-
Notifications
You must be signed in to change notification settings - Fork 30.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
doc: add policy for executables #51994
Conversation
Review requested:
|
I'll read the proposed text tomorrow (a bit late here) but for some additional historical context, here's the discussion when |
A major concern there seemed to be whether |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
IMHO this does not describe the status quo.
running code that is downloaded after installation is the essence of npm
, corepack
and npx
.
in the case of npx
that is almost the only thing it does.
even node -e "import('http://somthing/a.js')"
runs downloaded code.
@MoLow I took out the discussion of downloading and found a different way to phrase it. What do you think of this? @wesleytodd I think this should be clearer? |
@GeoffreyBooth this now kind of states the obvious. read this sentence without the erased part: The distribution will only include executables |
I think this PR focuses too much on the implementation details instead of the problems the distribution policy tries to solve. |
Well but the erased part is kind of the point 😄 As I wrote in the top post, my intent with the proposed initial language is to define a policy that could reflect the status quo. We don’t currently ship a And again, I’m not really sure that this is what either I or we want. I opened this PR to spark the discussion to try to reach a consensus on how we feel about “placeholder” executables such as the |
all this is an implementation detail. As a user, if it looks like yarn and sounds like yarn I consider that I have yarn on my machine. the existence of a jumper binary is just an abstraction that not many people are aware of. |
Agreed. What I’m trying to say in this text is that we aren’t shipping things in our distribution that look like yarn and sound like yarn but aren’t yarn. I’m not trying to argue that that should be our policy, just that if there were to be a policy to lock in the status quo, here’s what it would be. I think if there seems to be consensus that this is what we want our policy to be, we can continue wordsmithing this; but until then, perhaps let’s focus our discussion on what policy we want? @MoLow is what I’ve described here the policy that you think we want, regardless of how much better it could possibly be expressed? |
the thing is the status quo didn't necessarily take shape by a well-defined policy, it is more a sequence of events, wich is why it is so hard to come up with the current policy and wanted changes to it. The Node.js distribution includes several executables, such as `node`, that
are intended to be run directly by users and are vendored into the distribution.
Some other executables that are not vendored directly by Node.js are available
for execution via thin wrappers that obtain them lazily what I am trying to say is we currently have a situation we (maybe?) want to document, not a policy |
But “Some other executables that are not vendored directly by Node.js are available for execution via thin wrappers that obtain them lazily” is not true today, is it? That’s what the “enable Corepack” or alternative PR would create. Or are you saying that this is what you propose the policy should be, to enable one or the other of those PRs? |
I agree, that isn't the current policy. |
So I’ve been thinking about this, and about: Where we added Yarn 1 to our Docker image some years ago. I think the experience here is instructive: it’s a breaking change now for us to either remove Yarn from that image or to make the Multiply this by however many tools we might want to provide stubs for, and the potential similar issues that might arise for each one:
And so on. The more I think about it, the more that I think that what’s proposed in this PR should be our policy (regardless of whether or not it reflects the status quo or how we got here, which don’t matter). I just don’t think we want to be in the business of managing all the potential breaking changes or security issues of the projects we provide stubs for. It’s very easy for users to install these other projects, whether via |
Is it? It shouldn't |
Why wouldn’t it be? Currently Yarn is baked into the image. Mapping it to Corepack instead is a breaking change because:
But regardless, even if somehow this example isn’t a breaking change, I think we can agree that breaking changes along these lines are likely if not inevitable if we get into the business of shipping placeholders for external projects. |
The npm team has experienced this as well. npm is a dependency of Node.js but since it is fully exposed to a user, any breaking change of npm could be considered a breaking change for Node as well. In order to not force npm major versions to be coupled with Node major versions (even though that is a future goal), we came up with the following guidelines for which npm breaking changes should be considered Node breaking changes: https://github.com/npm/cli/wiki/Integrating-with-node. We also opened issues in I wanted to point all this out to show 1) that there is some prior art here and 2) documenting a policy about how breaking changes are treated in exposed dependencies is important. |
