+1

But we need better docs to explain the differences between legacy-whitelist
and whitelist

And more detailed explanation on how to create a proper config.xml that
works across the board for ios and android. What about windows?

Also to look on how to have a good config.xml in hello-world template,
since most users will start with this first and I would like to be secure
by default and they open. meaning rely on CSP, and only use config.xml for
x, y, z


On Wed, Aug 26, 2015 at 10:34 AM Tommy-Carlos Williams <to...@devgeeks.org>
wrote:

> +1 from me.
>
>
>
> > On 26 Aug 2015, at 23:13, Shazron <shaz...@gmail.com> wrote:
> >
> > Any objections or further feedback? If not I will move on to what we seem
> > to have consensus about:
> >
> > If there are no <access> entries, then network requests are wide open
> > (wildcard * default) and security is handled via CSP.
> > We would recommend no <access> entries to be used, users should use CSP.
> >
> >> On Tue, Aug 11, 2015 at 7:01 PM, Shazron <shaz...@gmail.com> wrote:
> >>
> >>
> >> So, is the whitelist plugin network request list "*" with no <access>
> >>> entries, or
> >>> "*" because of the <access> entry added to the default project?
> >>
> >>
> >> "*" would be the default. So if there are no <access> entries, it would
> be
> >> added. If the default project had the <access> wildcard, then no change
> >> (since that is the default anyway).
> >>
> >> The old way you would need an explicit <access> entry wildcard for
> >> unrestricted native and web code access -- the new way is unrestricted
> >> native code access (unless set explicitly), and CSP for web code access.
> >>
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: dev-unsubscr...@cordova.apache.org
> For additional commands, e-mail: dev-h...@cordova.apache.org
>
>

Reply via email to