@@ -549,6 +549,18 @@ Affects the default output directory of:
549
549
* [ ` --heap-prof-dir ` ] [ ]
550
550
* [ ` --redirect-warnings ` ] [ ]
551
551
552
+ ### ` --disable-proto=mode `
553
+
554
+ <!-- YAML
555
+ added:
556
+ - v13.12.0
557
+ - v12.17.0
558
+ -->
559
+
560
+ Disable the ` Object.prototype.__proto__ ` property. If ` mode ` is ` delete ` , the
561
+ property is removed entirely. If ` mode ` is ` throw ` , accesses to the
562
+ property throw an exception with the code ` ERR_PROTO_ACCESS ` .
563
+
552
564
### ` --disable-warning=code-or-type `
553
565
554
566
> Stability: 1.1 - Active development
@@ -641,18 +653,6 @@ users can at least run WebAssembly (with less optimal performance)
641
653
when the virtual memory address space available to their Node.js
642
654
process is lower than what the V8 WebAssembly memory cage needs.
643
655
644
- ### ` --disable-proto=mode `
645
-
646
- <!-- YAML
647
- added:
648
- - v13.12.0
649
- - v12.17.0
650
- -->
651
-
652
- Disable the ` Object.prototype.__proto__ ` property. If ` mode ` is ` delete ` , the
653
- property is removed entirely. If ` mode ` is ` throw ` , accesses to the
654
- property throw an exception with the code ` ERR_PROTO_ACCESS ` .
655
-
656
656
### ` --disallow-code-generation-from-strings `
657
657
658
658
<!-- YAML
@@ -663,23 +663,6 @@ Make built-in language features like `eval` and `new Function` that generate
663
663
code from strings throw an exception instead. This does not affect the Node.js
664
664
` node:vm ` module.
665
665
666
- ### ` --expose-gc `
667
-
668
- <!-- YAML
669
- added: v22.3.0
670
- -->
671
-
672
- > Stability: 1 - Experimental. This flag is inherited from V8 and is subject to
673
- > change upstream.
674
-
675
- This flag will expose the gc extension from V8.
676
-
677
- ``` js
678
- if (globalThis .gc ) {
679
- globalThis .gc ();
680
- }
681
- ```
682
-
683
666
### ` --dns-result-order=order `
684
667
685
668
<!-- YAML
@@ -783,6 +766,15 @@ node --entry-url --experimental-strip-types 'file.ts?query#hash'
783
766
node --entry-url ' data:text/javascript,console.log("Hello")'
784
767
```
785
768
769
+ ### ` --env-file-if-exists=config `
770
+
771
+ <!-- YAML
772
+ added: v22.9.0
773
+ -->
774
+
775
+ Behavior is the same as [ ` --env-file ` ] [ ] , but an error is not thrown if the file
776
+ does not exist.
777
+
786
778
### ` --env-file=config `
787
779
788
780
> Stability: 1.1 - Active development
@@ -850,15 +842,6 @@ export USERNAME="nodejs" # will result in `nodejs` as the value.
850
842
If you want to load environment variables from a file that may not exist, you
851
843
can use the [ ` --env-file-if-exists ` ] [ ] flag instead.
852
844
853
- ### ` --env-file-if-exists=config `
854
-
855
- <!-- YAML
856
- added: v22.9.0
857
- -->
858
-
859
- Behavior is the same as [ ` --env-file ` ] [ ] , but an error is not thrown if the file
860
- does not exist.
861
-
862
845
### ` -e ` , ` --eval "script" `
863
846
864
847
<!-- YAML
@@ -929,17 +912,6 @@ files with no extension will be treated as WebAssembly if they begin with the
929
912
WebAssembly magic number (` \0asm ` ); otherwise they will be treated as ES module
930
913
JavaScript.
931
914
932
- ### ` --experimental-transform-types `
933
-
934
- <!-- YAML
935
- added: v22.7.0
936
- -->
937
-
938
- > Stability: 1.0 - Early development
939
-
940
- Enables the transformation of TypeScript-only syntax into JavaScript code.
941
- Implies ` --experimental-strip-types ` and ` --enable-source-maps ` .
