Open Bug 1207321 Opened 6 years ago Updated 1 year ago
Stop exposing XPCWrapped
Native (XPCWN) to the web
Obviously this depends on the various bugs that track things we still expose via XPCWN. Added some of those, but some stuff listed in https://etherpad.mozilla.org/classinfo doesn't seem to have associated bugs yet.
Has the day finally come? :-)
It depends on your definitions of "web", "expose", and "is". ;) The current state of things is that nsScriptSecurityManager::CanCreateWrapper allows creation in the following three cases: 1) This is a remote-XUL domain. Hence my thread about removing remote XUL on .platform. 2) This is a global that did enablePrivilege. 3) This is a global that has the system principal. What that means in terms of resolving this bug, I'm not sure. I'm not even sure what it means in terms of resolving the bugs it blocks (e.g. can we get rid of XPCWN xrays given the above? Replace them with opaque wrappers, presumably?).
Per vidyo discussion, I think we should: * Remove the permission stuff around remote XUL, replace it with: IsFileURIWithPrefSet || IsInAutomation * Move all web-related stuff to a separate object, only instantiate XPCWNScope for the cases where it's allowed, and kill the CanCreateWrapper stuff. * Try to get somebody to do the work to remove enablePrivilege (see bug 1435113)
You need to log in before you can comment on or make changes to this bug.