Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat(ses): export Permits #1981

Open
wants to merge 1 commit into
base: master
Choose a base branch
from
Open

Conversation

boneskull
Copy link
Collaborator

Description

This exports the entirety of src/permits.js as the Permits object via the tools export.

We are using this information in lavamoat-tofu for SES-compat detection, and we would like to keep it up-to-date with SES (LavaMoat/LavaMoat#814).

There are other ways we could accomplish this, but exporting it is the easiest way for lavamoat-tofu to consume it.

Security Considerations

Unknown

Scaling Considerations

No

Documentation Considerations

The tools export is not currently documented. Whether this is considered a private API is unknown to me. Assuming it's not considered a private API, this change adds more stuff to the public API which will need to be taken into consideration during versioning.

Testing Considerations

I'm not sure it's valuable to test that an export simply exists, but I can add such a test if desired.

Upgrade Considerations

n/a

@boneskull boneskull added enhancement New feature or request ses labels Jan 18, 2024
@boneskull boneskull self-assigned this Jan 18, 2024
This exports the entirety of `src/permits.js` as the `Permits` object via the `tools` export.

We are using this information in `lavamoat-tofu` for SES-compat detection, and we would like to keep it up-to-date with SES.

There are other ways we could accomplish this, but exporting it is the easiest way for `lavamoat-tofu` to consume it.
@boneskull
Copy link
Collaborator Author

boneskull commented Jan 18, 2024

This stack of pull requests is managed by Graphite. Learn more about stacking.

Join @boneskull and the rest of your teammates on Graphite Graphite

@boneskull
Copy link
Collaborator Author

@kumavis This is the "whitelist" that gets pulled into tofu.

@kriskowal
Copy link
Member

kriskowal commented Jan 19, 2024

I would prefer to avoid making the permits structure part of the SES public API so we can remain at liberty to change its structure and type as need evolves. It exists in its current form because of a host of simplifying assumptions that are not permanently reliable. We recently added support for symbols. We could conceivably need to allow [[name]] or @name to be permitted properties and they cannot today.

(If we did export it as-is, I would want to export it from a separate module.)

This is a case where I would prefer that you copy and paste.

If we ejected the permits into another package, so that ses could ramp the major version of its internal dependency without having to ramp its own major version, that might be acceptable too.

I would like @erights to weigh in on these considerations.

@kumavis
Copy link
Member

kumavis commented Jan 19, 2024

I find it useful, moving it into a lower package seems appropriate

@erights
Copy link
Contributor

erights commented Jan 19, 2024

First, a nit.

We recently added support for symbols.

The permits.js file already supported symbols via a textual encoding. What we recently added was symbol support to enablements.js. That one uses the symbols themselves, as there was no need to encode them.

@kriskowal 's main point

It exists in its current form because of a host of simplifying assumptions that are not permanently reliable.

is true. That is not necessarily incompat with a tools-only export, depending on what we say that means.

Some other considerations

  • I am uncomfortable about exporting these unless we harden them first. They are not meant to be mutated.
  • Vetted shims run after permits-intrinsics.js. We want to define the obligations of a "vetted shim" such that many well-behaved shims not aware of the ses-shim can be approved by this vetting process. The permits-intrinsics.js processing happens before the vetted shims run. The vetted shims are supposed to be able to mutate the primordials in ways that we vet as safe, but which can deviate from permits.js, rendering that tools export stale by the end of that phase. We have not decided that the vetting process must include meta data describing these changes to the primordials.
  • If you export this, perhaps you should also export enablements.js. These are processed after vetted shims run, in which case we have the opposite problem: we might need meta data for each vetted shim saying how to update enablements.js before that phase runs.
  • The info provided by these data structures has much overlap with our vague intentions for the "get intrinsics" proposal, which is what we hope to eventually standardize. This proposal has similar questions about being updated in light of mutations before hardening, but the answers to these questions are likely to be different in detail.

Nevertheless, I remain open to exporting via tools given an adequate shared understanding of what such an export means re future coordination.

Seems like a good discussion for an upcoming Endo meeting!

@erights erights self-requested a review January 19, 2024 23:11
@kriskowal
Copy link
Member

Seems like a good discussion for an upcoming Endo meeting!

Added to the agenda, though we have demos with Spritely scheduled.

I feel strongly that if we export permits, it should be from another package so that we don’t have to ramp the SES major version if its schema changes. That is tricky, though. Harden would not be available in that package. Pervasively shallow- freezing the permits would be a lot of ceremony.

@boneskull
Copy link
Collaborator Author

Did this get discussed already or no? If not, I'll be on the next call

@kriskowal
Copy link
Member

Did this get discussed already or no? If not, I'll be on the next call

This did not get discussed. Consider the topic commuted!

@kriskowal
Copy link
Member

Summary:

  1. My position is that the permits should have a separate version number so breaking changes to the permits do not force a major version bump in SES. Major version bumps in SES increase the number of versions we have to back-port patches to.
  2. Mark’s position is that the permits should be hardened.
  3. There’s a reality that harden can’t be called until after lockdown, which ties 1 and 2 into a chicken and egg cycle.

However, the permits are acyclic. If we ejected the permits to @endo/permits and did a recursive freeze over transitive properties at the export site, they would be emergently hardened after lockdown, lockdown could still refer to them internally, and we wouldn’t have to do any special treatment in anticipation of cycles.

I’m curious whether @erights would find that safe enough.

@erights
Copy link
Contributor

erights commented Feb 5, 2024

... ejected ...

"ejected"?

@boneskull
Copy link
Collaborator Author

fwiw: I have no opinion on how they get exported, but it'd be nice if we could find some mutually-agreed-upon way to do so. 😄

@kriskowal
Copy link
Member

... ejected ...

"ejected"?

Move code currently in ses into a package ses depends upon.

@erights
Copy link
Contributor

erights commented Feb 7, 2024

... ejected ...

"ejected"?

Move code currently in ses into a package ses depends upon.

Rereading with that in mind...

I’m curious whether @erights would find that safe enough.

yes.

Copy link
Member

@kriskowal kriskowal left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Plan of record:

  1. Create a new package, @endo/permits using scripts/create-package.sh permits
  2. Move permits.js into @endo/permits under src.
  3. Add a transitive property tree freeze and freeze permits.
  4. export permits, import them in ses

@erights
Copy link
Contributor

erights commented Feb 8, 2024

What about enablements? What other intrinsic enumerations should we consider?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request ses
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

4 participants