sammccall added a comment.

In D92155#2453597 <https://reviews.llvm.org/D92155#2453597>, @psionic12 wrote:

> In D92155#2450474 <https://reviews.llvm.org/D92155#2450474>, @nridge wrote:
>
>> Something just occurred to me: can't clangd arguments also be controlled by 
>> the untrusted repository by having a `.vscode/settings.json` file with 
>> specificed `"clangd.arguments"` checked in?

Hmm, maybe... I thought `getConfiguration('clangd')` with no scope specified 
was supposed to be global (i.e. not a workspace-specific setting). There's a 
scope you can pass in, and we're not providing one.

Nevertheless testing it locally these flags do seem to be used. We should fix 
this, I think `workspace.getConfiguration('clangd').inspect('arguments')` and 
then applying the components manually makes it possible. This is a horrible 
breaking change, though :-(

Alternatives would be treating clangd args as untrusted too, conceding that 
opening a file in vscode can own the user, some list of safe flags...

> Yeah, there are too many ways to pass an argument without user's awareness, 
> all the safety protections we talked about aren't help much, and I think this 
> is not the clangd's problem, it exists in clang as well. So I think loading 
> plugin codes guarded with CLANG_PLUGIN_SUPPORT on is enough, no more 
> complicity protections should added.

I can't agree with this, even if other problems exist, it's not OK to introduce 
a big problem with a broad scope, when we have alternatives.


Repository:
  rG LLVM Github Monorepo

CHANGES SINCE LAST ACTION
  https://reviews.llvm.org/D92155/new/

https://reviews.llvm.org/D92155

_______________________________________________
cfe-commits mailing list
cfe-commits@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits

Reply via email to