You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@cordova.apache.org by GitBox <gi...@apache.org> on 2019/10/22 15:12:18 UTC

[GitHub] [cordova-docs] breautek opened a new issue #1022: Document warnings on using remote source for

breautek opened a new issue #1022: Document warnings on using remote source for <content>
URL: https://github.com/apache/cordova-docs/issues/1022
 
 
   I think there should be better warnings documented about using a remote url for the `config.xml` tag `<content src="..." />`
   
   It should be noted that using remote urls can be dangerous for security and is also against the terms of service of both the Apple App & Google Play stores. (Text of interest is in bold).
   
   Apple App Store policy at Section 4.7 HTML5 Games, Bots, etc[1] reads:
   >Apps may contain or run code that is not embedded in the binary (e.g. HTML5-based games, bots, etc.), as long as code distribution isn’t the main purpose of the app, the code is not offered in a store or store-like interface, and provided that the software (1) is free or purchased using in-app purchase; (2) only uses capabilities available in a standard WebKit view (e.g. it must open and run natively in Safari without modifications or additional software); **your app must use WebKit and JavaScript Core to run third-party software and should not attempt to extend or expose native platform APIs to third-party software**; (3) is offered by developers that have joined the Apple Developer Program and signed the Apple Developer Program License Agreement; (4) does not provide access to real money gaming, lotteries, or charitable donations; (5) adheres to the terms of these App Review Guidelines (e.g. does not include objectionable content); and (6) does not support digital commerce. Upon request, you must provide an index of software and metadata available in your app. It must include Apple Developer Program Team IDs for the providers of the software along with a URL which App Review can use to confirm that the software complies with the requirements above.
   
   Google Play Store policy "Malicious Behaviour" reads:
   > An app distributed via Google Play may not modify, replace, or update itself using any method other than Google Play's update mechanism. **Likewise, an app may not download executable code (e.g. dex, JAR, .so files) from a source other than Google Play. This restriction does not apply to code that runs in a virtual machine and has limited access to Android APIs (such as JavaScript in a webview or browser).**
   
   While the text isn't as explicit as Apple, and the examples are mostly native file examples, it does say that this does not apply to code that has limited access to Android APIs such as Javascript but in Cordova, the javascript **does** have full access to android APIs via the cordova bridge.
   
   Currently the [documentation](https://github.com/apache/cordova-docs/blob/master/www/docs/en/dev/config_ref/index.md#content) does not warn the users of this, and I see on a rather frequent basis of this kind of usage, which I think is completely improper.
   
   [1] https://developer.apple.com/app-store/review/guidelines/
   [2] https://play.google.com/about/developer-content-policy-print/

----------------------------------------------------------------
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.
 
For queries about this service, please contact Infrastructure at:
users@infra.apache.org


With regards,
Apache Git Services

---------------------------------------------------------------------
To unsubscribe, e-mail: commits-unsubscribe@cordova.apache.org
For additional commands, e-mail: commits-help@cordova.apache.org