0.2.1 • Published 2 years ago

shelljs-exec-proxy v0.2.1

Weekly downloads
178
License
MIT
Repository
github
Last release
2 years ago

ShellJS Exec Proxy

Build Status Codecov npm npm downloads

Unleash the power of unlimited ShellJS commands... with ES6 Proxies!

Do you like ShellJS, but wish it had your favorite commands? Skip the weird exec() calls by using shelljs-exec-proxy:

// Our goal: make a commit: `$ git commit -am "I'm updating the \"foo\" module to be more secure"`
// Standard ShellJS requires the exec function, with confusing string escaping:
shell.exec('git commit -am "I\'m updating the \\"foo\\" module to be more secure"');
// Skip the extra string escaping with shelljs-exec-proxy!
shell.git.commit('-am', `I'm updating the "foo" module to be more secure`);

Installation

Important: This is only available for Node v6+ (it requires ES6 Proxies!)

$ npm install --save shelljs-exec-proxy

Get that JavaScript feeling back in your code

const shell = require('shelljs-exec-proxy');
shell.git.status();
shell.git.add('.');
shell.git.commit('-am', 'Fixed issue #1');
shell.git.push('origin', 'master');

Security improvements

Current versions of ShellJS export the .exec() method, which if not used carefully, could introduce command injection Vulnerabilities to your module. Here's an insecure code snippet:

shell.ls('dir/*.txt').forEach(file => {
  shell.exec('git add ' + file);
}

This leaves you vulnerable to files like:

Example file nameUnintended behavior
File 1.txtThis tries to add both File and 1.txt, instead of File 1.txt
foo;rm -rf *This executes both git add foo and rm -rf *, unexpectedly deleting your files!
ThisHas"quotes'.txtThis tries running git add ThisHas"quotes'.txt, producing a Bash syntax error

shelljs-exec-proxy solves all these problems:

shell.ls('dir/*.txt').forEach(file => {
  shell.git.add(file);
}
Example file nameBehavior
File 1.txtArguments are automatically quoted, so spaces aren't an issue
foo;rm -rf *Only one command runs at a time (semicolons are treated literally) and wildcards aren't expanded
ThisHas"quotes'.txtQuote characters are automatically escaped for you, so there are never any issues