Closed
Bug 1438781
Opened 7 years ago
Closed 5 years ago
Improve handling permission requests from null principal pages
Categories
(Firefox :: Site Permissions, enhancement, P2)
Tracking
()
RESOLVED
WORKSFORME
Tracking | Status | |
---|---|---|
firefox60 | --- | affected |
People
(Reporter: johannh, Unassigned)
References
Details
When we receive a permission request from e.g. a sandboxed iframe without allow-same-origin, we exhibit an incredibly bad behavior right now. The promise is just left dangling because we never end up showing a permission prompt because of https://searchfox.org/mozilla-central/rev/74b7ffee403c7ffd05b8b476c411cbf11d134eb9/browser/modules/PermissionUI.jsm#253
This doesn't happen for WebRTC prompts which have their own UI code, though we're considering/planning to disallow null-principals in bug 1371741 there.
This can be tested on https://joo.crater.uberspace.de/frame-permissions.html (in the sandboxed permission.site)
Chrome just throws a Security Exception in all these cases because they have implemented Feature Policy and sites can go around this by explicitly setting allow="geolocation". I would really love to have Feature Policy (https://github.com/mozilla/standards-positions/issues/24).
We could do the same (throw a security exception), or use the documentURI of the page. Either way we should do something about this.
Reporter | ||
Updated•7 years ago
|
Summary: Improve handling permissions from null principal pages → Improve handling permission requests from null principal pages
Updated•7 years ago
|
Assignee: nobody → prathikshaprasadsuman
Status: NEW → ASSIGNED
Updated•6 years ago
|
Assignee: prathikshaprasadsuman → nobody
Status: ASSIGNED → NEW
Updated•5 years ago
|
Component: Site Identity → Site Permissions
Reporter | ||
Comment 1•5 years ago
|
||
We have Feature Policy and Permission Delegation now 🤝
Status: NEW → RESOLVED
Closed: 5 years ago
Resolution: --- → WORKSFORME
You need to log in
before you can comment on or make changes to this bug.
Description
•