libraries with anything what you want;
const Isolation = require('isolation');
const src = `
const fs = require('fs');
module.exports = fs.readFile('Isolation.js');
`;
const sub = name => {
if (name !== 'fs') return true;
return {
readFile: filename => filename + ' Works !',
};
};
const result = Isolation.execute(src, { access: { realm: sub } });
console.log(result); // Output: Isolation.js Works !
Option | Possible | Default | Description |
---|---|---|---|
type | iso|cjs | cjs | Type of script handling, see syntax types |
ctx | object | {} | Realm context, see Context API |
filename | string | ISO | Name of the module | __filename |
dir | string | process.cwd() | Module directory | __dirname |
npmIsolation | boolean | false | Controls npm modules isolation |
access | Access | {} | Isolation restrictions, see Access API |
prepare | boolean | false | Reader would'nt execute script for you |
depth | boolean|number | true | Restricts dir reading depth |
script | ScriptOptions | {} | Configuration for VM.Script initialization |
run | RunningCodeOptions | {timeout: 1000} | Configuration for VM.Script execution |
Copyright © 2023 Astrohelm contributors.
This library is MIT licensed license.
And it is part of Astrohelm solutions.