Hi!

intrigeri:
> u:
>> intrigeri:
>>> u:
>>>>   ln -s ../../wiki/src/contribute/l10n_tricks/pre-commit .
>>>
>>> This caught my eye before I could test this.
>>>
>>> I'd rather not ask all Tails contributors to run code, on every
>>> commit, that lives in a section of our website that's publicly
>>> writable. Please consider moving this script to bin/ :)
> 
>> With a notion of 'public' that allows only some people to write here, right?

>  - I believe that the only thing that prevent ikiwiki.cgi from
>    allowing anyone with an Internet connection to edit arbitrary files
>    under wiki/src/ is our lockedit plugin configuration.
>    There's already been security issues in this part of the ikiwiki
>    code so I'd rather not rely on it when we can cheaply avoid it.

Oops. I was not aware of that.
> So yeah, in theory, assuming no software bugs, it's safe to put such
> code under wiki/src/; but it increases attack surface a fair bit, with
> no substantial benefit I can think of, so let's err on the safe side,
> as you did already, thanks!

If there's a place for such scripts, let's put them there :)

> Now, this hook runs wiki/src/contribute/l10n_tricks/check_po.sh so the
> problem I'm describing above is still there. This could not fixed in
> pre-commit hook by calling submodules/jenkins-tools/slaves/check_po
> directly instead of going through the symlink.

Agreed. I'll modify this, this will be transparent for the testers.

Cheers!
u.
_______________________________________________
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.

Reply via email to