942
-
943
915
### ` --experimental-eventsource `
944
916
945
917
<!-- YAML
@@ -1016,6 +988,16 @@ following permissions are restricted:
1016
988
* WASI - manageable through [ ` --allow-wasi ` ] [ ] flag
1017
989
* Addons - manageable through [ ` --allow-addons ` ] [ ] flag
1018
990
991
+ ### ` --experimental-print-required-tla `
992
+
993
+ <!-- YAML
994
+ added: v22.0.0
995
+ -->
996
+
997
+ If the ES module being ` require() ` 'd contains top-level ` await ` , this flag
998
+ allows Node.js to evaluate the module, try to locate the
999
+ top-level awaits, and print their location to help users find them.
1000
+
1019
1001
### ` --experimental-require-module `
1020
1002
1021
1003
<!-- YAML
@@ -1108,6 +1090,17 @@ added: v22.3.0
1108
1090
1109
1091
Enable module mocking in the test runner.
1110
1092
1093
+ ### ` --experimental-transform-types `
1094
+
1095
+ <!-- YAML
1096
+ added: v22.7.0
1097
+ -->
1098
+
1099
+ > Stability: 1.0 - Early development
1100
+
1101
+ Enables the transformation of TypeScript-only syntax into JavaScript code.
1102
+ Implies ` --experimental-strip-types ` and ` --enable-source-maps ` .
1103
+
1111
1104
### ` --experimental-vm-modules `
1112
1105
1113
1106
<!-- YAML
@@ -1153,6 +1146,23 @@ added: v22.4.0
1153
1146
1154
1147
Enable experimental [ ` Web Storage ` ] [ ] support.
1155
1148
1149
+ ### ` --expose-gc `
1150
+
1151
+ <!-- YAML
1152
+ added: v22.3.0
1153
+ -->
1154
+
1155
+ > Stability: 1 - Experimental. This flag is inherited from V8 and is subject to
1156
+ > change upstream.
1157
+
1158
+ This flag will expose the gc extension from V8.
1159
+
1160
+ ``` js
1161
+ if (globalThis .gc ) {
1162
+ globalThis .gc ();
1163
+ }
1164
+ ```
1165
+
1156
1166
### ` --force-context-aware `
1157
1167
1158
1168
<!-- YAML
@@ -1427,40 +1437,6 @@ When enabled, the parser will accept the following:
1427
1437
All the above will expose your application to request smuggling
1428
1438
or poisoning attack. Avoid using this option.
1429
1439
1430
- ### ` --inspect[=[host:]port] `
1431
-
1432
- <!-- YAML
1433
- added: v6.3.0
1434
- -->
1435
-
1436
- Activate inspector on ` host:port ` . Default is ` 127.0.0.1:9229 ` . If port ` 0 ` is
1437
- specified, a random available port will be used.
1438
-
1439
- V8 inspector integration allows tools such as Chrome DevTools and IDEs to debug
1440
- and profile Node.js instances. The tools attach to Node.js instances via a
1441
- tcp port and communicate using the [ Chrome DevTools Protocol] [ ] .
1442
- See [ V8 Inspector integration for Node.js] [ ] for further explanation on Node.js debugger.
1443
-
1444
- <!-- Anchor to make sure old links find a target -->
1445
-
1446
- <a id =" inspector_security " ></a >
1447
-
1448
- #### Warning: binding inspector to a public IP: port combination is insecure
1449
-
1450
- Binding the inspector to a public IP (including ` 0.0.0.0 ` ) with an open port is
1451
- insecure, as it allows external hosts to connect to the inspector and perform
1452
- a [ remote code execution] [ ] attack.
1453
-
1454
- If specifying a host, make sure that either:
1455
-
1456
- * The host is not accessible from public networks.
1457
- * A firewall disallows unwanted connections on the port.
1458
-
1459
- ** More specifically, ` --inspect=0.0.0.0 ` is insecure if the port (` 9229 ` by
1460
- default) is not firewall-protected.**
1461
-
1462
- See the [ debugging security implications] [ ] section for more information.
1463
-
1464
1440
### ` --inspect-brk[=[host:]port] `
1465
1441
1466
1442
<!-- YAML
@@ -1507,6 +1483,40 @@ a random available port will be used.
1507
1483
1508
1484
See [ V8 Inspector integration for Node.js] [ ] for further explanation on Node.js debugger.
