-
Notifications
You must be signed in to change notification settings - Fork 29.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Proposal: --config=file command line argument #11997
Comments
The key requirement I wanted to address with #11888 is being able to do the preload even in For example, if I do How can I get that with this approach? |
I’d really like it if we could set env vars and flags in (almost) 1:1 correspondence. That would make our API more consistent and give users control over which node processes they want to target. Also, I’m not really a fan of adding a config file for Node, except maybe for the REPL (because that’s an actual application that happens to ship with the platform). |
Using an environment variable for each flag might cause issues/headaches if a node process forks, since I realize there are already other environment variables that could have similar issues, but I think adding a new one per flag could make it worse? |
@mscdex That’s more or less what I meant – people can use environment variables if they want that recursive behaviour, and flags otherwise. Imho that’s a pretty traditional approach, and one of the primary reasons environment variables exist. |
The key problem I have with that approach is that the environment variables would have an effect even if the users don't want to use them, and many users may not be aware of them at all. For some environment variables (like |
Right, that’s why I said “almost” – I can see that there are valid reasons for exceptions. I don’t think
I’d be really curious to a scenario in which this is true… if you allow untrusted code to run and set arbitrary environment variables, it seems to me you’d have a problem anyway (messing with |
One scenario is a variation of this: http://blog.npmjs.org/post/141702881055/package-install-scripts-vulnerability ... Install scripts run under the users identity and permissions and have the ability to modify both file system and environment variables in persistent ways that may not be detected. Yes, users can turn off install scripts per the vulnerability report, but how many users know about that and how many actually do turn them off? Sure, this is not a problem that is specific to the use of environment variables and there are all sorts of other risks and vulnerabilities this would allow, but it's one way that a |
(and yes, the install script problem generally applies to all environment variables including HOMe, SHELL, LD_PRELOAD, etc... which is why install scripts really ought to be turned off by default) |
Yeah, I haven't completely ruled it out, by any means. I'm still exploring and kicking around ideas. My key concern here is that I don't want to make it easier for attackers. I definitely not saying that this would introduce a new security risk but I'm afraid that it could make an existing one easier to exploit. So I'm wanting to be very careful in how we proceed. |
I don't object to this proposal, but it doesn't address the use-case that This use-case requires the developer of the code that runs node to pre-anticipate that they want runtime configuration, and to implement it by writing their start script appropriately. They could do this already, actually, with some variant of:
However, that doesn't solve my use-cases. The problem I've run into (not just once, but over-and-over again, with strong-pm/strong-supervisor, with several indepent projects at multiple companies building docker containers for node servers, when webexed into customer sites at 3am, when looking at building tooling for running node apps in the cloud, etc.) is how to start and configure thirdparty apps, apps that I didn't write, that weren't written to be runtime configurable, and where I can't programmatically rewrite their start scripts. This There is only one convention for starting node servers, and that is What this means in practice is that node server's aren't directly runnable by node... they are actually shell scripts. The script may be quite simple ("node --abort-on-uncaught-exception server/server.js"), or might be more complex ("./start.sh"). This means that tooling that packages and deploys generic node servers, ones that are written in the conventional way, but have not installed any production tooling, and have not specially written their start script, have no way of being customized in production. I believe this is one cause of the poor production debug and deploy tooling situation for node ATM. #2738 and strongloop/strong-supervisor#56 (comment) for example, "NODEOPT=--abort-on-uncaught-exception" would also be useful. Deployment tools aren't the only use-case, @jasnell (I think) mentioned how something like NODEOPT could surprisingly apply to node process spawned by npm life-cycle scripts. Its true, it could surprise people. However, life-cycle scripts can literally NOT be modified by a user, if I do npm install, and in the middle of it one of the install scripts spawns a node child, and its dying, and I want to inject node-report, because something is happening that I can't reproduce when running the package script standalone, I'm currently dead in the water. npm downloaded the package and ran the script, I don't have any way to modify the script before npm runs it. Being able to do I don't think every node option should be valid in More related issues (non-exhaustive, just from my notes):
|
After speaking with a few folks about it in detail, I'm going to drop my general objection to My preference would be for:
|
+1, I think we'd definitely need opt-in/opt-out support with this feature.
Do you mean that the parent would need a command line parameter, or that you'd have to opt-in in code in the child? I'd be +1 on the first, the second seems unnecessary (and would break a lot of the use cases for this). When we say opt-in or opt-out, I'm assuming the only way to do that would be with a command-line option like |
I kinda don’t get what the point of having an environment variable is then? They are specifically there for the situation where you want to pass options to an entire process hierarchy… |
My requirement is to be able to get the Any kind of required opt-in/opt-out via command line parameter nullifies the intend of the feature, because if I have control of the command line parameter, then whatever I need to do is already possible as is. There've been a lot of ideas going around, but so far I see that having some kind of Here is another idea I've been thinking:
Is this an acceptable approach? |
@addaleax ... yes, I get that, but there are a number of backwards compatibility concerns to consider. Command line args are not currently inherited automatically by child processes. Existing child processes could fail or experience issues if they suddenly start automatically inheriting command line options set by |
I could get behind a NODEOPT flag as long as it's ignored when getuid() != geteuid(). There is precedence in other languages/runtimes, e.g., PERL5OPT. That said, I'd be remiss if I didn't point out the drawbacks: 1a. Set-and-forget. You set it in your .bashrc and six months later you run into this obscure issue that takes you two days to debug. Turns out it's that 1b. A variation on 1a that affects us: people reporting issues that we cannot reproduce because the reporter neglects to mention they set NODEOPT. Technical solutions like a 2a. People tend to want to rewrite the environment variable when passing it to child processes, e.g. to change the location of the log file, but inevitably end up getting it wrong. Not really our problem but still a problem. (Also, how does it interact with 2b. Core probably needs to apply rewrite rules as well, e.g., for port numbers. We already do that but it would have to be extended to cover NODEOPT as well. Argument parsing is a messy affair. |
@jchip ... just to follow up on the earlier conversation around |
@gibfahn ... for const fork = require('child_process').fork;
fork('script', {nodeopt: true}); We could allow the default value for the |
I have some code around that implements NODEOPT, but doesn't yet blacklist options that aren't safe ( @jchip I've seem some fairly strong -1s on ~/.noderc in other threads, though not here because I don't think its being considered seriously. I'm not keen on it. Injecting env vars into production envs can usually be done easily (through cloud consoles, |
I think we should use a whitelist not blacklist for any security concerns. |
@bmeck pls comment on the PR, there isn't a list per-se, black or white, and it looks like a "whitelisty" approach would mean adding a case statement into node.cc for almost every v8 option, which would be pretty hairy to maintain I suspect you will see. |
In a number of conversations (e.g. #11888), the idea of introducing either a
NODEOPT
environment variable that would allow arbitrary command line flags to be set via the environment, or a.noderc
configuration file that could provide configuration options has been discussed. These choices have their merits and their disadvantages. One of the key disadvantages for me is the potential for the configuration collisions across applications and spooky action coming from environment settings that are unknown to the user. I much prefer explicit opt-in solutions.One approach that could work that can potentially fill the gap is allowing configuration settings to be set using a
.noderc
type configuration file that is explicitly passed in via command line argument:$ node --config=/some/path/.noderc app.js
If a user wanted to make use of environment variables in various environments, they could easily do so via variable expansion:
The text was updated successfully, but these errors were encountered: