You can also run arbitrary scripts via the <engine> tag. (you can specify
your own script in it).

On Tue, Feb 10, 2015 at 12:22 PM, Horn, Julian C <julian.c.h...@intel.com>
wrote:

> Actually I see it the other way around.  If you want to trust a plugin,
> you can make that decision; it's your machine.  The build server doesn’t
> trust the plugins you trust.
>
> -----Original Message-----
> From: mmo...@google.com [mailto:mmo...@google.com] On Behalf Of Michal
> Mocny
> Sent: Tuesday, February 10, 2015 11:27 AM
> To: Michal Mocny
> Cc: dev
> Subject: Re: Plugin Install Hooks
>
> ..Not to mention, these plugins will be running on end users' personal
> devices.  That sounds vastly more concerning than running hooks on a server
> you control and can sandbox.
>
> On Tue, Feb 10, 2015 at 11:25 AM, Michal Mocny <mmo...@chromium.org>
> wrote:
>
> > So, I think this is not different than downloading and running
> > packages from any package manager.
> >
> > That said, I think a --suppress-hooks flag would be fine.  I suggest
> > you file a JIRA so others can chime in, and if you want it to land
> > soon I would take a stab at a PR.
> >
> > -Michal
> >
> > On Tue, Feb 10, 2015 at 10:02 AM, Horn, Julian C
> > <julian.c.h...@intel.com>
> > wrote:
> >
> >> Thanks for the pointer Shazron.  I read through all of this
> >> interesting discussion.  I agree that sandboxing is hard and prompting
> is problematic.
> >> But there's still an issue here.
> >>
> >> If there is no mechanism to exclude scripting in untrusted plugins
> >> then build servers are unlikely to accept any uncurated plugin, which
> >> is what PGBuild is doing.  The Intel XDK provides a build server.  We
> >> would like to support arbitrary third party plugins, not just ones we
> >> have curated.  This install-time hooks feature creates a major
> >> security issue for us. Under no circumstances are we going to allow
> >> untrusted native code to run on our build server.
> >>
> >> And thanks to Sergey for pointing out that issue with pre_package hooks!
> >> We were under the impression that project-level hooks could be
> >> suppressed by excluding the hooks directory. I see now that this isn't
> sufficient.
> >>
> >> I have a very simple suggestion: add a "--suppress-hooks" flag.  This
> >> doesn't prompt: it assumes the answer to the prompt is "no".
> >>
> >> I don't have enough experience with install hooks to know if the
> >> plugin is likely to be usable without running the install-time hook.
> >> I expect that if you add a plugin that contains an install time hook
> >> and --suppress-hooks is present, then the plugin add should fail.  If
> >> there's some reason to believe that a plugin could be usable without
> >> running the install time hook, then maybe it would be interesting to
> >> have a variant of --suppress-hooks that bypasses the hook but allows
> >> the plugin to be installed anyway.
> >>
> >> I would also expect that --suppress-hooks would suppress pre_package
> >> time hooks too.
> >>
> >>     Julian
> >>
> >> -----Original Message-----
> >> From: Shazron [mailto:shaz...@gmail.com]
> >> Sent: Monday, February 09, 2015 4:21 PM
> >> To: dev@cordova.apache.org
> >> Subject: Re: Plugin Install Hooks
> >>
> >> We did discuss this, and we rejected:
> >> 1. Having a prompt
> >> 2. Sandboxing
> >>
> >> Check out the discussion, for reasons:
> >> http://markmail.org/message/alknczhqdghaurrw
> >>
> >> On Mon, Feb 9, 2015 at 8:28 AM, Horn, Julian C
> >> <julian.c.h...@intel.com>
> >> wrote:
> >> > We have identified a security issue with the recently added feature
> >> > of
> >> install-time plugin hooks.
> >> >
> >> > As far as I can tell, there is nothing that prevents creation of a
> >> plugin with a malicious install-time hook script.  Adding that plugin
> >> to a project could corrupt the user's host machine.  If that project
> >> using that plugin is submitted to a build server, then the build
> >> server could be corrupted.
> >> >
> >> > Yes, you can use lower level plugman scripts to fetch plugins and
> >> > then
> >> pre-scan them for install time hooks and track down all the
> >> dependencies and scan them too.  So this is fixable (on a build
> >> server), but it's a lot of extra work; "cordova plugin add" should not
> be an unsafe operation.
> >> >
> >> > I propose that the CLI should check to see if a plugin requires an
> >> install-time hook and require the user to explicitly grant permission
> >> before executing the install hook.  A build server would always deny
> >> permission.
> >> >
> >> > Is there something I'm missing here?
> >> >
> >> >     Julian
> >>
> >> ---------------------------------------------------------------------
> >> To unsubscribe, e-mail: dev-unsubscr...@cordova.apache.org
> >> For additional commands, e-mail: dev-h...@cordova.apache.org
> >>
> >>
> >
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: dev-unsubscr...@cordova.apache.org
> For additional commands, e-mail: dev-h...@cordova.apache.org
>

Reply via email to