1509
1485
1486
+ ### ` --inspect[=[host:]port] `
1487
+
1488
+ <!-- YAML
1489
+ added: v6.3.0
1490
+ -->
1491
+
1492
+ Activate inspector on ` host:port ` . Default is ` 127.0.0.1:9229 ` . If port ` 0 ` is
1493
+ specified, a random available port will be used.
1494
+
1495
+ V8 inspector integration allows tools such as Chrome DevTools and IDEs to debug
1496
+ and profile Node.js instances. The tools attach to Node.js instances via a
1497
+ tcp port and communicate using the [ Chrome DevTools Protocol] [ ] .
1498
+ See [ V8 Inspector integration for Node.js] [ ] for further explanation on Node.js debugger.
1499
+
1500
+ <!-- Anchor to make sure old links find a target -->
1501
+
1502
+ <a id =" inspector_security " ></a >
1503
+
1504
+ #### Warning: binding inspector to a public IP: port combination is insecure
1505
+
1506
+ Binding the inspector to a public IP (including ` 0.0.0.0 ` ) with an open port is
1507
+ insecure, as it allows external hosts to connect to the inspector and perform
1508
+ a [ remote code execution] [ ] attack.
1509
+
1510
+ If specifying a host, make sure that either:
1511
+
1512
+ * The host is not accessible from public networks.
1513
+ * A firewall disallows unwanted connections on the port.
1514
+
1515
+ ** More specifically, ` --inspect=0.0.0.0 ` is insecure if the port (` 9229 ` by
1516
+ default) is not firewall-protected.**
1517
+
1518
+ See the [ debugging security implications] [ ] section for more information.
1519
+
1510
1520
### ` -i ` , ` --interactive `
1511
1521
1512
1522
<!-- YAML
@@ -1590,14 +1600,6 @@ added: v0.8.0
1590
1600
1591
1601
Silence deprecation warnings.
1592
1602
1593
- ### ` --no-experimental-fetch `
1594
-
1595
- <!-- YAML
1596
- added: v18.0.0
1597
- -->
1598
-
1599
- Disable exposition of [ Fetch API] [ ] on the global scope.
1600
-
1601
1603
### ` --no-experimental-detect-module `
1602
1604
1603
1605
<!-- YAML
@@ -1613,6 +1615,14 @@ changes:
1613
1615
1614
1616
Disable using [ syntax detection] [ ] to determine module type.
1615
1617
1618
+ ### ` --no-experimental-fetch `
1619
+
1620
+ <!-- YAML
1621
+ added: v18.0.0
1622
+ -->
1623
+
1624
+ Disable exposition of [ Fetch API] [ ] on the global scope.
1625
+
1616
1626
### ` --no-experimental-global-customevent `
1617
1627
1618
1628
<!-- YAML
@@ -1874,16 +1884,6 @@ changes:
1874
1884
1875
1885
Identical to ` -e ` but prints the result.
1876
1886
1877
- ### ` --experimental-print-required-tla `
1878
-
1879
- <!-- YAML
1880
- added: v22.0.0
1881
- -->
1882
-
1883
- If the ES module being ` require() ` 'd contains top-level ` await ` , this flag
1884
- allows Node.js to evaluate the module, try to locate the
1885
- top-level awaits, and print their location to help users find them.
1886
-
1887
1887
### ` --prof `
1888
1888
1889
1889
<!-- YAML
@@ -1957,9 +1957,7 @@ contain the `environmentVariables` data.
1957
1957
### ` --report-exclude-network `
1958
1958
1959
1959
<!-- YAML
1960
- added:
1961
- - v22.0.0
1962
- - v20.13.0
1960
+ added: v22.0.0
1963
1961
-->
1964
1962
1965
1963
Exclude ` header.networkInterfaces ` from the diagnostic report. By default
@@ -2073,15 +2071,6 @@ Enables report to be generated when the process exits due to an uncaught
2073
2071
exception. Useful when inspecting the JavaScript stack in conjunction with
2074
2072
native stack and other runtime environment data.
2075
2073
2076
- ### ` --report-exclude-network `
2077
-
2078
- <!-- YAML
2079
- added: v22.0.0
2080
- -->
2081
-
2082
- Exclude ` header.networkInterfaces ` from the diagnostic report. By default
2083
- this is not set and the network interfaces are included.
