Replies: 1 comment 12 replies
-
I don't think that's something we should expose to the end users because to them, it's just an executable file. If the single executable file is at location Also, the files bundled into the single executable is an internal component of the bundled application, so I don't think there's any reason why an end user would want to access that. If it's something that an application author expects their users to access, IMO such a resource should be placed somewhere on the real file system. |
Beta Was this translation helpful? Give feedback.
-
The blog post lists as one of the requirements of VFS:
Not the same as the above, but worth including in documentation for any VFS implementation: will those files be exposed via clever invocations of bundled executables? This depends on where the VFS lives; what paths it uses.
For example if I bundle
prettier
into an executable and then run it, asking it to format a path that exists in the VFS:./prettier ./prettier/__vfs__/index.js
then I'm guessing I will see bundled source emitted to stdout.I think this is fine, it's just a characteristic of the VFS that may be worth documenting. Wouldn't want users of SEA to assume bundled files are in any way secret without application-level safeguards.
Another thing that might crop up:
If I run
./globbing-tool './**/*'
, will it list the contents of the VFS? If the VFS exists at./globbing-tool
then./globbing-tool/__vfs__/bin.js
does match the glob.If I run
./globbing-tool './**/* | bash-stuff
thenbash-stuff
might try to read./globbing-tool/__vfs__/bin.js
and fail.Beta Was this translation helpful? Give feedback.
All reactions