That may well be the case for npm, but that's mostly because projects managed by npm aren't version-locked on npm itself. It's one of the very things that Corepack addresses, by locking package manager versions on a by-project basis. |
I think this is the case for npm because it is bundled. Even if npm had similar behavior as Corepack, as long as it were possible to use npm without locking the version, then updating to a new major version of npm within Node could be considered a breaking change. I should have clarified above, I don't think binaries exposed through Corepack should be subject to the same breaking change policy. Only that a policy for executables in Node should include a discussion about breaking changes in those executables. And I think the specific case of Yarn 1 in an official Docker image falls under this example. |
@GeoffreyBooth you indirectly / unintentionally bring up a good point: despite its usage, as far as I understand it corepack is directly installing software that's technically EOL and code using it is "legacy code" that should be moved off of (yarnpkg/yarn#8583 (comment), second result on Google for Putting aside any judgement on that one way or another, a guide like this should probably also include verbiage around what's okay to ship and our expectations of support for what we're shipping. If the stance of corepack is that Yarn v1 - EOL software by every measure - should be supported and we generally agree with that, this document should include reasoning behind that stance. |
Calling Yarn v1 EOL will certainly derail this conversation, FWIW the last release of Yarn v1 is 1.22.22, published 3 days ago.
I mean, like npm, Corepack will install what the user asked for, including versions which are EOL (as long as they are still on the registry). |
the README literally tells you to migrate to berry and says the code is "mostly kept for historical purposes". This is also restated multiple times throughout issues over the span of years, and is shown by the release log - 4 days, 4 months, 2 years for the three most recent patch versions. I don't feel like that's controversial, and I'm not trying to posit as such - the project effectively says it ¯\_(ツ)_/¯
I didn't ask for anything, this is the default. Again, not trying to stir anything up with this - I just specifically think that this document should outline why we're not following the package's own advice and using the latest thing that they recommend users migrate to. I have an understanding of why some people choose Yarn v1 over newer tooling from the project, but I think if we're making that decision for people we should document that choice here. |
It is the default, just like |
The current proposal is to forbid such executables, so unless we decide on something else then this isn't something we need to address. @aduh95 @joyeecheung I reworded per your notes, please let me know what you think of this. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think this is too strong. I care about reproducibility of the execution environment, not if the software is downloaded on the fly or not.
This already happens for Node.js http headers and node-gyp.
What would you propose instead? This PR doesn’t really have anything to do with reproducibility. One can obviously have executables that download pinned versions of tools, and that would provide reproducibility. We can also have reproducibility today without adding these placeholder executables. I just don’t see how the reproducibility question is relevant.
I don’t understand this. We don’t ship a |
Closing in favor of #52107 |
Following up #51918, this PR tries to define a policy regarding what commands the Node installation adds to a user’s
PATH
; currently it addsnode
,npm
,npx
andcorepack
. This PR would define a policy around potentially adding any more.I wanted to draft what I thought would be the consensus or majority view regarding this, but I honestly don’t know what that would be in this case. So rather than take a guess at what I think would win approval, I just wrote what could fairly describe the status quo. The rule in this PR allows what Node currently provides, but it would prohibit #51886 or #51931. Maybe that’s what we want, but I can easily see us deciding that no, we do want a
yarn
executable shipped with Node that either uses built-in Corepack to install Yarn (#51886) or downloads Corepack and then uses Corepack to install Yarn (#51931). If so, though, what would a policy look like to allow that?yarn
andpnpm
, presumably, but what about other package managers such as Bun?tsc
toeslint
toprettier
tocoffee
or anything.In either case, we’re probably stuck indefinitely with whatever executables we add, since it would be very disruptive to someday remove them, even as a breaking change (see npm).
@nodejs/tsc @nodejs/corepack @nodejs/npm @nodejs/package-maintenance