2084
-
2085
2074
### ` -r ` , ` --require module `
2086
2075
2087
2076
<!-- YAML
@@ -2168,6 +2157,17 @@ The following environment variables are set when running a script with `--run`:
2168
2157
* ` NODE_RUN_PACKAGE_JSON_PATH ` : The path to the ` package.json ` that is being
2169
2158
processed.
2170
2159
2160
+ ### ` --secure-heap-min=n `
2161
+
2162
+ <!-- YAML
2163
+ added: v15.6.0
2164
+ -->
2165
+
2166
+ When using ` --secure-heap ` , the ` --secure-heap-min ` flag specifies the
2167
+ minimum allocation from the secure heap. The minimum value is ` 2 ` .
2168
+ The maximum value is the lesser of ` --secure-heap ` or ` 2147483647 ` .
2169
+ The value given must be a power of two.
2170
+
2171
2171
### ` --secure-heap=n `
2172
2172
2173
2173
<!-- YAML
@@ -2193,17 +2193,6 @@ The secure heap is not available on Windows.
2193
2193
2194
2194
See [ ` CRYPTO_secure_malloc_init ` ] [ ] for more details.
2195
2195
2196
- ### ` --secure-heap-min=n `
2197
-
2198
- <!-- YAML
2199
- added: v15.6.0
2200
- -->
2201
-
2202
- When using ` --secure-heap ` , the ` --secure-heap-min ` flag specifies the
2203
- minimum allocation from the secure heap. The minimum value is ` 2 ` .
2204
- The maximum value is the lesser of ` --secure-heap ` or ` 2147483647 ` .
2205
- The value given must be a power of two.
2206
-
2207
2196
### ` --snapshot-blob=path `
2208
2197
2209
2198
<!-- YAML
@@ -2941,11 +2930,6 @@ and `NODE_DISABLE_COLORS` environment variables are ignored.
2941
2930
2942
2931
Any other value will result in colorized output being disabled.
2943
2932
2944
- ### ` NO_COLOR=<any> `
2945
-
2946
- [ ` NO_COLOR ` ] [ ] is an alias for ` NODE_DISABLE_COLORS ` . The value of the
2947
- environment variable is arbitrary.
2948
-
2949
2933
### ` NODE_COMPILE_CACHE=dir `
2950
2934
2951
2935
<!-- YAML
@@ -3421,6 +3405,11 @@ and the line lengths of the source file (in the key `lineLengths`).
3421
3405
}
3422
3406
```
3423
3407
3408
+ ### ` NO_COLOR=<any> `
3409
+
3410
+ [ ` NO_COLOR ` ] [ ] is an alias for ` NODE_DISABLE_COLORS ` . The value of the
3411
+ environment variable is arbitrary.
3412
+
3424
3413
### ` OPENSSL_CONF=file `
3425
3414
3426
3415
<!-- YAML
@@ -3542,19 +3531,9 @@ documented here:
3542
3531
3543
3532
### ` --huge-max-old-generation-size `
3544
3533
3545
- ### ` --jitless `
3546
-
3547
3534
### ` --interpreted-frames-native-stack `
3548
3535
3549
- ### ` --prof `
3550
-
3551
- ### ` --perf-basic-prof `
3552
-
3553
- ### ` --perf-basic-prof-only-functions `
3554
-
3555
- ### ` --perf-prof `
3556
-
3557
- ### ` --perf-prof-unwinding-info `
3536
+ ### ` --jitless `
3558
3537
3559
3538
<!-- Anchor to make sure old links find a target -->
3560
3539
@@ -3606,6 +3585,16 @@ for MiB in 16 32 64 128; do
3606
3585
done
3607
3586
```
3608
3587
3588
+ ### ` --perf-basic-prof `
3589
+
3590
+ ### ` --perf-basic-prof-only-functions `
3591
+
3592
+ ### ` --perf-prof `
3593
+
3594
+ ### ` --perf-prof-unwinding-info `
3595
+
3596
+ ### ` --prof `
3597
+
3609
3598
### ` --security-revert `
3610
3599
3611
3600
### ` --stack-trace-limit=limit `
0 commit comments