endo icon indicating copy to clipboard operation
endo copied to clipboard

feat(ses): export Permits

Open boneskull opened this issue 1 year ago • 19 comments

Description

This exports the entirety of src/permits.js as the Permits object via the tools export.

We are using this information in lavamoat-tofu for SES-compat detection, and we would like to keep it up-to-date with SES (https://github.com/LavaMoat/LavaMoat/issues/814).

There are other ways we could accomplish this, but exporting it is the easiest way for lavamoat-tofu to consume it.

Security Considerations

Unknown

Scaling Considerations

No

Documentation Considerations

The tools export is not currently documented. Whether this is considered a private API is unknown to me. Assuming it's not considered a private API, this change adds more stuff to the public API which will need to be taken into consideration during versioning.

Testing Considerations

I'm not sure it's valuable to test that an export simply exists, but I can add such a test if desired.

Upgrade Considerations

n/a

boneskull avatar Jan 18 '24 00:01 boneskull

  • #1981 Graphite 👈
  • master

This stack of pull requests is managed by Graphite. Learn more about stacking.

Join @boneskull and the rest of your teammates on Graphite Graphite

boneskull avatar Jan 18 '24 00:01 boneskull

@kumavis This is the "whitelist" that gets pulled into tofu.

boneskull avatar Jan 18 '24 23:01 boneskull

I would prefer to avoid making the permits structure part of the SES public API so we can remain at liberty to change its structure and type as need evolves. It exists in its current form because of a host of simplifying assumptions that are not permanently reliable. We recently added support for symbols. We could conceivably need to allow [[name]] or @name to be permitted properties and they cannot today.

(If we did export it as-is, I would want to export it from a separate module.)

This is a case where I would prefer that you copy and paste.

If we ejected the permits into another package, so that ses could ramp the major version of its internal dependency without having to ramp its own major version, that might be acceptable too.

I would like @erights to weigh in on these considerations.

kriskowal avatar Jan 19 '24 00:01 kriskowal

I find it useful, moving it into a lower package seems appropriate

kumavis avatar Jan 19 '24 21:01 kumavis

First, a nit.

We recently added support for symbols.

The permits.js file already supported symbols via a textual encoding. What we recently added was symbol support to enablements.js. That one uses the symbols themselves, as there was no need to encode them.

@kriskowal 's main point

It exists in its current form because of a host of simplifying assumptions that are not permanently reliable.

is true. That is not necessarily incompat with a tools-only export, depending on what we say that means.

Some other considerations

  • I am uncomfortable about exporting these unless we harden them first. They are not meant to be mutated.
  • Vetted shims run after permits-intrinsics.js. We want to define the obligations of a "vetted shim" such that many well-behaved shims not aware of the ses-shim can be approved by this vetting process. The permits-intrinsics.js processing happens before the vetted shims run. The vetted shims are supposed to be able to mutate the primordials in ways that we vet as safe, but which can deviate from permits.js, rendering that tools export stale by the end of that phase. We have not decided that the vetting process must include meta data describing these changes to the primordials.
  • If you export this, perhaps you should also export enablements.js. These are processed after vetted shims run, in which case we have the opposite problem: we might need meta data for each vetted shim saying how to update enablements.js before that phase runs.
  • The info provided by these data structures has much overlap with our vague intentions for the "get intrinsics" proposal, which is what we hope to eventually standardize. This proposal has similar questions about being updated in light of mutations before hardening, but the answers to these questions are likely to be different in detail.

Nevertheless, I remain open to exporting via tools given an adequate shared understanding of what such an export means re future coordination.

Seems like a good discussion for an upcoming Endo meeting!

erights avatar Jan 19 '24 23:01 erights

Seems like a good discussion for an upcoming Endo meeting!

Added to the agenda, though we have demos with Spritely scheduled.

I feel strongly that if we export permits, it should be from another package so that we don’t have to ramp the SES major version if its schema changes. That is tricky, though. Harden would not be available in that package. Pervasively shallow- freezing the permits would be a lot of ceremony.

kriskowal avatar Jan 20 '24 00:01 kriskowal

Did this get discussed already or no? If not, I'll be on the next call

boneskull avatar Jan 27 '24 00:01 boneskull

Did this get discussed already or no? If not, I'll be on the next call

This did not get discussed. Consider the topic commuted!

kriskowal avatar Jan 27 '24 00:01 kriskowal

Summary:

  1. My position is that the permits should have a separate version number so breaking changes to the permits do not force a major version bump in SES. Major version bumps in SES increase the number of versions we have to back-port patches to.
  2. Mark’s position is that the permits should be hardened.
  3. There’s a reality that harden can’t be called until after lockdown, which ties 1 and 2 into a chicken and egg cycle.

However, the permits are acyclic. If we ejected the permits to @endo/permits and did a recursive freeze over transitive properties at the export site, they would be emergently hardened after lockdown, lockdown could still refer to them internally, and we wouldn’t have to do any special treatment in anticipation of cycles.

I’m curious whether @erights would find that safe enough.

kriskowal avatar Feb 05 '24 22:02 kriskowal

... ejected ...

"ejected"?

erights avatar Feb 05 '24 22:02 erights

fwiw: I have no opinion on how they get exported, but it'd be nice if we could find some mutually-agreed-upon way to do so. 😄

boneskull avatar Feb 05 '24 23:02 boneskull

... ejected ...

"ejected"?

Move code currently in ses into a package ses depends upon.

kriskowal avatar Feb 06 '24 23:02 kriskowal

... ejected ...

"ejected"?

Move code currently in ses into a package ses depends upon.

Rereading with that in mind...

I’m curious whether @erights would find that safe enough.

yes.

erights avatar Feb 07 '24 04:02 erights

What about enablements? What other intrinsic enumerations should we consider?

erights avatar Feb 08 '24 23:02 erights