gradle / actions

A collection of GitHub Actions to accelerate your Gradle Builds on GitHub
https://github.com/marketplace/actions/build-with-gradle
MIT License
147 stars 39 forks source link

Validate gradlew scripts #283

Open di72nn opened 4 years ago

di72nn commented 4 years ago

Also validate gradlew and gradlew.bat scripts. These are not blobs so it is harder to overlook something, but I think these should be checked too.

JLLeitschuh commented 4 years ago

That doesn't always really work. Some organizations modify their gradlew scripts when updating them in order to, for example, increase the memory the wrapper is given. When doing that, the checksum can't be validated.

https://gradle/gradle:buildSrc/subprojects/versioning/src/main/kotlin/org/gradle/gradlebuild/versioning/WrapperPlugin.kt@298ac44#L34-L42

di72nn commented 4 years ago

That's a fair point, but I still think that there should be an option (or another step in the workflow) to check the scripts for those who don't need to modify them.

JLLeitschuh commented 4 years ago

@eskatos how difficult would it be to also generate SHA checksums for the gradlew and gradle.bat files? One problem that you'd also run into here is that, unless you had your .gitattributes (for example) file setup correctly, depending upon the OS that created the repository, you may have different line endings (windows vs unix line endings) in the file, thus causing the SHA checksums to be different.

eskatos commented 4 years ago

@JLLeitschuh it shouldn't be difficult. But it'll require work to automate generating the hashes, publishing them where appropriate etc.. You could have a look at how the wrapper jar hashes are handled, it should be similar both in where and how it's done. Then we could update this action to consume them for more validation.

As said above, I wonder what the signal/noise ratio would be given the line endings potential problem and the fact it is intended that people modify it if they need to e.g. change the Gradle client VM options.

robstoll commented 4 years ago

I would vote for an opt-out of the additional check (in the sense of security first).

vlsi commented 3 years ago

As said above, I wonder what the signal/noise ratio would be given the line endings potential problem and the fact it is intended that people modify it if they need to e.g. change the Gradle client VM options.

1) The verifier could normalize line endings (gradlew to LF and gradlew.bat to CRLF) before doing the comparison (it might make sense to normalize to LF always).

2) Frankly speaking, I have not seen a case when users customized gradlew scripts. I assume an opt-out would really help here: the extra skip-gradlew-scripts-validation: true would make it explicit that the files are augmented on purpose.

tlf30 commented 1 year ago

I also agree. While some users may modify their scripts, I have not personally seen it before. It would be incredibly nice to have in order to verify the integrity of the scripts. An opt out is a fine solution in my opinion. And I think normalization of line endings would be the way to go as already mentioned.

magicgoose commented 2 months ago

If I were to think like an attacker looking to plant some backdoors or whatever, I may need to choose between:

  1. infect wrapper jar: a. it is obvious that no one will even try reviewing it by eye, obviously only a movie superhero can do it b. already existing tools, like this one, will catch it by a checksum check
  2. infect gradlew[.bat] script: a. technically it's just a large script, in a somewhat-readable language; given enough time, someone can review it in full with some chance of success, so someone else may also "hope" that someone else had/would have reviewed it b. it is likely that no automation will catch a malicious injection in it c. people who didn't do research, may assume that their already-set-up automation, like this project, will verify the script too

so my chances of being successful seem to be much higher if I go for the script