|
1 | 1 | # Permissions
|
2 | 2 |
|
3 |
| -This section exposes security features available to be adopted in a |
4 |
| -Node.js application. The available scopes are: |
| 3 | +Permissions can be used to control what system resources the |
| 4 | +Node.js process has access to or what actions the process can take |
| 5 | +with those resources. Permissions can also control what modules can |
| 6 | +be accessed by other modules. |
| 7 | + |
| 8 | +* [Process-based permissions](#process-based-permissions) control the Node.js |
| 9 | + process's access to resources such as the file system or the network. |
| 10 | + The resource can be entirely allowed or denied, or actions related to it can |
| 11 | + be controlled; for example, you can allow file system reads while denying |
| 12 | + writes. |
| 13 | + |
| 14 | +* [Module-based permissions](#module-based-permissions) control which files |
| 15 | + or URLs are available to other modules during application execution. |
| 16 | + This can be used to control what modules can be accessed by third-party |
| 17 | + dependencies, for example. |
| 18 | + |
| 19 | +Both types of permissions can be used together to provide a |
| 20 | +safer environment. If you find a potential security vulnerability, |
| 21 | +please refer to our [Security Policy][]. |
5 | 22 |
|
6 |
| -* [Resource-based permissions](#resource-based-permissions) |
7 |
| -* [Process-based permissions](#process-based-permissions) |
8 |
| - |
9 |
| -Resource-based permissions stands for the managment of modules using |
10 |
| -policies. A policy can guarantee which module/resource is available |
11 |
| -during the application execution. |
12 |
| - |
13 |
| -Process-based permissions stands for the management of resources such |
14 |
| -as _File System_ or _Network_. A permission can be configured to restrict |
15 |
| -access to specific resources, for instance, one can restrict access to |
16 |
| -all the _File System_ write. |
17 |
| - |
18 |
| -Both permissions can be used together to provide a safer environment. |
| 23 | +## Process-based permissions |
19 | 24 |
|
20 |
| -**Note**: if you find a potential security vulnerability on Node.js, |
21 |
| -refer to our [Security Policy][]. |
| 25 | +// STUB |
22 | 26 |
|
23 |
| -## Resource-based permissions |
| 27 | +## Module-based permissions |
24 | 28 |
|
25 | 29 | ## Policies
|
26 | 30 |
|
@@ -447,9 +451,7 @@ not adopt the origin of the `blob:` URL.
|
447 | 451 | Additionally, import maps only work on `import` so it may be desirable to add a
|
448 | 452 | `"import"` condition to all dependency mappings.
|
449 | 453 |
|
450 |
| -## Process-based permissions |
451 |
| - |
| 454 | +[Security Policy]: https://github.com/nodejs/node/blob/main/SECURITY.md |
452 | 455 | [import maps]: https://url.spec.whatwg.org/#relative-url-with-fragment-string
|
453 | 456 | [relative-url string]: https://url.spec.whatwg.org/#relative-url-with-fragment-string
|
454 | 457 | [special schemes]: https://url.spec.whatwg.org/#special-scheme
|
455 |
| -[Security Policy]: https://github.com/nodejs/node/blob/main/SECURITY.md |
|
0 commit comments