Closed Bug 1448735 Opened 7 years ago Closed 7 years ago

Stop allowing Components in non-system-principal sandboxes

Categories

(Core :: XPConnect, enhancement)

enhancement
Not set
normal

Tracking

()

RESOLVED FIXED
mozilla61
Tracking Status
firefox61 --- fixed

People

(Reporter: bzbarsky, Assigned: bzbarsky)

References

Details

Attachments

(1 file)

Right now we put a Components into expanded-principal sandboxes unless they explicitly opt out. We should stop doing this, as part of making Components system-only.
I don't see an obvious way to keep the test coverage for same-compartment security wrappers there...
Attachment #8962229 - Flags: review?(kmaglione+bmo)
Assignee: nobody → bzbarsky
Status: NEW → ASSIGNED
Comment on attachment 8962229 [details] [diff] [review] Stop exposing Components in expanded principal sandboxes Review of attachment 8962229 [details] [diff] [review]: ----------------------------------------------------------------- ::: js/xpconnect/tests/unit/test_bug872772.js @@ -37,5 @@ > - var waivedC = unwaivedC.wrappedJSObject; > - Assert.ok(waivedC && unwaivedC && (waivedC != unwaivedC)); > - xhr.waivedC = waivedC; > - Assert.ok(xhr.waivedC === waivedC); > - Assert.ok(Cu.unwaiveXrays(xhr.waivedC) === unwaivedC); I guess at this point it doesn't really matter. Once the DOM_OBJECT flag is gone, there shouldn't be any way to get a same-compartment security wrapper from a content scope anymore.
Attachment #8962229 - Flags: review?(kmaglione+bmo) → review+
Pushed by bzbarsky@mozilla.com: https://hg.mozilla.org/integration/mozilla-inbound/rev/0aa804586253 Stop exposing Components in expanded principal sandboxes. r=kmag
Status: ASSIGNED → RESOLVED
Closed: 7 years ago
Resolution: --- → FIXED
Target Milestone: --- → mozilla61
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Created:
Updated:
Size: